Unnamed: 0 int64 0 350k | level_0 int64 0 351k | ApplicationNumber int64 9.75M 96.1M | ArtUnit int64 1.6k 3.99k | Abstract stringlengths 1 8.37k | Claims stringlengths 3 292k | abstract-claims stringlengths 68 293k | TechCenter int64 1.6k 3.9k |
|---|---|---|---|---|---|---|---|
7,100 | 7,100 | 14,424,067 | 2,487 | To estimate content complexity of a video, energy of prediction residuals is calculated. The prediction residuals are usually smaller when the video is less complex and more predictable. Scales of prediction residuals also depend on encoding configurations, for example, I pictures usually have larger prediction residuals than P and B pictures even when the contents are very similar and thus have similar perceived content complexity. To more closely reflect the content complexity, alignment scaling factors are estimated for different encoding configurations. Based on the energy of prediction residuals and alignment scaling factors, an overall content unpredictability parameter can be estimated to compute a compression distortion factor for the video. The compression distortion factor, combined with slicing and freezing distortion factors, can be used to estimate a video quality metric for the video. | 1. A method for assessing video quality of a video included in a bitstream, comprising the steps of:
determining a content unpredictability parameter responsive to prediction residuals of a block of a picture in the video; scaling the content unpredictability parameter responsive to the encoding configuration of the block, wherein the encoding configuration includes at least one of a picture type and GOP (Group of Picture) structure; and determining a quality metric representative of video quality of the video included in the bitstream in response to the scaled content unpredictability parameter. 2. The method of claim 1, wherein the content unpredictability parameter is indicative of a degree of difficulty of predicting the block, and wherein a value of the scaled content unpredictability parameter is substantially same as a value of a second content unpredictability parameter for another block that has similar content as the block. 3. (canceled) 4. The method of claim 1, wherein the step of determining a content unpredictability parameter comprises the steps of:
determining energy of the prediction residuals. 5. The method of claim 4, wherein a scaling factor used in the scaling step is determined on the basis that the prediction residuals follow a gamma distribution. 6. The method of claim 5, wherein respective scaling factors are determined for a plurality of encoding configurations, on the basis that a shape parameter of the gamma distribution for the encoding configuration is same as another shape parameter for another encoding configuration. 7. The method of claim 1, wherein a respective content unpredictability parameter is determined for each one of a plurality of blocks in the video, and wherein an overall content unpredictability parameter for the video is determined responsive the content unpredictability parameters for the plurality of blocks. 8. The method of claim 1, further comprising:
performing at least one of monitoring quality of the bitstream, adjusting the bitstream in response to the quality metric, creating a new bitstream based on the quality metric, adjusting parameters of a distribution network used to transmit the bitstream, determining whether to keep the bitstream based on the quality metric, and choosing an error concealment mode at a decoder. 9. The method of claim 1, wherein the step of determining the quality metric is further in response to at least one of a resolution and frame rate. 10. An apparatus for assessing video quality of a video included in a bitstream, comprising:
a decoder configured to access prediction residuals for a block of a picture of the video and determine encoding configuration of the block; a content unpredictability parameter calculator configured to
determine a content unpredictability parameter responsive to prediction residuals of the block, and
scale the content unpredictability parameter responsive to the encoding configuration of the block, wherein the encoding configuration includes at least one of a picture type and GOP (Group of Picture) structure; and
a quality predictor configured to determine a quality metric representative of video quality of the video included in the bitstream in response to the scaled content unpredictability parameter. 11. The apparatus of claim 10, wherein the content unpredictability parameter is indicative of a degree of difficulty of predicting the block, and wherein a value of the scaled content unpredictability parameter is substantially same as a value of a second content unpredictability parameter for another block that has similar content as the block. 12. (canceled) 13. The apparatus of claim 10, wherein the content unpredictability parameter calculator determines energy of the prediction residuals and scales the energy of the prediction residuals responsive to the encoding configuration. 14. The apparatus of claim 13, wherein the content unpredictability parameter calculator determines a scaling factor on the basis that the prediction residuals follow a gamma distribution. 15. The apparatus of claim 14, wherein respective scaling factors are determined for a plurality of encoding configurations, on the basis that a shape parameter of the gamma distribution for the encoding configuration is same as another shape parameter for another encoding configuration. 16. The apparatus of claim 10, wherein a respective content unpredictability parameter is determined for each one of a plurality of blocks in the video, and wherein an overall content unpredictability parameter for the video is determined responsive the content unpredictability parameters for the plurality of blocks. 17. The apparatus of claim 10, further comprising:
a video quality monitor configured to perform at least one of monitoring quality of the bitstream, adjusting the bitstream in response to the quality metric, creating a new bitstream based on the quality metric, adjusting parameters of a distribution network used to transmit the bitstream, determining whether to keep the bitstream based on the quality metric, and choosing an error concealment mode at a decoder. 18. The apparatus of claim 10, wherein the content unpredictability parameter calculator determines the quality metric further in response to at least one of a resolution and frame rate. 19. (canceled) | To estimate content complexity of a video, energy of prediction residuals is calculated. The prediction residuals are usually smaller when the video is less complex and more predictable. Scales of prediction residuals also depend on encoding configurations, for example, I pictures usually have larger prediction residuals than P and B pictures even when the contents are very similar and thus have similar perceived content complexity. To more closely reflect the content complexity, alignment scaling factors are estimated for different encoding configurations. Based on the energy of prediction residuals and alignment scaling factors, an overall content unpredictability parameter can be estimated to compute a compression distortion factor for the video. The compression distortion factor, combined with slicing and freezing distortion factors, can be used to estimate a video quality metric for the video.1. A method for assessing video quality of a video included in a bitstream, comprising the steps of:
determining a content unpredictability parameter responsive to prediction residuals of a block of a picture in the video; scaling the content unpredictability parameter responsive to the encoding configuration of the block, wherein the encoding configuration includes at least one of a picture type and GOP (Group of Picture) structure; and determining a quality metric representative of video quality of the video included in the bitstream in response to the scaled content unpredictability parameter. 2. The method of claim 1, wherein the content unpredictability parameter is indicative of a degree of difficulty of predicting the block, and wherein a value of the scaled content unpredictability parameter is substantially same as a value of a second content unpredictability parameter for another block that has similar content as the block. 3. (canceled) 4. The method of claim 1, wherein the step of determining a content unpredictability parameter comprises the steps of:
determining energy of the prediction residuals. 5. The method of claim 4, wherein a scaling factor used in the scaling step is determined on the basis that the prediction residuals follow a gamma distribution. 6. The method of claim 5, wherein respective scaling factors are determined for a plurality of encoding configurations, on the basis that a shape parameter of the gamma distribution for the encoding configuration is same as another shape parameter for another encoding configuration. 7. The method of claim 1, wherein a respective content unpredictability parameter is determined for each one of a plurality of blocks in the video, and wherein an overall content unpredictability parameter for the video is determined responsive the content unpredictability parameters for the plurality of blocks. 8. The method of claim 1, further comprising:
performing at least one of monitoring quality of the bitstream, adjusting the bitstream in response to the quality metric, creating a new bitstream based on the quality metric, adjusting parameters of a distribution network used to transmit the bitstream, determining whether to keep the bitstream based on the quality metric, and choosing an error concealment mode at a decoder. 9. The method of claim 1, wherein the step of determining the quality metric is further in response to at least one of a resolution and frame rate. 10. An apparatus for assessing video quality of a video included in a bitstream, comprising:
a decoder configured to access prediction residuals for a block of a picture of the video and determine encoding configuration of the block; a content unpredictability parameter calculator configured to
determine a content unpredictability parameter responsive to prediction residuals of the block, and
scale the content unpredictability parameter responsive to the encoding configuration of the block, wherein the encoding configuration includes at least one of a picture type and GOP (Group of Picture) structure; and
a quality predictor configured to determine a quality metric representative of video quality of the video included in the bitstream in response to the scaled content unpredictability parameter. 11. The apparatus of claim 10, wherein the content unpredictability parameter is indicative of a degree of difficulty of predicting the block, and wherein a value of the scaled content unpredictability parameter is substantially same as a value of a second content unpredictability parameter for another block that has similar content as the block. 12. (canceled) 13. The apparatus of claim 10, wherein the content unpredictability parameter calculator determines energy of the prediction residuals and scales the energy of the prediction residuals responsive to the encoding configuration. 14. The apparatus of claim 13, wherein the content unpredictability parameter calculator determines a scaling factor on the basis that the prediction residuals follow a gamma distribution. 15. The apparatus of claim 14, wherein respective scaling factors are determined for a plurality of encoding configurations, on the basis that a shape parameter of the gamma distribution for the encoding configuration is same as another shape parameter for another encoding configuration. 16. The apparatus of claim 10, wherein a respective content unpredictability parameter is determined for each one of a plurality of blocks in the video, and wherein an overall content unpredictability parameter for the video is determined responsive the content unpredictability parameters for the plurality of blocks. 17. The apparatus of claim 10, further comprising:
a video quality monitor configured to perform at least one of monitoring quality of the bitstream, adjusting the bitstream in response to the quality metric, creating a new bitstream based on the quality metric, adjusting parameters of a distribution network used to transmit the bitstream, determining whether to keep the bitstream based on the quality metric, and choosing an error concealment mode at a decoder. 18. The apparatus of claim 10, wherein the content unpredictability parameter calculator determines the quality metric further in response to at least one of a resolution and frame rate. 19. (canceled) | 2,400 |
7,101 | 7,101 | 13,204,078 | 2,452 | According to one aspect, the subject matter described herein includes a method for managing social interaction information. The method includes receiving first social interaction information associated with a user of a first over the top (OTT) service platform. The method also includes receiving second social interaction information associated with the user, the second social interaction information from a communications service platform distinct from the first OTT service platform. The method further includes generating, using the first social interaction information and the second social interaction information, consolidated social interaction information and providing the consolidated social interaction information to the user. | 1. A method for managing social interaction information, the method comprising:
receiving first social interaction information associated with a user of a first over the top (OTT) service platform; receiving second social interaction information associated with the user, the second social interaction information from a communications service platform distinct from the first OTT service platform; generating, using the first social interaction information and the second social interaction information, consolidated social interaction information; and providing the consolidated social interaction information to the user. 2. The method of claim 1 wherein receiving the first social interaction information includes logging into the first OTT service platform using stored user information and retrieving the first social interaction information. 3. The method of claim 1 wherein receiving the first social interaction information includes monitoring communications between the user and the first OTT service platform. 4. The method of claim 2 wherein monitoring communications between the user and the first OTT service platform is performed by at least one of user equipment, a server, a proxy, and a telecommunications node. 5. The method of claim 1 wherein providing consolidated social interaction information to a user includes generating a data structure representing social interactions of the user. 6. The method of claim 5 wherein the data structure includes information indicating associations between related interactions occurring via the first OTT service platform and the communications service. 7. The method of claim 5 wherein the data structure is used in generating a visual representation of at least a portion of the social interactions of the user. 8. The method of claim 7 wherein the at least a portion of the social interactions of the user is based on at least one of a time period, a persona, a location, an occupation, an interest, a communications device, a communications service, a conversation, and frequency of interaction. 9. The method of claim 7 wherein the visual representation is usable to initiate communications via the first OTT service platform or the second OTT service platform. 10. The method of claim 1 wherein the first OTT service platform includes one of an email service platform, an instant messaging service platform, a social networking service platform, a media hosting service platform, a business networking service platform, a media streaming service platform, or a voice over Internet Protocol (VoIP) service platform. 11. The method of claim 1 wherein the communications service platform includes one of a mobile telecommunications service platform or a second OTT service platform. 12. A system for managing social interaction information, the system comprising:
a monitoring module configured to receive first social interaction information associated with a user in a first over the top (OTT) service platform and configured to receive second social interaction information associated with the user, the second social interaction information from a communications service platform distinct from the first OTT service platform; and a consolidation module configured to generate, using the first social interaction information and the second social interaction information, consolidated social interaction information and configured to provide the consolidated social interaction information to the user. 13. The system of claim 12 wherein the monitoring module is associated with at least one of user equipment, a server, a proxy, and a telecommunications node. 14. The system of claim 12 wherein the consolidation module is associated with at least one of user equipment, a server, a proxy, and a telecommunications node. 15. The system of claim 12 wherein the consolidation module is configured to generate a data structure representing social interactions of the user. 16. The system of claim 12 wherein the data structure includes information indicating associations between related interactions occurring via different service platforms. 17. The system of claim 15 wherein the consolidation module is configured to generate, using the data structure, a visual representation of at least a portion of the social interactions of the user. 18. The system of claim 17 wherein the at least a portion of the social interactions of the user is based on at least one of a time period, a persona, a location, an occupation, an interest, a communications device, a communications service, a conversation, and frequency of interaction. 19. The system of claim 17 wherein the visual representation is usable to initiate communications via the first OTT service platform or the second OTT service platform. 20. The system of claim 12 wherein the first OTT service platform includes one of an email service platform, an instant messaging service platform, a social networking service platform, a media hosting service platform, a business networking service platform, a media streaming service platform, or a voice over Internet Protocol (VoIP) service platform. 21. The system of claim 12 wherein the communications service platform includes one of a mobile telecommunications service platform or a second OTT service platform. 22. A non-transitory computer readable medium comprising computer executable instructions that when executed by a processor of a computer control the computer to perform steps comprising:
receiving first social interaction information associated with a user of a first over the top (OTT) service platform; receiving second social interaction information associated with the user, the second social interaction information from a communications service platform distinct from the first OTT service platform; generating, using the first social interaction information and the second social interaction information, consolidated social interaction information; and providing the consolidated social interaction information to the user. | According to one aspect, the subject matter described herein includes a method for managing social interaction information. The method includes receiving first social interaction information associated with a user of a first over the top (OTT) service platform. The method also includes receiving second social interaction information associated with the user, the second social interaction information from a communications service platform distinct from the first OTT service platform. The method further includes generating, using the first social interaction information and the second social interaction information, consolidated social interaction information and providing the consolidated social interaction information to the user.1. A method for managing social interaction information, the method comprising:
receiving first social interaction information associated with a user of a first over the top (OTT) service platform; receiving second social interaction information associated with the user, the second social interaction information from a communications service platform distinct from the first OTT service platform; generating, using the first social interaction information and the second social interaction information, consolidated social interaction information; and providing the consolidated social interaction information to the user. 2. The method of claim 1 wherein receiving the first social interaction information includes logging into the first OTT service platform using stored user information and retrieving the first social interaction information. 3. The method of claim 1 wherein receiving the first social interaction information includes monitoring communications between the user and the first OTT service platform. 4. The method of claim 2 wherein monitoring communications between the user and the first OTT service platform is performed by at least one of user equipment, a server, a proxy, and a telecommunications node. 5. The method of claim 1 wherein providing consolidated social interaction information to a user includes generating a data structure representing social interactions of the user. 6. The method of claim 5 wherein the data structure includes information indicating associations between related interactions occurring via the first OTT service platform and the communications service. 7. The method of claim 5 wherein the data structure is used in generating a visual representation of at least a portion of the social interactions of the user. 8. The method of claim 7 wherein the at least a portion of the social interactions of the user is based on at least one of a time period, a persona, a location, an occupation, an interest, a communications device, a communications service, a conversation, and frequency of interaction. 9. The method of claim 7 wherein the visual representation is usable to initiate communications via the first OTT service platform or the second OTT service platform. 10. The method of claim 1 wherein the first OTT service platform includes one of an email service platform, an instant messaging service platform, a social networking service platform, a media hosting service platform, a business networking service platform, a media streaming service platform, or a voice over Internet Protocol (VoIP) service platform. 11. The method of claim 1 wherein the communications service platform includes one of a mobile telecommunications service platform or a second OTT service platform. 12. A system for managing social interaction information, the system comprising:
a monitoring module configured to receive first social interaction information associated with a user in a first over the top (OTT) service platform and configured to receive second social interaction information associated with the user, the second social interaction information from a communications service platform distinct from the first OTT service platform; and a consolidation module configured to generate, using the first social interaction information and the second social interaction information, consolidated social interaction information and configured to provide the consolidated social interaction information to the user. 13. The system of claim 12 wherein the monitoring module is associated with at least one of user equipment, a server, a proxy, and a telecommunications node. 14. The system of claim 12 wherein the consolidation module is associated with at least one of user equipment, a server, a proxy, and a telecommunications node. 15. The system of claim 12 wherein the consolidation module is configured to generate a data structure representing social interactions of the user. 16. The system of claim 12 wherein the data structure includes information indicating associations between related interactions occurring via different service platforms. 17. The system of claim 15 wherein the consolidation module is configured to generate, using the data structure, a visual representation of at least a portion of the social interactions of the user. 18. The system of claim 17 wherein the at least a portion of the social interactions of the user is based on at least one of a time period, a persona, a location, an occupation, an interest, a communications device, a communications service, a conversation, and frequency of interaction. 19. The system of claim 17 wherein the visual representation is usable to initiate communications via the first OTT service platform or the second OTT service platform. 20. The system of claim 12 wherein the first OTT service platform includes one of an email service platform, an instant messaging service platform, a social networking service platform, a media hosting service platform, a business networking service platform, a media streaming service platform, or a voice over Internet Protocol (VoIP) service platform. 21. The system of claim 12 wherein the communications service platform includes one of a mobile telecommunications service platform or a second OTT service platform. 22. A non-transitory computer readable medium comprising computer executable instructions that when executed by a processor of a computer control the computer to perform steps comprising:
receiving first social interaction information associated with a user of a first over the top (OTT) service platform; receiving second social interaction information associated with the user, the second social interaction information from a communications service platform distinct from the first OTT service platform; generating, using the first social interaction information and the second social interaction information, consolidated social interaction information; and providing the consolidated social interaction information to the user. | 2,400 |
7,102 | 7,102 | 14,465,119 | 2,425 | An exhibition key delivery message (KDM) distribution system operable to receive a distribution KDM (DKDM), a method of creating an exhibition KDM, a system for controlling digital cinema content distribution, an exhibition KDM and a digital cinema player employing the exhibition KDM to play a digital cinema package. In one embodiment, the KDM distribution system includes: (1) a device list database containing device certificates of at least some target digital cinema players located in a region corresponding to the KDM distribution system, (2) booking data database containing schedules regarding a composition pertaining to the DKDM and (3) a KDM generator operable to create an exhibition KDM for the composition using the DKDM, a device certificate from the device list and the booking data. | 1. An exhibition key delivery message (KDM) distribution system operable to receive a distribution KDM (DKDM) and comprising:
a device list database containing device certificates of at least some target digital cinema players located in a region corresponding to said KDM distribution system; booking data database containing schedules regarding a composition pertaining to said DKDM; and a KDM generator operable to create an exhibition KDM for said composition using said DKDM, a device certificate from said device list and said booking data. 2. The KDM distribution system as recited in claim 1 wherein said device list contains device certificates of all target digital cinema players located in said region. 3. The KDM distribution system as recited in claim 1 wherein said schedule defines which theatres are allowed to play said composition. 4. The KDM distribution system as recited in claim 1 wherein said schedule defines which of said target digital cinema players are allowed to play said composition. 5. The KDM distribution system as recited in claim 1 wherein said KDM distribution system is further operable to distribute said exhibition KDM to a corresponding target digital cinema player. 6. The KDM distribution system as recited in claim 1 wherein said region is selected from the group consisting of:
a continent,
a subcontinent,
a country,
a state,
a county,
a city, and
a town. 7. A method of creating an exhibition key delivery message (KDM), comprising:
receiving a distribution KDM (DKDM); extracting a device certificate from a device list database containing device certificates of at least some target digital cinema players located in a region corresponding to a KDM distribution system; extracting booking data from a database containing schedules regarding a composition pertaining to said DKDM; and creating said exhibition KDM for said composition using said DKDM, said device certificate and said booking data. 8. The method as recited in claim 7 wherein said device list contains device certificates of all target digital cinema players located in said region. 9. The method as recited in claim 7 wherein said schedule defines which theatres are allowed to play said composition. 10. The method as recited in claim 7 wherein said schedule defines which of said target digital cinema players are allowed to play said composition. 11. The method as recited in claim 7 further comprising distributing said exhibition KDM to a corresponding target digital cinema player. 12. The method as recited in claim 7 wherein said region is selected from the group consisting of:
a continent,
a subcontinent,
a country,
a state,
a county,
a city, and
a town. 13. A system for controlling digital cinema content distribution, comprising:
a mastering site operable to generate distribution key delivery messages (DKDMs) on behalf of a content owner; and distribution sites containing exhibition key delivery message (KDM) distribution systems operable to receive said DKDMs, each of said exhibition KDM distribution systems including:
a device list database containing device certificates of at least some target digital cinema players located in a region corresponding to said KDM distribution system,
booking data database containing schedules regarding a composition pertaining to said DKDM, and
a KDM generator operable to create an exhibition KDM for said composition using said DKDM, a device certificate from said device list and said booking data. 14. The system as recited in claim 12 wherein said device list contains device certificates of all target digital cinema players located in said region. 15. The system as recited in claim 12 wherein said schedule defines which theatres are allowed to play said composition. 16. The system as recited in claim 12 wherein said schedule defines which of said target digital cinema players are allowed to play said composition. 17. The system as recited in claim 12 wherein each of said KDM distribution systems is further operable to distribute said exhibition KDM to a corresponding target digital cinema player. 18. The system as recited in claim 12 wherein said region is selected from the group consisting of:
a continent,
a subcontinent,
a country,
a state,
a county,
a city, and
a town. 19. An exhibition key delivery message (KDM), comprising:
data identifying a digital cinema package (DCP) to which said KDM corresponds; at least one business rule identifying a location of a digital cinema player authorized to play said DCP; and data allowing said digital cinema player to play said DCP only if said digital cinema player qualifies according to said at least one business rule. 20. The exhibition KDM as recited in claim 19 wherein said data allowing said digital cinema player to play said DCP includes data allowing said digital cinema player to decrypt said DCP. 21. The exhibition KDM as recited in claim 19 wherein said location is expressed as a selected one of:
a political subdivision, and
Global Positioning Satellite (GPS) coordinates. 22. A digital cinema player, comprising:
a key delivery message (KDM) receiver operable to receive a KDM for a digital cinema package (DCP) and determine whether said digital cinema player is authorized to play said DCP using a device certificate for said digital cinema player based on a location of said digital cinema player; and a DCP player associated with said KDM receiver and operable to play said DCP only if said digital cinema player is authorized to play said DCP. 23. The digital cinema player as recited in claim 22 wherein said location is expressed as a selected one of:
a political subdivision, and
Global Positioning Satellite (GPS) coordinates. 24. The digital cinema player as recited in claim 22 wherein said location is exclusive to said digital cinema player. | An exhibition key delivery message (KDM) distribution system operable to receive a distribution KDM (DKDM), a method of creating an exhibition KDM, a system for controlling digital cinema content distribution, an exhibition KDM and a digital cinema player employing the exhibition KDM to play a digital cinema package. In one embodiment, the KDM distribution system includes: (1) a device list database containing device certificates of at least some target digital cinema players located in a region corresponding to the KDM distribution system, (2) booking data database containing schedules regarding a composition pertaining to the DKDM and (3) a KDM generator operable to create an exhibition KDM for the composition using the DKDM, a device certificate from the device list and the booking data.1. An exhibition key delivery message (KDM) distribution system operable to receive a distribution KDM (DKDM) and comprising:
a device list database containing device certificates of at least some target digital cinema players located in a region corresponding to said KDM distribution system; booking data database containing schedules regarding a composition pertaining to said DKDM; and a KDM generator operable to create an exhibition KDM for said composition using said DKDM, a device certificate from said device list and said booking data. 2. The KDM distribution system as recited in claim 1 wherein said device list contains device certificates of all target digital cinema players located in said region. 3. The KDM distribution system as recited in claim 1 wherein said schedule defines which theatres are allowed to play said composition. 4. The KDM distribution system as recited in claim 1 wherein said schedule defines which of said target digital cinema players are allowed to play said composition. 5. The KDM distribution system as recited in claim 1 wherein said KDM distribution system is further operable to distribute said exhibition KDM to a corresponding target digital cinema player. 6. The KDM distribution system as recited in claim 1 wherein said region is selected from the group consisting of:
a continent,
a subcontinent,
a country,
a state,
a county,
a city, and
a town. 7. A method of creating an exhibition key delivery message (KDM), comprising:
receiving a distribution KDM (DKDM); extracting a device certificate from a device list database containing device certificates of at least some target digital cinema players located in a region corresponding to a KDM distribution system; extracting booking data from a database containing schedules regarding a composition pertaining to said DKDM; and creating said exhibition KDM for said composition using said DKDM, said device certificate and said booking data. 8. The method as recited in claim 7 wherein said device list contains device certificates of all target digital cinema players located in said region. 9. The method as recited in claim 7 wherein said schedule defines which theatres are allowed to play said composition. 10. The method as recited in claim 7 wherein said schedule defines which of said target digital cinema players are allowed to play said composition. 11. The method as recited in claim 7 further comprising distributing said exhibition KDM to a corresponding target digital cinema player. 12. The method as recited in claim 7 wherein said region is selected from the group consisting of:
a continent,
a subcontinent,
a country,
a state,
a county,
a city, and
a town. 13. A system for controlling digital cinema content distribution, comprising:
a mastering site operable to generate distribution key delivery messages (DKDMs) on behalf of a content owner; and distribution sites containing exhibition key delivery message (KDM) distribution systems operable to receive said DKDMs, each of said exhibition KDM distribution systems including:
a device list database containing device certificates of at least some target digital cinema players located in a region corresponding to said KDM distribution system,
booking data database containing schedules regarding a composition pertaining to said DKDM, and
a KDM generator operable to create an exhibition KDM for said composition using said DKDM, a device certificate from said device list and said booking data. 14. The system as recited in claim 12 wherein said device list contains device certificates of all target digital cinema players located in said region. 15. The system as recited in claim 12 wherein said schedule defines which theatres are allowed to play said composition. 16. The system as recited in claim 12 wherein said schedule defines which of said target digital cinema players are allowed to play said composition. 17. The system as recited in claim 12 wherein each of said KDM distribution systems is further operable to distribute said exhibition KDM to a corresponding target digital cinema player. 18. The system as recited in claim 12 wherein said region is selected from the group consisting of:
a continent,
a subcontinent,
a country,
a state,
a county,
a city, and
a town. 19. An exhibition key delivery message (KDM), comprising:
data identifying a digital cinema package (DCP) to which said KDM corresponds; at least one business rule identifying a location of a digital cinema player authorized to play said DCP; and data allowing said digital cinema player to play said DCP only if said digital cinema player qualifies according to said at least one business rule. 20. The exhibition KDM as recited in claim 19 wherein said data allowing said digital cinema player to play said DCP includes data allowing said digital cinema player to decrypt said DCP. 21. The exhibition KDM as recited in claim 19 wherein said location is expressed as a selected one of:
a political subdivision, and
Global Positioning Satellite (GPS) coordinates. 22. A digital cinema player, comprising:
a key delivery message (KDM) receiver operable to receive a KDM for a digital cinema package (DCP) and determine whether said digital cinema player is authorized to play said DCP using a device certificate for said digital cinema player based on a location of said digital cinema player; and a DCP player associated with said KDM receiver and operable to play said DCP only if said digital cinema player is authorized to play said DCP. 23. The digital cinema player as recited in claim 22 wherein said location is expressed as a selected one of:
a political subdivision, and
Global Positioning Satellite (GPS) coordinates. 24. The digital cinema player as recited in claim 22 wherein said location is exclusive to said digital cinema player. | 2,400 |
7,103 | 7,103 | 14,328,406 | 2,485 | A method, apparatus, and manufacture for processing video data. A list of output layer sets in a video bitstream is received, and an index to at least one target output layer set in the list of output layer sets is received. Next, target output layers in the at least one target output layer set is determined based on the index. At least the target output layers from the video bitstream are decoded. Then, the decoded target output layers are output without outputting layers that are not targeted for output. | 1. A method of decoding video data, the method comprising:
receiving a list of output layer sets in a video bitstream; receiving an index to at least one target output layer set in the list of output layer sets; determining target output layers in the at least one target output layer set based on the index; decoding at least the target output layers from the video bitstream; and outputting the decoded target output layers without outputting layers that are not targeted for output. 2. The method of claim 1, further comprising:
selecting a decoded picture buffer (DPB) size or sub-DPB size based at least partially on the index. 3. The method of claim 1, wherein the target output layer set includes a set of nuh_layer_id values, and wherein decoding at least the target output layers includes decoding data for pictures corresponding to the nuh_layer_id values in the target output layer set. 4. The method of claim 1, wherein each of the layers corresponds to at least one of a view, an image resolution, or a quality representation. 5. The method of claim 1, wherein decoding at least the target output layers includes decoding the target output layers, and further includes, when at least one of the target output layers depends on a reference layer that is not included in the set of target output layers, decoding the reference layer. 6. The method of claim 1, further comprising:
decoding at least the target output layers based on one or more syntax elements in a video picture sequence (VPS) of the video bitstream that signal the output operation point. 7. The method of claim 6, wherein the one or more syntax elements include the list of output layer sets. 8. The method of claim 1, wherein the list of output layer sets includes, in each output layer set in the list of output layer sets, another index to a layer set that corresponds to the output layer set, and wherein decoding at least the target output layers includes decoding each layer in the corresponding layer set. 9. The method of claim 8, wherein the corresponding layer set identifies each of the layers to be decoded, the target output layer set identifies each of the layers targeted for output, and wherein layers targeted for output are a subset of the layers to be decoded. 10. The method of claim 1, wherein receiving the index includes receiving the index in a transport layer. 11. The method of claim 10, wherein the index to the target output layer set in the list of output layer sets is associated with a specific output operation point selected from a set of output operation points associated with a manifest file that includes information on the target output layer set. 12. The method of claim 11, wherein the manifest file includes a media presentation description (MPD). 13. The method of claim 11, wherein the manifest file includes a session description protocol (SDP) message. 14. The method of claim 11, wherein the transport stream includes one of dynamic adaptive streaming over Hypertext Transfer Protocol (HTTP) (DASH), real-time transport protocol (RTP), or real time streaming protocol (RTSP). 15. A device for decoding video data, comprising:
a memory configured to store data; and one or more processors in communication with the memory and configured to:
receive a list of output layer sets in a video bitstream from the video bitstream;
receive an index to at least one target output layer set in the list of output layer sets;
determine target output layers in the at least one target output layer set based on the index;
decode at least the target output layers; and
output the decoded target output layers without outputting layers that are not targeted for output. 16. The device of claim 15, wherein the device comprises at least one of:
an integrated circuit; a microprocessor; or a wireless communication device. 17. The device of claim 15, wherein the one or more processors are further configured to:
select a decoded picture buffer (DPB) size or sub-DPB size based at least partially on the index. 18. The device of claim 15, wherein the target output layer set includes a set of nuh_layer_id values, and wherein decoding at least the target output layers includes decoding data for pictures corresponding to the nuh_layer_id values in the target output layer set. 19. The device of claim 15, wherein each of the layers corresponds to at least one of a view or an image resolution. 20. The device of claim 15, wherein decoding at least the target output layers includes decoding the target output layers, and further includes, when at least one of the target output layers depends on a reference layer that is not included in the set of target output layers, decoding the reference layer. 21. The device of claim 15, wherein the one or more processors are further configured to:
extract an output operation point based one or more syntax elements in a video picture sequence (VPS) of the bitstream that signal the output operation point. 22. The device of claim 21, wherein the one or more syntax elements include the list of output layer sets. 23. The device of claim 21, wherein the list of output layer sets includes, in each output layer set in the list of output layer sets, another index to a layer set that corresponds to the output layer set, and wherein decoding at least the target output layers includes decoding each layer in the corresponding layer set. 24. The device of claim 23, wherein the corresponding layer set identifies each of the layers to be decoded, the target output layer set identifies each of the layers targeted for output, and wherein layers targeted for output are a subset of the layers to be decoded. 25. A non-transitory computer-readable storage medium having stored thereon instructions that, when executed, cause at least one processor to:
receive a list of output layer sets in a video bitstream; receive an index to at least one target output layer set in the list of output layer sets; determine target output layers in the at least one target output layer set based on the index; decode at least the target output layers from the video bitstream; and output the decoded target output layers without outputting layers that are not targeted for output. 26. A device for decoding video data, the device comprising:
means for receiving a list of output layer sets in a video bitstream; means for receiving an index to at least one target output layer set in the list of output layer sets; means for determining target output layers in the at least one target output layer set based on the index; means for decoding at least the target output layers from the video bitstream; and means for outputting the decoded target output layers without outputting layers that are not targeted for output. 27. A method for processing video data, the method comprising:
determining a set of layers that are targeted for output; determining an index to a target output layer set in a list of output layer sets such that the target output layer set identifies the determined set of layers that are targeted for output; and sending the index to a video decoder. 28. The method of claim 27, wherein at least one output operation point is associated with the target output layer set. 29. The method of claim 27, wherein the target output layer set is identified by a set of nuh_layer_id values of each picture that is to be output associated with the target output layer set. 30. The method of claim 27, wherein when a transport layer used to receive the index conforms to a Session Description Protocol (SDP), the index has been determined by a receiver device based on an encoded bitstream including views of video data chosen by the receiver device, a description of output layer sets, and operation points based on temporal subsets. 31. The method of claim 27, further comprising:
communicating operation point information; after communicating the operation point information, receiving a selection of an output operation point; and determining the set of layers that are targeted for output based, at least in part, on the selection of the output operation point. 32. A device for processing video data, comprising:
a memory configured to store data; and one or more processors in communication with the memory and configured to:
receive an index to at least one target output layer set in a list of output;
determine a set of layers that are targeted for output;
determine an index to a target output layer set in a list of output layer sets such that the target output layer set identifies the determined set of layers that are targeted for output; and
send the index to a video decoder. 33. A non-transitory computer-readable storage medium having stored thereon instructions that, when executed, cause at least one processor to:
determine a set of layers that are targeted for output; determine an index to a target output layer set in a list of output layer sets such that the target output layer set identifies the determined set of layers that are targeted for output; and send the index to a video decoder. | A method, apparatus, and manufacture for processing video data. A list of output layer sets in a video bitstream is received, and an index to at least one target output layer set in the list of output layer sets is received. Next, target output layers in the at least one target output layer set is determined based on the index. At least the target output layers from the video bitstream are decoded. Then, the decoded target output layers are output without outputting layers that are not targeted for output.1. A method of decoding video data, the method comprising:
receiving a list of output layer sets in a video bitstream; receiving an index to at least one target output layer set in the list of output layer sets; determining target output layers in the at least one target output layer set based on the index; decoding at least the target output layers from the video bitstream; and outputting the decoded target output layers without outputting layers that are not targeted for output. 2. The method of claim 1, further comprising:
selecting a decoded picture buffer (DPB) size or sub-DPB size based at least partially on the index. 3. The method of claim 1, wherein the target output layer set includes a set of nuh_layer_id values, and wherein decoding at least the target output layers includes decoding data for pictures corresponding to the nuh_layer_id values in the target output layer set. 4. The method of claim 1, wherein each of the layers corresponds to at least one of a view, an image resolution, or a quality representation. 5. The method of claim 1, wherein decoding at least the target output layers includes decoding the target output layers, and further includes, when at least one of the target output layers depends on a reference layer that is not included in the set of target output layers, decoding the reference layer. 6. The method of claim 1, further comprising:
decoding at least the target output layers based on one or more syntax elements in a video picture sequence (VPS) of the video bitstream that signal the output operation point. 7. The method of claim 6, wherein the one or more syntax elements include the list of output layer sets. 8. The method of claim 1, wherein the list of output layer sets includes, in each output layer set in the list of output layer sets, another index to a layer set that corresponds to the output layer set, and wherein decoding at least the target output layers includes decoding each layer in the corresponding layer set. 9. The method of claim 8, wherein the corresponding layer set identifies each of the layers to be decoded, the target output layer set identifies each of the layers targeted for output, and wherein layers targeted for output are a subset of the layers to be decoded. 10. The method of claim 1, wherein receiving the index includes receiving the index in a transport layer. 11. The method of claim 10, wherein the index to the target output layer set in the list of output layer sets is associated with a specific output operation point selected from a set of output operation points associated with a manifest file that includes information on the target output layer set. 12. The method of claim 11, wherein the manifest file includes a media presentation description (MPD). 13. The method of claim 11, wherein the manifest file includes a session description protocol (SDP) message. 14. The method of claim 11, wherein the transport stream includes one of dynamic adaptive streaming over Hypertext Transfer Protocol (HTTP) (DASH), real-time transport protocol (RTP), or real time streaming protocol (RTSP). 15. A device for decoding video data, comprising:
a memory configured to store data; and one or more processors in communication with the memory and configured to:
receive a list of output layer sets in a video bitstream from the video bitstream;
receive an index to at least one target output layer set in the list of output layer sets;
determine target output layers in the at least one target output layer set based on the index;
decode at least the target output layers; and
output the decoded target output layers without outputting layers that are not targeted for output. 16. The device of claim 15, wherein the device comprises at least one of:
an integrated circuit; a microprocessor; or a wireless communication device. 17. The device of claim 15, wherein the one or more processors are further configured to:
select a decoded picture buffer (DPB) size or sub-DPB size based at least partially on the index. 18. The device of claim 15, wherein the target output layer set includes a set of nuh_layer_id values, and wherein decoding at least the target output layers includes decoding data for pictures corresponding to the nuh_layer_id values in the target output layer set. 19. The device of claim 15, wherein each of the layers corresponds to at least one of a view or an image resolution. 20. The device of claim 15, wherein decoding at least the target output layers includes decoding the target output layers, and further includes, when at least one of the target output layers depends on a reference layer that is not included in the set of target output layers, decoding the reference layer. 21. The device of claim 15, wherein the one or more processors are further configured to:
extract an output operation point based one or more syntax elements in a video picture sequence (VPS) of the bitstream that signal the output operation point. 22. The device of claim 21, wherein the one or more syntax elements include the list of output layer sets. 23. The device of claim 21, wherein the list of output layer sets includes, in each output layer set in the list of output layer sets, another index to a layer set that corresponds to the output layer set, and wherein decoding at least the target output layers includes decoding each layer in the corresponding layer set. 24. The device of claim 23, wherein the corresponding layer set identifies each of the layers to be decoded, the target output layer set identifies each of the layers targeted for output, and wherein layers targeted for output are a subset of the layers to be decoded. 25. A non-transitory computer-readable storage medium having stored thereon instructions that, when executed, cause at least one processor to:
receive a list of output layer sets in a video bitstream; receive an index to at least one target output layer set in the list of output layer sets; determine target output layers in the at least one target output layer set based on the index; decode at least the target output layers from the video bitstream; and output the decoded target output layers without outputting layers that are not targeted for output. 26. A device for decoding video data, the device comprising:
means for receiving a list of output layer sets in a video bitstream; means for receiving an index to at least one target output layer set in the list of output layer sets; means for determining target output layers in the at least one target output layer set based on the index; means for decoding at least the target output layers from the video bitstream; and means for outputting the decoded target output layers without outputting layers that are not targeted for output. 27. A method for processing video data, the method comprising:
determining a set of layers that are targeted for output; determining an index to a target output layer set in a list of output layer sets such that the target output layer set identifies the determined set of layers that are targeted for output; and sending the index to a video decoder. 28. The method of claim 27, wherein at least one output operation point is associated with the target output layer set. 29. The method of claim 27, wherein the target output layer set is identified by a set of nuh_layer_id values of each picture that is to be output associated with the target output layer set. 30. The method of claim 27, wherein when a transport layer used to receive the index conforms to a Session Description Protocol (SDP), the index has been determined by a receiver device based on an encoded bitstream including views of video data chosen by the receiver device, a description of output layer sets, and operation points based on temporal subsets. 31. The method of claim 27, further comprising:
communicating operation point information; after communicating the operation point information, receiving a selection of an output operation point; and determining the set of layers that are targeted for output based, at least in part, on the selection of the output operation point. 32. A device for processing video data, comprising:
a memory configured to store data; and one or more processors in communication with the memory and configured to:
receive an index to at least one target output layer set in a list of output;
determine a set of layers that are targeted for output;
determine an index to a target output layer set in a list of output layer sets such that the target output layer set identifies the determined set of layers that are targeted for output; and
send the index to a video decoder. 33. A non-transitory computer-readable storage medium having stored thereon instructions that, when executed, cause at least one processor to:
determine a set of layers that are targeted for output; determine an index to a target output layer set in a list of output layer sets such that the target output layer set identifies the determined set of layers that are targeted for output; and send the index to a video decoder. | 2,400 |
7,104 | 7,104 | 14,166,790 | 2,448 | Methods, systems, and computer readable media for managing network virtualization are disclosed. According to one aspect, a method for managing network virtualization includes, at a virtualization orchestrator comprising a hardware processor and for managing virtual networks within a telecommunications network, receiving virtualization related data from an information concentrator for collecting and analyzing virtualization related information and/or a source other than telecommunications network nodes, determining a network virtualization operation based on the received data, and performing the network virtualization operation. | 1. A method for managing network virtualization, the method comprising:
at a virtualization orchestrator comprising a hardware processor and for managing virtual networks within a telecommunications network:
receiving virtualization related data from at least one of an information concentrator for collecting and analyzing virtualization related information and a source other than telecommunications network nodes;
determining a network virtualization operation based on the received data; and
performing the network virtualization operation. 2. The method of claim 1 wherein determining a network virtualization operation to perform comprises using a rules engine for analyzing the received data and identifying a network virtualization operation to be performed based on rules. 3. The method of claim 1 wherein determining a network virtualization operation comprises using information from at least one of:
a rules database for providing network virtualization operation rules;
a topology database for providing network topology information; and
a state database for maintaining network state information. 4. The method of claim 1 wherein receiving virtualization related data comprises receiving data via an interface module for receiving virtualization related data from an information concentrator. 5. The method of claim 1 wherein receiving virtualization related data comprises receiving processed virtualization related information from an information concentrator. 6. The method of claim 5 wherein receiving processed virtualization related information comprises receiving information that has been processed by performing at least one of:
filtering the processed virtualization related information;
applying an algorithm to the processed virtualization related information; and
detecting a characteristic pattern within the processed virtualization related information. 7. The method of claim 1 wherein receiving virtualization related data includes receiving at least one of:
system performance indicators;
cloud management information; and
external network information. 8. The method of claim 1 wherein performing the network virtualization operation comprises one of:
assigning at least one additional network resource to a network component; and
removing at least one network resource from a network component. 9. A system for managing network virtualization, the system comprising:
a virtualization orchestrator (VO) comprising hardware and for managing virtual networks within a telecommunications network, the VO including: a network interface for receiving virtualization related data; and a virtualization engine for determining a network virtualization operation based on the received information and for performing the network virtualization operation, wherein the received information is at least one of:
information received from an information concentrator for collecting and analyzing virtualization related information; and
information received from sources other than telecommunications network nodes. 10. The system of claim 9 wherein the virtualization engine includes a rules engine for analyzing the received information and identifying a network virtualization operation to be performed based on rules. 11. The system of claim 9 wherein the virtualization orchestrator further comprises at least one of:
a rules database for providing network virtualization operation rules;
a topology database for providing network topology information; and
a state database for maintaining network state information. 12. The system of claim 9 wherein the virtualization orchestrator includes an interface module configured for receiving virtualization related data from an information concentrator. 13. The system of claim 9 comprising an information concentrator for collecting and analyzing virtualization related information and providing processed virtualization related data to the virtualization orchestrator. 14. The system of claim 13 wherein analyzing the virtualization related information comprises at least one of:
filtering the virtualization related information;
applying an algorithm to the virtualization related information; and
detecting a characteristic pattern within the virtualization related information. 15. The system of claim 9 wherein the received information includes at least one of:
system performance indicators;
cloud management information; and
information from sources external to the network. 16. The system of claim 9 wherein the network virtualization operation comprises one of:
assigning at least one additional network resource to a network component; and
removing at least one network resource from a network component. 17. A non-transitory computer readable medium having stored thereon computer executable instructions embodied in a computer readable medium and when executed by a processor of a computer performs steps comprising:
at a virtualization orchestrator comprising a hardware processor and for managing virtual networks:
receiving virtualization related data from at least one of: an information concentrator for collecting and analyzing virtualization related information; and a source other than telecommunications network nodes;
determining a network virtualization operation based on the received data; and
performing the network virtualization operation. 18. The non-transitory computer readable medium of claim 17 wherein determining a network virtualization operation to perform comprises using a rules engine for analyzing the received data and identifying a network virtualization operation to be performed based on rules. 19. The non-transitory computer readable medium of claim 17 wherein determining a network virtualization operation comprises using information from at least one of:
a rules database for providing network virtualization operation rules;
a topology database for providing network topology information; and
a state database for maintaining network state information. 20. The non-transitory computer readable medium of claim 17 wherein receiving virtualization related data comprises receiving data via an interface module for receiving virtualization related data from an information concentrator. | Methods, systems, and computer readable media for managing network virtualization are disclosed. According to one aspect, a method for managing network virtualization includes, at a virtualization orchestrator comprising a hardware processor and for managing virtual networks within a telecommunications network, receiving virtualization related data from an information concentrator for collecting and analyzing virtualization related information and/or a source other than telecommunications network nodes, determining a network virtualization operation based on the received data, and performing the network virtualization operation.1. A method for managing network virtualization, the method comprising:
at a virtualization orchestrator comprising a hardware processor and for managing virtual networks within a telecommunications network:
receiving virtualization related data from at least one of an information concentrator for collecting and analyzing virtualization related information and a source other than telecommunications network nodes;
determining a network virtualization operation based on the received data; and
performing the network virtualization operation. 2. The method of claim 1 wherein determining a network virtualization operation to perform comprises using a rules engine for analyzing the received data and identifying a network virtualization operation to be performed based on rules. 3. The method of claim 1 wherein determining a network virtualization operation comprises using information from at least one of:
a rules database for providing network virtualization operation rules;
a topology database for providing network topology information; and
a state database for maintaining network state information. 4. The method of claim 1 wherein receiving virtualization related data comprises receiving data via an interface module for receiving virtualization related data from an information concentrator. 5. The method of claim 1 wherein receiving virtualization related data comprises receiving processed virtualization related information from an information concentrator. 6. The method of claim 5 wherein receiving processed virtualization related information comprises receiving information that has been processed by performing at least one of:
filtering the processed virtualization related information;
applying an algorithm to the processed virtualization related information; and
detecting a characteristic pattern within the processed virtualization related information. 7. The method of claim 1 wherein receiving virtualization related data includes receiving at least one of:
system performance indicators;
cloud management information; and
external network information. 8. The method of claim 1 wherein performing the network virtualization operation comprises one of:
assigning at least one additional network resource to a network component; and
removing at least one network resource from a network component. 9. A system for managing network virtualization, the system comprising:
a virtualization orchestrator (VO) comprising hardware and for managing virtual networks within a telecommunications network, the VO including: a network interface for receiving virtualization related data; and a virtualization engine for determining a network virtualization operation based on the received information and for performing the network virtualization operation, wherein the received information is at least one of:
information received from an information concentrator for collecting and analyzing virtualization related information; and
information received from sources other than telecommunications network nodes. 10. The system of claim 9 wherein the virtualization engine includes a rules engine for analyzing the received information and identifying a network virtualization operation to be performed based on rules. 11. The system of claim 9 wherein the virtualization orchestrator further comprises at least one of:
a rules database for providing network virtualization operation rules;
a topology database for providing network topology information; and
a state database for maintaining network state information. 12. The system of claim 9 wherein the virtualization orchestrator includes an interface module configured for receiving virtualization related data from an information concentrator. 13. The system of claim 9 comprising an information concentrator for collecting and analyzing virtualization related information and providing processed virtualization related data to the virtualization orchestrator. 14. The system of claim 13 wherein analyzing the virtualization related information comprises at least one of:
filtering the virtualization related information;
applying an algorithm to the virtualization related information; and
detecting a characteristic pattern within the virtualization related information. 15. The system of claim 9 wherein the received information includes at least one of:
system performance indicators;
cloud management information; and
information from sources external to the network. 16. The system of claim 9 wherein the network virtualization operation comprises one of:
assigning at least one additional network resource to a network component; and
removing at least one network resource from a network component. 17. A non-transitory computer readable medium having stored thereon computer executable instructions embodied in a computer readable medium and when executed by a processor of a computer performs steps comprising:
at a virtualization orchestrator comprising a hardware processor and for managing virtual networks:
receiving virtualization related data from at least one of: an information concentrator for collecting and analyzing virtualization related information; and a source other than telecommunications network nodes;
determining a network virtualization operation based on the received data; and
performing the network virtualization operation. 18. The non-transitory computer readable medium of claim 17 wherein determining a network virtualization operation to perform comprises using a rules engine for analyzing the received data and identifying a network virtualization operation to be performed based on rules. 19. The non-transitory computer readable medium of claim 17 wherein determining a network virtualization operation comprises using information from at least one of:
a rules database for providing network virtualization operation rules;
a topology database for providing network topology information; and
a state database for maintaining network state information. 20. The non-transitory computer readable medium of claim 17 wherein receiving virtualization related data comprises receiving data via an interface module for receiving virtualization related data from an information concentrator. | 2,400 |
7,105 | 7,105 | 13,146,608 | 2,466 | A transmission method in time-division relay, using a common transmission format to transmit a control signal for each relay station apparatus; and a base station apparatus of the same. A base station apparatus maps the control signal for relay station apparatuses in the (D+1)th OFDM symbol inside a subframe, wherein D is the maximum number of OFDM symbols in which control signals for mobile station apparatuses are mapped, said control signals being transmitted from the base station apparatus to mobile station apparatuses under the control of the base station apparatus. | 1. A base station apparatus applied to a radio communication system in which a time resource used for downlink from the base station apparatus to a relay station apparatus and a time resource used for downlink from the relay station apparatus to a mobile station apparatus covered by the relay station apparatus are time-divided within a predetermined period, the base station apparatus comprising:
a mapping section, wherein where D denotes a maximum number of symbols in which a control signal for the mobile station apparatus, transmitted from the base station apparatus to the mobile station apparatus covered by the base station apparatus, is mapped, the mapping section maps a control signal for the relay station apparatus in a (D+1)-th symbol within the predetermined period; and a transmission section for transmitting the mapped control signal to the relay station apparatus. 2. The base station apparatus according to claim 1, wherein:
the radio communication system supports a long term evolution system, the predetermined period is a sub-frame length, the mapping section calculates a range of symbols within a sub-frame that can be received by the relay station apparatus, on the basis of difference of frame timing of the sub-frame between the base station apparatus and the relay station apparatus and on the basis of a propagation delay time between the base station apparatus and the relay station apparatus, and maps a data signal for the relay station apparatus in any one of the symbols in the range of symbols that can be received by the relay station apparatus. 3. The base station apparatus according to claim 1, wherein the mapping section maps a data signal for the relay station apparatus from a head in a forward direction from a symbol immediately after a symbol in which the control signal is mapped, and maps the data signal for the relay station apparatus from an end in a backward direction from a symbol immediately before a symbol in which the control signal is mapped. 4. The base station apparatus according to claim 1, wherein the transmission section transmits the control signal for the relay station apparatus such that the control signal includes information about the number of symbols in which the control signal for the mobile station apparatus is mapped. 5. The base station apparatus according to claim 1, wherein:
the radio communication system supports a long term evolution system; the predetermined period is a sub-frame length; and the mapping section: calculates a range of symbols within the sub-frame that can be received by the relay station apparatus, on the basis of difference of frame timing of the sub-frame between the base station apparatus and the relay station apparatus and on the basis of a propagation delay time between the base station apparatus and the relay station apparatus; divides symbols other than symbols of the sub-frame in which the control signal for the mobile station apparatus covered by the base station apparatus is mapped into a first half and a latter half; and maps a data signal for the relay station apparatus in either the first half or the latter half, on the basis of the range of symbols that can be received by the relay station apparatus. 6. A transmission method for transmitting a control signal from a base station apparatus to a relay station apparatus in a radio communication system in which a time resource used for downlink from the base station apparatus to the relay station apparatus and a time resource used for downlink from the relay station apparatus to a mobile station apparatus covered by the relay station apparatus are time-divided within a predetermined period, the transmission method comprising the steps of:
where D denotes a maximum number of symbols in which a control signal for the mobile station apparatus, transmitted from the base station apparatus to the mobile station apparatus covered by the base station apparatus, is mapped, arranging a control signal for the relay station apparatus in a (D+1)-th symbol within the predetermined period; and transmitting the mapped control signal to the relay station apparatus. | A transmission method in time-division relay, using a common transmission format to transmit a control signal for each relay station apparatus; and a base station apparatus of the same. A base station apparatus maps the control signal for relay station apparatuses in the (D+1)th OFDM symbol inside a subframe, wherein D is the maximum number of OFDM symbols in which control signals for mobile station apparatuses are mapped, said control signals being transmitted from the base station apparatus to mobile station apparatuses under the control of the base station apparatus.1. A base station apparatus applied to a radio communication system in which a time resource used for downlink from the base station apparatus to a relay station apparatus and a time resource used for downlink from the relay station apparatus to a mobile station apparatus covered by the relay station apparatus are time-divided within a predetermined period, the base station apparatus comprising:
a mapping section, wherein where D denotes a maximum number of symbols in which a control signal for the mobile station apparatus, transmitted from the base station apparatus to the mobile station apparatus covered by the base station apparatus, is mapped, the mapping section maps a control signal for the relay station apparatus in a (D+1)-th symbol within the predetermined period; and a transmission section for transmitting the mapped control signal to the relay station apparatus. 2. The base station apparatus according to claim 1, wherein:
the radio communication system supports a long term evolution system, the predetermined period is a sub-frame length, the mapping section calculates a range of symbols within a sub-frame that can be received by the relay station apparatus, on the basis of difference of frame timing of the sub-frame between the base station apparatus and the relay station apparatus and on the basis of a propagation delay time between the base station apparatus and the relay station apparatus, and maps a data signal for the relay station apparatus in any one of the symbols in the range of symbols that can be received by the relay station apparatus. 3. The base station apparatus according to claim 1, wherein the mapping section maps a data signal for the relay station apparatus from a head in a forward direction from a symbol immediately after a symbol in which the control signal is mapped, and maps the data signal for the relay station apparatus from an end in a backward direction from a symbol immediately before a symbol in which the control signal is mapped. 4. The base station apparatus according to claim 1, wherein the transmission section transmits the control signal for the relay station apparatus such that the control signal includes information about the number of symbols in which the control signal for the mobile station apparatus is mapped. 5. The base station apparatus according to claim 1, wherein:
the radio communication system supports a long term evolution system; the predetermined period is a sub-frame length; and the mapping section: calculates a range of symbols within the sub-frame that can be received by the relay station apparatus, on the basis of difference of frame timing of the sub-frame between the base station apparatus and the relay station apparatus and on the basis of a propagation delay time between the base station apparatus and the relay station apparatus; divides symbols other than symbols of the sub-frame in which the control signal for the mobile station apparatus covered by the base station apparatus is mapped into a first half and a latter half; and maps a data signal for the relay station apparatus in either the first half or the latter half, on the basis of the range of symbols that can be received by the relay station apparatus. 6. A transmission method for transmitting a control signal from a base station apparatus to a relay station apparatus in a radio communication system in which a time resource used for downlink from the base station apparatus to the relay station apparatus and a time resource used for downlink from the relay station apparatus to a mobile station apparatus covered by the relay station apparatus are time-divided within a predetermined period, the transmission method comprising the steps of:
where D denotes a maximum number of symbols in which a control signal for the mobile station apparatus, transmitted from the base station apparatus to the mobile station apparatus covered by the base station apparatus, is mapped, arranging a control signal for the relay station apparatus in a (D+1)-th symbol within the predetermined period; and transmitting the mapped control signal to the relay station apparatus. | 2,400 |
7,106 | 7,106 | 13,817,221 | 2,471 | Embodiments of the present invention disclose triggering methods and apparatuses of aperiodic channel state information CSI and an aperiodic sounding reference signal SRS for a carrier aggregation system. The method comprises: (1) pre-assigning a corresponding relationship between bits of the CSI request field in an uplink grant and multiple downlink component carriers DL CCs of user equipment, wherein the number of bits of the CSI request field is greater than 1 and less than the maximum allowed number of DL CCs in the system; (2) determining the DL CC for which aperiodic CSI reporting is to be triggered; and (3) mapping the CSI request field in the uplink grant according to the pre-assigned corresponding relationship to mark the value of the bit corresponding to the determined DL CC as “trigger”. | 1.-33. (canceled) 34. A triggering method of aperiodic channel state information CSI for a carrier aggregation system, comprising:
(1) pre-assigning a mapping relationship between different values of the CSI request field in an uplink grant and CSI requests for different combinations of downlink component carriers DL CCs, wherein the number of bits of the CSI request field is greater than 1 and less than the maximum allowed number of DL CCs in the system; (2) determining the DL CC for which aperiodic CSI reporting is to be triggered; and (3) populating value of the CSI request field in the uplink grant according to the pre-assigned mapping relationship and the determined DL CC. 35. The method according to claim 34, wherein the mapping relationship comprises: mapping a first value of the CSI request field to indicate that CSI reporting for the DL CC carrying the uplink grant is to be triggered. 36. A reporting method of aperiodic channel state information CSI for a carrier aggregation system, comprising:
(1) pre-assigning a mapping relationship between different values of the CSI request field in an uplink grant and CSI requests for different combinations of downlink component carriers DL CCs, wherein the number of bits of the CSI request field is greater than 1 and less than the maximum allowed number of DL CCs in the system; and (2) demapping, according to the pre-assigned mapping relationship, the CSI request field in the received uplink grant so as to determine the DL CC for which aperiodic CSI reporting is to be implemented. 37. The method according to claim 36, wherein the mapping relationship comprises: mapping a first value of the CSI request field to indicate that CSI reporting for the DL CC carrying the uplink grant is to be triggered, and mapping a second value of the CSI request field to indicate that CSI reporting for all DL CCs is to be triggered. 38. A triggering apparatus of aperiodic channel state information CSI for a carrier aggregation system, comprising:
(1) fifth pre-assigning means, for pre-assigning a mapping relationship between different values of the CSI request field in an uplink grant and CSI requests for different combinations of downlink component carriers DL CCs, wherein the number of bits of the CSI request field is greater than 1 and less than the maximum allowed number of DL CCs in the system; (2) fifth determining means, for determining the DL CC for which aperiodic CSI reporting is to be triggered; and (3) fifth mapping means, for populating value of the CSI request field in the uplink grant according to the pre-assigned mapping relationship and the determined DL CC. 39. A reporting apparatus of aperiodic channel state information CSI for a carrier aggregation system, comprising:
(1) sixth pre-assigning means, for pre-assigning a mapping relationship between different values of the CSI request field in an uplink grant and CSI requests for different combinations of downlink component carriers DL CCs, wherein the number of bits of the CSI request field is greater than 1 and less than the maximum allowed number of DL CCs in the system; and (2) sixth determining means, for demapping, according to the pre-assigned mapping relationship, the CSI request field in the received uplink grant so as to determine the DL CC for which aperiodic CSI reporting is to be implemented. 40.-45. (canceled) 46. The method according to claim 34, wherein the mapping relationship comprises: mapping a second value of the CSI request field to indicate that CSI reporting for all DL CCs is to be triggered. 47. The method according to claim 34, wherein the mapping relationship comprises: mapping a third value of the CSI request field to indicate no CSI reporting for any DL CCs is to be triggered. 48. The method according to claim 34, further comprising:
when one uplink grant is not sufficient to trigger CSI reporting for all DL CCs determined in step (2), sending multiple single-bit triggering uplink grants in the same subframe as the first uplink grant or in a subsequent subframe. 49. The method according to claim 36, wherein the mapping relationship comprises: mapping a second value of the CSI request field to indicate that CSI reporting for all DL CCs is to be triggered. 50. The method according to claim 36, wherein the mapping relationship comprises: mapping a third value of the CSI request field to indicate no CSI reporting for any DL CCs is to be triggered. 51. The apparatus according to claim 38, wherein the mapping relationship comprises: mapping a first value of the CSI request field to indicate that CSI reporting for the DL CC carrying the uplink grant is to be triggered. 52. The apparatus according to claim 38, wherein the mapping relationship comprises: mapping a third value of the CSI request field to indicate no CSI reporting for any DL CCs is to be triggered. 53. The apparatus according to claim 39, wherein the mapping relationship comprises: mapping a first value of the CSI request field to indicate that CSI reporting for the DL CC carrying the uplink grant is to be triggered 54. The apparatus according to claim 39, wherein the mapping relationship comprises: mapping a third value of the CSI request field to indicate no CSI reporting for any DL CCs is to be triggered. | Embodiments of the present invention disclose triggering methods and apparatuses of aperiodic channel state information CSI and an aperiodic sounding reference signal SRS for a carrier aggregation system. The method comprises: (1) pre-assigning a corresponding relationship between bits of the CSI request field in an uplink grant and multiple downlink component carriers DL CCs of user equipment, wherein the number of bits of the CSI request field is greater than 1 and less than the maximum allowed number of DL CCs in the system; (2) determining the DL CC for which aperiodic CSI reporting is to be triggered; and (3) mapping the CSI request field in the uplink grant according to the pre-assigned corresponding relationship to mark the value of the bit corresponding to the determined DL CC as “trigger”.1.-33. (canceled) 34. A triggering method of aperiodic channel state information CSI for a carrier aggregation system, comprising:
(1) pre-assigning a mapping relationship between different values of the CSI request field in an uplink grant and CSI requests for different combinations of downlink component carriers DL CCs, wherein the number of bits of the CSI request field is greater than 1 and less than the maximum allowed number of DL CCs in the system; (2) determining the DL CC for which aperiodic CSI reporting is to be triggered; and (3) populating value of the CSI request field in the uplink grant according to the pre-assigned mapping relationship and the determined DL CC. 35. The method according to claim 34, wherein the mapping relationship comprises: mapping a first value of the CSI request field to indicate that CSI reporting for the DL CC carrying the uplink grant is to be triggered. 36. A reporting method of aperiodic channel state information CSI for a carrier aggregation system, comprising:
(1) pre-assigning a mapping relationship between different values of the CSI request field in an uplink grant and CSI requests for different combinations of downlink component carriers DL CCs, wherein the number of bits of the CSI request field is greater than 1 and less than the maximum allowed number of DL CCs in the system; and (2) demapping, according to the pre-assigned mapping relationship, the CSI request field in the received uplink grant so as to determine the DL CC for which aperiodic CSI reporting is to be implemented. 37. The method according to claim 36, wherein the mapping relationship comprises: mapping a first value of the CSI request field to indicate that CSI reporting for the DL CC carrying the uplink grant is to be triggered, and mapping a second value of the CSI request field to indicate that CSI reporting for all DL CCs is to be triggered. 38. A triggering apparatus of aperiodic channel state information CSI for a carrier aggregation system, comprising:
(1) fifth pre-assigning means, for pre-assigning a mapping relationship between different values of the CSI request field in an uplink grant and CSI requests for different combinations of downlink component carriers DL CCs, wherein the number of bits of the CSI request field is greater than 1 and less than the maximum allowed number of DL CCs in the system; (2) fifth determining means, for determining the DL CC for which aperiodic CSI reporting is to be triggered; and (3) fifth mapping means, for populating value of the CSI request field in the uplink grant according to the pre-assigned mapping relationship and the determined DL CC. 39. A reporting apparatus of aperiodic channel state information CSI for a carrier aggregation system, comprising:
(1) sixth pre-assigning means, for pre-assigning a mapping relationship between different values of the CSI request field in an uplink grant and CSI requests for different combinations of downlink component carriers DL CCs, wherein the number of bits of the CSI request field is greater than 1 and less than the maximum allowed number of DL CCs in the system; and (2) sixth determining means, for demapping, according to the pre-assigned mapping relationship, the CSI request field in the received uplink grant so as to determine the DL CC for which aperiodic CSI reporting is to be implemented. 40.-45. (canceled) 46. The method according to claim 34, wherein the mapping relationship comprises: mapping a second value of the CSI request field to indicate that CSI reporting for all DL CCs is to be triggered. 47. The method according to claim 34, wherein the mapping relationship comprises: mapping a third value of the CSI request field to indicate no CSI reporting for any DL CCs is to be triggered. 48. The method according to claim 34, further comprising:
when one uplink grant is not sufficient to trigger CSI reporting for all DL CCs determined in step (2), sending multiple single-bit triggering uplink grants in the same subframe as the first uplink grant or in a subsequent subframe. 49. The method according to claim 36, wherein the mapping relationship comprises: mapping a second value of the CSI request field to indicate that CSI reporting for all DL CCs is to be triggered. 50. The method according to claim 36, wherein the mapping relationship comprises: mapping a third value of the CSI request field to indicate no CSI reporting for any DL CCs is to be triggered. 51. The apparatus according to claim 38, wherein the mapping relationship comprises: mapping a first value of the CSI request field to indicate that CSI reporting for the DL CC carrying the uplink grant is to be triggered. 52. The apparatus according to claim 38, wherein the mapping relationship comprises: mapping a third value of the CSI request field to indicate no CSI reporting for any DL CCs is to be triggered. 53. The apparatus according to claim 39, wherein the mapping relationship comprises: mapping a first value of the CSI request field to indicate that CSI reporting for the DL CC carrying the uplink grant is to be triggered 54. The apparatus according to claim 39, wherein the mapping relationship comprises: mapping a third value of the CSI request field to indicate no CSI reporting for any DL CCs is to be triggered. | 2,400 |
7,107 | 7,107 | 13,921,300 | 2,483 | The present invention relates generally to both a system and method for visually (e.g., via a video-based system or some other visual system) monitoring one or more objects where such objects are obscured by a high intensity light source such as a plasma, flame, or welding arc. In one embodiment, a system in accordance with the present invention comprises a digital camera, at least one light emitting diode (LED) light source, and at least one filter. In another embodiment, a system in accordance with the present invention comprises a digital camera, at least one light emitting diode (LED) light source, and at least one filter selected from a notch filter, a neutral density filter, or combinations thereof. Additionally, the system of the present invention can further include software designed to process, interpret and/or collect various data captured by the visual monitoring, or, imaging, system of the present invention. | 1. A visual monitoring, or imaging, system comprising:
at least one digital camera; at least one light emitting diode light source; and at least one filter, or multi-filter system. 2. The visual monitoring, or imaging, system of claim 1, wherein the at least one light emitting diode is selected from at least one infrared light emitting diode, at least one red light emitting diode, at least one orange light emitting diode, at least one yellow light emitting diode, at least one green light emitting diode, at least one blue light emitting diode, at least one violet light emitting diode, at least purple light emitting diode, at least one ultraviolet light emitting diode, at least one pink light emitting diode, at least one white light emitting diode, or a combination of any two or more thereof, any three or more thereof, any four or more thereof, any five or more thereof, any six or more thereof, or even any seven or more thereof. 3. The visual monitoring, or imaging, system of claim 1, wherein the at least one filter, or multi-filter system, is selected from at least one notch filter, at least one neutral density filter, or any combination of two or more thereof. 4. A method of imaging a work piece being subjected to an intense light source, the method comprising the step of:
using the system of claim 1 to image a work piece being subjected to an intense light source. 5. The method of claim 4, wherein the intense light source is the result of a plasma, flame, or welding arc process. 6. A visual monitoring, or imaging, system comprising:
at least one digital camera; at least one light emitting diode light source; at least one filter, or multi-filter system; and image capturing, processing and/or collecting software. 7. The visual monitoring, or imaging, system of claim 6, wherein the at least one light emitting diode is selected from at least one infrared light emitting diode, at least one red light emitting diode, at least one orange light emitting diode, at least one yellow light emitting diode, at least one green light emitting diode, at least one blue light emitting diode, at least one violet light emitting diode, at least purple light emitting diode, at least one ultraviolet light emitting diode, at least one pink light emitting diode, at least one white light emitting diode, or a combination of any two or more thereof, any three or more thereof, any four or more thereof, any five or more thereof, any six or more thereof, or even any seven or more thereof. 8. The visual monitoring, or imaging, system of claim 6, wherein the at least one filter, or multi-filter system, is selected from at least one notch filter, at least one neutral density filter, or any combination of two or more thereof. 9. A method of imaging a work piece being subjected to an intense light source, the method comprising the step of:
using the system of claim 6 to image a work piece being subjected to an intense light source. 10. The method of claim 9, wherein the intense light source is the result of a plasma, flame, or welding arc process. 11. A visual monitoring, or imaging, system comprising:
at least one digital camera; at least one light emitting diode light source; at least one filter, or multi-filter system; and image capturing, processing and/or collecting software that utilizes, in part, individual pixel filtering. 12. The visual monitoring, or imaging, system of claim 11, wherein the at least one light emitting diode is selected from at least one infrared light emitting diode, at least one red light emitting diode, at least one orange light emitting diode, at least one yellow light emitting diode, at least one green light emitting diode, at least one blue light emitting diode, at least one violet light emitting diode, at least purple light emitting diode, at least one ultraviolet light emitting diode, at least one pink light emitting diode, at least one white light emitting diode, or a combination of any two or more thereof, any three or more thereof, any four or more thereof, any five or more thereof, any six or more thereof, or even any seven or more thereof. 13. The visual monitoring, or imaging, system of claim 11, wherein the at least one filter, or multi-filter system, is selected from at least one notch filter, at least one neutral density filter, or any combination of two or more thereof. 14. A method of imaging a work piece being subjected to an intense light source, the method comprising the step of:
using the system of claim 11 to image a work piece being subjected to an intense light source. 15. The method of claim 14, wherein the intense light source is the result of a plasma, flame, or welding arc process. 16. A visual monitoring, or imaging, system as shown and described herein. 17. A method for visually monitoring, or imaging, a work piece using a visual monitoring, or imaging, system as shown and described herein. 18. A method for visually monitoring, or imaging, a work piece as shown and described herein. | The present invention relates generally to both a system and method for visually (e.g., via a video-based system or some other visual system) monitoring one or more objects where such objects are obscured by a high intensity light source such as a plasma, flame, or welding arc. In one embodiment, a system in accordance with the present invention comprises a digital camera, at least one light emitting diode (LED) light source, and at least one filter. In another embodiment, a system in accordance with the present invention comprises a digital camera, at least one light emitting diode (LED) light source, and at least one filter selected from a notch filter, a neutral density filter, or combinations thereof. Additionally, the system of the present invention can further include software designed to process, interpret and/or collect various data captured by the visual monitoring, or, imaging, system of the present invention.1. A visual monitoring, or imaging, system comprising:
at least one digital camera; at least one light emitting diode light source; and at least one filter, or multi-filter system. 2. The visual monitoring, or imaging, system of claim 1, wherein the at least one light emitting diode is selected from at least one infrared light emitting diode, at least one red light emitting diode, at least one orange light emitting diode, at least one yellow light emitting diode, at least one green light emitting diode, at least one blue light emitting diode, at least one violet light emitting diode, at least purple light emitting diode, at least one ultraviolet light emitting diode, at least one pink light emitting diode, at least one white light emitting diode, or a combination of any two or more thereof, any three or more thereof, any four or more thereof, any five or more thereof, any six or more thereof, or even any seven or more thereof. 3. The visual monitoring, or imaging, system of claim 1, wherein the at least one filter, or multi-filter system, is selected from at least one notch filter, at least one neutral density filter, or any combination of two or more thereof. 4. A method of imaging a work piece being subjected to an intense light source, the method comprising the step of:
using the system of claim 1 to image a work piece being subjected to an intense light source. 5. The method of claim 4, wherein the intense light source is the result of a plasma, flame, or welding arc process. 6. A visual monitoring, or imaging, system comprising:
at least one digital camera; at least one light emitting diode light source; at least one filter, or multi-filter system; and image capturing, processing and/or collecting software. 7. The visual monitoring, or imaging, system of claim 6, wherein the at least one light emitting diode is selected from at least one infrared light emitting diode, at least one red light emitting diode, at least one orange light emitting diode, at least one yellow light emitting diode, at least one green light emitting diode, at least one blue light emitting diode, at least one violet light emitting diode, at least purple light emitting diode, at least one ultraviolet light emitting diode, at least one pink light emitting diode, at least one white light emitting diode, or a combination of any two or more thereof, any three or more thereof, any four or more thereof, any five or more thereof, any six or more thereof, or even any seven or more thereof. 8. The visual monitoring, or imaging, system of claim 6, wherein the at least one filter, or multi-filter system, is selected from at least one notch filter, at least one neutral density filter, or any combination of two or more thereof. 9. A method of imaging a work piece being subjected to an intense light source, the method comprising the step of:
using the system of claim 6 to image a work piece being subjected to an intense light source. 10. The method of claim 9, wherein the intense light source is the result of a plasma, flame, or welding arc process. 11. A visual monitoring, or imaging, system comprising:
at least one digital camera; at least one light emitting diode light source; at least one filter, or multi-filter system; and image capturing, processing and/or collecting software that utilizes, in part, individual pixel filtering. 12. The visual monitoring, or imaging, system of claim 11, wherein the at least one light emitting diode is selected from at least one infrared light emitting diode, at least one red light emitting diode, at least one orange light emitting diode, at least one yellow light emitting diode, at least one green light emitting diode, at least one blue light emitting diode, at least one violet light emitting diode, at least purple light emitting diode, at least one ultraviolet light emitting diode, at least one pink light emitting diode, at least one white light emitting diode, or a combination of any two or more thereof, any three or more thereof, any four or more thereof, any five or more thereof, any six or more thereof, or even any seven or more thereof. 13. The visual monitoring, or imaging, system of claim 11, wherein the at least one filter, or multi-filter system, is selected from at least one notch filter, at least one neutral density filter, or any combination of two or more thereof. 14. A method of imaging a work piece being subjected to an intense light source, the method comprising the step of:
using the system of claim 11 to image a work piece being subjected to an intense light source. 15. The method of claim 14, wherein the intense light source is the result of a plasma, flame, or welding arc process. 16. A visual monitoring, or imaging, system as shown and described herein. 17. A method for visually monitoring, or imaging, a work piece using a visual monitoring, or imaging, system as shown and described herein. 18. A method for visually monitoring, or imaging, a work piece as shown and described herein. | 2,400 |
7,108 | 7,108 | 14,930,453 | 2,472 | A method of a base station (BS) to implement a listen-before-talk (LBT) protocol is provided. The method includes generating for transmission at least one of a discovery reference signal (DRS) or a data signal. The method also includes initiating an LBT protocol based on a single sensing interval to access a channel and transmit the DRS in contiguous orthogonal frequency-division multiplexing (OFDM) symbols. The method further includes initiating an LBT protocol with random back-off to access the channel and transmit the data signal, where a back-off counter value of the LBT protocol with random back-off does not decrement when the DRS is transmitting in the channel. | 1. A method of implementing a listen-before-talk (LBT) protocol by a base station (BS), the method comprising:
generating for transmission at least one of a discovery reference signal (DRS) or a data signal; initiating an LBT protocol based on a single sensing interval to access a channel and transmit the DRS in contiguous orthogonal frequency-division multiplexing (OFDM) symbols; and initiating an LBT protocol with random back-off to access the channel and transmit the data signal, wherein a back-off counter value of the LBT with random back-off does not decrement when the DRS is transmitted in the channel. 2. The method of claim 1, wherein at least one of the DRS or the data signal comprises an initial signal, wherein the initial signal comprises a variable portion and a fixed portion, and wherein the fixed portion comprises at least one of a primary synchronization signal (PSS), a secondary synchronization signal (SSS), a common reference signal (CRS), or a cell specific reference signal (CSRS). 3. The method of claim 2, wherein the fixed portion is multiplexed with at least one of physical downlink control channel (PDCCH) or enhanced physical downlink control channel (EPDSCH). 4. The method of claim 1, wherein each of the DRS and the data signal comprises one of a two-slot demodulation reference signal (DM-RS) mapping pattern or a one-slot DM-RS mapping pattern. 5. The method of claim 4, wherein generating at least one of the DRS or the data signal for transmission comprises configuring at least one of the DRS or the data signal with the two-slot DM-RS mapping pattern or the one-slot DM-RS mapping pattern based on a channel access timing. 6. The base station (BS) comprising:
processing circuitry configured to:
generate for transmission at least one of a discovery reference signal (DRS) or a data signal;
initiate an LBT protocol based on a single sensing interval to access a channel and transmit the DRS in contiguous orthogonal frequency-division multiplexing (OFDM) symbols; and
initiate an LBT protocol with random back-off to access the channel and transmit the data signal, wherein a back-off counter value of the LBT protocol with random back-off does not decrement when the DRS is transmitted in the channel. 7. The BS of claim 6, wherein at least one of the DRS or the data signal comprises an initial signal, wherein the initial signal comprises a variable portion and a fixed portion, and wherein the fixed portion comprises at least one of a primary synchronization signal (PSS), a secondary synchronization signal (SSS), a common reference signal (CRS), or a cell specific reference signal (CSRS). 8. The BS of claim 7, wherein the fixed portion is multiplexed with at least one of physical downlink control channel (PDCCH) or enhanced physical downlink control channel (EPDSCH). 9. The BS of claim 6, wherein each of the DRS and the data signal comprises one of a two-slot demodulation reference signal (DM-RS) mapping pattern or a one-slot DM-RS mapping pattern. 10. The BS of claim 9, wherein the processing circuitry is further configured to configure at least one of the DRS or the data signal with the two-slot DM-RS mapping pattern or the one-slot DM-RS mapping pattern based on a channel access timing. 11. A method of implementing a listen-before-talk (LBT) protocol by a mobile station (MS), the method comprising:
receiving a discovery reference signal (DRS) transmitted from a base station (BS) via a channel using an LBT protocol based on a single sensing interval, wherein the DRS is received in contiguous orthogonal frequency-division multiplexing (OFDM) symbols; and receiving a data signal transmitted from the BS via the channel using an LBT protocol with random back-off. 12. The method of claim 11, wherein at least one of the DRS or the data signal comprises an initial signal, wherein the initial signal comprises a variable portion and a fixed portion, and wherein the fixed portion comprises at least one of a primary synchronization signal (PSS), a secondary synchronization signal (SSS), a common reference signal (CRS), or a cell specific reference signal (CSRS). 13. The method of claim 12, wherein the fixed portion is multiplexed with at least one of physical downlink control channel (PDCCH) or enhanced physical downlink control channel (EPDSCH). 14. The method of claim 11, wherein each of the DRS and the data signal comprises one of a two-slot demodulation reference signal (DM-RS) mapping pattern or a one-slot DM-RS mapping pattern. 15. The method of claim 14, wherein the DRS and the data signal is configured with the two-slot DM-RS mapping pattern or the one-slot DM-RS mapping pattern based on a channel access timing. 16. A mobile station (MS) comprising:
a transceiver; and processing circuitry configured to:
detect a reception, via the transceiver, of a discovery reference signal (DRS) transmitted from a base station (BS) via a channel using an LBT protocol based on a single sensing interval, wherein the DRS is received in contiguous orthogonal frequency-division multiplexing (OFDM) symbols; and
detect a reception, via the transceiver, of a data signal transmitted from the BS via the channel using an LBT protocol with random back-off. 17. The MS of claim 16, wherein at least one of the DRS or the data signal comprises an initial signal, wherein the initial signal comprises a variable portion and a fixed portion, and wherein the fixed portion comprises at least one of a primary synchronization signal (PSS), a secondary synchronization signal (SSS), a common reference signal (CRS), or a cell specific reference signal (CSRS). 18. The MS of claim 17, wherein the fixed portion is multiplexed with at least one of physical downlink control channel (PDCCH) or enhanced physical downlink control channel (EPDSCH). 19. The MS of claim 16, wherein each of the DRS and the data signal comprises one of a two-slot demodulation reference signal (DM-RS) mapping pattern or a one-slot DM-RS mapping pattern. 20. The MS of claim 19, wherein the DRS and the data signal is configured with the two-slot DM-RS mapping pattern or the one-slot DM-RS mapping pattern based on a channel access timing. | A method of a base station (BS) to implement a listen-before-talk (LBT) protocol is provided. The method includes generating for transmission at least one of a discovery reference signal (DRS) or a data signal. The method also includes initiating an LBT protocol based on a single sensing interval to access a channel and transmit the DRS in contiguous orthogonal frequency-division multiplexing (OFDM) symbols. The method further includes initiating an LBT protocol with random back-off to access the channel and transmit the data signal, where a back-off counter value of the LBT protocol with random back-off does not decrement when the DRS is transmitting in the channel.1. A method of implementing a listen-before-talk (LBT) protocol by a base station (BS), the method comprising:
generating for transmission at least one of a discovery reference signal (DRS) or a data signal; initiating an LBT protocol based on a single sensing interval to access a channel and transmit the DRS in contiguous orthogonal frequency-division multiplexing (OFDM) symbols; and initiating an LBT protocol with random back-off to access the channel and transmit the data signal, wherein a back-off counter value of the LBT with random back-off does not decrement when the DRS is transmitted in the channel. 2. The method of claim 1, wherein at least one of the DRS or the data signal comprises an initial signal, wherein the initial signal comprises a variable portion and a fixed portion, and wherein the fixed portion comprises at least one of a primary synchronization signal (PSS), a secondary synchronization signal (SSS), a common reference signal (CRS), or a cell specific reference signal (CSRS). 3. The method of claim 2, wherein the fixed portion is multiplexed with at least one of physical downlink control channel (PDCCH) or enhanced physical downlink control channel (EPDSCH). 4. The method of claim 1, wherein each of the DRS and the data signal comprises one of a two-slot demodulation reference signal (DM-RS) mapping pattern or a one-slot DM-RS mapping pattern. 5. The method of claim 4, wherein generating at least one of the DRS or the data signal for transmission comprises configuring at least one of the DRS or the data signal with the two-slot DM-RS mapping pattern or the one-slot DM-RS mapping pattern based on a channel access timing. 6. The base station (BS) comprising:
processing circuitry configured to:
generate for transmission at least one of a discovery reference signal (DRS) or a data signal;
initiate an LBT protocol based on a single sensing interval to access a channel and transmit the DRS in contiguous orthogonal frequency-division multiplexing (OFDM) symbols; and
initiate an LBT protocol with random back-off to access the channel and transmit the data signal, wherein a back-off counter value of the LBT protocol with random back-off does not decrement when the DRS is transmitted in the channel. 7. The BS of claim 6, wherein at least one of the DRS or the data signal comprises an initial signal, wherein the initial signal comprises a variable portion and a fixed portion, and wherein the fixed portion comprises at least one of a primary synchronization signal (PSS), a secondary synchronization signal (SSS), a common reference signal (CRS), or a cell specific reference signal (CSRS). 8. The BS of claim 7, wherein the fixed portion is multiplexed with at least one of physical downlink control channel (PDCCH) or enhanced physical downlink control channel (EPDSCH). 9. The BS of claim 6, wherein each of the DRS and the data signal comprises one of a two-slot demodulation reference signal (DM-RS) mapping pattern or a one-slot DM-RS mapping pattern. 10. The BS of claim 9, wherein the processing circuitry is further configured to configure at least one of the DRS or the data signal with the two-slot DM-RS mapping pattern or the one-slot DM-RS mapping pattern based on a channel access timing. 11. A method of implementing a listen-before-talk (LBT) protocol by a mobile station (MS), the method comprising:
receiving a discovery reference signal (DRS) transmitted from a base station (BS) via a channel using an LBT protocol based on a single sensing interval, wherein the DRS is received in contiguous orthogonal frequency-division multiplexing (OFDM) symbols; and receiving a data signal transmitted from the BS via the channel using an LBT protocol with random back-off. 12. The method of claim 11, wherein at least one of the DRS or the data signal comprises an initial signal, wherein the initial signal comprises a variable portion and a fixed portion, and wherein the fixed portion comprises at least one of a primary synchronization signal (PSS), a secondary synchronization signal (SSS), a common reference signal (CRS), or a cell specific reference signal (CSRS). 13. The method of claim 12, wherein the fixed portion is multiplexed with at least one of physical downlink control channel (PDCCH) or enhanced physical downlink control channel (EPDSCH). 14. The method of claim 11, wherein each of the DRS and the data signal comprises one of a two-slot demodulation reference signal (DM-RS) mapping pattern or a one-slot DM-RS mapping pattern. 15. The method of claim 14, wherein the DRS and the data signal is configured with the two-slot DM-RS mapping pattern or the one-slot DM-RS mapping pattern based on a channel access timing. 16. A mobile station (MS) comprising:
a transceiver; and processing circuitry configured to:
detect a reception, via the transceiver, of a discovery reference signal (DRS) transmitted from a base station (BS) via a channel using an LBT protocol based on a single sensing interval, wherein the DRS is received in contiguous orthogonal frequency-division multiplexing (OFDM) symbols; and
detect a reception, via the transceiver, of a data signal transmitted from the BS via the channel using an LBT protocol with random back-off. 17. The MS of claim 16, wherein at least one of the DRS or the data signal comprises an initial signal, wherein the initial signal comprises a variable portion and a fixed portion, and wherein the fixed portion comprises at least one of a primary synchronization signal (PSS), a secondary synchronization signal (SSS), a common reference signal (CRS), or a cell specific reference signal (CSRS). 18. The MS of claim 17, wherein the fixed portion is multiplexed with at least one of physical downlink control channel (PDCCH) or enhanced physical downlink control channel (EPDSCH). 19. The MS of claim 16, wherein each of the DRS and the data signal comprises one of a two-slot demodulation reference signal (DM-RS) mapping pattern or a one-slot DM-RS mapping pattern. 20. The MS of claim 19, wherein the DRS and the data signal is configured with the two-slot DM-RS mapping pattern or the one-slot DM-RS mapping pattern based on a channel access timing. | 2,400 |
7,109 | 7,109 | 13,167,686 | 2,456 | The embodiments described herein relate to web service client/server systems. According to some embodiments, there is provided a web service system including at least one client processor adapted to generate and transmit at least one piped request comprising a plurality of discrete requests and at least one server processor in data communication with the client processor. The at least one server processor is adapted to receive the at least one piped request comprising the discrete requests, de-pipe each discrete request from the piped request and execute each discrete request to generate a result associated with the discrete request. | 1. A web service system, comprising:
at least one client processor adapted to generate and transmit at least one piped request comprising a plurality of discrete requests; at least one server processor in data communication with the client processor, the at least one server processor adapted to:
receive the at least one piped request comprising the discrete requests,
de-pipe each discrete request from the piped request; and
execute each discrete request to generate a result associated with the discrete request. 2. The system of claim 1, wherein the server processor is further adapted to generate and transmit at least one response to the one piped request based on at least one of the results generated. 3. The system of claim 2, wherein the server processor is adapted to provide a discrete request processing module operable to:
receive at least one of the discrete requests; and execute the received discrete request to generate the result associated with that request. 4. The system of claim 3, wherein the server processor is adapted to provide a pipe controller module, and the discrete processing module is operable to:
receive the at least one piped request comprising the discrete requests; de-pipe each discrete request from the piped request; provide each discrete request to the discrete-request processing module; and generate and transmit at least one response to the one piped request based on at least one of the results associated with the executed discrete requests. 5. The system of claim 4, wherein the pipe controller module is operable to generate a command associated with at least one of the discrete requests and provide the command to the discrete request processing module, and the discrete request processing module is operable to receive the command and execute the command to generate the result associated with that discrete request. 6. The system of claim 5, wherein the pipe controller module is adapted to generate the command based on at least one of the discrete requests and at least one of the results that has been previously generated by the discrete-request processing module. 7. The system of claim 1, wherein the at least one piped request is a web request for transmission over the Internet. 8. The system of claim 7, wherein the web request is compatible with hypertext transfer protocol (“HTTP”). 9. The system of claim 3, wherein the discrete request processor module is based on a model-view-controller (MVC) pattern for web applications based on ASP.NET framework. 10. The system of according to claim 4, wherein the discrete request processing module is operable to provide the generated result to the pipe controller module by storing the result in the data storage device at a particular location and the pipe controller module is operable to receive the result by referencing the result that is being stored at the particular location. 11. The web service system of claim 1, wherein the result generated by the discrete request processor module is a logical object. 12. The web service system of claim 1, wherein the discrete request processor module comprises a piped request handler sub-module for setting up an HTTP environment for processing the discrete request. 13. A web server comprising at least one server processor adapted to:
receive the at least one piped request comprising the discrete requests, de-pipe each discrete request from the piped request; and execute each discrete request to generate a result associated with the discrete request. 14. The server of claim 13, wherein the server processor is adapted to generate and transmit at least one response to the at least one piped request based on at least one of the results generated. 15. The server claim 13, wherein the server processor is adapted to provide a discrete request processing module, the discrete processing module being operable to:
receive at least one of the discrete request; and execute the received discrete request to generate the result associated with that request. 16. The server of claim 14, wherein the server processor is further adapted to provide a pipe controller module operable to:
receive the at least one piped request comprising the discrete requests; de-pipe each discrete request from the piped request; provide each discrete request to the discrete-request processing module; and generate and transmit at least one response to the one piped request based on at least one of the results associated with the executed discrete requests. 17. The server of claim 16, wherein the pipe controller module is operable to generate a command associated with at least one of the discrete request and provide the command to the discrete request processing module, and the discrete request processing module is operable to receive the command and execute the command to generate the result associated with that discrete request. 18. The server of claim 17, wherein the pipe controller module is adapted to generate the command based on at least one of the discrete requests and at least one of the results that has been previously generated by the discrete-request processing module. 19. The server of claim 13, wherein the at least one piped request is a web request for transmission over the Internet. 20. The server of claim 13, wherein the web request is compatible with hypertext transfer protocol (“HTTP”). 21. The server of claim 15, wherein the discrete request processor module is based on a model-view-controller (MVC) pattern for web applications based on ASP.NET framework. 22. The server of claim 16, wherein the discrete request processing module is operable to provide the generated result to the pipe controller module by storing the result in the data storage device at a particular location and the pipe controller module is operable to receive the result by referencing the result that is being stored at the particular location. 23. The server of claim 16, wherein the result generated by the discrete request processor module is a logical object. 24. The server of claim 16, wherein the discrete request processor module comprises a piped request handler sub-module for setting up an HTTP environment for processing the discrete request. 25. A computer-implemented web service method comprising:
receiving at least one piped request comprising a plurality of discrete requests; de-piping each discrete request from the piped request; and executing each discrete request to generate a result associated with the discrete request. 26. The method of claim 25 further comprising generating and transmitting at least one response to the one piped request based on at least one of the results generated. 27. The method of claim 25, wherein the step of de-piping each discrete request comprises generating a command associated with at least one of the discrete requests for execution. 28. The method of claim 25, wherein the step of generating the command comprises generating the command based on at least one of the discrete requests and at least one of the results generated by the discrete-request processing module. | The embodiments described herein relate to web service client/server systems. According to some embodiments, there is provided a web service system including at least one client processor adapted to generate and transmit at least one piped request comprising a plurality of discrete requests and at least one server processor in data communication with the client processor. The at least one server processor is adapted to receive the at least one piped request comprising the discrete requests, de-pipe each discrete request from the piped request and execute each discrete request to generate a result associated with the discrete request.1. A web service system, comprising:
at least one client processor adapted to generate and transmit at least one piped request comprising a plurality of discrete requests; at least one server processor in data communication with the client processor, the at least one server processor adapted to:
receive the at least one piped request comprising the discrete requests,
de-pipe each discrete request from the piped request; and
execute each discrete request to generate a result associated with the discrete request. 2. The system of claim 1, wherein the server processor is further adapted to generate and transmit at least one response to the one piped request based on at least one of the results generated. 3. The system of claim 2, wherein the server processor is adapted to provide a discrete request processing module operable to:
receive at least one of the discrete requests; and execute the received discrete request to generate the result associated with that request. 4. The system of claim 3, wherein the server processor is adapted to provide a pipe controller module, and the discrete processing module is operable to:
receive the at least one piped request comprising the discrete requests; de-pipe each discrete request from the piped request; provide each discrete request to the discrete-request processing module; and generate and transmit at least one response to the one piped request based on at least one of the results associated with the executed discrete requests. 5. The system of claim 4, wherein the pipe controller module is operable to generate a command associated with at least one of the discrete requests and provide the command to the discrete request processing module, and the discrete request processing module is operable to receive the command and execute the command to generate the result associated with that discrete request. 6. The system of claim 5, wherein the pipe controller module is adapted to generate the command based on at least one of the discrete requests and at least one of the results that has been previously generated by the discrete-request processing module. 7. The system of claim 1, wherein the at least one piped request is a web request for transmission over the Internet. 8. The system of claim 7, wherein the web request is compatible with hypertext transfer protocol (“HTTP”). 9. The system of claim 3, wherein the discrete request processor module is based on a model-view-controller (MVC) pattern for web applications based on ASP.NET framework. 10. The system of according to claim 4, wherein the discrete request processing module is operable to provide the generated result to the pipe controller module by storing the result in the data storage device at a particular location and the pipe controller module is operable to receive the result by referencing the result that is being stored at the particular location. 11. The web service system of claim 1, wherein the result generated by the discrete request processor module is a logical object. 12. The web service system of claim 1, wherein the discrete request processor module comprises a piped request handler sub-module for setting up an HTTP environment for processing the discrete request. 13. A web server comprising at least one server processor adapted to:
receive the at least one piped request comprising the discrete requests, de-pipe each discrete request from the piped request; and execute each discrete request to generate a result associated with the discrete request. 14. The server of claim 13, wherein the server processor is adapted to generate and transmit at least one response to the at least one piped request based on at least one of the results generated. 15. The server claim 13, wherein the server processor is adapted to provide a discrete request processing module, the discrete processing module being operable to:
receive at least one of the discrete request; and execute the received discrete request to generate the result associated with that request. 16. The server of claim 14, wherein the server processor is further adapted to provide a pipe controller module operable to:
receive the at least one piped request comprising the discrete requests; de-pipe each discrete request from the piped request; provide each discrete request to the discrete-request processing module; and generate and transmit at least one response to the one piped request based on at least one of the results associated with the executed discrete requests. 17. The server of claim 16, wherein the pipe controller module is operable to generate a command associated with at least one of the discrete request and provide the command to the discrete request processing module, and the discrete request processing module is operable to receive the command and execute the command to generate the result associated with that discrete request. 18. The server of claim 17, wherein the pipe controller module is adapted to generate the command based on at least one of the discrete requests and at least one of the results that has been previously generated by the discrete-request processing module. 19. The server of claim 13, wherein the at least one piped request is a web request for transmission over the Internet. 20. The server of claim 13, wherein the web request is compatible with hypertext transfer protocol (“HTTP”). 21. The server of claim 15, wherein the discrete request processor module is based on a model-view-controller (MVC) pattern for web applications based on ASP.NET framework. 22. The server of claim 16, wherein the discrete request processing module is operable to provide the generated result to the pipe controller module by storing the result in the data storage device at a particular location and the pipe controller module is operable to receive the result by referencing the result that is being stored at the particular location. 23. The server of claim 16, wherein the result generated by the discrete request processor module is a logical object. 24. The server of claim 16, wherein the discrete request processor module comprises a piped request handler sub-module for setting up an HTTP environment for processing the discrete request. 25. A computer-implemented web service method comprising:
receiving at least one piped request comprising a plurality of discrete requests; de-piping each discrete request from the piped request; and executing each discrete request to generate a result associated with the discrete request. 26. The method of claim 25 further comprising generating and transmitting at least one response to the one piped request based on at least one of the results generated. 27. The method of claim 25, wherein the step of de-piping each discrete request comprises generating a command associated with at least one of the discrete requests for execution. 28. The method of claim 25, wherein the step of generating the command comprises generating the command based on at least one of the discrete requests and at least one of the results generated by the discrete-request processing module. | 2,400 |
7,110 | 7,110 | 13,631,396 | 2,455 | The present disclosure is directed to methods and systems that include generating an availability request, where the availability request inquires about an availability of each contact in a set of multiple contacts; submitting a composite presence subscribe request to a presence server based on the availability request, where the composite presence subscribe request identifies each contact in the set of multiple contacts; generating, from the presence server, a composite presence report indicating the availability of each contact; and notifying of the availability of each contact. | 1. A method comprising:
generating an availability request, wherein the availability request inquires about an availability of each contact in a set of multiple contacts; submitting a composite presence subscribe request to a presence server based on the availability request, wherein the composite presence subscribe request identifies each contact in the set of multiple contacts; generating, from the presence server, a composite presence report indicating the availability of each contact; and notifying of the availability of each contact. 2. The method of claim 1, wherein the notifying comprises notifying without each contact subscribing to the availability request. 3. The method of claim 1, wherein the composite presence subscribe request is a SIP request. 4. The method of claim 3, wherein the composite presence subscribe request comprises a parameter of “list=ad hoc” in the TO address. 5. The method of claim 4, wherein the composite presence subscribe request further comprises an expires=0. 6. The method of claim 5, wherein the composite presence subscribe request further comprises an identification of a user set to be retrieved in a URL encoded query in the TO address. 7. The method of claim 1, wherein the composite presence subscribe request is an XMPP request. 8. The method of claim 1, wherein a privacy of each contact is considered. 9. The method of claim 1, wherein the notifying comprises the user receiving one notification list containing an indication of the availability of each contact in the set of contacts. 10. A computer readable medium comprising processor executable instructions to perform the steps of claim 1. 11. A presence aware communications system, comprising:
a module operable to: receive, from a client, a composite presence subscribe request, wherein the composite presence subscribe request identifies each contact in a set of multiple contacts and requests an availability of each contact in the set of multiple contacts; execute a search based on the composite presence subscribe request to determine the availability of each contact; and return, to the client, a composite presence report indicating the availability of each contact. 12. The system of claim 11, wherein executing the search query comprises executing without each contact subscribing to the composite presence subscribe request. 13. The system of claim 11, wherein the composite presence subscribe request is a SIP request. 14. The system of claim 13, wherein the composite presence subscribe request comprises a parameter of “list=ad hoc” in the TO address. 15. The system of claim 14, wherein the composite presence subscribe request further comprises an expires=0. 16. The system of claim 15, wherein the composite presence subscribe request further comprises an identification of a user set to be retrieved in a URL encoded query in the TO address. 17. The system of claim 11, wherein the composite presence subscribe request is an XMPP request. 18. The system of claim 11, wherein the composite presence report is one list indicating the availability of each contact. 19. The system of claim 11, further comprising the steps of:
following receiving the composite presence subscribe request, receiving, from the client, a rich presence information request for at least one contact in the set of multiple contacts; and generating the rich presence information. 20. The system of claim 19, wherein generating the rich presence information comprises the at least one contact subscribing to the availability request. | The present disclosure is directed to methods and systems that include generating an availability request, where the availability request inquires about an availability of each contact in a set of multiple contacts; submitting a composite presence subscribe request to a presence server based on the availability request, where the composite presence subscribe request identifies each contact in the set of multiple contacts; generating, from the presence server, a composite presence report indicating the availability of each contact; and notifying of the availability of each contact.1. A method comprising:
generating an availability request, wherein the availability request inquires about an availability of each contact in a set of multiple contacts; submitting a composite presence subscribe request to a presence server based on the availability request, wherein the composite presence subscribe request identifies each contact in the set of multiple contacts; generating, from the presence server, a composite presence report indicating the availability of each contact; and notifying of the availability of each contact. 2. The method of claim 1, wherein the notifying comprises notifying without each contact subscribing to the availability request. 3. The method of claim 1, wherein the composite presence subscribe request is a SIP request. 4. The method of claim 3, wherein the composite presence subscribe request comprises a parameter of “list=ad hoc” in the TO address. 5. The method of claim 4, wherein the composite presence subscribe request further comprises an expires=0. 6. The method of claim 5, wherein the composite presence subscribe request further comprises an identification of a user set to be retrieved in a URL encoded query in the TO address. 7. The method of claim 1, wherein the composite presence subscribe request is an XMPP request. 8. The method of claim 1, wherein a privacy of each contact is considered. 9. The method of claim 1, wherein the notifying comprises the user receiving one notification list containing an indication of the availability of each contact in the set of contacts. 10. A computer readable medium comprising processor executable instructions to perform the steps of claim 1. 11. A presence aware communications system, comprising:
a module operable to: receive, from a client, a composite presence subscribe request, wherein the composite presence subscribe request identifies each contact in a set of multiple contacts and requests an availability of each contact in the set of multiple contacts; execute a search based on the composite presence subscribe request to determine the availability of each contact; and return, to the client, a composite presence report indicating the availability of each contact. 12. The system of claim 11, wherein executing the search query comprises executing without each contact subscribing to the composite presence subscribe request. 13. The system of claim 11, wherein the composite presence subscribe request is a SIP request. 14. The system of claim 13, wherein the composite presence subscribe request comprises a parameter of “list=ad hoc” in the TO address. 15. The system of claim 14, wherein the composite presence subscribe request further comprises an expires=0. 16. The system of claim 15, wherein the composite presence subscribe request further comprises an identification of a user set to be retrieved in a URL encoded query in the TO address. 17. The system of claim 11, wherein the composite presence subscribe request is an XMPP request. 18. The system of claim 11, wherein the composite presence report is one list indicating the availability of each contact. 19. The system of claim 11, further comprising the steps of:
following receiving the composite presence subscribe request, receiving, from the client, a rich presence information request for at least one contact in the set of multiple contacts; and generating the rich presence information. 20. The system of claim 19, wherein generating the rich presence information comprises the at least one contact subscribing to the availability request. | 2,400 |
7,111 | 7,111 | 14,197,019 | 2,449 | A network communications system and method are disclosed. In at least one implementation, the network communications system includes a network appliance configured to receive from a client device via a client-side wide area network, an HTTP non-compliant request stream including one or more HTTP non-compliant requests formatted according to an HTTP non-compliant application level protocol. The network appliance is further configured to translate the one or more HTTP non-compliant requests of the HTTP non-compliant request stream from the HTTP non-compliant application level protocol into one or more HTTP compliant requests of an HTTP compliant request stream. The network appliance is further configured to forward the HTTP compliant request stream including the one or more HTTP compliant requests to one or more server devices via a server-side local area network. | 1. A network communications method performed by a network appliance, the method comprising:
receiving a first request stream via a single TCP connection, the first request stream including multiple requests initiated by a first client device and multiplexed over the single TCP connection; receiving a second request stream via at least one other TCP connection, the second request stream including one or more requests initiated by a second client device that are defined by a different application level protocol than the first request stream; demultiplexing the multiple requests of the first request stream received via the single TCP connection to obtain multiple demultiplexed requests; rewriting one or more of a URL, a header, or a data payload of each of the multiple demultiplexed requests to obtain corresponding multiple rewritten requests that share the same application level protocol with the second client device; multiplexing at least one request of the multiple rewritten requests of the first request stream with at least one request of the second request stream to obtain a multiplexed request stream for the first and second client devices; and transmitting the multiplexed request stream to a server device via a persistent TCP connection with that server device. 2. The method of claim 1, wherein multiplexing the at least one request of the multiple rewritten requests of the first request stream with the at least one request of the second request stream includes multiplexing two or more of the multiple rewritten requests of the first request stream with the at least one request of the second request stream. 3. The method of claim 1, wherein the first request stream is defined by an HTTP non-compliant application level protocol; and
wherein the second request stream is defined by an HTTP compliant application level protocol defining a greater specified number of TCP connections than the HTTP non-compliant application level protocol. 4. The method of claim 1, wherein the server device supports the HTTP compliant application level protocol, and does not support the HTTP non-compliant application level protocol. 5. The method of claim 3, wherein the HTTP non-compliant application level protocol defines a specified number of TCP connections in which the specified number of TCP connections is one TCP connection corresponding to the single TCP connection; and
wherein the HTTP compliant application level protocol defines the greater specified number of TCP connections. 6. The method of claim 3, wherein the HTTP non-compliant application level protocol is SPDY. 7. The method of claim 3, prior to receiving the first request stream,
receiving an indication initiated by the first client device that the first client device supports one or more application level protocols, including an indication that the first client device supports the HTTP non-compliant application level protocol; and send an indication of one or more supported application level protocols to the first client device, including an indication of support for the HTTP non-compliant application level protocol. 8. The method of claim 1, further comprising:
transmitting another demultiplexed request of the multiple demultiplexed requests to another server device via another persistent TCP connection. 9. The method of claim 1, wherein the first request stream is received via the single TCP connection over a client-side wide area network;
wherein the second request stream is received via the at least one other TCP connection over the client-side wide area network; and wherein the multiplexed request stream is transmitted to the server device via the persistent TCP connection with that server device over a server-side local area network. 10. The method of claim 1, further comprising:
receiving a response stream via the persistent TCP connection, the response stream including multiple responses initiated by the server device destined for at least the first client device and the second client device, and multiplexed over the persistent TCP connection; demultiplexing the multiple responses of the response stream to obtain multiple demultiplexed responses; rewriting one or more of a URL, a header, or a data payload of two or more of the multiple demultiplexed responses destined for the first client device to obtain a rewritten response stream for the first client device defined by the different application level protocol than at least another demultiplexed response destined for the second client device; multiplexing the multiple rewritten responses destined for the first client device to obtain a multiplexed response stream; and transmitting the multiplexed response stream to the first client device via the single TCP connection with the first client device. 11. The method of claim 10, wherein the multiplexed response stream is defined by an HTTP non-compliant application level protocol; and
wherein the response stream received via the persistent TCP connection is defined by an HTTP compliant application level protocol. 12. The method of claim 1, further comprising uncompressing respective headers of the multiple demultiplexed requests initiated by the first client device. 13. The method of claim 1, further comprising decrypting respective headers of the multiple demultiplexed requests initiated by the first client device. 14. The method of claim 1, further comprising decrypting the first request stream prior to rewriting one or more of the URL, the header, or the data payload of each of the multiple demultiplexed requests. 15. The method of claim 1, further comprising terminating the single TCP connection with the first client device on the client-side of the network appliance, and terminating the persistent TCP with the server device on the server-side of the network appliance. 16. A network communications method performed by a network appliance, the method comprising:
receiving a response stream via a persistent TCP connection, the response stream including multiple responses initiated by a server device destined for at least a first client device and a second client device, and multiplexed over the persistent TCP connection; demultiplexing the multiple responses of the response stream to obtain multiple demultiplexed responses for at least the first client device and the second client device; rewriting one or more of a URL, a header, or a data payload of two or more of the multiple demultiplexed responses destined for the first client device to obtain a rewritten response stream for the first client device defined by a different application level protocol than at least another demultiplexed response destined for the second client device; multiplexing the multiple rewritten responses destined for the first client device to obtain a multiplexed response stream; and transmitting the multiplexed response stream to the first client device via a single TCP connection with the first client device. 17. The method of claim 16, wherein the multiple rewritten responses are responsive to one or more requests received from the first client device over the single TCP connection with the first client device. 18. The method of claim 16, wherein the multiplexed response stream is defined by an HTTP non-compliant application level protocol that defines a specified number of TCP connections in which the specified number of TCP connections is one TCP connection corresponding to the single TCP connection; and
wherein the response stream received via the persistent TCP connection is defined by an HTTP compliant application level protocol that defines a greater specified number of TCP connections that is greater than the HTTP non-compliant application level protocol. 19. The method of claim 18, wherein the HTTP non-compliant application level protocol is SPDY. 20. A network communications system, comprising:
a network appliance configured to:
receive a first request stream via a single TCP connection, the first request stream including multiple requests initiated by a first client device and multiplexed over the single TCP connection of a client-side wide area network;
receive a second request stream via at least one other TCP connection, the second request stream including one or more requests initiated by a second client device that are defined by a different application level protocol than the first request stream, the different application level protocol defining a greater number of TCP connections than the single TCP connection of the first request stream;
demultiplex the multiple requests of the first request stream received via the single TCP connection to obtain multiple demultiplexed requests;
rewrite one or more of a URL, a header, or a data payload of each of the multiple demultiplexed requests to obtain corresponding multiple rewritten requests that share the same application level protocol with the second client device;
multiplex at least one request of the multiple rewritten requests of the first request stream with at least one request of the second request stream to obtain a multiplexed request stream for the first and second client devices; and
transmit the multiplexed request stream to a server device via a persistent TCP connection of a server-side local area network with that server device. | A network communications system and method are disclosed. In at least one implementation, the network communications system includes a network appliance configured to receive from a client device via a client-side wide area network, an HTTP non-compliant request stream including one or more HTTP non-compliant requests formatted according to an HTTP non-compliant application level protocol. The network appliance is further configured to translate the one or more HTTP non-compliant requests of the HTTP non-compliant request stream from the HTTP non-compliant application level protocol into one or more HTTP compliant requests of an HTTP compliant request stream. The network appliance is further configured to forward the HTTP compliant request stream including the one or more HTTP compliant requests to one or more server devices via a server-side local area network.1. A network communications method performed by a network appliance, the method comprising:
receiving a first request stream via a single TCP connection, the first request stream including multiple requests initiated by a first client device and multiplexed over the single TCP connection; receiving a second request stream via at least one other TCP connection, the second request stream including one or more requests initiated by a second client device that are defined by a different application level protocol than the first request stream; demultiplexing the multiple requests of the first request stream received via the single TCP connection to obtain multiple demultiplexed requests; rewriting one or more of a URL, a header, or a data payload of each of the multiple demultiplexed requests to obtain corresponding multiple rewritten requests that share the same application level protocol with the second client device; multiplexing at least one request of the multiple rewritten requests of the first request stream with at least one request of the second request stream to obtain a multiplexed request stream for the first and second client devices; and transmitting the multiplexed request stream to a server device via a persistent TCP connection with that server device. 2. The method of claim 1, wherein multiplexing the at least one request of the multiple rewritten requests of the first request stream with the at least one request of the second request stream includes multiplexing two or more of the multiple rewritten requests of the first request stream with the at least one request of the second request stream. 3. The method of claim 1, wherein the first request stream is defined by an HTTP non-compliant application level protocol; and
wherein the second request stream is defined by an HTTP compliant application level protocol defining a greater specified number of TCP connections than the HTTP non-compliant application level protocol. 4. The method of claim 1, wherein the server device supports the HTTP compliant application level protocol, and does not support the HTTP non-compliant application level protocol. 5. The method of claim 3, wherein the HTTP non-compliant application level protocol defines a specified number of TCP connections in which the specified number of TCP connections is one TCP connection corresponding to the single TCP connection; and
wherein the HTTP compliant application level protocol defines the greater specified number of TCP connections. 6. The method of claim 3, wherein the HTTP non-compliant application level protocol is SPDY. 7. The method of claim 3, prior to receiving the first request stream,
receiving an indication initiated by the first client device that the first client device supports one or more application level protocols, including an indication that the first client device supports the HTTP non-compliant application level protocol; and send an indication of one or more supported application level protocols to the first client device, including an indication of support for the HTTP non-compliant application level protocol. 8. The method of claim 1, further comprising:
transmitting another demultiplexed request of the multiple demultiplexed requests to another server device via another persistent TCP connection. 9. The method of claim 1, wherein the first request stream is received via the single TCP connection over a client-side wide area network;
wherein the second request stream is received via the at least one other TCP connection over the client-side wide area network; and wherein the multiplexed request stream is transmitted to the server device via the persistent TCP connection with that server device over a server-side local area network. 10. The method of claim 1, further comprising:
receiving a response stream via the persistent TCP connection, the response stream including multiple responses initiated by the server device destined for at least the first client device and the second client device, and multiplexed over the persistent TCP connection; demultiplexing the multiple responses of the response stream to obtain multiple demultiplexed responses; rewriting one or more of a URL, a header, or a data payload of two or more of the multiple demultiplexed responses destined for the first client device to obtain a rewritten response stream for the first client device defined by the different application level protocol than at least another demultiplexed response destined for the second client device; multiplexing the multiple rewritten responses destined for the first client device to obtain a multiplexed response stream; and transmitting the multiplexed response stream to the first client device via the single TCP connection with the first client device. 11. The method of claim 10, wherein the multiplexed response stream is defined by an HTTP non-compliant application level protocol; and
wherein the response stream received via the persistent TCP connection is defined by an HTTP compliant application level protocol. 12. The method of claim 1, further comprising uncompressing respective headers of the multiple demultiplexed requests initiated by the first client device. 13. The method of claim 1, further comprising decrypting respective headers of the multiple demultiplexed requests initiated by the first client device. 14. The method of claim 1, further comprising decrypting the first request stream prior to rewriting one or more of the URL, the header, or the data payload of each of the multiple demultiplexed requests. 15. The method of claim 1, further comprising terminating the single TCP connection with the first client device on the client-side of the network appliance, and terminating the persistent TCP with the server device on the server-side of the network appliance. 16. A network communications method performed by a network appliance, the method comprising:
receiving a response stream via a persistent TCP connection, the response stream including multiple responses initiated by a server device destined for at least a first client device and a second client device, and multiplexed over the persistent TCP connection; demultiplexing the multiple responses of the response stream to obtain multiple demultiplexed responses for at least the first client device and the second client device; rewriting one or more of a URL, a header, or a data payload of two or more of the multiple demultiplexed responses destined for the first client device to obtain a rewritten response stream for the first client device defined by a different application level protocol than at least another demultiplexed response destined for the second client device; multiplexing the multiple rewritten responses destined for the first client device to obtain a multiplexed response stream; and transmitting the multiplexed response stream to the first client device via a single TCP connection with the first client device. 17. The method of claim 16, wherein the multiple rewritten responses are responsive to one or more requests received from the first client device over the single TCP connection with the first client device. 18. The method of claim 16, wherein the multiplexed response stream is defined by an HTTP non-compliant application level protocol that defines a specified number of TCP connections in which the specified number of TCP connections is one TCP connection corresponding to the single TCP connection; and
wherein the response stream received via the persistent TCP connection is defined by an HTTP compliant application level protocol that defines a greater specified number of TCP connections that is greater than the HTTP non-compliant application level protocol. 19. The method of claim 18, wherein the HTTP non-compliant application level protocol is SPDY. 20. A network communications system, comprising:
a network appliance configured to:
receive a first request stream via a single TCP connection, the first request stream including multiple requests initiated by a first client device and multiplexed over the single TCP connection of a client-side wide area network;
receive a second request stream via at least one other TCP connection, the second request stream including one or more requests initiated by a second client device that are defined by a different application level protocol than the first request stream, the different application level protocol defining a greater number of TCP connections than the single TCP connection of the first request stream;
demultiplex the multiple requests of the first request stream received via the single TCP connection to obtain multiple demultiplexed requests;
rewrite one or more of a URL, a header, or a data payload of each of the multiple demultiplexed requests to obtain corresponding multiple rewritten requests that share the same application level protocol with the second client device;
multiplex at least one request of the multiple rewritten requests of the first request stream with at least one request of the second request stream to obtain a multiplexed request stream for the first and second client devices; and
transmit the multiplexed request stream to a server device via a persistent TCP connection of a server-side local area network with that server device. | 2,400 |
7,112 | 7,112 | 14,567,989 | 2,473 | Techniques are described for wireless communication. A first method includes measuring, by a first device, a condition of a wireless channel; and generating at least one channel side information feedback message based on the measured condition of the wireless channel. The at least one channel side information feedback message provides information on a relationship of a set of parameters, including a data rate parameter, an error probability parameter, and at least one of a deadline parameter or a transmission link parameter. A second method includes measuring, by a first device, interference on a wireless channel; identifying an interfering device for the wireless channel based on the measurement; and generating a channel side information feedback message based on the measured interference on the wireless channel. The channel side information feedback message indicates the interfering device for the wireless channel and a correlation of interference from the interfering device with time or frequency. | 1. A method of wireless communication, comprising:
measuring, by a first device, a condition of a wireless channel; generating at least one channel side information feedback message based on the measured condition of the wireless channel, wherein the at least one channel side information feedback message provides information on at least one parameter correlated with time or frequency; and transmitting the at least one channel side information feedback message to a second device. 2. The method of claim 1, wherein the at least one parameter comprises a data rate parameter. 3. The method of claim 1, further comprising:
estimating a periodicity of the at least one parameter in time or frequency, wherein the at least one channel side information feedback message comprises the estimated periodicity. 4. A device for wireless communication, comprising:
means for measuring a condition of a wireless channel; means for generating at least one channel side information feedback message based on the measured condition of the wireless channel, wherein the at least one channel side information feedback message provides information on at least one parameter correlated with time or frequency; and means for transmitting the at least one channel side information feedback message to another device. 5. The device of claim 4, wherein the at least one parameter comprises a data rate parameter. 6. The device of claim 4, further comprising:
means for estimating a periodicity of the at least one parameter in time or frequency; wherein the at least one channel side information feedback message comprises the estimated periodicity. 7. A device for wireless communication, comprising a processor, memory in electronic communication with the processor, and instructions stored in the memory, the instructions being executable by the processor to:
measure, by a first device, a condition of a wireless channel; generate at least one channel side information feedback message based on the measured condition of the wireless channel, wherein the at least one channel side information feedback message provides information on at least one parameter correlated with time or frequency; and transmit the at least one channel side information feedback message to another device. 8. The device of claim 7, wherein the at least one parameter comprises a data rate parameter. 9. The device of claim 7, wherein the instructions are executable by the processor to:
estimate a periodicity of the at least one parameter in time or frequency; wherein the at least one channel side information feedback message comprises the estimated periodicity. 10. A non-transitory computer-readable medium storing instructions executable by a processor to cause a device to:
measure, by a first device, a condition of a wireless channel; generate at least one channel side information feedback message based on the measured condition of the wireless channel, wherein the at least one channel side information feedback message provides information on at least one parameter correlated with time or frequency; and transmit the at least one channel side information feedback message to another device. 11. A method of wireless communication, comprising:
transmitting a wireless signal to a device over a wireless channel; and receiving from the device at least one channel side information feedback message based on a measured condition of the wireless channel, wherein the at least one channel side information feedback message provides information on at least one parameter correlated with time or frequency. 12. The method of claim 11, wherein the at least one parameter comprises a data rate parameter. 13. The method of claim 11, wherein the at least one channel side information feedback message comprises a periodicity of the at least one parameter in time or frequency. 14. A device for wireless communication, comprising:
means for transmitting a wireless signal to a device over a wireless channel; and means for receiving from the device at least one channel side information feedback message based on a measured condition of the wireless channel, wherein the at least one channel side information feedback message provides information on at least one parameter correlated with time or frequency. 15. The device of claim 14, wherein the at least one parameter comprises a data rate parameter. 16. The device of claim 14, wherein the at least one channel side information feedback message comprises a periodicity of the at least one parameter in time or frequency. 17. A device for wireless communication, comprising a processor, memory in electronic communication with the processor, and instructions stored in the memory, the instructions being executable by the processor to:
transmit a wireless signal to a device over a wireless channel; and receive from the device at least one channel side information feedback message based on a measured condition of the wireless channel, wherein the at least one channel side information feedback message provides information on at least one parameter correlated with time or frequency. 18. The device of claim 17, wherein the at least one parameter comprises a data rate parameter. 19. The device of claim 17, wherein the at least one channel side information feedback message comprises a periodicity of the at least one parameter in time or frequency. 20. A non-transitory computer-readable medium storing instructions executable by a processor to cause a device to:
transmit a wireless signal to a device over a wireless channel; and receive from the device at least one channel side information feedback message based on a measured condition of the wireless channel, wherein the at least one channel side information feedback message provides information on at least one parameter correlated with time or frequency. | Techniques are described for wireless communication. A first method includes measuring, by a first device, a condition of a wireless channel; and generating at least one channel side information feedback message based on the measured condition of the wireless channel. The at least one channel side information feedback message provides information on a relationship of a set of parameters, including a data rate parameter, an error probability parameter, and at least one of a deadline parameter or a transmission link parameter. A second method includes measuring, by a first device, interference on a wireless channel; identifying an interfering device for the wireless channel based on the measurement; and generating a channel side information feedback message based on the measured interference on the wireless channel. The channel side information feedback message indicates the interfering device for the wireless channel and a correlation of interference from the interfering device with time or frequency.1. A method of wireless communication, comprising:
measuring, by a first device, a condition of a wireless channel; generating at least one channel side information feedback message based on the measured condition of the wireless channel, wherein the at least one channel side information feedback message provides information on at least one parameter correlated with time or frequency; and transmitting the at least one channel side information feedback message to a second device. 2. The method of claim 1, wherein the at least one parameter comprises a data rate parameter. 3. The method of claim 1, further comprising:
estimating a periodicity of the at least one parameter in time or frequency, wherein the at least one channel side information feedback message comprises the estimated periodicity. 4. A device for wireless communication, comprising:
means for measuring a condition of a wireless channel; means for generating at least one channel side information feedback message based on the measured condition of the wireless channel, wherein the at least one channel side information feedback message provides information on at least one parameter correlated with time or frequency; and means for transmitting the at least one channel side information feedback message to another device. 5. The device of claim 4, wherein the at least one parameter comprises a data rate parameter. 6. The device of claim 4, further comprising:
means for estimating a periodicity of the at least one parameter in time or frequency; wherein the at least one channel side information feedback message comprises the estimated periodicity. 7. A device for wireless communication, comprising a processor, memory in electronic communication with the processor, and instructions stored in the memory, the instructions being executable by the processor to:
measure, by a first device, a condition of a wireless channel; generate at least one channel side information feedback message based on the measured condition of the wireless channel, wherein the at least one channel side information feedback message provides information on at least one parameter correlated with time or frequency; and transmit the at least one channel side information feedback message to another device. 8. The device of claim 7, wherein the at least one parameter comprises a data rate parameter. 9. The device of claim 7, wherein the instructions are executable by the processor to:
estimate a periodicity of the at least one parameter in time or frequency; wherein the at least one channel side information feedback message comprises the estimated periodicity. 10. A non-transitory computer-readable medium storing instructions executable by a processor to cause a device to:
measure, by a first device, a condition of a wireless channel; generate at least one channel side information feedback message based on the measured condition of the wireless channel, wherein the at least one channel side information feedback message provides information on at least one parameter correlated with time or frequency; and transmit the at least one channel side information feedback message to another device. 11. A method of wireless communication, comprising:
transmitting a wireless signal to a device over a wireless channel; and receiving from the device at least one channel side information feedback message based on a measured condition of the wireless channel, wherein the at least one channel side information feedback message provides information on at least one parameter correlated with time or frequency. 12. The method of claim 11, wherein the at least one parameter comprises a data rate parameter. 13. The method of claim 11, wherein the at least one channel side information feedback message comprises a periodicity of the at least one parameter in time or frequency. 14. A device for wireless communication, comprising:
means for transmitting a wireless signal to a device over a wireless channel; and means for receiving from the device at least one channel side information feedback message based on a measured condition of the wireless channel, wherein the at least one channel side information feedback message provides information on at least one parameter correlated with time or frequency. 15. The device of claim 14, wherein the at least one parameter comprises a data rate parameter. 16. The device of claim 14, wherein the at least one channel side information feedback message comprises a periodicity of the at least one parameter in time or frequency. 17. A device for wireless communication, comprising a processor, memory in electronic communication with the processor, and instructions stored in the memory, the instructions being executable by the processor to:
transmit a wireless signal to a device over a wireless channel; and receive from the device at least one channel side information feedback message based on a measured condition of the wireless channel, wherein the at least one channel side information feedback message provides information on at least one parameter correlated with time or frequency. 18. The device of claim 17, wherein the at least one parameter comprises a data rate parameter. 19. The device of claim 17, wherein the at least one channel side information feedback message comprises a periodicity of the at least one parameter in time or frequency. 20. A non-transitory computer-readable medium storing instructions executable by a processor to cause a device to:
transmit a wireless signal to a device over a wireless channel; and receive from the device at least one channel side information feedback message based on a measured condition of the wireless channel, wherein the at least one channel side information feedback message provides information on at least one parameter correlated with time or frequency. | 2,400 |
7,113 | 7,113 | 14,303,466 | 2,484 | The importance of video sections of a video file may be determined from features of the video file. The video file may be decoded to obtain video frames and audio data associated with the video frames. Feature scores for each video frame may be obtained by analyzing features of the video frame or the audio data associated with the video frame based on a local rule, a global rule, or both. The feature scores are further combined to derive a frame importance score for the video frame. Based on the feature scores of the video frames in the video file, the video file may be segmented into video sections of different section importance values. | 1. One or more computer-readable media storing computer-executable instructions that are executable to cause one or more processors to perform acts comprising:
decoding a video file to obtain at least one of a video frame or audio data associated with the video frame; analyzing one or more high-level features of the at least one of the video frame or the audio data associated with the video frame based on at least one of a local rule or a global rule to obtain one or more feature scores for the video frame, the one or more high-level features including at least one feature that is related to a movement or a position of a human face in the video frame; combining the one or more feature scores of the video frame to derive a frame importance score for the video frame; and segmenting the video file into video sections of different section importance values based at least on the frame importance scores of the video frame and other frame importance scores of additional video frames of the video file. 2. The one or more computer-readable media of claim 1, further comprising ranking the video sections according to the section importance values. 3. The one or more computer-readable media of claim 1, further comprising:
calculating a video importance value for the video file based at least on the frame importance scores of all video frames in the video file; and ranking the video file relative to additional video files based at least on the video importance value of the video file and other video importance values of the additional video files. 4. The one or more computer-readable media of claim 3, further comprising storing metadata regarding one or more video frames in the video file, the metadata including one or more feature scores of a video frame. 5. The one or more computer-readable media of claim 1, wherein the local rule affects an assignment of feature importance for the video frame and the global rule affects the assignment of feature importance for multiple video frames in the video file that includes the video frame. 6. The one or more computer-readable media of claim 1, wherein the one or more high-level features includes at least one of a position of a human face in the video frame, an occurrence frequency of the human face over multiple video frames, frame saliency of the video frame, an audio power of the audio data associated with the video frame, or an audio type of the audio data associated with the video frame. 7. The one or more computer-readable media of claim 1, wherein the analyzing further includes analyzing one or more low-level features of the video frame, and wherein the combining further includes combining the feature scores for the high-level features and the low-level features of the video frame to derive the frame importance score for the video frame. 8. The one or more computer-readable media of claim 6, wherein the one or more low-level features includes at least one of a frame exposure quality of the video frame, a frame saturation quality of the video frame, a frame hue variety of the video frame, a frame shakiness of the video frame, an average brightness of the video frame, a color entropy of the video frame, or a histogram difference between the video frame and an adjacent video frame. 9. The one or more computer-readable media of claim 1, wherein the analyzing includes:
executing face detection on the video frame to detect one or more human faces; executing face tracking to track the one or more human faces; assigning a negative or a positive score bias to the video frame based at least on a face size, a face position, or one or more facial feature of at least one human face in the video frame, the one or more facial features including an absence or presence of at least one of a smile or open eyes in the at least one human face; executing at least one of face recognition or face grouping on at least one human face of the one or more human faces; identifying one or more main characters based at least on at least one of face grouping data or face recognition data; assigning an additional positive score bias to the video frame for a presence of a main character in the video frame; and computing a face importance score for the video frame that accounts for the negative score bias and the positive score bias. 10. A computer-implemented method, comprising:
decoding a video file to obtain at least one of a video frame or audio data associated with the video frame; analyzing one or more features of at least one of the video frame or the audio data associated with the video frame based on at least one of a local rule or a global rule to obtain one or more feature scores for the video frame; combining the one or more feature scores of the video frame to derive a frame importance score for the video frame; calculating a video importance value for the video file based at least on the frame importance scores of the video frame and other frame importance scores of additional video frames of the video file; and ranking the video file relative to additional video files based at least on video importance values of the video file and other video importance values of the additional video files. 11. The computer-implemented method of claim 10, further comprising segmenting the video file into video sections of different section importance based at least on the frame importance scores of all the video frames in the video file or motion data associated with a plurality of video frames in the video file. 12. The computer-implemented method of claim 10, wherein the local rule affects an assignment of feature importance for the video frame and the global rule affects the assignment of feature importance for multiple video frames in the video file that includes the video frame. 13. The computer-implemented method of claim 11, wherein the segmenting the video file based at least on the motion data associated with a plurality of video frames in the video file includes:
detecting feature points in the video frame of the video file by detecting common points between multiple down sampled images of the video frame; matching the feature points in the video frame to an additional set of feature points in a preceding video frame of the video file; calculating a homography transform matrix that describes movement of the feature points between the video frames; computing motion data for the video frame from the homography transform matrix, the motion data including magnitude and direction of zooming and vertical translation components of the movement of the feature points; combining the motion data for the video frame with motion data for one or more remaining frames in the video file; calculating running averages for the motion data of the video frames in the video file; ascertaining zero crossing zones to find local peak and valley information for the motion data based at least on the running averages; and determining video sections of the video file based at least on the local peak and valley information of the motion data. 14. The computer-implemented method of claim 11, further comprising:
calculating section importance values of the video sections based at least on frame importance scores of corresponding video frames in the video sections; and ranking the video sections according to the section importance values. 15. The computer-implemented method of claim 10, wherein the one or more features includes one or more of a position of a human face in the video frame, an occurrence frequency of the human face over multiple video frames, frame saliency of the video frame, an audio power of the audio data associated with the video frame, an audio type of the audio data associated with the video frame, a frame exposure quality of the video frame, a frame saturation quality of the video frame, a frame hue variety of the video frame, a frame shakiness of the video frame, an average brightness of the video frame, a color entropy of the video frame, or a histogram difference between the video frame and an adjacent video frame. 16. The computer-implemented method of claim 10, wherein the analyzing includes:
executing face detection on a video frame to detect one or more human faces; executing face tracking to track the one or more human faces; assigning a negative score bias or positive score bias to the video frame based at least on a face size, a face position, or one or more facial features of at least one human face in the video frame, the one or more facial features including an absence or presence of at least one of a smile or open eyes in the at least one human face; executing at least one of face recognition or face grouping on at least one human face of the one or more human faces; identifying one or more main characters based at least on at least one of face grouping data or face recognition data; assigning a positive score bias to the video frame for a presence of a main character in the video frame; and computing a face importance score for the video frame that accounts for the negative score bias and the positive score bias. 17. A system, comprising:
one or more processors; a memory that includes a plurality of computer-executable components that are executable by the one or more processors to perform a plurality of actions, the plurality of actions comprising:
decoding a video file to obtain at least one of a video frame or audio data associated with the video frame;
analyzing one or more features of the at least one of the video frame or the audio data associated with the video frame based on at least one of a local rule or a global rule to obtain one or more feature scores for the video frame, the local rule affects an assignment of feature importance for the video frame and the global rule affects the assignment of feature importance for multiple video frames in the video file that includes the video frame;
combining the one or more feature scores of the video frame to derive a frame importance score for the video frame;
segmenting the video file into video sections of different section importance based at least on motion data associated with the video frame and additional video frames in the video file; and
ranking the video sections according section importance values of the video sections that are calculated based at least on the frame importance scores of the video frame and the additional video frames in the video file. 18. The system of claim 17, further comprising:
calculating a video importance value for the video file based at least on the frame importance scores of the video frames in the video file; and ranking the video file relative to additional video files based at least on the video importance value of the video file and other video importance values of additional video files. 19. The system of claim 17, wherein the segmenting the video file includes:
detecting feature points in the video frame of the video file by detecting common points between multiple down sampled images of the video frame; matching the feature points in the video frame to an additional set of feature points in a preceding video frame of the video file; calculating a homography transform matrix that describes movement of the feature points between the video frames; computing motion data for the video frame from the homography transform matrix, the motion data including magnitude and direction of zooming and vertical translation components of the movement of the feature points; combining the motion data for the video frame with motion data for one or more remaining frames in the video file; calculating running averages for the motion data of the video frames in the video file; ascertaining zero crossing zones to find local peak and valley information for the motion data based at least on the running averages; and determining video sections of the video file based at least on the local peak and valley information of the motion data. 20. The system of claim 17, further comprising combining multiple video sections into a highlight video file of the video file. | The importance of video sections of a video file may be determined from features of the video file. The video file may be decoded to obtain video frames and audio data associated with the video frames. Feature scores for each video frame may be obtained by analyzing features of the video frame or the audio data associated with the video frame based on a local rule, a global rule, or both. The feature scores are further combined to derive a frame importance score for the video frame. Based on the feature scores of the video frames in the video file, the video file may be segmented into video sections of different section importance values.1. One or more computer-readable media storing computer-executable instructions that are executable to cause one or more processors to perform acts comprising:
decoding a video file to obtain at least one of a video frame or audio data associated with the video frame; analyzing one or more high-level features of the at least one of the video frame or the audio data associated with the video frame based on at least one of a local rule or a global rule to obtain one or more feature scores for the video frame, the one or more high-level features including at least one feature that is related to a movement or a position of a human face in the video frame; combining the one or more feature scores of the video frame to derive a frame importance score for the video frame; and segmenting the video file into video sections of different section importance values based at least on the frame importance scores of the video frame and other frame importance scores of additional video frames of the video file. 2. The one or more computer-readable media of claim 1, further comprising ranking the video sections according to the section importance values. 3. The one or more computer-readable media of claim 1, further comprising:
calculating a video importance value for the video file based at least on the frame importance scores of all video frames in the video file; and ranking the video file relative to additional video files based at least on the video importance value of the video file and other video importance values of the additional video files. 4. The one or more computer-readable media of claim 3, further comprising storing metadata regarding one or more video frames in the video file, the metadata including one or more feature scores of a video frame. 5. The one or more computer-readable media of claim 1, wherein the local rule affects an assignment of feature importance for the video frame and the global rule affects the assignment of feature importance for multiple video frames in the video file that includes the video frame. 6. The one or more computer-readable media of claim 1, wherein the one or more high-level features includes at least one of a position of a human face in the video frame, an occurrence frequency of the human face over multiple video frames, frame saliency of the video frame, an audio power of the audio data associated with the video frame, or an audio type of the audio data associated with the video frame. 7. The one or more computer-readable media of claim 1, wherein the analyzing further includes analyzing one or more low-level features of the video frame, and wherein the combining further includes combining the feature scores for the high-level features and the low-level features of the video frame to derive the frame importance score for the video frame. 8. The one or more computer-readable media of claim 6, wherein the one or more low-level features includes at least one of a frame exposure quality of the video frame, a frame saturation quality of the video frame, a frame hue variety of the video frame, a frame shakiness of the video frame, an average brightness of the video frame, a color entropy of the video frame, or a histogram difference between the video frame and an adjacent video frame. 9. The one or more computer-readable media of claim 1, wherein the analyzing includes:
executing face detection on the video frame to detect one or more human faces; executing face tracking to track the one or more human faces; assigning a negative or a positive score bias to the video frame based at least on a face size, a face position, or one or more facial feature of at least one human face in the video frame, the one or more facial features including an absence or presence of at least one of a smile or open eyes in the at least one human face; executing at least one of face recognition or face grouping on at least one human face of the one or more human faces; identifying one or more main characters based at least on at least one of face grouping data or face recognition data; assigning an additional positive score bias to the video frame for a presence of a main character in the video frame; and computing a face importance score for the video frame that accounts for the negative score bias and the positive score bias. 10. A computer-implemented method, comprising:
decoding a video file to obtain at least one of a video frame or audio data associated with the video frame; analyzing one or more features of at least one of the video frame or the audio data associated with the video frame based on at least one of a local rule or a global rule to obtain one or more feature scores for the video frame; combining the one or more feature scores of the video frame to derive a frame importance score for the video frame; calculating a video importance value for the video file based at least on the frame importance scores of the video frame and other frame importance scores of additional video frames of the video file; and ranking the video file relative to additional video files based at least on video importance values of the video file and other video importance values of the additional video files. 11. The computer-implemented method of claim 10, further comprising segmenting the video file into video sections of different section importance based at least on the frame importance scores of all the video frames in the video file or motion data associated with a plurality of video frames in the video file. 12. The computer-implemented method of claim 10, wherein the local rule affects an assignment of feature importance for the video frame and the global rule affects the assignment of feature importance for multiple video frames in the video file that includes the video frame. 13. The computer-implemented method of claim 11, wherein the segmenting the video file based at least on the motion data associated with a plurality of video frames in the video file includes:
detecting feature points in the video frame of the video file by detecting common points between multiple down sampled images of the video frame; matching the feature points in the video frame to an additional set of feature points in a preceding video frame of the video file; calculating a homography transform matrix that describes movement of the feature points between the video frames; computing motion data for the video frame from the homography transform matrix, the motion data including magnitude and direction of zooming and vertical translation components of the movement of the feature points; combining the motion data for the video frame with motion data for one or more remaining frames in the video file; calculating running averages for the motion data of the video frames in the video file; ascertaining zero crossing zones to find local peak and valley information for the motion data based at least on the running averages; and determining video sections of the video file based at least on the local peak and valley information of the motion data. 14. The computer-implemented method of claim 11, further comprising:
calculating section importance values of the video sections based at least on frame importance scores of corresponding video frames in the video sections; and ranking the video sections according to the section importance values. 15. The computer-implemented method of claim 10, wherein the one or more features includes one or more of a position of a human face in the video frame, an occurrence frequency of the human face over multiple video frames, frame saliency of the video frame, an audio power of the audio data associated with the video frame, an audio type of the audio data associated with the video frame, a frame exposure quality of the video frame, a frame saturation quality of the video frame, a frame hue variety of the video frame, a frame shakiness of the video frame, an average brightness of the video frame, a color entropy of the video frame, or a histogram difference between the video frame and an adjacent video frame. 16. The computer-implemented method of claim 10, wherein the analyzing includes:
executing face detection on a video frame to detect one or more human faces; executing face tracking to track the one or more human faces; assigning a negative score bias or positive score bias to the video frame based at least on a face size, a face position, or one or more facial features of at least one human face in the video frame, the one or more facial features including an absence or presence of at least one of a smile or open eyes in the at least one human face; executing at least one of face recognition or face grouping on at least one human face of the one or more human faces; identifying one or more main characters based at least on at least one of face grouping data or face recognition data; assigning a positive score bias to the video frame for a presence of a main character in the video frame; and computing a face importance score for the video frame that accounts for the negative score bias and the positive score bias. 17. A system, comprising:
one or more processors; a memory that includes a plurality of computer-executable components that are executable by the one or more processors to perform a plurality of actions, the plurality of actions comprising:
decoding a video file to obtain at least one of a video frame or audio data associated with the video frame;
analyzing one or more features of the at least one of the video frame or the audio data associated with the video frame based on at least one of a local rule or a global rule to obtain one or more feature scores for the video frame, the local rule affects an assignment of feature importance for the video frame and the global rule affects the assignment of feature importance for multiple video frames in the video file that includes the video frame;
combining the one or more feature scores of the video frame to derive a frame importance score for the video frame;
segmenting the video file into video sections of different section importance based at least on motion data associated with the video frame and additional video frames in the video file; and
ranking the video sections according section importance values of the video sections that are calculated based at least on the frame importance scores of the video frame and the additional video frames in the video file. 18. The system of claim 17, further comprising:
calculating a video importance value for the video file based at least on the frame importance scores of the video frames in the video file; and ranking the video file relative to additional video files based at least on the video importance value of the video file and other video importance values of additional video files. 19. The system of claim 17, wherein the segmenting the video file includes:
detecting feature points in the video frame of the video file by detecting common points between multiple down sampled images of the video frame; matching the feature points in the video frame to an additional set of feature points in a preceding video frame of the video file; calculating a homography transform matrix that describes movement of the feature points between the video frames; computing motion data for the video frame from the homography transform matrix, the motion data including magnitude and direction of zooming and vertical translation components of the movement of the feature points; combining the motion data for the video frame with motion data for one or more remaining frames in the video file; calculating running averages for the motion data of the video frames in the video file; ascertaining zero crossing zones to find local peak and valley information for the motion data based at least on the running averages; and determining video sections of the video file based at least on the local peak and valley information of the motion data. 20. The system of claim 17, further comprising combining multiple video sections into a highlight video file of the video file. | 2,400 |
7,114 | 7,114 | 13,745,784 | 2,439 | An aspect provides a method, including: receiving user credentials at a client application via an input device of an information handling device; creating a token using the user credentials; launching a web browser after receiving input at the client application; providing the token to a remote device; and loading, in response to the remote device authenticating the user based on the token, a secure web site in the web browser for presentation on a display device associated with the information handling device. Other aspects are described and claimed. | 1. A method, comprising:
receiving user credentials at a client application via an input device of an information handling device; creating a token using the user credentials; launching a web browser after receiving a user selection at the client application; providing the token to a remote device; and loading, in response to the remote device authenticating the user based on the token, a secure web site in the web browser for presentation on a display device associated with the information handling device. 2. The method of claim 1, wherein the step of providing the token to a remote device comprises using the web browser to provide the token to the remote device. 3. The method of claim 2, wherein the token is provided to the web browser as a text string. 4. The method of claim 1, further comprising retrieving the token from a web service resident on the information handling device prior to providing the token to the remote device. 5. The method of claim 1, further comprising validating the token prior to providing the token to the remote device. 6. The method of claim 5, further comprising, responsive to determining the token is not valid, prompting the user for input of the user credentials. 7. The method of claim 6, wherein the user is prompted to input the user credentials to the client application. 8. The method of claim 1, wherein the step of loading a secure web site in the web browser for presentation on a display device associated with the information handling device further comprises loading a re-directed web site received from the remote device. 9. The method of claim 1, wherein the client application and the secure web site have been previously associated. 10. An information handling device, comprising:
an input device; one or more processors; and a memory operatively coupled to the one or more processors that stores instructions executable by the one or more processors to perform acts comprising: receiving user credentials at a client application via an input device of the information handling device; creating a token using the user credentials; launching a web browser after receiving a user selection at the client application; providing the token to a remote device; and loading, in response to the remote device authenticating the user based on the token, a secure web site in the web browser for presentation on a display device associated with the information handling device. 11. The information handling device of claim 10, wherein the step of providing the token to a remote device comprises using the web browser to provide the token to the remote device. 12. The information handling device of claim 11, wherein the token is provided to the web browser as a text string. 13. The information handling device of claim 10, wherein the acts further comprise retrieving the token from a web service resident on the information handling device prior to providing the token to the remote device. 14. The information handling device of claim 10, wherein the acts further comprise validating the token prior to providing the token to the remote device. 15. The information handling device of claim 14, wherein the acts further comprise, responsive to determining the token is not valid, prompting the user for input of the user credentials. 16. The information handling device of claim 15, wherein the user is prompted to input the user credentials to the client application. 17. The information handling device of claim 10, wherein:
the remote device comprises a web server; and wherein the step of loading a secure web site in the web browser for presentation on a display device associated with the information handling device further comprises loading a re-directed web site received from the web server. 18. The information handling device of claim 10, wherein the client application and the secure web site have been previously associated. 19. A program product, comprising:
a computer readable storage device having computer program code embodied therewith, the computer program code comprising: computer program code configured to receive user credentials at a client application via an input device of an information handling device; computer program code configured to create a token using the user credentials; computer program code configured to launch a web browser after receiving a user selection at the client application; computer program code configured to provide the token to a remote device; and computer program code configured to load, in response to the remote device authenticating the user based on the token, a secure web site in the web browser for presentation on a display device associated with the information handling device. 20. A method, comprising:
receiving, at an information handling device, user credentials input by a user at a client application of a client device, the credentials received in the form of a token derived from the user credentials; authenticating, in response to a web page request from the client device, the user based on the token; providing, in response to authenticating the user based on the token, a secure web site to the web browser of the client device for presentation on a display device associated with the client device. 21. The method of claim 20, wherein the step providing a secure web site to the web browser of the client device for presentation on a display device associated with the client device further comprises providing a re-directed web site from the information handling device. | An aspect provides a method, including: receiving user credentials at a client application via an input device of an information handling device; creating a token using the user credentials; launching a web browser after receiving input at the client application; providing the token to a remote device; and loading, in response to the remote device authenticating the user based on the token, a secure web site in the web browser for presentation on a display device associated with the information handling device. Other aspects are described and claimed.1. A method, comprising:
receiving user credentials at a client application via an input device of an information handling device; creating a token using the user credentials; launching a web browser after receiving a user selection at the client application; providing the token to a remote device; and loading, in response to the remote device authenticating the user based on the token, a secure web site in the web browser for presentation on a display device associated with the information handling device. 2. The method of claim 1, wherein the step of providing the token to a remote device comprises using the web browser to provide the token to the remote device. 3. The method of claim 2, wherein the token is provided to the web browser as a text string. 4. The method of claim 1, further comprising retrieving the token from a web service resident on the information handling device prior to providing the token to the remote device. 5. The method of claim 1, further comprising validating the token prior to providing the token to the remote device. 6. The method of claim 5, further comprising, responsive to determining the token is not valid, prompting the user for input of the user credentials. 7. The method of claim 6, wherein the user is prompted to input the user credentials to the client application. 8. The method of claim 1, wherein the step of loading a secure web site in the web browser for presentation on a display device associated with the information handling device further comprises loading a re-directed web site received from the remote device. 9. The method of claim 1, wherein the client application and the secure web site have been previously associated. 10. An information handling device, comprising:
an input device; one or more processors; and a memory operatively coupled to the one or more processors that stores instructions executable by the one or more processors to perform acts comprising: receiving user credentials at a client application via an input device of the information handling device; creating a token using the user credentials; launching a web browser after receiving a user selection at the client application; providing the token to a remote device; and loading, in response to the remote device authenticating the user based on the token, a secure web site in the web browser for presentation on a display device associated with the information handling device. 11. The information handling device of claim 10, wherein the step of providing the token to a remote device comprises using the web browser to provide the token to the remote device. 12. The information handling device of claim 11, wherein the token is provided to the web browser as a text string. 13. The information handling device of claim 10, wherein the acts further comprise retrieving the token from a web service resident on the information handling device prior to providing the token to the remote device. 14. The information handling device of claim 10, wherein the acts further comprise validating the token prior to providing the token to the remote device. 15. The information handling device of claim 14, wherein the acts further comprise, responsive to determining the token is not valid, prompting the user for input of the user credentials. 16. The information handling device of claim 15, wherein the user is prompted to input the user credentials to the client application. 17. The information handling device of claim 10, wherein:
the remote device comprises a web server; and wherein the step of loading a secure web site in the web browser for presentation on a display device associated with the information handling device further comprises loading a re-directed web site received from the web server. 18. The information handling device of claim 10, wherein the client application and the secure web site have been previously associated. 19. A program product, comprising:
a computer readable storage device having computer program code embodied therewith, the computer program code comprising: computer program code configured to receive user credentials at a client application via an input device of an information handling device; computer program code configured to create a token using the user credentials; computer program code configured to launch a web browser after receiving a user selection at the client application; computer program code configured to provide the token to a remote device; and computer program code configured to load, in response to the remote device authenticating the user based on the token, a secure web site in the web browser for presentation on a display device associated with the information handling device. 20. A method, comprising:
receiving, at an information handling device, user credentials input by a user at a client application of a client device, the credentials received in the form of a token derived from the user credentials; authenticating, in response to a web page request from the client device, the user based on the token; providing, in response to authenticating the user based on the token, a secure web site to the web browser of the client device for presentation on a display device associated with the client device. 21. The method of claim 20, wherein the step providing a secure web site to the web browser of the client device for presentation on a display device associated with the client device further comprises providing a re-directed web site from the information handling device. | 2,400 |
7,115 | 7,115 | 14,684,929 | 2,452 | Disclosed are systems, computer-readable mediums, and methods for receiving a start replication message to replicate a source volume to a replicated volume. A source system forwards I/O requests to the replica server. A data structure associated with the replicated volume is initialized. A write request is received from the source system. The write data is written to the replicated volume and the data structure is updated. Source metadata associated with the source volume is received. The source metadata is compared with prior metadata associated with a prior point-in-time image of the source volume to determine blocks of data that have changed since the prior point-in-time image of the source volume. A first block is determined to not be retrieved based upon the data structure. A second block is determined to be retrieved based upon the data structure. The second block is received and written to the replicated volume. | 1. A system comprising:
a replica server comprising one or more processors configured to:
receive a start replication message from a source system to replicate data of a source volume to a replicated volume on the replica server, wherein the replicated volume comprises a copy of data of the source volume, and wherein the source system forwards input/output (I/O) requests to the replica server after the start replication message is sent;
initiate a data structure associated with units of data of the replicated volume;
receive, from the source system, a write request comprising write data associated a unit of data of the replicated volume, wherein the source system wrote the write data to the source volume based upon the write request;
write the write data to the replicated volume;
update the data structure to indicate the write data has been written after the receipt of the start replication message;
receive source metadata associated with the source volume, wherein the metadata comprises an ordered list of block identifiers for data blocks of the source volume, and wherein each block identifier is used to access a data block;
compare the source metadata with prior metadata associated with a prior point-in-time image of the source volume to determine blocks of data that have changed since the prior point-in-time image of the source volume;
determine a first block of the blocks of data should not be retrieved based upon the data structure;
determine a second block of the blocks of data should be retrieved based upon the data structure;
retrieve the second block from the source system; and
write the second block to the replicated volume. 2. The system of claim 1, wherein the one or more processors are further configured to send a replication complete message to the source system, wherein the source system no longer forwards I/O to the replica server based upon receipt of the replication complete message. 3. The system of claim 1, wherein the one or more processors are further configured to:
request verification data from the source system; receive the verification data from the source system; and compare the received verification data with corresponding verification data of the replica volume to determine the replication was successful. 4. The system of claim 1, wherein a unit of data is a sub-block, wherein a block consists of a plurality of sub-blocks, and wherein to write the second block the one or more processors are further configured to:
determine which sub-blocks have been updated since the receipt of the start replication message based upon the data structure; and write sub-blocks of the second block based upon on the sub-block not being updated since the receipt of the start replication message. 5. The system of claim 1, further comprising a data server, wherein the data server comprising one or more processors configured to:
request quality of service parameters for the replicated volume; request quality of service parameters for the source volume; determine if the replication of the source volume to the replicated volume will succeed based upon the quality of service parameters of the replicated volume and the source volume. 6. The system of claim 5, wherein the data server comprising one or more processors are further configured to determine a ratio of the quality of service parameters for the replicated volume to the quality of service parameters for the source volume, wherein the replication of the source volume will succeed if the ratio is greater than one. 7. The system of claim 1, wherein the data blocks of the replicated volume are randomly and evenly distributed across a cluster containing the replicated volume. 8. A method comprising:
receiving, at a replica server, a start replication message from a source system to replicate data of a source volume to a replicated volume on the replica server, wherein the replicated volume comprises a copy of data of the source volume, and wherein the source system forwards input/output (I/O) requests to the replica server after the start replication message is sent; initiating a data structure associated with units of data of the replicated volume; receiving, from the source system, a write request comprising write data associated a unit of data of the replicated volume, wherein the source system wrote the write data to the source volume based upon the write request; writing the write data to the replicated volume; updating the data structure to indicate the write data has been written after the receipt of the start replication message; receiving source metadata associated with the source volume, wherein the metadata comprises an ordered list of block identifiers for data blocks of the source volume, and wherein each block identifier is used to access a data block; comparing the source metadata with prior metadata associated with a prior point-in-time image of the source volume to determine blocks of data that have changed since the prior point-in-time image of the source volume; determining, using a processor, a first block of the blocks of data should not be retrieved based upon the data structure; determining a second block of the blocks of data should be retrieved based upon the data structure; retrieving the second block from the source system; and writing the second block to the replicated volume. 9. The method of claim 8, further comprising sending a replication complete message to the source system, wherein the source system no longer forwards I/O to the replica server based upon receipt of the replication complete message. 10. The method of claim 8, further comprising:
requesting verification data from the source system; receiving the verification data from the source system; and comparing the received verification data with corresponding verification data of the replica volume to determine the replication was successful. 11. The method of claim 8, wherein a unit of data is a sub-block, wherein a block consists of a plurality of sub-blocks, and wherein the method further comprises:
determining which sub-blocks have been updated since the receipt of the start replication message based upon the data structure; and writing sub-blocks of the second block based upon on the sub-block not being updated since the receipt of the start replication message. 12. The method of claim 8, further comprising
requesting quality of service parameters for the replicated volume; requesting quality of service parameters for the source volume; determining if the replication of the source volume to the replicated volume will succeed based upon the quality of service parameters of the replicated volume and the source volume. 13. The method of claim 12, further comprising determining a ratio of the quality of service parameters for the replicated volume to the quality of service parameters for the source volume, wherein the replication of the source volume will succeed if the ratio is greater than one. 14. The method of claim 8, wherein the data blocks of the replicated volume are randomly and evenly distributed across a cluster containing the replicated volume. 15. A non-transitory computer-readable medium having instructions stored thereon, the instructions comprising:
instructions to receive a start replication message from a source system to replicate data of a source volume to a replicated volume on the replica server, wherein the replicated volume comprises a copy of data of the source volume, and wherein the source system forwards input/output (I/O) requests to the replica server after the start replication message is sent; instructions to initiate a data structure associated with units of data of the replicated volume; instructions to receive, from the source system, a write request comprising write data associated a unit of data of the replicated volume, wherein the source system wrote the write data to the source volume based upon the write request; instructions to write the write data to the replicated volume; instructions to update the data structure to indicate the write data has been written after the receipt of the start replication message; instructions to receive source metadata associated with the source volume, wherein the metadata comprises an ordered list of block identifiers for data blocks of the source volume, and wherein each block identifier is used to access a data block; instructions to compare the source metadata with prior metadata associated with a prior point-in-time image of the source volume to determine blocks of data that have changed since the prior point-in-time image of the source volume; instructions to determine a first block of the blocks of data should not be retrieved based upon the data structure; instructions to determine a second block of the blocks of data should be retrieved based upon the data structure; instructions to retrieve the second block from the source system; and instructions to write the second block to the replicated volume. 16. The non-transitory computer-readable medium of claim 15, wherein the instructions further comprise instructions to send a replication complete message to the source system, wherein the source system no longer forwards I/O to the replica server based upon receipt of the replication complete message. 17. The non-transitory computer-readable medium of claim 15, wherein the instructions further comprise instructions to:
instructions to request verification data from the source system; instructions to receive the verification data from the source system; and instructions to compare the received verification data with corresponding verification data of the replica volume to determine the replication was successful. 18. The non-transitory computer-readable medium of claim 15, wherein a unit of data is a sub-block, wherein a block consists of a plurality of sub-blocks, and wherein the instructions to write the second block comprise:
instructions to determine which sub-blocks have been updated since the receipt of the start replication message based upon the data structure; and instructions to write sub-blocks of the second block based upon on the sub-block not being updated since the receipt of the start replication message. 19. The non-transitory computer-readable medium of claim 15, wherein the instructions further comprise instructions to:
instructions to request quality of service parameters for the replicated volume; instructions to request quality of service parameters for the source volume; instructions to determine if the replication of the source volume to the replicated volume will succeed based upon the quality of service parameters of the replicated volume and the source volume. 20. The non-transitory computer-readable medium of claim 15, wherein the data blocks of the replicated volume are randomly and evenly distributed across a cluster containing the replicated volume. | Disclosed are systems, computer-readable mediums, and methods for receiving a start replication message to replicate a source volume to a replicated volume. A source system forwards I/O requests to the replica server. A data structure associated with the replicated volume is initialized. A write request is received from the source system. The write data is written to the replicated volume and the data structure is updated. Source metadata associated with the source volume is received. The source metadata is compared with prior metadata associated with a prior point-in-time image of the source volume to determine blocks of data that have changed since the prior point-in-time image of the source volume. A first block is determined to not be retrieved based upon the data structure. A second block is determined to be retrieved based upon the data structure. The second block is received and written to the replicated volume.1. A system comprising:
a replica server comprising one or more processors configured to:
receive a start replication message from a source system to replicate data of a source volume to a replicated volume on the replica server, wherein the replicated volume comprises a copy of data of the source volume, and wherein the source system forwards input/output (I/O) requests to the replica server after the start replication message is sent;
initiate a data structure associated with units of data of the replicated volume;
receive, from the source system, a write request comprising write data associated a unit of data of the replicated volume, wherein the source system wrote the write data to the source volume based upon the write request;
write the write data to the replicated volume;
update the data structure to indicate the write data has been written after the receipt of the start replication message;
receive source metadata associated with the source volume, wherein the metadata comprises an ordered list of block identifiers for data blocks of the source volume, and wherein each block identifier is used to access a data block;
compare the source metadata with prior metadata associated with a prior point-in-time image of the source volume to determine blocks of data that have changed since the prior point-in-time image of the source volume;
determine a first block of the blocks of data should not be retrieved based upon the data structure;
determine a second block of the blocks of data should be retrieved based upon the data structure;
retrieve the second block from the source system; and
write the second block to the replicated volume. 2. The system of claim 1, wherein the one or more processors are further configured to send a replication complete message to the source system, wherein the source system no longer forwards I/O to the replica server based upon receipt of the replication complete message. 3. The system of claim 1, wherein the one or more processors are further configured to:
request verification data from the source system; receive the verification data from the source system; and compare the received verification data with corresponding verification data of the replica volume to determine the replication was successful. 4. The system of claim 1, wherein a unit of data is a sub-block, wherein a block consists of a plurality of sub-blocks, and wherein to write the second block the one or more processors are further configured to:
determine which sub-blocks have been updated since the receipt of the start replication message based upon the data structure; and write sub-blocks of the second block based upon on the sub-block not being updated since the receipt of the start replication message. 5. The system of claim 1, further comprising a data server, wherein the data server comprising one or more processors configured to:
request quality of service parameters for the replicated volume; request quality of service parameters for the source volume; determine if the replication of the source volume to the replicated volume will succeed based upon the quality of service parameters of the replicated volume and the source volume. 6. The system of claim 5, wherein the data server comprising one or more processors are further configured to determine a ratio of the quality of service parameters for the replicated volume to the quality of service parameters for the source volume, wherein the replication of the source volume will succeed if the ratio is greater than one. 7. The system of claim 1, wherein the data blocks of the replicated volume are randomly and evenly distributed across a cluster containing the replicated volume. 8. A method comprising:
receiving, at a replica server, a start replication message from a source system to replicate data of a source volume to a replicated volume on the replica server, wherein the replicated volume comprises a copy of data of the source volume, and wherein the source system forwards input/output (I/O) requests to the replica server after the start replication message is sent; initiating a data structure associated with units of data of the replicated volume; receiving, from the source system, a write request comprising write data associated a unit of data of the replicated volume, wherein the source system wrote the write data to the source volume based upon the write request; writing the write data to the replicated volume; updating the data structure to indicate the write data has been written after the receipt of the start replication message; receiving source metadata associated with the source volume, wherein the metadata comprises an ordered list of block identifiers for data blocks of the source volume, and wherein each block identifier is used to access a data block; comparing the source metadata with prior metadata associated with a prior point-in-time image of the source volume to determine blocks of data that have changed since the prior point-in-time image of the source volume; determining, using a processor, a first block of the blocks of data should not be retrieved based upon the data structure; determining a second block of the blocks of data should be retrieved based upon the data structure; retrieving the second block from the source system; and writing the second block to the replicated volume. 9. The method of claim 8, further comprising sending a replication complete message to the source system, wherein the source system no longer forwards I/O to the replica server based upon receipt of the replication complete message. 10. The method of claim 8, further comprising:
requesting verification data from the source system; receiving the verification data from the source system; and comparing the received verification data with corresponding verification data of the replica volume to determine the replication was successful. 11. The method of claim 8, wherein a unit of data is a sub-block, wherein a block consists of a plurality of sub-blocks, and wherein the method further comprises:
determining which sub-blocks have been updated since the receipt of the start replication message based upon the data structure; and writing sub-blocks of the second block based upon on the sub-block not being updated since the receipt of the start replication message. 12. The method of claim 8, further comprising
requesting quality of service parameters for the replicated volume; requesting quality of service parameters for the source volume; determining if the replication of the source volume to the replicated volume will succeed based upon the quality of service parameters of the replicated volume and the source volume. 13. The method of claim 12, further comprising determining a ratio of the quality of service parameters for the replicated volume to the quality of service parameters for the source volume, wherein the replication of the source volume will succeed if the ratio is greater than one. 14. The method of claim 8, wherein the data blocks of the replicated volume are randomly and evenly distributed across a cluster containing the replicated volume. 15. A non-transitory computer-readable medium having instructions stored thereon, the instructions comprising:
instructions to receive a start replication message from a source system to replicate data of a source volume to a replicated volume on the replica server, wherein the replicated volume comprises a copy of data of the source volume, and wherein the source system forwards input/output (I/O) requests to the replica server after the start replication message is sent; instructions to initiate a data structure associated with units of data of the replicated volume; instructions to receive, from the source system, a write request comprising write data associated a unit of data of the replicated volume, wherein the source system wrote the write data to the source volume based upon the write request; instructions to write the write data to the replicated volume; instructions to update the data structure to indicate the write data has been written after the receipt of the start replication message; instructions to receive source metadata associated with the source volume, wherein the metadata comprises an ordered list of block identifiers for data blocks of the source volume, and wherein each block identifier is used to access a data block; instructions to compare the source metadata with prior metadata associated with a prior point-in-time image of the source volume to determine blocks of data that have changed since the prior point-in-time image of the source volume; instructions to determine a first block of the blocks of data should not be retrieved based upon the data structure; instructions to determine a second block of the blocks of data should be retrieved based upon the data structure; instructions to retrieve the second block from the source system; and instructions to write the second block to the replicated volume. 16. The non-transitory computer-readable medium of claim 15, wherein the instructions further comprise instructions to send a replication complete message to the source system, wherein the source system no longer forwards I/O to the replica server based upon receipt of the replication complete message. 17. The non-transitory computer-readable medium of claim 15, wherein the instructions further comprise instructions to:
instructions to request verification data from the source system; instructions to receive the verification data from the source system; and instructions to compare the received verification data with corresponding verification data of the replica volume to determine the replication was successful. 18. The non-transitory computer-readable medium of claim 15, wherein a unit of data is a sub-block, wherein a block consists of a plurality of sub-blocks, and wherein the instructions to write the second block comprise:
instructions to determine which sub-blocks have been updated since the receipt of the start replication message based upon the data structure; and instructions to write sub-blocks of the second block based upon on the sub-block not being updated since the receipt of the start replication message. 19. The non-transitory computer-readable medium of claim 15, wherein the instructions further comprise instructions to:
instructions to request quality of service parameters for the replicated volume; instructions to request quality of service parameters for the source volume; instructions to determine if the replication of the source volume to the replicated volume will succeed based upon the quality of service parameters of the replicated volume and the source volume. 20. The non-transitory computer-readable medium of claim 15, wherein the data blocks of the replicated volume are randomly and evenly distributed across a cluster containing the replicated volume. | 2,400 |
7,116 | 7,116 | 13,839,112 | 2,491 | Disclosed are various embodiments for enforcing device compliance parameters by inhibiting access to devices, networks or resources. Methods may include associating a compliance rule with a client device. If the compliance rule is violated, a setting associated with the client device may be altered. The altered setting may inhibit access to the client device, a network, a client device resource and/or a network resource. For example, necessary password complexities may be increased, password lifetimes may be decreased and/or resources may be restricted based on a geofence, a time of day and/or a day of the week. | 1. A method, comprising:
associating a compliance rule with a client device; determining whether the compliance rule is violated; and altering a setting associated with the client device based on the compliance rule being violated, wherein the altered setting inhibits access to at least one of the client device, a network, a client device resource and a network resource. 2. The method of claim 1, wherein said altering the setting comprises increasing a required password complexity for at least one of the client device or the network. 3. The method of claim 1, wherein said altering the setting comprises decreasing a password lifetime for at least one of the client device or the network. 4. The method of claim 1, wherein said altering the setting comprises restricting access to at least one of the client device resource or the network resource based on at least one of a geofence, a date, a time of day and a day of week. 5. The method of claim 1, wherein said determining is performed on the client device. 6. The method of claim 1, wherein said determining is performed on a remote server. 7. The method of claim 1, wherein said altering is performed based on instructions provided by a remote server. 8. The method of claim 1, wherein said altering inhibits access to at least one of the client device resource or the network resource, the at least one of the client device resource or the network resource including at least one of an application, a computer folder, a data file, an electronic document and a network address. 9. The method of claim 1, further comprising at least one of sending or receiving an alert from the client device to a remote server including an indication of said altering. 10. An apparatus, comprising:
a two-way communication device; a display; and a processor, configured to:
associate a compliance rule with the apparatus; and
alter a setting associated with the apparatus based on the compliance rule being violated,
wherein, the altered setting inhibits access to at least one of the apparatus, a network, an apparatus resource and a network resource. 11. The apparatus of claim 10, wherein altering the setting comprises at least one of:
increasing a required password complexity for at least one of the apparatus or the network; and decreasing a password lifetime for at least one of the client device or the network. 12. The apparatus of claim 10, wherein altering the setting comprises restricting access to at least one of the apparatus resource or the network resource based on at least one of a geofence, a date, a time of day and a day of week. 13. The apparatus of claim 12, wherein altering the setting comprises restricting access to the at least one of the apparatus, network, apparatus resource and network resource based on a geofence, and further includes at least one of:
blocking outgoing calls; blocking outgoing messages; routing inbound calls to an alternate number, address or device; routing some inbound calls to an alternate number, address or device, and allowing other inbound calls to be received; and disabling inbound calls, and providing an automated response to a source of the inbound calls. 14. The apparatus of claim 12, wherein altering the setting comprises restricting access to the at least one of the apparatus, network, apparatus resource and network resource based on an NFC geofence, and further includes at least one of:
blocking outgoing calls via a first carrier; routing outgoing calls to an NFC-enabled device; and routing incoming calls to the NFC-enabled device. 15. The apparatus of claim 10, wherein the processor is further configured to at least one of:
determine whether the compliance rule is violated; and receive an indication that the compliance rule is violated from a remote server. 16. The apparatus of claim 10, wherein the altering is performed based on instructions provided by a remote server. 17. The apparatus of claim 12, wherein altering the setting comprises inhibiting access to a communication function of the apparatus and further includes at least one of:
blocking outgoing calls during predetermined time periods; blocking outgoing messages during predetermined time periods; routing inbound calls to an alternate number, address or device during predetermined time periods; routing some inbound calls to an alternate number, address or device, and allowing other inbound calls to be received, during predetermined time periods; and disabling inbound calls, and providing an automated response to a source of the inbound calls, during predetermined time periods. 18. The apparatus of claim 10, wherein the processor is further configured to send an alert to a remote server including an indication of the altered setting. 19. An apparatus comprising:
a two-way communication device; a storage device; and a processor, configured to:
set a compliance rule, and store the compliance rule on the storage device;
provide the compliance rule to a client device via the two-way communication device;
determine if the client device has violated the compliance rule; and
provide an instruction for altering a setting associated with the client device based on the compliance rule being violated; and
wherein, the altered setting inhibits access to at least one of the client device, a network, a client device resource and a network resource. 20. The apparatus of claim 19, wherein said altering the setting comprises at least one of:
increasing a required password complexity for the client device; increasing a required password complexity for the network; decreasing a password lifetime for the client device; decreasing a password lifetime for the network; restricting access to the client device resource based on a geofence; restricting access to the network resource based on the geofence; restricting access to the client device resource based on a time of day; and restricting access to the network resource based on the time of day. | Disclosed are various embodiments for enforcing device compliance parameters by inhibiting access to devices, networks or resources. Methods may include associating a compliance rule with a client device. If the compliance rule is violated, a setting associated with the client device may be altered. The altered setting may inhibit access to the client device, a network, a client device resource and/or a network resource. For example, necessary password complexities may be increased, password lifetimes may be decreased and/or resources may be restricted based on a geofence, a time of day and/or a day of the week.1. A method, comprising:
associating a compliance rule with a client device; determining whether the compliance rule is violated; and altering a setting associated with the client device based on the compliance rule being violated, wherein the altered setting inhibits access to at least one of the client device, a network, a client device resource and a network resource. 2. The method of claim 1, wherein said altering the setting comprises increasing a required password complexity for at least one of the client device or the network. 3. The method of claim 1, wherein said altering the setting comprises decreasing a password lifetime for at least one of the client device or the network. 4. The method of claim 1, wherein said altering the setting comprises restricting access to at least one of the client device resource or the network resource based on at least one of a geofence, a date, a time of day and a day of week. 5. The method of claim 1, wherein said determining is performed on the client device. 6. The method of claim 1, wherein said determining is performed on a remote server. 7. The method of claim 1, wherein said altering is performed based on instructions provided by a remote server. 8. The method of claim 1, wherein said altering inhibits access to at least one of the client device resource or the network resource, the at least one of the client device resource or the network resource including at least one of an application, a computer folder, a data file, an electronic document and a network address. 9. The method of claim 1, further comprising at least one of sending or receiving an alert from the client device to a remote server including an indication of said altering. 10. An apparatus, comprising:
a two-way communication device; a display; and a processor, configured to:
associate a compliance rule with the apparatus; and
alter a setting associated with the apparatus based on the compliance rule being violated,
wherein, the altered setting inhibits access to at least one of the apparatus, a network, an apparatus resource and a network resource. 11. The apparatus of claim 10, wherein altering the setting comprises at least one of:
increasing a required password complexity for at least one of the apparatus or the network; and decreasing a password lifetime for at least one of the client device or the network. 12. The apparatus of claim 10, wherein altering the setting comprises restricting access to at least one of the apparatus resource or the network resource based on at least one of a geofence, a date, a time of day and a day of week. 13. The apparatus of claim 12, wherein altering the setting comprises restricting access to the at least one of the apparatus, network, apparatus resource and network resource based on a geofence, and further includes at least one of:
blocking outgoing calls; blocking outgoing messages; routing inbound calls to an alternate number, address or device; routing some inbound calls to an alternate number, address or device, and allowing other inbound calls to be received; and disabling inbound calls, and providing an automated response to a source of the inbound calls. 14. The apparatus of claim 12, wherein altering the setting comprises restricting access to the at least one of the apparatus, network, apparatus resource and network resource based on an NFC geofence, and further includes at least one of:
blocking outgoing calls via a first carrier; routing outgoing calls to an NFC-enabled device; and routing incoming calls to the NFC-enabled device. 15. The apparatus of claim 10, wherein the processor is further configured to at least one of:
determine whether the compliance rule is violated; and receive an indication that the compliance rule is violated from a remote server. 16. The apparatus of claim 10, wherein the altering is performed based on instructions provided by a remote server. 17. The apparatus of claim 12, wherein altering the setting comprises inhibiting access to a communication function of the apparatus and further includes at least one of:
blocking outgoing calls during predetermined time periods; blocking outgoing messages during predetermined time periods; routing inbound calls to an alternate number, address or device during predetermined time periods; routing some inbound calls to an alternate number, address or device, and allowing other inbound calls to be received, during predetermined time periods; and disabling inbound calls, and providing an automated response to a source of the inbound calls, during predetermined time periods. 18. The apparatus of claim 10, wherein the processor is further configured to send an alert to a remote server including an indication of the altered setting. 19. An apparatus comprising:
a two-way communication device; a storage device; and a processor, configured to:
set a compliance rule, and store the compliance rule on the storage device;
provide the compliance rule to a client device via the two-way communication device;
determine if the client device has violated the compliance rule; and
provide an instruction for altering a setting associated with the client device based on the compliance rule being violated; and
wherein, the altered setting inhibits access to at least one of the client device, a network, a client device resource and a network resource. 20. The apparatus of claim 19, wherein said altering the setting comprises at least one of:
increasing a required password complexity for the client device; increasing a required password complexity for the network; decreasing a password lifetime for the client device; decreasing a password lifetime for the network; restricting access to the client device resource based on a geofence; restricting access to the network resource based on the geofence; restricting access to the client device resource based on a time of day; and restricting access to the network resource based on the time of day. | 2,400 |
7,117 | 7,117 | 14,825,649 | 2,425 | A method (and structure) includes forming a wireless ad hoc network with a plurality of sensors at a first location, the ad hoc network being a localized, decentralized network wherein each participating sensor has an equal status on the network for performing network functions and is free to associate with any other ad hoc network device in a link range of a vicinity of the first location. Data is transmitted from the plurality of sensors via the ad hoc network, for consumption by an at-home user located at a second location different from said first location. Each sensor indicates a location and a directivity of sensing in the vicinity of the first location, so that the plurality of sensors thereby can provide data sufficient for the at-home user to be immersed in an experience at the first location. | 1. A method comprising:
forming a wireless ad hoc network with a plurality of sensors at a first location, said ad hoc network comprising a localized, decentralized network wherein each participating sensor has an equal status on said network for performing network functions and is free to associate with any other ad hoc network device in a link range of a vicinity of said first location; and transmitting data from said plurality of sensors via said ad hoc network, for consumption by an at-home user located at a second location being any location different from said first location, using an at-home device, each said sensor indicating a location and a directivity of sensing in said vicinity of said first location, said plurality of sensors thereby providing data sufficient for said at-home user to be immersed in an experience that approximates that of said first location, wherein said wireless ad hoc network is established and maintained by a transceiver on an on-the-go user device that transmits a pulse such that any sensor in said link range capable of recognizing said transmitted pulse is invited to join said wireless ad hoc network of sensors, and wherein said on-the-go user device comprises a processor-based device carried by or associated with an on-the-go user who is located at said first location. 2. The method of claim 1, wherein each said sensor of said plurality of sensors provides at least one of video data and audio data from different locations and orientations in said link range in said vicinity of said first location. 3. The method of claim 2, wherein said plurality of sensors comprise any of:
one or more video cameras respectively mounted in a fixed location in a vicinity of said first location, each said one or more video cameras being one of rigidly mounted or selectively movable about one or more axes; one or more microphones respectively mounted in a fixed location in said vicinity of said first location; one or more of a video camera and/or microphone mounted on the on-the-go user device; one or more video cameras and/or microphones mounted on one or more articles worn or carried by said on-the-go user; and one or more video cameras and/or microphones mounted on one or more mobile platforms in said vicinity of said first location. 4-5. (canceled) 6. The method of claim 1, further comprising:
receiving said data from said plurality of sensors at said at-home user device; preparing said received data in accordance with a selected perspective of said at-home user relative to said first location; and presenting said prepared data to said at-home user, wherein said preparing renders said received data to provide said at-home user at the second location different from said first location to recreate the experience of the on-the-go user at said first location from the at-home user's selected perspective, using video and/or audio devices at the at-home user's second location. 7. The method of claim 1, as implemented by a set of instructions stored in a non-transitory memory device of said on-the-go user device, wherein said set of instructions is one of:
previously stored as one of an app or application program in said non-transitory memory device on said on-the-go user device; downloaded from a network server into said non-transitory memory device on said on-the-go user device for purpose of a single session; and downloaded into said non-transitory memory device on said on-the-go user device for purpose of a single session, as part of a cloud service. 8. The method of claim 1, further comprising at least one of:
a feature permitting one of said at-home user and said on-the-go user to bid on a service for data quality and/or bandwidth constraints; and a feature permitting one of said at-home user and said on-the-go user to subscribe to one of different tiered service level for data quality and/or bandwidth constraints. 9. The method of claim 1, wherein said data from said plurality of sensors is received via said transceiver on said on-the-go user device, to be forwarded to said at-home user. 10. The method of claim 1, wherein said data from said plurality of sensors is received via said transceiver on said on-the-go user device and is stored. 11. The method of claim 10, wherein said stored data permits at least one of a future replay of data by said at-home user and a repository of data that can be used to fill in gaps of video data in future sessions. 12. The method of claim 1, wherein said first location changes over time of an ad hoc network session, such that different sensors are added and/or deleted from said ad hoc network as said first location changes. 13. An apparatus, comprising:
a memory device; a processor; a transceiver; an antenna; and circuitry to communicate with an at-home user device located at a location different from that of said apparatus, wherein said memory device stores instructions to permit said apparatus to establish a communication with said at-home user device and to establish and maintain an ad hoc network of sensors within a vicinity of said apparatus and a link range of said antenna, wherein said ad hoc network is established and maintained by said transceiver receiving a command from said processor to generate and transmit a signal via said antenna to invite sensors within the link range of said antenna to establish and maintain said ad hoc network as comprising a localized, decentralized network of sensors wherein each participating sensor has an equal status on said network for performing network functions and is free to associate with any other ad hoc network device in said link range, wherein said plurality of sensors transmit data via said ad hoc network for consumption by said at-home user device, each said sensor indicating a location and a directivity of sensing in said vicinity of said apparatus, wherein said plurality of sensors thereby provide data sufficient for said at-home user to be immersed in an experience of said data transmitted from said plurality of sensors forming said ad hoc network, and wherein said apparatus comprises a smart device carried by or associated with an on-the-go user located in a vicinity of said plurality of sensors forming said ad hoc network. 14. (canceled) 15. A method, comprising:
receiving data from an ad hoc network comprising a plurality of sensors located at a first location, each said sensor providing information of a location and sensing directivity, aid ad hoc network comprising a localized, decentralized network wherein each participating sensor has an equal status on said network for performing network functions and is free to associate with any other ad hoc network device in a link range; receiving a desired location and viewing perspective of an at-home user's device relative to said first location, the at-home user being at a second location different from the first location, the desired location and viewing perspective being defined by inputs received from an at-home user device to describe how the at-home user wishes to perceive the first location; preparing, using a processor, said received data in accordance with said desired location and viewing perspective; and presenting said prepared data to said at-home user's device, such that an at-home user thereby is immersed in data from said first location in the desired location and viewing perspective desired by the at-home user, wherein said wireless ad hoc network is established and maintained by a transceiver on an on-the-go user device that transmits a pulse such that any sensor in said link range capable of recognizing said transmitted pulse is invited to join said wireless ad hoc network of sensors, and wherein said on-the-go user device comprises a processor-based device carried by or associated with an on-the-go user who is located at said first location. 16. The method of claim 15, wherein said preparing said received data comprises:
selecting which sensor data is appropriate for said at-home user's desired location and viewing perspective; and one or more of:
rendering any audio data to be consistent with said at-home user's desired location and viewing perspective;
converting resolution and any other appropriate parameters of video data from selected sensors into a common video format, if selected sensors are not uniform;
stitching together and/or merging video from selected sensors;
filling in any gaps of video data for said desired location and viewing perspective;
rendering the stitched/merged video;
providing a three-dimensional (3D) model of the selected sensor data; and
adapting data to be presented to said at-home user in accordance with outputs from a learning module that defines any special visual or auditory accommodations for said at-home user. 17. The method of claim 15, wherein said receiving said desired location and viewing perspective of an at-home user comprises at least one of:
receiving inputs from said at-home user via menu selections; receiving inputs from said at-home user via input devices on a device used by said at-home user for executing an at-home user session; and receiving data from sensors associated with said at home user device that automatically indicate changes in at least one of eye motion and body movements of said at-home user. 18. (canceled) 19. The method of claim 15, further comprising executing a learning feature that detects and accommodates special visual and/or auditory needs or preferences of the at-home user. 20. The method of claim 15, as implemented by a set of instructions stored in a non-transitory memory device on a device used by said at-home user for executing an at-home user session, wherein said set of instructions is one of:
previously stored as one of an app or application program in said non-transitory memory device on said at-home user device; downloaded from a network server into said non-transitory memory device on said at-home user device for purpose of a single session; and downloaded into said non-transitory memory device on said at-home user device for purpose of a single session, as part of a cloud service. 21. The method of claim 1, wherein said on-the-go user device and said at-home device are interconnected via an audio channel, thereby permitting a real-time conversation between the on-the-go user and the at-home user. 22. The method of claim 21, wherein said on-the-go user device and said at-home device comprise smart phones and the method is implemented by apps downloaded on the on-the-go user smart phone and on the at-home smart phone. 23. The method of claim 1, further comprising using historical footage from the remote location to fill in gaps of a teleported image. 24. The method of claim 1, further comprising
categorizing sensors at the first locution based on at least one of a resolution and a networking capability; detecting computationally gaps in an image from a viewer's perspective, and providing interpolation for the detected gaps. | A method (and structure) includes forming a wireless ad hoc network with a plurality of sensors at a first location, the ad hoc network being a localized, decentralized network wherein each participating sensor has an equal status on the network for performing network functions and is free to associate with any other ad hoc network device in a link range of a vicinity of the first location. Data is transmitted from the plurality of sensors via the ad hoc network, for consumption by an at-home user located at a second location different from said first location. Each sensor indicates a location and a directivity of sensing in the vicinity of the first location, so that the plurality of sensors thereby can provide data sufficient for the at-home user to be immersed in an experience at the first location.1. A method comprising:
forming a wireless ad hoc network with a plurality of sensors at a first location, said ad hoc network comprising a localized, decentralized network wherein each participating sensor has an equal status on said network for performing network functions and is free to associate with any other ad hoc network device in a link range of a vicinity of said first location; and transmitting data from said plurality of sensors via said ad hoc network, for consumption by an at-home user located at a second location being any location different from said first location, using an at-home device, each said sensor indicating a location and a directivity of sensing in said vicinity of said first location, said plurality of sensors thereby providing data sufficient for said at-home user to be immersed in an experience that approximates that of said first location, wherein said wireless ad hoc network is established and maintained by a transceiver on an on-the-go user device that transmits a pulse such that any sensor in said link range capable of recognizing said transmitted pulse is invited to join said wireless ad hoc network of sensors, and wherein said on-the-go user device comprises a processor-based device carried by or associated with an on-the-go user who is located at said first location. 2. The method of claim 1, wherein each said sensor of said plurality of sensors provides at least one of video data and audio data from different locations and orientations in said link range in said vicinity of said first location. 3. The method of claim 2, wherein said plurality of sensors comprise any of:
one or more video cameras respectively mounted in a fixed location in a vicinity of said first location, each said one or more video cameras being one of rigidly mounted or selectively movable about one or more axes; one or more microphones respectively mounted in a fixed location in said vicinity of said first location; one or more of a video camera and/or microphone mounted on the on-the-go user device; one or more video cameras and/or microphones mounted on one or more articles worn or carried by said on-the-go user; and one or more video cameras and/or microphones mounted on one or more mobile platforms in said vicinity of said first location. 4-5. (canceled) 6. The method of claim 1, further comprising:
receiving said data from said plurality of sensors at said at-home user device; preparing said received data in accordance with a selected perspective of said at-home user relative to said first location; and presenting said prepared data to said at-home user, wherein said preparing renders said received data to provide said at-home user at the second location different from said first location to recreate the experience of the on-the-go user at said first location from the at-home user's selected perspective, using video and/or audio devices at the at-home user's second location. 7. The method of claim 1, as implemented by a set of instructions stored in a non-transitory memory device of said on-the-go user device, wherein said set of instructions is one of:
previously stored as one of an app or application program in said non-transitory memory device on said on-the-go user device; downloaded from a network server into said non-transitory memory device on said on-the-go user device for purpose of a single session; and downloaded into said non-transitory memory device on said on-the-go user device for purpose of a single session, as part of a cloud service. 8. The method of claim 1, further comprising at least one of:
a feature permitting one of said at-home user and said on-the-go user to bid on a service for data quality and/or bandwidth constraints; and a feature permitting one of said at-home user and said on-the-go user to subscribe to one of different tiered service level for data quality and/or bandwidth constraints. 9. The method of claim 1, wherein said data from said plurality of sensors is received via said transceiver on said on-the-go user device, to be forwarded to said at-home user. 10. The method of claim 1, wherein said data from said plurality of sensors is received via said transceiver on said on-the-go user device and is stored. 11. The method of claim 10, wherein said stored data permits at least one of a future replay of data by said at-home user and a repository of data that can be used to fill in gaps of video data in future sessions. 12. The method of claim 1, wherein said first location changes over time of an ad hoc network session, such that different sensors are added and/or deleted from said ad hoc network as said first location changes. 13. An apparatus, comprising:
a memory device; a processor; a transceiver; an antenna; and circuitry to communicate with an at-home user device located at a location different from that of said apparatus, wherein said memory device stores instructions to permit said apparatus to establish a communication with said at-home user device and to establish and maintain an ad hoc network of sensors within a vicinity of said apparatus and a link range of said antenna, wherein said ad hoc network is established and maintained by said transceiver receiving a command from said processor to generate and transmit a signal via said antenna to invite sensors within the link range of said antenna to establish and maintain said ad hoc network as comprising a localized, decentralized network of sensors wherein each participating sensor has an equal status on said network for performing network functions and is free to associate with any other ad hoc network device in said link range, wherein said plurality of sensors transmit data via said ad hoc network for consumption by said at-home user device, each said sensor indicating a location and a directivity of sensing in said vicinity of said apparatus, wherein said plurality of sensors thereby provide data sufficient for said at-home user to be immersed in an experience of said data transmitted from said plurality of sensors forming said ad hoc network, and wherein said apparatus comprises a smart device carried by or associated with an on-the-go user located in a vicinity of said plurality of sensors forming said ad hoc network. 14. (canceled) 15. A method, comprising:
receiving data from an ad hoc network comprising a plurality of sensors located at a first location, each said sensor providing information of a location and sensing directivity, aid ad hoc network comprising a localized, decentralized network wherein each participating sensor has an equal status on said network for performing network functions and is free to associate with any other ad hoc network device in a link range; receiving a desired location and viewing perspective of an at-home user's device relative to said first location, the at-home user being at a second location different from the first location, the desired location and viewing perspective being defined by inputs received from an at-home user device to describe how the at-home user wishes to perceive the first location; preparing, using a processor, said received data in accordance with said desired location and viewing perspective; and presenting said prepared data to said at-home user's device, such that an at-home user thereby is immersed in data from said first location in the desired location and viewing perspective desired by the at-home user, wherein said wireless ad hoc network is established and maintained by a transceiver on an on-the-go user device that transmits a pulse such that any sensor in said link range capable of recognizing said transmitted pulse is invited to join said wireless ad hoc network of sensors, and wherein said on-the-go user device comprises a processor-based device carried by or associated with an on-the-go user who is located at said first location. 16. The method of claim 15, wherein said preparing said received data comprises:
selecting which sensor data is appropriate for said at-home user's desired location and viewing perspective; and one or more of:
rendering any audio data to be consistent with said at-home user's desired location and viewing perspective;
converting resolution and any other appropriate parameters of video data from selected sensors into a common video format, if selected sensors are not uniform;
stitching together and/or merging video from selected sensors;
filling in any gaps of video data for said desired location and viewing perspective;
rendering the stitched/merged video;
providing a three-dimensional (3D) model of the selected sensor data; and
adapting data to be presented to said at-home user in accordance with outputs from a learning module that defines any special visual or auditory accommodations for said at-home user. 17. The method of claim 15, wherein said receiving said desired location and viewing perspective of an at-home user comprises at least one of:
receiving inputs from said at-home user via menu selections; receiving inputs from said at-home user via input devices on a device used by said at-home user for executing an at-home user session; and receiving data from sensors associated with said at home user device that automatically indicate changes in at least one of eye motion and body movements of said at-home user. 18. (canceled) 19. The method of claim 15, further comprising executing a learning feature that detects and accommodates special visual and/or auditory needs or preferences of the at-home user. 20. The method of claim 15, as implemented by a set of instructions stored in a non-transitory memory device on a device used by said at-home user for executing an at-home user session, wherein said set of instructions is one of:
previously stored as one of an app or application program in said non-transitory memory device on said at-home user device; downloaded from a network server into said non-transitory memory device on said at-home user device for purpose of a single session; and downloaded into said non-transitory memory device on said at-home user device for purpose of a single session, as part of a cloud service. 21. The method of claim 1, wherein said on-the-go user device and said at-home device are interconnected via an audio channel, thereby permitting a real-time conversation between the on-the-go user and the at-home user. 22. The method of claim 21, wherein said on-the-go user device and said at-home device comprise smart phones and the method is implemented by apps downloaded on the on-the-go user smart phone and on the at-home smart phone. 23. The method of claim 1, further comprising using historical footage from the remote location to fill in gaps of a teleported image. 24. The method of claim 1, further comprising
categorizing sensors at the first locution based on at least one of a resolution and a networking capability; detecting computationally gaps in an image from a viewer's perspective, and providing interpolation for the detected gaps. | 2,400 |
7,118 | 7,118 | 14,150,383 | 2,448 | A method of an event management system trapping changes using a server in an indoor positioning system with trap management to a plurality of devices each having a transponder within a location having a plurality of anchor nodes at fixed locations. | 1. A method of an event management system trapping changes using a server in an indoor positioning system with trap management to a plurality of devices within a location having a plurality of anchor nodes at fixed locations; each device having a transponder, the method comprising the steps of:
the server receiving instructions to scan a location to locate the plurality devices within a range; the server initiating the plurality of anchor nodes to perform a current scan of the location to actively locate the plurality of devices within the location; the server receiving current scan data regarding positions of the plurality of devices from the plurality of anchor nodes, wherein the position of each of the devices is measured from at least three different anchor nodes; the server storing the current scan data in a repository; the server comparing the current scan data to data stored in the repository from a previous scan to trap changes to the devices within the location; and if the current scan data is different from the data stored in the repository from a previous scan, indicating that a change is trapped, the server sending data regarding the trapped change to a configuration management database of an event management system. 2. The method of claim 1, wherein when the current scan data contains a device which is not in the data stored in the repository from a previous scan, the change is trapped as a new device. 3. The method of claim 1, wherein when the current scan data does not contain a device which is in the data stored in the repository from a previous scan, the change is trapped as a device missing. 4. The method of claim 1, wherein when coordinates for a device in the current scan data are different from coordinates for the same device in the data stored in the repository from a previous scan, the change is trapped as new coordinates. 5. The method of claim 1, further comprising the server establishing a baseline scan of the system by the steps of:
the server initiating the plurality of anchor nodes to perform a scan of the location to actively locate the plurality of devices within the location; the server receiving scan data regarding positions of the plurality of devices from the plurality of anchor nodes, wherein the position of each of the devices is measured from at least three different anchor nodes; the server storing the scan data in a repository as a baseline scan; sending data from the baseline scan regarding the positions of each of the devices to the configuration management database of the event management system. 6. The method of claim 1, further comprising the step of the event management system sending data to a security operations center regarding a change sent by the server. 7. The method of claim 1, further comprising the step of the event management system sending data to an IT service management ticketing and asset system regarding a change sent by the server. 8. The method of claim 1, further comprising the step of the event management system sending data to a network operations center regarding a change sent by the server. 9. The method of claim 1, further comprising the step of the event management system sending data to a billing system regarding a change sent by the server. 10. The method of claim 1, wherein the current scan data is stored in a repository as a log file. | A method of an event management system trapping changes using a server in an indoor positioning system with trap management to a plurality of devices each having a transponder within a location having a plurality of anchor nodes at fixed locations.1. A method of an event management system trapping changes using a server in an indoor positioning system with trap management to a plurality of devices within a location having a plurality of anchor nodes at fixed locations; each device having a transponder, the method comprising the steps of:
the server receiving instructions to scan a location to locate the plurality devices within a range; the server initiating the plurality of anchor nodes to perform a current scan of the location to actively locate the plurality of devices within the location; the server receiving current scan data regarding positions of the plurality of devices from the plurality of anchor nodes, wherein the position of each of the devices is measured from at least three different anchor nodes; the server storing the current scan data in a repository; the server comparing the current scan data to data stored in the repository from a previous scan to trap changes to the devices within the location; and if the current scan data is different from the data stored in the repository from a previous scan, indicating that a change is trapped, the server sending data regarding the trapped change to a configuration management database of an event management system. 2. The method of claim 1, wherein when the current scan data contains a device which is not in the data stored in the repository from a previous scan, the change is trapped as a new device. 3. The method of claim 1, wherein when the current scan data does not contain a device which is in the data stored in the repository from a previous scan, the change is trapped as a device missing. 4. The method of claim 1, wherein when coordinates for a device in the current scan data are different from coordinates for the same device in the data stored in the repository from a previous scan, the change is trapped as new coordinates. 5. The method of claim 1, further comprising the server establishing a baseline scan of the system by the steps of:
the server initiating the plurality of anchor nodes to perform a scan of the location to actively locate the plurality of devices within the location; the server receiving scan data regarding positions of the plurality of devices from the plurality of anchor nodes, wherein the position of each of the devices is measured from at least three different anchor nodes; the server storing the scan data in a repository as a baseline scan; sending data from the baseline scan regarding the positions of each of the devices to the configuration management database of the event management system. 6. The method of claim 1, further comprising the step of the event management system sending data to a security operations center regarding a change sent by the server. 7. The method of claim 1, further comprising the step of the event management system sending data to an IT service management ticketing and asset system regarding a change sent by the server. 8. The method of claim 1, further comprising the step of the event management system sending data to a network operations center regarding a change sent by the server. 9. The method of claim 1, further comprising the step of the event management system sending data to a billing system regarding a change sent by the server. 10. The method of claim 1, wherein the current scan data is stored in a repository as a log file. | 2,400 |
7,119 | 7,119 | 14,673,969 | 2,432 | An approach is provided for sending a non-visual challenge request to a wearable device worn by a user. A non-visual challenge response is received from the wearable device, such as by the user moving the wearable device. The non-visual challenge response is compared to an expected response. The system allows usage of a resource by the user of the wearable device in response to the comparison revealing that the non-visual challenge response matches the expected response. | 1. A method comprising:
sending a non-visual challenge request to a wearable device, wherein the request is a pattern of one or more vibrations that the wearable device creates that are felt by a user of the wearable device, wherein the pattern is selected from a plurality of available patterns with each pattern corresponding to a different one of a plurality of expected responses with the selected pattern corresponding to a selected expected response from the plurality of expected responses; receiving a non-visual challenge response from the wearable device based on a movement detected at the wearable device; comparing the non-visual challenge response to the selected expected response; and allowing usage of a resource by the user of the wearable device in response to the comparison revealing that the non-visual challenge response matches the selected expected response. 2. The method of claim 1 further comprising:
receiving a wearable-device identifier from the wearable device;
comparing the wearable-device identifier with a registered wearable-device identifier; and
inhibiting usage of the resource in response to the wearable-device identifier failing to match the registered wearable device identifier. 3. The method of claim 1 further comprising:
setting a timer in conjunction with the sending of the non-visual challenge request; and
inhibiting usage of the resource in response to the timer expiring before the reception of the non-visual challenge response. 4. (canceled) 5. The method of claim 1 wherein the non-visual challenge response is a pattern of one or more movements of the wearable device by the user. 6. The method of claim 1 further comprising:
prior to sending the non-visual challenge request:
selecting the non-visual challenge request from a plurality of non-visual challenge requests;
receiving the expected response to the selected non-visual challenge request from the wearable device, wherein the expected response is a result of movement of the wearable device by the user; and
associating the non-visual challenge request with the expected response. 7. The method of claim 6 further comprising:
prior to sending the non-visual challenge request:
receiving a wearable device identifier corresponding to the wearable device; and
associating the received wearable device identifier with the user. 8. An information handling system comprising:
one or more processors; a memory coupled to at least one of the processors; a communications adapter that sends and receives communications to and from wearable devices; and a set of instructions stored in the memory and executed by at least one of the processors to:
send a non-visual challenge request to a wearable device, wherein the request is a pattern of one or more vibrations that the wearable device creates that are felt by a user of the wearable device, wherein the pattern is selected from a plurality of available patterns with each pattern corresponding to a different one of a plurality of expected responses with the selected pattern corresponding to a selected expected response from the plurality of expected responses;
receive a non-visual challenge response from the wearable device based on a movement detected at the wearable device;
compare the non-visual challenge response to the selected expected response; and
allow usage of a resource by the user of the wearable device in response to the comparison revealing that the non-visual challenge response matches the selected expected response. 9. The information handling system of claim 8 wherein the set of instructions further comprise further instructions executed by at least one of the processors to:
receive a wearable-device identifier from the wearable device;
compare the wearable-device identifier with a registered wearable-device identifier; and
inhibit usage of the resource in response to the wearable-device identifier failing to match the registered wearable device identifier. 10. The information handling system of claim 8 wherein the set of instructions further comprise further instructions executed by at least one of the processors to:
set a timer in conjunction with the sending of the non-visual challenge request; and
inhibit usage of the resource in response to the timer expiring before the reception of the non-visual challenge response. 11. (canceled) 12. The information handling system of claim 8 wherein the non-visual challenge response is a pattern of one or more movements of the wearable device by the user. 13. The information handling system of claim 8 wherein the set of instructions further comprise further instructions executed by at least one of the processors to:
prior to the send of the non-visual challenge request:
select the non-visual challenge request from a plurality of non-visual challenge requests;
receive the expected response to the selected non-visual challenge request from the wearable device, wherein the expected response is a result of movement of the wearable device by the user; and
associate the non-visual challenge request with the expected response. 14. The information handling system of claim 13 wherein the set of instructions further comprise further instructions executed by at least one of the processors to:
prior to the send of the non-visual challenge request:
receive a wearable device identifier corresponding to the wearable device; and
associate the received wearable device identifier with the user. 15. A computer program product comprising:
a computer readable storage medium comprising a set of computer instructions, the computer instructions effective to:
send a non-visual challenge request to a wearable device, wherein the request is a pattern of one or more vibrations that the wearable device creates that are felt by a user of the wearable device, wherein the pattern is selected from a plurality of available patterns with each pattern corresponding to a different one of a plurality of expected responses with the selected pattern corresponding to a selected expected response from the plurality of expected responses;
receive a non-visual challenge response from the wearable device based on a movement detected at the wearable device;
compare the non-visual challenge response to the selected expected response; and
allow usage of a resource by the user of the wearable device in response to the comparison revealing that the non-visual challenge response matches the selected expected response. 16. The computer program product of claim 15 wherein the set of instructions further comprise instructions effective to:
receive a wearable-device identifier from the wearable device;
compare the wearable-device identifier with a registered wearable-device identifier; and
inhibit usage of the resource in response to the wearable-device identifier failing to match the registered wearable device identifier. 17. The computer program product of claim 15 wherein the set of instructions further comprise instructions effective to:
set a timer in conjunction with the sending of the non-visual challenge request; and
inhibit usage of the resource in response to the timer expiring before the reception of the non-visual challenge response. 18. (canceled) 19. The computer program product of claim 15 wherein the non-visual challenge response is a pattern of one or more movements of the wearable device by the user. 20. The computer program product of claim 15 wherein the set of instructions further comprise instructions effective to:
prior to the send of the non-visual challenge request:
receive a wearable device identifier corresponding to the wearable device;
associate the received wearable device identifier with the user;
select the non-visual challenge request from a plurality of non-visual challenge requests;
receive the expected response to the selected non-visual challenge request from the wearable device, wherein the expected response is a result of movement of the wearable device by the user; and
associate the non-visual challenge request with the expected response. | An approach is provided for sending a non-visual challenge request to a wearable device worn by a user. A non-visual challenge response is received from the wearable device, such as by the user moving the wearable device. The non-visual challenge response is compared to an expected response. The system allows usage of a resource by the user of the wearable device in response to the comparison revealing that the non-visual challenge response matches the expected response.1. A method comprising:
sending a non-visual challenge request to a wearable device, wherein the request is a pattern of one or more vibrations that the wearable device creates that are felt by a user of the wearable device, wherein the pattern is selected from a plurality of available patterns with each pattern corresponding to a different one of a plurality of expected responses with the selected pattern corresponding to a selected expected response from the plurality of expected responses; receiving a non-visual challenge response from the wearable device based on a movement detected at the wearable device; comparing the non-visual challenge response to the selected expected response; and allowing usage of a resource by the user of the wearable device in response to the comparison revealing that the non-visual challenge response matches the selected expected response. 2. The method of claim 1 further comprising:
receiving a wearable-device identifier from the wearable device;
comparing the wearable-device identifier with a registered wearable-device identifier; and
inhibiting usage of the resource in response to the wearable-device identifier failing to match the registered wearable device identifier. 3. The method of claim 1 further comprising:
setting a timer in conjunction with the sending of the non-visual challenge request; and
inhibiting usage of the resource in response to the timer expiring before the reception of the non-visual challenge response. 4. (canceled) 5. The method of claim 1 wherein the non-visual challenge response is a pattern of one or more movements of the wearable device by the user. 6. The method of claim 1 further comprising:
prior to sending the non-visual challenge request:
selecting the non-visual challenge request from a plurality of non-visual challenge requests;
receiving the expected response to the selected non-visual challenge request from the wearable device, wherein the expected response is a result of movement of the wearable device by the user; and
associating the non-visual challenge request with the expected response. 7. The method of claim 6 further comprising:
prior to sending the non-visual challenge request:
receiving a wearable device identifier corresponding to the wearable device; and
associating the received wearable device identifier with the user. 8. An information handling system comprising:
one or more processors; a memory coupled to at least one of the processors; a communications adapter that sends and receives communications to and from wearable devices; and a set of instructions stored in the memory and executed by at least one of the processors to:
send a non-visual challenge request to a wearable device, wherein the request is a pattern of one or more vibrations that the wearable device creates that are felt by a user of the wearable device, wherein the pattern is selected from a plurality of available patterns with each pattern corresponding to a different one of a plurality of expected responses with the selected pattern corresponding to a selected expected response from the plurality of expected responses;
receive a non-visual challenge response from the wearable device based on a movement detected at the wearable device;
compare the non-visual challenge response to the selected expected response; and
allow usage of a resource by the user of the wearable device in response to the comparison revealing that the non-visual challenge response matches the selected expected response. 9. The information handling system of claim 8 wherein the set of instructions further comprise further instructions executed by at least one of the processors to:
receive a wearable-device identifier from the wearable device;
compare the wearable-device identifier with a registered wearable-device identifier; and
inhibit usage of the resource in response to the wearable-device identifier failing to match the registered wearable device identifier. 10. The information handling system of claim 8 wherein the set of instructions further comprise further instructions executed by at least one of the processors to:
set a timer in conjunction with the sending of the non-visual challenge request; and
inhibit usage of the resource in response to the timer expiring before the reception of the non-visual challenge response. 11. (canceled) 12. The information handling system of claim 8 wherein the non-visual challenge response is a pattern of one or more movements of the wearable device by the user. 13. The information handling system of claim 8 wherein the set of instructions further comprise further instructions executed by at least one of the processors to:
prior to the send of the non-visual challenge request:
select the non-visual challenge request from a plurality of non-visual challenge requests;
receive the expected response to the selected non-visual challenge request from the wearable device, wherein the expected response is a result of movement of the wearable device by the user; and
associate the non-visual challenge request with the expected response. 14. The information handling system of claim 13 wherein the set of instructions further comprise further instructions executed by at least one of the processors to:
prior to the send of the non-visual challenge request:
receive a wearable device identifier corresponding to the wearable device; and
associate the received wearable device identifier with the user. 15. A computer program product comprising:
a computer readable storage medium comprising a set of computer instructions, the computer instructions effective to:
send a non-visual challenge request to a wearable device, wherein the request is a pattern of one or more vibrations that the wearable device creates that are felt by a user of the wearable device, wherein the pattern is selected from a plurality of available patterns with each pattern corresponding to a different one of a plurality of expected responses with the selected pattern corresponding to a selected expected response from the plurality of expected responses;
receive a non-visual challenge response from the wearable device based on a movement detected at the wearable device;
compare the non-visual challenge response to the selected expected response; and
allow usage of a resource by the user of the wearable device in response to the comparison revealing that the non-visual challenge response matches the selected expected response. 16. The computer program product of claim 15 wherein the set of instructions further comprise instructions effective to:
receive a wearable-device identifier from the wearable device;
compare the wearable-device identifier with a registered wearable-device identifier; and
inhibit usage of the resource in response to the wearable-device identifier failing to match the registered wearable device identifier. 17. The computer program product of claim 15 wherein the set of instructions further comprise instructions effective to:
set a timer in conjunction with the sending of the non-visual challenge request; and
inhibit usage of the resource in response to the timer expiring before the reception of the non-visual challenge response. 18. (canceled) 19. The computer program product of claim 15 wherein the non-visual challenge response is a pattern of one or more movements of the wearable device by the user. 20. The computer program product of claim 15 wherein the set of instructions further comprise instructions effective to:
prior to the send of the non-visual challenge request:
receive a wearable device identifier corresponding to the wearable device;
associate the received wearable device identifier with the user;
select the non-visual challenge request from a plurality of non-visual challenge requests;
receive the expected response to the selected non-visual challenge request from the wearable device, wherein the expected response is a result of movement of the wearable device by the user; and
associate the non-visual challenge request with the expected response. | 2,400 |
7,120 | 7,120 | 13,962,579 | 2,491 | A system and computer-implemented method for providing decentralized access to records. The method is performed on at least one computer system including at least one processor. The method includes the steps of: generating at least one reference for at least one record stored on a source system, the at least one reference comprising authorization information and a pointer to the at least one record; receiving, at the source system from a client system, a request to retrieve the at least one record from the source system, the request initiated using the at least one reference and including at least a portion of the at least one reference; authenticating or authorizing at least one of the client system and a user of the client system; and transmitting the at least one record from the source system to the client system. | 1. A computer-implemented method for providing decentralized access to records, the method performed on at least one computer system including at least one processor, the method comprising:
generating at least one reference for at least one record stored on a source system, the at least one reference comprising authorization information and a pointer to the at least one record; receiving, at the source system from a client system, a request to retrieve the at least one record from the source system, the request initiated using the at least one reference and including at least a portion of the at least one reference; authenticating or authorizing at least one of the client system and a user of the client system; and transmitting the at least one record from the source system to the client system. 2. The computer-implemented method of claim 1, wherein the at least one reference is generated at a first medical facility, and wherein the client system comprises a second medical facility or a patient portal. 3. The computer-implemented method of claim 1, wherein the source system authenticates the at least one of the client system and the user of the client system based at least partially by determining if the user of the client system is in possession of the at least one reference and at least one of the following: a key, an identifier, a PIN, or any combination thereof. 4. The computer-implemented method of claim 1, further comprising assigning, by the source system, an authorization level based at least partially on data received from the client system. 5. The computer-implemented method of claim 1, further comprising tracking, in a data structure at the source system, entities that access the at least one record with the at least one reference. 6. The computer-implemented method of claim 1, wherein at least a portion of the at least one reference comprises a token, and wherein a remaining portion of the at least one reference must be completed with the token at the client system. 7. The computer-implemented method of claim 1, wherein the at least one of the client system and the user of the client system is authenticated or authorized based at least partially on a secret comprising at least one of the following: a PIN, a passphrase, a unique key, or any combination thereof, and wherein the secret is stored at the source system. 8. The computer-implemented method of claim 1, wherein the at least one reference comprises at least one indirect reference, such that the at least one reference indirectly points to the at least one record by pointing to at least one other record, the at least one other record comprising at least one other reference pointing to the at least one record. 9. The computer-implemented method of claim 1, further comprising storing the at least one reference on a portable data storage device or printed medium. 10. The computer-implemented method of claim 1, further comprising storing the at least one reference on a network-accessible service. 11. The computer-implemented method of claim 1, further comprising storing the at least one reference in a central index, wherein the central index is configured to be accessible only to a plurality of authorized client systems. 12. The computer-implemented method of claim 1, further comprising providing an online system configured to facilitate a patient to transmit the at least one reference to a healthcare professional or to approve the healthcare professional as an authorized recipient of the at least one reference or a copy of the at least one reference. 13. The computer-implemented method of claim 1, further comprising storing the at least one reference in an indirect record that comprises a plurality of references pointing to a plurality of other records comprising the at least one record, wherein an indirect reference comprises a pointer to the indirect record. 14. The computer-implemented method of claim 13, wherein the indirect reference comprises a URL and is at least one of the following: printed on a tangible data carrier, stored on a data storage device, stored on a network-accessible service, stored on a printed medium, encoded as a one-dimensional barcode, encoded as a two-dimensional barcode, or any combination thereof. 15. The computer-implemented method of claim 1, further comprising providing an online system configured to facilitate a patient to view the at least one record, or to allow specified entities to view at least a portion of the at least one record. 16. The computer-implemented method of claim 1, further comprising transmitting the at least one reference directly to at least one of a healthcare facility and a healthcare professional. 17. The computer-implemented method of claim 1, further comprising:
storing the at least one reference in a temporary index; and automatically deleting the at least one reference from the temporary index after the client system or user of the client system has retrieved or obtained the at least one reference. 18. The computer-implemented method of claim 1, wherein the at least one reference is generated in a patient portal, and wherein the client system comprises a second medical facility. 19. A computer-implemented method for providing decentralized access to records, the method performed on at least one computer system including at least one processor, the method comprising:
generating at least one reference for at least one record stored on a source system, the at least one reference comprising authorization information and a pointer to the at least one record; receiving, at the source system from the client system, a request to retrieve or copy the at least one record from the source system, the request initiated by the client system or a user of the client system using the at least one reference; recording, in at least one data structure at the source system, an association between the at least one reference and at least one of an identifier and a key, wherein the at least one of the identifier and the key uniquely identifies the client system or the user of the client system, such that only at least one of the client system and the user of the client system is permitted to retrieve the at least one record or copy the at least one reference after the association is recorded, wherein the association is recorded before, after, or at the time of receiving the request; determining if the client system or user of the client system is authorized to retrieve the at least one record or copy the at least one reference; and transmitting, from the source system to the client system, at least one of the at least one record and a new reference that points to the at least one record if it is determined that the client system or user of the client system is authorized to retrieve the at least one record or copy the at least one reference. 20. The computer-implemented method of claim 19, wherein the at least one of an identifier or a key comprises a public key corresponding to the client system or the user of the client system. 21. The computer-implemented method of claim 20, wherein the public key corresponding to the client system is stored in a portable device configured for storage and computation. 22. The computer-implemented method of claim 19, further comprising:
preventing the client system from making a valid copy of the at least one reference or creating a new reference pointing to the at least one record if the at least one reference is not associated, in the at least one data structure, with the identifier or the key. 23. The computer-implemented method of claim 19, wherein the association is recorded after receiving the request, and wherein the request is a first time that the at least one reference is used by the client system or the user of the client system. 24. The computer-implemented method of claim 19, further comprising: controlling, by the source system, use of the at least one reference based at least partially on at least one policy stored by the source system and at least partially encoded in the at least one reference. 25. The computer-implemented method of claim 19, further comprising preventing the client system or the user of the client system from retrieving the at least one record or copying the at least one reference before the association is recorded in the at least one data structure. 26. The computer-implemented method of claim 19, wherein determining if the client system or user of the client system is authorized to retrieve the at least one record or copy the at least one reference comprises determining if the client system or the user of the client system is on a blacklist, and wherein the client system or the user is determined to be authorized only if not on the blacklist. 27. The computer-implemented method of claim 19, wherein determining if the client system or user of the client system is authorized to retrieve the at least one record or copy the at least one reference comprises determining if the client system or the user of the client system is on a whitelist, the whitelist comprising a plurality of authorized client systems or users of client systems. 28. The computer-implemented method of claim 19, wherein the client system is prevented from copying the at least one reference or a copy of the at least one reference. 29. The computer-implemented method of claim 19, wherein the association is registered only if the client system or the user of the client system establishes that it possesses a secret corresponding to the at least one reference, wherein the secret is stored by the source system when the at least one reference is generated. 30. The computer-implemented method of claim 19, further comprising storing the at least one reference on a portable data storage device. 31. The computer-implemented method of claim 19, further comprising:
storing the at least one reference in a temporary index system prior to the association being registered in the at least one data structure; and automatically deleting the at least one reference from the temporary index after the at least one reference has been retrieved by the client system or the user of the client system. 32. The computer-implemented method of claim 31, further comprising: a workflow management system that contains at least one temporary index, the workflow management system configured to receive a plurality of bids from a plurality of authorized client systems including the at least one client system, the plurality of bids comprising a plurality of requests to retrieve the at least one record from the temporary index, the plurality of requests comprising the request, wherein a winning client system is selected from the plurality of client systems based at least partially on the plurality of bids. 33. The computer-implemented method of claim 19 wherein the at least one reference is governed by at least one policy in the source system, and wherein the at least one policy indicates at least one of the following: the at least one reference may be copied, the at least one reference may be used to retrieve the at least one record, the at least one reference may not be copied, the at least one reference may not be used to retrieve the at least one record, or any combination thereof. 34. The computer-implemented method of claim 33, wherein the at least one reference is stored on a portable device, using which a plurality of healthcare facilities visited by a patient in possession of the portable device may obtain or request a copy of the at least one reference. 35. The computer-implemented method of claim 33, wherein the at least one reference is stored in a patient-managed index or in a central index accessible by a plurality of healthcare facilities, wherein the patient-managed index or the central index is associated with the at least one reference, and wherein the patient-managed index or the central index is configured to facilitate copying the at least one reference for authorized client systems or authorized users. 36. A system for providing decentralized access to records, comprising:
at least one source system comprising at least one processor, the at least one source system in communication with at least one data storage device, the at least one source system configured to:
generate at least one reference for the at least one record stored on at least one data storage device, the at least one reference comprising authorization information and a pointer to or unique identifier for the at least one record;
receive, from a client system, a request to retrieve the at least one record, the request initiated using the at least one reference and including at least a portion of the at least one reference;
authenticating or authorizing at least one of the client system and a user of the client system; and
transmitting the at least one record to the client system. 37. The system of claim 36, wherein at least a portion of the at least one record is encrypted. 38. The system of claim 36, further comprising a secure device comprising an interior and an exterior, the interior comprising the at least one source system. 39. The system of claim 36, further comprising a secure device comprising an interior and an exterior, the interior comprising a client system. 40. The system of claim 38, further comprising at least one data structure, wherein the at least one source system is further configured to:
generate at least one encryption/decryption key; encrypt the at least one record prior to storing the at least one record on an insecure storage system; and store the at least one encryption/decryption key in the data structure. 41. The system of claim 38, wherein the at least one source system is configured to store, in an external data storage device, at least one of authentication, encryption and decryption keys, or a master key with which said keys can be stored externally in encrypted format to allow for decryption by the master key, such that the at least one source system allows for a secure way to recover said master, authorization, encryption or decryption keys in case of failure and the need for replacement or recovery of the system. 42. The system of claim 36, further comprising a data carrier comprising the at least one reference, the data carrier comprising at least one of the following: a printed substrate, a magnetic card, a smartcard, a mobile device, a USB drive, a portable memory device, or any combination thereof. 43. A system for providing decentralized access to records, comprising:
at least one data storage device comprising at least one record, wherein at least a portion of the at least one record is encrypted; at least one source system comprising at least one processor, the at least one source system in communication with the at least one data storage device, the at least one source system configured to:
generate at least one reference for the at least one record stored on the at least one data storage device, the at least one reference comprising: (i) at least one of a pointer to a key and a unique identifier of the key, wherein the key is adapted to decrypt the at least one record, and (ii) at least one of a pointer to the at least one record and an identifier of the at least one record;
receive, from a client system, a request to retrieve at least one of the key adapted to decrypt the at least one record or a data structure containing at least one of the key or an identifier of the key adapted to decrypt the at least one record, the request initiated using the at least one reference;
transmit, to the client system, the key adapted to decrypt the at least one record or the data structure containing at least one of the key or an identifier of the key adapted to decrypt the at least one record, such that the client system is enabled to retrieve the at least one record from the at least one data storage device and decrypt the at least one record with the key or with the key obtained by the client from a separate service, using the identifier of the key. | A system and computer-implemented method for providing decentralized access to records. The method is performed on at least one computer system including at least one processor. The method includes the steps of: generating at least one reference for at least one record stored on a source system, the at least one reference comprising authorization information and a pointer to the at least one record; receiving, at the source system from a client system, a request to retrieve the at least one record from the source system, the request initiated using the at least one reference and including at least a portion of the at least one reference; authenticating or authorizing at least one of the client system and a user of the client system; and transmitting the at least one record from the source system to the client system.1. A computer-implemented method for providing decentralized access to records, the method performed on at least one computer system including at least one processor, the method comprising:
generating at least one reference for at least one record stored on a source system, the at least one reference comprising authorization information and a pointer to the at least one record; receiving, at the source system from a client system, a request to retrieve the at least one record from the source system, the request initiated using the at least one reference and including at least a portion of the at least one reference; authenticating or authorizing at least one of the client system and a user of the client system; and transmitting the at least one record from the source system to the client system. 2. The computer-implemented method of claim 1, wherein the at least one reference is generated at a first medical facility, and wherein the client system comprises a second medical facility or a patient portal. 3. The computer-implemented method of claim 1, wherein the source system authenticates the at least one of the client system and the user of the client system based at least partially by determining if the user of the client system is in possession of the at least one reference and at least one of the following: a key, an identifier, a PIN, or any combination thereof. 4. The computer-implemented method of claim 1, further comprising assigning, by the source system, an authorization level based at least partially on data received from the client system. 5. The computer-implemented method of claim 1, further comprising tracking, in a data structure at the source system, entities that access the at least one record with the at least one reference. 6. The computer-implemented method of claim 1, wherein at least a portion of the at least one reference comprises a token, and wherein a remaining portion of the at least one reference must be completed with the token at the client system. 7. The computer-implemented method of claim 1, wherein the at least one of the client system and the user of the client system is authenticated or authorized based at least partially on a secret comprising at least one of the following: a PIN, a passphrase, a unique key, or any combination thereof, and wherein the secret is stored at the source system. 8. The computer-implemented method of claim 1, wherein the at least one reference comprises at least one indirect reference, such that the at least one reference indirectly points to the at least one record by pointing to at least one other record, the at least one other record comprising at least one other reference pointing to the at least one record. 9. The computer-implemented method of claim 1, further comprising storing the at least one reference on a portable data storage device or printed medium. 10. The computer-implemented method of claim 1, further comprising storing the at least one reference on a network-accessible service. 11. The computer-implemented method of claim 1, further comprising storing the at least one reference in a central index, wherein the central index is configured to be accessible only to a plurality of authorized client systems. 12. The computer-implemented method of claim 1, further comprising providing an online system configured to facilitate a patient to transmit the at least one reference to a healthcare professional or to approve the healthcare professional as an authorized recipient of the at least one reference or a copy of the at least one reference. 13. The computer-implemented method of claim 1, further comprising storing the at least one reference in an indirect record that comprises a plurality of references pointing to a plurality of other records comprising the at least one record, wherein an indirect reference comprises a pointer to the indirect record. 14. The computer-implemented method of claim 13, wherein the indirect reference comprises a URL and is at least one of the following: printed on a tangible data carrier, stored on a data storage device, stored on a network-accessible service, stored on a printed medium, encoded as a one-dimensional barcode, encoded as a two-dimensional barcode, or any combination thereof. 15. The computer-implemented method of claim 1, further comprising providing an online system configured to facilitate a patient to view the at least one record, or to allow specified entities to view at least a portion of the at least one record. 16. The computer-implemented method of claim 1, further comprising transmitting the at least one reference directly to at least one of a healthcare facility and a healthcare professional. 17. The computer-implemented method of claim 1, further comprising:
storing the at least one reference in a temporary index; and automatically deleting the at least one reference from the temporary index after the client system or user of the client system has retrieved or obtained the at least one reference. 18. The computer-implemented method of claim 1, wherein the at least one reference is generated in a patient portal, and wherein the client system comprises a second medical facility. 19. A computer-implemented method for providing decentralized access to records, the method performed on at least one computer system including at least one processor, the method comprising:
generating at least one reference for at least one record stored on a source system, the at least one reference comprising authorization information and a pointer to the at least one record; receiving, at the source system from the client system, a request to retrieve or copy the at least one record from the source system, the request initiated by the client system or a user of the client system using the at least one reference; recording, in at least one data structure at the source system, an association between the at least one reference and at least one of an identifier and a key, wherein the at least one of the identifier and the key uniquely identifies the client system or the user of the client system, such that only at least one of the client system and the user of the client system is permitted to retrieve the at least one record or copy the at least one reference after the association is recorded, wherein the association is recorded before, after, or at the time of receiving the request; determining if the client system or user of the client system is authorized to retrieve the at least one record or copy the at least one reference; and transmitting, from the source system to the client system, at least one of the at least one record and a new reference that points to the at least one record if it is determined that the client system or user of the client system is authorized to retrieve the at least one record or copy the at least one reference. 20. The computer-implemented method of claim 19, wherein the at least one of an identifier or a key comprises a public key corresponding to the client system or the user of the client system. 21. The computer-implemented method of claim 20, wherein the public key corresponding to the client system is stored in a portable device configured for storage and computation. 22. The computer-implemented method of claim 19, further comprising:
preventing the client system from making a valid copy of the at least one reference or creating a new reference pointing to the at least one record if the at least one reference is not associated, in the at least one data structure, with the identifier or the key. 23. The computer-implemented method of claim 19, wherein the association is recorded after receiving the request, and wherein the request is a first time that the at least one reference is used by the client system or the user of the client system. 24. The computer-implemented method of claim 19, further comprising: controlling, by the source system, use of the at least one reference based at least partially on at least one policy stored by the source system and at least partially encoded in the at least one reference. 25. The computer-implemented method of claim 19, further comprising preventing the client system or the user of the client system from retrieving the at least one record or copying the at least one reference before the association is recorded in the at least one data structure. 26. The computer-implemented method of claim 19, wherein determining if the client system or user of the client system is authorized to retrieve the at least one record or copy the at least one reference comprises determining if the client system or the user of the client system is on a blacklist, and wherein the client system or the user is determined to be authorized only if not on the blacklist. 27. The computer-implemented method of claim 19, wherein determining if the client system or user of the client system is authorized to retrieve the at least one record or copy the at least one reference comprises determining if the client system or the user of the client system is on a whitelist, the whitelist comprising a plurality of authorized client systems or users of client systems. 28. The computer-implemented method of claim 19, wherein the client system is prevented from copying the at least one reference or a copy of the at least one reference. 29. The computer-implemented method of claim 19, wherein the association is registered only if the client system or the user of the client system establishes that it possesses a secret corresponding to the at least one reference, wherein the secret is stored by the source system when the at least one reference is generated. 30. The computer-implemented method of claim 19, further comprising storing the at least one reference on a portable data storage device. 31. The computer-implemented method of claim 19, further comprising:
storing the at least one reference in a temporary index system prior to the association being registered in the at least one data structure; and automatically deleting the at least one reference from the temporary index after the at least one reference has been retrieved by the client system or the user of the client system. 32. The computer-implemented method of claim 31, further comprising: a workflow management system that contains at least one temporary index, the workflow management system configured to receive a plurality of bids from a plurality of authorized client systems including the at least one client system, the plurality of bids comprising a plurality of requests to retrieve the at least one record from the temporary index, the plurality of requests comprising the request, wherein a winning client system is selected from the plurality of client systems based at least partially on the plurality of bids. 33. The computer-implemented method of claim 19 wherein the at least one reference is governed by at least one policy in the source system, and wherein the at least one policy indicates at least one of the following: the at least one reference may be copied, the at least one reference may be used to retrieve the at least one record, the at least one reference may not be copied, the at least one reference may not be used to retrieve the at least one record, or any combination thereof. 34. The computer-implemented method of claim 33, wherein the at least one reference is stored on a portable device, using which a plurality of healthcare facilities visited by a patient in possession of the portable device may obtain or request a copy of the at least one reference. 35. The computer-implemented method of claim 33, wherein the at least one reference is stored in a patient-managed index or in a central index accessible by a plurality of healthcare facilities, wherein the patient-managed index or the central index is associated with the at least one reference, and wherein the patient-managed index or the central index is configured to facilitate copying the at least one reference for authorized client systems or authorized users. 36. A system for providing decentralized access to records, comprising:
at least one source system comprising at least one processor, the at least one source system in communication with at least one data storage device, the at least one source system configured to:
generate at least one reference for the at least one record stored on at least one data storage device, the at least one reference comprising authorization information and a pointer to or unique identifier for the at least one record;
receive, from a client system, a request to retrieve the at least one record, the request initiated using the at least one reference and including at least a portion of the at least one reference;
authenticating or authorizing at least one of the client system and a user of the client system; and
transmitting the at least one record to the client system. 37. The system of claim 36, wherein at least a portion of the at least one record is encrypted. 38. The system of claim 36, further comprising a secure device comprising an interior and an exterior, the interior comprising the at least one source system. 39. The system of claim 36, further comprising a secure device comprising an interior and an exterior, the interior comprising a client system. 40. The system of claim 38, further comprising at least one data structure, wherein the at least one source system is further configured to:
generate at least one encryption/decryption key; encrypt the at least one record prior to storing the at least one record on an insecure storage system; and store the at least one encryption/decryption key in the data structure. 41. The system of claim 38, wherein the at least one source system is configured to store, in an external data storage device, at least one of authentication, encryption and decryption keys, or a master key with which said keys can be stored externally in encrypted format to allow for decryption by the master key, such that the at least one source system allows for a secure way to recover said master, authorization, encryption or decryption keys in case of failure and the need for replacement or recovery of the system. 42. The system of claim 36, further comprising a data carrier comprising the at least one reference, the data carrier comprising at least one of the following: a printed substrate, a magnetic card, a smartcard, a mobile device, a USB drive, a portable memory device, or any combination thereof. 43. A system for providing decentralized access to records, comprising:
at least one data storage device comprising at least one record, wherein at least a portion of the at least one record is encrypted; at least one source system comprising at least one processor, the at least one source system in communication with the at least one data storage device, the at least one source system configured to:
generate at least one reference for the at least one record stored on the at least one data storage device, the at least one reference comprising: (i) at least one of a pointer to a key and a unique identifier of the key, wherein the key is adapted to decrypt the at least one record, and (ii) at least one of a pointer to the at least one record and an identifier of the at least one record;
receive, from a client system, a request to retrieve at least one of the key adapted to decrypt the at least one record or a data structure containing at least one of the key or an identifier of the key adapted to decrypt the at least one record, the request initiated using the at least one reference;
transmit, to the client system, the key adapted to decrypt the at least one record or the data structure containing at least one of the key or an identifier of the key adapted to decrypt the at least one record, such that the client system is enabled to retrieve the at least one record from the at least one data storage device and decrypt the at least one record with the key or with the key obtained by the client from a separate service, using the identifier of the key. | 2,400 |
7,121 | 7,121 | 13,411,048 | 2,448 | A system includes a server system interface arranged to receive, from a client application of one of a plurality of client computing devices, a communication that corresponds to a request to obtain or update a software application; and an application marketplace server system programmed to identify, in response to the communication, application files that include an application binary file that corresponds to the software application and one or more supplemental files associated with the software application, and to send information that relates to the application files to the client application in response to receiving the communication, and identify stored files on the computing device that correspond to the application files, determine particular ones of the application files to download based on the identified stored files and the information that relates to the application files sent from the application marketplace server system, and initiate download. | 1. A computer-implemented system for distributing application files to a computing device from an application marketplace, the system comprising:
a server system interface arranged to receive, from a client application of one of a plurality of client computing devices, a communication that corresponds to a request to obtain or update a software application for the one client computing device; and an application marketplace server system programmed to:
identify, in response to the communication, application files that include an application binary file that corresponds to the software application and one or more supplemental files associated with the software application, and to send information that relates to the application files to the client application in response to receiving the communication, and
identify stored files on the computing device that correspond to the application files, determine particular ones of the application files to download based on the identified stored files and the information that relates to the application files sent from the application marketplace server system, and initiate download of the particular ones of the application files. 2. The system of claim 1, wherein the client application comprises an application marketplace client that corresponds to the application marketplace server system and is programmed to download files for a plurality of different applications from the application marketplace server system. 3. The system of claim 2, wherein the information that relates to the application files comprises version information for each of the application files, and wherein the application marketplace client is programmed to compare the version information to respective versions of the stored files to determine whether to download particular ones of the application files. 4. The system of claim 3, wherein the client application is programmed to remove previous versions of the stored files from the computing device after downloading newer versions of the stored files. 5. The system of claim 1, wherein the application marketplace server system is programmed to limit the application binary file to a defined maximum size, and wherein an aggregate size of the particular ones of the application files exceeds the maximum size of the application binary file. 6. The system of claim 1, wherein the client application is programmed to identify the stored files by analyzing files stored in a directory on the computing device that corresponds to the software application. 7. The system of claim 1, wherein the application marketplace server system is programmed to generate a file signature for the application files based on analyzing portions of the application files, and wherein the client application is programmed to verify the file signature before initiating installation of the application files. 8. The system of claim 7, wherein the application marketplace server system is programmed to send, to the client application, information about the portions of the application files that were analyzed by the application marketplace server system, and the client application is programmed to verify the file signature by generating a verification signature for the application files based on analyzing the portions of the application files that were analyzed by the marketplace server system, and comparing the file signature to the verification signature. 9. The system of claim 1, wherein particular versions of the supplemental files associated with the software application are targeted to respective device groups, and wherein the application marketplace server system is programmed to identify the particular versions of the supplemental files for distribution to the computing device based on a determination of a particular device group to which the computing device belongs. 10. The system of claim 1, wherein the information that relates to the application files comprises size information for particular ones of the application files, and wherein the client application is programmed to display an indicator of progress of the download of the particular ones of the application files, the indicator showing a ratio of an amount downloaded to an aggregate size of the particular ones of the application files. 11. The system of claim 1, wherein the client application is programmed to initiate installation of the application files after the download of the particular ones of the application files is complete. 12. The system of claim 1, wherein the application marketplace server system is programmed to download files in response to verified requests from (a) an application marketplace application that that corresponds to the application marketplace server system and is programmed to download files for a plurality of different applications from the application marketplace server system; and (b) from particular applications requesting the downloaded files for their own use. 13. A computer-implemented method for determining application files for download to a computing device, the method comprising:
receiving, with an application marketplace client executing on a computing device, a request to obtain or update a software application that is associated with a plurality of application files and that is configured to execute on the computing device; receiving, with the application marketplace client and from an application marketplace server system that operates remotely from the computing device, information that relates to the application files; identifying stored files on the computing device that correspond to the application files; determining particular ones of the application files to download based on the identified stored files and the received information that relates to the application files; and initiating download of the determined particular ones of the application files. 14. The method of claim 13, further comprising identifying a failure by the application marketplace client to download one or more files, and instituting download of the one or more files from the marketplace server system by an application that is programmed to use the one or more files after the one or more files are downloaded. 15. The method of claim 13, wherein the information that relates to the application files comprises version information for particular ones of the application files, and wherein the method further comprises comparing the version information to respective versions of the stored files to determine whether to download particular ones of the application files. 16. The method of claim 15, further comprising automatically removing previous versions of the stored files from the computing device after downloading newer versions of the stored files. 17. The method of claim 13, further comprising identifying the stored files by analyzing files stored in a directory on the computing device that corresponds to the software application. 18. The method of claim 13, further comprising, before initiating installation of the application files, verifying a file signature generated by the application marketplace server system for the application files by analyzing portions of the application files. 19. The method of claim 18, further comprising
receiving, from the application marketplace server system, information about the portions of the application files that were analyzed by the application marketplace server system, and verifying the file signature by generating a verification signature for the application files based on analyzing the portions of the application files that were analyzed by the marketplace server system, and comparing the file signature to the verification signature. 20. The method of claim 13, wherein the information that relates to the application files comprises size information for each of the application files, and the method further comprises displaying an indicator of progress of the download of the particular ones of the application files, the indicator showing a ratio of an amount downloaded to an aggregate size of the particular ones of the application files. 21. A computer-implemented method for determining applications for download to a computing device from an application marketplace, the method comprising:
receiving, from an application marketplace client of one of a plurality of client computing devices, a communication that corresponds to a request to obtain or update a software application for the one client computing device; identifying, in response to the communication, application files that include an application binary file that corresponds to the software application and one or more supplemental files associated with the software application, and to send information that relates to the application files to the application marketplace client in response to receiving the communication, and initiating download of particular ones of the application files in response to an identification of stored files on the computing device that correspond to the application files, and determining the particular ones of the application files based on the identified stored files and the information that relates to the application files sent from the application marketplace server system. 22. The method of claim 21, further comprising limiting the application binary file to a defined maximum size, wherein an aggregate size of the particular ones of the application files exceeds the maximum size of the application binary file. 23. The method of claim 21, wherein particular versions of the supplemental files associated with the software application are targeted to respective device groups, and the method further comprises identifying the particular versions of the supplemental files for distribution to the computing device based on a determination of a particular device group to which the computing device belongs. | A system includes a server system interface arranged to receive, from a client application of one of a plurality of client computing devices, a communication that corresponds to a request to obtain or update a software application; and an application marketplace server system programmed to identify, in response to the communication, application files that include an application binary file that corresponds to the software application and one or more supplemental files associated with the software application, and to send information that relates to the application files to the client application in response to receiving the communication, and identify stored files on the computing device that correspond to the application files, determine particular ones of the application files to download based on the identified stored files and the information that relates to the application files sent from the application marketplace server system, and initiate download.1. A computer-implemented system for distributing application files to a computing device from an application marketplace, the system comprising:
a server system interface arranged to receive, from a client application of one of a plurality of client computing devices, a communication that corresponds to a request to obtain or update a software application for the one client computing device; and an application marketplace server system programmed to:
identify, in response to the communication, application files that include an application binary file that corresponds to the software application and one or more supplemental files associated with the software application, and to send information that relates to the application files to the client application in response to receiving the communication, and
identify stored files on the computing device that correspond to the application files, determine particular ones of the application files to download based on the identified stored files and the information that relates to the application files sent from the application marketplace server system, and initiate download of the particular ones of the application files. 2. The system of claim 1, wherein the client application comprises an application marketplace client that corresponds to the application marketplace server system and is programmed to download files for a plurality of different applications from the application marketplace server system. 3. The system of claim 2, wherein the information that relates to the application files comprises version information for each of the application files, and wherein the application marketplace client is programmed to compare the version information to respective versions of the stored files to determine whether to download particular ones of the application files. 4. The system of claim 3, wherein the client application is programmed to remove previous versions of the stored files from the computing device after downloading newer versions of the stored files. 5. The system of claim 1, wherein the application marketplace server system is programmed to limit the application binary file to a defined maximum size, and wherein an aggregate size of the particular ones of the application files exceeds the maximum size of the application binary file. 6. The system of claim 1, wherein the client application is programmed to identify the stored files by analyzing files stored in a directory on the computing device that corresponds to the software application. 7. The system of claim 1, wherein the application marketplace server system is programmed to generate a file signature for the application files based on analyzing portions of the application files, and wherein the client application is programmed to verify the file signature before initiating installation of the application files. 8. The system of claim 7, wherein the application marketplace server system is programmed to send, to the client application, information about the portions of the application files that were analyzed by the application marketplace server system, and the client application is programmed to verify the file signature by generating a verification signature for the application files based on analyzing the portions of the application files that were analyzed by the marketplace server system, and comparing the file signature to the verification signature. 9. The system of claim 1, wherein particular versions of the supplemental files associated with the software application are targeted to respective device groups, and wherein the application marketplace server system is programmed to identify the particular versions of the supplemental files for distribution to the computing device based on a determination of a particular device group to which the computing device belongs. 10. The system of claim 1, wherein the information that relates to the application files comprises size information for particular ones of the application files, and wherein the client application is programmed to display an indicator of progress of the download of the particular ones of the application files, the indicator showing a ratio of an amount downloaded to an aggregate size of the particular ones of the application files. 11. The system of claim 1, wherein the client application is programmed to initiate installation of the application files after the download of the particular ones of the application files is complete. 12. The system of claim 1, wherein the application marketplace server system is programmed to download files in response to verified requests from (a) an application marketplace application that that corresponds to the application marketplace server system and is programmed to download files for a plurality of different applications from the application marketplace server system; and (b) from particular applications requesting the downloaded files for their own use. 13. A computer-implemented method for determining application files for download to a computing device, the method comprising:
receiving, with an application marketplace client executing on a computing device, a request to obtain or update a software application that is associated with a plurality of application files and that is configured to execute on the computing device; receiving, with the application marketplace client and from an application marketplace server system that operates remotely from the computing device, information that relates to the application files; identifying stored files on the computing device that correspond to the application files; determining particular ones of the application files to download based on the identified stored files and the received information that relates to the application files; and initiating download of the determined particular ones of the application files. 14. The method of claim 13, further comprising identifying a failure by the application marketplace client to download one or more files, and instituting download of the one or more files from the marketplace server system by an application that is programmed to use the one or more files after the one or more files are downloaded. 15. The method of claim 13, wherein the information that relates to the application files comprises version information for particular ones of the application files, and wherein the method further comprises comparing the version information to respective versions of the stored files to determine whether to download particular ones of the application files. 16. The method of claim 15, further comprising automatically removing previous versions of the stored files from the computing device after downloading newer versions of the stored files. 17. The method of claim 13, further comprising identifying the stored files by analyzing files stored in a directory on the computing device that corresponds to the software application. 18. The method of claim 13, further comprising, before initiating installation of the application files, verifying a file signature generated by the application marketplace server system for the application files by analyzing portions of the application files. 19. The method of claim 18, further comprising
receiving, from the application marketplace server system, information about the portions of the application files that were analyzed by the application marketplace server system, and verifying the file signature by generating a verification signature for the application files based on analyzing the portions of the application files that were analyzed by the marketplace server system, and comparing the file signature to the verification signature. 20. The method of claim 13, wherein the information that relates to the application files comprises size information for each of the application files, and the method further comprises displaying an indicator of progress of the download of the particular ones of the application files, the indicator showing a ratio of an amount downloaded to an aggregate size of the particular ones of the application files. 21. A computer-implemented method for determining applications for download to a computing device from an application marketplace, the method comprising:
receiving, from an application marketplace client of one of a plurality of client computing devices, a communication that corresponds to a request to obtain or update a software application for the one client computing device; identifying, in response to the communication, application files that include an application binary file that corresponds to the software application and one or more supplemental files associated with the software application, and to send information that relates to the application files to the application marketplace client in response to receiving the communication, and initiating download of particular ones of the application files in response to an identification of stored files on the computing device that correspond to the application files, and determining the particular ones of the application files based on the identified stored files and the information that relates to the application files sent from the application marketplace server system. 22. The method of claim 21, further comprising limiting the application binary file to a defined maximum size, wherein an aggregate size of the particular ones of the application files exceeds the maximum size of the application binary file. 23. The method of claim 21, wherein particular versions of the supplemental files associated with the software application are targeted to respective device groups, and the method further comprises identifying the particular versions of the supplemental files for distribution to the computing device based on a determination of a particular device group to which the computing device belongs. | 2,400 |
7,122 | 7,122 | 13,678,593 | 2,423 | An encoder resource receives segments of content on one or more data feeds. The encoder resource receives and/or produces encoder control information specifying multiple different bit rate data streams on which to encode the segments of content. As specified by the encoder control information, in accordance with encoding rules, the encoder resource adaptively encodes the segments of content into a varying number of different bit rate data streams. Clients in a network environment initiate retrieval of the varying number of different bit rate data streams to playback content. | 1. A method comprising:
receiving segments of content from an inputted data stream; receiving encoder control information specifying multiple different bit rate data streams in which to encode the segments of content; and as specified by the encoder control information, adaptively encoding the segments of content into a varying number of different bit rate data streams available to subscribers. 2. The method as in claim 1, wherein adaptively encoding the segments of content includes:
encoding a first portion of the segments of content up to a first level of quality and corresponding bit rate; and encoding a second portion of the segments of content up to a second level of quality and corresponding bit rate, the second level of quality being higher than the first level of quality. 3. The method as in claim 1 further comprising:
as specified by the encoder control information, varying a number of bit rates of encoding segments of a scheduled program of streaming content received on the inputted data stream. 4. The method as in claim 1 further comprising:
varying bit rates of encoding the segments of content based at least in part on a time of day at which the segments of content are received on the inputted data stream. 5. The method as in claim 1 further comprising:
varying bit rates of encoding the segments of content based at least in part on an amount of bandwidth available on which to transmit the encoded segments of content. 6. The method as in claim 1 further comprising:
receiving the segments of content in the inputted data stream on a data feed, the inputted data stream including at least a portion of metadata; and
retrieving the encoder control information from the metadata in the inputted data stream. 7. The method as in claim 1 further comprising:
receiving the encoder control information from an out-of-band signal with respect to the inputted data stream on which the segments of content are received. 8. The method as in claim 1, wherein receiving the receiving segments of content includes receiving a first program of content and a second program of content on a data feed, the first program of content unrelated to the second program of content;
wherein the encoder control information specifies to encode the first program of content according to a first number of different bit rate data streams; and wherein the encoder control information specifies to encode the second program of content according to a second number of different bit rate data streams, the second number different than the first number. 9. The method as in claim 8 further comprising:
receiving the first program of content on the data feed followed by receiving the second program of content on the data feed; and
wherein adaptively encoding the segments of content into the varying number of different bit rate data streams includes: i) encoding the first program of content in accordance with the first number of data streams as specified by the encoder control information; and ii) encoding the second program of content in accordance with the second number of data streams as specified by the encoder control information. 10. The method as in claim 8 further comprising:
receiving segments of the first program of content interleaved amongst segments of the second program of content on the data feed; and
wherein adaptively encoding the segments of content into the varying number of different bit rate data streams includes: i) encoding the segments of the first program of content in accordance with the first number of data streams as specified by the encoder control information; and ii) encoding the segments of the second program of content in accordance with the second number of data streams as specified by the encoder control information. 11. The method as in claim 1 further comprising:
receiving first encoder control information, the first encoder control information indicating to configure a respective encoder to encode a first portion of the received segments of content in a first number of different bit rate data streams; and
in accordance with the first encoder control information, encoding the first portion of received segments of content into the first number of different bit rate data streams as specified by the first encoder control information;
receiving second encoder control information, the second encoder control information indicating to configure the respective encoder to encode a second portion of the received segments of content in a second number of different bit rate data streams; and
in accordance with the second encoder control information, encoding the second portion of received segments of content into the second number of different bit rate data streams as specified by the first encoder control information. 12. The method as in claim 1, wherein encoding the segments of content into a varying number of different bit rate data streams includes:
encoding a first segment of the content retrieved from the inputted data stream into a first number of different levels of quality as specified by the encoder control information; and encoding a second segment of the content retrieved from the inputted data stream into a second number of different levels of quality as specified by the encoder control information, the second number of different levels of quality being different than the first number of different levels of quality. 13. The method as in claim 1 further comprising:
producing content access information to indicate availability of the segments of content according to the varying number of bit rate data streams; and
distributing the content access information to at least one of the subscribers, the at least one subscriber selectively retrieving encoded segments of content from the varying number of bit rate data streams. 14. The method as in claim 1 further comprising:
analyzing the segments of content to determine bandwidth requirements to transmit the segments of content on different bit rate data streams;
encoding the segments of content in accordance with multiple different bit rates; and
dynamically adjusting a number of different bit rate data streams into which the segments of content are encoded based at least in part on the bandwidth requirements associated with the segments. 15. The method as in claim 1 further comprising:
in response to detecting that the bandwidth requirements to transmit at least one of the segments is above a threshold value, increasing the number of different bit rate data streams on which to encode the at least one segment. 16. The method as in claim 1, wherein the content received on the inputted data stream includes at least a first program of content and a second program of content, the method further comprising:
receiving classification information indicating classification types associated with the first program and the second program; and producing the encoder control information based on the classification types. 17. The method as in claim 1 further comprising:
receiving first classification information specifying a first class type into which a first program of content received on the inputted data stream falls;
receiving second classification information specifying a second class type into which a second program of content received on the inputted data stream falls;
mapping the first class type to a first set of data stream bit rates assigned to the first class type;
mapping the second class type to a second set of data stream bit rates assigned to the second class type;
generating the encoder control information to include first encoder control information and second encoder control information, the first encoder control information indicating to encode the first program of content at each of the bit rates as specified by the first set, the second encoder control information indicating to encode the second program of content at each of the bit rates as specified by the second set. 18. The method as in claim 1, wherein the inputted data stream is a linear channel including multiple programs of content, the method further comprising:
producing the encoder control information based on scheduling times and a classification type of the multiple programs on the linear channel. 19. The method as in claim 18 further comprising:
dynamically adjusting a number of different bit rate data streams into which the segments of content are encoded based at least in part on network bandwidth available to transmit segments of content encoded at different levels of quality. 20. The method as in claim 1 further comprising:
producing the encoder control information to eliminate encoding the segments of content on at least one of the multiple different bit rate data streams to free bandwidth in a network over which at least portions of the encoded data streams are transmitted. 21. A method comprising:
receiving original segments of content; determining a magnitude of complexity of each respective original segment of content, the segments specifying how to reproduce a rendition of the respective original segment on playback; and dynamically adjusting a number of different bit rate data streams into which the original segments of content are encoded based at least in part on the magnitude of the complexity of each of the respective original segments. 22. The method as in claim 21 further comprising:
receiving a first segment of the content;
in response to detecting that a magnitude of complexity of the first segment of content falls below a threshold value, encoding the first segment into a first set of multiple bit rate data streams;
receiving a second segment of the content; and
in response to detecting that a magnitude of complexity of the second segment of content is greater than a threshold value, encoding the second segment into a greater number of bit rate data streams than included in the first set. 23. The method as in claim 22, wherein the second set of multiple different bit rate data streams includes at least one higher level of quality of data stream that is not included in the first set. 24. The method as in claim 21 further comprising:
receiving a first segment of the content;
encoding the first segment onto a first set of multiple bit rate data streams;
receiving a second segment of the content, the second segment logically disposed in a sequence following the first segment;
in response to detecting that a magnitude of complexity of the second segment of content is less than a threshold value, encoding the second segment into a second set of data streams including fewer bit rate data streams than the first set. 25. The method as in claim 24, wherein the first set of multiple different bit rate data streams includes at least one higher level of quality of data stream than data streams included in the second set. 26. The method as in claim 21 further comprising:
producing content access information to indicate availability of the segments of content according to the varying number of bit rate data streams. 27. The method as in claim 21 further comprising:
receiving encoder control information indicating a range of multiple different bit rate data streams in which to potentially encode the segments of content; and
dynamically adjusting the number of different bit rate data streams to vary within the range as specified by the encoder control information depending on the magnitude of complexity of the original segments. 28. The method as in claim 21 further comprising:
in response to detecting that a particular segment of the content requires a transmission bandwidth below a particular threshold value, reducing the number of different bit rate data streams on which the particular segment is encoded. 29. A computer system comprising:
at least one processor device; and a hardware storage resource coupled to the at least one processor device, the hardware storage resource storing instructions that, when executed by the at least one processor device, cause the at least one processor device to perform the operations of: receiving segments of content from an inputted data stream; receiving encoder control information specifying multiple different bit rate data streams in which to encode the segments of content; and as specified by the encoder control information, adaptively encoding the segments of content into a varying number of different bit rate data streams available to subscribers. 30. The computer system as in claim 29, wherein adaptively encoding the segments of content includes:
encoding a first portion of the segments of content up to a first level of quality and corresponding bit rate; and encoding a second portion of the segments of content up to a second level of quality and corresponding bit rate, the second level of quality being higher than the first level of quality. 31. The computer system as in claim 29, wherein the at least one processor device further supports operations of:
as specified by the encoder control information, varying a number of bit rates of encoding segments of a scheduled program of streaming content received on the inputted data stream. 32. The computer system as in claim 29, wherein the at least one processor device further supports operations of:
varying bit rates of encoding the segments of content based at least in part on a time of day at which the segments of content are received on the inputted data stream. 33. The computer system as in claim 29, wherein the at least one processor device further supports operations of:
varying bit rates of encoding the segments of content based at least in part on an amount of bandwidth on which to transmit the encoded segments of content. 34. The computer system as in claim 29, wherein the at least one processor device further supports operations of:
receiving the segments of content in the inputted data stream on a data feed, the inputted data stream including at least a portion of metadata; and retrieving the encoder control information from the metadata in the inputted data stream. 35. The computer system as in claim 29, wherein the at least one processor device further supports operations of:
receiving the encoder control information from an out-of-band signal with respect to the inputted data stream on which the segments of content are received. 36. The computer system as in claim 29, wherein receiving the receiving segments of content includes receiving a first program of content and a second program of content on a data feed, the first program of content unrelated to the second program of content;
wherein the encoder control information specifies to encode the first program of content according to a first number of different bit rate data streams; and wherein the encoder control information specifies to encode the second program of content according to a second number of different bit rate data streams, the second number different than the first number. 37. The computer system as in claim 36, wherein the at least one processor device further supports operations of:
receiving the first program of content on the data feed followed by receiving the second program of content on the data feed; and wherein adaptively encoding the segments of content into the varying number of different bit rate data streams includes: i) encoding the first program of content in accordance with the first number of data streams as specified by the encoder control information; and ii) encoding the second program of content in accordance with the second number of data streams as specified by the encoder control information. 38. The computer system as in claim 36, wherein the at least one processor device further supports operations of:
receiving segments of the first program of content interleaved amongst segments of the second program of content on the data feed; and wherein adaptively encoding the segments of content into the varying number of different bit rate data streams includes: i) encoding the segments of the first program of content in accordance with the first number of data streams as specified by the encoder control information; and ii) encoding the segments of the second program of content in accordance with the second number of data streams as specified by the encoder control information. 39. The computer system as in claim 29, wherein the at least one processor device further supports operations of:
receiving first encoder control information, the first encoder control information indicating to configure a respective encoder to encode a first portion of the received segments of content in a first number of different bit rate data streams; and in accordance with the first encoder control information, encoding the first portion of received segments of content into the first number of different bit rate data streams as specified by the first encoder control information; receiving second encoder control information, the second encoder control information indicating to configure the respective encoder to encode a second portion of the received segments of content in a second number of different bit rate data streams; and in accordance with the second encoder control information, encoding the second portion of received segments of content into the second number of different bit rate data streams as specified by the first encoder control information. 40. The computer system as in claim 29, wherein encoding the segments of content into a varying number of different bit rate data streams includes:
encoding a first segment of the content retrieved from the inputted data stream into a first number of different levels of quality as specified by the encoder control information; and encoding a second segment of the content retrieved from the inputted data stream into a second number of different levels of quality as specified by the encoder control information, the second number of different levels of quality being different than the first number of different levels of quality. | An encoder resource receives segments of content on one or more data feeds. The encoder resource receives and/or produces encoder control information specifying multiple different bit rate data streams on which to encode the segments of content. As specified by the encoder control information, in accordance with encoding rules, the encoder resource adaptively encodes the segments of content into a varying number of different bit rate data streams. Clients in a network environment initiate retrieval of the varying number of different bit rate data streams to playback content.1. A method comprising:
receiving segments of content from an inputted data stream; receiving encoder control information specifying multiple different bit rate data streams in which to encode the segments of content; and as specified by the encoder control information, adaptively encoding the segments of content into a varying number of different bit rate data streams available to subscribers. 2. The method as in claim 1, wherein adaptively encoding the segments of content includes:
encoding a first portion of the segments of content up to a first level of quality and corresponding bit rate; and encoding a second portion of the segments of content up to a second level of quality and corresponding bit rate, the second level of quality being higher than the first level of quality. 3. The method as in claim 1 further comprising:
as specified by the encoder control information, varying a number of bit rates of encoding segments of a scheduled program of streaming content received on the inputted data stream. 4. The method as in claim 1 further comprising:
varying bit rates of encoding the segments of content based at least in part on a time of day at which the segments of content are received on the inputted data stream. 5. The method as in claim 1 further comprising:
varying bit rates of encoding the segments of content based at least in part on an amount of bandwidth available on which to transmit the encoded segments of content. 6. The method as in claim 1 further comprising:
receiving the segments of content in the inputted data stream on a data feed, the inputted data stream including at least a portion of metadata; and
retrieving the encoder control information from the metadata in the inputted data stream. 7. The method as in claim 1 further comprising:
receiving the encoder control information from an out-of-band signal with respect to the inputted data stream on which the segments of content are received. 8. The method as in claim 1, wherein receiving the receiving segments of content includes receiving a first program of content and a second program of content on a data feed, the first program of content unrelated to the second program of content;
wherein the encoder control information specifies to encode the first program of content according to a first number of different bit rate data streams; and wherein the encoder control information specifies to encode the second program of content according to a second number of different bit rate data streams, the second number different than the first number. 9. The method as in claim 8 further comprising:
receiving the first program of content on the data feed followed by receiving the second program of content on the data feed; and
wherein adaptively encoding the segments of content into the varying number of different bit rate data streams includes: i) encoding the first program of content in accordance with the first number of data streams as specified by the encoder control information; and ii) encoding the second program of content in accordance with the second number of data streams as specified by the encoder control information. 10. The method as in claim 8 further comprising:
receiving segments of the first program of content interleaved amongst segments of the second program of content on the data feed; and
wherein adaptively encoding the segments of content into the varying number of different bit rate data streams includes: i) encoding the segments of the first program of content in accordance with the first number of data streams as specified by the encoder control information; and ii) encoding the segments of the second program of content in accordance with the second number of data streams as specified by the encoder control information. 11. The method as in claim 1 further comprising:
receiving first encoder control information, the first encoder control information indicating to configure a respective encoder to encode a first portion of the received segments of content in a first number of different bit rate data streams; and
in accordance with the first encoder control information, encoding the first portion of received segments of content into the first number of different bit rate data streams as specified by the first encoder control information;
receiving second encoder control information, the second encoder control information indicating to configure the respective encoder to encode a second portion of the received segments of content in a second number of different bit rate data streams; and
in accordance with the second encoder control information, encoding the second portion of received segments of content into the second number of different bit rate data streams as specified by the first encoder control information. 12. The method as in claim 1, wherein encoding the segments of content into a varying number of different bit rate data streams includes:
encoding a first segment of the content retrieved from the inputted data stream into a first number of different levels of quality as specified by the encoder control information; and encoding a second segment of the content retrieved from the inputted data stream into a second number of different levels of quality as specified by the encoder control information, the second number of different levels of quality being different than the first number of different levels of quality. 13. The method as in claim 1 further comprising:
producing content access information to indicate availability of the segments of content according to the varying number of bit rate data streams; and
distributing the content access information to at least one of the subscribers, the at least one subscriber selectively retrieving encoded segments of content from the varying number of bit rate data streams. 14. The method as in claim 1 further comprising:
analyzing the segments of content to determine bandwidth requirements to transmit the segments of content on different bit rate data streams;
encoding the segments of content in accordance with multiple different bit rates; and
dynamically adjusting a number of different bit rate data streams into which the segments of content are encoded based at least in part on the bandwidth requirements associated with the segments. 15. The method as in claim 1 further comprising:
in response to detecting that the bandwidth requirements to transmit at least one of the segments is above a threshold value, increasing the number of different bit rate data streams on which to encode the at least one segment. 16. The method as in claim 1, wherein the content received on the inputted data stream includes at least a first program of content and a second program of content, the method further comprising:
receiving classification information indicating classification types associated with the first program and the second program; and producing the encoder control information based on the classification types. 17. The method as in claim 1 further comprising:
receiving first classification information specifying a first class type into which a first program of content received on the inputted data stream falls;
receiving second classification information specifying a second class type into which a second program of content received on the inputted data stream falls;
mapping the first class type to a first set of data stream bit rates assigned to the first class type;
mapping the second class type to a second set of data stream bit rates assigned to the second class type;
generating the encoder control information to include first encoder control information and second encoder control information, the first encoder control information indicating to encode the first program of content at each of the bit rates as specified by the first set, the second encoder control information indicating to encode the second program of content at each of the bit rates as specified by the second set. 18. The method as in claim 1, wherein the inputted data stream is a linear channel including multiple programs of content, the method further comprising:
producing the encoder control information based on scheduling times and a classification type of the multiple programs on the linear channel. 19. The method as in claim 18 further comprising:
dynamically adjusting a number of different bit rate data streams into which the segments of content are encoded based at least in part on network bandwidth available to transmit segments of content encoded at different levels of quality. 20. The method as in claim 1 further comprising:
producing the encoder control information to eliminate encoding the segments of content on at least one of the multiple different bit rate data streams to free bandwidth in a network over which at least portions of the encoded data streams are transmitted. 21. A method comprising:
receiving original segments of content; determining a magnitude of complexity of each respective original segment of content, the segments specifying how to reproduce a rendition of the respective original segment on playback; and dynamically adjusting a number of different bit rate data streams into which the original segments of content are encoded based at least in part on the magnitude of the complexity of each of the respective original segments. 22. The method as in claim 21 further comprising:
receiving a first segment of the content;
in response to detecting that a magnitude of complexity of the first segment of content falls below a threshold value, encoding the first segment into a first set of multiple bit rate data streams;
receiving a second segment of the content; and
in response to detecting that a magnitude of complexity of the second segment of content is greater than a threshold value, encoding the second segment into a greater number of bit rate data streams than included in the first set. 23. The method as in claim 22, wherein the second set of multiple different bit rate data streams includes at least one higher level of quality of data stream that is not included in the first set. 24. The method as in claim 21 further comprising:
receiving a first segment of the content;
encoding the first segment onto a first set of multiple bit rate data streams;
receiving a second segment of the content, the second segment logically disposed in a sequence following the first segment;
in response to detecting that a magnitude of complexity of the second segment of content is less than a threshold value, encoding the second segment into a second set of data streams including fewer bit rate data streams than the first set. 25. The method as in claim 24, wherein the first set of multiple different bit rate data streams includes at least one higher level of quality of data stream than data streams included in the second set. 26. The method as in claim 21 further comprising:
producing content access information to indicate availability of the segments of content according to the varying number of bit rate data streams. 27. The method as in claim 21 further comprising:
receiving encoder control information indicating a range of multiple different bit rate data streams in which to potentially encode the segments of content; and
dynamically adjusting the number of different bit rate data streams to vary within the range as specified by the encoder control information depending on the magnitude of complexity of the original segments. 28. The method as in claim 21 further comprising:
in response to detecting that a particular segment of the content requires a transmission bandwidth below a particular threshold value, reducing the number of different bit rate data streams on which the particular segment is encoded. 29. A computer system comprising:
at least one processor device; and a hardware storage resource coupled to the at least one processor device, the hardware storage resource storing instructions that, when executed by the at least one processor device, cause the at least one processor device to perform the operations of: receiving segments of content from an inputted data stream; receiving encoder control information specifying multiple different bit rate data streams in which to encode the segments of content; and as specified by the encoder control information, adaptively encoding the segments of content into a varying number of different bit rate data streams available to subscribers. 30. The computer system as in claim 29, wherein adaptively encoding the segments of content includes:
encoding a first portion of the segments of content up to a first level of quality and corresponding bit rate; and encoding a second portion of the segments of content up to a second level of quality and corresponding bit rate, the second level of quality being higher than the first level of quality. 31. The computer system as in claim 29, wherein the at least one processor device further supports operations of:
as specified by the encoder control information, varying a number of bit rates of encoding segments of a scheduled program of streaming content received on the inputted data stream. 32. The computer system as in claim 29, wherein the at least one processor device further supports operations of:
varying bit rates of encoding the segments of content based at least in part on a time of day at which the segments of content are received on the inputted data stream. 33. The computer system as in claim 29, wherein the at least one processor device further supports operations of:
varying bit rates of encoding the segments of content based at least in part on an amount of bandwidth on which to transmit the encoded segments of content. 34. The computer system as in claim 29, wherein the at least one processor device further supports operations of:
receiving the segments of content in the inputted data stream on a data feed, the inputted data stream including at least a portion of metadata; and retrieving the encoder control information from the metadata in the inputted data stream. 35. The computer system as in claim 29, wherein the at least one processor device further supports operations of:
receiving the encoder control information from an out-of-band signal with respect to the inputted data stream on which the segments of content are received. 36. The computer system as in claim 29, wherein receiving the receiving segments of content includes receiving a first program of content and a second program of content on a data feed, the first program of content unrelated to the second program of content;
wherein the encoder control information specifies to encode the first program of content according to a first number of different bit rate data streams; and wherein the encoder control information specifies to encode the second program of content according to a second number of different bit rate data streams, the second number different than the first number. 37. The computer system as in claim 36, wherein the at least one processor device further supports operations of:
receiving the first program of content on the data feed followed by receiving the second program of content on the data feed; and wherein adaptively encoding the segments of content into the varying number of different bit rate data streams includes: i) encoding the first program of content in accordance with the first number of data streams as specified by the encoder control information; and ii) encoding the second program of content in accordance with the second number of data streams as specified by the encoder control information. 38. The computer system as in claim 36, wherein the at least one processor device further supports operations of:
receiving segments of the first program of content interleaved amongst segments of the second program of content on the data feed; and wherein adaptively encoding the segments of content into the varying number of different bit rate data streams includes: i) encoding the segments of the first program of content in accordance with the first number of data streams as specified by the encoder control information; and ii) encoding the segments of the second program of content in accordance with the second number of data streams as specified by the encoder control information. 39. The computer system as in claim 29, wherein the at least one processor device further supports operations of:
receiving first encoder control information, the first encoder control information indicating to configure a respective encoder to encode a first portion of the received segments of content in a first number of different bit rate data streams; and in accordance with the first encoder control information, encoding the first portion of received segments of content into the first number of different bit rate data streams as specified by the first encoder control information; receiving second encoder control information, the second encoder control information indicating to configure the respective encoder to encode a second portion of the received segments of content in a second number of different bit rate data streams; and in accordance with the second encoder control information, encoding the second portion of received segments of content into the second number of different bit rate data streams as specified by the first encoder control information. 40. The computer system as in claim 29, wherein encoding the segments of content into a varying number of different bit rate data streams includes:
encoding a first segment of the content retrieved from the inputted data stream into a first number of different levels of quality as specified by the encoder control information; and encoding a second segment of the content retrieved from the inputted data stream into a second number of different levels of quality as specified by the encoder control information, the second number of different levels of quality being different than the first number of different levels of quality. | 2,400 |
7,123 | 7,123 | 13,777,218 | 2,442 | A system for facilitating examination of conditions across physical machines using augmented reality generates an overlay of information about application structure across physical systems, such as physical systems located within a data center. Additionally, the system for facilitating examination of application structure across physical machines using augmented reality overlays this information about application structure using imaging captured through a camera, such as a camera associated with a tablet type or smart phone type computing device. | 1. A method for facilitating examination of conditions across physical machines comprising:
defining presentation of software stacks executing on physical hardware in a data processing system environment; defining presentation of information regarding a physical installed hardware environment of the data processing system environment; obtaining information in real time about the physical hardware in the data processing system environment while in proximity with the physical hardware; identifying the physical hardware based upon the information about the physical hardware; and, obtaining condition information regarding physical hardware based upon the identifying. 2. The method of claim 1, further comprising:
overlaying the status information with images of the physical hardware. 3. The method of claim 1, wherein the identifying is based upon at least one of an identifier (ID) of the physical
device and a quick response (QR) type code of the physical device, the at least one of the ID of the physical device and the QR type code of the physical device being visible on the physical machine. 4. The method of claim 1, wherein
the condition information comprises at least one of information regarding applications executing on the physical device, input/output health information, users presently operating on the physical device and diagnostics information generated by any diagnostics tools associated with the physical device. 5. The method of claim 4, wherein
the condition information is obtained from monitoring software, the monitoring software monitoring operation of the physical hardware. 6. The method of claim 1, wherein
the physical hardware an officially registered end point of a data center pool of assets; and, information associated with the physical device can be obtained regarding internal software stacks. 7-18. (canceled) | A system for facilitating examination of conditions across physical machines using augmented reality generates an overlay of information about application structure across physical systems, such as physical systems located within a data center. Additionally, the system for facilitating examination of application structure across physical machines using augmented reality overlays this information about application structure using imaging captured through a camera, such as a camera associated with a tablet type or smart phone type computing device.1. A method for facilitating examination of conditions across physical machines comprising:
defining presentation of software stacks executing on physical hardware in a data processing system environment; defining presentation of information regarding a physical installed hardware environment of the data processing system environment; obtaining information in real time about the physical hardware in the data processing system environment while in proximity with the physical hardware; identifying the physical hardware based upon the information about the physical hardware; and, obtaining condition information regarding physical hardware based upon the identifying. 2. The method of claim 1, further comprising:
overlaying the status information with images of the physical hardware. 3. The method of claim 1, wherein the identifying is based upon at least one of an identifier (ID) of the physical
device and a quick response (QR) type code of the physical device, the at least one of the ID of the physical device and the QR type code of the physical device being visible on the physical machine. 4. The method of claim 1, wherein
the condition information comprises at least one of information regarding applications executing on the physical device, input/output health information, users presently operating on the physical device and diagnostics information generated by any diagnostics tools associated with the physical device. 5. The method of claim 4, wherein
the condition information is obtained from monitoring software, the monitoring software monitoring operation of the physical hardware. 6. The method of claim 1, wherein
the physical hardware an officially registered end point of a data center pool of assets; and, information associated with the physical device can be obtained regarding internal software stacks. 7-18. (canceled) | 2,400 |
7,124 | 7,124 | 14,259,395 | 2,431 | A method of obscuring software code including a plurality of basic blocks wherein the basic blocks have an associated identifier (ID), including: determining, by a processor, for a first basic block first predecessor basic blocks, wherein first predecessor basic blocks jump to the first basic block and the first basic block jumps to a next basic block based upon a next basic block ID; producing, by the processor, a mask value based upon the IDs of first predecessor basic blocks, wherein the mask value identifies common bits of the IDs of the first predecessor basic blocks; and inserting, by the processor, an instruction in the first basic block to determine a next basic block ID based upon the mask value and an ID of one of the first predecessor basic blocks. | 1. A method of obscuring software code including a plurality of basic blocks wherein the basic blocks have an associated identifier (ID), comprising:
determining, by a processor, for a first basic block first predecessor basic blocks, wherein first predecessor basic blocks jump to the first basic block and the first basic block jumps to a next basic block based upon a next basic block ID; producing, by the processor, a mask value based upon the IDs of first predecessor basic blocks, wherein the mask value identifies common bits of the IDs of the first predecessor basic blocks; and inserting, by a processor, an instruction in the first basic block to determine a next basic block ID based upon the mask value and an ID of one of the first predecessor basic blocks. 2. The method of claim 1, wherein determining the next basic block ID is further based upon a condition. 3. The method of claim 1, further comprising producing a table of basic block addresses indexed by basic block IDs. 4. The method of claim 1, wherein the mask value is calculated by calculating a first result by bit-wise ANDing the IDs of the first predecessor basic blocks, by calculating a second result by bit-wise ANDing the inverses of the IDs of the first predecessor basic block, and bit-wise ORing the first result and the second result. 5. The method of claim 1, wherein the first predecessor basic blocks are a plurality of dummy basic blocks, wherein the plurality of dummy basic blocks have a second plurality of predecessor basic blocks, wherein the plurality of dummy basic blocks merge the control flow from the second plurality of predecessor basic blocks to the basic block. 6. The method of claim 1, further comprising:
receiving software code in a higher order language; and compiling the received software code into the software code with basic blocks. 7. The method of claim 6, wherein compiling the received software code includes determining for a first basic block the first predecessor basic blocks, producing the mask value, and inserting the instruction in the first basic block. 8. The method of claim 1, wherein determining the next basic block ID is determined by the following calculation: bb_next=(bb_prev & mask)+(cond? (ID_then_BB−(ID_prev_BB & mask)):(ID_else_BB−(ID_prev_BB & mask))), where bb_next is the next basic block ID, bb_prev is one predecessor basic block ID, mask is the mask value, cond is a Boolean value or expression, ID_then_BB and ID_else_BB are the IDs of the next basic blocks depending on the value of cond, and ID_prev_BB is the ID of an arbitrary predecessor block. 9. The method of claim 1, wherein when the first basic block ends by falling through to a next basic block, inserting a jump instruction to the next basic block. 10. The method of claim 9, further comprising shuffling the plurality of basic blocks. 11. A non-transitory machine-readable storage medium encoded with instructions of a basic block of software code for execution by a processor, the non-transitory machine-readable storage medium comprising:
instructions for determining the identifier (ID) of a next basic block based upon a mask, an ID of a predecessor basic block, and an ID based upon a condition; and instructions for jumping to the next basic block, wherein the mask identifies common bits in a first plurality of predecessor basic blocks. 12. The non-transitory machine-readable storage medium of claim 11 further comprising:
instructions for setting a variable identifying the predecessor basic block to the ID of the basic block; and
instructions for setting a variable identifying the basic block to the determined ID of the next basic block. 13. The non-transitory machine-readable storage medium of claim 11 wherein the mask is calculated by calculating a first result by bit-wise ANDing the IDs of the first predecessor basic blocks, by calculating a second result by bit-wise ANDing the inverses of the IDs of the first predecessor basic block, and bit-wise ORing the first result and the second result. 14. The non-transitory machine-readable storage medium of claim 11 wherein the first predecessor basic blocks are a plurality of dummy basic blocks, wherein the plurality of dummy basic blocks have a second plurality of predecessor basic blocks, wherein the plurality of dummy basic blocks merge the control flow from the second plurality of predecessor basic blocks to the basic block. 15. The non-transitory machine-readable storage medium of claim 11 wherein instructions for jumping to the next basic block include accessing a table of basic block addresses indexed by basic block IDs based upon the ID of the determined next basic block. 16. The non-transitory machine-readable storage medium of claim 11, wherein instructions for determining the ID of the next basic block is calculated using the following calculation: bb_next=(bb_prev & mask)+(cond? (ID_then_BB−(ID_prev_BB & mask)):(ID_else_BB−(ID_prev_BB & mask))), where bb_next is the next basic block ID, bb_prev is one predecessor basic block ID, mask if the mask value, cond is a Boolean value or expression, ID_then_BB and ID_else_BB are the IDs of the next basic blocks depending on the value of cond, and ID_prev_BB is the ID of an arbitrary predecessor block. 17. A method of executing instructions of a basic block of software code for execution by a processor, comprising:
determining, by a processor, the identifier (ID) of a next basic block based upon a mask, an ID of a predecessor basic block, and an ID based upon a condition; and jumping, by the processor, to the next basic block, wherein the mask identifies common bits in a first plurality of predecessor basic blocks. 18. The method of claim 17 further comprising:
setting, by the processor, a variable identifying the predecessor basic block to the ID of the basic block; and
setting, by the processor, a variable identifying the basic block to the determined ID of the next basic block. 19. The method of claim 17 wherein the mask is calculated by calculating a first result by bit-wise ANDing the IDs of the first predecessor basic blocks, by calculating a second result by bit-wise ANDing the inverses of the IDs of the first predecessor basic block, and bit-wise ORing the first result and the second result. 20. The method of claim 17 wherein the first predecessor basic blocks are a plurality of dummy basic blocks, wherein the plurality of dummy basic blocks have a second plurality of predecessor basic blocks, wherein the plurality of dummy basic blocks merge the control flow from the second plurality of predecessor basic blocks to the basic block. 21. The method of claim 17 wherein jumping to the next basic block include accessing a table of basic block addresses indexed by basic block IDs based upon the ID of the determined next basic block. 22. The method of claim 17, wherein determining the ID of the next basic block is calculated using the following calculation: bb_next=(bb_prev & mask)+(cond? (ID_then_BB−(ID_prev_BB & mask)):(ID_else_BB−(ID_prev_BB & mask))), where bb_next is the next basic block ID, bb_prev is one predecessor basic block ID, mask if the mask value, cond is a Boolean value or expression, ID_then_BB and ID_else_BB are the IDs of the next basic blocks depending on the value of cond, and ID_prev_BB is the ID of an arbitrary predecessor block. | A method of obscuring software code including a plurality of basic blocks wherein the basic blocks have an associated identifier (ID), including: determining, by a processor, for a first basic block first predecessor basic blocks, wherein first predecessor basic blocks jump to the first basic block and the first basic block jumps to a next basic block based upon a next basic block ID; producing, by the processor, a mask value based upon the IDs of first predecessor basic blocks, wherein the mask value identifies common bits of the IDs of the first predecessor basic blocks; and inserting, by the processor, an instruction in the first basic block to determine a next basic block ID based upon the mask value and an ID of one of the first predecessor basic blocks.1. A method of obscuring software code including a plurality of basic blocks wherein the basic blocks have an associated identifier (ID), comprising:
determining, by a processor, for a first basic block first predecessor basic blocks, wherein first predecessor basic blocks jump to the first basic block and the first basic block jumps to a next basic block based upon a next basic block ID; producing, by the processor, a mask value based upon the IDs of first predecessor basic blocks, wherein the mask value identifies common bits of the IDs of the first predecessor basic blocks; and inserting, by a processor, an instruction in the first basic block to determine a next basic block ID based upon the mask value and an ID of one of the first predecessor basic blocks. 2. The method of claim 1, wherein determining the next basic block ID is further based upon a condition. 3. The method of claim 1, further comprising producing a table of basic block addresses indexed by basic block IDs. 4. The method of claim 1, wherein the mask value is calculated by calculating a first result by bit-wise ANDing the IDs of the first predecessor basic blocks, by calculating a second result by bit-wise ANDing the inverses of the IDs of the first predecessor basic block, and bit-wise ORing the first result and the second result. 5. The method of claim 1, wherein the first predecessor basic blocks are a plurality of dummy basic blocks, wherein the plurality of dummy basic blocks have a second plurality of predecessor basic blocks, wherein the plurality of dummy basic blocks merge the control flow from the second plurality of predecessor basic blocks to the basic block. 6. The method of claim 1, further comprising:
receiving software code in a higher order language; and compiling the received software code into the software code with basic blocks. 7. The method of claim 6, wherein compiling the received software code includes determining for a first basic block the first predecessor basic blocks, producing the mask value, and inserting the instruction in the first basic block. 8. The method of claim 1, wherein determining the next basic block ID is determined by the following calculation: bb_next=(bb_prev & mask)+(cond? (ID_then_BB−(ID_prev_BB & mask)):(ID_else_BB−(ID_prev_BB & mask))), where bb_next is the next basic block ID, bb_prev is one predecessor basic block ID, mask is the mask value, cond is a Boolean value or expression, ID_then_BB and ID_else_BB are the IDs of the next basic blocks depending on the value of cond, and ID_prev_BB is the ID of an arbitrary predecessor block. 9. The method of claim 1, wherein when the first basic block ends by falling through to a next basic block, inserting a jump instruction to the next basic block. 10. The method of claim 9, further comprising shuffling the plurality of basic blocks. 11. A non-transitory machine-readable storage medium encoded with instructions of a basic block of software code for execution by a processor, the non-transitory machine-readable storage medium comprising:
instructions for determining the identifier (ID) of a next basic block based upon a mask, an ID of a predecessor basic block, and an ID based upon a condition; and instructions for jumping to the next basic block, wherein the mask identifies common bits in a first plurality of predecessor basic blocks. 12. The non-transitory machine-readable storage medium of claim 11 further comprising:
instructions for setting a variable identifying the predecessor basic block to the ID of the basic block; and
instructions for setting a variable identifying the basic block to the determined ID of the next basic block. 13. The non-transitory machine-readable storage medium of claim 11 wherein the mask is calculated by calculating a first result by bit-wise ANDing the IDs of the first predecessor basic blocks, by calculating a second result by bit-wise ANDing the inverses of the IDs of the first predecessor basic block, and bit-wise ORing the first result and the second result. 14. The non-transitory machine-readable storage medium of claim 11 wherein the first predecessor basic blocks are a plurality of dummy basic blocks, wherein the plurality of dummy basic blocks have a second plurality of predecessor basic blocks, wherein the plurality of dummy basic blocks merge the control flow from the second plurality of predecessor basic blocks to the basic block. 15. The non-transitory machine-readable storage medium of claim 11 wherein instructions for jumping to the next basic block include accessing a table of basic block addresses indexed by basic block IDs based upon the ID of the determined next basic block. 16. The non-transitory machine-readable storage medium of claim 11, wherein instructions for determining the ID of the next basic block is calculated using the following calculation: bb_next=(bb_prev & mask)+(cond? (ID_then_BB−(ID_prev_BB & mask)):(ID_else_BB−(ID_prev_BB & mask))), where bb_next is the next basic block ID, bb_prev is one predecessor basic block ID, mask if the mask value, cond is a Boolean value or expression, ID_then_BB and ID_else_BB are the IDs of the next basic blocks depending on the value of cond, and ID_prev_BB is the ID of an arbitrary predecessor block. 17. A method of executing instructions of a basic block of software code for execution by a processor, comprising:
determining, by a processor, the identifier (ID) of a next basic block based upon a mask, an ID of a predecessor basic block, and an ID based upon a condition; and jumping, by the processor, to the next basic block, wherein the mask identifies common bits in a first plurality of predecessor basic blocks. 18. The method of claim 17 further comprising:
setting, by the processor, a variable identifying the predecessor basic block to the ID of the basic block; and
setting, by the processor, a variable identifying the basic block to the determined ID of the next basic block. 19. The method of claim 17 wherein the mask is calculated by calculating a first result by bit-wise ANDing the IDs of the first predecessor basic blocks, by calculating a second result by bit-wise ANDing the inverses of the IDs of the first predecessor basic block, and bit-wise ORing the first result and the second result. 20. The method of claim 17 wherein the first predecessor basic blocks are a plurality of dummy basic blocks, wherein the plurality of dummy basic blocks have a second plurality of predecessor basic blocks, wherein the plurality of dummy basic blocks merge the control flow from the second plurality of predecessor basic blocks to the basic block. 21. The method of claim 17 wherein jumping to the next basic block include accessing a table of basic block addresses indexed by basic block IDs based upon the ID of the determined next basic block. 22. The method of claim 17, wherein determining the ID of the next basic block is calculated using the following calculation: bb_next=(bb_prev & mask)+(cond? (ID_then_BB−(ID_prev_BB & mask)):(ID_else_BB−(ID_prev_BB & mask))), where bb_next is the next basic block ID, bb_prev is one predecessor basic block ID, mask if the mask value, cond is a Boolean value or expression, ID_then_BB and ID_else_BB are the IDs of the next basic blocks depending on the value of cond, and ID_prev_BB is the ID of an arbitrary predecessor block. | 2,400 |
7,125 | 7,125 | 15,368,001 | 2,433 | In an aspect, a wireless communication between a transmitter and a receiver involves determining updated keys according to a key management process for MAC layer encryption. Such key is propagated to a transmitter MAC and though a receiver key management process to a receiver MAC. After a delay, transmitter MAC device begins using the updated key, instead of a prior key, for payload encryption. Receiver MAC continues to use the prior key until a packet that was accurately received fails a message integrity/authentication check. Then, the receiver MAC swaps in the updated key and continues to process received packets. The packet data that failed the message integrity check is discarded. Transmitter MAC retries the failed packet at a later time, and if the packet was accurately received and was encrypted by the transmitter MAC using the updated key, then the receiver will determine that the message is authentic and will receive it and acknowledge it. | 1. A process of receiving encrypted communications in a network, comprising:
receiving at a link layer of a receiving device a current key, for use in decrypting packets of data received from a transmitting device in a communication session; receiving from the transmitting device a new key; in response to determining that data contained in a payload from a received packet cannot be decrypted using the current key, updating, at the receiving device, the current key with the new key; and after updating the current key, waiting for a retransmission of the packet, decrypting the payload of the packet using the updated current key, and only after successfully decrypting the payload using the updated current key acknowledging receipt of the packet. 2. The process of receiving encrypted communications in a network as set forth in claim 1, further comprising negotiating the current key and, after a period of time elapses, negotiating the new key, using software executing on a respective processor at each of the transmitting device and the receiving device. 3. The process of receiving encrypted communications in a network as set forth in claim 2, wherein, after a determined period of time elapses following negotiation of the new key, the transmitting device updates the current key with the new key and then uses the updated current key to encrypt a payload, encapsulates the payload in a packet and transmits the packet to the receiving device. 4. The process of receiving encrypted communications in a network as set forth in claim 1, wherein the packet is a packet from a sequence of packets transmitted by the transmitting device to the receiving device, and wherein the transmitting device swaps out the current key with the new key after a delay in a hardware encryption engine of the transmitting device. 5. A device capable of receiving encrypted communications in a network, comprising:
a link layer configured to receive keys for use in decrypting encrypted packets of data received from a transmitting device in a communication session; a physical (PHY) layer configured to receive an encrypted packet of data from the transmitting device; and a decryption engine coupled with the PHY layer and configured to:
process the received encrypted packet of data with a current key installed in the decryption engine in order to decrypt it,
in response to determining that data contained in said received encrypted packet of data cannot be decrypted using the current key, updating said current key with a new key received by said link layer, and
after updating said current key with said new key, waiting for a retransmission of the encrypted packet of data, processing the retransmitted packet of data using the updated current key, and only after successfully decrypting the retransmitted packet of data using the updated current key, sending an acknowledgment receipt of the packet to said transmitting device. 6. The device as set forth in claim 5, further comprising a MAC layer driver configured to provide each negotiated key to the decryption engine. 7. The device as set forth in claim 5, wherein the device is configured to allow a payload of the MAC layer to be discarded after decryption but before authentication of the decrypted MAC layer payload. 8. A non-transitory computer readable storage medium having stored thereon a computer readable description of an integrated circuit that, when processed in an integrated circuit manufacturing system, causes the integrated circuit manufacturing system to manufacture a device capable of receiving encrypted communications in a network, comprising:
a link layer configured to receive keys for use in decrypting encrypted packets of data received from a transmitting device in a communication session; a physical (PHY) layer configured to receive an encrypted packet of data from the transmitting device; and a decryption engine coupled with the PHY layer and configured to:
process the received encrypted packet of data with a current key installed in the decryption engine in order to decrypt it,
in response to determining that data contained in said received encrypted packet of data cannot be decrypted using the current key, updating said current key with a new key received by said link layer, and
after updating said current key with said new key, waiting for a retransmission of the encrypted packet of data, processing the retransmitted packet of data using the updated current key, and only after successfully decrypting the retransmitted packet of data using the updated current key, sending an acknowledgment receipt of the packet to said transmitting device. | In an aspect, a wireless communication between a transmitter and a receiver involves determining updated keys according to a key management process for MAC layer encryption. Such key is propagated to a transmitter MAC and though a receiver key management process to a receiver MAC. After a delay, transmitter MAC device begins using the updated key, instead of a prior key, for payload encryption. Receiver MAC continues to use the prior key until a packet that was accurately received fails a message integrity/authentication check. Then, the receiver MAC swaps in the updated key and continues to process received packets. The packet data that failed the message integrity check is discarded. Transmitter MAC retries the failed packet at a later time, and if the packet was accurately received and was encrypted by the transmitter MAC using the updated key, then the receiver will determine that the message is authentic and will receive it and acknowledge it.1. A process of receiving encrypted communications in a network, comprising:
receiving at a link layer of a receiving device a current key, for use in decrypting packets of data received from a transmitting device in a communication session; receiving from the transmitting device a new key; in response to determining that data contained in a payload from a received packet cannot be decrypted using the current key, updating, at the receiving device, the current key with the new key; and after updating the current key, waiting for a retransmission of the packet, decrypting the payload of the packet using the updated current key, and only after successfully decrypting the payload using the updated current key acknowledging receipt of the packet. 2. The process of receiving encrypted communications in a network as set forth in claim 1, further comprising negotiating the current key and, after a period of time elapses, negotiating the new key, using software executing on a respective processor at each of the transmitting device and the receiving device. 3. The process of receiving encrypted communications in a network as set forth in claim 2, wherein, after a determined period of time elapses following negotiation of the new key, the transmitting device updates the current key with the new key and then uses the updated current key to encrypt a payload, encapsulates the payload in a packet and transmits the packet to the receiving device. 4. The process of receiving encrypted communications in a network as set forth in claim 1, wherein the packet is a packet from a sequence of packets transmitted by the transmitting device to the receiving device, and wherein the transmitting device swaps out the current key with the new key after a delay in a hardware encryption engine of the transmitting device. 5. A device capable of receiving encrypted communications in a network, comprising:
a link layer configured to receive keys for use in decrypting encrypted packets of data received from a transmitting device in a communication session; a physical (PHY) layer configured to receive an encrypted packet of data from the transmitting device; and a decryption engine coupled with the PHY layer and configured to:
process the received encrypted packet of data with a current key installed in the decryption engine in order to decrypt it,
in response to determining that data contained in said received encrypted packet of data cannot be decrypted using the current key, updating said current key with a new key received by said link layer, and
after updating said current key with said new key, waiting for a retransmission of the encrypted packet of data, processing the retransmitted packet of data using the updated current key, and only after successfully decrypting the retransmitted packet of data using the updated current key, sending an acknowledgment receipt of the packet to said transmitting device. 6. The device as set forth in claim 5, further comprising a MAC layer driver configured to provide each negotiated key to the decryption engine. 7. The device as set forth in claim 5, wherein the device is configured to allow a payload of the MAC layer to be discarded after decryption but before authentication of the decrypted MAC layer payload. 8. A non-transitory computer readable storage medium having stored thereon a computer readable description of an integrated circuit that, when processed in an integrated circuit manufacturing system, causes the integrated circuit manufacturing system to manufacture a device capable of receiving encrypted communications in a network, comprising:
a link layer configured to receive keys for use in decrypting encrypted packets of data received from a transmitting device in a communication session; a physical (PHY) layer configured to receive an encrypted packet of data from the transmitting device; and a decryption engine coupled with the PHY layer and configured to:
process the received encrypted packet of data with a current key installed in the decryption engine in order to decrypt it,
in response to determining that data contained in said received encrypted packet of data cannot be decrypted using the current key, updating said current key with a new key received by said link layer, and
after updating said current key with said new key, waiting for a retransmission of the encrypted packet of data, processing the retransmitted packet of data using the updated current key, and only after successfully decrypting the retransmitted packet of data using the updated current key, sending an acknowledgment receipt of the packet to said transmitting device. | 2,400 |
7,126 | 7,126 | 13,009,083 | 2,488 | In an example, a dynamic codec allocation method is provided. The method includes receiving a plurality of datastreams and determining a respective codec loading factor for each of the datastreams. The datastreams are assigned to codecs, in order by respective codec loading factor, starting with the highest respective codec loading factor. Initially, the datastreams are assigned to a hardware codec, until the hardware codec is loaded to substantially maximum capacity. If the hardware codec is loaded to substantially maximum capacity, the remaining datastreams are assigned to a software codec. As new datastreams are received, the method repeats, and previously-assigned datastreams can be reassigned from a hardware codec to a software codec, and vice versa, based on their relative codec loading factors. | 1. A dynamic codec allocation method, comprising:
receiving a plurality of datastreams; determining a respective codec loading factor for each datastream in the plurality of datastreams; assigning the datastreams to a hardware codec, in order by respective codec loading factor starting with the highest respective codec loading factor, until the hardware codec is loaded to substantially maximum capacity; and if the hardware codec is loaded to substantially maximum capacity, assigning the remaining datastreams to a software codec. 2. The method of claim 1, further comprising saving the datastream loading factors for future use. 3. The method of claim 1, wherein at least one of the assigning the datastreams to a hardware codec or the assigning the remaining datastreams to a software codec is performed at a start of a datastream frame. 4. The method of claim 1, wherein the assigning the datastreams to a hardware codec is performed on a datastream in the plurality of datastreams while the datastream is in mid-stream. 5. The method of claim 1, wherein the determining the respective codec loading factor is based at least on one of a codec parameter, a system power state, a battery energy level, or estimated codec power consumption. 6. The method of claim 1, wherein the determining the respective codec loading factor and the assigning the datastreams to a hardware codec are triggered by a video event. 7. A dynamic codec allocation apparatus, comprising:
means for receiving a plurality of datastreams; means for determining a respective codec loading factor for each datastream in the plurality of datastreams; means for assigning the datastreams to a hardware codec, in order by respective codec loading factor starting with the highest respective codec loading factor, until the hardware codec is loaded to substantially maximum capacity; and means for assigning the remaining datastreams to a software codec, if the hardware codec is loaded to substantially maximum capacity. 8. The apparatus of claim 7, further comprising means for saving the datastream loading factors for future use. 9. The apparatus of claim 7, wherein at least one of the means for assigning the datastreams to a hardware codec or the means for assigning the remaining datastreams to a software codec, includes means for performing the respective assigning at a start of a datastream frame. 10. The apparatus of claim 7, wherein the means for assigning the datastreams to a hardware codec includes means for assigning a datastream in the plurality of datastreams while the datastream is in mid-stream. 11. The apparatus of claim 7, wherein the means for determining the respective codec loading factor include means for determining the respective codec loading factor based at least on one of a codec parameter, a system power state, a battery energy level, or estimated codec power consumption. 12. The apparatus of claim 7, wherein the means for determining the respective codec loading factor and the means for assigning the datastreams to a hardware codec are triggered by a video event. 13. A non-transitory computer-readable medium, comprising instructions stored thereon that, if executed by a processor, cause the processor to execute a method comprising:
receiving a plurality of datastreams; determining a respective codec loading factor for each datastream in the plurality of datastreams; assigning the datastreams to a hardware codec, in order by respective codec loading factor starting with the highest respective codec loading factor, until the hardware codec is loaded to substantially maximum capacity; and if the hardware codec is loaded to substantially maximum capacity, assigning the remaining datastreams to a software codec. 14. The non-transitory computer-readable medium of claim 13, wherein the method further comprises saving the datastream loading factors for future use. 15. The non-transitory computer-readable medium of claim 13, wherein at least one of the assigning the datastreams to a hardware codec or the assigning the remaining datastreams to a software codec is performed at a start of a datastream frame. 16. The non-transitory computer-readable medium of claim 13, wherein the assigning the datastreams to a hardware codec is performed on a datastream in the plurality of datastreams while the datastream is in mid-stream. 17. The non-transitory computer-readable medium of claim 13, wherein the determining the respective codec loading factor is based at least on one of a codec parameter, a system power state, a battery energy level, or estimated codec power consumption. 18. The non-transitory computer-readable medium of claim 13, wherein the determining the respective codec loading factor and the assigning the datastreams to a hardware codec are triggered by a video event. 19. A dynamic codec allocation apparatus, comprising:
a hardware codec; and a processor coupled to the hardware codec, and configured to:
receive a plurality of datastreams;
determine a respective codec loading factor for each datastream in the plurality of datastreams;
assign the datastreams to the hardware codec, in order by respective codec loading factor starting with the highest respective codec loading factor, until the hardware codec is loaded to substantially maximum capacity; and
if the hardware codec is loaded to substantially maximum capacity, assign the remaining datastreams to a software codec. 20. The apparatus of claim 19, further comprising a memory coupled to the processor, and configured to save the datastream loading factors for future use. 21. The apparatus of claim 19, wherein the processor is further configured to, at a start of a datastream frame, perform at least one of the assigning the datastreams to a hardware codec or assigning the remaining datastreams to a software codec. 22. The apparatus of claim 19, wherein the processor is configured to perform the assigning the datastreams to a hardware codec on a datastream in the plurality of datastreams while the datastream is in mid-stream. 23. The apparatus of claim 19, wherein the processor is configured to determine the respective codec loading factor based at least on one of a codec parameter, a system power state, a battery energy level, or estimated codec power consumption. 24. The apparatus of claim 19, wherein the processor is configured to determine the respective codec loading factor and the assign the datastreams to a hardware codec when triggered by a video event. | In an example, a dynamic codec allocation method is provided. The method includes receiving a plurality of datastreams and determining a respective codec loading factor for each of the datastreams. The datastreams are assigned to codecs, in order by respective codec loading factor, starting with the highest respective codec loading factor. Initially, the datastreams are assigned to a hardware codec, until the hardware codec is loaded to substantially maximum capacity. If the hardware codec is loaded to substantially maximum capacity, the remaining datastreams are assigned to a software codec. As new datastreams are received, the method repeats, and previously-assigned datastreams can be reassigned from a hardware codec to a software codec, and vice versa, based on their relative codec loading factors.1. A dynamic codec allocation method, comprising:
receiving a plurality of datastreams; determining a respective codec loading factor for each datastream in the plurality of datastreams; assigning the datastreams to a hardware codec, in order by respective codec loading factor starting with the highest respective codec loading factor, until the hardware codec is loaded to substantially maximum capacity; and if the hardware codec is loaded to substantially maximum capacity, assigning the remaining datastreams to a software codec. 2. The method of claim 1, further comprising saving the datastream loading factors for future use. 3. The method of claim 1, wherein at least one of the assigning the datastreams to a hardware codec or the assigning the remaining datastreams to a software codec is performed at a start of a datastream frame. 4. The method of claim 1, wherein the assigning the datastreams to a hardware codec is performed on a datastream in the plurality of datastreams while the datastream is in mid-stream. 5. The method of claim 1, wherein the determining the respective codec loading factor is based at least on one of a codec parameter, a system power state, a battery energy level, or estimated codec power consumption. 6. The method of claim 1, wherein the determining the respective codec loading factor and the assigning the datastreams to a hardware codec are triggered by a video event. 7. A dynamic codec allocation apparatus, comprising:
means for receiving a plurality of datastreams; means for determining a respective codec loading factor for each datastream in the plurality of datastreams; means for assigning the datastreams to a hardware codec, in order by respective codec loading factor starting with the highest respective codec loading factor, until the hardware codec is loaded to substantially maximum capacity; and means for assigning the remaining datastreams to a software codec, if the hardware codec is loaded to substantially maximum capacity. 8. The apparatus of claim 7, further comprising means for saving the datastream loading factors for future use. 9. The apparatus of claim 7, wherein at least one of the means for assigning the datastreams to a hardware codec or the means for assigning the remaining datastreams to a software codec, includes means for performing the respective assigning at a start of a datastream frame. 10. The apparatus of claim 7, wherein the means for assigning the datastreams to a hardware codec includes means for assigning a datastream in the plurality of datastreams while the datastream is in mid-stream. 11. The apparatus of claim 7, wherein the means for determining the respective codec loading factor include means for determining the respective codec loading factor based at least on one of a codec parameter, a system power state, a battery energy level, or estimated codec power consumption. 12. The apparatus of claim 7, wherein the means for determining the respective codec loading factor and the means for assigning the datastreams to a hardware codec are triggered by a video event. 13. A non-transitory computer-readable medium, comprising instructions stored thereon that, if executed by a processor, cause the processor to execute a method comprising:
receiving a plurality of datastreams; determining a respective codec loading factor for each datastream in the plurality of datastreams; assigning the datastreams to a hardware codec, in order by respective codec loading factor starting with the highest respective codec loading factor, until the hardware codec is loaded to substantially maximum capacity; and if the hardware codec is loaded to substantially maximum capacity, assigning the remaining datastreams to a software codec. 14. The non-transitory computer-readable medium of claim 13, wherein the method further comprises saving the datastream loading factors for future use. 15. The non-transitory computer-readable medium of claim 13, wherein at least one of the assigning the datastreams to a hardware codec or the assigning the remaining datastreams to a software codec is performed at a start of a datastream frame. 16. The non-transitory computer-readable medium of claim 13, wherein the assigning the datastreams to a hardware codec is performed on a datastream in the plurality of datastreams while the datastream is in mid-stream. 17. The non-transitory computer-readable medium of claim 13, wherein the determining the respective codec loading factor is based at least on one of a codec parameter, a system power state, a battery energy level, or estimated codec power consumption. 18. The non-transitory computer-readable medium of claim 13, wherein the determining the respective codec loading factor and the assigning the datastreams to a hardware codec are triggered by a video event. 19. A dynamic codec allocation apparatus, comprising:
a hardware codec; and a processor coupled to the hardware codec, and configured to:
receive a plurality of datastreams;
determine a respective codec loading factor for each datastream in the plurality of datastreams;
assign the datastreams to the hardware codec, in order by respective codec loading factor starting with the highest respective codec loading factor, until the hardware codec is loaded to substantially maximum capacity; and
if the hardware codec is loaded to substantially maximum capacity, assign the remaining datastreams to a software codec. 20. The apparatus of claim 19, further comprising a memory coupled to the processor, and configured to save the datastream loading factors for future use. 21. The apparatus of claim 19, wherein the processor is further configured to, at a start of a datastream frame, perform at least one of the assigning the datastreams to a hardware codec or assigning the remaining datastreams to a software codec. 22. The apparatus of claim 19, wherein the processor is configured to perform the assigning the datastreams to a hardware codec on a datastream in the plurality of datastreams while the datastream is in mid-stream. 23. The apparatus of claim 19, wherein the processor is configured to determine the respective codec loading factor based at least on one of a codec parameter, a system power state, a battery energy level, or estimated codec power consumption. 24. The apparatus of claim 19, wherein the processor is configured to determine the respective codec loading factor and the assign the datastreams to a hardware codec when triggered by a video event. | 2,400 |
7,127 | 7,127 | 14,848,687 | 2,467 | A system for enforcing quality of service and methods of configuring and enforcing quality of service (QoS). In one embodiment, the system includes: (1) a host configured to process a plurality of applications and (2) a modem coupled to the host and configured to interface with data networks and having a non-access stratum configured to prioritize real time data packets and selectively to discard data packets based on a defined criteria. | 1. A system for enforcing quality of service, comprising:
a host configured to process a plurality of applications; and a modem coupled to said host and configured to interface with data networks and having a non-access stratum configured to prioritize real time data packets and selectively to discard data packets based on a defined criteria. 2. The system as recited in claim 1 wherein said plurality of applications further comprises:
a plurality of real-time applications; and
a plurality of other non-real-time applications. 3. The system as recited in claim 1 wherein said host further comprises:
a radio interface layer; and
an IP stack. 4. The system as recited in claim 1 wherein said non-access stratum further comprises:
an internal quality of service controller configured to receive and apply quality of service rules; and
a quality of service enforcement function configured to apply said quality of service rules. 5. A method of configuring internal quality of service, comprising:
making a quality of service request from a radio interface layer; translating said quality of service request into an AT command; providing said AT command to an AT command interpreter; translating said AT command into a quality of service rule; and providing said quality of service rule to an internal quality of service controller. 6. The method as recited in claim 5 wherein said AT command is a proprietary command. 7. The method as recited in claim 5 wherein said AT command is a standard-based AT command, and wherein said internal quality of service is configured as a fallback if a requested standard based QoS is not granted. 8. The method as recited in claim 5 wherein said quality of service rules comprise discard selection criteria. 9. The method as recited in claim 5 wherein said quality of service rules further comprise prioritization criteria. 10. The method as recited in claim 5 wherein said quality of service rules further comprise proprietary deep inspection patterns to identify traffic flows. 11. A method of enforcing internal quality of service, comprising:
identifying data packets internal to a non-access stratum of a modem; associating a quality of service policy to said data packets internal to said non-access stratum of a modem; and applying said quality of service policy to said data packets internal to said non-access stratum of a modem. 12. The method as recited in claim 11 wherein said identifying said data packets is enabled by an existing standards-based framework. 13. The method as recited in claim 11 wherein said identification of said data packets is enabled by deep packet inspection. 14. The method as recited in claim 11 further comprising receiving an AT command; and
basing said quality of service policy on at least one quality of service rule determined by said AT command. 15. The method as recited in claim 11 wherein said applying of said quality of service policy to said data packets is enabled by a custom configuration. 16. The method as recited in claim 11 wherein said applying comprises:
limiting buffered data within an access stratum of said modem while avoiding underrun; and
prioritizing packets for transmission within said non-access stratum based on quality of service policy. 17. The method as recited in claim 11 wherein said applying comprises discarding packets based on a quality of service policy. 18. The method as recited in claim 11 wherein said applying is carried out on a data bearer basis. | A system for enforcing quality of service and methods of configuring and enforcing quality of service (QoS). In one embodiment, the system includes: (1) a host configured to process a plurality of applications and (2) a modem coupled to the host and configured to interface with data networks and having a non-access stratum configured to prioritize real time data packets and selectively to discard data packets based on a defined criteria.1. A system for enforcing quality of service, comprising:
a host configured to process a plurality of applications; and a modem coupled to said host and configured to interface with data networks and having a non-access stratum configured to prioritize real time data packets and selectively to discard data packets based on a defined criteria. 2. The system as recited in claim 1 wherein said plurality of applications further comprises:
a plurality of real-time applications; and
a plurality of other non-real-time applications. 3. The system as recited in claim 1 wherein said host further comprises:
a radio interface layer; and
an IP stack. 4. The system as recited in claim 1 wherein said non-access stratum further comprises:
an internal quality of service controller configured to receive and apply quality of service rules; and
a quality of service enforcement function configured to apply said quality of service rules. 5. A method of configuring internal quality of service, comprising:
making a quality of service request from a radio interface layer; translating said quality of service request into an AT command; providing said AT command to an AT command interpreter; translating said AT command into a quality of service rule; and providing said quality of service rule to an internal quality of service controller. 6. The method as recited in claim 5 wherein said AT command is a proprietary command. 7. The method as recited in claim 5 wherein said AT command is a standard-based AT command, and wherein said internal quality of service is configured as a fallback if a requested standard based QoS is not granted. 8. The method as recited in claim 5 wherein said quality of service rules comprise discard selection criteria. 9. The method as recited in claim 5 wherein said quality of service rules further comprise prioritization criteria. 10. The method as recited in claim 5 wherein said quality of service rules further comprise proprietary deep inspection patterns to identify traffic flows. 11. A method of enforcing internal quality of service, comprising:
identifying data packets internal to a non-access stratum of a modem; associating a quality of service policy to said data packets internal to said non-access stratum of a modem; and applying said quality of service policy to said data packets internal to said non-access stratum of a modem. 12. The method as recited in claim 11 wherein said identifying said data packets is enabled by an existing standards-based framework. 13. The method as recited in claim 11 wherein said identification of said data packets is enabled by deep packet inspection. 14. The method as recited in claim 11 further comprising receiving an AT command; and
basing said quality of service policy on at least one quality of service rule determined by said AT command. 15. The method as recited in claim 11 wherein said applying of said quality of service policy to said data packets is enabled by a custom configuration. 16. The method as recited in claim 11 wherein said applying comprises:
limiting buffered data within an access stratum of said modem while avoiding underrun; and
prioritizing packets for transmission within said non-access stratum based on quality of service policy. 17. The method as recited in claim 11 wherein said applying comprises discarding packets based on a quality of service policy. 18. The method as recited in claim 11 wherein said applying is carried out on a data bearer basis. | 2,400 |
7,128 | 7,128 | 14,929,572 | 2,466 | A packet data transmission system comprises primary stations (PS) having signal transmitting and receiving means and antennas (PA 1 to PA 4 ) for propagating downlink signals and receiving uplink signals and a plurality of secondary stations (SS) able to roam within the coverage areas of the primary stations. Each secondary station (SS 1 ) has signal transmitting and receiving means, a predetermined number of antennas (SA 1 to SA 4 ), and means for monitoring its radio environment. Information about the radio environment is relayed as an uplink signal to the respective primary station which modifies its mode of transmission of packet data signals. The secondary station in response to the modified mode of transmission of the downlink signals adapts its receiver resources to process the packet data signals and effect cancellation of any interference. | 1. A method of operating packet data transmission between a primary station and a secondary station, the method comprising:
monitoring, by a secondary station, a radio environment; sending, by the secondary station, radio environment information to the primary station, the radio environment information being indicative of characteristics of a channel transfer function between one or more interference sources and secondary station antennas; and configuring, by the secondary station, receiver resources of the secondary station for processing received data and interference signals based on the radio environment information. 2. The method of claim 1, further comprising transmitting, by the secondary station, a recommendation such that the primary station is enabled to adapt a mode of signal transmission to the secondary station, in accordance with the recommendation. 3. The method of claim 2, wherein the recommendation comprises the number of antennas or a subset of antennas for the primary station to use when transmitting packet data to the secondary station. 4. The method of claim 2, wherein the recommendation comprises a maximum desired number of receivable transmission antennas to be used by the primary station. 5. The method of claim 2, wherein the recommendation comprises a transmission format to be used by the primary station. 6. The method of claim 1, wherein the radio environment information further comprises antenna coefficients which enable the primary station to optimize at least one parameter of antennas of the secondary station. 7. The method of claim 1, further comprising determining, by the secondary station, the resources to be used for receiving packet data and the resources to be used for interference cancellation, and wherein a number of interference sources which can be cancelled by a linear combination of antenna outputs is equal to a number of receiver antennas minus a number of signals to be received from the primary station. 8. The method of claim 1, further comprising monitoring, by the secondary station, a transfer function of paths between antennas of the primary station and the secondary station. 9. The method of claim 1 wherein the level of interference between the pairs of antennas includes interference in channels between pairs of interfering transmitter and receiver antennas. 10. A secondary station configured to be utilized in a packet data transmission system, the secondary station comprising:
a plurality of antennas; and a processor coupled to the plurality of antennas, the processor being configured to:
monitor a radio environment of the packet data transmission system;
transmit a signal including radio environment information to a primary station, the radio environment information being indicative of characteristics of a channel transfer function between one or more interference sources and the secondary station antennas; and
adapt receiver resources of the secondary station for processing received data and interference signals based on the radio environment information. 11. The secondary station of claim 10, wherein the radio environment information further includes antenna coefficients which enable the primary station to optimize at least one parameter of the antennas of the secondary station. 12. The secondary station of claim 10, wherein the processor is configured to determine resources to be used for receiving packet data and resources to be used for interference cancellation, and wherein a number of interference sources which can be cancelled by a linear combination of antenna outputs is equal to a number of receiver antennas minus a number of signals to be received from the primary station. 13. The secondary station of claim 10, wherein the processor is configured to allocate resources for processing the received data and interference by choosing, based on characteristics of the channel transfer functions between interference sources and the plurality of antennas, selected ones of the plurality of antennas for receiving interference signals for interference cancellation. 14. The secondary station of claim 10, wherein the processor is configured to transmit, via one or more of the plurality of antennas, a recommendation such that the primary station is enabled to adapt a mode of signal transmission to the secondary station in accordance with the recommendation. 15. The secondary station of claim 14, wherein the recommendation comprises the number of antennas or a subset of antennas for the primary station to use when transmitting packet data to the secondary station. 16. The secondary station of claim 14, wherein the recommendation comprises a maximum desired number of receivable transmission antennas to be used by the primary station. 17. The secondary station of claim 14, wherein the recommendation comprises a transmission format to be used by the primary station. 18. A primary station configured to be utilized in a packet data transmission system, the primary station comprising:
a plurality of antennas; and a processor coupled to the plurality of antennas, the processor being configured to:
receive a signal including radio environment information from a secondary station, the radio environment information being indicative of characteristics of a channel transfer function between one or more interference sources and secondary station antennas; and
allocate, based on the radio environment information, transmission resources of the plurality of antennas for transmission of communication signals to the secondary station such that the secondary station is enabled to process received data and interference signals based on the radio environment information. 19. The primary station of claim 18, wherein the processor is configured to receive a recommendation from the secondary station, and wherein the processor is configured to adapt a mode of signal transmission to the secondary station based on the recommendation. 20. The primary station of claim 19, wherein the recommendation comprises the number of antennas or a subset of antennas for the primary station to use when transmitting packet data to the secondary station. 21. The primary station of claim 19, wherein the recommendation comprises a maximum desired number of receivable transmission antennas to be used by the primary station. 22. The primary station of claim 19, wherein the recommendation comprises a transmission format to be used by the primary station. 23. The primary station of claim 18, wherein radio environment information further includes antenna coefficients, and wherein the processor is configured to optimize at least one parameter of antennas of the secondary station based on the antenna coefficients. | A packet data transmission system comprises primary stations (PS) having signal transmitting and receiving means and antennas (PA 1 to PA 4 ) for propagating downlink signals and receiving uplink signals and a plurality of secondary stations (SS) able to roam within the coverage areas of the primary stations. Each secondary station (SS 1 ) has signal transmitting and receiving means, a predetermined number of antennas (SA 1 to SA 4 ), and means for monitoring its radio environment. Information about the radio environment is relayed as an uplink signal to the respective primary station which modifies its mode of transmission of packet data signals. The secondary station in response to the modified mode of transmission of the downlink signals adapts its receiver resources to process the packet data signals and effect cancellation of any interference.1. A method of operating packet data transmission between a primary station and a secondary station, the method comprising:
monitoring, by a secondary station, a radio environment; sending, by the secondary station, radio environment information to the primary station, the radio environment information being indicative of characteristics of a channel transfer function between one or more interference sources and secondary station antennas; and configuring, by the secondary station, receiver resources of the secondary station for processing received data and interference signals based on the radio environment information. 2. The method of claim 1, further comprising transmitting, by the secondary station, a recommendation such that the primary station is enabled to adapt a mode of signal transmission to the secondary station, in accordance with the recommendation. 3. The method of claim 2, wherein the recommendation comprises the number of antennas or a subset of antennas for the primary station to use when transmitting packet data to the secondary station. 4. The method of claim 2, wherein the recommendation comprises a maximum desired number of receivable transmission antennas to be used by the primary station. 5. The method of claim 2, wherein the recommendation comprises a transmission format to be used by the primary station. 6. The method of claim 1, wherein the radio environment information further comprises antenna coefficients which enable the primary station to optimize at least one parameter of antennas of the secondary station. 7. The method of claim 1, further comprising determining, by the secondary station, the resources to be used for receiving packet data and the resources to be used for interference cancellation, and wherein a number of interference sources which can be cancelled by a linear combination of antenna outputs is equal to a number of receiver antennas minus a number of signals to be received from the primary station. 8. The method of claim 1, further comprising monitoring, by the secondary station, a transfer function of paths between antennas of the primary station and the secondary station. 9. The method of claim 1 wherein the level of interference between the pairs of antennas includes interference in channels between pairs of interfering transmitter and receiver antennas. 10. A secondary station configured to be utilized in a packet data transmission system, the secondary station comprising:
a plurality of antennas; and a processor coupled to the plurality of antennas, the processor being configured to:
monitor a radio environment of the packet data transmission system;
transmit a signal including radio environment information to a primary station, the radio environment information being indicative of characteristics of a channel transfer function between one or more interference sources and the secondary station antennas; and
adapt receiver resources of the secondary station for processing received data and interference signals based on the radio environment information. 11. The secondary station of claim 10, wherein the radio environment information further includes antenna coefficients which enable the primary station to optimize at least one parameter of the antennas of the secondary station. 12. The secondary station of claim 10, wherein the processor is configured to determine resources to be used for receiving packet data and resources to be used for interference cancellation, and wherein a number of interference sources which can be cancelled by a linear combination of antenna outputs is equal to a number of receiver antennas minus a number of signals to be received from the primary station. 13. The secondary station of claim 10, wherein the processor is configured to allocate resources for processing the received data and interference by choosing, based on characteristics of the channel transfer functions between interference sources and the plurality of antennas, selected ones of the plurality of antennas for receiving interference signals for interference cancellation. 14. The secondary station of claim 10, wherein the processor is configured to transmit, via one or more of the plurality of antennas, a recommendation such that the primary station is enabled to adapt a mode of signal transmission to the secondary station in accordance with the recommendation. 15. The secondary station of claim 14, wherein the recommendation comprises the number of antennas or a subset of antennas for the primary station to use when transmitting packet data to the secondary station. 16. The secondary station of claim 14, wherein the recommendation comprises a maximum desired number of receivable transmission antennas to be used by the primary station. 17. The secondary station of claim 14, wherein the recommendation comprises a transmission format to be used by the primary station. 18. A primary station configured to be utilized in a packet data transmission system, the primary station comprising:
a plurality of antennas; and a processor coupled to the plurality of antennas, the processor being configured to:
receive a signal including radio environment information from a secondary station, the radio environment information being indicative of characteristics of a channel transfer function between one or more interference sources and secondary station antennas; and
allocate, based on the radio environment information, transmission resources of the plurality of antennas for transmission of communication signals to the secondary station such that the secondary station is enabled to process received data and interference signals based on the radio environment information. 19. The primary station of claim 18, wherein the processor is configured to receive a recommendation from the secondary station, and wherein the processor is configured to adapt a mode of signal transmission to the secondary station based on the recommendation. 20. The primary station of claim 19, wherein the recommendation comprises the number of antennas or a subset of antennas for the primary station to use when transmitting packet data to the secondary station. 21. The primary station of claim 19, wherein the recommendation comprises a maximum desired number of receivable transmission antennas to be used by the primary station. 22. The primary station of claim 19, wherein the recommendation comprises a transmission format to be used by the primary station. 23. The primary station of claim 18, wherein radio environment information further includes antenna coefficients, and wherein the processor is configured to optimize at least one parameter of antennas of the secondary station based on the antenna coefficients. | 2,400 |
7,129 | 7,129 | 14,829,393 | 2,425 | A system and method for providing curated content items is disclosed. According to one embodiment, a method includes selecting a first set of content items from a plurality of available content items provided by a plurality of content provider servers, providing the first set of content items to a second user account included in a subscriber account, the subscriber account including a first user account and the second user account, providing a curation interface to the second user account on a second user portal that displays on a user device, the curation interface displaying information on the first set of content items, receiving a curation instruction that is configured by the second user account via the curation interface, selecting a second set of content items from the first set of content items based upon the curation instruction, and providing the second set of content items to the first user account on a first user portal that displays on the user device. | 1. A method, comprising:
selecting a first set of content items from a plurality of available content items provided by a plurality of content provider servers; providing the first set of content items to a second user account included in a subscriber account, wherein the subscriber account includes a first user account and the second user account; providing a curation interface to the second user account on a second user portal that displays on a user device, wherein the curation interface displays information on the first set of content items; receiving a curation instruction that is configured by the second user account via the curation interface; selecting a second set of content items from the first set of content items based upon the curation instruction; and providing the second set of content items to the first user account on a first user portal that displays on the user device. 2. The method of claim 1, wherein the information on the first set of content items includes a discovery path including content items from the first set of content items selected by the second user account of the subscription account. 3. The method of claim 1, further comprising providing the curation instruction to a plurality of subscriber accounts upon authorization by the second user account of the subscription account. 4. The method of claim 1, further comprising receiving consumption information for the first user account regarding the second set of content items from the user device. 5. The method of claim 4, further comprising providing the consumption information for the first user account to a plurality of subscriber accounts. 6. The method of claim 4, further comprising compiling a playlist of content items from the second set of content items based on the consumption information for the first user account regarding the second set of content items. 7. The method of claim 6, wherein the playlist is configured by the first user account using the first user portal that displays on the user device. 8. The method of claim 7, further comprising providing the playlist to a plurality of subscriber accounts upon authorization by the first user account. 9. The method of claim 4, further comprising providing the consumption information for the first user account to the plurality of content provider servers. 10. The method of claim 9, further comprising providing payment to the plurality of content provider servers based on the consumption information. 11. The method of claim 1, further comprising:
associating the subscriber account with a subscription service mode that is selected by the second user account via the second user portal; and selecting the first set of content items from the plurality of available content items provided by the plurality of content provider servers based on the subscription service mode. 12. The method of claim 1, further comprising recommending one or more of a physical item and a virtual item associated with a content item of the first set of content items for purchase by the first user account on the user device, wherein the virtual item includes a movie, a video, an audio file, an electronic book, and an application. 13. A system, comprising:
a first user portal that displays on a user device, wherein the first user portal provides access to a first user account of a subscriber account; a second user portal that displays on the user device, wherein the second user portal provides access to a second user account of the subscriber account; a content curation analytics engine that
selects a first set of content items from a plurality of available content items provided by a plurality of content provider servers,
provides the first set of content items to the second user account,
provides a curation interface to the second user account on the second user portal, wherein the curation interface displays information on the first set of content items,
receive a curation instruction that is configured by the second user account via the curation interface,
select a second set of content items from the first set of content items based upon the curation instruction, and
provide the second set of content items to the first user account on a first user portal. 14. The system of claim 13, wherein the information on the first set of content items includes a discovery path including content items from the first set of content items selected by the second user account of the subscription account. 15. The system of claim 13, wherein the content curation analytics engine provides the curation instruction to a plurality of subscriber accounts upon authorization by the second user account of the subscription account. 16. The system of claim 13, further comprising a user tracking engine that receives consumption information for the first user account regarding the second set of content items from the user device. 17. The system of claim 16, wherein the content curation analytics engine provides the consumption information for the first user account to a plurality of subscriber accounts. 18. The system of claim 16, wherein the content curation analytics engine compiles a playlist of content items from the second set of content items based on the consumption information for the first user account regarding the second set of content items. 19. The system of claim 18, wherein the playlist is configured by the first user account using the first user portal that displays on the user device. 20. The system of claim 19, wherein the content curation analytics engine provides the playlist to a plurality of subscriber accounts upon authorization by the first user account. 21. The system of claim 16, wherein the content curation analytics engine provides the consumption information for the first user account to the plurality of content provider servers. 22. The system of claim 21, wherein the content curation analytics engine provides payment to the plurality of content provider servers based on the consumption information. 23. The system of claim 13, wherein the content curation analytics engine
associates the subscriber account with a subscription service mode that is selected by the second user account via the second user portal, and selects the first set of content items from the plurality of available content items provided by the plurality of content provider servers based on the subscription service mode. 24. The system of claim 13, wherein the content curation analytics engine recommends one or more of a physical item and a virtual item associated with a content item of the first set of content items for purchase by the first user account on the user device, wherein the virtual item includes a movie, a video, an audio file, an electronic book, and an application. | A system and method for providing curated content items is disclosed. According to one embodiment, a method includes selecting a first set of content items from a plurality of available content items provided by a plurality of content provider servers, providing the first set of content items to a second user account included in a subscriber account, the subscriber account including a first user account and the second user account, providing a curation interface to the second user account on a second user portal that displays on a user device, the curation interface displaying information on the first set of content items, receiving a curation instruction that is configured by the second user account via the curation interface, selecting a second set of content items from the first set of content items based upon the curation instruction, and providing the second set of content items to the first user account on a first user portal that displays on the user device.1. A method, comprising:
selecting a first set of content items from a plurality of available content items provided by a plurality of content provider servers; providing the first set of content items to a second user account included in a subscriber account, wherein the subscriber account includes a first user account and the second user account; providing a curation interface to the second user account on a second user portal that displays on a user device, wherein the curation interface displays information on the first set of content items; receiving a curation instruction that is configured by the second user account via the curation interface; selecting a second set of content items from the first set of content items based upon the curation instruction; and providing the second set of content items to the first user account on a first user portal that displays on the user device. 2. The method of claim 1, wherein the information on the first set of content items includes a discovery path including content items from the first set of content items selected by the second user account of the subscription account. 3. The method of claim 1, further comprising providing the curation instruction to a plurality of subscriber accounts upon authorization by the second user account of the subscription account. 4. The method of claim 1, further comprising receiving consumption information for the first user account regarding the second set of content items from the user device. 5. The method of claim 4, further comprising providing the consumption information for the first user account to a plurality of subscriber accounts. 6. The method of claim 4, further comprising compiling a playlist of content items from the second set of content items based on the consumption information for the first user account regarding the second set of content items. 7. The method of claim 6, wherein the playlist is configured by the first user account using the first user portal that displays on the user device. 8. The method of claim 7, further comprising providing the playlist to a plurality of subscriber accounts upon authorization by the first user account. 9. The method of claim 4, further comprising providing the consumption information for the first user account to the plurality of content provider servers. 10. The method of claim 9, further comprising providing payment to the plurality of content provider servers based on the consumption information. 11. The method of claim 1, further comprising:
associating the subscriber account with a subscription service mode that is selected by the second user account via the second user portal; and selecting the first set of content items from the plurality of available content items provided by the plurality of content provider servers based on the subscription service mode. 12. The method of claim 1, further comprising recommending one or more of a physical item and a virtual item associated with a content item of the first set of content items for purchase by the first user account on the user device, wherein the virtual item includes a movie, a video, an audio file, an electronic book, and an application. 13. A system, comprising:
a first user portal that displays on a user device, wherein the first user portal provides access to a first user account of a subscriber account; a second user portal that displays on the user device, wherein the second user portal provides access to a second user account of the subscriber account; a content curation analytics engine that
selects a first set of content items from a plurality of available content items provided by a plurality of content provider servers,
provides the first set of content items to the second user account,
provides a curation interface to the second user account on the second user portal, wherein the curation interface displays information on the first set of content items,
receive a curation instruction that is configured by the second user account via the curation interface,
select a second set of content items from the first set of content items based upon the curation instruction, and
provide the second set of content items to the first user account on a first user portal. 14. The system of claim 13, wherein the information on the first set of content items includes a discovery path including content items from the first set of content items selected by the second user account of the subscription account. 15. The system of claim 13, wherein the content curation analytics engine provides the curation instruction to a plurality of subscriber accounts upon authorization by the second user account of the subscription account. 16. The system of claim 13, further comprising a user tracking engine that receives consumption information for the first user account regarding the second set of content items from the user device. 17. The system of claim 16, wherein the content curation analytics engine provides the consumption information for the first user account to a plurality of subscriber accounts. 18. The system of claim 16, wherein the content curation analytics engine compiles a playlist of content items from the second set of content items based on the consumption information for the first user account regarding the second set of content items. 19. The system of claim 18, wherein the playlist is configured by the first user account using the first user portal that displays on the user device. 20. The system of claim 19, wherein the content curation analytics engine provides the playlist to a plurality of subscriber accounts upon authorization by the first user account. 21. The system of claim 16, wherein the content curation analytics engine provides the consumption information for the first user account to the plurality of content provider servers. 22. The system of claim 21, wherein the content curation analytics engine provides payment to the plurality of content provider servers based on the consumption information. 23. The system of claim 13, wherein the content curation analytics engine
associates the subscriber account with a subscription service mode that is selected by the second user account via the second user portal, and selects the first set of content items from the plurality of available content items provided by the plurality of content provider servers based on the subscription service mode. 24. The system of claim 13, wherein the content curation analytics engine recommends one or more of a physical item and a virtual item associated with a content item of the first set of content items for purchase by the first user account on the user device, wherein the virtual item includes a movie, a video, an audio file, an electronic book, and an application. | 2,400 |
7,130 | 7,130 | 14,533,151 | 2,488 | A moving picture encoding method for increasing coding efficiency includes: determining whether or not to apply orthogonal transformation, to calculate a value of an orthogonal transform skip flag; performing the orthogonal transformation on a prediction residual according to the value of the orthogonal transform skip flag, to calculate at least one orthogonal transform coefficient; performing quantization on at least the one orthogonal transform coefficient, to calculate at least one quantized coefficient; performing variable-length encoding on the orthogonal transform skip flag; and changing a scan order for at least the one quantized coefficient according to the value of the orthogonal transform skip flag, and performing variable-length encoding on at least the one quantized coefficient in the scan order after the change. | 1. A moving picture encoding method for encoding a moving picture per block, the moving picture encoding method comprising:
generating a prediction image of a current block to be encoded, using a reference block that is adjacent to the current block or included in a reference picture different from a current picture to be encoded, and generating a prediction residual which is a difference between the current block and the prediction image; determining whether or not to apply transformation to the prediction residual; performing the transformation on the prediction residual according to a result of the determining, to derive transform coefficients; performing quantization on the transform coefficients to derive quantized coefficients; encoding a transform skip flag indicating the result of the determining; and encoding the quantized coefficients either in a first scan order when the result of the determining indicates to apply the transformation or a second scan order when the result of the determining indicates not to apply the transformation, the second scan order being different from the first scan order. 2. The moving picture encoding method according to claim 1,
wherein the encoding of the transform skip flag further includes setting the transform skip flag to a value of 1 when the result of the determining indicates not to apply the transformation, and wherein the encoding of the quantized coefficients further includes encoding the quantized coefficients sequentially along a horizontal direction as the second scan order when the transform skip flag has the value of 1 and the prediction image is generated by intra prediction in a horizontal prediction direction. 3. The moving picture encoding method according to claim 1,
wherein the encoding of the transform skip flag further includes setting the transform skip flag to a value of 1 when the result of the determining indicates not to apply the transformation, and wherein the encoding of the quantized coefficients further includes encoding the quantized coefficients sequentially along a vertical direction as the second scan order when the transform skip flag has the value of 1 and the prediction image is generated by intra prediction in a vertical prediction direction. 4. The moving picture encoding method according to claim 1,
wherein in the encoding of the transform skip flag, the transform skip flag is encoded only when the prediction image is generated by intra prediction and the transformation is on a 4 by 4 size basis. 5. The moving picture encoding method according to claim 1,
wherein in the performing of the quantization, the transform coefficients are quantized according to the result of the determining. 6. The moving picture encoding method according to claim 5,
wherein when the result of the determining indicates not to apply the transformation, the transform coefficients are quantized without using a quantization matrix in the performing of the quantization. 7. A moving picture decoding method for decoding a moving picture in an encoded bitstream per block, the moving picture decoding method comprising:
decoding a transform skip flag indicating whether or not to apply inverse transformation to a current block to be decoded; decoding quantized coefficients included in the current block, either in a first scan order when the transform skip flag indicates to apply the inverse transformation or a second scan order when the transform skip flag indicates not to apply the inverse transformation, the second scan order being different from the first scan order; performing inverse quantization on the decoded quantized coefficients, to derive inverse quantized coefficients; performing inverse transformation on the inverse quantized coefficients according to a value of the transform skip flag, to obtain a prediction residual of the current block; and generating a prediction image of the current block using a reference block that is adjacent to the current block or included in a reference picture different from a current picture to be decoded, and generating a reconstructed image by adding up the prediction residual and the prediction image. 8. The moving picture decoding method according to claim 7,
wherein the decoding of the quantized coefficients further includes decoding the quantized coefficients sequentially along a horizontal direction as the second scan order when the transform skip flag has a value of 1 and the prediction image is generated by intra prediction in a horizontal prediction direction. 9. The moving picture decoding method according to claim 7,
wherein the decoding of the quantized coefficients further includes decoding the quantized coefficients sequentially along a vertical direction as the second scan order when the transform skip flag has a value of 1 and the prediction image is generated by intra prediction in a vertical prediction direction. 10. The moving picture decoding method according to claim 7,
wherein in the decoding of the transform skip flag, the transform skip flag is decoded only when the prediction image is generated by intra prediction and the inverse transformation is on a 4 by 4 size basis. 11. The moving picture decoding method according to claim 7,
wherein in the performing of the inverse quantization, the decoded quantized coefficients are inversely quantized according to the value of the transform skip flag. 12. The moving picture decoding method according to claim 11,
wherein in the performing of the inverse quantization, the quantized coefficients are inversely quantized without use of a quantization matrix when the transform skip flag has a value of 1. 13. A moving picture encoding apparatus that encodes a moving picture per block, the moving picture encoding apparatus comprising:
processing circuitry; and storage connected to the processing circuitry, wherein the processing circuitry encodes the moving picture per block by executing the steps of: generating a prediction image of a current block to be encoded, using a reference block that is held in the storage and adjacent to the current block or included in a reference picture different from a current picture to be encoded, and generating a prediction residual which is a difference between the current block and the prediction image; determining whether or not to apply transformation to the prediction residual; performing the transformation on the prediction residual according to a result of the determining, to derive transform coefficients; performing quantization on the transform coefficients to derive quantized coefficients; encoding a transform skip flag indicating the result of the determining; and encoding the quantized coefficients either in a first scan order when the result of the determining indicates to apply the transformation or a second scan order when the result of the determining indicates not to apply the transformation, the second scan order being different from the first scan order. 14. A moving picture decoding apparatus that decodes a moving picture in an encoded bitstream per block, the moving picture decoding apparatus comprising:
processing circuitry; and storage connected to the processing circuitry, wherein the processing circuitry decodes the moving picture by executing the steps of: decoding a transform skip flag indicating whether or not to apply inverse transformation to a current block to be decoded; decoding quantized coefficients included in the current block, either in a first scan order when the transform skip flag indicates to apply the inverse transformation or a second scan order when the transform skip flag indicates not to apply the inverse transformation, the second scan order being different from the first scan order; performing inverse quantization on the decoded quantized coefficients, to derive inverse quantized coefficients; performing inverse transformation on the inverse quantized coefficients according to a value of the transform skip flag, to obtain a prediction residual of the current block; and generating a prediction image of the current block using a reference block that is held in the storage and adjacent to the current block or included in a reference picture different from a current picture to be decoded, and generating a reconstructed image by adding up the prediction residual and the prediction image. | A moving picture encoding method for increasing coding efficiency includes: determining whether or not to apply orthogonal transformation, to calculate a value of an orthogonal transform skip flag; performing the orthogonal transformation on a prediction residual according to the value of the orthogonal transform skip flag, to calculate at least one orthogonal transform coefficient; performing quantization on at least the one orthogonal transform coefficient, to calculate at least one quantized coefficient; performing variable-length encoding on the orthogonal transform skip flag; and changing a scan order for at least the one quantized coefficient according to the value of the orthogonal transform skip flag, and performing variable-length encoding on at least the one quantized coefficient in the scan order after the change.1. A moving picture encoding method for encoding a moving picture per block, the moving picture encoding method comprising:
generating a prediction image of a current block to be encoded, using a reference block that is adjacent to the current block or included in a reference picture different from a current picture to be encoded, and generating a prediction residual which is a difference between the current block and the prediction image; determining whether or not to apply transformation to the prediction residual; performing the transformation on the prediction residual according to a result of the determining, to derive transform coefficients; performing quantization on the transform coefficients to derive quantized coefficients; encoding a transform skip flag indicating the result of the determining; and encoding the quantized coefficients either in a first scan order when the result of the determining indicates to apply the transformation or a second scan order when the result of the determining indicates not to apply the transformation, the second scan order being different from the first scan order. 2. The moving picture encoding method according to claim 1,
wherein the encoding of the transform skip flag further includes setting the transform skip flag to a value of 1 when the result of the determining indicates not to apply the transformation, and wherein the encoding of the quantized coefficients further includes encoding the quantized coefficients sequentially along a horizontal direction as the second scan order when the transform skip flag has the value of 1 and the prediction image is generated by intra prediction in a horizontal prediction direction. 3. The moving picture encoding method according to claim 1,
wherein the encoding of the transform skip flag further includes setting the transform skip flag to a value of 1 when the result of the determining indicates not to apply the transformation, and wherein the encoding of the quantized coefficients further includes encoding the quantized coefficients sequentially along a vertical direction as the second scan order when the transform skip flag has the value of 1 and the prediction image is generated by intra prediction in a vertical prediction direction. 4. The moving picture encoding method according to claim 1,
wherein in the encoding of the transform skip flag, the transform skip flag is encoded only when the prediction image is generated by intra prediction and the transformation is on a 4 by 4 size basis. 5. The moving picture encoding method according to claim 1,
wherein in the performing of the quantization, the transform coefficients are quantized according to the result of the determining. 6. The moving picture encoding method according to claim 5,
wherein when the result of the determining indicates not to apply the transformation, the transform coefficients are quantized without using a quantization matrix in the performing of the quantization. 7. A moving picture decoding method for decoding a moving picture in an encoded bitstream per block, the moving picture decoding method comprising:
decoding a transform skip flag indicating whether or not to apply inverse transformation to a current block to be decoded; decoding quantized coefficients included in the current block, either in a first scan order when the transform skip flag indicates to apply the inverse transformation or a second scan order when the transform skip flag indicates not to apply the inverse transformation, the second scan order being different from the first scan order; performing inverse quantization on the decoded quantized coefficients, to derive inverse quantized coefficients; performing inverse transformation on the inverse quantized coefficients according to a value of the transform skip flag, to obtain a prediction residual of the current block; and generating a prediction image of the current block using a reference block that is adjacent to the current block or included in a reference picture different from a current picture to be decoded, and generating a reconstructed image by adding up the prediction residual and the prediction image. 8. The moving picture decoding method according to claim 7,
wherein the decoding of the quantized coefficients further includes decoding the quantized coefficients sequentially along a horizontal direction as the second scan order when the transform skip flag has a value of 1 and the prediction image is generated by intra prediction in a horizontal prediction direction. 9. The moving picture decoding method according to claim 7,
wherein the decoding of the quantized coefficients further includes decoding the quantized coefficients sequentially along a vertical direction as the second scan order when the transform skip flag has a value of 1 and the prediction image is generated by intra prediction in a vertical prediction direction. 10. The moving picture decoding method according to claim 7,
wherein in the decoding of the transform skip flag, the transform skip flag is decoded only when the prediction image is generated by intra prediction and the inverse transformation is on a 4 by 4 size basis. 11. The moving picture decoding method according to claim 7,
wherein in the performing of the inverse quantization, the decoded quantized coefficients are inversely quantized according to the value of the transform skip flag. 12. The moving picture decoding method according to claim 11,
wherein in the performing of the inverse quantization, the quantized coefficients are inversely quantized without use of a quantization matrix when the transform skip flag has a value of 1. 13. A moving picture encoding apparatus that encodes a moving picture per block, the moving picture encoding apparatus comprising:
processing circuitry; and storage connected to the processing circuitry, wherein the processing circuitry encodes the moving picture per block by executing the steps of: generating a prediction image of a current block to be encoded, using a reference block that is held in the storage and adjacent to the current block or included in a reference picture different from a current picture to be encoded, and generating a prediction residual which is a difference between the current block and the prediction image; determining whether or not to apply transformation to the prediction residual; performing the transformation on the prediction residual according to a result of the determining, to derive transform coefficients; performing quantization on the transform coefficients to derive quantized coefficients; encoding a transform skip flag indicating the result of the determining; and encoding the quantized coefficients either in a first scan order when the result of the determining indicates to apply the transformation or a second scan order when the result of the determining indicates not to apply the transformation, the second scan order being different from the first scan order. 14. A moving picture decoding apparatus that decodes a moving picture in an encoded bitstream per block, the moving picture decoding apparatus comprising:
processing circuitry; and storage connected to the processing circuitry, wherein the processing circuitry decodes the moving picture by executing the steps of: decoding a transform skip flag indicating whether or not to apply inverse transformation to a current block to be decoded; decoding quantized coefficients included in the current block, either in a first scan order when the transform skip flag indicates to apply the inverse transformation or a second scan order when the transform skip flag indicates not to apply the inverse transformation, the second scan order being different from the first scan order; performing inverse quantization on the decoded quantized coefficients, to derive inverse quantized coefficients; performing inverse transformation on the inverse quantized coefficients according to a value of the transform skip flag, to obtain a prediction residual of the current block; and generating a prediction image of the current block using a reference block that is held in the storage and adjacent to the current block or included in a reference picture different from a current picture to be decoded, and generating a reconstructed image by adding up the prediction residual and the prediction image. | 2,400 |
7,131 | 7,131 | 13,912,989 | 2,456 | A system for delivering content, such as video content, via a network. In an illustrative embodiment, the system includes a server system that is connected to the network and has access to the content. A client system is adapted to forward a request for the content to the server system via the network. One or more content-delivery routines in communication with the server system are adapted to initiate sending of the content to the client system via multiple streams over the network in response to the request. | 1.-47. (canceled) 48. A method for downloading digital content to a user of a client system from a server system in response to a request by the user for the digital content, the method comprising:
authenticating the user; and initiating download of the digital content from the server system to the client system via a best-effort network using a protocol determined by a protocol handling module within the client system, the protocol comprising:
initializing a plurality of communication streams from the server system through the network to the client system, the plurality of communication streams including a control stream, a chapter stream and a plurality of data content streams, the data content streams being configured to carry the requested digital content;
monitoring at least one of network performance, network latency, and transmission progress of the requested digital content; and
adjusting, via the control stream, download parameters of the data content streams in response to the monitoring. 49. The method of claim 48, wherein the adjusting comprises adjusting the number of data streams carrying the requested digital content. 50. The method of claim 48 wherein the adjusting stabilizes a transfer rate of the requested digital content from the server system to the client system. 51. The method of claim 50 wherein the stabilized transfer rate is determined by a target transfer rate of the requested digital content and a target fluctuation of the target transfer rate of the requested digital content. 52. The method of claim 48 wherein the protocol further comprises initiating a video menu stream, configured to carry data from the server system to the client system independently of the data content streams carrying the requested digital data. 53. The method of claim 48 wherein the step of initializing download occurs immediately following the step of authenticating the user. 54. The method of claim 48, further comprising, between the step of authenticating the user and the step of initializing download, providing a video-menu interface to the user, the video-menu interface providing an option to select one or more custom video menus, each custom video menu being associated with a custom-menu data stream, each custom-menu data stream being configured to carry data bi-directionally between the server system and the client system. 55. An apparatus for downloading digital content to a user of a client system from a server system in response to a request by the user for the digital content comprising:
a processor; a processor-readable storage device including instructions executable by the processor for:
authenticating the user; and
initiating download of the digital content from the server system to the client system via a best-effort network using a protocol determined by a protocol handling module within the client system, the protocol comprising:
initializing a plurality of communication streams from the server system through the network to the client system, the plurality of communication streams including a control stream, a chapter stream and a plurality of data content streams, the data content streams being configured to carry the requested digital content;
monitoring at least one of network performance, network latency, and transmission progress of the requested digital content; and
adjusting, via the control stream, download parameters of the data content streams in response to the monitoring. 56. A non-transitory computer readable medium including instructions executable by a processor to download digital content to a user of a client system from a server system in response to a request by the user for the digital content, the medium comprising one or more instructions for:
authenticating the user; and initiating download of the digital content from the server system to the client system via a best-effort network using a protocol determined by a protocol handling module within the client system, the protocol comprising:
initializing a plurality of communication streams from the server system through the network to the client system, the plurality of communication streams including a control stream, a chapter stream and a plurality of data content streams, the data content streams being configured to carry the requested digital content;
monitoring at least one of network performance, network latency, and transmission progress of the requested digital content; and
adjusting, via the control stream, download parameters of the data content streams in response to the monitoring. | A system for delivering content, such as video content, via a network. In an illustrative embodiment, the system includes a server system that is connected to the network and has access to the content. A client system is adapted to forward a request for the content to the server system via the network. One or more content-delivery routines in communication with the server system are adapted to initiate sending of the content to the client system via multiple streams over the network in response to the request.1.-47. (canceled) 48. A method for downloading digital content to a user of a client system from a server system in response to a request by the user for the digital content, the method comprising:
authenticating the user; and initiating download of the digital content from the server system to the client system via a best-effort network using a protocol determined by a protocol handling module within the client system, the protocol comprising:
initializing a plurality of communication streams from the server system through the network to the client system, the plurality of communication streams including a control stream, a chapter stream and a plurality of data content streams, the data content streams being configured to carry the requested digital content;
monitoring at least one of network performance, network latency, and transmission progress of the requested digital content; and
adjusting, via the control stream, download parameters of the data content streams in response to the monitoring. 49. The method of claim 48, wherein the adjusting comprises adjusting the number of data streams carrying the requested digital content. 50. The method of claim 48 wherein the adjusting stabilizes a transfer rate of the requested digital content from the server system to the client system. 51. The method of claim 50 wherein the stabilized transfer rate is determined by a target transfer rate of the requested digital content and a target fluctuation of the target transfer rate of the requested digital content. 52. The method of claim 48 wherein the protocol further comprises initiating a video menu stream, configured to carry data from the server system to the client system independently of the data content streams carrying the requested digital data. 53. The method of claim 48 wherein the step of initializing download occurs immediately following the step of authenticating the user. 54. The method of claim 48, further comprising, between the step of authenticating the user and the step of initializing download, providing a video-menu interface to the user, the video-menu interface providing an option to select one or more custom video menus, each custom video menu being associated with a custom-menu data stream, each custom-menu data stream being configured to carry data bi-directionally between the server system and the client system. 55. An apparatus for downloading digital content to a user of a client system from a server system in response to a request by the user for the digital content comprising:
a processor; a processor-readable storage device including instructions executable by the processor for:
authenticating the user; and
initiating download of the digital content from the server system to the client system via a best-effort network using a protocol determined by a protocol handling module within the client system, the protocol comprising:
initializing a plurality of communication streams from the server system through the network to the client system, the plurality of communication streams including a control stream, a chapter stream and a plurality of data content streams, the data content streams being configured to carry the requested digital content;
monitoring at least one of network performance, network latency, and transmission progress of the requested digital content; and
adjusting, via the control stream, download parameters of the data content streams in response to the monitoring. 56. A non-transitory computer readable medium including instructions executable by a processor to download digital content to a user of a client system from a server system in response to a request by the user for the digital content, the medium comprising one or more instructions for:
authenticating the user; and initiating download of the digital content from the server system to the client system via a best-effort network using a protocol determined by a protocol handling module within the client system, the protocol comprising:
initializing a plurality of communication streams from the server system through the network to the client system, the plurality of communication streams including a control stream, a chapter stream and a plurality of data content streams, the data content streams being configured to carry the requested digital content;
monitoring at least one of network performance, network latency, and transmission progress of the requested digital content; and
adjusting, via the control stream, download parameters of the data content streams in response to the monitoring. | 2,400 |
7,132 | 7,132 | 13,706,962 | 2,465 | A method for providing a communication service includes detecting an initiated communication initiated by a communications device with a processor and a memory. Environmental data for an environment of the communications device is identified based on detecting the initiated communication. The environmental data is used to supplement a communication service requested by the initiated communication. | 1. A method for providing a communication service, comprising:
detecting an initiated communication initiated to a remote recipient over a wireless network by a communications device with a processor and a memory; and identifying environmental data for an environment of the communications device, based on detecting the initiated communication initiated to the remote recipient over the wireless network, wherein the environmental data is used to supplement an interactive communication service provided by the remote recipient of the initiated communication and requested by the initiated communication. 2. The method according to claim 1,
wherein the initiated communication is a telephone call over a first channel, and wherein the environmental data is sent for use by the communication service over a second channel. 3. The method according to claim 2,
wherein the environmental data is identified during a call setup of the telephone call. 4. The method according to claim 2,
wherein the second channel is a data channel. 5. The method according to claim 2,
wherein the communications device is used for both the telephone call and for sending the environmental data. 6. The method according to claim 1,
wherein the initiated communication is to an agent system that provides the communication service. 7. The method according to claim 1,
wherein the environmental data is obtained before the initiated communication is initiated. 8. The method according to claim 1,
wherein the environmental data is obtained based on a trigger. 9. The method according to claim 8,
wherein the environmental data that is obtained is obtained based on the trigger before the communication is initiated. 10. The method according to claim 1,
wherein the environmental data is obtained after the initiated communication is initiated and before a human agent joins the communication to provide the communication service. 11. The method according to claim 1, further comprising:
identifying additional environmental data for the environment of the communications device during the communication; and using the additional environmental data to update the environmental data used to supplement the communication service. 12. The method according to claim 1,
wherein the environmental data includes an air temperature of air in an indoor environment of the communications device and an air temperature of air in an outdoor environment outside of the indoor environment of the communications device. 13. The method according to claim 1,
wherein the environmental data is obtained by the communications device from a secondary device in the environment of the communications device. 14. The method according to claim 13,
wherein the secondary device is a medical monitor. 15. The method according to claim 1,
wherein a communication service script used to provide the communication service is modified based on the environmental data. 16. The method according to claim 1,
wherein the environmental data includes a location of the communications device, and wherein a communication service script used to provide the communication service is updated based on information known for the location of the communications device. 17. The method according to claim 1,
wherein the environmental data is detected by the communications device using a first application running on the communications device, and the environmental data is obtained originally by a second application running on the communications device. 18. The method according to claim 1,
wherein a type of the environmental data identified is selected in accordance with an input address input to the communications device to initiate the communication. 19. A system for providing a communication service, the system comprising:
a memory that stores a plurality of executable instructions; a processor that executes the plurality of executable instructions; wherein, when executed by the processor, the plurality of executable instructions cause the system to perform operations comprising:
detecting an initiated communication initiated to a remote recipient over a wireless network by a communications device; and
identifying environmental data for an environment of the communications device, based on detecting the initiated communication initiated to the remote recipient over the wireless network, and
wherein the environmental data is used to supplement an interactive communication service provided by the remote recipient of the initiated communication and requested by the initiated communication. 20. A computer readable storage medium that stores a plurality of executable instructions that, when executed by a processor of a computer system, cause the computer system to perform operations comprising:
detecting an initiated communication initiated to a remote recipient over a wireless network by a communications device with a processor and a memory; and identifying environmental data for an environment of the communications device, based on detecting the initiated communication initiated to the remote recipient over the wireless network, wherein the environmental data is used to supplement an interactive communication service provided by the remote recipient of the initiated communication and requested by the initiated communication. | A method for providing a communication service includes detecting an initiated communication initiated by a communications device with a processor and a memory. Environmental data for an environment of the communications device is identified based on detecting the initiated communication. The environmental data is used to supplement a communication service requested by the initiated communication.1. A method for providing a communication service, comprising:
detecting an initiated communication initiated to a remote recipient over a wireless network by a communications device with a processor and a memory; and identifying environmental data for an environment of the communications device, based on detecting the initiated communication initiated to the remote recipient over the wireless network, wherein the environmental data is used to supplement an interactive communication service provided by the remote recipient of the initiated communication and requested by the initiated communication. 2. The method according to claim 1,
wherein the initiated communication is a telephone call over a first channel, and wherein the environmental data is sent for use by the communication service over a second channel. 3. The method according to claim 2,
wherein the environmental data is identified during a call setup of the telephone call. 4. The method according to claim 2,
wherein the second channel is a data channel. 5. The method according to claim 2,
wherein the communications device is used for both the telephone call and for sending the environmental data. 6. The method according to claim 1,
wherein the initiated communication is to an agent system that provides the communication service. 7. The method according to claim 1,
wherein the environmental data is obtained before the initiated communication is initiated. 8. The method according to claim 1,
wherein the environmental data is obtained based on a trigger. 9. The method according to claim 8,
wherein the environmental data that is obtained is obtained based on the trigger before the communication is initiated. 10. The method according to claim 1,
wherein the environmental data is obtained after the initiated communication is initiated and before a human agent joins the communication to provide the communication service. 11. The method according to claim 1, further comprising:
identifying additional environmental data for the environment of the communications device during the communication; and using the additional environmental data to update the environmental data used to supplement the communication service. 12. The method according to claim 1,
wherein the environmental data includes an air temperature of air in an indoor environment of the communications device and an air temperature of air in an outdoor environment outside of the indoor environment of the communications device. 13. The method according to claim 1,
wherein the environmental data is obtained by the communications device from a secondary device in the environment of the communications device. 14. The method according to claim 13,
wherein the secondary device is a medical monitor. 15. The method according to claim 1,
wherein a communication service script used to provide the communication service is modified based on the environmental data. 16. The method according to claim 1,
wherein the environmental data includes a location of the communications device, and wherein a communication service script used to provide the communication service is updated based on information known for the location of the communications device. 17. The method according to claim 1,
wherein the environmental data is detected by the communications device using a first application running on the communications device, and the environmental data is obtained originally by a second application running on the communications device. 18. The method according to claim 1,
wherein a type of the environmental data identified is selected in accordance with an input address input to the communications device to initiate the communication. 19. A system for providing a communication service, the system comprising:
a memory that stores a plurality of executable instructions; a processor that executes the plurality of executable instructions; wherein, when executed by the processor, the plurality of executable instructions cause the system to perform operations comprising:
detecting an initiated communication initiated to a remote recipient over a wireless network by a communications device; and
identifying environmental data for an environment of the communications device, based on detecting the initiated communication initiated to the remote recipient over the wireless network, and
wherein the environmental data is used to supplement an interactive communication service provided by the remote recipient of the initiated communication and requested by the initiated communication. 20. A computer readable storage medium that stores a plurality of executable instructions that, when executed by a processor of a computer system, cause the computer system to perform operations comprising:
detecting an initiated communication initiated to a remote recipient over a wireless network by a communications device with a processor and a memory; and identifying environmental data for an environment of the communications device, based on detecting the initiated communication initiated to the remote recipient over the wireless network, wherein the environmental data is used to supplement an interactive communication service provided by the remote recipient of the initiated communication and requested by the initiated communication. | 2,400 |
7,133 | 7,133 | 13,923,098 | 2,486 | Aspects of the subject disclosure are directed towards saving resources such as energy, computing, and communication by capturing evaluation (e.g., low-resolution) images periodically or otherwise, such as in a continuous mobile vision system, and processing each evaluation to determine whether a likely event is present that warrants capturing another (e.g., higher-resolution) image for further image processing. In one aspect, only the region or regions of interest of the high-resolution image is provided to an image processing algorithm for further image processing. Also described is the use of infrared sensing, such as to determine whether an image/event location/region of interest includes thermal data indicative of human features. | 1. A method, comprising, processing first data of a first set of pixels corresponding to an evaluation image captured by a gating sensor to determine whether to activate a gated sensor, and if so activating the gated sensor to obtain an image set comprising one or more images, in which a field of view of the gated sensor overlaps a field of view of the gating sensor. 2. The method of claim 1 wherein processing the first data of the first set of pixels corresponding to the evaluation image comprises determining that the gated sensor is to be activated, and wherein activating the gated sensor to obtain the image set comprises capturing another evaluation image to determine whether to activate another gated sensor. 3. The method of claim 1 wherein the gated sensor is a higher resolution sensor relative to the gating sensor, wherein processing the first data of the first set of pixels corresponding to the evaluation image comprises determining that one or more regions of interest exist and that the gated sensor is to be activated, and wherein activating the gated sensor to obtain the image set comprises capturing the one or more regions of interest in the image set. 4. The method of claim 3 wherein capturing the image set comprises capturing a full image at higher resolution, and further comprising, cropping the full image into at least one cropped image. 5. The method of claim 3 wherein capturing the image set comprises image comprises controlling the higher resolution sensor to capture at least one window within a larger field of view. 6. The method of claim 1 wherein the gated sensor is an infrared sensor, and wherein activating the gated sensor to obtain the image set comprises capturing an image representative of temperature data for processing to determine whether a region of interest exists, or to determine whether human features exist, or both to determine whether a region of interest exists and to determine whether human features exist. 7. The method of claim 1 wherein the gating sensor comprises an infrared sensor. 8. The method of claim 7 wherein processing the first data of the first set of pixels corresponding to the evaluation image comprises determining that one or human features exist and that the gated sensor is to be activated, and wherein activating the gated sensor to obtain the image set comprises capturing at least one of: an infrared image set, a color image set, a monochrome image set, an actively illuminated infrared image set, an actively illuminated color image set, or a depth image set. 9. The method of claim 1 wherein the first set of pixels corresponds to a first set of pixel sensors co-located with other pixel sensors, and further comprising, capturing the data of the first set of pixels by energizing the first set of pixel sensors while not energizing at least some of the other pixel sensors. 10. A system comprising, a first sensor array configured to capture evaluation images, a second sensor array configured to capture another image set comprising one or more images, and a controller, the controller configured to process an evaluation image to determine if one or more region-of-interest criteria are met, including whether a region of interest is present within the evaluation image, and if the one or more region-of-interest criteria are met, the controller further configured to control the second sensor array to capture the other image set. 11. The system of claim 10 wherein the first sensor and the second sensor are co-located. 12. The system of claim 10 wherein the first sensor has light directed thereto by a first lens mechanism, and wherein and the second sensor has light directed thereto by a second lens mechanism. 13. The system of claim 10 wherein the one or more region-of-interest criteria include whether thermal data indicates one or more human features are within the image. 14. The system of claim 13 wherein the thermal data is sensed by a thermopile-based far infrared image sensor mechanism. 15. The system of claim 14 wherein the first sensor pixel array, the second sensor pixel array and the thermopile-based far infrared image sensor mechanism are co-located. 16. The system of claim 10 wherein the second sensor comprises an array of pixel sensors having windowing capability that captures a specified area or areas within a field of view. 17. The system of claim 10 wherein the first sensor array and the second sensor array are incorporated into a wearable device. 18. One or more controller logic or machine-readable media having executable instructions, which when executed perform steps, comprising:
(a) obtaining a first evaluation image; (b) processing the first evaluation image to determine whether the first evaluation image meets a first criterion, and if not, returning to step (a); (c) obtaining a second evaluation image and processing the second evaluation image to determine whether the second evaluation image meets a second criterion, and if not, returning to step (a); (d) obtaining an image set comprising at least one image; and (e) providing at least part of the image set to an image processor. 19. The one or more controller logic or machine-readable media of claim 18 wherein:
(a) obtaining the first evaluation image comprises obtaining an infrared image and obtaining the second evaluation image comprises obtaining a color image; or
(b) obtaining the first evaluation image comprises obtaining a color image and capturing the second evaluation image comprises obtaining an infrared image; or
(c) obtaining the first evaluation image comprises obtaining a depth image and capturing the second evaluation image comprises obtaining an infrared image; or
(d) obtaining the first evaluation image comprises obtaining a depth image and capturing the second evaluation image comprises obtaining a color image. 20. The one or more controller logic or machine-readable media of claim 18 wherein obtaining an image set comprises, capturing a higher-resolution color image, a higher-resolution infrared, or a higher-resolution depth image. | Aspects of the subject disclosure are directed towards saving resources such as energy, computing, and communication by capturing evaluation (e.g., low-resolution) images periodically or otherwise, such as in a continuous mobile vision system, and processing each evaluation to determine whether a likely event is present that warrants capturing another (e.g., higher-resolution) image for further image processing. In one aspect, only the region or regions of interest of the high-resolution image is provided to an image processing algorithm for further image processing. Also described is the use of infrared sensing, such as to determine whether an image/event location/region of interest includes thermal data indicative of human features.1. A method, comprising, processing first data of a first set of pixels corresponding to an evaluation image captured by a gating sensor to determine whether to activate a gated sensor, and if so activating the gated sensor to obtain an image set comprising one or more images, in which a field of view of the gated sensor overlaps a field of view of the gating sensor. 2. The method of claim 1 wherein processing the first data of the first set of pixels corresponding to the evaluation image comprises determining that the gated sensor is to be activated, and wherein activating the gated sensor to obtain the image set comprises capturing another evaluation image to determine whether to activate another gated sensor. 3. The method of claim 1 wherein the gated sensor is a higher resolution sensor relative to the gating sensor, wherein processing the first data of the first set of pixels corresponding to the evaluation image comprises determining that one or more regions of interest exist and that the gated sensor is to be activated, and wherein activating the gated sensor to obtain the image set comprises capturing the one or more regions of interest in the image set. 4. The method of claim 3 wherein capturing the image set comprises capturing a full image at higher resolution, and further comprising, cropping the full image into at least one cropped image. 5. The method of claim 3 wherein capturing the image set comprises image comprises controlling the higher resolution sensor to capture at least one window within a larger field of view. 6. The method of claim 1 wherein the gated sensor is an infrared sensor, and wherein activating the gated sensor to obtain the image set comprises capturing an image representative of temperature data for processing to determine whether a region of interest exists, or to determine whether human features exist, or both to determine whether a region of interest exists and to determine whether human features exist. 7. The method of claim 1 wherein the gating sensor comprises an infrared sensor. 8. The method of claim 7 wherein processing the first data of the first set of pixels corresponding to the evaluation image comprises determining that one or human features exist and that the gated sensor is to be activated, and wherein activating the gated sensor to obtain the image set comprises capturing at least one of: an infrared image set, a color image set, a monochrome image set, an actively illuminated infrared image set, an actively illuminated color image set, or a depth image set. 9. The method of claim 1 wherein the first set of pixels corresponds to a first set of pixel sensors co-located with other pixel sensors, and further comprising, capturing the data of the first set of pixels by energizing the first set of pixel sensors while not energizing at least some of the other pixel sensors. 10. A system comprising, a first sensor array configured to capture evaluation images, a second sensor array configured to capture another image set comprising one or more images, and a controller, the controller configured to process an evaluation image to determine if one or more region-of-interest criteria are met, including whether a region of interest is present within the evaluation image, and if the one or more region-of-interest criteria are met, the controller further configured to control the second sensor array to capture the other image set. 11. The system of claim 10 wherein the first sensor and the second sensor are co-located. 12. The system of claim 10 wherein the first sensor has light directed thereto by a first lens mechanism, and wherein and the second sensor has light directed thereto by a second lens mechanism. 13. The system of claim 10 wherein the one or more region-of-interest criteria include whether thermal data indicates one or more human features are within the image. 14. The system of claim 13 wherein the thermal data is sensed by a thermopile-based far infrared image sensor mechanism. 15. The system of claim 14 wherein the first sensor pixel array, the second sensor pixel array and the thermopile-based far infrared image sensor mechanism are co-located. 16. The system of claim 10 wherein the second sensor comprises an array of pixel sensors having windowing capability that captures a specified area or areas within a field of view. 17. The system of claim 10 wherein the first sensor array and the second sensor array are incorporated into a wearable device. 18. One or more controller logic or machine-readable media having executable instructions, which when executed perform steps, comprising:
(a) obtaining a first evaluation image; (b) processing the first evaluation image to determine whether the first evaluation image meets a first criterion, and if not, returning to step (a); (c) obtaining a second evaluation image and processing the second evaluation image to determine whether the second evaluation image meets a second criterion, and if not, returning to step (a); (d) obtaining an image set comprising at least one image; and (e) providing at least part of the image set to an image processor. 19. The one or more controller logic or machine-readable media of claim 18 wherein:
(a) obtaining the first evaluation image comprises obtaining an infrared image and obtaining the second evaluation image comprises obtaining a color image; or
(b) obtaining the first evaluation image comprises obtaining a color image and capturing the second evaluation image comprises obtaining an infrared image; or
(c) obtaining the first evaluation image comprises obtaining a depth image and capturing the second evaluation image comprises obtaining an infrared image; or
(d) obtaining the first evaluation image comprises obtaining a depth image and capturing the second evaluation image comprises obtaining a color image. 20. The one or more controller logic or machine-readable media of claim 18 wherein obtaining an image set comprises, capturing a higher-resolution color image, a higher-resolution infrared, or a higher-resolution depth image. | 2,400 |
7,134 | 7,134 | 14,052,713 | 2,494 | Systems and methods for conducting correlation analysis for security events with assets attributes of a network by a SIEM device to enable more efficient reporting are provided. According to one embodiment, when a SIEM device obtains a security event, a risk level of the security event is calculated based on at least a correlation of the security event with one or more asset attributes of a network that is managed by the SIEM device. When the risk level meets a predetermined or configurable threshold, the SIEM device causes the security event to be reported to an administrator of the network. | 1. A method comprising:
obtaining, by a security information and event management (SIEM) device, a security event; calculating, by the SIEM device, a risk level of the security event based on at least a correlation of the security event with one or more asset attributes of a network that is managed by the SIEM device; and when the risk level meets a predetermined or configurable threshold, then causing, by the SIEM device, the security event to be reported to an administrator of the network. 2. The method of claim 1, wherein said obtaining a security event further comprises:
receiving, by SIEM device, a plurality of original events from at least one source; logically correlating the plurality of original events; and extracting the security event from the plurality of original events. 3. The method of claim 2, wherein said logically correlating the plurality of original events comprises identifying the security event based on logical relationships of the original events. 4. The method of claim 2, wherein said logically correlating the plurality of original events comprises combining repeated original events into the security event. 5. The method of claim 1, further comprising:
setting up an asset table that describes assets contained in the network that are managed by the SIEM device; setting up an asset value for each asset, wherein the asset value represents a relative importance level of the asset in the network; mapping a target of the security event to an asset in the asset table; extracting the asset value of the mapped asset; and adjusting the risk level of the security event based on the asset value of the mapped asset. 6. The method of claim 5, further comprising decreasing the risk level of the security event if the target of the security event is not mapped to any asset of the network. 7. The method of claim 5, further comprising:
setting up an inventory list for each asset of the network, wherein the inventory list describes hardware and software attributes of the asset; setting up a reliability value for each attribute in the inventory list, wherein the reliability value represents the reliability of the attribute in the asset; searching an attribute of the security event in the inventory list of the mapped asset; extracting the reliability value of the attribute; adjusting the risk level of the security event based on the reliability value. 8. The method of claim 1, further comprising:
matching a system vulnerability with the security event; scanning a target of the security event for the system vulnerability; and increasing the risk level of the security event if the system vulnerability exists in the target of the security event; and decreasing the risk level of the security event if the system vulnerability does not exist in the target of the security event. 9. The method of claim 8, wherein said matching a system vulnerability with the security event further comprises matching the system vulnerability based on a common vulnerabilities and exposures (CVE) attribute, a BugTraq attribute or an S3CVE attribute of the security event. 10. The method of claim 8, wherein said matching a system vulnerability with the security event further comprises matching the system vulnerability with the security event based on a local knowledge database. 11. The method of claim 1, further comprising setting up a correlation policy to define a sequence or a combination of correlations of the security event with the asset attributes of the network that is managed by the SIEM device. 12. A computer system comprising:
a non-transitory storage device having tangibly embodied therein instructions representing a security application; and one or more processors coupled to the non-transitory storage device and operable to execute the security application to perform a method comprising: obtaining, by a security information and event management (SIEM) device, a security event; calculating, by the SIEM device, a risk level of the security event based on at least a correlation of the security event with one or more asset attributes of a network that is managed by the SIEM device; and when the risk level meets a predetermined or configurable threshold, then causing, by the SIEM device, the security event to be reported to an administrator of the network. 13. The computer system of claim 12, wherein said obtaining a security event further comprises:
receiving, by SIEM device, a plurality of original events from at least one source; logically correlating the plurality of original events; and extracting the security event from the plurality of original events. 14. The computer system of claim 13, wherein said logically correlating the plurality of original events comprises identifying the security event based on logical relationships of the original events. 15. The computer system of claim 13, wherein said logically correlating the plurality of original events comprises combining repeated original events into the security event. 16. The computer system of claim 12, wherein the method further comprise:
setting up an asset table that describes assets contained in the network that is managed by the SIEM device; setting up an asset value for each asset, wherein the asset value represents the importance level of the asset in the network; mapping a target of the security event with an asset in the asset table; extracting the asset value of the mapped asset; and adjusting the risk level of the security event based on the asset value of the mapped asset. 17. The computer system of claim 16, wherein the method further comprises decreasing the risk level of the security event when the target of the security event is not mapped to any asset of the network. 18. The computer system of claim 16, wherein the method further comprises:
setting up an inventory list for each asset of the network, wherein the inventory list describes hardware and software attributes of the asset; setting up a reliability value for each attribute in the inventory list, wherein the reliability value represents the reliability of the attribute in the asset; searching an attribute of the security event in the inventory list of the mapped asset; extracting the reliability value of the attribute; adjusting the risk level of the security event based on the reliability value. 19. The computer system of claim 12, wherein the method further comprises:
matching a system vulnerability with the security event; scanning a target of the security event for the system vulnerability; and increasing the risk level of the security event if the system vulnerability exists in the target of the security event; and decreasing the risk level of the security event if the system vulnerability does not exist in the target of the security event. 20. The computer system of claim 19, wherein said matching a system vulnerability with the security event further comprises matching the system vulnerability based on a common vulnerabilities and exposures (CVE) attribute, a BugTraq attribute or a S3CVE attribute of the security event. 21. The computer system of claim 19, wherein said matching a system vulnerability with the security event further comprises matching the system vulnerability with the security event based on local knowledge database. 22. The computer system of claim 12, wherein the method further comprises setting up a correlation policy to define a sequence or a combination of correlations of the security event with the asset attributes of the network that is managed by the SIEM device. | Systems and methods for conducting correlation analysis for security events with assets attributes of a network by a SIEM device to enable more efficient reporting are provided. According to one embodiment, when a SIEM device obtains a security event, a risk level of the security event is calculated based on at least a correlation of the security event with one or more asset attributes of a network that is managed by the SIEM device. When the risk level meets a predetermined or configurable threshold, the SIEM device causes the security event to be reported to an administrator of the network.1. A method comprising:
obtaining, by a security information and event management (SIEM) device, a security event; calculating, by the SIEM device, a risk level of the security event based on at least a correlation of the security event with one or more asset attributes of a network that is managed by the SIEM device; and when the risk level meets a predetermined or configurable threshold, then causing, by the SIEM device, the security event to be reported to an administrator of the network. 2. The method of claim 1, wherein said obtaining a security event further comprises:
receiving, by SIEM device, a plurality of original events from at least one source; logically correlating the plurality of original events; and extracting the security event from the plurality of original events. 3. The method of claim 2, wherein said logically correlating the plurality of original events comprises identifying the security event based on logical relationships of the original events. 4. The method of claim 2, wherein said logically correlating the plurality of original events comprises combining repeated original events into the security event. 5. The method of claim 1, further comprising:
setting up an asset table that describes assets contained in the network that are managed by the SIEM device; setting up an asset value for each asset, wherein the asset value represents a relative importance level of the asset in the network; mapping a target of the security event to an asset in the asset table; extracting the asset value of the mapped asset; and adjusting the risk level of the security event based on the asset value of the mapped asset. 6. The method of claim 5, further comprising decreasing the risk level of the security event if the target of the security event is not mapped to any asset of the network. 7. The method of claim 5, further comprising:
setting up an inventory list for each asset of the network, wherein the inventory list describes hardware and software attributes of the asset; setting up a reliability value for each attribute in the inventory list, wherein the reliability value represents the reliability of the attribute in the asset; searching an attribute of the security event in the inventory list of the mapped asset; extracting the reliability value of the attribute; adjusting the risk level of the security event based on the reliability value. 8. The method of claim 1, further comprising:
matching a system vulnerability with the security event; scanning a target of the security event for the system vulnerability; and increasing the risk level of the security event if the system vulnerability exists in the target of the security event; and decreasing the risk level of the security event if the system vulnerability does not exist in the target of the security event. 9. The method of claim 8, wherein said matching a system vulnerability with the security event further comprises matching the system vulnerability based on a common vulnerabilities and exposures (CVE) attribute, a BugTraq attribute or an S3CVE attribute of the security event. 10. The method of claim 8, wherein said matching a system vulnerability with the security event further comprises matching the system vulnerability with the security event based on a local knowledge database. 11. The method of claim 1, further comprising setting up a correlation policy to define a sequence or a combination of correlations of the security event with the asset attributes of the network that is managed by the SIEM device. 12. A computer system comprising:
a non-transitory storage device having tangibly embodied therein instructions representing a security application; and one or more processors coupled to the non-transitory storage device and operable to execute the security application to perform a method comprising: obtaining, by a security information and event management (SIEM) device, a security event; calculating, by the SIEM device, a risk level of the security event based on at least a correlation of the security event with one or more asset attributes of a network that is managed by the SIEM device; and when the risk level meets a predetermined or configurable threshold, then causing, by the SIEM device, the security event to be reported to an administrator of the network. 13. The computer system of claim 12, wherein said obtaining a security event further comprises:
receiving, by SIEM device, a plurality of original events from at least one source; logically correlating the plurality of original events; and extracting the security event from the plurality of original events. 14. The computer system of claim 13, wherein said logically correlating the plurality of original events comprises identifying the security event based on logical relationships of the original events. 15. The computer system of claim 13, wherein said logically correlating the plurality of original events comprises combining repeated original events into the security event. 16. The computer system of claim 12, wherein the method further comprise:
setting up an asset table that describes assets contained in the network that is managed by the SIEM device; setting up an asset value for each asset, wherein the asset value represents the importance level of the asset in the network; mapping a target of the security event with an asset in the asset table; extracting the asset value of the mapped asset; and adjusting the risk level of the security event based on the asset value of the mapped asset. 17. The computer system of claim 16, wherein the method further comprises decreasing the risk level of the security event when the target of the security event is not mapped to any asset of the network. 18. The computer system of claim 16, wherein the method further comprises:
setting up an inventory list for each asset of the network, wherein the inventory list describes hardware and software attributes of the asset; setting up a reliability value for each attribute in the inventory list, wherein the reliability value represents the reliability of the attribute in the asset; searching an attribute of the security event in the inventory list of the mapped asset; extracting the reliability value of the attribute; adjusting the risk level of the security event based on the reliability value. 19. The computer system of claim 12, wherein the method further comprises:
matching a system vulnerability with the security event; scanning a target of the security event for the system vulnerability; and increasing the risk level of the security event if the system vulnerability exists in the target of the security event; and decreasing the risk level of the security event if the system vulnerability does not exist in the target of the security event. 20. The computer system of claim 19, wherein said matching a system vulnerability with the security event further comprises matching the system vulnerability based on a common vulnerabilities and exposures (CVE) attribute, a BugTraq attribute or a S3CVE attribute of the security event. 21. The computer system of claim 19, wherein said matching a system vulnerability with the security event further comprises matching the system vulnerability with the security event based on local knowledge database. 22. The computer system of claim 12, wherein the method further comprises setting up a correlation policy to define a sequence or a combination of correlations of the security event with the asset attributes of the network that is managed by the SIEM device. | 2,400 |
7,135 | 7,135 | 11,909,080 | 2,456 | Non-intrusive peripheral systems and methods to track, identify various acting entities and capture the full motion of these entities in a sports event. The entities preferably include players belonging to teams. The motion capture of more than one player is implemented in real-time with image processing methods. Captured player body organ or joints location data can be used to generate a three-dimensional display of the real sporting event using computer games graphics. | 1-61. (canceled) 62. A system for real-time object localization and tracking in a sports event comprising:
a. a plurality of fixed cameras positioned at a single location relative to a sports playing field and operative to capture video of the playing field including objects located therein; b. an image processing unit operative to receive video frames from each camera and to detect and segment at least some of the objects in at least some of the frames using image processing algorithms, thereby providing processed object information; and c. a central server operative to provide real-time localization and tracking information on the detected objects based on respective processed object information. 63. The system of claim 62, operative to assign each detected object to an object group. 64. The system of claim 63, wherein the detected object is a player, wherein the object group is a team, and wherein the assignment of the player to a team is automatic, without need for an operator to mark the player. 65. The system of claim 63, operative to perform an automatic setup and calibration process, without need for an operator to mark the player during a preparatory stage. 66. A system for real-time object localization, tracking and personal identification of players in a sports event comprising:
a. a plurality of cameras positioned at multiple locations relative to a sports playing field and operative to capture video of the playing field including objects located therein; b. an image processing unit operative to receive video frames including some of the objects from at least some of the cameras and to detect and segment the objects using image processing algorithms, thereby providing processed object information; c. a central server operative to provide real-time localization and tracking information on detected objects based on respective processed object information; and d. at least one robotic camera capable to pan, tilt and zoom and to provide detailed views of an object of interest. 67. The system of claim 66, further comprising a display operative to display the detailed views to an operator. 68. The system of claim 67, wherein the object of interest is a player, and wherein the operator can identify the player from the detailed view. 69. The system of claim 66, wherein one of the objects is a ball, wherein the processed image information includes a location and tracking of the ball provided by the plurality of cameras. 70. The system of claim 68, wherein the player is either not detected or its identity is uncertain and wherein the system is operative to allow the operator to manually remark the lost player. 71. The system of claim 66, wherein the at least one robotic camera includes a plurality of robotic cameras, wherein the object of interest is a player having an identifying shirt detail, and wherein the system is operative to automatically identify the player from at least one detailed view that captures and provides the identifying shirt item. 72. The system of claim 71, wherein the identifying shirt detail is a shirt number. 73. The system of claim 66, wherein at least one robotic camera may be slaved onto an identified and tracked player to generate single player video clips. 74. The system of claim 67, further comprising a first application server coupled to elements b and c and operative to provide automatic or semiautomatic content based indexing, storage and retrieval of a video of the sports event. 75. The system of claim 67, further comprising a second application server coupled to elements b and c and operative to provide a rigid model two dimensional (2D) or three dimensional (3D) graphical representations of plays in the sports event. 76. The system of claim 67, operative to generate a telestrator clip with automatic tied-to-objects graphics for a match commentator. 77. The system of claim 67, operative to automatically create team and player performance databases for sports computer game developers and for fantasy games, whereby the fidelity of the computer game is increased through the usage of real data collected in real matches. 78. A system for automatic objects tracking and motion capture in a sports event comprising:
a. a plurality of fixed high resolution video cameras positioned at multiple locations relative to a sports playing field, each camera operative to capture a portion of the playing field including objects located therein, the objects including players; b. an image processing unit (IPU) operative to provide full motion capture of moving objects based on the video streams; and c. a central server coupled to the video cameras and the IPU and operative to provide localization information on player parts, whereby the system provides real time motion capture of multiple players and other moving objects. 79. The system of claim 78, wherein the IPU includes a player identification capability and wherein the system is further operative to provide individual player identification and tracking. 80. The system of claim 79, wherein the player identification is based on automatically identifying shirt detail 81. The system of claim 78, further comprising a three-dimensional (3D) graphics application server coupled to elements a-c and operative to generate a three dimensional (3D) graphical representation of the sports event for use in a broadcast event. 82. The system of claim 78, further comprising a three-dimensional (3D) graphics application server coupled to elements a-c and used for providing temporal player behavior inputs to a user computer game. 83. A system for generating a virtual flight clip (VFC) in a sports event comprising:
a. a plurality of fixed video cameras positioned at multiple locations relative to a sports playing field, each camera operative to capture a portion of the playing field including objects located therein, the objects including players; b. a high resolution video recorder coupled to each camera and used for continuously recording respective camera real video frames; and c. a VFC processor operative to select recorded real frames of various cameras, to create intermediate synthesized frames and to combine the real and synthesized frames into a virtual flight clip of the sports game. 84. In a sports event taking place on a playing field, a method for real-time motion capture of multiple moving objects comprising the steps of:
a. providing a plurality of fixed high resolution video cameras positioned at multiple locations relative to a sports playing field; and b. using the cameras to capture the full motion of multiple moving objects on the playing field in real-time. 85. The method of claim 84, wherein the objects include players having body organs, and wherein the step of using the cameras to capture the full motion of multiple moving objects includes capturing the full motion of each of multiple players based on image processing of at least some of the body organs of the respective player. 86. The method of claim 85, wherein the capturing of the full motion of each of respective player further includes: using a processing unit:
i. capturing high resolution video frames from each camera, ii. separating each video frame into foreground objects and an empty playing field, iii. performing automatic blob segmentation to identify the respective player's body organs, and iv. extracting the respective player's body organs directions from a viewpoint of each camera, 87. The method of claim 86, wherein the capturing of the full motion further includes:
vi. matching the player's body organs received from the different camera viewpoints, and vii. calculating a three-dimensional location of all the player's organs including joints. 88. The method of claim 87, wherein the capturing of the full motion further includes automatically selecting a dynamic player's behavior that most likely fits the respective player's body organ location over a time period, thereby creating respective player temporal characteristics. 89. The method of claim 88, further comprising the step of generating, on a user's device, a 3D graphical dynamic environment that combines the temporal player characteristics with a real or virtual playing field image. 90. The method of claim 86, wherein the processing unit is an image processing and player identification unit (IPPIU), the method further comprising the step of using the IPPIU to identify a player from a respective player shirt detail. 91. A method for generating a virtual flight clip (VFC) of a sports game, comprising the steps of:
a. at a high resolution recorder coupled to a plurality of fixed video cameras positioned at multiple locations relative to a sports playing field, each camera operative to capture a portion of the playing field including objects located therein, the objects including players, continuously recording respective real camera video frames; and b. using a VFC processor coupled to the high resolution recorder to select recorded real frames of various cameras, to create intermediate synthesized frames and to combine the real and synthesized frames into a virtual flight clip. 92. The method of claim 91, wherein the step of using a VFC processor includes:
i. generating an empty playing field from at least one camera CAMi, ii. segmenting foreground objects in each real camera frame, iii. correlating real frames of two consecutive cameras CAMi and CAMi+1 and performing a motion vector analysis using these frames, iv. calculating n synthesized frames for a virtual camera located between real cameras CAMi and CAMi+1 according to a calculated location of the virtual camera v. calculating a background empty field from each viewpoint of the virtual camera, vi. composing a synthesized foreground over the background empty field to obtain a composite replay clip that represents the virtual flight clip, and vii. displaying the composite replay clip to a user. | Non-intrusive peripheral systems and methods to track, identify various acting entities and capture the full motion of these entities in a sports event. The entities preferably include players belonging to teams. The motion capture of more than one player is implemented in real-time with image processing methods. Captured player body organ or joints location data can be used to generate a three-dimensional display of the real sporting event using computer games graphics.1-61. (canceled) 62. A system for real-time object localization and tracking in a sports event comprising:
a. a plurality of fixed cameras positioned at a single location relative to a sports playing field and operative to capture video of the playing field including objects located therein; b. an image processing unit operative to receive video frames from each camera and to detect and segment at least some of the objects in at least some of the frames using image processing algorithms, thereby providing processed object information; and c. a central server operative to provide real-time localization and tracking information on the detected objects based on respective processed object information. 63. The system of claim 62, operative to assign each detected object to an object group. 64. The system of claim 63, wherein the detected object is a player, wherein the object group is a team, and wherein the assignment of the player to a team is automatic, without need for an operator to mark the player. 65. The system of claim 63, operative to perform an automatic setup and calibration process, without need for an operator to mark the player during a preparatory stage. 66. A system for real-time object localization, tracking and personal identification of players in a sports event comprising:
a. a plurality of cameras positioned at multiple locations relative to a sports playing field and operative to capture video of the playing field including objects located therein; b. an image processing unit operative to receive video frames including some of the objects from at least some of the cameras and to detect and segment the objects using image processing algorithms, thereby providing processed object information; c. a central server operative to provide real-time localization and tracking information on detected objects based on respective processed object information; and d. at least one robotic camera capable to pan, tilt and zoom and to provide detailed views of an object of interest. 67. The system of claim 66, further comprising a display operative to display the detailed views to an operator. 68. The system of claim 67, wherein the object of interest is a player, and wherein the operator can identify the player from the detailed view. 69. The system of claim 66, wherein one of the objects is a ball, wherein the processed image information includes a location and tracking of the ball provided by the plurality of cameras. 70. The system of claim 68, wherein the player is either not detected or its identity is uncertain and wherein the system is operative to allow the operator to manually remark the lost player. 71. The system of claim 66, wherein the at least one robotic camera includes a plurality of robotic cameras, wherein the object of interest is a player having an identifying shirt detail, and wherein the system is operative to automatically identify the player from at least one detailed view that captures and provides the identifying shirt item. 72. The system of claim 71, wherein the identifying shirt detail is a shirt number. 73. The system of claim 66, wherein at least one robotic camera may be slaved onto an identified and tracked player to generate single player video clips. 74. The system of claim 67, further comprising a first application server coupled to elements b and c and operative to provide automatic or semiautomatic content based indexing, storage and retrieval of a video of the sports event. 75. The system of claim 67, further comprising a second application server coupled to elements b and c and operative to provide a rigid model two dimensional (2D) or three dimensional (3D) graphical representations of plays in the sports event. 76. The system of claim 67, operative to generate a telestrator clip with automatic tied-to-objects graphics for a match commentator. 77. The system of claim 67, operative to automatically create team and player performance databases for sports computer game developers and for fantasy games, whereby the fidelity of the computer game is increased through the usage of real data collected in real matches. 78. A system for automatic objects tracking and motion capture in a sports event comprising:
a. a plurality of fixed high resolution video cameras positioned at multiple locations relative to a sports playing field, each camera operative to capture a portion of the playing field including objects located therein, the objects including players; b. an image processing unit (IPU) operative to provide full motion capture of moving objects based on the video streams; and c. a central server coupled to the video cameras and the IPU and operative to provide localization information on player parts, whereby the system provides real time motion capture of multiple players and other moving objects. 79. The system of claim 78, wherein the IPU includes a player identification capability and wherein the system is further operative to provide individual player identification and tracking. 80. The system of claim 79, wherein the player identification is based on automatically identifying shirt detail 81. The system of claim 78, further comprising a three-dimensional (3D) graphics application server coupled to elements a-c and operative to generate a three dimensional (3D) graphical representation of the sports event for use in a broadcast event. 82. The system of claim 78, further comprising a three-dimensional (3D) graphics application server coupled to elements a-c and used for providing temporal player behavior inputs to a user computer game. 83. A system for generating a virtual flight clip (VFC) in a sports event comprising:
a. a plurality of fixed video cameras positioned at multiple locations relative to a sports playing field, each camera operative to capture a portion of the playing field including objects located therein, the objects including players; b. a high resolution video recorder coupled to each camera and used for continuously recording respective camera real video frames; and c. a VFC processor operative to select recorded real frames of various cameras, to create intermediate synthesized frames and to combine the real and synthesized frames into a virtual flight clip of the sports game. 84. In a sports event taking place on a playing field, a method for real-time motion capture of multiple moving objects comprising the steps of:
a. providing a plurality of fixed high resolution video cameras positioned at multiple locations relative to a sports playing field; and b. using the cameras to capture the full motion of multiple moving objects on the playing field in real-time. 85. The method of claim 84, wherein the objects include players having body organs, and wherein the step of using the cameras to capture the full motion of multiple moving objects includes capturing the full motion of each of multiple players based on image processing of at least some of the body organs of the respective player. 86. The method of claim 85, wherein the capturing of the full motion of each of respective player further includes: using a processing unit:
i. capturing high resolution video frames from each camera, ii. separating each video frame into foreground objects and an empty playing field, iii. performing automatic blob segmentation to identify the respective player's body organs, and iv. extracting the respective player's body organs directions from a viewpoint of each camera, 87. The method of claim 86, wherein the capturing of the full motion further includes:
vi. matching the player's body organs received from the different camera viewpoints, and vii. calculating a three-dimensional location of all the player's organs including joints. 88. The method of claim 87, wherein the capturing of the full motion further includes automatically selecting a dynamic player's behavior that most likely fits the respective player's body organ location over a time period, thereby creating respective player temporal characteristics. 89. The method of claim 88, further comprising the step of generating, on a user's device, a 3D graphical dynamic environment that combines the temporal player characteristics with a real or virtual playing field image. 90. The method of claim 86, wherein the processing unit is an image processing and player identification unit (IPPIU), the method further comprising the step of using the IPPIU to identify a player from a respective player shirt detail. 91. A method for generating a virtual flight clip (VFC) of a sports game, comprising the steps of:
a. at a high resolution recorder coupled to a plurality of fixed video cameras positioned at multiple locations relative to a sports playing field, each camera operative to capture a portion of the playing field including objects located therein, the objects including players, continuously recording respective real camera video frames; and b. using a VFC processor coupled to the high resolution recorder to select recorded real frames of various cameras, to create intermediate synthesized frames and to combine the real and synthesized frames into a virtual flight clip. 92. The method of claim 91, wherein the step of using a VFC processor includes:
i. generating an empty playing field from at least one camera CAMi, ii. segmenting foreground objects in each real camera frame, iii. correlating real frames of two consecutive cameras CAMi and CAMi+1 and performing a motion vector analysis using these frames, iv. calculating n synthesized frames for a virtual camera located between real cameras CAMi and CAMi+1 according to a calculated location of the virtual camera v. calculating a background empty field from each viewpoint of the virtual camera, vi. composing a synthesized foreground over the background empty field to obtain a composite replay clip that represents the virtual flight clip, and vii. displaying the composite replay clip to a user. | 2,400 |
7,136 | 7,136 | 13,059,134 | 2,416 | The present invention relates to a method and system for management of the mobility of a terminal by using a non-access stratum (network stratum “NAS”) protocol in a mobile telecommunication network. The method for management of the mobility of a terminal by using an NAS protocol, i.e., messages includes a terminal (“UE”) and a mobile management entity (“MME”), and efficiently divides and processes security protected NAS messages and NAS messages with no security, and efficiently divides and processes EMM (EPS Mobility Management) messages, i.e., mobility management messages, and ESM (Evolved Session Management) messages, i.e., session management messages in a network such as an EPS (Evolved Packet System) of 3GPP, thereby managing the mobility and the sessions of a terminal in an efficient manner. | 1. A method for processing a NAS protocol message in a mobile communication, the method comprising:
receiving a NAS protocol message having a protocol discriminator corresponding to four most significant bits of a first octet and a security header type corresponding to four least significant bits of a second octet; analyzing the protocol discriminator of the message; and processing, when the protocol discriminator is a protocol discriminator extension indicator, the message based on data of the protocol discriminator extension. 2. The method of claim 1, wherein the protocol discriminator is set to “0010” for indicating an ESM message and “0111” for indicating an EMM message. 3. The method of claim 2, wherein the analyzing comprises:
checking, when the protocol discriminator indicates the EMM message, the security header type; determining, when the security header type is set to “1100”, the EMM message as an integrity protected service request message; determining, when the security header type is set to “0001”, the EMM message as an integrity protected message; and determining, when the security header type is set to “0010”, the EMM message as an integrity/cipher protected message. 4. The method of claim 2, wherein the analyzing comprises:
checking, when the protocol discriminator indicates the ESM message, four least significant bits of the first octet; interpreting, when the four least significant bits of the first octet is set to “0000”, the four least significant bits as a No EPS bearer identity; and interpreting, when the four least significant bits of the first octet is set to one of “0101” to “1111”, an EPS bearer identity value. 5. The method of claim 2, wherein the analyzing comprises:
checking, when the protocol discriminator indicates the EMM message, security header type; determining, when the security type is set to “1100”, the EMM message as an integrity protected service request message; and determining, when the security type is set to “0001”, the EMM message as an integrity protected message; and determining, when the security type is set to “0010”, the EMM message as an integrity/cipher protected message. 6. A mobile communication system comprising:
terminals located within a cell as a service coverage of a base station; and a mobility management entity which manages mobility of the terminals using NAS protocol messages in connection with the terminals via the base stations, wherein the NAS protocol message comprises a protocol discriminator corresponding to four most significant bits of a first octet for discriminating ESM message, EMM message, and protocol discriminator extension indicator; a security header type corresponding to four least significant bits of a second octet for indicating whether the message is protected; a Message Authentication Code (MAC) for integrity authentication of the message; and a sequence number. 7. The mobile communication system of claim 6, wherein the protocol discriminator is set to “0010” for indicating an ESM message and “0111” for indicating an EMM message. 8. The mobile communication system of claim 7, wherein the security header type is set, when the protocol discriminator indicates the EMM message, to “1100” for indicating the EMM message as an integrity protected service request message, “0001” for indicating the EMM message as in integrity protected message; and “0010” for indicating the EMM message as an integrity/cipher protected message. 9. The mobile communication system of claim 7, wherein four least significant bits of the first octet are set, when the protocol discriminator indicates the ESM message, to “0000” for indicating No EPS bearer identity and one of “0101” to “1111” for indicating an EPS bearer identity value. 10. The mobile communication system of claim 7, wherein the security header type is set, when the protocol discriminator indicates the ESM message, to “1100” for indicating the ESM message as an integrity protected service request message, “0001” for indicating the ESM message as an integrity protected message; and “0010” for indicating the ESM message as an integrity/cipher protected message. 11. A method for generating a NAS protocol message in a wireless communication system, the method comprising:
designating four most significant bits of a first octet of the NAS protocol message as a protocol discriminator; designating four least significant bits of the first octet of the NAS protocol message as a protocol discriminator extension; designating four least significant bits of a second octet of the NAS protocol message as a security header type; and transmitting the NAS protocol message. 12. The method of claim 11, wherein the protocol discriminator is set to “0010” for indicating the NAS protocol message as an ESM message and “0111” for indicating the NAS protocol message as an EMM message. 13. The method of claim 11, wherein the security header type is set, when the protocol discriminator is set for indicating the EMM message, to “1100” for indicating the EMM message as an integrity protected service request message, “0001” for indicating the MME message as an integrity protected message, and “0010” for indicating the MME message as an integrity/cipher protected message. 14. The method of claim 12, wherein the four least significant bits of the first octet is set, when the protocol discriminator is set for indicating the ESM message, to “0000” for indicating a No EPS bearer identity and one of “0101” to “1111” for indicating an EPS bearer identity value. | The present invention relates to a method and system for management of the mobility of a terminal by using a non-access stratum (network stratum “NAS”) protocol in a mobile telecommunication network. The method for management of the mobility of a terminal by using an NAS protocol, i.e., messages includes a terminal (“UE”) and a mobile management entity (“MME”), and efficiently divides and processes security protected NAS messages and NAS messages with no security, and efficiently divides and processes EMM (EPS Mobility Management) messages, i.e., mobility management messages, and ESM (Evolved Session Management) messages, i.e., session management messages in a network such as an EPS (Evolved Packet System) of 3GPP, thereby managing the mobility and the sessions of a terminal in an efficient manner.1. A method for processing a NAS protocol message in a mobile communication, the method comprising:
receiving a NAS protocol message having a protocol discriminator corresponding to four most significant bits of a first octet and a security header type corresponding to four least significant bits of a second octet; analyzing the protocol discriminator of the message; and processing, when the protocol discriminator is a protocol discriminator extension indicator, the message based on data of the protocol discriminator extension. 2. The method of claim 1, wherein the protocol discriminator is set to “0010” for indicating an ESM message and “0111” for indicating an EMM message. 3. The method of claim 2, wherein the analyzing comprises:
checking, when the protocol discriminator indicates the EMM message, the security header type; determining, when the security header type is set to “1100”, the EMM message as an integrity protected service request message; determining, when the security header type is set to “0001”, the EMM message as an integrity protected message; and determining, when the security header type is set to “0010”, the EMM message as an integrity/cipher protected message. 4. The method of claim 2, wherein the analyzing comprises:
checking, when the protocol discriminator indicates the ESM message, four least significant bits of the first octet; interpreting, when the four least significant bits of the first octet is set to “0000”, the four least significant bits as a No EPS bearer identity; and interpreting, when the four least significant bits of the first octet is set to one of “0101” to “1111”, an EPS bearer identity value. 5. The method of claim 2, wherein the analyzing comprises:
checking, when the protocol discriminator indicates the EMM message, security header type; determining, when the security type is set to “1100”, the EMM message as an integrity protected service request message; and determining, when the security type is set to “0001”, the EMM message as an integrity protected message; and determining, when the security type is set to “0010”, the EMM message as an integrity/cipher protected message. 6. A mobile communication system comprising:
terminals located within a cell as a service coverage of a base station; and a mobility management entity which manages mobility of the terminals using NAS protocol messages in connection with the terminals via the base stations, wherein the NAS protocol message comprises a protocol discriminator corresponding to four most significant bits of a first octet for discriminating ESM message, EMM message, and protocol discriminator extension indicator; a security header type corresponding to four least significant bits of a second octet for indicating whether the message is protected; a Message Authentication Code (MAC) for integrity authentication of the message; and a sequence number. 7. The mobile communication system of claim 6, wherein the protocol discriminator is set to “0010” for indicating an ESM message and “0111” for indicating an EMM message. 8. The mobile communication system of claim 7, wherein the security header type is set, when the protocol discriminator indicates the EMM message, to “1100” for indicating the EMM message as an integrity protected service request message, “0001” for indicating the EMM message as in integrity protected message; and “0010” for indicating the EMM message as an integrity/cipher protected message. 9. The mobile communication system of claim 7, wherein four least significant bits of the first octet are set, when the protocol discriminator indicates the ESM message, to “0000” for indicating No EPS bearer identity and one of “0101” to “1111” for indicating an EPS bearer identity value. 10. The mobile communication system of claim 7, wherein the security header type is set, when the protocol discriminator indicates the ESM message, to “1100” for indicating the ESM message as an integrity protected service request message, “0001” for indicating the ESM message as an integrity protected message; and “0010” for indicating the ESM message as an integrity/cipher protected message. 11. A method for generating a NAS protocol message in a wireless communication system, the method comprising:
designating four most significant bits of a first octet of the NAS protocol message as a protocol discriminator; designating four least significant bits of the first octet of the NAS protocol message as a protocol discriminator extension; designating four least significant bits of a second octet of the NAS protocol message as a security header type; and transmitting the NAS protocol message. 12. The method of claim 11, wherein the protocol discriminator is set to “0010” for indicating the NAS protocol message as an ESM message and “0111” for indicating the NAS protocol message as an EMM message. 13. The method of claim 11, wherein the security header type is set, when the protocol discriminator is set for indicating the EMM message, to “1100” for indicating the EMM message as an integrity protected service request message, “0001” for indicating the MME message as an integrity protected message, and “0010” for indicating the MME message as an integrity/cipher protected message. 14. The method of claim 12, wherein the four least significant bits of the first octet is set, when the protocol discriminator is set for indicating the ESM message, to “0000” for indicating a No EPS bearer identity and one of “0101” to “1111” for indicating an EPS bearer identity value. | 2,400 |
7,137 | 7,137 | 15,399,085 | 2,416 | A radio device in a communication network comprises an embedded Universal Integrated Circuit Card. The radio device stores a device fall-back policy based on a fall-back policy message received from a connectivity service platform that is separate from the radio device and in the communication network. The radio device receives, from the connectivity service platform, an event message indicating disablement, deactivation, or termination of a subscription of the radio device with a network operator. The event message is received from the connectivity service platform via a wireless network connection of the subscription. Responsive to determining that the radio device will lose the wireless network connection of the subscription due to the disablement, deactivation, or termination, the radio device obtains a different wireless network connection for the radio device using a different subscription by falling back in accordance with the stored fall-back policy. | 1. A method performed by a card embedded in a radio device in a communication network, the method comprising:
storing a fall-back policy based on a fall-back policy message received from a connectivity service platform that is separate from the radio device and in the communication network; receiving, from the connectivity service platform, an event message indicating disablement, deactivation, or termination of a subscription of the radio device with a network operator, the event message being received from the connectivity service platform via a wireless network connection of the subscription; responsive to determining that the radio device will lose the wireless network connection of the subscription due to the disablement, deactivation, or termination, obtaining a different wireless network connection for the radio device using a different subscription in order to fall back in accordance with the stored fall-back policy. 2. The method of claim 1, wherein the event message comprises an instruction to disable, deactivate, or terminate the subscription, and the method further comprises executing the instruction on the subscription such that the radio devices loses the wireless network connection. 3. The method of claim 1, further comprising, responsive to receiving the event message and before the fall back, sending a response to the connectivity service platform via the wireless network connection. 4. The method of claim 1, wherein the different subscription is with a different network operator than the network operator corresponding to the subscription. 5. The method of claim 1, wherein the different subscription is a provisioning subscription of the card. 6. The method of claim 1, wherein the radio device is a machine-to-machine (M2M) device. 7. The method of claim 1, wherein the card is an embedded Universal Integrated Circuit Card. 8. A card configured to be embedded in a radio device, the card comprising memory and circuitry, the circuitry configured to:
store a fall-back policy based on a fall-back policy message received from a connectivity service platform that is separate from the radio device and in the communication network; receive, from the connectivity service platform, an event message indicating disablement, deactivation, or termination of a subscription of the radio device with a network operator, the event message being received from the connectivity service platform via a wireless network connection of the subscription; responsive to determining that the radio device will lose the wireless network connection of the subscription due to the disablement, deactivation, or termination, obtain a different wireless network connection for the radio device using a different subscription in order to fall back in accordance with the stored fall-back policy. 9. A method performed by a connectivity service platform in a communication network, the method comprising:
sending a fall-back policy message comprising information about a fall-back policy to a card embedded in a radio device; detecting an event indicating disablement, deactivation, or termination of a subscription of the radio device with a network operator of a wireless network connection of the radio device; sending an event message to the card embedded in the radio device via the wireless network connection, the event message indicating the disablement, deactivation, or termination of the subscription; responsive to determining that the radio device will lose the wireless network connection due to the disablement, deactivation, or termination of the subscription, enabling, in the connectivity service platform, a different subscription of the radio device in order to fall back in accordance with the stored fall-back policy. 10. The method of claim 9, wherein the event message instructs the card embedded in the radio device to disable, deactivate, or terminate the subscription such that the wireless network connection is lost. 11. The method of claim 9, further comprising receiving a response to the event message from the card embedded in the radio device before the fall back. 12. The method of claim 9, further comprising instructing a network operator providing the different subscription to activate the different subscription. 13. The method of claim 9, wherein the different subscription is with a different network operator than the network operator corresponding to the subscription. 14. The method of claim 9, wherein the different subscription is a provisioning subscription of the card embedded in the radio device. 15. The method of claim 9, wherein detecting the event comprises detecting an instruction to disable, deactivate, or terminate the subscription. 16. The method of claim 9, wherein the radio device is a machine-to-machine (M2M) device. 17. The method of claim 9, wherein the radio device comprises an embedded Universal Integrated Circuit Card (eUICC). 18. A connectivity service platform in a communication network, the connectivity platform comprising memory and processor circuitry, the processing circuitry configured to:
send a fall-back policy message comprising information about a fall-back policy to a radio device; detect an event indicating disablement, deactivation, or termination of a subscription of the radio device with a network operator of a wireless network connection of the radio device; sending an event message to the radio device via the wireless network connection, the event message indicating the disablement, deactivation, or termination of the subscription; responsive to determining that the radio device will lose the wireless network connection due to the disablement, deactivation, or termination of the subscription, enabling, in the connectivity service platform, a different subscription of the radio device in order to fall back in accordance with the stored fall-back policy. | A radio device in a communication network comprises an embedded Universal Integrated Circuit Card. The radio device stores a device fall-back policy based on a fall-back policy message received from a connectivity service platform that is separate from the radio device and in the communication network. The radio device receives, from the connectivity service platform, an event message indicating disablement, deactivation, or termination of a subscription of the radio device with a network operator. The event message is received from the connectivity service platform via a wireless network connection of the subscription. Responsive to determining that the radio device will lose the wireless network connection of the subscription due to the disablement, deactivation, or termination, the radio device obtains a different wireless network connection for the radio device using a different subscription by falling back in accordance with the stored fall-back policy.1. A method performed by a card embedded in a radio device in a communication network, the method comprising:
storing a fall-back policy based on a fall-back policy message received from a connectivity service platform that is separate from the radio device and in the communication network; receiving, from the connectivity service platform, an event message indicating disablement, deactivation, or termination of a subscription of the radio device with a network operator, the event message being received from the connectivity service platform via a wireless network connection of the subscription; responsive to determining that the radio device will lose the wireless network connection of the subscription due to the disablement, deactivation, or termination, obtaining a different wireless network connection for the radio device using a different subscription in order to fall back in accordance with the stored fall-back policy. 2. The method of claim 1, wherein the event message comprises an instruction to disable, deactivate, or terminate the subscription, and the method further comprises executing the instruction on the subscription such that the radio devices loses the wireless network connection. 3. The method of claim 1, further comprising, responsive to receiving the event message and before the fall back, sending a response to the connectivity service platform via the wireless network connection. 4. The method of claim 1, wherein the different subscription is with a different network operator than the network operator corresponding to the subscription. 5. The method of claim 1, wherein the different subscription is a provisioning subscription of the card. 6. The method of claim 1, wherein the radio device is a machine-to-machine (M2M) device. 7. The method of claim 1, wherein the card is an embedded Universal Integrated Circuit Card. 8. A card configured to be embedded in a radio device, the card comprising memory and circuitry, the circuitry configured to:
store a fall-back policy based on a fall-back policy message received from a connectivity service platform that is separate from the radio device and in the communication network; receive, from the connectivity service platform, an event message indicating disablement, deactivation, or termination of a subscription of the radio device with a network operator, the event message being received from the connectivity service platform via a wireless network connection of the subscription; responsive to determining that the radio device will lose the wireless network connection of the subscription due to the disablement, deactivation, or termination, obtain a different wireless network connection for the radio device using a different subscription in order to fall back in accordance with the stored fall-back policy. 9. A method performed by a connectivity service platform in a communication network, the method comprising:
sending a fall-back policy message comprising information about a fall-back policy to a card embedded in a radio device; detecting an event indicating disablement, deactivation, or termination of a subscription of the radio device with a network operator of a wireless network connection of the radio device; sending an event message to the card embedded in the radio device via the wireless network connection, the event message indicating the disablement, deactivation, or termination of the subscription; responsive to determining that the radio device will lose the wireless network connection due to the disablement, deactivation, or termination of the subscription, enabling, in the connectivity service platform, a different subscription of the radio device in order to fall back in accordance with the stored fall-back policy. 10. The method of claim 9, wherein the event message instructs the card embedded in the radio device to disable, deactivate, or terminate the subscription such that the wireless network connection is lost. 11. The method of claim 9, further comprising receiving a response to the event message from the card embedded in the radio device before the fall back. 12. The method of claim 9, further comprising instructing a network operator providing the different subscription to activate the different subscription. 13. The method of claim 9, wherein the different subscription is with a different network operator than the network operator corresponding to the subscription. 14. The method of claim 9, wherein the different subscription is a provisioning subscription of the card embedded in the radio device. 15. The method of claim 9, wherein detecting the event comprises detecting an instruction to disable, deactivate, or terminate the subscription. 16. The method of claim 9, wherein the radio device is a machine-to-machine (M2M) device. 17. The method of claim 9, wherein the radio device comprises an embedded Universal Integrated Circuit Card (eUICC). 18. A connectivity service platform in a communication network, the connectivity platform comprising memory and processor circuitry, the processing circuitry configured to:
send a fall-back policy message comprising information about a fall-back policy to a radio device; detect an event indicating disablement, deactivation, or termination of a subscription of the radio device with a network operator of a wireless network connection of the radio device; sending an event message to the radio device via the wireless network connection, the event message indicating the disablement, deactivation, or termination of the subscription; responsive to determining that the radio device will lose the wireless network connection due to the disablement, deactivation, or termination of the subscription, enabling, in the connectivity service platform, a different subscription of the radio device in order to fall back in accordance with the stored fall-back policy. | 2,400 |
7,138 | 7,138 | 14,227,322 | 2,423 | An optical microscope includes a first mask that has transmission regions that are separated from one another for the simultaneous generation of a plurality of illumination light beams from illumination light, for example, a first scanning device for generating a scanning motion of the illumination light beams and a sample holder. The optical microscope also includes a second mask with transmission regions separated from one another, which transmission regions are smaller than the transmission regions of the first mask in order to clip the illumination light beams, such that, through the scanning motion of the first scanning device, each of the illumination light beams can be successively passed onto different transmission regions of the second mask, and a second scanning device is provided for generating a scanning motion between the clipped illumination light beams and the sample holder. A method for examining a microscopic sample is also provided. | 1. An optical microscope comprising:
a first mask (19) having transmission regions (19.1) separated from one another for simultaneously generating a plurality of illumination light beams (44) from illumination light (14), first scanning means (71) for generating a scanning motion of the illumination light beams (44), a sample holder (45) to hold a sample (41), a second mask (25) having transmission regions (25.1) separated from one another and smaller than the transmission regions (19.1) of the first mask for clipping the illumination light beams (44), wherein each of the illumination light beams (44) is passible successively to different transmission regions (25.1) of the second mask (25) by means of the scanning motion of the first scanning means (71), and second scanning means (29) for generating a scanning motion between the clipped illumination light beams (44) and the sample holder (45). 2. The optical microscope according to claim 1, wherein:
the first mask (19) comprises a first pinhole disk (19) in which the transmission regions (19.1) are formed by apertures (19.1), and the first scanning means (71) comprise adjustment means for changing the position of the pinhole disk (19). 3. The optical microscope according to claim 1, wherein:
each of the transmission regions (19.1) of the first mask (19) is at least as large as an Airy disk and each of the transmission regions (25.1) of the second mask (25) is smaller than an Airy disk. 4. The optical microscope according to claim 1, wherein:
the separation between adjacent transmission regions (25.1) of the second mask (25) is smaller than the separation between neighboring transmission regions (19.1) of the first mask (19). 5. The optical microscope according to claim 1, wherein:
the second mask (25) is configured to make the sample light (53) passible to the first mask (19) without being clipped by the second mask (25). 6. The optical microscope according to claim 5, wherein:
the second mask (25) blocks light outside its transmission regions (25.1) depending on wavelength. 7. The optical microscope according to claim 5, wherein:
the second mask (25) passes light between the first mask (19) and the sample plane (40) in order to clip incident illumination light beams (44) and to pass incident sample light (53) unclipped in the direction of the first mask (19). 8. The optical microscope according to claim 5, further comprising a first color splitter (22) and a second color splitter (26) arranged to pass illumination light beams (44) from the first color splitter (22) to the second color splitter (26) via the second mask (25) without passing sample light (53) from the second color splitter (26) to the first color splitter (22) via the second mask (25). 9. The optical microscope according to claim 1, wherein:
the second scanning means (29) are configured for one of changing the position of the second mask (25) and variably deflecting light between the second mask (25) and the sample plane (40). 10. The optical microscope according to claim 1, wherein:
the second scanning means (29) are configured to variably deflect light (44, 53) between the first and the second mask (19, 25), and also to variably deflect light between the second mask (25) and the sample plane (40). 11. The optical microscope according to claim 1, further comprising a holder for releasably holding the second mask (25). 12. A method for examination of a microscopic sample (41), using a microscope having a first mask (19) having a plurality of transmission regions (19.1) separated from one another, first scanning means (71), a second mask (25) having a plurality of transmission regions (25.1) separated from one another and smaller than the transmission regions (19.1) of the first mask, and second scanning means (29), the method comprising the steps of:
emitting an illumination light (14), simultaneously generating a plurality of illumination light beams (44) from the illumination light (14) when the illumination light (14) is directed onto the transmission regions (19.1) of the first mask (19), using the first scanning means (71) to generate a scanning motion of the illumination light beams (44), clipping the illumination light beams (44) with the transmission regions (25.1) of the second mask (25), successively passing each of the illumination light beams (44) to the plurality of transmission regions (25.1) of the second mask (25) by means of the scanning motion generated by the first scanning means (71), and using the second scanner means (29) to generate a scanning motion between the clipped illumination light beams (46) and the sample (41). 13. The method according to claim 12, wherein the microscope further includes a camera device (60), the method comprising the further steps of:
receiving and capturing sample light (53) coming from the sample (41) using the camera device (60), using the camera device (60) to integrate the received signals while continuously irradiating the first mask (19) with the illumination light (14), and generating a scanning motion of the illumination light beams (44) using the first scanning means (71). 14. The method according to claim 13, further comprising
discontinuing the integration of the received signals of the camera device (60), and reading out the image thus captured, only after each of the illumination light beams (44) has been successively passed onto the plurality of transmission regions (25.1) of the second mask (25). 15. The method according to claim 13, wherein:
a scanning motion of the second scanning means (29) takes place between integration intervals of the camera device (60), but not during a time when clipped illumination light beams (46) are passed onto the sample (41) and the camera device (60) integrates the received signals. 16. The method according to claim 13, wherein:
the scanning motion of the second scanning means (29) takes place during integration intervals of the camera device (60) so slowly that the clipped illumination light beams (46) are displaced in the sample plane (40) during the integration time by a distance that is smaller than 1 Airy. 17. The method according to claim 13, wherein:
displacing the clipped illumination light beams (46) in the sample plane (40) by a distance smaller than 1 Airy by using the second scanning means (29) to perform a scanning motion between two image captures of the camera device (60). | An optical microscope includes a first mask that has transmission regions that are separated from one another for the simultaneous generation of a plurality of illumination light beams from illumination light, for example, a first scanning device for generating a scanning motion of the illumination light beams and a sample holder. The optical microscope also includes a second mask with transmission regions separated from one another, which transmission regions are smaller than the transmission regions of the first mask in order to clip the illumination light beams, such that, through the scanning motion of the first scanning device, each of the illumination light beams can be successively passed onto different transmission regions of the second mask, and a second scanning device is provided for generating a scanning motion between the clipped illumination light beams and the sample holder. A method for examining a microscopic sample is also provided.1. An optical microscope comprising:
a first mask (19) having transmission regions (19.1) separated from one another for simultaneously generating a plurality of illumination light beams (44) from illumination light (14), first scanning means (71) for generating a scanning motion of the illumination light beams (44), a sample holder (45) to hold a sample (41), a second mask (25) having transmission regions (25.1) separated from one another and smaller than the transmission regions (19.1) of the first mask for clipping the illumination light beams (44), wherein each of the illumination light beams (44) is passible successively to different transmission regions (25.1) of the second mask (25) by means of the scanning motion of the first scanning means (71), and second scanning means (29) for generating a scanning motion between the clipped illumination light beams (44) and the sample holder (45). 2. The optical microscope according to claim 1, wherein:
the first mask (19) comprises a first pinhole disk (19) in which the transmission regions (19.1) are formed by apertures (19.1), and the first scanning means (71) comprise adjustment means for changing the position of the pinhole disk (19). 3. The optical microscope according to claim 1, wherein:
each of the transmission regions (19.1) of the first mask (19) is at least as large as an Airy disk and each of the transmission regions (25.1) of the second mask (25) is smaller than an Airy disk. 4. The optical microscope according to claim 1, wherein:
the separation between adjacent transmission regions (25.1) of the second mask (25) is smaller than the separation between neighboring transmission regions (19.1) of the first mask (19). 5. The optical microscope according to claim 1, wherein:
the second mask (25) is configured to make the sample light (53) passible to the first mask (19) without being clipped by the second mask (25). 6. The optical microscope according to claim 5, wherein:
the second mask (25) blocks light outside its transmission regions (25.1) depending on wavelength. 7. The optical microscope according to claim 5, wherein:
the second mask (25) passes light between the first mask (19) and the sample plane (40) in order to clip incident illumination light beams (44) and to pass incident sample light (53) unclipped in the direction of the first mask (19). 8. The optical microscope according to claim 5, further comprising a first color splitter (22) and a second color splitter (26) arranged to pass illumination light beams (44) from the first color splitter (22) to the second color splitter (26) via the second mask (25) without passing sample light (53) from the second color splitter (26) to the first color splitter (22) via the second mask (25). 9. The optical microscope according to claim 1, wherein:
the second scanning means (29) are configured for one of changing the position of the second mask (25) and variably deflecting light between the second mask (25) and the sample plane (40). 10. The optical microscope according to claim 1, wherein:
the second scanning means (29) are configured to variably deflect light (44, 53) between the first and the second mask (19, 25), and also to variably deflect light between the second mask (25) and the sample plane (40). 11. The optical microscope according to claim 1, further comprising a holder for releasably holding the second mask (25). 12. A method for examination of a microscopic sample (41), using a microscope having a first mask (19) having a plurality of transmission regions (19.1) separated from one another, first scanning means (71), a second mask (25) having a plurality of transmission regions (25.1) separated from one another and smaller than the transmission regions (19.1) of the first mask, and second scanning means (29), the method comprising the steps of:
emitting an illumination light (14), simultaneously generating a plurality of illumination light beams (44) from the illumination light (14) when the illumination light (14) is directed onto the transmission regions (19.1) of the first mask (19), using the first scanning means (71) to generate a scanning motion of the illumination light beams (44), clipping the illumination light beams (44) with the transmission regions (25.1) of the second mask (25), successively passing each of the illumination light beams (44) to the plurality of transmission regions (25.1) of the second mask (25) by means of the scanning motion generated by the first scanning means (71), and using the second scanner means (29) to generate a scanning motion between the clipped illumination light beams (46) and the sample (41). 13. The method according to claim 12, wherein the microscope further includes a camera device (60), the method comprising the further steps of:
receiving and capturing sample light (53) coming from the sample (41) using the camera device (60), using the camera device (60) to integrate the received signals while continuously irradiating the first mask (19) with the illumination light (14), and generating a scanning motion of the illumination light beams (44) using the first scanning means (71). 14. The method according to claim 13, further comprising
discontinuing the integration of the received signals of the camera device (60), and reading out the image thus captured, only after each of the illumination light beams (44) has been successively passed onto the plurality of transmission regions (25.1) of the second mask (25). 15. The method according to claim 13, wherein:
a scanning motion of the second scanning means (29) takes place between integration intervals of the camera device (60), but not during a time when clipped illumination light beams (46) are passed onto the sample (41) and the camera device (60) integrates the received signals. 16. The method according to claim 13, wherein:
the scanning motion of the second scanning means (29) takes place during integration intervals of the camera device (60) so slowly that the clipped illumination light beams (46) are displaced in the sample plane (40) during the integration time by a distance that is smaller than 1 Airy. 17. The method according to claim 13, wherein:
displacing the clipped illumination light beams (46) in the sample plane (40) by a distance smaller than 1 Airy by using the second scanning means (29) to perform a scanning motion between two image captures of the camera device (60). | 2,400 |
7,139 | 7,139 | 14,806,025 | 2,488 | A system to perform processing operations of input (video) streams, including is disclosed. The system consists of an input module, a stream type detection engine, a plurality of processing resources a resource monitoring engine, an attribution module, a dispatching module, and various other optional interface modules. | 1. A security system video monitoring workstation for processing and displaying a large number of streams of encoded or compressed video, the workstation comprising:
a multi-core CPU; a data network interface; a display control device comprising at least one GPU having multiple hardware cores configured for video decoding multiple video streams; memory storing instances of a GPU codec driver executable by said CPU and each configured to send one of said streams of encoded or compressed video to said at least one GPU with instructions to decode said one of said streams and to display said one of said streams in a predetermined tile of a display; memory storing instances of at least one video codec program module executable by said CPU and configured to decode a format of encoded or compressed video and to send decoded video image data to said at least one GPU for scaling and output in a predetermined tile of a display; memory storing a stream receiving and dispatching program module executable by said CPU and configured to receive said large number of streams of encoded or compressed video from said data network interface and to selectively relay each one of said streams to either one of said GPU codec driver instances or to one of said video codec program module instances; and memory storing a control program module executable by said CPU and configured to detect a processing error or failure of one of said GPU codec driver instances handling a given one of said streams and, in response to said error or failure, cause said stream receiving and dispatching program module to relay said given one of said streams to one of said video codec program module instances with instruction to display said given one of said streams in a same predetermined tile of said display. 2. The workstation as defined in claim 1, wherein said stream receiving and dispatching program module is configured to handle more than 15 video streams from said data network interface. 3. The workstation as defined in claim 1, wherein said stream receiving and dispatching program module is configured to handle more than 24 video streams from said data network interface. 4. The workstation as defined in claim 1, wherein said stream receiving and dispatching program module is further configured to detect a format of said streams and to determine based on the format whether each one of said streams should be initially relayed to said one of said GPU codec driver instances or to said one of said video codec program module instances. 5. A method for processing and displaying a large number of streams of encoded or compressed video in a security system, the method comprising:
receiving a large number of streams of encoded or compressed video from a data network interface; relaying each one of said streams to either one of a plurality of GPU codec driver instances or to one of a plurality of video codec program module instances executed in a CPU; displaying decoded video streams from both said plurality of GPU codec driver instances and said plurality of video codec program module instances in tiles of a display; and detecting a processing error or failure of one of said GPU codec driver instances handling a given one of said streams and, in response to said error or failure, relaying said given one of said streams to one of said video codec program module instances with instruction to display said given one of said streams in a same predetermined tile of said display. 6. The method as defined in claim 5, wherein said receiving comprises receiving more than 15 video streams. 7. The method as defined in claim 5, wherein said receiving comprises receiving more than 24 video streams. 8. The method as defined in claim 5, further comprising detecting a format of said streams and determining based on the format whether each one of said streams should be initially relayed to said one of said GPU codec driver instances or to said one of said video codec program module instances. 9. The method as defined in claim 5, wherein said relaying comprises initially relaying all streams able to be processed by a GPU codec to one of said plurality of GPU codec driver instances. | A system to perform processing operations of input (video) streams, including is disclosed. The system consists of an input module, a stream type detection engine, a plurality of processing resources a resource monitoring engine, an attribution module, a dispatching module, and various other optional interface modules.1. A security system video monitoring workstation for processing and displaying a large number of streams of encoded or compressed video, the workstation comprising:
a multi-core CPU; a data network interface; a display control device comprising at least one GPU having multiple hardware cores configured for video decoding multiple video streams; memory storing instances of a GPU codec driver executable by said CPU and each configured to send one of said streams of encoded or compressed video to said at least one GPU with instructions to decode said one of said streams and to display said one of said streams in a predetermined tile of a display; memory storing instances of at least one video codec program module executable by said CPU and configured to decode a format of encoded or compressed video and to send decoded video image data to said at least one GPU for scaling and output in a predetermined tile of a display; memory storing a stream receiving and dispatching program module executable by said CPU and configured to receive said large number of streams of encoded or compressed video from said data network interface and to selectively relay each one of said streams to either one of said GPU codec driver instances or to one of said video codec program module instances; and memory storing a control program module executable by said CPU and configured to detect a processing error or failure of one of said GPU codec driver instances handling a given one of said streams and, in response to said error or failure, cause said stream receiving and dispatching program module to relay said given one of said streams to one of said video codec program module instances with instruction to display said given one of said streams in a same predetermined tile of said display. 2. The workstation as defined in claim 1, wherein said stream receiving and dispatching program module is configured to handle more than 15 video streams from said data network interface. 3. The workstation as defined in claim 1, wherein said stream receiving and dispatching program module is configured to handle more than 24 video streams from said data network interface. 4. The workstation as defined in claim 1, wherein said stream receiving and dispatching program module is further configured to detect a format of said streams and to determine based on the format whether each one of said streams should be initially relayed to said one of said GPU codec driver instances or to said one of said video codec program module instances. 5. A method for processing and displaying a large number of streams of encoded or compressed video in a security system, the method comprising:
receiving a large number of streams of encoded or compressed video from a data network interface; relaying each one of said streams to either one of a plurality of GPU codec driver instances or to one of a plurality of video codec program module instances executed in a CPU; displaying decoded video streams from both said plurality of GPU codec driver instances and said plurality of video codec program module instances in tiles of a display; and detecting a processing error or failure of one of said GPU codec driver instances handling a given one of said streams and, in response to said error or failure, relaying said given one of said streams to one of said video codec program module instances with instruction to display said given one of said streams in a same predetermined tile of said display. 6. The method as defined in claim 5, wherein said receiving comprises receiving more than 15 video streams. 7. The method as defined in claim 5, wherein said receiving comprises receiving more than 24 video streams. 8. The method as defined in claim 5, further comprising detecting a format of said streams and determining based on the format whether each one of said streams should be initially relayed to said one of said GPU codec driver instances or to said one of said video codec program module instances. 9. The method as defined in claim 5, wherein said relaying comprises initially relaying all streams able to be processed by a GPU codec to one of said plurality of GPU codec driver instances. | 2,400 |
7,140 | 7,140 | 14,356,981 | 2,459 | The present invention relates to a method for simultaneously transmitting and receiving multiple managed objects in order to compensate for the inadeguacies of the current 3GPP TS32.607 standard, characterized in that, the method comprises: encapsulating two or more managed objects in one or more atomic transactions according to internal attributes and data processing of the managed objects, wherein each atomic transaction includes at least two managed objects; according to a pre-defined association rule, determining association relationships between managed objects in the one atomic transaction, or determining association relationships between multiple atomic transactions and association relationships between managed objects in each of the multiple atomic transactions; and transmitting one or more atomic transactions through a communication network. | 1. A method for simultaneously transmitting multiple managed objects, characterized in that, the method comprises:
encapsulating two or more managed objects in one or more atomic transactions according to internal attributes and data processing of the managed objects, wherein each atomic transaction includes at least two managed objects; according to a pre-defined association rule, determining association relationships between managed objects in the one atomic transaction, or determining association relationships between multiple atomic transactions and association relationships between managed objects in each of the multiple atomic transactions; and transmitting one or more atomic transactions through a communication network. 2. The method according to claim 1, wherein, the internal properties of the managed objects include resource identification and/or internal data structure and/ or, data processing of the managed objects is an operation that can be executed on resources and/or an operation executed according to the internal data structure and/or, transmitting one or more atomic transactions through a single simple object access protocol message via a communication network. 3. (canceled) 4. (canceled) 5. The method according to claim 2, further comprising using eXtensible Markup Language in a single simple object access protocol message to mark: association relationships between managed objects in atomic transactions; or management relationships between atomic transactions and association relationships between managed objects in the atomic transactions. 6. A method for simultaneously receiving multiple managed objects, characterized in that, the method comprises:
receiving one or more atomic transactions through a communication network, wherein each atomic transaction includes at least two managed objects; according to a pre-defined association rule, determining association relationships between managed objects in one atomic transaction, or determining association relationships between multiple atomic transactions and association relationships between managed objects in each of the multiple atomic transactions; and executing one or more atomic transactions according to the association relationships. 7. The method according to claim 6, further comprising receiving a single simple object access protocol message via a communication network, wherein the single simple object access protocol message comprises one or more atomic transactions. 8. The method according to claim 7, further comprising determining, according to marks in eXtensible Markup Language in a single simple object access protocol message: association relationships between managed objects in atomic transactions; or management relationships between atomic transactions and association relationships between managed objects in the atomic transactions. 9. The method according to claim 6, wherein, the managed objects comprise internal attributes and data processing, the internal attributes comprising resource identification and/or internal data structure, the data processing being an operation that can be executed on resources and/or an operation executed according to the internal data structure further comprising operating the multiple atomic transactions as a separate atom operation or operating a part of the multiple atomic transactions as a separate atom operation. 10. (canceled) 11. A transmitting apparatus for simultaneously transmitting multiple managed objects, characterized in that, the apparatus comprises:
an encapsulating unit for encapsulating two or more managed objects in one or more atomic transactions according to internal attributes and data processing of the managed objects, wherein each atomic transaction includes at least two managed objects; a determining unit for, according to a pre-defined association rule, determining association relationships between managed objects in the one atomic transaction, or determining association relationships between multiple atomic transactions and association relationships between managed objects in each of the multiple atomic transactions; and a transmitting unit for transmitting one or more atomic transactions through a communication network. 12. The apparatus according to claim 11, wherein, the internal properties of the managed objects include resource identification and/or internal data structure and/or data processing of the managed objects is an operation that can be executed on resources and/or an operation executed according to the internal data structure and/or the transmitting unit transmits one or more atomic transactions through a single simple object access protocol message via a communication network. 13. (canceled) 14. (canceled) 15. The apparatus according to claim 12, further comprising using eXtensible Markup Language in a single simple object access protocol message to mark: association relationships between managed objects in atomic transactions; or management relationships between atomic transactions and association relationships between managed objects in the atomic transactions. 16. A receiving apparatus for simultaneously receiving multiple managed objects, characterized in that, the apparatus comprises:
a receiving unit for receiving one or more atomic transactions through a communication network, wherein each atomic transaction includes at least two managed objects; a determining unit for, according to a pre-defined association rule, determining association relationships between managed objects in one atomic transaction, or determining association relationships between multiple atomic transactions and association relationships between managed objects in each of the multiple atomic transactions; and an executing unit for executing one or more atomic transactions according to the association relationships. 17. The apparatus according to claim 16, further comprising the receiving unit receiving a single simple object access protocol message via a communication network, the single simple object access protocol message comprising one or more atomic transactions. 18. The apparatus according to claim 17, further comprising the determining unit determining, according to marks in eXtensible Markup Language in a single simple object access protocol message: association relationships between managed objects in atomic transactions; or management relationships between atomic transactions and association relationships between managed objects in the atomic transactions. 19. The apparatus according to claim 16, wherein, the managed objects comprise internal attributes and data processing, the internal attributes comprising resource identification and/or internal data structure, the data processing being an operation that can be executed on resources and/or an operation executed according to the internal data structure and/or further comprising operating the multiple atomic transactions as a separate atom operation or operating a part of the multiple atomic transactions as a separate atom operation. 20. (canceled) | The present invention relates to a method for simultaneously transmitting and receiving multiple managed objects in order to compensate for the inadeguacies of the current 3GPP TS32.607 standard, characterized in that, the method comprises: encapsulating two or more managed objects in one or more atomic transactions according to internal attributes and data processing of the managed objects, wherein each atomic transaction includes at least two managed objects; according to a pre-defined association rule, determining association relationships between managed objects in the one atomic transaction, or determining association relationships between multiple atomic transactions and association relationships between managed objects in each of the multiple atomic transactions; and transmitting one or more atomic transactions through a communication network.1. A method for simultaneously transmitting multiple managed objects, characterized in that, the method comprises:
encapsulating two or more managed objects in one or more atomic transactions according to internal attributes and data processing of the managed objects, wherein each atomic transaction includes at least two managed objects; according to a pre-defined association rule, determining association relationships between managed objects in the one atomic transaction, or determining association relationships between multiple atomic transactions and association relationships between managed objects in each of the multiple atomic transactions; and transmitting one or more atomic transactions through a communication network. 2. The method according to claim 1, wherein, the internal properties of the managed objects include resource identification and/or internal data structure and/ or, data processing of the managed objects is an operation that can be executed on resources and/or an operation executed according to the internal data structure and/or, transmitting one or more atomic transactions through a single simple object access protocol message via a communication network. 3. (canceled) 4. (canceled) 5. The method according to claim 2, further comprising using eXtensible Markup Language in a single simple object access protocol message to mark: association relationships between managed objects in atomic transactions; or management relationships between atomic transactions and association relationships between managed objects in the atomic transactions. 6. A method for simultaneously receiving multiple managed objects, characterized in that, the method comprises:
receiving one or more atomic transactions through a communication network, wherein each atomic transaction includes at least two managed objects; according to a pre-defined association rule, determining association relationships between managed objects in one atomic transaction, or determining association relationships between multiple atomic transactions and association relationships between managed objects in each of the multiple atomic transactions; and executing one or more atomic transactions according to the association relationships. 7. The method according to claim 6, further comprising receiving a single simple object access protocol message via a communication network, wherein the single simple object access protocol message comprises one or more atomic transactions. 8. The method according to claim 7, further comprising determining, according to marks in eXtensible Markup Language in a single simple object access protocol message: association relationships between managed objects in atomic transactions; or management relationships between atomic transactions and association relationships between managed objects in the atomic transactions. 9. The method according to claim 6, wherein, the managed objects comprise internal attributes and data processing, the internal attributes comprising resource identification and/or internal data structure, the data processing being an operation that can be executed on resources and/or an operation executed according to the internal data structure further comprising operating the multiple atomic transactions as a separate atom operation or operating a part of the multiple atomic transactions as a separate atom operation. 10. (canceled) 11. A transmitting apparatus for simultaneously transmitting multiple managed objects, characterized in that, the apparatus comprises:
an encapsulating unit for encapsulating two or more managed objects in one or more atomic transactions according to internal attributes and data processing of the managed objects, wherein each atomic transaction includes at least two managed objects; a determining unit for, according to a pre-defined association rule, determining association relationships between managed objects in the one atomic transaction, or determining association relationships between multiple atomic transactions and association relationships between managed objects in each of the multiple atomic transactions; and a transmitting unit for transmitting one or more atomic transactions through a communication network. 12. The apparatus according to claim 11, wherein, the internal properties of the managed objects include resource identification and/or internal data structure and/or data processing of the managed objects is an operation that can be executed on resources and/or an operation executed according to the internal data structure and/or the transmitting unit transmits one or more atomic transactions through a single simple object access protocol message via a communication network. 13. (canceled) 14. (canceled) 15. The apparatus according to claim 12, further comprising using eXtensible Markup Language in a single simple object access protocol message to mark: association relationships between managed objects in atomic transactions; or management relationships between atomic transactions and association relationships between managed objects in the atomic transactions. 16. A receiving apparatus for simultaneously receiving multiple managed objects, characterized in that, the apparatus comprises:
a receiving unit for receiving one or more atomic transactions through a communication network, wherein each atomic transaction includes at least two managed objects; a determining unit for, according to a pre-defined association rule, determining association relationships between managed objects in one atomic transaction, or determining association relationships between multiple atomic transactions and association relationships between managed objects in each of the multiple atomic transactions; and an executing unit for executing one or more atomic transactions according to the association relationships. 17. The apparatus according to claim 16, further comprising the receiving unit receiving a single simple object access protocol message via a communication network, the single simple object access protocol message comprising one or more atomic transactions. 18. The apparatus according to claim 17, further comprising the determining unit determining, according to marks in eXtensible Markup Language in a single simple object access protocol message: association relationships between managed objects in atomic transactions; or management relationships between atomic transactions and association relationships between managed objects in the atomic transactions. 19. The apparatus according to claim 16, wherein, the managed objects comprise internal attributes and data processing, the internal attributes comprising resource identification and/or internal data structure, the data processing being an operation that can be executed on resources and/or an operation executed according to the internal data structure and/or further comprising operating the multiple atomic transactions as a separate atom operation or operating a part of the multiple atomic transactions as a separate atom operation. 20. (canceled) | 2,400 |
7,141 | 7,141 | 14,169,851 | 2,446 | The present invention is geared generally towards the transmission of data, such as images, audio, video, or text, as a continuous stream via a network to recipients. In particular, the present invention relates to enabling the transmission of data to recipients and enabling the recipients to interact and influence the content of the transmission. | 1-9. (canceled) 10. An apparatus comprising:
a device configured to receive a data stream including content data from a data server, the data server being configured to provide the same data stream to one or more other devices for presentation of the same content data by the respective one or more other devices, wherein the device is configured to present the content data of the data stream to a user, the content data including a plurality of visual elements, the device being configured to present the content data including being configured to scroll or slide the visual elements arranged in a position on a screen, wherein the device is configured to receive an indication of a user action, or an indication of user interaction with the content data of the data stream, wherein the device is configured to transmit data associated with the user action or user interaction, the data server being configured to adjust the content data of the data stream per the user action or user interaction, the adjusted content data including different visual elements or the same visual elements arranged in a different position, and wherein the device being configured to receive a data stream includes being configured to receive the data stream further including the adjusted content data, and being configured to present the content data includes being configured to further present the adjusted content data, the data server being configured to provide the same data stream to the one or more other devices for further presentation of the same adjusted content data by the respective one or more other devices. 11. The apparatus of claim 10, wherein the device is one of a computer or a mobile device. 12. The apparatus of claim 10, wherein the content data includes one or more of image data, textual data, video data or audio data. 13. The apparatus of claim 10, wherein the device is configured to receive the indication of user interaction, the indication including one or more of image data, textual data, video data or audio data. 14. The apparatus of claim 10, wherein the device is configured to receive the indication of user interaction, the indication including input regarding one or more elements of the content data. 15. The apparatus of claim 10, wherein the device is configured to receive the indication of user interaction, the indication including a request for further information regarding one or more elements of the content data. 16. The apparatus of claim 10, wherein the device is configured to receive the indication of user interaction, the indication including a request to purchase a good or service associated with one or more elements of the content data. 17. The apparatus of claim 10, wherein the device is configured to receive the indication of user interaction, the indication including selection of a visual element different from the visual elements of the of the content data, the selected visual element including one or more of image data or video data,
wherein the device is configured to transmit data associated with the user interaction, including being configured to upload the selected visual element, the data server being configured to adjust the content data of the data stream to add the selected, uploaded visual element to the content data, the adjusted content data including the uploaded, added visual element. 18. The apparatus of claim 17, wherein the device being configured to receive the indication of user interaction includes being configured to further receive a location identifier reflecting a geographic location or contact information for the user,
wherein the device being configured to transmit data associated with the user interaction includes being configured to upload the selected visual element and location identifier or contact information, the data server thereby being configured to adjust the content data of the data stream to add the selected, uploaded visual element and location identifier or contact information to the content data, the adjusted content data including the uploaded, added visual element and location identifier or contact information. 19. The apparatus of claim 10, wherein the device being configured to receive the indication of user action or user interaction includes being configured to receive a location identifier reflecting a geographic location or contact the information for the user,
wherein the device being configured to transmit data associated with the user interaction includes being configured to transmit the location identifier or contact information, the data server being configured to adjust the content data of the data stream to add the location identifier or contact information to the content data, the adjusted content data including the added location identifier or contact information. 20. The apparatus of claim 10, wherein the content data of the data stream includes information for a plurality of goods or services available for purchase,
wherein the device is configured to receive the indication of user interaction, the indication including selection of one of the goods or services, and wherein the device being configured to transmit data associated with the user interaction includes being configured to transmit the selection, the data server thereby being configured to adjust the content data to add a second data stream to include the selected good or service and any other of the goods or services for which the data server receives selection from a predetermined number of the device and the one or more other devices, the second data stream thereby including goods or services designated as being popular goods or services. 21. The apparatus of claim 10, wherein the visual elements of the content data include empty advertising space interspersed with other visual elements,
wherein the device is configured to receive the indication of user interaction, the indication including selection of the empty advertising space, wherein the device being configured to transmit data associated with the user interaction includes being configured to transmit an indication of selection of the empty advertising space, the data server thereby being configured to cause the device to present a prompt to permit the user to input advertising data, and wherein the device is configured to receive further user interaction including being configured to receive the advertising data, the device being configured to transmit further data associated with the user interaction including being configured to transmit the advertising data, the data server thereby being configured to adjust the content data of the data stream to add the advertising data to the content data, the adjusted content data including the added advertising data. 22. An apparatus comprising:
a data server configured to provide a data stream including content data to a plurality of devices for presentation of the content data of the data stream to users of the respective devices, the content data including a plurality of visual elements, the data server being configured to provide the data stream for the respective devices to scroll or slide the visual elements arranged in a position on respective screens, wherein data server is configured to receive, data associated with a user action, or data associated with a user interaction with the content data of the data stream at the respective one of the devices, wherein the data server is configured to adjust the content data of the data stream per the user action or user interaction, the adjusted content data including different visual elements or the same visual elements arranged in a different position, and wherein the data server being configured to provide a data stream further includes being configured to provide the data stream further including the adjusted content data to the plurality of devices for further presentation of the adjusted content of the data stream to the users of the respective devices. 23. The apparatus of claim 22, wherein the content data includes one or more of image data, textual data, video data or audio data. 24. The apparatus of claim 22, wherein the data server is configured to receive the data associated with user interaction, the data including one or more of image data, textual data, video data or audio data. 25. The apparatus of claim 22, wherein the data server is configured to receive the data associated with user interaction includes being configured to receive, the data including input regarding one or more elements of the content data. 26. The apparatus of claim 22, wherein the data server is configured to receive the data associated with user interaction, the data including a request for further information regarding one or more elements of the content data. 27. The apparatus of claim 22, wherein the data server is configured to receive the data associated with user interaction, the data including a request to purchase a good or service associated with one or more elements of the content data. 28. The apparatus of claim 22, wherein data server is configured to receive the data associated with user interaction, the data including an uploaded visual element different from the visual elements of the of the content data, the uploaded visual element including one or more of image data or video data,
wherein the data server being configured to adjust the content data includes being configured to add the uploaded visual element to the content data, the adjusted content data including the uploaded, added visual element. 29. The apparatus of claim 22, wherein the data server being configured to receive data associated with user action or user interaction includes being configured to receive a location identifier reflecting a geographic location or contact information for the user, and
wherein the data server being configured to adjust the content data includes being configured to add the location identifier or contact information to the content data, the adjusted content data including the added location identifier or contact information. 30. The apparatus of claim 29, wherein the data server being configured to adjust the content data includes being configured to add previously-uploaded image data with the location identifier or contact information, the adjusted content data including the added, previously-uploaded image data and location identifier or contact information. 31. A non-transitory computer-readable storage medium having computer-readable program code portions stored therein, the computer-readable storage medium and computer-readable program code portions being configured to, with a processor, cause an apparatus to at least:
receive a data stream including content data from a data server, the data server being configured to provide the same data stream to one or more other devices for presentation of the same content data by the respective one or more other devices; direct presentation of the content data of the data stream to a user, the content data including a plurality of visual elements, being configured to cause the apparatus to direct presentation of the content data including being configured to direct the apparatus to scroll or slide the visual elements arranged in a position on a screen; receive an indication of a user action, or an indication of user interaction with the content data of the data stream; and direct transmission of data associated with the user action or user interaction, the data server being configured to adjust the content data of the data stream per the user action or user interaction, the adjusted content data including different visual elements or the same visual elements arranged in a different position, wherein being configured to cause the apparatus to receive a data stream includes being configured to cause the apparatus to receive the data stream further including the adjusted content data, and being configured to cause the apparatus to direct presentation of the content data includes being configured to cause the apparatus to further direct presentation of the adjusted content data, the data server being configured to provide the same data stream to the one or more other devices for further presentation of the same adjusted content data by the respective one or more other devices. 32. The non-transitory computer-readable storage medium of claim 31, wherein the content data includes one or more of image data, textual data, video data or audio data. 33. The non-transitory computer-readable storage medium of claim 31, wherein the apparatus is caused to receive the indication of user interaction, the indication including one or more of image data, textual data, video data or audio data. 34. The non-transitory computer-readable storage medium of claim 31, wherein the apparatus is caused to receive the indication of user interaction, the indication including input regarding one or more elements of the content data. 35. The non-transitory computer-readable storage medium of claim 31, wherein the apparatus is caused to receive the indication of user interaction, the indication including a request for further information regarding one or more elements of the content data. 36. The non-transitory computer-readable storage medium of claim 31, wherein the apparatus is caused to receive the indication of user interaction, the indication including a request to purchase a good or service associated with one or more elements of the content data. 37. The non-transitory computer-readable storage medium of claim 31, wherein the apparatus is caused to receive the indication of user interaction, the indication including selection of a visual element different from the visual elements of the content data, the selected visual element including one or more of image data or video data,
wherein being configured to cause the apparatus to direct transmission of data associated with the user interaction includes being configured to cause the apparatus to direct an upload of the selected visual element, the data server being configured to adjust the content data of the data stream to add the selected, uploaded visual element of the content data, the adjusted content data including the uploaded, added visual element. 38. A non-transitory computer-readable storage medium having computer-readable program code portions stored therein, the computer-readable storage medium and computer-readable program code portions being configured to, with a processor, cause an apparatus to at least:
direct provision of a data stream including content data to a plurality of devices for presentation of the content data of the data stream to users of the respective devices, the content data including a plurality of visual elements, provision of the data stream being directed to the plurality of devices for the respective devices to scroll or slide the visual elements arranged in a position on respective screens; receive data associated with a user action, or data associated with a user interaction with the content data of the data stream at the respective one of the devices; and adjust the content data of the data stream per the user action or user interaction, the adjusted content data including different visual elements or the same visual elements arranged in a different position, wherein being configured to cause the apparatus to direct provision of a data stream further includes being configured to cause the apparatus to direct provision of the data stream further including the adjusted content data to the plurality of devices for further presentation of the adjusted content of the data stream to the users of the respective devices. 39. The non-transitory computer-readable storage medium of claim 38, wherein the content data includes one or more of image data, textual data, video data or audio data. 40. The non-transitory computer-readable storage medium of claim 38, wherein the apparatus is caused to receive the data associated with user interaction, the data including one or more of image data, textual data, video data or audio data. 41. The non-transitory computer-readable storage medium of claim 38, wherein the apparatus is caused to receive the data associated with user interaction, the data including input regarding one or more elements of the content data. 42. The non-transitory computer-readable storage medium of claim 38, wherein the apparatus is caused to receive the data associated with user interaction, the data including a request for further information regarding one or more elements of the content data. 43. The non-transitory computer-readable storage medium of claim 38, wherein the apparatus is caused to receive the data associated with user interaction, the data including a request to purchase a good or service associated with one or more elements of the content data. 44. The non-transitory computer-readable storage medium of claim 38, wherein the apparatus is caused to receive the data associated with user interaction, the data including an uploaded visual element different from the visual elements of the of the content data, the uploaded visual element including one or more of image data or video data,
wherein being configured to cause the apparatus to adjust the content data includes being configured to cause the apparatus to add the uploaded visual element to the content data, the adjusted content data including the uploaded, added visual element. | The present invention is geared generally towards the transmission of data, such as images, audio, video, or text, as a continuous stream via a network to recipients. In particular, the present invention relates to enabling the transmission of data to recipients and enabling the recipients to interact and influence the content of the transmission.1-9. (canceled) 10. An apparatus comprising:
a device configured to receive a data stream including content data from a data server, the data server being configured to provide the same data stream to one or more other devices for presentation of the same content data by the respective one or more other devices, wherein the device is configured to present the content data of the data stream to a user, the content data including a plurality of visual elements, the device being configured to present the content data including being configured to scroll or slide the visual elements arranged in a position on a screen, wherein the device is configured to receive an indication of a user action, or an indication of user interaction with the content data of the data stream, wherein the device is configured to transmit data associated with the user action or user interaction, the data server being configured to adjust the content data of the data stream per the user action or user interaction, the adjusted content data including different visual elements or the same visual elements arranged in a different position, and wherein the device being configured to receive a data stream includes being configured to receive the data stream further including the adjusted content data, and being configured to present the content data includes being configured to further present the adjusted content data, the data server being configured to provide the same data stream to the one or more other devices for further presentation of the same adjusted content data by the respective one or more other devices. 11. The apparatus of claim 10, wherein the device is one of a computer or a mobile device. 12. The apparatus of claim 10, wherein the content data includes one or more of image data, textual data, video data or audio data. 13. The apparatus of claim 10, wherein the device is configured to receive the indication of user interaction, the indication including one or more of image data, textual data, video data or audio data. 14. The apparatus of claim 10, wherein the device is configured to receive the indication of user interaction, the indication including input regarding one or more elements of the content data. 15. The apparatus of claim 10, wherein the device is configured to receive the indication of user interaction, the indication including a request for further information regarding one or more elements of the content data. 16. The apparatus of claim 10, wherein the device is configured to receive the indication of user interaction, the indication including a request to purchase a good or service associated with one or more elements of the content data. 17. The apparatus of claim 10, wherein the device is configured to receive the indication of user interaction, the indication including selection of a visual element different from the visual elements of the of the content data, the selected visual element including one or more of image data or video data,
wherein the device is configured to transmit data associated with the user interaction, including being configured to upload the selected visual element, the data server being configured to adjust the content data of the data stream to add the selected, uploaded visual element to the content data, the adjusted content data including the uploaded, added visual element. 18. The apparatus of claim 17, wherein the device being configured to receive the indication of user interaction includes being configured to further receive a location identifier reflecting a geographic location or contact information for the user,
wherein the device being configured to transmit data associated with the user interaction includes being configured to upload the selected visual element and location identifier or contact information, the data server thereby being configured to adjust the content data of the data stream to add the selected, uploaded visual element and location identifier or contact information to the content data, the adjusted content data including the uploaded, added visual element and location identifier or contact information. 19. The apparatus of claim 10, wherein the device being configured to receive the indication of user action or user interaction includes being configured to receive a location identifier reflecting a geographic location or contact the information for the user,
wherein the device being configured to transmit data associated with the user interaction includes being configured to transmit the location identifier or contact information, the data server being configured to adjust the content data of the data stream to add the location identifier or contact information to the content data, the adjusted content data including the added location identifier or contact information. 20. The apparatus of claim 10, wherein the content data of the data stream includes information for a plurality of goods or services available for purchase,
wherein the device is configured to receive the indication of user interaction, the indication including selection of one of the goods or services, and wherein the device being configured to transmit data associated with the user interaction includes being configured to transmit the selection, the data server thereby being configured to adjust the content data to add a second data stream to include the selected good or service and any other of the goods or services for which the data server receives selection from a predetermined number of the device and the one or more other devices, the second data stream thereby including goods or services designated as being popular goods or services. 21. The apparatus of claim 10, wherein the visual elements of the content data include empty advertising space interspersed with other visual elements,
wherein the device is configured to receive the indication of user interaction, the indication including selection of the empty advertising space, wherein the device being configured to transmit data associated with the user interaction includes being configured to transmit an indication of selection of the empty advertising space, the data server thereby being configured to cause the device to present a prompt to permit the user to input advertising data, and wherein the device is configured to receive further user interaction including being configured to receive the advertising data, the device being configured to transmit further data associated with the user interaction including being configured to transmit the advertising data, the data server thereby being configured to adjust the content data of the data stream to add the advertising data to the content data, the adjusted content data including the added advertising data. 22. An apparatus comprising:
a data server configured to provide a data stream including content data to a plurality of devices for presentation of the content data of the data stream to users of the respective devices, the content data including a plurality of visual elements, the data server being configured to provide the data stream for the respective devices to scroll or slide the visual elements arranged in a position on respective screens, wherein data server is configured to receive, data associated with a user action, or data associated with a user interaction with the content data of the data stream at the respective one of the devices, wherein the data server is configured to adjust the content data of the data stream per the user action or user interaction, the adjusted content data including different visual elements or the same visual elements arranged in a different position, and wherein the data server being configured to provide a data stream further includes being configured to provide the data stream further including the adjusted content data to the plurality of devices for further presentation of the adjusted content of the data stream to the users of the respective devices. 23. The apparatus of claim 22, wherein the content data includes one or more of image data, textual data, video data or audio data. 24. The apparatus of claim 22, wherein the data server is configured to receive the data associated with user interaction, the data including one or more of image data, textual data, video data or audio data. 25. The apparatus of claim 22, wherein the data server is configured to receive the data associated with user interaction includes being configured to receive, the data including input regarding one or more elements of the content data. 26. The apparatus of claim 22, wherein the data server is configured to receive the data associated with user interaction, the data including a request for further information regarding one or more elements of the content data. 27. The apparatus of claim 22, wherein the data server is configured to receive the data associated with user interaction, the data including a request to purchase a good or service associated with one or more elements of the content data. 28. The apparatus of claim 22, wherein data server is configured to receive the data associated with user interaction, the data including an uploaded visual element different from the visual elements of the of the content data, the uploaded visual element including one or more of image data or video data,
wherein the data server being configured to adjust the content data includes being configured to add the uploaded visual element to the content data, the adjusted content data including the uploaded, added visual element. 29. The apparatus of claim 22, wherein the data server being configured to receive data associated with user action or user interaction includes being configured to receive a location identifier reflecting a geographic location or contact information for the user, and
wherein the data server being configured to adjust the content data includes being configured to add the location identifier or contact information to the content data, the adjusted content data including the added location identifier or contact information. 30. The apparatus of claim 29, wherein the data server being configured to adjust the content data includes being configured to add previously-uploaded image data with the location identifier or contact information, the adjusted content data including the added, previously-uploaded image data and location identifier or contact information. 31. A non-transitory computer-readable storage medium having computer-readable program code portions stored therein, the computer-readable storage medium and computer-readable program code portions being configured to, with a processor, cause an apparatus to at least:
receive a data stream including content data from a data server, the data server being configured to provide the same data stream to one or more other devices for presentation of the same content data by the respective one or more other devices; direct presentation of the content data of the data stream to a user, the content data including a plurality of visual elements, being configured to cause the apparatus to direct presentation of the content data including being configured to direct the apparatus to scroll or slide the visual elements arranged in a position on a screen; receive an indication of a user action, or an indication of user interaction with the content data of the data stream; and direct transmission of data associated with the user action or user interaction, the data server being configured to adjust the content data of the data stream per the user action or user interaction, the adjusted content data including different visual elements or the same visual elements arranged in a different position, wherein being configured to cause the apparatus to receive a data stream includes being configured to cause the apparatus to receive the data stream further including the adjusted content data, and being configured to cause the apparatus to direct presentation of the content data includes being configured to cause the apparatus to further direct presentation of the adjusted content data, the data server being configured to provide the same data stream to the one or more other devices for further presentation of the same adjusted content data by the respective one or more other devices. 32. The non-transitory computer-readable storage medium of claim 31, wherein the content data includes one or more of image data, textual data, video data or audio data. 33. The non-transitory computer-readable storage medium of claim 31, wherein the apparatus is caused to receive the indication of user interaction, the indication including one or more of image data, textual data, video data or audio data. 34. The non-transitory computer-readable storage medium of claim 31, wherein the apparatus is caused to receive the indication of user interaction, the indication including input regarding one or more elements of the content data. 35. The non-transitory computer-readable storage medium of claim 31, wherein the apparatus is caused to receive the indication of user interaction, the indication including a request for further information regarding one or more elements of the content data. 36. The non-transitory computer-readable storage medium of claim 31, wherein the apparatus is caused to receive the indication of user interaction, the indication including a request to purchase a good or service associated with one or more elements of the content data. 37. The non-transitory computer-readable storage medium of claim 31, wherein the apparatus is caused to receive the indication of user interaction, the indication including selection of a visual element different from the visual elements of the content data, the selected visual element including one or more of image data or video data,
wherein being configured to cause the apparatus to direct transmission of data associated with the user interaction includes being configured to cause the apparatus to direct an upload of the selected visual element, the data server being configured to adjust the content data of the data stream to add the selected, uploaded visual element of the content data, the adjusted content data including the uploaded, added visual element. 38. A non-transitory computer-readable storage medium having computer-readable program code portions stored therein, the computer-readable storage medium and computer-readable program code portions being configured to, with a processor, cause an apparatus to at least:
direct provision of a data stream including content data to a plurality of devices for presentation of the content data of the data stream to users of the respective devices, the content data including a plurality of visual elements, provision of the data stream being directed to the plurality of devices for the respective devices to scroll or slide the visual elements arranged in a position on respective screens; receive data associated with a user action, or data associated with a user interaction with the content data of the data stream at the respective one of the devices; and adjust the content data of the data stream per the user action or user interaction, the adjusted content data including different visual elements or the same visual elements arranged in a different position, wherein being configured to cause the apparatus to direct provision of a data stream further includes being configured to cause the apparatus to direct provision of the data stream further including the adjusted content data to the plurality of devices for further presentation of the adjusted content of the data stream to the users of the respective devices. 39. The non-transitory computer-readable storage medium of claim 38, wherein the content data includes one or more of image data, textual data, video data or audio data. 40. The non-transitory computer-readable storage medium of claim 38, wherein the apparatus is caused to receive the data associated with user interaction, the data including one or more of image data, textual data, video data or audio data. 41. The non-transitory computer-readable storage medium of claim 38, wherein the apparatus is caused to receive the data associated with user interaction, the data including input regarding one or more elements of the content data. 42. The non-transitory computer-readable storage medium of claim 38, wherein the apparatus is caused to receive the data associated with user interaction, the data including a request for further information regarding one or more elements of the content data. 43. The non-transitory computer-readable storage medium of claim 38, wherein the apparatus is caused to receive the data associated with user interaction, the data including a request to purchase a good or service associated with one or more elements of the content data. 44. The non-transitory computer-readable storage medium of claim 38, wherein the apparatus is caused to receive the data associated with user interaction, the data including an uploaded visual element different from the visual elements of the of the content data, the uploaded visual element including one or more of image data or video data,
wherein being configured to cause the apparatus to adjust the content data includes being configured to cause the apparatus to add the uploaded visual element to the content data, the adjusted content data including the uploaded, added visual element. | 2,400 |
7,142 | 7,142 | 13,991,388 | 2,449 | Various systems and techniques for remote machine management are described. Simulated device input (SDI) may be received from a source machine at a device driver module of a target machine, the source machine is remote from the target machine. The SDI may correspond to a local target input device serviced by the device driver module. The SDI may be provided to a consumer of the device driver module. A representation of a local target machine graphical display may be transmitted to the source machine including a response to the provided SDI. | 1. A non-transitory machine readable medium including instructions that, when executed by a machine, cause the machine to perform operations comprising:
receiving, at a device driver module of a target machine, simulated device input, herein referred to as SDI, from a source machine, the SDI corresponding to a local target input device serviced by the device driver module, the source machine being remote from the target machine; providing the SDI to a consumer of the device driver module; and transmitting a representation of a graphical display of the target machine's to the administration machine including a response to the provided SDI. 2. The machine readable medium of claim 1, wherein the SDI is in a universal form, and wherein providing the SDI to the consumer includes converting the universal form to device input specific to the device driver module. 3. The machine readable medium of claim 1, wherein the SDI is in a specific form, and wherein providing the SDI to the consumer includes passing the SDI to the consumer without modification. 4. The machine readable medium of claim 1, wherein the source machine does not have a version of the target input device. 5. The machine readable medium of claim 1, wherein receiving the SDI from the source machine includes authenticating the source machine. 6. The machine readable medium of claim 5, wherein authenticating the source machine includes authenticating the source machine using a local security module outside of the target machine's operating system's control. 7. (canceled) 8. The machine readable medium of claim 1, wherein the target input device is a multi-point touch interface. 9. The machine readable medium of claim 1, wherein the target input device is an accelerometer. 10. (canceled) 11. A source machine for remote device management, the source machine comprising:
a management module configured to:
create simulated device input, herein referred to as SDI, for a target input device based on a source input device and a selection of the target input device received from a user of the source machine;
transmit the SDI to a target machine remote from the source machine; and
present, to the user, a representation of a graphical display of the target machine; and
a graphical display to display a representation of the graphical display of the target machine. 12. The source machine of claim 11, comprising a profile module configured to translate source input from the source input device into a specific form of device input corresponding to the target input device. 13. The source machine of claim 11, wherein the source input device is a mouse and the target input device is a multi-point touch interface. 14. The source machine of claim 11, wherein the source input device is a mouse and the target input device is a proximity sensor. 15. A target machine for remote device management, the target machine comprising:
a device driver module on the target machine, the device driver module configured to:
receive simulated device input, herein referred to as SDI, from a source machine, the SDI based on a source input device and a selection of the target input device received from a user of the source machine; and
provide the SDI to a consumer of the device driver module, the consumer being local to the target machine; and
a graphical display module on the target machine, the graphical display module configured to transmit the representation of the graphical display to the source machine. 16. The target machine of claim 15, wherein the SDI is in a universal form, and wherein to provide the SDI to the consumer includes the device driver module configured to convert the universal form to device input specific to the device driver module. 17. The target machine of claim 15, wherein the SDI is in a specific form, and wherein to provide the SDI to the consumer the device driver module is configured to passing the SDI to the consumer without modification. 18. The target machine of claim 15, wherein the source machine does not have a version of the target input device. 19. The target machine of claim 15, wherein to receive the SDI from the source machine the device driver module is configured to authenticate the source machine. 20. The target machine of claim 19, wherein to authenticate the source machine the device driver module is configured to use a local security module outside an operating system of the target's control. 21. The target machine of claim 19, wherein to authenticate the source machine the local security module is configured to identify a set of permitted consumers; and wherein the consumer is in the set of permitted consumers. 22. The target machine of claim 15, wherein the target input device is a multi-point touch interface. 23. The target machine of claim 15, wherein the target input device is an accelerometer. 24. A system for remote device management, the system comprising:
a management module on a source machine, the management module configured to:
create simulated device input, herein referred to as SDI, for a target input device based on a source input device and a selection of the target input device received from a user;
transmit the SDI to a target machine remote from the source machine; and
present, to the user, a representation of a graphical display of the target machine;
a device driver module on the target machine, the device driver module configured to:
receive the SDI; and
provide the SDI to a consumer of the device driver module, the consumer being local to the target machine; and
a graphical display module on the target machine, the graphical display module configured to transmit the representation of the graphical display to the source machine. 25. The system of claim 24, comprising a profile module configured to translate source input from the source input device into a specific form of device input corresponding to the target input device. 26. The system of claim 24, wherein the source input device is a mouse and the target input device is a multi-point touch interface. 27. The system of claim 24, wherein the source input device is a mouse and the target input device is a proximity sensor. | Various systems and techniques for remote machine management are described. Simulated device input (SDI) may be received from a source machine at a device driver module of a target machine, the source machine is remote from the target machine. The SDI may correspond to a local target input device serviced by the device driver module. The SDI may be provided to a consumer of the device driver module. A representation of a local target machine graphical display may be transmitted to the source machine including a response to the provided SDI.1. A non-transitory machine readable medium including instructions that, when executed by a machine, cause the machine to perform operations comprising:
receiving, at a device driver module of a target machine, simulated device input, herein referred to as SDI, from a source machine, the SDI corresponding to a local target input device serviced by the device driver module, the source machine being remote from the target machine; providing the SDI to a consumer of the device driver module; and transmitting a representation of a graphical display of the target machine's to the administration machine including a response to the provided SDI. 2. The machine readable medium of claim 1, wherein the SDI is in a universal form, and wherein providing the SDI to the consumer includes converting the universal form to device input specific to the device driver module. 3. The machine readable medium of claim 1, wherein the SDI is in a specific form, and wherein providing the SDI to the consumer includes passing the SDI to the consumer without modification. 4. The machine readable medium of claim 1, wherein the source machine does not have a version of the target input device. 5. The machine readable medium of claim 1, wherein receiving the SDI from the source machine includes authenticating the source machine. 6. The machine readable medium of claim 5, wherein authenticating the source machine includes authenticating the source machine using a local security module outside of the target machine's operating system's control. 7. (canceled) 8. The machine readable medium of claim 1, wherein the target input device is a multi-point touch interface. 9. The machine readable medium of claim 1, wherein the target input device is an accelerometer. 10. (canceled) 11. A source machine for remote device management, the source machine comprising:
a management module configured to:
create simulated device input, herein referred to as SDI, for a target input device based on a source input device and a selection of the target input device received from a user of the source machine;
transmit the SDI to a target machine remote from the source machine; and
present, to the user, a representation of a graphical display of the target machine; and
a graphical display to display a representation of the graphical display of the target machine. 12. The source machine of claim 11, comprising a profile module configured to translate source input from the source input device into a specific form of device input corresponding to the target input device. 13. The source machine of claim 11, wherein the source input device is a mouse and the target input device is a multi-point touch interface. 14. The source machine of claim 11, wherein the source input device is a mouse and the target input device is a proximity sensor. 15. A target machine for remote device management, the target machine comprising:
a device driver module on the target machine, the device driver module configured to:
receive simulated device input, herein referred to as SDI, from a source machine, the SDI based on a source input device and a selection of the target input device received from a user of the source machine; and
provide the SDI to a consumer of the device driver module, the consumer being local to the target machine; and
a graphical display module on the target machine, the graphical display module configured to transmit the representation of the graphical display to the source machine. 16. The target machine of claim 15, wherein the SDI is in a universal form, and wherein to provide the SDI to the consumer includes the device driver module configured to convert the universal form to device input specific to the device driver module. 17. The target machine of claim 15, wherein the SDI is in a specific form, and wherein to provide the SDI to the consumer the device driver module is configured to passing the SDI to the consumer without modification. 18. The target machine of claim 15, wherein the source machine does not have a version of the target input device. 19. The target machine of claim 15, wherein to receive the SDI from the source machine the device driver module is configured to authenticate the source machine. 20. The target machine of claim 19, wherein to authenticate the source machine the device driver module is configured to use a local security module outside an operating system of the target's control. 21. The target machine of claim 19, wherein to authenticate the source machine the local security module is configured to identify a set of permitted consumers; and wherein the consumer is in the set of permitted consumers. 22. The target machine of claim 15, wherein the target input device is a multi-point touch interface. 23. The target machine of claim 15, wherein the target input device is an accelerometer. 24. A system for remote device management, the system comprising:
a management module on a source machine, the management module configured to:
create simulated device input, herein referred to as SDI, for a target input device based on a source input device and a selection of the target input device received from a user;
transmit the SDI to a target machine remote from the source machine; and
present, to the user, a representation of a graphical display of the target machine;
a device driver module on the target machine, the device driver module configured to:
receive the SDI; and
provide the SDI to a consumer of the device driver module, the consumer being local to the target machine; and
a graphical display module on the target machine, the graphical display module configured to transmit the representation of the graphical display to the source machine. 25. The system of claim 24, comprising a profile module configured to translate source input from the source input device into a specific form of device input corresponding to the target input device. 26. The system of claim 24, wherein the source input device is a mouse and the target input device is a multi-point touch interface. 27. The system of claim 24, wherein the source input device is a mouse and the target input device is a proximity sensor. | 2,400 |
7,143 | 7,143 | 14,238,501 | 2,481 | The embodiments relates to motion vector prediction and decoding for multi-view video content from multiple camera views ( 10, 20 ). At least one candidate motion vector predictor ( 44, 54 ) is provided for a current motion vector ( 34 ) to be encoded. A motion vector predictor ( 44 ) is then determined from the at least one candidate motion vector predictor ( 44, 54 ). Correspondingly, during decoding a motion vector ( 34 ) is determined for a current pixel block ( 30 ) based on a motion vector predictor ( 44 ) determined for the current pixel block ( 30 ). | 1-38. (canceled) 39. A method of motion vector prediction for multi-view video coding of video content from multiple camera views, said method comprising:
determining a motion vector type from multiple predefined motion vector types for a motion vector, wherein said motion vector is estimated for a current pixel block in a current frame of a current camera view of said multiple camera views and said motion vector identifies a reference pixel area in a reference frame, wherein said motion vector type is determined based on at least one of i) said current camera view and a camera view of said reference frame among said multiple camera views, and ii) a point in time of said current frame and a point in time of said reference frame; identifying at least one candidate motion vector predictor of said determined motion vector type; and determining a motion vector predictor for said motion vector based on said at least one candidate motion vector predictor. 40. The method of claim 39, wherein
determining said motion vector type comprises determining said motion vector type to be a temporal motion vector type in the event that said point of time of said current frame is different from said point of time of said reference frame; and identifying said at least one candidate motion vector predictor comprises identifying at least one candidate motion vector predictor associated with a pixel block in a first frame and identifying a pixel area in a first reference frame having a point in time different from a point in time of said first frame but belonging to a same camera view of said multiple camera views as said first frame. 41. The method of claim 39, wherein
determining said motion vector type comprises determining said motion vector type to be an inter-view motion vector type in the event that said current camera view is different from said camera view of said reference frame; and identifying said at least one candidate motion vector predictor comprises identifying at least one candidate motion vector predictor associated with a pixel block in a first frame in a first camera view of said multiple camera views and identifying a pixel area in a first reference frame having a point in time equal to a point in time of said first frame but belonging to a camera view of said multiple camera views different from said first camera view. 42. The method of claim 39, wherein identifying said at least one candidate motion vector predictor comprises identifying said at least one candidate motion vector predictor from a set of multiple candidate motion vector predictors determined based on a position of said current pixel block in said current frame, said point in time of said current frame and said current camera view. 43. The method of claim 39, further comprising calculating a residual motion vector based on said motion vector and said motion vector predictor. 44. The method of claim 39, further comprising estimating, for said current pixel block, said motion vector identifying said reference pixel area in said reference frame. 45. The method of claim 44, wherein estimating said motion vector comprises estimating, for said current pixel block, said motion vector identifying said reference pixel area in said reference frame of a reference camera view of said multiple camera views, said current frame having a current picture order count (CurrPOC) and said reference frame having a reference picture order count (CurrRfPOC), wherein said at least one candidate motion vector predictor is associated with a pixel block in a first frame having a first picture order count (RfPOC) and identifies a pixel area in a first reference frame having a first reference picture order count (RfRfPOC), said method further comprising:
determining, for said at least one candidate motion vector predictor, a scaling factor to be equal to a fixed predefined value in the event that i) said current picture order count is equal to said reference picture order count or ii) said first picture order count is equal to said first reference picture order count, and otherwise determining said scaling factor to be based on
CurrPOC
-
CurrRfPOC
RfPOC
-
RfRfPOC
;
and
determining, for said at least one candidate motion vector predictor, a scaled candidate motion vector predictor based on said candidate motion vector predictor multiplied by said scaling factor, wherein determining said motion vector predictor comprises determining said motion vector predictor for said motion vector based on said at least one scaled candidate motion vector predictor. 46. The method of claim 44, wherein estimating said motion vector comprises estimating, for said current pixel block, said motion vector identifying said reference pixel area in said reference frame of a reference camera view of said multiple camera views, said current camera view being different from said reference camera view, wherein said at least one candidate motion vector predictor is associated with a pixel block in a first frame of a first camera view of said multiple camera views and identifies a pixel area in a first reference frame of a first reference camera view of said multiple camera views, said first camera view being different from said first reference camera view, and wherein said method further comprises:
determining a scaling factor, for said at least one candidate motion vector predictor, based on a baseline distance between said current camera view and said reference camera view and a baseline distance between said first camera view and said first reference camera view; and determining, for said at least one candidate motion vector predictor, a scaled candidate motion vector predictor based on said candidate motion vector predictor multiplied by said scaling factor, wherein determining said motion vector predictor comprises determining said motion vector predictor for said motion vector based on said at least one scaled candidate motion vector predictor. 47. The method of claim 46, wherein determining said scaling factor comprises determining said scaling factor, for said at least one candidate motion vector predictor, based on a quotient between said baseline distance between said current camera view and said reference camera view and said baseline distance between said first camera view and said first reference camera view. 48. A non-transitory computer-readable medium comprising, stored thereupon, a computer program for predicting motion vectors for multi-view video coding of video content from multiple camera views, said computer program comprising code that, when run on a computer, causes said computer to:
determine a motion vector type from multiple predefined motion vector types for a motion vector, wherein said motion vector is estimated for a current pixel block in a current frame of a current view of said multiple camera views and said motion vector identifies a reference pixel area in a reference frame, wherein said motion vector type is determined based on at least one of i) said current camera view and a camera view of said reference frame among said multiple camera views, and ii) a point in time of said current frame and a point in time of said reference frame; identify at least one candidate motion vector predictor of said determined motion vector type; and determine a motion vector predictor for said motion vector based on said at least one candidate motion vector predictor. 49. A device for motion vector prediction for multi-view video coding of video content from multiple camera views, said device comprising:
a type determiner configured to determine a motion vector type from multiple predefined motion vector types for a motion vector, wherein said motion vector is estimated for a current pixel block in a current frame of a current camera view of said multiple camera views and said motion vector identifies a reference pixel area in a reference frame, wherein said type determiner is configured to determine said motion vector type based on at least one of i) said current camera view and a camera view of said reference frame among said multiple camera views, and ii) a point in time of said current frame and a point in time of said reference frame; a predictor identifier configured to identify at least one candidate motion vector predictor of said motion vector type determined by said type determiner; and a predictor determiner configured to determine a motion vector predictor for said motion vector based on said at least one candidate motion vector predictor identified by said predictor identifier. 50. The device of claim 49, wherein:
said type determiner is configured to determine said motion vector type to be a temporal motion vector type in the event that said point of time of said current frame is different from said point of time of said reference frame; and said predictor identifier is configured to identify at least one candidate motion vector predictor associated with a pixel block in a first frame and identifying a pixel area in a first reference frame having a point in time different from a point in time of said first frame but belonging to a same camera view of said multiple camera views as said first frame. 51. The device of claim 49, wherein:
said type determiner is configured to determine said motion vector type to be an inter-view motion vector type in the event that said current camera view is different from said camera view of said reference frame; and said predictor identifier is configured to identify at least one candidate motion vector predictor associated with a pixel block in a first frame in a first camera view of said multiple camera views and identify a pixel area in a first reference frame having a point in time equal to a point in time of said first frame but belonging to a camera view of said multiple camera views different from said first camera view. 52. The device of claim 49, wherein said predictor identifier is configured to identify said at least one candidate motion vector predictor from a set of multiple candidate motion vector predictors determined based on a position of said current pixel block in said current frame, said point in time of said current frame and said current camera view. 53. The device of claim 49, further comprising a vector calculator configured to calculate a residual motion vector based on said motion vector and said motion vector predictor. 54. The device of claim 49, further comprising a motion vector (MV) estimator configured to estimate, for said current pixel block, said motion vector identifying said reference pixel area in said reference frame. 55. The device of claim 54, wherein said MV estimator is configured to estimate, for said current pixel block, said motion vector identifying said reference pixel area in said reference frame of a reference camera view of said multiple camera views, said current frame having a current picture order count (CurrPOC) and said reference frame having a reference picture order count (CurrRfPOC), wherein said at least one candidate motion vector predictor is associated with a pixel block in a first frame having a first picture order count (RfPOC) and identifies a pixel area in a first reference frame having a first reference picture order count (RfRfPOC), and wherein said device further comprises:
a scaling factor determiner configured to determine, for said at least one candidate motion vector predictor, a scaling factor to be equal to a fixed predefined value in the event that i) said current picture order count is equal to said reference picture order count, or ii) said first picture order count is equal to said first reference picture order count, and otherwise determine said scaling factor to be based on
CurrPOC
-
CurrRfPOC
RfPOC
-
RfRfPOC
;
and
a scaled predictor determiner configured to determine, for said at least one candidate motion vector predictor, a scaled candidate motion vector predictor based on said candidate motion vector predictor multiplied by said scaling factor, wherein said predictor determiner is configured to determine said motion vector predictor for said motion vector based on said at least one scaled candidate motion vector predictor. 56. The device of claim 54, wherein said MV estimator is configured to estimate, for said current pixel block, said motion vector identifying said reference pixel area in said reference frame of a reference camera view of said multiple camera views, said current camera view being different from said reference camera view, said at least one candidate motion vector predictor is associated with a pixel block in a first frame of a first camera view of said multiple camera views and identifies a pixel area in a first reference frame of a first reference camera view of said multiple camera views, said first camera view being different from said first reference camera view, wherein said device further comprises:
a scaling factor determiner configured to determine a scaling factor for said at least one candidate motion vector predictor based on a baseline distance between said current camera view and said reference camera view and a baseline distance between said first camera view and said first reference camera view; and a scaled predictor determiner configured to determine, for said at least one candidate motion vector predictor, a scaled candidate motion vector predictor based on said candidate motion vector predictor multiplied by said scaling factor, wherein said predictor determiner is configured to determine said motion vector predictor for said motion vector based on said at least one scaled candidate motion vector predictor. 57. The device of claim 56, wherein said scaling factor determiner is configured to determine said scaling factor, for said at least one candidate motion vector predictor, based on a quotient between said baseline distance between said current camera view and said reference camera view and said baseline distance between said first camera view and said first reference camera view. 58. A method of motion vector decoding for encoded multi-view video from multiple camera views, said method comprises:
providing, for a current pixel block in a current frame of a current camera view of said multiple camera views, a reference frame index identifying a reference frame; determining a motion vector type from multiple predefined motion vector types for said current pixel block and based on at least one of i) said current camera view and a camera view of said reference frame among said multiple camera views, and ii) a point in time of said current frame and a point in time of said reference frame; generating a candidate list comprising at least one candidate motion vector predictor of said determined motion vector type; and determining a motion vector for said current pixel block based on a candidate motion vector predictor of said candidate list. 59. The method of claim 58, wherein:
determining said motion vector type comprises determining said motion vector type to be a temporal motion vector type if said point of time of said current frame is different from said point of time of said reference frame; and generating said candidate list comprises generating said candidate list comprising at least one candidate motion vector predictor associated with a pixel block in a first frame and identifying a pixel area in a first reference frame having a point in time different from a point in time of said first frame but belonging to a same camera view of said multiple camera views as said first frame. 60. The method of claim 58, wherein:
determining said motion vector type comprises determining said motion vector type to be an inter-view motion vector type in the event that said current camera view is different from said camera view of said reference frame; and generating said candidate list comprises generating said candidate list comprising at least one candidate motion vector predictor associated with a pixel block in a first frame in a first camera view of said multiple camera views and identifying a pixel area in a first reference frame having a point in time equal to a point in time of said first frame but belonging to a camera view of said multiple camera views different from said first camera view. 61. The method of claim 58, wherein generating said candidate list comprises identifying said at least one candidate motion vector predictor from a set of multiple candidate motion vector predictors determined based on a position of said current pixel block in said current frame, said point in time of said current frame and said current camera view. 62. The method of claim 61, further comprising determining said set of multiple candidate motion vector predictors based on at least one of i) motion vectors associated with spatially neighboring pixel blocks in said current frame, ii) motion vectors associated with temporally neighboring pixel blocks in frames different from said current frame but belonging to said current camera view, iii) motion vectors associated with pixel blocks in frames belonging to camera views of said multiple camera views different from said current camera view but having a respective point in time equal to said point in time of said current frame. 63. The method of claim 58, wherein providing said reference frame index comprises providing, for said current pixel block in said current frame having a current picture order count (CurrPOC) and being present in said current camera view, said reference frame index identifying said reference frame having a reference picture order count (CurrRfPOC) and being present in a reference camera view of said multiple camera views, said at least one candidate motion vector predictor is associated with a pixel block in a first frame having a first picture order count (RfPOC) and identifies a pixel area in a first reference frame having a first reference picture order count (RfRfPOC), said method further comprises:
determining, for said at least one candidate motion vector predictor, a respective scaling factor to be equal to a fixed predefined value if i) said current picture order count is equal to said reference picture order count, or ii) said first picture order count is equal to said first reference picture order count and otherwise determining said scaling factor to be base on
CurrPOC
-
CurrRfPOC
RfPOC
-
RfRfPOC
,
wherein generating said candidate list comprises generating said candidate list comprising at least one scaled candidate motion vector predictor formed based on said at least one candidate motion vector predictor multiplied by said respective scaling factor. 64. The method of claim 58, wherein providing said reference frame index comprises providing, for said current pixel block, said reference frame index identifying said reference frame of a reference camera view of said multiple camera views, said current camera view being different from said reference camera view, wherein said at least one candidate motion vector predictor is associated with a pixel block in a first frame of a first camera view of said multiple camera views and identifies a pixel area in a first reference frame of a first reference camera view of said multiple camera views, said first camera view being different from said first reference camera view, said method further comprising:
determining, for said at least one candidate motion vector predictor, a respective scaling factor based on a baseline distance between said current camera view and said reference camera view and a baseline distance between said first camera view and said first reference camera view, wherein generating said candidate list comprises generating said candidate list comprising at least one scaled candidate motion vector predictor formed based on said at least one candidate motion vector predictor multiplied by said respective scaling factor. 65. The method of claim 64, wherein determining said respective scaling factor comprises determining said respective scaling factor, for said at least one candidate motion vector predictor, based on a quotient between said baseline distance between said current camera view and said reference camera view and said baseline distance between said first camera view and said first reference camera view. 66. The method of claim 58, further comprising selecting a motion vector predictor from said candidate list for said current pixel block based on a predictor index associated with said current pixel block, wherein determining said motion vector comprises determining said motion vector for said current pixel block based on said selected motion vector predictor and a residual motion vector associated with said current pixel block. 67. A non-transitory computer-readable medium comprising, stored thereupon, a computer program for decoding motion vectors for encoded multi-view video from multiple camera views, said computer program comprising code that, when run on a computer, causes said computer to:
provide, for a current pixel block in a current frame of a current camera view of said multiple camera views, a reference frame index identifying a reference frame; determine a motion vector type from multiple predefined motion vector types for said current pixel block and based on at least one of i) said current camera view and a camera view of said reference frame among said multiple camera views, and ii) a point in time of said current frame and a point in time of said reference frame; generate a candidate list comprising at least one candidate motion vector predictor of said determined motion vector type; and determine a motion vector for said current pixel block based on a candidate motion vector predictor of said candidate list. 68. A device for motion vector decoding for encoded multi-view video from multiple camera views, said device comprising:
an index provider configured to provide, for a current pixel block in a current frame of a current camera view of said multiple camera views, a reference frame index identifying a reference frame; a type determiner configured to determine a motion vector type from multiple predefined motion vector types for said current pixel block and based on at least one of i) said current camera view and a camera view of said reference frame among said multiple camera views, and ii) a point in time of said current frame and a point in time of said reference frame; a list generator configured to generate a candidate list comprising at least one candidate motion vector predictor of said motion vector type determined by said type determiner; and a vector determiner configured to determine a motion vector for said current pixel block based on a candidate motion vector predictor of said candidate list. 69. The device of claim 68, wherein
said type determiner is configured to determine said motion vector type to be a temporal motion vector type in the event that said point of time of said current frame is different from said point of time of said reference frame; and said list generator is configured to generate said candidate list comprising at least one candidate motion vector predictor associated with a pixel block in a first frame and i) identifying a pixel area in a first reference frame having a point in time different from a point in time of said first frame but belonging to a same camera view of said multiple camera views as said first frame, or ii) identifying a pixel area in a first reference frame having a point in time different from said point in time of said first frame and belonging to a camera view of said multiple camera views different from said camera view of said first frame. 70. The device of claim 68, wherein
said type determiner is configured to determine said motion vector type to be an inter-view motion vector type in the event that said current camera view is different from said camera view of said reference frame; and said list generator is configured to generate said candidate list comprising at least one candidate motion vector predictor associated with a pixel block in a first frame in a first camera view of said multiple camera views and identifying a pixel area in a first reference frame having a point in time equal to a point in time of said first frame but belonging to a camera view of said multiple camera views different from said first camera view. 71. The device of claim 68, wherein said list generator is configured to identify said at least one candidate motion vector predictor from a set of multiple candidate motion vector predictors determined based on a position of said current pixel block in said current frame, said point in time of said current frame and said current camera view. 72. The device of claim 68, wherein said index provider is configured to provide, for said current pixel block in said current frame having a current picture order count (CurrPOC), said reference frame index identifying said reference frame having a reference picture order count (CurrRfPOC) and being present in a reference camera view of said multiple camera views, said at least one candidate motion vector predictor is associated with a pixel block in a first frame having a first picture order count (RfPOC) and identifies a pixel area in a first reference frame having a first reference picture order count (RfRfPOC), said device further comprises:
a scaling factor determiner configured to determine, for said at least one candidate motion vector predictor, a respective scaling factor to be equal to a fixed predefined value in the event that i) said current picture order count is equal to said reference picture order count, or ii) said first picture order count is equal to said first reference picture order count, and to otherwise determine said scaling factor to be based on
CurrPOC
-
CurrRfPOC
RfPOC
-
RfRfPOC
,
wherein said list generator is configured to generate said candidate list comprising at least one scaled candidate motion vector predictor formed based on said at least one candidate motion vector predictor multiplied by said respective scaling factor. 73. The device of claim 68, wherein said index provider is configured to provide, for said current pixel block, said reference frame index identifying said reference frame of a reference camera view of said multiple camera views, said current camera view being different from said reference camera view, wherein said at least one candidate motion vector predictor is associated with a pixel block in a first frame of a first camera view of said multiple camera views and identifies a pixel area in a first reference frame of a first reference camera view of said multiple camera views, said first camera view being different from said first reference camera view, said device further comprising:
a scaling factor determiner configured to determine, for said at least one candidate motion vector predictor, a respective scaling factor based on a baseline distance between said current camera view and said reference camera view and a baseline distance between said first camera view and said first reference camera view, wherein said list generator is configured to generate said candidate list comprising at least one scaled candidate motion vector predictor formed based on said at least one candidate motion vector predictor multiplied by said respective scaling factor. 74. The device of claim 73, wherein said scaling factor determiner is configured to determine said respective scaling factor, for said at least one candidate motion vector predictor, based on a quotient between said baseline distance between said current camera view and said reference camera view and said baseline distance between said first camera view and said first reference camera view. 75. The device of claim 68, further comprising a predictor selector configured to select a motion vector predictor from said candidate list for said current pixel block based on a predictor index associated with said current pixel block, wherein said vector determiner is configured to determine said motion vector for said current pixel block based on said motion vector predictor selected by said predictor selector and a residual motion vector associated with said current pixel block. | The embodiments relates to motion vector prediction and decoding for multi-view video content from multiple camera views ( 10, 20 ). At least one candidate motion vector predictor ( 44, 54 ) is provided for a current motion vector ( 34 ) to be encoded. A motion vector predictor ( 44 ) is then determined from the at least one candidate motion vector predictor ( 44, 54 ). Correspondingly, during decoding a motion vector ( 34 ) is determined for a current pixel block ( 30 ) based on a motion vector predictor ( 44 ) determined for the current pixel block ( 30 ).1-38. (canceled) 39. A method of motion vector prediction for multi-view video coding of video content from multiple camera views, said method comprising:
determining a motion vector type from multiple predefined motion vector types for a motion vector, wherein said motion vector is estimated for a current pixel block in a current frame of a current camera view of said multiple camera views and said motion vector identifies a reference pixel area in a reference frame, wherein said motion vector type is determined based on at least one of i) said current camera view and a camera view of said reference frame among said multiple camera views, and ii) a point in time of said current frame and a point in time of said reference frame; identifying at least one candidate motion vector predictor of said determined motion vector type; and determining a motion vector predictor for said motion vector based on said at least one candidate motion vector predictor. 40. The method of claim 39, wherein
determining said motion vector type comprises determining said motion vector type to be a temporal motion vector type in the event that said point of time of said current frame is different from said point of time of said reference frame; and identifying said at least one candidate motion vector predictor comprises identifying at least one candidate motion vector predictor associated with a pixel block in a first frame and identifying a pixel area in a first reference frame having a point in time different from a point in time of said first frame but belonging to a same camera view of said multiple camera views as said first frame. 41. The method of claim 39, wherein
determining said motion vector type comprises determining said motion vector type to be an inter-view motion vector type in the event that said current camera view is different from said camera view of said reference frame; and identifying said at least one candidate motion vector predictor comprises identifying at least one candidate motion vector predictor associated with a pixel block in a first frame in a first camera view of said multiple camera views and identifying a pixel area in a first reference frame having a point in time equal to a point in time of said first frame but belonging to a camera view of said multiple camera views different from said first camera view. 42. The method of claim 39, wherein identifying said at least one candidate motion vector predictor comprises identifying said at least one candidate motion vector predictor from a set of multiple candidate motion vector predictors determined based on a position of said current pixel block in said current frame, said point in time of said current frame and said current camera view. 43. The method of claim 39, further comprising calculating a residual motion vector based on said motion vector and said motion vector predictor. 44. The method of claim 39, further comprising estimating, for said current pixel block, said motion vector identifying said reference pixel area in said reference frame. 45. The method of claim 44, wherein estimating said motion vector comprises estimating, for said current pixel block, said motion vector identifying said reference pixel area in said reference frame of a reference camera view of said multiple camera views, said current frame having a current picture order count (CurrPOC) and said reference frame having a reference picture order count (CurrRfPOC), wherein said at least one candidate motion vector predictor is associated with a pixel block in a first frame having a first picture order count (RfPOC) and identifies a pixel area in a first reference frame having a first reference picture order count (RfRfPOC), said method further comprising:
determining, for said at least one candidate motion vector predictor, a scaling factor to be equal to a fixed predefined value in the event that i) said current picture order count is equal to said reference picture order count or ii) said first picture order count is equal to said first reference picture order count, and otherwise determining said scaling factor to be based on
CurrPOC
-
CurrRfPOC
RfPOC
-
RfRfPOC
;
and
determining, for said at least one candidate motion vector predictor, a scaled candidate motion vector predictor based on said candidate motion vector predictor multiplied by said scaling factor, wherein determining said motion vector predictor comprises determining said motion vector predictor for said motion vector based on said at least one scaled candidate motion vector predictor. 46. The method of claim 44, wherein estimating said motion vector comprises estimating, for said current pixel block, said motion vector identifying said reference pixel area in said reference frame of a reference camera view of said multiple camera views, said current camera view being different from said reference camera view, wherein said at least one candidate motion vector predictor is associated with a pixel block in a first frame of a first camera view of said multiple camera views and identifies a pixel area in a first reference frame of a first reference camera view of said multiple camera views, said first camera view being different from said first reference camera view, and wherein said method further comprises:
determining a scaling factor, for said at least one candidate motion vector predictor, based on a baseline distance between said current camera view and said reference camera view and a baseline distance between said first camera view and said first reference camera view; and determining, for said at least one candidate motion vector predictor, a scaled candidate motion vector predictor based on said candidate motion vector predictor multiplied by said scaling factor, wherein determining said motion vector predictor comprises determining said motion vector predictor for said motion vector based on said at least one scaled candidate motion vector predictor. 47. The method of claim 46, wherein determining said scaling factor comprises determining said scaling factor, for said at least one candidate motion vector predictor, based on a quotient between said baseline distance between said current camera view and said reference camera view and said baseline distance between said first camera view and said first reference camera view. 48. A non-transitory computer-readable medium comprising, stored thereupon, a computer program for predicting motion vectors for multi-view video coding of video content from multiple camera views, said computer program comprising code that, when run on a computer, causes said computer to:
determine a motion vector type from multiple predefined motion vector types for a motion vector, wherein said motion vector is estimated for a current pixel block in a current frame of a current view of said multiple camera views and said motion vector identifies a reference pixel area in a reference frame, wherein said motion vector type is determined based on at least one of i) said current camera view and a camera view of said reference frame among said multiple camera views, and ii) a point in time of said current frame and a point in time of said reference frame; identify at least one candidate motion vector predictor of said determined motion vector type; and determine a motion vector predictor for said motion vector based on said at least one candidate motion vector predictor. 49. A device for motion vector prediction for multi-view video coding of video content from multiple camera views, said device comprising:
a type determiner configured to determine a motion vector type from multiple predefined motion vector types for a motion vector, wherein said motion vector is estimated for a current pixel block in a current frame of a current camera view of said multiple camera views and said motion vector identifies a reference pixel area in a reference frame, wherein said type determiner is configured to determine said motion vector type based on at least one of i) said current camera view and a camera view of said reference frame among said multiple camera views, and ii) a point in time of said current frame and a point in time of said reference frame; a predictor identifier configured to identify at least one candidate motion vector predictor of said motion vector type determined by said type determiner; and a predictor determiner configured to determine a motion vector predictor for said motion vector based on said at least one candidate motion vector predictor identified by said predictor identifier. 50. The device of claim 49, wherein:
said type determiner is configured to determine said motion vector type to be a temporal motion vector type in the event that said point of time of said current frame is different from said point of time of said reference frame; and said predictor identifier is configured to identify at least one candidate motion vector predictor associated with a pixel block in a first frame and identifying a pixel area in a first reference frame having a point in time different from a point in time of said first frame but belonging to a same camera view of said multiple camera views as said first frame. 51. The device of claim 49, wherein:
said type determiner is configured to determine said motion vector type to be an inter-view motion vector type in the event that said current camera view is different from said camera view of said reference frame; and said predictor identifier is configured to identify at least one candidate motion vector predictor associated with a pixel block in a first frame in a first camera view of said multiple camera views and identify a pixel area in a first reference frame having a point in time equal to a point in time of said first frame but belonging to a camera view of said multiple camera views different from said first camera view. 52. The device of claim 49, wherein said predictor identifier is configured to identify said at least one candidate motion vector predictor from a set of multiple candidate motion vector predictors determined based on a position of said current pixel block in said current frame, said point in time of said current frame and said current camera view. 53. The device of claim 49, further comprising a vector calculator configured to calculate a residual motion vector based on said motion vector and said motion vector predictor. 54. The device of claim 49, further comprising a motion vector (MV) estimator configured to estimate, for said current pixel block, said motion vector identifying said reference pixel area in said reference frame. 55. The device of claim 54, wherein said MV estimator is configured to estimate, for said current pixel block, said motion vector identifying said reference pixel area in said reference frame of a reference camera view of said multiple camera views, said current frame having a current picture order count (CurrPOC) and said reference frame having a reference picture order count (CurrRfPOC), wherein said at least one candidate motion vector predictor is associated with a pixel block in a first frame having a first picture order count (RfPOC) and identifies a pixel area in a first reference frame having a first reference picture order count (RfRfPOC), and wherein said device further comprises:
a scaling factor determiner configured to determine, for said at least one candidate motion vector predictor, a scaling factor to be equal to a fixed predefined value in the event that i) said current picture order count is equal to said reference picture order count, or ii) said first picture order count is equal to said first reference picture order count, and otherwise determine said scaling factor to be based on
CurrPOC
-
CurrRfPOC
RfPOC
-
RfRfPOC
;
and
a scaled predictor determiner configured to determine, for said at least one candidate motion vector predictor, a scaled candidate motion vector predictor based on said candidate motion vector predictor multiplied by said scaling factor, wherein said predictor determiner is configured to determine said motion vector predictor for said motion vector based on said at least one scaled candidate motion vector predictor. 56. The device of claim 54, wherein said MV estimator is configured to estimate, for said current pixel block, said motion vector identifying said reference pixel area in said reference frame of a reference camera view of said multiple camera views, said current camera view being different from said reference camera view, said at least one candidate motion vector predictor is associated with a pixel block in a first frame of a first camera view of said multiple camera views and identifies a pixel area in a first reference frame of a first reference camera view of said multiple camera views, said first camera view being different from said first reference camera view, wherein said device further comprises:
a scaling factor determiner configured to determine a scaling factor for said at least one candidate motion vector predictor based on a baseline distance between said current camera view and said reference camera view and a baseline distance between said first camera view and said first reference camera view; and a scaled predictor determiner configured to determine, for said at least one candidate motion vector predictor, a scaled candidate motion vector predictor based on said candidate motion vector predictor multiplied by said scaling factor, wherein said predictor determiner is configured to determine said motion vector predictor for said motion vector based on said at least one scaled candidate motion vector predictor. 57. The device of claim 56, wherein said scaling factor determiner is configured to determine said scaling factor, for said at least one candidate motion vector predictor, based on a quotient between said baseline distance between said current camera view and said reference camera view and said baseline distance between said first camera view and said first reference camera view. 58. A method of motion vector decoding for encoded multi-view video from multiple camera views, said method comprises:
providing, for a current pixel block in a current frame of a current camera view of said multiple camera views, a reference frame index identifying a reference frame; determining a motion vector type from multiple predefined motion vector types for said current pixel block and based on at least one of i) said current camera view and a camera view of said reference frame among said multiple camera views, and ii) a point in time of said current frame and a point in time of said reference frame; generating a candidate list comprising at least one candidate motion vector predictor of said determined motion vector type; and determining a motion vector for said current pixel block based on a candidate motion vector predictor of said candidate list. 59. The method of claim 58, wherein:
determining said motion vector type comprises determining said motion vector type to be a temporal motion vector type if said point of time of said current frame is different from said point of time of said reference frame; and generating said candidate list comprises generating said candidate list comprising at least one candidate motion vector predictor associated with a pixel block in a first frame and identifying a pixel area in a first reference frame having a point in time different from a point in time of said first frame but belonging to a same camera view of said multiple camera views as said first frame. 60. The method of claim 58, wherein:
determining said motion vector type comprises determining said motion vector type to be an inter-view motion vector type in the event that said current camera view is different from said camera view of said reference frame; and generating said candidate list comprises generating said candidate list comprising at least one candidate motion vector predictor associated with a pixel block in a first frame in a first camera view of said multiple camera views and identifying a pixel area in a first reference frame having a point in time equal to a point in time of said first frame but belonging to a camera view of said multiple camera views different from said first camera view. 61. The method of claim 58, wherein generating said candidate list comprises identifying said at least one candidate motion vector predictor from a set of multiple candidate motion vector predictors determined based on a position of said current pixel block in said current frame, said point in time of said current frame and said current camera view. 62. The method of claim 61, further comprising determining said set of multiple candidate motion vector predictors based on at least one of i) motion vectors associated with spatially neighboring pixel blocks in said current frame, ii) motion vectors associated with temporally neighboring pixel blocks in frames different from said current frame but belonging to said current camera view, iii) motion vectors associated with pixel blocks in frames belonging to camera views of said multiple camera views different from said current camera view but having a respective point in time equal to said point in time of said current frame. 63. The method of claim 58, wherein providing said reference frame index comprises providing, for said current pixel block in said current frame having a current picture order count (CurrPOC) and being present in said current camera view, said reference frame index identifying said reference frame having a reference picture order count (CurrRfPOC) and being present in a reference camera view of said multiple camera views, said at least one candidate motion vector predictor is associated with a pixel block in a first frame having a first picture order count (RfPOC) and identifies a pixel area in a first reference frame having a first reference picture order count (RfRfPOC), said method further comprises:
determining, for said at least one candidate motion vector predictor, a respective scaling factor to be equal to a fixed predefined value if i) said current picture order count is equal to said reference picture order count, or ii) said first picture order count is equal to said first reference picture order count and otherwise determining said scaling factor to be base on
CurrPOC
-
CurrRfPOC
RfPOC
-
RfRfPOC
,
wherein generating said candidate list comprises generating said candidate list comprising at least one scaled candidate motion vector predictor formed based on said at least one candidate motion vector predictor multiplied by said respective scaling factor. 64. The method of claim 58, wherein providing said reference frame index comprises providing, for said current pixel block, said reference frame index identifying said reference frame of a reference camera view of said multiple camera views, said current camera view being different from said reference camera view, wherein said at least one candidate motion vector predictor is associated with a pixel block in a first frame of a first camera view of said multiple camera views and identifies a pixel area in a first reference frame of a first reference camera view of said multiple camera views, said first camera view being different from said first reference camera view, said method further comprising:
determining, for said at least one candidate motion vector predictor, a respective scaling factor based on a baseline distance between said current camera view and said reference camera view and a baseline distance between said first camera view and said first reference camera view, wherein generating said candidate list comprises generating said candidate list comprising at least one scaled candidate motion vector predictor formed based on said at least one candidate motion vector predictor multiplied by said respective scaling factor. 65. The method of claim 64, wherein determining said respective scaling factor comprises determining said respective scaling factor, for said at least one candidate motion vector predictor, based on a quotient between said baseline distance between said current camera view and said reference camera view and said baseline distance between said first camera view and said first reference camera view. 66. The method of claim 58, further comprising selecting a motion vector predictor from said candidate list for said current pixel block based on a predictor index associated with said current pixel block, wherein determining said motion vector comprises determining said motion vector for said current pixel block based on said selected motion vector predictor and a residual motion vector associated with said current pixel block. 67. A non-transitory computer-readable medium comprising, stored thereupon, a computer program for decoding motion vectors for encoded multi-view video from multiple camera views, said computer program comprising code that, when run on a computer, causes said computer to:
provide, for a current pixel block in a current frame of a current camera view of said multiple camera views, a reference frame index identifying a reference frame; determine a motion vector type from multiple predefined motion vector types for said current pixel block and based on at least one of i) said current camera view and a camera view of said reference frame among said multiple camera views, and ii) a point in time of said current frame and a point in time of said reference frame; generate a candidate list comprising at least one candidate motion vector predictor of said determined motion vector type; and determine a motion vector for said current pixel block based on a candidate motion vector predictor of said candidate list. 68. A device for motion vector decoding for encoded multi-view video from multiple camera views, said device comprising:
an index provider configured to provide, for a current pixel block in a current frame of a current camera view of said multiple camera views, a reference frame index identifying a reference frame; a type determiner configured to determine a motion vector type from multiple predefined motion vector types for said current pixel block and based on at least one of i) said current camera view and a camera view of said reference frame among said multiple camera views, and ii) a point in time of said current frame and a point in time of said reference frame; a list generator configured to generate a candidate list comprising at least one candidate motion vector predictor of said motion vector type determined by said type determiner; and a vector determiner configured to determine a motion vector for said current pixel block based on a candidate motion vector predictor of said candidate list. 69. The device of claim 68, wherein
said type determiner is configured to determine said motion vector type to be a temporal motion vector type in the event that said point of time of said current frame is different from said point of time of said reference frame; and said list generator is configured to generate said candidate list comprising at least one candidate motion vector predictor associated with a pixel block in a first frame and i) identifying a pixel area in a first reference frame having a point in time different from a point in time of said first frame but belonging to a same camera view of said multiple camera views as said first frame, or ii) identifying a pixel area in a first reference frame having a point in time different from said point in time of said first frame and belonging to a camera view of said multiple camera views different from said camera view of said first frame. 70. The device of claim 68, wherein
said type determiner is configured to determine said motion vector type to be an inter-view motion vector type in the event that said current camera view is different from said camera view of said reference frame; and said list generator is configured to generate said candidate list comprising at least one candidate motion vector predictor associated with a pixel block in a first frame in a first camera view of said multiple camera views and identifying a pixel area in a first reference frame having a point in time equal to a point in time of said first frame but belonging to a camera view of said multiple camera views different from said first camera view. 71. The device of claim 68, wherein said list generator is configured to identify said at least one candidate motion vector predictor from a set of multiple candidate motion vector predictors determined based on a position of said current pixel block in said current frame, said point in time of said current frame and said current camera view. 72. The device of claim 68, wherein said index provider is configured to provide, for said current pixel block in said current frame having a current picture order count (CurrPOC), said reference frame index identifying said reference frame having a reference picture order count (CurrRfPOC) and being present in a reference camera view of said multiple camera views, said at least one candidate motion vector predictor is associated with a pixel block in a first frame having a first picture order count (RfPOC) and identifies a pixel area in a first reference frame having a first reference picture order count (RfRfPOC), said device further comprises:
a scaling factor determiner configured to determine, for said at least one candidate motion vector predictor, a respective scaling factor to be equal to a fixed predefined value in the event that i) said current picture order count is equal to said reference picture order count, or ii) said first picture order count is equal to said first reference picture order count, and to otherwise determine said scaling factor to be based on
CurrPOC
-
CurrRfPOC
RfPOC
-
RfRfPOC
,
wherein said list generator is configured to generate said candidate list comprising at least one scaled candidate motion vector predictor formed based on said at least one candidate motion vector predictor multiplied by said respective scaling factor. 73. The device of claim 68, wherein said index provider is configured to provide, for said current pixel block, said reference frame index identifying said reference frame of a reference camera view of said multiple camera views, said current camera view being different from said reference camera view, wherein said at least one candidate motion vector predictor is associated with a pixel block in a first frame of a first camera view of said multiple camera views and identifies a pixel area in a first reference frame of a first reference camera view of said multiple camera views, said first camera view being different from said first reference camera view, said device further comprising:
a scaling factor determiner configured to determine, for said at least one candidate motion vector predictor, a respective scaling factor based on a baseline distance between said current camera view and said reference camera view and a baseline distance between said first camera view and said first reference camera view, wherein said list generator is configured to generate said candidate list comprising at least one scaled candidate motion vector predictor formed based on said at least one candidate motion vector predictor multiplied by said respective scaling factor. 74. The device of claim 73, wherein said scaling factor determiner is configured to determine said respective scaling factor, for said at least one candidate motion vector predictor, based on a quotient between said baseline distance between said current camera view and said reference camera view and said baseline distance between said first camera view and said first reference camera view. 75. The device of claim 68, further comprising a predictor selector configured to select a motion vector predictor from said candidate list for said current pixel block based on a predictor index associated with said current pixel block, wherein said vector determiner is configured to determine said motion vector for said current pixel block based on said motion vector predictor selected by said predictor selector and a residual motion vector associated with said current pixel block. | 2,400 |
7,144 | 7,144 | 14,538,006 | 2,431 | A method and apparatus for providing fallback data services over a Wi-Fi network is described. A request to enable access to new data sessions for wireless terminals in a zone covered by a Wi-Fi network node is received upon failure of 3GPP radio in that zone. When a request for a new data session from a WT is received, the MAC address of the WT is added to a list of authorized users. The MAC address of the WT is sent to Wi-Fi network nodes of adjacent zones such that the WT can have continuous service as it moves between zones. When a Wi-Fi network node currently serving the WT receives an indication that the WT data session is terminated, a message is sent from the Wi-Fi network node currently serving the WT, to nodes of adjacent zones to remove the MAC address of the WT from the list of authorized users. | 1. A method, performed in a Wi-Fi network node of a Wireless Network providing cellular and Wi-Fi services, the method comprising:
receiving a request to enable Wi-Fi access to wireless terminals (WTs) located in a zone covered by said Wi-Fi network node; receiving a request for a new data session from a WT; adding the MAC address of said WT to a list of authorized users such that data sessions can be enabled for said WT located in said covered zone; sending the MAC address of said WT to other Wi-Fi network nodes in said covered zone and Wi-Fi network nodes of adjacent zones such that said WT can have continuous data services as it moves within said covered zone and other zones adjacent thereof; receiving at a Wi-Fi network node currently serving said WT an indication that the WT data session is terminated; and sending a message from said serving Wi-Fi network node, to other Wi-Fi network nodes in said covered zone and Wi-Fi network nodes of adjacent zones to remove the MAC address of said WT from said list of authorized users. 2. A method as defined in claim 1, wherein said request to enable Wi-Fi access to said WT is received at said Wi-Fi network node upon failure of a cellular RF radio serving said WT in said covered zone. 3. A method as defined in claim 2, wherein MAC addresses of all WTs located in said covered zone is collected upon failure of said cellular RF radio and added to said list of authorized users. 4. A method as defined in claim 3, wherein said list of MAC addresses is forwarded to other nodes in said covered zone and zones adjacent thereof when said WT moves away from said serving node to another node in said serving zone or to an adjacent zone thereof. 5. A Wi-Fi network node of a Wireless Network providing cellular and Wi-Fi services, the Wi-Fi network node comprising:
a processor; and a computer program product storing instructions that, when executed by the processor, causes the Wi-Fi network node to:
enable access to all new data sessions for wireless terminals (WTs) located in a Wi-Fi zone covered by said Wi-Fi network node;
add the MAC address of said WTs to a list of users authorized to access said Wi-Fi network node;
send the MAC address of said WT to other Wi-Fi network nodes of said covered zone and zones adjacent thereof such that said WT can have continuous service as it moves between Wi-Fi nodes of one zone and from one zone to another zone;
receive at a Wi-Fi network node currently serving said WT an indication that the WT data session is terminated; and
send a message from said serving Wi-Fi network node, to other Wi-Fi network nodes in said covered zone and Wi-Fi network nodes of adjacent zones to remove the MAC address of said WT from said list of authorized users. 6. A Wi-fi network node as defined in claim 5, wherein said Wi-Fi access is enabled for WTs in said covered zone upon failure of a cellular RF radio also serving said WTs. 7. A Wi-Fi network node as defined in claim 6, wherein MAC addresses of all WTs located in said covered zone is collected upon failure of said cellular RF radio and added to said list of authorized users. 8. A Wi-Fi network node as defined in claim 7, wherein said list of MAC addresses is forwarded to other nodes in said covered zone and zones adjacent thereof when said WT moves away from said serving node to another node in said serving zone or to an adjacent zone thereof. 9. A computer program comprising computer program code which, when run on Wi-Fi network node, causes the Wi-Fi network node to:
enable access to all new data sessions for wireless terminals located in a Wi-Fi zone covered by said Wi-Fi network node;
add the MAC address of said WTs to a list of users authorized to access said Wi-Fi network node;
send the MAC address of said WT to other Wi-Fi network nodes of said covered zone and zones adjacent thereof such that said WT can have continuous service as it moves between Wi-Fi nodes of one zone and from one zone to another;
receive at a Wi-Fi network node currently serving said WT an indication that the WT data session is terminated; and
send a message from said serving Wi-Fi network node, to other Wi-Fi network nodes in said covered zone and Wi-Fi network nodes of adjacent zones to remove the MAC address of said WT from said list of authorized users. 10. A computer program as defined in claim 9, wherein said Wi-Fi access is enabled for WTs in said covered zone upon failure of a cellular RF radio also serving said WTs. 11. A computer program as defined in claim 10, wherein MAC addresses of all WTs located in said covered zone is collected upon failure of said cellular RF radio and added to said list of authorized users. 12. A computer program as defined in claim 11, wherein said list of MAC addresses is forwarded to other nodes in said covered zone and zones adjacent thereof when said WT moves away from said serving node to another node in said serving zone or to an adjacent zone thereof. 13. A method, performed in a wireless terminal (WT) being capable of communicating both with a cellular communication network and a Wi-Fi access point (AP), the method comprising:
detecting the presence of a Wi-Fi AP which said WT is not currently authorized to access; detecting the failure of a cellular RF radio currently serving said WT; detecting that said Wi-Fi AP is now available for access; sending a request for a new data session to said Wi-Fi AP; completing a hand shake with said Wi-Fi AP to activate said new data session; detecting the presence of another Wi-Fi AP which is now available for access as said WT moves within a zone or from one zone served by said Wi-Fi AP to a zone served by said other Wi-Fi AP. 14. A wireless terminal being capable of communicating both with a cellular communication network and a Wi-Fi access point, the wireless terminal comprising:
a processor; and a computer program product storing instructions that, when executed by the processor, causes the wireless terminal to: detect the presence of a Wi-Fi AP which said WT is not currently authorized to access; detect the failure of a cellular RF radio currently serving said WT; detect that said Wi-Fi AP is now available for access; send a request for a new data session to said Wi-Fi AP; complete a hand shake with said Wi-Fi AP to activate said new data session; detect the presence of another Wi-Fi AP which is now available for access as said WT moves within a zone or from one zone served by said Wi-Fi AP to a zone served by said other Wi-Fi AP. 15. A computer program comprising computer program code which, when run on a wireless terminal being capable of communicating both with a cellular communication network and a Wi-Fi access point, causes the wireless terminal to:
detect the presence of a Wi-Fi AP which said WT is not currently authorized to access; detect the failure of a cellular RF radio currently serving said WT; detect that said Wi-Fi AP is now available for access; send a request for a new data session to said Wi-Fi AP; complete a hand shake with said Wi-Fi AP to activate said new data session; detect the presence of another Wi-Fi AP which is now available for access as said WT moves within a zone or from one zone served by said Wi-Fi AP to a zone served by said other Wi-Fi AP. 16. A method, performed in a Wireless Access Controller (AC) being capable of communicating both with a cellular communication network radio and a Wi-Fi access point (AP), both said radio and AP serving a wireless mobility zone, the method comprising:
detecting a cellular service failure event; instructing said cellular network radio to disable cellular RF ports associated with said failure event for an affected zone; instructing a Wi-Fi AP serving said affected zone to enable Wi-Fi access to Wireless Terminals (WT) located in a zone covered by said Wi-Fi AP; receiving from said serving Wi-Fi AP, a list of MAC addresses associated with one or more WT requesting a new data session with said serving Wi-Fi AP or any other Wi-Fi AP in a zone managed by said AC or in a zone adjacent thereof. 17. A method as defined in claim 16, wherein said list of MAC addresses is forwarded to other nodes in said zone and zones adjacent thereof when said WT moves away from said serving node to another node in said serving zone or to a zone adjacent thereof. 18. A Wireless Access Controller (AC) capable of communicating both with a cellular communication network radio and a Wi-Fi access point (AP), both said radio and AP serving a wireless mobility service zone, the AC comprising:
a processor; and a computer program product storing instructions that, when executed by the processor, causes the AC to: detect a cellular service failure event; instruct said cellular communication network radio to disable cellular RF ports associated with said failure event for an affected zone; instruct a Wi-Fi AP serving said affected zone to enable access to Wireless Terminals (WT) in said affected zone; receive from said serving Wi-Fi AP, a list of MAC addresses associated with one or more WT requesting a new data session with said serving Wi-Fi AP or any other Wi-Fi AP in a zone managed by said AC. 19. A computer program comprising a computer program code which, when run on a Wi-Fi Access Controller (AC) capable of communicating both with a cellular communication network radio and a Wi-Fi access point (AP), wherein both said radio and AP serve a wireless mobility service zone, causes the Wi-Fi AC to:
detect a cellular service failure event; instruct said cellular communication network radio to disable cellular RF ports associated with said failure event for an affected zone; instruct a Wi-Fi AP serving said affected zone to enable access to all new data sessions from Wireless Terminals (WT) in said affected zone; receive from said serving Wi-Fi AP, a list of MAC addresses associated with one or more WT requesting a new data session with said serving Wi-Fi AP or any other Wi-Fi AP in a zone managed by said AC. | A method and apparatus for providing fallback data services over a Wi-Fi network is described. A request to enable access to new data sessions for wireless terminals in a zone covered by a Wi-Fi network node is received upon failure of 3GPP radio in that zone. When a request for a new data session from a WT is received, the MAC address of the WT is added to a list of authorized users. The MAC address of the WT is sent to Wi-Fi network nodes of adjacent zones such that the WT can have continuous service as it moves between zones. When a Wi-Fi network node currently serving the WT receives an indication that the WT data session is terminated, a message is sent from the Wi-Fi network node currently serving the WT, to nodes of adjacent zones to remove the MAC address of the WT from the list of authorized users.1. A method, performed in a Wi-Fi network node of a Wireless Network providing cellular and Wi-Fi services, the method comprising:
receiving a request to enable Wi-Fi access to wireless terminals (WTs) located in a zone covered by said Wi-Fi network node; receiving a request for a new data session from a WT; adding the MAC address of said WT to a list of authorized users such that data sessions can be enabled for said WT located in said covered zone; sending the MAC address of said WT to other Wi-Fi network nodes in said covered zone and Wi-Fi network nodes of adjacent zones such that said WT can have continuous data services as it moves within said covered zone and other zones adjacent thereof; receiving at a Wi-Fi network node currently serving said WT an indication that the WT data session is terminated; and sending a message from said serving Wi-Fi network node, to other Wi-Fi network nodes in said covered zone and Wi-Fi network nodes of adjacent zones to remove the MAC address of said WT from said list of authorized users. 2. A method as defined in claim 1, wherein said request to enable Wi-Fi access to said WT is received at said Wi-Fi network node upon failure of a cellular RF radio serving said WT in said covered zone. 3. A method as defined in claim 2, wherein MAC addresses of all WTs located in said covered zone is collected upon failure of said cellular RF radio and added to said list of authorized users. 4. A method as defined in claim 3, wherein said list of MAC addresses is forwarded to other nodes in said covered zone and zones adjacent thereof when said WT moves away from said serving node to another node in said serving zone or to an adjacent zone thereof. 5. A Wi-Fi network node of a Wireless Network providing cellular and Wi-Fi services, the Wi-Fi network node comprising:
a processor; and a computer program product storing instructions that, when executed by the processor, causes the Wi-Fi network node to:
enable access to all new data sessions for wireless terminals (WTs) located in a Wi-Fi zone covered by said Wi-Fi network node;
add the MAC address of said WTs to a list of users authorized to access said Wi-Fi network node;
send the MAC address of said WT to other Wi-Fi network nodes of said covered zone and zones adjacent thereof such that said WT can have continuous service as it moves between Wi-Fi nodes of one zone and from one zone to another zone;
receive at a Wi-Fi network node currently serving said WT an indication that the WT data session is terminated; and
send a message from said serving Wi-Fi network node, to other Wi-Fi network nodes in said covered zone and Wi-Fi network nodes of adjacent zones to remove the MAC address of said WT from said list of authorized users. 6. A Wi-fi network node as defined in claim 5, wherein said Wi-Fi access is enabled for WTs in said covered zone upon failure of a cellular RF radio also serving said WTs. 7. A Wi-Fi network node as defined in claim 6, wherein MAC addresses of all WTs located in said covered zone is collected upon failure of said cellular RF radio and added to said list of authorized users. 8. A Wi-Fi network node as defined in claim 7, wherein said list of MAC addresses is forwarded to other nodes in said covered zone and zones adjacent thereof when said WT moves away from said serving node to another node in said serving zone or to an adjacent zone thereof. 9. A computer program comprising computer program code which, when run on Wi-Fi network node, causes the Wi-Fi network node to:
enable access to all new data sessions for wireless terminals located in a Wi-Fi zone covered by said Wi-Fi network node;
add the MAC address of said WTs to a list of users authorized to access said Wi-Fi network node;
send the MAC address of said WT to other Wi-Fi network nodes of said covered zone and zones adjacent thereof such that said WT can have continuous service as it moves between Wi-Fi nodes of one zone and from one zone to another;
receive at a Wi-Fi network node currently serving said WT an indication that the WT data session is terminated; and
send a message from said serving Wi-Fi network node, to other Wi-Fi network nodes in said covered zone and Wi-Fi network nodes of adjacent zones to remove the MAC address of said WT from said list of authorized users. 10. A computer program as defined in claim 9, wherein said Wi-Fi access is enabled for WTs in said covered zone upon failure of a cellular RF radio also serving said WTs. 11. A computer program as defined in claim 10, wherein MAC addresses of all WTs located in said covered zone is collected upon failure of said cellular RF radio and added to said list of authorized users. 12. A computer program as defined in claim 11, wherein said list of MAC addresses is forwarded to other nodes in said covered zone and zones adjacent thereof when said WT moves away from said serving node to another node in said serving zone or to an adjacent zone thereof. 13. A method, performed in a wireless terminal (WT) being capable of communicating both with a cellular communication network and a Wi-Fi access point (AP), the method comprising:
detecting the presence of a Wi-Fi AP which said WT is not currently authorized to access; detecting the failure of a cellular RF radio currently serving said WT; detecting that said Wi-Fi AP is now available for access; sending a request for a new data session to said Wi-Fi AP; completing a hand shake with said Wi-Fi AP to activate said new data session; detecting the presence of another Wi-Fi AP which is now available for access as said WT moves within a zone or from one zone served by said Wi-Fi AP to a zone served by said other Wi-Fi AP. 14. A wireless terminal being capable of communicating both with a cellular communication network and a Wi-Fi access point, the wireless terminal comprising:
a processor; and a computer program product storing instructions that, when executed by the processor, causes the wireless terminal to: detect the presence of a Wi-Fi AP which said WT is not currently authorized to access; detect the failure of a cellular RF radio currently serving said WT; detect that said Wi-Fi AP is now available for access; send a request for a new data session to said Wi-Fi AP; complete a hand shake with said Wi-Fi AP to activate said new data session; detect the presence of another Wi-Fi AP which is now available for access as said WT moves within a zone or from one zone served by said Wi-Fi AP to a zone served by said other Wi-Fi AP. 15. A computer program comprising computer program code which, when run on a wireless terminal being capable of communicating both with a cellular communication network and a Wi-Fi access point, causes the wireless terminal to:
detect the presence of a Wi-Fi AP which said WT is not currently authorized to access; detect the failure of a cellular RF radio currently serving said WT; detect that said Wi-Fi AP is now available for access; send a request for a new data session to said Wi-Fi AP; complete a hand shake with said Wi-Fi AP to activate said new data session; detect the presence of another Wi-Fi AP which is now available for access as said WT moves within a zone or from one zone served by said Wi-Fi AP to a zone served by said other Wi-Fi AP. 16. A method, performed in a Wireless Access Controller (AC) being capable of communicating both with a cellular communication network radio and a Wi-Fi access point (AP), both said radio and AP serving a wireless mobility zone, the method comprising:
detecting a cellular service failure event; instructing said cellular network radio to disable cellular RF ports associated with said failure event for an affected zone; instructing a Wi-Fi AP serving said affected zone to enable Wi-Fi access to Wireless Terminals (WT) located in a zone covered by said Wi-Fi AP; receiving from said serving Wi-Fi AP, a list of MAC addresses associated with one or more WT requesting a new data session with said serving Wi-Fi AP or any other Wi-Fi AP in a zone managed by said AC or in a zone adjacent thereof. 17. A method as defined in claim 16, wherein said list of MAC addresses is forwarded to other nodes in said zone and zones adjacent thereof when said WT moves away from said serving node to another node in said serving zone or to a zone adjacent thereof. 18. A Wireless Access Controller (AC) capable of communicating both with a cellular communication network radio and a Wi-Fi access point (AP), both said radio and AP serving a wireless mobility service zone, the AC comprising:
a processor; and a computer program product storing instructions that, when executed by the processor, causes the AC to: detect a cellular service failure event; instruct said cellular communication network radio to disable cellular RF ports associated with said failure event for an affected zone; instruct a Wi-Fi AP serving said affected zone to enable access to Wireless Terminals (WT) in said affected zone; receive from said serving Wi-Fi AP, a list of MAC addresses associated with one or more WT requesting a new data session with said serving Wi-Fi AP or any other Wi-Fi AP in a zone managed by said AC. 19. A computer program comprising a computer program code which, when run on a Wi-Fi Access Controller (AC) capable of communicating both with a cellular communication network radio and a Wi-Fi access point (AP), wherein both said radio and AP serve a wireless mobility service zone, causes the Wi-Fi AC to:
detect a cellular service failure event; instruct said cellular communication network radio to disable cellular RF ports associated with said failure event for an affected zone; instruct a Wi-Fi AP serving said affected zone to enable access to all new data sessions from Wireless Terminals (WT) in said affected zone; receive from said serving Wi-Fi AP, a list of MAC addresses associated with one or more WT requesting a new data session with said serving Wi-Fi AP or any other Wi-Fi AP in a zone managed by said AC. | 2,400 |
7,145 | 7,145 | 14,029,120 | 2,483 | This disclosure describes techniques for signaling and using an indication that video data is in a frame-packed stereoscopic 3D video data format. In one example of the disclosure, a method for decoding video data comprises receiving video data, receiving an indication that indicates whether any pictures in the received video data contain frame-packed stereoscopic 3D video data, and decoding the received video data in accordance with the received indication. The received video data may be rejected if the video decoder is unable to decode frame-packed stereoscopic 3D video data. | 1. A method for decoding video data, the method comprising:
receiving video data; receiving an indication that indicates whether any pictures in the received video data contain frame-packed stereoscopic 3D video data; and decoding the received video data in accordance with the received indication. 2. The method of claim 1, wherein the indication comprises a flag, and wherein the flag value equal to 0 indicates that all pictures in the received video data do not contain frame-packed stereoscopic 3D video data and the received video data includes no frame packing arrangement (FPA) supplemental enhancement information (SEI) messages, and wherein the flag value equal to 1 indicates that there may be one or more pictures in the received video data that contain frame-packed stereoscopic 3D video data and the received video data includes one or more FPA SEI messages. 3. The method of claim 1, wherein the indication indicates that there may be one or more pictures in the received video data that contain frame-packed stereoscopic 3D video data and that the received video data includes one or more frame packing arrangement (FPA) supplemental enhancement information (SEI) messages, and wherein decoding the received video data comprises rejecting the video data based on the received indication. 4. The method of claim 1, further comprising receiving the indication in at least one of a video parameter set and a sequence parameter set. 5. The method of claim 1, further comprising receiving the indication in a sample entry of video file format information. 6. The method of claim 5, further comprising receiving the indication in one of a sample description, a session description protocol (SDP) file, and a media presentation description (MPD). 7. The method of claim 1, wherein the indication is a parameter in an RTP payload. 8. The method of claim 7, wherein the indication is a parameter that further indicates a capability requirement of a receiver implementation. 9. The method of claim 1, further comprising receiving the indication in at least one of a profile syntax, a tier syntax, and a level syntax. 10. A method for encoding video data, the method comprising:
encoding video data; generating an indication that indicates whether any pictures in the encoded video data contain frame-packed stereoscopic 3D video data; and signaling the indication in an encoded video bitstream. 11. The method of claim 10, wherein the indication comprises a flag, and wherein the flag value equal to 0 indicates that all pictures in the encoded video data do not contain frame-packed stereoscopic 3D video data and the encoded video data includes no frame packing arrangement (FPA) supplemental enhancement information (SEI) messages, and wherein the flag value equal to 1 indicates that there may be one or more pictures in the encoded video data that contain frame-packed stereoscopic 3D video data and the encoded video data includes one or more FPA SEI messages. 12. The method of claim 10, further comprising signaling the indication in at least one of a video parameter set and a sequence parameter set. 13. The method of claim 10, further comprising signaling the indication in a sample entry of video file format information. 14. The method of claim 13, further comprising signaling the indication in one of a sample description, a session description protocol (SDP) file, and a media presentation description (MPD). 15. The method of claim 10, wherein the indication is a parameter in an RTP payload. 16. The method of claim 15, wherein the indication is a parameter that further indicates a capability requirement of a receiver implementation. 17. The method of claim 10, further comprising signaling the indication in at least one of a profile syntax, a tier syntax, and a level syntax. 18. An apparatus configured to decode video data, the apparatus comprising:
a video decoder configured to:
receive video data;
receive an indication that indicates whether any pictures in the received video data contain frame-packed stereoscopic 3D video data; and
decode the received video data in accordance with the received indication. 19. The apparatus of claim 18, wherein the indication comprises a flag, and wherein the flag value equal to 0 indicates that all pictures in the received video data do not contain frame-packed stereoscopic 3D video data and the received video data includes no frame packing arrangement (FPA) supplemental enhancement information (SEI) messages, and wherein the flag value equal to 1 indicates that there may be one or more pictures in the received video data that contain frame-packed stereoscopic 3D video data and the received video data includes one or more FPA SEI messages. 20. The apparatus of claim 18, wherein the indication indicates that there may be one or more pictures in the received video data that contain frame-packed stereoscopic 3D video data and that the received video data includes one or more frame packing arrangement (FPA) supplemental enhancement information (SEI) messages, and wherein the video decoder is further configured to reject the video data based on the received indication. 21. The apparatus of claim 18, wherein the video decoder is further configured to receive the indication in at least one of a video parameter set and a sequence parameter set. 22. The apparatus of claim 18, wherein the video decoder is further configured to receive the indication in a sample entry of video file format information. 23. The apparatus of claim 22, wherein the video decoder is further configured to receive the indication in one of a sample description, a session description protocol (SDP) file, and a media presentation description (MPD). 24. The apparatus of claim 18, wherein the indication is a parameter in an RTP payload. 25. The apparatus of claim 24, wherein the indication is a parameter that further indicates a capability requirement of a receiver implementation. 26. The apparatus of claim 18, wherein the video decoder is further configured to receive the indication in at least one of a profile syntax, a tier syntax, and a level syntax. 27. An apparatus configured to encode video data, the apparatus comprising:
a video encoder configured to:
encode video data;
generate an indication that indicates whether any pictures in the encoded video data contain frame-packed stereoscopic 3D video data; and
signal the indication in an encoded video bitstream. 28. The apparatus of claim 27, wherein the indication comprises a flag, and wherein the flag value equal to 0 indicates that all pictures in the encoded video data do not contain frame-packed stereoscopic 3D video data and the encoded video data includes no frame packing arrangement (FPA) supplemental enhancement information (SEI) messages, and wherein the flag value equal to 1 indicates that there may be one or more pictures in the encoded video data that contain frame-packed stereoscopic 3D video data and the encoded video data includes one or more FPA SEI messages. 29. The apparatus of claim 27, wherein the video encoder is further configured to signal the indication in at least one of a video parameter set and a sequence parameter set. 30. The apparatus of claim 27, wherein the video encoder is further configured to signal the indication in a sample entry of video file format information. 31. The apparatus of claim 30, wherein the video encoder is further configured to signal the indication in one of a sample description, a session description protocol (SDP) file, and a media presentation description (MPD). 32. The apparatus of claim 27, wherein the indication is a parameter in an RTP payload. 33. The apparatus of claim 32, wherein the indication is a parameter that further indicates a capability requirement of a receiver implementation. 34. The apparatus of claim 27, wherein the video encoder is further configured to signal the indication in at least one of a profile syntax, a tier syntax, and a level syntax. 35. An apparatus configured to decode video data, the apparatus comprising:
means for receiving video data; means for receiving an indication that indicates whether any pictures in the received video data contain frame-packed stereoscopic 3D video data; and means for decoding the received video data in accordance with the received indication. 36. An apparatus configured to encode video data, the apparatus comprising:
means for encoding video data; means for generating an indication that indicates whether any pictures in the encoded video data contain frame-packed stereoscopic 3D video data; and means for signaling the indication in an encoded video bitstream. 37. A computer-readable storage medium storing instructions that, when executed, cause one or more processors of a device configured to decode video data to:
receive video data; receive an indication that indicates whether any pictures in the received video data contain frame-packed stereoscopic 3D video data; and decode the received video data in accordance with the received indication. 38. A computer-readable storage medium storing instructions that, when executed, cause one or more processors of a device configured to encode video data to:
encode video data; generate an indication that indicates whether any pictures in the encoded video data contain frame-packed stereoscopic 3D video data; and signal the indication in an encoded video bitstream. | This disclosure describes techniques for signaling and using an indication that video data is in a frame-packed stereoscopic 3D video data format. In one example of the disclosure, a method for decoding video data comprises receiving video data, receiving an indication that indicates whether any pictures in the received video data contain frame-packed stereoscopic 3D video data, and decoding the received video data in accordance with the received indication. The received video data may be rejected if the video decoder is unable to decode frame-packed stereoscopic 3D video data.1. A method for decoding video data, the method comprising:
receiving video data; receiving an indication that indicates whether any pictures in the received video data contain frame-packed stereoscopic 3D video data; and decoding the received video data in accordance with the received indication. 2. The method of claim 1, wherein the indication comprises a flag, and wherein the flag value equal to 0 indicates that all pictures in the received video data do not contain frame-packed stereoscopic 3D video data and the received video data includes no frame packing arrangement (FPA) supplemental enhancement information (SEI) messages, and wherein the flag value equal to 1 indicates that there may be one or more pictures in the received video data that contain frame-packed stereoscopic 3D video data and the received video data includes one or more FPA SEI messages. 3. The method of claim 1, wherein the indication indicates that there may be one or more pictures in the received video data that contain frame-packed stereoscopic 3D video data and that the received video data includes one or more frame packing arrangement (FPA) supplemental enhancement information (SEI) messages, and wherein decoding the received video data comprises rejecting the video data based on the received indication. 4. The method of claim 1, further comprising receiving the indication in at least one of a video parameter set and a sequence parameter set. 5. The method of claim 1, further comprising receiving the indication in a sample entry of video file format information. 6. The method of claim 5, further comprising receiving the indication in one of a sample description, a session description protocol (SDP) file, and a media presentation description (MPD). 7. The method of claim 1, wherein the indication is a parameter in an RTP payload. 8. The method of claim 7, wherein the indication is a parameter that further indicates a capability requirement of a receiver implementation. 9. The method of claim 1, further comprising receiving the indication in at least one of a profile syntax, a tier syntax, and a level syntax. 10. A method for encoding video data, the method comprising:
encoding video data; generating an indication that indicates whether any pictures in the encoded video data contain frame-packed stereoscopic 3D video data; and signaling the indication in an encoded video bitstream. 11. The method of claim 10, wherein the indication comprises a flag, and wherein the flag value equal to 0 indicates that all pictures in the encoded video data do not contain frame-packed stereoscopic 3D video data and the encoded video data includes no frame packing arrangement (FPA) supplemental enhancement information (SEI) messages, and wherein the flag value equal to 1 indicates that there may be one or more pictures in the encoded video data that contain frame-packed stereoscopic 3D video data and the encoded video data includes one or more FPA SEI messages. 12. The method of claim 10, further comprising signaling the indication in at least one of a video parameter set and a sequence parameter set. 13. The method of claim 10, further comprising signaling the indication in a sample entry of video file format information. 14. The method of claim 13, further comprising signaling the indication in one of a sample description, a session description protocol (SDP) file, and a media presentation description (MPD). 15. The method of claim 10, wherein the indication is a parameter in an RTP payload. 16. The method of claim 15, wherein the indication is a parameter that further indicates a capability requirement of a receiver implementation. 17. The method of claim 10, further comprising signaling the indication in at least one of a profile syntax, a tier syntax, and a level syntax. 18. An apparatus configured to decode video data, the apparatus comprising:
a video decoder configured to:
receive video data;
receive an indication that indicates whether any pictures in the received video data contain frame-packed stereoscopic 3D video data; and
decode the received video data in accordance with the received indication. 19. The apparatus of claim 18, wherein the indication comprises a flag, and wherein the flag value equal to 0 indicates that all pictures in the received video data do not contain frame-packed stereoscopic 3D video data and the received video data includes no frame packing arrangement (FPA) supplemental enhancement information (SEI) messages, and wherein the flag value equal to 1 indicates that there may be one or more pictures in the received video data that contain frame-packed stereoscopic 3D video data and the received video data includes one or more FPA SEI messages. 20. The apparatus of claim 18, wherein the indication indicates that there may be one or more pictures in the received video data that contain frame-packed stereoscopic 3D video data and that the received video data includes one or more frame packing arrangement (FPA) supplemental enhancement information (SEI) messages, and wherein the video decoder is further configured to reject the video data based on the received indication. 21. The apparatus of claim 18, wherein the video decoder is further configured to receive the indication in at least one of a video parameter set and a sequence parameter set. 22. The apparatus of claim 18, wherein the video decoder is further configured to receive the indication in a sample entry of video file format information. 23. The apparatus of claim 22, wherein the video decoder is further configured to receive the indication in one of a sample description, a session description protocol (SDP) file, and a media presentation description (MPD). 24. The apparatus of claim 18, wherein the indication is a parameter in an RTP payload. 25. The apparatus of claim 24, wherein the indication is a parameter that further indicates a capability requirement of a receiver implementation. 26. The apparatus of claim 18, wherein the video decoder is further configured to receive the indication in at least one of a profile syntax, a tier syntax, and a level syntax. 27. An apparatus configured to encode video data, the apparatus comprising:
a video encoder configured to:
encode video data;
generate an indication that indicates whether any pictures in the encoded video data contain frame-packed stereoscopic 3D video data; and
signal the indication in an encoded video bitstream. 28. The apparatus of claim 27, wherein the indication comprises a flag, and wherein the flag value equal to 0 indicates that all pictures in the encoded video data do not contain frame-packed stereoscopic 3D video data and the encoded video data includes no frame packing arrangement (FPA) supplemental enhancement information (SEI) messages, and wherein the flag value equal to 1 indicates that there may be one or more pictures in the encoded video data that contain frame-packed stereoscopic 3D video data and the encoded video data includes one or more FPA SEI messages. 29. The apparatus of claim 27, wherein the video encoder is further configured to signal the indication in at least one of a video parameter set and a sequence parameter set. 30. The apparatus of claim 27, wherein the video encoder is further configured to signal the indication in a sample entry of video file format information. 31. The apparatus of claim 30, wherein the video encoder is further configured to signal the indication in one of a sample description, a session description protocol (SDP) file, and a media presentation description (MPD). 32. The apparatus of claim 27, wherein the indication is a parameter in an RTP payload. 33. The apparatus of claim 32, wherein the indication is a parameter that further indicates a capability requirement of a receiver implementation. 34. The apparatus of claim 27, wherein the video encoder is further configured to signal the indication in at least one of a profile syntax, a tier syntax, and a level syntax. 35. An apparatus configured to decode video data, the apparatus comprising:
means for receiving video data; means for receiving an indication that indicates whether any pictures in the received video data contain frame-packed stereoscopic 3D video data; and means for decoding the received video data in accordance with the received indication. 36. An apparatus configured to encode video data, the apparatus comprising:
means for encoding video data; means for generating an indication that indicates whether any pictures in the encoded video data contain frame-packed stereoscopic 3D video data; and means for signaling the indication in an encoded video bitstream. 37. A computer-readable storage medium storing instructions that, when executed, cause one or more processors of a device configured to decode video data to:
receive video data; receive an indication that indicates whether any pictures in the received video data contain frame-packed stereoscopic 3D video data; and decode the received video data in accordance with the received indication. 38. A computer-readable storage medium storing instructions that, when executed, cause one or more processors of a device configured to encode video data to:
encode video data; generate an indication that indicates whether any pictures in the encoded video data contain frame-packed stereoscopic 3D video data; and signal the indication in an encoded video bitstream. | 2,400 |
7,146 | 7,146 | 13,787,510 | 2,432 | Disclosed is a method for configuring an internal entity of a WiFi-enabled remote station with a certificate. In the method, the remote station receives the certificate in at least one message from a registrar acting as a certificate authority. The remote station provides the certificate to the internal entity. The internal entity securely communicates with an external entity based on the certificate. | 1. A method for configuring an internal entity of a WiFi-enabled remote station with a certificate, comprising:
the remote station receiving the certificate in at least one message from a registrar acting as a certificate authority; the remote station providing the certificate to the internal entity; and the internal entity securely communicating with an external entity based on the certificate. 2. A method for configuring as defined in claim 1, further comprising:
the remote station receiving a private key corresponding to the certificate in the at least one message; the remote station providing the private key to the internal entity; and the internal entity securely communicating with the external entity also based on the private key. 3. A method for configuring as defined in claim 2, wherein the remote station receives the private key with the certificate. 4. A method for configuring as defined in claim 2, wherein the certificate comprises a public key, corresponding to the private key, and a public key identifier. 5. A method for configuring as defined in claim 1, further comprising:
the remote station sending a public key to be certified in the at least one message, wherein the certificate is generated in association with the public key. 6. A method for configuring as defined in claim 5, further comprising:
the remote station generating the public key and a corresponding private key. 7. A method for configuring as defined in claim 1, further comprising:
the remote station receiving, with the certificate, a shared secret, an identity for the shared secret, a PIN, a password, and/or a certificate lifetime. 8. A method for configuring as defined in claim 1, wherein the at least one message comprises WSC M7 and/or M8 messages. 9. A method for configuring as defined in claim 1, wherein the internal entity is a SEP2 client, and the external entity is a SEP2 server. 10. A method for configuring as defined in claim 1, wherein the internal entity is a SEP2 server, and the external entity is a SEP2 client. 11. A method for configuring as defined in claim 1, wherein the registrar has a user interface. 12. A method for configuring as defined in claim 1, wherein the registrar is a smartphone. 13. A method for configuring as defined in claim 1, wherein the remote station does not have a user interface. 14. A method for configuring as defined in claim 1, wherein the registrar is an access point. 15. A method for configuring as defined in claim 1, wherein the registrar acts as a pseudo-certificate authority. 16. A method for configuring as defined in claim 1, wherein the certificate is a self-signed certificate containing a root-of-trust public key. 17. A WiFi-enable remote station with an internal entity, comprising:
means for receiving a certificate in at least one message from a registrar acting as a certificate authority; means for providing the certificate to the internal entity; and means for securely communicating with an external entity based on the certificate. 18. A remote station as defined in claim 17, further comprising:
means for receiving a private key corresponding to the certificate in the at least one message; means for providing the private key to the internal entity; and means for securely communicating with the external entity also based on the private key. 19. A remote station as defined in claim 18, wherein the private key is received with the certificate. 20. A remote station as defined in claim 18, wherein the certificate comprises a public key, corresponding to the private key, and a public key identifier. 21. A remote station as defined in claim 17, further comprising:
means for sending a public key to be certified in the at least one message, wherein the certificate is generated in association with the public key. 22. A remote station as defined in claim 21, further comprising:
means for generating the public key and a corresponding private key. 23. A remote station as defined in claim 17, further comprising:
means for receiving, with the certificate, a shared secret, an identity for the shared secret, a PIN, a password, and/or a certificate lifetime. 24. A remote station as defined in claim 17, wherein the at least one message comprises WSC M7 and/or M8 messages. 25. A remote station as defined in claim 17, wherein the internal entity is a SEP2 client, and the external entity is a SEP2 server. 26. A remote station as defined in claim 17, wherein the internal entity is a SEP2 server, and the external entity is a SEP2 client. 27. A remote station as defined in claim 17, wherein the registrar has a user interface. 28. A remote station as defined in claim 17, wherein the registrar is a smartphone. 29. A remote station as defined in claim 17, wherein the remote station does not have a user interface. 30. A remote station as defined in claim 17, wherein the registrar is an access point. 31. A remote station as defined in claim 30, wherein the registrar acts as a pseudo-certificate authority. 32. A remote station as defined in claim 17, the certificate is a self-signed certificate containing a root-of-trust public key. 33. A WiFi-enabled remote station with an internal entity, comprising:
a processor configured to:
receive a certificate in at least one message from a registrar acting as a certificate authority; and
provide the certificate to the internal entity for securely communicating with an external entity based on the certificate. 34. A remote station as defined in claim 33, wherein the processor is further configured to:
receive a private key corresponding to the certificate in the at least one message; and provide the private key to the internal entity for securely communicating with the external entity also based on the private key. 35. A remote station as defined in claim 34, wherein the private key is received with the certificate. 36. A remote station as defined in claim 34, wherein the certificate comprises a public key, corresponding to the private key, and a public key identifier. 37. A remote station as defined in claim 33, wherein the processor is further configured to:
send a public key to be certified in the at least one message, wherein the certificate is generated in association with the public key. 38. A remote station as defined in claim 37, wherein the processor is further configured to:
generate the public key and a corresponding private key. 39. A remote station as defined in claim 33, wherein the processor is further configured to:
receive, with the certificate, a shared secret, an identity for the shared secret, a PIN, a password, and/or a certificate lifetime. 40. A remote station as defined in claim 33, wherein the at least one message comprises WSC M7 and/or M8 messages. 41. A remote station as defined in claim 33, wherein the internal entity is a SEP2 client, and the external entity is a SEP2 server. 42. A remote station as defined in claim 33, wherein the internal entity is a SEP2 server, and the external entity is a SEP2 client. 43. A remote station as defined in claim 33, wherein the registrar has a user interface. 44. A remote station as defined in claim 33, wherein the registrar is a smartphone. 45. A remote station as defined in claim 33, wherein the remote station does not have a user interface. 46. A remote station as defined in claim 33, wherein the registrar is an access point. 47. A remote station as defined in claim 46, wherein the registrar acts as a pseudo-certificate authority. 48. A remote station as defined in claim 33, wherein the certificate is a self-signed certificate containing a root-of-trust public key. 49. A computer program product, comprising:
computer-readable medium, comprising:
code for causing a computer to receive a certificate in at least one message from a registrar acting as a certificate authority; and
code for causing a computer to provide the certificate to an internal entity for securely communicating with an external entity based on the certificate. 50. A computer program product as defined in claim 49, wherein the computer readable medium further comprises:
code for causing a computer to receive a private key corresponding to the certificate in the at least one message; and code for causing a computer to provide the private key to the internal entity for securely communicating with the external entity also based on the private key. 51. A computer program product as defined in claim 50, wherein the private key is received with the certificate. 52. A computer program product as defined in claim 50, wherein the certificate comprises a public key, corresponding to the private key, and a public key identifier. 53. A computer program product as defined in claim 49, wherein the computer readable medium further comprises:
code for causing a computer to send a public key to be certified in the at least one message, wherein the certificate is generated in association with the public key. 54. A computer program product as defined in claim 53, wherein the computer readable medium further comprises:
code for causing a computer to generate the public key and a corresponding private key. 55. A computer program product as defined in claim 49, wherein the computer readable medium further comprises:
code for causing a computer to receive, with the certificate, a shared secret, an identity for the shared secret, a PIN, a password, and/or a certificate lifetime. 56. A computer program product as defined in claim 49, wherein the at least one message comprises WSC M7 and/or M8 messages. 57. A computer program product as defined in claim 49, wherein the internal entity is a SEP2 client, and the external entity is a SEP2 server. 58. A computer program product as defined in claim 49, wherein the internal entity is a SEP2 server, and the external entity is a SEP2 client. 59. A computer program product as defined in claim 49, wherein the registrar has a user interface. 60. A computer program product as defined in claim 49, wherein the registrar is a smartphone. 61. A computer program product as defined in claim 49, wherein the remote station does not have a user interface. 62. A computer program product as defined in claim 49, wherein the registrar is an access point. 63. A computer program product as defined in claim 62, wherein the registrar acts as a pseudo-certificate authority. 64. A computer program product as defined in claim 49, wherein the certificate is a self-signed certificate containing a root-of-trust public key. | Disclosed is a method for configuring an internal entity of a WiFi-enabled remote station with a certificate. In the method, the remote station receives the certificate in at least one message from a registrar acting as a certificate authority. The remote station provides the certificate to the internal entity. The internal entity securely communicates with an external entity based on the certificate.1. A method for configuring an internal entity of a WiFi-enabled remote station with a certificate, comprising:
the remote station receiving the certificate in at least one message from a registrar acting as a certificate authority; the remote station providing the certificate to the internal entity; and the internal entity securely communicating with an external entity based on the certificate. 2. A method for configuring as defined in claim 1, further comprising:
the remote station receiving a private key corresponding to the certificate in the at least one message; the remote station providing the private key to the internal entity; and the internal entity securely communicating with the external entity also based on the private key. 3. A method for configuring as defined in claim 2, wherein the remote station receives the private key with the certificate. 4. A method for configuring as defined in claim 2, wherein the certificate comprises a public key, corresponding to the private key, and a public key identifier. 5. A method for configuring as defined in claim 1, further comprising:
the remote station sending a public key to be certified in the at least one message, wherein the certificate is generated in association with the public key. 6. A method for configuring as defined in claim 5, further comprising:
the remote station generating the public key and a corresponding private key. 7. A method for configuring as defined in claim 1, further comprising:
the remote station receiving, with the certificate, a shared secret, an identity for the shared secret, a PIN, a password, and/or a certificate lifetime. 8. A method for configuring as defined in claim 1, wherein the at least one message comprises WSC M7 and/or M8 messages. 9. A method for configuring as defined in claim 1, wherein the internal entity is a SEP2 client, and the external entity is a SEP2 server. 10. A method for configuring as defined in claim 1, wherein the internal entity is a SEP2 server, and the external entity is a SEP2 client. 11. A method for configuring as defined in claim 1, wherein the registrar has a user interface. 12. A method for configuring as defined in claim 1, wherein the registrar is a smartphone. 13. A method for configuring as defined in claim 1, wherein the remote station does not have a user interface. 14. A method for configuring as defined in claim 1, wherein the registrar is an access point. 15. A method for configuring as defined in claim 1, wherein the registrar acts as a pseudo-certificate authority. 16. A method for configuring as defined in claim 1, wherein the certificate is a self-signed certificate containing a root-of-trust public key. 17. A WiFi-enable remote station with an internal entity, comprising:
means for receiving a certificate in at least one message from a registrar acting as a certificate authority; means for providing the certificate to the internal entity; and means for securely communicating with an external entity based on the certificate. 18. A remote station as defined in claim 17, further comprising:
means for receiving a private key corresponding to the certificate in the at least one message; means for providing the private key to the internal entity; and means for securely communicating with the external entity also based on the private key. 19. A remote station as defined in claim 18, wherein the private key is received with the certificate. 20. A remote station as defined in claim 18, wherein the certificate comprises a public key, corresponding to the private key, and a public key identifier. 21. A remote station as defined in claim 17, further comprising:
means for sending a public key to be certified in the at least one message, wherein the certificate is generated in association with the public key. 22. A remote station as defined in claim 21, further comprising:
means for generating the public key and a corresponding private key. 23. A remote station as defined in claim 17, further comprising:
means for receiving, with the certificate, a shared secret, an identity for the shared secret, a PIN, a password, and/or a certificate lifetime. 24. A remote station as defined in claim 17, wherein the at least one message comprises WSC M7 and/or M8 messages. 25. A remote station as defined in claim 17, wherein the internal entity is a SEP2 client, and the external entity is a SEP2 server. 26. A remote station as defined in claim 17, wherein the internal entity is a SEP2 server, and the external entity is a SEP2 client. 27. A remote station as defined in claim 17, wherein the registrar has a user interface. 28. A remote station as defined in claim 17, wherein the registrar is a smartphone. 29. A remote station as defined in claim 17, wherein the remote station does not have a user interface. 30. A remote station as defined in claim 17, wherein the registrar is an access point. 31. A remote station as defined in claim 30, wherein the registrar acts as a pseudo-certificate authority. 32. A remote station as defined in claim 17, the certificate is a self-signed certificate containing a root-of-trust public key. 33. A WiFi-enabled remote station with an internal entity, comprising:
a processor configured to:
receive a certificate in at least one message from a registrar acting as a certificate authority; and
provide the certificate to the internal entity for securely communicating with an external entity based on the certificate. 34. A remote station as defined in claim 33, wherein the processor is further configured to:
receive a private key corresponding to the certificate in the at least one message; and provide the private key to the internal entity for securely communicating with the external entity also based on the private key. 35. A remote station as defined in claim 34, wherein the private key is received with the certificate. 36. A remote station as defined in claim 34, wherein the certificate comprises a public key, corresponding to the private key, and a public key identifier. 37. A remote station as defined in claim 33, wherein the processor is further configured to:
send a public key to be certified in the at least one message, wherein the certificate is generated in association with the public key. 38. A remote station as defined in claim 37, wherein the processor is further configured to:
generate the public key and a corresponding private key. 39. A remote station as defined in claim 33, wherein the processor is further configured to:
receive, with the certificate, a shared secret, an identity for the shared secret, a PIN, a password, and/or a certificate lifetime. 40. A remote station as defined in claim 33, wherein the at least one message comprises WSC M7 and/or M8 messages. 41. A remote station as defined in claim 33, wherein the internal entity is a SEP2 client, and the external entity is a SEP2 server. 42. A remote station as defined in claim 33, wherein the internal entity is a SEP2 server, and the external entity is a SEP2 client. 43. A remote station as defined in claim 33, wherein the registrar has a user interface. 44. A remote station as defined in claim 33, wherein the registrar is a smartphone. 45. A remote station as defined in claim 33, wherein the remote station does not have a user interface. 46. A remote station as defined in claim 33, wherein the registrar is an access point. 47. A remote station as defined in claim 46, wherein the registrar acts as a pseudo-certificate authority. 48. A remote station as defined in claim 33, wherein the certificate is a self-signed certificate containing a root-of-trust public key. 49. A computer program product, comprising:
computer-readable medium, comprising:
code for causing a computer to receive a certificate in at least one message from a registrar acting as a certificate authority; and
code for causing a computer to provide the certificate to an internal entity for securely communicating with an external entity based on the certificate. 50. A computer program product as defined in claim 49, wherein the computer readable medium further comprises:
code for causing a computer to receive a private key corresponding to the certificate in the at least one message; and code for causing a computer to provide the private key to the internal entity for securely communicating with the external entity also based on the private key. 51. A computer program product as defined in claim 50, wherein the private key is received with the certificate. 52. A computer program product as defined in claim 50, wherein the certificate comprises a public key, corresponding to the private key, and a public key identifier. 53. A computer program product as defined in claim 49, wherein the computer readable medium further comprises:
code for causing a computer to send a public key to be certified in the at least one message, wherein the certificate is generated in association with the public key. 54. A computer program product as defined in claim 53, wherein the computer readable medium further comprises:
code for causing a computer to generate the public key and a corresponding private key. 55. A computer program product as defined in claim 49, wherein the computer readable medium further comprises:
code for causing a computer to receive, with the certificate, a shared secret, an identity for the shared secret, a PIN, a password, and/or a certificate lifetime. 56. A computer program product as defined in claim 49, wherein the at least one message comprises WSC M7 and/or M8 messages. 57. A computer program product as defined in claim 49, wherein the internal entity is a SEP2 client, and the external entity is a SEP2 server. 58. A computer program product as defined in claim 49, wherein the internal entity is a SEP2 server, and the external entity is a SEP2 client. 59. A computer program product as defined in claim 49, wherein the registrar has a user interface. 60. A computer program product as defined in claim 49, wherein the registrar is a smartphone. 61. A computer program product as defined in claim 49, wherein the remote station does not have a user interface. 62. A computer program product as defined in claim 49, wherein the registrar is an access point. 63. A computer program product as defined in claim 62, wherein the registrar acts as a pseudo-certificate authority. 64. A computer program product as defined in claim 49, wherein the certificate is a self-signed certificate containing a root-of-trust public key. | 2,400 |
7,147 | 7,147 | 14,713,644 | 2,491 | Embodiments disclosed herein provide systems and methods for mitigating attacks on a WebRTC system at the edge of an enterprise network. In a particular embodiment a method provides obtaining access criteria regarding access to a WebRTC system in the enterprise network, wherein the access criteria comprise instructions for allowing WebRTC connections with the WebRTC system. The method further provides receiving WebRTC signaling associated with WebRTC connections between the WebRTC system and endpoints having network addresses outside the enterprise network and blocking at least one connection associated with the WebRTC signaling from participating in WebRTC communications with the WebRTC system based on the access criteria. | 1. A method of an edge system to mitigate Web Real Time Communication (WebRTC) attacks on an enterprise network, the method comprising:
obtaining access criteria regarding access to a WebRTC system in the enterprise network, wherein the access criteria comprise instructions for allowing WebRTC connections with the WebRTC system; receiving WebRTC signaling associated with WebRTC connections between the WebRTC system and endpoints having network addresses outside the enterprise network; and blocking at least one connection associated with the WebRTC signaling from participating in WebRTC communications with the WebRTC system based on the access criteria. 2. The method of claim 1, wherein the access criteria include a threshold of WebRTC connections that are allowed from a particular network location and wherein blocking the at least one connection comprises:
blocking all connections associated with WebRTC signaling from the particular network location once the threshold is reached. 3. The method of claim 1, further comprising:
storing network characteristics of WebRTC connections with the WebRTC system in the edge system; and applying the access criteria to the network characteristics when determining whether to block the at least one connection. 4. The method of claim 3, wherein the network characteristics include Internet Protocol (IP) addresses, IP address ranges, subnet identities, and physical locations of the WebRTC communications established with the WebRTC system. 5. The method of claim 1, wherein the access criteria includes first criteria and second criteria, and wherein blocking the at least one connection comprises:
automatically blocking connections associated with the WebRTC signaling that satisfy the first criteria; and querying the WebRTC system for whether connections associated with the WebRTC signaling that satisfy the second criteria should be blocked. 6. The method of claim 5, further comprising:
upon receiving indication from the WebRTC system that one or more of the connections associated with the WebRTC signaling that satisfy the second criteria should be blocked, blocking the one or more of the connections associated with the WebRTC signaling that satisfy the second criteria. 7. The method of claim 5, wherein, in response to the querying, the WebRTC system transfers a test to each endpoint of the connections associated with the WebRTC signaling that satisfy the second criteria, wherein the test is used to determine whether each endpoint has a human operator. 8. The method of claim 7, wherein the WebRTC system directs the edge system to block connections from endpoints of the connections associated with the WebRTC signaling that satisfy the second criteria that are determined to not have a human operator. 9. The method of claim 1, wherein obtaining the access criteria comprises receiving at least a portion of the access criteria via an out-of-band link between the edge system and the WebRTC system. 10. The method of claim 1, wherein the edge system comprises a Traversal Using Relays around NAT (Network Address Translation) server. 11. An edge system to mitigate Web Real Time Communication (WebRTC) attacks on an enterprise network, the method comprising:
a processing system configured to obtain access criteria regarding access to a WebRTC system in the enterprise network, wherein the access criteria comprise instructions for allowing WebRTC connections with the WebRTC system; a communication interface configured to receive WebRTC signaling associated with WebRTC connections between the WebRTC system and endpoints having network addresses outside the enterprise network; and a processing system configured to block at least one connection associated with the WebRTC signaling from participating in WebRTC communications with the WebRTC system based on the access criteria. 12. The edge system of claim 11, wherein the access criteria include a threshold of WebRTC connections that are allowed from a particular network location and wherein the processing system configured to block the at least one connection comprises:
the processing system configured to block all connections associated with WebRTC signaling from the particular network location once the threshold is reached. 13. The edge system of claim 11, further comprising:
a storage system configured to store network characteristics of WebRTC connections with the WebRTC system in the edge system; and the processing system configured to apply the access criteria to the network characteristics when determining whether to block the at least one connection. 14. The edge system of claim 13, wherein the network characteristics include Internet Protocol (IP) addresses, IP address ranges, subnet identities, and physical locations of the WebRTC communications established with the WebRTC system. 15. The edge system of claim 11, wherein the access criteria includes first criteria and second criteria, and wherein the processing system configured to block the at least one connection comprises:
the processing system configured to automatically block connections associated with the WebRTC signaling that satisfy the first criteria and query the WebRTC system for whether connections associated with the WebRTC signaling that satisfy the second criteria should be blocked. 16. The edge system of claim 15, further comprising:
upon receiving indication from the WebRTC system that one or more of the connections associated with the WebRTC signaling that satisfy the second criteria should be blocked, the processing system is configured to block the one or more of the connections associated with the WebRTC signaling that satisfy the second criteria. 17. The edge system of claim 15, wherein, in response to the querying, the WebRTC system transfers a test to each endpoint of the connections associated with the WebRTC signaling that satisfy the second criteria, wherein the test is used to determine whether each endpoint has a human operator. 18. The edge system of claim 17, wherein the WebRTC system directs the edge system to block connections from endpoints of the connections associated with the WebRTC signaling that satisfy the second criteria that are determined to not have a human operator. 19. The edge system of claim 11, wherein the processing system configured to obtain the access criteria comprises the processing system configured to receive at least a portion of the access criteria via an out-of-band link between the communication interface and the WebRTC system. 20. The edge system of claim 11, wherein the edge system comprises a Traversal Using Relays around NAT (Network Address Translation) server. | Embodiments disclosed herein provide systems and methods for mitigating attacks on a WebRTC system at the edge of an enterprise network. In a particular embodiment a method provides obtaining access criteria regarding access to a WebRTC system in the enterprise network, wherein the access criteria comprise instructions for allowing WebRTC connections with the WebRTC system. The method further provides receiving WebRTC signaling associated with WebRTC connections between the WebRTC system and endpoints having network addresses outside the enterprise network and blocking at least one connection associated with the WebRTC signaling from participating in WebRTC communications with the WebRTC system based on the access criteria.1. A method of an edge system to mitigate Web Real Time Communication (WebRTC) attacks on an enterprise network, the method comprising:
obtaining access criteria regarding access to a WebRTC system in the enterprise network, wherein the access criteria comprise instructions for allowing WebRTC connections with the WebRTC system; receiving WebRTC signaling associated with WebRTC connections between the WebRTC system and endpoints having network addresses outside the enterprise network; and blocking at least one connection associated with the WebRTC signaling from participating in WebRTC communications with the WebRTC system based on the access criteria. 2. The method of claim 1, wherein the access criteria include a threshold of WebRTC connections that are allowed from a particular network location and wherein blocking the at least one connection comprises:
blocking all connections associated with WebRTC signaling from the particular network location once the threshold is reached. 3. The method of claim 1, further comprising:
storing network characteristics of WebRTC connections with the WebRTC system in the edge system; and applying the access criteria to the network characteristics when determining whether to block the at least one connection. 4. The method of claim 3, wherein the network characteristics include Internet Protocol (IP) addresses, IP address ranges, subnet identities, and physical locations of the WebRTC communications established with the WebRTC system. 5. The method of claim 1, wherein the access criteria includes first criteria and second criteria, and wherein blocking the at least one connection comprises:
automatically blocking connections associated with the WebRTC signaling that satisfy the first criteria; and querying the WebRTC system for whether connections associated with the WebRTC signaling that satisfy the second criteria should be blocked. 6. The method of claim 5, further comprising:
upon receiving indication from the WebRTC system that one or more of the connections associated with the WebRTC signaling that satisfy the second criteria should be blocked, blocking the one or more of the connections associated with the WebRTC signaling that satisfy the second criteria. 7. The method of claim 5, wherein, in response to the querying, the WebRTC system transfers a test to each endpoint of the connections associated with the WebRTC signaling that satisfy the second criteria, wherein the test is used to determine whether each endpoint has a human operator. 8. The method of claim 7, wherein the WebRTC system directs the edge system to block connections from endpoints of the connections associated with the WebRTC signaling that satisfy the second criteria that are determined to not have a human operator. 9. The method of claim 1, wherein obtaining the access criteria comprises receiving at least a portion of the access criteria via an out-of-band link between the edge system and the WebRTC system. 10. The method of claim 1, wherein the edge system comprises a Traversal Using Relays around NAT (Network Address Translation) server. 11. An edge system to mitigate Web Real Time Communication (WebRTC) attacks on an enterprise network, the method comprising:
a processing system configured to obtain access criteria regarding access to a WebRTC system in the enterprise network, wherein the access criteria comprise instructions for allowing WebRTC connections with the WebRTC system; a communication interface configured to receive WebRTC signaling associated with WebRTC connections between the WebRTC system and endpoints having network addresses outside the enterprise network; and a processing system configured to block at least one connection associated with the WebRTC signaling from participating in WebRTC communications with the WebRTC system based on the access criteria. 12. The edge system of claim 11, wherein the access criteria include a threshold of WebRTC connections that are allowed from a particular network location and wherein the processing system configured to block the at least one connection comprises:
the processing system configured to block all connections associated with WebRTC signaling from the particular network location once the threshold is reached. 13. The edge system of claim 11, further comprising:
a storage system configured to store network characteristics of WebRTC connections with the WebRTC system in the edge system; and the processing system configured to apply the access criteria to the network characteristics when determining whether to block the at least one connection. 14. The edge system of claim 13, wherein the network characteristics include Internet Protocol (IP) addresses, IP address ranges, subnet identities, and physical locations of the WebRTC communications established with the WebRTC system. 15. The edge system of claim 11, wherein the access criteria includes first criteria and second criteria, and wherein the processing system configured to block the at least one connection comprises:
the processing system configured to automatically block connections associated with the WebRTC signaling that satisfy the first criteria and query the WebRTC system for whether connections associated with the WebRTC signaling that satisfy the second criteria should be blocked. 16. The edge system of claim 15, further comprising:
upon receiving indication from the WebRTC system that one or more of the connections associated with the WebRTC signaling that satisfy the second criteria should be blocked, the processing system is configured to block the one or more of the connections associated with the WebRTC signaling that satisfy the second criteria. 17. The edge system of claim 15, wherein, in response to the querying, the WebRTC system transfers a test to each endpoint of the connections associated with the WebRTC signaling that satisfy the second criteria, wherein the test is used to determine whether each endpoint has a human operator. 18. The edge system of claim 17, wherein the WebRTC system directs the edge system to block connections from endpoints of the connections associated with the WebRTC signaling that satisfy the second criteria that are determined to not have a human operator. 19. The edge system of claim 11, wherein the processing system configured to obtain the access criteria comprises the processing system configured to receive at least a portion of the access criteria via an out-of-band link between the communication interface and the WebRTC system. 20. The edge system of claim 11, wherein the edge system comprises a Traversal Using Relays around NAT (Network Address Translation) server. | 2,400 |
7,148 | 7,148 | 15,500,461 | 2,422 | Apparatuses, systems, and methods are provided for alignment of a camera based on an image captured by the camera. The camera can, for example, be supported by a support structure to face towards an image alignment reference marker such that an image captured by the camera contains the marker. The camera can, for example, be rotatably aligned relative to the marker to an aligned position based on the captured image. | 1. An apparatus comprising:
a calibration surface including an image alignment reference marker; and a support structure to support a camera to face towards the calibration surface, wherein the support structure includes a camera opening to allow the camera to capture an image containing the marker through the camera opening, the camera opening including an inner surface sized to rotatably mate with an outer surface of the camera to allow the camera to be rotatably aligned to an aligned position based on the captured image, and wherein the support structure includes a securing element to allow the camera to be secured to the support structure in the aligned position during installation of the camera. 2. The apparatus of claim 1, wherein the calibration surface includes four image alignment reference markers that correspond to the four corners of an image captured by the camera in the aligned position. 3. The apparatus of claim 1, wherein the support structure includes a cover for the camera that restricts tampering of the camera's alignment after the camera is installed. 4. The apparatus of claim 1, wherein the inner surface of the camera opening is sized to rotatably mate with the outer surface of the camera to allow the camera to be rotatably aligned along an imaging lens axis of the camera. 5. The apparatus of claim 1, wherein the inner surface of the camera opening is cylindrical and sized to securely rotatably mate with a cylindrical lens barrel of the camera. 6. The apparatus of claim 1, wherein the support structure is securable to the calibration surface to support the camera above the calibration surface at a predetermined position relative to the marker. 7. The apparatus of claim 1, further comprising:
a calibration plate securable to the support structure, the calibration surface being located on the calibration plate. 8. The apparatus of claim 1, further comprising:
a camera to capture an image containing the marker through the camera opening. 9. A system comprising:
a camera support structure that is dimensioned to support a camera to face towards an image alignment reference marker; an actuator connectable to the camera to adjust the rotational alignment of the camera along an imaging axis of the camera; a control module connectable to the camera to communicate with the camera; and a data storage module containing instructions executable by the processor such that the system is operative to:
instruct the camera to capture an image containing the marker;
receive image data from the camera corresponding to the captured image; and
actuate the actuator to adjust the rotational alignment of the camera to an aligned position based on the received data. 10. The system of claim 9, further comprising:
a camera securable to the support structure in the aligned position. 11. The system of claim 9, wherein the data storage module contains instructions executable by the control module such that the system is further operative to:
instruct the camera to capture a second image containing the marker in the aligned position; receive image data from the camera corresponding to the second captured image; and actuate the actuator to adjust the rotational alignment of the camera to a second aligned position based on the second captured image of the marker. 12. A method comprising:
securing a camera to a support structure such that the camera is positioned relative to a camera opening in the support structure so as to face the camera towards an image alignment reference marker, the camera being secured to the support structure such that an outer surface of the camera is rotatably mated with an inner surface of the camera opening to allow the camera to be rotatably aligned relative to the camera opening; capturing an image of the marker with the camera; and aligning the camera to an aligned position based on the captured image of the marker. 13. The method of claim 12, further comprising:
securing the camera in the aligned position. 14. The method of claim 12, further comprising:
capturing a second image of the marker while the camera is in the aligned position; and aligning the camera to a second aligned position based on the second captured image of the marker. 15. The method of claim 12, further comprising:
securing the support structure to a calibration surface that includes the image alignment reference marker, the support structure being secured to the calibration surface such that a camera opening of the support structure is positioned at a predetermined position relative to the calibration surface. | Apparatuses, systems, and methods are provided for alignment of a camera based on an image captured by the camera. The camera can, for example, be supported by a support structure to face towards an image alignment reference marker such that an image captured by the camera contains the marker. The camera can, for example, be rotatably aligned relative to the marker to an aligned position based on the captured image.1. An apparatus comprising:
a calibration surface including an image alignment reference marker; and a support structure to support a camera to face towards the calibration surface, wherein the support structure includes a camera opening to allow the camera to capture an image containing the marker through the camera opening, the camera opening including an inner surface sized to rotatably mate with an outer surface of the camera to allow the camera to be rotatably aligned to an aligned position based on the captured image, and wherein the support structure includes a securing element to allow the camera to be secured to the support structure in the aligned position during installation of the camera. 2. The apparatus of claim 1, wherein the calibration surface includes four image alignment reference markers that correspond to the four corners of an image captured by the camera in the aligned position. 3. The apparatus of claim 1, wherein the support structure includes a cover for the camera that restricts tampering of the camera's alignment after the camera is installed. 4. The apparatus of claim 1, wherein the inner surface of the camera opening is sized to rotatably mate with the outer surface of the camera to allow the camera to be rotatably aligned along an imaging lens axis of the camera. 5. The apparatus of claim 1, wherein the inner surface of the camera opening is cylindrical and sized to securely rotatably mate with a cylindrical lens barrel of the camera. 6. The apparatus of claim 1, wherein the support structure is securable to the calibration surface to support the camera above the calibration surface at a predetermined position relative to the marker. 7. The apparatus of claim 1, further comprising:
a calibration plate securable to the support structure, the calibration surface being located on the calibration plate. 8. The apparatus of claim 1, further comprising:
a camera to capture an image containing the marker through the camera opening. 9. A system comprising:
a camera support structure that is dimensioned to support a camera to face towards an image alignment reference marker; an actuator connectable to the camera to adjust the rotational alignment of the camera along an imaging axis of the camera; a control module connectable to the camera to communicate with the camera; and a data storage module containing instructions executable by the processor such that the system is operative to:
instruct the camera to capture an image containing the marker;
receive image data from the camera corresponding to the captured image; and
actuate the actuator to adjust the rotational alignment of the camera to an aligned position based on the received data. 10. The system of claim 9, further comprising:
a camera securable to the support structure in the aligned position. 11. The system of claim 9, wherein the data storage module contains instructions executable by the control module such that the system is further operative to:
instruct the camera to capture a second image containing the marker in the aligned position; receive image data from the camera corresponding to the second captured image; and actuate the actuator to adjust the rotational alignment of the camera to a second aligned position based on the second captured image of the marker. 12. A method comprising:
securing a camera to a support structure such that the camera is positioned relative to a camera opening in the support structure so as to face the camera towards an image alignment reference marker, the camera being secured to the support structure such that an outer surface of the camera is rotatably mated with an inner surface of the camera opening to allow the camera to be rotatably aligned relative to the camera opening; capturing an image of the marker with the camera; and aligning the camera to an aligned position based on the captured image of the marker. 13. The method of claim 12, further comprising:
securing the camera in the aligned position. 14. The method of claim 12, further comprising:
capturing a second image of the marker while the camera is in the aligned position; and aligning the camera to a second aligned position based on the second captured image of the marker. 15. The method of claim 12, further comprising:
securing the support structure to a calibration surface that includes the image alignment reference marker, the support structure being secured to the calibration surface such that a camera opening of the support structure is positioned at a predetermined position relative to the calibration surface. | 2,400 |
7,149 | 7,149 | 12,697,004 | 2,432 | Computer-implemented systems and methods are described for providing user access to content via customized options for a plurality of regions, a customized option being provided to a user based on a region associated with the user. An upload of content for distribution and metadata describing the content are received. A first option definition is received that defines first criteria for accessing the content in a first region. A second option definition defining second criteria for accessing the content in a second region is received. One or more options for the content are provided to the user based on the region associated with the user. An identification of an option is received from the user, and access to the content is provided according to the criteria of the option that the user has identified. | 1. A processor-implemented method of providing user access to content via customized options for a plurality of regions, a customized option being provided to a user based on a region in the plurality of regions that is associated with the user, the method comprising:
receiving, using one or more processors, an upload of content for distribution and metadata describing the content, the received content and metadata being stored in a computer-readable memory; receiving a first option definition defining first criteria for accessing the content in a first region in the plurality of regions, the first criteria including an option type, a value, and a first region where the first option definition is valid; receiving a second option definition defining second criteria for accessing the content in a second region in the plurality of regions, the second criteria including an option type, a value, and a second region where the second option definition is valid; providing one or more options for the content to a user based on the region associated with the user; receiving an identification of an option in the one or more options from the user; and providing access to the content according to a criterion of the option that the user has identified. 2. The method of claim 1, wherein the content or the metadata associated with the content are identical across a plurality of options associated with the content, wherein the plurality of options includes the first option and the second option. 3. The method of claim 1, wherein the user is provided the first option but not the second option based on the region associated with the user. 4. The method of claim 1, wherein the region associated with the user is associated with the user based on a user input, an address, or a detected Internet access provider. 5. The method of claim 1, wherein a second user associated with a third region in the plurality of regions is not provided with any options for the content based on the second user being associated with the third region. 6. The method of claim 1, wherein a second user associated with a third region in the plurality of regions is not provided with any options for the content based on a lack of any options being associated with the third region. 7. The method of claim 1, wherein the first option includes a time period of validity, wherein the time period of validity is preceded by a period where materials for the content are available in the first region. 8. The method of claim 7, wherein a user associated with the second region cannot access the materials prior to a beginning of the time period of validity for the first option. 9. The method of claim 1, wherein the first option comprises a higher value than the second option, a higher video resolution than a video resolution included in the second option, a different option type than is included in the second option, or additional content not included in the second option. 10. The method of claim 1, wherein a plurality of options are defined for the content for the first region. 11. The method of claim 1, wherein a user is not able to locate content if no options are available for the region associated with the user. 12. A computer-implemented system of providing user access to content via customized options for a plurality of regions, a customized option being provided to a user based on a region in the plurality of regions that is associated with the user, the system comprising:
a data processor; a computer-readable memory encoded with instructions for commanding the data processor to perform steps including:
receiving, using one or more processors, an upload of content for distribution and metadata describing the content, the received content and metadata being stored in a computer-readable memory;
receiving a first option definition defining first criteria for accessing the content in a first region in the plurality of regions, the first criteria including an option type, a value, and a first region where the first option definition is valid;
receiving a second option definition defining second criteria for accessing the content in a second region in the plurality of regions, the second criteria including an option type, a value, and a second region where the second option definition is valid;
providing one or more options for the content to a user based on the region associated with the user;
receiving an identification of an option in the one or more options from the user; and
providing access to the content according to a criterion of the option that the user has identified. 13. The system of claim 12, wherein the content or the metadata associated with the content are identical across a plurality of options associated with the content, wherein the plurality of options includes the first option and the second option. 14. The system of claim 12, wherein the user is provided the first option but not the second option based on the region associated with the user. 15. The system of claim 12, wherein the region associated with the user is associated with the user based on a user input, an address, or a detected Internet access provider. 16. The system of claim 12, wherein a second user associated with a third region in the plurality of regions is not provided with any options for the content based on the second user being associated with the third region. 17. The system of claim 12, wherein a second user associated with a third region in the plurality of regions is not provided with any options for the content based on a lack of any options being associated with the third region. 18. The system of claim 12, wherein the first option includes a time period of validity, wherein the time period of validity is preceded by a period where materials for the content are available in the first region. 19. The system of claim 18, wherein a user associated with the second region cannot access the materials prior to a beginning of the time period of validity for the first option. 20. The system of claim 12, wherein the first option comprises a higher value than the second option, a higher video resolution than a video resolution included in the second option, a different option type than is included in the second option, or additional content not included in the second option. 21. The system of claim 12, wherein a plurality of options are defined for the content for the first region. 22. The system of claim 12, wherein a user is not able to locate content if no options are available for the region associated with the user. | Computer-implemented systems and methods are described for providing user access to content via customized options for a plurality of regions, a customized option being provided to a user based on a region associated with the user. An upload of content for distribution and metadata describing the content are received. A first option definition is received that defines first criteria for accessing the content in a first region. A second option definition defining second criteria for accessing the content in a second region is received. One or more options for the content are provided to the user based on the region associated with the user. An identification of an option is received from the user, and access to the content is provided according to the criteria of the option that the user has identified.1. A processor-implemented method of providing user access to content via customized options for a plurality of regions, a customized option being provided to a user based on a region in the plurality of regions that is associated with the user, the method comprising:
receiving, using one or more processors, an upload of content for distribution and metadata describing the content, the received content and metadata being stored in a computer-readable memory; receiving a first option definition defining first criteria for accessing the content in a first region in the plurality of regions, the first criteria including an option type, a value, and a first region where the first option definition is valid; receiving a second option definition defining second criteria for accessing the content in a second region in the plurality of regions, the second criteria including an option type, a value, and a second region where the second option definition is valid; providing one or more options for the content to a user based on the region associated with the user; receiving an identification of an option in the one or more options from the user; and providing access to the content according to a criterion of the option that the user has identified. 2. The method of claim 1, wherein the content or the metadata associated with the content are identical across a plurality of options associated with the content, wherein the plurality of options includes the first option and the second option. 3. The method of claim 1, wherein the user is provided the first option but not the second option based on the region associated with the user. 4. The method of claim 1, wherein the region associated with the user is associated with the user based on a user input, an address, or a detected Internet access provider. 5. The method of claim 1, wherein a second user associated with a third region in the plurality of regions is not provided with any options for the content based on the second user being associated with the third region. 6. The method of claim 1, wherein a second user associated with a third region in the plurality of regions is not provided with any options for the content based on a lack of any options being associated with the third region. 7. The method of claim 1, wherein the first option includes a time period of validity, wherein the time period of validity is preceded by a period where materials for the content are available in the first region. 8. The method of claim 7, wherein a user associated with the second region cannot access the materials prior to a beginning of the time period of validity for the first option. 9. The method of claim 1, wherein the first option comprises a higher value than the second option, a higher video resolution than a video resolution included in the second option, a different option type than is included in the second option, or additional content not included in the second option. 10. The method of claim 1, wherein a plurality of options are defined for the content for the first region. 11. The method of claim 1, wherein a user is not able to locate content if no options are available for the region associated with the user. 12. A computer-implemented system of providing user access to content via customized options for a plurality of regions, a customized option being provided to a user based on a region in the plurality of regions that is associated with the user, the system comprising:
a data processor; a computer-readable memory encoded with instructions for commanding the data processor to perform steps including:
receiving, using one or more processors, an upload of content for distribution and metadata describing the content, the received content and metadata being stored in a computer-readable memory;
receiving a first option definition defining first criteria for accessing the content in a first region in the plurality of regions, the first criteria including an option type, a value, and a first region where the first option definition is valid;
receiving a second option definition defining second criteria for accessing the content in a second region in the plurality of regions, the second criteria including an option type, a value, and a second region where the second option definition is valid;
providing one or more options for the content to a user based on the region associated with the user;
receiving an identification of an option in the one or more options from the user; and
providing access to the content according to a criterion of the option that the user has identified. 13. The system of claim 12, wherein the content or the metadata associated with the content are identical across a plurality of options associated with the content, wherein the plurality of options includes the first option and the second option. 14. The system of claim 12, wherein the user is provided the first option but not the second option based on the region associated with the user. 15. The system of claim 12, wherein the region associated with the user is associated with the user based on a user input, an address, or a detected Internet access provider. 16. The system of claim 12, wherein a second user associated with a third region in the plurality of regions is not provided with any options for the content based on the second user being associated with the third region. 17. The system of claim 12, wherein a second user associated with a third region in the plurality of regions is not provided with any options for the content based on a lack of any options being associated with the third region. 18. The system of claim 12, wherein the first option includes a time period of validity, wherein the time period of validity is preceded by a period where materials for the content are available in the first region. 19. The system of claim 18, wherein a user associated with the second region cannot access the materials prior to a beginning of the time period of validity for the first option. 20. The system of claim 12, wherein the first option comprises a higher value than the second option, a higher video resolution than a video resolution included in the second option, a different option type than is included in the second option, or additional content not included in the second option. 21. The system of claim 12, wherein a plurality of options are defined for the content for the first region. 22. The system of claim 12, wherein a user is not able to locate content if no options are available for the region associated with the user. | 2,400 |
7,150 | 7,150 | 13,908,855 | 2,487 | A method for encoding a multiview video stream representing a plurality of viewpoints of a 3D scenery comprising objects, the method comprising for each of said viewpoints rendering and encoding a plurality of 2D video streams, respective ones of said plurality of 2D video streams including color information, depth information, and transparency information pertaining to objects in respective object layers serializing said plurality of 2D video streams into a combined 2D video stream; including said combined 2D video stream into said multiview video stream. | 1. A method for encoding a multiview video stream representing a plurality of viewpoints of a 3D scenery comprising objects, the method comprising for each of said viewpoints:
rendering and encoding a plurality of 2D video streams, respective ones of said plurality of 2D video streams including color information, depth information, and transparency information pertaining to objects in respective object layers; serializing said plurality of 2D video streams into a combined 2D video stream; including said combined 2D video stream into said multiview video stream. 2. The method according to claim 1, wherein said encoding of said multiview video stream comprises generating a stream according to the H.264 MVC standard. 3. The method according to claim 2, wherein said transparency information is encoded as an alpha parameter. 4. A method for decoding a multiview video stream representing a plurality of viewpoints of a 3D scenery comprising objects, the method comprising for a first one of said viewpoints:
extracting a first combined 2D video stream from said multiview video stream; deserializing said first combined 2D video stream into a first plurality of 2D video streams; extracting color information, depth information, and transparency information pertaining to groups of objects in respective object layers from respective ones of said first plurality of 2D video streams; using said respective color information, depth information, and transparency information pertaining to said groups of objects in said respective object layers to generate a first superimposed stream, said first superimposed stream being consistent with said first one of said viewpoints. 5. The method according to claim 4, further comprising for a second one of said viewpoints:
extracting a second combined 2D video stream from said multiview video stream; deserializing said second combined 2D video stream into a second plurality of 2D video streams; extracting additional color information, depth information, and transparency information pertaining to said groups of objects in respective object layers from respective ones of said second plurality of 2D video streams; using said respective color information, depth information, and transparency information, and said respective additional color information, depth information, and transparency information pertaining to said objects in said respective object layers to generate a second superimposed stream, said second superimposed stream being consistent with a new viewpoint, said new viewpoint being capable of being interpolated, from said first one of said viewpoints and said second one of said viewpoints. 6. The method according to claim 4, further comprising adding a rendering of a modeled 3D object to said superimposed stream in accordance with color information, depth information, and transparency information pertaining to said modeled 3D object. 7. A computer program comprising software means configured to perform, when executed, the method of claim 1. 8. A system for encoding a multiview video stream representing a plurality of viewpoints of a 3D scenery comprising objects, the system comprising:
a renderer configured to generate renderings according to a first viewpoint and a second viewpoint; a layer generator, operatively connected to said renderer, said layer generator being configured to divide said objects appearing in said first viewpoint into a first plurality of layers, to divide said objects appearing in said second viewpoint into a second plurality of layers, and to produce 2D video streams for each layer of said first plurality of layers and said second plurality of layers, said 2D video streams including color information, depth information, and transparency information pertaining to said objects in said respective layers; an encoder, operatively connected to said layer generator, said encoder being configured to encode and serialize said 2D video streams according to each of said first viewpoint and said second viewpoint into respective combined 2D video streams; an encapsulator, operatively connected to said encoder, said encapsulator being configured to include said combined 2D video streams into said multiview video stream. 9. The system according to claim 8, wherein said multiview video stream comprises a stream according to the H.264 MVC standard. 10. The system according to claim 9, wherein said transparency information is encoded as an alpha parameter. 11. A system for decoding a multiview video stream representing a plurality of viewpoints of a 3D scenery comprising objects, the system comprising:
an extractor configured to extract a first combined 2D video stream from said multiview video stream; a decoder, operatively connected to said extractor, said decoder being configured to deserialize said first combined 2D video stream into a first plurality of 2D video streams; to extract color information, depth information, and transparency information pertaining to groups of objects in respective object layers from each of said first plurality of video streams; a view synthesizer, operatively connected to said decoder, said visualizing agent being configured to use said respective color information, depth information, and transparency information pertaining to said objects in said respective object layers to generate a first superimposed stream, said first superimposed stream being consistent with said first one of said viewpoints. 12. The system according to claim 11, wherein said extractor is further configured to extract a second combined 2D video stream from said multiview video stream;
wherein said decoder is further configured to deserialize said second combined 2D video stream into a second plurality of 2D video streams; to extract additional color information, depth information, and transparency information pertaining to said groups of objects from said second plurality of 2D video streams; and wherein said view synthesizer is further configured to use said respective color information, depth information, and transparency information, and said respective additional color information, depth information, and transparency information pertaining to said groups of objects to generate a second superimposed stream, said second superimposed stream being consistent with a new viewpoint, said new viewpoint being capable of being interpolated from said first one of said viewpoints and said second one of said viewpoints. 13. The system according to claim 11, wherein said view synthesizer is further configured to add a rendering of a modeled 3D object to said superimposed stream in accordance with color information, depth information, and 20 transparency information pertaining to said modeled 3D object. 14. A set-top box comprising the system according to claim 8. | A method for encoding a multiview video stream representing a plurality of viewpoints of a 3D scenery comprising objects, the method comprising for each of said viewpoints rendering and encoding a plurality of 2D video streams, respective ones of said plurality of 2D video streams including color information, depth information, and transparency information pertaining to objects in respective object layers serializing said plurality of 2D video streams into a combined 2D video stream; including said combined 2D video stream into said multiview video stream.1. A method for encoding a multiview video stream representing a plurality of viewpoints of a 3D scenery comprising objects, the method comprising for each of said viewpoints:
rendering and encoding a plurality of 2D video streams, respective ones of said plurality of 2D video streams including color information, depth information, and transparency information pertaining to objects in respective object layers; serializing said plurality of 2D video streams into a combined 2D video stream; including said combined 2D video stream into said multiview video stream. 2. The method according to claim 1, wherein said encoding of said multiview video stream comprises generating a stream according to the H.264 MVC standard. 3. The method according to claim 2, wherein said transparency information is encoded as an alpha parameter. 4. A method for decoding a multiview video stream representing a plurality of viewpoints of a 3D scenery comprising objects, the method comprising for a first one of said viewpoints:
extracting a first combined 2D video stream from said multiview video stream; deserializing said first combined 2D video stream into a first plurality of 2D video streams; extracting color information, depth information, and transparency information pertaining to groups of objects in respective object layers from respective ones of said first plurality of 2D video streams; using said respective color information, depth information, and transparency information pertaining to said groups of objects in said respective object layers to generate a first superimposed stream, said first superimposed stream being consistent with said first one of said viewpoints. 5. The method according to claim 4, further comprising for a second one of said viewpoints:
extracting a second combined 2D video stream from said multiview video stream; deserializing said second combined 2D video stream into a second plurality of 2D video streams; extracting additional color information, depth information, and transparency information pertaining to said groups of objects in respective object layers from respective ones of said second plurality of 2D video streams; using said respective color information, depth information, and transparency information, and said respective additional color information, depth information, and transparency information pertaining to said objects in said respective object layers to generate a second superimposed stream, said second superimposed stream being consistent with a new viewpoint, said new viewpoint being capable of being interpolated, from said first one of said viewpoints and said second one of said viewpoints. 6. The method according to claim 4, further comprising adding a rendering of a modeled 3D object to said superimposed stream in accordance with color information, depth information, and transparency information pertaining to said modeled 3D object. 7. A computer program comprising software means configured to perform, when executed, the method of claim 1. 8. A system for encoding a multiview video stream representing a plurality of viewpoints of a 3D scenery comprising objects, the system comprising:
a renderer configured to generate renderings according to a first viewpoint and a second viewpoint; a layer generator, operatively connected to said renderer, said layer generator being configured to divide said objects appearing in said first viewpoint into a first plurality of layers, to divide said objects appearing in said second viewpoint into a second plurality of layers, and to produce 2D video streams for each layer of said first plurality of layers and said second plurality of layers, said 2D video streams including color information, depth information, and transparency information pertaining to said objects in said respective layers; an encoder, operatively connected to said layer generator, said encoder being configured to encode and serialize said 2D video streams according to each of said first viewpoint and said second viewpoint into respective combined 2D video streams; an encapsulator, operatively connected to said encoder, said encapsulator being configured to include said combined 2D video streams into said multiview video stream. 9. The system according to claim 8, wherein said multiview video stream comprises a stream according to the H.264 MVC standard. 10. The system according to claim 9, wherein said transparency information is encoded as an alpha parameter. 11. A system for decoding a multiview video stream representing a plurality of viewpoints of a 3D scenery comprising objects, the system comprising:
an extractor configured to extract a first combined 2D video stream from said multiview video stream; a decoder, operatively connected to said extractor, said decoder being configured to deserialize said first combined 2D video stream into a first plurality of 2D video streams; to extract color information, depth information, and transparency information pertaining to groups of objects in respective object layers from each of said first plurality of video streams; a view synthesizer, operatively connected to said decoder, said visualizing agent being configured to use said respective color information, depth information, and transparency information pertaining to said objects in said respective object layers to generate a first superimposed stream, said first superimposed stream being consistent with said first one of said viewpoints. 12. The system according to claim 11, wherein said extractor is further configured to extract a second combined 2D video stream from said multiview video stream;
wherein said decoder is further configured to deserialize said second combined 2D video stream into a second plurality of 2D video streams; to extract additional color information, depth information, and transparency information pertaining to said groups of objects from said second plurality of 2D video streams; and wherein said view synthesizer is further configured to use said respective color information, depth information, and transparency information, and said respective additional color information, depth information, and transparency information pertaining to said groups of objects to generate a second superimposed stream, said second superimposed stream being consistent with a new viewpoint, said new viewpoint being capable of being interpolated from said first one of said viewpoints and said second one of said viewpoints. 13. The system according to claim 11, wherein said view synthesizer is further configured to add a rendering of a modeled 3D object to said superimposed stream in accordance with color information, depth information, and 20 transparency information pertaining to said modeled 3D object. 14. A set-top box comprising the system according to claim 8. | 2,400 |
7,151 | 7,151 | 14,925,904 | 2,467 | Systems and methods described herein are directed to solutions for Network on Chip (NoC) interconnects that automatically and dynamically determines the position of hosts of various size and shape in a NoC topology based on the connectivity, bandwidth and latency requirements of the system traffic flows and certain performance optimization metrics such as system interconnect latency and interconnect cost. The example embodiments selects hosts for relocation consideration and determines a new possible position for them in the NoC based on the system traffic specification, shape and size of the hosts and by using probabilistic function to decide if the relocation is carried out or not. The procedure is repeated over new sets of hosts until certain optimization targets are satisfied or repetition count is exceeded. | 1. A method, comprising:
generating a floorplan for a chip comprising a plurality of hosts and a network on chip (NoC) interconnect configured to communicatively connect the plurality of hosts, the generating of the floorplan comprising determining, by a processor, positions for the plurality of hosts, a first one of the plurality of hosts having a different physical footprint from a second one of the plurality of hosts, wherein the positions for the plurality of hosts are determined based on optimization of one or more efficiency functions; and generating the NoC interconnect based on the positions for the plurality of hosts. 2. The method of claim 1, wherein the one or more efficiency functions comprises at least one of: latency, bandwidth, and number of router hops between each host in the NoC interconnect. 3. The method of claim 1, wherein the generating the NoC interconnect comprises connecting each of the plurality of hosts to an adjacent router based on the determined positions for the plurality of hosts. 4. The method of claim 1, further comprising determining whether resulting positions of the plurality of hosts results in overlap and repositioning overlapped ones of the plurality of hosts. 5. The method of claim 4, wherein the repositioning overlapped ones of the plurality of hosts comprises:
determining whether resulting positions of the plurality of hosts results in overlap, and repositioning overlapped ones of the plurality of hosts by one of: repositioning overlapped ones to the position associated with the selected host, and selecting the overlapped ones for shifting in the selected direction. 6. The method of claim 1, wherein the determining positions for the plurality of hosts is based on connectivity requirements of the plurality of hosts. 7. A non-transitory computer readable medium, storing instructions for executing a process, the instructions comprising:
generating a floorplan for a chip comprising a plurality of hosts and a network on chip (NoC) interconnect configured to communicatively connect the plurality of hosts, the generating of the floorplan comprising determining positions for the plurality of hosts, a first one of the plurality of hosts having a different physical footprint from a second one of the plurality of hosts, wherein the positions for the plurality of hosts are determined based on optimization of one or more efficiency functions; and generating the NoC interconnect based on the positions for the plurality of hosts. 8. The non-transitory computer readable medium of claim 7, wherein the one or more efficiency functions comprises at least one of: latency, bandwidth, and number of router hops between each host in the NoC interconnect. 9. The non-transitory computer readable medium of claim 7, wherein the generating the NoC interconnect comprises connecting each of the plurality of hosts to an adjacent router based on the determined positions for the plurality of hosts. 10. The non-transitory computer readable medium of claim 7, wherein the instructions further comprise determining whether resulting positions of the plurality of hosts results in overlap and repositioning overlapped ones of the plurality of hosts. 11. The non-transitory computer readable medium of claim 10, wherein the repositioning overlapped ones of the plurality of hosts comprises:
determining whether resulting positions of the plurality of hosts results in overlap, and repositioning overlapped ones of the plurality of hosts by one of: repositioning overlapped ones to the position associated with the selected host, and selecting the overlapped ones for shifting in the selected direction. 12. The non-transitory computer readable medium of claim 7, wherein the determining positions for the plurality of hosts is based on connectivity requirements of the plurality of hosts. 13. A system, comprising:
a processor, configured to:
generate a floorplan for a chip comprising a plurality of hosts and a network on chip (NoC) interconnect configured to communicatively connect the plurality of hosts, the processor configured to generate the floorplan by determining positions for the plurality of hosts, wherein a first one of the plurality of hosts having a different physical footprint from a second one of the plurality of hosts, wherein the positions for the plurality of hosts are determined based on optimization of one or more efficiency functions; and
generate the NoC interconnect based on the positions for the plurality of hosts. 14. The system of claim 13, wherein the one or more efficiency functions comprises at least one of: latency, bandwidth, and number of router hops between each host in the NoC interconnect. 15. The system of claim 13, wherein the processor is configured to generate the NoC interconnect by connecting each of the plurality of hosts to an adjacent router based on the determined positions for the plurality of hosts. 16. The system of claim 13, wherein the processor is configured to determine whether resulting positions of the plurality of hosts results in overlap and reposition overlapped ones of the plurality of hosts. 17. The system of claim 13, wherein the processor is configured to reposition overlapped ones of the plurality of hosts by:
determining whether resulting positions of the plurality of hosts results in overlap, and repositioning overlapped ones of the plurality of hosts by one of: repositioning overlapped ones to the position associated with the selected host, and selecting the overlapped ones for shifting in the selected direction. 18. The system of claim 13, wherein the processor is configured to determine positions for the plurality of hosts based on connectivity requirements of the plurality of hosts. | Systems and methods described herein are directed to solutions for Network on Chip (NoC) interconnects that automatically and dynamically determines the position of hosts of various size and shape in a NoC topology based on the connectivity, bandwidth and latency requirements of the system traffic flows and certain performance optimization metrics such as system interconnect latency and interconnect cost. The example embodiments selects hosts for relocation consideration and determines a new possible position for them in the NoC based on the system traffic specification, shape and size of the hosts and by using probabilistic function to decide if the relocation is carried out or not. The procedure is repeated over new sets of hosts until certain optimization targets are satisfied or repetition count is exceeded.1. A method, comprising:
generating a floorplan for a chip comprising a plurality of hosts and a network on chip (NoC) interconnect configured to communicatively connect the plurality of hosts, the generating of the floorplan comprising determining, by a processor, positions for the plurality of hosts, a first one of the plurality of hosts having a different physical footprint from a second one of the plurality of hosts, wherein the positions for the plurality of hosts are determined based on optimization of one or more efficiency functions; and generating the NoC interconnect based on the positions for the plurality of hosts. 2. The method of claim 1, wherein the one or more efficiency functions comprises at least one of: latency, bandwidth, and number of router hops between each host in the NoC interconnect. 3. The method of claim 1, wherein the generating the NoC interconnect comprises connecting each of the plurality of hosts to an adjacent router based on the determined positions for the plurality of hosts. 4. The method of claim 1, further comprising determining whether resulting positions of the plurality of hosts results in overlap and repositioning overlapped ones of the plurality of hosts. 5. The method of claim 4, wherein the repositioning overlapped ones of the plurality of hosts comprises:
determining whether resulting positions of the plurality of hosts results in overlap, and repositioning overlapped ones of the plurality of hosts by one of: repositioning overlapped ones to the position associated with the selected host, and selecting the overlapped ones for shifting in the selected direction. 6. The method of claim 1, wherein the determining positions for the plurality of hosts is based on connectivity requirements of the plurality of hosts. 7. A non-transitory computer readable medium, storing instructions for executing a process, the instructions comprising:
generating a floorplan for a chip comprising a plurality of hosts and a network on chip (NoC) interconnect configured to communicatively connect the plurality of hosts, the generating of the floorplan comprising determining positions for the plurality of hosts, a first one of the plurality of hosts having a different physical footprint from a second one of the plurality of hosts, wherein the positions for the plurality of hosts are determined based on optimization of one or more efficiency functions; and generating the NoC interconnect based on the positions for the plurality of hosts. 8. The non-transitory computer readable medium of claim 7, wherein the one or more efficiency functions comprises at least one of: latency, bandwidth, and number of router hops between each host in the NoC interconnect. 9. The non-transitory computer readable medium of claim 7, wherein the generating the NoC interconnect comprises connecting each of the plurality of hosts to an adjacent router based on the determined positions for the plurality of hosts. 10. The non-transitory computer readable medium of claim 7, wherein the instructions further comprise determining whether resulting positions of the plurality of hosts results in overlap and repositioning overlapped ones of the plurality of hosts. 11. The non-transitory computer readable medium of claim 10, wherein the repositioning overlapped ones of the plurality of hosts comprises:
determining whether resulting positions of the plurality of hosts results in overlap, and repositioning overlapped ones of the plurality of hosts by one of: repositioning overlapped ones to the position associated with the selected host, and selecting the overlapped ones for shifting in the selected direction. 12. The non-transitory computer readable medium of claim 7, wherein the determining positions for the plurality of hosts is based on connectivity requirements of the plurality of hosts. 13. A system, comprising:
a processor, configured to:
generate a floorplan for a chip comprising a plurality of hosts and a network on chip (NoC) interconnect configured to communicatively connect the plurality of hosts, the processor configured to generate the floorplan by determining positions for the plurality of hosts, wherein a first one of the plurality of hosts having a different physical footprint from a second one of the plurality of hosts, wherein the positions for the plurality of hosts are determined based on optimization of one or more efficiency functions; and
generate the NoC interconnect based on the positions for the plurality of hosts. 14. The system of claim 13, wherein the one or more efficiency functions comprises at least one of: latency, bandwidth, and number of router hops between each host in the NoC interconnect. 15. The system of claim 13, wherein the processor is configured to generate the NoC interconnect by connecting each of the plurality of hosts to an adjacent router based on the determined positions for the plurality of hosts. 16. The system of claim 13, wherein the processor is configured to determine whether resulting positions of the plurality of hosts results in overlap and reposition overlapped ones of the plurality of hosts. 17. The system of claim 13, wherein the processor is configured to reposition overlapped ones of the plurality of hosts by:
determining whether resulting positions of the plurality of hosts results in overlap, and repositioning overlapped ones of the plurality of hosts by one of: repositioning overlapped ones to the position associated with the selected host, and selecting the overlapped ones for shifting in the selected direction. 18. The system of claim 13, wherein the processor is configured to determine positions for the plurality of hosts based on connectivity requirements of the plurality of hosts. | 2,400 |
7,152 | 7,152 | 14,968,178 | 2,436 | Systems and methods may provide for detecting a browser request for web content. Additionally, interaction information associated with a plurality of sources may be determined in response to the browser request, and a risk profile may be generated based on the interaction. The risk profile may include at least a portion of the interaction information as well as recommended control actions to mitigate the identified risk. In one example, the risk profile is presented to a user associated with the browser request as well as to a security control module associated with the platform. | 1. (canceled) 2. An apparatus comprising:
a browser interface to detect a browser request that is to be issued from a browser of a platform for remote web content, wherein the web content is to be presented on the platform in response to the browser request; a security module to:
determine interaction information including a web content call to a hardware component of the platform by the web content during one or more of a retrieval of the web content and a presentation of the web content on the platform; and
generate a risk profile based on the interaction information to document a risk associated with access by the web content to the hardware component of the platform. 3. The apparatus of claim 2, wherein the security module includes a sensor interface to determine interaction information including a web content call to a sensor by the web content, wherein the sensor includes one or more of a Wi-Fi sensor, a global positioning system (GPS) sensor, a cellular sensor, a near field communications (NFC) sensor, an audio sensor and a motion sensor. 4. The apparatus of claim 3, wherein the sensor interface is to determine interaction information including the web content call to the sensor by the web content when the sensor is to be accessed by the web content to determine a location of the platform. 5. The apparatus of claim 2, wherein the security module includes a hardware security reference to determine interaction information including a web content call by the web content to one or more of platform memory, a platform input output (IO) component, a platform processor, a platform runtime context interface and a platform user setting location, wherein the platform IO component includes one or more of a file system component, a networking component and a graphics component. 6. The apparatus of claim 2, wherein the security module includes:
a first data aggregator to obtain interaction information from one or more of a platform sensor, platform memory, a platform IO component, a platform processor, a platform runtime context interface and a platform user setting location; and a second data aggregator to obtain interaction information from one or more of a remote peer-to-peer (P2P) application, a remote social network, a remote cloud service and a remote enterprise database. 7. The apparatus of claim 2, further including a control interface to send the risk profile to a security control module in response to one or more of a control request from the security control module and a trigger condition associated with the risk profile. 8. The apparatus of claim 2, wherein the web content is to be written in one or more of a just in time (JIT) language and a runtime environment language that is to expose the hardware component, and wherein the runtime environment language is to include HyperText Markup Language 5 (HTML5). 9. The apparatus of claim 2, wherein the security module is to determine interaction information including an application programming interface function call to the hardware component by the web content. 10. At least one non-transitory computer readable storage medium comprising a set of instructions which, if executed by a processor, cause a computer to:
detect a browser request that is to be issued from a browser of a platform for remote web content, wherein the web content is to be presented on the platform in response to the browser request; determine interaction information including a web content call to a hardware component of the platform by the web content during one or more of a retrieval of the web content and a presentation of the web content on the platform; and generate a risk profile based on the interaction information to document a risk associated with access by the web content to the hardware component of the platform. 11. The at least one computer readable storage medium of claim 10, wherein the instructions, if executed, cause a computer to determine interaction information including a web content call to a sensor by the web content, wherein the sensor includes one or more of a Wi-Fi sensor, a global positioning system (GPS) sensor, a cellular sensor, a near field communications (NFC) sensor, an audio sensor and a motion sensor. 12. The at least one computer readable storage medium of claim 11, wherein the instructions, if executed, cause a computer to determine interaction information including the web content call to the sensor by the web content when the sensor is to be accessed by the web content to determine a location of the platform. 13. The at least one computer readable storage medium of claim 10, wherein the instructions, if executed, cause a computer to determine interaction information including a web content call by the web content to one or more of platform memory, a platform input output (IO) component, a platform processor, a platform runtime context interface and a platform user setting location, wherein the platform TO component includes one or more of a file system component, a networking component and a graphics component. 14. The at least one computer readable storage medium of claim 10, wherein the instructions, if executed, cause a computer to:
obtain interaction information from one or more of a platform sensor, platform memory, a platform IO component, a platform processor, a platform runtime context interface and a platform user setting location; and obtain interaction information from one or more of a remote peer-to-peer (P2P) application, a remote social network, a remote cloud service and a remote enterprise database. 15. The at least one computer readable storage medium of claim 10, wherein the instructions, if executed, cause a computer to send the risk profile to a security control module in response to one or more of a control request from the security control module and a trigger condition associated with the risk profile. 16. The at least one computer readable storage medium of claim 10, wherein the web content is to be written in one or more of a just in time (JIT) language and a runtime environment language that is to expose the hardware component, and wherein the runtime environment language is to include HyperText Markup Language 5 (HTML5). 17. The at least one computer readable storage medium of claim 10, wherein the instructions, if executed, cause a computer to determine interaction information including an application programming interface function call to the hardware component by the web content. 18. A method comprising:
detecting a browser request that is issued from a browser of a platform for remote web content, wherein the web content is presented on the platform in response to the browser request; determining interaction information including a web content call to a hardware component of the platform by the web content during one or more of a retrieval of the web content and a presentation of the web content on the platform; and generating a risk profile based on the interaction information to document a risk associated with access by the web content to the hardware component of the platform. 19. The method of claim 18, wherein determining the interaction information includes determining interaction information including a web content call to a sensor by the web content, wherein the sensor includes one or more of a Wi-Fi sensor, a global positioning system (GPS) sensor, a cellular sensor, a near field communications (NFC) sensor, an audio sensor and a motion sensor. 20. The method of claim 19, wherein determining the interaction information includes determining interaction information including the web content call to the sensor by the web content when the sensor is accessed by the web content to determine a location of the platform. 21. The method of claim 18, wherein the web content is written in one or more of a just in time (JIT) language and a runtime environment language that is to expose the hardware component, wherein the runtime environment language includes HyperText Markup Language 5 (HTML5), and wherein determining the interaction information includes determining interaction information including an application programming interface function call to the hardware component by the web content. | Systems and methods may provide for detecting a browser request for web content. Additionally, interaction information associated with a plurality of sources may be determined in response to the browser request, and a risk profile may be generated based on the interaction. The risk profile may include at least a portion of the interaction information as well as recommended control actions to mitigate the identified risk. In one example, the risk profile is presented to a user associated with the browser request as well as to a security control module associated with the platform.1. (canceled) 2. An apparatus comprising:
a browser interface to detect a browser request that is to be issued from a browser of a platform for remote web content, wherein the web content is to be presented on the platform in response to the browser request; a security module to:
determine interaction information including a web content call to a hardware component of the platform by the web content during one or more of a retrieval of the web content and a presentation of the web content on the platform; and
generate a risk profile based on the interaction information to document a risk associated with access by the web content to the hardware component of the platform. 3. The apparatus of claim 2, wherein the security module includes a sensor interface to determine interaction information including a web content call to a sensor by the web content, wherein the sensor includes one or more of a Wi-Fi sensor, a global positioning system (GPS) sensor, a cellular sensor, a near field communications (NFC) sensor, an audio sensor and a motion sensor. 4. The apparatus of claim 3, wherein the sensor interface is to determine interaction information including the web content call to the sensor by the web content when the sensor is to be accessed by the web content to determine a location of the platform. 5. The apparatus of claim 2, wherein the security module includes a hardware security reference to determine interaction information including a web content call by the web content to one or more of platform memory, a platform input output (IO) component, a platform processor, a platform runtime context interface and a platform user setting location, wherein the platform IO component includes one or more of a file system component, a networking component and a graphics component. 6. The apparatus of claim 2, wherein the security module includes:
a first data aggregator to obtain interaction information from one or more of a platform sensor, platform memory, a platform IO component, a platform processor, a platform runtime context interface and a platform user setting location; and a second data aggregator to obtain interaction information from one or more of a remote peer-to-peer (P2P) application, a remote social network, a remote cloud service and a remote enterprise database. 7. The apparatus of claim 2, further including a control interface to send the risk profile to a security control module in response to one or more of a control request from the security control module and a trigger condition associated with the risk profile. 8. The apparatus of claim 2, wherein the web content is to be written in one or more of a just in time (JIT) language and a runtime environment language that is to expose the hardware component, and wherein the runtime environment language is to include HyperText Markup Language 5 (HTML5). 9. The apparatus of claim 2, wherein the security module is to determine interaction information including an application programming interface function call to the hardware component by the web content. 10. At least one non-transitory computer readable storage medium comprising a set of instructions which, if executed by a processor, cause a computer to:
detect a browser request that is to be issued from a browser of a platform for remote web content, wherein the web content is to be presented on the platform in response to the browser request; determine interaction information including a web content call to a hardware component of the platform by the web content during one or more of a retrieval of the web content and a presentation of the web content on the platform; and generate a risk profile based on the interaction information to document a risk associated with access by the web content to the hardware component of the platform. 11. The at least one computer readable storage medium of claim 10, wherein the instructions, if executed, cause a computer to determine interaction information including a web content call to a sensor by the web content, wherein the sensor includes one or more of a Wi-Fi sensor, a global positioning system (GPS) sensor, a cellular sensor, a near field communications (NFC) sensor, an audio sensor and a motion sensor. 12. The at least one computer readable storage medium of claim 11, wherein the instructions, if executed, cause a computer to determine interaction information including the web content call to the sensor by the web content when the sensor is to be accessed by the web content to determine a location of the platform. 13. The at least one computer readable storage medium of claim 10, wherein the instructions, if executed, cause a computer to determine interaction information including a web content call by the web content to one or more of platform memory, a platform input output (IO) component, a platform processor, a platform runtime context interface and a platform user setting location, wherein the platform TO component includes one or more of a file system component, a networking component and a graphics component. 14. The at least one computer readable storage medium of claim 10, wherein the instructions, if executed, cause a computer to:
obtain interaction information from one or more of a platform sensor, platform memory, a platform IO component, a platform processor, a platform runtime context interface and a platform user setting location; and obtain interaction information from one or more of a remote peer-to-peer (P2P) application, a remote social network, a remote cloud service and a remote enterprise database. 15. The at least one computer readable storage medium of claim 10, wherein the instructions, if executed, cause a computer to send the risk profile to a security control module in response to one or more of a control request from the security control module and a trigger condition associated with the risk profile. 16. The at least one computer readable storage medium of claim 10, wherein the web content is to be written in one or more of a just in time (JIT) language and a runtime environment language that is to expose the hardware component, and wherein the runtime environment language is to include HyperText Markup Language 5 (HTML5). 17. The at least one computer readable storage medium of claim 10, wherein the instructions, if executed, cause a computer to determine interaction information including an application programming interface function call to the hardware component by the web content. 18. A method comprising:
detecting a browser request that is issued from a browser of a platform for remote web content, wherein the web content is presented on the platform in response to the browser request; determining interaction information including a web content call to a hardware component of the platform by the web content during one or more of a retrieval of the web content and a presentation of the web content on the platform; and generating a risk profile based on the interaction information to document a risk associated with access by the web content to the hardware component of the platform. 19. The method of claim 18, wherein determining the interaction information includes determining interaction information including a web content call to a sensor by the web content, wherein the sensor includes one or more of a Wi-Fi sensor, a global positioning system (GPS) sensor, a cellular sensor, a near field communications (NFC) sensor, an audio sensor and a motion sensor. 20. The method of claim 19, wherein determining the interaction information includes determining interaction information including the web content call to the sensor by the web content when the sensor is accessed by the web content to determine a location of the platform. 21. The method of claim 18, wherein the web content is written in one or more of a just in time (JIT) language and a runtime environment language that is to expose the hardware component, wherein the runtime environment language includes HyperText Markup Language 5 (HTML5), and wherein determining the interaction information includes determining interaction information including an application programming interface function call to the hardware component by the web content. | 2,400 |
7,153 | 7,153 | 15,186,490 | 2,439 | A method, system and apparatus for authenticating a communication request sent from a client computing device. The communication request is initially blocked by a firewall preventing delivery to a server. A first logging event corresponding to the communication request is created. The communication request and the logging event are stored in a firewall. The server is notified of the first logging event. The communication request corresponding to the first logging event is authenticated. A port in the firewall is enabled if the communication request is authenticated. | 1. A system for authenticating a communication request sent from a client computing device, the system comprising:
a firewall, the firewall comprising:
a processing unit operating to perform functions including:
initially block the communication request; and,
create a first logging event corresponding to the communication request; and
a storage unit, the storage unit storing the communication request and the logging event; and
a server in data communication with the firewall, the server having a processing unit, the processing unit operating to perform functions including:
receiving notification of the first logging event created by the firewall;
authenticating the communication request corresponding to the first logging event; and
enabling a port in the firewall if the communication request is authenticated. 2. The system according to claim 1, wherein the communication request is comprised of a plurality of addresses corresponding to the client and a hash of the plurality of addresses corresponding to the client. 3. The system according to claim 2, wherein the server central processing unit authenticates the communication request by performing functions including:
hashing the plurality of addresses corresponding to the client; and, matching the plurality of addresses hashed by the server with the hashed plurality of addresses in the communication request. 4. The system according to claim 3, wherein the server central processing unit further authenticates the communication request by transmitting a request to the client for a public key corresponding to the server if the plurality of addresses hashed by the server match with the hashed plurality of addresses in the communication request. 5. (canceled) 6. The system according to claim 5, wherein the plurality of addresses corresponding to the client include an Internet Protocol Address and a Media Access Control layer address. 7. A method for authenticating a communication request sent from a client computing device, the method comprising:
initially blocking the communication request from delivery to a server; creating a first logging event corresponding to the communication request; storing the communication request and the logging event in a firewall; notifying the server of the first logging event; authenticating the communication request corresponding to the first logging event; and enabling a port in the firewall if the communication request is authenticated. 8. The method according to claim 7, wherein the communication request is comprised of a plurality of addresses corresponding to the client and a first hashing of the plurality of addresses corresponding to the client. 9. The method according to claim 8, wherein authenticating the communication request includes:
performing a second hashing of the plurality of address corresponding to the client; and, matching the second hashing of plurality of addresses with the hashed plurality of addresses in the communication request. 10. The method according to claim 9, wherein authenticating the communication request further includes transmitting a request to the client for a public key corresponding to the server if the second hashed plurality of addresses match with the hashed plurality of addresses in the communication request. 11. (canceled) 12. The method according to claim 11, wherein the plurality of addresses corresponding to the client include an Internet Protocol Address and a Media Access Control layer address. 13. The method according to claim 10, wherein the first hashing and the second hashing further include positional coordinates corresponding to the client. 14. A machine readable storage device having stored thereon a computer program for authenticating a communication request sent from a client computing device, the computer program comprising a set of instructions which when executed by a machine causes the machine to perform a method including:
initially blocking the communication request from delivery to a server; creating a first logging event corresponding to the communication request; storing the communication request and the logging event; notifying the server of the first logging event; authenticating the communication request corresponding to the first logging event; and enabling a port in a firewall if the communication request is authenticated. 15. The machine readable storage device according to claim 14, wherein the communication request is comprised of a plurality of addresses corresponding to the client and a first hash of the plurality of addresses corresponding to the client. 16. The method according to claim 15, wherein authenticating the communication request includes:
performing a second hashing of the plurality of address corresponding to the client; and, matching the second hashing of plurality of addresses with the hashed plurality of addresses in the communication request. 17. The method according to claim 16, wherein authenticating the communication request further includes transmitting a request to the client for a public key corresponding to the server if the second hashed plurality of addresses match with the first hashed plurality of addresses in the communication request. 18. (canceled) 19. The method according to claim 18, wherein the plurality of addresses corresponding to the client include an Internet Protocol Address and a Media Access Control layer address. 20. The method according to claim 17, wherein the first hashing and the second hashing further include positional coordinates corresponding to the client. | A method, system and apparatus for authenticating a communication request sent from a client computing device. The communication request is initially blocked by a firewall preventing delivery to a server. A first logging event corresponding to the communication request is created. The communication request and the logging event are stored in a firewall. The server is notified of the first logging event. The communication request corresponding to the first logging event is authenticated. A port in the firewall is enabled if the communication request is authenticated.1. A system for authenticating a communication request sent from a client computing device, the system comprising:
a firewall, the firewall comprising:
a processing unit operating to perform functions including:
initially block the communication request; and,
create a first logging event corresponding to the communication request; and
a storage unit, the storage unit storing the communication request and the logging event; and
a server in data communication with the firewall, the server having a processing unit, the processing unit operating to perform functions including:
receiving notification of the first logging event created by the firewall;
authenticating the communication request corresponding to the first logging event; and
enabling a port in the firewall if the communication request is authenticated. 2. The system according to claim 1, wherein the communication request is comprised of a plurality of addresses corresponding to the client and a hash of the plurality of addresses corresponding to the client. 3. The system according to claim 2, wherein the server central processing unit authenticates the communication request by performing functions including:
hashing the plurality of addresses corresponding to the client; and, matching the plurality of addresses hashed by the server with the hashed plurality of addresses in the communication request. 4. The system according to claim 3, wherein the server central processing unit further authenticates the communication request by transmitting a request to the client for a public key corresponding to the server if the plurality of addresses hashed by the server match with the hashed plurality of addresses in the communication request. 5. (canceled) 6. The system according to claim 5, wherein the plurality of addresses corresponding to the client include an Internet Protocol Address and a Media Access Control layer address. 7. A method for authenticating a communication request sent from a client computing device, the method comprising:
initially blocking the communication request from delivery to a server; creating a first logging event corresponding to the communication request; storing the communication request and the logging event in a firewall; notifying the server of the first logging event; authenticating the communication request corresponding to the first logging event; and enabling a port in the firewall if the communication request is authenticated. 8. The method according to claim 7, wherein the communication request is comprised of a plurality of addresses corresponding to the client and a first hashing of the plurality of addresses corresponding to the client. 9. The method according to claim 8, wherein authenticating the communication request includes:
performing a second hashing of the plurality of address corresponding to the client; and, matching the second hashing of plurality of addresses with the hashed plurality of addresses in the communication request. 10. The method according to claim 9, wherein authenticating the communication request further includes transmitting a request to the client for a public key corresponding to the server if the second hashed plurality of addresses match with the hashed plurality of addresses in the communication request. 11. (canceled) 12. The method according to claim 11, wherein the plurality of addresses corresponding to the client include an Internet Protocol Address and a Media Access Control layer address. 13. The method according to claim 10, wherein the first hashing and the second hashing further include positional coordinates corresponding to the client. 14. A machine readable storage device having stored thereon a computer program for authenticating a communication request sent from a client computing device, the computer program comprising a set of instructions which when executed by a machine causes the machine to perform a method including:
initially blocking the communication request from delivery to a server; creating a first logging event corresponding to the communication request; storing the communication request and the logging event; notifying the server of the first logging event; authenticating the communication request corresponding to the first logging event; and enabling a port in a firewall if the communication request is authenticated. 15. The machine readable storage device according to claim 14, wherein the communication request is comprised of a plurality of addresses corresponding to the client and a first hash of the plurality of addresses corresponding to the client. 16. The method according to claim 15, wherein authenticating the communication request includes:
performing a second hashing of the plurality of address corresponding to the client; and, matching the second hashing of plurality of addresses with the hashed plurality of addresses in the communication request. 17. The method according to claim 16, wherein authenticating the communication request further includes transmitting a request to the client for a public key corresponding to the server if the second hashed plurality of addresses match with the first hashed plurality of addresses in the communication request. 18. (canceled) 19. The method according to claim 18, wherein the plurality of addresses corresponding to the client include an Internet Protocol Address and a Media Access Control layer address. 20. The method according to claim 17, wherein the first hashing and the second hashing further include positional coordinates corresponding to the client. | 2,400 |
7,154 | 7,154 | 12,910,726 | 2,443 | Described are embodiments directed to providing a preview feature in a report designer that allows modifications to report metadata to be made and previewed accurately. In embodiments, the feature allows a user to open a report to make changes to metadata of the report and have an accurate preview of how the report will look when published on a report publishing server. Embodiments provide for a report publishing server to allocate an in memory location that stores modified metadata of a report. The in memory location allows relative paths and references to sub-reports or data sources in the original report to be accurately reflected in a preview on the client. | 1. A computer implemented method of previewing reports in a reporting service application, the method comprising:
receiving at the client a selection to edit metadata of a report published in a server environment on a report publishing server; in response to receiving the selection to edit metadata, sending a request to the report publishing server to create a memory location to store modified metadata of the report, wherein the memory location provides characteristics of the server environment that allows modified metadata to be tested; receiving at the client edits to the metadata of the report to create the modified metadata; in response to receiving the edits to the metadata, sending the modified metadata to the report publishing server for storing in the memory location; displaying at the client a preview of a version of the report created using the modified metadata stored in the memory location. 2. The method of claim 1, wherein the modified metadata in the memory location does not interfere with a second client accessing the report. 3. The method of claim 1, wherein the sending the request comprises sending a request to establish an edit session. 4. The method of claim 1, further comprising prior to the receiving at the client a selection to edit the metadata of the report;
receiving at the client a selection to publish the report; sending a first request to the report publishing server to publish the report in the server environment. 5. The method of claim 1, further comprising receiving at the client a selection to test connection data used to connect to a data source referred to in the report, wherein at least a portion of the metadata includes the connection data. 6. The method of claim 5, in response to the receiving the selection to test connection data, sending a request to the report publishing server to test the connection data used to connect to the data source. 7. The method of claim 6, wherein the request includes credentials for connecting to the data source. 8. The method of claim 6, wherein the request includes a reference to data source connection information. 9. A computer implemented method of providing preview data for reports published from a reporting service application, the method comprising:
receiving a request at a report publishing server to create a memory location to store modified metadata of a report, wherein the report is published in a server environment on the report publishing server, and wherein the memory location provides characteristics of the server environment that allows modified metadata of the report to be tested; and receiving at the report publishing server the modified metadata from a client; and storing the modified metadata in the memory location. 10. The method of claim 9, wherein the modified metadata in the memory location does not interfere with a second client accessing the report. 11. The method of claim 9, wherein the receiving the request comprises receiving a request to establish an edit session. 12. The method of claim 9, further comprising prior to the receiving the request:
receiving a first request at the report publishing server to publish the report in the server environment. 13. The method of claim 9, receiving a request at the report publishing server to test connection data used to connect to a data source referred to in the report, wherein at least a portion of the metadata includes the connection data. 14. The method of claim 9, testing the connection data by sending a request to connect to the data source. 15. The method of claim 9, further comprising, executing the report with the modified metadata to generate preview information. 16. The method of claim 9, further comprising, sending the preview information to the client. 17. A computer readable storage medium storing computer executable instructions that when executed perform a method of testing connection data referenced in a report, the method comprising:
receiving a request from a client at a report publishing server, wherein the request provides data source information; attempting to establish a connection with the data source; and sending an indication to the client regarding whether a connection to the data source was established. 18. The computer readable storage medium of claim 17, wherein the request from the client includes credentials for establishing a connection with the data source. 19. The computer readable storage medium of claim 19, wherein the attempting comprises using the credentials. 20. The computer readable storage medium of claim 17, wherein the attempting comprises using credentials stored at the publishing server. | Described are embodiments directed to providing a preview feature in a report designer that allows modifications to report metadata to be made and previewed accurately. In embodiments, the feature allows a user to open a report to make changes to metadata of the report and have an accurate preview of how the report will look when published on a report publishing server. Embodiments provide for a report publishing server to allocate an in memory location that stores modified metadata of a report. The in memory location allows relative paths and references to sub-reports or data sources in the original report to be accurately reflected in a preview on the client.1. A computer implemented method of previewing reports in a reporting service application, the method comprising:
receiving at the client a selection to edit metadata of a report published in a server environment on a report publishing server; in response to receiving the selection to edit metadata, sending a request to the report publishing server to create a memory location to store modified metadata of the report, wherein the memory location provides characteristics of the server environment that allows modified metadata to be tested; receiving at the client edits to the metadata of the report to create the modified metadata; in response to receiving the edits to the metadata, sending the modified metadata to the report publishing server for storing in the memory location; displaying at the client a preview of a version of the report created using the modified metadata stored in the memory location. 2. The method of claim 1, wherein the modified metadata in the memory location does not interfere with a second client accessing the report. 3. The method of claim 1, wherein the sending the request comprises sending a request to establish an edit session. 4. The method of claim 1, further comprising prior to the receiving at the client a selection to edit the metadata of the report;
receiving at the client a selection to publish the report; sending a first request to the report publishing server to publish the report in the server environment. 5. The method of claim 1, further comprising receiving at the client a selection to test connection data used to connect to a data source referred to in the report, wherein at least a portion of the metadata includes the connection data. 6. The method of claim 5, in response to the receiving the selection to test connection data, sending a request to the report publishing server to test the connection data used to connect to the data source. 7. The method of claim 6, wherein the request includes credentials for connecting to the data source. 8. The method of claim 6, wherein the request includes a reference to data source connection information. 9. A computer implemented method of providing preview data for reports published from a reporting service application, the method comprising:
receiving a request at a report publishing server to create a memory location to store modified metadata of a report, wherein the report is published in a server environment on the report publishing server, and wherein the memory location provides characteristics of the server environment that allows modified metadata of the report to be tested; and receiving at the report publishing server the modified metadata from a client; and storing the modified metadata in the memory location. 10. The method of claim 9, wherein the modified metadata in the memory location does not interfere with a second client accessing the report. 11. The method of claim 9, wherein the receiving the request comprises receiving a request to establish an edit session. 12. The method of claim 9, further comprising prior to the receiving the request:
receiving a first request at the report publishing server to publish the report in the server environment. 13. The method of claim 9, receiving a request at the report publishing server to test connection data used to connect to a data source referred to in the report, wherein at least a portion of the metadata includes the connection data. 14. The method of claim 9, testing the connection data by sending a request to connect to the data source. 15. The method of claim 9, further comprising, executing the report with the modified metadata to generate preview information. 16. The method of claim 9, further comprising, sending the preview information to the client. 17. A computer readable storage medium storing computer executable instructions that when executed perform a method of testing connection data referenced in a report, the method comprising:
receiving a request from a client at a report publishing server, wherein the request provides data source information; attempting to establish a connection with the data source; and sending an indication to the client regarding whether a connection to the data source was established. 18. The computer readable storage medium of claim 17, wherein the request from the client includes credentials for establishing a connection with the data source. 19. The computer readable storage medium of claim 19, wherein the attempting comprises using the credentials. 20. The computer readable storage medium of claim 17, wherein the attempting comprises using credentials stored at the publishing server. | 2,400 |
7,155 | 7,155 | 12,717,638 | 2,462 | An apparatus for bridging a barrier to wireless communication between wireless field device networks includes a pair of locally-powered wireless devices connected by a wired link spanning the barrier. At least one of the locally-powered wireless devices is in wireless communication with each of the wireless networks intended to be interconnected. The wireless devices include a wireless transceiver and an antenna. Messages from one wireless field device network addressed to a member node of another wireless field device network are received by a wireless device on one side of the barrier and transmitted via the wired link to another wireless device on the other side of the barrier for routing to the member node of the other wireless field device network. | 1. An apparatus for bridging a barrier to wireless communication between a first wireless field device network and a second wireless field device network, the apparatus comprising:
a first locally-powered wireless device in wireless communication with the first wireless field device network, the first wireless device comprising:
a first data router;
a first local power source;
a first transceiver; and
a first antenna;
a second wireless device in wireless communication with the second wireless field device network, the second wireless device comprising:
a second transceiver; and
a second antenna; and
a wired link connecting the first wireless device to the second wireless device, wherein the wired link spans the barrier to wireless communication between the first wireless field device network and the second wireless field device network; wherein messages from the first wireless field device network addressed to a member node of the second wireless field device network, received by the first wireless device and transmitted into the second wireless field device network by the second wireless device for routing to the member node of the second wireless network, cross the barrier to wireless communication via the wired link; and wherein the second wireless device is powered by the first power source through the wired link or by a second local power source associated with the second wireless device. 2. The apparatus of claim 1, wherein the first wireless device formats wireless communications received from the first wireless field device network into a communications protocol for transmission over the wired link that is compatible with the second wireless field device network, and wherein the first wireless device formats communications received over the wired link from the second wireless field device network into a communications protocol compatible with wireless transmission into the first wireless field device network 3. The apparatus of claim 1, wherein the first wireless device further comprises a first field device. 4. The apparatus of claim 3, further comprising a second field device, wherein the second field device is electrically connected to and can communicate with the first wireless device, and wherein the second field device is physically separated from the first wireless device. 5. The apparatus of claim 1, further comprising a first field device, wherein the first field device is electrically connected to and can communicate with the first wireless device, and wherein the first field device is physically separated from the first wireless device. 6. The apparatus of claim 1, wherein the second wireless device further comprises a second data router. 7. The apparatus of claim 6, wherein the first wireless device formats wireless communications received from the first wireless field device network into a communications protocol for transmission over the wired link that is compatible with the second wireless field device network, and wherein the first wireless device formats communications received over the wired link from the second wireless field device network into a communications protocol compatible with wireless transmission into the first wireless field device network. 8. The apparatus of claim 6, further comprising a first field device, wherein the first field device is electrically connected to and can communicate with the first wireless device, and wherein the first field device is physically separated from the first wireless device. 9. The apparatus of claim 8, further comprising a second field device, wherein the second field device is electrically connected to and can communicate with the second wireless device, and wherein the second field device is physically separated from the second wireless device. 10. The apparatus of claim 6, wherein the first wireless device further comprises a first field device. 11. The apparatus of claim 10, wherein the first wireless device formats wireless communications received from the first wireless field device network into a communications protocol for transmission over the wired link that is compatible with the second wireless field device network, and wherein the first wireless device formats communications received over the wired link from the second wireless field device network into a communications protocol compatible with wireless transmission into the first wireless field device network. 12. The apparatus of claim 10, wherein the wired link connects the second data router to one of the first data router and the first field device. 13. The apparatus of claim 10, further comprising a second field device, wherein the second field device is electrically connected to and can communicate with the first wireless device, and wherein the second field device is physically separated from the first wireless device. 14. The apparatus of claim 13, wherein the wired link connects the second data router to one of the first data router and the first field device. 15. The apparatus of claim 10, further comprising a second field device, wherein the second field device is electrically connected to and can communicate with the second wireless device, and wherein the second field device is physically separated from the second wireless device. 16. The apparatus of claim 15, wherein the wired link connects the second data router to one of the first data router and the first field device. 17. The apparatus of claim 15, further comprising a third field device, wherein the third field device is electrically connected to and can communicate with the first wireless device, and wherein the third field device is physically separated from the first wireless device. 18. The apparatus of claim 17, wherein the wired link connects the second data router to one of the first data router and the first field device. 19. The apparatus of claim 10, wherein the second wireless device further comprises a second field device. 20. The apparatus of claim 19, wherein the first wireless device formats wireless communications received from the first wireless field device network into a communications protocol for transmission over the wired link that is compatible with the second wireless field device network, and wherein the first wireless device formats communications received over the wired link from the second wireless field device network into a communications protocol compatible with wireless transmission into the first wireless field device network. 21. The apparatus of claim 19, wherein the wired link connects the second data router to one of the first data router and the first field device. 22. The apparatus of claim 19, wherein the wired link connects the first field device to the second field device. 23. The apparatus of claim 19, further comprising a third field device, wherein the third field device is electrically connected to and can communicate with the first wireless device, and wherein the third field device is physically separated from the first wireless device. 24. The apparatus of claim 23, wherein the wired link connects the first data router to one of the second data router and the second field device. 25. The apparatus of claim 23, wherein the wired link connects the first field device to one of the second data router and the second field device. 26. The apparatus of claim 23, further comprising a fourth field device, wherein the fourth field device is electrically connected to and can communicate with the second wireless device, and wherein the fourth field device is physically separated from the second wireless device. 27. The apparatus of claim 26, wherein the wired link connects the second data router to one of the first data router and the first field device. 28. The apparatus of claim 26, wherein the wired link connects the first field device to the second field device. 29. A system for bridging barriers to wireless communication between a plurality of wireless field device networks, each network comprising a plurality of wireless devices, the system comprising:
a wired link, wherein the wired link is a locally-powered wired data link spanning the barriers to wireless communication between the plurality of wireless field device networks; and at least one locally-powered wireless device from each network connected to the wired data link in multi-drop, multi-point fashion to provide intercommunication between wireless devices of its network and wireless devices of other networks making up the plurality of wireless networks through the wired data link, wherein each connected wireless device comprises:
a data router;
a local power source;
a transceiver; and
an antenna. 30. The system of claim 29, wherein at least one of the locally-powered wireless devices connected to the wired data link further comprises a field device. 31. The system of claim 30, wherein the wired data link connects to one of the field device and the data router of each of the locally-powered wireless devices connected to the wired data link. 32. The system of claim 29 wherein each of the locally-powered wireless devices connected to the wired data link formats received wireless communications into a communications protocol for transmission over the wired data link, and wherein each of the locally-powered wireless devices connected to the wired data link formats communications received over the wired link into a communications protocol compatible with wireless transmission into the one of the plurality of field device networks with which it is in wireless communication. 33. The system of claim 29, further comprising a plurality of field devices, wherein the wired data link connects the plurality of field devices in multi-drop, multi-point fashion. 34. A system for bridging barriers to wireless communication between a plurality of wireless field device networks, each network comprising a plurality of wireless devices, the system comprising:
a wired link, wherein the wired link is a locally-powered wired data link spanning the barriers to wireless communication between the plurality of wireless field device networks; and at least one locally-powered wireless device from each network connected to the wired data link in multi-drop, multi-point fashion to provide intercommunication between wireless devices of its network and wireless devices of other networks making up the plurality of wireless networks through the wired data link, wherein each connected wireless device comprises:
a data router;
a transceiver; and
an antenna;
wherein at least one of the locally-powered wireless devices further comprises a local power source; wherein the local power source powers the wired data link. 35. The system of claim 34, wherein at least one of the locally-powered wireless devices connected to the wired data link further comprises a field device. 36. The system of claim 35, wherein the wired data link connects to one of the field device and the data router of each of the locally-powered wireless devices connected to the wired data link. 37. The system of claim 34, wherein each of the locally-powered wireless devices connected to the wired data link formats received wireless communications into a communications protocol for transmission over the wired data link, and wherein each of the locally-powered wireless devices connected to the wired data link formats communications received over the wired link into a communications protocol compatible with wireless transmission into the one of the plurality of field device networks with which it is in wireless communication. 38. The system of claim 34, further comprising a plurality of field devices, wherein the wired data link connects the plurality of field devices in multi-drop, multi-point fashion. 39. A method for bridging a barrier to wireless communication between a first wireless field device network and a second wireless field device network, the method comprising:
receiving a message from the first wireless field device network addressed to a final destination node of the second wireless field device network at a first locally-powered wireless device in wireless communication with the first wireless device network; transmitting the message through the barrier to wireless network communication using a wired link connected to the first wireless device; receiving the message from the wired link at a second locally-powered wireless device connected to the wired link and in wireless communication with the second wireless field device network; retransmitting the message into the second wireless field device network using the second wireless device; and routing the message in a hop by hop fashion through the nodes of the second wireless network to the final destination node of the second wireless field device network. 40. The method of claim 39, wherein the method further comprises:
employing an encapsulation protocol to format the message received from the first wireless field device network prior to transmitting the message through the barrier to wireless network communication; and employing the encapsulation protocol to unpack the message received from the wired link prior to transmitting the message into the second wireless field device network. 41. The method of claim 39, wherein the method further comprises:
translating the format of the message received from the first wireless field device network into a communications protocol compatible with the second wireless field device network; employing an encapsulation protocol to reformat the message translated into the communications protocol prior to transmitting the message through the barrier to wireless network communication; and employing the encapsulation protocol to unpack the message received from the wired link prior to transmitting the message into the second wireless field device network. 42. The method of claim 39, wherein the method further comprises:
employing an encapsulation protocol to format the message received from the first wireless field device network prior to transmitting the message through the barrier to wireless network communication; employing the encapsulation protocol to unpack the message received from the wired link prior to translating the format of the message into a communications protocol compatible with the second wireless field device network; and translating the format of the message into the communications protocol prior to transmitting the message into the second wireless field device network. 43. The method of claim 39, wherein the method further comprises:
translating the format of the message received from the first wireless field device network into a communications protocol prior to transmitting the message through the barrier to wireless network communication; translating the format of the message received from the wired link from the communications protocol back to the format of the message as received at the first locally-powered wireless field device prior to transmitting the message into the second wireless field device network, wherein the communications protocol is compatible with transmission over the wired link. 44. The method of claim 39, wherein the method further comprises:
translating the format of the message received from the first wireless field device network into a first communications protocol compatible with the second wireless field device network prior to retranslating the message into a second communications protocol; retranslating the format of the message translated into the first communications protocol into the second communications protocol prior to transmitting the message through the barrier to wireless network communication; translating the format of the message received from the wired link from the second communications protocol into the first communications protocol prior to transmitting the message into the second wireless field device network, wherein the second communications protocol is compatible with transmission over the wired link. 45. The method of claim 39, wherein the method further comprises:
translating the format of the message received from the first wireless field device network into a first communications protocol prior to transmitting the message through the barrier to wireless network communication; translating the format of the message received from the wired link from the first communications protocol back to the format of the message as received at the first locally-powered wireless field device prior to retranslating the format of the message into a second communications protocol compatible with the second wireless field device network, wherein the first communications protocol is compatible with transmission over the wired link; retranslating the format of the message into the second communications protocol prior to transmitting the message into the second wireless field device network. 46. A system comprising:
a first wireless field device network; a second wireless field device network; a first locally-powered wireless device in wireless communication with the first wireless field device network; a second locally-powered wireless device in wireless communication with the second wireless field device network; and a wired link connecting the first wireless device to the second wireless device, wherein the wired link spans a barrier to wireless communication between the first wireless field device network and the second wireless field device network; wherein messages from the first wireless field device network addressed to a member node of the second wireless field device network, received by the first wireless device and transmitted into the second wireless field device network by the second wireless device for routing to the member node of the second wireless network, cross the barrier to wireless communication via the wired link. 47. An apparatus for bridging a barrier to wireless communication between a first wireless field device network and a second wireless field device network, the apparatus comprising:
a locally-powered wireless device comprising:
a data router;
a local power source;
a first transceiver;
a first antenna; and
a second transceiver;
a second antenna; and a wired link; wherein the first antenna is in wireless communication with first wireless field device network; the second antenna is in wireless communication with the second wireless field device network; and the wired link is an RF cable connecting the second antenna to the second transceiver, wherein the wired link spans the barrier to wireless communication between the first wireless field device network and the second wireless field device network; wherein messages from the first wireless field device network addressed to a member node of the second wireless field device network, received by the first antenna and transmitted into the second wireless field device network by the second antenna for routing to the member node of the second wireless network, cross the barrier to wireless communication via the wired link. 48. The apparatus of claim 47, wherein the wireless device further comprises a field device. | An apparatus for bridging a barrier to wireless communication between wireless field device networks includes a pair of locally-powered wireless devices connected by a wired link spanning the barrier. At least one of the locally-powered wireless devices is in wireless communication with each of the wireless networks intended to be interconnected. The wireless devices include a wireless transceiver and an antenna. Messages from one wireless field device network addressed to a member node of another wireless field device network are received by a wireless device on one side of the barrier and transmitted via the wired link to another wireless device on the other side of the barrier for routing to the member node of the other wireless field device network.1. An apparatus for bridging a barrier to wireless communication between a first wireless field device network and a second wireless field device network, the apparatus comprising:
a first locally-powered wireless device in wireless communication with the first wireless field device network, the first wireless device comprising:
a first data router;
a first local power source;
a first transceiver; and
a first antenna;
a second wireless device in wireless communication with the second wireless field device network, the second wireless device comprising:
a second transceiver; and
a second antenna; and
a wired link connecting the first wireless device to the second wireless device, wherein the wired link spans the barrier to wireless communication between the first wireless field device network and the second wireless field device network; wherein messages from the first wireless field device network addressed to a member node of the second wireless field device network, received by the first wireless device and transmitted into the second wireless field device network by the second wireless device for routing to the member node of the second wireless network, cross the barrier to wireless communication via the wired link; and wherein the second wireless device is powered by the first power source through the wired link or by a second local power source associated with the second wireless device. 2. The apparatus of claim 1, wherein the first wireless device formats wireless communications received from the first wireless field device network into a communications protocol for transmission over the wired link that is compatible with the second wireless field device network, and wherein the first wireless device formats communications received over the wired link from the second wireless field device network into a communications protocol compatible with wireless transmission into the first wireless field device network 3. The apparatus of claim 1, wherein the first wireless device further comprises a first field device. 4. The apparatus of claim 3, further comprising a second field device, wherein the second field device is electrically connected to and can communicate with the first wireless device, and wherein the second field device is physically separated from the first wireless device. 5. The apparatus of claim 1, further comprising a first field device, wherein the first field device is electrically connected to and can communicate with the first wireless device, and wherein the first field device is physically separated from the first wireless device. 6. The apparatus of claim 1, wherein the second wireless device further comprises a second data router. 7. The apparatus of claim 6, wherein the first wireless device formats wireless communications received from the first wireless field device network into a communications protocol for transmission over the wired link that is compatible with the second wireless field device network, and wherein the first wireless device formats communications received over the wired link from the second wireless field device network into a communications protocol compatible with wireless transmission into the first wireless field device network. 8. The apparatus of claim 6, further comprising a first field device, wherein the first field device is electrically connected to and can communicate with the first wireless device, and wherein the first field device is physically separated from the first wireless device. 9. The apparatus of claim 8, further comprising a second field device, wherein the second field device is electrically connected to and can communicate with the second wireless device, and wherein the second field device is physically separated from the second wireless device. 10. The apparatus of claim 6, wherein the first wireless device further comprises a first field device. 11. The apparatus of claim 10, wherein the first wireless device formats wireless communications received from the first wireless field device network into a communications protocol for transmission over the wired link that is compatible with the second wireless field device network, and wherein the first wireless device formats communications received over the wired link from the second wireless field device network into a communications protocol compatible with wireless transmission into the first wireless field device network. 12. The apparatus of claim 10, wherein the wired link connects the second data router to one of the first data router and the first field device. 13. The apparatus of claim 10, further comprising a second field device, wherein the second field device is electrically connected to and can communicate with the first wireless device, and wherein the second field device is physically separated from the first wireless device. 14. The apparatus of claim 13, wherein the wired link connects the second data router to one of the first data router and the first field device. 15. The apparatus of claim 10, further comprising a second field device, wherein the second field device is electrically connected to and can communicate with the second wireless device, and wherein the second field device is physically separated from the second wireless device. 16. The apparatus of claim 15, wherein the wired link connects the second data router to one of the first data router and the first field device. 17. The apparatus of claim 15, further comprising a third field device, wherein the third field device is electrically connected to and can communicate with the first wireless device, and wherein the third field device is physically separated from the first wireless device. 18. The apparatus of claim 17, wherein the wired link connects the second data router to one of the first data router and the first field device. 19. The apparatus of claim 10, wherein the second wireless device further comprises a second field device. 20. The apparatus of claim 19, wherein the first wireless device formats wireless communications received from the first wireless field device network into a communications protocol for transmission over the wired link that is compatible with the second wireless field device network, and wherein the first wireless device formats communications received over the wired link from the second wireless field device network into a communications protocol compatible with wireless transmission into the first wireless field device network. 21. The apparatus of claim 19, wherein the wired link connects the second data router to one of the first data router and the first field device. 22. The apparatus of claim 19, wherein the wired link connects the first field device to the second field device. 23. The apparatus of claim 19, further comprising a third field device, wherein the third field device is electrically connected to and can communicate with the first wireless device, and wherein the third field device is physically separated from the first wireless device. 24. The apparatus of claim 23, wherein the wired link connects the first data router to one of the second data router and the second field device. 25. The apparatus of claim 23, wherein the wired link connects the first field device to one of the second data router and the second field device. 26. The apparatus of claim 23, further comprising a fourth field device, wherein the fourth field device is electrically connected to and can communicate with the second wireless device, and wherein the fourth field device is physically separated from the second wireless device. 27. The apparatus of claim 26, wherein the wired link connects the second data router to one of the first data router and the first field device. 28. The apparatus of claim 26, wherein the wired link connects the first field device to the second field device. 29. A system for bridging barriers to wireless communication between a plurality of wireless field device networks, each network comprising a plurality of wireless devices, the system comprising:
a wired link, wherein the wired link is a locally-powered wired data link spanning the barriers to wireless communication between the plurality of wireless field device networks; and at least one locally-powered wireless device from each network connected to the wired data link in multi-drop, multi-point fashion to provide intercommunication between wireless devices of its network and wireless devices of other networks making up the plurality of wireless networks through the wired data link, wherein each connected wireless device comprises:
a data router;
a local power source;
a transceiver; and
an antenna. 30. The system of claim 29, wherein at least one of the locally-powered wireless devices connected to the wired data link further comprises a field device. 31. The system of claim 30, wherein the wired data link connects to one of the field device and the data router of each of the locally-powered wireless devices connected to the wired data link. 32. The system of claim 29 wherein each of the locally-powered wireless devices connected to the wired data link formats received wireless communications into a communications protocol for transmission over the wired data link, and wherein each of the locally-powered wireless devices connected to the wired data link formats communications received over the wired link into a communications protocol compatible with wireless transmission into the one of the plurality of field device networks with which it is in wireless communication. 33. The system of claim 29, further comprising a plurality of field devices, wherein the wired data link connects the plurality of field devices in multi-drop, multi-point fashion. 34. A system for bridging barriers to wireless communication between a plurality of wireless field device networks, each network comprising a plurality of wireless devices, the system comprising:
a wired link, wherein the wired link is a locally-powered wired data link spanning the barriers to wireless communication between the plurality of wireless field device networks; and at least one locally-powered wireless device from each network connected to the wired data link in multi-drop, multi-point fashion to provide intercommunication between wireless devices of its network and wireless devices of other networks making up the plurality of wireless networks through the wired data link, wherein each connected wireless device comprises:
a data router;
a transceiver; and
an antenna;
wherein at least one of the locally-powered wireless devices further comprises a local power source; wherein the local power source powers the wired data link. 35. The system of claim 34, wherein at least one of the locally-powered wireless devices connected to the wired data link further comprises a field device. 36. The system of claim 35, wherein the wired data link connects to one of the field device and the data router of each of the locally-powered wireless devices connected to the wired data link. 37. The system of claim 34, wherein each of the locally-powered wireless devices connected to the wired data link formats received wireless communications into a communications protocol for transmission over the wired data link, and wherein each of the locally-powered wireless devices connected to the wired data link formats communications received over the wired link into a communications protocol compatible with wireless transmission into the one of the plurality of field device networks with which it is in wireless communication. 38. The system of claim 34, further comprising a plurality of field devices, wherein the wired data link connects the plurality of field devices in multi-drop, multi-point fashion. 39. A method for bridging a barrier to wireless communication between a first wireless field device network and a second wireless field device network, the method comprising:
receiving a message from the first wireless field device network addressed to a final destination node of the second wireless field device network at a first locally-powered wireless device in wireless communication with the first wireless device network; transmitting the message through the barrier to wireless network communication using a wired link connected to the first wireless device; receiving the message from the wired link at a second locally-powered wireless device connected to the wired link and in wireless communication with the second wireless field device network; retransmitting the message into the second wireless field device network using the second wireless device; and routing the message in a hop by hop fashion through the nodes of the second wireless network to the final destination node of the second wireless field device network. 40. The method of claim 39, wherein the method further comprises:
employing an encapsulation protocol to format the message received from the first wireless field device network prior to transmitting the message through the barrier to wireless network communication; and employing the encapsulation protocol to unpack the message received from the wired link prior to transmitting the message into the second wireless field device network. 41. The method of claim 39, wherein the method further comprises:
translating the format of the message received from the first wireless field device network into a communications protocol compatible with the second wireless field device network; employing an encapsulation protocol to reformat the message translated into the communications protocol prior to transmitting the message through the barrier to wireless network communication; and employing the encapsulation protocol to unpack the message received from the wired link prior to transmitting the message into the second wireless field device network. 42. The method of claim 39, wherein the method further comprises:
employing an encapsulation protocol to format the message received from the first wireless field device network prior to transmitting the message through the barrier to wireless network communication; employing the encapsulation protocol to unpack the message received from the wired link prior to translating the format of the message into a communications protocol compatible with the second wireless field device network; and translating the format of the message into the communications protocol prior to transmitting the message into the second wireless field device network. 43. The method of claim 39, wherein the method further comprises:
translating the format of the message received from the first wireless field device network into a communications protocol prior to transmitting the message through the barrier to wireless network communication; translating the format of the message received from the wired link from the communications protocol back to the format of the message as received at the first locally-powered wireless field device prior to transmitting the message into the second wireless field device network, wherein the communications protocol is compatible with transmission over the wired link. 44. The method of claim 39, wherein the method further comprises:
translating the format of the message received from the first wireless field device network into a first communications protocol compatible with the second wireless field device network prior to retranslating the message into a second communications protocol; retranslating the format of the message translated into the first communications protocol into the second communications protocol prior to transmitting the message through the barrier to wireless network communication; translating the format of the message received from the wired link from the second communications protocol into the first communications protocol prior to transmitting the message into the second wireless field device network, wherein the second communications protocol is compatible with transmission over the wired link. 45. The method of claim 39, wherein the method further comprises:
translating the format of the message received from the first wireless field device network into a first communications protocol prior to transmitting the message through the barrier to wireless network communication; translating the format of the message received from the wired link from the first communications protocol back to the format of the message as received at the first locally-powered wireless field device prior to retranslating the format of the message into a second communications protocol compatible with the second wireless field device network, wherein the first communications protocol is compatible with transmission over the wired link; retranslating the format of the message into the second communications protocol prior to transmitting the message into the second wireless field device network. 46. A system comprising:
a first wireless field device network; a second wireless field device network; a first locally-powered wireless device in wireless communication with the first wireless field device network; a second locally-powered wireless device in wireless communication with the second wireless field device network; and a wired link connecting the first wireless device to the second wireless device, wherein the wired link spans a barrier to wireless communication between the first wireless field device network and the second wireless field device network; wherein messages from the first wireless field device network addressed to a member node of the second wireless field device network, received by the first wireless device and transmitted into the second wireless field device network by the second wireless device for routing to the member node of the second wireless network, cross the barrier to wireless communication via the wired link. 47. An apparatus for bridging a barrier to wireless communication between a first wireless field device network and a second wireless field device network, the apparatus comprising:
a locally-powered wireless device comprising:
a data router;
a local power source;
a first transceiver;
a first antenna; and
a second transceiver;
a second antenna; and a wired link; wherein the first antenna is in wireless communication with first wireless field device network; the second antenna is in wireless communication with the second wireless field device network; and the wired link is an RF cable connecting the second antenna to the second transceiver, wherein the wired link spans the barrier to wireless communication between the first wireless field device network and the second wireless field device network; wherein messages from the first wireless field device network addressed to a member node of the second wireless field device network, received by the first antenna and transmitted into the second wireless field device network by the second antenna for routing to the member node of the second wireless network, cross the barrier to wireless communication via the wired link. 48. The apparatus of claim 47, wherein the wireless device further comprises a field device. | 2,400 |
7,156 | 7,156 | 14,007,191 | 2,461 | A mobile communications network for communicating broadcast data to a plurality of mobile communications devices by transmitting the broadcast data via a wireless access interface, the mobile communications network including a plurality of base stations disposed throughout the network and arranged in operation to transmit signals to mobile communications devices attached to the base stations, and one or more relay nodes. One of the relay nodes is arranged in operation to receive a first signal representing the broadcast data transmitted by one or more of the base stations and to retransmit the broadcast data as a second signal, the first signal being broadcast for reception by a first mobile communications device and the relay node and the second signal being broadcast for reception by a second mobile communications device. The first signal is transmitted on a first channel of the wireless access interface, and the second signal is transmitted in a second channel of the wireless access interface,and one or more of the base stations is arranged to communicate data to a third mobile communications device in the second channel contemporaneously with the transmission of the broadcast data on the second channel by the relay node. Accordingly a relay node layer can be provided to a mobile radio network which improves an efficiency of use of the available communications resources. | 1. A mobile communications network for communicating broadcast data to a plurality of mobile communications devices by transmitting the broadcast data via a wireless access interface, the mobile communications network including
a plurality of base stations disposed throughout the network and arranged in operation to transmit signals to mobile communications devices attached to the base stations, and a relay node arranged in operation to receive a first signal representing the broadcast data transmitted by one or more of the base stations and to retransmit the broadcast data as a second signal, the first signal being broadcast for reception by a first mobile communications device and the relay node and the second signal being broadcast for reception by a second mobile communications device, wherein the first signal is transmitted on a first channel of the wireless access interface, and the second signal is transmitted in a second channel of the wireless access interface, and one or more of the base stations is arranged to communicate data to a third mobile communications device in the second channel contemporaneously with the transmission of the broadcast data on the second channel by the relay node. 2. A mobile communications network as claimed in claim 1, wherein the first channel on which the first signal is transmitted is provided by a first time slot within a first frequency band, and the second channel on which the second signal is transmitted is provided by a second time slot being after the first time slot and transmitted within the first frequency or a second frequency band. 3. A mobile communications network as claimed in claim 1, wherein one of the first and second mobile communications devices is adapted to receive the first signal representing the data, to store a representation of the first signal, and to receive the second signal representing the data and to combine the first signal from the representation stored in the store with the second signal, to recover the broadcast data. 4. A mobile communications network as claimed in claim 1, wherein the first or the second mobile communications devices is adapted to receive the first signal representing the data, to store a representation of the first signal, and to receive the second signal representing the data and to select one of the first signal or the second signal and to recover the broadcast data from the select first or second signals. 5. A mobile communications network as claimed in claim 1, wherein the mobile communications device which is arranged to receive the data communicated by the base station on the second channel includes a receiver, the receiver being adapted to cancel the transmission in the second signal of the broadcast data contemporaneously received from the relay node in the second channel, using a version of the broadcast data received from the base station which has been transmitted in the first channel. 6. A mobile communications network as claimed in claim 1, wherein one or more of the base stations is arranged to communicate data to the third mobile communications device in the second channel contemporaneously with the transmission of the broadcast data on the second channel by the relay node, the data being transmitted by the base station in the second channel at a power level which is lower than a power of the transmission of the broadcast data in the second channel. 7. A mobile communications network as claimed in claim 1, wherein the relay node is arranged to communicate data to a fourth mobile communications device in the first channel contemporaneously with the transmission of the broadcast data on the first channel by the base station, the data being transmitted by relay node in the first channel at a power level which is lower than a power of the transmission of the broadcast data in the first channel. 8. A method of communicating broadcast data to a plurality of mobile communications devices by transmitting the broadcast data via a wireless access interface of a mobile radio network, the method comprising
providing the mobile radio communications network including a plurality of base stations disposed throughout the network and arranged in operation to transmit signals to and receive signals from mobile communications devices attached to the base stations, and receiving at a relay node a first signal representing the broadcast data transmitted by one of the base stations, retransmitting the broadcast data as a second signal, the first signal being broadcast for reception by a first mobile communications device and the relay node and the second signal being broadcast for reception by a second mobile communications device, wherein the first signal is transmitted on a first channel of the wireless access interface, and the second signal is transmitted in a second channel of the wireless access interface and the method includes communicating data from one or more of the base stations to a third mobile communications device in the second channel contemporaneously with the transmission of the broadcast data on the second channel by the relay node. 9. A mobile communications device for receiving broadcast data from a mobile radio network, the mobile radio network including a plurality of base stations disposed throughout the mobile radio network and arranged in operation to transmit a first signals representing the broadcast data to mobile communications devices attached to the base stations via a wireless access interface, and a relay node is arranged to receive the first signal representing the broadcast data transmitted by the base station and to retransmit the broadcast data as a second signal, the mobile communications device comprising
a receiver which is arranged in operation to receive the broadcast data as a first signal from one or more of the base stations, and to receive the broadcast data as the second signal from the relay node, wherein the first signal is received from a first channel and the second signal is received from a second channel of the wireless access interface, and the receiver is arranged to combine the first and the second signals to recover the broadcast data. 10. A mobile communications device as claimed in claim 9, wherein the first channel on which the first signal is transmitted is provided by a first time slot within a first frequency band, and the second channel on which the second signal is transmitted is provided by a second time slot being after the first time slot and transmitted within the first frequency band or a second frequency band. 11. A mobile communications device as claimed in claim 9, wherein the receiver is adapted to receive the first signal representing the broadcast data, to store a representation of the first signal, and to receive the second signal representing the broadcast data and to combine the first signal from the representation stored in the store with the second signal, to recover the broadcast data. 12. A mobile communications device as claimed in claim 11, wherein the first signal is a first Orthogonal Frequency Division Multiplexed, OFDM, symbol and the second signal is a second OFDM symbol, each of the first and second OFDM symbols comprising a plurality of narrow band carriers and the receiver is arranged in operation to convert the first OFDM symbol to a baseband form and the second OFDM symbol to a base band form and to combine the first and the second signals by combining each of the respective narrow band carriers of the first and second OFDM symbols. 13. A mobile communications device as claimed in claim 9, wherein the receiver is adapted to combine the first signal and the second signal by receiving the first signal representing the data, storing a representation of the first signal, and receiving the second signal representing the data, selecting one of the first signal or the second signal and recovering the broadcast data from the select first signal or second signal. 14. A mobile communications device as claimed in claim 9, wherein the receiver is adapted to receive data communicated by one or more of the base stations in the second channel contemporaneously with the transmission of the broadcast data as the second signal in the second channel by the relay node, the receiver being adapted to cancel the second signal contemporaneously received from the relay node in the second time slot, using a version of the broadcast data received from the base station as the first signal which has been transmitted in the first channel. 15. A method of communicating broadcast data to a mobile communications device by transmitting the broadcast data via a wireless access interface of a mobile communications network, the mobile communications network including a plurality of base stations disposed throughout the network and arranged in operation to transmit signals to and receive signals from mobile communications devices attached to the base stations via the wireless access network, and one or more a relay nodes arranged to receive a first signal representing the broadcast data from by one of the base stations, and to retransmit the broadcast data as a second signal, the method comprising
receiving the broadcast data as the first signal from one or more of the base stations, and/or receiving the broadcast data as the second signal from a relay node, wherein the first signal is received on a first channel and/or the second signal is received on a second channel of the wireless access interface, wherein the first signal is transmitted on a first channel of the mobile radio network, and the second signal is transmitted in a second channel of a mobile radio network. 16. A relay node for use in extending a coverage range of a base station operating within a mobile radio network for communicating broadcast data, the mobile radio network including a plurality of base stations disposed throughout the mobile radio network and arranged in operation to transmit signals to mobile communications devices attached to the base stations via a wireless access interface, the relay node comprising
a receiver which is arranged in operation to receive a first signal representing the broadcast data transmitted by one or more of the base stations to the relay node and to retransmit the broadcast data as a second signal, the first signal being broadcast for reception by a first mobile communications device and the relay node and the second signal being broadcast for reception by a second mobile communications device, wherein the first signal is transmitted on a first channel of the mobile radio network, and the second signal is transmitted in a second channel of a mobile radio network. 17. A relay node as claimed in claim 16, wherein the first channel on which the first signal is transmitted is provided by a first time slot within a first frequency band of the wireless access interface, and the second channel on which the second signal is transmitted is provided by a second time slot being after the first time slot and transmitted within the first frequency band or a second frequency band. 18. A method of communicating broadcast data from a relay node to one or more mobile communications devices by transmitting the broadcast data via a wireless access interface of a mobile radio network, the method comprising
receiving at the relay node a first signal representing the broadcast data transmitted by one of the base stations, retransmitting the broadcast data as a second signal, the first signal being broadcast to the relay node and the second signal being broadcast for reception by a the mobile communications devices, wherein the first signal is transmitted on a first channel of the wireless access interface, and the second signal is transmitted in a second channel of the wireless access interface. 19. A mobile communications network as claimed in claim 2, wherein one of the first and second mobile communications devices is adapted to receive the first signal representing the data, to store a representation of the first signal, and to receive the second signal representing the data and to combine the first signal from the representation stored in the store with the second signal, to recover the broadcast data. 20. A mobile communications network as claimed in claim 2, wherein the first or the second mobile communications devices is adapted to receive the first signal representing the data, to store a representation of the first signal, and to receive the second signal representing the data and to select one of the first signal or the second signal and to recover the broadcast data from the select first or second signals. | A mobile communications network for communicating broadcast data to a plurality of mobile communications devices by transmitting the broadcast data via a wireless access interface, the mobile communications network including a plurality of base stations disposed throughout the network and arranged in operation to transmit signals to mobile communications devices attached to the base stations, and one or more relay nodes. One of the relay nodes is arranged in operation to receive a first signal representing the broadcast data transmitted by one or more of the base stations and to retransmit the broadcast data as a second signal, the first signal being broadcast for reception by a first mobile communications device and the relay node and the second signal being broadcast for reception by a second mobile communications device. The first signal is transmitted on a first channel of the wireless access interface, and the second signal is transmitted in a second channel of the wireless access interface,and one or more of the base stations is arranged to communicate data to a third mobile communications device in the second channel contemporaneously with the transmission of the broadcast data on the second channel by the relay node. Accordingly a relay node layer can be provided to a mobile radio network which improves an efficiency of use of the available communications resources.1. A mobile communications network for communicating broadcast data to a plurality of mobile communications devices by transmitting the broadcast data via a wireless access interface, the mobile communications network including
a plurality of base stations disposed throughout the network and arranged in operation to transmit signals to mobile communications devices attached to the base stations, and a relay node arranged in operation to receive a first signal representing the broadcast data transmitted by one or more of the base stations and to retransmit the broadcast data as a second signal, the first signal being broadcast for reception by a first mobile communications device and the relay node and the second signal being broadcast for reception by a second mobile communications device, wherein the first signal is transmitted on a first channel of the wireless access interface, and the second signal is transmitted in a second channel of the wireless access interface, and one or more of the base stations is arranged to communicate data to a third mobile communications device in the second channel contemporaneously with the transmission of the broadcast data on the second channel by the relay node. 2. A mobile communications network as claimed in claim 1, wherein the first channel on which the first signal is transmitted is provided by a first time slot within a first frequency band, and the second channel on which the second signal is transmitted is provided by a second time slot being after the first time slot and transmitted within the first frequency or a second frequency band. 3. A mobile communications network as claimed in claim 1, wherein one of the first and second mobile communications devices is adapted to receive the first signal representing the data, to store a representation of the first signal, and to receive the second signal representing the data and to combine the first signal from the representation stored in the store with the second signal, to recover the broadcast data. 4. A mobile communications network as claimed in claim 1, wherein the first or the second mobile communications devices is adapted to receive the first signal representing the data, to store a representation of the first signal, and to receive the second signal representing the data and to select one of the first signal or the second signal and to recover the broadcast data from the select first or second signals. 5. A mobile communications network as claimed in claim 1, wherein the mobile communications device which is arranged to receive the data communicated by the base station on the second channel includes a receiver, the receiver being adapted to cancel the transmission in the second signal of the broadcast data contemporaneously received from the relay node in the second channel, using a version of the broadcast data received from the base station which has been transmitted in the first channel. 6. A mobile communications network as claimed in claim 1, wherein one or more of the base stations is arranged to communicate data to the third mobile communications device in the second channel contemporaneously with the transmission of the broadcast data on the second channel by the relay node, the data being transmitted by the base station in the second channel at a power level which is lower than a power of the transmission of the broadcast data in the second channel. 7. A mobile communications network as claimed in claim 1, wherein the relay node is arranged to communicate data to a fourth mobile communications device in the first channel contemporaneously with the transmission of the broadcast data on the first channel by the base station, the data being transmitted by relay node in the first channel at a power level which is lower than a power of the transmission of the broadcast data in the first channel. 8. A method of communicating broadcast data to a plurality of mobile communications devices by transmitting the broadcast data via a wireless access interface of a mobile radio network, the method comprising
providing the mobile radio communications network including a plurality of base stations disposed throughout the network and arranged in operation to transmit signals to and receive signals from mobile communications devices attached to the base stations, and receiving at a relay node a first signal representing the broadcast data transmitted by one of the base stations, retransmitting the broadcast data as a second signal, the first signal being broadcast for reception by a first mobile communications device and the relay node and the second signal being broadcast for reception by a second mobile communications device, wherein the first signal is transmitted on a first channel of the wireless access interface, and the second signal is transmitted in a second channel of the wireless access interface and the method includes communicating data from one or more of the base stations to a third mobile communications device in the second channel contemporaneously with the transmission of the broadcast data on the second channel by the relay node. 9. A mobile communications device for receiving broadcast data from a mobile radio network, the mobile radio network including a plurality of base stations disposed throughout the mobile radio network and arranged in operation to transmit a first signals representing the broadcast data to mobile communications devices attached to the base stations via a wireless access interface, and a relay node is arranged to receive the first signal representing the broadcast data transmitted by the base station and to retransmit the broadcast data as a second signal, the mobile communications device comprising
a receiver which is arranged in operation to receive the broadcast data as a first signal from one or more of the base stations, and to receive the broadcast data as the second signal from the relay node, wherein the first signal is received from a first channel and the second signal is received from a second channel of the wireless access interface, and the receiver is arranged to combine the first and the second signals to recover the broadcast data. 10. A mobile communications device as claimed in claim 9, wherein the first channel on which the first signal is transmitted is provided by a first time slot within a first frequency band, and the second channel on which the second signal is transmitted is provided by a second time slot being after the first time slot and transmitted within the first frequency band or a second frequency band. 11. A mobile communications device as claimed in claim 9, wherein the receiver is adapted to receive the first signal representing the broadcast data, to store a representation of the first signal, and to receive the second signal representing the broadcast data and to combine the first signal from the representation stored in the store with the second signal, to recover the broadcast data. 12. A mobile communications device as claimed in claim 11, wherein the first signal is a first Orthogonal Frequency Division Multiplexed, OFDM, symbol and the second signal is a second OFDM symbol, each of the first and second OFDM symbols comprising a plurality of narrow band carriers and the receiver is arranged in operation to convert the first OFDM symbol to a baseband form and the second OFDM symbol to a base band form and to combine the first and the second signals by combining each of the respective narrow band carriers of the first and second OFDM symbols. 13. A mobile communications device as claimed in claim 9, wherein the receiver is adapted to combine the first signal and the second signal by receiving the first signal representing the data, storing a representation of the first signal, and receiving the second signal representing the data, selecting one of the first signal or the second signal and recovering the broadcast data from the select first signal or second signal. 14. A mobile communications device as claimed in claim 9, wherein the receiver is adapted to receive data communicated by one or more of the base stations in the second channel contemporaneously with the transmission of the broadcast data as the second signal in the second channel by the relay node, the receiver being adapted to cancel the second signal contemporaneously received from the relay node in the second time slot, using a version of the broadcast data received from the base station as the first signal which has been transmitted in the first channel. 15. A method of communicating broadcast data to a mobile communications device by transmitting the broadcast data via a wireless access interface of a mobile communications network, the mobile communications network including a plurality of base stations disposed throughout the network and arranged in operation to transmit signals to and receive signals from mobile communications devices attached to the base stations via the wireless access network, and one or more a relay nodes arranged to receive a first signal representing the broadcast data from by one of the base stations, and to retransmit the broadcast data as a second signal, the method comprising
receiving the broadcast data as the first signal from one or more of the base stations, and/or receiving the broadcast data as the second signal from a relay node, wherein the first signal is received on a first channel and/or the second signal is received on a second channel of the wireless access interface, wherein the first signal is transmitted on a first channel of the mobile radio network, and the second signal is transmitted in a second channel of a mobile radio network. 16. A relay node for use in extending a coverage range of a base station operating within a mobile radio network for communicating broadcast data, the mobile radio network including a plurality of base stations disposed throughout the mobile radio network and arranged in operation to transmit signals to mobile communications devices attached to the base stations via a wireless access interface, the relay node comprising
a receiver which is arranged in operation to receive a first signal representing the broadcast data transmitted by one or more of the base stations to the relay node and to retransmit the broadcast data as a second signal, the first signal being broadcast for reception by a first mobile communications device and the relay node and the second signal being broadcast for reception by a second mobile communications device, wherein the first signal is transmitted on a first channel of the mobile radio network, and the second signal is transmitted in a second channel of a mobile radio network. 17. A relay node as claimed in claim 16, wherein the first channel on which the first signal is transmitted is provided by a first time slot within a first frequency band of the wireless access interface, and the second channel on which the second signal is transmitted is provided by a second time slot being after the first time slot and transmitted within the first frequency band or a second frequency band. 18. A method of communicating broadcast data from a relay node to one or more mobile communications devices by transmitting the broadcast data via a wireless access interface of a mobile radio network, the method comprising
receiving at the relay node a first signal representing the broadcast data transmitted by one of the base stations, retransmitting the broadcast data as a second signal, the first signal being broadcast to the relay node and the second signal being broadcast for reception by a the mobile communications devices, wherein the first signal is transmitted on a first channel of the wireless access interface, and the second signal is transmitted in a second channel of the wireless access interface. 19. A mobile communications network as claimed in claim 2, wherein one of the first and second mobile communications devices is adapted to receive the first signal representing the data, to store a representation of the first signal, and to receive the second signal representing the data and to combine the first signal from the representation stored in the store with the second signal, to recover the broadcast data. 20. A mobile communications network as claimed in claim 2, wherein the first or the second mobile communications devices is adapted to receive the first signal representing the data, to store a representation of the first signal, and to receive the second signal representing the data and to select one of the first signal or the second signal and to recover the broadcast data from the select first or second signals. | 2,400 |
7,157 | 7,157 | 15,285,290 | 2,486 | A method for filtering radiation on a CCD based camera inspection video, the method including: capturing video signals via the camera; converting the video signals to a plurality of digital video frames; identifying radiation bright spots, defined as xnoids, in a pixel of at least one of the frames, replacing the xnoids and surrounding pixels with corresponding pixels of another of the frames to create a filtered frame. A system for the inspection of a nuclear power plant comprising: a camera; and a computer, the computer configured to execute identifying xnoids in a pixel of at least one digitized video frame and replacing the xnoids and surrounding pixels with corresponding pixels of another of the frames to create a filtered frame. | 1. A method for filtering radiation on a CCD based camera inspection video, the method comprising:
capturing video signals via the camera; converting the video signals to a plurality of digital video frames; identifying xnoids in a pixel of at least one of the frames, replacing the xnoids and surrounding pixels with corresponding pixels of another of the frames to create a filtered frame. 2. The method as recited in claim 1 wherein the video signals are converted to digital video frames by a video capture card. 3. The method as recited in claim 1 wherein the filtered frame is shown in real time via a computer display. 4. The method as recited in claim 1 wherein data of the filtered frame is stored on a computer component and replayed at a later timer. 5. The method as recited in claim 5 wherein the another frame is N+1. 6. The method as recited in claim 6 wherein the another frame is N−1, N+2 or N−2, respectively, when the digital video frame N+1 has already been marked as a xnoid. 7. A system for the inspection of a nuclear power plant comprising:
a camera; and a computer, the computer configured with software to execute identifying xnoids in a pixel of at least one digitized video frame and replacing the xnoids and surrounding pixels with corresponding pixels of another of the frames to create a filtered frame. 8. The system as recited in claim 8 wherein the camera is a CCD based camera. 9. The method as recited in claim 1 wherein identifying xnoids includes determining an intensity level for the pixel and comparing the intensity level of the pixel to an intensity level of a plurality of surrounding pixels, identifying the pixel as a xnoid when the intensity level of the pixel is brighter then the intensity level of the plurality of surrounding pixels. 10. The method as recited in claim 1 wherein identifying the xnoid includes comparing an intensity level of the pixel to an intensity level of twenty four surrounding pixels, wherein the bright spot exists when the intensity level of the pixel is greater then the intensity level of the twenty four surrounding pixels. 11. A method for predicting camera failure due to radiation exposure, the method comprising:
calculating a current estimated relative absorbed dose of the video camera; recording the current estimated absorbed dose of the video camera; and comparing the current estimated relative absorbed dose to a previously recorded estimated relative absorbed dose. 12. The method as recited in claim 11 wherein calculating the current estimated relative absorbed dose includes detecting xnoids in a filtered video frame and counting the total number of xnoids detected. | A method for filtering radiation on a CCD based camera inspection video, the method including: capturing video signals via the camera; converting the video signals to a plurality of digital video frames; identifying radiation bright spots, defined as xnoids, in a pixel of at least one of the frames, replacing the xnoids and surrounding pixels with corresponding pixels of another of the frames to create a filtered frame. A system for the inspection of a nuclear power plant comprising: a camera; and a computer, the computer configured to execute identifying xnoids in a pixel of at least one digitized video frame and replacing the xnoids and surrounding pixels with corresponding pixels of another of the frames to create a filtered frame.1. A method for filtering radiation on a CCD based camera inspection video, the method comprising:
capturing video signals via the camera; converting the video signals to a plurality of digital video frames; identifying xnoids in a pixel of at least one of the frames, replacing the xnoids and surrounding pixels with corresponding pixels of another of the frames to create a filtered frame. 2. The method as recited in claim 1 wherein the video signals are converted to digital video frames by a video capture card. 3. The method as recited in claim 1 wherein the filtered frame is shown in real time via a computer display. 4. The method as recited in claim 1 wherein data of the filtered frame is stored on a computer component and replayed at a later timer. 5. The method as recited in claim 5 wherein the another frame is N+1. 6. The method as recited in claim 6 wherein the another frame is N−1, N+2 or N−2, respectively, when the digital video frame N+1 has already been marked as a xnoid. 7. A system for the inspection of a nuclear power plant comprising:
a camera; and a computer, the computer configured with software to execute identifying xnoids in a pixel of at least one digitized video frame and replacing the xnoids and surrounding pixels with corresponding pixels of another of the frames to create a filtered frame. 8. The system as recited in claim 8 wherein the camera is a CCD based camera. 9. The method as recited in claim 1 wherein identifying xnoids includes determining an intensity level for the pixel and comparing the intensity level of the pixel to an intensity level of a plurality of surrounding pixels, identifying the pixel as a xnoid when the intensity level of the pixel is brighter then the intensity level of the plurality of surrounding pixels. 10. The method as recited in claim 1 wherein identifying the xnoid includes comparing an intensity level of the pixel to an intensity level of twenty four surrounding pixels, wherein the bright spot exists when the intensity level of the pixel is greater then the intensity level of the twenty four surrounding pixels. 11. A method for predicting camera failure due to radiation exposure, the method comprising:
calculating a current estimated relative absorbed dose of the video camera; recording the current estimated absorbed dose of the video camera; and comparing the current estimated relative absorbed dose to a previously recorded estimated relative absorbed dose. 12. The method as recited in claim 11 wherein calculating the current estimated relative absorbed dose includes detecting xnoids in a filtered video frame and counting the total number of xnoids detected. | 2,400 |
7,158 | 7,158 | 11,980,497 | 2,425 | To achieve an encoding system including a highly efficient prediction performed in response to the content of a scene, a significance, and a motion characteristic of a moving picture and the like, memories a, b, c, motion compensator 5 responsive to an arbitrary transform parameter representing the motion of a prediction picture segment for generating a predicted picture by using arbitrary data stored in the memories a, b, c based upon the transform parameter, and memory update unit 15 for allowing the content of one or more of the memories to be updated at an arbitrary period of time, are provided. | 1. A moving picture prediction system for predicting a moving picture to be implemented in at least one of an encoder and a decoder, the moving picture prediction system comprising:
a plurality of reference picture memory areas, each area for storing picture data of a reference picture to be used for prediction; and a prediction picture generation section including a motion compensator for receiving a parameter representing a motion of between an image to be predicted and a reference picture stored in a reference memory area, a parameter representing a reference memory area to be used for prediction, and for generating a predicted image by using the reference picture data stored in the plurality of the reference picture memory areas and indicated by said parameter representing a reference memory area to be used for prediction, and a parameter determining bit assignment for coded representation of the parameter representing a reference memory area of a plurality of reference picture memory areas to be used for prediction. 2. The moving picture prediction system according to claim 1, wherein each reference picture is allocated unique reference number based on frequency in use for prediction. 3. The moving picture prediction system according to claim 1, wherein each reference number is dynamically updated. 4. A moving picture prediction system for predicting a moving picture to be implemented in at least one of an encoder and a decoder, the moving picture prediction system comprising:
a plurality of reference picture memory areas, each area for storing picture data of a reference picture to be used for prediction; and a prediction picture generation section including a motion compensator for receiving a parameter representing a motion between an image to be predicted and a reference picture stored in a reference memory area, a parameter representing a reference memory area to be used for prediction and reference number identifying the reference picture to be used for prediction, and for generating a predicted image by using the reference picture data stored in the plurality of the reference picture memory areas and indicated by said parameter representing a reference memory area to be used for prediction, wherein each reference picture is identified by each reference number, which is dynamically updated. 5. The moving picture prediction system according to claim 4, wherein the reference number is dynamically updated based on frequency in use for prediction. 6. A moving picture prediction method of predicting a moving picture to be implemented in at least one of an encoder and a decoder, the moving picture prediction method comprising the steps of:
receiving a parameter representing a motion between an image to be predicted and a reference picture stored in a reference memory area, a parameter representing a reference memory area of a plurality of reference picture memory areas to be used for prediction, each area for storing picture data of a reference picture to be used for prediction, and a parameter determining bit assignment for coded representation of the parameter representing a reference memory area of a plurality of reference picture memory areas to be used for prediction, and generating a predicted image by using the reference picture data stored in the plurality of the reference picture memory areas and indicated by said parameter representing a reference memory area to be used for prediction. 7. The moving picture prediction method according to claim 6, wherein each reference picture is allocated unique reference number based on frequency in use for prediction. 8. The moving picture prediction system according to claim 6, wherein each reference number is dynamically updated. 9. A moving picture prediction method of predicting a moving picture to be implemented in at least one of an encoder and a decoder, the moving picture prediction method comprising the steps of:
receiving a parameter representing a motion between an image to be predicted and a reference picture stored in a reference memory area, a parameter representing a reference memory area of a plurality of reference picture memory areas to be used for prediction, and reference number identifying the reference picture to be used for prediction, each reference memory area for storing picture data of a reference picture to be used for prediction and generating a predicted image by using the reference picture data stored in the plurality of the reference picture memory areas and indicated by said parameter representing a reference memory area to be used for prediction, wherein each reference picture is identified by each reference number, which is dynamically updated. 10. The moving picture prediction method according to claim 9, wherein the reference number is dynamically updated based on frequency in use for prediction. | To achieve an encoding system including a highly efficient prediction performed in response to the content of a scene, a significance, and a motion characteristic of a moving picture and the like, memories a, b, c, motion compensator 5 responsive to an arbitrary transform parameter representing the motion of a prediction picture segment for generating a predicted picture by using arbitrary data stored in the memories a, b, c based upon the transform parameter, and memory update unit 15 for allowing the content of one or more of the memories to be updated at an arbitrary period of time, are provided.1. A moving picture prediction system for predicting a moving picture to be implemented in at least one of an encoder and a decoder, the moving picture prediction system comprising:
a plurality of reference picture memory areas, each area for storing picture data of a reference picture to be used for prediction; and a prediction picture generation section including a motion compensator for receiving a parameter representing a motion of between an image to be predicted and a reference picture stored in a reference memory area, a parameter representing a reference memory area to be used for prediction, and for generating a predicted image by using the reference picture data stored in the plurality of the reference picture memory areas and indicated by said parameter representing a reference memory area to be used for prediction, and a parameter determining bit assignment for coded representation of the parameter representing a reference memory area of a plurality of reference picture memory areas to be used for prediction. 2. The moving picture prediction system according to claim 1, wherein each reference picture is allocated unique reference number based on frequency in use for prediction. 3. The moving picture prediction system according to claim 1, wherein each reference number is dynamically updated. 4. A moving picture prediction system for predicting a moving picture to be implemented in at least one of an encoder and a decoder, the moving picture prediction system comprising:
a plurality of reference picture memory areas, each area for storing picture data of a reference picture to be used for prediction; and a prediction picture generation section including a motion compensator for receiving a parameter representing a motion between an image to be predicted and a reference picture stored in a reference memory area, a parameter representing a reference memory area to be used for prediction and reference number identifying the reference picture to be used for prediction, and for generating a predicted image by using the reference picture data stored in the plurality of the reference picture memory areas and indicated by said parameter representing a reference memory area to be used for prediction, wherein each reference picture is identified by each reference number, which is dynamically updated. 5. The moving picture prediction system according to claim 4, wherein the reference number is dynamically updated based on frequency in use for prediction. 6. A moving picture prediction method of predicting a moving picture to be implemented in at least one of an encoder and a decoder, the moving picture prediction method comprising the steps of:
receiving a parameter representing a motion between an image to be predicted and a reference picture stored in a reference memory area, a parameter representing a reference memory area of a plurality of reference picture memory areas to be used for prediction, each area for storing picture data of a reference picture to be used for prediction, and a parameter determining bit assignment for coded representation of the parameter representing a reference memory area of a plurality of reference picture memory areas to be used for prediction, and generating a predicted image by using the reference picture data stored in the plurality of the reference picture memory areas and indicated by said parameter representing a reference memory area to be used for prediction. 7. The moving picture prediction method according to claim 6, wherein each reference picture is allocated unique reference number based on frequency in use for prediction. 8. The moving picture prediction system according to claim 6, wherein each reference number is dynamically updated. 9. A moving picture prediction method of predicting a moving picture to be implemented in at least one of an encoder and a decoder, the moving picture prediction method comprising the steps of:
receiving a parameter representing a motion between an image to be predicted and a reference picture stored in a reference memory area, a parameter representing a reference memory area of a plurality of reference picture memory areas to be used for prediction, and reference number identifying the reference picture to be used for prediction, each reference memory area for storing picture data of a reference picture to be used for prediction and generating a predicted image by using the reference picture data stored in the plurality of the reference picture memory areas and indicated by said parameter representing a reference memory area to be used for prediction, wherein each reference picture is identified by each reference number, which is dynamically updated. 10. The moving picture prediction method according to claim 9, wherein the reference number is dynamically updated based on frequency in use for prediction. | 2,400 |
7,159 | 7,159 | 14,487,414 | 2,431 | This disclosure describes an automated process of discovering characteristics needed to integrate a web-based application to a web portal, such as a reverse proxy. This process eliminates the need for application owners and security analysts to manually discover the information needed for the on-boarding process. To this end, application-specific information is determined by monitoring network traffic flows in and out of the application, user authentication and authorization event data, and the like. An application discovery engine analyzes the discovered data, preferably against a set of patterns and heuristic-based rules, to discover or identify the one or more application characteristics. A set of configuration data is then generated, and this configuration data is then used to integrate the application into the web reverse proxy and, in particular, by specifying the configuration needed to “board” the application. Preferably, the monitoring and application characterization determination functions occur in an automated manner. | 1. A method for automated on-boarding of a web application in association with a proxy, comprising:
monitoring communications to and from the web application as users interact with the web application to discover data indicative of one or more application characteristics; analyzing the data against one or more rules to identify the one or more application characteristics; based on the one or more identified application characteristics, generating a set of configuration data to configure the application to the proxy; and applying the configuration data to the proxy; wherein at least the monitoring and analyzing operations are carried out in software executing in one or more hardware processing elements. 2. The method as described in claim 1 wherein the data include one or more application characteristic patterns, and wherein the analyzing step compares the one or more application characteristic patterns to one or more heuristic rules. 3. The method as described in claim 1 further including scanning the web-based application to identify at least one application characteristic. 4. The method as described in claim 1 further including providing a progress indication as the data is discovered and the one or more application characteristics are being identified. 5. The method as described in claim 4 wherein the progress indication is rendered visually. 6. The method as described in claim 1 further including receiving a set of one or more parameters to configure the monitoring operation. 7. The method as described in claim 1 wherein the proxy is a reverse proxy enabled as a Web portal. 8. Apparatus, comprising:
a processor; computer memory holding computer program instructions executed by the processor for automated on-boarding of a web application in association with a proxy, the computer program instructions comprising:
program code to monitor communications to and from the web application as users interact with the web application to discover data indicative of one or more application characteristics;
program code to analyze the data against one or more rules to identify the one or more application characteristics;
program code using the one or more identified application characteristics to generate a set of configuration data to configure the application to the proxy; and
program code to apply the configuration data to the proxy. 9. The apparatus as described in claim 8 wherein the data include one or more application characteristic patterns, and wherein the program code to analyze compares the one or more application characteristic patterns to one or more heuristic rules. 10. The apparatus as described in claim 8 wherein the computer program instructions also include program code operative to scan the web-based application to identify at least one application characteristic. 11. The apparatus as described in claim 8 wherein the computer program instructions also include program code to provide a progress indication as the data is discovered and the one or more application characteristics are being identified. 12. The apparatus as described in claim 11 wherein the progress indication is rendered visually. 13. The apparatus as described in claim 8 wherein the computer program instructions further includes program code to receive a set of one or more parameters to configure monitoring of the communications. 14. The apparatus as described in claim 8 wherein the proxy is a reverse proxy enabled as a Web portal. 15. A computer program product in a computer readable storage medium for use in a data processing system, the computer program product holding computer program instructions which, when executed by the data processing system, perform automated on-boarding of a web application in association with a proxy, the computer program instructions comprising:
program code to monitor communications to and from the web application as users interact with the web application to discover data indicative of one or more application characteristics; program code to analyze the data against one or more rules to identify the one or more application characteristics; program code using the one or more identified application characteristics to generate a set of configuration data to configure the application to the proxy; and program code to apply the configuration data to the proxy. 16. The computer program product as described in claim 15 wherein the data include one or more application characteristic patterns, and wherein the program code to analyze compares the one or more application characteristic patterns to one or more heuristic rules. 17. The computer program product as described in claim 15 wherein the computer program instructions also include program code operative to scan the web-based application to identify at least one application characteristic. 18. The computer program product as described in claim 15 wherein the computer program instructions also include program code to provide a progress indication as the data is discovered and the one or more application characteristics are being identified. 19. The computer program product as described in claim 18 wherein the progress indication is rendered visually. 20. The computer program product as described in claim 15 wherein the computer program instructions further includes program code to receive a set of one or more parameters to configure monitoring of the communications. | This disclosure describes an automated process of discovering characteristics needed to integrate a web-based application to a web portal, such as a reverse proxy. This process eliminates the need for application owners and security analysts to manually discover the information needed for the on-boarding process. To this end, application-specific information is determined by monitoring network traffic flows in and out of the application, user authentication and authorization event data, and the like. An application discovery engine analyzes the discovered data, preferably against a set of patterns and heuristic-based rules, to discover or identify the one or more application characteristics. A set of configuration data is then generated, and this configuration data is then used to integrate the application into the web reverse proxy and, in particular, by specifying the configuration needed to “board” the application. Preferably, the monitoring and application characterization determination functions occur in an automated manner.1. A method for automated on-boarding of a web application in association with a proxy, comprising:
monitoring communications to and from the web application as users interact with the web application to discover data indicative of one or more application characteristics; analyzing the data against one or more rules to identify the one or more application characteristics; based on the one or more identified application characteristics, generating a set of configuration data to configure the application to the proxy; and applying the configuration data to the proxy; wherein at least the monitoring and analyzing operations are carried out in software executing in one or more hardware processing elements. 2. The method as described in claim 1 wherein the data include one or more application characteristic patterns, and wherein the analyzing step compares the one or more application characteristic patterns to one or more heuristic rules. 3. The method as described in claim 1 further including scanning the web-based application to identify at least one application characteristic. 4. The method as described in claim 1 further including providing a progress indication as the data is discovered and the one or more application characteristics are being identified. 5. The method as described in claim 4 wherein the progress indication is rendered visually. 6. The method as described in claim 1 further including receiving a set of one or more parameters to configure the monitoring operation. 7. The method as described in claim 1 wherein the proxy is a reverse proxy enabled as a Web portal. 8. Apparatus, comprising:
a processor; computer memory holding computer program instructions executed by the processor for automated on-boarding of a web application in association with a proxy, the computer program instructions comprising:
program code to monitor communications to and from the web application as users interact with the web application to discover data indicative of one or more application characteristics;
program code to analyze the data against one or more rules to identify the one or more application characteristics;
program code using the one or more identified application characteristics to generate a set of configuration data to configure the application to the proxy; and
program code to apply the configuration data to the proxy. 9. The apparatus as described in claim 8 wherein the data include one or more application characteristic patterns, and wherein the program code to analyze compares the one or more application characteristic patterns to one or more heuristic rules. 10. The apparatus as described in claim 8 wherein the computer program instructions also include program code operative to scan the web-based application to identify at least one application characteristic. 11. The apparatus as described in claim 8 wherein the computer program instructions also include program code to provide a progress indication as the data is discovered and the one or more application characteristics are being identified. 12. The apparatus as described in claim 11 wherein the progress indication is rendered visually. 13. The apparatus as described in claim 8 wherein the computer program instructions further includes program code to receive a set of one or more parameters to configure monitoring of the communications. 14. The apparatus as described in claim 8 wherein the proxy is a reverse proxy enabled as a Web portal. 15. A computer program product in a computer readable storage medium for use in a data processing system, the computer program product holding computer program instructions which, when executed by the data processing system, perform automated on-boarding of a web application in association with a proxy, the computer program instructions comprising:
program code to monitor communications to and from the web application as users interact with the web application to discover data indicative of one or more application characteristics; program code to analyze the data against one or more rules to identify the one or more application characteristics; program code using the one or more identified application characteristics to generate a set of configuration data to configure the application to the proxy; and program code to apply the configuration data to the proxy. 16. The computer program product as described in claim 15 wherein the data include one or more application characteristic patterns, and wherein the program code to analyze compares the one or more application characteristic patterns to one or more heuristic rules. 17. The computer program product as described in claim 15 wherein the computer program instructions also include program code operative to scan the web-based application to identify at least one application characteristic. 18. The computer program product as described in claim 15 wherein the computer program instructions also include program code to provide a progress indication as the data is discovered and the one or more application characteristics are being identified. 19. The computer program product as described in claim 18 wherein the progress indication is rendered visually. 20. The computer program product as described in claim 15 wherein the computer program instructions further includes program code to receive a set of one or more parameters to configure monitoring of the communications. | 2,400 |
7,160 | 7,160 | 14,009,859 | 2,463 | Embodiments of the present invention provide a method and apparatus for performing MBMS service communications and a method and apparatus for receiving an MBMS service. Specifically, there is provided a method for performing MBMS service communications, comprising acquiring location area information of an MBMS service distribution; and notifying a UE of the location area information of the MBMS service distribution. Further, there is provided a method for receiving an MBMS service, comprising receiving location area information of an MBMS service distribution; comparing location information of a UE with the location area information of the MBMS service distribution; and determining whether to read an MCCH and MCCH information change notification based on a comparison result. | 1. A method for performing Multimedia Broadcast Multicast Service (MBMS) communications, comprising:
acquiring location area information of an MBMS service distribution; and notifying a User Equipment (UE) of the location area information of the MBMS service distribution. 2. The method of claim 1, wherein the location area information of the MBMS service distribution comprises Service Area (SA) information and mapping relationship information between cells and the SA; or
the location area information of the MBMS service distribution comprises mobility management logical area information. 3. The method of claim 1, further comprising:
embedding the acquired location area information of the MBMS service distribution into MBMS service description metadata; and wherein notifying the UE of the location area information of the MBMS service distribution comprises: during a service announcement or service discovery process, notifying the UE of the location area information of the MBMS service distribution by utilizing the MBMS service description metadata. 4. (canceled) 5. A method for receiving a Multimedia Broadcast Multicast Service (MBMS), comprising:
receiving location area information of an MBMS service distribution; comparing location information of a User Equipment (UE) with location area information of the MBMS service distribution; and determining whether to read an MBMS Control Channel (MCCH) and MCCH information change notification based on a comparing result. 6. The method of claim 5, wherein the location information of the UE is information of a cell where the UE is located or information of a Multicast Broadcast Single Frequency Network (MBSFN) area where the UE is located. 7. The method of claim 6, wherein if MBMS service transmission area information as acquired by the UE indicates to the UE that an MBMS service is transmitted within a Serve Area (SA), then the location information of the UE is information of a cell where the UE is located;
if the MBMS service transmission area information as acquired by the UE indicates to the UE that the MBMS service is transmitted within all MBSFN areas which correspond to the SA and comprise the SA, then the location information of the UE is the information of the MBSFN areas where the UE is located. 8. The method of claim 5, wherein the comparing step occurs in response to the following events:
after the UE is powered on or enters into a new cell, a set of MBMS services of the UE's interest is not empty; or the set of MBMS services of the UE's interest changes; or a predetermined time period elapses. 9. An apparatus for performing Multimedia Broadcast Multicast Service (MBMS) communications, comprising
MBMS service location acquiring means configured to acquire location area information of an MBMS service distribution; and MBMS service location notifying means configured to notify a User Equipment (UE) of the location area information of the MBMS service distribution. 10. The apparatus of claim 9, wherein the location area information of the MBMS service distribution comprises Service Area (SA) information and mapping relationship information between cells and the SA; or
the location area information of the MBMS service distribution comprises mobility management logical area information. 11. The apparatus of claim 9, further comprising:
MBMS service location embedding means configured to embed the acquired location area information of the MBMS service distribution into MBMS service description metadata; and wherein the MBMS service location notification means comprises: means for, during a service announcement or service discovery process, notifying the UE of the location area information of the MBMS service distribution by utilizing the MBMS service description metadata. 12. (canceled) 13. An apparatus for receiving a Multimedia Broadcast Multicast Service (MBMS), comprising:
MBMS service location receiving means configured to receive location area information of an MBMS service distribution; location information comparing means configured to compare location information of a User Equipment (UE) with location area information of the MBMS service distribution; and determining means configured to determine whether to read an MBMS Control Channel (MCCH) and MCCH information change notification based on a comparing result. 14. The apparatus of claim 13, wherein the location information of the UE is information of a cell where the UE is located or information of a Multicast Broadcast Single Frequency Network (MBSFN) area where the UE is located. 15. The apparatus of claim 14, wherein if MBMS service transmission area information as acquired by the UE indicates to the UE that the MBMS service is transmitted within a Service Area (SA), then the location information of the UE is information of a cell where the UE is located;
if the MBMS service transmission area information as acquired by the UE indicates to the UE that the MBMS service is transmitted within all MBSFN areas which correspond to the SA and comprise the SA, then the location information of the UE is the information of the MBSFN areas where the UE is located. 16. The apparatus of claim 13, wherein the location information comparing means operates in response to the following events:
after the UE is powered on or enters into a new cell, a set of MBMS services of the UE's interest is not empty; or the set of MBMS services of the UE's interest changes; or a predetermined time period elapses. | Embodiments of the present invention provide a method and apparatus for performing MBMS service communications and a method and apparatus for receiving an MBMS service. Specifically, there is provided a method for performing MBMS service communications, comprising acquiring location area information of an MBMS service distribution; and notifying a UE of the location area information of the MBMS service distribution. Further, there is provided a method for receiving an MBMS service, comprising receiving location area information of an MBMS service distribution; comparing location information of a UE with the location area information of the MBMS service distribution; and determining whether to read an MCCH and MCCH information change notification based on a comparison result.1. A method for performing Multimedia Broadcast Multicast Service (MBMS) communications, comprising:
acquiring location area information of an MBMS service distribution; and notifying a User Equipment (UE) of the location area information of the MBMS service distribution. 2. The method of claim 1, wherein the location area information of the MBMS service distribution comprises Service Area (SA) information and mapping relationship information between cells and the SA; or
the location area information of the MBMS service distribution comprises mobility management logical area information. 3. The method of claim 1, further comprising:
embedding the acquired location area information of the MBMS service distribution into MBMS service description metadata; and wherein notifying the UE of the location area information of the MBMS service distribution comprises: during a service announcement or service discovery process, notifying the UE of the location area information of the MBMS service distribution by utilizing the MBMS service description metadata. 4. (canceled) 5. A method for receiving a Multimedia Broadcast Multicast Service (MBMS), comprising:
receiving location area information of an MBMS service distribution; comparing location information of a User Equipment (UE) with location area information of the MBMS service distribution; and determining whether to read an MBMS Control Channel (MCCH) and MCCH information change notification based on a comparing result. 6. The method of claim 5, wherein the location information of the UE is information of a cell where the UE is located or information of a Multicast Broadcast Single Frequency Network (MBSFN) area where the UE is located. 7. The method of claim 6, wherein if MBMS service transmission area information as acquired by the UE indicates to the UE that an MBMS service is transmitted within a Serve Area (SA), then the location information of the UE is information of a cell where the UE is located;
if the MBMS service transmission area information as acquired by the UE indicates to the UE that the MBMS service is transmitted within all MBSFN areas which correspond to the SA and comprise the SA, then the location information of the UE is the information of the MBSFN areas where the UE is located. 8. The method of claim 5, wherein the comparing step occurs in response to the following events:
after the UE is powered on or enters into a new cell, a set of MBMS services of the UE's interest is not empty; or the set of MBMS services of the UE's interest changes; or a predetermined time period elapses. 9. An apparatus for performing Multimedia Broadcast Multicast Service (MBMS) communications, comprising
MBMS service location acquiring means configured to acquire location area information of an MBMS service distribution; and MBMS service location notifying means configured to notify a User Equipment (UE) of the location area information of the MBMS service distribution. 10. The apparatus of claim 9, wherein the location area information of the MBMS service distribution comprises Service Area (SA) information and mapping relationship information between cells and the SA; or
the location area information of the MBMS service distribution comprises mobility management logical area information. 11. The apparatus of claim 9, further comprising:
MBMS service location embedding means configured to embed the acquired location area information of the MBMS service distribution into MBMS service description metadata; and wherein the MBMS service location notification means comprises: means for, during a service announcement or service discovery process, notifying the UE of the location area information of the MBMS service distribution by utilizing the MBMS service description metadata. 12. (canceled) 13. An apparatus for receiving a Multimedia Broadcast Multicast Service (MBMS), comprising:
MBMS service location receiving means configured to receive location area information of an MBMS service distribution; location information comparing means configured to compare location information of a User Equipment (UE) with location area information of the MBMS service distribution; and determining means configured to determine whether to read an MBMS Control Channel (MCCH) and MCCH information change notification based on a comparing result. 14. The apparatus of claim 13, wherein the location information of the UE is information of a cell where the UE is located or information of a Multicast Broadcast Single Frequency Network (MBSFN) area where the UE is located. 15. The apparatus of claim 14, wherein if MBMS service transmission area information as acquired by the UE indicates to the UE that the MBMS service is transmitted within a Service Area (SA), then the location information of the UE is information of a cell where the UE is located;
if the MBMS service transmission area information as acquired by the UE indicates to the UE that the MBMS service is transmitted within all MBSFN areas which correspond to the SA and comprise the SA, then the location information of the UE is the information of the MBSFN areas where the UE is located. 16. The apparatus of claim 13, wherein the location information comparing means operates in response to the following events:
after the UE is powered on or enters into a new cell, a set of MBMS services of the UE's interest is not empty; or the set of MBMS services of the UE's interest changes; or a predetermined time period elapses. | 2,400 |
7,161 | 7,161 | 13,332,054 | 2,485 | In one example, an apparatus is disclosed for coding coefficients associated with a block of video data during a video coding process, the apparatus comprising a video coder configured to code information that identifies a scanning order associated with the block, wherein to code the information that identifies the scanning order associated with the block, the video coder is configured to determine a most probable scanning order for the block, and code an indication of whether the scanning order associated with the block is the most probable scanning order. In another example, to code the information that identifies the scanning order associated with the block, the video coder is further configured to, in the event the scanning order associated with the block is not the most probable scanning order, code an indication of the scanning order associated with the block. | 1. A method of coding coefficients associated with a block of video data during a video coding process, the method comprising:
coding information that identifies a scanning order associated with the block, including determining a most probable scanning order for the block, and coding an indication of whether the scanning order associated with the block is the most probable scanning order. 2. The method of claim 1, wherein determining the most probable scanning order for the block comprises determining a most probable scanning order for the block based on a prediction mode and a size associated with the block. 3. The method of claim 1, wherein coding the indication of whether the scanning order associated with the block is the most probable scanning order comprises performing a context adaptive entropy coding process that includes applying a context model based on at least one context, wherein the at least one context includes one of the most probable scanning order, a prediction mode associated with the block, and a size associated with the block. 4. The method of claim 1, further comprising:
in the event the scanning order associated with the block is not the most probable scanning order, using a zig-zag scanning order to code the coefficients associated with the block. 5. The method of claim 1, wherein coding the information that identifies the scanning order associated with the block further includes:
in the event the scanning order associated with the block is not the most probable scanning order, coding an indication of the scanning order associated with the block. 6. The method of claim 5, wherein coding the indication of the scanning order associated with the block comprises performing a context adaptive entropy coding process that includes applying a context model based on at least one context, wherein the at least one context includes one of the most probable scanning order, a prediction mode associated with the block, and a size associated with the block. 7. The method of claim 1, wherein determining the most probable scanning order for the block comprises designating a zig-zag scanning order as the most probable scanning order for the block. 8. The method of claim 1, wherein each of the scanning order associated with the block and the most probable scanning order comprises one of a zig-zag scanning order, a horizontal scanning order, a vertical scanning order, and a diagonal scanning order. 9. The method of claim 1, further comprising coding information that identifies a position of a last non-zero coefficient within the block according to the scanning order associated with the block. 10. The method of claim 1, further comprising coding information that identifies positions of non-zero coefficients within the block. 11. An apparatus for coding coefficients associated with a block of video data during a video coding process, the apparatus comprising a video coder configured to:
code information that identifies a scanning order associated with the block, wherein to code the information that identifies the scanning order associated with the block, the video coder is configured to determine a most probable scanning order for the block, and code an indication of whether the scanning order associated with the block is the most probable scanning order. 12. The apparatus of claim 11, wherein to determine the most probable scanning order for the block, the video coder is configured to determine a most probable scanning order for the block based on a prediction mode and a size associated with the block. 13. The apparatus of claim 11, wherein to code the indication of whether the scanning order associated with the block is the most probable scanning order, the video coder is configured to perform a context adaptive entropy coding process that includes the video coder applying a context model based on at least one context, wherein the at least one context includes one of the most probable scanning order, a prediction mode associated with the block, and a size associated with the block. 14. The apparatus of claim 11, wherein the video coder is further configured to:
in the event the scanning order associated with the block is not the most probable scanning order, use a zig-zag scanning order to code the coefficients associated with the block. 15. The apparatus of claim 11, wherein to code the information that identifies the scanning order associated with the block, the video coder is further configured to:
in the event the scanning order associated with the block is not the most probable scanning order, code an indication of the scanning order associated with the block. 16. The apparatus of claim 15, wherein to code the indication of the scanning order associated with the block, the video coder is configured to perform a context adaptive entropy coding process that includes the video coder applying a context model based on at least one context, wherein the at least one context includes one of the most probable scanning order, a prediction mode associated with the block, and a size associated with the block. 17. The apparatus of claim 11, wherein to determine the most probable scanning order for the block, the video coder is configured to designate a zig-zag scanning order as the most probable scanning order for the block. 18. The apparatus of claim 11, wherein each of the scanning order associated with the block and the most probable scanning order comprises one of a zig-zag scanning order, a horizontal scanning order, a vertical scanning order, and a diagonal scanning order. 19. The apparatus of claim 11, wherein the video coder is further configured to code information that identifies a position of a last non-zero coefficient within the block according to the scanning order associated with the block. 20. The apparatus of claim 11, wherein the video coder is further configured to code information that identifies positions of non-zero coefficients within the block. 21. The apparatus of claim 11, wherein the apparatus comprises at least one of:
an integrated circuit; a microprocessor; and a wireless communication device that includes the video coder. 22. A device for coding coefficients associated with a block of video data during a video coding process, the device comprising:
means for coding information that identifies a scanning order associated with the block, including means for determining a most probable scanning order for the block, and means for coding an indication of whether the scanning order associated with the block is the most probable scanning order. 23. The device of claim 22, wherein the means for determining the most probable scanning order for the block comprises means for determining a most probable scanning order for the block based on a prediction mode and a size associated with the block. 24. The device of claim 22, wherein the means for coding the indication of whether the scanning order associated with the block is the most probable scanning order comprises means for performing a context adaptive entropy coding process that includes applying a context model based on at least one context, wherein the at least one context includes one of the most probable scanning order, a prediction mode associated with the block, and a size associated with the block. 25. The device of claim 22, further comprising:
means for, in the event the scanning order associated with the block is not the most probable scanning order, using a zig-zag scanning order to code the coefficients associated with the block. 26. The device of claim 22, wherein the means for coding the information that identifies the scanning order associated with the block further includes:
means for, in the event the scanning order associated with the block is not the most probable scanning order, coding an indication of the scanning order associated with the block. 27. The device of claim 26, wherein the means for coding the indication of the scanning order associated with the block comprises means for performing a context adaptive entropy coding process that includes applying a context model based on at least one context, wherein the at least one context includes one of the most probable scanning order, a prediction mode associated with the block, and a size associated with the block. 28. The device of claim 22, wherein the means for determining the most probable scanning order for the block comprises means for designating a zig-zag scanning order as the most probable scanning order for the block. 29. The device of claim 22, wherein each of the scanning order associated with the block and the most probable scanning order comprises one of a zig-zag scanning order, a horizontal scanning order, a vertical scanning order, and a diagonal scanning order. 30. The device of claim 22, further comprising means for coding information that identifies a position of a last non-zero coefficient within the block according to the scanning order associated with the block. 31. The device of claim 22, further comprising means for coding information that identifies positions of non-zero coefficients within the block. 32. A computer-readable medium comprising instructions that, when executed, cause a processor to code coefficients associated with a block of video data during a video coding process, wherein the instructions cause the processor to:
code information that identifies a scanning order associated with the block, wherein the instructions that cause the processor to code the information that identifies the scanning order associated with the block comprise instructions that cause the processor to determine a most probable scanning order for the block, and code an indication of whether the scanning order associated with the block is the most probable scanning order. 33. The computer-readable medium of claim 32, wherein the instructions that cause the processor to determine the most probable scanning order for the block comprise instructions that cause the processor to determine a most probable scanning order for the block based on a prediction mode and a size associated with the block. 34. The computer-readable medium of claim 32, wherein the instructions that cause the processor to code the indication of whether the scanning order associated with the block is the most probable scanning order comprise instructions that cause the processor to perform a context adaptive entropy coding process that includes applying a context model based on at least one context, wherein the at least one context includes one of the most probable scanning order, a prediction mode associated with the block, and a size associated with the block. 35. The computer-readable medium of claim 32, wherein the instructions that cause the processor to code the coefficients associated with the block during the video coding process further cause the processor to:
in the event the scanning order associated with the block is not the most probable scanning order, use a zig-zag scanning order to code the coefficients associated with the block. 36. The computer-readable medium of claim 32, wherein the instructions that cause the processor to code the information that identifies the scanning order associated with the block further comprise instructions that cause the processor to:
in the event the scanning order associated with the block is not the most probable scanning order, code an indication of the scanning order associated with the block. 37. The computer-readable medium of claim 36, wherein the instructions that cause the processor to code the indication of the scanning order associated with the block comprise instructions that cause the processor to perform a context adaptive entropy coding process that includes applying a context model based on at least one context, wherein the at least one context includes one of the most probable scanning order, a prediction mode associated with the block, and a size associated with the block. 38. The computer-readable medium of claim 32, wherein the instructions that cause the processor to determine the most probable scanning order for the block comprise instructions that cause the processor to designate a zig-zag scanning order as the most probable scanning order for the block. 39. The computer-readable medium of claim 32, wherein each of the scanning order associated with the block and the most probable scanning order comprises one of a zig-zag scanning order, a horizontal scanning order, a vertical scanning order, and a diagonal scanning order. 40. The computer-readable medium of claim 32, wherein the instructions that cause the processor to code the coefficients associated with the block during the video coding process further cause the processor to:
code information that identifies a position of a last non-zero coefficient within the block according to the scanning order associated with the block. 41. The computer-readable medium of claim 32, wherein the instructions that cause the processor to code the coefficients associated with the block during the video coding process further cause the processor to:
code information that identifies positions of non-zero coefficients within the block. | In one example, an apparatus is disclosed for coding coefficients associated with a block of video data during a video coding process, the apparatus comprising a video coder configured to code information that identifies a scanning order associated with the block, wherein to code the information that identifies the scanning order associated with the block, the video coder is configured to determine a most probable scanning order for the block, and code an indication of whether the scanning order associated with the block is the most probable scanning order. In another example, to code the information that identifies the scanning order associated with the block, the video coder is further configured to, in the event the scanning order associated with the block is not the most probable scanning order, code an indication of the scanning order associated with the block.1. A method of coding coefficients associated with a block of video data during a video coding process, the method comprising:
coding information that identifies a scanning order associated with the block, including determining a most probable scanning order for the block, and coding an indication of whether the scanning order associated with the block is the most probable scanning order. 2. The method of claim 1, wherein determining the most probable scanning order for the block comprises determining a most probable scanning order for the block based on a prediction mode and a size associated with the block. 3. The method of claim 1, wherein coding the indication of whether the scanning order associated with the block is the most probable scanning order comprises performing a context adaptive entropy coding process that includes applying a context model based on at least one context, wherein the at least one context includes one of the most probable scanning order, a prediction mode associated with the block, and a size associated with the block. 4. The method of claim 1, further comprising:
in the event the scanning order associated with the block is not the most probable scanning order, using a zig-zag scanning order to code the coefficients associated with the block. 5. The method of claim 1, wherein coding the information that identifies the scanning order associated with the block further includes:
in the event the scanning order associated with the block is not the most probable scanning order, coding an indication of the scanning order associated with the block. 6. The method of claim 5, wherein coding the indication of the scanning order associated with the block comprises performing a context adaptive entropy coding process that includes applying a context model based on at least one context, wherein the at least one context includes one of the most probable scanning order, a prediction mode associated with the block, and a size associated with the block. 7. The method of claim 1, wherein determining the most probable scanning order for the block comprises designating a zig-zag scanning order as the most probable scanning order for the block. 8. The method of claim 1, wherein each of the scanning order associated with the block and the most probable scanning order comprises one of a zig-zag scanning order, a horizontal scanning order, a vertical scanning order, and a diagonal scanning order. 9. The method of claim 1, further comprising coding information that identifies a position of a last non-zero coefficient within the block according to the scanning order associated with the block. 10. The method of claim 1, further comprising coding information that identifies positions of non-zero coefficients within the block. 11. An apparatus for coding coefficients associated with a block of video data during a video coding process, the apparatus comprising a video coder configured to:
code information that identifies a scanning order associated with the block, wherein to code the information that identifies the scanning order associated with the block, the video coder is configured to determine a most probable scanning order for the block, and code an indication of whether the scanning order associated with the block is the most probable scanning order. 12. The apparatus of claim 11, wherein to determine the most probable scanning order for the block, the video coder is configured to determine a most probable scanning order for the block based on a prediction mode and a size associated with the block. 13. The apparatus of claim 11, wherein to code the indication of whether the scanning order associated with the block is the most probable scanning order, the video coder is configured to perform a context adaptive entropy coding process that includes the video coder applying a context model based on at least one context, wherein the at least one context includes one of the most probable scanning order, a prediction mode associated with the block, and a size associated with the block. 14. The apparatus of claim 11, wherein the video coder is further configured to:
in the event the scanning order associated with the block is not the most probable scanning order, use a zig-zag scanning order to code the coefficients associated with the block. 15. The apparatus of claim 11, wherein to code the information that identifies the scanning order associated with the block, the video coder is further configured to:
in the event the scanning order associated with the block is not the most probable scanning order, code an indication of the scanning order associated with the block. 16. The apparatus of claim 15, wherein to code the indication of the scanning order associated with the block, the video coder is configured to perform a context adaptive entropy coding process that includes the video coder applying a context model based on at least one context, wherein the at least one context includes one of the most probable scanning order, a prediction mode associated with the block, and a size associated with the block. 17. The apparatus of claim 11, wherein to determine the most probable scanning order for the block, the video coder is configured to designate a zig-zag scanning order as the most probable scanning order for the block. 18. The apparatus of claim 11, wherein each of the scanning order associated with the block and the most probable scanning order comprises one of a zig-zag scanning order, a horizontal scanning order, a vertical scanning order, and a diagonal scanning order. 19. The apparatus of claim 11, wherein the video coder is further configured to code information that identifies a position of a last non-zero coefficient within the block according to the scanning order associated with the block. 20. The apparatus of claim 11, wherein the video coder is further configured to code information that identifies positions of non-zero coefficients within the block. 21. The apparatus of claim 11, wherein the apparatus comprises at least one of:
an integrated circuit; a microprocessor; and a wireless communication device that includes the video coder. 22. A device for coding coefficients associated with a block of video data during a video coding process, the device comprising:
means for coding information that identifies a scanning order associated with the block, including means for determining a most probable scanning order for the block, and means for coding an indication of whether the scanning order associated with the block is the most probable scanning order. 23. The device of claim 22, wherein the means for determining the most probable scanning order for the block comprises means for determining a most probable scanning order for the block based on a prediction mode and a size associated with the block. 24. The device of claim 22, wherein the means for coding the indication of whether the scanning order associated with the block is the most probable scanning order comprises means for performing a context adaptive entropy coding process that includes applying a context model based on at least one context, wherein the at least one context includes one of the most probable scanning order, a prediction mode associated with the block, and a size associated with the block. 25. The device of claim 22, further comprising:
means for, in the event the scanning order associated with the block is not the most probable scanning order, using a zig-zag scanning order to code the coefficients associated with the block. 26. The device of claim 22, wherein the means for coding the information that identifies the scanning order associated with the block further includes:
means for, in the event the scanning order associated with the block is not the most probable scanning order, coding an indication of the scanning order associated with the block. 27. The device of claim 26, wherein the means for coding the indication of the scanning order associated with the block comprises means for performing a context adaptive entropy coding process that includes applying a context model based on at least one context, wherein the at least one context includes one of the most probable scanning order, a prediction mode associated with the block, and a size associated with the block. 28. The device of claim 22, wherein the means for determining the most probable scanning order for the block comprises means for designating a zig-zag scanning order as the most probable scanning order for the block. 29. The device of claim 22, wherein each of the scanning order associated with the block and the most probable scanning order comprises one of a zig-zag scanning order, a horizontal scanning order, a vertical scanning order, and a diagonal scanning order. 30. The device of claim 22, further comprising means for coding information that identifies a position of a last non-zero coefficient within the block according to the scanning order associated with the block. 31. The device of claim 22, further comprising means for coding information that identifies positions of non-zero coefficients within the block. 32. A computer-readable medium comprising instructions that, when executed, cause a processor to code coefficients associated with a block of video data during a video coding process, wherein the instructions cause the processor to:
code information that identifies a scanning order associated with the block, wherein the instructions that cause the processor to code the information that identifies the scanning order associated with the block comprise instructions that cause the processor to determine a most probable scanning order for the block, and code an indication of whether the scanning order associated with the block is the most probable scanning order. 33. The computer-readable medium of claim 32, wherein the instructions that cause the processor to determine the most probable scanning order for the block comprise instructions that cause the processor to determine a most probable scanning order for the block based on a prediction mode and a size associated with the block. 34. The computer-readable medium of claim 32, wherein the instructions that cause the processor to code the indication of whether the scanning order associated with the block is the most probable scanning order comprise instructions that cause the processor to perform a context adaptive entropy coding process that includes applying a context model based on at least one context, wherein the at least one context includes one of the most probable scanning order, a prediction mode associated with the block, and a size associated with the block. 35. The computer-readable medium of claim 32, wherein the instructions that cause the processor to code the coefficients associated with the block during the video coding process further cause the processor to:
in the event the scanning order associated with the block is not the most probable scanning order, use a zig-zag scanning order to code the coefficients associated with the block. 36. The computer-readable medium of claim 32, wherein the instructions that cause the processor to code the information that identifies the scanning order associated with the block further comprise instructions that cause the processor to:
in the event the scanning order associated with the block is not the most probable scanning order, code an indication of the scanning order associated with the block. 37. The computer-readable medium of claim 36, wherein the instructions that cause the processor to code the indication of the scanning order associated with the block comprise instructions that cause the processor to perform a context adaptive entropy coding process that includes applying a context model based on at least one context, wherein the at least one context includes one of the most probable scanning order, a prediction mode associated with the block, and a size associated with the block. 38. The computer-readable medium of claim 32, wherein the instructions that cause the processor to determine the most probable scanning order for the block comprise instructions that cause the processor to designate a zig-zag scanning order as the most probable scanning order for the block. 39. The computer-readable medium of claim 32, wherein each of the scanning order associated with the block and the most probable scanning order comprises one of a zig-zag scanning order, a horizontal scanning order, a vertical scanning order, and a diagonal scanning order. 40. The computer-readable medium of claim 32, wherein the instructions that cause the processor to code the coefficients associated with the block during the video coding process further cause the processor to:
code information that identifies a position of a last non-zero coefficient within the block according to the scanning order associated with the block. 41. The computer-readable medium of claim 32, wherein the instructions that cause the processor to code the coefficients associated with the block during the video coding process further cause the processor to:
code information that identifies positions of non-zero coefficients within the block. | 2,400 |
7,162 | 7,162 | 14,764,670 | 2,495 | Providing a targeted security alert can include collecting participant data from a plurality of participants within a threat exchange community, calculating, using a threat exchange server, a threat relevancy score of a participant among the plurality of participants within the threat exchange community using the collected participant data, and providing, from the threat exchange server to the participant, the targeted security alert based on the calculated threat relevancy score via a communication link within the threat exchange community. | 1. A method for providing a targeted security alert, the method comprising:
collecting participant data from a plurality of participants within a threat exchange community; calculating, using a threat exchange server, a threat relevancy score of a participant among the plurality of participants using the collected participant data; and providing, from the threat exchange server to the participant, a targeted security alert based on the calculated threat relevancy score via a communication link within the threat exchange community. 2. The method of claim 1, wherein calculating the threat relevancy score includes statistically modeling a probability that a security occurrence is relevant to the participant based on a subset of the collected participant data. 3. The method of claim 1, wherein calculating the threat relevancy score includes statistically modeling a probability that the participant will be attacked by an exploit against a vulnerability. 4. The method of claim 1, further including grouping the plurality of participants into a plurality of clusters based on the participant provided data. 5. The method of claim 4, wherein calculating the threat relevancy score includes comparing the participant to a cluster among the plurality of clusters. 6. A non-transitory computer-readable medium storing a set of instructions executable by a processing resource, wherein the set of instructions can be executed by the processing resource to:
collect characteristic data and security data from a plurality of participants within a threat exchange community; group the plurality of participants into a plurality of clusters based on the collected characteristic data and security data; calculate, using a threat exchange server, a threat relevancy score of a participant among the plurality of participants using security data from the participant and a cluster among the plurality of clusters; and provide, from the threat exchange server to the participant, a targeted security alert based on the calculated threat relevancy score via a communication link within the threat exchange community. 7. The medium of claim 6, wherein the instructions executable by the processing resource include instructions executable to group the plurality of participants into a plurality of clusters based on common security occurrence patterns identified from security data collected. 8. The medium of claim 6, wherein the instructions executable by the processing resource to provide the targeted security alert include instructions to send the targeted security alert to the participant in response to the threat relevancy score being beyond a threshold score. 9. The medium of claim 6, wherein the instructions executable by the processing resource to calculate the threat relevancy score of the participant include instructions to consider security context to identify a threat level. 10. The medium of claim 6, wherein the instructions executable by the processing resource to provide the targeted security alert include instructions to provide supporting evidence in the targeted security alert. 11. The medium of claim 6, wherein the instructions executable by the processing resource to calculate the threat relevancy score of the participant include instructions to determine a similarity of the participant to the cluster. 12. A system for sending targeted security alerts comprising:
a processing resource; and a memory resource communicatively coupled to the processing resource containing instructions executable by the processing resource to:
register a plurality of participants within a threat exchange community, including collecting characteristic data from the plurality of participants;
continuously collect security data from the plurality of participants;
dynamically group the plurality of participants into a plurality of clusters based on behaviors identified from the characteristic data and security data;
calculate, using a threat exchange server, a threat relevancy score of a participant among the plurality of participants using security data from the participant and a cluster among the plurality of clusters; and
provide, from the threat exchange server to the participant, a targeted security alert based on the calculated threat relevancy score via a communication link within the threat exchange community. 13. The system of claim 12, wherein the instructions executable to calculate the threat relevancy score to the participant include instructions to calculate a higher threat relevancy score of the participant in response to a verified security attack against the cluster and the participant being in the cluster. 14. The system of claim 12, wherein the instructions executable to provide the targeted security alert include instructions to provide the targeted security alert in response to the threat relevancy score being above a threshold score. 15. The system of claim 12, wherein the instructions are executable to dynamically group the participants based on information inferred using the continuously collected security data. | Providing a targeted security alert can include collecting participant data from a plurality of participants within a threat exchange community, calculating, using a threat exchange server, a threat relevancy score of a participant among the plurality of participants within the threat exchange community using the collected participant data, and providing, from the threat exchange server to the participant, the targeted security alert based on the calculated threat relevancy score via a communication link within the threat exchange community.1. A method for providing a targeted security alert, the method comprising:
collecting participant data from a plurality of participants within a threat exchange community; calculating, using a threat exchange server, a threat relevancy score of a participant among the plurality of participants using the collected participant data; and providing, from the threat exchange server to the participant, a targeted security alert based on the calculated threat relevancy score via a communication link within the threat exchange community. 2. The method of claim 1, wherein calculating the threat relevancy score includes statistically modeling a probability that a security occurrence is relevant to the participant based on a subset of the collected participant data. 3. The method of claim 1, wherein calculating the threat relevancy score includes statistically modeling a probability that the participant will be attacked by an exploit against a vulnerability. 4. The method of claim 1, further including grouping the plurality of participants into a plurality of clusters based on the participant provided data. 5. The method of claim 4, wherein calculating the threat relevancy score includes comparing the participant to a cluster among the plurality of clusters. 6. A non-transitory computer-readable medium storing a set of instructions executable by a processing resource, wherein the set of instructions can be executed by the processing resource to:
collect characteristic data and security data from a plurality of participants within a threat exchange community; group the plurality of participants into a plurality of clusters based on the collected characteristic data and security data; calculate, using a threat exchange server, a threat relevancy score of a participant among the plurality of participants using security data from the participant and a cluster among the plurality of clusters; and provide, from the threat exchange server to the participant, a targeted security alert based on the calculated threat relevancy score via a communication link within the threat exchange community. 7. The medium of claim 6, wherein the instructions executable by the processing resource include instructions executable to group the plurality of participants into a plurality of clusters based on common security occurrence patterns identified from security data collected. 8. The medium of claim 6, wherein the instructions executable by the processing resource to provide the targeted security alert include instructions to send the targeted security alert to the participant in response to the threat relevancy score being beyond a threshold score. 9. The medium of claim 6, wherein the instructions executable by the processing resource to calculate the threat relevancy score of the participant include instructions to consider security context to identify a threat level. 10. The medium of claim 6, wherein the instructions executable by the processing resource to provide the targeted security alert include instructions to provide supporting evidence in the targeted security alert. 11. The medium of claim 6, wherein the instructions executable by the processing resource to calculate the threat relevancy score of the participant include instructions to determine a similarity of the participant to the cluster. 12. A system for sending targeted security alerts comprising:
a processing resource; and a memory resource communicatively coupled to the processing resource containing instructions executable by the processing resource to:
register a plurality of participants within a threat exchange community, including collecting characteristic data from the plurality of participants;
continuously collect security data from the plurality of participants;
dynamically group the plurality of participants into a plurality of clusters based on behaviors identified from the characteristic data and security data;
calculate, using a threat exchange server, a threat relevancy score of a participant among the plurality of participants using security data from the participant and a cluster among the plurality of clusters; and
provide, from the threat exchange server to the participant, a targeted security alert based on the calculated threat relevancy score via a communication link within the threat exchange community. 13. The system of claim 12, wherein the instructions executable to calculate the threat relevancy score to the participant include instructions to calculate a higher threat relevancy score of the participant in response to a verified security attack against the cluster and the participant being in the cluster. 14. The system of claim 12, wherein the instructions executable to provide the targeted security alert include instructions to provide the targeted security alert in response to the threat relevancy score being above a threshold score. 15. The system of claim 12, wherein the instructions are executable to dynamically group the participants based on information inferred using the continuously collected security data. | 2,400 |
7,163 | 7,163 | 15,293,963 | 2,431 | Systems and methods for tracking malware operator behavior patterns in a network environment simulated for an extended period of time include a processor that causes the system to receive organizational data that describes a virtual organization, obtain additional data related to the organizational data, and provide a simulated computer network of the virtual organization based on the organizational data. The process can further cause the system to install at least one malware on the simulated computer network, monitor one or more interactions between the simulated computer network and an operator of the malware, and build a malware operator profile that characterizes the operator of the malware based on the one or more interactions, with which the operator of the malware can be identified in subsequent interactions. | 1. A system for tracking malware operator behavior patterns in a simulated network environment, the system comprising:
a memory storing instructions; and a processor device that is coupled to the memory and, when executing the instructions, is configured to:
receive organizational data that describes a virtual organization and comprises a plurality of simulated users that are logged into a plurality of simulated machines;
create user profiles for the plurality of simulated users;
provide a simulated computer network of the virtual organization based at least partially on the organizational data and the user profiles, wherein after the simulated computer network is provided, malware is installed on the simulated computer network to create an incubator; and
monitor one or more interactions between the simulated computer network and an operator of the malware, wherein the one or more interactions comprise the operator of the malware illicitly gathering information related to the user profiles. 2. The system of claim 1, wherein the organizational data includes at least one of a characteristic, a feature, or an attribute of the virtual organization. 3. The system of claim 1, wherein the processing device is further configured to provide a user interface based on the organizational data of the virtual organization to obtain career detail information for the plurality of simulated users. 4. The system of claim 1, wherein the organizational data includes at least one of a domain, a number of users, an industry, a keyword, or malware information. 5. The system of claim 1, wherein the organizational data includes at least one keyword associated with the virtual organization, and the processing device is further configured to obtain career detail information for the plurality of simulated users based on the at least one keyword, and wherein the career detail information includes at least one of a personnel hierarchy and personnel identities. 6. The system of claim 5, wherein the personnel identities include at least one of a personnel name, a job position, and a job title. 7. The system of claim 1, wherein the organizational data includes an industry and at least one keyword associated with the virtual organization, and the processing device is further configured to obtain career detail information for the plurality of simulated users based on the industry and the at least one keyword, and wherein the career detail information includes one or more documents associated with the industry. 8. The system of claim 1, wherein the simulated computer network includes a plurality of nodes, and the processing device is further configured to install the malware in at least one node included in the plurality of nodes. 9. The system of claim 8, wherein the plurality of nodes includes at least one of a computing machine and a network router. 10. The system of claim 1, wherein the processing device is further configured to provide the simulated computer network of the virtual organization for a predetermined period of time that is greater than one day. 11. The system of claim 1, wherein the processing device is further configured to monitor the one or more interactions between the simulated computer network and the operator of the malware for the predetermined period of time. 12. The system of claim 1, wherein the processing device is configured to build a malware operator profile based on the one or more interactions and identify the operator of the malware based on a malware operator profile. 13. A computer-implemented method for tracking malware operator behavior, the method comprising:
receiving organizational data that describes a virtual organization and comprises a plurality of simulated users that are logged into a plurality of simulated machines; creating user profiles for the plurality of simulated users; providing a simulated computer network of the virtual organization based at least partially on the organizational data and the user profiles, wherein after the simulated computer network is provided, malware is installed on the simulated computer network to create an incubator; and monitoring one or more interactions between the simulated computer network and an operator of the malware, wherein the one or more interactions comprise the operator of the malware illicitly gathering information related to the user profiles. 14. The method of claim 13, further comprising alerting a user when the one or more interactions occur. 15. The method of claim 13, further comprising building a security program that incorporates a malware operator profile, wherein the malware operator profile is based on the one or more interactions, and the security program is configured to identify when the operator of the malware attempts to access another computer network. 16. The method of claim 15, wherein the security program is further configured to block the operator of the malware from accessing the another computer network. 17. A non-transitory computer-readable storage medium including instructions that, when executed by a processor device, cause the processor device to track malware operator behavior, by performing the steps of:
receiving organizational data that describes a virtual organization and comprises a plurality of simulated users that are logged into a plurality of simulated machines; creating user profiles for the plurality of simulated users; providing a simulated computer network of the virtual organization based at least partially on the organizational data and the user profiles, wherein after the simulated computer network is provided, malware is installed on the simulated computer network to create an incubator; and monitoring one or more interactions between the simulated computer network and an operator of the malware, wherein the one or more interactions comprise the operator of the malware illicitly gathering information related to the user profiles. 18. The non-transitory computer-readable storage medium of claim 17, further comprising generating the user profiles using career detail information obtained from searching a website to make the user profiles compatible with the virtual organization. 19. The non-transitory computer-readable storage medium of claim 18, wherein the career detail information comprises one or more real documents from the website. 20. The non-transitory computer-readable storage medium of claim 17, wherein the operator of the malware installs the malware on the simulated computer network. 21. The non-transitory computer-readable storage medium of claim 17, further comprising building a malware operator profile that characterizes the operator of the malware based on the one or more interactions. | Systems and methods for tracking malware operator behavior patterns in a network environment simulated for an extended period of time include a processor that causes the system to receive organizational data that describes a virtual organization, obtain additional data related to the organizational data, and provide a simulated computer network of the virtual organization based on the organizational data. The process can further cause the system to install at least one malware on the simulated computer network, monitor one or more interactions between the simulated computer network and an operator of the malware, and build a malware operator profile that characterizes the operator of the malware based on the one or more interactions, with which the operator of the malware can be identified in subsequent interactions.1. A system for tracking malware operator behavior patterns in a simulated network environment, the system comprising:
a memory storing instructions; and a processor device that is coupled to the memory and, when executing the instructions, is configured to:
receive organizational data that describes a virtual organization and comprises a plurality of simulated users that are logged into a plurality of simulated machines;
create user profiles for the plurality of simulated users;
provide a simulated computer network of the virtual organization based at least partially on the organizational data and the user profiles, wherein after the simulated computer network is provided, malware is installed on the simulated computer network to create an incubator; and
monitor one or more interactions between the simulated computer network and an operator of the malware, wherein the one or more interactions comprise the operator of the malware illicitly gathering information related to the user profiles. 2. The system of claim 1, wherein the organizational data includes at least one of a characteristic, a feature, or an attribute of the virtual organization. 3. The system of claim 1, wherein the processing device is further configured to provide a user interface based on the organizational data of the virtual organization to obtain career detail information for the plurality of simulated users. 4. The system of claim 1, wherein the organizational data includes at least one of a domain, a number of users, an industry, a keyword, or malware information. 5. The system of claim 1, wherein the organizational data includes at least one keyword associated with the virtual organization, and the processing device is further configured to obtain career detail information for the plurality of simulated users based on the at least one keyword, and wherein the career detail information includes at least one of a personnel hierarchy and personnel identities. 6. The system of claim 5, wherein the personnel identities include at least one of a personnel name, a job position, and a job title. 7. The system of claim 1, wherein the organizational data includes an industry and at least one keyword associated with the virtual organization, and the processing device is further configured to obtain career detail information for the plurality of simulated users based on the industry and the at least one keyword, and wherein the career detail information includes one or more documents associated with the industry. 8. The system of claim 1, wherein the simulated computer network includes a plurality of nodes, and the processing device is further configured to install the malware in at least one node included in the plurality of nodes. 9. The system of claim 8, wherein the plurality of nodes includes at least one of a computing machine and a network router. 10. The system of claim 1, wherein the processing device is further configured to provide the simulated computer network of the virtual organization for a predetermined period of time that is greater than one day. 11. The system of claim 1, wherein the processing device is further configured to monitor the one or more interactions between the simulated computer network and the operator of the malware for the predetermined period of time. 12. The system of claim 1, wherein the processing device is configured to build a malware operator profile based on the one or more interactions and identify the operator of the malware based on a malware operator profile. 13. A computer-implemented method for tracking malware operator behavior, the method comprising:
receiving organizational data that describes a virtual organization and comprises a plurality of simulated users that are logged into a plurality of simulated machines; creating user profiles for the plurality of simulated users; providing a simulated computer network of the virtual organization based at least partially on the organizational data and the user profiles, wherein after the simulated computer network is provided, malware is installed on the simulated computer network to create an incubator; and monitoring one or more interactions between the simulated computer network and an operator of the malware, wherein the one or more interactions comprise the operator of the malware illicitly gathering information related to the user profiles. 14. The method of claim 13, further comprising alerting a user when the one or more interactions occur. 15. The method of claim 13, further comprising building a security program that incorporates a malware operator profile, wherein the malware operator profile is based on the one or more interactions, and the security program is configured to identify when the operator of the malware attempts to access another computer network. 16. The method of claim 15, wherein the security program is further configured to block the operator of the malware from accessing the another computer network. 17. A non-transitory computer-readable storage medium including instructions that, when executed by a processor device, cause the processor device to track malware operator behavior, by performing the steps of:
receiving organizational data that describes a virtual organization and comprises a plurality of simulated users that are logged into a plurality of simulated machines; creating user profiles for the plurality of simulated users; providing a simulated computer network of the virtual organization based at least partially on the organizational data and the user profiles, wherein after the simulated computer network is provided, malware is installed on the simulated computer network to create an incubator; and monitoring one or more interactions between the simulated computer network and an operator of the malware, wherein the one or more interactions comprise the operator of the malware illicitly gathering information related to the user profiles. 18. The non-transitory computer-readable storage medium of claim 17, further comprising generating the user profiles using career detail information obtained from searching a website to make the user profiles compatible with the virtual organization. 19. The non-transitory computer-readable storage medium of claim 18, wherein the career detail information comprises one or more real documents from the website. 20. The non-transitory computer-readable storage medium of claim 17, wherein the operator of the malware installs the malware on the simulated computer network. 21. The non-transitory computer-readable storage medium of claim 17, further comprising building a malware operator profile that characterizes the operator of the malware based on the one or more interactions. | 2,400 |
7,164 | 7,164 | 11,207,979 | 2,484 | A method and apparatus for identifying programming that is estimated to meet a preference of a user is provided. An implicitly correlated list is generated using a correlation engine by estimating similarity of user recording logs corresponding to a plurality of users where each user recording log comprises implicit data associated with programming recorded by respective users in the plurality. In a preference engine, an identification of a program is taken from the implicitly-correlated list and matched against content to be broadcast in the future to create a matching list. DVR programming parameters are stored in a memory using the matching list. | 1. A method of identifying programming estimated to meet a preference of a user, the method comprising:
receiving a user recording log comprising implicit data associated with programs recorded by the user over a time period; estimating similarity of the program recording log with user recording logs corresponding to a plurality of other users to create a preference profile for the user; and identifying a program, using the preference profile, for recording from content to be broadcast in the future. 2. The method of claim 1 further including storing DVR programming parameters to schedule the program for recording. 3. The method of claim 1 where the estimating uses an algorithm for correlating the user recording logs. 4. The method of claim 1 where the implicit data is content-independent. 5. The method of claim 1 where the implicit data includes a viewing history. 6. The method of claim 5 where the viewing history indicates a duration of time in which the programs are viewed by the user. 7. The method of claim 5 where the viewing history indicates a frequency in which the programs are viewed by the user. 8. A method of operating a DVR to record programming estimated to meet a preference of a user, the method comprising:
receiving an identification of a program from an implicitly-correlated list, the implicitly correlated list being generated by estimating similarity of user recording logs corresponding to a plurality of users, each user recording log comprising implicit data associated with programming recorded by respective users in the plurality of users; matching the identification against content to be broadcast in the future to create a matching list; and storing DVR programming parameters using the matching list. 9. The method of claim 8 where the matching uses electronic programming guide data. 10. An apparatus for recording video programming, comprising:
a receiving subsystem for receiving an identification of a program from an implicitly-correlated list; a preference engine for matching the identification against content to be broadcast in the future to create a matching list; and a memory for storing DVR programming parameters that are generated using the matching list. 11. The apparatus of claim 10 where the implicitly correlated list is generated by estimating similarity of user recording logs corresponding to a plurality of users, each user recording log comprising implicit data associated with programming recorded by respective users in the plurality of users. 12. The apparatus of claim 10 further including an interactive user interface for displaying DVR recording options to the user. 13. The apparatus of claim 10 further including a user control for interacting with the user interface to thereby input user commands. 14. The apparatus of claim 10 where the preference engine is arranged to scan electronic programming guide data to create the matching list. 15. The apparatus of claim 10 where the receiving subsystem is in periodic communication with a remote server and downloads the identification into a database. 16. The apparatus of claim 10 where the matching list includes ranking information indicative of a degree of correlation between the programming and the preferences of the user. 17. At least one computer-readable medium encoded with instructions which, when executed by a processor, perform a method comprising:
receiving a user recording log comprising implicit data associated with programs recorded by the user over a time period; estimating similarity of the user recording log with user recording logs corresponding to a plurality of other users to create a preference profile for the user; and identifying a program, using the preference profile, for recording from content to be broadcast in the future. 18. The at least one computer medium of claim 17 where the implicit data is content-independent. 19. The at least one computer medium of claim 17 where the implicit data includes a viewing history. 20. The at least one computer medium of claim 19 where the implicit data includes a viewing history includes an indication of a viewing percentage of a program. | A method and apparatus for identifying programming that is estimated to meet a preference of a user is provided. An implicitly correlated list is generated using a correlation engine by estimating similarity of user recording logs corresponding to a plurality of users where each user recording log comprises implicit data associated with programming recorded by respective users in the plurality. In a preference engine, an identification of a program is taken from the implicitly-correlated list and matched against content to be broadcast in the future to create a matching list. DVR programming parameters are stored in a memory using the matching list.1. A method of identifying programming estimated to meet a preference of a user, the method comprising:
receiving a user recording log comprising implicit data associated with programs recorded by the user over a time period; estimating similarity of the program recording log with user recording logs corresponding to a plurality of other users to create a preference profile for the user; and identifying a program, using the preference profile, for recording from content to be broadcast in the future. 2. The method of claim 1 further including storing DVR programming parameters to schedule the program for recording. 3. The method of claim 1 where the estimating uses an algorithm for correlating the user recording logs. 4. The method of claim 1 where the implicit data is content-independent. 5. The method of claim 1 where the implicit data includes a viewing history. 6. The method of claim 5 where the viewing history indicates a duration of time in which the programs are viewed by the user. 7. The method of claim 5 where the viewing history indicates a frequency in which the programs are viewed by the user. 8. A method of operating a DVR to record programming estimated to meet a preference of a user, the method comprising:
receiving an identification of a program from an implicitly-correlated list, the implicitly correlated list being generated by estimating similarity of user recording logs corresponding to a plurality of users, each user recording log comprising implicit data associated with programming recorded by respective users in the plurality of users; matching the identification against content to be broadcast in the future to create a matching list; and storing DVR programming parameters using the matching list. 9. The method of claim 8 where the matching uses electronic programming guide data. 10. An apparatus for recording video programming, comprising:
a receiving subsystem for receiving an identification of a program from an implicitly-correlated list; a preference engine for matching the identification against content to be broadcast in the future to create a matching list; and a memory for storing DVR programming parameters that are generated using the matching list. 11. The apparatus of claim 10 where the implicitly correlated list is generated by estimating similarity of user recording logs corresponding to a plurality of users, each user recording log comprising implicit data associated with programming recorded by respective users in the plurality of users. 12. The apparatus of claim 10 further including an interactive user interface for displaying DVR recording options to the user. 13. The apparatus of claim 10 further including a user control for interacting with the user interface to thereby input user commands. 14. The apparatus of claim 10 where the preference engine is arranged to scan electronic programming guide data to create the matching list. 15. The apparatus of claim 10 where the receiving subsystem is in periodic communication with a remote server and downloads the identification into a database. 16. The apparatus of claim 10 where the matching list includes ranking information indicative of a degree of correlation between the programming and the preferences of the user. 17. At least one computer-readable medium encoded with instructions which, when executed by a processor, perform a method comprising:
receiving a user recording log comprising implicit data associated with programs recorded by the user over a time period; estimating similarity of the user recording log with user recording logs corresponding to a plurality of other users to create a preference profile for the user; and identifying a program, using the preference profile, for recording from content to be broadcast in the future. 18. The at least one computer medium of claim 17 where the implicit data is content-independent. 19. The at least one computer medium of claim 17 where the implicit data includes a viewing history. 20. The at least one computer medium of claim 19 where the implicit data includes a viewing history includes an indication of a viewing percentage of a program. | 2,400 |
7,165 | 7,165 | 14,730,869 | 2,421 | Methods and systems for using text data in content presentation and content search are disclosed. Text data. and a plurality of video frames can be extracted from a content program and stored in a database. Extracted text data can be divided into a plurality of text segments. The plurality of text segments and the plurality of video frames can be presented in the form of an electronic book or guide. In addition, the content program can be divided into a plurality of content segments and stored in the database. The plurality of content segments and the plurality of text segments can be associated by time indices. A user can identify one or more content segments in the database by a query, and notifications can be sent according to the query. | 1. A method comprising:
dividing content into a plurality of content segments, wherein each of the plurality of content segments is associated with a respective time index; extracting text data from the plurality of content segments, wherein the text data comprises closed captioning data; storing the text data and the plurality of content segments in a database; associating one or more of the plurality of content segments with one or more portions of the extracted text data based on the respective time index of each of the plurality of text segments; and identifying one or more of the plurality of content segments in the database in response to a query comprising a text string and a time range within a duration of the plurality of content segments. 2. The method of claim 1, further comprising providing the identified one or more of the plurality of content segments. 3. The method of claim 1, further comprising providing another notification associated with the identified one or more of the plurality of content segments based on the query. 4. The method of claim 3, wherein the other notification is provided via one or more of, a pop-up message, a text message, and an E-mail message. 5. The method of claim 3, wherein the other notification comprises one or more of, a title of the content program associated with the identified one or more of the plurality of content segments, channel information associated with the identified one or more of the plurality of content segments, a link to the identified one or more of the plurality of content segments, and review information associated with the identified one or more of the plurality of content segments. 6. The method of claim 1, wherein each of the respective time indices comprises a start time that an associated one of the plurality of content segments is provided. 7. (canceled) 8. A method comprising:
extracting text data from a content program wherein the text data are divided into a plurality of text segments, wherein each of the plurality of text segments is associated with a respective time index; extracting a plurality of video frames from the content program at a specific time interval; associating each of the plurality of text segments with one or more of the plurality of video frames based on associating the respective time index of each of the plurality of text segments and the specific time interval; and providing one or more of the plurality of text segments and one or more of the plurality of video frames associated with the one or more of the plurality of text segments at the same time, wherein the one or more of the plurality of text segments and the one or more of the plurality of video frames are selected based on a query comprising a text string and a time range within a duration of the plurality of content segments. 9. The method of claim 8, wherein the text data comprises closed captioning data. 10. The method of claim 8, wherein the one or more text segments of the plurality of text segments and the one or more of the plurality of video frames associated with the one or more text segments are provided at least in part simultaneously as an electronic program guide. 11. The method of claim 8, wherein the one or more text segments of the plurality of text segments and the one or more of the plurality of video frames associated with the one or more text segments of the plurality of text segments are provided at least in part simultaneously as an electronic book. 12. The method of claim 8, wherein the one or more text segments of the plurality of text segments and the one or more of the plurality of video frames associated with the one or more text segments of the plurality of text segments are provided based on a time, a text string, or a combination thereof 13. The method of claim 8, wherein the one or more text segments of the plurality of text segments and the one or more of the plurality of video frames associated with the one or more text segments of the plurality of text segments are provided according to a predefined speed. 14. The method of claim 8, further comprising converting each of the plurality of video frames to a plurality of sizes, a plurality of resolutions, and a plurality of formats. 15. The method of claim 8, further comprising, providing the content program starting from a time point associated with a provided video frame via interacting with the provided video frame, wherein one or more text segments is updated to synchronize with the content program being provided. 16. A method comprising:
buffering, into a buffer, a plurality of respective portions of a plurality of content programs from a plurality of linear video streams; extracting text data from the plurality of respective portions of the plurality of content programs in the buffer, wherein the text data are divided into respective pluralities of text segments, wherein each text segment of the pluralities of text segments is associated with a respective time index; extracting a plurality of video frames from each of the plurality of respective portions of the plurality of the content programs at a specific time interval; associating each text segment of the pluralities of text segments with one or more of the pluralities of video frames based on associating the respective time index of each text segment of the pluralities of text segments and the specific time interval; and creating an interface to select at least one of the plurality of linear video streams corresponding to one or more of the pluralities of text segments matching a search query by displaying one or more of the pluralities of text segments and the one or more of the pluralities of video frames associated with the one or more of the pluralities of text segments. 17. The method of claim 16, wherein the interface comprises an electronic program guide. 18. The method of claim 16, wherein the text data comprises closed captioning data. 19. The method of claim 16, wherein the one or more of the pluralities of text segments and the one or more of the pluralities of video frames associated with the one or more of the pluralities of text segments are provided based on a time, a text string, or a combination thereof. 20. The method of claim 16, further comprising converting each of the pluralities of video frames to a plurality of sizes, a plurality of resolutions, and a plurality of formats. 21. The method of claim 16, wherein the search query comprises a text string and a time range within a duration of the plurality of content segments. | Methods and systems for using text data in content presentation and content search are disclosed. Text data. and a plurality of video frames can be extracted from a content program and stored in a database. Extracted text data can be divided into a plurality of text segments. The plurality of text segments and the plurality of video frames can be presented in the form of an electronic book or guide. In addition, the content program can be divided into a plurality of content segments and stored in the database. The plurality of content segments and the plurality of text segments can be associated by time indices. A user can identify one or more content segments in the database by a query, and notifications can be sent according to the query.1. A method comprising:
dividing content into a plurality of content segments, wherein each of the plurality of content segments is associated with a respective time index; extracting text data from the plurality of content segments, wherein the text data comprises closed captioning data; storing the text data and the plurality of content segments in a database; associating one or more of the plurality of content segments with one or more portions of the extracted text data based on the respective time index of each of the plurality of text segments; and identifying one or more of the plurality of content segments in the database in response to a query comprising a text string and a time range within a duration of the plurality of content segments. 2. The method of claim 1, further comprising providing the identified one or more of the plurality of content segments. 3. The method of claim 1, further comprising providing another notification associated with the identified one or more of the plurality of content segments based on the query. 4. The method of claim 3, wherein the other notification is provided via one or more of, a pop-up message, a text message, and an E-mail message. 5. The method of claim 3, wherein the other notification comprises one or more of, a title of the content program associated with the identified one or more of the plurality of content segments, channel information associated with the identified one or more of the plurality of content segments, a link to the identified one or more of the plurality of content segments, and review information associated with the identified one or more of the plurality of content segments. 6. The method of claim 1, wherein each of the respective time indices comprises a start time that an associated one of the plurality of content segments is provided. 7. (canceled) 8. A method comprising:
extracting text data from a content program wherein the text data are divided into a plurality of text segments, wherein each of the plurality of text segments is associated with a respective time index; extracting a plurality of video frames from the content program at a specific time interval; associating each of the plurality of text segments with one or more of the plurality of video frames based on associating the respective time index of each of the plurality of text segments and the specific time interval; and providing one or more of the plurality of text segments and one or more of the plurality of video frames associated with the one or more of the plurality of text segments at the same time, wherein the one or more of the plurality of text segments and the one or more of the plurality of video frames are selected based on a query comprising a text string and a time range within a duration of the plurality of content segments. 9. The method of claim 8, wherein the text data comprises closed captioning data. 10. The method of claim 8, wherein the one or more text segments of the plurality of text segments and the one or more of the plurality of video frames associated with the one or more text segments are provided at least in part simultaneously as an electronic program guide. 11. The method of claim 8, wherein the one or more text segments of the plurality of text segments and the one or more of the plurality of video frames associated with the one or more text segments of the plurality of text segments are provided at least in part simultaneously as an electronic book. 12. The method of claim 8, wherein the one or more text segments of the plurality of text segments and the one or more of the plurality of video frames associated with the one or more text segments of the plurality of text segments are provided based on a time, a text string, or a combination thereof 13. The method of claim 8, wherein the one or more text segments of the plurality of text segments and the one or more of the plurality of video frames associated with the one or more text segments of the plurality of text segments are provided according to a predefined speed. 14. The method of claim 8, further comprising converting each of the plurality of video frames to a plurality of sizes, a plurality of resolutions, and a plurality of formats. 15. The method of claim 8, further comprising, providing the content program starting from a time point associated with a provided video frame via interacting with the provided video frame, wherein one or more text segments is updated to synchronize with the content program being provided. 16. A method comprising:
buffering, into a buffer, a plurality of respective portions of a plurality of content programs from a plurality of linear video streams; extracting text data from the plurality of respective portions of the plurality of content programs in the buffer, wherein the text data are divided into respective pluralities of text segments, wherein each text segment of the pluralities of text segments is associated with a respective time index; extracting a plurality of video frames from each of the plurality of respective portions of the plurality of the content programs at a specific time interval; associating each text segment of the pluralities of text segments with one or more of the pluralities of video frames based on associating the respective time index of each text segment of the pluralities of text segments and the specific time interval; and creating an interface to select at least one of the plurality of linear video streams corresponding to one or more of the pluralities of text segments matching a search query by displaying one or more of the pluralities of text segments and the one or more of the pluralities of video frames associated with the one or more of the pluralities of text segments. 17. The method of claim 16, wherein the interface comprises an electronic program guide. 18. The method of claim 16, wherein the text data comprises closed captioning data. 19. The method of claim 16, wherein the one or more of the pluralities of text segments and the one or more of the pluralities of video frames associated with the one or more of the pluralities of text segments are provided based on a time, a text string, or a combination thereof. 20. The method of claim 16, further comprising converting each of the pluralities of video frames to a plurality of sizes, a plurality of resolutions, and a plurality of formats. 21. The method of claim 16, wherein the search query comprises a text string and a time range within a duration of the plurality of content segments. | 2,400 |
7,166 | 7,166 | 15,231,713 | 2,454 | Providing a mobile device with web-based access to data objects is disclosed. Authentication information is sent from a mobile device to a relay server. The relay server executes a connection application to establish a connection to a web access server. The authentication information is provided to the web access server associated with a data store hosting a data object. Upon authentication, the data object is provided to the relay server from the data store. The data object is then provided to the mobile device. | 1. A method of providing a mobile device web-based access to a data object, the method comprising:
establishing, by a relay server, a connection to a web access server associated with the application server; enabling access of the relay server to the data object hosted by the application server in response to authentication of access to the application server; and receiving, by the relay server, keep-alives from the mobile device to maintain connectivity between the mobile device and the relay server. 2. The method of claim 1, further comprising:
determining, by the relay server, that the data object has been updated; and sending a notification to the mobile device that the object has been updated. 3. The method of claim 1, further comprising:
determining, by the relay server, that the data object has been updated; and automatically sending an updated version of the data object to the mobile device. 4. The method of claim 1, further comprising:
in response to detecting that the data object has been updated, sending a query to determine whether a user of the mobile device wishes to receive an updated version of the data object; and transmitting the updated version of the data object to the mobile device in response to determining that the user wishes to receive the updated version of the data object. 5. The method of claim 1, wherein, the relay server generates keep alives to be sent to the web access server. 6. The method of claim 1, further comprising, sending, by the relay server keep alives to the web access server. 7. The method of claim 1, wherein, the relay server receives instructions from the mobile device to generate keep alives to be sent to the web access server. 8. A method of providing a mobile device web-based access to a data object, the method comprising:
establishing, by a relay server, a connection to a web access server associated with the application server; wherein, access of the relay server to the data object hosted by the application server is enabled in response to authentication of access to the application server; generating, by the relay server, keep alives to be sent to the web access server to maintain connectivity between the relay server and the web access server; and sending the keep alives to the web access server. 9. The method of claim 8, wherein, the relay server receives instructions to generate keep alives to be sent to the web access server. 10. The method of claim 9, wherein, the instructions are received from the mobile device. 11. A method of providing a mobile device web-based access to a data object, the method comprising:
establishing, by a relay server, a connection to a web access server associated with the application server; enabling access of the relay server to the data object hosted by the application server in response to authentication of access to the application server; receiving the data object from the application server and subsequently determining that the data object has been updated; and notifying the mobile device indicating that the data object has been updated. 12. The method of claim 11, further comprising, receiving, at the relay server, credential information for the authentication of access from the mobile device. 13. The method of claim 11, further comprising, retrieving credential information for the authentication of access from a database at the relay server. 14. The method of claim 11, wherein, the notifying the mobile device includes sending an updated version of the data object. 15. The method of claim 11, wherein, the notifying the mobile device includes sending a query to determine whether a user of the mobile device wishes to receive an updated version of the data object. | Providing a mobile device with web-based access to data objects is disclosed. Authentication information is sent from a mobile device to a relay server. The relay server executes a connection application to establish a connection to a web access server. The authentication information is provided to the web access server associated with a data store hosting a data object. Upon authentication, the data object is provided to the relay server from the data store. The data object is then provided to the mobile device.1. A method of providing a mobile device web-based access to a data object, the method comprising:
establishing, by a relay server, a connection to a web access server associated with the application server; enabling access of the relay server to the data object hosted by the application server in response to authentication of access to the application server; and receiving, by the relay server, keep-alives from the mobile device to maintain connectivity between the mobile device and the relay server. 2. The method of claim 1, further comprising:
determining, by the relay server, that the data object has been updated; and sending a notification to the mobile device that the object has been updated. 3. The method of claim 1, further comprising:
determining, by the relay server, that the data object has been updated; and automatically sending an updated version of the data object to the mobile device. 4. The method of claim 1, further comprising:
in response to detecting that the data object has been updated, sending a query to determine whether a user of the mobile device wishes to receive an updated version of the data object; and transmitting the updated version of the data object to the mobile device in response to determining that the user wishes to receive the updated version of the data object. 5. The method of claim 1, wherein, the relay server generates keep alives to be sent to the web access server. 6. The method of claim 1, further comprising, sending, by the relay server keep alives to the web access server. 7. The method of claim 1, wherein, the relay server receives instructions from the mobile device to generate keep alives to be sent to the web access server. 8. A method of providing a mobile device web-based access to a data object, the method comprising:
establishing, by a relay server, a connection to a web access server associated with the application server; wherein, access of the relay server to the data object hosted by the application server is enabled in response to authentication of access to the application server; generating, by the relay server, keep alives to be sent to the web access server to maintain connectivity between the relay server and the web access server; and sending the keep alives to the web access server. 9. The method of claim 8, wherein, the relay server receives instructions to generate keep alives to be sent to the web access server. 10. The method of claim 9, wherein, the instructions are received from the mobile device. 11. A method of providing a mobile device web-based access to a data object, the method comprising:
establishing, by a relay server, a connection to a web access server associated with the application server; enabling access of the relay server to the data object hosted by the application server in response to authentication of access to the application server; receiving the data object from the application server and subsequently determining that the data object has been updated; and notifying the mobile device indicating that the data object has been updated. 12. The method of claim 11, further comprising, receiving, at the relay server, credential information for the authentication of access from the mobile device. 13. The method of claim 11, further comprising, retrieving credential information for the authentication of access from a database at the relay server. 14. The method of claim 11, wherein, the notifying the mobile device includes sending an updated version of the data object. 15. The method of claim 11, wherein, the notifying the mobile device includes sending a query to determine whether a user of the mobile device wishes to receive an updated version of the data object. | 2,400 |
7,167 | 7,167 | 14,035,367 | 2,437 | A method for performing an escalation security policy in a software defined network (SDN) includes receiving at least one attack indication performed against at least one destination server; upon determination that an attack is being performed against the at least one destination server, for each client sending traffic to the at least one destination server: determining a risk state for a user of the each client; obtaining an escalation security policy respective of the determined risk state of the user, wherein the escalation security policy defines a sequence of at least one challenge action for challenging the each client, an order and at least one condition for execution of the sequence of at least one challenge action; and causing network elements of the SDN to divert incoming traffic from the each client to security servers connected to the SDN and configured to perform the at least one challenge action. | 1. A method for performing an escalation security policy in a software defined network (SDN), the method is being performed by a central controller of the SDN, comprising:
receiving at least one attack indication performed against at least one destination server; upon determination, respective of at least one attack indication, that an attack is being performed against the at least one destination server, for each client sending traffic to the at least one destination server:
determining a risk state for a user of the each client;
obtaining an escalation security policy respective of the determined risk state of the user, wherein the escalation security policy defines a sequence of at least one challenge action for challenging the each client, an order and at least one condition for execution of the sequence of at least one challenge action; and
causing network elements of the SDN to divert incoming traffic from the each client to security servers connected to the SDN and configured to perform the at least one challenge action. 2. The method of claim 1, further comprising:
monitoring at least one of health and load of each of the security servers; and switching over to a redundant security server when a respective security server is determined to be nonfunctional or overloaded. 3. The method of claim 2, further comprising:
load balancing clients' traffic among the security servers performing the same challenge action, when the respective security server is determined to be overloaded. 4. The method of claim 1, further comprising checking the identity of the user using at least one of: a source Internet protocol (IP) address of its respective client, application layer parameters, and an identity manager device. 5. The method of claim 1, wherein diverting the incoming traffic further comprising:
diverting the incoming traffic to the security servers according to the order of execution of the sequence of the at least one action and the condition defined in the respective execution security policy. 6. The method of claim 5, wherein the at least one condition defined in the escalation policy includes at least one of: a status of the attack and a status of the at least one challenge action. 7. The method of claim 6, further comprising:
selecting a first challenge action out of the at least one challenge action, wherein the first challenge action is selected respective of the risk state, the status of the attack, and a sequence order defined in the escalation security policy; selecting a security server out of the security servers configured to perform the first challenge action; and causing the network elements of the SDN to divert incoming traffic to the selected security server. 8. The method of claim 7, further comprising:
checking the status of the first challenge action; selecting a second challenge action, when the status of the first challenge action indicates that the first challenge action has passed; selecting a security server out of the security servers configured to perform the second challenge action; and causing the network elements of the SDN to divert incoming traffic to the selected security server. 9. The method of claim 8, wherein the second challenge action is more aggressive than the first challenge action. 10. The method of claim 8, further comprising:
programing a peer network element to block the incoming traffic if the status of the challenge action indicates that any of the first and second challenge actions has failed during a predefined number of consecutive challenge attempts. 11. The method of claim 8, further comprising:
computing a route from the each client to the at least one destination server, when the attack is mitigated and when the status of the challenge action indicates that any of the first and second challenge actions has passed; and diverting traffic to the at least one destination server over the computed route. 12. The method of claim 5, wherein causing network elements of the SDN to divert incoming traffic from the each client to security servers further comprising: at least one of: programming each network element in the SDN to forward a packet based on a diversion value designated in a packet diversion field; and configuring a flow table of each network element. 13. The method of claim 12, wherein programming each network element in the SDN to forward a packet based on a diversion value further comprising:
instructing at least one peer network element in the SDN to mark a diversion field in each packet in the incoming traffic addressed to the security servers, wherein each network element in the SDN receiving the packet with the marked diversion field is programmed to divert the packet to security servers. 14. The method of claim 1, wherein the attack indication includes at least one of: an attack alarm from an attack detection device, a high number of active connections, a high number of packets received per second, an indication that an incoming traffic is from an Internet Protocol (IP) address included in a black list, an indication received from a client authentication service, geo-analysis information, a type of content accessed by the client, and behavioral analysis. 15. The method of claim 1, wherein the user risk state is assigned with a deterministic value. 16. The method of claim 15, wherein the user risk state is determined based on a plurality of security risk indication parameters, wherein the security risk indication parameters include at least a pre-compiled list of trusted clients per IP address, a reputation score per IP address, a reputation score per geographical region, application layer parameters, a client unique identification token, the user identity, a client affiliation, a type of content accessed by the client, a challenge action result and behavioral analysis. 17. The method of claim 1, wherein the at least one challenge action includes any one of: a SYN cookie, a web redirect, a JavaScript redirect, and CAPTCHA. 18. The method of claim 1, wherein the escalation security policy is realized through a state machine, wherein the central controller maintains at least one state machine for the each user. 19. The method of claim 1, wherein the at least one peer network element is a network element of the SDN through which the incoming traffic addressed to the at least one destination server flows through. 20. The method of claim 19, wherein an OpenFlow protocol is utilized for communication between the network elements and the central controller. 21. A non-transitory computer readable medium having stored thereon instructions for causing one or more processing units to execute the computerized method according to claim 1. 22. A system for performing an escalation security policy in a software defined network (SDN), comprising:
a processor; a network-interface module for communicating with the SDN; a memory connected to the processor and configured to contain a plurality of instructions that when executed by the processor configure the system to: receive at least one attack indication performed against at least one destination server; upon determination, respective of at least one attack indication, that an attack is being performed against the at least one destination server, for each client sending traffic to the at least one destination server:
determine a risk state for a user of the each client;
obtain an escalation security policy respective of the determined user risk state, wherein the escalation security policy defines a sequence of at least one challenge action for challenging the each client, an order and at least one condition for execution of the sequence of at least one challenge action; and
cause network elements of the SDN to divert incoming traffic from the each client to security servers connected to the SDN and configured to perform the at least one challenge action. 23. The system of claim 22, wherein the network-interface module is configured to interface with the SDN through a SDN network controller, wherein the SDN network controller is configured to communicate and program network elements of the SDN. 24. A system for performing an escalation security policy in a software defined network (SDN), comprising:
a network-interface module for communicating with the SDN; a system-interface for receiving at least one attack indication performed against at least one destination server; an escalation module for determining whether an attack is being performed against the at least one destination server, wherein upon determination of that the attack is being perform, the escalation module is configured to:
determine a risk state for a user for the each client sending traffic to the at least one destination server;
obtain an escalation security policy respective of the determined user risk state, wherein the escalation security policy defines a sequence of at least one challenge action for challenging the each client, an order and at least one condition for execution of the sequence of at least one challenge action; and
a diversion module for causing network elements of the SDN to divert incoming traffic from the each client to security servers connected to the SDN and configured to perform the at least one challenge action. 25. The system of claim 24, wherein the network-interface module is configured to interface with the SDN through a SDN network controller, wherein the SDN network controller is configured to communicate and program network elements of the SDN. 26. The system of claim 24, wherein the system interface is configured to interface with an external system, wherein the external system is any one of an attack detection tool and an identity manager device. 27. The system of claim 25, wherein an OpenFlow protocol is utilized for communication between the network elements and any of at least one of the SDN network controller. | A method for performing an escalation security policy in a software defined network (SDN) includes receiving at least one attack indication performed against at least one destination server; upon determination that an attack is being performed against the at least one destination server, for each client sending traffic to the at least one destination server: determining a risk state for a user of the each client; obtaining an escalation security policy respective of the determined risk state of the user, wherein the escalation security policy defines a sequence of at least one challenge action for challenging the each client, an order and at least one condition for execution of the sequence of at least one challenge action; and causing network elements of the SDN to divert incoming traffic from the each client to security servers connected to the SDN and configured to perform the at least one challenge action.1. A method for performing an escalation security policy in a software defined network (SDN), the method is being performed by a central controller of the SDN, comprising:
receiving at least one attack indication performed against at least one destination server; upon determination, respective of at least one attack indication, that an attack is being performed against the at least one destination server, for each client sending traffic to the at least one destination server:
determining a risk state for a user of the each client;
obtaining an escalation security policy respective of the determined risk state of the user, wherein the escalation security policy defines a sequence of at least one challenge action for challenging the each client, an order and at least one condition for execution of the sequence of at least one challenge action; and
causing network elements of the SDN to divert incoming traffic from the each client to security servers connected to the SDN and configured to perform the at least one challenge action. 2. The method of claim 1, further comprising:
monitoring at least one of health and load of each of the security servers; and switching over to a redundant security server when a respective security server is determined to be nonfunctional or overloaded. 3. The method of claim 2, further comprising:
load balancing clients' traffic among the security servers performing the same challenge action, when the respective security server is determined to be overloaded. 4. The method of claim 1, further comprising checking the identity of the user using at least one of: a source Internet protocol (IP) address of its respective client, application layer parameters, and an identity manager device. 5. The method of claim 1, wherein diverting the incoming traffic further comprising:
diverting the incoming traffic to the security servers according to the order of execution of the sequence of the at least one action and the condition defined in the respective execution security policy. 6. The method of claim 5, wherein the at least one condition defined in the escalation policy includes at least one of: a status of the attack and a status of the at least one challenge action. 7. The method of claim 6, further comprising:
selecting a first challenge action out of the at least one challenge action, wherein the first challenge action is selected respective of the risk state, the status of the attack, and a sequence order defined in the escalation security policy; selecting a security server out of the security servers configured to perform the first challenge action; and causing the network elements of the SDN to divert incoming traffic to the selected security server. 8. The method of claim 7, further comprising:
checking the status of the first challenge action; selecting a second challenge action, when the status of the first challenge action indicates that the first challenge action has passed; selecting a security server out of the security servers configured to perform the second challenge action; and causing the network elements of the SDN to divert incoming traffic to the selected security server. 9. The method of claim 8, wherein the second challenge action is more aggressive than the first challenge action. 10. The method of claim 8, further comprising:
programing a peer network element to block the incoming traffic if the status of the challenge action indicates that any of the first and second challenge actions has failed during a predefined number of consecutive challenge attempts. 11. The method of claim 8, further comprising:
computing a route from the each client to the at least one destination server, when the attack is mitigated and when the status of the challenge action indicates that any of the first and second challenge actions has passed; and diverting traffic to the at least one destination server over the computed route. 12. The method of claim 5, wherein causing network elements of the SDN to divert incoming traffic from the each client to security servers further comprising: at least one of: programming each network element in the SDN to forward a packet based on a diversion value designated in a packet diversion field; and configuring a flow table of each network element. 13. The method of claim 12, wherein programming each network element in the SDN to forward a packet based on a diversion value further comprising:
instructing at least one peer network element in the SDN to mark a diversion field in each packet in the incoming traffic addressed to the security servers, wherein each network element in the SDN receiving the packet with the marked diversion field is programmed to divert the packet to security servers. 14. The method of claim 1, wherein the attack indication includes at least one of: an attack alarm from an attack detection device, a high number of active connections, a high number of packets received per second, an indication that an incoming traffic is from an Internet Protocol (IP) address included in a black list, an indication received from a client authentication service, geo-analysis information, a type of content accessed by the client, and behavioral analysis. 15. The method of claim 1, wherein the user risk state is assigned with a deterministic value. 16. The method of claim 15, wherein the user risk state is determined based on a plurality of security risk indication parameters, wherein the security risk indication parameters include at least a pre-compiled list of trusted clients per IP address, a reputation score per IP address, a reputation score per geographical region, application layer parameters, a client unique identification token, the user identity, a client affiliation, a type of content accessed by the client, a challenge action result and behavioral analysis. 17. The method of claim 1, wherein the at least one challenge action includes any one of: a SYN cookie, a web redirect, a JavaScript redirect, and CAPTCHA. 18. The method of claim 1, wherein the escalation security policy is realized through a state machine, wherein the central controller maintains at least one state machine for the each user. 19. The method of claim 1, wherein the at least one peer network element is a network element of the SDN through which the incoming traffic addressed to the at least one destination server flows through. 20. The method of claim 19, wherein an OpenFlow protocol is utilized for communication between the network elements and the central controller. 21. A non-transitory computer readable medium having stored thereon instructions for causing one or more processing units to execute the computerized method according to claim 1. 22. A system for performing an escalation security policy in a software defined network (SDN), comprising:
a processor; a network-interface module for communicating with the SDN; a memory connected to the processor and configured to contain a plurality of instructions that when executed by the processor configure the system to: receive at least one attack indication performed against at least one destination server; upon determination, respective of at least one attack indication, that an attack is being performed against the at least one destination server, for each client sending traffic to the at least one destination server:
determine a risk state for a user of the each client;
obtain an escalation security policy respective of the determined user risk state, wherein the escalation security policy defines a sequence of at least one challenge action for challenging the each client, an order and at least one condition for execution of the sequence of at least one challenge action; and
cause network elements of the SDN to divert incoming traffic from the each client to security servers connected to the SDN and configured to perform the at least one challenge action. 23. The system of claim 22, wherein the network-interface module is configured to interface with the SDN through a SDN network controller, wherein the SDN network controller is configured to communicate and program network elements of the SDN. 24. A system for performing an escalation security policy in a software defined network (SDN), comprising:
a network-interface module for communicating with the SDN; a system-interface for receiving at least one attack indication performed against at least one destination server; an escalation module for determining whether an attack is being performed against the at least one destination server, wherein upon determination of that the attack is being perform, the escalation module is configured to:
determine a risk state for a user for the each client sending traffic to the at least one destination server;
obtain an escalation security policy respective of the determined user risk state, wherein the escalation security policy defines a sequence of at least one challenge action for challenging the each client, an order and at least one condition for execution of the sequence of at least one challenge action; and
a diversion module for causing network elements of the SDN to divert incoming traffic from the each client to security servers connected to the SDN and configured to perform the at least one challenge action. 25. The system of claim 24, wherein the network-interface module is configured to interface with the SDN through a SDN network controller, wherein the SDN network controller is configured to communicate and program network elements of the SDN. 26. The system of claim 24, wherein the system interface is configured to interface with an external system, wherein the external system is any one of an attack detection tool and an identity manager device. 27. The system of claim 25, wherein an OpenFlow protocol is utilized for communication between the network elements and any of at least one of the SDN network controller. | 2,400 |
7,168 | 7,168 | 14,387,213 | 2,491 | There is described a method of controlling access to IP streaming content by a plurality of receivers. The method comprises the steps of (a) for each receiver in the plurality of receivers, providing that receiver with access to first control information for that receiver to enable that receiver to access a first portion of the content; (b) identifying a receiver from the plurality of receivers as an identified receiver; (c) updating the first control information so as to provide updated control information for each receiver, the updated control information being associated with a second portion of the content; and (d) configuring each receiver to fetch the updated control information for that receiver. For the identified receiver, the updated control information is invalid such that the identified receiver is unable to fully access the second portion of the content. A server configured to carry out the method is also described. | 1. A method, implemented by one or more processors, of controlling access to IP streaming content by a plurality of receivers, the method comprising:
for each receiver in the plurality of receivers, providing that receiver with access to first control information for that receiver to enable that receiver to access a first portion of the content; identifying a receiver from the plurality of receivers as an identified receiver; updating the first control information so as to provide updated control information for each receiver, the updated control information being associated with a second portion of the content; and configuring each receiver to fetch the updated control information for that receiver; wherein, for the identified receiver, the updated control information is invalid such that the identified receiver is unable to fully access the second portion of the content. 2. The method of claim 1 wherein:
the control information comprises key management information for providing access to a content decryption key for decrypting the content; and
for the identified receiver, the updated control information does not enable the identified receiver to access an updated content decryption key for the second portion of the content. 3. The method of claim 2 wherein, for each receiver, the key management information comprises a unique key for that receiver, the unique key being operable to enable that receiver to access the content decryption key for decrypting the content. 4. The method of claim 1 wherein:
the content comprises a time series of content chunks;
the control information comprises a playlist of content chunk references, each content chunk reference being a reference to a respective content chunk of the content; and
for the identified receiver, the updated control information does not include a valid playlist of content chunk references for the second portion of the content. 5. The method of claim 1 wherein:
the content comprises a time series of content chunks disposed in a content file;
the control information comprises a manifest file which enables a receiver to generate URLs relating to content chunks in the content file; and
for the identified receiver, the updated control information does not include a valid manifest file to enable the identified receiver to generate valid URLs for content chunks associated with the second portion of the content. 6. The method of claim 1 wherein configuring each receiver to fetch the updated control information for that receiver comprises:
providing each receiver with an expiration time for the first control information, by which expiration time that receiver should fetch the updated control information for that receiver. 7. The method of claim 1 wherein the content is fingerprinted, and wherein identifying a receiver from the plurality of receivers as an identified receiver comprises:
detecting a fingerprint associated with the identified receiver in an unauthorised instance of the content. 8. The method of claim 1 wherein, for each receiver, the control information for that receiver is stored in a different file from files used to store the control information for other receivers in the plurality of receivers. 9. The method of claim 1 wherein:
for at least a subset of the plurality of receivers, the control information is stored in a single combined file for that subset of receivers; and
for each receiver in the subset of receivers, the control information for that receiver is stored in a different file location from the file locations used to store the control information for other receivers in the subset of receivers. 10. The method of claim 1 wherein, for the identified receiver, the updated control information is invalid such that the identified receiver is unable to access any of the second portion of the content. 11. The method of claim 1 wherein the updated control information for the identified receiver comprises a null file entry. 12. The method of claim 1 wherein:
the content comprises a time series of content chunks; and
the first and second portions of the content are each associated with a respective integer number of content chunks. 13. A server comprising one or more processors configured to control access to IP streaming content by a plurality of receivers, by:
for each receiver in the plurality of receivers, providing that receiver with access to first control information for that receiver to enable that receiver to access a first portion of the content; identifying a receiver from the plurality of receivers as an identified receiver; updating the first control information so as to provide updated control information for each receiver, the updated control information being associated with a second portion of the content; and configuring each receiver to fetch the updated control information for that receiver; wherein, for the identified receiver, the updated control information is invalid such that the identified receiver is unable to fully access the second portion of the content. 14. A-One or more tangible computer readable media comprising computer program code which, when executed by a processor, causes the processor to control access to IP streaming content by a plurality of receivers, by:
for each receiver in the plurality of receivers, providing that receiver with access to first control information for that receiver to enable that receiver to access a first portion of the content; identifying a receiver from the plurality of receivers as an identified receiver; updating the first control information so as to provide updated control information for each receiver, the updated control information being associated with a second portion of the content; and configuring each receiver to fetch the updated control information for that receiver; wherein, for the identified receiver, the updated control information is invalid such that the identified receiver is unable to fully access the second portion of the content. 15-18. (canceled) | There is described a method of controlling access to IP streaming content by a plurality of receivers. The method comprises the steps of (a) for each receiver in the plurality of receivers, providing that receiver with access to first control information for that receiver to enable that receiver to access a first portion of the content; (b) identifying a receiver from the plurality of receivers as an identified receiver; (c) updating the first control information so as to provide updated control information for each receiver, the updated control information being associated with a second portion of the content; and (d) configuring each receiver to fetch the updated control information for that receiver. For the identified receiver, the updated control information is invalid such that the identified receiver is unable to fully access the second portion of the content. A server configured to carry out the method is also described.1. A method, implemented by one or more processors, of controlling access to IP streaming content by a plurality of receivers, the method comprising:
for each receiver in the plurality of receivers, providing that receiver with access to first control information for that receiver to enable that receiver to access a first portion of the content; identifying a receiver from the plurality of receivers as an identified receiver; updating the first control information so as to provide updated control information for each receiver, the updated control information being associated with a second portion of the content; and configuring each receiver to fetch the updated control information for that receiver; wherein, for the identified receiver, the updated control information is invalid such that the identified receiver is unable to fully access the second portion of the content. 2. The method of claim 1 wherein:
the control information comprises key management information for providing access to a content decryption key for decrypting the content; and
for the identified receiver, the updated control information does not enable the identified receiver to access an updated content decryption key for the second portion of the content. 3. The method of claim 2 wherein, for each receiver, the key management information comprises a unique key for that receiver, the unique key being operable to enable that receiver to access the content decryption key for decrypting the content. 4. The method of claim 1 wherein:
the content comprises a time series of content chunks;
the control information comprises a playlist of content chunk references, each content chunk reference being a reference to a respective content chunk of the content; and
for the identified receiver, the updated control information does not include a valid playlist of content chunk references for the second portion of the content. 5. The method of claim 1 wherein:
the content comprises a time series of content chunks disposed in a content file;
the control information comprises a manifest file which enables a receiver to generate URLs relating to content chunks in the content file; and
for the identified receiver, the updated control information does not include a valid manifest file to enable the identified receiver to generate valid URLs for content chunks associated with the second portion of the content. 6. The method of claim 1 wherein configuring each receiver to fetch the updated control information for that receiver comprises:
providing each receiver with an expiration time for the first control information, by which expiration time that receiver should fetch the updated control information for that receiver. 7. The method of claim 1 wherein the content is fingerprinted, and wherein identifying a receiver from the plurality of receivers as an identified receiver comprises:
detecting a fingerprint associated with the identified receiver in an unauthorised instance of the content. 8. The method of claim 1 wherein, for each receiver, the control information for that receiver is stored in a different file from files used to store the control information for other receivers in the plurality of receivers. 9. The method of claim 1 wherein:
for at least a subset of the plurality of receivers, the control information is stored in a single combined file for that subset of receivers; and
for each receiver in the subset of receivers, the control information for that receiver is stored in a different file location from the file locations used to store the control information for other receivers in the subset of receivers. 10. The method of claim 1 wherein, for the identified receiver, the updated control information is invalid such that the identified receiver is unable to access any of the second portion of the content. 11. The method of claim 1 wherein the updated control information for the identified receiver comprises a null file entry. 12. The method of claim 1 wherein:
the content comprises a time series of content chunks; and
the first and second portions of the content are each associated with a respective integer number of content chunks. 13. A server comprising one or more processors configured to control access to IP streaming content by a plurality of receivers, by:
for each receiver in the plurality of receivers, providing that receiver with access to first control information for that receiver to enable that receiver to access a first portion of the content; identifying a receiver from the plurality of receivers as an identified receiver; updating the first control information so as to provide updated control information for each receiver, the updated control information being associated with a second portion of the content; and configuring each receiver to fetch the updated control information for that receiver; wherein, for the identified receiver, the updated control information is invalid such that the identified receiver is unable to fully access the second portion of the content. 14. A-One or more tangible computer readable media comprising computer program code which, when executed by a processor, causes the processor to control access to IP streaming content by a plurality of receivers, by:
for each receiver in the plurality of receivers, providing that receiver with access to first control information for that receiver to enable that receiver to access a first portion of the content; identifying a receiver from the plurality of receivers as an identified receiver; updating the first control information so as to provide updated control information for each receiver, the updated control information being associated with a second portion of the content; and configuring each receiver to fetch the updated control information for that receiver; wherein, for the identified receiver, the updated control information is invalid such that the identified receiver is unable to fully access the second portion of the content. 15-18. (canceled) | 2,400 |
7,169 | 7,169 | 14,712,367 | 2,435 | In at least one embodiment, a system for authorizing use of a vehicle communication and information system may include one or more data processors configured to receive information associating one or more devices with a vehicle computer. The data processor(s) may be also configured to receive information identifying a user requesting authorization to command the vehicle controls from the one or more devices associated with the vehicle computer. The user(s) may be authorized to command the vehicle controls from the one or more devices associated with the vehicle computer based on performing an authentication process for authenticating the user, determining that the user is an authenticated user based on the authentication process, and enabling command of one or more vehicle controls from the one or more remote devices via the associated vehicle computer based on the user being authenticated. | 1.-20. (canceled) 21. A system comprising:
a mobile-device processor configured to:
receive an authentication request from a user attempting to use a substitute-user device to access a vehicle for drive-away;
receive confirmation of the request, through a mobile-device interface, approving the user to access the vehicle; and
transmit authentication data, usable to start the vehicle for drive-away, to the vehicle in response to receipt of the confirmation. 22. The system of claim 21, wherein the confirmation of the request is based on a selection of an acceptance option displayed at the mobile-device interface. 23. The system of claim 22, wherein the acceptance option enables the transmission of the authentication data to the vehicle to enable the substitute-user device to command one or more vehicle controls to a vehicle computing system. 24. The system of claim 23, wherein the one or more vehicle controls is at least one of remote lock and unlock, remote start, remote radio selection, and remote HVAC selection. 25. The system of claim 21, wherein the authentication data is at least one of numbers, letters, characters, and a combination of numbers, letters and characters. 26. The system of claim 25, wherein the vehicle receives, via a vehicle computing system, the authentication data via the substitute-user device and identifies the user based on the at least one of numbers, letters, characters, and a combination of numbers, letters and characters from the substitute-user device. 27. The system of claim 21, wherein the substitute-user device is a remote nomadic device or a personal computer. 28. The system of claim 27, wherein the vehicle is enabled to receive a commanded vehicle control via the nomadic device based on the authentication data. 29. A mobile device comprising:
a processor configured to, in response to an authentication request identifying a remote user: transmit authentication data to a substitute-user device in response to approval received via a mobile device user interface authorizing the remote user of the substitute-user device, the authentication data usable by a vehicle to allow vehicle drive-away. 30. The mobile device of claim 29, wherein the processor is further configured to display at the mobile device user interface an accept and reject option for the authentication request. 31. The mobile device of claim 30, wherein the accept option enables the transmission of the authentication data to the vehicle to enable the substitute-user device to command one or more vehicle controls to a vehicle computing system. 32. The mobile device of claim 31, wherein the one or more vehicle controls is at least one of remote lock and unlock, remote start, remote radio selection, and remote HVAC selection. 33. The mobile device of claim 30, wherein the processor is further configured to, in response to the reject option being selected at the mobile device user interface, transmit a non-authorization message to the substitute-user device. 34. The mobile device of claim 29, wherein the authentication data is at least one of numbers, letters, characters, and a combination of numbers, letters and characters. 35. The mobile device of claim 29, wherein the processor is further configured to transmit the authentication data to the substitute-user device via a server. 36. The mobile device of claim 29, wherein the vehicle is configured to receive a commanded vehicle control via the substitute-user device based on the authentication data. 37. A system comprising:
a processor configured to:
receive a request from a first mobile device identifying a user attempting to access a vehicle for drive-away;
relay the request to a second mobile device, pre-identified as corresponding to an authorized user for vehicle for drive-away access; and
send authentication data to the first mobile device, usable to access the vehicle for drive-away, in response to receiving a confirmation receipt from the second mobile device. 38. The system of claim 37, wherein the first mobile device is configured to transmit one or more vehicle controls to a vehicle computer based on the authentication data. 39. The system of claim 38, wherein the authentication data is an electronic serial number associated with the vehicle. 40. A system comprising:
a processor configured to, in response to a request associated with a user attempting to access a vehicle from a first mobile device:
relay the request to a pre-identified second mobile device associated with an authorized user to access the vehicle; and
send authentication data to the vehicle authorizing vehicle access, in response to receiving a confirmation receipt from the second mobile device. | In at least one embodiment, a system for authorizing use of a vehicle communication and information system may include one or more data processors configured to receive information associating one or more devices with a vehicle computer. The data processor(s) may be also configured to receive information identifying a user requesting authorization to command the vehicle controls from the one or more devices associated with the vehicle computer. The user(s) may be authorized to command the vehicle controls from the one or more devices associated with the vehicle computer based on performing an authentication process for authenticating the user, determining that the user is an authenticated user based on the authentication process, and enabling command of one or more vehicle controls from the one or more remote devices via the associated vehicle computer based on the user being authenticated.1.-20. (canceled) 21. A system comprising:
a mobile-device processor configured to:
receive an authentication request from a user attempting to use a substitute-user device to access a vehicle for drive-away;
receive confirmation of the request, through a mobile-device interface, approving the user to access the vehicle; and
transmit authentication data, usable to start the vehicle for drive-away, to the vehicle in response to receipt of the confirmation. 22. The system of claim 21, wherein the confirmation of the request is based on a selection of an acceptance option displayed at the mobile-device interface. 23. The system of claim 22, wherein the acceptance option enables the transmission of the authentication data to the vehicle to enable the substitute-user device to command one or more vehicle controls to a vehicle computing system. 24. The system of claim 23, wherein the one or more vehicle controls is at least one of remote lock and unlock, remote start, remote radio selection, and remote HVAC selection. 25. The system of claim 21, wherein the authentication data is at least one of numbers, letters, characters, and a combination of numbers, letters and characters. 26. The system of claim 25, wherein the vehicle receives, via a vehicle computing system, the authentication data via the substitute-user device and identifies the user based on the at least one of numbers, letters, characters, and a combination of numbers, letters and characters from the substitute-user device. 27. The system of claim 21, wherein the substitute-user device is a remote nomadic device or a personal computer. 28. The system of claim 27, wherein the vehicle is enabled to receive a commanded vehicle control via the nomadic device based on the authentication data. 29. A mobile device comprising:
a processor configured to, in response to an authentication request identifying a remote user: transmit authentication data to a substitute-user device in response to approval received via a mobile device user interface authorizing the remote user of the substitute-user device, the authentication data usable by a vehicle to allow vehicle drive-away. 30. The mobile device of claim 29, wherein the processor is further configured to display at the mobile device user interface an accept and reject option for the authentication request. 31. The mobile device of claim 30, wherein the accept option enables the transmission of the authentication data to the vehicle to enable the substitute-user device to command one or more vehicle controls to a vehicle computing system. 32. The mobile device of claim 31, wherein the one or more vehicle controls is at least one of remote lock and unlock, remote start, remote radio selection, and remote HVAC selection. 33. The mobile device of claim 30, wherein the processor is further configured to, in response to the reject option being selected at the mobile device user interface, transmit a non-authorization message to the substitute-user device. 34. The mobile device of claim 29, wherein the authentication data is at least one of numbers, letters, characters, and a combination of numbers, letters and characters. 35. The mobile device of claim 29, wherein the processor is further configured to transmit the authentication data to the substitute-user device via a server. 36. The mobile device of claim 29, wherein the vehicle is configured to receive a commanded vehicle control via the substitute-user device based on the authentication data. 37. A system comprising:
a processor configured to:
receive a request from a first mobile device identifying a user attempting to access a vehicle for drive-away;
relay the request to a second mobile device, pre-identified as corresponding to an authorized user for vehicle for drive-away access; and
send authentication data to the first mobile device, usable to access the vehicle for drive-away, in response to receiving a confirmation receipt from the second mobile device. 38. The system of claim 37, wherein the first mobile device is configured to transmit one or more vehicle controls to a vehicle computer based on the authentication data. 39. The system of claim 38, wherein the authentication data is an electronic serial number associated with the vehicle. 40. A system comprising:
a processor configured to, in response to a request associated with a user attempting to access a vehicle from a first mobile device:
relay the request to a pre-identified second mobile device associated with an authorized user to access the vehicle; and
send authentication data to the vehicle authorizing vehicle access, in response to receiving a confirmation receipt from the second mobile device. | 2,400 |
7,170 | 7,170 | 14,709,099 | 2,493 | An apparatus is provided for implementation of a system for screening electronic mail messages. The apparatus may receive an electronic mail message, and scan the electronic mail message for a uniform resource identifier (URI) of an Internet resource embedded therein. In an instance in which a URI is embedded in the electronic mail message, the apparatus may query a WHOIS server for a created date of the Internet resource. In this regard, the WHOIS server may be queried using a domain name of the Internet resource included in the URI. And the apparatus may determine an age of the Internet resource from the created date, and perform a remedial action in an instance in which the age of the Internet resource is less than a threshold age. | 1. An apparatus for implementation of a system for screening electronic mail messages, the apparatus comprising a processor and a memory storing executable instructions that in response to execution by the processor cause the apparatus to implement at least:
a scanner configured to receive an electronic mail message, and scan the electronic mail message for a uniform resource identifier (URI) of an Internet resource embedded therein; a WHOIS client coupled to the scanner and in an instance in which a URI is embedded in the electronic mail message, configured to query a WHOIS server for a created date of the Internet resource, the WHOIS server being queried using information contained in the URI from which the Internet resource is identifiable; and a control coupled to the WHOIS client and configured to determine an age of the Internet resource from the created date, and perform a remedial action in an instance in which the age of the Internet resource is less than a threshold age. 2. The apparatus of claim 1, wherein the electronic mail message includes a message body, and the scanner being configured to scan the electronic mail message includes being configured to scan the message body for a URI. 3. The apparatus of claim 1, wherein the electronic mail message includes an attached file, and the scanner being configured to scan the electronic mail message includes being configured to scan the attached file for a URI. 4. The apparatus of claim 1, wherein the information is a domain name of the Internet resource included in the URL, and the WHOIS client being configured to query the WHOIS server includes being configured to query the WHOIS server for the created date corresponding to a date on which the domain name was registered with a domain name registry. 5. The apparatus of claim 1, wherein the control being configured to perform the remedial action includes being configured to block delivery of the electronic mail message to a recipient to which the electronic mail message is addressed. 6. The apparatus of claim 1, wherein the control being configured to perform the remedial action includes being configured to delete the URI from the electronic mail message before delivery of the electronic mail message to a recipient to which the electronic mail message is addressed. 7. The apparatus of claim 6, wherein the control being configured to perform the remedial action further includes being configured to add a user-notification regarding the deleted URI to the electronic mail message in place of the URI. 8. A method of screening electronic mail messages, the method comprising:
receiving an electronic mail message; scanning the electronic mail message for a uniform resource identifier (URI) of an Internet resource embedded therein; and in an instance in which a URI is embedded in the electronic mail message, querying a WHOIS server for a created date of the Internet resource, the WHOIS server being queried using information contained in the URI from which the Internet resource is identifiable; determining an age of the Internet resource from the created date; and performing a remedial action in an instance in which the age of the Internet resource is less than a threshold age. 9. The method of claim 8, wherein the electronic mail message includes a message body, and scanning the electronic mail message includes scanning the message body for a URI. 10. The method of claim 8, wherein the electronic mail message includes an attached file, and scanning the electronic mail message includes scanning the attached file for a URI. 11. The method of claim 8, wherein the information is a domain name of the Internet resource included in the URL, and querying the WHOIS server includes querying the WHOIS server for the created date corresponding to a date on which the domain name was registered with a domain name registry. 12. The method of claim 8, wherein performing the remedial action includes blocking delivery of the electronic mail message to a recipient to which the electronic mail message is addressed. 13. The method of claim 8, wherein performing the remedial action includes deleting the URI from the electronic mail message before delivery of the electronic mail message to a recipient to which the electronic mail message is addressed. 14. The method of claim 13, wherein performing the remedial action further includes adding a user-notification regarding the deleted URI to the electronic mail message in place of the URI. 15. A computer-readable storage medium for screening electronic mail messages, the computer-readable storage medium being non-transitory and having computer-readable program code portions stored therein that in response to execution by a processor, cause an apparatus to at least:
receive an electronic mail message; scan the electronic mail message for a uniform resource identifier (URI) of an Internet resource embedded therein; and in an instance in which a URI is embedded in the electronic mail message, query a WHOIS server for a created date of the Internet resource, the WHOIS server being queried using information contained in the URI from which the Internet resource is identifiable; determine an age of the Internet resource from the created date; and perform a remedial action in an instance in which the age of the Internet resource is less than a threshold age. 16. The computer-readable storage medium of claim 15, wherein the electronic mail message includes a message body, and the apparatus being caused to scan the electronic mail message includes being caused to scan the message body for a URI. 17. The computer-readable storage medium of claim 15, wherein the electronic mail message includes an attached file, and the apparatus being caused to scan the electronic mail message includes being caused to scan the attached file for a URI. 18. The computer-readable storage medium of claim 15, wherein the information is a domain name of the Internet resource included in the URL, and the apparatus being caused to query the WHOIS server includes being caused to query the WHOIS server for the created date corresponding to a date on which the domain name was registered with a domain name registry. 19. The computer-readable storage medium of claim 15, wherein the apparatus being caused to perform the remedial action includes being caused to block delivery of the electronic mail message to a recipient to which the electronic mail message is addressed. 20. The computer-readable storage medium of claim 15, wherein the apparatus being caused to perform the remedial action includes being caused to delete the URI from the electronic mail message before delivery of the electronic mail message to a recipient to which the electronic mail message is addressed. 21. The computer-readable storage medium of claim 20, wherein the apparatus being caused to perform the remedial action further includes being caused to add a user-notification regarding the deleted URI to the electronic mail message in place of the URI. | An apparatus is provided for implementation of a system for screening electronic mail messages. The apparatus may receive an electronic mail message, and scan the electronic mail message for a uniform resource identifier (URI) of an Internet resource embedded therein. In an instance in which a URI is embedded in the electronic mail message, the apparatus may query a WHOIS server for a created date of the Internet resource. In this regard, the WHOIS server may be queried using a domain name of the Internet resource included in the URI. And the apparatus may determine an age of the Internet resource from the created date, and perform a remedial action in an instance in which the age of the Internet resource is less than a threshold age.1. An apparatus for implementation of a system for screening electronic mail messages, the apparatus comprising a processor and a memory storing executable instructions that in response to execution by the processor cause the apparatus to implement at least:
a scanner configured to receive an electronic mail message, and scan the electronic mail message for a uniform resource identifier (URI) of an Internet resource embedded therein; a WHOIS client coupled to the scanner and in an instance in which a URI is embedded in the electronic mail message, configured to query a WHOIS server for a created date of the Internet resource, the WHOIS server being queried using information contained in the URI from which the Internet resource is identifiable; and a control coupled to the WHOIS client and configured to determine an age of the Internet resource from the created date, and perform a remedial action in an instance in which the age of the Internet resource is less than a threshold age. 2. The apparatus of claim 1, wherein the electronic mail message includes a message body, and the scanner being configured to scan the electronic mail message includes being configured to scan the message body for a URI. 3. The apparatus of claim 1, wherein the electronic mail message includes an attached file, and the scanner being configured to scan the electronic mail message includes being configured to scan the attached file for a URI. 4. The apparatus of claim 1, wherein the information is a domain name of the Internet resource included in the URL, and the WHOIS client being configured to query the WHOIS server includes being configured to query the WHOIS server for the created date corresponding to a date on which the domain name was registered with a domain name registry. 5. The apparatus of claim 1, wherein the control being configured to perform the remedial action includes being configured to block delivery of the electronic mail message to a recipient to which the electronic mail message is addressed. 6. The apparatus of claim 1, wherein the control being configured to perform the remedial action includes being configured to delete the URI from the electronic mail message before delivery of the electronic mail message to a recipient to which the electronic mail message is addressed. 7. The apparatus of claim 6, wherein the control being configured to perform the remedial action further includes being configured to add a user-notification regarding the deleted URI to the electronic mail message in place of the URI. 8. A method of screening electronic mail messages, the method comprising:
receiving an electronic mail message; scanning the electronic mail message for a uniform resource identifier (URI) of an Internet resource embedded therein; and in an instance in which a URI is embedded in the electronic mail message, querying a WHOIS server for a created date of the Internet resource, the WHOIS server being queried using information contained in the URI from which the Internet resource is identifiable; determining an age of the Internet resource from the created date; and performing a remedial action in an instance in which the age of the Internet resource is less than a threshold age. 9. The method of claim 8, wherein the electronic mail message includes a message body, and scanning the electronic mail message includes scanning the message body for a URI. 10. The method of claim 8, wherein the electronic mail message includes an attached file, and scanning the electronic mail message includes scanning the attached file for a URI. 11. The method of claim 8, wherein the information is a domain name of the Internet resource included in the URL, and querying the WHOIS server includes querying the WHOIS server for the created date corresponding to a date on which the domain name was registered with a domain name registry. 12. The method of claim 8, wherein performing the remedial action includes blocking delivery of the electronic mail message to a recipient to which the electronic mail message is addressed. 13. The method of claim 8, wherein performing the remedial action includes deleting the URI from the electronic mail message before delivery of the electronic mail message to a recipient to which the electronic mail message is addressed. 14. The method of claim 13, wherein performing the remedial action further includes adding a user-notification regarding the deleted URI to the electronic mail message in place of the URI. 15. A computer-readable storage medium for screening electronic mail messages, the computer-readable storage medium being non-transitory and having computer-readable program code portions stored therein that in response to execution by a processor, cause an apparatus to at least:
receive an electronic mail message; scan the electronic mail message for a uniform resource identifier (URI) of an Internet resource embedded therein; and in an instance in which a URI is embedded in the electronic mail message, query a WHOIS server for a created date of the Internet resource, the WHOIS server being queried using information contained in the URI from which the Internet resource is identifiable; determine an age of the Internet resource from the created date; and perform a remedial action in an instance in which the age of the Internet resource is less than a threshold age. 16. The computer-readable storage medium of claim 15, wherein the electronic mail message includes a message body, and the apparatus being caused to scan the electronic mail message includes being caused to scan the message body for a URI. 17. The computer-readable storage medium of claim 15, wherein the electronic mail message includes an attached file, and the apparatus being caused to scan the electronic mail message includes being caused to scan the attached file for a URI. 18. The computer-readable storage medium of claim 15, wherein the information is a domain name of the Internet resource included in the URL, and the apparatus being caused to query the WHOIS server includes being caused to query the WHOIS server for the created date corresponding to a date on which the domain name was registered with a domain name registry. 19. The computer-readable storage medium of claim 15, wherein the apparatus being caused to perform the remedial action includes being caused to block delivery of the electronic mail message to a recipient to which the electronic mail message is addressed. 20. The computer-readable storage medium of claim 15, wherein the apparatus being caused to perform the remedial action includes being caused to delete the URI from the electronic mail message before delivery of the electronic mail message to a recipient to which the electronic mail message is addressed. 21. The computer-readable storage medium of claim 20, wherein the apparatus being caused to perform the remedial action further includes being caused to add a user-notification regarding the deleted URI to the electronic mail message in place of the URI. | 2,400 |
7,171 | 7,171 | 14,461,928 | 2,424 | Sensing interfaces associated with a home entertainment system are used to automate a system response to events which occur in a viewing area associated with the home entertainment system. Data derived from such sensing interfaces may also be used to enhance the response readiness of one or more system components. Still further, user presence data derived from such sensing interfaces may be used to capture and report user viewing habits and/or preferences. | 1. A method for collecting information indicative of usage of at least one component device in a home entertainment system comprised of a plurality of component devices, comprising:
capturing via at least one of an image sensing interface, a sound sensing interface, and a networked device sensing interface user event data; capturing via at least one of the plurality of component devices appliance event data; capturing via at least one of the plurality of component devices content event data; formatting the captured user event data, the captured appliance event data, and the captured content event data into a respective one of user event record class, an appliance event record class, and a content event record class; and providing the user event record class, the appliance event record class, and the content event record class to a statistics gathering module associated with one or more advertisement or content disseminations services to allow for an analysis of user viewing habits and preferences. 2. The method as recited in claim 1, comprising wherein the appliance event data comprises data indicative of a command being provided to at least one of the plurality of component device to change a state of the at least one of the plurality of component devices. 3. The method as recited in claim 2, wherein the command is provided to the at least one of the plurality of component devices from a remote control device. 4. The method as recited in claim 2, wherein the command is provided to the at least one of the plurality of component device via a user interaction with an input interface of the at least one of the plurality of component devices. 5. The method as recited in claim 1, wherein the user event data comprises data indicative of a sensed change in at least one of the number of and identity of viewers determined to be in the viewing area associated with the home entertainment system. 6. The method as recited in claim 1, wherein the content event data comprises data indicative of at least one of a show title retrieved from a program guide, a DVD, and a streamed video. 7. The method as recited in claim 1, wherein the content event data comprises data indicative of a media sample extracted from a video and/or an audio being rendered by at least one of the plurality of component devices. 8. The method as recited in claim 1, wherein the content event data comprises a metadata value obtained from at least one of a DVD, a CD, and a streaming video service. 9. The method as recited in claim 1, wherein an entry in the user event record comprises a user identifier, a time stamp, and a one of a plurality of user event type identifiers. 10. The method as recited in claim 1, wherein an entry in the appliance event record comprises a component device identifier, a time stamp, and a one of a plurality of appliance event type identifiers. 11. The method as recited in claim 1, wherein an entry in the content event record comprises a source component device identifier, a time stamp, a one of a plurality of content event type identifiers, and identity data corresponding to the one of the plurality of content event type identifiers. 12. The method as recited in claim 1, wherein the statistics gathering module resides on a one of the plurality of component devices. 13. The method as recited in claim 1, wherein the statistics gathering module resides on a server in communication with the home entertainment system via a network connection. 14. The method as recited in claim 13, wherein the network connection comprises a wide area network connection. | Sensing interfaces associated with a home entertainment system are used to automate a system response to events which occur in a viewing area associated with the home entertainment system. Data derived from such sensing interfaces may also be used to enhance the response readiness of one or more system components. Still further, user presence data derived from such sensing interfaces may be used to capture and report user viewing habits and/or preferences.1. A method for collecting information indicative of usage of at least one component device in a home entertainment system comprised of a plurality of component devices, comprising:
capturing via at least one of an image sensing interface, a sound sensing interface, and a networked device sensing interface user event data; capturing via at least one of the plurality of component devices appliance event data; capturing via at least one of the plurality of component devices content event data; formatting the captured user event data, the captured appliance event data, and the captured content event data into a respective one of user event record class, an appliance event record class, and a content event record class; and providing the user event record class, the appliance event record class, and the content event record class to a statistics gathering module associated with one or more advertisement or content disseminations services to allow for an analysis of user viewing habits and preferences. 2. The method as recited in claim 1, comprising wherein the appliance event data comprises data indicative of a command being provided to at least one of the plurality of component device to change a state of the at least one of the plurality of component devices. 3. The method as recited in claim 2, wherein the command is provided to the at least one of the plurality of component devices from a remote control device. 4. The method as recited in claim 2, wherein the command is provided to the at least one of the plurality of component device via a user interaction with an input interface of the at least one of the plurality of component devices. 5. The method as recited in claim 1, wherein the user event data comprises data indicative of a sensed change in at least one of the number of and identity of viewers determined to be in the viewing area associated with the home entertainment system. 6. The method as recited in claim 1, wherein the content event data comprises data indicative of at least one of a show title retrieved from a program guide, a DVD, and a streamed video. 7. The method as recited in claim 1, wherein the content event data comprises data indicative of a media sample extracted from a video and/or an audio being rendered by at least one of the plurality of component devices. 8. The method as recited in claim 1, wherein the content event data comprises a metadata value obtained from at least one of a DVD, a CD, and a streaming video service. 9. The method as recited in claim 1, wherein an entry in the user event record comprises a user identifier, a time stamp, and a one of a plurality of user event type identifiers. 10. The method as recited in claim 1, wherein an entry in the appliance event record comprises a component device identifier, a time stamp, and a one of a plurality of appliance event type identifiers. 11. The method as recited in claim 1, wherein an entry in the content event record comprises a source component device identifier, a time stamp, a one of a plurality of content event type identifiers, and identity data corresponding to the one of the plurality of content event type identifiers. 12. The method as recited in claim 1, wherein the statistics gathering module resides on a one of the plurality of component devices. 13. The method as recited in claim 1, wherein the statistics gathering module resides on a server in communication with the home entertainment system via a network connection. 14. The method as recited in claim 13, wherein the network connection comprises a wide area network connection. | 2,400 |
7,172 | 7,172 | 14,026,546 | 2,437 | Methods and apparatuses for offloading traffic from a third generation partnership project (3GPP) access network to a non-3GPP access point (AP) are disclosed. A 3GPP access network entity may receive subscription information associated with a wireless transmit receive unit (WTRU). The 3GPP access network entity may further receive traffic associated with the WTRU. The 3GPP access network entity may further determine whether to offload the traffic to the non-3GPP AP based on the subscription information. The 3GPP access network entity may also forward the traffic to the non-3GPP AP based on its determination. | 1. A method for offloading traffic from a third generation partnership project (3GPP) access network to a non-3GPP access point (AP), comprising:
a 3GPP access network entity receiving subscription information associated with a wireless transmit receive unit (WTRU); the 3GPP access network entity receiving traffic associated with the WTRU; the 3GPP access network entity determining whether to offload the traffic to the non-3GPP AP based on the subscription information; and the 3GPP access network entity forwarding the traffic to the non-3GPP AP based on the determining. 2. The method of claim 1, wherein the 3GPP access network entity connects directly with the non-3GPP AP. 3. The method of claim 1, wherein the 3GPP access network entity is one of an evolved Node-B (eNB), home eNB (HeNB), and HeNB gateway (GW). 4. The method of claim 1, wherein the non-3GPP AP is a WiFi AP. 5. The method of claim 1, wherein the 3GPP access network entity receiving subscription information further comprises receiving the subscription information from a home subscriber server (HSS). 6. The method of claim 1, wherein the subscription information indicates the traffic is subject to offload between the 3GPP access network and the non-3GPP access. 7. The method of claim 6, wherein the subscription information indicates a data type or application type of the traffic that is subject to offload. 8. The method of claim 6, wherein the subscription information indicates a data type or application type of the traffic that is not subject to offload. 9. The method of claim 6, wherein the subscription information indicates a quality of service (QoS) or QoS class indicator (QCI) associated with the traffic that is subject to offload. 10. The method of claim 9, wherein the forwarding the traffic further includes forwarding a bearer carrying a portion of the traffic on a condition the portion of the traffic matches the indicated QoS or QCI. 11. A third generation partnership project (3GPP) access network entity configured to offload data to a non-3GPP access point (AP), the 3GPP access network entity comprising:
a receiver configured to:
receive subscription information, wherein the subscription information includes indications of conditions for offloading traffic associated with a wireless transmit receive unit (WTRU); and
receive data associated with the WTRU;
a processor configured to determine whether to offload the data to the non-3GPP AP based on the data satisfying at least one condition indicated in the subscription information; and a transmitter configured to forward the data to the non-3GPP AP responsive to the processor determining that the data satisfies at least one condition indicated in the subscription information. 12. The 3GPP access network entity of claim 11, wherein the transmitter is further configured to connect directly with the non-3GPP AP. 13. The 3GPP access network entity of claim 11, wherein the 3GPP access network entity is one of an evolved Node-B (eNB), home eNB (HeNB), and HeNB gateway (GW). 14. The 3GPP access network entity of claim 11, wherein the non-3GPP AP is a WiFi AP. 15. The 3GPP access network entity of claim 11, wherein receiver is further configured to receive the subscription information from a home subscriber server (HSS). 16. The 3GPP access network entity of claim 11, wherein the subscription information indicates the traffic is subject to offload between the 3GPP access network and the non-3GPP access. 17. The 3GPP access network entity of claim 16, wherein the subscription information indicates a data type or application type of the traffic that is subject to offload. 18. The 3GPP access network entity of claim 16, wherein the subscription information indicates a data type or application type of the traffic that is not subject to offload. 19. The 3GPP access network entity of claim 16, wherein the subscription information indicates a quality of service (QoS) or QoS class indicator (QCI) associated with the traffic that is subject to offload. 20. The 3GPP access network entity of claim 19, wherein the transmitter is further configured to forward a bearer carrying a portion of the traffic on a condition the portion of the traffic matches the indicated QoS or QCI. | Methods and apparatuses for offloading traffic from a third generation partnership project (3GPP) access network to a non-3GPP access point (AP) are disclosed. A 3GPP access network entity may receive subscription information associated with a wireless transmit receive unit (WTRU). The 3GPP access network entity may further receive traffic associated with the WTRU. The 3GPP access network entity may further determine whether to offload the traffic to the non-3GPP AP based on the subscription information. The 3GPP access network entity may also forward the traffic to the non-3GPP AP based on its determination.1. A method for offloading traffic from a third generation partnership project (3GPP) access network to a non-3GPP access point (AP), comprising:
a 3GPP access network entity receiving subscription information associated with a wireless transmit receive unit (WTRU); the 3GPP access network entity receiving traffic associated with the WTRU; the 3GPP access network entity determining whether to offload the traffic to the non-3GPP AP based on the subscription information; and the 3GPP access network entity forwarding the traffic to the non-3GPP AP based on the determining. 2. The method of claim 1, wherein the 3GPP access network entity connects directly with the non-3GPP AP. 3. The method of claim 1, wherein the 3GPP access network entity is one of an evolved Node-B (eNB), home eNB (HeNB), and HeNB gateway (GW). 4. The method of claim 1, wherein the non-3GPP AP is a WiFi AP. 5. The method of claim 1, wherein the 3GPP access network entity receiving subscription information further comprises receiving the subscription information from a home subscriber server (HSS). 6. The method of claim 1, wherein the subscription information indicates the traffic is subject to offload between the 3GPP access network and the non-3GPP access. 7. The method of claim 6, wherein the subscription information indicates a data type or application type of the traffic that is subject to offload. 8. The method of claim 6, wherein the subscription information indicates a data type or application type of the traffic that is not subject to offload. 9. The method of claim 6, wherein the subscription information indicates a quality of service (QoS) or QoS class indicator (QCI) associated with the traffic that is subject to offload. 10. The method of claim 9, wherein the forwarding the traffic further includes forwarding a bearer carrying a portion of the traffic on a condition the portion of the traffic matches the indicated QoS or QCI. 11. A third generation partnership project (3GPP) access network entity configured to offload data to a non-3GPP access point (AP), the 3GPP access network entity comprising:
a receiver configured to:
receive subscription information, wherein the subscription information includes indications of conditions for offloading traffic associated with a wireless transmit receive unit (WTRU); and
receive data associated with the WTRU;
a processor configured to determine whether to offload the data to the non-3GPP AP based on the data satisfying at least one condition indicated in the subscription information; and a transmitter configured to forward the data to the non-3GPP AP responsive to the processor determining that the data satisfies at least one condition indicated in the subscription information. 12. The 3GPP access network entity of claim 11, wherein the transmitter is further configured to connect directly with the non-3GPP AP. 13. The 3GPP access network entity of claim 11, wherein the 3GPP access network entity is one of an evolved Node-B (eNB), home eNB (HeNB), and HeNB gateway (GW). 14. The 3GPP access network entity of claim 11, wherein the non-3GPP AP is a WiFi AP. 15. The 3GPP access network entity of claim 11, wherein receiver is further configured to receive the subscription information from a home subscriber server (HSS). 16. The 3GPP access network entity of claim 11, wherein the subscription information indicates the traffic is subject to offload between the 3GPP access network and the non-3GPP access. 17. The 3GPP access network entity of claim 16, wherein the subscription information indicates a data type or application type of the traffic that is subject to offload. 18. The 3GPP access network entity of claim 16, wherein the subscription information indicates a data type or application type of the traffic that is not subject to offload. 19. The 3GPP access network entity of claim 16, wherein the subscription information indicates a quality of service (QoS) or QoS class indicator (QCI) associated with the traffic that is subject to offload. 20. The 3GPP access network entity of claim 19, wherein the transmitter is further configured to forward a bearer carrying a portion of the traffic on a condition the portion of the traffic matches the indicated QoS or QCI. | 2,400 |
7,173 | 7,173 | 14,338,157 | 2,456 | Technology is disclosed for managing network storage services by service level objectives (SLOs). The method receives multiple service level capability (SLC) templates; creates at least one storage service level (SSL) instance using at least one of the SLC templates; provisions a storage object located in a network storage infrastructure based on the SSL instance; and services storage requests using the storage object. | 1. A method, comprising:
selecting an individual service level capability (SLC) template of multiple SLC templates based on hardware configuration of a storage network and a data storage provisioning request; creating at least one storage service level (SSL) instance based on the individual SLC template; provisioning a storage space in a storage server of the storage network for storing a data set based on the SSL instance, in response to the data storage provisioning request; and providing data access to the storage space. 2. The method of claim 1, wherein the SLC template comprises a protection profile and a storage profile, and the protection profile comprises topology information of the network storage controllers of the storage network, and wherein different protection profiles can be created using a set of storage profiles. 3. The method of claim 1, further comprising:
creating at least a local backup copy of the data set on the storage server based on a data replication topology of the individual SLC temp; and performing scheduled local backup processes based on one or more of a recovery point objective, a retention time or a schedule start time of a local recovery dimension of the individual SLC template. 4. The method of claim 1, further comprising:
creating at least a remote backup copy of the data set on a storage device separate from the storage server based on a backup recovery dimension of the individual SLC template; and creating at least a disaster backup copy of the data set on a cloud storage service based on a disaster recovery dimension of the individual SLC template. 5. The method of claim 1, wherein the servicing comprises:
controlling input/output (I/O) throughput rates between a performance ceiling and a performance floor specified by a performance dimension of the individual SLC template. 6. The method of claim 1, further comprising:
encrypting data of the data set based on an at-rest encryption field of a security dimension of the individual SLC template; and re-encrypting the data of the data set using a new key based on a re-key schedule of the security dimension of the individual SLC template. 7. The method of claim 1, further comprising:
creating an application level requirement template by combining multiple SLC templates together. 8. A computing device, comprising:
a memory containing machine readable medium comprising machine executable code having stored thereon instructions for performing a method of managing network storage controllers by employing service level objectives (SLOs); and a processor coupled to the memory, the processor configured to execute the machine executable code to:
receive multiple service level capability (SLC) templates;
create at least one storage service level (SSL) instance using at least one of the SLC templates;
provision a data set located in a network storage infrastructure based on the SSL instance; and
service storage requests using the data set. 9. The computing device of claim 8, wherein the processor is further configured to execute the machine executable code to:
determine the SLC templates independently from underlying hardware technologies using one or more SLO dimensions. 10. The computing device of claim 8, wherein the SLO dimensions are described using quantitative, vendor technology independent attributes such that an SLC template can be realized by multiple different underlying storage technologies. 11. The computing device of claim 8, wherein the processor is further configured to execute the machine executable code to:
based on the SLO dimensions that are described using the quantitative attributes, quantitively determine a performance and capacity headroom for provision a storage space, wherein the storage space is provisioned for a tenant, an application, a LUN, a file, or a storage object. 12. The computing device of claim 8, wherein the processor is further configured to execute the machine executable code to:
determine the SLC templates independently from underlying hardware technologies using one or more SLO dimensions including one or more of performance, local recovery, backup recovery, disaster recovery, availability, security, space guarantee, or durability. 13. The computing device of claim 12, wherein the processor is further configured to execute the machine executable code to:
identify a single unit of SLO dimension as a combination of multiple SLO dimensions. 14. The computing device of claim 8, wherein the processor is further configured to execute the machine executable code to:
determine a first SLC template of the multiple SLC templates that has different attribute values of at least one of the SLO dimensions than a second SLC template of the multiple SLC templates. 15. The computing device of claim 8, wherein the processor is further configured to execute the machine executable code to:
determine the SLC templates using the one or more SLO dimensions having attribute values that are quantitative and independent of the underlying hardware technologies and relate to multiple configuration settings of the network storage controllers. 16. A non-transitory machine readable medium having stored thereon instructions for performing a method of managing network storage controllers by service level objectives (SLOs), comprising machine executable code which when executed by at least one machine, causes the machine to:
create multiple storage service level (SSL) instances using at least one of multiple service level capability (SLC) templates by using a storage provider application programming interface (API); provision a storage object located in a network storage infrastructure based on the SSL instance; and service storage requests using the storage object. 17. The non-transitory machine readable medium of claim 16, wherein the machine executable code which when executed by at least one machine, further causes the machine to:
receive an order from a storage architect to create a service level capability (SLC) template by specifying different storage controller types and knob combinations within a storage controller type. 18. The non-transitory machine readable medium of claim 16, wherein the machine executable code which when executed by at least one machine, further causes the machine to:
drive an SLO monitoring engine, an SLO conformance engine or an SLO correction engine based on SLO specifications in the API. 19. The non-transitory machine readable medium of claim 16, wherein the machine executable code which when executed by at least one machine, further causes the machine to:
wrap the storage provider APIs in a driver implementation of a storage interface. 20. The non-transitory machine readable medium of claim 16, wherein the machine executable code which when executed by at least one machine, further causes the machine to:
generate a report showing storage objects provisioned by a tenant of the network storage controllers. | Technology is disclosed for managing network storage services by service level objectives (SLOs). The method receives multiple service level capability (SLC) templates; creates at least one storage service level (SSL) instance using at least one of the SLC templates; provisions a storage object located in a network storage infrastructure based on the SSL instance; and services storage requests using the storage object.1. A method, comprising:
selecting an individual service level capability (SLC) template of multiple SLC templates based on hardware configuration of a storage network and a data storage provisioning request; creating at least one storage service level (SSL) instance based on the individual SLC template; provisioning a storage space in a storage server of the storage network for storing a data set based on the SSL instance, in response to the data storage provisioning request; and providing data access to the storage space. 2. The method of claim 1, wherein the SLC template comprises a protection profile and a storage profile, and the protection profile comprises topology information of the network storage controllers of the storage network, and wherein different protection profiles can be created using a set of storage profiles. 3. The method of claim 1, further comprising:
creating at least a local backup copy of the data set on the storage server based on a data replication topology of the individual SLC temp; and performing scheduled local backup processes based on one or more of a recovery point objective, a retention time or a schedule start time of a local recovery dimension of the individual SLC template. 4. The method of claim 1, further comprising:
creating at least a remote backup copy of the data set on a storage device separate from the storage server based on a backup recovery dimension of the individual SLC template; and creating at least a disaster backup copy of the data set on a cloud storage service based on a disaster recovery dimension of the individual SLC template. 5. The method of claim 1, wherein the servicing comprises:
controlling input/output (I/O) throughput rates between a performance ceiling and a performance floor specified by a performance dimension of the individual SLC template. 6. The method of claim 1, further comprising:
encrypting data of the data set based on an at-rest encryption field of a security dimension of the individual SLC template; and re-encrypting the data of the data set using a new key based on a re-key schedule of the security dimension of the individual SLC template. 7. The method of claim 1, further comprising:
creating an application level requirement template by combining multiple SLC templates together. 8. A computing device, comprising:
a memory containing machine readable medium comprising machine executable code having stored thereon instructions for performing a method of managing network storage controllers by employing service level objectives (SLOs); and a processor coupled to the memory, the processor configured to execute the machine executable code to:
receive multiple service level capability (SLC) templates;
create at least one storage service level (SSL) instance using at least one of the SLC templates;
provision a data set located in a network storage infrastructure based on the SSL instance; and
service storage requests using the data set. 9. The computing device of claim 8, wherein the processor is further configured to execute the machine executable code to:
determine the SLC templates independently from underlying hardware technologies using one or more SLO dimensions. 10. The computing device of claim 8, wherein the SLO dimensions are described using quantitative, vendor technology independent attributes such that an SLC template can be realized by multiple different underlying storage technologies. 11. The computing device of claim 8, wherein the processor is further configured to execute the machine executable code to:
based on the SLO dimensions that are described using the quantitative attributes, quantitively determine a performance and capacity headroom for provision a storage space, wherein the storage space is provisioned for a tenant, an application, a LUN, a file, or a storage object. 12. The computing device of claim 8, wherein the processor is further configured to execute the machine executable code to:
determine the SLC templates independently from underlying hardware technologies using one or more SLO dimensions including one or more of performance, local recovery, backup recovery, disaster recovery, availability, security, space guarantee, or durability. 13. The computing device of claim 12, wherein the processor is further configured to execute the machine executable code to:
identify a single unit of SLO dimension as a combination of multiple SLO dimensions. 14. The computing device of claim 8, wherein the processor is further configured to execute the machine executable code to:
determine a first SLC template of the multiple SLC templates that has different attribute values of at least one of the SLO dimensions than a second SLC template of the multiple SLC templates. 15. The computing device of claim 8, wherein the processor is further configured to execute the machine executable code to:
determine the SLC templates using the one or more SLO dimensions having attribute values that are quantitative and independent of the underlying hardware technologies and relate to multiple configuration settings of the network storage controllers. 16. A non-transitory machine readable medium having stored thereon instructions for performing a method of managing network storage controllers by service level objectives (SLOs), comprising machine executable code which when executed by at least one machine, causes the machine to:
create multiple storage service level (SSL) instances using at least one of multiple service level capability (SLC) templates by using a storage provider application programming interface (API); provision a storage object located in a network storage infrastructure based on the SSL instance; and service storage requests using the storage object. 17. The non-transitory machine readable medium of claim 16, wherein the machine executable code which when executed by at least one machine, further causes the machine to:
receive an order from a storage architect to create a service level capability (SLC) template by specifying different storage controller types and knob combinations within a storage controller type. 18. The non-transitory machine readable medium of claim 16, wherein the machine executable code which when executed by at least one machine, further causes the machine to:
drive an SLO monitoring engine, an SLO conformance engine or an SLO correction engine based on SLO specifications in the API. 19. The non-transitory machine readable medium of claim 16, wherein the machine executable code which when executed by at least one machine, further causes the machine to:
wrap the storage provider APIs in a driver implementation of a storage interface. 20. The non-transitory machine readable medium of claim 16, wherein the machine executable code which when executed by at least one machine, further causes the machine to:
generate a report showing storage objects provisioned by a tenant of the network storage controllers. | 2,400 |
7,174 | 7,174 | 14,865,320 | 2,433 | In a method for certifying a website to be malware-free and owned by an entity fulfilling a trust criterion, such as a chartered financial institution, a request can be received via a network. The request can specify a domain name and a site map of the domain name. A processor can validate that all Uniform Resource Locators (URLs) in the site map are devoid of malware and that the domain name is owned by a chartered financial institution. A network-accessible document can certify that the domain name and all URLs in the site map are devoid of malware and that the domain name is owned by the chartered financial institution. The URLs can be validated periodically, and the document can be updated periodically. The document can be a single XML file stored in a centralized location, and can include validations from multiple website owned by respective financial institutions. | 1. A method, comprising:
receiving a request via a network, the request specifying a domain name and a site map of the domain name; validating, with a processor, that all Uniform Resource Locators (URLs) in the site map are devoid of malware and that the domain name is owned by an entity fulfilling a trust criterion; and publishing a document to a network-accessible location, the document certifying that the domain name and all URLs in the site map are devoid of malware and that the domain name is owned by the entity fulfilling the trust criterion. 2. The method of claim 1, wherein validating, with the processor, that all URLs in the site map are devoid of malware and that the domain name is owned by an entity fulfilling a trust criterion comprises:
sending the domain name and the site map, via a network, to a certification service; and receiving notification from the certification service, via the network, that the certification service certifies that all URLs in the site map are devoid of malware. 3. The method of claim 2, further comprising:
periodically validating, with a processor, that all URLs in the site map are devoid of malware; periodically refreshing the document to update a certification that the domain name and the site map are devoid of malware; and publishing the refreshed document to the network-accessible location, the refreshed document certifying that the domain name and all URLs in the site map are devoid of malware and that the domain name is owned by the entity fulfilling the trust criterion. 4. The method of claim 3, wherein periodically refreshing the document to update the certification that the domain name and the site map are devoid of malware comprises:
receiving periodic notification from the certification service, via the network, including updated certification from the certification service that all URLs in the site map are devoid of malware; and refreshing the document at least once an hour to update the certification that the domain name and the site map are devoid of malware. 5. The method of claim 4, wherein receiving periodic notification from the certification service, via the network, including updated certification from the certification service that all URLs in the site map are devoid of malware comprises:
receiving notification at least once an hour from the certification service, via the network, including updated certification from the certification service that all URLs in the site map are devoid of malware. 6. The method of claim 1,
wherein the entity is a chartered financial institution and the trust criterion is a charter of the financial institution; and wherein validating, with the processor, that all URLs in the site map are devoid of malware and that the domain name is owned by an entity fulfilling a trust criterion comprises: confirming receipt, with the processor, of a government-issued charter document corresponding to a financial institution. 7. The method of claim 1, wherein the document is in Extensible Markup Language (XML) and is accessible via a network. 8. The method of claim 7, wherein the XML document includes an element corresponding to each URL in the site map. 9. The method of claim 8, wherein each element includes attributes corresponding to common and legal names of the entity fulfilling the trust criterion. 10. The method of claim 8, wherein each element includes at least one attribute corresponding to counsel contact information at the entity fulfilling the trust criterion. 11. The method of claim 9, wherein the counsel contact information includes at least one of a physical address, an email address, a telephone number, and an automated contact point. 12. The method of claim 8, wherein each element includes attributes that:
indicate validity of a security certificate of the domain name; and indicate an expiration date of the security certificate. 13. The method of claim 8, wherein each element includes an attribute corresponding to confirmation of an audit of a trust criterion of the entity. 14. The method of claim 8, wherein each element includes an attribute corresponding to confirmation that all URLs in the site map are devoid of malware. 15. The method of claim 8, wherein each element includes attributes corresponding to a fully qualified domain name (FQDN) and a URL corresponding to a site map of the FQDN. 16. The method of claim 8, wherein each element includes at least one attribute corresponding to redirects in the site map. 17. A method, comprising:
receiving requests via a network, the requests specifying a plurality of domain names and a respective plurality of site maps of the plurality of domain names; validating, with a processor, that all Uniform Resource Locators (URLs) in each of the plurality of site maps are devoid of malware and that each of the plurality of domain names is owned by a respective entity fulfilling a trust criterion; and publishing a document to a network-accessible location, the document certifying that:
each of the plurality of domain names and each of the plurality of site maps are devoid of malware; and
each of the plurality of domain names is owned by a respective entity fulfilling a respective trust criterion. 18. The method of claim 17, further comprising:
periodically validating, with a processor, that all URLs in each of the plurality of site maps are devoid of malware; periodically refreshing the document to update a certification that each of the plurality of domain names and each of the plurality of site maps are devoid of malware; and publishing the refreshed document to the network-accessible location, the refreshed document certifying that:
each of the pluralities of domain names and each of the plurality of site maps are devoid of malware; and
each of the plurality of domain names is owned by the respective entity fulfilling the respective trust criterion. 19. A system, comprising:
a network interface device; at least one processor; and at least one memory device storing instructions executable by the at least one processor, the instructions being executable by the at least one processor to perform data processing activities, the data processing activities comprising:
receiving requests through the network interface device, the requests specifying a plurality of domain names and a respective plurality of site maps of the plurality of domain names;
validating, with the at least one processor, that all Uniform Resource Locators (URLs) in each of the plurality of site maps are devoid of malware and that each of the plurality of domain names is owned by a respective entity fulfilling a respective trust criterion; and
publishing a document to a network-accessible location, the document certifying that:
each of the plurality of domain names and each of the plurality of site maps are devoid of malware; and
each of the plurality of domain names is owned by a respective entity fulfilling a respective trust. 20. The system of claim 19, wherein the data processing activities further comprise:
periodically validating, with the at least one processor, that all URLs in each of the plurality of site maps are devoid of malware; periodically refreshing the document to update a certification that each of the plurality of domain names and each of the plurality of site maps are devoid of malware; and publishing the refreshed document to the network-accessible location, the refreshed document certifying that:
each of the pluralities of domain names and each of the plurality of site maps are devoid of malware; and
each of the plurality of domain names is owned by the respective entity fulfilling the respective trust criterion. | In a method for certifying a website to be malware-free and owned by an entity fulfilling a trust criterion, such as a chartered financial institution, a request can be received via a network. The request can specify a domain name and a site map of the domain name. A processor can validate that all Uniform Resource Locators (URLs) in the site map are devoid of malware and that the domain name is owned by a chartered financial institution. A network-accessible document can certify that the domain name and all URLs in the site map are devoid of malware and that the domain name is owned by the chartered financial institution. The URLs can be validated periodically, and the document can be updated periodically. The document can be a single XML file stored in a centralized location, and can include validations from multiple website owned by respective financial institutions.1. A method, comprising:
receiving a request via a network, the request specifying a domain name and a site map of the domain name; validating, with a processor, that all Uniform Resource Locators (URLs) in the site map are devoid of malware and that the domain name is owned by an entity fulfilling a trust criterion; and publishing a document to a network-accessible location, the document certifying that the domain name and all URLs in the site map are devoid of malware and that the domain name is owned by the entity fulfilling the trust criterion. 2. The method of claim 1, wherein validating, with the processor, that all URLs in the site map are devoid of malware and that the domain name is owned by an entity fulfilling a trust criterion comprises:
sending the domain name and the site map, via a network, to a certification service; and receiving notification from the certification service, via the network, that the certification service certifies that all URLs in the site map are devoid of malware. 3. The method of claim 2, further comprising:
periodically validating, with a processor, that all URLs in the site map are devoid of malware; periodically refreshing the document to update a certification that the domain name and the site map are devoid of malware; and publishing the refreshed document to the network-accessible location, the refreshed document certifying that the domain name and all URLs in the site map are devoid of malware and that the domain name is owned by the entity fulfilling the trust criterion. 4. The method of claim 3, wherein periodically refreshing the document to update the certification that the domain name and the site map are devoid of malware comprises:
receiving periodic notification from the certification service, via the network, including updated certification from the certification service that all URLs in the site map are devoid of malware; and refreshing the document at least once an hour to update the certification that the domain name and the site map are devoid of malware. 5. The method of claim 4, wherein receiving periodic notification from the certification service, via the network, including updated certification from the certification service that all URLs in the site map are devoid of malware comprises:
receiving notification at least once an hour from the certification service, via the network, including updated certification from the certification service that all URLs in the site map are devoid of malware. 6. The method of claim 1,
wherein the entity is a chartered financial institution and the trust criterion is a charter of the financial institution; and wherein validating, with the processor, that all URLs in the site map are devoid of malware and that the domain name is owned by an entity fulfilling a trust criterion comprises: confirming receipt, with the processor, of a government-issued charter document corresponding to a financial institution. 7. The method of claim 1, wherein the document is in Extensible Markup Language (XML) and is accessible via a network. 8. The method of claim 7, wherein the XML document includes an element corresponding to each URL in the site map. 9. The method of claim 8, wherein each element includes attributes corresponding to common and legal names of the entity fulfilling the trust criterion. 10. The method of claim 8, wherein each element includes at least one attribute corresponding to counsel contact information at the entity fulfilling the trust criterion. 11. The method of claim 9, wherein the counsel contact information includes at least one of a physical address, an email address, a telephone number, and an automated contact point. 12. The method of claim 8, wherein each element includes attributes that:
indicate validity of a security certificate of the domain name; and indicate an expiration date of the security certificate. 13. The method of claim 8, wherein each element includes an attribute corresponding to confirmation of an audit of a trust criterion of the entity. 14. The method of claim 8, wherein each element includes an attribute corresponding to confirmation that all URLs in the site map are devoid of malware. 15. The method of claim 8, wherein each element includes attributes corresponding to a fully qualified domain name (FQDN) and a URL corresponding to a site map of the FQDN. 16. The method of claim 8, wherein each element includes at least one attribute corresponding to redirects in the site map. 17. A method, comprising:
receiving requests via a network, the requests specifying a plurality of domain names and a respective plurality of site maps of the plurality of domain names; validating, with a processor, that all Uniform Resource Locators (URLs) in each of the plurality of site maps are devoid of malware and that each of the plurality of domain names is owned by a respective entity fulfilling a trust criterion; and publishing a document to a network-accessible location, the document certifying that:
each of the plurality of domain names and each of the plurality of site maps are devoid of malware; and
each of the plurality of domain names is owned by a respective entity fulfilling a respective trust criterion. 18. The method of claim 17, further comprising:
periodically validating, with a processor, that all URLs in each of the plurality of site maps are devoid of malware; periodically refreshing the document to update a certification that each of the plurality of domain names and each of the plurality of site maps are devoid of malware; and publishing the refreshed document to the network-accessible location, the refreshed document certifying that:
each of the pluralities of domain names and each of the plurality of site maps are devoid of malware; and
each of the plurality of domain names is owned by the respective entity fulfilling the respective trust criterion. 19. A system, comprising:
a network interface device; at least one processor; and at least one memory device storing instructions executable by the at least one processor, the instructions being executable by the at least one processor to perform data processing activities, the data processing activities comprising:
receiving requests through the network interface device, the requests specifying a plurality of domain names and a respective plurality of site maps of the plurality of domain names;
validating, with the at least one processor, that all Uniform Resource Locators (URLs) in each of the plurality of site maps are devoid of malware and that each of the plurality of domain names is owned by a respective entity fulfilling a respective trust criterion; and
publishing a document to a network-accessible location, the document certifying that:
each of the plurality of domain names and each of the plurality of site maps are devoid of malware; and
each of the plurality of domain names is owned by a respective entity fulfilling a respective trust. 20. The system of claim 19, wherein the data processing activities further comprise:
periodically validating, with the at least one processor, that all URLs in each of the plurality of site maps are devoid of malware; periodically refreshing the document to update a certification that each of the plurality of domain names and each of the plurality of site maps are devoid of malware; and publishing the refreshed document to the network-accessible location, the refreshed document certifying that:
each of the pluralities of domain names and each of the plurality of site maps are devoid of malware; and
each of the plurality of domain names is owned by the respective entity fulfilling the respective trust criterion. | 2,400 |
7,175 | 7,175 | 15,351,366 | 2,487 | Embodiments of the present invention comprise systems and methods for predicting high dynamic range (HDR) image blocks with block-specific prediction data, where the systems and methods may comprise low dynamic range (LDR) image data and HDR image data for a target image block, where a scaled, offset LDR image block may be combined with HDR residual image block to form an HDR image block corresponding to the target image block. | 1. A method for predicting a high dynamic range image block with differentially-coded prediction data, the method comprising:
receiving high dynamic range (HDR) image data for a first image block, the first image block HDR image data comprising a first prediction data for the first image block; receiving high dynamic range (HDR) image data for a second image block, the second image block HDR image data comprising a prediction difference data related to the first prediction data; combining the first prediction data and the prediction difference data to determine second prediction data for the second image block; and determining a first HDR residual image block based on the received HDR image data for the first image block and a decoded low dynamic range (LDR) image, wherein the LDR image is a scaled decoded LDR image, and wherein the scaled decoded LDR image is an offset scaled decoded LDR image. | Embodiments of the present invention comprise systems and methods for predicting high dynamic range (HDR) image blocks with block-specific prediction data, where the systems and methods may comprise low dynamic range (LDR) image data and HDR image data for a target image block, where a scaled, offset LDR image block may be combined with HDR residual image block to form an HDR image block corresponding to the target image block.1. A method for predicting a high dynamic range image block with differentially-coded prediction data, the method comprising:
receiving high dynamic range (HDR) image data for a first image block, the first image block HDR image data comprising a first prediction data for the first image block; receiving high dynamic range (HDR) image data for a second image block, the second image block HDR image data comprising a prediction difference data related to the first prediction data; combining the first prediction data and the prediction difference data to determine second prediction data for the second image block; and determining a first HDR residual image block based on the received HDR image data for the first image block and a decoded low dynamic range (LDR) image, wherein the LDR image is a scaled decoded LDR image, and wherein the scaled decoded LDR image is an offset scaled decoded LDR image. | 2,400 |
7,176 | 7,176 | 14,264,220 | 2,419 | Certain aspects of the present disclosure propose techniques for transmission time interval (TTI) bundling for physical downlink shared channel (PDSCH) in long term evolution (LTE). According to certain aspects a method is provided for wireless communications. The method may be performed, for example, by a user equipment (UE). The method generally includes identifying a transmit time interval (TTI) bundle comprising a subset of subframes from a set of subframes for transmitting data on a physical downlink shared channel (PDSCH) and receiving the data on the PDSCH in the subset of subframes. | 1. A method for wireless communications by a user equipment (UE), comprising:
identifying a transmit time interval (TTI) bundle comprising a subset of subframes from a set of subframes for transmitting data on a physical downlink shared channel (PDSCH); and receiving the data on the PDSCH in the subset of subframes. 2. The method of claim 1, wherein the PDSCH is broadcast or unicast. 3. The method of claim 1, wherein the data is in a frame structure of frequency division duplex (FDD) or time division duplex (TDD). 4. The method of claim 1, further comprising receiving signaling indicating the subset of subframes. 5. The method of claim 1, wherein the subset of subframes comprises non-multi-broadcast single frequency network (MBSFN) subframes for broadcast PDSCH. 6. The method of claim 1, further comprising:
identifying another signal configured to transmit in at least one subframe in the subset of subframes; and taking action in response to the identification. 7. The method of claim 6, wherein:
the PDSCH is for at least one of paging, system information broadcast, or random access response; the another signal comprises a channel state information (CSI) reference signal (CSI-RS); and the taking action comprises at least one of puncturing the PDSCH with the CSI-RS in the subset of subframes or performing rate matching for the PDSCH around resource elements (REs) occupied by the CSI-RS. 8. The method of claim 6, wherein:
the another signal comprises a reference signal (RS); and the taking action comprises dropping the RS. 9. The method of claim 8, wherein:
the RS comprises a channel state information (CSI) reference signal (CSI-RS); and the dropping the RS comprises dropping the CSI-RS in at least one of:
all possible subframes for TTI bundling for paging,
cell-specific subframes involved in TTI bundling for paging,
the subset of subframes for broadcast PDSCH with system information broadcast (SIBs), or
a first subframe of the subset of subframes. 10. The method of claim 8, wherein:
the RS comprises a positioning reference signal (PRS); and the dropping the RS comprises dropping the PRS in a first subframe of the subset of subframes, further comprising: dropping or partially dropping PDSCH transmissions in remaining subframes of the subset of subframes. 11. The method of claim 8, wherein:
the RS comprises positioning reference signals (PRS); and the dropping the RS comprises dropping the PRS in the subset of subframes. 12. The method of claim 6, wherein:
the taking action comprises skipping decoding multi-broadcast single frequency network (MBSFN) subframes in the subset of subframes. 13. The method of claim 6, wherein the taking action comprises receiving PDSCH based on cell-specific reference signal (CRS) or UE specific RS in multi-broadcast single frequency network (MBSFN) subframes in the subset of subframes. 14. The method of claim 6, wherein the taking action comprises declaring an error event for multi-broadcast single frequency network (MBSFN) subframes in the subset of subframes. 15. A method for wireless communications by a base station (BS), comprising:
identifying a transmit time interval (TTI) bundle comprising a subset of subframes from a set of subframes for transmitting data on a physical downlink shared channel (PDSCH); and transmitting the data on the PDSCH in the subset of subframes. 16. The method of claim 15, wherein the PDSCH is broadcast or unicast. 17. The method of claim 15, wherein the data is in a frame structure of frequency division duplex (FDD) or time division duplex (TDD). 18. The method of claim 15, further comprising signaling an indication of the subset of subframes. 19. The method of claim 15, wherein the subset of subframes comprises non-multimedia-broadcast single frequency network (MBSFN) subframes for PDSCH with system information blocks (SIBs). 20. The method of claim 15, further comprising:
identifying another signal configured to transmit in at least one subframe in the subset of subframes; and taking action in response to the identification. 21. The method of claim 20, wherein:
the PDSCH is for at least one of paging, system information broadcast, or random access response; the another signal comprises a channel state information (CSI) reference signal (RS); and the taking action comprises at least one of puncturing the PDSCH with the CSI-RS in the subset of subframes or performing rate matching for the PDSCH around resource elements (REs) occupied by the CSI-RS. 22. The method of claim 20, wherein:
the another signal comprises a reference signal (RS); and the taking action comprises dropping the RS. 23. The method of claim 22, wherein:
the RS comprises a channel state information (CSI) reference signal (CSI-RS); and the dropping comprises dropping the CSI-RS in at least one of:
all possible subframes for TTI bundling for paging,
cell-specific subframes involved in TTI bundling for paging,
the subset of subframes for broadcast PDSCH with system information broadcast (SIBs), or
a first subframe of the subset of subframes. 24. The method of claim 22, wherein:
the RS comprises a positioning reference signal (PRS); and the dropping the RS comprises dropping the PRS in a first subframe of the subset of subframes, further comprising: dropping or partially dropping PDSCH transmissions in remaining subframes of the subset of subframes. 25. The method of claim 22, wherein:
the RS comprises a positioning reference signal (PRS); and the dropping the RS comprises dropping the PRS in the subset of subframes. 26. The method of claim 20, wherein the taking action comprises transmitting PDSCH based on cell-specific reference signal (CRS) or UE specific RS in multi-broadcast single frequency network (MBSFN) subframes in the subset of subframes. 27. An apparatus for wireless communications by a user equipment (UE), comprising:
means for identifying a transmit time interval (TTI) bundle comprising a subset of subframes from a set of subframes for transmitting data on a physical downlink shared channel (PDSCH); and means for receiving the data on the PDSCH in the subset of subframes. 28. The apparatus of claim 27, further comprising:
means for identifying another signal configured to transmit in at least one subframe in the subset of subframes; and means for taking action in response to the identification. 29. An apparatus for wireless communications by a base station (BS), comprising:
means for identifying a transmit time interval (TTI) bundle comprising a subset of subframes from a set of subframes for transmitting data on a physical downlink shared channel (PDSCH); and means for transmitting the data on the PDSCH in the subset of subframes. 30. The apparatus of claim 29, further comprising:
means for identifying another signal configured to transmit in at least one subframe in the subset of subframes; and means for taking action in response to the identification. | Certain aspects of the present disclosure propose techniques for transmission time interval (TTI) bundling for physical downlink shared channel (PDSCH) in long term evolution (LTE). According to certain aspects a method is provided for wireless communications. The method may be performed, for example, by a user equipment (UE). The method generally includes identifying a transmit time interval (TTI) bundle comprising a subset of subframes from a set of subframes for transmitting data on a physical downlink shared channel (PDSCH) and receiving the data on the PDSCH in the subset of subframes.1. A method for wireless communications by a user equipment (UE), comprising:
identifying a transmit time interval (TTI) bundle comprising a subset of subframes from a set of subframes for transmitting data on a physical downlink shared channel (PDSCH); and receiving the data on the PDSCH in the subset of subframes. 2. The method of claim 1, wherein the PDSCH is broadcast or unicast. 3. The method of claim 1, wherein the data is in a frame structure of frequency division duplex (FDD) or time division duplex (TDD). 4. The method of claim 1, further comprising receiving signaling indicating the subset of subframes. 5. The method of claim 1, wherein the subset of subframes comprises non-multi-broadcast single frequency network (MBSFN) subframes for broadcast PDSCH. 6. The method of claim 1, further comprising:
identifying another signal configured to transmit in at least one subframe in the subset of subframes; and taking action in response to the identification. 7. The method of claim 6, wherein:
the PDSCH is for at least one of paging, system information broadcast, or random access response; the another signal comprises a channel state information (CSI) reference signal (CSI-RS); and the taking action comprises at least one of puncturing the PDSCH with the CSI-RS in the subset of subframes or performing rate matching for the PDSCH around resource elements (REs) occupied by the CSI-RS. 8. The method of claim 6, wherein:
the another signal comprises a reference signal (RS); and the taking action comprises dropping the RS. 9. The method of claim 8, wherein:
the RS comprises a channel state information (CSI) reference signal (CSI-RS); and the dropping the RS comprises dropping the CSI-RS in at least one of:
all possible subframes for TTI bundling for paging,
cell-specific subframes involved in TTI bundling for paging,
the subset of subframes for broadcast PDSCH with system information broadcast (SIBs), or
a first subframe of the subset of subframes. 10. The method of claim 8, wherein:
the RS comprises a positioning reference signal (PRS); and the dropping the RS comprises dropping the PRS in a first subframe of the subset of subframes, further comprising: dropping or partially dropping PDSCH transmissions in remaining subframes of the subset of subframes. 11. The method of claim 8, wherein:
the RS comprises positioning reference signals (PRS); and the dropping the RS comprises dropping the PRS in the subset of subframes. 12. The method of claim 6, wherein:
the taking action comprises skipping decoding multi-broadcast single frequency network (MBSFN) subframes in the subset of subframes. 13. The method of claim 6, wherein the taking action comprises receiving PDSCH based on cell-specific reference signal (CRS) or UE specific RS in multi-broadcast single frequency network (MBSFN) subframes in the subset of subframes. 14. The method of claim 6, wherein the taking action comprises declaring an error event for multi-broadcast single frequency network (MBSFN) subframes in the subset of subframes. 15. A method for wireless communications by a base station (BS), comprising:
identifying a transmit time interval (TTI) bundle comprising a subset of subframes from a set of subframes for transmitting data on a physical downlink shared channel (PDSCH); and transmitting the data on the PDSCH in the subset of subframes. 16. The method of claim 15, wherein the PDSCH is broadcast or unicast. 17. The method of claim 15, wherein the data is in a frame structure of frequency division duplex (FDD) or time division duplex (TDD). 18. The method of claim 15, further comprising signaling an indication of the subset of subframes. 19. The method of claim 15, wherein the subset of subframes comprises non-multimedia-broadcast single frequency network (MBSFN) subframes for PDSCH with system information blocks (SIBs). 20. The method of claim 15, further comprising:
identifying another signal configured to transmit in at least one subframe in the subset of subframes; and taking action in response to the identification. 21. The method of claim 20, wherein:
the PDSCH is for at least one of paging, system information broadcast, or random access response; the another signal comprises a channel state information (CSI) reference signal (RS); and the taking action comprises at least one of puncturing the PDSCH with the CSI-RS in the subset of subframes or performing rate matching for the PDSCH around resource elements (REs) occupied by the CSI-RS. 22. The method of claim 20, wherein:
the another signal comprises a reference signal (RS); and the taking action comprises dropping the RS. 23. The method of claim 22, wherein:
the RS comprises a channel state information (CSI) reference signal (CSI-RS); and the dropping comprises dropping the CSI-RS in at least one of:
all possible subframes for TTI bundling for paging,
cell-specific subframes involved in TTI bundling for paging,
the subset of subframes for broadcast PDSCH with system information broadcast (SIBs), or
a first subframe of the subset of subframes. 24. The method of claim 22, wherein:
the RS comprises a positioning reference signal (PRS); and the dropping the RS comprises dropping the PRS in a first subframe of the subset of subframes, further comprising: dropping or partially dropping PDSCH transmissions in remaining subframes of the subset of subframes. 25. The method of claim 22, wherein:
the RS comprises a positioning reference signal (PRS); and the dropping the RS comprises dropping the PRS in the subset of subframes. 26. The method of claim 20, wherein the taking action comprises transmitting PDSCH based on cell-specific reference signal (CRS) or UE specific RS in multi-broadcast single frequency network (MBSFN) subframes in the subset of subframes. 27. An apparatus for wireless communications by a user equipment (UE), comprising:
means for identifying a transmit time interval (TTI) bundle comprising a subset of subframes from a set of subframes for transmitting data on a physical downlink shared channel (PDSCH); and means for receiving the data on the PDSCH in the subset of subframes. 28. The apparatus of claim 27, further comprising:
means for identifying another signal configured to transmit in at least one subframe in the subset of subframes; and means for taking action in response to the identification. 29. An apparatus for wireless communications by a base station (BS), comprising:
means for identifying a transmit time interval (TTI) bundle comprising a subset of subframes from a set of subframes for transmitting data on a physical downlink shared channel (PDSCH); and means for transmitting the data on the PDSCH in the subset of subframes. 30. The apparatus of claim 29, further comprising:
means for identifying another signal configured to transmit in at least one subframe in the subset of subframes; and means for taking action in response to the identification. | 2,400 |
7,177 | 7,177 | 15,877,404 | 2,487 | A system for refereeing a sports match including a portable processing device for compiling data associated with the sports match and eyeglasses including data display means for displaying the data associated with the sports match to a wearer of the eyeglasses. | 1. A system comprising first and second devices for interaction between respective first and second persons, each of the first and second devices comprising:
a tactile surface responsive to the person touch or press; a first camera for capturing or imaging a visual image; a microphone configured and mounted for capturing the person originated voice; a first display configured and mounted for providing first visual data to the person; a sound transducer consisting of, or comprising, a loudspeaker, headphone, or earphone, that is configured and mounted for sounding an auditory data to the person; an antenna and a wireless transceiver coupled the antenna for wirelessly receiving first data and for wirelessly transmitting second data over a wireless network, the wireless transceiver is coupled to the first display for displaying the first visual data that is responsive to, includes, or is based on the received first data, the wireless transceiver is further coupled to the sound transducer for sounding the auditory data that is responsive to, includes, or is based on the received first data, the wireless transceiver is further coupled to the tactile surface, the first camera, or the microphone for the second data that is respectively responsive to, include, or is based on the person touch or press, the visual image, or the person originated voice; a software and a processor for executing the software, the processor coupled to control, receive data from, or transmit data to, the tactile surface, the first camera, the microphone, the first display, and the sound transducer; and a wearable eyewear frame configured for mounting or attaching thereon the processor, the antenna, the tactile surface, the first camera, the microphone, and the first display, wherein the first device is configured for transmitting, by via the antenna by the wireless transceiver of the first device, the visual image captured by the first camera of the first device, and wherein the second device is configured for receiving, by via the antenna by the wireless transceiver of the second device, the visual image sent by the first camera of the first device, and for displaying, by the first display of the second device, the received visual image. 2. The system according to claim 1, wherein each of the first and second devices further comprises a second camera configured and mounted for capturing or imaging the person eye or eyes, the second camera is coupled to the processor and is mounted on, or attached to, the respective wearable eyewear frame of the first and second devices. 3. The system according to claim 2, wherein in the first device or in the second device the visual image on the first display is responsive to the person eye movement captured by the second camera. 4. The system according to claim 1, wherein in the first device or in the second device the visual image on the first display is responsive to the person voice sensed by the microphone, or to the person touch or press sensed by the tactile surface. 5. The system according to claim 1, wherein the first device or the second device further comprises a memory coupled to the processor and to the first camera for storing the visual image captured by the first camera. 6. The system according to claim 1, wherein the second device is further operative to compare the visual image captured by the first camera of the second device and the received visual image captured by the first camera of the first device. 7. The system according to claim 1, wherein each of the first and second devices further comprises a distance measuring meter for measuring a distance coupled to the first display for displaying the measured distance, the distance measuring meter is coupled to the processor and is mounted on, or attached to, the respective wearable eyewear frame of the first and second devices. 8. The system according to claim 7, wherein distance measuring meter is based on light, laser, sound, ultrasonic sound, or optics. 9. The system according to claim 8, wherein the distance measuring meter is integrated with the first camera. 10. The system according to claim 1, wherein the first device or the second device further comprises a memory, and the respective first or second device is operative to store the first or second data in the memory. 11. The system according to claim 1, wherein each of the first and second devices is addressable in the wireless network. 12. The system according to claim 1, wherein each of the first and second devices is configured to, and shaped for, attach to an optical eye-glasses or sun-glasses. 13. The system according to claim 1, wherein the wireless transceiver consists of, or comprises, a modem (modulator/demodulator) using RF (Radio-Frequency) based Wireless Local Area Network (WLAN), Wireless Personal Area Network (WPAN), or Wireless Wide Area Network (WWAN). 14. The system according to claim 13, wherein the WLAN is according to, or based on, Wi-Fi standard, wherein the WPAN is according to, or based on, Bluetooth or ZigBee standard, wherein the WWAN is based on cellular or satellite communication. 15. The system according to claim 13, wherein the wireless communication is according to, is based on, or is using, a Wireless Personal Area Network (WPAN), the antenna is a WPAN antenna, and the wireless transceiver is a WPAN transceiver. 16. The device according to claim 15, wherein the WPAN is Bluetooth®. 17. The system according to claim 1, wherein the first or second device further comprises a random number generator coupled to, or part of, the respective processor, for generating a random number. 18. The system according to claim 1, wherein first display is coupled to the tactile surface so that the first device is further operative to display yellow or red background color on the first display in response to the person touch or press. 19. The system according to claim 1, wherein the first device further comprises a second display screen coupled to the processor and two opposed first and second exterior surfaces, and wherein the first display screen is attached to the first exterior surface and the second display is attached to the second exterior surface. 20. The system according to claim 1, wherein the sound transducer is coupled to the wireless transceiver and to the processor, and the first device is operative to vocalize at least part of the received first data. 21. The system according to claim 1, further comprising a third device, the third device comprising:
a software and a processor for executing the software, the software including an operating system; a memory storing the software coupled to the processor; an input component, consisting of or comprising a keyboard or a tactile surface coupled to the processor for capturing input data from a person; a display coupled to the processor for presenting visual information to the person; an antenna and a wireless transceiver coupled to the processor for wirelessly communicating with the first device; and a hand held enclosure for housing the processor, the memory, the input component, the wireless transmitter, and the display, wherein the third device is operative to receive the first input data from the person using the input component, to store the first input data in the memory, to display the first data on the display, and to transmit the first input data via the wireless transceiver to the first device, and wherein the first device is operative to wirelessly receive the first input data from the third device, to store the first input data in the memory, and to display the first input data on the first display of the first device. 22. The system according to claim 21, wherein the third device is operative to receive the visual data captured by the first camera of the first device via the antenna by the wireless transceiver of the third device, and to display the received visual data on the display of the third device. 23. The system according to claim 21, wherein the third device consists of, or is part of, a smartphone or a tablet. 24. The system according to claim 21, wherein the third device is configured to, and shaped as, an eyewear device. 25. The system according to claim 1, further comprising a plurality of two or more devices, each identical to the first device, wherein the plurality of two or more devices are configured for communicating with each other over a communication network via the respective antennas and wireless transceivers, where the second data of one of the plurality of devices is received as the first data by all other devices of the plurality of devices. 26. The system according to claim 25, wherein the communication network is a Wireless Wide Area Network (WWAN) or a Wireless Local Area Network (WLAN), and each of the antennas is respectively a WWAN or WLAN antenna, and each of the wireless transceivers is respectively WWAN or WLAN wireless transceiver. 27. The system according to claim 1, wherein the visual image captured by the first camera of the first device comprises a first human image, and wherein the visual image captured by the first camera of the second device comprises a second human image. 28. The system according to claim 1, wherein the first or second device is configured to compare the first and second human images for determining to include the same person. 29. The system according to claim 1, wherein the first or second device further comprises a memory coupled to the respective processor and to the respective microphone for storing a person originated voice. 30. The system according to claim 29, wherein the respective sound transducer is coupled to the respective memory for playing the stored person originated voice. | A system for refereeing a sports match including a portable processing device for compiling data associated with the sports match and eyeglasses including data display means for displaying the data associated with the sports match to a wearer of the eyeglasses.1. A system comprising first and second devices for interaction between respective first and second persons, each of the first and second devices comprising:
a tactile surface responsive to the person touch or press; a first camera for capturing or imaging a visual image; a microphone configured and mounted for capturing the person originated voice; a first display configured and mounted for providing first visual data to the person; a sound transducer consisting of, or comprising, a loudspeaker, headphone, or earphone, that is configured and mounted for sounding an auditory data to the person; an antenna and a wireless transceiver coupled the antenna for wirelessly receiving first data and for wirelessly transmitting second data over a wireless network, the wireless transceiver is coupled to the first display for displaying the first visual data that is responsive to, includes, or is based on the received first data, the wireless transceiver is further coupled to the sound transducer for sounding the auditory data that is responsive to, includes, or is based on the received first data, the wireless transceiver is further coupled to the tactile surface, the first camera, or the microphone for the second data that is respectively responsive to, include, or is based on the person touch or press, the visual image, or the person originated voice; a software and a processor for executing the software, the processor coupled to control, receive data from, or transmit data to, the tactile surface, the first camera, the microphone, the first display, and the sound transducer; and a wearable eyewear frame configured for mounting or attaching thereon the processor, the antenna, the tactile surface, the first camera, the microphone, and the first display, wherein the first device is configured for transmitting, by via the antenna by the wireless transceiver of the first device, the visual image captured by the first camera of the first device, and wherein the second device is configured for receiving, by via the antenna by the wireless transceiver of the second device, the visual image sent by the first camera of the first device, and for displaying, by the first display of the second device, the received visual image. 2. The system according to claim 1, wherein each of the first and second devices further comprises a second camera configured and mounted for capturing or imaging the person eye or eyes, the second camera is coupled to the processor and is mounted on, or attached to, the respective wearable eyewear frame of the first and second devices. 3. The system according to claim 2, wherein in the first device or in the second device the visual image on the first display is responsive to the person eye movement captured by the second camera. 4. The system according to claim 1, wherein in the first device or in the second device the visual image on the first display is responsive to the person voice sensed by the microphone, or to the person touch or press sensed by the tactile surface. 5. The system according to claim 1, wherein the first device or the second device further comprises a memory coupled to the processor and to the first camera for storing the visual image captured by the first camera. 6. The system according to claim 1, wherein the second device is further operative to compare the visual image captured by the first camera of the second device and the received visual image captured by the first camera of the first device. 7. The system according to claim 1, wherein each of the first and second devices further comprises a distance measuring meter for measuring a distance coupled to the first display for displaying the measured distance, the distance measuring meter is coupled to the processor and is mounted on, or attached to, the respective wearable eyewear frame of the first and second devices. 8. The system according to claim 7, wherein distance measuring meter is based on light, laser, sound, ultrasonic sound, or optics. 9. The system according to claim 8, wherein the distance measuring meter is integrated with the first camera. 10. The system according to claim 1, wherein the first device or the second device further comprises a memory, and the respective first or second device is operative to store the first or second data in the memory. 11. The system according to claim 1, wherein each of the first and second devices is addressable in the wireless network. 12. The system according to claim 1, wherein each of the first and second devices is configured to, and shaped for, attach to an optical eye-glasses or sun-glasses. 13. The system according to claim 1, wherein the wireless transceiver consists of, or comprises, a modem (modulator/demodulator) using RF (Radio-Frequency) based Wireless Local Area Network (WLAN), Wireless Personal Area Network (WPAN), or Wireless Wide Area Network (WWAN). 14. The system according to claim 13, wherein the WLAN is according to, or based on, Wi-Fi standard, wherein the WPAN is according to, or based on, Bluetooth or ZigBee standard, wherein the WWAN is based on cellular or satellite communication. 15. The system according to claim 13, wherein the wireless communication is according to, is based on, or is using, a Wireless Personal Area Network (WPAN), the antenna is a WPAN antenna, and the wireless transceiver is a WPAN transceiver. 16. The device according to claim 15, wherein the WPAN is Bluetooth®. 17. The system according to claim 1, wherein the first or second device further comprises a random number generator coupled to, or part of, the respective processor, for generating a random number. 18. The system according to claim 1, wherein first display is coupled to the tactile surface so that the first device is further operative to display yellow or red background color on the first display in response to the person touch or press. 19. The system according to claim 1, wherein the first device further comprises a second display screen coupled to the processor and two opposed first and second exterior surfaces, and wherein the first display screen is attached to the first exterior surface and the second display is attached to the second exterior surface. 20. The system according to claim 1, wherein the sound transducer is coupled to the wireless transceiver and to the processor, and the first device is operative to vocalize at least part of the received first data. 21. The system according to claim 1, further comprising a third device, the third device comprising:
a software and a processor for executing the software, the software including an operating system; a memory storing the software coupled to the processor; an input component, consisting of or comprising a keyboard or a tactile surface coupled to the processor for capturing input data from a person; a display coupled to the processor for presenting visual information to the person; an antenna and a wireless transceiver coupled to the processor for wirelessly communicating with the first device; and a hand held enclosure for housing the processor, the memory, the input component, the wireless transmitter, and the display, wherein the third device is operative to receive the first input data from the person using the input component, to store the first input data in the memory, to display the first data on the display, and to transmit the first input data via the wireless transceiver to the first device, and wherein the first device is operative to wirelessly receive the first input data from the third device, to store the first input data in the memory, and to display the first input data on the first display of the first device. 22. The system according to claim 21, wherein the third device is operative to receive the visual data captured by the first camera of the first device via the antenna by the wireless transceiver of the third device, and to display the received visual data on the display of the third device. 23. The system according to claim 21, wherein the third device consists of, or is part of, a smartphone or a tablet. 24. The system according to claim 21, wherein the third device is configured to, and shaped as, an eyewear device. 25. The system according to claim 1, further comprising a plurality of two or more devices, each identical to the first device, wherein the plurality of two or more devices are configured for communicating with each other over a communication network via the respective antennas and wireless transceivers, where the second data of one of the plurality of devices is received as the first data by all other devices of the plurality of devices. 26. The system according to claim 25, wherein the communication network is a Wireless Wide Area Network (WWAN) or a Wireless Local Area Network (WLAN), and each of the antennas is respectively a WWAN or WLAN antenna, and each of the wireless transceivers is respectively WWAN or WLAN wireless transceiver. 27. The system according to claim 1, wherein the visual image captured by the first camera of the first device comprises a first human image, and wherein the visual image captured by the first camera of the second device comprises a second human image. 28. The system according to claim 1, wherein the first or second device is configured to compare the first and second human images for determining to include the same person. 29. The system according to claim 1, wherein the first or second device further comprises a memory coupled to the respective processor and to the respective microphone for storing a person originated voice. 30. The system according to claim 29, wherein the respective sound transducer is coupled to the respective memory for playing the stored person originated voice. | 2,400 |
7,178 | 7,178 | 14,231,627 | 2,449 | A method of selective file synchronization between computing devices is disclosed. Creation of customized profiles for grouping digital content, such as application programs and multimedia files, and assignment of the content to the profiles is described. Digital content can be manually or automatically assigned to profiles. Customizable file synchronization profiles provide improved data security because private files can be excluded from a profile and will not be transferred. The disclosed subject matter is applicable to general purpose and special purpose computing devices in mobile and non-mobile environments. | 1. A computer-implemented method comprising:
receiving, from a user, a first label to assign to a first portion of data stored on a first device, the label indicating a first context in which the first portion of data is to be synchronized; receiving a request to synchronize the first device with a second device; determining a second context in which the request is received; determining that the second context is consistent with the first context; and performing a synchronization operation to synchronize the first portion of data with the second device. 2. The method of claim 1, further comprising:
receiving, from the user, a second label for a second portion of data stored on the first device, the second label indicating a third context in which the second portion of data is to be synchronized; determining that the second label prohibits synchronization in the third context; determining that the second context is consistent with the third context; and omitting the second portion of data from the synchronization operation. 3. The method of claim 1, further comprising:
receiving, from the user, a second label for a second portion of data stored on the first device, the second label indicating a third context in which the second portion of data is to be synchronized; determining that the third context is consistent with the first context; and performing a synchronization operation to synchronize the second portion of data with the second device 4. The method of claim 1, wherein the first portion of data stored on the first device comprises a software application. 5. The method of claim 1 wherein the first portion of data stored on the first device comprises data internal to a first application installed on the first device. 6. The method of claim 5 wherein the first portion of data stored on the first device comprises data internal to a second application installed on the first device. 7. The method of claim 1, wherein the synchronization operation comprises transferring a copy of the first portion of data from the first device to the second device. 8. The method of claim 1, further comprising providing a user interface to facilitate user interaction with the data synchronization operation. 9. The method of claim 8, further comprising displaying the label, and the portion of data assigned to the label. 10. The method of claim 1, wherein the label is defined by a set of human-readable characters of any length supported by the first device. 11. The method of claim 1, wherein the label comprises at least one selected from the group consisting of “sync”, “do not sync”, “private”, “personal”, “public”, “non-private”, “travel”, “financial”, and “games”. 12. The method of claim 1, wherein a device type of each of the first device and the second device comprises a type selected from the group consisting of: a cellular phone, a smartphone, a tablet computer, a personal digital assistant, a digital music player, a wearable device, a laptop computer, a Personal Computer (PC), a desktop computer, a networked server, a vehicle entertainment system, a global positioning system, and an in-flight entertainment system. 13. The method of claim 1, wherein the synchronization operation comprises establishing a communication between the first device and the second device without providing user account information to the second device. 14. A method comprising:
establishing, by a first device, a connection with a user mobile device; providing an indication of a context in which the first device is operable to connect to the user mobile device; receiving data from the user mobile device in a synchronization operation, the data being identified on the user mobile device by a label that is consistent with the context in which the first device is operable to connect to the user mobile device. 15. The method of claim 14 wherein the first portion of data stored on the first device comprises data internal to a first application installed on the first device. 16. The method of claim 15 wherein the first portion of data stored on the first device comprises data internal to a second application installed on the first device. 17. The method of claim 14, further comprising:
providing verification data to the user mobile device, the verification data providing verification that the first device is operable within the context. | A method of selective file synchronization between computing devices is disclosed. Creation of customized profiles for grouping digital content, such as application programs and multimedia files, and assignment of the content to the profiles is described. Digital content can be manually or automatically assigned to profiles. Customizable file synchronization profiles provide improved data security because private files can be excluded from a profile and will not be transferred. The disclosed subject matter is applicable to general purpose and special purpose computing devices in mobile and non-mobile environments.1. A computer-implemented method comprising:
receiving, from a user, a first label to assign to a first portion of data stored on a first device, the label indicating a first context in which the first portion of data is to be synchronized; receiving a request to synchronize the first device with a second device; determining a second context in which the request is received; determining that the second context is consistent with the first context; and performing a synchronization operation to synchronize the first portion of data with the second device. 2. The method of claim 1, further comprising:
receiving, from the user, a second label for a second portion of data stored on the first device, the second label indicating a third context in which the second portion of data is to be synchronized; determining that the second label prohibits synchronization in the third context; determining that the second context is consistent with the third context; and omitting the second portion of data from the synchronization operation. 3. The method of claim 1, further comprising:
receiving, from the user, a second label for a second portion of data stored on the first device, the second label indicating a third context in which the second portion of data is to be synchronized; determining that the third context is consistent with the first context; and performing a synchronization operation to synchronize the second portion of data with the second device 4. The method of claim 1, wherein the first portion of data stored on the first device comprises a software application. 5. The method of claim 1 wherein the first portion of data stored on the first device comprises data internal to a first application installed on the first device. 6. The method of claim 5 wherein the first portion of data stored on the first device comprises data internal to a second application installed on the first device. 7. The method of claim 1, wherein the synchronization operation comprises transferring a copy of the first portion of data from the first device to the second device. 8. The method of claim 1, further comprising providing a user interface to facilitate user interaction with the data synchronization operation. 9. The method of claim 8, further comprising displaying the label, and the portion of data assigned to the label. 10. The method of claim 1, wherein the label is defined by a set of human-readable characters of any length supported by the first device. 11. The method of claim 1, wherein the label comprises at least one selected from the group consisting of “sync”, “do not sync”, “private”, “personal”, “public”, “non-private”, “travel”, “financial”, and “games”. 12. The method of claim 1, wherein a device type of each of the first device and the second device comprises a type selected from the group consisting of: a cellular phone, a smartphone, a tablet computer, a personal digital assistant, a digital music player, a wearable device, a laptop computer, a Personal Computer (PC), a desktop computer, a networked server, a vehicle entertainment system, a global positioning system, and an in-flight entertainment system. 13. The method of claim 1, wherein the synchronization operation comprises establishing a communication between the first device and the second device without providing user account information to the second device. 14. A method comprising:
establishing, by a first device, a connection with a user mobile device; providing an indication of a context in which the first device is operable to connect to the user mobile device; receiving data from the user mobile device in a synchronization operation, the data being identified on the user mobile device by a label that is consistent with the context in which the first device is operable to connect to the user mobile device. 15. The method of claim 14 wherein the first portion of data stored on the first device comprises data internal to a first application installed on the first device. 16. The method of claim 15 wherein the first portion of data stored on the first device comprises data internal to a second application installed on the first device. 17. The method of claim 14, further comprising:
providing verification data to the user mobile device, the verification data providing verification that the first device is operable within the context. | 2,400 |
7,179 | 7,179 | 14,371,110 | 2,494 | A group structure preserving signature system that can be applied to groups based on symmetric bilinear mapping, that reduces the signature length, and that enables efficient computation of verification equations is provided. At least, information indicating p, G 1 , G 2 , G T , e, g 1 , and g 2 , information needed to obtain e(k u , h v ), and data that includes g s , h s , g t , h t , {g 1 , h 1 }, . . . , {g K , h K } are held as a public key vk, and data that includes vk, γ s , δ s , γ t , δ t , δ u , δ v , {γ 1 , δ 1 }, . . . , {γ K , δ K } are held as a secret key sk. A signature device selects ζ and ρ at random from integers between 0 and p−1, both inclusive, obtains w, s, t, and r, and generates, as a signature σ, data that includes w, s, t, and r. A verification device verifies the signature σ by using two verification equations. | 1. A signature verification system comprising:
a signature device which generates a signature, and a verification device which verifies the signature, the signature device comprising: a signature recording unit which records information indicating p, G1, G2, GT, e, g 1, and g2, information needed to obtain e(gu, gv) and e(hu, hv), and data that includes gs, hs, gt, ht, {g1, h1}, . . . , {gK, hK} as a public key vk and records data that includes vk, γs, δs, γt, δt, γu, δu, γv, δv, {γ1, δ1}, . . . , {γK, δK} as a secret key sk; and a signature generating unit which selects ζ and ρ at random from integers between 0 and p−1, both inclusive, obtains w, s, t, and r, as given below,
w
=
g
1
ζ
,
s
=
g
2
ρ
,
t
=
(
g
2
δ
u
·
δ
v
-
δ
s
·
ρ
∏
k
=
1
K
m
k
-
δ
k
)
1
/
δ
t
r
=
(
g
2
γ
u
·
γ
v
-
γ
s
·
ρ
·
t
-
γ
t
∏
k
=
1
K
m
k
-
γ
k
)
1
/
ζ
and generates, as a signature σ, data that includes w, s, t, and r; and
the verification device comprising:
a verification recording unit which records the public key vk; and
a verifying unit which checks whether two equations
e(g u ,g v)=e(g s ,s)e(g t ,t)(Πk=1 K e(g k ,m k))e(w,r),
e(h u ,h v)=e(h s, s)e)(h t ,t)Πk=1 K e(h k ,m k)
are satisfied, and which determines that the signature is correct when the two equations are satisfied, or determines that the signature is incorrect when at least one of the two equations is not satisfied,
where G1, G2, and GT represent groups of order p, e represents pairing of G1×G2→GT, g1 represents any generator of group G1, g2 represents any generator of group G2, K represents a predetermined integer not smaller than 1, k represents an integer between 1 and K, both inclusive, m1, . . . , mK represent elements of group G1, message M is M=(m1, . . . , mK), ̂ represents a power;
γs, δs, γt, δt, γu, δu, γv, δv, {γ1, δ1}, . . . , {γK, δK} are integers between 0 and p−1, both inclusive; and
gs, hs, gt, ht, gu, hu, gv, hv, {g1, h1}, . . . , {gK, hK} are given as follows:
gs=g1̂γshs=g1̂δs
gt=g1̂γtht=g1̂δt
gu=g1̂γuhu=g1̂δu
gv=g2̂γvhv=g2̂δv
gk=g1̂γkhk=g1̂δk
where k=1, . . . , K. 2. A signature verification system comprising:
a signature device which generates a signature, and a verification device which verifies the signature, the signature device comprising: a signature recording unit which records information indicating p, G1, G2, GT, e, g1, and g2, information needed to obtain e(hu, hv), and data that includes gs, hs, gt, ht, {g1, h1}, . . . , {gK, hK} as a public key vk and records data that includes vk, γs, δt, γt, δt, δu, δv, {γ1, δ1}, . . . , {γK, δK} as a secret key sk; and a signature generating unit which selects ζ and ρ at random from integers between 0 and p−1, both inclusive, obtains w, s, t, and r, as given below,
w
=
g
1
ζ
,
s
=
g
2
ρ
,
t
=
(
g
2
δ
u
·
δ
v
-
δ
s
·
ρ
∏
k
=
1
K
m
k
-
δ
k
)
1
/
δ
t
r
=
(
g
2
-
γ
s
·
ρ
·
t
-
γ
t
∏
k
=
1
K
m
k
-
γ
k
)
1
/
ζ
and generates, as a signature σ, data that includes w, s, t, and r; and
the verification device comprising:
a verification recording unit which records the public key vk; and
a verifying unit which checks whether two equations
1=e(g s , s)e(g t ,t)(Πk=1 K e(g k ,m k))e(w,r),
e(h u ,h v)=e(h s ,s)e(h t ,t)Πk=1 K e(h k ,m k)
are satisfied, and which determines that the signature is correct when the two equations are satisfied, or determines that the signature is incorrect when at least one of the two equations is not satisfied,
where G1, G2, and GT represent groups of order p, e represents pairing of G1×G2→GT, g1 represents any generator of group G1, g2 represents any generator of group G2, K represents a predetermined integer not smaller than 1, k represents an integer between 1 and K, both inclusive, m1, . . . , mK represent elements of group G1, message M is M=(m1, . . . , mK), ̂ represents a power;
γs, δs, γt, δt, δu, δv, {γ1, δ1}, . . . , {γK, δK} are integers between 0 and p−1, both inclusive; and
gs, hs, gt, ht, hu, hv, {g1, h1}, . . . , {gK, hK} are given as follows:
gs=g1̂γshs=g1̂δs
gt=gt̂γtht=g1̂δt
hu=g1̂δu
hv=g2̂δv
gk=g1̂γkhk=g1̂δk
where k=1, . . . , K. 3. A signature device comprising:
a signature recording unit which records information indicating p, G1, G2, GT, e, g1, and g2, information needed to obtain e(gu, gv) and e(hu, hv), and data that includes gs, hs, gt, ht, {g1, h1}, . . . , {gK, hK} as a public key vk and records data that includes vk, γs, δs, γt, δt, γu, δu, γv, δv, {γ1, δ1}, . . . , {γK, δK} as a secret key sk; and a signature generating unit which selects and p at random from integers between 0 and p−1, both inclusive, obtains w, s, t, and r, as given below,
w
=
g
1
ζ
,
s
=
g
2
ρ
,
t
=
(
g
2
δ
u
·
δ
v
-
δ
s
·
ρ
∏
k
=
1
K
m
k
-
δ
k
)
1
/
δ
t
r
=
(
g
2
γ
u
·
γ
v
-
γ
s
·
ρ
·
t
-
γ
t
∏
k
=
1
K
m
k
-
γ
k
)
1
/
ζ
and generates, as a signature σ, data that includes w, s, t, and r;
where G1, G2, and GT represent groups of order p, e represents pairing of G1×G2→GT, g1 represents any generator of group G1, g2 represents any generator of group G2, K represents a predetermined integer not smaller than 1, k represents an integer between 1 and K, both inclusive, m1, . . . , mK represent elements of group G1, message M is M=(m1, . . . , mK), ̂ represents a power;
γs, δs, γt, δt, γu, δu, γv, δv, {γ1, δ1}, . . . , {K, δK} are integers between 0 and p−1, both inclusive; and
gs, hs, gt, ht, gu, hu, gv, hv, {g1, h1}, . . . , {gK, hK} are given as follows:
gs=g1̂γshs=g1̂δs
gt=g1̂γtht=g1̂δt
gu=g1̂γuhu=g1̂δu
gv=g2̂γvhv=g2̂δv
gk=g1̂γkhk=g1̂δk
where k=1, . . . , K. 4. A signature device comprising:
a signature recording unit which records information indicating p, G1, G2, GT, e, g1, and g2, information needed to obtain e(hu, hv), and data that includes gs, hs, gt, ht, {g1, h1}, . . . , {gK, hK} as a public key vk and records data that includes vk, γs, δs, γt, δt, δu, δv, {γ1, δ1}, . . . , {γK, δK} as a secret key sk; and a signature generating unit which selects and ζ and ρ at random from integers between 0 and p−1, both inclusive, obtains w, s, t, and r, as given below,
w
=
g
1
ζ
,
s
=
g
2
ρ
,
t
=
(
g
2
δ
u
·
δ
v
-
δ
s
·
ρ
∏
k
=
1
K
m
k
-
δ
k
)
1
/
δ
t
r
=
(
g
2
-
γ
u
·
ρ
·
t
-
γ
t
∏
k
=
1
K
m
k
-
γ
k
)
1
/
ζ
and generates, as a signature σ, data that includes w, s, t, and r;
where G1, G2, and GT represent groups of order p, e represents pairing of G1×G2→GT, g1 represents any generator of group G1, g2 represents any generator of group G2, K represents a predetermined integer not smaller than 1, k represents an integer between 1 and K, both inclusive, m1, . . . , mK represent elements of group G1, message M is M=(m1, . . . , mK), ̂ represents a power;
γs, δss, γt, δt, δu, δv, {γ1, δ1}, . . . , {γK, δK} are integers between 0 and p−1, both inclusive; and
gs, hs, gt, ht, hu, hv, {g1, h1}, . . . , {gK, hK} are given as follows:
gs=g1̂γshs=g1̂δs
gt=g1̂γtht=g1̂δt
hu=g1̂δu
hv=g2̂δv
gk=g1̂γkhk=g1̂δk
where k=1, . . . , K. 5. A verification device comprising:
a verification recording unit which records information indicating p, G1, G2, GT, e, g1, and g2, information needed to obtain e(gu, gv) and e(hu, hv), and data that includes gs, hs, gt, ht, {g1, h1}, . . . , {gK, hK} as a public key vk; and a verifying unit which checks whether two equations
e(g u ,g v)=e(g s ,s)e(g t ,t)(Πk=1 K e(g k ,m k))e(w,r),
e(h u ,h v)=e(h s ,s)e)(h t ,t)Πk=1 K e(h k ,m k)
are satisfied, and which determines that the signature is correct when the two equations are satisfied, or determines that the signature is incorrect when at least one of the two equations is not satisfied,
where G1, G2, and GT represent groups of order p, e represents pairing of G1×G2→GT, g1 represents any generator of group G1, g2 represents any generator of group G2, K represents a predetermined integer not smaller than 1, k represents an integer between 1 and K, both inclusive, m1, . . . , mK represent elements of group G1, message M is M=(m1, . . . , mK), w is an element of group G1, s, t, and r are elements of group G2, a signature verified by the verification device is a data including w, s, t, and r, ̂ represents a power;
γs, δs, γt, δt, γu, δu, γv, δv, {γ1, δt}, . . . , {γK, δK} are integers between 0 and p−1, both inclusive; and
gs, hs, gt, ht, gu, hu, gv, hv, {g1, h1}, . . . , {gK, hK} are given as follows:
gs=g1̂γshs=g1̂δs
gt=g1̂γtht=g1̂δt
gu=g1̂γuhu=g1̂δu
gv=g2̂γvhv=g2̂δv
gk=g1̂γkhk=g1̂δk
where k=1, . . . , K. 6. A verification device comprising:
a verification recording unit which records information indicating p, G1, G2, GT, e, g1, and g2, information needed to obtain e(hu, hv), and data that includes gs, hs, gt, ht, {g1, h1}, . . . , {gK, hK} as a public key vk; and a verifying unit which checks whether two equations
1e(g s ,s)e(g t ,t)(Πk=1 K e(g k ,m k))e(w,r),
e(h u ,h v)=e(h s, s)e)(h t ,t)Πk=1 K e(h k ,m k)
are satisfied, and which determines that the signature is correct when the two equations are satisfied, or determines that the signature is incorrect when at least one of the two equations is not satisfied,
where G1, G2, and GT represent groups of order p, e represents pairing of G1×G2→GT, g1 represents any generator of group G1, g2 represents any generator of group G2, K represents a predetermined integer not smaller than 1, k represents an integer between 1 and K, both inclusive, m1, . . . , mK represent elements of group G1, message M is M=(m1, . . . , mK), w is an element of group G1, s, t, and r are elements of group G2, a signature verified by the verification device is a data including w, s, t, and r, ̂ represents a power;
γs, δs, γt, δt, δu, δv, {γ1, δ1}, . . . , {K, δK} are integers between 0 and p−1, both inclusive; and
gs, hs, gt, ht, hu, hv, {g1, h1}, . . . , {gK, hK} are given as follows:
gs=g1̂γshs=g1̂δs
gt=g1̂γtht=g1̂δt
hu=g1̂γu
hv=g2̂γv
gk=g1̂γkhk=g1̂δk
where k=1, . . . , K. 7. A signature verification method used with a signature device which generates a signature and a verification device which verifies the signature,
the signature verification method comprising: a signature recording step in which the signature device records information indicating p, G1, G2, GT, e, g1, and g2, information needed to obtain e(gu, gv) and e(hu, hv), and data that includes gs, hs, gt, ht, {g1, h1}, . . . , {gK, hK} as a public key vk and records data that includes vk, γs, δs, γt, δt, γu, δv, γv, δv, {γ1, δ1}, . . . , {K, δK} as a secret key sk; a signature generating step in which the signature device selects ζ and ρ at random from integers between 0 and p−1, both inclusive, obtains w, s, t, and r, as given below,
w
=
g
1
ζ
,
s
=
g
2
ρ
,
t
=
(
g
2
δ
u
·
δ
v
-
δ
s
·
ρ
∏
k
=
1
K
m
k
-
δ
k
)
1
/
δ
t
r
=
(
g
2
γ
u
·
γ
v
-
γ
s
·
ρ
·
t
-
γ
t
∏
k
=
1
K
m
k
-
γ
k
)
1
/
ζ
and generates, as a signature σ, data that includes w, s, t, and r;
a verification recording step in which the verification device records the public key vk; and
a verifying step in which the verification device checks whether two equations
e(g u ,g v)=e(g s ,s)e(g t ,t)(Πk=1 K e(g k ,m k))e(w,r),
e(h u ,h v)=e(h s, s)e)(h t ,t)Πk=1 K e(h k ,m k)
are satisfied, and determines that the signature is correct when the two equations are satisfied, or determines that the signature is incorrect when at least one of the two equations is not satisfied,
where G1, G2, and GT represent groups of order p, e represents pairing of G1×G2→GT, g1 represents any generator of group G1, g2 represents any generator of group G2, K represents a predetermined integer not smaller than 1, k represents an integer between 1 and K, both inclusive, m1, . . . , mK represent elements of group G1, message M is M=(m1, . . . , mK), ̂ represents a power;
γs, δs, γt, δt, γu, δu, γv, δv, {γ1, δ1}, . . . , {γK, δK} are integers between 0 and p−1, both inclusive; and
gs, hs, gt, ht, gu, hu, gv, hv, {g1, h1}, . . . , {gK, hK} are given as follows:
gs=g1̂γshs=g1̂δs
gt=g1̂γtht=g1̂δt
gu=g1̂γuhu=g1̂δu
gv=g2̂γvhv=g2̂δv
gk=g1̂γkhk=g1̂δk
where k=1, . . . , K. 8. A signature verification method used with a signature device which generates a signature and a verification device which verifies the signature,
the signature verification method comprising: a signature recording step in which the signature device records information indicating p, G1, G2, GT, e, gt, and g2, information needed to obtain e(hu, hv), and data that includes gs, hs, gt, ht, {g 1, h1}, . . . , {gK, hK} as a public key vk and records data that includes vk, γs, δs, γt, δu, δv, {γ1, δ1}, . . . , {γ6 K, δK} as a secret key sk; a signature generating step in which the signature device selects ζ and ρ at random from integers between 0 and p−1, both inclusive, obtains w, s, t, and r, as given below,
w
=
g
1
ζ
,
s
=
g
2
ρ
,
t
=
(
g
2
δ
u
·
δ
v
-
δ
s
·
ρ
∏
k
=
1
K
m
k
-
δ
k
)
1
/
δ
t
r
=
(
g
2
-
γ
u
·
ρ
·
t
-
γ
t
∏
k
=
1
K
m
k
-
γ
k
)
1
/
ζ
and generates, as a signature σ, data that includes w, s, t, and r;
a verification recording step in which the verification device records the public key vk; and
a verifying step in which the verification device checks whether two equations
1=e(g s ,s)e(g t ,t)(Πk=1 K e(g k ,m k))e(w,r),
e(h u ,h v)=e(h s, s)e)(h t ,t)Πk=1 K e(h k ,m k)
are satisfied, and determines that the signature is correct when the two equations are satisfied, or it is determined that the signature is incorrect when at least one of the two equations is not satisfied,
where G1, G2, and GT represent groups of order p, e represents pairing of G1×G2→GT, g1 represents any generator of group G1, g2 represents any generator of group G2, K represents a predetermined integer not smaller than 1, k represents an integer between 1 and K, both inclusive, m1, . . . , mK represent elements of group G1, message M is M=(m1, . . . , mK), ̂ represents a power;
γs, δs, γt, δt, δu, δv, {γ1, δ1}, . . . , {K, δK} are integers between 0 and −1, both inclusive; and
gs, hs, gt, ht, hu, hu, gv, {g1, h1}, . . . , {gK, hK} are given as follows:
gs=g1̂γshs=g1̂δs
gt=g1̂γtht=g1̂δt
hu=g1̂δu
hv=g2̂δv
gk=g1̂γkhk=g1̂δk
where k=1, . . . , K. | A group structure preserving signature system that can be applied to groups based on symmetric bilinear mapping, that reduces the signature length, and that enables efficient computation of verification equations is provided. At least, information indicating p, G 1 , G 2 , G T , e, g 1 , and g 2 , information needed to obtain e(k u , h v ), and data that includes g s , h s , g t , h t , {g 1 , h 1 }, . . . , {g K , h K } are held as a public key vk, and data that includes vk, γ s , δ s , γ t , δ t , δ u , δ v , {γ 1 , δ 1 }, . . . , {γ K , δ K } are held as a secret key sk. A signature device selects ζ and ρ at random from integers between 0 and p−1, both inclusive, obtains w, s, t, and r, and generates, as a signature σ, data that includes w, s, t, and r. A verification device verifies the signature σ by using two verification equations.1. A signature verification system comprising:
a signature device which generates a signature, and a verification device which verifies the signature, the signature device comprising: a signature recording unit which records information indicating p, G1, G2, GT, e, g 1, and g2, information needed to obtain e(gu, gv) and e(hu, hv), and data that includes gs, hs, gt, ht, {g1, h1}, . . . , {gK, hK} as a public key vk and records data that includes vk, γs, δs, γt, δt, γu, δu, γv, δv, {γ1, δ1}, . . . , {γK, δK} as a secret key sk; and a signature generating unit which selects ζ and ρ at random from integers between 0 and p−1, both inclusive, obtains w, s, t, and r, as given below,
w
=
g
1
ζ
,
s
=
g
2
ρ
,
t
=
(
g
2
δ
u
·
δ
v
-
δ
s
·
ρ
∏
k
=
1
K
m
k
-
δ
k
)
1
/
δ
t
r
=
(
g
2
γ
u
·
γ
v
-
γ
s
·
ρ
·
t
-
γ
t
∏
k
=
1
K
m
k
-
γ
k
)
1
/
ζ
and generates, as a signature σ, data that includes w, s, t, and r; and
the verification device comprising:
a verification recording unit which records the public key vk; and
a verifying unit which checks whether two equations
e(g u ,g v)=e(g s ,s)e(g t ,t)(Πk=1 K e(g k ,m k))e(w,r),
e(h u ,h v)=e(h s, s)e)(h t ,t)Πk=1 K e(h k ,m k)
are satisfied, and which determines that the signature is correct when the two equations are satisfied, or determines that the signature is incorrect when at least one of the two equations is not satisfied,
where G1, G2, and GT represent groups of order p, e represents pairing of G1×G2→GT, g1 represents any generator of group G1, g2 represents any generator of group G2, K represents a predetermined integer not smaller than 1, k represents an integer between 1 and K, both inclusive, m1, . . . , mK represent elements of group G1, message M is M=(m1, . . . , mK), ̂ represents a power;
γs, δs, γt, δt, γu, δu, γv, δv, {γ1, δ1}, . . . , {γK, δK} are integers between 0 and p−1, both inclusive; and
gs, hs, gt, ht, gu, hu, gv, hv, {g1, h1}, . . . , {gK, hK} are given as follows:
gs=g1̂γshs=g1̂δs
gt=g1̂γtht=g1̂δt
gu=g1̂γuhu=g1̂δu
gv=g2̂γvhv=g2̂δv
gk=g1̂γkhk=g1̂δk
where k=1, . . . , K. 2. A signature verification system comprising:
a signature device which generates a signature, and a verification device which verifies the signature, the signature device comprising: a signature recording unit which records information indicating p, G1, G2, GT, e, g1, and g2, information needed to obtain e(hu, hv), and data that includes gs, hs, gt, ht, {g1, h1}, . . . , {gK, hK} as a public key vk and records data that includes vk, γs, δt, γt, δt, δu, δv, {γ1, δ1}, . . . , {γK, δK} as a secret key sk; and a signature generating unit which selects ζ and ρ at random from integers between 0 and p−1, both inclusive, obtains w, s, t, and r, as given below,
w
=
g
1
ζ
,
s
=
g
2
ρ
,
t
=
(
g
2
δ
u
·
δ
v
-
δ
s
·
ρ
∏
k
=
1
K
m
k
-
δ
k
)
1
/
δ
t
r
=
(
g
2
-
γ
s
·
ρ
·
t
-
γ
t
∏
k
=
1
K
m
k
-
γ
k
)
1
/
ζ
and generates, as a signature σ, data that includes w, s, t, and r; and
the verification device comprising:
a verification recording unit which records the public key vk; and
a verifying unit which checks whether two equations
1=e(g s , s)e(g t ,t)(Πk=1 K e(g k ,m k))e(w,r),
e(h u ,h v)=e(h s ,s)e(h t ,t)Πk=1 K e(h k ,m k)
are satisfied, and which determines that the signature is correct when the two equations are satisfied, or determines that the signature is incorrect when at least one of the two equations is not satisfied,
where G1, G2, and GT represent groups of order p, e represents pairing of G1×G2→GT, g1 represents any generator of group G1, g2 represents any generator of group G2, K represents a predetermined integer not smaller than 1, k represents an integer between 1 and K, both inclusive, m1, . . . , mK represent elements of group G1, message M is M=(m1, . . . , mK), ̂ represents a power;
γs, δs, γt, δt, δu, δv, {γ1, δ1}, . . . , {γK, δK} are integers between 0 and p−1, both inclusive; and
gs, hs, gt, ht, hu, hv, {g1, h1}, . . . , {gK, hK} are given as follows:
gs=g1̂γshs=g1̂δs
gt=gt̂γtht=g1̂δt
hu=g1̂δu
hv=g2̂δv
gk=g1̂γkhk=g1̂δk
where k=1, . . . , K. 3. A signature device comprising:
a signature recording unit which records information indicating p, G1, G2, GT, e, g1, and g2, information needed to obtain e(gu, gv) and e(hu, hv), and data that includes gs, hs, gt, ht, {g1, h1}, . . . , {gK, hK} as a public key vk and records data that includes vk, γs, δs, γt, δt, γu, δu, γv, δv, {γ1, δ1}, . . . , {γK, δK} as a secret key sk; and a signature generating unit which selects and p at random from integers between 0 and p−1, both inclusive, obtains w, s, t, and r, as given below,
w
=
g
1
ζ
,
s
=
g
2
ρ
,
t
=
(
g
2
δ
u
·
δ
v
-
δ
s
·
ρ
∏
k
=
1
K
m
k
-
δ
k
)
1
/
δ
t
r
=
(
g
2
γ
u
·
γ
v
-
γ
s
·
ρ
·
t
-
γ
t
∏
k
=
1
K
m
k
-
γ
k
)
1
/
ζ
and generates, as a signature σ, data that includes w, s, t, and r;
where G1, G2, and GT represent groups of order p, e represents pairing of G1×G2→GT, g1 represents any generator of group G1, g2 represents any generator of group G2, K represents a predetermined integer not smaller than 1, k represents an integer between 1 and K, both inclusive, m1, . . . , mK represent elements of group G1, message M is M=(m1, . . . , mK), ̂ represents a power;
γs, δs, γt, δt, γu, δu, γv, δv, {γ1, δ1}, . . . , {K, δK} are integers between 0 and p−1, both inclusive; and
gs, hs, gt, ht, gu, hu, gv, hv, {g1, h1}, . . . , {gK, hK} are given as follows:
gs=g1̂γshs=g1̂δs
gt=g1̂γtht=g1̂δt
gu=g1̂γuhu=g1̂δu
gv=g2̂γvhv=g2̂δv
gk=g1̂γkhk=g1̂δk
where k=1, . . . , K. 4. A signature device comprising:
a signature recording unit which records information indicating p, G1, G2, GT, e, g1, and g2, information needed to obtain e(hu, hv), and data that includes gs, hs, gt, ht, {g1, h1}, . . . , {gK, hK} as a public key vk and records data that includes vk, γs, δs, γt, δt, δu, δv, {γ1, δ1}, . . . , {γK, δK} as a secret key sk; and a signature generating unit which selects and ζ and ρ at random from integers between 0 and p−1, both inclusive, obtains w, s, t, and r, as given below,
w
=
g
1
ζ
,
s
=
g
2
ρ
,
t
=
(
g
2
δ
u
·
δ
v
-
δ
s
·
ρ
∏
k
=
1
K
m
k
-
δ
k
)
1
/
δ
t
r
=
(
g
2
-
γ
u
·
ρ
·
t
-
γ
t
∏
k
=
1
K
m
k
-
γ
k
)
1
/
ζ
and generates, as a signature σ, data that includes w, s, t, and r;
where G1, G2, and GT represent groups of order p, e represents pairing of G1×G2→GT, g1 represents any generator of group G1, g2 represents any generator of group G2, K represents a predetermined integer not smaller than 1, k represents an integer between 1 and K, both inclusive, m1, . . . , mK represent elements of group G1, message M is M=(m1, . . . , mK), ̂ represents a power;
γs, δss, γt, δt, δu, δv, {γ1, δ1}, . . . , {γK, δK} are integers between 0 and p−1, both inclusive; and
gs, hs, gt, ht, hu, hv, {g1, h1}, . . . , {gK, hK} are given as follows:
gs=g1̂γshs=g1̂δs
gt=g1̂γtht=g1̂δt
hu=g1̂δu
hv=g2̂δv
gk=g1̂γkhk=g1̂δk
where k=1, . . . , K. 5. A verification device comprising:
a verification recording unit which records information indicating p, G1, G2, GT, e, g1, and g2, information needed to obtain e(gu, gv) and e(hu, hv), and data that includes gs, hs, gt, ht, {g1, h1}, . . . , {gK, hK} as a public key vk; and a verifying unit which checks whether two equations
e(g u ,g v)=e(g s ,s)e(g t ,t)(Πk=1 K e(g k ,m k))e(w,r),
e(h u ,h v)=e(h s ,s)e)(h t ,t)Πk=1 K e(h k ,m k)
are satisfied, and which determines that the signature is correct when the two equations are satisfied, or determines that the signature is incorrect when at least one of the two equations is not satisfied,
where G1, G2, and GT represent groups of order p, e represents pairing of G1×G2→GT, g1 represents any generator of group G1, g2 represents any generator of group G2, K represents a predetermined integer not smaller than 1, k represents an integer between 1 and K, both inclusive, m1, . . . , mK represent elements of group G1, message M is M=(m1, . . . , mK), w is an element of group G1, s, t, and r are elements of group G2, a signature verified by the verification device is a data including w, s, t, and r, ̂ represents a power;
γs, δs, γt, δt, γu, δu, γv, δv, {γ1, δt}, . . . , {γK, δK} are integers between 0 and p−1, both inclusive; and
gs, hs, gt, ht, gu, hu, gv, hv, {g1, h1}, . . . , {gK, hK} are given as follows:
gs=g1̂γshs=g1̂δs
gt=g1̂γtht=g1̂δt
gu=g1̂γuhu=g1̂δu
gv=g2̂γvhv=g2̂δv
gk=g1̂γkhk=g1̂δk
where k=1, . . . , K. 6. A verification device comprising:
a verification recording unit which records information indicating p, G1, G2, GT, e, g1, and g2, information needed to obtain e(hu, hv), and data that includes gs, hs, gt, ht, {g1, h1}, . . . , {gK, hK} as a public key vk; and a verifying unit which checks whether two equations
1e(g s ,s)e(g t ,t)(Πk=1 K e(g k ,m k))e(w,r),
e(h u ,h v)=e(h s, s)e)(h t ,t)Πk=1 K e(h k ,m k)
are satisfied, and which determines that the signature is correct when the two equations are satisfied, or determines that the signature is incorrect when at least one of the two equations is not satisfied,
where G1, G2, and GT represent groups of order p, e represents pairing of G1×G2→GT, g1 represents any generator of group G1, g2 represents any generator of group G2, K represents a predetermined integer not smaller than 1, k represents an integer between 1 and K, both inclusive, m1, . . . , mK represent elements of group G1, message M is M=(m1, . . . , mK), w is an element of group G1, s, t, and r are elements of group G2, a signature verified by the verification device is a data including w, s, t, and r, ̂ represents a power;
γs, δs, γt, δt, δu, δv, {γ1, δ1}, . . . , {K, δK} are integers between 0 and p−1, both inclusive; and
gs, hs, gt, ht, hu, hv, {g1, h1}, . . . , {gK, hK} are given as follows:
gs=g1̂γshs=g1̂δs
gt=g1̂γtht=g1̂δt
hu=g1̂γu
hv=g2̂γv
gk=g1̂γkhk=g1̂δk
where k=1, . . . , K. 7. A signature verification method used with a signature device which generates a signature and a verification device which verifies the signature,
the signature verification method comprising: a signature recording step in which the signature device records information indicating p, G1, G2, GT, e, g1, and g2, information needed to obtain e(gu, gv) and e(hu, hv), and data that includes gs, hs, gt, ht, {g1, h1}, . . . , {gK, hK} as a public key vk and records data that includes vk, γs, δs, γt, δt, γu, δv, γv, δv, {γ1, δ1}, . . . , {K, δK} as a secret key sk; a signature generating step in which the signature device selects ζ and ρ at random from integers between 0 and p−1, both inclusive, obtains w, s, t, and r, as given below,
w
=
g
1
ζ
,
s
=
g
2
ρ
,
t
=
(
g
2
δ
u
·
δ
v
-
δ
s
·
ρ
∏
k
=
1
K
m
k
-
δ
k
)
1
/
δ
t
r
=
(
g
2
γ
u
·
γ
v
-
γ
s
·
ρ
·
t
-
γ
t
∏
k
=
1
K
m
k
-
γ
k
)
1
/
ζ
and generates, as a signature σ, data that includes w, s, t, and r;
a verification recording step in which the verification device records the public key vk; and
a verifying step in which the verification device checks whether two equations
e(g u ,g v)=e(g s ,s)e(g t ,t)(Πk=1 K e(g k ,m k))e(w,r),
e(h u ,h v)=e(h s, s)e)(h t ,t)Πk=1 K e(h k ,m k)
are satisfied, and determines that the signature is correct when the two equations are satisfied, or determines that the signature is incorrect when at least one of the two equations is not satisfied,
where G1, G2, and GT represent groups of order p, e represents pairing of G1×G2→GT, g1 represents any generator of group G1, g2 represents any generator of group G2, K represents a predetermined integer not smaller than 1, k represents an integer between 1 and K, both inclusive, m1, . . . , mK represent elements of group G1, message M is M=(m1, . . . , mK), ̂ represents a power;
γs, δs, γt, δt, γu, δu, γv, δv, {γ1, δ1}, . . . , {γK, δK} are integers between 0 and p−1, both inclusive; and
gs, hs, gt, ht, gu, hu, gv, hv, {g1, h1}, . . . , {gK, hK} are given as follows:
gs=g1̂γshs=g1̂δs
gt=g1̂γtht=g1̂δt
gu=g1̂γuhu=g1̂δu
gv=g2̂γvhv=g2̂δv
gk=g1̂γkhk=g1̂δk
where k=1, . . . , K. 8. A signature verification method used with a signature device which generates a signature and a verification device which verifies the signature,
the signature verification method comprising: a signature recording step in which the signature device records information indicating p, G1, G2, GT, e, gt, and g2, information needed to obtain e(hu, hv), and data that includes gs, hs, gt, ht, {g 1, h1}, . . . , {gK, hK} as a public key vk and records data that includes vk, γs, δs, γt, δu, δv, {γ1, δ1}, . . . , {γ6 K, δK} as a secret key sk; a signature generating step in which the signature device selects ζ and ρ at random from integers between 0 and p−1, both inclusive, obtains w, s, t, and r, as given below,
w
=
g
1
ζ
,
s
=
g
2
ρ
,
t
=
(
g
2
δ
u
·
δ
v
-
δ
s
·
ρ
∏
k
=
1
K
m
k
-
δ
k
)
1
/
δ
t
r
=
(
g
2
-
γ
u
·
ρ
·
t
-
γ
t
∏
k
=
1
K
m
k
-
γ
k
)
1
/
ζ
and generates, as a signature σ, data that includes w, s, t, and r;
a verification recording step in which the verification device records the public key vk; and
a verifying step in which the verification device checks whether two equations
1=e(g s ,s)e(g t ,t)(Πk=1 K e(g k ,m k))e(w,r),
e(h u ,h v)=e(h s, s)e)(h t ,t)Πk=1 K e(h k ,m k)
are satisfied, and determines that the signature is correct when the two equations are satisfied, or it is determined that the signature is incorrect when at least one of the two equations is not satisfied,
where G1, G2, and GT represent groups of order p, e represents pairing of G1×G2→GT, g1 represents any generator of group G1, g2 represents any generator of group G2, K represents a predetermined integer not smaller than 1, k represents an integer between 1 and K, both inclusive, m1, . . . , mK represent elements of group G1, message M is M=(m1, . . . , mK), ̂ represents a power;
γs, δs, γt, δt, δu, δv, {γ1, δ1}, . . . , {K, δK} are integers between 0 and −1, both inclusive; and
gs, hs, gt, ht, hu, hu, gv, {g1, h1}, . . . , {gK, hK} are given as follows:
gs=g1̂γshs=g1̂δs
gt=g1̂γtht=g1̂δt
hu=g1̂δu
hv=g2̂δv
gk=g1̂γkhk=g1̂δk
where k=1, . . . , K. | 2,400 |
7,180 | 7,180 | 15,012,801 | 2,465 | In one embodiment, packet forwarding apparatus includes a data packet receiving interface, a data packet forwarding interface, and a configuration interface. The apparatus also includes circuitry that defines a plurality of data packet forwarding paths between the data packet receiving interface and the data packet forwarding interface. The circuitry defines at least one of the plurality of data packet forwarding paths in response to input received via the configuration interface, and the circuitry adaptively reconfigures at least one of the plurality of data packet forwarding paths i) in response to input received via the configuration interface, and ii) while data packets are being received by the packet forwarding apparatus. | 1. A packet forwarding apparatus, comprising:
a data packet receiving interface; a data packet forwarding interface; a configuration interface; and circuitry defining a plurality of data packet forwarding paths between the data packet receiving interface and the data packet forwarding interface, the circuitry defining at least one of the plurality of data packet forwarding paths in response to input received via the configuration interface, and the circuitry adaptively reconfiguring at least one of the plurality of data packet forwarding paths i) in response to input received via the configuration interface, and ii) while data packets are being received by the packet forwarding apparatus. 2. The packet forwarding apparatus of claim 1, wherein:
the data packet receiving interface comprises a real-time data packet receiving interface and a non-real-time data packet receiving interface; and the circuitry defines at least one real-time data packet forwarding path and at least one non-real-time data packet forwarding path. 3. The packet forwarding apparatus of claim 2, wherein the at least one non-real-time data packet forwarding path comprises a non-real-time data packet forwarding path that forwards data that is automatically received at the non-real-time data packet receiving interface. 4. The packet forwarding apparatus of claim 2, wherein:
the circuitry comprises a query interface; and the at least one non-real-time data packet forwarding path comprises a non-real-time data packet forwarding path that forwards data received at the non-real-time data packet receiving interface in response to queries issued by the query interface. 5. The packet forwarding apparatus of claim 1, further comprising a data packet store, wherein:
the data packet receiving interface comprises a real-time data packet receiving interface; and the circuitry defines at least one real-time data packet forwarding path and at least one non-real-time data packet forwarding path, the real-time data packet forwarding path i) routing data packets received at the real-time data packet receiving interface to the data packet store, and ii) retrieving at least some of the data packets in the data store for forwarding to the data packet forwarding interface. 6. The packet forwarding apparatus of claim 1, wherein:
the at least one data packet receiving interface comprises a real-time data packet receiving interface; the circuitry defines a real-time sampled data packet forwarding path, the real-time sampled data packet forwarding path including a data packet sampling circuit; and the circuitry defines a real-time filtered data packet forwarding path, the real-time filtered data packet forwarding path including a data packet filter. 7. The packet forwarding apparatus of claim 1, wherein:
the circuitry defines a sampled data packet forwarding path, the sampled data packet forwarding path including a data packet sampling circuit; and the circuitry is configured to receive input via the configuration interface and adaptively reconfigure at least one parameter of the data packet sampling circuit while data packets are being received by the packet forwarding apparatus. 8. The packet forwarding apparatus of claim 1, wherein:
the circuitry defines a filtered data packet forwarding path, the filtered data packet forwarding path including a data packet filter; and the circuitry is configured to receive input via the configuration interface and adaptively reconfigure at least one parameter of the data packet filter while data packets are being received by the packet forwarding apparatus. 9. The packet forwarding apparatus of claim 1, wherein the circuitry comprises a field-programmable gate array. 10. The packet forwarding apparatus of claim 1, wherein the circuitry comprises a microprocessor. 11. The packet forwarding apparatus of claim 1, further comprising a packet decoder coupled to the data packet receiving interface, wherein the circuitry defines a particular one of the plurality of data packet forwarding paths in response to configuration information, received via the configuration interface, indicating whether an output of the particular one of the data packet forwarding paths should include raw data packets or decoded data packets. 12. The packet forwarding apparatus of claim 1, further comprising a physical, network-connectable, data capture probe, the data capture probe being coupled to the data packet receiving interface. 13. A packet forwarding method, comprising:
receiving data packets derived from a physical, network-connectable, data capture probe; receiving configuration information while receiving the data packets; defining a plurality of data packet forwarding paths, each of the data packet forwarding paths forwarding at least some of the received data packets to a respective one of a plurality of data packet outputs, the defining including,
defining at least two of the data packet forwarding paths to forward data packets at different rates; and
adaptively reconfiguring at least one of the plurality of data packet forwarding paths in response to the received configuration information. 14. The packet forwarding method of claim 13, wherein defining a plurality of data packet forwarding paths comprises defining a real-time data packet forwarding path and a non-real-time data packet forwarding path. 15. The packet forwarding method of claim 13, wherein defining a plurality of data packet forwarding paths comprises defining a sampled data packet forwarding path and a filtered data packet forwarding path. 16. The packet forwarding method of claim 13, wherein defining a plurality of data packet forwarding paths comprises, in response to the received configuration information, adaptively reconfiguring at least one parameter of a data packet sampling circuit. 17. The packet forwarding method of claim 13, wherein defining a plurality of data packet forwarding paths comprises, in response to the received configuration information, adaptively reconfiguring at least one parameter of a data packet filter. 18. The packet forwarding method of claim 13, wherein at least one of the plurality of data packet forwarding paths is defined at least partly by a field-programmable gate array. 19. The packet forwarding method of claim 13, wherein at least one of the plurality of data packet forwarding paths is defined at least partly by a microprocessor. | In one embodiment, packet forwarding apparatus includes a data packet receiving interface, a data packet forwarding interface, and a configuration interface. The apparatus also includes circuitry that defines a plurality of data packet forwarding paths between the data packet receiving interface and the data packet forwarding interface. The circuitry defines at least one of the plurality of data packet forwarding paths in response to input received via the configuration interface, and the circuitry adaptively reconfigures at least one of the plurality of data packet forwarding paths i) in response to input received via the configuration interface, and ii) while data packets are being received by the packet forwarding apparatus.1. A packet forwarding apparatus, comprising:
a data packet receiving interface; a data packet forwarding interface; a configuration interface; and circuitry defining a plurality of data packet forwarding paths between the data packet receiving interface and the data packet forwarding interface, the circuitry defining at least one of the plurality of data packet forwarding paths in response to input received via the configuration interface, and the circuitry adaptively reconfiguring at least one of the plurality of data packet forwarding paths i) in response to input received via the configuration interface, and ii) while data packets are being received by the packet forwarding apparatus. 2. The packet forwarding apparatus of claim 1, wherein:
the data packet receiving interface comprises a real-time data packet receiving interface and a non-real-time data packet receiving interface; and the circuitry defines at least one real-time data packet forwarding path and at least one non-real-time data packet forwarding path. 3. The packet forwarding apparatus of claim 2, wherein the at least one non-real-time data packet forwarding path comprises a non-real-time data packet forwarding path that forwards data that is automatically received at the non-real-time data packet receiving interface. 4. The packet forwarding apparatus of claim 2, wherein:
the circuitry comprises a query interface; and the at least one non-real-time data packet forwarding path comprises a non-real-time data packet forwarding path that forwards data received at the non-real-time data packet receiving interface in response to queries issued by the query interface. 5. The packet forwarding apparatus of claim 1, further comprising a data packet store, wherein:
the data packet receiving interface comprises a real-time data packet receiving interface; and the circuitry defines at least one real-time data packet forwarding path and at least one non-real-time data packet forwarding path, the real-time data packet forwarding path i) routing data packets received at the real-time data packet receiving interface to the data packet store, and ii) retrieving at least some of the data packets in the data store for forwarding to the data packet forwarding interface. 6. The packet forwarding apparatus of claim 1, wherein:
the at least one data packet receiving interface comprises a real-time data packet receiving interface; the circuitry defines a real-time sampled data packet forwarding path, the real-time sampled data packet forwarding path including a data packet sampling circuit; and the circuitry defines a real-time filtered data packet forwarding path, the real-time filtered data packet forwarding path including a data packet filter. 7. The packet forwarding apparatus of claim 1, wherein:
the circuitry defines a sampled data packet forwarding path, the sampled data packet forwarding path including a data packet sampling circuit; and the circuitry is configured to receive input via the configuration interface and adaptively reconfigure at least one parameter of the data packet sampling circuit while data packets are being received by the packet forwarding apparatus. 8. The packet forwarding apparatus of claim 1, wherein:
the circuitry defines a filtered data packet forwarding path, the filtered data packet forwarding path including a data packet filter; and the circuitry is configured to receive input via the configuration interface and adaptively reconfigure at least one parameter of the data packet filter while data packets are being received by the packet forwarding apparatus. 9. The packet forwarding apparatus of claim 1, wherein the circuitry comprises a field-programmable gate array. 10. The packet forwarding apparatus of claim 1, wherein the circuitry comprises a microprocessor. 11. The packet forwarding apparatus of claim 1, further comprising a packet decoder coupled to the data packet receiving interface, wherein the circuitry defines a particular one of the plurality of data packet forwarding paths in response to configuration information, received via the configuration interface, indicating whether an output of the particular one of the data packet forwarding paths should include raw data packets or decoded data packets. 12. The packet forwarding apparatus of claim 1, further comprising a physical, network-connectable, data capture probe, the data capture probe being coupled to the data packet receiving interface. 13. A packet forwarding method, comprising:
receiving data packets derived from a physical, network-connectable, data capture probe; receiving configuration information while receiving the data packets; defining a plurality of data packet forwarding paths, each of the data packet forwarding paths forwarding at least some of the received data packets to a respective one of a plurality of data packet outputs, the defining including,
defining at least two of the data packet forwarding paths to forward data packets at different rates; and
adaptively reconfiguring at least one of the plurality of data packet forwarding paths in response to the received configuration information. 14. The packet forwarding method of claim 13, wherein defining a plurality of data packet forwarding paths comprises defining a real-time data packet forwarding path and a non-real-time data packet forwarding path. 15. The packet forwarding method of claim 13, wherein defining a plurality of data packet forwarding paths comprises defining a sampled data packet forwarding path and a filtered data packet forwarding path. 16. The packet forwarding method of claim 13, wherein defining a plurality of data packet forwarding paths comprises, in response to the received configuration information, adaptively reconfiguring at least one parameter of a data packet sampling circuit. 17. The packet forwarding method of claim 13, wherein defining a plurality of data packet forwarding paths comprises, in response to the received configuration information, adaptively reconfiguring at least one parameter of a data packet filter. 18. The packet forwarding method of claim 13, wherein at least one of the plurality of data packet forwarding paths is defined at least partly by a field-programmable gate array. 19. The packet forwarding method of claim 13, wherein at least one of the plurality of data packet forwarding paths is defined at least partly by a microprocessor. | 2,400 |
7,181 | 7,181 | 13,305,958 | 2,456 | A method, a digital content consumption device, and a conditional access system are disclosed. A network interface may receive in a digital content consumption device a public key message that includes an encrypted key. A processor may decrypt the encrypted key using a secret key to produce the transmitted public key, identify a region descriptor in the public key message, and determine the secret key based on the region descriptor. | 1. A method for key-based decryption, the method comprising:
receiving, in a digital content consumption device, a public key message comprising an encrypted key; identifying a region descriptor in the public key message; determining a secret key based on the region descriptor; and decrypting the encrypted key using the secret key to produce a transmitted public key. 2. The method of claim 1, further comprising validating that the transmitted public key is a signed transmitted public key. 3. The method of claim 2, further comprising validating the signed transmitted public key using a verification public key. 4. The method of claim 1, further comprising validating that the encrypted key is a signed encrypted key. 5. The method of claim 1, further comprising storing a secret key set. 6. The method of claim 1, further comprising storing the secret key in a software-protected module. 7. The method of claim 1, further comprising restricting access to the secret key with specialized hardware. 8. The method of claim 1, further comprising using the received public key to authenticate a control message. 9. The method of claim 1, further comprising using the received public key to decrypt one or more of a cryptographic key and a cryptographic value required for content access. 10. The method of claim 1, wherein the secret key is an asymmetric decryption key having a different value than a corresponding encryption key. 11. A digital content consumption device comprising:
a communication interface that receives in a digital content consumption device a public key message comprising an encrypted key; and a processor that is configured to identify a region descriptor in the public key message, determine a secret key based on the region descriptor, and decrypt the encrypted key using the secret key to produce a second level public key. 12. The digital content consumption device of claim 11, wherein the processor is configured to identify a region descriptor in the public key message. 13. The digital content consumption device of claim 11, wherein the processor is configured to determine the secret key based on the region descriptor. 14. The digital content consumption device of claim 11, further comprising a non-volatile memory that comprises a software-protected module that maintains at least one of the secret key and a first level public key that validates the second level public key. 15. The digital content consumption device of claim 11, further comprising specialized hardware that restricts access to at least one of the secret key and a first level public key that validates the second level public key. 16. The digital content consumption device of claim 11, wherein the processor is configured to validate that the second level public key is a signed second level public key. 17. The digital content consumption device of claim 11, wherein the processor is configured to validate that the encrypted key is a signed encrypted key. 18. The digital content consumption device of claim 11, wherein the processor is configured to use the second level public key to authenticate a control message. 19. The digital content consumption device of claim 11, wherein the processor is configured to use the received public key to decrypt one or more of a cryptographic key and a cryptographic value required for content access 20. The digital content consumption device of claim 11, wherein the secret key is an asymmetric decryption key having a different value than a corresponding encryption key. 21. A conditional access system, comprising:
a communication interface that receives a second level private key and a public key message comprising an encrypted key associated with a region and forwards the public key message to a digital content consumption device having a secret key that decrypts the encrypted key to produce a second level public key associated with the second level private key; and a data storage that stores the second level private key. 22. The conditional access system of claim 21, further comprising a processor that is configured to sign a control message to the digital content consumption device with the second level private key. | A method, a digital content consumption device, and a conditional access system are disclosed. A network interface may receive in a digital content consumption device a public key message that includes an encrypted key. A processor may decrypt the encrypted key using a secret key to produce the transmitted public key, identify a region descriptor in the public key message, and determine the secret key based on the region descriptor.1. A method for key-based decryption, the method comprising:
receiving, in a digital content consumption device, a public key message comprising an encrypted key; identifying a region descriptor in the public key message; determining a secret key based on the region descriptor; and decrypting the encrypted key using the secret key to produce a transmitted public key. 2. The method of claim 1, further comprising validating that the transmitted public key is a signed transmitted public key. 3. The method of claim 2, further comprising validating the signed transmitted public key using a verification public key. 4. The method of claim 1, further comprising validating that the encrypted key is a signed encrypted key. 5. The method of claim 1, further comprising storing a secret key set. 6. The method of claim 1, further comprising storing the secret key in a software-protected module. 7. The method of claim 1, further comprising restricting access to the secret key with specialized hardware. 8. The method of claim 1, further comprising using the received public key to authenticate a control message. 9. The method of claim 1, further comprising using the received public key to decrypt one or more of a cryptographic key and a cryptographic value required for content access. 10. The method of claim 1, wherein the secret key is an asymmetric decryption key having a different value than a corresponding encryption key. 11. A digital content consumption device comprising:
a communication interface that receives in a digital content consumption device a public key message comprising an encrypted key; and a processor that is configured to identify a region descriptor in the public key message, determine a secret key based on the region descriptor, and decrypt the encrypted key using the secret key to produce a second level public key. 12. The digital content consumption device of claim 11, wherein the processor is configured to identify a region descriptor in the public key message. 13. The digital content consumption device of claim 11, wherein the processor is configured to determine the secret key based on the region descriptor. 14. The digital content consumption device of claim 11, further comprising a non-volatile memory that comprises a software-protected module that maintains at least one of the secret key and a first level public key that validates the second level public key. 15. The digital content consumption device of claim 11, further comprising specialized hardware that restricts access to at least one of the secret key and a first level public key that validates the second level public key. 16. The digital content consumption device of claim 11, wherein the processor is configured to validate that the second level public key is a signed second level public key. 17. The digital content consumption device of claim 11, wherein the processor is configured to validate that the encrypted key is a signed encrypted key. 18. The digital content consumption device of claim 11, wherein the processor is configured to use the second level public key to authenticate a control message. 19. The digital content consumption device of claim 11, wherein the processor is configured to use the received public key to decrypt one or more of a cryptographic key and a cryptographic value required for content access 20. The digital content consumption device of claim 11, wherein the secret key is an asymmetric decryption key having a different value than a corresponding encryption key. 21. A conditional access system, comprising:
a communication interface that receives a second level private key and a public key message comprising an encrypted key associated with a region and forwards the public key message to a digital content consumption device having a secret key that decrypts the encrypted key to produce a second level public key associated with the second level private key; and a data storage that stores the second level private key. 22. The conditional access system of claim 21, further comprising a processor that is configured to sign a control message to the digital content consumption device with the second level private key. | 2,400 |
7,182 | 7,182 | 14,589,947 | 2,426 | Methods and apparatus for identification and characterization of latency in a content delivery network. In one embodiment, interaction of users with content is recorded via the collection of a plurality of tuning records; the latency is then utilize to adjust the timing on the tuning records to account for lapses in time for sending these from between entities of the network and the user devices, and for processing occurring at the devices as required. The latency is determined by taking into account an experimentally or manufacturer-derived device specific latency component, and a network latency component. The network latency component is determined in one variant by sending a message to the device from the network requesting a current system time (or other response). Once the timing of the tuning records is adjusted, these tuning records may be relied upon as being accurate representations of subscriber interaction with content on a second-by-second basis. Accordingly, tuning records may be obtained and analyzed for content which lasts for very short periods of time (e.g. advertisements). | 1.-32. (canceled) 33. A method of accounting for an asynchronization between an entity for providing content in a content delivery network and a plurality of devices for receiving said content therefrom, said asynchronization being unique for each of said plurality of devices, said method comprising:
determining a plurality of values of a latency attributable to respective ones of said plurality of devices; determining a plurality of values of a latency attributable to respective ones of a plurality of network paths which may be taken for delivery of said content to each of said plurality of devices; and for each of said plurality of devices, utilizing a value of said latency attributable thereto, and a value of said latency attributable to a respective one of said network paths, to determine a respective plurality of values of a composite latency; wherein each of said plurality of values of said composite latency for each of said plurality of devices is unique to a respective one of said plurality of devices. 34. A method for determining a system latency specific to an individual one of a plurality of devices in a content delivery network, said method comprising:
collecting a value for latency attributable to said individual one of said plurality of devices; sending a message requiring a response to said individual one of said plurality of devices at a first time; receiving, in response to said message said response from said individual one of said plurality of devices, said response indicating a second time; and applying at least one algorithm to:
determine a portion of a difference between said second and said first time attributable to a one-way traversal of said network to said individual one device; and
combine said portion of said difference with said value for latency attributable to said individual one of said plurality of devices to obtain a system latency for said individual one of said plurality of devices. 35. The method of claim 34, further comprising receiving a plurality of records relating to an interaction of respective ones of said individual ones of said plurality of devices with one or more content elements. 36. The method of claim 35, wherein said algorithm is further configured to apply said system latency to individual ones of said plurality of records. 37. The method of claim 36, wherein said one or more content elements comprise one or more advertisements. 38. The method of claim 36, further comprising performing one or more tests to determine a validity of individual ones of said plurality of records. 39. The method of claim 36, further comprising filtering said plurality of records according to at least one criterion to generate a subset of said plurality of data, and transmitting said subset of said plurality of data to an entity outside of said content delivery network. 40. The method of claim 34, wherein said message indicates said first time therein. 41. Consumer premises equipment (CPE) for use in a content delivery network, said CPE comprising:
at least one first interface configured to communicate with said content delivery network; a storage apparatus; and a digital processor, said digital processor configured to execute at least one computer program thereon, said program being configured to, when executed:
determine a measure of time which said CPE is out of synchronization to at least one entity of said network;
collect a plurality of records, each of said plurality of records indicating:
a time of collection of said record; and
a descriptor of an interaction of a user of said CPE with one or more content elements; and
re-synchronize said collected plurality of records by adjusting said time of said collection for each of said records by said measure of time. 42. The CPE of claim 41, wherein said plurality of instructions are further configured to when executed anonymize said collected plurality of records to obfuscate an identity of said CPE and/or said user of said CPE. 43. The CPE of claim 41, wherein said determination of said measure of time comprises receipt of information relating to said measure of time from at least one entity configured to:
obtain a first value for latency within said CPE; obtain a second value for latency within said network in delivery of content to said CPE; and derive a third value for said measure of time based at least in part on said first and second values. 44. The CPE of claim 43, wherein said at least one entity comprises a second computer program configured to be executed by said digital processor. 45. The CPE of claim 43, wherein said at least one entity comprise an entity of said content delivery network in communication with said CPE via said at least one first interface. 46. A network apparatus for determining amounts of time by which records collected by a user device must be adjusted to account for latency in a content delivery network, said network apparatus comprising:
at least one first interface configured to communicate at least said user device; a storage apparatus; and a digital processor, said digital processor configured to execute at least one computer program thereon which is configured to, when executed:
obtain a first value representative of processing delay at said user device;
derive a second value associated with a transmission delay between said network apparatus and said user device; and
utilize said first and said second values to calculate a third value, said third value representing a unique amount of time individual ones of said records collected at said user device must be adjusted. 47. The network apparatus of claim 46, wherein individual ones of said records collected at said user device comprise records which characterize user interaction with content at a particular time. 48. The network apparatus of claim 47, wherein said content comprises content having a total duration less than or equal to one minute, and said adjustment of said individual ones of said records enables said records to accurately identify said particular time to within an accuracy of less than or equal to one (1) second. 49. The network apparatus of claim 46, wherein said second value is derived by:
sending at a first time a Simple Network Management Protocol (SNMP) message to said user device; receiving a response to said message, said response indicating a second time; and calculating a one-way propagation delay based at least on said second and said first times. 50. The network apparatus of claim 46, wherein said plurality of instructions are further configured to:
send said third value to said user device; and receive from said user device one or more of said records, each of said records having been adjusted using said third value. 51. The network apparatus of claim 46, wherein said plurality of instructions are further configured to:
store said third value at said storage apparatus; receive said individual ones of said records collected at said user device; and adjust a time associated with said individual ones of said records collected at said user device by said third value. 52. A method of obtaining data relating to content, comprising:
delivering content to a plurality of users of a network; obtaining data relating to interactions of said users with said delivered content; and adjusting said data so that it accurately reflects a timing of said interactions relative to delivery of said content. 53. The method of claim 52, further comprising processing said data to identify a subset of said data having at least one attribute of interest. 54. The method of claim 53, further comprising providing said subset to one or more consumers. 55. The method of claim 53, wherein said at least one attribute of interest comprises a common demographic of said users. 56. The method of claim 52, wherein said content comprises and advertisement, and said at least one of said one or more consumers comprises an advertiser responsible for said advertisement. | Methods and apparatus for identification and characterization of latency in a content delivery network. In one embodiment, interaction of users with content is recorded via the collection of a plurality of tuning records; the latency is then utilize to adjust the timing on the tuning records to account for lapses in time for sending these from between entities of the network and the user devices, and for processing occurring at the devices as required. The latency is determined by taking into account an experimentally or manufacturer-derived device specific latency component, and a network latency component. The network latency component is determined in one variant by sending a message to the device from the network requesting a current system time (or other response). Once the timing of the tuning records is adjusted, these tuning records may be relied upon as being accurate representations of subscriber interaction with content on a second-by-second basis. Accordingly, tuning records may be obtained and analyzed for content which lasts for very short periods of time (e.g. advertisements).1.-32. (canceled) 33. A method of accounting for an asynchronization between an entity for providing content in a content delivery network and a plurality of devices for receiving said content therefrom, said asynchronization being unique for each of said plurality of devices, said method comprising:
determining a plurality of values of a latency attributable to respective ones of said plurality of devices; determining a plurality of values of a latency attributable to respective ones of a plurality of network paths which may be taken for delivery of said content to each of said plurality of devices; and for each of said plurality of devices, utilizing a value of said latency attributable thereto, and a value of said latency attributable to a respective one of said network paths, to determine a respective plurality of values of a composite latency; wherein each of said plurality of values of said composite latency for each of said plurality of devices is unique to a respective one of said plurality of devices. 34. A method for determining a system latency specific to an individual one of a plurality of devices in a content delivery network, said method comprising:
collecting a value for latency attributable to said individual one of said plurality of devices; sending a message requiring a response to said individual one of said plurality of devices at a first time; receiving, in response to said message said response from said individual one of said plurality of devices, said response indicating a second time; and applying at least one algorithm to:
determine a portion of a difference between said second and said first time attributable to a one-way traversal of said network to said individual one device; and
combine said portion of said difference with said value for latency attributable to said individual one of said plurality of devices to obtain a system latency for said individual one of said plurality of devices. 35. The method of claim 34, further comprising receiving a plurality of records relating to an interaction of respective ones of said individual ones of said plurality of devices with one or more content elements. 36. The method of claim 35, wherein said algorithm is further configured to apply said system latency to individual ones of said plurality of records. 37. The method of claim 36, wherein said one or more content elements comprise one or more advertisements. 38. The method of claim 36, further comprising performing one or more tests to determine a validity of individual ones of said plurality of records. 39. The method of claim 36, further comprising filtering said plurality of records according to at least one criterion to generate a subset of said plurality of data, and transmitting said subset of said plurality of data to an entity outside of said content delivery network. 40. The method of claim 34, wherein said message indicates said first time therein. 41. Consumer premises equipment (CPE) for use in a content delivery network, said CPE comprising:
at least one first interface configured to communicate with said content delivery network; a storage apparatus; and a digital processor, said digital processor configured to execute at least one computer program thereon, said program being configured to, when executed:
determine a measure of time which said CPE is out of synchronization to at least one entity of said network;
collect a plurality of records, each of said plurality of records indicating:
a time of collection of said record; and
a descriptor of an interaction of a user of said CPE with one or more content elements; and
re-synchronize said collected plurality of records by adjusting said time of said collection for each of said records by said measure of time. 42. The CPE of claim 41, wherein said plurality of instructions are further configured to when executed anonymize said collected plurality of records to obfuscate an identity of said CPE and/or said user of said CPE. 43. The CPE of claim 41, wherein said determination of said measure of time comprises receipt of information relating to said measure of time from at least one entity configured to:
obtain a first value for latency within said CPE; obtain a second value for latency within said network in delivery of content to said CPE; and derive a third value for said measure of time based at least in part on said first and second values. 44. The CPE of claim 43, wherein said at least one entity comprises a second computer program configured to be executed by said digital processor. 45. The CPE of claim 43, wherein said at least one entity comprise an entity of said content delivery network in communication with said CPE via said at least one first interface. 46. A network apparatus for determining amounts of time by which records collected by a user device must be adjusted to account for latency in a content delivery network, said network apparatus comprising:
at least one first interface configured to communicate at least said user device; a storage apparatus; and a digital processor, said digital processor configured to execute at least one computer program thereon which is configured to, when executed:
obtain a first value representative of processing delay at said user device;
derive a second value associated with a transmission delay between said network apparatus and said user device; and
utilize said first and said second values to calculate a third value, said third value representing a unique amount of time individual ones of said records collected at said user device must be adjusted. 47. The network apparatus of claim 46, wherein individual ones of said records collected at said user device comprise records which characterize user interaction with content at a particular time. 48. The network apparatus of claim 47, wherein said content comprises content having a total duration less than or equal to one minute, and said adjustment of said individual ones of said records enables said records to accurately identify said particular time to within an accuracy of less than or equal to one (1) second. 49. The network apparatus of claim 46, wherein said second value is derived by:
sending at a first time a Simple Network Management Protocol (SNMP) message to said user device; receiving a response to said message, said response indicating a second time; and calculating a one-way propagation delay based at least on said second and said first times. 50. The network apparatus of claim 46, wherein said plurality of instructions are further configured to:
send said third value to said user device; and receive from said user device one or more of said records, each of said records having been adjusted using said third value. 51. The network apparatus of claim 46, wherein said plurality of instructions are further configured to:
store said third value at said storage apparatus; receive said individual ones of said records collected at said user device; and adjust a time associated with said individual ones of said records collected at said user device by said third value. 52. A method of obtaining data relating to content, comprising:
delivering content to a plurality of users of a network; obtaining data relating to interactions of said users with said delivered content; and adjusting said data so that it accurately reflects a timing of said interactions relative to delivery of said content. 53. The method of claim 52, further comprising processing said data to identify a subset of said data having at least one attribute of interest. 54. The method of claim 53, further comprising providing said subset to one or more consumers. 55. The method of claim 53, wherein said at least one attribute of interest comprises a common demographic of said users. 56. The method of claim 52, wherein said content comprises and advertisement, and said at least one of said one or more consumers comprises an advertiser responsible for said advertisement. | 2,400 |
7,183 | 7,183 | 14,299,390 | 2,436 | Provided are methods and systems of using division-free duplexing (DFD) in a cable communication network. Techniques for applying DFD in a cable communication network may enable data to be transmitted and received over a coaxial cable without using division duplexing techniques. For example, the cable communication network may include DFD enabled network nodes and each subscriber to the cable network may be equipped with a DFD system configured to operate in a DFD mode. In some embodiments, oppositely propagating signals may be transmitted over one frequency channel, and DFD techniques may be used to recover originally transmitted signals. Further, in some embodiments, DFD techniques may be used with encryption methods to increase the security of data transmitted in the cable communication network. | 1. A method comprising:
transmitting first data comprising a cryptovariable in a first direction from a first device to a second device over a cable in a cable communication network; receiving the first data comprising the cryptovariable at a second device; transmitting second data from the second device over the cable in a second direction, using a division-free duplexing (DFD) technique, and wherein transmitting the second data from the second device comprises transmitting broadband noise from the second device while the first device transmits the cryptovariable to the second device; and removing the broadband noise from the first data received at the second device using the DFD techniques to recover the cryptovariable. 2. The method of claim 1, comprising one or more of:
transmitting first encrypted data in the first direction from the first device after transmitting the cryptovariable; and transmitting second encrypted data in the second direction from the second device after receiving and recovering the cryptovariable. 3. The method of claim 2, comprising:
receiving the first encrypted data at the second device; and decrypting the first encrypted data using the cryptovariable. 4. The method of claim 3, comprising:
removing the broadband noise from the first encrypted data at the second device before decrypting. 5. The method of claim 1, comprising:
wherein removing the broadband noise from the first data received at the second device comprises using the second data transmitted from the second device as a reference signal. 6. The method of claim 1, wherein the DFD technique comprises:
receiving an analog primary signal from the cable; receiving an analog reference signal from a transmitter; converting the analog primary signal into a digital primary signal; converting the analog reference signal into a digital reference signal; and processing the digital reference signal with a digital adaptive filter, wherein the digital adaptive filter uses the digital reference signal and digital primary signal as inputs for determining filter weights of the digital adaptive filter to provide an output; and subtracting the output of the digital adaptive filter from the digital primary signal to generate a digital cancelled signal. 7. The method of claim 1, wherein the first data transmitted in the first direction and the second data transmitted in the second direction are transmitted over the same frequency channel. 8. A cable communication system, comprising:
a plurality of nodes each comprising a division-free duplexing (DFD) system configured such that each of the plurality of nodes is operable in a DFD mode; and a processor configured to control a mode of operation of each of the plurality of nodes, wherein each of the plurality of nodes connected to the one or more fiber rings is configured to receive a cryptovariable from one of the one or more network nodes. 9. The cable communication system of claim 8, wherein a communication between two or more of the plurality of nodes is transmitted via a coaxial cable. 10. The cable communication system of claim 8, wherein the plurality of nodes comprises one or more network nodes and one or more fiber rings each comprising a plurality of nodes, wherein each of the one or more network nodes are connected to one or more fiber rings. 11. The cable communication system of claim 8, wherein the cryptovariable comprises an algorithm. 12. The cable communication system of claim 8, wherein each of the plurality of nodes connected to the one or more fiber rings is configured to transmit noise while receiving the cryptovariable and use DFD techniques to recover the cryptovariable. 13. The cable communication system of claim 8, wherein the processor is configured to control the transmission of the cryptovariable from one of the one or more network nodes and the receiving of the cryptovariable at each of the plurality of nodes connected to the one or more fiber rings. 14. The cable communication system of claim 8, wherein each of the plurality of nodes in the one or more fiber rings is coupled to a user of the cable communication system. 15. The cable communication system of claim 8, wherein the plurality of nodes each comprise instructions for:
receiving a primary signal; receiving a reference signal from a transmitter; processing the reference signal with an adaptive filter, wherein the adaptive filter uses the reference signal and primary signal as inputs for determining filter weights of the adaptive filter to provide an output; and subtracting the output of the adaptive filter from the primary signal to generate a cancelled signal comprising the cryptovariable. 16. The cable communication system of claim 8, wherein the processor is configured to operate a respective node of the plurality of nodes using a division duplexing scheme. 17. A division-free duplexing (DFD) system comprising:
a receiver capable of receiving an analog primary signal from a coaxial cable in a cable network, wherein the analog signal comprises a cryptovariable; a transmitter capable of transmitting an analog transmitted signal to the coaxial cable, wherein the analog transmitted signal comprises broadband noise; a directional coupler capable of sampling a portion of the analog transmitted signal to provide an analog reference signal; a first analog to digital converter capable of converting the analog primary signal into a digital primary signal; a second analog to digital converter capable of converting the analog reference signal into a digital reference signal; and a processor comprising instructions for:
processing the digital reference signal with an adaptive filter, wherein the adaptive filter uses the digital reference and primary signals as inputs for determining filter weights of the adaptive filter to provide an output;
subtracting the output of the adaptive filter from the digital primary signal to generate a digital cancelled signal; and
recovering the cryptovariable from the digital cancelled signal. 18. The DFD system of claim 17, wherein the DFD system is configured to be coupled to a network node in a cable communication network. 19. The DFD system of claim 17, wherein the DFD system is configured to be coupled to a user device of a cable communication network. 20. The DFD system of claim 17, wherein the transmitter is configured to transmit the analog transmitted signal to the coaxial cable on a same frequency from which the receiver receives the analog primary signal. 21. The DFD system of claim 17, wherein the processor further comprises instructions for using the recovered cryptovariable to decrypt encrypted signals received at the receiver. 22. The DFD system of claim 17, wherein the processor further comprises instructions for using the recovered cryptovariable to encrypt signal transmitted from the transmitter. | Provided are methods and systems of using division-free duplexing (DFD) in a cable communication network. Techniques for applying DFD in a cable communication network may enable data to be transmitted and received over a coaxial cable without using division duplexing techniques. For example, the cable communication network may include DFD enabled network nodes and each subscriber to the cable network may be equipped with a DFD system configured to operate in a DFD mode. In some embodiments, oppositely propagating signals may be transmitted over one frequency channel, and DFD techniques may be used to recover originally transmitted signals. Further, in some embodiments, DFD techniques may be used with encryption methods to increase the security of data transmitted in the cable communication network.1. A method comprising:
transmitting first data comprising a cryptovariable in a first direction from a first device to a second device over a cable in a cable communication network; receiving the first data comprising the cryptovariable at a second device; transmitting second data from the second device over the cable in a second direction, using a division-free duplexing (DFD) technique, and wherein transmitting the second data from the second device comprises transmitting broadband noise from the second device while the first device transmits the cryptovariable to the second device; and removing the broadband noise from the first data received at the second device using the DFD techniques to recover the cryptovariable. 2. The method of claim 1, comprising one or more of:
transmitting first encrypted data in the first direction from the first device after transmitting the cryptovariable; and transmitting second encrypted data in the second direction from the second device after receiving and recovering the cryptovariable. 3. The method of claim 2, comprising:
receiving the first encrypted data at the second device; and decrypting the first encrypted data using the cryptovariable. 4. The method of claim 3, comprising:
removing the broadband noise from the first encrypted data at the second device before decrypting. 5. The method of claim 1, comprising:
wherein removing the broadband noise from the first data received at the second device comprises using the second data transmitted from the second device as a reference signal. 6. The method of claim 1, wherein the DFD technique comprises:
receiving an analog primary signal from the cable; receiving an analog reference signal from a transmitter; converting the analog primary signal into a digital primary signal; converting the analog reference signal into a digital reference signal; and processing the digital reference signal with a digital adaptive filter, wherein the digital adaptive filter uses the digital reference signal and digital primary signal as inputs for determining filter weights of the digital adaptive filter to provide an output; and subtracting the output of the digital adaptive filter from the digital primary signal to generate a digital cancelled signal. 7. The method of claim 1, wherein the first data transmitted in the first direction and the second data transmitted in the second direction are transmitted over the same frequency channel. 8. A cable communication system, comprising:
a plurality of nodes each comprising a division-free duplexing (DFD) system configured such that each of the plurality of nodes is operable in a DFD mode; and a processor configured to control a mode of operation of each of the plurality of nodes, wherein each of the plurality of nodes connected to the one or more fiber rings is configured to receive a cryptovariable from one of the one or more network nodes. 9. The cable communication system of claim 8, wherein a communication between two or more of the plurality of nodes is transmitted via a coaxial cable. 10. The cable communication system of claim 8, wherein the plurality of nodes comprises one or more network nodes and one or more fiber rings each comprising a plurality of nodes, wherein each of the one or more network nodes are connected to one or more fiber rings. 11. The cable communication system of claim 8, wherein the cryptovariable comprises an algorithm. 12. The cable communication system of claim 8, wherein each of the plurality of nodes connected to the one or more fiber rings is configured to transmit noise while receiving the cryptovariable and use DFD techniques to recover the cryptovariable. 13. The cable communication system of claim 8, wherein the processor is configured to control the transmission of the cryptovariable from one of the one or more network nodes and the receiving of the cryptovariable at each of the plurality of nodes connected to the one or more fiber rings. 14. The cable communication system of claim 8, wherein each of the plurality of nodes in the one or more fiber rings is coupled to a user of the cable communication system. 15. The cable communication system of claim 8, wherein the plurality of nodes each comprise instructions for:
receiving a primary signal; receiving a reference signal from a transmitter; processing the reference signal with an adaptive filter, wherein the adaptive filter uses the reference signal and primary signal as inputs for determining filter weights of the adaptive filter to provide an output; and subtracting the output of the adaptive filter from the primary signal to generate a cancelled signal comprising the cryptovariable. 16. The cable communication system of claim 8, wherein the processor is configured to operate a respective node of the plurality of nodes using a division duplexing scheme. 17. A division-free duplexing (DFD) system comprising:
a receiver capable of receiving an analog primary signal from a coaxial cable in a cable network, wherein the analog signal comprises a cryptovariable; a transmitter capable of transmitting an analog transmitted signal to the coaxial cable, wherein the analog transmitted signal comprises broadband noise; a directional coupler capable of sampling a portion of the analog transmitted signal to provide an analog reference signal; a first analog to digital converter capable of converting the analog primary signal into a digital primary signal; a second analog to digital converter capable of converting the analog reference signal into a digital reference signal; and a processor comprising instructions for:
processing the digital reference signal with an adaptive filter, wherein the adaptive filter uses the digital reference and primary signals as inputs for determining filter weights of the adaptive filter to provide an output;
subtracting the output of the adaptive filter from the digital primary signal to generate a digital cancelled signal; and
recovering the cryptovariable from the digital cancelled signal. 18. The DFD system of claim 17, wherein the DFD system is configured to be coupled to a network node in a cable communication network. 19. The DFD system of claim 17, wherein the DFD system is configured to be coupled to a user device of a cable communication network. 20. The DFD system of claim 17, wherein the transmitter is configured to transmit the analog transmitted signal to the coaxial cable on a same frequency from which the receiver receives the analog primary signal. 21. The DFD system of claim 17, wherein the processor further comprises instructions for using the recovered cryptovariable to decrypt encrypted signals received at the receiver. 22. The DFD system of claim 17, wherein the processor further comprises instructions for using the recovered cryptovariable to encrypt signal transmitted from the transmitter. | 2,400 |
7,184 | 7,184 | 13,801,622 | 2,486 | Methods and systems for efficient searching of candidate blocks for inter-coding and/or intra coding are provided. In one innovative aspect, an apparatus for performing motion estimation is provided. The apparatus includes a processor configured to identify a number of candidate blocks of a frame of video data to be searched, at least one candidate block corresponding to a block of another frame of the video data. The processor is further configured to select one or more of the candidate blocks to search based on a distance between the candidate blocks. The processor is also configured to select a method for searching the selected candidate blocks based on a format of the video data. The processor is also configured to estimate the motion for the block of the another frame based on the selected method and the selected candidate blocks. | 1. An apparatus for performing motion estimation, the apparatus comprising:
a processor configured to:
identify a number of candidate blocks of a frame of video data to be searched, at least one candidate block corresponding to a block of another frame of the video data;
select one or more of the candidate blocks to search based on a distance between the candidate blocks;
select a method for searching the selected candidate blocks based on a format of the video data; and
estimate the motion for the block of the another frame based on the selected method and the selected candidate blocks. 2. The apparatus of claim 1, wherein the processor is further configured to identify an order in which to search the candidate blocks. 3. The apparatus of claim 1, wherein the number of candidate blocks is identified based on a desired encoding time. 4. The apparatus of claim 1, wherein the number of candidate blocks is identified based on the format of the video data. 5. The apparatus of claim 1, wherein the format of the video data comprises at least one of a size of the frame and a frame rate of the video data. 6. The apparatus of claim 5, wherein the number of candidate blocks is identified based on a comparison between the size of the frame and a frame size threshold. 7. The apparatus of claim 6, wherein the number of candidate blocks is proportional to the size of the frame subtracted from the frame size threshold. 8. The apparatus of claim 5, wherein the number candidate blocks is identified based on a comparison between the frame rate and a frame rate threshold. 9. The apparatus of claim 8, wherein the number of candidate blocks is proportional to the frame rate subtracted from the frame rate threshold. 10. The apparatus of claim 1, wherein a candidate block is selected to search if the distance between the candidate block and another candidate block is greater than a configurable value. 11. The apparatus of claim 10, wherein the distance comprises a motion value. 12. The apparatus of claim 1, wherein selecting the method for searching comprises:
identifying a block search size; and selecting the method from one of a plurality of methods based on the identified block search size and a block search size for each of the plurality of methods. 13. The apparatus of claim 12, the block search size is identified based on a comparison between the size of the frame and a frame size threshold. 14. The apparatus of claim 13, wherein the block search size is inversely proportional to the size of the frame subtracted from the frame size threshold. 15. The apparatus of claim 12, wherein the block search size is identified based on a comparison between the frame rate and a frame rate threshold. 16. The apparatus of claim 15, wherein the block search size is inversely proportional to the frame rate subtracted from the frame rate threshold. 17. The apparatus of claim 1, wherein the order is set based on a coding scheme used to encode the video data. 18. A method for performing motion estimation, the method comprising:
identifying a number of candidate blocks of a frame of video data to be searched, at least one candidate block corresponding to a block of another frame of the video data; selecting one or more of the candidate blocks to search based on a distance between the candidate blocks; selecting a method for searching the selected candidate blocks based on a format of the video data; and estimating the motion for the block of the another frame based on the selected method and the selected candidate blocks. 19. The method of claim 18, wherein the processor is further configured to identify an order in which to search the candidate blocks. 20. The method of claim 18, wherein the number of candidate blocks is identified based on a desired encoding time. 21. The method of claim 18, wherein the number of candidate blocks is identified based on the format of the video data. 22. The method of claim 18, wherein the format of the video data comprises at least one of a size of the frame and a frame rate of the video data. 23. The method of claim 22, wherein the number of candidate blocks is identified based on a comparison between the size of the frame and a frame size threshold. 24. The method of claim 23, wherein the number of candidate blocks is proportional to the size of the frame subtracted from the frame size threshold. 25. The method of claim 22, wherein the number candidate blocks is identified based on a comparison between the frame rate and a frame rate threshold. 26. The method of claim 25, wherein the number of candidate blocks is proportional to the frame rate subtracted from the frame rate threshold. 27. The method of claim 18, wherein a candidate block is selected to search if the distance between the candidate block and another candidate block is greater than a configurable value. 28. The method of claim 27, wherein the distance comprises a motion value. 29. The method of claim 18, wherein selecting the method for searching comprises:
identifying a block search size; and selecting the method from one of a plurality of methods based on the identified block search size and a block search size for each of the plurality of methods. 30. The method of claim 29, the block search size is identified based on a comparison between the size of the frame and a frame size threshold. 31. The method of claim 30, wherein the block search size is inversely proportional to the size of the frame subtracted from the frame size threshold. 32. The method of claim 29, wherein the block search size is identified based on a comparison between the frame rate and a frame rate threshold. 33. The method of claim 32, wherein the block search size is inversely proportional to the frame rate subtracted from the frame rate threshold. 34. The method of claim 18, wherein the order is set based on a coding scheme used to encode the video data. 35. An apparatus for performing motion estimation, the apparatus comprising:
means for identifying a number of candidate blocks of a frame of video data to be searched, at least one candidate block corresponding to a block of another frame of the video data; means for selecting one or more of the candidate blocks to search based on a distance between the candidate blocks; means for selecting a method for searching the selected candidate blocks based on a format of the video data; and means for estimating the motion for the block of the another frame based on the selected method and the selected candidate blocks. 36. A computer-readable storage medium comprising instructions, the instructions causing an apparatus to:
identify a number of candidate blocks of a frame of video data to be searched, at least one candidate block corresponding to a block of another frame of the video data; select one or more of the candidate blocks to search based on a distance between the candidate blocks; select a method for searching the selected candidate blocks based on a format of the video data; and estimate the motion for the block of the another frame based on the selected method and the selected candidate blocks. | Methods and systems for efficient searching of candidate blocks for inter-coding and/or intra coding are provided. In one innovative aspect, an apparatus for performing motion estimation is provided. The apparatus includes a processor configured to identify a number of candidate blocks of a frame of video data to be searched, at least one candidate block corresponding to a block of another frame of the video data. The processor is further configured to select one or more of the candidate blocks to search based on a distance between the candidate blocks. The processor is also configured to select a method for searching the selected candidate blocks based on a format of the video data. The processor is also configured to estimate the motion for the block of the another frame based on the selected method and the selected candidate blocks.1. An apparatus for performing motion estimation, the apparatus comprising:
a processor configured to:
identify a number of candidate blocks of a frame of video data to be searched, at least one candidate block corresponding to a block of another frame of the video data;
select one or more of the candidate blocks to search based on a distance between the candidate blocks;
select a method for searching the selected candidate blocks based on a format of the video data; and
estimate the motion for the block of the another frame based on the selected method and the selected candidate blocks. 2. The apparatus of claim 1, wherein the processor is further configured to identify an order in which to search the candidate blocks. 3. The apparatus of claim 1, wherein the number of candidate blocks is identified based on a desired encoding time. 4. The apparatus of claim 1, wherein the number of candidate blocks is identified based on the format of the video data. 5. The apparatus of claim 1, wherein the format of the video data comprises at least one of a size of the frame and a frame rate of the video data. 6. The apparatus of claim 5, wherein the number of candidate blocks is identified based on a comparison between the size of the frame and a frame size threshold. 7. The apparatus of claim 6, wherein the number of candidate blocks is proportional to the size of the frame subtracted from the frame size threshold. 8. The apparatus of claim 5, wherein the number candidate blocks is identified based on a comparison between the frame rate and a frame rate threshold. 9. The apparatus of claim 8, wherein the number of candidate blocks is proportional to the frame rate subtracted from the frame rate threshold. 10. The apparatus of claim 1, wherein a candidate block is selected to search if the distance between the candidate block and another candidate block is greater than a configurable value. 11. The apparatus of claim 10, wherein the distance comprises a motion value. 12. The apparatus of claim 1, wherein selecting the method for searching comprises:
identifying a block search size; and selecting the method from one of a plurality of methods based on the identified block search size and a block search size for each of the plurality of methods. 13. The apparatus of claim 12, the block search size is identified based on a comparison between the size of the frame and a frame size threshold. 14. The apparatus of claim 13, wherein the block search size is inversely proportional to the size of the frame subtracted from the frame size threshold. 15. The apparatus of claim 12, wherein the block search size is identified based on a comparison between the frame rate and a frame rate threshold. 16. The apparatus of claim 15, wherein the block search size is inversely proportional to the frame rate subtracted from the frame rate threshold. 17. The apparatus of claim 1, wherein the order is set based on a coding scheme used to encode the video data. 18. A method for performing motion estimation, the method comprising:
identifying a number of candidate blocks of a frame of video data to be searched, at least one candidate block corresponding to a block of another frame of the video data; selecting one or more of the candidate blocks to search based on a distance between the candidate blocks; selecting a method for searching the selected candidate blocks based on a format of the video data; and estimating the motion for the block of the another frame based on the selected method and the selected candidate blocks. 19. The method of claim 18, wherein the processor is further configured to identify an order in which to search the candidate blocks. 20. The method of claim 18, wherein the number of candidate blocks is identified based on a desired encoding time. 21. The method of claim 18, wherein the number of candidate blocks is identified based on the format of the video data. 22. The method of claim 18, wherein the format of the video data comprises at least one of a size of the frame and a frame rate of the video data. 23. The method of claim 22, wherein the number of candidate blocks is identified based on a comparison between the size of the frame and a frame size threshold. 24. The method of claim 23, wherein the number of candidate blocks is proportional to the size of the frame subtracted from the frame size threshold. 25. The method of claim 22, wherein the number candidate blocks is identified based on a comparison between the frame rate and a frame rate threshold. 26. The method of claim 25, wherein the number of candidate blocks is proportional to the frame rate subtracted from the frame rate threshold. 27. The method of claim 18, wherein a candidate block is selected to search if the distance between the candidate block and another candidate block is greater than a configurable value. 28. The method of claim 27, wherein the distance comprises a motion value. 29. The method of claim 18, wherein selecting the method for searching comprises:
identifying a block search size; and selecting the method from one of a plurality of methods based on the identified block search size and a block search size for each of the plurality of methods. 30. The method of claim 29, the block search size is identified based on a comparison between the size of the frame and a frame size threshold. 31. The method of claim 30, wherein the block search size is inversely proportional to the size of the frame subtracted from the frame size threshold. 32. The method of claim 29, wherein the block search size is identified based on a comparison between the frame rate and a frame rate threshold. 33. The method of claim 32, wherein the block search size is inversely proportional to the frame rate subtracted from the frame rate threshold. 34. The method of claim 18, wherein the order is set based on a coding scheme used to encode the video data. 35. An apparatus for performing motion estimation, the apparatus comprising:
means for identifying a number of candidate blocks of a frame of video data to be searched, at least one candidate block corresponding to a block of another frame of the video data; means for selecting one or more of the candidate blocks to search based on a distance between the candidate blocks; means for selecting a method for searching the selected candidate blocks based on a format of the video data; and means for estimating the motion for the block of the another frame based on the selected method and the selected candidate blocks. 36. A computer-readable storage medium comprising instructions, the instructions causing an apparatus to:
identify a number of candidate blocks of a frame of video data to be searched, at least one candidate block corresponding to a block of another frame of the video data; select one or more of the candidate blocks to search based on a distance between the candidate blocks; select a method for searching the selected candidate blocks based on a format of the video data; and estimate the motion for the block of the another frame based on the selected method and the selected candidate blocks. | 2,400 |
7,185 | 7,185 | 13,381,270 | 2,443 | A method is employed in association with a communication session over a peer-to-peer network between a first node associated with a first session participant and a second node associated with a second session participant. In the method, identification information identifying the second session participant is received. Profile information descriptive of the second session participant is gathered using the identification information. The communication session is conducted using the profile information descriptive of the second session participant. | 1. A method, comprising:
in association with a communication session over a peer-to-peer network between a first node associated with a first session participant and a second node associated with a second session participant, receiving identification information identifying the second session participant; gathering profile information descriptive of the second session participant using the identification information; and conducting the communication session using the profile information descriptive of the second session participant. 2. The method of claim 1, wherein:
wherein the identification information comprises an identifier employed to register the second session participant with the peer-to-peer network. 3. The method of claim 1, wherein:
wherein the profile information comprises demographic information of the second session participant. 4. The method of claim 1, wherein:
wherein the profile information comprises information describing previous interaction of the second session participant with an entity associated with the first session participant. 5. The method of claim 1, wherein:
gathering the profile information comprises retrieving at least a portion of the profile information from a customer database maintained for a first entity associated with the first session participant. 6. The method of claim 1, wherein:
gathering the profile information comprises retrieving at least a portion of the profile information from a customer database maintained for a partnering entity of a first entity associated with the first session participant. 7. The method of claim 1, wherein:
gathering the profile information comprises determining if the second session participant is accessing a webpage presented on behalf of a first entity associated with the first session participant, and if so, determining the identity of the webpage. 8. The method of claim 1, wherein:
gathering the profile information comprises determining a type of device associated with the second node. 9. The method of claim 1, wherein:
gathering the profile information comprises determining whether the second session participant is logged into a networking website, and if so, determining the identity of the networking website. 10. The method of claim 1, wherein:
gathering the profile information comprises retrieving a posting by the second session participant to a networking website. 11. The method of claim 1, wherein:
conducting the communication session using the profile information comprises routing the communication session based on the profile information. 12. The method of claim 11, wherein:
routing the communication session based on the profile information comprises directing the communication session with the second session participant to the first session participant. 13. The method of claim 1, wherein:
conducting the communication session using the profile information comprises providing at least a portion of the profile information for display via the first node to the first session participant. 14. The method of claim 1, wherein:
conducting the communication session using the profile information comprises presenting a business persona indicative of a first entity associated with the first session participant to the second session participant via the second node, wherein the business persona is based at least in part on the profile information. 15. The method of claim 1, wherein:
gathering the profile information occurs prior to an initiation of the communication session over the peer-to-peer network between the first node and the second node. 16. A communication device, comprising:
a communication interface configured to, in association with a communication session over a peer-to-peer network between a first node associated with a first session participant and a second node associated with a second session participant, receive identification information identifying the second session participant; a processing system configured to gather profile information descriptive of the second session participant via the communication interface using the identification information; and a data storage system configured to store the profile information for subsequent transmission via the communication interface, wherein the profile information is to be employed to facilitate the communication session between the first node and the second node. 17. The communication device of claim 1, wherein:
the processing system is configured to route the communication session between the first node and the second node based on the profile information. 18. The communication device of claim 1, further comprising:
a user interface configured to present at least a portion of the profile information via the first node to the first session participant. 19. A non-transitory computer-readable storage medium having encoded thereon instructions executable on a processing system for employing a method comprising:
in association with a communication session over a peer-to-peer network between a first node associated with a first session participant and a second node associated with a second session participant, receiving identification information identifying the second session participant; gathering profile information descriptive of the second session participant using the identification information; and conducting the communication session using the profile information descriptive of the second session participant. 20. The non-transitory computer-readable storage medium of claim 19, wherein:
conducting the communication session using the profile information comprises at least one of routing the communication session between the first node and the second node based on the profile information, and providing at least a portion of the profile information for display via the first node to the first session participant. | A method is employed in association with a communication session over a peer-to-peer network between a first node associated with a first session participant and a second node associated with a second session participant. In the method, identification information identifying the second session participant is received. Profile information descriptive of the second session participant is gathered using the identification information. The communication session is conducted using the profile information descriptive of the second session participant.1. A method, comprising:
in association with a communication session over a peer-to-peer network between a first node associated with a first session participant and a second node associated with a second session participant, receiving identification information identifying the second session participant; gathering profile information descriptive of the second session participant using the identification information; and conducting the communication session using the profile information descriptive of the second session participant. 2. The method of claim 1, wherein:
wherein the identification information comprises an identifier employed to register the second session participant with the peer-to-peer network. 3. The method of claim 1, wherein:
wherein the profile information comprises demographic information of the second session participant. 4. The method of claim 1, wherein:
wherein the profile information comprises information describing previous interaction of the second session participant with an entity associated with the first session participant. 5. The method of claim 1, wherein:
gathering the profile information comprises retrieving at least a portion of the profile information from a customer database maintained for a first entity associated with the first session participant. 6. The method of claim 1, wherein:
gathering the profile information comprises retrieving at least a portion of the profile information from a customer database maintained for a partnering entity of a first entity associated with the first session participant. 7. The method of claim 1, wherein:
gathering the profile information comprises determining if the second session participant is accessing a webpage presented on behalf of a first entity associated with the first session participant, and if so, determining the identity of the webpage. 8. The method of claim 1, wherein:
gathering the profile information comprises determining a type of device associated with the second node. 9. The method of claim 1, wherein:
gathering the profile information comprises determining whether the second session participant is logged into a networking website, and if so, determining the identity of the networking website. 10. The method of claim 1, wherein:
gathering the profile information comprises retrieving a posting by the second session participant to a networking website. 11. The method of claim 1, wherein:
conducting the communication session using the profile information comprises routing the communication session based on the profile information. 12. The method of claim 11, wherein:
routing the communication session based on the profile information comprises directing the communication session with the second session participant to the first session participant. 13. The method of claim 1, wherein:
conducting the communication session using the profile information comprises providing at least a portion of the profile information for display via the first node to the first session participant. 14. The method of claim 1, wherein:
conducting the communication session using the profile information comprises presenting a business persona indicative of a first entity associated with the first session participant to the second session participant via the second node, wherein the business persona is based at least in part on the profile information. 15. The method of claim 1, wherein:
gathering the profile information occurs prior to an initiation of the communication session over the peer-to-peer network between the first node and the second node. 16. A communication device, comprising:
a communication interface configured to, in association with a communication session over a peer-to-peer network between a first node associated with a first session participant and a second node associated with a second session participant, receive identification information identifying the second session participant; a processing system configured to gather profile information descriptive of the second session participant via the communication interface using the identification information; and a data storage system configured to store the profile information for subsequent transmission via the communication interface, wherein the profile information is to be employed to facilitate the communication session between the first node and the second node. 17. The communication device of claim 1, wherein:
the processing system is configured to route the communication session between the first node and the second node based on the profile information. 18. The communication device of claim 1, further comprising:
a user interface configured to present at least a portion of the profile information via the first node to the first session participant. 19. A non-transitory computer-readable storage medium having encoded thereon instructions executable on a processing system for employing a method comprising:
in association with a communication session over a peer-to-peer network between a first node associated with a first session participant and a second node associated with a second session participant, receiving identification information identifying the second session participant; gathering profile information descriptive of the second session participant using the identification information; and conducting the communication session using the profile information descriptive of the second session participant. 20. The non-transitory computer-readable storage medium of claim 19, wherein:
conducting the communication session using the profile information comprises at least one of routing the communication session between the first node and the second node based on the profile information, and providing at least a portion of the profile information for display via the first node to the first session participant. | 2,400 |
7,186 | 7,186 | 14,428,406 | 2,476 | A vehicle-to-vehicle communication device ( 100; 100 ′) is provided with access to a cellular network ( 200, 210 ). The cellular network ( 200, 210 ) implements at least a first radio technology. The vehicle-to-vehicle communication device ( 100, 100 ′) further supports a second radio technology for vehicle-to-vehicle communication. For controlling vehicle-to-vehicle communication by the second radio technology, data from the cellular network ( 200, 210 ) are provided to the vehicle-to-vehicle communication device ( 100, 100 ′). For example, such data may be derived from presence or mobility information available in the cellular network ( 200, 210 ). On the basis of the data from the cellular network ( 200, 210 ), the vehicle-to-vehicle communication device ( 100, 100 ′) sets at least one control parameter of vehicle-to-vehicle communication by the second radio technology, e.g., a rate of sending a message or a transmission power utilized by the second radio technology. | 1-23. (canceled) 24. A method for controlling vehicle-to-vehicle communication, the method comprising:
a vehicle-to-vehicle communication device receiving data from a cellular network implementing a first radio technology, the data being related to a risk of collisions of transmissions from the vehicle-to-vehicle communication device and from other vehicle-to-vehicle communication devices by a second radio technology; the vehicle-to-vehicle communication device setting at least one control parameter of vehicle-to-vehicle communication by the second radio technology based on the data from the cellular network; wherein the at least one control parameter relates to a rate of periodically sending a vehicle-to-vehicle Cooperative Awareness Message by the second radio technology. 25. The method of claim 24, wherein the data is received through a multicast and/or broadcast transmission mode of the first radio technology. 26. The method of claim 24, wherein the data comprises traffic density information. 27. The method of claim 24, wherein the data comprises geographical information. 28. The method of claim 24, wherein the data comprises traffic reporting information. 29. The method of claim 24, wherein the data comprises an accident risk level. 30. The method of claim 24, wherein the data comprises the at least one control parameter and/or at least one further control parameter of the second radio technology. 31. The method of claim 24, wherein the at least one control parameter relates to at least one of:
a transmission power for sending a vehicle-to-vehicle Cooperative Awareness Message by the second radio technology; a transmission range for sending a vehicle-to-vehicle Cooperative Awareness Message by the second radio technology; a sense range for detecting colliding usage of the second radio technology; a contention window for a collision handling mechanism of the second radio technology; time scheduling for sending a vehicle-to-vehicle Cooperative Awareness Message by the second radio technology. 32. A method for controlling vehicle-to-vehicle communication, the method comprising:
a network node associated with a cellular network implementing a first radio technology determining data for controlling vehicle-to-vehicle communication by a second radio technology, the data being related to a risk of collisions of transmissions from a vehicle-to-vehicle communication device and from other vehicle-to-vehicle communication devices by the second radio technology; the network node sending the data to a vehicle-to-vehicle communication device connected to the cellular network, the vehicle-to-vehicle communication device being configured to set, based on the data, at least one control parameter of vehicle-to-vehicle communication by the second radio technology; wherein the at least one control parameter relates to a rate of periodically sending a vehicle-to-vehicle Cooperative Awareness Message by the second radio technology. 33. The method of claim 32, wherein the data is based on presence and/or mobility information of the cellular network. 34. The method of claim 33, wherein the data is based on a number of users in the same control area of the cellular network as the vehicle-to-vehicle communication device. 35. The method of claim 32, wherein the data is based on a location of the vehicle-to-vehicle communication device as determined in the cellular network. 36. The method of claim 32, wherein the data is based on statistical accident data. 37. The method of claim 32, wherein the data comprises traffic density information. 38. The method of claim 32, wherein the data comprises geographical information. 39. The method of claim 32, wherein the data comprises traffic reporting information. 40. The method of claim 32, wherein the data comprises an accident risk level. 41. The method of claim 32, wherein data comprises the at least one control parameter and/or at least one further control parameter of the second radio access technology. 42. The method of claim 32, wherein the at least one control parameter relates to at least one of:
a transmission power for sending a vehicle-to-vehicle Cooperative Awareness Message by the second radio technology; a transmission range for sending a vehicle-to-vehicle Cooperative Awareness Message by the second radio technology; a sense range for detecting colliding usage of the second radio technology; a contention window for a collision handling mechanism of the second radio technology; time scheduling for sending a vehicle-to-vehicle communication message by the second radio technology. 43. A device for vehicle-to-vehicle communication, the device comprising:
a first radio interface for communication with a cellular network implementing a first radio technology; a second radio interface for vehicle-to-vehicle communication by a second radio technology; a processing circuit configured to:
receive data from the cellular network, the data being related to a risk of collisions of transmissions from the device and from other vehicle-to-vehicle communication devices by the second radio technology;
set, based on the data from the cellular network, at least one control parameter of vehicle-to-vehicle communication by the second radio technology;
wherein the at least one control parameter relates to a rate of periodically sending a vehicle-to-vehicle Cooperative Awareness Message by the second radio technology. 44. A network node, comprising:
an interface for communication, via a cellular network implementing a first radio access technology, with a vehicle-to-vehicle communication device; a processing circuit configured to:
determine data for controlling vehicle-to-vehicle communication by a second radio technology, the data being related to a risk of collisions of transmissions from the vehicle-to-vehicle communication device and from other vehicle-to-vehicle communication devices by the second radio technology;
send the data to the vehicle-to-vehicle communication device, the vehicle-to-vehicle communication device being configured to set, based on the data, at least one control parameter of vehicle-to-vehicle communication by the second radio access technology;
wherein the at least one control parameter relates to a rate of periodically sending a vehicle-to-vehicle Cooperative Awareness Message by the second radio technology. | A vehicle-to-vehicle communication device ( 100; 100 ′) is provided with access to a cellular network ( 200, 210 ). The cellular network ( 200, 210 ) implements at least a first radio technology. The vehicle-to-vehicle communication device ( 100, 100 ′) further supports a second radio technology for vehicle-to-vehicle communication. For controlling vehicle-to-vehicle communication by the second radio technology, data from the cellular network ( 200, 210 ) are provided to the vehicle-to-vehicle communication device ( 100, 100 ′). For example, such data may be derived from presence or mobility information available in the cellular network ( 200, 210 ). On the basis of the data from the cellular network ( 200, 210 ), the vehicle-to-vehicle communication device ( 100, 100 ′) sets at least one control parameter of vehicle-to-vehicle communication by the second radio technology, e.g., a rate of sending a message or a transmission power utilized by the second radio technology.1-23. (canceled) 24. A method for controlling vehicle-to-vehicle communication, the method comprising:
a vehicle-to-vehicle communication device receiving data from a cellular network implementing a first radio technology, the data being related to a risk of collisions of transmissions from the vehicle-to-vehicle communication device and from other vehicle-to-vehicle communication devices by a second radio technology; the vehicle-to-vehicle communication device setting at least one control parameter of vehicle-to-vehicle communication by the second radio technology based on the data from the cellular network; wherein the at least one control parameter relates to a rate of periodically sending a vehicle-to-vehicle Cooperative Awareness Message by the second radio technology. 25. The method of claim 24, wherein the data is received through a multicast and/or broadcast transmission mode of the first radio technology. 26. The method of claim 24, wherein the data comprises traffic density information. 27. The method of claim 24, wherein the data comprises geographical information. 28. The method of claim 24, wherein the data comprises traffic reporting information. 29. The method of claim 24, wherein the data comprises an accident risk level. 30. The method of claim 24, wherein the data comprises the at least one control parameter and/or at least one further control parameter of the second radio technology. 31. The method of claim 24, wherein the at least one control parameter relates to at least one of:
a transmission power for sending a vehicle-to-vehicle Cooperative Awareness Message by the second radio technology; a transmission range for sending a vehicle-to-vehicle Cooperative Awareness Message by the second radio technology; a sense range for detecting colliding usage of the second radio technology; a contention window for a collision handling mechanism of the second radio technology; time scheduling for sending a vehicle-to-vehicle Cooperative Awareness Message by the second radio technology. 32. A method for controlling vehicle-to-vehicle communication, the method comprising:
a network node associated with a cellular network implementing a first radio technology determining data for controlling vehicle-to-vehicle communication by a second radio technology, the data being related to a risk of collisions of transmissions from a vehicle-to-vehicle communication device and from other vehicle-to-vehicle communication devices by the second radio technology; the network node sending the data to a vehicle-to-vehicle communication device connected to the cellular network, the vehicle-to-vehicle communication device being configured to set, based on the data, at least one control parameter of vehicle-to-vehicle communication by the second radio technology; wherein the at least one control parameter relates to a rate of periodically sending a vehicle-to-vehicle Cooperative Awareness Message by the second radio technology. 33. The method of claim 32, wherein the data is based on presence and/or mobility information of the cellular network. 34. The method of claim 33, wherein the data is based on a number of users in the same control area of the cellular network as the vehicle-to-vehicle communication device. 35. The method of claim 32, wherein the data is based on a location of the vehicle-to-vehicle communication device as determined in the cellular network. 36. The method of claim 32, wherein the data is based on statistical accident data. 37. The method of claim 32, wherein the data comprises traffic density information. 38. The method of claim 32, wherein the data comprises geographical information. 39. The method of claim 32, wherein the data comprises traffic reporting information. 40. The method of claim 32, wherein the data comprises an accident risk level. 41. The method of claim 32, wherein data comprises the at least one control parameter and/or at least one further control parameter of the second radio access technology. 42. The method of claim 32, wherein the at least one control parameter relates to at least one of:
a transmission power for sending a vehicle-to-vehicle Cooperative Awareness Message by the second radio technology; a transmission range for sending a vehicle-to-vehicle Cooperative Awareness Message by the second radio technology; a sense range for detecting colliding usage of the second radio technology; a contention window for a collision handling mechanism of the second radio technology; time scheduling for sending a vehicle-to-vehicle communication message by the second radio technology. 43. A device for vehicle-to-vehicle communication, the device comprising:
a first radio interface for communication with a cellular network implementing a first radio technology; a second radio interface for vehicle-to-vehicle communication by a second radio technology; a processing circuit configured to:
receive data from the cellular network, the data being related to a risk of collisions of transmissions from the device and from other vehicle-to-vehicle communication devices by the second radio technology;
set, based on the data from the cellular network, at least one control parameter of vehicle-to-vehicle communication by the second radio technology;
wherein the at least one control parameter relates to a rate of periodically sending a vehicle-to-vehicle Cooperative Awareness Message by the second radio technology. 44. A network node, comprising:
an interface for communication, via a cellular network implementing a first radio access technology, with a vehicle-to-vehicle communication device; a processing circuit configured to:
determine data for controlling vehicle-to-vehicle communication by a second radio technology, the data being related to a risk of collisions of transmissions from the vehicle-to-vehicle communication device and from other vehicle-to-vehicle communication devices by the second radio technology;
send the data to the vehicle-to-vehicle communication device, the vehicle-to-vehicle communication device being configured to set, based on the data, at least one control parameter of vehicle-to-vehicle communication by the second radio access technology;
wherein the at least one control parameter relates to a rate of periodically sending a vehicle-to-vehicle Cooperative Awareness Message by the second radio technology. | 2,400 |
7,187 | 7,187 | 13,637,242 | 2,483 | An object with the embodiments of the present invention is to make it well defined from which previously decoded picture to retrieve the values for calculating POC of the current picture regardless of how many temporal layers have been decoded.
That is achieved by determining the POC of the current picture, to be used by the decoder, as a sum of a syntax element pic_order_cnt_lsb and a most significant bits of the POC, PicOrderCntMsb, of the current picture, wherein the PicOrderCntMsb of the current picture is derived using at least a prevPicOrderCntMsb and a prevPicOrderCntLsb and the prevPicOrderCntMsb is set equal to the most significant bits of the POC of a previous reference picture in decoding order that has a layer identity equal to zero and prevPicOrderCntLsb is set equal to the value of the least significant bits of the POC of a previous reference picture in decoding order that has a layer identity equal to zero. | 1-12. (canceled) 13. A method of decoding a representation of a current picture of a video stream of multiple pictures using reference pictures, wherein each picture belongs to a layer identified by a layer identity, the method comprising:
receiving least significant bits of a Picture Order Count (POC) value (pic_order_cnt_lsb) of the current picture from a bitstream; determining the POC value of the current picture, to be used by the decoder, as a sum of the pic_order_cnt_lsb and most significant bits of the POC (PicOrderCntMsb) of the current picture; wherein the PicOrderCntMsb of the current picture is derived using at least a prevPicOrderCntMsb and a prevPicOrderCntLsb, where:
prevPicOrderCntMsb is set equal to PicOrderCntMsb of a previous reference picture in decoding order that has a layer identity equal to or lower than the layer identity of the current picture;
prevPicOrderCntLsb is set equal to the value of pic_order_cnt_lsb of the previous reference picture. 14. The method of claim 13 wherein the previous reference picture is the closest reference picture in decoding order that has a layer identity equal to or lower than the layer identity of the current picture. 15. The method of claim 13 wherein the layer is a temporal layer and the layer identity corresponds to temporal_id. 16. A decoder configured to decode a representation of a current picture of a video stream of multiple pictures using reference pictures, where each picture belongs to a layer identified by a layer identity, wherein the decoder is configured to receive least significant bits of a Picture Order Count (POC) value (pic_order_cnt_lsb) of the current picture from a bitstream, the decoder comprising:
a processor configured to determine the POC value of the current picture as a sum of the pic_order_cnt_lsb and most significant bits of the POC value (PicOrderCntMsb) of the current picture; wherein the PicOrderCntMsb of the current picture is derived using at least a prevPicOrderCntMsb and a prevPicOrderCntLsb, where:
prevPicOrderCntMsb is set equal to PicOrderCntMsb of a previous reference picture in decoding order that has a layer identity equal to or lower than the layer identity of the current picture;
prevPicOrderCntLsb is set equal to the value of pic_order_cnt_lsb of the previous reference picture. 17. The decoder of claim 16 wherein the previous reference picture is the closest reference picture in decoding order that has a layer identity equal to or lower than the layer identity of the current picture. 18. The decoder of claim 16 wherein the layer is a temporal layer and the layer identity corresponds to temporal_id. 19. A method of decoding a representation of a current picture of a video stream of multiple pictures using reference pictures, wherein each picture belongs to a layer identified by a layer identity, the method comprising:
receiving least significant bits of a Picture Order Count (POC) value (pic_order_cnt_lsb) of the current picture from a bitstream; determining the POC value of the current picture as a sum of the pic_order_cnt_lsb and most significant bits of the POC (PicOrderCntMsb) of the current picture; wherein the PicOrderCntMsb of the current picture is derived using at least a prevPicOrderCntMsb and a prevPicOrderCntLsb, where:
prevPicOrderCntMsb is set equal to PicOrderCntMsb of a previous reference picture in decoding order that has a layer identity equal to zero;
prevPicOrderCntLsb is set equal to the value of pic_order_cnt_lsb of the previous reference picture. 20. The method of claim 19 wherein the previous reference picture is the closest reference picture in decoding order that has a layer identity equal to zero. 21. The method of claim 19 wherein the layer is a temporal layer and the temporal layer identity corresponds to temporal_id. 22. A decoder configured to decode a representation of a current picture of a video stream of multiple pictures using reference pictures, wherein each picture belongs to a layer identified by a layer identity, wherein the decoder is configured to receive least significant bits of a Picture Order Count (POC) value (pic_order_cnt_lsb) of the current picture from a bitstream, the decoder comprising:
a processor configured to determine the POC value of the current picture as a sum of the pic_order_cnt_lsb and most significant bits of the POC value (PicOrderCntMsb) of the current picture; wherein the PicOrderCntMsb of the current picture is derived using at least a prevPicOrderCntMsb and a prevPicOrderCntLsb, where:
prevPicOrderCntMsb is set equal to the most PicOrderCntMsb of a previous reference picture in decoding order that has a layer identity equal to zero;
prevPicOrderCntLsb is set equal to the value of pic_order_cnt_lsb of the previous reference picture. 23. The decoder of claim 22 wherein the previous reference picture is the closest reference picture in decoding order that has a layer identity equal to zero. 24. The decoder of claim 22 wherein the layer is a temporal layer and the temporal layer identity corresponds to temporal_id. | An object with the embodiments of the present invention is to make it well defined from which previously decoded picture to retrieve the values for calculating POC of the current picture regardless of how many temporal layers have been decoded.
That is achieved by determining the POC of the current picture, to be used by the decoder, as a sum of a syntax element pic_order_cnt_lsb and a most significant bits of the POC, PicOrderCntMsb, of the current picture, wherein the PicOrderCntMsb of the current picture is derived using at least a prevPicOrderCntMsb and a prevPicOrderCntLsb and the prevPicOrderCntMsb is set equal to the most significant bits of the POC of a previous reference picture in decoding order that has a layer identity equal to zero and prevPicOrderCntLsb is set equal to the value of the least significant bits of the POC of a previous reference picture in decoding order that has a layer identity equal to zero.1-12. (canceled) 13. A method of decoding a representation of a current picture of a video stream of multiple pictures using reference pictures, wherein each picture belongs to a layer identified by a layer identity, the method comprising:
receiving least significant bits of a Picture Order Count (POC) value (pic_order_cnt_lsb) of the current picture from a bitstream; determining the POC value of the current picture, to be used by the decoder, as a sum of the pic_order_cnt_lsb and most significant bits of the POC (PicOrderCntMsb) of the current picture; wherein the PicOrderCntMsb of the current picture is derived using at least a prevPicOrderCntMsb and a prevPicOrderCntLsb, where:
prevPicOrderCntMsb is set equal to PicOrderCntMsb of a previous reference picture in decoding order that has a layer identity equal to or lower than the layer identity of the current picture;
prevPicOrderCntLsb is set equal to the value of pic_order_cnt_lsb of the previous reference picture. 14. The method of claim 13 wherein the previous reference picture is the closest reference picture in decoding order that has a layer identity equal to or lower than the layer identity of the current picture. 15. The method of claim 13 wherein the layer is a temporal layer and the layer identity corresponds to temporal_id. 16. A decoder configured to decode a representation of a current picture of a video stream of multiple pictures using reference pictures, where each picture belongs to a layer identified by a layer identity, wherein the decoder is configured to receive least significant bits of a Picture Order Count (POC) value (pic_order_cnt_lsb) of the current picture from a bitstream, the decoder comprising:
a processor configured to determine the POC value of the current picture as a sum of the pic_order_cnt_lsb and most significant bits of the POC value (PicOrderCntMsb) of the current picture; wherein the PicOrderCntMsb of the current picture is derived using at least a prevPicOrderCntMsb and a prevPicOrderCntLsb, where:
prevPicOrderCntMsb is set equal to PicOrderCntMsb of a previous reference picture in decoding order that has a layer identity equal to or lower than the layer identity of the current picture;
prevPicOrderCntLsb is set equal to the value of pic_order_cnt_lsb of the previous reference picture. 17. The decoder of claim 16 wherein the previous reference picture is the closest reference picture in decoding order that has a layer identity equal to or lower than the layer identity of the current picture. 18. The decoder of claim 16 wherein the layer is a temporal layer and the layer identity corresponds to temporal_id. 19. A method of decoding a representation of a current picture of a video stream of multiple pictures using reference pictures, wherein each picture belongs to a layer identified by a layer identity, the method comprising:
receiving least significant bits of a Picture Order Count (POC) value (pic_order_cnt_lsb) of the current picture from a bitstream; determining the POC value of the current picture as a sum of the pic_order_cnt_lsb and most significant bits of the POC (PicOrderCntMsb) of the current picture; wherein the PicOrderCntMsb of the current picture is derived using at least a prevPicOrderCntMsb and a prevPicOrderCntLsb, where:
prevPicOrderCntMsb is set equal to PicOrderCntMsb of a previous reference picture in decoding order that has a layer identity equal to zero;
prevPicOrderCntLsb is set equal to the value of pic_order_cnt_lsb of the previous reference picture. 20. The method of claim 19 wherein the previous reference picture is the closest reference picture in decoding order that has a layer identity equal to zero. 21. The method of claim 19 wherein the layer is a temporal layer and the temporal layer identity corresponds to temporal_id. 22. A decoder configured to decode a representation of a current picture of a video stream of multiple pictures using reference pictures, wherein each picture belongs to a layer identified by a layer identity, wherein the decoder is configured to receive least significant bits of a Picture Order Count (POC) value (pic_order_cnt_lsb) of the current picture from a bitstream, the decoder comprising:
a processor configured to determine the POC value of the current picture as a sum of the pic_order_cnt_lsb and most significant bits of the POC value (PicOrderCntMsb) of the current picture; wherein the PicOrderCntMsb of the current picture is derived using at least a prevPicOrderCntMsb and a prevPicOrderCntLsb, where:
prevPicOrderCntMsb is set equal to the most PicOrderCntMsb of a previous reference picture in decoding order that has a layer identity equal to zero;
prevPicOrderCntLsb is set equal to the value of pic_order_cnt_lsb of the previous reference picture. 23. The decoder of claim 22 wherein the previous reference picture is the closest reference picture in decoding order that has a layer identity equal to zero. 24. The decoder of claim 22 wherein the layer is a temporal layer and the temporal layer identity corresponds to temporal_id. | 2,400 |
7,188 | 7,188 | 13,280,205 | 2,432 | Various embodiments of the present invention relates generally to an integrated circuit, and more particularly, to systems, devices and methods of incorporating a tamper detection countermeasure into a security ASIC to deter physical attacks. The tamper detection countermeasure architects an active mesh to cover a sensitive area in the security ASIC. A plurality of time-varying random numbers is generated by a random number generator (RNG), and the active mesh is driven and configured according to these random numbers. During tamper detection cycles, the active mesh is monitored with respect to the plurality of random numbers that is directly provided by the RNG. Upon a tampering attempt, a flag signal is generated and used to initialize subsequent anti-tampering actions. The active mesh may be controlled and monitored based on time-varying codes, and therefore, an adversary may not easily bypass the active mesh and attack the sensitive area. | 1. A method of detecting a tampering attempt in a secure application specific integrated circuit (ASIC), comprising steps of:
generating a plurality of random numbers that varies with time; driving and configuring an active mesh according to the plurality of random numbers, the active mesh covering a sensitive area in the secure ASIC; monitoring the active mesh with respect to the plurality of random numbers; and generating a flag signal that indicates the tampering attempt. 2. The method of detecting the tampering attempt in claim 1, wherein the active mesh is made from at least one metal layer above a substrate of the security ASIC, and routed to integrated circuit in the substrate via intermediate metal and polysilicon layers. 3. The method of detecting the tampering attempt in claim 1, comprises a plurality of conductive metal wires. 4. The method of detecting the tampering attempt in claim 3, wherein at least one random number in the plurality of random numbers comprises a plurality of bits, and the step of driving and configuring the active mesh further comprises a step of:
driving a first end node of each conductive metal wire in the plurality of conductive metal wires at a logic level determined by a bit in the plurality of bits. 5. The method of detecting the tampering attempt in claim 4, wherein the step of monitoring the active mesh further comprises steps of:
monitoring a voltage at a second end node of at least one conductive metal wire selected from the plurality of conductive metal wires; verifying the voltage with respect to a corresponding bit in the plurality of bits; and generating a flag signal. 6. The method of detecting the tampering attempt in claim 1, wherein the active mesh comprises a plurality of capacitors. 7. The method of detecting the tampering attempt in claim 6, wherein the plurality of random numbers includes a first random number and a second random number, and the step of driving and configuring an active mesh further comprises a step of:
selecting a first capacitor and a second capacitor from the plurality of capacitors according to the first and second random numbers. 8. The method of detecting the tampering attempt in claim 7, wherein the step of monitoring the active mesh further comprises steps of:
comparing the capacitances of the first and second capacitors; detecting a disparity of the capacitances; and generating a flag signal. 9. A tamper detection system that protects a sensitive area in a secure application specific integrated circuit (ASIC), comprising:
an active mesh that comprises a plurality of conductive metal wires, the active mesh covering the sensitive area; a random number generator (RNG) that generates at least one random number, the at least one random number comprising a plurality of bits and varying with time; a mesh driver, coupled between the active mesh and the RNG, the mesh driver driving the active mesh with a time-varying driving pattern according to the at least one random number, a first end node of each conductive metal wire in the plurality of conductive metal wires being driven at a logic level determined by a bit in the plurality of bits; and a tamper sensing unit, coupled to both the active mesh and the RNG, the tamper sensing unit monitoring a voltage at a second end node of at least one conductive metal wire selected from the plurality of metal wires, verifying the voltage with respect to a corresponding bit in the plurality of bits, and generating a flag signal. 10. The tamper detection system in claim 9, wherein the active mesh is made from at least one metal layer above a substrate of the security ASIC, and routed to integrated circuit in the substrate via intermediate metal and polysilicon layers. 11. The tamper detection system in claim 9, wherein the RNG, the mesh driver and the tamper sensing unit are integrated in the substrate of the secure ASIC. 12. The tamper detection system in claim 9, wherein the mesh driver further comprises a state machine to control temporal variation of the driving pattern. 13. The tamper detection system in claim 9, further comprising a storage selected from cache memories and data registers to temporarily store the at least one random numbers. 14. The tamper detection system in claim 9, further comprising a plurality of analog switches that are controlled to couple the plurality of conductive metal wires to the RNG, the mesh driver and the tamper sensing unit. 15. A tamper detection system that protects a sensitive area in a secure application specific integrated circuit (ASIC), comprising:
an active mesh that comprises a plurality of capacitors, the active mesh covering the sensitive area, capacitors in the plurality of capacitors sharing a substantially equal capacitance; a random number generator (RNG) that generates a first random number and a second random number, the first and second random numbers varying with time; a mesh driver, coupled between the active mesh and the RNG, the mesh driver architecting the active mesh with a time-varying configuration according to the first and second random numbers, a first capacitor and a second capacitor being selected from the plurality of capacitors according to the first and second random numbers; and a tamper sensing unit, coupled to both the active mesh and the RNG, the tamper sensing unit comparing the capacitances of the first and second capacitors, detecting a disparity of the capacitances, and generating a flag signal. 16. The tamper detection system in claim 15, wherein the active mesh is made from at least two metal layers above a substrate of the security ASIC, and routed to integrated circuit in the substrate via intermediate metal and polysilicon layers. 17. The tamper detection system in claim 15, wherein the RNG, the mesh driver and the tamper sensing unit are integrated in the substrate of the secure ASIC. 18. The tamper detection system in claim 15, wherein the tamper sensing unit further comprises a capacitance comparator. 19. The tamper detection system in claim 15, wherein the RNG generates another two distinct random numbers that are used to select another two capacitors, these two capacitors are compared for tamper detection during the same tamper detection cycle in which the first and second capacitors are monitored. 20. The tamper detection system in claim 15, further comprising a plurality of analog switches that are controlled to couple the plurality of capacitors to the RNG, the mesh driver and the tamper sensing unit. | Various embodiments of the present invention relates generally to an integrated circuit, and more particularly, to systems, devices and methods of incorporating a tamper detection countermeasure into a security ASIC to deter physical attacks. The tamper detection countermeasure architects an active mesh to cover a sensitive area in the security ASIC. A plurality of time-varying random numbers is generated by a random number generator (RNG), and the active mesh is driven and configured according to these random numbers. During tamper detection cycles, the active mesh is monitored with respect to the plurality of random numbers that is directly provided by the RNG. Upon a tampering attempt, a flag signal is generated and used to initialize subsequent anti-tampering actions. The active mesh may be controlled and monitored based on time-varying codes, and therefore, an adversary may not easily bypass the active mesh and attack the sensitive area.1. A method of detecting a tampering attempt in a secure application specific integrated circuit (ASIC), comprising steps of:
generating a plurality of random numbers that varies with time; driving and configuring an active mesh according to the plurality of random numbers, the active mesh covering a sensitive area in the secure ASIC; monitoring the active mesh with respect to the plurality of random numbers; and generating a flag signal that indicates the tampering attempt. 2. The method of detecting the tampering attempt in claim 1, wherein the active mesh is made from at least one metal layer above a substrate of the security ASIC, and routed to integrated circuit in the substrate via intermediate metal and polysilicon layers. 3. The method of detecting the tampering attempt in claim 1, comprises a plurality of conductive metal wires. 4. The method of detecting the tampering attempt in claim 3, wherein at least one random number in the plurality of random numbers comprises a plurality of bits, and the step of driving and configuring the active mesh further comprises a step of:
driving a first end node of each conductive metal wire in the plurality of conductive metal wires at a logic level determined by a bit in the plurality of bits. 5. The method of detecting the tampering attempt in claim 4, wherein the step of monitoring the active mesh further comprises steps of:
monitoring a voltage at a second end node of at least one conductive metal wire selected from the plurality of conductive metal wires; verifying the voltage with respect to a corresponding bit in the plurality of bits; and generating a flag signal. 6. The method of detecting the tampering attempt in claim 1, wherein the active mesh comprises a plurality of capacitors. 7. The method of detecting the tampering attempt in claim 6, wherein the plurality of random numbers includes a first random number and a second random number, and the step of driving and configuring an active mesh further comprises a step of:
selecting a first capacitor and a second capacitor from the plurality of capacitors according to the first and second random numbers. 8. The method of detecting the tampering attempt in claim 7, wherein the step of monitoring the active mesh further comprises steps of:
comparing the capacitances of the first and second capacitors; detecting a disparity of the capacitances; and generating a flag signal. 9. A tamper detection system that protects a sensitive area in a secure application specific integrated circuit (ASIC), comprising:
an active mesh that comprises a plurality of conductive metal wires, the active mesh covering the sensitive area; a random number generator (RNG) that generates at least one random number, the at least one random number comprising a plurality of bits and varying with time; a mesh driver, coupled between the active mesh and the RNG, the mesh driver driving the active mesh with a time-varying driving pattern according to the at least one random number, a first end node of each conductive metal wire in the plurality of conductive metal wires being driven at a logic level determined by a bit in the plurality of bits; and a tamper sensing unit, coupled to both the active mesh and the RNG, the tamper sensing unit monitoring a voltage at a second end node of at least one conductive metal wire selected from the plurality of metal wires, verifying the voltage with respect to a corresponding bit in the plurality of bits, and generating a flag signal. 10. The tamper detection system in claim 9, wherein the active mesh is made from at least one metal layer above a substrate of the security ASIC, and routed to integrated circuit in the substrate via intermediate metal and polysilicon layers. 11. The tamper detection system in claim 9, wherein the RNG, the mesh driver and the tamper sensing unit are integrated in the substrate of the secure ASIC. 12. The tamper detection system in claim 9, wherein the mesh driver further comprises a state machine to control temporal variation of the driving pattern. 13. The tamper detection system in claim 9, further comprising a storage selected from cache memories and data registers to temporarily store the at least one random numbers. 14. The tamper detection system in claim 9, further comprising a plurality of analog switches that are controlled to couple the plurality of conductive metal wires to the RNG, the mesh driver and the tamper sensing unit. 15. A tamper detection system that protects a sensitive area in a secure application specific integrated circuit (ASIC), comprising:
an active mesh that comprises a plurality of capacitors, the active mesh covering the sensitive area, capacitors in the plurality of capacitors sharing a substantially equal capacitance; a random number generator (RNG) that generates a first random number and a second random number, the first and second random numbers varying with time; a mesh driver, coupled between the active mesh and the RNG, the mesh driver architecting the active mesh with a time-varying configuration according to the first and second random numbers, a first capacitor and a second capacitor being selected from the plurality of capacitors according to the first and second random numbers; and a tamper sensing unit, coupled to both the active mesh and the RNG, the tamper sensing unit comparing the capacitances of the first and second capacitors, detecting a disparity of the capacitances, and generating a flag signal. 16. The tamper detection system in claim 15, wherein the active mesh is made from at least two metal layers above a substrate of the security ASIC, and routed to integrated circuit in the substrate via intermediate metal and polysilicon layers. 17. The tamper detection system in claim 15, wherein the RNG, the mesh driver and the tamper sensing unit are integrated in the substrate of the secure ASIC. 18. The tamper detection system in claim 15, wherein the tamper sensing unit further comprises a capacitance comparator. 19. The tamper detection system in claim 15, wherein the RNG generates another two distinct random numbers that are used to select another two capacitors, these two capacitors are compared for tamper detection during the same tamper detection cycle in which the first and second capacitors are monitored. 20. The tamper detection system in claim 15, further comprising a plurality of analog switches that are controlled to couple the plurality of capacitors to the RNG, the mesh driver and the tamper sensing unit. | 2,400 |
7,189 | 7,189 | 13,543,172 | 2,468 | It would be to provide a method which will work with future versions of LTE-A, be backwards compatible and alleviate interference to signals for basic system operation.
The method includes generating one or more Reference Signals associated with the one or more Channel Quality Indicators, and includes mapping the one or more Channel Quality Indicator-Reference Signals to the last symbol of the second slot of the one or more subframes. | 1. A method implemented in a base station used in a wireless communications system, comprising:
transmitting to a user equipment (UE) one or more channel quality indicator (CQI) reference signals in a subframe; and receiving from the user equipment a report determined according to said one or more CQI reference signals,
wherein the CQI reference signal transmission is repeated at a CQI reference signal transmission period, and
wherein a subframe offset is provided within a frame for the CQI reference signal transmission. 2. The method according to claim 1, wherein the report comprises at least one of a rank indicator (RI), a CQI, and a precoding matrix indicator (PMI). 3. The method according to claim 1, wherein the CQI reference signal transmission avoids collision with a Cell-specific Reference Signal (CRS), a Dedicated Reference Signal (DRS), a Physical Broadcast CHannel (PBCH), or a synchronization signal. 4. The method according to claim 1, wherein the CQI reference signal transmission period comprises any of 5 ms, 10 ms, 20 ms, 40 ms, 80 ms, and 160 ms. 5. The method according to claim 1, wherein the CQI reference signal transmission period comprises any of 2 ms, 5 ms, 10 ms, 20 ms, 40 ms, 80 ms, and 160 ms for Frequency Division Duplex (FDD) transmission. 6. The method according to claim 1, wherein the CQI reference signal transmission period comprises any of 1 ms, 5 ms, 10 ms, 20 ms, 40 ms, 80 ms, and 160 ms for Time Division Duplex (TDD) transmission. 7. The method according to claim 1, wherein the CQI reference signal transmission period is cell-specific and a CQI or PMI reporting period is UE-specific. 8. The method according to claim 1, wherein a CQI or PMI reporting period is equal to or longer than the CQI reference signal transmission period. 9. The method according to claim 1, wherein the subframe offset is relative to subframe 0 within the frame and takes a value from 0 ms to (TCQI-RS−1 ms) where TCQI-RS denotes the CQI reference signal transmission period. 10. The method according to claim 1, wherein the subframe offset is cell-specific. 11. The method according to claim 1, wherein said one or more CQI reference signals are used for one or more antenna ports for spatial multiplexing, the number of said one or more antenna ports being equal to or less than 8, or for one or more transmission layers, the number of said one or more transmission layers being equal to or less than 8. 12. The method according to claim 1, wherein a CQI reference signal position depends on a cyclic prefix (CP) length. 13. The method according to claim 1, wherein the base station is configured to be used in a Coordinated Multi-Point (CoMP) transmission. 14. A base station used in a wireless communications system, comprising:
a transmitter to transmit to a user equipment (UE) a channel quality indicator (CQI) reference signals in a subframe; and a receiver to receive from the user equipment a report determined according to the CQI reference signals, wherein the subframe comprises a resource block and a last OFDM (orthogonal frequency-division multiplexing) symbol in the resource block conveys the CQI reference signal. 15. A method implemented in a user equipment (UE) used in a wireless communications system, comprising:
receiving from a base station one or more channel quality indicator (CQI) reference signals in a subframe; and transmitting to the base station a report determined according to said one or more CQI reference signals,
wherein the CQI reference signal transmission is repeated at CQI reference signal transmission period TCQI-RS, and
wherein a subframe offset relative to subframe 0 is provided within a frame for the CQI reference signal transmission. 16. The method according to claim 15, wherein the report comprises at least one of a rank indicator (RI), a CQI, and a precoding matrix indicator (PMI). 17. The method according to claim 15, wherein the CQI reference signal transmission avoids collision with a Cell-specific Reference Signal (CRS), a Dedicated Reference Signal (DRS), a Physical Broadcast CHannel (PBCH), or a synchronization signal. 18. The method according to claim 15, wherein the CQI reference signal transmission period comprises any of 5 ms, 10 ms, 20 ms, 40 ms, 80 ms, and 160 ms. 19. The method according to claim 15, wherein the CQI reference signal transmission period comprises any of 2 ms, 5 ms, 10 ms, 20 ms, 40 ms, 80 ms, and 160 ms for Frequency Division Duplex (FDD) transmission. 20. The method according to claim 15, wherein the CQI reference signal transmission period comprises any of 1 ms, 5 ms, 10 ms, 20 ms, 40 ms, 80 ms, and 160 ms for Time Division Duplex (TDD) transmission. 21. The method according to claim 15, wherein the CQI reference signal transmission period is cell-specific and a CQI or PMI reporting period is UE-specific. 22. The method according to claim 15, wherein a CQI or PMI reporting period is equal to or longer than the CQI reference signal transmission period. 23. The method according to claim 15, wherein the subframe offset is relative to subframe 0 within the frame and takes a value from 0 ms to (TCQI-RS−1 ms) where TCQI-RS denotes the CQI reference signal transmission period. 24. The method according to claim 15, wherein the subframe offset is cell-specific. 25. The method according to claim 15, wherein said one or more CQI reference signals are used for one or more antenna ports for spatial multiplexing, the number of said one or more antenna ports being equal to or less than 8, or for one or more transmission layers, the number of said one or more transmission layers being equal to or less than 8. 26. The method according to claim 15, wherein a CQI reference signal position depends on a cyclic prefix (CP) length. 27. The method according to claim 15, wherein the base station is configured to be used in a Coordinated Multi-Point (CoMP) transmission. 28. A user equipment (UE) used in a wireless communications system, comprising:
a receiver to receive from a base station a channel quality indicator (CQI) reference signals in a subframe; and a transmitter to transmit to the base station a report determined according to the CQI reference signals, wherein the subframe comprises a resource block and a last OFDM (orthogonal frequency-division multiplexing) symbol in the resource block conveys the CQI reference signal. | It would be to provide a method which will work with future versions of LTE-A, be backwards compatible and alleviate interference to signals for basic system operation.
The method includes generating one or more Reference Signals associated with the one or more Channel Quality Indicators, and includes mapping the one or more Channel Quality Indicator-Reference Signals to the last symbol of the second slot of the one or more subframes.1. A method implemented in a base station used in a wireless communications system, comprising:
transmitting to a user equipment (UE) one or more channel quality indicator (CQI) reference signals in a subframe; and receiving from the user equipment a report determined according to said one or more CQI reference signals,
wherein the CQI reference signal transmission is repeated at a CQI reference signal transmission period, and
wherein a subframe offset is provided within a frame for the CQI reference signal transmission. 2. The method according to claim 1, wherein the report comprises at least one of a rank indicator (RI), a CQI, and a precoding matrix indicator (PMI). 3. The method according to claim 1, wherein the CQI reference signal transmission avoids collision with a Cell-specific Reference Signal (CRS), a Dedicated Reference Signal (DRS), a Physical Broadcast CHannel (PBCH), or a synchronization signal. 4. The method according to claim 1, wherein the CQI reference signal transmission period comprises any of 5 ms, 10 ms, 20 ms, 40 ms, 80 ms, and 160 ms. 5. The method according to claim 1, wherein the CQI reference signal transmission period comprises any of 2 ms, 5 ms, 10 ms, 20 ms, 40 ms, 80 ms, and 160 ms for Frequency Division Duplex (FDD) transmission. 6. The method according to claim 1, wherein the CQI reference signal transmission period comprises any of 1 ms, 5 ms, 10 ms, 20 ms, 40 ms, 80 ms, and 160 ms for Time Division Duplex (TDD) transmission. 7. The method according to claim 1, wherein the CQI reference signal transmission period is cell-specific and a CQI or PMI reporting period is UE-specific. 8. The method according to claim 1, wherein a CQI or PMI reporting period is equal to or longer than the CQI reference signal transmission period. 9. The method according to claim 1, wherein the subframe offset is relative to subframe 0 within the frame and takes a value from 0 ms to (TCQI-RS−1 ms) where TCQI-RS denotes the CQI reference signal transmission period. 10. The method according to claim 1, wherein the subframe offset is cell-specific. 11. The method according to claim 1, wherein said one or more CQI reference signals are used for one or more antenna ports for spatial multiplexing, the number of said one or more antenna ports being equal to or less than 8, or for one or more transmission layers, the number of said one or more transmission layers being equal to or less than 8. 12. The method according to claim 1, wherein a CQI reference signal position depends on a cyclic prefix (CP) length. 13. The method according to claim 1, wherein the base station is configured to be used in a Coordinated Multi-Point (CoMP) transmission. 14. A base station used in a wireless communications system, comprising:
a transmitter to transmit to a user equipment (UE) a channel quality indicator (CQI) reference signals in a subframe; and a receiver to receive from the user equipment a report determined according to the CQI reference signals, wherein the subframe comprises a resource block and a last OFDM (orthogonal frequency-division multiplexing) symbol in the resource block conveys the CQI reference signal. 15. A method implemented in a user equipment (UE) used in a wireless communications system, comprising:
receiving from a base station one or more channel quality indicator (CQI) reference signals in a subframe; and transmitting to the base station a report determined according to said one or more CQI reference signals,
wherein the CQI reference signal transmission is repeated at CQI reference signal transmission period TCQI-RS, and
wherein a subframe offset relative to subframe 0 is provided within a frame for the CQI reference signal transmission. 16. The method according to claim 15, wherein the report comprises at least one of a rank indicator (RI), a CQI, and a precoding matrix indicator (PMI). 17. The method according to claim 15, wherein the CQI reference signal transmission avoids collision with a Cell-specific Reference Signal (CRS), a Dedicated Reference Signal (DRS), a Physical Broadcast CHannel (PBCH), or a synchronization signal. 18. The method according to claim 15, wherein the CQI reference signal transmission period comprises any of 5 ms, 10 ms, 20 ms, 40 ms, 80 ms, and 160 ms. 19. The method according to claim 15, wherein the CQI reference signal transmission period comprises any of 2 ms, 5 ms, 10 ms, 20 ms, 40 ms, 80 ms, and 160 ms for Frequency Division Duplex (FDD) transmission. 20. The method according to claim 15, wherein the CQI reference signal transmission period comprises any of 1 ms, 5 ms, 10 ms, 20 ms, 40 ms, 80 ms, and 160 ms for Time Division Duplex (TDD) transmission. 21. The method according to claim 15, wherein the CQI reference signal transmission period is cell-specific and a CQI or PMI reporting period is UE-specific. 22. The method according to claim 15, wherein a CQI or PMI reporting period is equal to or longer than the CQI reference signal transmission period. 23. The method according to claim 15, wherein the subframe offset is relative to subframe 0 within the frame and takes a value from 0 ms to (TCQI-RS−1 ms) where TCQI-RS denotes the CQI reference signal transmission period. 24. The method according to claim 15, wherein the subframe offset is cell-specific. 25. The method according to claim 15, wherein said one or more CQI reference signals are used for one or more antenna ports for spatial multiplexing, the number of said one or more antenna ports being equal to or less than 8, or for one or more transmission layers, the number of said one or more transmission layers being equal to or less than 8. 26. The method according to claim 15, wherein a CQI reference signal position depends on a cyclic prefix (CP) length. 27. The method according to claim 15, wherein the base station is configured to be used in a Coordinated Multi-Point (CoMP) transmission. 28. A user equipment (UE) used in a wireless communications system, comprising:
a receiver to receive from a base station a channel quality indicator (CQI) reference signals in a subframe; and a transmitter to transmit to the base station a report determined according to the CQI reference signals, wherein the subframe comprises a resource block and a last OFDM (orthogonal frequency-division multiplexing) symbol in the resource block conveys the CQI reference signal. | 2,400 |
7,190 | 7,190 | 15,114,560 | 2,498 | A method for synchronizing playback of a program including a video and associated first audio at a first electronic device with playback of a second audio associated with the program at a second electronic device that also receives the video is disclosed. The method comprises decoding, by a video decoder in the second electronic device, the video, and outputting the decoded video; decoding, by an audio decoder in the second electronic device, the second audio and outputting the decoded second audio for playing back by the second electronic device; receiving a user command to synchronize the playback of the video at the first electronic device and playback of the second audio at the second electronic device; responsive to the user command, the method further comprising capturing, by a capturing device in the second electronic device, the playback of the video at the first electronic device; determining, by the second electronic device, an offset between the outputted decoded video and the captured video; and adjusting outputting of the decoded second audio according to the offset, so that the playback of the first audio at the first electronic device is synchronized with the playback of the second audio at the second electronic device. | 1. A method for synchronizing playback of a program including a video and associated first audio at a first electronic device with playback of a second audio associated with the program at a second electronic device that also receives the video, the method comprising:
decoding, by a video decoder in the second electronic device, the video, and outputting the decoded video; decoding by an audio decoder in the second electronic device, the second audio and outputting the decoded second audio for playing back by the second electronic device; receiving a user command to synchronize the playback of the video at the first electronic device and playback of the second audio at the second electronic device; responsive to the user command, the method further comprising: capturing, by a capturing device in the second electronic device, the playback of the video at the first electronic device; determining by the second electronic device, an offset between the outputted decoded video and the captured video; and adjusting outputting of the decoded second audio according to the offset, so that the playback of the first audio at the first electronic device is synchronized with the playback of the second audio at the second electronic device. 2. The method of claim 1, further comprising a step of playing back the second audio by the second electronic device from a first position, which is a first time interval away from a beginning of the program in a normal playback of the program, wherein when the playback of the second audio is at the first position, the playback of the program by the first electronic device is at a second position, which is a second time interval away from the beginning of the program in a normal playback, and wherein a difference between the first time interval and the second time interval is within a predefined interval. 3. The method of claim 2, further comprising a step of positioning the playback of the second audio to the first position responsive to a user signal. 4. The method of claim 1, if the step of determining the offset fails, asking a user to input the user command again, and the steps of capturing and determining the offset are repeated. 5. The method of claim 1, further comprising adjusting, by the video decoder, an output by outputting the decoded video according to the offset, so that outputs of the video decoder and the audio decoder are synchronized. 6. The method of claim 1, further comprising downloading the video and the second audio to the second electronic device before playing back the second audio by the second electronic device. 7. The method of claim 6, wherein the program received by the first electronic device, and the video and the second audio received by the second electronic device are downloaded from a first source. 8. The method of claim 6, wherein the program received by the first electronic device is downloaded from a second source different from a first source for downloading the video and the second audio to the second electronic device. 9. The method of claim 1, wherein the user command is generated by a user activating an input mechanism. 10. The method of claim 1, further comprising a step of determining a presentation time stamp associated with a frame in the decoded video, which corresponds a newly captured video frame according to the offset, and adjusting playback of the second audio comprising outputting a sample in the decoded second audio associated with the determined presentation time stamp. 11. The method of claim 1, wherein the first electronic device is one of a television receiver, a theater video reproduction device, and a computer. 12. A second electronic device comprising:
a video decoder and an audio decoder for respectively decoding a video and a second audio received by the second electronic device and outputting the decoded video and the decoded second audio, the second audio associated with a program comprising a video and the first audio and being played back by a first electronic device; a video capturing device for capturing the video being played back by the first electronic device; a video correlator receiving the captured playback video and the decoded video from the video decoder; and a processor, wherein when the processor receives a user command to synchronize playback of the second audio at the second electronic device with the playback of the video at the first electronic device, the processor is configured to instruct the video correlator to determine an offset between the received captured video and the received decoded video outputted from the video decoder and instruct the audio decoder to output the decoded second audio according to the offset. 13. The second electronic device of claim 12, further comprising a video player playing back the second audio by the second electronic device from a first position, which is a first time interval away from a beginning of the program in a normal playback of the program, wherein when the playback of the second audio is at the first position, the playback of the program at the first electronic device is at a second position, which is a second time interval away from the beginning of the program in a normal playback, and wherein a difference between the first time interval and the second time interval is within a predefined interval. 14. The second electronic device of claim 13, wherein the video player positions the playback of the second audio to the first position responsive to a user signal. 15. The second electronic device of claim 12, wherein if determining the offset fails, the processor is configured to ask a user to input the user command again, and instruct the video correlator to determine the offset again. 16. The second electronic device of claim 12, wherein the processor is configured to instruct the video decoder to adjust an output by outputting the decoded video according to the offset, so that outputs of the video decoder and the second audio decoder are synchronized. 17. The second electronic device of claim 12, wherein the video and the second audio are downloaded to the second electronic device before the second electronic device playing back the second audio. 18. The second electronic device of claim 17, wherein the program received by the first electronic device, and the video and the second audio received by the second electronic device are downloaded from a first source. 19. The second electronic device of claim 17, wherein the program received by the first electronic device is downloaded from a second source different from a first source for downloading the video and second audio to the second electronic device. 20. The second electronic device of claim 12, further comprising an input mechanism for a user to input the user command. 21. The second electronic device of claim 12, wherein the processor is configured to instruct the video correlator to determine a presentation time stamp associated with a frame in the decoded video, which corresponds a newly captured video according to the offset, and instruct the audio decoder to output a sample in the decoded second audio associating with the determined presentation time stamp. 22. The second electronic device of claim 12, wherein the first electronic device is one of a television receiver, a theater video reproduction device, and a computer. 23-33. (canceled) | A method for synchronizing playback of a program including a video and associated first audio at a first electronic device with playback of a second audio associated with the program at a second electronic device that also receives the video is disclosed. The method comprises decoding, by a video decoder in the second electronic device, the video, and outputting the decoded video; decoding, by an audio decoder in the second electronic device, the second audio and outputting the decoded second audio for playing back by the second electronic device; receiving a user command to synchronize the playback of the video at the first electronic device and playback of the second audio at the second electronic device; responsive to the user command, the method further comprising capturing, by a capturing device in the second electronic device, the playback of the video at the first electronic device; determining, by the second electronic device, an offset between the outputted decoded video and the captured video; and adjusting outputting of the decoded second audio according to the offset, so that the playback of the first audio at the first electronic device is synchronized with the playback of the second audio at the second electronic device.1. A method for synchronizing playback of a program including a video and associated first audio at a first electronic device with playback of a second audio associated with the program at a second electronic device that also receives the video, the method comprising:
decoding, by a video decoder in the second electronic device, the video, and outputting the decoded video; decoding by an audio decoder in the second electronic device, the second audio and outputting the decoded second audio for playing back by the second electronic device; receiving a user command to synchronize the playback of the video at the first electronic device and playback of the second audio at the second electronic device; responsive to the user command, the method further comprising: capturing, by a capturing device in the second electronic device, the playback of the video at the first electronic device; determining by the second electronic device, an offset between the outputted decoded video and the captured video; and adjusting outputting of the decoded second audio according to the offset, so that the playback of the first audio at the first electronic device is synchronized with the playback of the second audio at the second electronic device. 2. The method of claim 1, further comprising a step of playing back the second audio by the second electronic device from a first position, which is a first time interval away from a beginning of the program in a normal playback of the program, wherein when the playback of the second audio is at the first position, the playback of the program by the first electronic device is at a second position, which is a second time interval away from the beginning of the program in a normal playback, and wherein a difference between the first time interval and the second time interval is within a predefined interval. 3. The method of claim 2, further comprising a step of positioning the playback of the second audio to the first position responsive to a user signal. 4. The method of claim 1, if the step of determining the offset fails, asking a user to input the user command again, and the steps of capturing and determining the offset are repeated. 5. The method of claim 1, further comprising adjusting, by the video decoder, an output by outputting the decoded video according to the offset, so that outputs of the video decoder and the audio decoder are synchronized. 6. The method of claim 1, further comprising downloading the video and the second audio to the second electronic device before playing back the second audio by the second electronic device. 7. The method of claim 6, wherein the program received by the first electronic device, and the video and the second audio received by the second electronic device are downloaded from a first source. 8. The method of claim 6, wherein the program received by the first electronic device is downloaded from a second source different from a first source for downloading the video and the second audio to the second electronic device. 9. The method of claim 1, wherein the user command is generated by a user activating an input mechanism. 10. The method of claim 1, further comprising a step of determining a presentation time stamp associated with a frame in the decoded video, which corresponds a newly captured video frame according to the offset, and adjusting playback of the second audio comprising outputting a sample in the decoded second audio associated with the determined presentation time stamp. 11. The method of claim 1, wherein the first electronic device is one of a television receiver, a theater video reproduction device, and a computer. 12. A second electronic device comprising:
a video decoder and an audio decoder for respectively decoding a video and a second audio received by the second electronic device and outputting the decoded video and the decoded second audio, the second audio associated with a program comprising a video and the first audio and being played back by a first electronic device; a video capturing device for capturing the video being played back by the first electronic device; a video correlator receiving the captured playback video and the decoded video from the video decoder; and a processor, wherein when the processor receives a user command to synchronize playback of the second audio at the second electronic device with the playback of the video at the first electronic device, the processor is configured to instruct the video correlator to determine an offset between the received captured video and the received decoded video outputted from the video decoder and instruct the audio decoder to output the decoded second audio according to the offset. 13. The second electronic device of claim 12, further comprising a video player playing back the second audio by the second electronic device from a first position, which is a first time interval away from a beginning of the program in a normal playback of the program, wherein when the playback of the second audio is at the first position, the playback of the program at the first electronic device is at a second position, which is a second time interval away from the beginning of the program in a normal playback, and wherein a difference between the first time interval and the second time interval is within a predefined interval. 14. The second electronic device of claim 13, wherein the video player positions the playback of the second audio to the first position responsive to a user signal. 15. The second electronic device of claim 12, wherein if determining the offset fails, the processor is configured to ask a user to input the user command again, and instruct the video correlator to determine the offset again. 16. The second electronic device of claim 12, wherein the processor is configured to instruct the video decoder to adjust an output by outputting the decoded video according to the offset, so that outputs of the video decoder and the second audio decoder are synchronized. 17. The second electronic device of claim 12, wherein the video and the second audio are downloaded to the second electronic device before the second electronic device playing back the second audio. 18. The second electronic device of claim 17, wherein the program received by the first electronic device, and the video and the second audio received by the second electronic device are downloaded from a first source. 19. The second electronic device of claim 17, wherein the program received by the first electronic device is downloaded from a second source different from a first source for downloading the video and second audio to the second electronic device. 20. The second electronic device of claim 12, further comprising an input mechanism for a user to input the user command. 21. The second electronic device of claim 12, wherein the processor is configured to instruct the video correlator to determine a presentation time stamp associated with a frame in the decoded video, which corresponds a newly captured video according to the offset, and instruct the audio decoder to output a sample in the decoded second audio associating with the determined presentation time stamp. 22. The second electronic device of claim 12, wherein the first electronic device is one of a television receiver, a theater video reproduction device, and a computer. 23-33. (canceled) | 2,400 |
7,191 | 7,191 | 15,130,542 | 2,424 | A device is provided for use with a wireless communication device and with a video display. The device includes a receiver, an image decoder, an emergency alert system (EAS) decoder, an output port, a memory, a warning generator and a transmitter. The receiver receives input data including image data and EAS data. The image decoder decodes the image data into image display data. The EAS decoder decodes the emergency alert system data into emergency alert data. The output port outputs the image display data to the video display to display a video image. The memory stores contact information associated with the wireless communication device. The warning generator generates a warning signal based on the emergency alert data. The transmitter transmits a warning transmission to the wireless communication device over a cellular network, wherein the warning transmission is based on the warning signal and the contact information. | 1. A device for use with a wireless communication device and for use with a video display operable to display a video, said device comprising:
a receiver operable to receive input data including image data and emergency alert system data; an image decoder operable to decode the image data into image display data; an emergency alert system decoder operable to decode the emergency alert system data into emergency alert data; an output port operable to output the image display data to the video display to display a video image; a memory operable to store contact information associated with the wireless communication device; a warning generator operable to generate a warning signal based on the emergency alert data; and a transmitter operable to transmit a warning transmission to the wireless communication device over a cellular network, the warning transmission being based on the warning signal and the contact information. 2. The device of claim 1,
wherein said receiver is operable to receive the input data such that the emergency alert system data includes encoded audio data for transmission over the cellular network, wherein said emergency alert system decoder is operable to decode the encoded audio data into decoded audio data, and wherein said transmitter is operable to transmit the warning transmission so as to include an audio instruction based on the decoded audio data. 3. The device of claim 1,
wherein said receiver is operable to receive the input data such that the emergency alert system data includes encoded text data for transmission over the cellular network, wherein said emergency alert system decoder is operable to decode the encoded text data into decoded text data, and wherein said transmitter is operable to transmit the warning transmission so as to include a text instruction based on the decoded text data. 4. The device of claim 1, further comprising:
a pairing component operable to pair with a networked device over a second wireless network; and a controlling component operable to generate instructions, based on the emergency alert data, for the paired networked device so as to modify operation of the paired networked device, wherein said transmitter is further operable to transmit an instruction signal, based on the instructions, to the paired networked device over the second wireless network so as to modify operation of the paired networked device. 5. The device of claim 4, wherein said transmitter is operable to transmit the instruction signal as one of the group consisting of a Wi-Fi signal, a Bluetooth signal and a Bluetooth Low Energy signal. 6. The device of claim 4,
wherein said receiver is further operable to receive a notification from the paired networked device based on a detected parameter, wherein said warning generator is further operable to generate a second warning signal based on received notification, and wherein said transmitter is further operable to transmit a notification transmission to the wireless communication device over the cellular network, the notification transmission being based on the second warning signal and the contact information. 7. A method of using a wireless communication device and a video display operable to display a video, said method comprising:
receiving, via a receiver, input data including image data and emergency alert system data; decoding, via an image decoder, the image data into image display data; decoding, via an emergency alert system, the emergency alert system data into emergency alert data; outputting, via an output port, the image display data to the video display to display a video image; storing, into a memory, contact information associated with the wireless communication device; generating, via a warning generator, a warning signal based on the emergency alert data; and transmitting, via a transmitter, a warning transmission to the wireless communication device over a cellular network, the warning transmission being based on the warning signal and the contact information. 8. The method of claim 7,
wherein said receiving comprises receiving the input data such that the emergency alert system data includes encoded audio data for transmission over the cellular network, wherein said decoding the emergency alert system data into emergency alert data comprises decoding the encoded audio data into decoded audio data, and wherein said transmitting the warning transmission comprises transmitting the warning transmission so as to include an audio instruction based on the decoded audio data. 9. The method of claim 7,
wherein said receiving comprises receiving the input data such that the emergency alert system data includes encoded text data for transmission over the cellular network, wherein said decoding the emergency alert system data into emergency alert data comprises decoding the encoded text data into decoded text data, and wherein said transmitting the warning transmission comprises transmitting the warning transmission so as to include a text instruction based on the decoded text data. 10. The method of claim 7, further comprising:
pairing, via a pairing component, with a networked device over a second wireless network; generating, via a controlling component and based on the emergency alert data, instructions for the paired networked device so as to modify operation of the paired networked device; and transmitting, via the transmitter, an instruction signal, based on the instructions, to the paired networked device over the second wireless network so as to modify operation of the paired networked device. 11. The method of claim 10, wherein said transmitting the instruction signal comprises transmitting the instruction signal as one of the group consisting of a Wi-Fi signal, a Bluetooth signal and a Bluetooth Low Energy signal. 12. The method of claim 10, further comprising:
receiving, via the receiver, a notification from the paired networked device based on a detected parameter; generating, via the warning generator, a second warning signal based on received notification; and transmitting, via the transmitter, a notification transmission to the wireless communication device over the cellular network, the notification transmission being based on the second warning signal and the contact information. 13. A non-transitory, tangible, computer-readable media having computer-readable instructions stored thereon, for use with a wireless communication device and a video display operable to display a video, the computer-readable instructions being capable of being read by a computer and being capable of instructing the computer to perform the method comprising:
receiving, via a receiver, input data including image data and emergency alert system data; decoding, via an image decoder, the image data into image display data; decoding, via an emergency alert system, the emergency alert system data into emergency alert data; outputting, via an output port, the image display data to the video display to display a video image; storing, into a memory, contact information associated with the wireless communication device; generating, via a warning generator, a warning signal based on the emergency alert data; and transmitting, via a transmitter, a warning transmission to the wireless communication device over a cellular network, the warning transmission being based on the warning signal and the contact information. 14. The non-transitory, tangible, computer-readable media of claim 13,
wherein the computer-readable instructions are capable of instructing the computer to perform the method such that said receiving comprises receiving the input data such that the emergency alert system data includes encoded audio data for transmission over the cellular network, wherein the computer-readable instructions are capable of instructing the computer to perform the method such that said decoding the emergency alert system data into emergency alert data comprises decoding the encoded audio data into decoded audio data, and wherein the computer-readable instructions are capable of instructing the computer to perform the method such that said transmitting the warning transmission comprises transmitting the warning transmission so as to include an audio instruction based on the decoded audio data. 15. The non-transitory, tangible, computer-readable media of claim 13,
wherein the computer-readable instructions are capable of instructing the computer to perform the method such that said receiving comprises receiving the input data such that the emergency alert system data includes encoded text data for transmission over the cellular network, wherein the computer-readable instructions are capable of instructing the computer to perform the method such that said decoding the emergency alert system data into emergency alert data comprises decoding the encoded text data into decoded text data, and wherein the computer-readable instructions are capable of instructing the computer to perform the method such that said transmitting the warning transmission comprises transmitting the warning transmission so as to include a text instruction based on the decoded text data. 16. The non-transitory, tangible, computer-readable media of claim 13, the computer-readable instructions being capable of being read by a computer and being capable of instructing the computer to perform the method further comprising:
pairing, via a pairing component, with a networked device over a second wireless network; generating, via a controlling component and based on the emergency alert data, instructions for the paired networked device so as to modify operation of the paired networked device; and transmitting, via the transmitter, an instruction signal, based on the instructions, to the paired networked device over the second wireless network so as to modify operation of the paired networked device. 17. The non-transitory, tangible, computer-readable media of claim 16, wherein the computer-readable instructions are capable of instructing the computer to perform the method such that said transmitting the instruction signal comprises transmitting the instruction signal as one of the group consisting of a Wi-Fi signal, a Bluetooth signal and a Bluetooth Low Energy signal. 18. The non-transitory, tangible, computer-readable media of claim 16, the computer-readable instructions being capable of being read by a computer and being capable of instructing the computer to perform the method further comprising:
receiving, via the receiver, a notification from the paired networked device based on a detected parameter; generating, via the warning generator, a second warning signal based on received notification; and transmitting, via the transmitter, a notification transmission to the wireless communication device over the cellular network, the notification transmission being based on the second warning signal and the contact information. | A device is provided for use with a wireless communication device and with a video display. The device includes a receiver, an image decoder, an emergency alert system (EAS) decoder, an output port, a memory, a warning generator and a transmitter. The receiver receives input data including image data and EAS data. The image decoder decodes the image data into image display data. The EAS decoder decodes the emergency alert system data into emergency alert data. The output port outputs the image display data to the video display to display a video image. The memory stores contact information associated with the wireless communication device. The warning generator generates a warning signal based on the emergency alert data. The transmitter transmits a warning transmission to the wireless communication device over a cellular network, wherein the warning transmission is based on the warning signal and the contact information.1. A device for use with a wireless communication device and for use with a video display operable to display a video, said device comprising:
a receiver operable to receive input data including image data and emergency alert system data; an image decoder operable to decode the image data into image display data; an emergency alert system decoder operable to decode the emergency alert system data into emergency alert data; an output port operable to output the image display data to the video display to display a video image; a memory operable to store contact information associated with the wireless communication device; a warning generator operable to generate a warning signal based on the emergency alert data; and a transmitter operable to transmit a warning transmission to the wireless communication device over a cellular network, the warning transmission being based on the warning signal and the contact information. 2. The device of claim 1,
wherein said receiver is operable to receive the input data such that the emergency alert system data includes encoded audio data for transmission over the cellular network, wherein said emergency alert system decoder is operable to decode the encoded audio data into decoded audio data, and wherein said transmitter is operable to transmit the warning transmission so as to include an audio instruction based on the decoded audio data. 3. The device of claim 1,
wherein said receiver is operable to receive the input data such that the emergency alert system data includes encoded text data for transmission over the cellular network, wherein said emergency alert system decoder is operable to decode the encoded text data into decoded text data, and wherein said transmitter is operable to transmit the warning transmission so as to include a text instruction based on the decoded text data. 4. The device of claim 1, further comprising:
a pairing component operable to pair with a networked device over a second wireless network; and a controlling component operable to generate instructions, based on the emergency alert data, for the paired networked device so as to modify operation of the paired networked device, wherein said transmitter is further operable to transmit an instruction signal, based on the instructions, to the paired networked device over the second wireless network so as to modify operation of the paired networked device. 5. The device of claim 4, wherein said transmitter is operable to transmit the instruction signal as one of the group consisting of a Wi-Fi signal, a Bluetooth signal and a Bluetooth Low Energy signal. 6. The device of claim 4,
wherein said receiver is further operable to receive a notification from the paired networked device based on a detected parameter, wherein said warning generator is further operable to generate a second warning signal based on received notification, and wherein said transmitter is further operable to transmit a notification transmission to the wireless communication device over the cellular network, the notification transmission being based on the second warning signal and the contact information. 7. A method of using a wireless communication device and a video display operable to display a video, said method comprising:
receiving, via a receiver, input data including image data and emergency alert system data; decoding, via an image decoder, the image data into image display data; decoding, via an emergency alert system, the emergency alert system data into emergency alert data; outputting, via an output port, the image display data to the video display to display a video image; storing, into a memory, contact information associated with the wireless communication device; generating, via a warning generator, a warning signal based on the emergency alert data; and transmitting, via a transmitter, a warning transmission to the wireless communication device over a cellular network, the warning transmission being based on the warning signal and the contact information. 8. The method of claim 7,
wherein said receiving comprises receiving the input data such that the emergency alert system data includes encoded audio data for transmission over the cellular network, wherein said decoding the emergency alert system data into emergency alert data comprises decoding the encoded audio data into decoded audio data, and wherein said transmitting the warning transmission comprises transmitting the warning transmission so as to include an audio instruction based on the decoded audio data. 9. The method of claim 7,
wherein said receiving comprises receiving the input data such that the emergency alert system data includes encoded text data for transmission over the cellular network, wherein said decoding the emergency alert system data into emergency alert data comprises decoding the encoded text data into decoded text data, and wherein said transmitting the warning transmission comprises transmitting the warning transmission so as to include a text instruction based on the decoded text data. 10. The method of claim 7, further comprising:
pairing, via a pairing component, with a networked device over a second wireless network; generating, via a controlling component and based on the emergency alert data, instructions for the paired networked device so as to modify operation of the paired networked device; and transmitting, via the transmitter, an instruction signal, based on the instructions, to the paired networked device over the second wireless network so as to modify operation of the paired networked device. 11. The method of claim 10, wherein said transmitting the instruction signal comprises transmitting the instruction signal as one of the group consisting of a Wi-Fi signal, a Bluetooth signal and a Bluetooth Low Energy signal. 12. The method of claim 10, further comprising:
receiving, via the receiver, a notification from the paired networked device based on a detected parameter; generating, via the warning generator, a second warning signal based on received notification; and transmitting, via the transmitter, a notification transmission to the wireless communication device over the cellular network, the notification transmission being based on the second warning signal and the contact information. 13. A non-transitory, tangible, computer-readable media having computer-readable instructions stored thereon, for use with a wireless communication device and a video display operable to display a video, the computer-readable instructions being capable of being read by a computer and being capable of instructing the computer to perform the method comprising:
receiving, via a receiver, input data including image data and emergency alert system data; decoding, via an image decoder, the image data into image display data; decoding, via an emergency alert system, the emergency alert system data into emergency alert data; outputting, via an output port, the image display data to the video display to display a video image; storing, into a memory, contact information associated with the wireless communication device; generating, via a warning generator, a warning signal based on the emergency alert data; and transmitting, via a transmitter, a warning transmission to the wireless communication device over a cellular network, the warning transmission being based on the warning signal and the contact information. 14. The non-transitory, tangible, computer-readable media of claim 13,
wherein the computer-readable instructions are capable of instructing the computer to perform the method such that said receiving comprises receiving the input data such that the emergency alert system data includes encoded audio data for transmission over the cellular network, wherein the computer-readable instructions are capable of instructing the computer to perform the method such that said decoding the emergency alert system data into emergency alert data comprises decoding the encoded audio data into decoded audio data, and wherein the computer-readable instructions are capable of instructing the computer to perform the method such that said transmitting the warning transmission comprises transmitting the warning transmission so as to include an audio instruction based on the decoded audio data. 15. The non-transitory, tangible, computer-readable media of claim 13,
wherein the computer-readable instructions are capable of instructing the computer to perform the method such that said receiving comprises receiving the input data such that the emergency alert system data includes encoded text data for transmission over the cellular network, wherein the computer-readable instructions are capable of instructing the computer to perform the method such that said decoding the emergency alert system data into emergency alert data comprises decoding the encoded text data into decoded text data, and wherein the computer-readable instructions are capable of instructing the computer to perform the method such that said transmitting the warning transmission comprises transmitting the warning transmission so as to include a text instruction based on the decoded text data. 16. The non-transitory, tangible, computer-readable media of claim 13, the computer-readable instructions being capable of being read by a computer and being capable of instructing the computer to perform the method further comprising:
pairing, via a pairing component, with a networked device over a second wireless network; generating, via a controlling component and based on the emergency alert data, instructions for the paired networked device so as to modify operation of the paired networked device; and transmitting, via the transmitter, an instruction signal, based on the instructions, to the paired networked device over the second wireless network so as to modify operation of the paired networked device. 17. The non-transitory, tangible, computer-readable media of claim 16, wherein the computer-readable instructions are capable of instructing the computer to perform the method such that said transmitting the instruction signal comprises transmitting the instruction signal as one of the group consisting of a Wi-Fi signal, a Bluetooth signal and a Bluetooth Low Energy signal. 18. The non-transitory, tangible, computer-readable media of claim 16, the computer-readable instructions being capable of being read by a computer and being capable of instructing the computer to perform the method further comprising:
receiving, via the receiver, a notification from the paired networked device based on a detected parameter; generating, via the warning generator, a second warning signal based on received notification; and transmitting, via the transmitter, a notification transmission to the wireless communication device over the cellular network, the notification transmission being based on the second warning signal and the contact information. | 2,400 |
7,192 | 7,192 | 13,756,097 | 2,486 | Apparatus and methods are provided to implement a technique for managing stereo images. In one implementation, a computer system corrects misalignments in native stereo plates, i.e., images recorded using two cameras for stereo imaging, using homographic transformations. | 1. A method for correcting stereo images, comprising:
a. determining a position of a first camera; b. determining an orientation of the first camera; c. determining a position of a second camera; d. determining an orientation of the second camera; e. determining a difference between the first camera and the second camera based on the position of the first camera, the orientation of the first camera, the position of the second camera, and the orientation of the second camera; and f. performing a homographic transformation to adjust the orientation of the second camera based on the rotational difference. 2. The method of claim 1, wherein the determining the difference includes determining a perspective shift between the first camera and the second camera. 3. The method of claim 1, wherein the first camera is a first physical camera and the second camera is a second physical camera, and further comprising a first virtual camera and a second virtual camera, the first virtual camera having a location and orientation coincident with the first physical camera, and the second virtual camera having a location and orientation coincident with the second physical camera, and wherein the determining a difference is based on the position of the first virtual camera, the orientation of the first virtual camera, the position of the second virtual camera, and the orientation of the second virtual camera. 4. The method of claim 3, further comprising performing a homographic transformation to adjust the orientation of the first or second virtual camera based on the difference. 5. The method of claim 3, wherein the determining a position of a first camera and the determining a position of the second camera is performed using a step of match moving. 6. The method of claim 1, wherein the performing a homographic transformation to adjust the orientation of the second camera includes performing a nodal rotation of the second camera. 7. The method of claim 1, wherein the performing a homographic transformation includes adjusting a scale or zoom of images from the second camera. 8. The method of claim 5, further comprising:
a. receiving a series of first images from the first camera; b. receiving a series of second images from the second camera; and c. un-warping the series of first images and un-warping the series of second images prior to the step of determining a difference and performing a homographic transformation. 9. A non-transitory computer-readable medium, comprising instructions for causing a computer environment to perform the method of claim 1. 10. A module, implemented on a non-transitory computer-readable medium, for correcting stereo images, comprising:
a. a position determination module for determining the position of a first and a second physical camera; b. an orientation determination module for determining the orientation of a first and a second physical camera; c. a difference determination module for determining a difference between the first physical camera and the second physical camera based on the position of the first physical camera, the orientation of the first physical camera, the position of the second physical camera, and the orientation of the second physical camera; and d. a homographic transformation module for adjusting the orientation of the second physical camera based on the rotational difference. 11. The module of claim 10, further comprising a virtual camera module for situating a first virtual camera at a position and orientation coincident with the first physical camera and a second virtual camera at a position and orientation coincident with the second physical camera. 12. The module of claim 11, further comprising a virtual camera homographic transformation module for adjusting the orientation of the first or second virtual camera based on the difference. 13. The module of claim 12, further comprising a match move module for at least determining camera position and orientation, and wherein the position determination module and the orientation determination module employ the match move module in their determinations. 14. The module of claim 10, further comprising an un-warping module for un-warping images from the first and second physical cameras prior to the difference determination module determining a rotational difference, and wherein the adjustment module adjusts the orientation of the un-warped images. 15. The module of claim 10, wherein the adjustment module is configured to perform a homographic transformation in scale or zoom. 16. The module of claim 1510, wherein the adjustment module is configured to perform a nodal rotation. 17. The module of claim 10, wherein the adjustment module is configured to perform a perspective shift. | Apparatus and methods are provided to implement a technique for managing stereo images. In one implementation, a computer system corrects misalignments in native stereo plates, i.e., images recorded using two cameras for stereo imaging, using homographic transformations.1. A method for correcting stereo images, comprising:
a. determining a position of a first camera; b. determining an orientation of the first camera; c. determining a position of a second camera; d. determining an orientation of the second camera; e. determining a difference between the first camera and the second camera based on the position of the first camera, the orientation of the first camera, the position of the second camera, and the orientation of the second camera; and f. performing a homographic transformation to adjust the orientation of the second camera based on the rotational difference. 2. The method of claim 1, wherein the determining the difference includes determining a perspective shift between the first camera and the second camera. 3. The method of claim 1, wherein the first camera is a first physical camera and the second camera is a second physical camera, and further comprising a first virtual camera and a second virtual camera, the first virtual camera having a location and orientation coincident with the first physical camera, and the second virtual camera having a location and orientation coincident with the second physical camera, and wherein the determining a difference is based on the position of the first virtual camera, the orientation of the first virtual camera, the position of the second virtual camera, and the orientation of the second virtual camera. 4. The method of claim 3, further comprising performing a homographic transformation to adjust the orientation of the first or second virtual camera based on the difference. 5. The method of claim 3, wherein the determining a position of a first camera and the determining a position of the second camera is performed using a step of match moving. 6. The method of claim 1, wherein the performing a homographic transformation to adjust the orientation of the second camera includes performing a nodal rotation of the second camera. 7. The method of claim 1, wherein the performing a homographic transformation includes adjusting a scale or zoom of images from the second camera. 8. The method of claim 5, further comprising:
a. receiving a series of first images from the first camera; b. receiving a series of second images from the second camera; and c. un-warping the series of first images and un-warping the series of second images prior to the step of determining a difference and performing a homographic transformation. 9. A non-transitory computer-readable medium, comprising instructions for causing a computer environment to perform the method of claim 1. 10. A module, implemented on a non-transitory computer-readable medium, for correcting stereo images, comprising:
a. a position determination module for determining the position of a first and a second physical camera; b. an orientation determination module for determining the orientation of a first and a second physical camera; c. a difference determination module for determining a difference between the first physical camera and the second physical camera based on the position of the first physical camera, the orientation of the first physical camera, the position of the second physical camera, and the orientation of the second physical camera; and d. a homographic transformation module for adjusting the orientation of the second physical camera based on the rotational difference. 11. The module of claim 10, further comprising a virtual camera module for situating a first virtual camera at a position and orientation coincident with the first physical camera and a second virtual camera at a position and orientation coincident with the second physical camera. 12. The module of claim 11, further comprising a virtual camera homographic transformation module for adjusting the orientation of the first or second virtual camera based on the difference. 13. The module of claim 12, further comprising a match move module for at least determining camera position and orientation, and wherein the position determination module and the orientation determination module employ the match move module in their determinations. 14. The module of claim 10, further comprising an un-warping module for un-warping images from the first and second physical cameras prior to the difference determination module determining a rotational difference, and wherein the adjustment module adjusts the orientation of the un-warped images. 15. The module of claim 10, wherein the adjustment module is configured to perform a homographic transformation in scale or zoom. 16. The module of claim 1510, wherein the adjustment module is configured to perform a nodal rotation. 17. The module of claim 10, wherein the adjustment module is configured to perform a perspective shift. | 2,400 |
7,193 | 7,193 | 13,799,581 | 2,454 | In one embodiment, a method includes providing for presentation on a graphical user interface an identification of a user; and providing presence information of the user with the identification of the user. The presence information indicates a temporal, spatial, modal, or social accessibility or availability of user. The presence information includes real-time video of the user captured and is provided as presence information automatically and without user input of the user. | 1. A method comprising:
by a computing device, providing for presentation on a graphical user interface an identification of a first user; and by the computing device, providing presence information of the first user with the identification of the first user, the presence information indicating a temporal, spatial, modal, or social accessibility or availability of the first user, the presence information comprising real-time video of the first user captured and provided as presence information automatically and without user input of the first user. 2. The method of claim 1, wherein the graphical user interface is a profile page of the first user on a social-networking system. 3. The method of claim 1, further comprising:
providing for presentation on the graphical user interface an identification of one or more second users, the second users having a relationship with the first user based at least in part on social-graph information; and by the computing device, providing presence information of each of the second users with the identification of each of the second users. 4. The method of claim 3, wherein the social graph comprises a plurality of nodes and edges connecting the nodes;
at least one node in the graph corresponds to the first user; and at least one node in the graph corresponds to one of the second users. 5. The method of claim 3, wherein the graphical user interface is a newsfeed and further comprises one or more status updates generated by the first or one of more of the second users. 6. The method of claim 3, wherein the first and second users are members of a group and the graphical user interface is a group page on a social-networking system. 7. The method of claim 3, wherein the graphical user interface further comprises one or more messages generated by the first and one of more of the second users that comprise a real-time online conversation on a social-networking system. 8. The method of claim 1, wherein:
the first user is a business entity; the graphical user interface is a business page on a social-networking system; and the real-time video comprises one or more images corresponding to activity of a geo-location associated with the business entity. 9. One or more computer-readable non-transitory storage media embodying software configured when executed to:
provide for presentation on a graphical user interface an identification of a first user; and provide presence information of the first user with the identification of the first user, the presence information indicating a temporal, spatial, modal, or social accessibility or availability of the first user, the presence information comprising real-time video of the first user captured and provided as presence information automatically and without user input of the first user. 10. The media of claim 9, wherein the graphical user interface is a profile page of the first user on a social-networking system. 11. The media of claim 9, wherein the software is further configured to:
provide for presentation on the graphical user interface an identification of one or more second users, the second users having a relationship with the first user based at least in part on social-graph information; and provide presence information of each of the second users with the identification of each of the second users. 12. The media of claim 11, wherein the social graph comprises a plurality of nodes and edges connecting the nodes;
at least one node in the graph corresponds to the first user; and at least one node in the graph corresponds to one of the second users. 13. The media of claim 11, wherein the graphical user interface is a newsfeed and further comprises one or more status updates generated by the first or one of more of the second users. 14. The media of claim 11, wherein the first and second users are members of a group and the graphical user interface is a group page on a social-networking system. 15. The media of claim 11, wherein the graphical user interface further comprises one or more messages generated by the first and one of more of the second users that comprise a real-time online conversation on a social-networking system. 16. The media of claim 9, wherein:
the first user is a business entity; the graphical user interface is a business page on a social-networking system; and the real-time video comprises one or more images corresponding to activity of a geo-location associated with the business entity. 17. A device comprising:
a processor; and one or more computer-readable non-transitory storage media coupled to the processor and embodying software that:
provide for presentation on a graphical user interface an identification of a first user; and
provide presence information of the first user with the identification of the first user, the presence information indicating a temporal, spatial, modal, or social accessibility or availability of the first user, the presence information comprising real-time video of the first user captured and provided as presence information automatically and without user input of the first user. 18. The device of claim 17, wherein the graphical user interface is a profile page of the first user on a social-networking system. 19. The device of claim 17, wherein the software is further configured to:
provide for presentation on the graphical user interface an identification of one or more second users, the second users having a relationship with the first user based at least in part on social-graph information; and provide presence information of each of the second users with the identification of each of the second users. 20. The device of claim 17, wherein the graphical user interface is a newsfeed and further comprises one or more status updates generated by the first or one of more of the second users. | In one embodiment, a method includes providing for presentation on a graphical user interface an identification of a user; and providing presence information of the user with the identification of the user. The presence information indicates a temporal, spatial, modal, or social accessibility or availability of user. The presence information includes real-time video of the user captured and is provided as presence information automatically and without user input of the user.1. A method comprising:
by a computing device, providing for presentation on a graphical user interface an identification of a first user; and by the computing device, providing presence information of the first user with the identification of the first user, the presence information indicating a temporal, spatial, modal, or social accessibility or availability of the first user, the presence information comprising real-time video of the first user captured and provided as presence information automatically and without user input of the first user. 2. The method of claim 1, wherein the graphical user interface is a profile page of the first user on a social-networking system. 3. The method of claim 1, further comprising:
providing for presentation on the graphical user interface an identification of one or more second users, the second users having a relationship with the first user based at least in part on social-graph information; and by the computing device, providing presence information of each of the second users with the identification of each of the second users. 4. The method of claim 3, wherein the social graph comprises a plurality of nodes and edges connecting the nodes;
at least one node in the graph corresponds to the first user; and at least one node in the graph corresponds to one of the second users. 5. The method of claim 3, wherein the graphical user interface is a newsfeed and further comprises one or more status updates generated by the first or one of more of the second users. 6. The method of claim 3, wherein the first and second users are members of a group and the graphical user interface is a group page on a social-networking system. 7. The method of claim 3, wherein the graphical user interface further comprises one or more messages generated by the first and one of more of the second users that comprise a real-time online conversation on a social-networking system. 8. The method of claim 1, wherein:
the first user is a business entity; the graphical user interface is a business page on a social-networking system; and the real-time video comprises one or more images corresponding to activity of a geo-location associated with the business entity. 9. One or more computer-readable non-transitory storage media embodying software configured when executed to:
provide for presentation on a graphical user interface an identification of a first user; and provide presence information of the first user with the identification of the first user, the presence information indicating a temporal, spatial, modal, or social accessibility or availability of the first user, the presence information comprising real-time video of the first user captured and provided as presence information automatically and without user input of the first user. 10. The media of claim 9, wherein the graphical user interface is a profile page of the first user on a social-networking system. 11. The media of claim 9, wherein the software is further configured to:
provide for presentation on the graphical user interface an identification of one or more second users, the second users having a relationship with the first user based at least in part on social-graph information; and provide presence information of each of the second users with the identification of each of the second users. 12. The media of claim 11, wherein the social graph comprises a plurality of nodes and edges connecting the nodes;
at least one node in the graph corresponds to the first user; and at least one node in the graph corresponds to one of the second users. 13. The media of claim 11, wherein the graphical user interface is a newsfeed and further comprises one or more status updates generated by the first or one of more of the second users. 14. The media of claim 11, wherein the first and second users are members of a group and the graphical user interface is a group page on a social-networking system. 15. The media of claim 11, wherein the graphical user interface further comprises one or more messages generated by the first and one of more of the second users that comprise a real-time online conversation on a social-networking system. 16. The media of claim 9, wherein:
the first user is a business entity; the graphical user interface is a business page on a social-networking system; and the real-time video comprises one or more images corresponding to activity of a geo-location associated with the business entity. 17. A device comprising:
a processor; and one or more computer-readable non-transitory storage media coupled to the processor and embodying software that:
provide for presentation on a graphical user interface an identification of a first user; and
provide presence information of the first user with the identification of the first user, the presence information indicating a temporal, spatial, modal, or social accessibility or availability of the first user, the presence information comprising real-time video of the first user captured and provided as presence information automatically and without user input of the first user. 18. The device of claim 17, wherein the graphical user interface is a profile page of the first user on a social-networking system. 19. The device of claim 17, wherein the software is further configured to:
provide for presentation on the graphical user interface an identification of one or more second users, the second users having a relationship with the first user based at least in part on social-graph information; and provide presence information of each of the second users with the identification of each of the second users. 20. The device of claim 17, wherein the graphical user interface is a newsfeed and further comprises one or more status updates generated by the first or one of more of the second users. | 2,400 |
7,194 | 7,194 | 15,259,512 | 2,423 | Apparatus and methods for characterizing panoramic content, such as by a wide field of view and large image size. In one implementation, a panoramic image may be mapped to a cube or any other projection e.g icosahedron or octahedron. The disclosure exploits content continuity between facets, such as in the case of encoding/decoding cube-projected images. One facet may be encoded/decoded independently from other facets to obtain a seed facet. One or more transformed versions of the seed facet may be obtained; e.g., one corresponding to a 90 ° counterclockwise rotation, another to a 90 ° clockwise rotation, and one to an 180 ° rotation. Transformed versions may be used to form an augmented image. The remaining facets of the cube may be encoded using transformed versions within the augmented image. Continuity between transformed facets in the top row of the augmented image and facets in the middle row of the augmented image may be utilized for motion or intra prediction, and to obtain greater encoding performance compared to encoding facets independently. | 1.-8. (canceled) 9. A system configured to use an augmented image to improve encoding, the system comprising:
a network interface; one or more processor apparatus; and a storage apparatus in data communication with the one or more processor apparatus and comprising machine readable instructions, the machine readable instructions being configured to, when executed by the one or more processor apparatus, cause the system to:
partition an image, the partitioned image including a first image facet and a second image facet;
encode the first image facet;
transform the encoded first image facet via application of both of a rotation operation and a translation operation in order to produce a transformed encoded first image facet;
combine at least the transformed encoded first image facet with the second image facet to form the augmented image;
encode the second image facet based on the augmented image; and
transmit at least the encoded first image facet and the encoded second image facet to a display device for display. 10. The system of claim 9, wherein the machine readable instructions that cause the system to encode the second image facet based on the augmented image further comprise instructions configured to utilize at least one continuity across a boundary between the transformed encoded first image facet and another encoded image facet of the augmented image. 11. The system of claim 9, further comprising a codec configured to employ raster pixel scan order;
wherein the encoded first image facet is encoded with the codec. 12. The system of claim 9, further comprising a codec that is configured to effectuate motion prediction in top-to-bottom and left-to-right directions; and
wherein the encoded second image facet is encoded with the codec. 13. The system of claim 9, wherein the machine readable instructions that cause the system to partition the image further comprise instructions configured to select facet boundaries such that representation of an object is within the facet boundaries. 14. The system of claim 13, wherein the selection of facet boundaries comprises an adaptive selection using motion information associated with a sensing apparatus that has captured the object. 15.-23. (canceled) 24. A method of using an augmented image to improve encoding, the method comprising:
partitioning an image, the partitioned image comprising a first image portion and a second image portion; encoding the first image portion; transforming the encoded first image portion, the transforming comprising both rotating and translating the encoded first image portion to produce a transformed encoded first image portion; combining the transformed encoded first image portion with the partitioned image to form the augmented image; encoding the second image portion based on the augmented image; and transmitting at least the encoded second image portion to a display device for display. 25. The method of claim 24, further comprising utilizing continuity across a boundary between the transformed encoded first image portion and another encoded image portion of the augmented image. 26. The method of claim 24, further comprising selecting boundaries such that a representation of an object is within the facet boundaries. 27. The method of claim 24, wherein the transforming of the encoded first image portion further comprises one or more of scaling and warping. 28. The method of claim 24, further comprising obtaining the image from virtual reality (VR) content. 29. The method of claim 24, further comprising:
obtaining a subsequent image at a subsequent time; and encoding a subsequent first image portion from the subsequent image, the encoding the subsequent first image portion comprising using information from at least one of the second image portion or a third image portion. 30. A computer-readable storage medium having a plurality of computer instructions stored thereon, the plurality of computer instructions being configured to, when executed by a processor apparatus, cause a device to:
partition an image, the partitioned image including a first image facet and a second image facet; encode the first image facet; transform the encoded first image facet, the transformation comprising both a rotation and a translation of the encoded first image facet to produce a transformed encoded first image facet; combine the transformed encoded first image facet with the partitioned image to form the augmented image; encode the second image facet based on the augmented image; and transmit at least and the encoded second image facet to a display device for display., wherein the transformed encoded first image facet comprises a duplicate version of the encoded first image facet that has been (i) rotated clockwise or counterclockwise and (ii) translated proximate to the second image facet. 31. The computer-readable storage medium of claim 30, wherein the first image facet is encoded independently from other facets to obtain a seed facet. 32. The computer-readable storage medium of claim 31, wherein the transformation of the encoded first image facet is based on at least one known geometric relationship between a first and a second optics module. 33. (canceled) 34. The computer-readable storage medium of claim 30, wherein the transform is selected to provide visual scene continuity across at least one boundary. 35. The computer-readable storage medium of claim 30, wherein the transform is selected to facilitate intra-frame encoding of at least one other facet. 36. The computer-readable storage medium of claim 30, wherein the transform is adaptively selected in accordance with a facet packing configuration. 37. The computer-readable storage medium of claim 30, wherein encoded second image facet is encoded based on motion prediction information from the encoded first facet. 38. The computer-readable storage medium of claim 30, wherein the transformed encoded first image facet is not transmitted to the display device. 39. The computer-readable storage medium of claim 38, wherein a flag indicating a transformation type is transmitted to the display device. 40. The computer-readable storage medium of claim 38, wherein the transformation type is selected to minimize bits or maximize image quality of at least one facet. 41. The system of claim 9, wherein the combination comprises an addition of the transformed encoded first image facet proximate to the second image facet; and
the encoding of the second image facet of the partitioned image is further based on one or more pixels of the transformed encoded first image facet. 42. The system of claim 9, wherein the augmented image is configured to encode an image facet of another image. | Apparatus and methods for characterizing panoramic content, such as by a wide field of view and large image size. In one implementation, a panoramic image may be mapped to a cube or any other projection e.g icosahedron or octahedron. The disclosure exploits content continuity between facets, such as in the case of encoding/decoding cube-projected images. One facet may be encoded/decoded independently from other facets to obtain a seed facet. One or more transformed versions of the seed facet may be obtained; e.g., one corresponding to a 90 ° counterclockwise rotation, another to a 90 ° clockwise rotation, and one to an 180 ° rotation. Transformed versions may be used to form an augmented image. The remaining facets of the cube may be encoded using transformed versions within the augmented image. Continuity between transformed facets in the top row of the augmented image and facets in the middle row of the augmented image may be utilized for motion or intra prediction, and to obtain greater encoding performance compared to encoding facets independently.1.-8. (canceled) 9. A system configured to use an augmented image to improve encoding, the system comprising:
a network interface; one or more processor apparatus; and a storage apparatus in data communication with the one or more processor apparatus and comprising machine readable instructions, the machine readable instructions being configured to, when executed by the one or more processor apparatus, cause the system to:
partition an image, the partitioned image including a first image facet and a second image facet;
encode the first image facet;
transform the encoded first image facet via application of both of a rotation operation and a translation operation in order to produce a transformed encoded first image facet;
combine at least the transformed encoded first image facet with the second image facet to form the augmented image;
encode the second image facet based on the augmented image; and
transmit at least the encoded first image facet and the encoded second image facet to a display device for display. 10. The system of claim 9, wherein the machine readable instructions that cause the system to encode the second image facet based on the augmented image further comprise instructions configured to utilize at least one continuity across a boundary between the transformed encoded first image facet and another encoded image facet of the augmented image. 11. The system of claim 9, further comprising a codec configured to employ raster pixel scan order;
wherein the encoded first image facet is encoded with the codec. 12. The system of claim 9, further comprising a codec that is configured to effectuate motion prediction in top-to-bottom and left-to-right directions; and
wherein the encoded second image facet is encoded with the codec. 13. The system of claim 9, wherein the machine readable instructions that cause the system to partition the image further comprise instructions configured to select facet boundaries such that representation of an object is within the facet boundaries. 14. The system of claim 13, wherein the selection of facet boundaries comprises an adaptive selection using motion information associated with a sensing apparatus that has captured the object. 15.-23. (canceled) 24. A method of using an augmented image to improve encoding, the method comprising:
partitioning an image, the partitioned image comprising a first image portion and a second image portion; encoding the first image portion; transforming the encoded first image portion, the transforming comprising both rotating and translating the encoded first image portion to produce a transformed encoded first image portion; combining the transformed encoded first image portion with the partitioned image to form the augmented image; encoding the second image portion based on the augmented image; and transmitting at least the encoded second image portion to a display device for display. 25. The method of claim 24, further comprising utilizing continuity across a boundary between the transformed encoded first image portion and another encoded image portion of the augmented image. 26. The method of claim 24, further comprising selecting boundaries such that a representation of an object is within the facet boundaries. 27. The method of claim 24, wherein the transforming of the encoded first image portion further comprises one or more of scaling and warping. 28. The method of claim 24, further comprising obtaining the image from virtual reality (VR) content. 29. The method of claim 24, further comprising:
obtaining a subsequent image at a subsequent time; and encoding a subsequent first image portion from the subsequent image, the encoding the subsequent first image portion comprising using information from at least one of the second image portion or a third image portion. 30. A computer-readable storage medium having a plurality of computer instructions stored thereon, the plurality of computer instructions being configured to, when executed by a processor apparatus, cause a device to:
partition an image, the partitioned image including a first image facet and a second image facet; encode the first image facet; transform the encoded first image facet, the transformation comprising both a rotation and a translation of the encoded first image facet to produce a transformed encoded first image facet; combine the transformed encoded first image facet with the partitioned image to form the augmented image; encode the second image facet based on the augmented image; and transmit at least and the encoded second image facet to a display device for display., wherein the transformed encoded first image facet comprises a duplicate version of the encoded first image facet that has been (i) rotated clockwise or counterclockwise and (ii) translated proximate to the second image facet. 31. The computer-readable storage medium of claim 30, wherein the first image facet is encoded independently from other facets to obtain a seed facet. 32. The computer-readable storage medium of claim 31, wherein the transformation of the encoded first image facet is based on at least one known geometric relationship between a first and a second optics module. 33. (canceled) 34. The computer-readable storage medium of claim 30, wherein the transform is selected to provide visual scene continuity across at least one boundary. 35. The computer-readable storage medium of claim 30, wherein the transform is selected to facilitate intra-frame encoding of at least one other facet. 36. The computer-readable storage medium of claim 30, wherein the transform is adaptively selected in accordance with a facet packing configuration. 37. The computer-readable storage medium of claim 30, wherein encoded second image facet is encoded based on motion prediction information from the encoded first facet. 38. The computer-readable storage medium of claim 30, wherein the transformed encoded first image facet is not transmitted to the display device. 39. The computer-readable storage medium of claim 38, wherein a flag indicating a transformation type is transmitted to the display device. 40. The computer-readable storage medium of claim 38, wherein the transformation type is selected to minimize bits or maximize image quality of at least one facet. 41. The system of claim 9, wherein the combination comprises an addition of the transformed encoded first image facet proximate to the second image facet; and
the encoding of the second image facet of the partitioned image is further based on one or more pixels of the transformed encoded first image facet. 42. The system of claim 9, wherein the augmented image is configured to encode an image facet of another image. | 2,400 |
7,195 | 7,195 | 13,397,493 | 2,467 | Certain aspects of the present disclosure provide techniques and apparatus for managing transmit power in a television white space (TVWS) network. By managing transmit power as described herein, medium re-use may be improved in such a network, and unfair usage problems may be alleviated. One example method generally includes receiving a request message comprising an indication of a modulation and coding scheme (MCS) for transmitting data frames to be received, determining a link margin based on the MCS, and transmitting a response message with an indication of the link margin. Another example method generally includes determining a MCS for transmitting data frames and transmitting a request message comprising an indication of the MCS. | 1. An apparatus for wireless communications, comprising:
a processing system configured to determine a modulation and coding scheme (MCS) for transmitting data frames from the apparatus; and a transmitter configured to transmit a request message comprising an indication of the MCS. 2. The apparatus of claim 1, wherein the indication of the MCS comprises an information element (IE) in the request message. 3. The apparatus of claim 1, further comprising a receiver configured to receive a response message comprising an indication of a link margin, wherein the link margin is based on the MCS. 4. The apparatus of claim 3, wherein the transmitter is configured to transmit data using the MCS and a transmit power based on the link margin. 5. The apparatus of claim 1, wherein the transmitter is configured to transmit the request message via one or more channels in a television white space (TVWS). 6. A method for wireless communications, comprising:
determining a modulation and coding scheme (MCS) for transmitting data frames; and transmitting a request message comprising an indication of the MCS. 7. The method of claim 6, wherein the indication of the MCS comprises an information element (IE) in the request message. 8. The method of claim 6, further comprising receiving a response message comprising an indication of a link margin, wherein the link margin is based on the MCS. 9. The method of claim 8, further comprising transmitting transmit data using the MCS and a transmit power based on the link margin. 10. The method of claim 6, wherein transmitting the request message comprises transmitting the request message via one or more channels in a television white space (TVWS). 11. An apparatus for wireless communications, comprising:
means for determining a modulation and coding scheme (MCS) for transmitting data frames from the apparatus; and means for transmitting a request message comprising an indication of the MCS. 12-15. (canceled) 16. A computer-program product for wireless communications, comprising a computer-readable medium comprising instructions executable to:
determine a modulation and coding scheme (MCS) for transmitting data frames from an apparatus; and transmit a request message comprising an indication of the MCS. 17. A wireless node, comprising:
at least one antenna; a processing system configured to determine a modulation and coding scheme (MCS) for transmitting data frames from the wireless node; and a transmitter configured to transmit, via the at least one antenna, a request message comprising an indication of the MCS. 18. An apparatus for wireless communications, comprising:
a receiver configured to receive a request message comprising an indication of a modulation and coding scheme (MCS) for transmitting data frames to be received; a processing system configured to determine a link margin based on the MCS; and a transmitter configured to transmit a response message with an indication of the link margin. 19. The apparatus of claim 18, wherein the indication of the MCS comprises an information element (IE) in the request message. 20. The apparatus of claim 18, wherein the processing system is configured to determine a signal-to-interference-plus-noise ratio (SINR) and a path loss, wherein the link margin is based on the MCS, the SINR, and the path loss. 21. The apparatus of claim 18, wherein the processing system is configured to:
determine a received power associated with the request message; determine a power margin based on the received power associated with the request message; and adjust the power margin by a factor to obtain the link margin. 22. The apparatus of claim 21, wherein the factor is a tolerable interference factor. 23. The apparatus of claim 18, wherein the transmitter is configured to transmit the response message via one or more channels in a television white space (TVWS). 24. A method for wireless communications, comprising:
receiving a request message comprising an indication of a modulation and coding scheme (MCS) for transmitting data frames to be received; determining a link margin based on the MCS; and transmitting a response message with an indication of the link margin. 25. The method of claim 24, wherein the indication of the MCS comprises an information element (IE) in the request message. 26. The method of claim 24, further comprising determining a signal-to-interference-plus-noise ratio (SINR) and a path loss, wherein the link margin is based on the MCS, the SINR, and the path loss. 27. The method of claim 24, further comprising:
determining a received power associated with the request message; determining a power margin based on the received power associated with the request message; and adjusting the power margin by a factor to obtain the link margin. 28. The method of claim 27, wherein the factor is a tolerable interference factor. 29. The method of claim 24, wherein transmitting the response message comprises transmitting the response message via one or more channels in a television white space (TVWS). 30. An apparatus for wireless communications, comprising:
means for receiving a request message comprising an indication of a modulation and coding scheme (MCS) for transmitting data frames to be received; means for determining a link margin based on the MCS; and means for transmitting a response message with an indication of the link margin. 31-35. (canceled) 36. A computer-program product for wireless communications, comprising a computer-readable medium comprising instructions executable to:
receive a request message comprising an indication of a modulation and coding scheme (MCS) for transmitting data frames to be received; determine a link margin based on the MCS; and transmit a response message with an indication of the link margin. 37. A wireless node, comprising:
at least one antenna; a receiver configured to receive, via the at least one antenna, a request message comprising an indication of a modulation and coding scheme (MCS) for transmitting data frames to be received; a processing system configured to determine a link margin based on the MCS; and a transmitter configured to transmit, via the at least one antenna, a response message with an indication of the link margin. | Certain aspects of the present disclosure provide techniques and apparatus for managing transmit power in a television white space (TVWS) network. By managing transmit power as described herein, medium re-use may be improved in such a network, and unfair usage problems may be alleviated. One example method generally includes receiving a request message comprising an indication of a modulation and coding scheme (MCS) for transmitting data frames to be received, determining a link margin based on the MCS, and transmitting a response message with an indication of the link margin. Another example method generally includes determining a MCS for transmitting data frames and transmitting a request message comprising an indication of the MCS.1. An apparatus for wireless communications, comprising:
a processing system configured to determine a modulation and coding scheme (MCS) for transmitting data frames from the apparatus; and a transmitter configured to transmit a request message comprising an indication of the MCS. 2. The apparatus of claim 1, wherein the indication of the MCS comprises an information element (IE) in the request message. 3. The apparatus of claim 1, further comprising a receiver configured to receive a response message comprising an indication of a link margin, wherein the link margin is based on the MCS. 4. The apparatus of claim 3, wherein the transmitter is configured to transmit data using the MCS and a transmit power based on the link margin. 5. The apparatus of claim 1, wherein the transmitter is configured to transmit the request message via one or more channels in a television white space (TVWS). 6. A method for wireless communications, comprising:
determining a modulation and coding scheme (MCS) for transmitting data frames; and transmitting a request message comprising an indication of the MCS. 7. The method of claim 6, wherein the indication of the MCS comprises an information element (IE) in the request message. 8. The method of claim 6, further comprising receiving a response message comprising an indication of a link margin, wherein the link margin is based on the MCS. 9. The method of claim 8, further comprising transmitting transmit data using the MCS and a transmit power based on the link margin. 10. The method of claim 6, wherein transmitting the request message comprises transmitting the request message via one or more channels in a television white space (TVWS). 11. An apparatus for wireless communications, comprising:
means for determining a modulation and coding scheme (MCS) for transmitting data frames from the apparatus; and means for transmitting a request message comprising an indication of the MCS. 12-15. (canceled) 16. A computer-program product for wireless communications, comprising a computer-readable medium comprising instructions executable to:
determine a modulation and coding scheme (MCS) for transmitting data frames from an apparatus; and transmit a request message comprising an indication of the MCS. 17. A wireless node, comprising:
at least one antenna; a processing system configured to determine a modulation and coding scheme (MCS) for transmitting data frames from the wireless node; and a transmitter configured to transmit, via the at least one antenna, a request message comprising an indication of the MCS. 18. An apparatus for wireless communications, comprising:
a receiver configured to receive a request message comprising an indication of a modulation and coding scheme (MCS) for transmitting data frames to be received; a processing system configured to determine a link margin based on the MCS; and a transmitter configured to transmit a response message with an indication of the link margin. 19. The apparatus of claim 18, wherein the indication of the MCS comprises an information element (IE) in the request message. 20. The apparatus of claim 18, wherein the processing system is configured to determine a signal-to-interference-plus-noise ratio (SINR) and a path loss, wherein the link margin is based on the MCS, the SINR, and the path loss. 21. The apparatus of claim 18, wherein the processing system is configured to:
determine a received power associated with the request message; determine a power margin based on the received power associated with the request message; and adjust the power margin by a factor to obtain the link margin. 22. The apparatus of claim 21, wherein the factor is a tolerable interference factor. 23. The apparatus of claim 18, wherein the transmitter is configured to transmit the response message via one or more channels in a television white space (TVWS). 24. A method for wireless communications, comprising:
receiving a request message comprising an indication of a modulation and coding scheme (MCS) for transmitting data frames to be received; determining a link margin based on the MCS; and transmitting a response message with an indication of the link margin. 25. The method of claim 24, wherein the indication of the MCS comprises an information element (IE) in the request message. 26. The method of claim 24, further comprising determining a signal-to-interference-plus-noise ratio (SINR) and a path loss, wherein the link margin is based on the MCS, the SINR, and the path loss. 27. The method of claim 24, further comprising:
determining a received power associated with the request message; determining a power margin based on the received power associated with the request message; and adjusting the power margin by a factor to obtain the link margin. 28. The method of claim 27, wherein the factor is a tolerable interference factor. 29. The method of claim 24, wherein transmitting the response message comprises transmitting the response message via one or more channels in a television white space (TVWS). 30. An apparatus for wireless communications, comprising:
means for receiving a request message comprising an indication of a modulation and coding scheme (MCS) for transmitting data frames to be received; means for determining a link margin based on the MCS; and means for transmitting a response message with an indication of the link margin. 31-35. (canceled) 36. A computer-program product for wireless communications, comprising a computer-readable medium comprising instructions executable to:
receive a request message comprising an indication of a modulation and coding scheme (MCS) for transmitting data frames to be received; determine a link margin based on the MCS; and transmit a response message with an indication of the link margin. 37. A wireless node, comprising:
at least one antenna; a receiver configured to receive, via the at least one antenna, a request message comprising an indication of a modulation and coding scheme (MCS) for transmitting data frames to be received; a processing system configured to determine a link margin based on the MCS; and a transmitter configured to transmit, via the at least one antenna, a response message with an indication of the link margin. | 2,400 |
7,196 | 7,196 | 15,341,572 | 2,419 | A system and method are disclosed for providing internet access to residents of a controlled-environment facility. There are significant dangers associated with provide such residents with Internet access due to their criminal history. However, through the generation, updating and application of strict browsing restrictions, as well as the authentication of multiple forms of identifying information, Internet access can be provided to those residents safely and securely. | 1. A system comprising:
an inmate profile database comprising an inmate information database, an internet profile database, an internet filter category database, and an internet access log database; an input device configured to receive login information from an inmate residing in a controlled environment facility; an authentication subsystem configured to verify an identity of the inmate based on the received login information; an internet profile generator configured to:
retrieve, from the inmate information database, inmate information associated with the inmate, wherein the inmate information includes a criminal report detailing crimes committed by the inmate,
automatically generate an inmate internet profile that includes internet content categories permitted or prohibited for the inmate based directly on the inmate information, and
store the inmate internet profile in the internet profile database; and
an internet content filtering subsystem configured to:
receive a request to view a website from the inmate,
determine one or more content categories of the requested website from the internet filter category database, and
permit internet access to the requested website using the one or more content categories of the requested website and a full inmate filter profile, wherein the full inmate filter profile is a logical combination of the internet content categories of the inmate internet profile and a global internet profile providing internet restrictions applicable to all inmates of the controlled environment facility. 2. The system of claim 1, wherein the login information includes biometric information or radio frequency identification (RFID) information. 3. The system of claim 2, wherein the authentication subsystem is further configured to calculate a statistical comparison between the received biometric information and previously-stored biometric information. 4. The system of claim 1, wherein the inmate information further includes biometric measurements of the inmate. 5. (canceled) 6. (canceled) 7. The system of claim 1, further comprising:
one or more surveillance devices configured to monitor an area local to the input device and to provide one or more still images or a video sequence of the area; and a remote monitoring processor coupled to the one or more surveillance devices, wherein the remote monitoring processor disconnects the internet access to the requested website upon detection that the inmate is not visible in the one or more still images or the video sequence. 8. The system of claim 1, further comprising:
one or more surveillance devices configured to monitor an area local to the input device and to provide one or more still images or a video sequence of the area; and a remote monitoring processor coupled to the one or more surveillance devices, wherein the remote monitoring processor disconnects the internet access to the requested website upon detection that two or more inmates are visible in the one or more still images or the video sequence. 9. The system of claim 1, wherein the inmate internet profile includes one or more of a black list or a white list, wherein the black list is a list of prohibited internet content categories, and wherein the white list is a list of allowed internet content categories, and
wherein the internet content filtering subsystem is further configured to provide the inmate with the internet access to the requested website based on one or more of the black list or the white list, and based on the determination of the one or more content categories of the requested website. 10. The system of claim 1, wherein the internet content filtering subsystem is further configured to:
determine from the internet filter category database that the requested website is an uncategorized website; search of the uncategorized website for problematic content based on the inmate internet profile; and provide the inmate with internet access to the uncategorized website based on the search of the uncategorized website for problematic content based on the inmate internet profile. 11. A method comprising:
receiving a purported identity of an inmate together with identifying information of the inmate during an internet browsing session, the inmate being a resident of a controlled environment facility; authenticating the identifying information against previously-stored information associated with the purported identity;
retrieving, from an inmate information database, inmate information associated with the inmate, wherein the inmate information includes a criminal report detailing crimes committed by the inmate;
automatically generating an inmate internet profile based directly on the inmate information, the inmate internet profile including internet content categories permitted or prohibited for the inmate;
storing the inmate internet profile in an internet profile database;
receiving a request to view a website from the inmate;
determining one or more content categories of the requested website from an internet filter category database; and
permitting internet access to the requested website based on the one or more content categories of the requested website and a full inmate filter profile, wherein the full inmate filter profile is a logical combination of the internet content categories of the inmate internet profile and a global internet profile providing internet restrictions applicable to all inmates of the controlled environment facility,
wherein the authenticating, the automatically generating, the determining, and the permitting are performed by one or more processing devices. 12. (canceled) 13. The method of claim 11, further comprising:
obtaining, at regular intervals during the internet browsing session, secondary information of the inmate, wherein the secondary information of the inmate is biometric information of the inmate or radio frequency identification (RFID) information of the inmate; and authenticating each of the obtained secondary information against previously-stored secondary information of the inmate. 14. The method of claim 13, further comprising:
terminating the internet browsing session in response to any of the obtained secondary information not being authenticated. 15. (canceled) 16. The method of claim 11, wherein the automatically generating the inmate internet profile further includes browsing restrictions relating to each of the internet content categories. 17. The method of claim 11,
wherein the automatically generating the inmate internet profile further includes using one or more of a black list or a white list, wherein the black list is a list of prohibited internet content categories, and wherein the white list is a list of allowed internet content categories, and permitting the internet access to the requested website for the inmate further includes using one or more of the black list or the white list, and the determining of the one or more content categories of the requested website. 18. The method of claim 11, further comprising:
determining from the internet filter category database that the requested website is an uncategorized website; searching the uncategorized website for problematic content based on the inmate internet profile; and providing, to the inmate, internet access to the uncategorized website based on the search of the uncategorized website for problematic contents based on the inmate internet profile. 19. The method of claim 11, further comprising:
monitoring, by one or more surveillance devices, an area local to the inmate; providing one or more still images or a video sequence of the area; detecting that the inmate is not visible in the one or more still images or the video sequence of the area; and disconnecting the internet access to the requested website upon detection that the inmate is not visible in the one or more still images or the video sequence. 20. The method of claim 11, further comprising:
monitoring, by one or more surveillance devices, an area local to the inmate; providing one or more still images or a video sequence of the area; detecting that two or more inmates are visible in the one or more still images or the video sequence; and disconnecting the internet access to the requested website upon detection that two or more inmates are visible in the one or more still images or the video sequence. 21. The system of claim 1, wherein the internet content filtering subsystem is further configured to block an image within the requested website without blocking text within the requested website. 22. The system of claim 1, wherein the internet access log database is configured to store a search history of the inmate. 23. The system of claim 1, wherein the internet access log database is configured to store a number of failed attempts to access the requested website by the inmate. 24. The system of claim 1, wherein the internet access log database is configured to store a number of attempts by the inmate to bypass security features. 25. The system of claim 1, wherein the inmate information is downloaded from a jail management system of the controlled environment. 26. The system of claim 1, wherein the internet content filtering subsystem is further configured to determine the one or more content categories of the requested website by including input from an administrator. 27. The system of claim 1, wherein the internet profile database is configured to be edited by an administrator. 28. The method of claim 11, further comprising:
blocking an image within the website without blocking text within the website. 29. The method of claim 11, further comprising:
storing a search history of the inmate in an internet access log database. 30. The method of claim 11, further comprising:
storing a number of failed attempts to access the requested website by the inmate in the internet access log database. 31. The method of claim 11, further comprising:
storing a number of attempts by the inmate to bypass security features in the internet access log database. 32. The method of claim 11, further comprising:
downloading the inmate information from a jail management system of the controlled environment facility. 33. The method of claim 11, further comprising:
receiving input from an administrator, and wherein determining one or more content categories of the requested website from an internet filter category database further includes using the received input from the administrator. 34. The method of claim 11, further comprising:
editing the internet profile database using input by an administrator. | A system and method are disclosed for providing internet access to residents of a controlled-environment facility. There are significant dangers associated with provide such residents with Internet access due to their criminal history. However, through the generation, updating and application of strict browsing restrictions, as well as the authentication of multiple forms of identifying information, Internet access can be provided to those residents safely and securely.1. A system comprising:
an inmate profile database comprising an inmate information database, an internet profile database, an internet filter category database, and an internet access log database; an input device configured to receive login information from an inmate residing in a controlled environment facility; an authentication subsystem configured to verify an identity of the inmate based on the received login information; an internet profile generator configured to:
retrieve, from the inmate information database, inmate information associated with the inmate, wherein the inmate information includes a criminal report detailing crimes committed by the inmate,
automatically generate an inmate internet profile that includes internet content categories permitted or prohibited for the inmate based directly on the inmate information, and
store the inmate internet profile in the internet profile database; and
an internet content filtering subsystem configured to:
receive a request to view a website from the inmate,
determine one or more content categories of the requested website from the internet filter category database, and
permit internet access to the requested website using the one or more content categories of the requested website and a full inmate filter profile, wherein the full inmate filter profile is a logical combination of the internet content categories of the inmate internet profile and a global internet profile providing internet restrictions applicable to all inmates of the controlled environment facility. 2. The system of claim 1, wherein the login information includes biometric information or radio frequency identification (RFID) information. 3. The system of claim 2, wherein the authentication subsystem is further configured to calculate a statistical comparison between the received biometric information and previously-stored biometric information. 4. The system of claim 1, wherein the inmate information further includes biometric measurements of the inmate. 5. (canceled) 6. (canceled) 7. The system of claim 1, further comprising:
one or more surveillance devices configured to monitor an area local to the input device and to provide one or more still images or a video sequence of the area; and a remote monitoring processor coupled to the one or more surveillance devices, wherein the remote monitoring processor disconnects the internet access to the requested website upon detection that the inmate is not visible in the one or more still images or the video sequence. 8. The system of claim 1, further comprising:
one or more surveillance devices configured to monitor an area local to the input device and to provide one or more still images or a video sequence of the area; and a remote monitoring processor coupled to the one or more surveillance devices, wherein the remote monitoring processor disconnects the internet access to the requested website upon detection that two or more inmates are visible in the one or more still images or the video sequence. 9. The system of claim 1, wherein the inmate internet profile includes one or more of a black list or a white list, wherein the black list is a list of prohibited internet content categories, and wherein the white list is a list of allowed internet content categories, and
wherein the internet content filtering subsystem is further configured to provide the inmate with the internet access to the requested website based on one or more of the black list or the white list, and based on the determination of the one or more content categories of the requested website. 10. The system of claim 1, wherein the internet content filtering subsystem is further configured to:
determine from the internet filter category database that the requested website is an uncategorized website; search of the uncategorized website for problematic content based on the inmate internet profile; and provide the inmate with internet access to the uncategorized website based on the search of the uncategorized website for problematic content based on the inmate internet profile. 11. A method comprising:
receiving a purported identity of an inmate together with identifying information of the inmate during an internet browsing session, the inmate being a resident of a controlled environment facility; authenticating the identifying information against previously-stored information associated with the purported identity;
retrieving, from an inmate information database, inmate information associated with the inmate, wherein the inmate information includes a criminal report detailing crimes committed by the inmate;
automatically generating an inmate internet profile based directly on the inmate information, the inmate internet profile including internet content categories permitted or prohibited for the inmate;
storing the inmate internet profile in an internet profile database;
receiving a request to view a website from the inmate;
determining one or more content categories of the requested website from an internet filter category database; and
permitting internet access to the requested website based on the one or more content categories of the requested website and a full inmate filter profile, wherein the full inmate filter profile is a logical combination of the internet content categories of the inmate internet profile and a global internet profile providing internet restrictions applicable to all inmates of the controlled environment facility,
wherein the authenticating, the automatically generating, the determining, and the permitting are performed by one or more processing devices. 12. (canceled) 13. The method of claim 11, further comprising:
obtaining, at regular intervals during the internet browsing session, secondary information of the inmate, wherein the secondary information of the inmate is biometric information of the inmate or radio frequency identification (RFID) information of the inmate; and authenticating each of the obtained secondary information against previously-stored secondary information of the inmate. 14. The method of claim 13, further comprising:
terminating the internet browsing session in response to any of the obtained secondary information not being authenticated. 15. (canceled) 16. The method of claim 11, wherein the automatically generating the inmate internet profile further includes browsing restrictions relating to each of the internet content categories. 17. The method of claim 11,
wherein the automatically generating the inmate internet profile further includes using one or more of a black list or a white list, wherein the black list is a list of prohibited internet content categories, and wherein the white list is a list of allowed internet content categories, and permitting the internet access to the requested website for the inmate further includes using one or more of the black list or the white list, and the determining of the one or more content categories of the requested website. 18. The method of claim 11, further comprising:
determining from the internet filter category database that the requested website is an uncategorized website; searching the uncategorized website for problematic content based on the inmate internet profile; and providing, to the inmate, internet access to the uncategorized website based on the search of the uncategorized website for problematic contents based on the inmate internet profile. 19. The method of claim 11, further comprising:
monitoring, by one or more surveillance devices, an area local to the inmate; providing one or more still images or a video sequence of the area; detecting that the inmate is not visible in the one or more still images or the video sequence of the area; and disconnecting the internet access to the requested website upon detection that the inmate is not visible in the one or more still images or the video sequence. 20. The method of claim 11, further comprising:
monitoring, by one or more surveillance devices, an area local to the inmate; providing one or more still images or a video sequence of the area; detecting that two or more inmates are visible in the one or more still images or the video sequence; and disconnecting the internet access to the requested website upon detection that two or more inmates are visible in the one or more still images or the video sequence. 21. The system of claim 1, wherein the internet content filtering subsystem is further configured to block an image within the requested website without blocking text within the requested website. 22. The system of claim 1, wherein the internet access log database is configured to store a search history of the inmate. 23. The system of claim 1, wherein the internet access log database is configured to store a number of failed attempts to access the requested website by the inmate. 24. The system of claim 1, wherein the internet access log database is configured to store a number of attempts by the inmate to bypass security features. 25. The system of claim 1, wherein the inmate information is downloaded from a jail management system of the controlled environment. 26. The system of claim 1, wherein the internet content filtering subsystem is further configured to determine the one or more content categories of the requested website by including input from an administrator. 27. The system of claim 1, wherein the internet profile database is configured to be edited by an administrator. 28. The method of claim 11, further comprising:
blocking an image within the website without blocking text within the website. 29. The method of claim 11, further comprising:
storing a search history of the inmate in an internet access log database. 30. The method of claim 11, further comprising:
storing a number of failed attempts to access the requested website by the inmate in the internet access log database. 31. The method of claim 11, further comprising:
storing a number of attempts by the inmate to bypass security features in the internet access log database. 32. The method of claim 11, further comprising:
downloading the inmate information from a jail management system of the controlled environment facility. 33. The method of claim 11, further comprising:
receiving input from an administrator, and wherein determining one or more content categories of the requested website from an internet filter category database further includes using the received input from the administrator. 34. The method of claim 11, further comprising:
editing the internet profile database using input by an administrator. | 2,400 |
7,197 | 7,197 | 14,689,339 | 2,483 | A vehicle camera enclosure for enclosing a vehicle camera includes a housing having an inner edge defining an opening and a cover extending across the opening. The cover is outwardly rotatable away from the inner edge from a closed position to an open position. | 1. A vehicle camera enclosure for enclosing a vehicle camera comprising:
a housing including an inner edge defining an opening; and a cover extending across the opening, the cover outwardly rotatable away from the inner edge from a closed position to an open position. 2. The vehicle camera enclosure of claim 1, wherein the cover is biased towards the closed position. 3. The vehicle camera enclosure of claim 1, wherein the cover including two or more flaps. 4. The vehicle camera enclosure of claim 3, wherein each flap is rotatable about the inner edge from a closed position to an open position. 5. The vehicle camera enclosure of claim 3, wherein each flap is biased towards the closed position. 6. The vehicle camera enclosure of claim 3, wherein adjacent flaps contact each other. 7. The vehicle camera enclosure of claim 1, wherein the cover is rotatable about an axis tangential the inner edge from the closed to the open positions. 8. A vehicle camera enclosure for enclosing a vehicle camera comprising:
a housing including an inner edge defining an opening; and a cover extending across the opening and including inner and outer layers of different opaque materials. 9. The vehicle camera enclosure of claim 8, wherein the inner layer is formed of a fiber material. 10. The vehicle camera enclosure of claim 9, wherein the vehicle camera is translatable between inward and outward positions, the vehicle camera has a lens, and the fiber material contacts the vehicle camera lens while the vehicle camera translates from the inward position to the outward position. 11. The vehicle camera enclosure of claim 9, wherein the inner layer faces the vehicle camera lens. 12. The vehicle camera enclosure of claim 9, wherein the fiber material is Kevlar™ or nylon. 13. The vehicle camera enclosure of claim 8, wherein the outer layer is formed of a rigid polymer material. 14. The vehicle camera enclosure of claim 13, wherein the rigid polymer material is polyethylene or polypropylene. 15. A vehicle camera system comprising:
a camera translatable between inward and outward positions; and an enclosure at least partially enclosing the camera and having an opening and a cover extending across the opening, the cover having closed and open positions. 16. The vehicle camera system of claim 15, wherein the opening is bounded by an opening edge and the cover is mounted to the opening edge. 17. The vehicle camera system of claim 16, wherein the cover rotates outward when the camera translates between the inward and outward positions. 18. The vehicle camera system of claim 16, wherein the cover includes two or more flaps, each flap rotates outward when the camera translates between the inward and outward positions. 19. The vehicle camera system of claim 15, wherein the cover is in the closed position when the camera is in the inward position. 20. The vehicle camera system of claim 15, wherein the cover is in the open position when the camera is in the outward position. | A vehicle camera enclosure for enclosing a vehicle camera includes a housing having an inner edge defining an opening and a cover extending across the opening. The cover is outwardly rotatable away from the inner edge from a closed position to an open position.1. A vehicle camera enclosure for enclosing a vehicle camera comprising:
a housing including an inner edge defining an opening; and a cover extending across the opening, the cover outwardly rotatable away from the inner edge from a closed position to an open position. 2. The vehicle camera enclosure of claim 1, wherein the cover is biased towards the closed position. 3. The vehicle camera enclosure of claim 1, wherein the cover including two or more flaps. 4. The vehicle camera enclosure of claim 3, wherein each flap is rotatable about the inner edge from a closed position to an open position. 5. The vehicle camera enclosure of claim 3, wherein each flap is biased towards the closed position. 6. The vehicle camera enclosure of claim 3, wherein adjacent flaps contact each other. 7. The vehicle camera enclosure of claim 1, wherein the cover is rotatable about an axis tangential the inner edge from the closed to the open positions. 8. A vehicle camera enclosure for enclosing a vehicle camera comprising:
a housing including an inner edge defining an opening; and a cover extending across the opening and including inner and outer layers of different opaque materials. 9. The vehicle camera enclosure of claim 8, wherein the inner layer is formed of a fiber material. 10. The vehicle camera enclosure of claim 9, wherein the vehicle camera is translatable between inward and outward positions, the vehicle camera has a lens, and the fiber material contacts the vehicle camera lens while the vehicle camera translates from the inward position to the outward position. 11. The vehicle camera enclosure of claim 9, wherein the inner layer faces the vehicle camera lens. 12. The vehicle camera enclosure of claim 9, wherein the fiber material is Kevlar™ or nylon. 13. The vehicle camera enclosure of claim 8, wherein the outer layer is formed of a rigid polymer material. 14. The vehicle camera enclosure of claim 13, wherein the rigid polymer material is polyethylene or polypropylene. 15. A vehicle camera system comprising:
a camera translatable between inward and outward positions; and an enclosure at least partially enclosing the camera and having an opening and a cover extending across the opening, the cover having closed and open positions. 16. The vehicle camera system of claim 15, wherein the opening is bounded by an opening edge and the cover is mounted to the opening edge. 17. The vehicle camera system of claim 16, wherein the cover rotates outward when the camera translates between the inward and outward positions. 18. The vehicle camera system of claim 16, wherein the cover includes two or more flaps, each flap rotates outward when the camera translates between the inward and outward positions. 19. The vehicle camera system of claim 15, wherein the cover is in the closed position when the camera is in the inward position. 20. The vehicle camera system of claim 15, wherein the cover is in the open position when the camera is in the outward position. | 2,400 |
7,198 | 7,198 | 15,496,706 | 2,463 | A method in a user equipment for deciding whether to send an uplink transmission to a radio access network node is provided. The user equipment and radio access network node are comprised in a communications network. The user equipment is configured with Discontinuous Reception (DRX), wherein the user equipment is in active time or not in active time. The user equipment decides whether to send the uplink transmission at a transmission time t, based on the DRX status of the user equipment at a predefined earlier time instance relative to the transmission time t. | 1. A method in a user equipment configured to operate with Discontinuous Reception (DRX) in a radio access network, wherein a corresponding DRX status of the user equipment is either active or inactive, the method comprising:
deciding whether to send an uplink transmission for a radio access network node at a transmission time t, based on the DRX status of the user equipment at a predefined earlier time instance relative to the transmission time t. 2. The method of claim 1, wherein the uplink transmission comprises at least one of periodic uplink control signaling and transmission of a sounding reference signal. 3. The method of claim 2, wherein the periodic uplink control signaling comprises Channel State Information (CSI) comprising all of or any subsets of Channel Quality Indication (CQI), Precoding Matrix Indicator (PMI), Rank Indication (RI), and Precoder Type Indicator (PTI). 4. The method of claim 2, further comprising:
deciding a format to use for sending other uplink control signaling together with the periodic uplink control signaling, based on the DRX status of the user equipment at the predefined earlier time instance relative to the transmission time t. 5. The method of claim 4, wherein the other uplink control signaling comprises at least one of Hybrid Automatic Repeat ReQuest (HARQ) feedback and Acknowledgement/Not acknowledgement (A/N) feedback. 6. The method of claim 1, wherein the uplink transmission comprises a sounding reference signal transmission and wherein the method further comprises deciding whether to puncture an uplink data transmission coinciding with the transmission time t with the sounding reference signal transmission, based on the DRX status of the user equipment at the predefined earlier time instance relative to the transmission time t. 7. The method of claim 6, wherein the uplink data transmission is to be sent on a Physical Uplink Shared Channel (PUSCH). 8. The method of claim 6, wherein, when the decision is made to puncture the uplink data transmission with the sounding reference signal transmission, the method includes puncturing a last symbol of the uplink data. 9. The method of claim 1, wherein the method further comprises deciding whether to send the uplink transmission in further dependence on whether another uplink transmission from the user equipment coincides with the transmission time t. 10. The method of claim 1, further comprising deciding to base the transmission decision at the transmission time t on the DRX status of the user equipment at the predefined earlier time instance in dependence on there having been a change in an active time of the user equipment for DRX operation, due to radio access network node signaling or radio access network node data transmission to the user equipment. 11. A user equipment configured for operation in a radio access network and comprising: radio circuitry configured for communicating with the radio access network; and
a processing circuit operatively associated with the radio circuitry and configured to:
operate the user equipment in a Discontinuous Reception (DRX) configuration, wherein a corresponding DRX status of the user equipment is either active or inactive; and
decide whether to send an uplink transmission for a radio access network node at a transmission time t, based on the DRX status of the user equipment at a predefined earlier time instance relative to the transmission time t. 12. The user equipment of claim 11, wherein the uplink transmission comprises at least one of a periodic uplink control signaling and transmission of a sounding reference signal. 13. The user equipment of claim 12, wherein the periodic uplink control signaling comprises Channel State Information (CSI), comprising all of or any subsets of Channel Quality Indication (CQI), Precoding Matrix Indicator (PMI), Rank Indication (RI), and Precoder Type Indicator (PTI). 14. The user equipment of claim 12, wherein the processing circuit is configured to decide a format to use for sending other uplink control signaling together with the periodic uplink control signaling, based on the DRX status of the user equipment at the predefined earlier time instance relative to the transmission time t. 15. The user equipment of claim 14, wherein the other uplink control signaling comprises at least one of Hybrid Automatic Repeat ReQuest (HARQ) feedback and Acknowledgement/Not acknowledgement (A/N) feedback. 16. The user equipment of claim 11 wherein the uplink transmission comprises a sounding reference signal transmission and wherein the processing circuitry is configured to decide whether to puncture an uplink data transmission coinciding with the transmission time t with the sounding reference signal transmission, based on the DRX status of the user equipment at the predefined earlier time instance relative to the transmission time t. 17. The user equipment of claim 16, wherein the uplink data transmission is to be sent on a Physical Uplink Shared Channel (PUSCH). 18. The user equipment of claim 16, wherein, when the processing circuit decides to puncture the uplink data transmission, the processing circuit is configured to puncture a last symbol of the uplink data transmission with the sounding reference signal transmission. 19. The user equipment of claim 11, wherein the processing circuit is configured to decide whether to send the uplink transmission in further dependence on whether another uplink transmission from the user equipment coincides with the transmission time t. 20. The user equipment of claim 11, wherein the processing circuitry is configured to decide to base the transmission decision at the transmission time t on the DRX status of the user equipment at the predefined earlier time instance in dependence on there having been a change in an active time of the user equipment for DRX operation, due to radio access network node signaling or radio access network node data transmission to the user equipment. | A method in a user equipment for deciding whether to send an uplink transmission to a radio access network node is provided. The user equipment and radio access network node are comprised in a communications network. The user equipment is configured with Discontinuous Reception (DRX), wherein the user equipment is in active time or not in active time. The user equipment decides whether to send the uplink transmission at a transmission time t, based on the DRX status of the user equipment at a predefined earlier time instance relative to the transmission time t.1. A method in a user equipment configured to operate with Discontinuous Reception (DRX) in a radio access network, wherein a corresponding DRX status of the user equipment is either active or inactive, the method comprising:
deciding whether to send an uplink transmission for a radio access network node at a transmission time t, based on the DRX status of the user equipment at a predefined earlier time instance relative to the transmission time t. 2. The method of claim 1, wherein the uplink transmission comprises at least one of periodic uplink control signaling and transmission of a sounding reference signal. 3. The method of claim 2, wherein the periodic uplink control signaling comprises Channel State Information (CSI) comprising all of or any subsets of Channel Quality Indication (CQI), Precoding Matrix Indicator (PMI), Rank Indication (RI), and Precoder Type Indicator (PTI). 4. The method of claim 2, further comprising:
deciding a format to use for sending other uplink control signaling together with the periodic uplink control signaling, based on the DRX status of the user equipment at the predefined earlier time instance relative to the transmission time t. 5. The method of claim 4, wherein the other uplink control signaling comprises at least one of Hybrid Automatic Repeat ReQuest (HARQ) feedback and Acknowledgement/Not acknowledgement (A/N) feedback. 6. The method of claim 1, wherein the uplink transmission comprises a sounding reference signal transmission and wherein the method further comprises deciding whether to puncture an uplink data transmission coinciding with the transmission time t with the sounding reference signal transmission, based on the DRX status of the user equipment at the predefined earlier time instance relative to the transmission time t. 7. The method of claim 6, wherein the uplink data transmission is to be sent on a Physical Uplink Shared Channel (PUSCH). 8. The method of claim 6, wherein, when the decision is made to puncture the uplink data transmission with the sounding reference signal transmission, the method includes puncturing a last symbol of the uplink data. 9. The method of claim 1, wherein the method further comprises deciding whether to send the uplink transmission in further dependence on whether another uplink transmission from the user equipment coincides with the transmission time t. 10. The method of claim 1, further comprising deciding to base the transmission decision at the transmission time t on the DRX status of the user equipment at the predefined earlier time instance in dependence on there having been a change in an active time of the user equipment for DRX operation, due to radio access network node signaling or radio access network node data transmission to the user equipment. 11. A user equipment configured for operation in a radio access network and comprising: radio circuitry configured for communicating with the radio access network; and
a processing circuit operatively associated with the radio circuitry and configured to:
operate the user equipment in a Discontinuous Reception (DRX) configuration, wherein a corresponding DRX status of the user equipment is either active or inactive; and
decide whether to send an uplink transmission for a radio access network node at a transmission time t, based on the DRX status of the user equipment at a predefined earlier time instance relative to the transmission time t. 12. The user equipment of claim 11, wherein the uplink transmission comprises at least one of a periodic uplink control signaling and transmission of a sounding reference signal. 13. The user equipment of claim 12, wherein the periodic uplink control signaling comprises Channel State Information (CSI), comprising all of or any subsets of Channel Quality Indication (CQI), Precoding Matrix Indicator (PMI), Rank Indication (RI), and Precoder Type Indicator (PTI). 14. The user equipment of claim 12, wherein the processing circuit is configured to decide a format to use for sending other uplink control signaling together with the periodic uplink control signaling, based on the DRX status of the user equipment at the predefined earlier time instance relative to the transmission time t. 15. The user equipment of claim 14, wherein the other uplink control signaling comprises at least one of Hybrid Automatic Repeat ReQuest (HARQ) feedback and Acknowledgement/Not acknowledgement (A/N) feedback. 16. The user equipment of claim 11 wherein the uplink transmission comprises a sounding reference signal transmission and wherein the processing circuitry is configured to decide whether to puncture an uplink data transmission coinciding with the transmission time t with the sounding reference signal transmission, based on the DRX status of the user equipment at the predefined earlier time instance relative to the transmission time t. 17. The user equipment of claim 16, wherein the uplink data transmission is to be sent on a Physical Uplink Shared Channel (PUSCH). 18. The user equipment of claim 16, wherein, when the processing circuit decides to puncture the uplink data transmission, the processing circuit is configured to puncture a last symbol of the uplink data transmission with the sounding reference signal transmission. 19. The user equipment of claim 11, wherein the processing circuit is configured to decide whether to send the uplink transmission in further dependence on whether another uplink transmission from the user equipment coincides with the transmission time t. 20. The user equipment of claim 11, wherein the processing circuitry is configured to decide to base the transmission decision at the transmission time t on the DRX status of the user equipment at the predefined earlier time instance in dependence on there having been a change in an active time of the user equipment for DRX operation, due to radio access network node signaling or radio access network node data transmission to the user equipment. | 2,400 |
7,199 | 7,199 | 15,241,583 | 2,478 | A method of operating a cellular wireless network comprises broadcasting information about Internet Multimedia Subsystem (IMS) emergency call capability of the network on a broadcast channel in a cell of the network. This information may in one method concern the IMS emergency call capability of a base station included in the network and in another method it may include IMS emergency call capability of a base station and the core network. | 1-5. (canceled) 6. A method of operating a cellular wireless network, comprising:
broadcasting information about a capability of a cellular wireless network on a broadcast channel in a cell of the cellular wireless network from an access node associated with the cell, wherein the information about the capability includes information about a combined packet switched emergency call capability of a packet core of the cellular wireless network and the access node; allowing a user equipment to perform emergency calls in the cell where the information broadcast about the capability indicates packet switched emergency calls are supported; and making the user equipment select a different cell which supports emergency calls where the information broadcast about the capability indicates packet switched emergency calls are not supported; wherein the user equipment selects the different cell that supports emergency calls after receiving the broadcast with the information about the capability indicating packet switched emergency calls are not supported. 7. The method of claim 6 wherein the broadcast information includes information about at least one of local regulation and operator's policy regarding packet switched emergency calls. 8. The method of claim 6 wherein the combined packet switched emergency call capability is an Internet Protocol Multimedia Subsystem (IMS) emergency call capability. 9. The method of claim 6 wherein the broadcast information includes an Internet Protocol Multimedia Subsystem (IMS) emergency call capability of the access node;
wherein the access node is an eNodeB base station in accordance with Long Term Evolution (LTE) standards. 10. The method of claim 6 wherein signaling between the user equipment and a network node includes sending information about the packet switched emergency call capability of the packet core of the cellular wireless network to the user equipment;
wherein the packet core capability information is sent to the user equipment during handover procedures. 11. The method of claim 6 wherein the broadcast information includes an Internet Protocol Multimedia Subsystem (IMS) emergency call capability of the packet core. 12. The method of claim 6, the method further comprising:
making the user equipment revert to circuit switched emergency calls where the information broadcast about the capability indicates that packet switched emergency calls are not supported. 13. A base station for a cellular wireless network, the base station comprising:
a transmitter configured to broadcast information about a capability of the cellular wireless network on a broadcast channel for a cell of the cellular wireless network, wherein the base station is configured to define the cell, wherein the information about the capability includes information about a combined packet switched emergency call capability of a packet core of the cellular wireless network and the base station associated with the cell, wherein, during an attempted handover during an ongoing packet switched emergency call, the base station is further operative to:
allow a handover of user equipment, allowing the emergency call to proceed, if a target cell and core network support packet switched emergency calls, as indicated by a positive acknowledgement to a “handover required” message sent by the base station; and
make the user equipment select a different cell which supports emergency calls where the information broadcast about the capability indicates packet switched emergency calls are not supported. 14. The base station of claim 13 wherein the broadcast information includes information about at least one of local regulation and operator's policy regarding packet switched emergency calls. 15. The base station of claim 13 wherein the combined packet switched emergency call capability is an Internet Protocol Multimedia Subsystem (IMS) emergency call capability. 16. The base station of claim 13 wherein the broadcast information includes an Internet Protocol Multimedia Subsystem (IMS) emergency call capability of the packet core. 17. The base station of claim 13 wherein the base station is an eNodeB in accordance with Long Term Evolution (LTE) standards. 18. The base station of claim 13 wherein the base station is configured to allow the user equipment to perform emergency calls in the cell where the information broadcast about the capability indicates the packet core and the base station support packet switched emergency calls. 19. The base station of claim 13 wherein the base station is configured to make a user equipment revert to circuit switched emergency calls or select another cell which supports circuit switched emergency calls where the information broadcast about the capability indicates that packet switched emergency calls are not supported. 20. A mobile terminal for use with a cellular wireless network, the mobile terminal comprising
a receiver configured to receive information about a capability of the cellular wireless network in a cell of the cellular wireless network via a broadcast channel from an access node associated with the cell, wherein the information about the capability includes information about a combined packet switched emergency call capability of a packet core of the cellular wireless network and the access node; and at least one processor configured to detect information on the broadcast channel concerning the combined packet switched emergency call capability of the packet core of the cellular wireless network and the access node; wherein the at least one processor is configured to perform emergency calls in the cell where the information broadcast about the capability indicates packet switched emergency calls are supported; wherein the at least one processor is configured to select a different cell which supports emergency calls where the information broadcast about the capability indicates packet switched emergency calls are not supported; wherein the at least one processor is configured to select the different cell that supports emergency calls after receiving the broadcast with the information about the capability indicating packet switched emergency calls are not supported. 21. The mobile terminal of claim 20 wherein the combined packet switched emergency call capability is an Internet Protocol Multimedia Subsystem (IMS) emergency call capability. 22. The mobile terminal of claim 20 wherein the at least one processor is configured to revert to circuit switched emergency calls where the information broadcast about the capability indicates that packet switched emergency calls are not supported. 23. A method of operating a cellular wireless network, comprising:
receiving information about a capability of the cellular wireless network at a mobile terminal in a cell of the cellular wireless network via a broadcast channel from an access node associated with the cell, wherein the information about the capability includes information about a combined packet switched emergency call capability of a packet core of the cellular wireless network and the access node; detecting information on the broadcast channel at the mobile terminal concerning the combined packet switched emergency call capability of the packet core of the cellular wireless network and the access node; performing emergency calls from the mobile terminal in the cell where the information broadcast about the capability indicates packet switched emergency calls are supported; and selecting a different cell which supports emergency calls at the mobile terminal where the information broadcast about the capability indicates packet switched emergency calls are not supported; wherein the mobile terminal selects the different cell that supports emergency calls after receiving the broadcast with the information about the capability indicating packet switched emergency calls are not supported. 24. The method of claim 23 wherein the combined packet switched emergency call capability is an Internet Protocol Multimedia Subsystem (IMS) emergency call capability. 25. The method of claim 23, further comprising:
reverting to circuit switched emergency calls at the mobile terminal where the information broadcast about the capability indicates that packet switched emergency calls are not supported. | A method of operating a cellular wireless network comprises broadcasting information about Internet Multimedia Subsystem (IMS) emergency call capability of the network on a broadcast channel in a cell of the network. This information may in one method concern the IMS emergency call capability of a base station included in the network and in another method it may include IMS emergency call capability of a base station and the core network.1-5. (canceled) 6. A method of operating a cellular wireless network, comprising:
broadcasting information about a capability of a cellular wireless network on a broadcast channel in a cell of the cellular wireless network from an access node associated with the cell, wherein the information about the capability includes information about a combined packet switched emergency call capability of a packet core of the cellular wireless network and the access node; allowing a user equipment to perform emergency calls in the cell where the information broadcast about the capability indicates packet switched emergency calls are supported; and making the user equipment select a different cell which supports emergency calls where the information broadcast about the capability indicates packet switched emergency calls are not supported; wherein the user equipment selects the different cell that supports emergency calls after receiving the broadcast with the information about the capability indicating packet switched emergency calls are not supported. 7. The method of claim 6 wherein the broadcast information includes information about at least one of local regulation and operator's policy regarding packet switched emergency calls. 8. The method of claim 6 wherein the combined packet switched emergency call capability is an Internet Protocol Multimedia Subsystem (IMS) emergency call capability. 9. The method of claim 6 wherein the broadcast information includes an Internet Protocol Multimedia Subsystem (IMS) emergency call capability of the access node;
wherein the access node is an eNodeB base station in accordance with Long Term Evolution (LTE) standards. 10. The method of claim 6 wherein signaling between the user equipment and a network node includes sending information about the packet switched emergency call capability of the packet core of the cellular wireless network to the user equipment;
wherein the packet core capability information is sent to the user equipment during handover procedures. 11. The method of claim 6 wherein the broadcast information includes an Internet Protocol Multimedia Subsystem (IMS) emergency call capability of the packet core. 12. The method of claim 6, the method further comprising:
making the user equipment revert to circuit switched emergency calls where the information broadcast about the capability indicates that packet switched emergency calls are not supported. 13. A base station for a cellular wireless network, the base station comprising:
a transmitter configured to broadcast information about a capability of the cellular wireless network on a broadcast channel for a cell of the cellular wireless network, wherein the base station is configured to define the cell, wherein the information about the capability includes information about a combined packet switched emergency call capability of a packet core of the cellular wireless network and the base station associated with the cell, wherein, during an attempted handover during an ongoing packet switched emergency call, the base station is further operative to:
allow a handover of user equipment, allowing the emergency call to proceed, if a target cell and core network support packet switched emergency calls, as indicated by a positive acknowledgement to a “handover required” message sent by the base station; and
make the user equipment select a different cell which supports emergency calls where the information broadcast about the capability indicates packet switched emergency calls are not supported. 14. The base station of claim 13 wherein the broadcast information includes information about at least one of local regulation and operator's policy regarding packet switched emergency calls. 15. The base station of claim 13 wherein the combined packet switched emergency call capability is an Internet Protocol Multimedia Subsystem (IMS) emergency call capability. 16. The base station of claim 13 wherein the broadcast information includes an Internet Protocol Multimedia Subsystem (IMS) emergency call capability of the packet core. 17. The base station of claim 13 wherein the base station is an eNodeB in accordance with Long Term Evolution (LTE) standards. 18. The base station of claim 13 wherein the base station is configured to allow the user equipment to perform emergency calls in the cell where the information broadcast about the capability indicates the packet core and the base station support packet switched emergency calls. 19. The base station of claim 13 wherein the base station is configured to make a user equipment revert to circuit switched emergency calls or select another cell which supports circuit switched emergency calls where the information broadcast about the capability indicates that packet switched emergency calls are not supported. 20. A mobile terminal for use with a cellular wireless network, the mobile terminal comprising
a receiver configured to receive information about a capability of the cellular wireless network in a cell of the cellular wireless network via a broadcast channel from an access node associated with the cell, wherein the information about the capability includes information about a combined packet switched emergency call capability of a packet core of the cellular wireless network and the access node; and at least one processor configured to detect information on the broadcast channel concerning the combined packet switched emergency call capability of the packet core of the cellular wireless network and the access node; wherein the at least one processor is configured to perform emergency calls in the cell where the information broadcast about the capability indicates packet switched emergency calls are supported; wherein the at least one processor is configured to select a different cell which supports emergency calls where the information broadcast about the capability indicates packet switched emergency calls are not supported; wherein the at least one processor is configured to select the different cell that supports emergency calls after receiving the broadcast with the information about the capability indicating packet switched emergency calls are not supported. 21. The mobile terminal of claim 20 wherein the combined packet switched emergency call capability is an Internet Protocol Multimedia Subsystem (IMS) emergency call capability. 22. The mobile terminal of claim 20 wherein the at least one processor is configured to revert to circuit switched emergency calls where the information broadcast about the capability indicates that packet switched emergency calls are not supported. 23. A method of operating a cellular wireless network, comprising:
receiving information about a capability of the cellular wireless network at a mobile terminal in a cell of the cellular wireless network via a broadcast channel from an access node associated with the cell, wherein the information about the capability includes information about a combined packet switched emergency call capability of a packet core of the cellular wireless network and the access node; detecting information on the broadcast channel at the mobile terminal concerning the combined packet switched emergency call capability of the packet core of the cellular wireless network and the access node; performing emergency calls from the mobile terminal in the cell where the information broadcast about the capability indicates packet switched emergency calls are supported; and selecting a different cell which supports emergency calls at the mobile terminal where the information broadcast about the capability indicates packet switched emergency calls are not supported; wherein the mobile terminal selects the different cell that supports emergency calls after receiving the broadcast with the information about the capability indicating packet switched emergency calls are not supported. 24. The method of claim 23 wherein the combined packet switched emergency call capability is an Internet Protocol Multimedia Subsystem (IMS) emergency call capability. 25. The method of claim 23, further comprising:
reverting to circuit switched emergency calls at the mobile terminal where the information broadcast about the capability indicates that packet switched emergency calls are not supported. | 2,400 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.