Unnamed: 0
int64
0
350k
level_0
int64
0
351k
ApplicationNumber
int64
9.75M
96.1M
ArtUnit
int64
1.6k
3.99k
Abstract
stringlengths
1
8.37k
Claims
stringlengths
3
292k
abstract-claims
stringlengths
68
293k
TechCenter
int64
1.6k
3.9k
7,200
7,200
13,231,669
2,457
A method for control in a process control system, where a graphical user interface of said process control system is arranged with graphic representations of one or more control objects for monitoring and/or control of a process or an equipment. The control system GUI is displayed by a control system client application on a computer or workstation. In addition, one or more applications for monitoring and/or controlling at least one said control object are run in a computing process environment separate from said process control system. No code components execute in the same processing space as that running the GUI for the process control system. Any flaw or error in the extended applications cannot affect the control system program controlling an industrial process in real-time. A control system and a computer program are also disclosed.
1. A method for control in a process control system where a graphical user interface of said process control system comprises graphic representations of one or more control objects for monitoring and control of a process or an equipment displayed by a client application of said process control system running in a first computer processing environment on a computer or workstation comprising the steps of: running a second application in a second computing process environment separate from said first computer processing environment in which said client application is run, generating by means of the non-core application graphic image output in a second graphical user interface display comprising at least one said control object, sending the graphic image output of the second graphical user interface in a graphic output format from the second application to said process control system via an intermediate service, integrating the second graphical user interface of the second application running in the second and separate computing process environment in said graphical user interface of said client application of said process control system, accepting a user input to the second graphical user interface in said graphical user interface and sending information resulting from the user input via the intermediate service to the application running in the second computing process environment separate from said process control system. 2. The method according to claim 1, further comprising processing the information resulting from the user input in the separate computing process environment and returning, via the intermediate service, an updated graphic image output of the second graphical user interface in a graphic output format for integration with said graphical user interface. 3. The method according to claim 1, further comprising displaying on said graphical user interface an update, said update being at least one of a value, a status, or an event. 4. The method according to claim 1, further comprising providing the graphic image output of the second graphical user interface in a graphic output format by means of a remote viewer service and providing the application running in the computing process environment separate from said process control system by means of a viewer service running on a server. 5. The method according to claim 1, characterised by graphic output being in the form of a pixel-based graphic or bitmap 6. The method according to claim 1, characterised by graphic output being in the form of a vector-based graphic. 7. The method according to claim 1, characterised by graphic output being in the form of graphic display instructions for a graphic display apparatus. 8. The method according to claim 1, characterised by displaying on said graphical user interface a status or condition of a device or process on a display means of—at least one of a workstation, a portable computer, a dedicated handheld tool for configuration/maintenance, a personal digital assistant, a mobile phone, or a mobile computing device. 9. A computer program for control in a process control system implemented at least in part by one or more computer implemented run-time processes comprising software code portions or computer code to cause a computer or processor to carry out the steps of the method according to claim 1. 10. A process control system where a graphical user interface of said process control system is arranged with graphic representations of one or more control objects for monitoring and control of a process or an equipment and displayed by a control system client application running in a first computer processing environment on a computer or workstation comprising: a Server Node arranged for running a second application in a second computing process environment separate from said process control system, and an intermediate service arranged for sending a second graphic user interface graphic image data comprising the at least one said control object generated by means of the second application, in a graphic output format, from the second application to said process control system for integration of the second graphical user interface of the application in said graphical user interface of said process control system and for sending information resulting from accepting a user input to the second graphical user interface in said graphical user interface via the intermediate service to the application running in the second computing process environment separate from said process control system. 11. The system according to claim 10, wherein the intermediate service is provided for sending graphic output from a second user interface display to the Control System Client Application using Remote Desktop Protocol. 12. The system according to claim 10, wherein the intermediate service is provided for sending user input to second user interface display and sending the information of the user input to an application running in the separate computing process environment using Remote Desktop Protocol. 13. The system according to claim 10, wherein the intermediate service is provided for sending graphic output from a second user interface display to the Control System Client Application using a remote viewer to remote viewer server communication channel. 14. The system according to claim 10, characterised in that the Server Node is arranged with a Terminal Server Session Manager service application. 15. The system according to claim 10, characterised in that at least one sandbox is arranged for managing multiple Terminal Server Sessions. 16. The system according to claim 10, characterised in that said process control system is arranged with data network or gateway connections to at least one of a workstation, a portable computer, a dedicated handheld tool for configuration/maintenance, a personal digital assistant, a mobile phone, or a mobile computing device. 17. Use of a remote viewer server and a remote viewer client to run an application for control in a process control system in a first computer processing environment, where a graphical user interface of said process control system is arranged with graphic representations of one or more control objects for monitoring and control of a process or an equipment and displayed by said control system client application on a computer or workstation, characterized in that a second application is run in a computing process environment of the remote viewer server, which is a separate computing process environment from that running the remote viewer client, and view or receive user input to graphic information about a control object integrated in said graphical user interface of said control system client application.
A method for control in a process control system, where a graphical user interface of said process control system is arranged with graphic representations of one or more control objects for monitoring and/or control of a process or an equipment. The control system GUI is displayed by a control system client application on a computer or workstation. In addition, one or more applications for monitoring and/or controlling at least one said control object are run in a computing process environment separate from said process control system. No code components execute in the same processing space as that running the GUI for the process control system. Any flaw or error in the extended applications cannot affect the control system program controlling an industrial process in real-time. A control system and a computer program are also disclosed.1. A method for control in a process control system where a graphical user interface of said process control system comprises graphic representations of one or more control objects for monitoring and control of a process or an equipment displayed by a client application of said process control system running in a first computer processing environment on a computer or workstation comprising the steps of: running a second application in a second computing process environment separate from said first computer processing environment in which said client application is run, generating by means of the non-core application graphic image output in a second graphical user interface display comprising at least one said control object, sending the graphic image output of the second graphical user interface in a graphic output format from the second application to said process control system via an intermediate service, integrating the second graphical user interface of the second application running in the second and separate computing process environment in said graphical user interface of said client application of said process control system, accepting a user input to the second graphical user interface in said graphical user interface and sending information resulting from the user input via the intermediate service to the application running in the second computing process environment separate from said process control system. 2. The method according to claim 1, further comprising processing the information resulting from the user input in the separate computing process environment and returning, via the intermediate service, an updated graphic image output of the second graphical user interface in a graphic output format for integration with said graphical user interface. 3. The method according to claim 1, further comprising displaying on said graphical user interface an update, said update being at least one of a value, a status, or an event. 4. The method according to claim 1, further comprising providing the graphic image output of the second graphical user interface in a graphic output format by means of a remote viewer service and providing the application running in the computing process environment separate from said process control system by means of a viewer service running on a server. 5. The method according to claim 1, characterised by graphic output being in the form of a pixel-based graphic or bitmap 6. The method according to claim 1, characterised by graphic output being in the form of a vector-based graphic. 7. The method according to claim 1, characterised by graphic output being in the form of graphic display instructions for a graphic display apparatus. 8. The method according to claim 1, characterised by displaying on said graphical user interface a status or condition of a device or process on a display means of—at least one of a workstation, a portable computer, a dedicated handheld tool for configuration/maintenance, a personal digital assistant, a mobile phone, or a mobile computing device. 9. A computer program for control in a process control system implemented at least in part by one or more computer implemented run-time processes comprising software code portions or computer code to cause a computer or processor to carry out the steps of the method according to claim 1. 10. A process control system where a graphical user interface of said process control system is arranged with graphic representations of one or more control objects for monitoring and control of a process or an equipment and displayed by a control system client application running in a first computer processing environment on a computer or workstation comprising: a Server Node arranged for running a second application in a second computing process environment separate from said process control system, and an intermediate service arranged for sending a second graphic user interface graphic image data comprising the at least one said control object generated by means of the second application, in a graphic output format, from the second application to said process control system for integration of the second graphical user interface of the application in said graphical user interface of said process control system and for sending information resulting from accepting a user input to the second graphical user interface in said graphical user interface via the intermediate service to the application running in the second computing process environment separate from said process control system. 11. The system according to claim 10, wherein the intermediate service is provided for sending graphic output from a second user interface display to the Control System Client Application using Remote Desktop Protocol. 12. The system according to claim 10, wherein the intermediate service is provided for sending user input to second user interface display and sending the information of the user input to an application running in the separate computing process environment using Remote Desktop Protocol. 13. The system according to claim 10, wherein the intermediate service is provided for sending graphic output from a second user interface display to the Control System Client Application using a remote viewer to remote viewer server communication channel. 14. The system according to claim 10, characterised in that the Server Node is arranged with a Terminal Server Session Manager service application. 15. The system according to claim 10, characterised in that at least one sandbox is arranged for managing multiple Terminal Server Sessions. 16. The system according to claim 10, characterised in that said process control system is arranged with data network or gateway connections to at least one of a workstation, a portable computer, a dedicated handheld tool for configuration/maintenance, a personal digital assistant, a mobile phone, or a mobile computing device. 17. Use of a remote viewer server and a remote viewer client to run an application for control in a process control system in a first computer processing environment, where a graphical user interface of said process control system is arranged with graphic representations of one or more control objects for monitoring and control of a process or an equipment and displayed by said control system client application on a computer or workstation, characterized in that a second application is run in a computing process environment of the remote viewer server, which is a separate computing process environment from that running the remote viewer client, and view or receive user input to graphic information about a control object integrated in said graphical user interface of said control system client application.
2,400
7,201
7,201
15,348,882
2,422
There is provided a system including a non-transitory memory storing an executable code, and a hardware processor configured to execute the executable code to receive first and second Internet protocol (IP) video packets including respective first and second video content, and to identify a common reference time for the first and second IP video packets. The hardware processor also determines a first buffering interval for synchronizing the first and second IP video packets based on a first frame number, a first line number, and a first pixel number of the first video content, and the common reference time. In addition, the hardware processor holds the first IP video packet during the first buffering interval, and releases the first IP video packet when the first buffering interval elapses so as to align the first video content with the second video content at the common reference time.
1. a non-transitory memory storing an executable code; a hardware processor executing the executable code to: receive a first Internet protocol (IP) video packet including a first video content, and a second IP video packet including a second video content; identify a common reference time for the first and second IP video packets; identify a first frame number, a first line number, and a first pixel number of the first video content, the first frame number, the first line number, and the first pixel number corresponding to the common reference time; determine a first buffering interval for synchronizing the first IP video packet with the second IP video packet, the first buffering interval being determined based on the first frame number, the first line number, the first pixel number, and the common reference time; hold the first IP video packet during the first buffering interval; and release the first IP video packet when the first buffering interval elapses so as to align the first video content with the second video content at the common reference time; wherein the common reference time is one of a first time the first IP video packet is received and a second time the second IP video packet is received. 2. (canceled) 3. The system of claim 1, wherein synchronizing the first IP video packet with the second IP video packet includes temporally aligning the first video content with the second video content based on the first frame number of the first video content and a second frame number of the second video content. 4. The system of claim 1, wherein synchronizing the first IP video packet with the second IP video packet includes vertically aligning the first video content with the second video content based on the first line number of the first video content and a second line number of the second video content. 5. The system of claim 1, wherein synchronizing the first IP video packet with the second IP video packet includes horizontally aligning the first video content with the second video content based on the first pixel number of the first video content and a second pixel number of the second video content. 6. The system of claim 1, wherein the hardware processor further executes the executable code to determine a second buffering interval for synchronizing the second IP video packet with the first IP video packet, the second buffering interval being determined based on a second frame number of the second IP video packet, a second line number of the second IP video packet, a second pixel number of the second IP video packet, and the common reference time. 7. The system of claim 6, wherein the hardware processor further executes the executable code to hold the second IP video packet during the second buffering interval 8. The system of claim 7, wherein the hardware processor further executes the executable code to release the second IP video packet when the second buffering interval elapses. 9. The system of claim 1, wherein the first frame number, the first line number, and the first pixel number are included in a header of a first frame of the first IP video packet, and a second frame number, a second line number, and a second pixel number are included in a header of a second frame of the second IP video packet. 10. The system of claim 1, wherein the common reference time is the second time the second IP video packet is received. 11. A method for use with a device including a non-transitory memory and a hardware processor, the method comprising: receiving, using the hardware processor, a first Internet protocol (IP) video packet including a first video content, and a second IP video packet including a second video content; identifying, using the hardware processor, a common reference time for the first and second IP video packets; identifying, using the hardware processor, a first frame number, a first line number, and a first pixel number of the first video content, the first frame number, the first line number, and the first pixel number corresponding to the common reference time; determining, using the hardware processor, a first buffering interval for synchronizing the first IP video packet with the second IP video packet, the first buffering interval being determined based on the first frame number, the first line number, the first pixel number, and the common reference time; holding, using the hardware processor, the first IP video packet during the first buffering interval; and releasing, using the hardware processor, the first IP video packet when the first buffering interval elapses so as to align the first video content with the second video content at the common reference time; wherein the common reference time is one of a first time the first IP video packet is received and a second time the second IP video packet is received. 12. (canceled) 13. The method of claim 11, wherein synchronizing the first IP video packet with the second IP video packet includes temporally aligning the first video content with the second video content based on the first frame number of the first video content and a second frame number of the second video content. 14. The method of claim 11, wherein synchronizing the first IP video packet with the second IP video packet includes vertically aligning the first video content with the second video content based on the first line number of the first video content and a second line number of the second video content. 15. The method of claim 11, wherein synchronizing the first IP video packet with the second IP video packet includes horizontally aligning the first video content with the second video content based on the first pixel number of the first video content and a second pixel number of the second video content. 16. The method of claim 11, further comprising determining, using the hardware processor, a second buffering interval for synchronizing the second IP video packet with the first IP video packet, the second buffering interval being determined based on a second frame number of the second IP video packet, a second line number of the second IP video packet, a second pixel number of the second IP video packet, and the common reference time. 17. The method of claim 16, further comprising holding, using the hardware processor, the second IP video packet during the second buffering interval 18. The method of claim 17, further comprising releasing, using the hardware processor, the second IP video packet when the second buffering interval elapses. 19. The method of claim 11, wherein the first frame number, the first line number, and the first pixel number are included in a header of a first frame of the first IP video packet, and a second frame number, a second line number, and a second pixel number are included in a header of a second frame of the second IP video packet. 20. The method of claim 11, wherein the common reference time is the second time the second IP video packet is received.
There is provided a system including a non-transitory memory storing an executable code, and a hardware processor configured to execute the executable code to receive first and second Internet protocol (IP) video packets including respective first and second video content, and to identify a common reference time for the first and second IP video packets. The hardware processor also determines a first buffering interval for synchronizing the first and second IP video packets based on a first frame number, a first line number, and a first pixel number of the first video content, and the common reference time. In addition, the hardware processor holds the first IP video packet during the first buffering interval, and releases the first IP video packet when the first buffering interval elapses so as to align the first video content with the second video content at the common reference time.1. a non-transitory memory storing an executable code; a hardware processor executing the executable code to: receive a first Internet protocol (IP) video packet including a first video content, and a second IP video packet including a second video content; identify a common reference time for the first and second IP video packets; identify a first frame number, a first line number, and a first pixel number of the first video content, the first frame number, the first line number, and the first pixel number corresponding to the common reference time; determine a first buffering interval for synchronizing the first IP video packet with the second IP video packet, the first buffering interval being determined based on the first frame number, the first line number, the first pixel number, and the common reference time; hold the first IP video packet during the first buffering interval; and release the first IP video packet when the first buffering interval elapses so as to align the first video content with the second video content at the common reference time; wherein the common reference time is one of a first time the first IP video packet is received and a second time the second IP video packet is received. 2. (canceled) 3. The system of claim 1, wherein synchronizing the first IP video packet with the second IP video packet includes temporally aligning the first video content with the second video content based on the first frame number of the first video content and a second frame number of the second video content. 4. The system of claim 1, wherein synchronizing the first IP video packet with the second IP video packet includes vertically aligning the first video content with the second video content based on the first line number of the first video content and a second line number of the second video content. 5. The system of claim 1, wherein synchronizing the first IP video packet with the second IP video packet includes horizontally aligning the first video content with the second video content based on the first pixel number of the first video content and a second pixel number of the second video content. 6. The system of claim 1, wherein the hardware processor further executes the executable code to determine a second buffering interval for synchronizing the second IP video packet with the first IP video packet, the second buffering interval being determined based on a second frame number of the second IP video packet, a second line number of the second IP video packet, a second pixel number of the second IP video packet, and the common reference time. 7. The system of claim 6, wherein the hardware processor further executes the executable code to hold the second IP video packet during the second buffering interval 8. The system of claim 7, wherein the hardware processor further executes the executable code to release the second IP video packet when the second buffering interval elapses. 9. The system of claim 1, wherein the first frame number, the first line number, and the first pixel number are included in a header of a first frame of the first IP video packet, and a second frame number, a second line number, and a second pixel number are included in a header of a second frame of the second IP video packet. 10. The system of claim 1, wherein the common reference time is the second time the second IP video packet is received. 11. A method for use with a device including a non-transitory memory and a hardware processor, the method comprising: receiving, using the hardware processor, a first Internet protocol (IP) video packet including a first video content, and a second IP video packet including a second video content; identifying, using the hardware processor, a common reference time for the first and second IP video packets; identifying, using the hardware processor, a first frame number, a first line number, and a first pixel number of the first video content, the first frame number, the first line number, and the first pixel number corresponding to the common reference time; determining, using the hardware processor, a first buffering interval for synchronizing the first IP video packet with the second IP video packet, the first buffering interval being determined based on the first frame number, the first line number, the first pixel number, and the common reference time; holding, using the hardware processor, the first IP video packet during the first buffering interval; and releasing, using the hardware processor, the first IP video packet when the first buffering interval elapses so as to align the first video content with the second video content at the common reference time; wherein the common reference time is one of a first time the first IP video packet is received and a second time the second IP video packet is received. 12. (canceled) 13. The method of claim 11, wherein synchronizing the first IP video packet with the second IP video packet includes temporally aligning the first video content with the second video content based on the first frame number of the first video content and a second frame number of the second video content. 14. The method of claim 11, wherein synchronizing the first IP video packet with the second IP video packet includes vertically aligning the first video content with the second video content based on the first line number of the first video content and a second line number of the second video content. 15. The method of claim 11, wherein synchronizing the first IP video packet with the second IP video packet includes horizontally aligning the first video content with the second video content based on the first pixel number of the first video content and a second pixel number of the second video content. 16. The method of claim 11, further comprising determining, using the hardware processor, a second buffering interval for synchronizing the second IP video packet with the first IP video packet, the second buffering interval being determined based on a second frame number of the second IP video packet, a second line number of the second IP video packet, a second pixel number of the second IP video packet, and the common reference time. 17. The method of claim 16, further comprising holding, using the hardware processor, the second IP video packet during the second buffering interval 18. The method of claim 17, further comprising releasing, using the hardware processor, the second IP video packet when the second buffering interval elapses. 19. The method of claim 11, wherein the first frame number, the first line number, and the first pixel number are included in a header of a first frame of the first IP video packet, and a second frame number, a second line number, and a second pixel number are included in a header of a second frame of the second IP video packet. 20. The method of claim 11, wherein the common reference time is the second time the second IP video packet is received.
2,400
7,202
7,202
15,022,593
2,422
A system is provided for simultaneously displaying video data of multiple video sources ( 040, 042 ) on a display. The system comprises a video input ( 120 ) for receiving the video data ( 122 ) of the multiple video sources; a display processor ( 140 ) for generating display data ( 142 ) to display the video data of the multiple video sources in respective viewports ( 1 A- 2 F) on a display. The display processor is further arranged for, if needed to fit respective ones of the viewports, spatially scaling the video data of one or more of the multiple video sources to obtain said fit; and generating a visual indicator ( 300 - 320 ) for visually indicating whether the video data in one of the viewports has been spatially scaled from its native spatial resolution. By providing the visual indicator as part of the display data, the system may warn the user that the video data in one of the viewports may comprise undesirable artifacts which may hinder interpretation of the video data.
1. A system for simultaneously displaying video data of multiple video sources on a display, the system comprising: a video input for receiving the video data of the multiple video sources; a display processor for generating display data to display the video data of the multiple video sources in respective viewports (1A-2F) on a display, the viewports being positioned to simultaneously fit a display area on the display; wherein the display processor is arranged for: i) if needed to fit respective ones of the viewports, spatially scaling the video data of one or more of the multiple video sources to fit said respective viewports; ii) generating a visual indicator for visually indicating when the video data in one of the viewports (1A-2F) has been spatially scaled from its native spatial resolution; and iii) omitting or modifying the visual indicator when the video data in the one of the viewports is displayed at its native spatial resolution. 2. The system according to claim 1, further comprising a user interface subsystem for enabling a user to indicate a resize action to be applied to a selected one of the viewports (1B, 2E), and wherein the display processor is arranged for: based on the resize action, resizing one or more viewports (1A-2F), the one or more viewports comprising at least said selected viewport (1B, 2E); and spatially scaling the video data of one or more of the multiple video sources to fit the respective one or more resized viewports. 3. The system according to claim 2, wherein the resize action is a restore action, and wherein the display processor is arranged for carrying out the restore action by resizing the selected viewport (1B, 2E) to display the video data at its native resolution. 4. The system according to claim 3, wherein the user interface subsystem is arranged for enabling the user to initiate the restore action by selecting the visual indicator. 5. The system according to claim 2, wherein the display processor arranged for resizing or rearranging non-selected ones of the viewports (1A, 1C, 2A-2D, 2F) as part of the resize action to free up a portion of the display area for enabling the resizing of the selected viewport (1B, 2E). 6. The system according to claim 5, wherein the display processor is arranged for animating said resizing or said rearranging. 7. The system according to claim 2, wherein the user interface subsystem is arranged for enabling the user to initiate the resize action by moving a common boundary of the selected viewport (1B, 2E) and another viewport. 8. The system according to claim 1, wherein the display processor is arranged for displaying the visual indicator in visual association with the one of the viewports (1B, 2E). 9. The system according to claim 1, wherein one or more of the multiple video sources are marked as being scaling-sensitive, and wherein the display processor is arranged for generating the visual indicator only for the viewports which display the video data of said scaling-sensitive video sources. 10. The system according to claim 1, wherein the multiple video sources comprise a workstation or an imaging apparatus connected to the system via a remote desktop session. 11. The system according to claim 10, wherein the remote desktop session shows a medical image or a medical signal. 12. A workstation or imaging apparatus comprising the system according to claim 1. 13. A method for simultaneously displaying video data of multiple video sources on a display, the method comprising: receiving the video data of the multiple video sources; generating display data to display the video data of the multiple video sources in respective viewports on a display, the viewports being positioned to simultaneously fit a display area on the display; wherein the generating the display data comprises: i) if needed to fit respective ones of the viewports, spatially scaling the video data of one or more of the multiple video sources to fit said respective viewports, ii) generating a visual indicator for visually indicating when the video data in one of the viewports has been spatially scaled from its native spatial resolution; and iii) omitting or modifying the visual indicator when the video data in the one of the viewports is displayed at its native spatial resolution. 14. A computer program product comprising instructions for causing a processor system to perform the method according to claim 13.
A system is provided for simultaneously displaying video data of multiple video sources ( 040, 042 ) on a display. The system comprises a video input ( 120 ) for receiving the video data ( 122 ) of the multiple video sources; a display processor ( 140 ) for generating display data ( 142 ) to display the video data of the multiple video sources in respective viewports ( 1 A- 2 F) on a display. The display processor is further arranged for, if needed to fit respective ones of the viewports, spatially scaling the video data of one or more of the multiple video sources to obtain said fit; and generating a visual indicator ( 300 - 320 ) for visually indicating whether the video data in one of the viewports has been spatially scaled from its native spatial resolution. By providing the visual indicator as part of the display data, the system may warn the user that the video data in one of the viewports may comprise undesirable artifacts which may hinder interpretation of the video data.1. A system for simultaneously displaying video data of multiple video sources on a display, the system comprising: a video input for receiving the video data of the multiple video sources; a display processor for generating display data to display the video data of the multiple video sources in respective viewports (1A-2F) on a display, the viewports being positioned to simultaneously fit a display area on the display; wherein the display processor is arranged for: i) if needed to fit respective ones of the viewports, spatially scaling the video data of one or more of the multiple video sources to fit said respective viewports; ii) generating a visual indicator for visually indicating when the video data in one of the viewports (1A-2F) has been spatially scaled from its native spatial resolution; and iii) omitting or modifying the visual indicator when the video data in the one of the viewports is displayed at its native spatial resolution. 2. The system according to claim 1, further comprising a user interface subsystem for enabling a user to indicate a resize action to be applied to a selected one of the viewports (1B, 2E), and wherein the display processor is arranged for: based on the resize action, resizing one or more viewports (1A-2F), the one or more viewports comprising at least said selected viewport (1B, 2E); and spatially scaling the video data of one or more of the multiple video sources to fit the respective one or more resized viewports. 3. The system according to claim 2, wherein the resize action is a restore action, and wherein the display processor is arranged for carrying out the restore action by resizing the selected viewport (1B, 2E) to display the video data at its native resolution. 4. The system according to claim 3, wherein the user interface subsystem is arranged for enabling the user to initiate the restore action by selecting the visual indicator. 5. The system according to claim 2, wherein the display processor arranged for resizing or rearranging non-selected ones of the viewports (1A, 1C, 2A-2D, 2F) as part of the resize action to free up a portion of the display area for enabling the resizing of the selected viewport (1B, 2E). 6. The system according to claim 5, wherein the display processor is arranged for animating said resizing or said rearranging. 7. The system according to claim 2, wherein the user interface subsystem is arranged for enabling the user to initiate the resize action by moving a common boundary of the selected viewport (1B, 2E) and another viewport. 8. The system according to claim 1, wherein the display processor is arranged for displaying the visual indicator in visual association with the one of the viewports (1B, 2E). 9. The system according to claim 1, wherein one or more of the multiple video sources are marked as being scaling-sensitive, and wherein the display processor is arranged for generating the visual indicator only for the viewports which display the video data of said scaling-sensitive video sources. 10. The system according to claim 1, wherein the multiple video sources comprise a workstation or an imaging apparatus connected to the system via a remote desktop session. 11. The system according to claim 10, wherein the remote desktop session shows a medical image or a medical signal. 12. A workstation or imaging apparatus comprising the system according to claim 1. 13. A method for simultaneously displaying video data of multiple video sources on a display, the method comprising: receiving the video data of the multiple video sources; generating display data to display the video data of the multiple video sources in respective viewports on a display, the viewports being positioned to simultaneously fit a display area on the display; wherein the generating the display data comprises: i) if needed to fit respective ones of the viewports, spatially scaling the video data of one or more of the multiple video sources to fit said respective viewports, ii) generating a visual indicator for visually indicating when the video data in one of the viewports has been spatially scaled from its native spatial resolution; and iii) omitting or modifying the visual indicator when the video data in the one of the viewports is displayed at its native spatial resolution. 14. A computer program product comprising instructions for causing a processor system to perform the method according to claim 13.
2,400
7,203
7,203
14,547,825
2,463
Methods and systems are provided for sending and/or receiving communication information by a digital subscriber line access multiplexer to customer devices at one or more customer premises, via customer lines. In particular, the digital subscriber line access multiplexer may be configured to send a communication signal, for a particular customer device, concurrently via more than one customer line. The digital subscriber line access multiplexer may enhance a communication signal, received from a particular customer device, via a particular customer line, such as using a second communication signal received concurrently from the particular customer device via a second customer line.
1. A system, comprising: a digital subscriber line access multiplexer, the digital subscriber line access multiplexer being operable to send and/or receive communication signals to and/or from customer devices at one or more customer premises, via customer lines; and wherein the digital subscriber line access multiplexer is configured to send a communication signal for a particular customer device concurrently via more than one customer line to the particular customer device. 2. The system of claim 1, wherein the digital subscriber line multiplexer is configured to enhance a first communication signal, received from a particular customer device via a first customer line, using a second communication signal received concurrently from the particular customer device via a second customer line. 3. The system of claim 1, wherein the digital subscriber line multiplexer is configured to: determine channel coefficients of one or more of the following channels: transmission channels of a customer line and crosstalk channels between customer lines; and send the communication signal for the particular customer device using one or more of the determined channel coefficients. 4. The system of claim 1, wherein the digital subscriber line multiplexer is configured to: determine one or more channel coefficients of the following channels: transmission channels of a customer line and crosstalk channels between customer lines; and enhance a communication signal received from a particular customer device using one or more of the determined channel coefficients. 5. The system of claim 1, wherein the digital subscriber line multiplexer is configured to limit the communication signals to specific time periods and/or to specific frequency bands. 6. The system of claim 1, wherein the digital subscriber line multiplexer is configured to use vectoring. 7. The system of claim 1, wherein the digital subscriber line multiplexer is configured to: determine one or more of the following status information of one or more customer devices: turned on, turned off, disconnected, and operating frequency; and use the status information for selecting the more than one customer line for sending the communication signal to the particular customer device. 8. The system of claim 1, wherein the digital subscriber line multiplexer is configured to communicate via one or more broadband fiber optics lines. 9. A method for communication, comprising: sending and/or receiving by a digital subscriber line access multiplexer, communication signals to and/or from customer devices at one or more customer premises, via customer lines; wherein the sending comprises sending a communication signal for a particular customer device concurrently via more than one customer line to the particular customer device. 10. The method of claim 9, comprising enhancing a first communication signal, received from a particular customer device via a first customer line, using a second communication signal received concurrently from the particular customer device via a second customer line. 11. The method of claim 9, comprising: determining channel coefficients of one or more of the following channels: transmission channels of customer lines and crosstalk channels between customer lines; and sending the communication signal for the particular customer device using one or more of the determined channel coefficients. 12. The method of claim 9, comprising: determining one or more channel coefficients of the following channels: transmission channels of customer lines and crosstalk channels between customer lines; and enhancing a communication signal received from a particular customer device using one or more of the determined channel coefficients. 13. The method of claim 9, comprising limiting the communication signals to specific time periods and/or to specific frequency bands. 14. The method of claim 9, comprising using vectoring. 15. A computer program product, comprising a non-transitory computer readable medium having stored thereon computer program code for controlling one or more processors or circuits of a digital subscriber line access multiplexer to cause the digital subscriber line access multiplexer to perform: sending a communication signal for a particular customer device concurrently via more than one customer line to the particular customer device; and enhancing a communication signal, received from a particular customer device via a particular customer line. 16. The computer program product of claim 15, wherein the digital subscriber line access multiplexer is caused to enhance the communication signal, received from the particular customer device via the particular customer line, using a second communication signal received concurrently from the particular customer device via a second customer line. 17. The computer program product of claim 15, wherein digital subscriber line access multiplexer is caused to determine channel coefficients of one or more of the following channels: transmission channels of customer lines and crosstalk channels between customer lines. 18. The computer program product of claim 15, wherein digital subscriber line access multiplexer is caused to send the communication signal for the particular customer device using one or more of the determined channel coefficients. 19. The computer program product of claim 15, wherein digital subscriber line access multiplexer is caused to enhance the communication signal, received from the particular customer device via the particular customer line, using one or more of the determined channel coefficients. 20. The computer program product of claim 15, wherein the digital subscriber line access multiplexer is caused to limit the communication signals to specific time periods and/or to specific frequency bands.
Methods and systems are provided for sending and/or receiving communication information by a digital subscriber line access multiplexer to customer devices at one or more customer premises, via customer lines. In particular, the digital subscriber line access multiplexer may be configured to send a communication signal, for a particular customer device, concurrently via more than one customer line. The digital subscriber line access multiplexer may enhance a communication signal, received from a particular customer device, via a particular customer line, such as using a second communication signal received concurrently from the particular customer device via a second customer line.1. A system, comprising: a digital subscriber line access multiplexer, the digital subscriber line access multiplexer being operable to send and/or receive communication signals to and/or from customer devices at one or more customer premises, via customer lines; and wherein the digital subscriber line access multiplexer is configured to send a communication signal for a particular customer device concurrently via more than one customer line to the particular customer device. 2. The system of claim 1, wherein the digital subscriber line multiplexer is configured to enhance a first communication signal, received from a particular customer device via a first customer line, using a second communication signal received concurrently from the particular customer device via a second customer line. 3. The system of claim 1, wherein the digital subscriber line multiplexer is configured to: determine channel coefficients of one or more of the following channels: transmission channels of a customer line and crosstalk channels between customer lines; and send the communication signal for the particular customer device using one or more of the determined channel coefficients. 4. The system of claim 1, wherein the digital subscriber line multiplexer is configured to: determine one or more channel coefficients of the following channels: transmission channels of a customer line and crosstalk channels between customer lines; and enhance a communication signal received from a particular customer device using one or more of the determined channel coefficients. 5. The system of claim 1, wherein the digital subscriber line multiplexer is configured to limit the communication signals to specific time periods and/or to specific frequency bands. 6. The system of claim 1, wherein the digital subscriber line multiplexer is configured to use vectoring. 7. The system of claim 1, wherein the digital subscriber line multiplexer is configured to: determine one or more of the following status information of one or more customer devices: turned on, turned off, disconnected, and operating frequency; and use the status information for selecting the more than one customer line for sending the communication signal to the particular customer device. 8. The system of claim 1, wherein the digital subscriber line multiplexer is configured to communicate via one or more broadband fiber optics lines. 9. A method for communication, comprising: sending and/or receiving by a digital subscriber line access multiplexer, communication signals to and/or from customer devices at one or more customer premises, via customer lines; wherein the sending comprises sending a communication signal for a particular customer device concurrently via more than one customer line to the particular customer device. 10. The method of claim 9, comprising enhancing a first communication signal, received from a particular customer device via a first customer line, using a second communication signal received concurrently from the particular customer device via a second customer line. 11. The method of claim 9, comprising: determining channel coefficients of one or more of the following channels: transmission channels of customer lines and crosstalk channels between customer lines; and sending the communication signal for the particular customer device using one or more of the determined channel coefficients. 12. The method of claim 9, comprising: determining one or more channel coefficients of the following channels: transmission channels of customer lines and crosstalk channels between customer lines; and enhancing a communication signal received from a particular customer device using one or more of the determined channel coefficients. 13. The method of claim 9, comprising limiting the communication signals to specific time periods and/or to specific frequency bands. 14. The method of claim 9, comprising using vectoring. 15. A computer program product, comprising a non-transitory computer readable medium having stored thereon computer program code for controlling one or more processors or circuits of a digital subscriber line access multiplexer to cause the digital subscriber line access multiplexer to perform: sending a communication signal for a particular customer device concurrently via more than one customer line to the particular customer device; and enhancing a communication signal, received from a particular customer device via a particular customer line. 16. The computer program product of claim 15, wherein the digital subscriber line access multiplexer is caused to enhance the communication signal, received from the particular customer device via the particular customer line, using a second communication signal received concurrently from the particular customer device via a second customer line. 17. The computer program product of claim 15, wherein digital subscriber line access multiplexer is caused to determine channel coefficients of one or more of the following channels: transmission channels of customer lines and crosstalk channels between customer lines. 18. The computer program product of claim 15, wherein digital subscriber line access multiplexer is caused to send the communication signal for the particular customer device using one or more of the determined channel coefficients. 19. The computer program product of claim 15, wherein digital subscriber line access multiplexer is caused to enhance the communication signal, received from the particular customer device via the particular customer line, using one or more of the determined channel coefficients. 20. The computer program product of claim 15, wherein the digital subscriber line access multiplexer is caused to limit the communication signals to specific time periods and/or to specific frequency bands.
2,400
7,204
7,204
14,943,225
2,434
When a user is attempting to access a server application, a challenge is received, in a browser, for a one or more login credentials to access a server application (e.g., a web page). For example, a user is requested to provide a user name and password to login to the server application. In response to the user providing the credentials via the browser, the login credentials are sent. If the credentials are validated, an access token is received by the browser from the server application. In response to receiving the access token for the server application, the browser sends the access token and an address for the server application, via a local loopback address, to a local application. This allows the local application to send local information, such as local files, to the server application using the token.
1. A method comprising: receiving, by a processor, a challenge for a one or more login credentials; sending, by the processor, the one or more login credentials; receiving, by the processor, an access token for a server application; and in response to receiving the access token for the server application, sending, by the processor, the access token and an address for the server application, via a local loopback address, to a local application. 2. The method of claim 1, wherein claim 1 is implemented in a browser, wherein the server application is a web server application, and further comprising: sending, by the local application, the access token to the web server application to allow the local application to communicate with the web server application; and sending, by the local application, to the web server application, local information that cannot be accessed by the browser. 3. The method of claim 1, wherein claim 1 is implemented in a browser and wherein the local application sends information to the browser for display in the browser. 4. The method of claim 1, further comprising: sending, by the local application, a request to the server application using the access token. 5. The method of claim 1, wherein claim 1 is implemented as a plug-in in a browser. 6. The method of claim 1, wherein the local application is a non-browser application. 7. The method of claim 1, wherein the local application comprises a plurality of local applications that each use the access token to access the server application. 8. The method of claim 1, wherein the local application has a Hyper Text Transfer Protocol (HTTP) stack that is bound to the loopback address. 9. The method of claim 8, wherein the loopback address is within an IP address range of 127.0.0.0 to 127.0.0.8. 10. A system comprising: a memory, a processor in communication with the memory, the processor operable to execute software modules, the software modules comprising: a browser that receives a challenge for a one or more login credentials; sends the one or more login credentials; receives an access token for a server application; and sends the access token and an address of the server application, via a local loopback address, to a local application in response to receiving the access token for the server application. 11. The system of claim 10, further comprising: the local application that sends the access token to the server application to allow the local application to communicate with the server application and sends local information that cannot be accessed by the browser to the server application. 12. The system of claim 10, wherein the local application sends information to the browser for display in the browser. 13. The system of claim 10, wherein the local application sends a request to the server application using the access token. 14. The system of claim 10, wherein a browser plug-in implements the system of claim 10. 15. The system of claim 10, wherein the local application is a non-browser application. 16. The system of claim 10, wherein the local application comprises a plurality of local applications that each use the access token to access the server application. 17. The system of claim 10, wherein the local application has a Hyper Text Transfer Protocol (HTTP) stack that is bound to the loopback address. 18. The system of claim 17, wherein the loopback address is within an IP address range of 127.0.0.0 to 127.0.0.8. 19. A computer program product comprising a computer readable storage medium having stored thereon instructions that, when executed, cause a processor to perform a method, the instructions comprising: instructions to receive a challenge for a one or more login credentials; instructions to send the one or more login credentials; instructions to receive an access token for a server application; and in response to receiving the access token for the server application, instructions to send the access token and an address for the server application, via a local loopback address, to a local application. 20. The computer program product of claim 19, wherein claim 19 is implemented in a browser, wherein the server application is a web server application, and further comprising: instructions to send, by the local application, the access token to the web server application to allow the local application to communicate with the web server application; and instructions to send, by the local application, to the web server application, local information that cannot be accessed by the browser.
When a user is attempting to access a server application, a challenge is received, in a browser, for a one or more login credentials to access a server application (e.g., a web page). For example, a user is requested to provide a user name and password to login to the server application. In response to the user providing the credentials via the browser, the login credentials are sent. If the credentials are validated, an access token is received by the browser from the server application. In response to receiving the access token for the server application, the browser sends the access token and an address for the server application, via a local loopback address, to a local application. This allows the local application to send local information, such as local files, to the server application using the token.1. A method comprising: receiving, by a processor, a challenge for a one or more login credentials; sending, by the processor, the one or more login credentials; receiving, by the processor, an access token for a server application; and in response to receiving the access token for the server application, sending, by the processor, the access token and an address for the server application, via a local loopback address, to a local application. 2. The method of claim 1, wherein claim 1 is implemented in a browser, wherein the server application is a web server application, and further comprising: sending, by the local application, the access token to the web server application to allow the local application to communicate with the web server application; and sending, by the local application, to the web server application, local information that cannot be accessed by the browser. 3. The method of claim 1, wherein claim 1 is implemented in a browser and wherein the local application sends information to the browser for display in the browser. 4. The method of claim 1, further comprising: sending, by the local application, a request to the server application using the access token. 5. The method of claim 1, wherein claim 1 is implemented as a plug-in in a browser. 6. The method of claim 1, wherein the local application is a non-browser application. 7. The method of claim 1, wherein the local application comprises a plurality of local applications that each use the access token to access the server application. 8. The method of claim 1, wherein the local application has a Hyper Text Transfer Protocol (HTTP) stack that is bound to the loopback address. 9. The method of claim 8, wherein the loopback address is within an IP address range of 127.0.0.0 to 127.0.0.8. 10. A system comprising: a memory, a processor in communication with the memory, the processor operable to execute software modules, the software modules comprising: a browser that receives a challenge for a one or more login credentials; sends the one or more login credentials; receives an access token for a server application; and sends the access token and an address of the server application, via a local loopback address, to a local application in response to receiving the access token for the server application. 11. The system of claim 10, further comprising: the local application that sends the access token to the server application to allow the local application to communicate with the server application and sends local information that cannot be accessed by the browser to the server application. 12. The system of claim 10, wherein the local application sends information to the browser for display in the browser. 13. The system of claim 10, wherein the local application sends a request to the server application using the access token. 14. The system of claim 10, wherein a browser plug-in implements the system of claim 10. 15. The system of claim 10, wherein the local application is a non-browser application. 16. The system of claim 10, wherein the local application comprises a plurality of local applications that each use the access token to access the server application. 17. The system of claim 10, wherein the local application has a Hyper Text Transfer Protocol (HTTP) stack that is bound to the loopback address. 18. The system of claim 17, wherein the loopback address is within an IP address range of 127.0.0.0 to 127.0.0.8. 19. A computer program product comprising a computer readable storage medium having stored thereon instructions that, when executed, cause a processor to perform a method, the instructions comprising: instructions to receive a challenge for a one or more login credentials; instructions to send the one or more login credentials; instructions to receive an access token for a server application; and in response to receiving the access token for the server application, instructions to send the access token and an address for the server application, via a local loopback address, to a local application. 20. The computer program product of claim 19, wherein claim 19 is implemented in a browser, wherein the server application is a web server application, and further comprising: instructions to send, by the local application, the access token to the web server application to allow the local application to communicate with the web server application; and instructions to send, by the local application, to the web server application, local information that cannot be accessed by the browser.
2,400
7,205
7,205
14,078,855
2,486
An example of an information processing system includes a plurality of information processing apparatuses each capable of displaying, on a display device, a plurality of panoramic images associated with points on a map. A transmission-side apparatus determines a target point on the basis of an operation of a user, and displays, on a first display device, an image of a partial area, corresponding to a line-of-sight direction determined in accordance with an operation of the user, of a panoramic image associated with the target point. The transmission-side apparatus stores path information regarding a path along which the target point is moved during a predetermined period. A reception-side apparatus acquires the two or more panoramic images identified by the path information stored in the transmission-side apparatus, and displays, on a second display device, the acquired two or more panoramic images in an order identified by the path information.
1. An information processing system comprising a plurality of information processing apparatuses each capable of displaying, on a display device, a plurality of panoramic images associated with points on a map, a transmission-side apparatus of the plurality of information processing apparatuses comprising: a point determination unit configured to determine one of points on the map as a target point on the basis of an operation of a user; a first image display unit configured to display, on a first display device, an image of a partial area, corresponding to a line-of-sight direction determined in accordance with an operation of the user, of a panoramic image associated with the target point; and a path information storage unit configured to store path information which allows for identification of two or more panoramic images of panoramic images associated with points on a path along which the target point is moved during a predetermined period, and identification of an order of the two or more panoramic images, a reception-side apparatus of the plurality of information processing apparatuses comprising: a panoramic image acquisition unit configured to acquire the two or more panoramic images identified by the path information stored in the transmission-side apparatus; and a second image display unit configured to display, on a second display device, the acquired two or more panoramic images in the order identified by the path information. 2. The information processing system according to claim 1, further comprising a server capable of communicating with each information processing apparatus, wherein the transmission-side apparatus further comprises a transmission unit configured to transmit the stored path information to the server, the server stores the path information transmitted from the transmission-side apparatus, and the panoramic image acquisition unit acquires the panoramic images identified by the path information stored in the server. 3. The information processing system according to claim 2, wherein the transmission unit transmits, to the server, the path information with a message inputted by the user, and the server stores the message and first presentation information representing the path information, in a state where the message and the first presentation information are viewable by each information processing apparatus. 4. The information processing system according to claim 3, wherein the first presentation information is image information obtained from the panoramic image identified by the path information represented by the first presentation information. 5. The information processing system according to claim 2, wherein the transmission-side information processing apparatus further comprises an individual information storage unit configured to store individual point information which allows for identification of a panoramic image associated with one point designated by the user, the server generates first presentation information representing path information transmitted from one or more transmission-side apparatuses, for each path information, and generates second presentation information representing individual point information transmitted from one or more transmission-side apparatuses, for each individual point information, and the reception-side apparatus further comprises a list display section configured to: acquire the first presentation information from the server and display the first presentation information in a list on the second display device in accordance with a first instruction of a user; and acquire the second presentation information from the server and display the second presentation information in a list on the second display device in accordance with a second instruction of the user. 6. The information processing system according to claim 1, wherein, for each panoramic image identified by the path information, the path information storage unit stores path information including line-of-sight direction information indicating a line-of-sight direction determined on the basis of a line-of-sight direction when the panoramic image is displayed on the first display device. 7. The information processing system according to claim 6, wherein the second image display unit displays, on the second display device, an image of a partial area, determined on the basis of the line-of-sight direction information included in the path information, of the acquired panoramic image. 8. The information processing system according to claim 1, wherein the path information storage unit stores path information which allows for identification of panoramic images associated with some points that meet a predetermined condition, among points that become target points during the predetermined period. 9. The information processing system according to claim 8, wherein the path information storage unit selects the some points on the basis of a characteristic, on the map, which is calculated from map data representing the map, and stores path information which allows for identification of panoramic images associated with the selected points. 10. An information processing apparatus capable of displaying, on a display device, a plurality of panoramic images associated with points on a map, the information processing apparatus comprising: a point determination unit configured to determine one of points on the map as a target point on the basis of an operation of a user; an image display unit configured to display, on the display device, an image of a partial area, determined in accordance with an operation of the user, of a panoramic image associated with the target point; a path information storage unit configured to store path information which allows for identification of two or more panoramic images of panoramic images displayed on the display device in accordance with the target point being moved during a predetermined period, and identification of a display order of the two or more panoramic images; and a transmission unit configured to transmit the path information to another information processing apparatus. 11. A computer-readable non-transitory storage medium having stored therein an information processing program executed by a computer of an information processing apparatus capable of displaying, on a display device, a plurality of panoramic images associated with points on a map, the information processing program causing the computer to execute: determining one of points on the map as a target point on the basis of an operation of a user; displaying, on the display device, an image of a partial area, determined in accordance with an operation of the user, of a panoramic image associated with the target point; storing, into a storage unit of the information processing apparatus, path information which allows for identification of two or more panoramic images of panoramic images displayed on the display device in accordance with the target point being moved during a predetermined period, and identification of a display order of the two or more panoramic images; and transmitting the path information to another information processing apparatus. 12. An information transmission/reception method executed in an information processing system comprising a plurality of information processing apparatuses each capable of displaying, on a display device, a plurality of panoramic images associated with points on a map, a transmission-side apparatus of the plurality of information processing apparatuses: determining one of points on the map as a target point on the basis of an operation of a user; displaying, on a first display device, an image of a partial area, corresponding to a line-of-sight direction determined in accordance with an operation of the user, of a panoramic image associated with the target point; and storing path information which allows for identification of two or more panoramic images of panoramic images associated with points on a path along which the target point is moved during a predetermined period, and identification of an order of the two or more panoramic images, a reception-side apparatus of the plurality of information processing apparatuses: acquiring the two or more panoramic images identified by the path information stored in the transmission-side apparatus; and displaying, on a second display device, the acquired two or more panoramic images in the order identified by the path information.
An example of an information processing system includes a plurality of information processing apparatuses each capable of displaying, on a display device, a plurality of panoramic images associated with points on a map. A transmission-side apparatus determines a target point on the basis of an operation of a user, and displays, on a first display device, an image of a partial area, corresponding to a line-of-sight direction determined in accordance with an operation of the user, of a panoramic image associated with the target point. The transmission-side apparatus stores path information regarding a path along which the target point is moved during a predetermined period. A reception-side apparatus acquires the two or more panoramic images identified by the path information stored in the transmission-side apparatus, and displays, on a second display device, the acquired two or more panoramic images in an order identified by the path information.1. An information processing system comprising a plurality of information processing apparatuses each capable of displaying, on a display device, a plurality of panoramic images associated with points on a map, a transmission-side apparatus of the plurality of information processing apparatuses comprising: a point determination unit configured to determine one of points on the map as a target point on the basis of an operation of a user; a first image display unit configured to display, on a first display device, an image of a partial area, corresponding to a line-of-sight direction determined in accordance with an operation of the user, of a panoramic image associated with the target point; and a path information storage unit configured to store path information which allows for identification of two or more panoramic images of panoramic images associated with points on a path along which the target point is moved during a predetermined period, and identification of an order of the two or more panoramic images, a reception-side apparatus of the plurality of information processing apparatuses comprising: a panoramic image acquisition unit configured to acquire the two or more panoramic images identified by the path information stored in the transmission-side apparatus; and a second image display unit configured to display, on a second display device, the acquired two or more panoramic images in the order identified by the path information. 2. The information processing system according to claim 1, further comprising a server capable of communicating with each information processing apparatus, wherein the transmission-side apparatus further comprises a transmission unit configured to transmit the stored path information to the server, the server stores the path information transmitted from the transmission-side apparatus, and the panoramic image acquisition unit acquires the panoramic images identified by the path information stored in the server. 3. The information processing system according to claim 2, wherein the transmission unit transmits, to the server, the path information with a message inputted by the user, and the server stores the message and first presentation information representing the path information, in a state where the message and the first presentation information are viewable by each information processing apparatus. 4. The information processing system according to claim 3, wherein the first presentation information is image information obtained from the panoramic image identified by the path information represented by the first presentation information. 5. The information processing system according to claim 2, wherein the transmission-side information processing apparatus further comprises an individual information storage unit configured to store individual point information which allows for identification of a panoramic image associated with one point designated by the user, the server generates first presentation information representing path information transmitted from one or more transmission-side apparatuses, for each path information, and generates second presentation information representing individual point information transmitted from one or more transmission-side apparatuses, for each individual point information, and the reception-side apparatus further comprises a list display section configured to: acquire the first presentation information from the server and display the first presentation information in a list on the second display device in accordance with a first instruction of a user; and acquire the second presentation information from the server and display the second presentation information in a list on the second display device in accordance with a second instruction of the user. 6. The information processing system according to claim 1, wherein, for each panoramic image identified by the path information, the path information storage unit stores path information including line-of-sight direction information indicating a line-of-sight direction determined on the basis of a line-of-sight direction when the panoramic image is displayed on the first display device. 7. The information processing system according to claim 6, wherein the second image display unit displays, on the second display device, an image of a partial area, determined on the basis of the line-of-sight direction information included in the path information, of the acquired panoramic image. 8. The information processing system according to claim 1, wherein the path information storage unit stores path information which allows for identification of panoramic images associated with some points that meet a predetermined condition, among points that become target points during the predetermined period. 9. The information processing system according to claim 8, wherein the path information storage unit selects the some points on the basis of a characteristic, on the map, which is calculated from map data representing the map, and stores path information which allows for identification of panoramic images associated with the selected points. 10. An information processing apparatus capable of displaying, on a display device, a plurality of panoramic images associated with points on a map, the information processing apparatus comprising: a point determination unit configured to determine one of points on the map as a target point on the basis of an operation of a user; an image display unit configured to display, on the display device, an image of a partial area, determined in accordance with an operation of the user, of a panoramic image associated with the target point; a path information storage unit configured to store path information which allows for identification of two or more panoramic images of panoramic images displayed on the display device in accordance with the target point being moved during a predetermined period, and identification of a display order of the two or more panoramic images; and a transmission unit configured to transmit the path information to another information processing apparatus. 11. A computer-readable non-transitory storage medium having stored therein an information processing program executed by a computer of an information processing apparatus capable of displaying, on a display device, a plurality of panoramic images associated with points on a map, the information processing program causing the computer to execute: determining one of points on the map as a target point on the basis of an operation of a user; displaying, on the display device, an image of a partial area, determined in accordance with an operation of the user, of a panoramic image associated with the target point; storing, into a storage unit of the information processing apparatus, path information which allows for identification of two or more panoramic images of panoramic images displayed on the display device in accordance with the target point being moved during a predetermined period, and identification of a display order of the two or more panoramic images; and transmitting the path information to another information processing apparatus. 12. An information transmission/reception method executed in an information processing system comprising a plurality of information processing apparatuses each capable of displaying, on a display device, a plurality of panoramic images associated with points on a map, a transmission-side apparatus of the plurality of information processing apparatuses: determining one of points on the map as a target point on the basis of an operation of a user; displaying, on a first display device, an image of a partial area, corresponding to a line-of-sight direction determined in accordance with an operation of the user, of a panoramic image associated with the target point; and storing path information which allows for identification of two or more panoramic images of panoramic images associated with points on a path along which the target point is moved during a predetermined period, and identification of an order of the two or more panoramic images, a reception-side apparatus of the plurality of information processing apparatuses: acquiring the two or more panoramic images identified by the path information stored in the transmission-side apparatus; and displaying, on a second display device, the acquired two or more panoramic images in the order identified by the path information.
2,400
7,206
7,206
14,369,322
2,416
A technique for status change handling in an interconnect node is described, wherein the node comprises a data plane that can assume, per service, a passive or active status. A method aspect in the node comprises transmitting, to another node, a first indication that a change has been or is about to be performed, awaiting, from the other node, reception of a second indication that the data plane in the other node has been set to the passive status, and activating, responsive to the received indication, the data plane of the node from the passive status to the active status. The method aspect in the other node further comprises receiving, from the node, the first indication, passivating, responsive to the receiving step, the data plane being in the active status to the passive status, and transmitting, upon completion of the passivating step, the second indication.
1-49. (canceled) 50. A method for status change handling in an interconnect node, wherein the interconnect node comprises a data plane, wherein the data plane in the interconnect node can assume, per service, one of a passive status and an active status, and wherein the method is performed in the interconnect node and comprises: receiving, from another node, a first indication that a change has been or is about to be performed; passivating the data plane, in response to receiving the first indication, by changing the data plane from active status to passive status; transmitting, upon completion of the passivating, a second indication of the passive status of the data plane to the other node. 51. The method of claim 50, wherein the interconnect node is a Distributed Resilient Network Interconnect (DRNI) node. 52. The method of claim 50, wherein the change is one of the following: a recovery of the interconnect node from a node fault; a topology change in a network; a configuration change in a network. 53. The method of claim 52, wherein the interconnect node further comprises a fault management state machine involving a Wait-to-Restore-Active (WTR-A) state of the node. 54. The method of claim 53, further comprising: in the WTR-A state, allowing passivation of the data plane to the passive status; and/or in the WTR-A state, not allowing the data plane to change to the active status. 55. The method of claim 53, wherein a WTR-A signal signals whether the node transits into or from the WTR-A state. 56. The method of claim 55, further comprising setting the WTR-A signal if there is a signal fail (SF) signal. 57. The method of claim 56, wherein the setting the WTR-A signal is performed responsive to a detection that one of a tunnel and a link associated with the node is down. 58. The method of claim 56, further comprising invalidating the WTR-A signal upon completion of passivating the data plane in the node to the passive status. 59. The method of claim 58, wherein the invalidating of the WTR-A signal is preceded by invalidation of a signal fail (SF) signal. 60. The method of claim 59, wherein the invalidating of the SF signal is performed responsive to detection that one of a tunnel and a link associated with the node is available. 61. The method of claim 55, further comprising signaling the WTR-A signal in a periodically received Physical Data Unit (PDU). 62. The method of claim 61, wherein the PDU is associated with at least one Continuity Check Message frame received by the node. 63. The method of claim 61, wherein the PDU is associated with one of Inter-Chassis Communication Protocol (ICCP), and Link Aggregation Control Protocol (LACP). 64. The method of claim 61, wherein the PDU is associated with a received status of external interface links of the node. 65. The method of claim 50, further comprising: a set of active services that are pre-set to be served in the active status; a set of passive services that are pre-set to be served in the passive status. 66. The method of claim 65, wherein the data plane is activated for both sets of services. 67. The method of claim 65, wherein the data plane is activated only for the set of active services. 68. The method of claim 65, wherein each service is described by one of a Virtual Local Area Network (VLAN) and a Service Interface Identifier (I-SID). 69. The method of claim 68, wherein a flag for the WTR-A signal in the one or more CCM frames is the second most significant bit of a Flags field of a common Connectivity Fault Management header. 70. A computer program product stored in a non-transitory computer readable medium for status change handling in an interconnect node, wherein the interconnect node comprises a data plane, wherein the data plane in the interconnect node can assume, per service, one of a passive status and an active status, the computer program product comprising software instructions which, when run on one or more computing devices of the interconnect node, causes the interconnect node to: receive, from another node, a first indication that a change has been or is about to be performed; passivate the data plane, in response to receiving the first indication, by changing the data plane from active status to passive status; transmit, upon completion of the passivation, a second indication of the passive status of the data plane to the other node. 71. A device for status change handling in an interconnect node, wherein the interconnect node comprises a data plane, wherein the data plane in the interconnect node can assume, per service, one of a passive status and an active status, the device comprising: at least one processor configured to: receive, from another node, a first indication that a change has been or is about to be performed; passivate the data plane, in response to receiving the first indication, by changing the data plane from the active status to the passive status; transmit, upon completion of the passivation, a second indication of the passive status of the data plane to the other node. 72. The device of claim 71, wherein the interconnect node is one of: a Provider Edge Bridge node; a Provider Backbone Edge Bridge node; a Virtual Private Local Area Network Service Provider Edge node. 73. A method for status change handling in an interconnect node, wherein the interconnect node comprises a data plane, wherein the data plane in the interconnect node can assume, per service, one of a passive status and an active status, and wherein the method is performed in the interconnect node and comprises: transmitting, to another node, a first indication that a change has been or is about to be performed; awaiting reception, from the other node, of a second indication that the data plane in the other node has been set to passive status; activating the data plane of the node, in response to receiving the second indication, by changing the data plane of the node from passive status to active status. 74. A device for status change handling in an interconnect node, wherein the interconnect node comprises a data plane, wherein the data plane in the interconnect node can assume, per service, one of a passive status and an active status, the device comprising: at least one processor configured to: transmit, to another node, a first indication that a change has been or is about to be performed; await reception, from the other node, of a second indication that the data plane in the other node has been set to passive status; activate the data plane of the node, in response to receiving the second indication, by changing the data plane of the node from passive status to active status.
A technique for status change handling in an interconnect node is described, wherein the node comprises a data plane that can assume, per service, a passive or active status. A method aspect in the node comprises transmitting, to another node, a first indication that a change has been or is about to be performed, awaiting, from the other node, reception of a second indication that the data plane in the other node has been set to the passive status, and activating, responsive to the received indication, the data plane of the node from the passive status to the active status. The method aspect in the other node further comprises receiving, from the node, the first indication, passivating, responsive to the receiving step, the data plane being in the active status to the passive status, and transmitting, upon completion of the passivating step, the second indication.1-49. (canceled) 50. A method for status change handling in an interconnect node, wherein the interconnect node comprises a data plane, wherein the data plane in the interconnect node can assume, per service, one of a passive status and an active status, and wherein the method is performed in the interconnect node and comprises: receiving, from another node, a first indication that a change has been or is about to be performed; passivating the data plane, in response to receiving the first indication, by changing the data plane from active status to passive status; transmitting, upon completion of the passivating, a second indication of the passive status of the data plane to the other node. 51. The method of claim 50, wherein the interconnect node is a Distributed Resilient Network Interconnect (DRNI) node. 52. The method of claim 50, wherein the change is one of the following: a recovery of the interconnect node from a node fault; a topology change in a network; a configuration change in a network. 53. The method of claim 52, wherein the interconnect node further comprises a fault management state machine involving a Wait-to-Restore-Active (WTR-A) state of the node. 54. The method of claim 53, further comprising: in the WTR-A state, allowing passivation of the data plane to the passive status; and/or in the WTR-A state, not allowing the data plane to change to the active status. 55. The method of claim 53, wherein a WTR-A signal signals whether the node transits into or from the WTR-A state. 56. The method of claim 55, further comprising setting the WTR-A signal if there is a signal fail (SF) signal. 57. The method of claim 56, wherein the setting the WTR-A signal is performed responsive to a detection that one of a tunnel and a link associated with the node is down. 58. The method of claim 56, further comprising invalidating the WTR-A signal upon completion of passivating the data plane in the node to the passive status. 59. The method of claim 58, wherein the invalidating of the WTR-A signal is preceded by invalidation of a signal fail (SF) signal. 60. The method of claim 59, wherein the invalidating of the SF signal is performed responsive to detection that one of a tunnel and a link associated with the node is available. 61. The method of claim 55, further comprising signaling the WTR-A signal in a periodically received Physical Data Unit (PDU). 62. The method of claim 61, wherein the PDU is associated with at least one Continuity Check Message frame received by the node. 63. The method of claim 61, wherein the PDU is associated with one of Inter-Chassis Communication Protocol (ICCP), and Link Aggregation Control Protocol (LACP). 64. The method of claim 61, wherein the PDU is associated with a received status of external interface links of the node. 65. The method of claim 50, further comprising: a set of active services that are pre-set to be served in the active status; a set of passive services that are pre-set to be served in the passive status. 66. The method of claim 65, wherein the data plane is activated for both sets of services. 67. The method of claim 65, wherein the data plane is activated only for the set of active services. 68. The method of claim 65, wherein each service is described by one of a Virtual Local Area Network (VLAN) and a Service Interface Identifier (I-SID). 69. The method of claim 68, wherein a flag for the WTR-A signal in the one or more CCM frames is the second most significant bit of a Flags field of a common Connectivity Fault Management header. 70. A computer program product stored in a non-transitory computer readable medium for status change handling in an interconnect node, wherein the interconnect node comprises a data plane, wherein the data plane in the interconnect node can assume, per service, one of a passive status and an active status, the computer program product comprising software instructions which, when run on one or more computing devices of the interconnect node, causes the interconnect node to: receive, from another node, a first indication that a change has been or is about to be performed; passivate the data plane, in response to receiving the first indication, by changing the data plane from active status to passive status; transmit, upon completion of the passivation, a second indication of the passive status of the data plane to the other node. 71. A device for status change handling in an interconnect node, wherein the interconnect node comprises a data plane, wherein the data plane in the interconnect node can assume, per service, one of a passive status and an active status, the device comprising: at least one processor configured to: receive, from another node, a first indication that a change has been or is about to be performed; passivate the data plane, in response to receiving the first indication, by changing the data plane from the active status to the passive status; transmit, upon completion of the passivation, a second indication of the passive status of the data plane to the other node. 72. The device of claim 71, wherein the interconnect node is one of: a Provider Edge Bridge node; a Provider Backbone Edge Bridge node; a Virtual Private Local Area Network Service Provider Edge node. 73. A method for status change handling in an interconnect node, wherein the interconnect node comprises a data plane, wherein the data plane in the interconnect node can assume, per service, one of a passive status and an active status, and wherein the method is performed in the interconnect node and comprises: transmitting, to another node, a first indication that a change has been or is about to be performed; awaiting reception, from the other node, of a second indication that the data plane in the other node has been set to passive status; activating the data plane of the node, in response to receiving the second indication, by changing the data plane of the node from passive status to active status. 74. A device for status change handling in an interconnect node, wherein the interconnect node comprises a data plane, wherein the data plane in the interconnect node can assume, per service, one of a passive status and an active status, the device comprising: at least one processor configured to: transmit, to another node, a first indication that a change has been or is about to be performed; await reception, from the other node, of a second indication that the data plane in the other node has been set to passive status; activate the data plane of the node, in response to receiving the second indication, by changing the data plane of the node from passive status to active status.
2,400
7,207
7,207
14,170,404
2,454
In one implementation, a cloud orchestration system can comprise a solution engine, a configuration engine, and an implementation engine. The solution engine can receive an implementation selection of a service. The implementation selection can be based on a plurality of implementations of a cloud to provide the service. The configuration engine can obtain configuration information associated with the implementation selection. The implementation engine can communicate with an endpoint of the service based on the implementation selection and the configuration information. In another implementation, a method for orchestration of a cloud can comprise receiving an implementation selection for a solution of a service, collecting configuration information associated with the implementation selection, instantiating the solution based on the implementation selection and the configuration information, and providing connection information associated with the solution.
1. A cloud orchestration system comprising: a solution engine to receive an implementation selection of a service, the implementation selection based on a plurality of implementations of a cloud to provide the service; a configuration engine to obtain configuration information associated with the implementation selection; and an implementation engine to communicate with an endpoint of the service based on the implementation selection and the configuration information, the service to allocate a resource of the cloud based on the configuration information and the implementation selection. 2. The cloud orchestration system of claim 1, wherein the implementation engine causes the resource to be allocated to the service via an interface based on the cloud service model of the implementation selection. 3. The cloud orchestration system of claim 2, wherein the implementation engine causes a set of specifications and parameters to be passed via the interface of the service based on the configuration information, the interface being an application programming interface. 4. The cloud orchestration system of claim 1, wherein the solution engine contains a plurality of solution categories having commonality among service models based on interlace information aggregated from an interface gathering system. 5. The cloud orchestration system of claim 1, wherein the configuration engine obtains configuration information from at least one of a set of configuration questions to ask a user and a set of predefined defaults associated with the implementation selection. 6. A computer readable medium comprising a set of instructions executable by a processor resource to: cause an implementation of a service to be presented for selection based on availability of the implementation for the service, the service to be provisioned by a cloud configurable into a plurality of cloud service models; obtain configuration information associated with the implementation; and communicate with an endpoint of the service to allocate a resource of the cloud based on the implementation and the configuration information. 7. The medium of claim 6, wherein the set of instructions is executable by the processor resource to: identify the endpoint to communicate with based on a set of information collected, the set of information collected to include a selected implementation and the configuration information. 8. The medium of claim 7, herein the set of instructions is executable by the processor resource to: retrieve an application programming interface (“API”) from an interface gathering system; and allocate a resource via the API based on the configuration information. 9. The medium of claim 8, wherein the set of instructions is executable by the processor resource to: place the configuration information into a configuration payload accessible the service; and send the configuration payload to the endpoint. 10. The medium of claim 8, wherein the configuration payload is one of: a virtual machine image based on the configuration information; a set of parameters based on the configuration information; and a template file based on the configuration information. 11. A method for orchestration of a cloud comprising: receiving an implementation selection for a solution of a service to be executed on the cloud, the cloud configurable to provide the service via a plurality of cloud service models; collecting configuration information ration associated with the implementation selection; instantiating the solution based on the implementation selection and the configuration information; and providing connection information associated with the solution executed on the cloud to provide the service. 12. The method of claim 11, comprising identifying an implementation is available for the solution; and causing a number of available implementations to be presented for the solution. 13. The method of claim 11, comprising configuring the cloud via an application programming interface (“API”) based on the configuration information. 14. The method of claim 11, comprising causing a request for the configuration information to present to a user; and maintaining a configuration payload based on the configuration information. 15. The method of claim 14, comprising allocating a resource to the service; and configuring the resource based on the configuration payload.
In one implementation, a cloud orchestration system can comprise a solution engine, a configuration engine, and an implementation engine. The solution engine can receive an implementation selection of a service. The implementation selection can be based on a plurality of implementations of a cloud to provide the service. The configuration engine can obtain configuration information associated with the implementation selection. The implementation engine can communicate with an endpoint of the service based on the implementation selection and the configuration information. In another implementation, a method for orchestration of a cloud can comprise receiving an implementation selection for a solution of a service, collecting configuration information associated with the implementation selection, instantiating the solution based on the implementation selection and the configuration information, and providing connection information associated with the solution.1. A cloud orchestration system comprising: a solution engine to receive an implementation selection of a service, the implementation selection based on a plurality of implementations of a cloud to provide the service; a configuration engine to obtain configuration information associated with the implementation selection; and an implementation engine to communicate with an endpoint of the service based on the implementation selection and the configuration information, the service to allocate a resource of the cloud based on the configuration information and the implementation selection. 2. The cloud orchestration system of claim 1, wherein the implementation engine causes the resource to be allocated to the service via an interface based on the cloud service model of the implementation selection. 3. The cloud orchestration system of claim 2, wherein the implementation engine causes a set of specifications and parameters to be passed via the interface of the service based on the configuration information, the interface being an application programming interface. 4. The cloud orchestration system of claim 1, wherein the solution engine contains a plurality of solution categories having commonality among service models based on interlace information aggregated from an interface gathering system. 5. The cloud orchestration system of claim 1, wherein the configuration engine obtains configuration information from at least one of a set of configuration questions to ask a user and a set of predefined defaults associated with the implementation selection. 6. A computer readable medium comprising a set of instructions executable by a processor resource to: cause an implementation of a service to be presented for selection based on availability of the implementation for the service, the service to be provisioned by a cloud configurable into a plurality of cloud service models; obtain configuration information associated with the implementation; and communicate with an endpoint of the service to allocate a resource of the cloud based on the implementation and the configuration information. 7. The medium of claim 6, wherein the set of instructions is executable by the processor resource to: identify the endpoint to communicate with based on a set of information collected, the set of information collected to include a selected implementation and the configuration information. 8. The medium of claim 7, herein the set of instructions is executable by the processor resource to: retrieve an application programming interface (“API”) from an interface gathering system; and allocate a resource via the API based on the configuration information. 9. The medium of claim 8, wherein the set of instructions is executable by the processor resource to: place the configuration information into a configuration payload accessible the service; and send the configuration payload to the endpoint. 10. The medium of claim 8, wherein the configuration payload is one of: a virtual machine image based on the configuration information; a set of parameters based on the configuration information; and a template file based on the configuration information. 11. A method for orchestration of a cloud comprising: receiving an implementation selection for a solution of a service to be executed on the cloud, the cloud configurable to provide the service via a plurality of cloud service models; collecting configuration information ration associated with the implementation selection; instantiating the solution based on the implementation selection and the configuration information; and providing connection information associated with the solution executed on the cloud to provide the service. 12. The method of claim 11, comprising identifying an implementation is available for the solution; and causing a number of available implementations to be presented for the solution. 13. The method of claim 11, comprising configuring the cloud via an application programming interface (“API”) based on the configuration information. 14. The method of claim 11, comprising causing a request for the configuration information to present to a user; and maintaining a configuration payload based on the configuration information. 15. The method of claim 14, comprising allocating a resource to the service; and configuring the resource based on the configuration payload.
2,400
7,208
7,208
14,154,412
2,451
Disclosed is a system and method for creation of a SIP session between a controlling endpoint and a controlled endpoint. The SIP shared control mechanism sets up a first party control channel between a softclient acting as a CTI application and a controlled endpoint. The use of labels associated with multiple controlled endpoints associated with a user are utilized.
1. A method for establishing a session initiation protocol shared control channel between a first endpoint and a plurality of second endpoints associated with a user, said method comprising: providing a label and shared control support information corresponding to each of said plurality of second endpoints in a Contact header of a REGISTER message to a session initiation protocol registrar; saving each of said labels and shared control support information in association with a registered contact address of said second endpoint; via said first endpoint, reading each of said labels and shared control support information from a registration event NOTIFY message; and creating a shared control session and presenting said labels of said plurality of second endpoints to said user enabling said user to select one of said plurality of endpoints. 2. The method of claim 1, wherein said first endpoint is a controlling endpoint. 3. The method of claim 1, wherein said plurality of second endpoints are a plurality of controllable endpoints. 4. The method of claim 1, wherein said first endpoint is a softclient application. 5. The method of claim 1, said method further comprising, via said first endpoint, subscribing for a registration event package. 6. A method for establishing a session initiation protocol shared control channel between a first endpoint and a plurality of second endpoints associated with a user, said method comprising: sending a shared control INVITE request with a Request-URI set to an address of record of a user, said INVITE request comprising an indication of a desired protocol for said shared control session; by a proxy server. Receiving said INVITE request; by said proxy server, determining a list of registered contacts associated with said address of record; by said proxy server, selecting from said list one or more of said contacts that support indicated shared control protocol; and by said proxy server, forking said INVITE request to said selected contacts. 7. A method for establishing a session initiation protocol shared control channel between a controlling application and an endpoint, said endpoint comprising one of a plurality of controllable devices, said method comprising: at said controlling application, receiving a session initiation protocol registration event notification; at said controlling application, detecting which or one or more registered controllable devices are compatible for a shared control session; sending a separate INVITE request for each controllable device that is deemed compatible; and at said endpoint, enabling control by a user of said endpoint. 8. The method of claim 7, said method further comprising: presenting a list of controllable devices to said user. 9. The method of claim 7, wherein a Request-URI of each of said separate INVITE requests uniquely identifies a registered controllable device and said INVITE request is routed by said proxy server using session initiation protocol routing logic. 10. A system for establishing a session initiation protocol shared control channel, said system comprising: a controlling endpoint; and a plurality of controlled endpoints associated with an end user; wherein said controlling endpoint is enabled to subscribe to a registration event package, read labels corresponding to said plurality of controlled endpoints from a registration event NOTIFY message, and present said labels to the end user in connection with a shared control SIP session. 11. The system of claim 10, wherein said controlling endpoint is a softclient. 12. The system of claim 10, said wherein each of said plurality of controlled endpoints are enabled to prompt said user for entry of a label and provide said label in a display name portion of a Contact header of a REGISTER message to an SIP registrar.
Disclosed is a system and method for creation of a SIP session between a controlling endpoint and a controlled endpoint. The SIP shared control mechanism sets up a first party control channel between a softclient acting as a CTI application and a controlled endpoint. The use of labels associated with multiple controlled endpoints associated with a user are utilized.1. A method for establishing a session initiation protocol shared control channel between a first endpoint and a plurality of second endpoints associated with a user, said method comprising: providing a label and shared control support information corresponding to each of said plurality of second endpoints in a Contact header of a REGISTER message to a session initiation protocol registrar; saving each of said labels and shared control support information in association with a registered contact address of said second endpoint; via said first endpoint, reading each of said labels and shared control support information from a registration event NOTIFY message; and creating a shared control session and presenting said labels of said plurality of second endpoints to said user enabling said user to select one of said plurality of endpoints. 2. The method of claim 1, wherein said first endpoint is a controlling endpoint. 3. The method of claim 1, wherein said plurality of second endpoints are a plurality of controllable endpoints. 4. The method of claim 1, wherein said first endpoint is a softclient application. 5. The method of claim 1, said method further comprising, via said first endpoint, subscribing for a registration event package. 6. A method for establishing a session initiation protocol shared control channel between a first endpoint and a plurality of second endpoints associated with a user, said method comprising: sending a shared control INVITE request with a Request-URI set to an address of record of a user, said INVITE request comprising an indication of a desired protocol for said shared control session; by a proxy server. Receiving said INVITE request; by said proxy server, determining a list of registered contacts associated with said address of record; by said proxy server, selecting from said list one or more of said contacts that support indicated shared control protocol; and by said proxy server, forking said INVITE request to said selected contacts. 7. A method for establishing a session initiation protocol shared control channel between a controlling application and an endpoint, said endpoint comprising one of a plurality of controllable devices, said method comprising: at said controlling application, receiving a session initiation protocol registration event notification; at said controlling application, detecting which or one or more registered controllable devices are compatible for a shared control session; sending a separate INVITE request for each controllable device that is deemed compatible; and at said endpoint, enabling control by a user of said endpoint. 8. The method of claim 7, said method further comprising: presenting a list of controllable devices to said user. 9. The method of claim 7, wherein a Request-URI of each of said separate INVITE requests uniquely identifies a registered controllable device and said INVITE request is routed by said proxy server using session initiation protocol routing logic. 10. A system for establishing a session initiation protocol shared control channel, said system comprising: a controlling endpoint; and a plurality of controlled endpoints associated with an end user; wherein said controlling endpoint is enabled to subscribe to a registration event package, read labels corresponding to said plurality of controlled endpoints from a registration event NOTIFY message, and present said labels to the end user in connection with a shared control SIP session. 11. The system of claim 10, wherein said controlling endpoint is a softclient. 12. The system of claim 10, said wherein each of said plurality of controlled endpoints are enabled to prompt said user for entry of a label and provide said label in a display name portion of a Contact header of a REGISTER message to an SIP registrar.
2,400
7,209
7,209
12,748,416
2,486
A system for detecting and recording real-time law violations having an array of wide and narrow angled cameras providing a plurality of images of a substantially 360° field of view around a law enforcement unit, a recording unit for recording said images, an analyzing unit for detecting a law violation, a permanent storage unit for permanently storing a plurality of images of a law violation event and a reporting unit for issuing citations.
1. A system for detecting and recording real-time law violations, the system comprising: a. an array of cameras providing a plurality of images of a substantially 360° field of view around a law enforcement unit; b. a recording unit for recording said plurality of images from said array of cameras; and c. an analyzing unit for analyzing said plurality of images so as to detect a law violation event. 2. A system of claim 1 wherein said array of cameras includes: i. at least 4 wide angled cameras positioned to view primary relative directions, providing a substantially 360° field of view for detecting an object within said field of view; and ii. at least one narrow angled camera operable to rotate in order to provide a plurality of close up images of at least one identification feature of said detected object. 3. A system of claim 1 further consisting of: d. a permanent storage unit for permanently storing a plurality of images identified by said analyzing unit as representing a law violation event. 4. A system of claim 1 wherein the law enforcement unit is selected from a group consisting: a. a permanently fixed law enforcement unit b. a vehicular law enforcement unit; and c. a transportable law enforcement unit. 5. A system of claim 2 wherein said object is selected from a group consisting: a. a vehicle; and b. a person. 6. A system of claim 2 wherein said at least one identification feature is selected from the group consisting: i. a license plate; ii. a vehicle model; iii. a vehicle color; and iv. a face. 7. A system of claim 1 wherein said recording unit is further configured to record data, for use as evidentiary material, selected from the group consisting of: i. current speed of the law enforcement unit; ii. geographical location of the law enforcement unit; iii. current date; and iv. current time. 8. A system of claim 1 further consisting of: d. a reporting unit, wherein said reporting unit is operable to report said detected law violation, said reporting unit being selected from the group consisting of: i. a local citation issuing unit; and ii. a remote citation issuing unit. 9. A system of claim 2 wherein said wide angled cameras are fixedly mounted on the law enforcement unit. 10. A system of claim 2 wherein said wide angled cameras are fixedly mounted in the law enforcement unit. 11. A method for recognition of a law violation including the steps of: a. acquiring a plurality of images; b. recognizing a law violation by comparing a set of features from said plurality of images with a set of predefined rules for the law violation; and c. taking a legal action against a perpetrator of the law violation. 12. A method of claim 1 further including the step of: d. storing a set of identification features of a law violating object from said plurality of images for identification of said violating object. 13. A method of claim 12 wherein said law violating object is a vehicle. 14. A method of claim 12 wherein said law violating object is a person. 15. A method of claim 12 wherein said set of identification features is selected from the group consisting: i. a license plate; ii. a vehicle model; iii. a vehicle color; and iv. a face. 16. A method of claim 11 wherein said law violation is selected from the group of: i. an illegal changing of lanes; ii. illegally overtaking a second vehicle; and iii. tailgating. 17. A method of claim 16 wherein said illegal changing of lanes includes changing lanes without prior indication of a turn signal. 18. A method of claim 16 wherein said illegal changing of lanes includes changing lanes across a solid line. 19. A method of claim 11 wherein said legal action is effected by a local unit. 20. A method of claim 11 wherein said legal action is effected by a remote unit. 21. A mechanism including: a. at least one wide-angled camera for providing a plurality of images; b. a processor for processing said plurality of images so as to determine a region of interest; and c. at least one narrow angled camera operationally coupled to said processor operable to rotate in order to provide a plurality of higher quality images of said determined region of interest. 22. A mechanism of claim 21 wherein said wide angled camera is operationally coupled to said narrow angled camera, further configured to provide a wide angled image for every narrow angled image, where said wide angled image is captured at substantially the same time as said narrow angled image.
A system for detecting and recording real-time law violations having an array of wide and narrow angled cameras providing a plurality of images of a substantially 360° field of view around a law enforcement unit, a recording unit for recording said images, an analyzing unit for detecting a law violation, a permanent storage unit for permanently storing a plurality of images of a law violation event and a reporting unit for issuing citations.1. A system for detecting and recording real-time law violations, the system comprising: a. an array of cameras providing a plurality of images of a substantially 360° field of view around a law enforcement unit; b. a recording unit for recording said plurality of images from said array of cameras; and c. an analyzing unit for analyzing said plurality of images so as to detect a law violation event. 2. A system of claim 1 wherein said array of cameras includes: i. at least 4 wide angled cameras positioned to view primary relative directions, providing a substantially 360° field of view for detecting an object within said field of view; and ii. at least one narrow angled camera operable to rotate in order to provide a plurality of close up images of at least one identification feature of said detected object. 3. A system of claim 1 further consisting of: d. a permanent storage unit for permanently storing a plurality of images identified by said analyzing unit as representing a law violation event. 4. A system of claim 1 wherein the law enforcement unit is selected from a group consisting: a. a permanently fixed law enforcement unit b. a vehicular law enforcement unit; and c. a transportable law enforcement unit. 5. A system of claim 2 wherein said object is selected from a group consisting: a. a vehicle; and b. a person. 6. A system of claim 2 wherein said at least one identification feature is selected from the group consisting: i. a license plate; ii. a vehicle model; iii. a vehicle color; and iv. a face. 7. A system of claim 1 wherein said recording unit is further configured to record data, for use as evidentiary material, selected from the group consisting of: i. current speed of the law enforcement unit; ii. geographical location of the law enforcement unit; iii. current date; and iv. current time. 8. A system of claim 1 further consisting of: d. a reporting unit, wherein said reporting unit is operable to report said detected law violation, said reporting unit being selected from the group consisting of: i. a local citation issuing unit; and ii. a remote citation issuing unit. 9. A system of claim 2 wherein said wide angled cameras are fixedly mounted on the law enforcement unit. 10. A system of claim 2 wherein said wide angled cameras are fixedly mounted in the law enforcement unit. 11. A method for recognition of a law violation including the steps of: a. acquiring a plurality of images; b. recognizing a law violation by comparing a set of features from said plurality of images with a set of predefined rules for the law violation; and c. taking a legal action against a perpetrator of the law violation. 12. A method of claim 1 further including the step of: d. storing a set of identification features of a law violating object from said plurality of images for identification of said violating object. 13. A method of claim 12 wherein said law violating object is a vehicle. 14. A method of claim 12 wherein said law violating object is a person. 15. A method of claim 12 wherein said set of identification features is selected from the group consisting: i. a license plate; ii. a vehicle model; iii. a vehicle color; and iv. a face. 16. A method of claim 11 wherein said law violation is selected from the group of: i. an illegal changing of lanes; ii. illegally overtaking a second vehicle; and iii. tailgating. 17. A method of claim 16 wherein said illegal changing of lanes includes changing lanes without prior indication of a turn signal. 18. A method of claim 16 wherein said illegal changing of lanes includes changing lanes across a solid line. 19. A method of claim 11 wherein said legal action is effected by a local unit. 20. A method of claim 11 wherein said legal action is effected by a remote unit. 21. A mechanism including: a. at least one wide-angled camera for providing a plurality of images; b. a processor for processing said plurality of images so as to determine a region of interest; and c. at least one narrow angled camera operationally coupled to said processor operable to rotate in order to provide a plurality of higher quality images of said determined region of interest. 22. A mechanism of claim 21 wherein said wide angled camera is operationally coupled to said narrow angled camera, further configured to provide a wide angled image for every narrow angled image, where said wide angled image is captured at substantially the same time as said narrow angled image.
2,400
7,210
7,210
15,046,958
2,424
Techniques to allow advertising or other secondary content to be dismissed for later follow up are disclosed. In various embodiments, a user input associated with dismissing a displayed content for later follow up is received. Display of the content item discontinued and a follow up record is stored based at least in part on the indication. The follow up record is used to provide to a user with which the user input is associated a follow up content associated with the dismissed content.
1. A system comprising: a memory device; and a processor coupled to the memory device and configured to: receive from a user device via a network an indication to display the previously dismissed content; cause to be displayed on the user device a list of the previously dismissed content; track user engagement with the list; and perform a responsive action based at least in part on the tracked user engagement. 2. The system of claim 1, wherein user engagement includes at least one of deleting previously dismissed content from the list without viewing further information, viewing the previously dismissed content for period of time, selecting a content of the previously dismissed content, interacting with the previously dismissed content, and clicking through to a website of a content provider associated with the previously dismissed content. 3. The system of claim 1, wherein the processor is further configured to store data associated with the tracked user engagement. 4. The system of claim 1, wherein to perform a responsive action, the processor is further configured to: generate a sales record; and send the sales record to a content provider. 5. The system of claim 1, wherein to perform a responsive action, the processor is further configured to provide a control to be displayed on the user device that when selected, enables a contact provider to contact the user. 6. The system of claim 1, wherein to perform a responsive action, the processor is further configured to send contact information associated with the user device to a content provider. 7. The system of claim 1, wherein the processor is further configured to: receive an indication of the user engagement with a content of the previously dismissed content; and store data associated with the user engagement. 8. The system of claim 7, wherein the processor is further configured to: accumulate the data associated with the user engagement until report generation criteria is met; and send the accumulated data to a content provider in the event the report generation criteria is met. 9. The system of claim 8, wherein the report generation criteria includes receiving a selection of an option to be contacted by the content provider. 10. The system of claim 8, wherein the report generation criteria includes a user associated with the user device accessing other content associated with the content provider. 11. The system of claim 8, wherein the report generation criteria includes a user associated with the user device beginning but not completing a transaction with the content provider. 12. The system of claim 1, wherein the previously dismissed content was previously displayed on the user device and dismissed by a user input. 13. The system of claim 12, wherein the user input comprises a dismiss and follow up gesture is entered via a touchscreen. 14. The system of claim 1, wherein the previously dismissed content includes follow up content. 15. The system of claim 14, wherein the follow up content includes content other than or in addition to the previously dismissed content. 16. A method of providing access to previously dismissed content, comprising: receiving from a user device via a network an indication to display the previously dismissed content; causing to be displayed on the user device a list of the previously dismissed content; tracking user engagement with the list; and performing a responsive action based at least in part on the tracked user engagement. 17. The method of claim 16, wherein user engagement includes at least one of deleting previously dismissed content from the list without viewing further information, viewing the previously dismissed content for period of time, selecting a content of the previously dismissed content, interacting with the previously dismissed content, and clicking through to a website of a content provider associated with the previously dismissed content. 18. The method of claim 16, further comprising storing data associated with the tracked user engagement. 19. The method of claim 16, further comprising providing a control to be displayed on the user device that when selected, enables a contact provider to contact the user. 20. A computer program product embodied in a non-transitory computer readable storage medium and comprising computer instructions for: receiving from a user device via a network an indication to display the previously dismissed content; causing to be displayed on the user device a list of the previously dismissed content; tracking user engagement with the list; and performing a responsive action based at least in part on the tracked user engagement.
Techniques to allow advertising or other secondary content to be dismissed for later follow up are disclosed. In various embodiments, a user input associated with dismissing a displayed content for later follow up is received. Display of the content item discontinued and a follow up record is stored based at least in part on the indication. The follow up record is used to provide to a user with which the user input is associated a follow up content associated with the dismissed content.1. A system comprising: a memory device; and a processor coupled to the memory device and configured to: receive from a user device via a network an indication to display the previously dismissed content; cause to be displayed on the user device a list of the previously dismissed content; track user engagement with the list; and perform a responsive action based at least in part on the tracked user engagement. 2. The system of claim 1, wherein user engagement includes at least one of deleting previously dismissed content from the list without viewing further information, viewing the previously dismissed content for period of time, selecting a content of the previously dismissed content, interacting with the previously dismissed content, and clicking through to a website of a content provider associated with the previously dismissed content. 3. The system of claim 1, wherein the processor is further configured to store data associated with the tracked user engagement. 4. The system of claim 1, wherein to perform a responsive action, the processor is further configured to: generate a sales record; and send the sales record to a content provider. 5. The system of claim 1, wherein to perform a responsive action, the processor is further configured to provide a control to be displayed on the user device that when selected, enables a contact provider to contact the user. 6. The system of claim 1, wherein to perform a responsive action, the processor is further configured to send contact information associated with the user device to a content provider. 7. The system of claim 1, wherein the processor is further configured to: receive an indication of the user engagement with a content of the previously dismissed content; and store data associated with the user engagement. 8. The system of claim 7, wherein the processor is further configured to: accumulate the data associated with the user engagement until report generation criteria is met; and send the accumulated data to a content provider in the event the report generation criteria is met. 9. The system of claim 8, wherein the report generation criteria includes receiving a selection of an option to be contacted by the content provider. 10. The system of claim 8, wherein the report generation criteria includes a user associated with the user device accessing other content associated with the content provider. 11. The system of claim 8, wherein the report generation criteria includes a user associated with the user device beginning but not completing a transaction with the content provider. 12. The system of claim 1, wherein the previously dismissed content was previously displayed on the user device and dismissed by a user input. 13. The system of claim 12, wherein the user input comprises a dismiss and follow up gesture is entered via a touchscreen. 14. The system of claim 1, wherein the previously dismissed content includes follow up content. 15. The system of claim 14, wherein the follow up content includes content other than or in addition to the previously dismissed content. 16. A method of providing access to previously dismissed content, comprising: receiving from a user device via a network an indication to display the previously dismissed content; causing to be displayed on the user device a list of the previously dismissed content; tracking user engagement with the list; and performing a responsive action based at least in part on the tracked user engagement. 17. The method of claim 16, wherein user engagement includes at least one of deleting previously dismissed content from the list without viewing further information, viewing the previously dismissed content for period of time, selecting a content of the previously dismissed content, interacting with the previously dismissed content, and clicking through to a website of a content provider associated with the previously dismissed content. 18. The method of claim 16, further comprising storing data associated with the tracked user engagement. 19. The method of claim 16, further comprising providing a control to be displayed on the user device that when selected, enables a contact provider to contact the user. 20. A computer program product embodied in a non-transitory computer readable storage medium and comprising computer instructions for: receiving from a user device via a network an indication to display the previously dismissed content; causing to be displayed on the user device a list of the previously dismissed content; tracking user engagement with the list; and performing a responsive action based at least in part on the tracked user engagement.
2,400
7,211
7,211
14,058,423
2,425
A video surveillance system is set up, calibrated, tasked, and operated. The system extracts video primitives and extracts even occurrences from the video primitives using event discriminators. The extracted video primitives and event occurrences may be used to create and define additional video analytic rules. The system can undertake a response, such as an alarm, based on extracted event occurrences.
1. An event detection method, comprising: processing a first video portion to track an object in the first video portion; using, at least in part, the tracking of the object in the first video portion to create a first rule; and configuring a video surveillance system to detect an event in a second video portion using the first ride. 2. The method of claim 1, wherein tracking the object comprises tracking a human object in the first video portion. 3. The method of claim 1, wherein tracking the object comprises tracking a vehicle in the first video portion. 4. The method of claim 1, wherein tracking the object comprises tracking an emitter. 5. The method of claim 4, wherein tracking the object comprises outputting a radio frequency by the emitter. 6. The method of claim 4, wherein tracking the object comprises emitting location information. 7. The method of claim 4, wherein tracking the object comprises emitting GPS information. 8. The method, of claim 1, wherein creating the first rule comprises determining an area of interest based on tracking the object. 9. The method of claim 8, further comprising creating the first rule to detect an object that enters the area of interest. 10. The method of claim 8, further comprising creating the first rule to detect a specific object that enters the area of interest. 11. The method of claim 10, wherein creating the first rule to detect the specific object that enters the area of interest comprises specifying a type of object with a user interface. 12. The method of claim 8, further comprising creating the first rule to detect loitering within the area of interest. 13. The method of claim 8, further comprising creating the first rule to detect an object that leaves the area of interest. 14. The method of claim 1, wherein creating the first rule comprises determining a location of a tripwire. 15. The method of claim 14, wherein creating the first rule comprises determining end points of the tripwire. 16. The method of claim 15, wherein determining an end point of the tripwire comprises detecting that the object has stopped when tracking the object. 17. The method of claim 14. further comprising creating the first rule to detect people entering a space. 18. The method of claim 14, further comprising detecting an orientation of the object. 19. The method of claim 18, wherein creating the first rule comprises determining a direction of the tripwire using the orientation of the object. 20. The method of claim 1, further comprising detecting an orientation of the object, wherein creating the first rule uses the detected orientation of the object. 21. The method of claim 1, further comprising detecting that the object has stopped, wherein creating the first rule is responsive to the detection that the object has stopped. 22. The method of claim 1, further comprising putting the video surveillance system into a configuration mode, wherein tracking the object comprises tracking the object with the video surveillance system in the configuration mode. 23. The method of claim 22, wherein putting the video surveillance system into a configuration mode comprises use of a button, switch or remote control. 24. The method of claim 1, wherein tracking, the object comprises tracking a tracker pattern in the first video portion. 25. The method of claim 1, wherein tracking the object comprises tracking a fiducial mark in the first video portion. 26. The method of claim 1, further comprising tracking a path of the object in the first video portion and using the path at least in part, in creating the first rule. 27. The method of claim 1, further comprising tracking a speed of the object in the first video portion and using the tracked speed, at least in part, in creating the first rule. 28. The method of claim 1, further comprising detecting an event by analyzing the second video portion, at least in part, using the first rule. 29. An event detection method, comprising: tracking an object in a first video portion with an emitter; using, at least in part, the tracking of the object in the first video portion to create a first rule; and configuring a video surveillance system to detect an event in a second video portion using the first rule. 30. The method of claim 29, wherein tracking the object comprises outputting a radio frequency by the emitter. 31. The method of claim 29, wherein tracking the object comprises emitting location information. 32. The method of claim 29, wherein tracking the object comprises emitting GPS information. 33. A computer program product residing on a non-transitory computer readable medium having a plurality of instructions stored thereon, which, when executed by a processor, cause the processor to perform operations comprising: processing a first video portion to track an object in the first video portion; using, at least in part, the tracking, of the object in the first video portion to create a first rule; and configuring a video surveillance system to detect an event in a second video portion using the first rule. 34. An event detection system, comprising: processing a first video portion to track an object in the first video portion; using, at least in part, the tracking of the object in the first video portion to create a first rule; and configuring a video surveillance system to detect an event in a second video portion using the first rule.
A video surveillance system is set up, calibrated, tasked, and operated. The system extracts video primitives and extracts even occurrences from the video primitives using event discriminators. The extracted video primitives and event occurrences may be used to create and define additional video analytic rules. The system can undertake a response, such as an alarm, based on extracted event occurrences.1. An event detection method, comprising: processing a first video portion to track an object in the first video portion; using, at least in part, the tracking of the object in the first video portion to create a first rule; and configuring a video surveillance system to detect an event in a second video portion using the first ride. 2. The method of claim 1, wherein tracking the object comprises tracking a human object in the first video portion. 3. The method of claim 1, wherein tracking the object comprises tracking a vehicle in the first video portion. 4. The method of claim 1, wherein tracking the object comprises tracking an emitter. 5. The method of claim 4, wherein tracking the object comprises outputting a radio frequency by the emitter. 6. The method of claim 4, wherein tracking the object comprises emitting location information. 7. The method of claim 4, wherein tracking the object comprises emitting GPS information. 8. The method, of claim 1, wherein creating the first rule comprises determining an area of interest based on tracking the object. 9. The method of claim 8, further comprising creating the first rule to detect an object that enters the area of interest. 10. The method of claim 8, further comprising creating the first rule to detect a specific object that enters the area of interest. 11. The method of claim 10, wherein creating the first rule to detect the specific object that enters the area of interest comprises specifying a type of object with a user interface. 12. The method of claim 8, further comprising creating the first rule to detect loitering within the area of interest. 13. The method of claim 8, further comprising creating the first rule to detect an object that leaves the area of interest. 14. The method of claim 1, wherein creating the first rule comprises determining a location of a tripwire. 15. The method of claim 14, wherein creating the first rule comprises determining end points of the tripwire. 16. The method of claim 15, wherein determining an end point of the tripwire comprises detecting that the object has stopped when tracking the object. 17. The method of claim 14. further comprising creating the first rule to detect people entering a space. 18. The method of claim 14, further comprising detecting an orientation of the object. 19. The method of claim 18, wherein creating the first rule comprises determining a direction of the tripwire using the orientation of the object. 20. The method of claim 1, further comprising detecting an orientation of the object, wherein creating the first rule uses the detected orientation of the object. 21. The method of claim 1, further comprising detecting that the object has stopped, wherein creating the first rule is responsive to the detection that the object has stopped. 22. The method of claim 1, further comprising putting the video surveillance system into a configuration mode, wherein tracking the object comprises tracking the object with the video surveillance system in the configuration mode. 23. The method of claim 22, wherein putting the video surveillance system into a configuration mode comprises use of a button, switch or remote control. 24. The method of claim 1, wherein tracking, the object comprises tracking a tracker pattern in the first video portion. 25. The method of claim 1, wherein tracking the object comprises tracking a fiducial mark in the first video portion. 26. The method of claim 1, further comprising tracking a path of the object in the first video portion and using the path at least in part, in creating the first rule. 27. The method of claim 1, further comprising tracking a speed of the object in the first video portion and using the tracked speed, at least in part, in creating the first rule. 28. The method of claim 1, further comprising detecting an event by analyzing the second video portion, at least in part, using the first rule. 29. An event detection method, comprising: tracking an object in a first video portion with an emitter; using, at least in part, the tracking of the object in the first video portion to create a first rule; and configuring a video surveillance system to detect an event in a second video portion using the first rule. 30. The method of claim 29, wherein tracking the object comprises outputting a radio frequency by the emitter. 31. The method of claim 29, wherein tracking the object comprises emitting location information. 32. The method of claim 29, wherein tracking the object comprises emitting GPS information. 33. A computer program product residing on a non-transitory computer readable medium having a plurality of instructions stored thereon, which, when executed by a processor, cause the processor to perform operations comprising: processing a first video portion to track an object in the first video portion; using, at least in part, the tracking, of the object in the first video portion to create a first rule; and configuring a video surveillance system to detect an event in a second video portion using the first rule. 34. An event detection system, comprising: processing a first video portion to track an object in the first video portion; using, at least in part, the tracking of the object in the first video portion to create a first rule; and configuring a video surveillance system to detect an event in a second video portion using the first rule.
2,400
7,212
7,212
14,604,170
2,463
Examples disclosed herein relate to selection of a wireless network for use by a target computing device. Examples include a determination that a client computing device is connected to a first wireless network of a first frequency band and having a first service set identifier (SSD). Examples further include selection of a second wireless network of a second frequency band for use by the target computing device without user intervention, the second wireless network having an SSD including at least a base substring of the first SSD.
1. A non-transitory machine-readable storage medium comprising ins ructions executable by a processing resource of a client computing device to: determine that the client computing device is connected to a first wireless network of a first frequency band to which a target computing device cannot connect, the first wireless network having a first service set identifier (SSID); identify at least one other wireless network currently in range of at least one of the client and target computing devices; without user intervention, select for use by the target computing device, a second wireless network that was identified as currently in range, that operates in a second frequency band, and that has a second SSID that includes at least a base substring of the first SSID of the first wireless network, wherein the target computing device is able to connect to wireless networks of the second frequency band; and instruct the target computing device to connect to the selected second wireless network. 2. The storage medium of claim 1, wherein the instructions to select comprise instructions to; without user intervention, select for use by the target computing device, a second wireless network identified as currently in range, that operates in the second frequency band, and that has the same SSID as the first wireless network. 3. The storage medium of claim 1, wherein the instructions to select comprise instructions to; determine a base substring of the first SSID of the first wireless network; without user intervention, select for use by the target computing device, a wireless network identified as currently in range, that operates in a second frequency band, and that has a second SSID that includes the base substring of the first SSID. 4. The storage medium of claim 3, wherein the instructions to determine the base substring comprise instructions to: determine whether the first SSID of the first wireless network includes a predefined SSID modifier; in response to a determination that the first SSID includes a given predefined SSID modifier, determine that the base substring of the first SSID is the substring of the first SSID excluding the given predefined SSID modifier; and in response to a determination that the first SSID does not include a predefined SSID modifier, determine that the base substring of the first SSID is the full first SSID. 5. The storage medium of claim 3, wherein the second SSID includes the base substring of the first SSID and an SSID modifier. 6. The storage medium of claim 1, wherein the target computing device is a printing device. 7. The storage medium of claim 1, wherein the first frequency band is a 5 GHz frequency band and the second frequency band is a 2.4 GHz frequency band. 8. A system of a client computing device comprising: a network engine to determine that the client computing device is connected to a first wireless network of a first frequency band to which a target computing device cannot connect, the first wireless network having a first service set identifier (SSID); an acquisition engine to acquire an SSID and frequency band identification for each of at least one wireless network identified as currently in range to at least one of the client and target computing devices; a selection engine to, without user intervention, select for use by the target computing device, a second wireless network identified as currently in range, that operates in a second frequency band, and that has a second SSID that includes at least a base substring of the first SSID of the first wireless network, wherein the target computing device is able to connect to wireless networks of the second frequency band; and instruct engine to instruct the target computing device to connect to the selected second wireless network using credentials provided by the client computing device. 9. The system of claim 8, wherein: the acquisition engine is to acquire, from the operating system (OS) of the client computing device, an SSID and frequency band identification for each of at least one wireless network identified, by the client computing device, as currently in range to the client computing device. 10. The system of claim 8, wherein: the provided credentials include the password for the first wireless network; the target computing device is a printing device; and the acquisition engine is to acquire, from the printing device, an SSID and frequency band identification for each of at least one wireless network identified, by the printing device, as currently in range to the printing device. 11. The system of claim 8, wherein: the selection engine is to determine a base substring of the first SSID of the first wireless network based on predefined SSID modifiers; and the selection engine is to select no wireless network when either none or multiple of the at least one wireless network of the second frequency band identified as in range have an SSID that includes the base substring of the first SSID. 12. The system of claim 8, wherein the selection engine is further to select the second wireless network based in part on the basic service set identification (BSSID) associated with the first wireless network and the BSSID associated with the second wireless network. 13. A method comprising: determining, with a client computing device, that the client computing device is connected to a first wireless network of a first frequency band to which a selected printing device cannot connect, the first wireless network having a first service set identifier (SSID); acquiring an SSID and frequency band identification for each of at least one wireless network identified as currently in range to at least one of the client computing device and the printing device; determining a base substring of the first SSID; without user intervention, selecting for use by the printing device, a second wireless network identified as currently in range, that operates in a second frequency band, and that has a second SSID that includes at least the base substring of the first SSID of the first wireless network, wherein the printing device is able to connect to wireless networks of the second frequency band; and instructing the printing device to connect to the selected second wireless network. 14. The method of claim 13, wherein determining the base substring comprises: determining whether the first SSID includes a predefined SSID modifier; in response to a determination that the first SSID includes a given predefined SSID modifier, determining that the base substring of the first SSID is the substring of the first SSID excluding the given predefined SSID modifier; and in response to a determination that the first SSID does not include a predefined SSID modifier, determining that the base substring of the first SSID is the full first SSID. 15. The method of claim 14, wherein the instructing comprises: providing, to the printing device, the second SSID, a password for the firs wireless network, and a security type.
Examples disclosed herein relate to selection of a wireless network for use by a target computing device. Examples include a determination that a client computing device is connected to a first wireless network of a first frequency band and having a first service set identifier (SSD). Examples further include selection of a second wireless network of a second frequency band for use by the target computing device without user intervention, the second wireless network having an SSD including at least a base substring of the first SSD.1. A non-transitory machine-readable storage medium comprising ins ructions executable by a processing resource of a client computing device to: determine that the client computing device is connected to a first wireless network of a first frequency band to which a target computing device cannot connect, the first wireless network having a first service set identifier (SSID); identify at least one other wireless network currently in range of at least one of the client and target computing devices; without user intervention, select for use by the target computing device, a second wireless network that was identified as currently in range, that operates in a second frequency band, and that has a second SSID that includes at least a base substring of the first SSID of the first wireless network, wherein the target computing device is able to connect to wireless networks of the second frequency band; and instruct the target computing device to connect to the selected second wireless network. 2. The storage medium of claim 1, wherein the instructions to select comprise instructions to; without user intervention, select for use by the target computing device, a second wireless network identified as currently in range, that operates in the second frequency band, and that has the same SSID as the first wireless network. 3. The storage medium of claim 1, wherein the instructions to select comprise instructions to; determine a base substring of the first SSID of the first wireless network; without user intervention, select for use by the target computing device, a wireless network identified as currently in range, that operates in a second frequency band, and that has a second SSID that includes the base substring of the first SSID. 4. The storage medium of claim 3, wherein the instructions to determine the base substring comprise instructions to: determine whether the first SSID of the first wireless network includes a predefined SSID modifier; in response to a determination that the first SSID includes a given predefined SSID modifier, determine that the base substring of the first SSID is the substring of the first SSID excluding the given predefined SSID modifier; and in response to a determination that the first SSID does not include a predefined SSID modifier, determine that the base substring of the first SSID is the full first SSID. 5. The storage medium of claim 3, wherein the second SSID includes the base substring of the first SSID and an SSID modifier. 6. The storage medium of claim 1, wherein the target computing device is a printing device. 7. The storage medium of claim 1, wherein the first frequency band is a 5 GHz frequency band and the second frequency band is a 2.4 GHz frequency band. 8. A system of a client computing device comprising: a network engine to determine that the client computing device is connected to a first wireless network of a first frequency band to which a target computing device cannot connect, the first wireless network having a first service set identifier (SSID); an acquisition engine to acquire an SSID and frequency band identification for each of at least one wireless network identified as currently in range to at least one of the client and target computing devices; a selection engine to, without user intervention, select for use by the target computing device, a second wireless network identified as currently in range, that operates in a second frequency band, and that has a second SSID that includes at least a base substring of the first SSID of the first wireless network, wherein the target computing device is able to connect to wireless networks of the second frequency band; and instruct engine to instruct the target computing device to connect to the selected second wireless network using credentials provided by the client computing device. 9. The system of claim 8, wherein: the acquisition engine is to acquire, from the operating system (OS) of the client computing device, an SSID and frequency band identification for each of at least one wireless network identified, by the client computing device, as currently in range to the client computing device. 10. The system of claim 8, wherein: the provided credentials include the password for the first wireless network; the target computing device is a printing device; and the acquisition engine is to acquire, from the printing device, an SSID and frequency band identification for each of at least one wireless network identified, by the printing device, as currently in range to the printing device. 11. The system of claim 8, wherein: the selection engine is to determine a base substring of the first SSID of the first wireless network based on predefined SSID modifiers; and the selection engine is to select no wireless network when either none or multiple of the at least one wireless network of the second frequency band identified as in range have an SSID that includes the base substring of the first SSID. 12. The system of claim 8, wherein the selection engine is further to select the second wireless network based in part on the basic service set identification (BSSID) associated with the first wireless network and the BSSID associated with the second wireless network. 13. A method comprising: determining, with a client computing device, that the client computing device is connected to a first wireless network of a first frequency band to which a selected printing device cannot connect, the first wireless network having a first service set identifier (SSID); acquiring an SSID and frequency band identification for each of at least one wireless network identified as currently in range to at least one of the client computing device and the printing device; determining a base substring of the first SSID; without user intervention, selecting for use by the printing device, a second wireless network identified as currently in range, that operates in a second frequency band, and that has a second SSID that includes at least the base substring of the first SSID of the first wireless network, wherein the printing device is able to connect to wireless networks of the second frequency band; and instructing the printing device to connect to the selected second wireless network. 14. The method of claim 13, wherein determining the base substring comprises: determining whether the first SSID includes a predefined SSID modifier; in response to a determination that the first SSID includes a given predefined SSID modifier, determining that the base substring of the first SSID is the substring of the first SSID excluding the given predefined SSID modifier; and in response to a determination that the first SSID does not include a predefined SSID modifier, determining that the base substring of the first SSID is the full first SSID. 15. The method of claim 14, wherein the instructing comprises: providing, to the printing device, the second SSID, a password for the firs wireless network, and a security type.
2,400
7,213
7,213
13,696,217
2,416
A method and system for handover of a video call from a packet switched network to a circuit switched network by a first network entity associated with the packet switched network in a single radio environment is provided. A need to perform a video single radio voice call continuity (vSRVCC) handover from a packet switched network to a circuit switched network is detected during a video call session in the packet switched network. Accordingly, a vSRVCC handover request is transtnitted to a second network entity associated with the circuit switched network for performing the vSRVCC handover of the video call session where the vSRVCC handover request includes vSRVCC capabilities of a user equipment (UE) associated with the video call session.
1. A method for performing a handover of a video call from a packet switched network to a circuit switched network by a first network entity associated with the packet switched network in a wireless network environment, comprising: detecting a need to perform a video single radio voice call continuity (vSRVCC) handover from a packet switched network to a circuit switched network during a video call session in the packet switched network; and transmitting a vSRVCC handover request to a second network entity associated with the circuit switched network for performing the vSRVCC handover of the video call session; wherein the vSRVCC handover request comprises vSRVCC capabilities of a user equipment (UE) associated with the video call session. 2. The method of claim 1, wherein the vSRVCC capabilities comprise service change and unrestricted digital information fallback (SCUDIF) capabilities, a first set of bearer capabilities, a second set of bearer capabilities, and bearer capability elements. 3. The method of claim 2, wherein the SCUDIF capabilities indicate support for user initiated service change and fallback or network initiated in-call modification. 4. The method of claim 1, wherein the vSRVCC capabilities of the UE is acquuired during an initial attach procedure with the first network entity of the UE, and is stored in a memory associated with the first network entity. 5. The method of claim 19, wherein performing the vSRVCC handover based on the vSRVCC capabilities comprises: determining whether the UE supports the network initiated in-call modification and services corresponding to the first set of bearer capabilities and the second set of bearer capabilities based on the vSRVCC capabilities of the UE; if the UE supports the network initiated in-call modification and services, performing the network initiated in-call modification for handover of the video call session from the packet switched network to the circuit switched network; and if the UE does not support the network initiated in-call modification and services, determining whether the UE supports the user-initiated service change and fallback and services corresponding to the first set of bearer capabilities and the second set of bearer capabilities based on the vSRVCC capabilities of the UE. 6. The method of claim 5, wherein determining whether the UE supports the user-initiated service change and fallback and the services comprises: if the UE supports the network initiated in-call modification and services, receiving a request to perform the user-initiated service change and fallback procedure from the UE and performing the user initiated service change and fallback procedure based on the received request; and if the UE does not support the network initiated in-call modification and services, continuing the ongoing voice call associated with the UE based on the vSRVCC capabilities of the UE. 7. The method of claim 6, wherein performing the network initiated in-call modification for handover of the video call session from the packet switched network to the circuit switched network comprises: performing an SRVCC handover procedure for establishing a voice call session associated with the video call session; and adding a video component to the established voice call session by performing the network initiated in-call modification procedure, wherein performing the user initiated service change and fallback procedure based on the received request comprises: performing an SRVCC handover procedure for establishing a voice call session associated with the video call session based on the received request: and adding a video component to the established voice call session by performing the user-initiated service change and fallback procedure. 8. (canceled) 9. An apparatus for performing a handover of a video call from a packet switched network to a circuit switched network by a first network entity associated with the packet switched network in a wireless network environment. The apparatus comprising: a controller for detecting a need to perform a video single radio voice call continuity (vSRVCC) handover from the packet switched network to the circuit switched network during a video call session in the packet switched network, and a transmitter for transmitting a vSRVCC handover request to the second network entity associated with the circuit switched network, wherein the vSRVCC handover request includes sSRVCC capabilities of a user equipment (UE) associated with the video call session. 10. The apparatus of claim 9, wherein the vSRVCC capabilities comprise a-service change and unrestricted digital information fallback (SCUDIF) capabilities, a first set of bearer capabilities, a second set of bearer capabilities, and bearer capability elements. 11. The apparatus of claim 10, wherein the SCUDIF capabilities indicate support for user initiated service change and fallback or network initiated in-call modification. 12. The apparatus of claim 9, further comprising a memory for storing the vSRVCC capabilities of the UE wherein the vSRVCC capabilities of the UE are acquired during an initial attach procedure with the first network entity. 13. (canceled) 14. The apparatus of claim 11, wherein, in performing the vSRVCC handover based on the vSRVCC capabilities, the controller determines whether the UE supports the network initiated in-call modification and services corresponding to the first set of bearer capabilities and the second set of bearer capabilities based on the vSRVCC capabilities of the UE, and, if so, performs the network initiated in-call modification procedure for handover of the video call session from the packet switched network to the circuit switched network, and if not, determines whether the UE supports the user-initiated service change and fallback and services corresponding to the first set of bearer capabilities and the second set of bearer capabilities based on the vSRVCC capabilities of the UE. 15. The apparatus of claim 14, wherein in determining whether the UE supports the user-initiated service change and fallback, and the services corresponding to the first set of bearer capabilities and the second set of bearer capabilities based on the vSRVCC capabilities in the vSRVCC handover request, if the UE supports the network initiated in-call modification and services. The second network entity controller controls to the receiver for receiving a request to perform the user-initiated service change and fallback procedure from the UE and performs the user initiated service change and fallback procedure based on the received request and, if the UE does not support the network initiated in-call modification and services, the controller continues the ongoing voice call associated with the UE based on the vSRVCC capabilities of the UE. 16. The apparatus of claim 15, wherein, in performing the network initiated in-call modification procedure for handover of the video call session from the packet switched network to the circuit switched network, the controller performs an SRVCC handover procedure for establishing a voice call session associated with the video call session, and adds a video component to the established voice call session by performing the network initiated in-call modification procedure, and wherein, in performing the user initiated service change and fallback procedure based on the received request, the controller performs an SRVCC handover procedure for establishing a voice call session associated with the video call session based on the received request, and adds a video component to the established voice call session by performing the user-initiated service change and fallback procedure. 17. A method for performing a handover of a video call from a packet switched network to a circuit switched network by a second network entity associated with the circuit switched network in a wireless network environment, comprising: receiving, from a first network entity associated with the packet switched network, a video single radio voice call continuity (vSRVCC) handover request for performing a vSRVCC handover of a video call session in the packet switched network, wherein the vSRVCC handover request comprises vSRVCC capabilities of a user equipment (UE) associated with the video call session; and performing the vSRVCC handover based on the vSRVCC capabilities of the UE. 18. The method of claim 17, wherein the vSRVCC capabilities comprise service change and unrestricted digital information fallback (SCUDIF) capabilities, a first set of bearer capabilities, a second set of bearer capabilities, and bearer capability elements. 19. The method of claim 18, wherein the SCUDIF capabilities indicate support for user-initiated service change and fallback or network initiated in-call modification. 20. An apparatus for performing a handover of a video call from a packet switched network to a circuit switched network by a second network entity associated with the circuit switched network in a wireless network environment, the apparatus comprising: a receiver for receiving, from a first network entity associated with the packet switched network, a video single radio voice call continuity (vSRVCC) handover request for performing a vSRVCC handover of a video call session in the packet switched network, wherein the vSRVCC handover request comprises vSRVCC capabilities of a user equipment (UE) associated with the video call session; and a controller for performing the vSRVCC handover based on the vSRVCC capabilities of the UE. 21. The apparatus of claim 20, wherein the vSRVCC capabilities comprise service change and unrestricted digital information fallback (SCUDIF) capabilities, a first set of bearer capabilities, a second set of bearer capabilities, and bearer capability elements. 22. The apparatus of claim 21, wherein the SCUDIF capabilities indicate support for user initiated service change and fallback or network initiated in-call modification.
A method and system for handover of a video call from a packet switched network to a circuit switched network by a first network entity associated with the packet switched network in a single radio environment is provided. A need to perform a video single radio voice call continuity (vSRVCC) handover from a packet switched network to a circuit switched network is detected during a video call session in the packet switched network. Accordingly, a vSRVCC handover request is transtnitted to a second network entity associated with the circuit switched network for performing the vSRVCC handover of the video call session where the vSRVCC handover request includes vSRVCC capabilities of a user equipment (UE) associated with the video call session.1. A method for performing a handover of a video call from a packet switched network to a circuit switched network by a first network entity associated with the packet switched network in a wireless network environment, comprising: detecting a need to perform a video single radio voice call continuity (vSRVCC) handover from a packet switched network to a circuit switched network during a video call session in the packet switched network; and transmitting a vSRVCC handover request to a second network entity associated with the circuit switched network for performing the vSRVCC handover of the video call session; wherein the vSRVCC handover request comprises vSRVCC capabilities of a user equipment (UE) associated with the video call session. 2. The method of claim 1, wherein the vSRVCC capabilities comprise service change and unrestricted digital information fallback (SCUDIF) capabilities, a first set of bearer capabilities, a second set of bearer capabilities, and bearer capability elements. 3. The method of claim 2, wherein the SCUDIF capabilities indicate support for user initiated service change and fallback or network initiated in-call modification. 4. The method of claim 1, wherein the vSRVCC capabilities of the UE is acquuired during an initial attach procedure with the first network entity of the UE, and is stored in a memory associated with the first network entity. 5. The method of claim 19, wherein performing the vSRVCC handover based on the vSRVCC capabilities comprises: determining whether the UE supports the network initiated in-call modification and services corresponding to the first set of bearer capabilities and the second set of bearer capabilities based on the vSRVCC capabilities of the UE; if the UE supports the network initiated in-call modification and services, performing the network initiated in-call modification for handover of the video call session from the packet switched network to the circuit switched network; and if the UE does not support the network initiated in-call modification and services, determining whether the UE supports the user-initiated service change and fallback and services corresponding to the first set of bearer capabilities and the second set of bearer capabilities based on the vSRVCC capabilities of the UE. 6. The method of claim 5, wherein determining whether the UE supports the user-initiated service change and fallback and the services comprises: if the UE supports the network initiated in-call modification and services, receiving a request to perform the user-initiated service change and fallback procedure from the UE and performing the user initiated service change and fallback procedure based on the received request; and if the UE does not support the network initiated in-call modification and services, continuing the ongoing voice call associated with the UE based on the vSRVCC capabilities of the UE. 7. The method of claim 6, wherein performing the network initiated in-call modification for handover of the video call session from the packet switched network to the circuit switched network comprises: performing an SRVCC handover procedure for establishing a voice call session associated with the video call session; and adding a video component to the established voice call session by performing the network initiated in-call modification procedure, wherein performing the user initiated service change and fallback procedure based on the received request comprises: performing an SRVCC handover procedure for establishing a voice call session associated with the video call session based on the received request: and adding a video component to the established voice call session by performing the user-initiated service change and fallback procedure. 8. (canceled) 9. An apparatus for performing a handover of a video call from a packet switched network to a circuit switched network by a first network entity associated with the packet switched network in a wireless network environment. The apparatus comprising: a controller for detecting a need to perform a video single radio voice call continuity (vSRVCC) handover from the packet switched network to the circuit switched network during a video call session in the packet switched network, and a transmitter for transmitting a vSRVCC handover request to the second network entity associated with the circuit switched network, wherein the vSRVCC handover request includes sSRVCC capabilities of a user equipment (UE) associated with the video call session. 10. The apparatus of claim 9, wherein the vSRVCC capabilities comprise a-service change and unrestricted digital information fallback (SCUDIF) capabilities, a first set of bearer capabilities, a second set of bearer capabilities, and bearer capability elements. 11. The apparatus of claim 10, wherein the SCUDIF capabilities indicate support for user initiated service change and fallback or network initiated in-call modification. 12. The apparatus of claim 9, further comprising a memory for storing the vSRVCC capabilities of the UE wherein the vSRVCC capabilities of the UE are acquired during an initial attach procedure with the first network entity. 13. (canceled) 14. The apparatus of claim 11, wherein, in performing the vSRVCC handover based on the vSRVCC capabilities, the controller determines whether the UE supports the network initiated in-call modification and services corresponding to the first set of bearer capabilities and the second set of bearer capabilities based on the vSRVCC capabilities of the UE, and, if so, performs the network initiated in-call modification procedure for handover of the video call session from the packet switched network to the circuit switched network, and if not, determines whether the UE supports the user-initiated service change and fallback and services corresponding to the first set of bearer capabilities and the second set of bearer capabilities based on the vSRVCC capabilities of the UE. 15. The apparatus of claim 14, wherein in determining whether the UE supports the user-initiated service change and fallback, and the services corresponding to the first set of bearer capabilities and the second set of bearer capabilities based on the vSRVCC capabilities in the vSRVCC handover request, if the UE supports the network initiated in-call modification and services. The second network entity controller controls to the receiver for receiving a request to perform the user-initiated service change and fallback procedure from the UE and performs the user initiated service change and fallback procedure based on the received request and, if the UE does not support the network initiated in-call modification and services, the controller continues the ongoing voice call associated with the UE based on the vSRVCC capabilities of the UE. 16. The apparatus of claim 15, wherein, in performing the network initiated in-call modification procedure for handover of the video call session from the packet switched network to the circuit switched network, the controller performs an SRVCC handover procedure for establishing a voice call session associated with the video call session, and adds a video component to the established voice call session by performing the network initiated in-call modification procedure, and wherein, in performing the user initiated service change and fallback procedure based on the received request, the controller performs an SRVCC handover procedure for establishing a voice call session associated with the video call session based on the received request, and adds a video component to the established voice call session by performing the user-initiated service change and fallback procedure. 17. A method for performing a handover of a video call from a packet switched network to a circuit switched network by a second network entity associated with the circuit switched network in a wireless network environment, comprising: receiving, from a first network entity associated with the packet switched network, a video single radio voice call continuity (vSRVCC) handover request for performing a vSRVCC handover of a video call session in the packet switched network, wherein the vSRVCC handover request comprises vSRVCC capabilities of a user equipment (UE) associated with the video call session; and performing the vSRVCC handover based on the vSRVCC capabilities of the UE. 18. The method of claim 17, wherein the vSRVCC capabilities comprise service change and unrestricted digital information fallback (SCUDIF) capabilities, a first set of bearer capabilities, a second set of bearer capabilities, and bearer capability elements. 19. The method of claim 18, wherein the SCUDIF capabilities indicate support for user-initiated service change and fallback or network initiated in-call modification. 20. An apparatus for performing a handover of a video call from a packet switched network to a circuit switched network by a second network entity associated with the circuit switched network in a wireless network environment, the apparatus comprising: a receiver for receiving, from a first network entity associated with the packet switched network, a video single radio voice call continuity (vSRVCC) handover request for performing a vSRVCC handover of a video call session in the packet switched network, wherein the vSRVCC handover request comprises vSRVCC capabilities of a user equipment (UE) associated with the video call session; and a controller for performing the vSRVCC handover based on the vSRVCC capabilities of the UE. 21. The apparatus of claim 20, wherein the vSRVCC capabilities comprise service change and unrestricted digital information fallback (SCUDIF) capabilities, a first set of bearer capabilities, a second set of bearer capabilities, and bearer capability elements. 22. The apparatus of claim 21, wherein the SCUDIF capabilities indicate support for user initiated service change and fallback or network initiated in-call modification.
2,400
7,214
7,214
14,675,176
2,493
Systems, methods, and software described herein provide for identifying and implementing security actions within a computing environment. In one example, a method of operating an advisement system to provide security actions in a computing environment includes identifying communication interactions between a plurality of computing assets and, after identifying the communication interactions, identifying a security incident in a first computing asset. The method further provides identifying at least one related computing asset to the first asset based on the communication interactions, and determining the security actions to be taken in the first computing asset and the related computing asset.
1. A method of operating an advisement system to provide security actions in a computing environment, the method comprising: identifying communication interactions between a plurality of computing assets in the computing environment; after identifying the communication interactions, identifying a security incident in a first computing asset in the plurality of computing assets; determining at least one security action to be taken against the security incident in the first computing asset; identifying at least one related computing asset to the first computing asset based on the communication interactions; and determining one or more secondary security actions to be taken against the security incident in the at least one related computing asset. 2. The method of claim 1 wherein determining the at least one security action to be taken against the security incident in the first computing asset comprises determining at least one default security action to be taken against the security incident in the first computing asset based on enrichment information obtained for the security incident and a criticality rating for the first computing asset. 3. The method of claim 2 wherein the enrichment information comprises information obtained from one or more internal and external databases. 4. The method of claim 1 wherein determining the at least one security action to be taken against the security incident in the first computing asset comprises: identifying one or more suggested security actions to be supplied to an administrator based on enrichment information obtained for the security incident and a criticality rating for the first computing asset; and identifying a selected security action by the administrator. 5. The method of claim 1 wherein identifying the communication interactions between the plurality of computing assets in the computing environment comprises receiving communication reports indicating data communication flow for the plurality of computing assets in the computing environment. 6. The method of claim 1 wherein the security action comprises an action to prevent outgoing communications from the first computing asset, and wherein the secondary security actions comprise actions to prevent incoming communications from the first computing asset. 7. The method of claim 1 wherein identifying the at least one related computing asset comprises identifying at least one computing asset reliant on the first computing asset, and wherein the secondary security actions comprise actions to prevent incoming communication requests from the first computing asset and permit outgoing communication requests to the first computing asset. 8. The method of claim 1 wherein identifying the security incident in the first computing asset in the plurality of computing assets comprises receiving a notification of the security incident in the first computing asset from a security information and event management (SIEM). 9. A computer readable storage medium having instructions stored thereon, that when executed by an advisement computing system, direct the advisement computing system to perform a method of providing security actions in a computing environment, the method comprising: identifying communication interactions between a plurality of computing assets in the computing environment; after identifying the communication interactions, identifying a security incident in a first computing asset in the plurality of computing assets; determining at least one security action to be taken against the security incident in the first computing asset; identifying at least one related computing asset to the first computing asset based on the communication interactions; and determining one or more secondary security actions to be taken against the security incident in the at least one related computing asset. 10. The computer readable storage medium of claim 9, wherein determining the at least one security action to be taken against the security incident in the first computing asset comprises determining at least one default security action to be taken against the security incident in the first computing asset based on enrichment information obtained for the security incident and a criticality rating for the first computing asset. 11. The computer readable storage medium of claim 10, wherein the enrichment information comprises information obtained from one or more internal or external databases. 12. The computer readable storage medium of claim 9, wherein determining the at least one security action to be taken against the security incident in the first computing asset comprises: identifying one or more suggested security actions to be supplied to an administrator based on enrichment information obtained for the security incident and a criticality rating for the first computing asset; and identifying a selected security action by the administrator. 13. The computer readable storage medium of claim 9, wherein identifying the communication interactions between the plurality of computing assets in the computing environment comprises receiving communication reports indicating data communication flow for the plurality of computing assets in the computing environment. 14. The computer readable storage medium of claim 9, wherein the security action comprises an action to prevent outgoing communication from the first computing asset, and wherein the secondary security actions comprise actions to prevent incoming communications from the first computing asset. 15. The computer readable storage medium of claim 9, wherein identifying the at least one related computing asset comprises identifying at least one computing asset reliant on the first computing asset, and wherein the secondary security actions comprise actions to prevent incoming communication requests from the first computing asset and permit outgoing communication requests to the first computing asset. 16. The computer readable storage medium of claim 9, wherein identifying the security incident in the first computing asset in the plurality of computing assets comprises receiving a notification of the security incident in the first computing asset from a security information and event management (SIEM). 17. An apparatus to provide security actions in a computing environment, the apparatus comprising: one or more computer readable storage media; processing instructions stored on the one or more computer readable media that, when executed by a processing system, direct the processing system to at least: identify a security incident in a first computing asset in a plurality of computing assets, wherein the first computing asset provides a service to one or more related computing assets in the plurality of computing assets; obtain enrichment information related to the security incident; identify a rule set based at least on the enrichment information; and determine security actions to be taken against the security incident based on the rule set, wherein the security actions comprise actions to prevent the first computing asset from initiating communications with other assets in the computing environment. 18. The apparatus of claim 17 wherein the security actions further comprise process related actions that permit the one or more related computing assets to initiate communication with the first computing asset to provide the service. 19. The apparatus of claim 17 wherein the processing instructions to obtain enrichment information related to the security incident direct the processing system to obtain enrichment information from at least one internal or external source related to the security incident. 20. The apparatus of claim 17 wherein the processing instructions to determine security actions to be taken against the security incident based on the rule set direct the processing system to identify default security actions associated with the rule set to be taken against the security incident.
Systems, methods, and software described herein provide for identifying and implementing security actions within a computing environment. In one example, a method of operating an advisement system to provide security actions in a computing environment includes identifying communication interactions between a plurality of computing assets and, after identifying the communication interactions, identifying a security incident in a first computing asset. The method further provides identifying at least one related computing asset to the first asset based on the communication interactions, and determining the security actions to be taken in the first computing asset and the related computing asset.1. A method of operating an advisement system to provide security actions in a computing environment, the method comprising: identifying communication interactions between a plurality of computing assets in the computing environment; after identifying the communication interactions, identifying a security incident in a first computing asset in the plurality of computing assets; determining at least one security action to be taken against the security incident in the first computing asset; identifying at least one related computing asset to the first computing asset based on the communication interactions; and determining one or more secondary security actions to be taken against the security incident in the at least one related computing asset. 2. The method of claim 1 wherein determining the at least one security action to be taken against the security incident in the first computing asset comprises determining at least one default security action to be taken against the security incident in the first computing asset based on enrichment information obtained for the security incident and a criticality rating for the first computing asset. 3. The method of claim 2 wherein the enrichment information comprises information obtained from one or more internal and external databases. 4. The method of claim 1 wherein determining the at least one security action to be taken against the security incident in the first computing asset comprises: identifying one or more suggested security actions to be supplied to an administrator based on enrichment information obtained for the security incident and a criticality rating for the first computing asset; and identifying a selected security action by the administrator. 5. The method of claim 1 wherein identifying the communication interactions between the plurality of computing assets in the computing environment comprises receiving communication reports indicating data communication flow for the plurality of computing assets in the computing environment. 6. The method of claim 1 wherein the security action comprises an action to prevent outgoing communications from the first computing asset, and wherein the secondary security actions comprise actions to prevent incoming communications from the first computing asset. 7. The method of claim 1 wherein identifying the at least one related computing asset comprises identifying at least one computing asset reliant on the first computing asset, and wherein the secondary security actions comprise actions to prevent incoming communication requests from the first computing asset and permit outgoing communication requests to the first computing asset. 8. The method of claim 1 wherein identifying the security incident in the first computing asset in the plurality of computing assets comprises receiving a notification of the security incident in the first computing asset from a security information and event management (SIEM). 9. A computer readable storage medium having instructions stored thereon, that when executed by an advisement computing system, direct the advisement computing system to perform a method of providing security actions in a computing environment, the method comprising: identifying communication interactions between a plurality of computing assets in the computing environment; after identifying the communication interactions, identifying a security incident in a first computing asset in the plurality of computing assets; determining at least one security action to be taken against the security incident in the first computing asset; identifying at least one related computing asset to the first computing asset based on the communication interactions; and determining one or more secondary security actions to be taken against the security incident in the at least one related computing asset. 10. The computer readable storage medium of claim 9, wherein determining the at least one security action to be taken against the security incident in the first computing asset comprises determining at least one default security action to be taken against the security incident in the first computing asset based on enrichment information obtained for the security incident and a criticality rating for the first computing asset. 11. The computer readable storage medium of claim 10, wherein the enrichment information comprises information obtained from one or more internal or external databases. 12. The computer readable storage medium of claim 9, wherein determining the at least one security action to be taken against the security incident in the first computing asset comprises: identifying one or more suggested security actions to be supplied to an administrator based on enrichment information obtained for the security incident and a criticality rating for the first computing asset; and identifying a selected security action by the administrator. 13. The computer readable storage medium of claim 9, wherein identifying the communication interactions between the plurality of computing assets in the computing environment comprises receiving communication reports indicating data communication flow for the plurality of computing assets in the computing environment. 14. The computer readable storage medium of claim 9, wherein the security action comprises an action to prevent outgoing communication from the first computing asset, and wherein the secondary security actions comprise actions to prevent incoming communications from the first computing asset. 15. The computer readable storage medium of claim 9, wherein identifying the at least one related computing asset comprises identifying at least one computing asset reliant on the first computing asset, and wherein the secondary security actions comprise actions to prevent incoming communication requests from the first computing asset and permit outgoing communication requests to the first computing asset. 16. The computer readable storage medium of claim 9, wherein identifying the security incident in the first computing asset in the plurality of computing assets comprises receiving a notification of the security incident in the first computing asset from a security information and event management (SIEM). 17. An apparatus to provide security actions in a computing environment, the apparatus comprising: one or more computer readable storage media; processing instructions stored on the one or more computer readable media that, when executed by a processing system, direct the processing system to at least: identify a security incident in a first computing asset in a plurality of computing assets, wherein the first computing asset provides a service to one or more related computing assets in the plurality of computing assets; obtain enrichment information related to the security incident; identify a rule set based at least on the enrichment information; and determine security actions to be taken against the security incident based on the rule set, wherein the security actions comprise actions to prevent the first computing asset from initiating communications with other assets in the computing environment. 18. The apparatus of claim 17 wherein the security actions further comprise process related actions that permit the one or more related computing assets to initiate communication with the first computing asset to provide the service. 19. The apparatus of claim 17 wherein the processing instructions to obtain enrichment information related to the security incident direct the processing system to obtain enrichment information from at least one internal or external source related to the security incident. 20. The apparatus of claim 17 wherein the processing instructions to determine security actions to be taken against the security incident based on the rule set direct the processing system to identify default security actions associated with the rule set to be taken against the security incident.
2,400
7,215
7,215
14,446,821
2,419
Systems and methods which are adapted to provide selective transport accelerator operation are disclosed. In operation according to embodiments, one or more functions of transport accelerator operation is selectively bypassed or not based upon particular criteria. Transport accelerator control logic may obtain one or more acceleration selection attributes and, based on the one or more acceleration selection attributes, selectively invoke first functionality of transport accelerator logic of a client device to obtain the content from the content server or bypassing the first functionality of the transport accelerator logic of the client device to obtain the content from the content server. The first functionality may comprise subdividing the user agent's request for content into a plurality of chunk requests for requesting chunks of the content from the content server to provide accelerated delivery of the content to the client device.
1. A method comprising: obtaining, by transport accelerator (TA) control logic, one or more acceleration selection attributes comprising at least one of: an attribute of a user agent's request for content from a content server; or an attribute of the content server; and based on the one or more acceleration selection attributes obtained by the TA control logic of the client device, selectively invoking first functionality of transport accelerator (TA) logic of a client device to obtain the content from the content server or bypassing the first functionality of the TA logic of the client device to obtain the content from the content server, the first functionality of the TA logic of the client device comprising subdividing the user agent's request for content into a plurality of chunk requests for requesting chunks of the content from the content server to provide accelerated delivery of the content to the client device. 2. The method of claim 1, wherein the selectively invoking the first functionality of TA logic or bypassing the first functionality of the TA logic comprises bypassing the first functionality of the TA logic; and the method further comprises: invoking second functionality of the TA logic of the client device when bypassing the first functionality of the TA logic. 3. The method of claim 2, wherein the second functionality of the TA logic provides communication of the content via a plurality of connections established between the client device and the content server. 4. The method of claim 2, wherein the second functionality of the TA logic provides port recovery with respect to communication of the content between the client device and the content server. 5. The method of claim 1, wherein the selectively invoking the first functionality of TA logic or bypassing the first functionality of the TA logic comprises: routing data to bypass a functional block of the TA logic providing the first functionality of the TA logic. 6. The method of claim 1, wherein the selectively invoking the first functionality of TA logic or bypassing the first functionality of the TA logic comprises: controlling a functional block of the TA logic providing the first functionality of the TA logic to forego providing the first functionality with respect to at least one request for content. 7. The method of claim 6, wherein the controlling a functional block of the TA logic comprises: providing by the TA control logic an advisory parameter not to chunk the at least one request for content. 8. The method of claim 1, wherein the attribute of the user agent's request comprises at least one of: a uniform resource identifier (URI) of data being requested from the content server; a file extension of data being requested from the content server; or information regarding the user agent making the request. 9. The method of claim 1, wherein the attribute of the content server comprises at least one of: byte range request support by the content server; request forbidden by the content server; request range not-satisfiable by the content server; or a response code provided by the server determined to be indicative of content server suitability for transport acceleration operation. 10. The method of claim 1, wherein the selectively invoking the first functionality of the TA logic or bypassing the first functionality of the TA logic comprises: determining whether the one or more acceleration selection attributes meet one or more criteria of an exclude list; and in response to determining that the one or more acceleration selection attributes meet the one or more criteria of the exclude list, bypassing the first functionality of the TA logic. 11. The method of claim 1, wherein the selectively invoking the first functionality of the TA logic or bypassing the first functionality of the TA logic comprises: determining whether the one or more acceleration selection attributes meet one or more criteria of an exclude list; and in response to determining that the one or more acceleration selection attributes do not meet the one or more criteria of an exclude list: determining whether the one or more acceleration selection attributes meets one or more criteria of an include list; and in response to determining that the one or more acceleration selection attributes meet one or more criteria of the include list, invoking the first functionality of the TA logic. 12. The method of claim 11, further comprising: populating at least one of the exclude list or the include list using learning logic identifying operation indicative of transport acceleration operation support. 13. The method of claim 12, wherein the operation indicative of transport acceleration operation support comprises at least one of support for byte range requests, no support for byte range requests, requests resulting in a forbidden response, or requests resulting in a range not-satisfiable response. 14. The method of claim 1, wherein the attribute of the content server was derived from a response from the content server in response to a request made by the client device. 15. The method of claim 14, wherein the selectively invoking the first functionality of the TA logic or bypassing the first functionality of the TA logic comprises: determining whether the content server is included on a probing list; and in response to determining that the content server is included on the probing list, controlling the TA logic to make the request as a probing request for determining suitability of the content server for operation of the first functionality of the TA logic. 16. The method of claim 15, wherein the selectively invoking the first functionality of the TA logic or bypassing the first functionality of the TA logic comprises: determining whether the content server is suitable for operation of the first functionality of the TA logic based upon the response to the request; and in response to determining that the content server is not suitable for operation of the first functionality of the TA logic, adding the content server to an exclude list for bypassing of the first functionality of the TA logic with respect to communication of the content between the client device and the content server. 17. An apparatus comprising: means for transport accelerator (TA) control logic obtaining one or more acceleration selection attributes comprising at least one of: an attribute of a user agent's request for content from a content server; or an attribute of the content server; and means for selectively invoking first functionality of transport accelerator (TA) logic of a client device to obtain the content from the content server or bypassing the first functionality of the TA logic of the client device to obtain the content from the content server based on the one or more acceleration selection attributes obtained by the TA control logic of the client device, the first functionality of the TA logic of the client device comprising subdividing the user agent's request for content into a plurality of chunk requests for requesting chunks of the content from the content server to provide accelerated delivery of the content to the client device. 18. The apparatus of claim 17, wherein the means for selectively invoking the first functionality of TA logic or bypassing the first functionality of the TA logic comprises means for bypassing the first functionality of the TA logic; and the apparatus further comprises: means for invoking second functionality of the TA logic of the client device when bypassing the first functionality of the TA logic. 19. The apparatus of claim 18, wherein the second functionality of the TA logic provides communication of the content via a plurality of connections established between the client device and the content server. 20. The apparatus of claim 18, wherein the second functionality of the TA logic provides port recovery with respect to communication of the content between the client device and the content server. 21. The apparatus of claim 17, wherein the means for selectively invoking the first functionality of TA logic or bypassing the first functionality of the TA logic comprises: means for routing data to bypass a functional block of the TA logic providing the first functionality of the TA logic. 22. The apparatus of claim 17, wherein the means for selectively invoking the first functionality of TA logic or bypassing the first functionality of the TA logic comprises: means for controlling a functional block of the TA logic providing the first functionality of the TA logic to forego providing the first functionality with respect to at least one request for content. 23. The apparatus of claim 22, wherein the means for controlling a functional block of the TA logic comprises: means for providing by the TA control logic an advisory parameter not to chunk the at least one request for content. 24. The apparatus of claim 17, wherein the attribute of the user agent's request comprises at least one of: a uniform resource identifier (URI) of data being requested from the content server; a file extension of data being requested from the content server; or information regarding the user agent making the request. 25. The apparatus of claim 17, wherein the attribute of the content server comprises at least one of: byte range request support by the content server; request forbidden by the content server; request range not-satisfiable by the content server; or a response code provided by the server determined to be indicative of content server suitability for transport acceleration operation. 26. The apparatus of claim 17, wherein the means for selectively invoking the first functionality of the TA logic or bypassing the first functionality of the TA logic comprises: means for determining whether the one or more acceleration selection attributes meet one or more criteria of an exclude list; and means for bypassing the first functionality of the TA logic in response to a determination that the one or more acceleration selection attributes meet the one or more criteria of the exclude list. 27. The apparatus of claim 17, wherein the means for selectively invoking the first functionality of the TA logic or bypassing the first functionality of the TA logic comprises: means for determining whether the one or more acceleration selection attributes meet one or more criteria of an exclude list; and means for determining whether the one or more acceleration selection attributes meets one or more criteria of an include list in response to a determination that the one or more acceleration selection attributes do not meet the one or more criteria of an exclude list; and means for invoking the first functionality of the TA logic in response to a determination that the one or more acceleration selection attributes meet one or more criteria of the include list. 28. The apparatus of claim 27, further comprising: means for populating at least one of the exclude list or the include list using learning logic identifying operation indicative of transport acceleration operation support. 29. The apparatus of claim 27, wherein the means for selectively invoking the first functionality of the TA logic or bypassing the first functionality of the TA logic comprises: means for determining whether the content server is included on a probing list; and means for controlling the TA logic to make the request as a probing request for determining suitability of the content server for operation of the first functionality of the TA logic in response to a determination that the content server is included on the probing list. 30. The apparatus of claim 19, wherein the means for selectively invoking the first functionality of the TA logic or bypassing the first functionality of the TA logic comprises: means for determining whether the content server is suitable for operation of the first functionality of the TA logic based upon the response to the request; and means for adding the content server to an exclude list for bypassing of the first functionality of the TA logic with respect to communication of the content between the client device and the content server in response to a determination that the content server is not suitable for operation of the first functionality of the TA logic. 31. A computer program product comprising: a computer-readable medium having program code recorded thereon, said program code comprising: program code to obtain, by transport accelerator (TA) control logic, one or more acceleration selection attributes comprising at least one of: an attribute of a user agent's request for content from a content server; or an attribute of the content server; and program code to selectively invoke first functionality of transport accelerator (TA) logic of a client device to obtain the content from the content server or bypassing the first functionality of the TA logic of the client device to obtain the content from the content server based on the one or more acceleration selection attributes obtained by the TA control logic of the client device, the first functionality of the TA logic of the client device comprising subdividing the user agent's request for content into a plurality of chunk requests for requesting chunks of the content from the content server to provide accelerated delivery of the content to the client device. 32. The computer program product of claim 31, further comprising: program code to invoke second functionality of the TA logic of the client device when bypassing the first functionality of the TA logic. 33. The computer program product of claim 31, wherein the program code to selectively invoke the first functionality of TA logic or bypassing the first functionality of the TA logic comprises: program code to route data to bypass a functional block of the TA logic providing the first functionality of the TA logic. 34. The computer program product of claim 31, wherein the program code to selectively invoke the first functionality of TA logic or bypassing the first functionality of the TA logic comprises: program code to control a functional block of the TA logic providing the first functionality of the TA logic to forego providing the first functionality with respect to at least one request for content. 35. The computer program product of claim 34, wherein the program code to control a functional block of the TA logic comprises: program code to provide by the TA control logic an advisory parameter not to chunk the at least one request for content. 36. The computer program product of claim 31, wherein the program code to selectively invoke the first functionality of the TA logic or bypassing the first functionality of the TA logic comprises: program code to determine whether the one or more acceleration selection attributes meet one or more criteria of an exclude list; and program code to determine whether the one or more acceleration selection attributes meets one or more criteria of an include list in response to determining that the one or more acceleration selection attributes do not meet the one or more criteria of an exclude list; and program code to invoke the first functionality of the TA logic in response to determining that the one or more acceleration selection attributes meet one or more criteria of the include list. 37. The computer program product of claim 36, further comprising: program code to populate at least one of the exclude list or the include list using learning logic identifying operation indicative of transport acceleration operation support. 38. The computer program product of claim 31, wherein the program code to selectively invoke the first functionality of the TA logic or bypassing the first functionality of the TA logic comprises: program code to determine whether the content server is included on a probing list; and program code to control the TA logic to make the request as a probing request for determining suitability of the content server for operation of the first functionality of the TA logic in response to determining that the content server is included on the probing list. 39. An apparatus configured for wireless communication, said apparatus comprising at least one processor; and a memory coupled to said at least one processor, wherein said at least one processor is configured: to obtain one or more acceleration selection attributes by transport accelerator (TA) control logic, wherein the one or more acceleration selection attributes comprise at least one of: an attribute of a user agent's request for content from a content server; or an attribute of the content server; and to selectively invoke first functionality of transport accelerator (TA) logic of a client device to obtain the content from the content server or bypassing the first functionality of the TA logic of the client device to obtain the content from the content server based on the one or more acceleration selection attributes obtained by the TA control logic of the client device, the first functionality of the TA logic of the client device comprising subdividing the user agent's request for content into a plurality of chunk requests for requesting chunks of the content from the content server to provide accelerated delivery of the content to the client device. 40. The apparatus of claim 39, wherein the at least one processor is configured to: determine whether the one or more acceleration selection attributes meet one or more criteria of an exclude list; and bypass the first functionality of the TA logic in response to a determination that the one or more acceleration selection attributes meet the one or more criteria of the exclude list. 41. The apparatus of claim 39, wherein the at least one processor is configured to: determine whether the one or more acceleration selection attributes meet one or more criteria of an exclude list; determine whether the one or more acceleration selection attributes meets one or more criteria of an include list in response to a determination that the one or more acceleration selection attributes do not meet the one or more criteria of an exclude list; and invoke the first functionality of the TA logic in response to a determination that the one or more acceleration selection attributes meet one or more criteria of the include list. 42. The apparatus of claim 39, wherein the at least one processor is configured to: determine whether the content server is included on a probing list; and control the TA logic to make the request as a probing request for determining suitability of the content server for operation of the first functionality of the TA logic in response to a determination that the content server is included on the probing list.
Systems and methods which are adapted to provide selective transport accelerator operation are disclosed. In operation according to embodiments, one or more functions of transport accelerator operation is selectively bypassed or not based upon particular criteria. Transport accelerator control logic may obtain one or more acceleration selection attributes and, based on the one or more acceleration selection attributes, selectively invoke first functionality of transport accelerator logic of a client device to obtain the content from the content server or bypassing the first functionality of the transport accelerator logic of the client device to obtain the content from the content server. The first functionality may comprise subdividing the user agent's request for content into a plurality of chunk requests for requesting chunks of the content from the content server to provide accelerated delivery of the content to the client device.1. A method comprising: obtaining, by transport accelerator (TA) control logic, one or more acceleration selection attributes comprising at least one of: an attribute of a user agent's request for content from a content server; or an attribute of the content server; and based on the one or more acceleration selection attributes obtained by the TA control logic of the client device, selectively invoking first functionality of transport accelerator (TA) logic of a client device to obtain the content from the content server or bypassing the first functionality of the TA logic of the client device to obtain the content from the content server, the first functionality of the TA logic of the client device comprising subdividing the user agent's request for content into a plurality of chunk requests for requesting chunks of the content from the content server to provide accelerated delivery of the content to the client device. 2. The method of claim 1, wherein the selectively invoking the first functionality of TA logic or bypassing the first functionality of the TA logic comprises bypassing the first functionality of the TA logic; and the method further comprises: invoking second functionality of the TA logic of the client device when bypassing the first functionality of the TA logic. 3. The method of claim 2, wherein the second functionality of the TA logic provides communication of the content via a plurality of connections established between the client device and the content server. 4. The method of claim 2, wherein the second functionality of the TA logic provides port recovery with respect to communication of the content between the client device and the content server. 5. The method of claim 1, wherein the selectively invoking the first functionality of TA logic or bypassing the first functionality of the TA logic comprises: routing data to bypass a functional block of the TA logic providing the first functionality of the TA logic. 6. The method of claim 1, wherein the selectively invoking the first functionality of TA logic or bypassing the first functionality of the TA logic comprises: controlling a functional block of the TA logic providing the first functionality of the TA logic to forego providing the first functionality with respect to at least one request for content. 7. The method of claim 6, wherein the controlling a functional block of the TA logic comprises: providing by the TA control logic an advisory parameter not to chunk the at least one request for content. 8. The method of claim 1, wherein the attribute of the user agent's request comprises at least one of: a uniform resource identifier (URI) of data being requested from the content server; a file extension of data being requested from the content server; or information regarding the user agent making the request. 9. The method of claim 1, wherein the attribute of the content server comprises at least one of: byte range request support by the content server; request forbidden by the content server; request range not-satisfiable by the content server; or a response code provided by the server determined to be indicative of content server suitability for transport acceleration operation. 10. The method of claim 1, wherein the selectively invoking the first functionality of the TA logic or bypassing the first functionality of the TA logic comprises: determining whether the one or more acceleration selection attributes meet one or more criteria of an exclude list; and in response to determining that the one or more acceleration selection attributes meet the one or more criteria of the exclude list, bypassing the first functionality of the TA logic. 11. The method of claim 1, wherein the selectively invoking the first functionality of the TA logic or bypassing the first functionality of the TA logic comprises: determining whether the one or more acceleration selection attributes meet one or more criteria of an exclude list; and in response to determining that the one or more acceleration selection attributes do not meet the one or more criteria of an exclude list: determining whether the one or more acceleration selection attributes meets one or more criteria of an include list; and in response to determining that the one or more acceleration selection attributes meet one or more criteria of the include list, invoking the first functionality of the TA logic. 12. The method of claim 11, further comprising: populating at least one of the exclude list or the include list using learning logic identifying operation indicative of transport acceleration operation support. 13. The method of claim 12, wherein the operation indicative of transport acceleration operation support comprises at least one of support for byte range requests, no support for byte range requests, requests resulting in a forbidden response, or requests resulting in a range not-satisfiable response. 14. The method of claim 1, wherein the attribute of the content server was derived from a response from the content server in response to a request made by the client device. 15. The method of claim 14, wherein the selectively invoking the first functionality of the TA logic or bypassing the first functionality of the TA logic comprises: determining whether the content server is included on a probing list; and in response to determining that the content server is included on the probing list, controlling the TA logic to make the request as a probing request for determining suitability of the content server for operation of the first functionality of the TA logic. 16. The method of claim 15, wherein the selectively invoking the first functionality of the TA logic or bypassing the first functionality of the TA logic comprises: determining whether the content server is suitable for operation of the first functionality of the TA logic based upon the response to the request; and in response to determining that the content server is not suitable for operation of the first functionality of the TA logic, adding the content server to an exclude list for bypassing of the first functionality of the TA logic with respect to communication of the content between the client device and the content server. 17. An apparatus comprising: means for transport accelerator (TA) control logic obtaining one or more acceleration selection attributes comprising at least one of: an attribute of a user agent's request for content from a content server; or an attribute of the content server; and means for selectively invoking first functionality of transport accelerator (TA) logic of a client device to obtain the content from the content server or bypassing the first functionality of the TA logic of the client device to obtain the content from the content server based on the one or more acceleration selection attributes obtained by the TA control logic of the client device, the first functionality of the TA logic of the client device comprising subdividing the user agent's request for content into a plurality of chunk requests for requesting chunks of the content from the content server to provide accelerated delivery of the content to the client device. 18. The apparatus of claim 17, wherein the means for selectively invoking the first functionality of TA logic or bypassing the first functionality of the TA logic comprises means for bypassing the first functionality of the TA logic; and the apparatus further comprises: means for invoking second functionality of the TA logic of the client device when bypassing the first functionality of the TA logic. 19. The apparatus of claim 18, wherein the second functionality of the TA logic provides communication of the content via a plurality of connections established between the client device and the content server. 20. The apparatus of claim 18, wherein the second functionality of the TA logic provides port recovery with respect to communication of the content between the client device and the content server. 21. The apparatus of claim 17, wherein the means for selectively invoking the first functionality of TA logic or bypassing the first functionality of the TA logic comprises: means for routing data to bypass a functional block of the TA logic providing the first functionality of the TA logic. 22. The apparatus of claim 17, wherein the means for selectively invoking the first functionality of TA logic or bypassing the first functionality of the TA logic comprises: means for controlling a functional block of the TA logic providing the first functionality of the TA logic to forego providing the first functionality with respect to at least one request for content. 23. The apparatus of claim 22, wherein the means for controlling a functional block of the TA logic comprises: means for providing by the TA control logic an advisory parameter not to chunk the at least one request for content. 24. The apparatus of claim 17, wherein the attribute of the user agent's request comprises at least one of: a uniform resource identifier (URI) of data being requested from the content server; a file extension of data being requested from the content server; or information regarding the user agent making the request. 25. The apparatus of claim 17, wherein the attribute of the content server comprises at least one of: byte range request support by the content server; request forbidden by the content server; request range not-satisfiable by the content server; or a response code provided by the server determined to be indicative of content server suitability for transport acceleration operation. 26. The apparatus of claim 17, wherein the means for selectively invoking the first functionality of the TA logic or bypassing the first functionality of the TA logic comprises: means for determining whether the one or more acceleration selection attributes meet one or more criteria of an exclude list; and means for bypassing the first functionality of the TA logic in response to a determination that the one or more acceleration selection attributes meet the one or more criteria of the exclude list. 27. The apparatus of claim 17, wherein the means for selectively invoking the first functionality of the TA logic or bypassing the first functionality of the TA logic comprises: means for determining whether the one or more acceleration selection attributes meet one or more criteria of an exclude list; and means for determining whether the one or more acceleration selection attributes meets one or more criteria of an include list in response to a determination that the one or more acceleration selection attributes do not meet the one or more criteria of an exclude list; and means for invoking the first functionality of the TA logic in response to a determination that the one or more acceleration selection attributes meet one or more criteria of the include list. 28. The apparatus of claim 27, further comprising: means for populating at least one of the exclude list or the include list using learning logic identifying operation indicative of transport acceleration operation support. 29. The apparatus of claim 27, wherein the means for selectively invoking the first functionality of the TA logic or bypassing the first functionality of the TA logic comprises: means for determining whether the content server is included on a probing list; and means for controlling the TA logic to make the request as a probing request for determining suitability of the content server for operation of the first functionality of the TA logic in response to a determination that the content server is included on the probing list. 30. The apparatus of claim 19, wherein the means for selectively invoking the first functionality of the TA logic or bypassing the first functionality of the TA logic comprises: means for determining whether the content server is suitable for operation of the first functionality of the TA logic based upon the response to the request; and means for adding the content server to an exclude list for bypassing of the first functionality of the TA logic with respect to communication of the content between the client device and the content server in response to a determination that the content server is not suitable for operation of the first functionality of the TA logic. 31. A computer program product comprising: a computer-readable medium having program code recorded thereon, said program code comprising: program code to obtain, by transport accelerator (TA) control logic, one or more acceleration selection attributes comprising at least one of: an attribute of a user agent's request for content from a content server; or an attribute of the content server; and program code to selectively invoke first functionality of transport accelerator (TA) logic of a client device to obtain the content from the content server or bypassing the first functionality of the TA logic of the client device to obtain the content from the content server based on the one or more acceleration selection attributes obtained by the TA control logic of the client device, the first functionality of the TA logic of the client device comprising subdividing the user agent's request for content into a plurality of chunk requests for requesting chunks of the content from the content server to provide accelerated delivery of the content to the client device. 32. The computer program product of claim 31, further comprising: program code to invoke second functionality of the TA logic of the client device when bypassing the first functionality of the TA logic. 33. The computer program product of claim 31, wherein the program code to selectively invoke the first functionality of TA logic or bypassing the first functionality of the TA logic comprises: program code to route data to bypass a functional block of the TA logic providing the first functionality of the TA logic. 34. The computer program product of claim 31, wherein the program code to selectively invoke the first functionality of TA logic or bypassing the first functionality of the TA logic comprises: program code to control a functional block of the TA logic providing the first functionality of the TA logic to forego providing the first functionality with respect to at least one request for content. 35. The computer program product of claim 34, wherein the program code to control a functional block of the TA logic comprises: program code to provide by the TA control logic an advisory parameter not to chunk the at least one request for content. 36. The computer program product of claim 31, wherein the program code to selectively invoke the first functionality of the TA logic or bypassing the first functionality of the TA logic comprises: program code to determine whether the one or more acceleration selection attributes meet one or more criteria of an exclude list; and program code to determine whether the one or more acceleration selection attributes meets one or more criteria of an include list in response to determining that the one or more acceleration selection attributes do not meet the one or more criteria of an exclude list; and program code to invoke the first functionality of the TA logic in response to determining that the one or more acceleration selection attributes meet one or more criteria of the include list. 37. The computer program product of claim 36, further comprising: program code to populate at least one of the exclude list or the include list using learning logic identifying operation indicative of transport acceleration operation support. 38. The computer program product of claim 31, wherein the program code to selectively invoke the first functionality of the TA logic or bypassing the first functionality of the TA logic comprises: program code to determine whether the content server is included on a probing list; and program code to control the TA logic to make the request as a probing request for determining suitability of the content server for operation of the first functionality of the TA logic in response to determining that the content server is included on the probing list. 39. An apparatus configured for wireless communication, said apparatus comprising at least one processor; and a memory coupled to said at least one processor, wherein said at least one processor is configured: to obtain one or more acceleration selection attributes by transport accelerator (TA) control logic, wherein the one or more acceleration selection attributes comprise at least one of: an attribute of a user agent's request for content from a content server; or an attribute of the content server; and to selectively invoke first functionality of transport accelerator (TA) logic of a client device to obtain the content from the content server or bypassing the first functionality of the TA logic of the client device to obtain the content from the content server based on the one or more acceleration selection attributes obtained by the TA control logic of the client device, the first functionality of the TA logic of the client device comprising subdividing the user agent's request for content into a plurality of chunk requests for requesting chunks of the content from the content server to provide accelerated delivery of the content to the client device. 40. The apparatus of claim 39, wherein the at least one processor is configured to: determine whether the one or more acceleration selection attributes meet one or more criteria of an exclude list; and bypass the first functionality of the TA logic in response to a determination that the one or more acceleration selection attributes meet the one or more criteria of the exclude list. 41. The apparatus of claim 39, wherein the at least one processor is configured to: determine whether the one or more acceleration selection attributes meet one or more criteria of an exclude list; determine whether the one or more acceleration selection attributes meets one or more criteria of an include list in response to a determination that the one or more acceleration selection attributes do not meet the one or more criteria of an exclude list; and invoke the first functionality of the TA logic in response to a determination that the one or more acceleration selection attributes meet one or more criteria of the include list. 42. The apparatus of claim 39, wherein the at least one processor is configured to: determine whether the content server is included on a probing list; and control the TA logic to make the request as a probing request for determining suitability of the content server for operation of the first functionality of the TA logic in response to a determination that the content server is included on the probing list.
2,400
7,216
7,216
13,940,240
2,432
Methods, systems, and computer readable media for adaptive packet filtering are disclosed. One method includes identifying at least one subset of rules and an ordered set of firewall packet filtering rules that defines a firewall policy such that the subset contains disjoint rules. Disjoint rules are defined as rules whose order can be changed without changing integrity of the firewall policy. Rules in the subset are sorted to statistically decrease the number of comparisons that will be applied to each packet that a firewall encounters. Packets are filtered at the firewall using the sorted rules in the subset by comparing each packet to each of the sorted rules in the subset until the packet is allowed or denied and ceasing the comparing for the packet in response to the packet being allowed or denied and thereby achieving sub-linear searching for packets filtered using the sorted rules in the subset.
1. A method, comprising: identifying, from among a plurality of rules that define a packet filtering policy, one or more groups of disjoint rules, wherein each of the one or more groups of disjoint rules comprises at least two rules that when applied to a packet either allow the packet to continue toward its destination or prevent the packet from continuing towards its destination irrespective of an order in which the at least two rules are applied to the packet, a first of the at least two rules specifying a set of network addresses for which packets should be allowed to continue toward their respective destinations, and a second of the at least two rules specifying a set of network addresses for which packets should be prevented from continuing toward their respective destinations; receiving a plurality of packets; applying the first of the at least two rules to a first portion of the plurality of packets, the first portion of the plurality of packets having network addresses in the set of network addresses for which packets should be allowed to continue toward their respective destinations; applying the second of the at least two rules to a second portion of the plurality of packets, the second portion of the plurality of packets having network addresses in the set of network addresses for which packets should be prevented from continuing toward their respective destinations; allowing the first portion of the plurality of packets to continue toward their respective destinations; and preventing the second portion of the plurality of packets from continuing toward their respective destinations.
Methods, systems, and computer readable media for adaptive packet filtering are disclosed. One method includes identifying at least one subset of rules and an ordered set of firewall packet filtering rules that defines a firewall policy such that the subset contains disjoint rules. Disjoint rules are defined as rules whose order can be changed without changing integrity of the firewall policy. Rules in the subset are sorted to statistically decrease the number of comparisons that will be applied to each packet that a firewall encounters. Packets are filtered at the firewall using the sorted rules in the subset by comparing each packet to each of the sorted rules in the subset until the packet is allowed or denied and ceasing the comparing for the packet in response to the packet being allowed or denied and thereby achieving sub-linear searching for packets filtered using the sorted rules in the subset.1. A method, comprising: identifying, from among a plurality of rules that define a packet filtering policy, one or more groups of disjoint rules, wherein each of the one or more groups of disjoint rules comprises at least two rules that when applied to a packet either allow the packet to continue toward its destination or prevent the packet from continuing towards its destination irrespective of an order in which the at least two rules are applied to the packet, a first of the at least two rules specifying a set of network addresses for which packets should be allowed to continue toward their respective destinations, and a second of the at least two rules specifying a set of network addresses for which packets should be prevented from continuing toward their respective destinations; receiving a plurality of packets; applying the first of the at least two rules to a first portion of the plurality of packets, the first portion of the plurality of packets having network addresses in the set of network addresses for which packets should be allowed to continue toward their respective destinations; applying the second of the at least two rules to a second portion of the plurality of packets, the second portion of the plurality of packets having network addresses in the set of network addresses for which packets should be prevented from continuing toward their respective destinations; allowing the first portion of the plurality of packets to continue toward their respective destinations; and preventing the second portion of the plurality of packets from continuing toward their respective destinations.
2,400
7,217
7,217
14,653,499
2,476
The present invention provides a method of reporting network information of the ZigBee network in a ZigBee coordination node of an Internet of Things, wherein the ZigBee coordination node is connected to a plurality of ZigBee nodes forming the ZigBee network, and the Internet of Things further comprises an auto-configuration server in the IP network, the ZigBee coordination node being connected to the auto-configuration server through a gateway, the method comprising the following steps: sending a first signaling based on the ZigBee device object to the gateway, the first signaling including network description information and neighbor list information of each ZigBee node in the ZigBee network. According to the solution of the present invention, it makes it possible to use TR-069 to manage the ZigBee network, and in the case of ZigBee network failure, the manager of the ZigBee network can rapidly understand the failure cause so as to be capable of rapidly locating and eliminating the failure, thereby enhancing the network management efficiency.
1. A method of reporting network information of a ZigBee network in a ZigBee coordination node of an Internet of Things, wherein the ZigBee coordination node is connected to a plurality of ZigBee nodes forming the ZigBee network, and the Internet of Things further comprises an auto-configuration server in an IP network, the ZigBee coordination node being connected to the auto-configuration server via a gateway, the method comprising the following step: a. sending a first signaling based on a ZigBee device object to the gateway, wherein the first signaling includes network description information and neighbor list information of each ZigBee node in the ZigBee network. 2. The method according to claim 1, wherein the first signaling further includes network failure cause information for the ZigBee network, the failure cause information is used for describing the failure and situation occurring at a network layer. 3. The method according to claim 1, wherein the network description information contains information of a personal area network where the current ZigBee node is located; the neighbor list information contains information of a router that may be a candidate parent node during a network discovery and joining phase, or the relationship and link-state information between the current ZigBee node and a neighboring ZigBee node after the current ZigBee node is added into the ZigBee network. 4. The method according to claim 2, wherein the failure cause information contains destination address information where the failure occurs and state coding information indicating the network failure. 5. The method according to claim 1, wherein the method further comprises the following step before the step (a): receiving a ZigBee-device-object-based first request message from the gateway, wherein the first request message is used for requesting the ZigBee coordination node to report the first signaling. 6. A method for assisting in reporting network information of a ZigBee network in a gateway of an Internet of Things, wherein the Internet of Things further comprises an auto-configuration server in an IP network and a ZigBee coordination node in a non-IP network, the ZigBee coordination node being connected to a plurality of ZigBee nodes forming the ZigBee network and being connected to the auto-configuration server via the gateway, the method comprising the following steps: I. receiving a first signaling based on a ZigBee device object from the ZigBee coordination node, wherein the first signaling contains network description information and neighbor list information for each ZigBee node in the ZigBee network; II. recording the information contained in the first signaling; III. translating the information contained in the first signaling into a TR-069-based message format, and sending the translated information to the auto-configuration server. 7. The method according to claim 6, wherein the first signaling further comprises network failure cause information for the ZigBee network, the failure cause information is used for describing the failure and situation occurring at a network layer. 8. The method according to claim 6, wherein the network description information contains information of a personal area network where the current ZigBee node is located; the neighbor list information contains information of a router that may be a candidate parent node during a network discovery and joining phase, or the relationship and link-state information between the current ZigBee node and a neighboring ZigBee node after the current ZigBee node is added into the ZigBee network. 9. The method according to claim 7, wherein the failure cause information contains destination address information where the failure occurs and state coding information indicating the network failure. 10. The method according to claim 6, further comprising the following step before the step (I): receiving a TR-069-based first request message from the auto-configuration server, wherein the first request message is used for requesting the ZigBee coordination node to report the first signaling; translating the first request message into a ZigBee-device-object-based format and forwarding it to the ZigBee coordination node. 11. A method of managing a ZigBee network in an auto-configuration server in an IP network of an Internet of Things, wherein the Internet of Things further comprises a ZigBee coordination node that is connected to a plurality of ZigBee nodes forming the ZigBee network, and the ZigBee coordination node being connected to the auto-configuration server via a gateway, the method comprising the following step: A. receiving a TR-069-based first signaling from the gateway, wherein the first signaling includes network description information and neighbor list information of each ZigBee node in the ZigBee network. 12. The method according to claim 11, wherein the first signaling further includes network failure cause information for the ZigBee network, the failure cause information is used for describing the failure and situation occurring at a network layer. 13. The method according to claim 11, wherein the network description information contains information of a personal area network where the current ZigBee node is located; the neighbor list information contains information of a router that may be a candidate parent node during a network discovery and joining phase, or the relationship and link-state information between the current ZigBee node and a neighboring ZigBee node after the current ZigBee node is added into the ZigBee network. 14. The method according to claim 12, wherein the failure cause information contains destination address information where the failure occurs and state coding information indicating the network failure. 15. The method according to claim 11, wherein the method further comprises the following step before the step (A): sending a TR-069-based first request message to the gateway, wherein the first request message is used for requesting the ZigBee coordination node to report the first signaling.
The present invention provides a method of reporting network information of the ZigBee network in a ZigBee coordination node of an Internet of Things, wherein the ZigBee coordination node is connected to a plurality of ZigBee nodes forming the ZigBee network, and the Internet of Things further comprises an auto-configuration server in the IP network, the ZigBee coordination node being connected to the auto-configuration server through a gateway, the method comprising the following steps: sending a first signaling based on the ZigBee device object to the gateway, the first signaling including network description information and neighbor list information of each ZigBee node in the ZigBee network. According to the solution of the present invention, it makes it possible to use TR-069 to manage the ZigBee network, and in the case of ZigBee network failure, the manager of the ZigBee network can rapidly understand the failure cause so as to be capable of rapidly locating and eliminating the failure, thereby enhancing the network management efficiency.1. A method of reporting network information of a ZigBee network in a ZigBee coordination node of an Internet of Things, wherein the ZigBee coordination node is connected to a plurality of ZigBee nodes forming the ZigBee network, and the Internet of Things further comprises an auto-configuration server in an IP network, the ZigBee coordination node being connected to the auto-configuration server via a gateway, the method comprising the following step: a. sending a first signaling based on a ZigBee device object to the gateway, wherein the first signaling includes network description information and neighbor list information of each ZigBee node in the ZigBee network. 2. The method according to claim 1, wherein the first signaling further includes network failure cause information for the ZigBee network, the failure cause information is used for describing the failure and situation occurring at a network layer. 3. The method according to claim 1, wherein the network description information contains information of a personal area network where the current ZigBee node is located; the neighbor list information contains information of a router that may be a candidate parent node during a network discovery and joining phase, or the relationship and link-state information between the current ZigBee node and a neighboring ZigBee node after the current ZigBee node is added into the ZigBee network. 4. The method according to claim 2, wherein the failure cause information contains destination address information where the failure occurs and state coding information indicating the network failure. 5. The method according to claim 1, wherein the method further comprises the following step before the step (a): receiving a ZigBee-device-object-based first request message from the gateway, wherein the first request message is used for requesting the ZigBee coordination node to report the first signaling. 6. A method for assisting in reporting network information of a ZigBee network in a gateway of an Internet of Things, wherein the Internet of Things further comprises an auto-configuration server in an IP network and a ZigBee coordination node in a non-IP network, the ZigBee coordination node being connected to a plurality of ZigBee nodes forming the ZigBee network and being connected to the auto-configuration server via the gateway, the method comprising the following steps: I. receiving a first signaling based on a ZigBee device object from the ZigBee coordination node, wherein the first signaling contains network description information and neighbor list information for each ZigBee node in the ZigBee network; II. recording the information contained in the first signaling; III. translating the information contained in the first signaling into a TR-069-based message format, and sending the translated information to the auto-configuration server. 7. The method according to claim 6, wherein the first signaling further comprises network failure cause information for the ZigBee network, the failure cause information is used for describing the failure and situation occurring at a network layer. 8. The method according to claim 6, wherein the network description information contains information of a personal area network where the current ZigBee node is located; the neighbor list information contains information of a router that may be a candidate parent node during a network discovery and joining phase, or the relationship and link-state information between the current ZigBee node and a neighboring ZigBee node after the current ZigBee node is added into the ZigBee network. 9. The method according to claim 7, wherein the failure cause information contains destination address information where the failure occurs and state coding information indicating the network failure. 10. The method according to claim 6, further comprising the following step before the step (I): receiving a TR-069-based first request message from the auto-configuration server, wherein the first request message is used for requesting the ZigBee coordination node to report the first signaling; translating the first request message into a ZigBee-device-object-based format and forwarding it to the ZigBee coordination node. 11. A method of managing a ZigBee network in an auto-configuration server in an IP network of an Internet of Things, wherein the Internet of Things further comprises a ZigBee coordination node that is connected to a plurality of ZigBee nodes forming the ZigBee network, and the ZigBee coordination node being connected to the auto-configuration server via a gateway, the method comprising the following step: A. receiving a TR-069-based first signaling from the gateway, wherein the first signaling includes network description information and neighbor list information of each ZigBee node in the ZigBee network. 12. The method according to claim 11, wherein the first signaling further includes network failure cause information for the ZigBee network, the failure cause information is used for describing the failure and situation occurring at a network layer. 13. The method according to claim 11, wherein the network description information contains information of a personal area network where the current ZigBee node is located; the neighbor list information contains information of a router that may be a candidate parent node during a network discovery and joining phase, or the relationship and link-state information between the current ZigBee node and a neighboring ZigBee node after the current ZigBee node is added into the ZigBee network. 14. The method according to claim 12, wherein the failure cause information contains destination address information where the failure occurs and state coding information indicating the network failure. 15. The method according to claim 11, wherein the method further comprises the following step before the step (A): sending a TR-069-based first request message to the gateway, wherein the first request message is used for requesting the ZigBee coordination node to report the first signaling.
2,400
7,218
7,218
14,865,136
2,467
Methods and apparatus to securely measure quality of service end to end in a network. First and second endpoints are configured to detect packets marked for QoS measurements, associate a timestamp using a secure clock with such marked packets, and report the timestamp along with packet identifying metadata to an external monitor. The external monitor uses the packet identifying metadata to match up timestamps and calculates a QoS measurement corresponding to the latency incurred by the packet when traversing a packet-processing path between the first and second endpoints. The endpoints may be implemented in physical devices, such as Ethernet controllers and physical switches, as well as virtual, software-defined components including virtual switches.
1. A method for securely measuring end-to-end Quality of Service (QoS) in a network, comprising: at a first endpoint, detecting a first packet marked for QoS measurement; generating, using a secure clock, a first timestamp for the first packet; determining packet identifying metadata for the first packet; reporting the first timestamp and the packet identifying metadata for the first packet to an external monitor; at a second endpoint, detecting the first packet is marked for QoS measurement; generating, using a secure clock, a second timestamp for the first packet; determining packet identifying metadata for the first packet; reporting the second timestamp and the packet identifying metadata for the first packet to the external monitor; and employing the first and second timestamps and the packet identifying metadata for the first packet to measure a latency incurred by the first packet from the first endpoint to the second endpoint. 2. The method of claim 1, wherein the first and second endpoints are physical endpoints. 3. The method of claim 1, wherein the first and second endpoints are virtual endpoints. 4. The method of claim 1, further comprising marking the first packet for QoS measurement. 5. The method of claim 1, wherein the packet identifying metadata comprises a flow ID. 6. The method of claim 5, further comprising performing a hash on multiple header field values in the first packet to determine the flow ID. 7. The method of claim 5, where the packet identifying metadata comprises a QoS class. 8. The method of claim 1, wherein at least one of the first and second endpoints is implemented in a host platform, and wherein a packet processing path for the first packet between the first and second endpoints does not traverse an operating system network stack for the host platform. 9. The method of claim 1, wherein a packet processing path for the first packet between the first and second endpoints includes a plurality of Network Function Virtualization (NFV) appliances. 10. The method of claim 1, further comprising: at the first endpoint, receiving a second packet, detecting that the second packet is not marked for QoS measurement; forwarding the second packet along a normal packet processing path; at the second endpoint, detecting that the second packet is not marked for QoS measurement; and forwarding the second packet along a normal packet processing path. 11. The method of claim 1, further comprising: determining using the packet identifying metadata reported from the first endpoint that the first packet is a first packet for a given flow for which QoS measurements are to be determined; determining using the packet identifying metadata reported from the second endpoint that the first packet is the first packet for the given flow for which QoS measurements are to be determined that has reached the second endpoint; and calculating the QoS measurement as a difference between the second timestamp and the first timestamp. 12. The method of claim 1, further comprising configuring each of the first and second endpoints to timestamp packets marked for QoS measurement and to report the timestamp and packet identifying metadata to the external monitor. 13. The method of claim 1, further comprising accessing the secure clock through a hardware-based Root-of-Trust component. 14. An Ethernet controller, comprising: a plurality of ports including input ports and output ports; one of a secure clock or an interface for receiving timestamp data generated by a secure clock; an interface for communicating with an external monitor when the Ethernet controller is operating; and embedded logic configured to perform operations when the Ethernet controller is operating, including, in response to receiving a first packet at a first port, detecting the first packet is marked for QoS measurement; generating, using the secure clock, a first timestamp for the first packet or receiving a first timestamp for the first packet via the interface for receiving timestamp data generated by a secure clock; determining packet identifying metadata for the first packet; reporting the first timestamp and the packet identifying metadata for the first packet to the external monitor; at a second port, detecting the first packet is marked for QoS measurement; generating, using the secure clock, a second timestamp for the first packet or receiving a second timestamp for the first packet via the interface for receiving timestamp data generated by a secure clock; determining packet identifying metadata for the first packet; reporting the second timestamp and the packet identifying metadata for the first packet to the external monitor, wherein the first and second timestamps and the packet identifying metadata for the first packet are configured to enable the external monitor to measure a latency incurred by the first packet as it traverses a packet processing path between the first port and the second port. 15. The Ethernet controller of claim 14, wherein the embedded logic includes at least one processor and memory to store instructions configured to be executed by the at least one processor to effect the operations. 16. The Ethernet controller of claim 14, wherein the packet identifying metadata comprises a flow ID. 17. The Ethernet controller of claim 16, wherein the embedded logic is configured to perform a hash on multiple header field values in the first packet to determine the flow ID. 18. The Ethernet controller of claim 16, where the packet identifying metadata comprises a QoS class. 19. The Ethernet controller of claim 14, wherein the embedded logic is configured to perform further operations comprising: at the first port, receiving a second packet, detecting that the second packet is not marked for QoS measurement; forwarding the second packet along a normal packet processing path; at the second port, detecting that the second packet is not marked for QoS measurement; and forwarding the second packet along a normal packet processing path. 20. A non-transient machine readable medium having instructions stored thereon configured to be executed on one or more processors in a compute platform having a secure clock, wherein execution of the instructions perform operations comprising: implementing a virtual switch, the virtual switch having a plurality of virtual ports; at a first virtual port, detecting a first packet marked for QoS measurement; generating, using the secure clock, a first timestamp for the first packet; determining packet identifying metadata for the first packet; reporting the first timestamp and the packet identifying metadata for the first packet to an external monitor; at a second virtual port, detecting the first packet is marked for QoS measurement; generating, using the secure clock, a second timestamp for the first packet; determining packet identifying metadata for the first packet; reporting the second timestamp and the packet identifying metadata for the first packet to the external monitor, wherein the first and second timestamps and the packet identifying metadata for the first packet are configured to enable the external monitor to measure a latency incurred by the first packet as it traverses a packet processing path between the first virtual port and the second virtual port. 21. The non-transient machine-readable medium of claim 20, wherein the virtual switch is connected to a plurality of virtual machines collectively hosting a plurality of Network Function Virtualization (NFV) appliances, and the packet processing path includes processing performed on the first packet by the plurality of NFV appliances. 22. The non-transient machine-readable medium of claim 20, wherein execution of the instructions perform further operations comprising: at the first virtual port, receiving a second packet, detecting that the second packet is not marked for QoS measurement; forwarding the second packet along a normal packet processing path; at the second virtual port, detecting that the second packet is not marked for QoS measurement; and forwarding the second packet along a normal packet processing path. 23. The non-transient machine-readable medium of claim 20, further comprising instructions for implementing operations performed by the external monitor, including: determining the first and second timestamp correspond to timestamps for the first packet using the packet identifying metadata reported from the first virtual port and the second virtual port; determining a flow to which the first packet is associated; calculating the QoS measurement as a difference between the second timestamp and the first timestamp; and associating the QoS measurement that is calculated with the flow to which the first packet is associated. 24. The non-transient machine-readable medium of claim 20, further comprising instructions for implementing operations performed by the external monitor, including: determining using the packet identifying metadata reported from the first virtual port that the first packet is a first packet for a given flow for which QoS measurements are to be determined; determining using the packet identifying metadata reported from the second virtual port that the first packet is the first packet for the given flow for which QoS measurements are to be determined that has reached the second virtual port; and calculating the QoS measurement as a difference between the second timestamp and the first timestamp. 25. The non-transient machine-readable medium of claim 20, wherein the secure clock is accessed through a hardware-based Root-of-Trust component and the instructions include instructions for accessing data generated by the secure clock via a software interface for the hardware-based Root-of-Trust component.
Methods and apparatus to securely measure quality of service end to end in a network. First and second endpoints are configured to detect packets marked for QoS measurements, associate a timestamp using a secure clock with such marked packets, and report the timestamp along with packet identifying metadata to an external monitor. The external monitor uses the packet identifying metadata to match up timestamps and calculates a QoS measurement corresponding to the latency incurred by the packet when traversing a packet-processing path between the first and second endpoints. The endpoints may be implemented in physical devices, such as Ethernet controllers and physical switches, as well as virtual, software-defined components including virtual switches.1. A method for securely measuring end-to-end Quality of Service (QoS) in a network, comprising: at a first endpoint, detecting a first packet marked for QoS measurement; generating, using a secure clock, a first timestamp for the first packet; determining packet identifying metadata for the first packet; reporting the first timestamp and the packet identifying metadata for the first packet to an external monitor; at a second endpoint, detecting the first packet is marked for QoS measurement; generating, using a secure clock, a second timestamp for the first packet; determining packet identifying metadata for the first packet; reporting the second timestamp and the packet identifying metadata for the first packet to the external monitor; and employing the first and second timestamps and the packet identifying metadata for the first packet to measure a latency incurred by the first packet from the first endpoint to the second endpoint. 2. The method of claim 1, wherein the first and second endpoints are physical endpoints. 3. The method of claim 1, wherein the first and second endpoints are virtual endpoints. 4. The method of claim 1, further comprising marking the first packet for QoS measurement. 5. The method of claim 1, wherein the packet identifying metadata comprises a flow ID. 6. The method of claim 5, further comprising performing a hash on multiple header field values in the first packet to determine the flow ID. 7. The method of claim 5, where the packet identifying metadata comprises a QoS class. 8. The method of claim 1, wherein at least one of the first and second endpoints is implemented in a host platform, and wherein a packet processing path for the first packet between the first and second endpoints does not traverse an operating system network stack for the host platform. 9. The method of claim 1, wherein a packet processing path for the first packet between the first and second endpoints includes a plurality of Network Function Virtualization (NFV) appliances. 10. The method of claim 1, further comprising: at the first endpoint, receiving a second packet, detecting that the second packet is not marked for QoS measurement; forwarding the second packet along a normal packet processing path; at the second endpoint, detecting that the second packet is not marked for QoS measurement; and forwarding the second packet along a normal packet processing path. 11. The method of claim 1, further comprising: determining using the packet identifying metadata reported from the first endpoint that the first packet is a first packet for a given flow for which QoS measurements are to be determined; determining using the packet identifying metadata reported from the second endpoint that the first packet is the first packet for the given flow for which QoS measurements are to be determined that has reached the second endpoint; and calculating the QoS measurement as a difference between the second timestamp and the first timestamp. 12. The method of claim 1, further comprising configuring each of the first and second endpoints to timestamp packets marked for QoS measurement and to report the timestamp and packet identifying metadata to the external monitor. 13. The method of claim 1, further comprising accessing the secure clock through a hardware-based Root-of-Trust component. 14. An Ethernet controller, comprising: a plurality of ports including input ports and output ports; one of a secure clock or an interface for receiving timestamp data generated by a secure clock; an interface for communicating with an external monitor when the Ethernet controller is operating; and embedded logic configured to perform operations when the Ethernet controller is operating, including, in response to receiving a first packet at a first port, detecting the first packet is marked for QoS measurement; generating, using the secure clock, a first timestamp for the first packet or receiving a first timestamp for the first packet via the interface for receiving timestamp data generated by a secure clock; determining packet identifying metadata for the first packet; reporting the first timestamp and the packet identifying metadata for the first packet to the external monitor; at a second port, detecting the first packet is marked for QoS measurement; generating, using the secure clock, a second timestamp for the first packet or receiving a second timestamp for the first packet via the interface for receiving timestamp data generated by a secure clock; determining packet identifying metadata for the first packet; reporting the second timestamp and the packet identifying metadata for the first packet to the external monitor, wherein the first and second timestamps and the packet identifying metadata for the first packet are configured to enable the external monitor to measure a latency incurred by the first packet as it traverses a packet processing path between the first port and the second port. 15. The Ethernet controller of claim 14, wherein the embedded logic includes at least one processor and memory to store instructions configured to be executed by the at least one processor to effect the operations. 16. The Ethernet controller of claim 14, wherein the packet identifying metadata comprises a flow ID. 17. The Ethernet controller of claim 16, wherein the embedded logic is configured to perform a hash on multiple header field values in the first packet to determine the flow ID. 18. The Ethernet controller of claim 16, where the packet identifying metadata comprises a QoS class. 19. The Ethernet controller of claim 14, wherein the embedded logic is configured to perform further operations comprising: at the first port, receiving a second packet, detecting that the second packet is not marked for QoS measurement; forwarding the second packet along a normal packet processing path; at the second port, detecting that the second packet is not marked for QoS measurement; and forwarding the second packet along a normal packet processing path. 20. A non-transient machine readable medium having instructions stored thereon configured to be executed on one or more processors in a compute platform having a secure clock, wherein execution of the instructions perform operations comprising: implementing a virtual switch, the virtual switch having a plurality of virtual ports; at a first virtual port, detecting a first packet marked for QoS measurement; generating, using the secure clock, a first timestamp for the first packet; determining packet identifying metadata for the first packet; reporting the first timestamp and the packet identifying metadata for the first packet to an external monitor; at a second virtual port, detecting the first packet is marked for QoS measurement; generating, using the secure clock, a second timestamp for the first packet; determining packet identifying metadata for the first packet; reporting the second timestamp and the packet identifying metadata for the first packet to the external monitor, wherein the first and second timestamps and the packet identifying metadata for the first packet are configured to enable the external monitor to measure a latency incurred by the first packet as it traverses a packet processing path between the first virtual port and the second virtual port. 21. The non-transient machine-readable medium of claim 20, wherein the virtual switch is connected to a plurality of virtual machines collectively hosting a plurality of Network Function Virtualization (NFV) appliances, and the packet processing path includes processing performed on the first packet by the plurality of NFV appliances. 22. The non-transient machine-readable medium of claim 20, wherein execution of the instructions perform further operations comprising: at the first virtual port, receiving a second packet, detecting that the second packet is not marked for QoS measurement; forwarding the second packet along a normal packet processing path; at the second virtual port, detecting that the second packet is not marked for QoS measurement; and forwarding the second packet along a normal packet processing path. 23. The non-transient machine-readable medium of claim 20, further comprising instructions for implementing operations performed by the external monitor, including: determining the first and second timestamp correspond to timestamps for the first packet using the packet identifying metadata reported from the first virtual port and the second virtual port; determining a flow to which the first packet is associated; calculating the QoS measurement as a difference between the second timestamp and the first timestamp; and associating the QoS measurement that is calculated with the flow to which the first packet is associated. 24. The non-transient machine-readable medium of claim 20, further comprising instructions for implementing operations performed by the external monitor, including: determining using the packet identifying metadata reported from the first virtual port that the first packet is a first packet for a given flow for which QoS measurements are to be determined; determining using the packet identifying metadata reported from the second virtual port that the first packet is the first packet for the given flow for which QoS measurements are to be determined that has reached the second virtual port; and calculating the QoS measurement as a difference between the second timestamp and the first timestamp. 25. The non-transient machine-readable medium of claim 20, wherein the secure clock is accessed through a hardware-based Root-of-Trust component and the instructions include instructions for accessing data generated by the secure clock via a software interface for the hardware-based Root-of-Trust component.
2,400
7,219
7,219
13,241,055
2,411
In example embodiments of systems and methods of outside plant transport gateway provided herein, instead of locating the gateway/media converter inside the customer premises, the gateway/media converter is located outside the customer premises and may be configured to provide access/media conversion for multiple homes. In previous systems, the gateway/media converter is located in the customer premises. However, the customer premises must be entered to perform maintenance or other work. Moving the gateway/router outside of the customer premises offers easier maintenance at the gateway level.
1. A system comprising: a media converter located outside of customer premises, the media converter configured to receive packets from an access network in a first format, to convert the packets from the first format to a second format; and to transmit packets the packets in a second format to one or more customer premises equipment units (CPEUs). 2. The system of claim 1, wherein the media converter is powered by a service provider physical plant. 3. The system of claim 1, wherein the media converter is configured to transmit packets to a plurality of types of CPEUs. 4. The system of claim 3, wherein the CPEUs comprise at least one of an internet protocol television, a personal computer, and a smart grid device. 5. The system of claim 1, wherein the media converter transmits packets to at least one of a multimedia over coax alliance (MoCA) network, an Ethernet network, and an IEEE 802.11 network. 6. The system of claim 1, wherein the media converter transmits packets to at least one of a multimedia over coax alliance (MoCA) device, an Ethernet device, and an IEEE 802.11 device. 7. The system of claim 1, wherein the media converter receives packets from at least one of a fiber-based access network, a wireless access network, and a hybrid-fiber-coaxial (HFC) access network. 8. The system of claim 1, wherein the media converter is further configured to receive packets from the CPEUs and to transmit packets to the access network. 9. The system of claim 1, wherein the media converter is further configured to convert the received packets from a format of the access network to a format of at least one of the CPEUs. 10. A method comprising: receiving packets in a media converter located outside customer premises, the packets received from an access network in a first medium; converting the packets from the first medium to a second medium; and transmitting the packets to customer premises equipment units (CPEUs). 11. The method of claim 10, further comprising powering the media converter by a service provider physical plant. 12. The method of claim 10, wherein transmitting packets to CPEUs further comprises transmitting packets to a plurality of types of CPEUs. 13. The method of claim 12, wherein the CPEUs comprise at least one of an internet protocol television, a personal computer, and a smart grid device. 14. The method of claim 10, wherein transmitting packets further comprises transmitting packets to at least one of a multimedia over coax alliance (MoCA) network, an Ethernet network, and an IEEE 802.11 network. 15. The method of claim 10, wherein transmitting packets further comprises transmitting packets to at least one of a multimedia over coax alliance (MoCA) device, an Ethernet device, and an IEEE 802.11 device. 16. The method of claim 10, wherein receiving packets further comprises receiving packets from at least one of a fiber-based access network, a wireless access network, and a hybrid-fiber-coaxial (HFC) access network. 17. The method of claim 10, wherein receiving packets further comprises receiving packets from the CPEUs and transmitting packets further comprises transmitting packets to the access network. 18. The method of claim 10, further comprising converting the received packets from a format of the access network to a format of at least one of the CPEUs. 19. A service provider physical plant comprising: a power supply; a router powered by the power supply; and a media converter powered by the power supply, the media converter configured to transceive packets with an access network in a first format; convert the packets to and from a second format, the second format defined by a customer premises equipment unit; and transceive packets in the second format with the CPEU through the router. 20. The system of claim 15, wherein the media converter is further configured to receive packets from at least one of a fiber-based access network, a wireless access network, and a hybrid-fiber-coaxial (HFC) access network and to transmit packets to at least one of a multimedia over coax alliance (MoCA) network, an Ethernet network, and an IEEE 802.11 network.
In example embodiments of systems and methods of outside plant transport gateway provided herein, instead of locating the gateway/media converter inside the customer premises, the gateway/media converter is located outside the customer premises and may be configured to provide access/media conversion for multiple homes. In previous systems, the gateway/media converter is located in the customer premises. However, the customer premises must be entered to perform maintenance or other work. Moving the gateway/router outside of the customer premises offers easier maintenance at the gateway level.1. A system comprising: a media converter located outside of customer premises, the media converter configured to receive packets from an access network in a first format, to convert the packets from the first format to a second format; and to transmit packets the packets in a second format to one or more customer premises equipment units (CPEUs). 2. The system of claim 1, wherein the media converter is powered by a service provider physical plant. 3. The system of claim 1, wherein the media converter is configured to transmit packets to a plurality of types of CPEUs. 4. The system of claim 3, wherein the CPEUs comprise at least one of an internet protocol television, a personal computer, and a smart grid device. 5. The system of claim 1, wherein the media converter transmits packets to at least one of a multimedia over coax alliance (MoCA) network, an Ethernet network, and an IEEE 802.11 network. 6. The system of claim 1, wherein the media converter transmits packets to at least one of a multimedia over coax alliance (MoCA) device, an Ethernet device, and an IEEE 802.11 device. 7. The system of claim 1, wherein the media converter receives packets from at least one of a fiber-based access network, a wireless access network, and a hybrid-fiber-coaxial (HFC) access network. 8. The system of claim 1, wherein the media converter is further configured to receive packets from the CPEUs and to transmit packets to the access network. 9. The system of claim 1, wherein the media converter is further configured to convert the received packets from a format of the access network to a format of at least one of the CPEUs. 10. A method comprising: receiving packets in a media converter located outside customer premises, the packets received from an access network in a first medium; converting the packets from the first medium to a second medium; and transmitting the packets to customer premises equipment units (CPEUs). 11. The method of claim 10, further comprising powering the media converter by a service provider physical plant. 12. The method of claim 10, wherein transmitting packets to CPEUs further comprises transmitting packets to a plurality of types of CPEUs. 13. The method of claim 12, wherein the CPEUs comprise at least one of an internet protocol television, a personal computer, and a smart grid device. 14. The method of claim 10, wherein transmitting packets further comprises transmitting packets to at least one of a multimedia over coax alliance (MoCA) network, an Ethernet network, and an IEEE 802.11 network. 15. The method of claim 10, wherein transmitting packets further comprises transmitting packets to at least one of a multimedia over coax alliance (MoCA) device, an Ethernet device, and an IEEE 802.11 device. 16. The method of claim 10, wherein receiving packets further comprises receiving packets from at least one of a fiber-based access network, a wireless access network, and a hybrid-fiber-coaxial (HFC) access network. 17. The method of claim 10, wherein receiving packets further comprises receiving packets from the CPEUs and transmitting packets further comprises transmitting packets to the access network. 18. The method of claim 10, further comprising converting the received packets from a format of the access network to a format of at least one of the CPEUs. 19. A service provider physical plant comprising: a power supply; a router powered by the power supply; and a media converter powered by the power supply, the media converter configured to transceive packets with an access network in a first format; convert the packets to and from a second format, the second format defined by a customer premises equipment unit; and transceive packets in the second format with the CPEU through the router. 20. The system of claim 15, wherein the media converter is further configured to receive packets from at least one of a fiber-based access network, a wireless access network, and a hybrid-fiber-coaxial (HFC) access network and to transmit packets to at least one of a multimedia over coax alliance (MoCA) network, an Ethernet network, and an IEEE 802.11 network.
2,400
7,220
7,220
13,973,883
2,442
A system, method and computer-readable medium for request routing based on application information associated with the requested resource are provided. A DNS nameserver at an application broker obtains a DNS query corresponding to a resource requested from a client computing device and associated with a first resource identifier. The first resource identifier includes application information associated with the requested resource. Based on the application information parsed from the first resource identifier, the DNS nameserver at the application broker selects either a second resource identifier which resolves to a domain of a network computing provider or an IP address associated with a network computing component for processing the requested resource. The DNS nameserver then transmits either the second resource identifier or IP address to the client computing device.
1. A system comprising: a data store configured to store specific computer executable instructions; and a DNS server including a processor in communication with the data store, the processor configured to execute the stored specific computer executable instructions in order to at least: obtain a DNS query from a client computing device, wherein the DNS query corresponds to a requested resource associated with a first resource identifier and wherein the DNS server corresponds to an application broker; select a network computing component for processing the requested resource from a plurality of network computing components based on application information included in a DNS portion of the first resource identifier; and cause transmission of information identifying the selected network computing component from the DNS server to the client computing device. 2. The system as recited in claim 1, wherein the network computing component is operative to dynamically cause the creation of an instance of a virtual machine for processing the requested resource. 3. The system as recited in claim 1, wherein the first resource identifier includes information identifying the application broker. 4. The system as recited in claim 1, wherein the application information comprises identification of a file type of the requested resource. 5. The system as recited in claim 4, wherein the network computing component is selected at the DNS server based on the file type. 6. The system as recited in claim 1, wherein the application information comprises identification of a type of application for processing the requested resource. 7. The system as recited in claim 6, wherein the network computing component is selected at the DNS server based on the application type. 8. The system as recited in claim 1, wherein the application information includes identification of an instance of an application for processing the requested resource. 9. The system as recited in claim 8, wherein the network computing component is selected at the DNS server based on the application instance. 10. A non-transitory computer-readable storage medium having computer-executable instructions for implementation by a DNS server to cause the DNS server to: obtain a DNS query from a client computing device, wherein the DNS query corresponds to a requested resource associated with a first resource identifier and wherein the DNS server corresponds to an application broker; select a network computing component for processing the requested resource from a plurality of network computing components based on application information included in a DNS portion of the first resource identifier; and cause transmission of information identifying the selected network computing component from the DNS server to the client computing device. 11. The computer-readable storage medium as recited in claim 10, wherein the network computing component is operative to dynamically cause the creation of an instance of a virtual machine for processing the requested resource. 12. The computer-readable storage medium as recited in claim 10, wherein the first resource identifier includes information identifying the application broker. 13. The computer-readable storage medium as recited in claim 10, wherein the application information comprises identification of a file type of the requested resource. 14. The computer-readable storage medium as recited in claim 13, wherein the network computing component is selected at the DNS server based on the file type. 15. The computer-readable storage medium as recited in claim 10, wherein the application information comprises identification of a type of application for processing the requested resource. 16. The computer-readable storage medium as recited in claim 15, wherein the network computing component is selected at the DNS server based on the application type. 17. The computer-readable storage medium as recited in claim 10, wherein the application information includes identification of an instance of an application for processing the requested resource. 18. The computer-readable storage medium as recited in claim 17, wherein the network computing component is selected at the DNS server based on the application instance. 19. A system comprising: a data store configured to store specific computer executable instructions; and a DNS server including a processor in communication with the data store, the processor configured to execute the stored specific computer executable instructions in order to at least: obtain a DNS query from a client computing device, wherein the DNS query corresponds to a requested resource associated with a first resource identifier and wherein the DNS server corresponds to an application broker; select a network computing component for processing the requested resource from a plurality of network computing components based on information included in a DNS portion of the first resource identifier for identifying application information for use in selecting the network computing component; and cause transmission of information identifying the selected network computing component from the DNS server to the client computing device. 20. A system comprising: obtaining a DNS query from a client computing device at a DNS server, wherein the DNS query corresponds to a requested resource associated with a first resource identifier and wherein the DNS server corresponds to an application broker; selecting a network computing component for processing the requested resource from a plurality of network computing components based on information included in a DNS portion of the first resource identifier for identifying application information for use in selecting the network computing component; and causing transmission of information identifying the selected network computing component from the DNS server to the client computing device.
A system, method and computer-readable medium for request routing based on application information associated with the requested resource are provided. A DNS nameserver at an application broker obtains a DNS query corresponding to a resource requested from a client computing device and associated with a first resource identifier. The first resource identifier includes application information associated with the requested resource. Based on the application information parsed from the first resource identifier, the DNS nameserver at the application broker selects either a second resource identifier which resolves to a domain of a network computing provider or an IP address associated with a network computing component for processing the requested resource. The DNS nameserver then transmits either the second resource identifier or IP address to the client computing device.1. A system comprising: a data store configured to store specific computer executable instructions; and a DNS server including a processor in communication with the data store, the processor configured to execute the stored specific computer executable instructions in order to at least: obtain a DNS query from a client computing device, wherein the DNS query corresponds to a requested resource associated with a first resource identifier and wherein the DNS server corresponds to an application broker; select a network computing component for processing the requested resource from a plurality of network computing components based on application information included in a DNS portion of the first resource identifier; and cause transmission of information identifying the selected network computing component from the DNS server to the client computing device. 2. The system as recited in claim 1, wherein the network computing component is operative to dynamically cause the creation of an instance of a virtual machine for processing the requested resource. 3. The system as recited in claim 1, wherein the first resource identifier includes information identifying the application broker. 4. The system as recited in claim 1, wherein the application information comprises identification of a file type of the requested resource. 5. The system as recited in claim 4, wherein the network computing component is selected at the DNS server based on the file type. 6. The system as recited in claim 1, wherein the application information comprises identification of a type of application for processing the requested resource. 7. The system as recited in claim 6, wherein the network computing component is selected at the DNS server based on the application type. 8. The system as recited in claim 1, wherein the application information includes identification of an instance of an application for processing the requested resource. 9. The system as recited in claim 8, wherein the network computing component is selected at the DNS server based on the application instance. 10. A non-transitory computer-readable storage medium having computer-executable instructions for implementation by a DNS server to cause the DNS server to: obtain a DNS query from a client computing device, wherein the DNS query corresponds to a requested resource associated with a first resource identifier and wherein the DNS server corresponds to an application broker; select a network computing component for processing the requested resource from a plurality of network computing components based on application information included in a DNS portion of the first resource identifier; and cause transmission of information identifying the selected network computing component from the DNS server to the client computing device. 11. The computer-readable storage medium as recited in claim 10, wherein the network computing component is operative to dynamically cause the creation of an instance of a virtual machine for processing the requested resource. 12. The computer-readable storage medium as recited in claim 10, wherein the first resource identifier includes information identifying the application broker. 13. The computer-readable storage medium as recited in claim 10, wherein the application information comprises identification of a file type of the requested resource. 14. The computer-readable storage medium as recited in claim 13, wherein the network computing component is selected at the DNS server based on the file type. 15. The computer-readable storage medium as recited in claim 10, wherein the application information comprises identification of a type of application for processing the requested resource. 16. The computer-readable storage medium as recited in claim 15, wherein the network computing component is selected at the DNS server based on the application type. 17. The computer-readable storage medium as recited in claim 10, wherein the application information includes identification of an instance of an application for processing the requested resource. 18. The computer-readable storage medium as recited in claim 17, wherein the network computing component is selected at the DNS server based on the application instance. 19. A system comprising: a data store configured to store specific computer executable instructions; and a DNS server including a processor in communication with the data store, the processor configured to execute the stored specific computer executable instructions in order to at least: obtain a DNS query from a client computing device, wherein the DNS query corresponds to a requested resource associated with a first resource identifier and wherein the DNS server corresponds to an application broker; select a network computing component for processing the requested resource from a plurality of network computing components based on information included in a DNS portion of the first resource identifier for identifying application information for use in selecting the network computing component; and cause transmission of information identifying the selected network computing component from the DNS server to the client computing device. 20. A system comprising: obtaining a DNS query from a client computing device at a DNS server, wherein the DNS query corresponds to a requested resource associated with a first resource identifier and wherein the DNS server corresponds to an application broker; selecting a network computing component for processing the requested resource from a plurality of network computing components based on information included in a DNS portion of the first resource identifier for identifying application information for use in selecting the network computing component; and causing transmission of information identifying the selected network computing component from the DNS server to the client computing device.
2,400
7,221
7,221
12,607,231
2,443
A method of obtaining contextually relevant content by a wireless communications device is provided. The method may comprise obtaining, by a wireless communications device (WCD), a destination device identifying item, transmitting the destination device identifying item to a contextual content server, wherein the contextual content server determines one or more contextually relevant content items by processing the received destination device identifying item and a WCD location value, and receiving, from the contextual content server, at least one of the one or more contextually relevant content items.
1. A method of obtaining contextually relevant content by a wireless communications device, the method comprising: obtaining, by a wireless communications device (WCD), a destination device identifying item; transmitting the destination device identifying item to a contextual content server, wherein the contextual content server determines one or more contextually relevant content items by processing the received destination device identifying item; and receiving, from the contextual content server, at least one of the one or more contextually relevant content items. 2. The method of claim 1, wherein the contextual content server determines relevancy of the one or more contextually relevant content items with respect to at least one of: a WCD location value, a location associated with the destination device identifying item, textual content parsed from the destination device identifying item, a business or business category associated with the destination device identifying item, information obtained from an advertisement server, information obtained from a recommendations server, information obtained from a location server, or information obtained from a mobile operator associated with the WCD. 3. The method of claim 2, wherein the one or more contextually relevant content items determined with respect to the WCD location value include at least one of: weather information, local news feeds, local events, local time, a local country specific exchange rate, a local country specific stock index trigger, one or more social networking site feed associated with a user of the WCD, one or more point of interest associated with the business category for the destination device identifying item within a predefined distance from the WCD location value, map information, map information for the at least one of the one or more points of interest, one or more recommendations for other businesses, coupons or directions to the location associated with the destination device identifying item. 4. The method of claim 2, wherein the one or more contextually relevant content items determined with respect to the location associated with the destination device identifying item include at least one of: weather information, local news feeds, a business name, a business address, a business category, one or more points of interest associated with the business category within a predefined distance, map information, map information for the at least one of the one or more points of interest associated with the business category, one or more businesses related to the business category, recommendations for the one or more businesses related to the business category, directions to at least one of the one or more businesses related to the business category, or directions from the WCD location value to the location associated with the destination device identifying item. 5. The method of claim 2, wherein the one or more contextually relevant content items determined with respect to the business or business category destination device identifying item includes one or more contextually relevant content items determined through extracting a alpha-numeric representation from the business destination device identifying item and using the extracted alpha-numeric representation to determine a business category or at least one related business. 6. The method of claim 2, wherein the one or more contextually relevant content items determined with respect to the advertisement server are based on at least one of: a business associated with the destination device identifying item, a location associated with the destination device identifying item, or a location relationship between the WCD location value and the location associated with the destination device identifying item. 7. The method of claim 2, wherein the one or more contextually relevant content items determined with respect to the mobile operator associated with the WCD include at least one of: one or more advertisements associated with the mobile operator, one or more advertisements from one or more content providers associated with the mobile operator, one or more advertisements associated with a business category for the destination device identifying item, or one or more advertisements associated with a user profile for a user associated with the WCD. 8. The method of claim 2, wherein the contextual content server is associated with at least one of: the mobile operator, the advertisement server, or the recommendations server. 9. The method of claim 1, wherein the obtaining the destination device identifying item further includes at least one of: receiving a user inputted phone number from a user interface associated with the WCD, receiving a user inputted phone number from an address book associated with the WCD, receiving a user inputted value from a plurality of mobile operator provided values, or receiving the destination device identifying item from the incoming call. 10. The method of claim 3, wherein the WCD location information is obtained through at least one of: receiving the WCD location value from a location sensor associated with the WCD, or receiving the WCD location information from a user input, or receiving the WCD location information from an area code of a phone number associated with the WCD, or receiving the WCD location information from a location server. 11. The method of claim 1, wherein the receiving further comprises: receiving the at least one or the one or more contextually relevant content items during one or more operational intervals associated with the WCD, wherein the one or more operational intervals include at least one of: an interval prior to initiating a communication connection with the destination device identifying item, an interval prior to a communication connection being completed to the destination device identifying item, an interval during communications after the communication connection is established, or an interval after the communication connection is terminated. 12. The method of claim 11, wherein the receiving during the interval prior to initiating a communication connection with the destination device identifying item further comprises: displaying the one or more contextually relevant content items in response to a user input associated with an application displaying one or more non-contextually relevant content items. 13. The method of claim 1, wherein transmitting the destination device identifying item further transmitting the destination device identifying item using at least one of: a short message service (SMS) protocol, an enhanced messaging service (EMS) protocol, a multimedia message service (MMS) protocol, an Internet Protocol (IP) socket protocol, a code division multiple access (CDMA)-based protocol, or a global system for mobile communications (GSM)-based protocol. 14. The method of claim 1, wherein transmitting the destination device identifying item further transmitting the destination device identifying item as at least one of: a short message service (SMS) communication data packet, or a destination device phone number. 15. At least one processor configured to obtain contextually relevant content by a wireless communications device: a first module for obtaining, by a wireless communications device (WCD), a destination device identifying item; a second module for transmitting the destination device identifying item to a contextual content server, wherein the contextual content server determines one or more contextually relevant content items by processing the received destination device identifying item; and a third module for receiving, from the contextual content server, at least one of the one or more contextually relevant content items. 16. A computer program product, comprising: a computer-readable medium comprising: a first set of codes for causing a computer to obtain, by a wireless communications device (WCD), a destination device identifying item; a second set of codes for causing the computer to transmit the destination device identifying item to a contextual content server, wherein the contextual content server determines one or more contextually relevant content items by processing the received destination device identifying item; and a third set of codes for causing the computer to receive, from the contextual content server, at least one of the one or more contextually relevant content items. 17. An apparatus, comprising: means for obtaining, by a wireless communications device (WCD), a destination device identifying item; means for transmitting the destination device identifying item to a contextual content server, wherein the contextual content server determines one or more contextually relevant content items by processing the received destination device identifying item; and means for receiving, from the contextual content server, at least one of the one or more contextually relevant content items. 18. A wireless communications device (WCD), comprising: a communications module operable for: obtaining, by a wireless communications device (WCD), a destination device identifying item; transmitting the destination device identifying item to a contextual content server, wherein the contextual content server determines one or more contextually relevant content items by processing the received destination device identifying item; and receiving, from the contextual content server, at least one of the one or more contextually relevant content items. 19. The WCD of claim 18, wherein the contextual content server determines relevancy of the one or more contextually relevant content items with respect to at least one of: a WCD location value, a location associated with the destination device identifying item, textual content parsed from the destination device identifying item, a business or business category associated with the destination device identifying item, information obtained from an advertisement server, information obtained from a recommendations server, information obtained from a location server, or information obtained from a mobile operator associated with the WCD. 20. The WCD of claim 19, wherein the one or more contextually relevant content items determined with respect to the WCD location value include at least one of: weather information, local news feeds, local events, local time, a local country specific exchange rate, a local country specific stock index trigger, one or more social networking site feed associated with a user of the WCD, one or more point of interest associated with the business category for the destination device identifying item within a predefined distance from the WCD location value, map information, map information for the at least one of the one or more points of interest, one or more recommendations for other businesses, coupons or directions to the location associated with the destination device identifying item. 21. The WCD of claim 19, wherein the one or more contextually relevant content items determined with respect to the location associated with the destination device identifying item include at least one of: weather information, local news feeds, a business name, a business address, a business category, one or more points of interest associated with the business category within a predefined distance, map information, map information for the at least one of the one or more points of interest associated with the business category, one or more businesses related to the business category, recommendations for the one or more businesses related to the business category, directions to at least one of the one or more businesses related to the business category, or directions from the WCD location value to the location associated with the destination device identifying item. 22. The WCD of claim 19, wherein the one or more contextually relevant content items determined with respect to the business or business category destination device identifying item includes one or more contextually relevant content items determined through extracting a alpha-numeric representation from the business destination device identifying item and using the extracted alpha-numeric representation to determine a business category or at least one related business. 23. The WCD of claim 19, wherein the one or more contextually relevant content items determined with respect to the advertisement server are based on at least one of: a business associated with the destination device identifying item, a location associated with the destination device identifying item, or a location relationship between the WCD location value and the location associated with the destination device identifying item. 24. The WCD of claim 19, wherein the one or more contextually relevant content items determined with respect to the mobile operator associated with the WCD include at least one of: one or more advertisements associated with the mobile operator, one or more advertisements from one or more content providers associated with the mobile operator, one or more advertisements associated with a business category for the destination device identifying item, or one or more advertisements associated with a user profile for a user associated with the WCD. 25. The WCD of claim 19, wherein the contextual content server is associated with at least one of: the mobile operator, the advertisement server, or the recommendations server. 26. The WCD of claim 18, wherein the communications module is further operable for: receiving a user inputted phone number from a user interface associated with the WCD, receiving a user inputted phone number from an address book associated with the WCD, receiving a user inputted value from a plurality of mobile operator provided values, or receiving the destination device identifying item from the incoming call. 27. The WCD of claim 20, wherein the communications module is further operable for: receiving the WCD location value from a location sensor associated with the WCD, or receiving the WCD location information from a user input, or receiving the WCD location information from an area code of a phone number associated with the WCD, or receiving the WCD location information from a location server. 28. The WCD of claim 18, wherein the communications module is further operable for: receiving the at least one or the one or more contextually relevant content items during one or more operational intervals associated with the WCD, wherein the one or more operational intervals include at least one of: an interval prior to initiating a communication connection with the destination device identifying item, an interval prior to a communication connection being completed to the destination device identifying item, an interval during communications after the communication connection is established, or an interval after the communication connection is terminated. 29. The WCD of claim 28, further comprising an application module for displaying one or more non-contextually relevant content items; and wherein the communications module is further operable for: displaying the one or more contextually relevant content items in response to a user input associated with the application module displaying the one or more non-contextually relevant content items. 30. The WCD of claim 18, wherein the communications module is further operable for transmitting the destination device identifying item using at least one of: a short message service (SMS) protocol, an enhanced messaging service (EMS) protocol, a multimedia message service (MMS) protocol, an Internet Protocol (IP) socket protocol, a code division multiple access (CDMA)-based protocol, or a global system for mobile communications (GSM)-based protocol. 31. The WCD of claim 18, wherein the communications module is further operable for transmitting the destination device identifying item as at least one of: a short message service (SMS) communication data packet, or a destination device phone number. 32. A method for providing contextually relevant content to a wireless communications device (WCD), the method comprising: receiving, by a contextual content server, a destination device identifying item from a WCD; determining one or more contextually relevant content items by processing the received destination device identifying item; and transmitting at least one of the one or more contextually relevant content items to the WCD. 33. The method of claim 32, wherein the determining further comprises: determining relevancy of at least one of the one or more contextually relevant content items with respect to at least one of: a WCD location value, a location associated with the destination device identifying item, textual content parsed from the destination device identifying item, a business or business category associated with the destination device identifying item, information obtained from an advertisement server, information obtained from a recommendations server, information obtained from a location server, or information obtained from a mobile operator associated with the WCD. 34. The method of claim 33, wherein the one or more contextually relevant content items determined with respect to the WCD location value include at least one of: weather information, local news feeds, local events, local time, a local country specific exchange rate, a local country specific stock index trigger, one or more social networking site feed associated with a user of the WCD, one or more point of interest associated with the business category for the destination device identifying item within a predefined distance from the WCD location value, map information, map information for the at least one of the one or more points of interest, one or more recommendations for other businesses, coupons or directions to the location associated with the destination device identifying item. 35. The method of claim 33, wherein the one or more contextually relevant content items determined with respect to the location associated with the destination device identifying item include at least one of: weather information, local news feeds, a business name, a business address, a business category, one or more points of interest associated with the business category within a predefined distance, map information, map information for the at least one of the one or more points of interest associated with the business category, one or more businesses related to the business category, recommendations for the one or more businesses related to the business category, directions to at least one of the one or more businesses related to the business category, or directions from the WCD location value to the location associated with the destination device identifying item. 36. The method of claim 33, wherein the one or more contextually relevant content items determined with respect to the business or business category destination device identifying item includes one or more contextually relevant content items determined through extracting a alpha-numeric representation from the business destination device identifying item and using the extracted alpha-numeric representation to determine a business category or at least one related business. 37. The method of claim 33, wherein the one or more contextually relevant content items determined with respect to the advertisement server are based on at least one of: a business associated with the destination device identifying item, a location associated with the destination device identifying item, or a location relationship between the WCD location value and the location associated with the destination device identifying item. 38. The method of claim 33, wherein the one or more contextually relevant content items determined with respect to the mobile operator associated with the WCD include at least one of: one or more advertisements associated with the mobile operator, one or more advertisements from one or more content providers associated with the mobile operator, one or more advertisements associated with a business category for the destination device identifying item, or one or more advertisements associated with a user profile for a user associated with the WCD. 39. The method of claim 33, wherein the contextual content server is associated with at least one of: the mobile operator, the advertisement server, or the recommendations server. 40. The method of claim 32, further comprising: establishing a communication path between the WCD and a device associated with the destination device identifying item; and wherein the transmitting further comprises transmitting the at least one or the one or more contextually relevant content items during one or more operational intervals associated with the WCD, wherein the one or more operational intervals include at least one of: an interval prior to initiating a communication connection with the destination device identifying item, an interval prior to a communication connection being completed to the destination device identifying item, an interval during communications after the communication connection is established, or an interval after the communication connection is terminated. 41. The method of claim 33, further comprising: receiving user profile information from the WCD, wherein the user profile information includes at least one of: one or more user responses to previously transmitted contextually relevant content items, one or more reports of spam from previously transmitted contextually relevant content items, or a description of attributes associated with the model of the WCD; storing at least a portion of the received user profile information and the destination device identifying item; and generating one or more refined contextually relevant content items from processing stored user profile information and destination device identifying items for a plurality of users. 42. The method of claim 41, wherein the one or more refined contextually relevant content items include at least one of: one or more advertisements based on the attributes associated with the model of the WCD, or one or more advertisements for related businesses based on recommendation from the plurality of users. 43. The method of claim 32, wherein at least one of the receiving or the transmitting further comprises receiving or transmitting the destination device identifying item using at least one of: a short message service (SMS) protocol, an enhanced messaging service (EMS) protocol, a multimedia message service (MMS) protocol, an Internet Protocol (IP) socket protocol, a code division multiple access (CDMA)-based protocol, or a global system for mobile communications (GSM)-based protocol. 44. The method of claim 32, wherein at least one of the receiving or the transmitting further comprises receiving or transmitting the destination device identifying item as at least one or: a short message service (SMS) communication data packet, or a destination device phone number. 45. At least one processor configured to provide contextually relevant content to a wireless communications device (WCD): a first module for receiving, by a contextual content server, a destination device identifying item from a WCD; a second module for determining one or more contextually relevant content items by processing the received destination device identifying item; and a third module for transmitting at least one of the one or more contextually relevant content items to the WCD. 46. A computer program product, comprising: a computer-readable medium comprising: a first set of codes for causing a computer to receive, by a contextual content server, a destination device identifying item from a WCD; a second set of codes for causing the computer to determine one or more contextually relevant content items by processing the received destination device identifying item; and a third set of codes for causing the computer to transmit transmitting at least one of the one or more contextually relevant content items to the WCD. 47. An apparatus, comprising: means for receiving, by a contextual content server, a destination device identifying item from a WCD; means for determining one or more contextually relevant content items by processing the received destination device identifying item; and means for transmitting at least one of the one or more contextually relevant content items to the WCD. 48. A contextual content server, comprising: a communications module operable for: receiving, by a contextual content server, a destination device identifying item from a WCD; a contextual content module operable for: determining one or more contextually relevant content items by processing the received destination device identifying item; and wherein the communications module is further operable for: transmitting at least one of the one or more contextually relevant content items to the WCD. 49. The contextual content server of claim 48, wherein the contextual content module is further operable for: determining relevancy of at least one of the one or more contextually relevant content items with respect to at least one of: a WCD location value, a location associated with the destination device identifying item, textual content parsed from the destination device identifying item, a business or business category associated with the destination device identifying item, information obtained from an advertisement server, information obtained from a recommendations server, information obtained from a location server, or information obtained from a mobile operator associated with the WCD. 50. The contextual content server of claim 49, wherein the one or more contextually relevant content items determined with respect to the WCD location value include at least one of: weather information, local news feeds, local events, local time, a local country specific exchange rate, a local country specific stock index trigger, one or more social networking site feed associated with a user of the WCD, one or more point of interest associated with the business category for the destination device identifying item within a predefined distance from the WCD location value, map information, map information for the at least one of the one or more points of interest, one or more recommendations for other businesses, coupons or directions to the location associated with the destination device identifying item. 51. The contextual content server of claim 49, wherein the one or more contextually relevant content items determined with respect to the location associated with the destination device identifying item include at least one of: weather information, local news feeds, a business name, a business address, a business category, one or more points of interest associated with the business category within a predefined distance, map information, map information for the at least one of the one or more points of interest associated with the business category, one or more businesses related to the business category, recommendations for the one or more businesses related to the business category, directions to at least one of the one or more businesses related to the business category, or directions from the WCD location value to the location associated with the destination device identifying item. 52. The contextual content server of claim 49, wherein the one or more contextually relevant content items determined with respect to the business or business category destination device identifying item includes one or more contextually relevant content items determined through extracting a alpha-numeric representation from the business destination device identifying item and using the extracted alpha-numeric representation to determine a business category or at least one related business. 53. The contextual content server of claim 4, wherein the one or more contextually relevant content items determined with respect to the advertisement server are based on at least one of: a business associated with the destination device identifying item, a location associated with the destination device identifying item, or a location relationship between the WCD location value and the location associated with the destination device identifying item. 54. The contextual content server of claim 49, wherein the one or more contextually relevant content items determined with respect to the mobile operator associated with the WCD include at least one of: one or more advertisements associated with the mobile operator, one or more advertisements from one or more content providers associated with the mobile operator, one or more advertisements associated with a business category for the destination device identifying item, or one or more advertisements associated with a user profile for a user associated with the WCD. 55. The contextual content server of claim 49, wherein the contextual content server is associated with at least one of: the mobile operator, the advertisement server, or the recommendations server. 56. The contextual content server of claim 48, wherein the communications module is further operable for: establishing a communication path between the WCD and a device associated with the destination device identifying item; and wherein the transmitting further comprises transmitting the at least one or the one or more contextually relevant content items during one or more operational intervals associated with the WCD, wherein the one or more operational intervals include at least one of: an interval prior to initiating a communication connection with the destination device identifying item, an interval prior to a communication connection being completed to the destination device identifying item, an interval during communications after the communication connection is established, or an interval after the communication connection is terminated. 57. The contextual content server of claim 48, wherein the communications module is further operable for: receiving user profile information from the WCD, wherein the user profile information includes at least one of: one or more user responses to previously transmitted contextually relevant content items, one or more reports of spam from previously transmitted contextually relevant content items, or a description of attributes associated with the model of the WCD; further comprising a storage module operable for: storing at least a portion of the received user profile information and the destination device identifying item; and wherein the contextual content module is further operable for: generating one or more refined contextually relevant content items from processing stored user profile information and destination device identifying items for a plurality of users. 58. The contextual content server of claim 57, wherein the one or more refined contextually relevant content items include at least one of: one or more advertisements based on the attributes associated with the model of the WCD, or one or more advertisements for related businesses based on recommendation from the plurality of users. 59. The contextual content server of claim 48, wherein the communications module is further operable for receiving or transmitting the destination device identifying item using at least one of: a short message service (SMS) protocol, an enhanced messaging service (EMS) protocol, a multimedia message service (MMS) protocol, an Internet Protocol (IP) socket protocol, a code division multiple access (CDMA)-based protocol, or a global system for mobile communications (GSM)-based protocol. 60. The contextual content server of claim 48, wherein the communications module is further operable for receiving or transmitting the destination device identifying item as at least one of: a short message service (SMS) communication data packet, or a destination device phone number.
A method of obtaining contextually relevant content by a wireless communications device is provided. The method may comprise obtaining, by a wireless communications device (WCD), a destination device identifying item, transmitting the destination device identifying item to a contextual content server, wherein the contextual content server determines one or more contextually relevant content items by processing the received destination device identifying item and a WCD location value, and receiving, from the contextual content server, at least one of the one or more contextually relevant content items.1. A method of obtaining contextually relevant content by a wireless communications device, the method comprising: obtaining, by a wireless communications device (WCD), a destination device identifying item; transmitting the destination device identifying item to a contextual content server, wherein the contextual content server determines one or more contextually relevant content items by processing the received destination device identifying item; and receiving, from the contextual content server, at least one of the one or more contextually relevant content items. 2. The method of claim 1, wherein the contextual content server determines relevancy of the one or more contextually relevant content items with respect to at least one of: a WCD location value, a location associated with the destination device identifying item, textual content parsed from the destination device identifying item, a business or business category associated with the destination device identifying item, information obtained from an advertisement server, information obtained from a recommendations server, information obtained from a location server, or information obtained from a mobile operator associated with the WCD. 3. The method of claim 2, wherein the one or more contextually relevant content items determined with respect to the WCD location value include at least one of: weather information, local news feeds, local events, local time, a local country specific exchange rate, a local country specific stock index trigger, one or more social networking site feed associated with a user of the WCD, one or more point of interest associated with the business category for the destination device identifying item within a predefined distance from the WCD location value, map information, map information for the at least one of the one or more points of interest, one or more recommendations for other businesses, coupons or directions to the location associated with the destination device identifying item. 4. The method of claim 2, wherein the one or more contextually relevant content items determined with respect to the location associated with the destination device identifying item include at least one of: weather information, local news feeds, a business name, a business address, a business category, one or more points of interest associated with the business category within a predefined distance, map information, map information for the at least one of the one or more points of interest associated with the business category, one or more businesses related to the business category, recommendations for the one or more businesses related to the business category, directions to at least one of the one or more businesses related to the business category, or directions from the WCD location value to the location associated with the destination device identifying item. 5. The method of claim 2, wherein the one or more contextually relevant content items determined with respect to the business or business category destination device identifying item includes one or more contextually relevant content items determined through extracting a alpha-numeric representation from the business destination device identifying item and using the extracted alpha-numeric representation to determine a business category or at least one related business. 6. The method of claim 2, wherein the one or more contextually relevant content items determined with respect to the advertisement server are based on at least one of: a business associated with the destination device identifying item, a location associated with the destination device identifying item, or a location relationship between the WCD location value and the location associated with the destination device identifying item. 7. The method of claim 2, wherein the one or more contextually relevant content items determined with respect to the mobile operator associated with the WCD include at least one of: one or more advertisements associated with the mobile operator, one or more advertisements from one or more content providers associated with the mobile operator, one or more advertisements associated with a business category for the destination device identifying item, or one or more advertisements associated with a user profile for a user associated with the WCD. 8. The method of claim 2, wherein the contextual content server is associated with at least one of: the mobile operator, the advertisement server, or the recommendations server. 9. The method of claim 1, wherein the obtaining the destination device identifying item further includes at least one of: receiving a user inputted phone number from a user interface associated with the WCD, receiving a user inputted phone number from an address book associated with the WCD, receiving a user inputted value from a plurality of mobile operator provided values, or receiving the destination device identifying item from the incoming call. 10. The method of claim 3, wherein the WCD location information is obtained through at least one of: receiving the WCD location value from a location sensor associated with the WCD, or receiving the WCD location information from a user input, or receiving the WCD location information from an area code of a phone number associated with the WCD, or receiving the WCD location information from a location server. 11. The method of claim 1, wherein the receiving further comprises: receiving the at least one or the one or more contextually relevant content items during one or more operational intervals associated with the WCD, wherein the one or more operational intervals include at least one of: an interval prior to initiating a communication connection with the destination device identifying item, an interval prior to a communication connection being completed to the destination device identifying item, an interval during communications after the communication connection is established, or an interval after the communication connection is terminated. 12. The method of claim 11, wherein the receiving during the interval prior to initiating a communication connection with the destination device identifying item further comprises: displaying the one or more contextually relevant content items in response to a user input associated with an application displaying one or more non-contextually relevant content items. 13. The method of claim 1, wherein transmitting the destination device identifying item further transmitting the destination device identifying item using at least one of: a short message service (SMS) protocol, an enhanced messaging service (EMS) protocol, a multimedia message service (MMS) protocol, an Internet Protocol (IP) socket protocol, a code division multiple access (CDMA)-based protocol, or a global system for mobile communications (GSM)-based protocol. 14. The method of claim 1, wherein transmitting the destination device identifying item further transmitting the destination device identifying item as at least one of: a short message service (SMS) communication data packet, or a destination device phone number. 15. At least one processor configured to obtain contextually relevant content by a wireless communications device: a first module for obtaining, by a wireless communications device (WCD), a destination device identifying item; a second module for transmitting the destination device identifying item to a contextual content server, wherein the contextual content server determines one or more contextually relevant content items by processing the received destination device identifying item; and a third module for receiving, from the contextual content server, at least one of the one or more contextually relevant content items. 16. A computer program product, comprising: a computer-readable medium comprising: a first set of codes for causing a computer to obtain, by a wireless communications device (WCD), a destination device identifying item; a second set of codes for causing the computer to transmit the destination device identifying item to a contextual content server, wherein the contextual content server determines one or more contextually relevant content items by processing the received destination device identifying item; and a third set of codes for causing the computer to receive, from the contextual content server, at least one of the one or more contextually relevant content items. 17. An apparatus, comprising: means for obtaining, by a wireless communications device (WCD), a destination device identifying item; means for transmitting the destination device identifying item to a contextual content server, wherein the contextual content server determines one or more contextually relevant content items by processing the received destination device identifying item; and means for receiving, from the contextual content server, at least one of the one or more contextually relevant content items. 18. A wireless communications device (WCD), comprising: a communications module operable for: obtaining, by a wireless communications device (WCD), a destination device identifying item; transmitting the destination device identifying item to a contextual content server, wherein the contextual content server determines one or more contextually relevant content items by processing the received destination device identifying item; and receiving, from the contextual content server, at least one of the one or more contextually relevant content items. 19. The WCD of claim 18, wherein the contextual content server determines relevancy of the one or more contextually relevant content items with respect to at least one of: a WCD location value, a location associated with the destination device identifying item, textual content parsed from the destination device identifying item, a business or business category associated with the destination device identifying item, information obtained from an advertisement server, information obtained from a recommendations server, information obtained from a location server, or information obtained from a mobile operator associated with the WCD. 20. The WCD of claim 19, wherein the one or more contextually relevant content items determined with respect to the WCD location value include at least one of: weather information, local news feeds, local events, local time, a local country specific exchange rate, a local country specific stock index trigger, one or more social networking site feed associated with a user of the WCD, one or more point of interest associated with the business category for the destination device identifying item within a predefined distance from the WCD location value, map information, map information for the at least one of the one or more points of interest, one or more recommendations for other businesses, coupons or directions to the location associated with the destination device identifying item. 21. The WCD of claim 19, wherein the one or more contextually relevant content items determined with respect to the location associated with the destination device identifying item include at least one of: weather information, local news feeds, a business name, a business address, a business category, one or more points of interest associated with the business category within a predefined distance, map information, map information for the at least one of the one or more points of interest associated with the business category, one or more businesses related to the business category, recommendations for the one or more businesses related to the business category, directions to at least one of the one or more businesses related to the business category, or directions from the WCD location value to the location associated with the destination device identifying item. 22. The WCD of claim 19, wherein the one or more contextually relevant content items determined with respect to the business or business category destination device identifying item includes one or more contextually relevant content items determined through extracting a alpha-numeric representation from the business destination device identifying item and using the extracted alpha-numeric representation to determine a business category or at least one related business. 23. The WCD of claim 19, wherein the one or more contextually relevant content items determined with respect to the advertisement server are based on at least one of: a business associated with the destination device identifying item, a location associated with the destination device identifying item, or a location relationship between the WCD location value and the location associated with the destination device identifying item. 24. The WCD of claim 19, wherein the one or more contextually relevant content items determined with respect to the mobile operator associated with the WCD include at least one of: one or more advertisements associated with the mobile operator, one or more advertisements from one or more content providers associated with the mobile operator, one or more advertisements associated with a business category for the destination device identifying item, or one or more advertisements associated with a user profile for a user associated with the WCD. 25. The WCD of claim 19, wherein the contextual content server is associated with at least one of: the mobile operator, the advertisement server, or the recommendations server. 26. The WCD of claim 18, wherein the communications module is further operable for: receiving a user inputted phone number from a user interface associated with the WCD, receiving a user inputted phone number from an address book associated with the WCD, receiving a user inputted value from a plurality of mobile operator provided values, or receiving the destination device identifying item from the incoming call. 27. The WCD of claim 20, wherein the communications module is further operable for: receiving the WCD location value from a location sensor associated with the WCD, or receiving the WCD location information from a user input, or receiving the WCD location information from an area code of a phone number associated with the WCD, or receiving the WCD location information from a location server. 28. The WCD of claim 18, wherein the communications module is further operable for: receiving the at least one or the one or more contextually relevant content items during one or more operational intervals associated with the WCD, wherein the one or more operational intervals include at least one of: an interval prior to initiating a communication connection with the destination device identifying item, an interval prior to a communication connection being completed to the destination device identifying item, an interval during communications after the communication connection is established, or an interval after the communication connection is terminated. 29. The WCD of claim 28, further comprising an application module for displaying one or more non-contextually relevant content items; and wherein the communications module is further operable for: displaying the one or more contextually relevant content items in response to a user input associated with the application module displaying the one or more non-contextually relevant content items. 30. The WCD of claim 18, wherein the communications module is further operable for transmitting the destination device identifying item using at least one of: a short message service (SMS) protocol, an enhanced messaging service (EMS) protocol, a multimedia message service (MMS) protocol, an Internet Protocol (IP) socket protocol, a code division multiple access (CDMA)-based protocol, or a global system for mobile communications (GSM)-based protocol. 31. The WCD of claim 18, wherein the communications module is further operable for transmitting the destination device identifying item as at least one of: a short message service (SMS) communication data packet, or a destination device phone number. 32. A method for providing contextually relevant content to a wireless communications device (WCD), the method comprising: receiving, by a contextual content server, a destination device identifying item from a WCD; determining one or more contextually relevant content items by processing the received destination device identifying item; and transmitting at least one of the one or more contextually relevant content items to the WCD. 33. The method of claim 32, wherein the determining further comprises: determining relevancy of at least one of the one or more contextually relevant content items with respect to at least one of: a WCD location value, a location associated with the destination device identifying item, textual content parsed from the destination device identifying item, a business or business category associated with the destination device identifying item, information obtained from an advertisement server, information obtained from a recommendations server, information obtained from a location server, or information obtained from a mobile operator associated with the WCD. 34. The method of claim 33, wherein the one or more contextually relevant content items determined with respect to the WCD location value include at least one of: weather information, local news feeds, local events, local time, a local country specific exchange rate, a local country specific stock index trigger, one or more social networking site feed associated with a user of the WCD, one or more point of interest associated with the business category for the destination device identifying item within a predefined distance from the WCD location value, map information, map information for the at least one of the one or more points of interest, one or more recommendations for other businesses, coupons or directions to the location associated with the destination device identifying item. 35. The method of claim 33, wherein the one or more contextually relevant content items determined with respect to the location associated with the destination device identifying item include at least one of: weather information, local news feeds, a business name, a business address, a business category, one or more points of interest associated with the business category within a predefined distance, map information, map information for the at least one of the one or more points of interest associated with the business category, one or more businesses related to the business category, recommendations for the one or more businesses related to the business category, directions to at least one of the one or more businesses related to the business category, or directions from the WCD location value to the location associated with the destination device identifying item. 36. The method of claim 33, wherein the one or more contextually relevant content items determined with respect to the business or business category destination device identifying item includes one or more contextually relevant content items determined through extracting a alpha-numeric representation from the business destination device identifying item and using the extracted alpha-numeric representation to determine a business category or at least one related business. 37. The method of claim 33, wherein the one or more contextually relevant content items determined with respect to the advertisement server are based on at least one of: a business associated with the destination device identifying item, a location associated with the destination device identifying item, or a location relationship between the WCD location value and the location associated with the destination device identifying item. 38. The method of claim 33, wherein the one or more contextually relevant content items determined with respect to the mobile operator associated with the WCD include at least one of: one or more advertisements associated with the mobile operator, one or more advertisements from one or more content providers associated with the mobile operator, one or more advertisements associated with a business category for the destination device identifying item, or one or more advertisements associated with a user profile for a user associated with the WCD. 39. The method of claim 33, wherein the contextual content server is associated with at least one of: the mobile operator, the advertisement server, or the recommendations server. 40. The method of claim 32, further comprising: establishing a communication path between the WCD and a device associated with the destination device identifying item; and wherein the transmitting further comprises transmitting the at least one or the one or more contextually relevant content items during one or more operational intervals associated with the WCD, wherein the one or more operational intervals include at least one of: an interval prior to initiating a communication connection with the destination device identifying item, an interval prior to a communication connection being completed to the destination device identifying item, an interval during communications after the communication connection is established, or an interval after the communication connection is terminated. 41. The method of claim 33, further comprising: receiving user profile information from the WCD, wherein the user profile information includes at least one of: one or more user responses to previously transmitted contextually relevant content items, one or more reports of spam from previously transmitted contextually relevant content items, or a description of attributes associated with the model of the WCD; storing at least a portion of the received user profile information and the destination device identifying item; and generating one or more refined contextually relevant content items from processing stored user profile information and destination device identifying items for a plurality of users. 42. The method of claim 41, wherein the one or more refined contextually relevant content items include at least one of: one or more advertisements based on the attributes associated with the model of the WCD, or one or more advertisements for related businesses based on recommendation from the plurality of users. 43. The method of claim 32, wherein at least one of the receiving or the transmitting further comprises receiving or transmitting the destination device identifying item using at least one of: a short message service (SMS) protocol, an enhanced messaging service (EMS) protocol, a multimedia message service (MMS) protocol, an Internet Protocol (IP) socket protocol, a code division multiple access (CDMA)-based protocol, or a global system for mobile communications (GSM)-based protocol. 44. The method of claim 32, wherein at least one of the receiving or the transmitting further comprises receiving or transmitting the destination device identifying item as at least one or: a short message service (SMS) communication data packet, or a destination device phone number. 45. At least one processor configured to provide contextually relevant content to a wireless communications device (WCD): a first module for receiving, by a contextual content server, a destination device identifying item from a WCD; a second module for determining one or more contextually relevant content items by processing the received destination device identifying item; and a third module for transmitting at least one of the one or more contextually relevant content items to the WCD. 46. A computer program product, comprising: a computer-readable medium comprising: a first set of codes for causing a computer to receive, by a contextual content server, a destination device identifying item from a WCD; a second set of codes for causing the computer to determine one or more contextually relevant content items by processing the received destination device identifying item; and a third set of codes for causing the computer to transmit transmitting at least one of the one or more contextually relevant content items to the WCD. 47. An apparatus, comprising: means for receiving, by a contextual content server, a destination device identifying item from a WCD; means for determining one or more contextually relevant content items by processing the received destination device identifying item; and means for transmitting at least one of the one or more contextually relevant content items to the WCD. 48. A contextual content server, comprising: a communications module operable for: receiving, by a contextual content server, a destination device identifying item from a WCD; a contextual content module operable for: determining one or more contextually relevant content items by processing the received destination device identifying item; and wherein the communications module is further operable for: transmitting at least one of the one or more contextually relevant content items to the WCD. 49. The contextual content server of claim 48, wherein the contextual content module is further operable for: determining relevancy of at least one of the one or more contextually relevant content items with respect to at least one of: a WCD location value, a location associated with the destination device identifying item, textual content parsed from the destination device identifying item, a business or business category associated with the destination device identifying item, information obtained from an advertisement server, information obtained from a recommendations server, information obtained from a location server, or information obtained from a mobile operator associated with the WCD. 50. The contextual content server of claim 49, wherein the one or more contextually relevant content items determined with respect to the WCD location value include at least one of: weather information, local news feeds, local events, local time, a local country specific exchange rate, a local country specific stock index trigger, one or more social networking site feed associated with a user of the WCD, one or more point of interest associated with the business category for the destination device identifying item within a predefined distance from the WCD location value, map information, map information for the at least one of the one or more points of interest, one or more recommendations for other businesses, coupons or directions to the location associated with the destination device identifying item. 51. The contextual content server of claim 49, wherein the one or more contextually relevant content items determined with respect to the location associated with the destination device identifying item include at least one of: weather information, local news feeds, a business name, a business address, a business category, one or more points of interest associated with the business category within a predefined distance, map information, map information for the at least one of the one or more points of interest associated with the business category, one or more businesses related to the business category, recommendations for the one or more businesses related to the business category, directions to at least one of the one or more businesses related to the business category, or directions from the WCD location value to the location associated with the destination device identifying item. 52. The contextual content server of claim 49, wherein the one or more contextually relevant content items determined with respect to the business or business category destination device identifying item includes one or more contextually relevant content items determined through extracting a alpha-numeric representation from the business destination device identifying item and using the extracted alpha-numeric representation to determine a business category or at least one related business. 53. The contextual content server of claim 4, wherein the one or more contextually relevant content items determined with respect to the advertisement server are based on at least one of: a business associated with the destination device identifying item, a location associated with the destination device identifying item, or a location relationship between the WCD location value and the location associated with the destination device identifying item. 54. The contextual content server of claim 49, wherein the one or more contextually relevant content items determined with respect to the mobile operator associated with the WCD include at least one of: one or more advertisements associated with the mobile operator, one or more advertisements from one or more content providers associated with the mobile operator, one or more advertisements associated with a business category for the destination device identifying item, or one or more advertisements associated with a user profile for a user associated with the WCD. 55. The contextual content server of claim 49, wherein the contextual content server is associated with at least one of: the mobile operator, the advertisement server, or the recommendations server. 56. The contextual content server of claim 48, wherein the communications module is further operable for: establishing a communication path between the WCD and a device associated with the destination device identifying item; and wherein the transmitting further comprises transmitting the at least one or the one or more contextually relevant content items during one or more operational intervals associated with the WCD, wherein the one or more operational intervals include at least one of: an interval prior to initiating a communication connection with the destination device identifying item, an interval prior to a communication connection being completed to the destination device identifying item, an interval during communications after the communication connection is established, or an interval after the communication connection is terminated. 57. The contextual content server of claim 48, wherein the communications module is further operable for: receiving user profile information from the WCD, wherein the user profile information includes at least one of: one or more user responses to previously transmitted contextually relevant content items, one or more reports of spam from previously transmitted contextually relevant content items, or a description of attributes associated with the model of the WCD; further comprising a storage module operable for: storing at least a portion of the received user profile information and the destination device identifying item; and wherein the contextual content module is further operable for: generating one or more refined contextually relevant content items from processing stored user profile information and destination device identifying items for a plurality of users. 58. The contextual content server of claim 57, wherein the one or more refined contextually relevant content items include at least one of: one or more advertisements based on the attributes associated with the model of the WCD, or one or more advertisements for related businesses based on recommendation from the plurality of users. 59. The contextual content server of claim 48, wherein the communications module is further operable for receiving or transmitting the destination device identifying item using at least one of: a short message service (SMS) protocol, an enhanced messaging service (EMS) protocol, a multimedia message service (MMS) protocol, an Internet Protocol (IP) socket protocol, a code division multiple access (CDMA)-based protocol, or a global system for mobile communications (GSM)-based protocol. 60. The contextual content server of claim 48, wherein the communications module is further operable for receiving or transmitting the destination device identifying item as at least one of: a short message service (SMS) communication data packet, or a destination device phone number.
2,400
7,222
7,222
14,400,480
2,461
A method for transmitting data using an Ethernet AVB transport protocol between nodes of a motor vehicle includes: reserving resources necessary for the transmission of the data by reservation messages from a dedicated protocol; setting flow of data from a node to a particular transmission rate and/or data rate; transmitting data at cyclic intervals via an Ethernet-based network by inputting the data into a transmission frame and forwarding to local transmitters; deactivating the local transmitters and receivers of a node in non-use periods, in which no data need to be transmitted; activating again the local transmitters and receivers of a node provided that data are pending transmission in a transmission frame, wherein the local transmitters and receivers are available for transmission following an activation time; and activating the local transmitters and/or receivers of the nodes based on a reservation message and a setting of the transmission rate and/or data rate.
1-11. (canceled) 12. A method for transmitting data using an Ethernet AVB transport protocol between nodes of a motor vehicle, comprising: reserving resources necessary for the transmission of the data by reservation messages from a dedicated protocol; setting flow of data from a node to a particular transmission rate and/or data rate; transmitting data at cyclic intervals via an Ethernet-based network by inputting the data into a transmission frame (MAC frame) and forwarding to local transmitters (PHY); deactivating the local transmitters and receivers (PHY) of a node in non-use periods, in which no data need to be transmitted; activating again the local transmitters and receivers (PHY) of a node provided that data are pending transmission in a transmission frame (MAC frame), wherein the local transmitters and receivers (PHY) are available for transmission following an activation time (Tw); and activating the local transmitters and/or receivers of the nodes based on a reservation message and a setting of the transmission rate and/or data rate. 13. The method as claimed in claim 12, wherein the local transmitter and/or receiver (PHY) of a node is/are activated by writing to a suitable MAC or PHY register. 14. The method as claimed in claim 12, wherein the local transmitter and/or receiver (PHY) of a node is/are activated by a timer that prescribes the time when a local transmitter and/or receiver (PHY) is/are activated again following the beginning of deactivation. 15. The method as claimed in claim 12, wherein the local transmitter and/or receiver (PHY) of a node is/are activated by a dummy data packet that is transmitted prior to the transmission of the data. 16. The method as claimed in claim 12, wherein the local transmitter and/or receiver (PHY) of a node is/are activated prior to a scheduled transmission time by at least the activation time (Tw). 17. The method as claimed in claim 15, wherein the local transmitter and/or receiver (PHY) of a node is/are activated prior to a scheduled transmission time by at least the sum of the activation time (Tw) and the transmission period for the dummy data packet. 18. The method as claimed in claim 17, wherein the dummy data packet is produced by an application and transferred to an upstream layer. 19. The method as claimed in one of claim 18, wherein the dummy data packet is rejected in the local transmitter and/or receiver and is not transmitted to another node. 20. The method as claimed in claim 12, wherein the data are transmitted in the Ethernet-based network and reservation messages are transmitted on different transmission channels. 21. A controller having a local transmitter and/or receiver and a computation unit, wherein the computation unit is configured to execute program code for transmitting data using an Ethernet AVB transport protocol between nodes of a motor vehicle, wherein the program code causes the computation unit to carry out the method as claimed in claim 12. 22. A non-transitory computer-readable medium storing program code that, when executed by a computation unit, causes the computation unit to carry out the method as claimed in claim 12.
A method for transmitting data using an Ethernet AVB transport protocol between nodes of a motor vehicle includes: reserving resources necessary for the transmission of the data by reservation messages from a dedicated protocol; setting flow of data from a node to a particular transmission rate and/or data rate; transmitting data at cyclic intervals via an Ethernet-based network by inputting the data into a transmission frame and forwarding to local transmitters; deactivating the local transmitters and receivers of a node in non-use periods, in which no data need to be transmitted; activating again the local transmitters and receivers of a node provided that data are pending transmission in a transmission frame, wherein the local transmitters and receivers are available for transmission following an activation time; and activating the local transmitters and/or receivers of the nodes based on a reservation message and a setting of the transmission rate and/or data rate.1-11. (canceled) 12. A method for transmitting data using an Ethernet AVB transport protocol between nodes of a motor vehicle, comprising: reserving resources necessary for the transmission of the data by reservation messages from a dedicated protocol; setting flow of data from a node to a particular transmission rate and/or data rate; transmitting data at cyclic intervals via an Ethernet-based network by inputting the data into a transmission frame (MAC frame) and forwarding to local transmitters (PHY); deactivating the local transmitters and receivers (PHY) of a node in non-use periods, in which no data need to be transmitted; activating again the local transmitters and receivers (PHY) of a node provided that data are pending transmission in a transmission frame (MAC frame), wherein the local transmitters and receivers (PHY) are available for transmission following an activation time (Tw); and activating the local transmitters and/or receivers of the nodes based on a reservation message and a setting of the transmission rate and/or data rate. 13. The method as claimed in claim 12, wherein the local transmitter and/or receiver (PHY) of a node is/are activated by writing to a suitable MAC or PHY register. 14. The method as claimed in claim 12, wherein the local transmitter and/or receiver (PHY) of a node is/are activated by a timer that prescribes the time when a local transmitter and/or receiver (PHY) is/are activated again following the beginning of deactivation. 15. The method as claimed in claim 12, wherein the local transmitter and/or receiver (PHY) of a node is/are activated by a dummy data packet that is transmitted prior to the transmission of the data. 16. The method as claimed in claim 12, wherein the local transmitter and/or receiver (PHY) of a node is/are activated prior to a scheduled transmission time by at least the activation time (Tw). 17. The method as claimed in claim 15, wherein the local transmitter and/or receiver (PHY) of a node is/are activated prior to a scheduled transmission time by at least the sum of the activation time (Tw) and the transmission period for the dummy data packet. 18. The method as claimed in claim 17, wherein the dummy data packet is produced by an application and transferred to an upstream layer. 19. The method as claimed in one of claim 18, wherein the dummy data packet is rejected in the local transmitter and/or receiver and is not transmitted to another node. 20. The method as claimed in claim 12, wherein the data are transmitted in the Ethernet-based network and reservation messages are transmitted on different transmission channels. 21. A controller having a local transmitter and/or receiver and a computation unit, wherein the computation unit is configured to execute program code for transmitting data using an Ethernet AVB transport protocol between nodes of a motor vehicle, wherein the program code causes the computation unit to carry out the method as claimed in claim 12. 22. A non-transitory computer-readable medium storing program code that, when executed by a computation unit, causes the computation unit to carry out the method as claimed in claim 12.
2,400
7,223
7,223
14,764,280
2,433
Example embodiments relate to assessing dynamic security scans using runtime analysis and static code analysis. In example embodiments, a system performs static code analysis of a web application to identify reachable code and/or data entry points, where the data entry points are used to determine an attack surface size for the web application. At this stage, the system may initiate runtime monitoring for a dynamic security scan of the web application, where the runtime monitoring detects invocation of a statement at one of the data entry points. The invocation is logged as an invocation entry that comprises invocation parameters and/or code units that were executed in response to the invocation. The system may then determine an attack surface coverage of the dynamic security scan using the invocation entry and the attack surface size and/or a reachable code coverage using the invocation entry and the reachable code.
1. A system for assessing dynamic security scans using runtime analysis and static code analysis, the system comprising: a processor to: perform the static code analysis of a web application to identify a plurality of data entry points for the web application, wherein the plurality of data entry points are used to determine an attack surface size for the web application; initiate runtime monitoring for a dynamic security scan of the web application; detect, by the runtime monitoring, invocation of a statement at one of the plurality of data entry points, wherein the invocation is logged as an invocation entry that comprises invocation parameters and a timestamp; and determine an attack surface coverage of the dynamic security scan using the invocation entry and the attack surface size. 2. The system of claim 1, wherein the static code analysis of the web application also identifies a reachable portion of source code of the web application, and wherein the invocation entry further comprises code units of the reachable portion of the source code that were accessed in response to the invocation of the statement, and wherein the processor is further to: determine a reachable code coverage of the dynamic security scan using the code units and the reachable portion of the source code. 3. The system of claim 2, wherein the processor is further to: use the reachable code coverage and the attack surface coverage to determine a combined coverage; and in response to determining that the combined coverage has fallen below a preconfigured threshold, generate a notification recommending that the dynamic security scan be reconfigured to increase the combined coverage. 4. The system of claim 2, wherein the processor is further to: use the reachable code coverage and the attack surface coverage to determine a first combined coverage; in response to receiving updated source code of the web application, determine a second combined coverage using the updated source code; and in response to determining that the second combined coverage is less than the first combined coverage, generate a notification recommending that the dynamic security scan be reconfigured based on the updated source code. 5. The system of claim 1, wherein the processor is further to: track code units of the reachable portion of the source code that were accessed in response to the invocation of the statement; and determine a reachable code coverage of the dynamic security scan using the code units and the reachable portion of the source code. 6. The system of claim 2, wherein the static code analysis of the web application further identifies an unreachable portion of the source code for the web application, and wherein the unreachable portion is disregarded when determining the reachable code coverage. 7. A non-transitory machine-readable storage medium encoded with instructions executable by a processor, the machine-readable storage medium comprising: instructions to perform static code analysis of a web application to identify a reachable portion of source code of the web application, wherein the reachable portion of the source code is accessible from a client-side; instructions to detect runtime monitoring for a dynamic security scan of the web application; instructions to detect, by the runtime monitoring, invocation of a statement in the reachable portion of the source code, wherein the invocation is logged as an invocation entry that comprises a timestamp and code units of the reachable portion of the source code that were accessed in response to the invocation of the statement; and instructions to detect a reachable code coverage of the dynamic security scan using the code units and the reachable portion of the source code. 8. The machine-readable storage medium of claim 7, wherein the static code analysis of the web application also identifies a plurality of data entry points for the web application, wherein the invocation entry further comprises invocation parameters, and wherein the machine-readable storage medium further comprises: instructions to user the plurality of data entry points to determine an attack surface size for the web application; and instructions to determine an attack surface coverage of the dynamic security scan using the invocation entry and the attack surface size. 9. The machine-readable storage medium of claim 8, wherein the machine-readable storage medium further comprises: instructions to use the reachable code coverage and the attack surface coverage to determine a combined coverage; and instructions to generate, in response to determining that the combined coverage has fallen below a preconfigured threshold, a notification recommending that the dynamic security scan be reconfigured to increase the combined coverage. 10. The machine-readable storage medium of claim 8, wherein the machine-readable storage medium further comprises: instructions to use the reachable code coverage and the attack surface coverage to determine a first combined coverage; instructions to determine, in response to receiving updated source code of the web application, a second combined coverage using the updated source code; and instructions to generate, in response to determining that the second combined coverage is less than the first combined coverage, a notification recommending that the dynamic security scan be reconfigured based on the updated source code. 11. The machine-readable storage medium of claim 7, wherein the static code analysis of the web application further identifies an unreachable portion of the source code for the web application, and wherein the unreachable portion is disregarded when determining the reachable code coverage. 12. A method for assessing dynamic security scans using runtime analysis and static code analysis, the method comprising: performing, by a computing device, the static code analysis of a web application to identify a plurality of data entry points for the web application and a reachable portion of source code of the web application, wherein the plurality of data entry points are used to determine an attack surface size for the web application; initiating runtime monitoring for a dynamic security scan of the web application; detecting, by the runtime monitoring, invocation of a statement at one of the plurality of data entry points, wherein the invocation is logged as an invocation entry that comprises invocation parameters, a timestamp, and code units of the reachable portion of the source code that were accessed in response to the invocation of the statement; and determining combined coverage of the dynamic security scan using the invocation entry, the attack surface size, and the reachable portion of source code. 13. The method of claim 12, further comprising: in response to determining that the combined coverage has fallen below a preconfigured threshold, generating a notification recommending that the dynamic security scan be reconfigured to increase the combined coverage. 14. The method of claim 12, further comprising: in response to receiving updated source code of the web application, determine an updated combined coverage using the updated source code; and in response to determining that the updated combined coverage is less than the combined coverage, generate a notification recommending that the dynamic security scan be reconfigured based on the updated source code. 15. The method of claim 12, wherein the static code analysis of the web application further identifies an unreachable portion of the source code for the web application, and wherein the unreachable portion is disregarded when determining the combined coverage.
Example embodiments relate to assessing dynamic security scans using runtime analysis and static code analysis. In example embodiments, a system performs static code analysis of a web application to identify reachable code and/or data entry points, where the data entry points are used to determine an attack surface size for the web application. At this stage, the system may initiate runtime monitoring for a dynamic security scan of the web application, where the runtime monitoring detects invocation of a statement at one of the data entry points. The invocation is logged as an invocation entry that comprises invocation parameters and/or code units that were executed in response to the invocation. The system may then determine an attack surface coverage of the dynamic security scan using the invocation entry and the attack surface size and/or a reachable code coverage using the invocation entry and the reachable code.1. A system for assessing dynamic security scans using runtime analysis and static code analysis, the system comprising: a processor to: perform the static code analysis of a web application to identify a plurality of data entry points for the web application, wherein the plurality of data entry points are used to determine an attack surface size for the web application; initiate runtime monitoring for a dynamic security scan of the web application; detect, by the runtime monitoring, invocation of a statement at one of the plurality of data entry points, wherein the invocation is logged as an invocation entry that comprises invocation parameters and a timestamp; and determine an attack surface coverage of the dynamic security scan using the invocation entry and the attack surface size. 2. The system of claim 1, wherein the static code analysis of the web application also identifies a reachable portion of source code of the web application, and wherein the invocation entry further comprises code units of the reachable portion of the source code that were accessed in response to the invocation of the statement, and wherein the processor is further to: determine a reachable code coverage of the dynamic security scan using the code units and the reachable portion of the source code. 3. The system of claim 2, wherein the processor is further to: use the reachable code coverage and the attack surface coverage to determine a combined coverage; and in response to determining that the combined coverage has fallen below a preconfigured threshold, generate a notification recommending that the dynamic security scan be reconfigured to increase the combined coverage. 4. The system of claim 2, wherein the processor is further to: use the reachable code coverage and the attack surface coverage to determine a first combined coverage; in response to receiving updated source code of the web application, determine a second combined coverage using the updated source code; and in response to determining that the second combined coverage is less than the first combined coverage, generate a notification recommending that the dynamic security scan be reconfigured based on the updated source code. 5. The system of claim 1, wherein the processor is further to: track code units of the reachable portion of the source code that were accessed in response to the invocation of the statement; and determine a reachable code coverage of the dynamic security scan using the code units and the reachable portion of the source code. 6. The system of claim 2, wherein the static code analysis of the web application further identifies an unreachable portion of the source code for the web application, and wherein the unreachable portion is disregarded when determining the reachable code coverage. 7. A non-transitory machine-readable storage medium encoded with instructions executable by a processor, the machine-readable storage medium comprising: instructions to perform static code analysis of a web application to identify a reachable portion of source code of the web application, wherein the reachable portion of the source code is accessible from a client-side; instructions to detect runtime monitoring for a dynamic security scan of the web application; instructions to detect, by the runtime monitoring, invocation of a statement in the reachable portion of the source code, wherein the invocation is logged as an invocation entry that comprises a timestamp and code units of the reachable portion of the source code that were accessed in response to the invocation of the statement; and instructions to detect a reachable code coverage of the dynamic security scan using the code units and the reachable portion of the source code. 8. The machine-readable storage medium of claim 7, wherein the static code analysis of the web application also identifies a plurality of data entry points for the web application, wherein the invocation entry further comprises invocation parameters, and wherein the machine-readable storage medium further comprises: instructions to user the plurality of data entry points to determine an attack surface size for the web application; and instructions to determine an attack surface coverage of the dynamic security scan using the invocation entry and the attack surface size. 9. The machine-readable storage medium of claim 8, wherein the machine-readable storage medium further comprises: instructions to use the reachable code coverage and the attack surface coverage to determine a combined coverage; and instructions to generate, in response to determining that the combined coverage has fallen below a preconfigured threshold, a notification recommending that the dynamic security scan be reconfigured to increase the combined coverage. 10. The machine-readable storage medium of claim 8, wherein the machine-readable storage medium further comprises: instructions to use the reachable code coverage and the attack surface coverage to determine a first combined coverage; instructions to determine, in response to receiving updated source code of the web application, a second combined coverage using the updated source code; and instructions to generate, in response to determining that the second combined coverage is less than the first combined coverage, a notification recommending that the dynamic security scan be reconfigured based on the updated source code. 11. The machine-readable storage medium of claim 7, wherein the static code analysis of the web application further identifies an unreachable portion of the source code for the web application, and wherein the unreachable portion is disregarded when determining the reachable code coverage. 12. A method for assessing dynamic security scans using runtime analysis and static code analysis, the method comprising: performing, by a computing device, the static code analysis of a web application to identify a plurality of data entry points for the web application and a reachable portion of source code of the web application, wherein the plurality of data entry points are used to determine an attack surface size for the web application; initiating runtime monitoring for a dynamic security scan of the web application; detecting, by the runtime monitoring, invocation of a statement at one of the plurality of data entry points, wherein the invocation is logged as an invocation entry that comprises invocation parameters, a timestamp, and code units of the reachable portion of the source code that were accessed in response to the invocation of the statement; and determining combined coverage of the dynamic security scan using the invocation entry, the attack surface size, and the reachable portion of source code. 13. The method of claim 12, further comprising: in response to determining that the combined coverage has fallen below a preconfigured threshold, generating a notification recommending that the dynamic security scan be reconfigured to increase the combined coverage. 14. The method of claim 12, further comprising: in response to receiving updated source code of the web application, determine an updated combined coverage using the updated source code; and in response to determining that the updated combined coverage is less than the combined coverage, generate a notification recommending that the dynamic security scan be reconfigured based on the updated source code. 15. The method of claim 12, wherein the static code analysis of the web application further identifies an unreachable portion of the source code for the web application, and wherein the unreachable portion is disregarded when determining the combined coverage.
2,400
7,224
7,224
14,726,110
2,484
In various embodiments, methods and systems for providing video scrubbing based on thumbnail video players are provided. An indication to review video content on a video player is received. The video content corresponds to a thumbnail video in a playlist that supports a thumbnail video player. In particular, the playlist includes a thumbnail video variant constructively as a variant of the video content. The thumbnail video variant is referenced from the playlist to locate the thumbnail video. A video player development component supports generating, packaging, and communicating instructions for the providing the thumbnail video in a thumbnail video player. The thumbnail video is communicated for display on the thumbnail video player as continuous thumbnail video for video scrubbing the video content. It is contemplated that a selection indication associated with a portion of the thumbnail video triggers navigation to a corresponding portion in the video content in the video player.
1. One or more computer storage media having computer-executable instructions embodied thereon that, when executed, by one or more processors, causes the one or more processors to perform a method for providing video scrubbing using thumbnail players, the method comprising: accessing a video player package, the video player package comprising a playlist having a video content variant and a thumbnail video variant; generating a video player for video content, the video content is accessed based on the playlist having the video content variant; receiving an indication to review the video content; and generating a thumbnail video player for thumbnail video, the thumbnail video is accessed based on the playlist having the thumbnail video variant. 2. The media of claim 1, wherein the playlist comprises at least one video content variant associated with a video profile, at least one thumbnail video variant associated with a thumbnail video profile, and at least one thumbnail image variant associated with a thumbnail image profile. 3. The media of claim 1, wherein the video content variant is tagged with a first tag that designates the video content for playback on the video player and the thumbnail video player is tagged with a second that designates the thumbnail video for playback on the thumbnail video player. 4. The media of claim 1, wherein the thumbnail video player is implemented with an adaptive bit rate (ABR) policy that instructs the thumbnail video player to exclusively access thumbnail video variants in the playlist. 5. The media of claim 1, wherein the thumbnail video player generates the thumbnail video having a lower resolution and a smaller display area than the corresponding video content. 6. The media of claim 1, wherein the thumbnail video player generates the thumbnail video as video only. 7. The media of claim 1, further comprising: receiving a selection indication of a portion of the thumbnail video; and navigating to a corresponding portion of the video content on the video player. 8. A computer-implemented method for providing video scrubbing using thumbnail video players, the method comprising: accessing a video player instance for video content and thumbnail video, the video player instance comprising configuration instructions for video content and thumbnail video content; and generating a video player package for the video content and the thumbnail video, the video player package comprises a playlist having a video content variant and a thumbnail video variant. 9. The method of claim 8, wherein generating the video player package further comprises downsizing a resolution of the video content, the resolution of the video content is downsized from a first resolution to a second resolution used as a resolution of the thumbnail video, the second resolution is lower than the first resolution. 10. The method of claim 8, wherein generating the video player package further comprises converting the video content to thumbnail video as video-only. 11. The method of claim 8, wherein generating the video player package further comprises tagging the video content with a first tag and tagging the thumbnail video with a second tag, the first tag and the second tag designate corresponding variants for a video player and a thumbnail video player respectively. 12. The method of claim 8, wherein the second tag excludes the thumbnail video from playback using the video player, the thumbnail video is constructively a variant of the video content in the playlist. 13. The method of claim 8, wherein the thumbnail video corresponds to a thumbnail video player, the thumbnail video player is associated with a thumbnail adaptive bit rate (ABR) policy that instructs the thumbnail video player to exclusively access thumbnail video variants. 14. The method of claim 8, wherein the playlist comprises at least one video content variant associated with a video profile, at least one thumbnail video variant associated with a thumbnail video profile, and at least one thumbnail image variant associated with a thumbnail image profile. 15. The method of claim 8, wherein the video player instance is generated based on accessing an integrated development environment providing a software development kit for the video player instance, the integrated development environment comprises application programming interfaces for generating the video player instance. 16. The method of claim 8, further comprising communicating the video player package such that the thumbnail video is played back at a media device using the thumbnail video player when video scrubbing the video content. 17. A system for providing video scrubbing using thumbnail video players, the system comprising: a processor and a memory configured for providing computer program instructions to the processor; an video player component configured for: accessing a video player package, the video player package comprises the playlist having a video content variant and a thumbnail video variant; generating a video player for the video content, the video content is accessed based on the playlist; receiving an indication to review the video content; and generating a thumbnail video player for the thumbnail video, the thumbnail video is accessed based on the playlist. 18. The system of claim 17, the system further comprising: a video player development component configured for: accessing the video player instance for the video content and the thumbnail video; generating the video player package for the video content and the thumbnail video, the video player package comprises the playlist having the video content variant and the thumbnail video variant; and communicating the video player package such that the thumbnail video is played back using the thumbnail video player when video scrubbing the video content. 19. The system of claim 17, the system further comprising: a video player instance component configured for: generating a video player instance having configuration instructions for video content and thumbnail video, wherein the video player instance is generated using a software development kit that supports thumbnail video profiles used to playback thumbnail videos in a thumbnail video player; and communicating the video player instance. 20. The system of claim 19, wherein generating the video player instance further comprises selecting at least one video content profile and at least one thumbnail video profile. 21. The system of claim 19, wherein a video content profile is associated with a first tag and a thumbnail video profile is associated with a second tag, wherein the first tag and the second tag designate corresponding profiles for the video player and the thumbnail video player respectively. 22. The system of claim 21, wherein the video content profile or the thumbnail video profile is a record of attributes and metadata of the corresponding video. 23. The system of claim 21, wherein the video content profile or the thumbnail video profile comprises one of: a live thumbnail video profile or a video on demand (VOD) thumbnail video profile. 24. The system of claim 19, wherein generating the video player instance comprises referencing, from a video player development component, one or more of the following: a video component, a video player packager component, and a policy services component. 25. The system of claim 19, wherein the video player instance component is further configured for: providing an integrated development environment based on the software development kit, the integrated development environment comprises application programming interfaces for generating the video player instance.
In various embodiments, methods and systems for providing video scrubbing based on thumbnail video players are provided. An indication to review video content on a video player is received. The video content corresponds to a thumbnail video in a playlist that supports a thumbnail video player. In particular, the playlist includes a thumbnail video variant constructively as a variant of the video content. The thumbnail video variant is referenced from the playlist to locate the thumbnail video. A video player development component supports generating, packaging, and communicating instructions for the providing the thumbnail video in a thumbnail video player. The thumbnail video is communicated for display on the thumbnail video player as continuous thumbnail video for video scrubbing the video content. It is contemplated that a selection indication associated with a portion of the thumbnail video triggers navigation to a corresponding portion in the video content in the video player.1. One or more computer storage media having computer-executable instructions embodied thereon that, when executed, by one or more processors, causes the one or more processors to perform a method for providing video scrubbing using thumbnail players, the method comprising: accessing a video player package, the video player package comprising a playlist having a video content variant and a thumbnail video variant; generating a video player for video content, the video content is accessed based on the playlist having the video content variant; receiving an indication to review the video content; and generating a thumbnail video player for thumbnail video, the thumbnail video is accessed based on the playlist having the thumbnail video variant. 2. The media of claim 1, wherein the playlist comprises at least one video content variant associated with a video profile, at least one thumbnail video variant associated with a thumbnail video profile, and at least one thumbnail image variant associated with a thumbnail image profile. 3. The media of claim 1, wherein the video content variant is tagged with a first tag that designates the video content for playback on the video player and the thumbnail video player is tagged with a second that designates the thumbnail video for playback on the thumbnail video player. 4. The media of claim 1, wherein the thumbnail video player is implemented with an adaptive bit rate (ABR) policy that instructs the thumbnail video player to exclusively access thumbnail video variants in the playlist. 5. The media of claim 1, wherein the thumbnail video player generates the thumbnail video having a lower resolution and a smaller display area than the corresponding video content. 6. The media of claim 1, wherein the thumbnail video player generates the thumbnail video as video only. 7. The media of claim 1, further comprising: receiving a selection indication of a portion of the thumbnail video; and navigating to a corresponding portion of the video content on the video player. 8. A computer-implemented method for providing video scrubbing using thumbnail video players, the method comprising: accessing a video player instance for video content and thumbnail video, the video player instance comprising configuration instructions for video content and thumbnail video content; and generating a video player package for the video content and the thumbnail video, the video player package comprises a playlist having a video content variant and a thumbnail video variant. 9. The method of claim 8, wherein generating the video player package further comprises downsizing a resolution of the video content, the resolution of the video content is downsized from a first resolution to a second resolution used as a resolution of the thumbnail video, the second resolution is lower than the first resolution. 10. The method of claim 8, wherein generating the video player package further comprises converting the video content to thumbnail video as video-only. 11. The method of claim 8, wherein generating the video player package further comprises tagging the video content with a first tag and tagging the thumbnail video with a second tag, the first tag and the second tag designate corresponding variants for a video player and a thumbnail video player respectively. 12. The method of claim 8, wherein the second tag excludes the thumbnail video from playback using the video player, the thumbnail video is constructively a variant of the video content in the playlist. 13. The method of claim 8, wherein the thumbnail video corresponds to a thumbnail video player, the thumbnail video player is associated with a thumbnail adaptive bit rate (ABR) policy that instructs the thumbnail video player to exclusively access thumbnail video variants. 14. The method of claim 8, wherein the playlist comprises at least one video content variant associated with a video profile, at least one thumbnail video variant associated with a thumbnail video profile, and at least one thumbnail image variant associated with a thumbnail image profile. 15. The method of claim 8, wherein the video player instance is generated based on accessing an integrated development environment providing a software development kit for the video player instance, the integrated development environment comprises application programming interfaces for generating the video player instance. 16. The method of claim 8, further comprising communicating the video player package such that the thumbnail video is played back at a media device using the thumbnail video player when video scrubbing the video content. 17. A system for providing video scrubbing using thumbnail video players, the system comprising: a processor and a memory configured for providing computer program instructions to the processor; an video player component configured for: accessing a video player package, the video player package comprises the playlist having a video content variant and a thumbnail video variant; generating a video player for the video content, the video content is accessed based on the playlist; receiving an indication to review the video content; and generating a thumbnail video player for the thumbnail video, the thumbnail video is accessed based on the playlist. 18. The system of claim 17, the system further comprising: a video player development component configured for: accessing the video player instance for the video content and the thumbnail video; generating the video player package for the video content and the thumbnail video, the video player package comprises the playlist having the video content variant and the thumbnail video variant; and communicating the video player package such that the thumbnail video is played back using the thumbnail video player when video scrubbing the video content. 19. The system of claim 17, the system further comprising: a video player instance component configured for: generating a video player instance having configuration instructions for video content and thumbnail video, wherein the video player instance is generated using a software development kit that supports thumbnail video profiles used to playback thumbnail videos in a thumbnail video player; and communicating the video player instance. 20. The system of claim 19, wherein generating the video player instance further comprises selecting at least one video content profile and at least one thumbnail video profile. 21. The system of claim 19, wherein a video content profile is associated with a first tag and a thumbnail video profile is associated with a second tag, wherein the first tag and the second tag designate corresponding profiles for the video player and the thumbnail video player respectively. 22. The system of claim 21, wherein the video content profile or the thumbnail video profile is a record of attributes and metadata of the corresponding video. 23. The system of claim 21, wherein the video content profile or the thumbnail video profile comprises one of: a live thumbnail video profile or a video on demand (VOD) thumbnail video profile. 24. The system of claim 19, wherein generating the video player instance comprises referencing, from a video player development component, one or more of the following: a video component, a video player packager component, and a policy services component. 25. The system of claim 19, wherein the video player instance component is further configured for: providing an integrated development environment based on the software development kit, the integrated development environment comprises application programming interfaces for generating the video player instance.
2,400
7,225
7,225
12,770,322
2,413
A method and apparatus for providing a local IP access service to a User Equipment (UE) attached to a femtocell including a Packet Data Network (PDN) gateway function in a wireless communication system. A method includes receiving a service request from a User Equipment (UE), transmitting an initial UE message including information on a local gateway to a Mobility Management Entity (MME), storing bearer information carried in an initial context setup request transmitted by the MME, receiving a Packet Data Network (PDN) connectivity request from the UE, forwarding the PDN connectivity request to the MME, receiving a create session request from the MME, and establishing a radio bearer with the local gateway, the local gateway being co-located with the femtocell.
1. A method for supporting local Internet Protocol (IP) access of a femtocell in a wireless communication system, the method comprising: receiving a service request from a User Equipment (UE); transmitting an initial UE message including information on a local gateway to a Mobility Management Entity (MME); storing bearer information carried in an initial context setup request transmitted by the MME; receiving a Packet Data Network (PDN) connectivity request from the UE; forwarding the PDN connectivity request to the MME; receiving a create session request from the MME; and establishing a radio bearer with the local gateway, the local gateway being co-located with the femtocell. 2. The method of claim 1, wherein the initial UE message includes information on a local serving gateway and a local PDN gateway. 3. The method of claim 2, wherein the information on the local serving gateway and the local PDN gateway includes IP addresses of the local serving gateway and the local PDN gateway. 4. The method of claim 2, wherein establishing the radio bearer comprises transmitting the PDN connectivity request from the MME to the local serving gateway. 5. The method of claim 2, wherein establishing the radio bearer comprises establishing a bearer between the local serving gateway and the local PDN gateway. 6. An apparatus for supporting local Internet Protocol (IP) access in a wireless communication system, the apparatus comprising: a femtocell that receives a service request from a User Equipment (UE), transmits, an initial UE message including information on a local gateway to a Mobility Management Entity (MME), stores bearer information carried in an initial context setup request transmitted by the MME, receives a Packet Data Network (PDN) connectivity request from the UE, and forwards the PDN connectivity request to the MME; a local serving gateway that receives a create session request from the MME, and establishes a radio bearer; and a local PDN gateway that is connected to a PDN with a core network and establishes the radio bearer with the serving gateway. 7. A data path configuration method in a wireless communication system including a femto base station, the method comprising: establishing, when a User Equipment (UE) is in active state, a first data path connecting the UE, the femto base station, and a local Packet Data Network (PDN) gateway co-located with the femto base station, the local PDN gateway supporting a local Internet Protocol (IP) access function; and establishing a second data path connecting the UE, the femto base station, a serving gateway, and the local PDN gateway, when the UE transitions from the active state to an idle state. 8. The data path configuration method of claim 7, wherein establishing the first data path comprises: receiving a PDN connectivity request from the UE; and setting a data link between the femto base station and the local PDN gateway. 9. The data path configuration method of claim 7, wherein establishing the first data path comprises: receiving a PDN connectivity request from the UE; and setting a data link between the femto base station and the local PDN gateway using a control connection established between the MME and the femto base station. 10. The data path configuration method of claim 7, wherein establishing the second data path comprises setting a data link between the local PDN gateway and the local serving gateway for the UE to receive a paging signal.
A method and apparatus for providing a local IP access service to a User Equipment (UE) attached to a femtocell including a Packet Data Network (PDN) gateway function in a wireless communication system. A method includes receiving a service request from a User Equipment (UE), transmitting an initial UE message including information on a local gateway to a Mobility Management Entity (MME), storing bearer information carried in an initial context setup request transmitted by the MME, receiving a Packet Data Network (PDN) connectivity request from the UE, forwarding the PDN connectivity request to the MME, receiving a create session request from the MME, and establishing a radio bearer with the local gateway, the local gateway being co-located with the femtocell.1. A method for supporting local Internet Protocol (IP) access of a femtocell in a wireless communication system, the method comprising: receiving a service request from a User Equipment (UE); transmitting an initial UE message including information on a local gateway to a Mobility Management Entity (MME); storing bearer information carried in an initial context setup request transmitted by the MME; receiving a Packet Data Network (PDN) connectivity request from the UE; forwarding the PDN connectivity request to the MME; receiving a create session request from the MME; and establishing a radio bearer with the local gateway, the local gateway being co-located with the femtocell. 2. The method of claim 1, wherein the initial UE message includes information on a local serving gateway and a local PDN gateway. 3. The method of claim 2, wherein the information on the local serving gateway and the local PDN gateway includes IP addresses of the local serving gateway and the local PDN gateway. 4. The method of claim 2, wherein establishing the radio bearer comprises transmitting the PDN connectivity request from the MME to the local serving gateway. 5. The method of claim 2, wherein establishing the radio bearer comprises establishing a bearer between the local serving gateway and the local PDN gateway. 6. An apparatus for supporting local Internet Protocol (IP) access in a wireless communication system, the apparatus comprising: a femtocell that receives a service request from a User Equipment (UE), transmits, an initial UE message including information on a local gateway to a Mobility Management Entity (MME), stores bearer information carried in an initial context setup request transmitted by the MME, receives a Packet Data Network (PDN) connectivity request from the UE, and forwards the PDN connectivity request to the MME; a local serving gateway that receives a create session request from the MME, and establishes a radio bearer; and a local PDN gateway that is connected to a PDN with a core network and establishes the radio bearer with the serving gateway. 7. A data path configuration method in a wireless communication system including a femto base station, the method comprising: establishing, when a User Equipment (UE) is in active state, a first data path connecting the UE, the femto base station, and a local Packet Data Network (PDN) gateway co-located with the femto base station, the local PDN gateway supporting a local Internet Protocol (IP) access function; and establishing a second data path connecting the UE, the femto base station, a serving gateway, and the local PDN gateway, when the UE transitions from the active state to an idle state. 8. The data path configuration method of claim 7, wherein establishing the first data path comprises: receiving a PDN connectivity request from the UE; and setting a data link between the femto base station and the local PDN gateway. 9. The data path configuration method of claim 7, wherein establishing the first data path comprises: receiving a PDN connectivity request from the UE; and setting a data link between the femto base station and the local PDN gateway using a control connection established between the MME and the femto base station. 10. The data path configuration method of claim 7, wherein establishing the second data path comprises setting a data link between the local PDN gateway and the local serving gateway for the UE to receive a paging signal.
2,400
7,226
7,226
14,925,170
2,477
The present disclosure relates to transmitting synchronization signals and in particular to so called beam sweep. In particular the disclosure relates to methods for providing synchronization using synchronization sequences that are transmitted at different points in time. The disclosure also relates to corresponding devices and computer programs. A method in a network node, for transmitting synchronization sequences of a synchronization signal to one or more receiving wireless devices, comprises determining multiple synchronization sequences, such that each synchronization sequence comprises a respective timing indication, whereby each synchronization sequence enables determination of a time of an event in a receiving wireless device and transmitting the synchronization sequences to the one or more wireless devices, at different points in time.
1. A method implemented by a network node, for transmitting synchronization sequences of a synchronization signal to one or more receiving wireless devices, the method comprising: determining multiple synchronization sequences, such that each synchronization sequence comprises a respective timing indication, whereby each synchronization sequence enables determination of a time of an event in a receiving wireless device; and transmitting the synchronization sequences to the one or more wireless devices, at different points in time. 2. The method of claim 1, wherein the multiple synchronization sequences are time dependent versions of a synchronization signal referring to one particular event. 3. The method of claim 1, further comprising determining a time of the event. 4. The method of claim 1, wherein the synchronization sequences are transmitted in different directions. 5. The method of claim 4, wherein the transmission of the synchronization sequences constitutes a beam sweep. 6. The method of claim 1, wherein the timing indications are relative to a time of transmission of the respective synchronization sequence. 7. The method of claim 1, wherein the timing indications are relative to a reference clock. 8. The method of claim 1, wherein the event is a time of a reserved time slot where the wireless device is allowed to transmit. 9. The method of claim 8, wherein the reserved time slot is a random access window. 10. The method of claim 1, wherein the event is a time of a further transmission from the network node. 11. The method of claim 1, wherein the timing indications are encoded into the synchronization sequence. 12. The method of claim 1, wherein the synchronization sequences are determined to comprise a synchronization sequence from a set of dissimilar synchronization sequences, and wherein each of the dissimilar synchronization sequences in the set is mapped to a respective point in time or to a timing. 13. The method of claim 12, wherein each synchronization sequence is mapped to a time or timing by an index. 14. A non-transitory computer-readable medium storing a computer program comprising program instructions that, when executed by processing circuitry in a network node, configures the network node for transmitting synchronization sequences of a synchronization signal to one or more receiving wireless devices, the computer program comprising program instructions causing the network node to: determine multiple synchronization sequences, such that each synchronization sequence comprises a respective timing indication, whereby each synchronization sequence enables determination of a time of an event in a receiving wireless device; and transmit the synchronization sequences to the one or more wireless devices, at different points in time. 15. A method implemented by a wireless device, for receiving one or more synchronization sequences of a synchronization signal, the method comprising: monitoring a spectrum for synchronisation sequences; and when a first synchronisation sequence is detected then: obtaining, by analysing the content of the detected first synchronisation sequence, a timing indication defining a time of an event. 16. The method of claim 15, wherein the method comprises receiving a second synchronization sequence, wherein the first and the second synchronization sequences define the same time. 17. The method of claim 15, comprising performing a transceiver operation at the time defined by the timing indication. 18. The method of claim 15, wherein the timing indications are relative times to a time of a transmission of the respective synchronization sequence. 19. The method of claim 15, wherein the timing indications are relative to a reference clock. 20. The method of claim 15, wherein the event is a time of a reserved time slot where the wireless device is allowed to transmit. 21. The method of claim 20, wherein the reserved time slot is a random access window. 22. The method of claim 15, wherein the event is a time when the wireless device is requested to listen for further transmission from the network node. 23. The method of claim 15, wherein the timing indications are encoded into the synchronization sequences and wherein the analyzing comprises decoding the synchronization sequence. 24. The method of claim 15, wherein the wireless device monitors the spectrum for several dissimilar synchronization sequences, and wherein each of the dissimilar synchronization sequences is mapped to a respective point in time or to a timing. 25. The method of claim 24, wherein each synchronization sequence is mapped to a time or timing by an index and wherein the obtaining comprises retrieving a time of timing using the index. 26. A non-transitory computer-readable medium storing a computer program comprising program instructions that, when executed by processing circuitry in a wireless device, configures the wireless device for receiving one or more synchronization sequences of a synchronization signal, the computer program comprising program instructions causing the wireless device to: monitor a spectrum for synchronisation sequences; and when a first synchronisation sequence is detected then: obtain, by analysing the content of the detected first synchronisation sequence, a timing indication defining a time of an event. 27. A network node in a cellular communication network configured for transmitting synchronization sequences of a synchronization signal to one or more receiving wireless devices, the network node, comprising: a communication interface; and processing circuitry configured to cause the network node to: determine multiple synchronization sequences, such that each synchronization sequence comprises a respective timing indication, whereby each synchronization sequence enables determination of a time of an event in a receiving wireless device; and transmit the synchronization sequences to the one or more wireless devices, at different points in time. 28. A wireless device being configured for receiving one or more synchronization sequences of a synchronization signal, the wireless device comprising: circuitry communication interface; and processing circuitry configured to cause the wireless device to: monitor a spectrum for synchronisation sequences; and when a first synchronisation sequence is detected then: obtain, by analysing the content of the detected first synchronisation sequence, a timing indication defining a time of an event.
The present disclosure relates to transmitting synchronization signals and in particular to so called beam sweep. In particular the disclosure relates to methods for providing synchronization using synchronization sequences that are transmitted at different points in time. The disclosure also relates to corresponding devices and computer programs. A method in a network node, for transmitting synchronization sequences of a synchronization signal to one or more receiving wireless devices, comprises determining multiple synchronization sequences, such that each synchronization sequence comprises a respective timing indication, whereby each synchronization sequence enables determination of a time of an event in a receiving wireless device and transmitting the synchronization sequences to the one or more wireless devices, at different points in time.1. A method implemented by a network node, for transmitting synchronization sequences of a synchronization signal to one or more receiving wireless devices, the method comprising: determining multiple synchronization sequences, such that each synchronization sequence comprises a respective timing indication, whereby each synchronization sequence enables determination of a time of an event in a receiving wireless device; and transmitting the synchronization sequences to the one or more wireless devices, at different points in time. 2. The method of claim 1, wherein the multiple synchronization sequences are time dependent versions of a synchronization signal referring to one particular event. 3. The method of claim 1, further comprising determining a time of the event. 4. The method of claim 1, wherein the synchronization sequences are transmitted in different directions. 5. The method of claim 4, wherein the transmission of the synchronization sequences constitutes a beam sweep. 6. The method of claim 1, wherein the timing indications are relative to a time of transmission of the respective synchronization sequence. 7. The method of claim 1, wherein the timing indications are relative to a reference clock. 8. The method of claim 1, wherein the event is a time of a reserved time slot where the wireless device is allowed to transmit. 9. The method of claim 8, wherein the reserved time slot is a random access window. 10. The method of claim 1, wherein the event is a time of a further transmission from the network node. 11. The method of claim 1, wherein the timing indications are encoded into the synchronization sequence. 12. The method of claim 1, wherein the synchronization sequences are determined to comprise a synchronization sequence from a set of dissimilar synchronization sequences, and wherein each of the dissimilar synchronization sequences in the set is mapped to a respective point in time or to a timing. 13. The method of claim 12, wherein each synchronization sequence is mapped to a time or timing by an index. 14. A non-transitory computer-readable medium storing a computer program comprising program instructions that, when executed by processing circuitry in a network node, configures the network node for transmitting synchronization sequences of a synchronization signal to one or more receiving wireless devices, the computer program comprising program instructions causing the network node to: determine multiple synchronization sequences, such that each synchronization sequence comprises a respective timing indication, whereby each synchronization sequence enables determination of a time of an event in a receiving wireless device; and transmit the synchronization sequences to the one or more wireless devices, at different points in time. 15. A method implemented by a wireless device, for receiving one or more synchronization sequences of a synchronization signal, the method comprising: monitoring a spectrum for synchronisation sequences; and when a first synchronisation sequence is detected then: obtaining, by analysing the content of the detected first synchronisation sequence, a timing indication defining a time of an event. 16. The method of claim 15, wherein the method comprises receiving a second synchronization sequence, wherein the first and the second synchronization sequences define the same time. 17. The method of claim 15, comprising performing a transceiver operation at the time defined by the timing indication. 18. The method of claim 15, wherein the timing indications are relative times to a time of a transmission of the respective synchronization sequence. 19. The method of claim 15, wherein the timing indications are relative to a reference clock. 20. The method of claim 15, wherein the event is a time of a reserved time slot where the wireless device is allowed to transmit. 21. The method of claim 20, wherein the reserved time slot is a random access window. 22. The method of claim 15, wherein the event is a time when the wireless device is requested to listen for further transmission from the network node. 23. The method of claim 15, wherein the timing indications are encoded into the synchronization sequences and wherein the analyzing comprises decoding the synchronization sequence. 24. The method of claim 15, wherein the wireless device monitors the spectrum for several dissimilar synchronization sequences, and wherein each of the dissimilar synchronization sequences is mapped to a respective point in time or to a timing. 25. The method of claim 24, wherein each synchronization sequence is mapped to a time or timing by an index and wherein the obtaining comprises retrieving a time of timing using the index. 26. A non-transitory computer-readable medium storing a computer program comprising program instructions that, when executed by processing circuitry in a wireless device, configures the wireless device for receiving one or more synchronization sequences of a synchronization signal, the computer program comprising program instructions causing the wireless device to: monitor a spectrum for synchronisation sequences; and when a first synchronisation sequence is detected then: obtain, by analysing the content of the detected first synchronisation sequence, a timing indication defining a time of an event. 27. A network node in a cellular communication network configured for transmitting synchronization sequences of a synchronization signal to one or more receiving wireless devices, the network node, comprising: a communication interface; and processing circuitry configured to cause the network node to: determine multiple synchronization sequences, such that each synchronization sequence comprises a respective timing indication, whereby each synchronization sequence enables determination of a time of an event in a receiving wireless device; and transmit the synchronization sequences to the one or more wireless devices, at different points in time. 28. A wireless device being configured for receiving one or more synchronization sequences of a synchronization signal, the wireless device comprising: circuitry communication interface; and processing circuitry configured to cause the wireless device to: monitor a spectrum for synchronisation sequences; and when a first synchronisation sequence is detected then: obtain, by analysing the content of the detected first synchronisation sequence, a timing indication defining a time of an event.
2,400
7,227
7,227
13,966,642
2,422
A method for performing a surgical procedure includes adjusting an encoding configuration of a video encoder in response to receiving an input associated with a change of state of a surgical system performing the surgical procedure, and encoding image data of the surgical procedure captured after the change of state based on the adjusted encoding configuration.
1. A method of processing video of a surgical procedure, the method comprising: adjusting an encoding configuration of a video encoder in response to receiving an input associated with a change of state of a surgical system performing the surgical procedure; and encoding image data of the surgical procedure captured after the change of state based on the adjusted encoding configuration. 2. The method of claim 1, wherein: adjusting the encoding configuration comprises increasing an image encoding resolution for encoding at least one image frame of the image data. 3. The method of claim 2, wherein: adjusting the encoding configuration further comprises decreasing an image encoding rate for encoding the image data. 4. The method of claim 1, wherein: encoding the image data based on the adjusted encoding configuration comprises generating intra-frames (i-frames) at an i-frame rate and generating predictive inter-frames (p-frames) at a p-frame rate; and adjusting the encoding configuration comprises adjusting the i-frame rate. 5. The method of claim 4, wherein: adjusting the encoding configuration further comprises adjusting the p-frame rate. 6. The method of claim 5, further comprising: transmitting the generated i-frames and p-frames to a video decoder at a predetermined transmission data rate wherein: the adjusting of the p-frame rate is based on the adjusting of the i-frame rate and the predetermined transmission data rate. 7. The method of claim 1, wherein: the input associated with the change of state comprises at least one of an input associated with controlling movement of the image capture device, an input associated with controlling an adjustment of a field of view of the image capture device, and an input associated with controlling movement of an element within the field of view of the image capture device; and adjusting the encoding configuration is based on a predicted difference between current captured image data and anticipated captured image data as affected by the change of state. 8. The method of claim 1, further comprising: adjusting the encoding configuration in response to receiving an input indicative of a change of a bandwidth available for transmission of encoded images. 9. The method of claim 1, wherein the input associated with the change of state of the surgical system comprises an input associated with a control command input at a surgeon console of a robotic surgical system. 10. A surgical system comprising: an endoscopic image capture device for capturing image data of a surgical site during a surgical procedure; and a video processor for generating video encoding configuration data to encode the image data, the processor configured to: receive an input associated with a change of state of the surgical system; and output adjusted video encoding configuration data based on the input. 11. The surgical system of claim 10, further comprising: an image encoder logically coupled to the processor and the endoscopic image capture device, the image encoder configured to: receive from the processor the video encoding configuration data; receive from the endoscopic image capture device the image data; and encode the received image data based on the received video encoding configuration data. 12. The surgical system of claim 11, further comprising: an input communication interface logically coupled to the processor to provide to the processor the input indicative of the change of state. 13. The surgical system of claim 12, further comprising: an output communication interface logically coupled to the image encoder to provide to a display the encoded image data. 14. The surgical system of claim 11, wherein: the adjusted video encoding configuration data comprises an intra-frames (i-frames) rate parameter and a predictive inter-frames (p-frames) rate parameter for encoding the image data based on the anticipated effect of the change of state. 15. The surgical system of claim 14, further comprising: an output communication interface logically coupled to the image encoder to provide to a display through a communication link the encoded image data, wherein: the processor is further configured to receive an input to the processor indicative of a communication link condition; and the adjusted video encoding configuration data comprises an intra-frames (i-frames) rate parameter and a predictive inter-frames (p-frames) rate parameter for encoding the captured image content of the field of view based on the input indicative of the communication link condition. 16. The surgical system of claim 10, wherein: the adjusted video encoding configuration data comprises an image encoding resolution for encoding the image data based on the anticipated effect of the change of state on the image data. 17. The surgical system of claim 16, wherein: the adjusted video encoding configuration data further comprises an image encoding rate for encoding the image data based on the anticipated effect of the change of state on the image data. 18. The surgical system of claim 10, wherein: the adjusted video encoding configuration data further comprises an image encoding rate for encoding the image data based on the anticipated effect of the change of state on the image data. 19. The surgical system of claim 10, further comprising: an output communication interface logically coupled to the image encoder to provide to a display encoded image data through a communication link, wherein: the video processor is further configured to receive an input indicative of a condition of the communication link; and the adjusted video encoding configuration data further comprises an image encoding resolution for encoding the image data based on the input indicative of the communication link condition. 20. The surgical system of claim 19, wherein: the adjusted video encoding configuration data further comprises an image encoding rate for encoding the image data based on the input indicative of the communication link condition. 21. The surgical system of claim 10, wherein the input associated with a change of state of the surgical system comprises at least one of an input associated with controlling movement of the image capture device, an input associated with controlling an adjustment of a field of view of the image capture device, and an input associated with controlling movement of an element within the field of view of the image capture device. 22. The surgical system of claim 10, wherein the input associated with a change of state of the surgical system comprises an input associated with a control command input at a surgeon console of a robotic surgical system.
A method for performing a surgical procedure includes adjusting an encoding configuration of a video encoder in response to receiving an input associated with a change of state of a surgical system performing the surgical procedure, and encoding image data of the surgical procedure captured after the change of state based on the adjusted encoding configuration.1. A method of processing video of a surgical procedure, the method comprising: adjusting an encoding configuration of a video encoder in response to receiving an input associated with a change of state of a surgical system performing the surgical procedure; and encoding image data of the surgical procedure captured after the change of state based on the adjusted encoding configuration. 2. The method of claim 1, wherein: adjusting the encoding configuration comprises increasing an image encoding resolution for encoding at least one image frame of the image data. 3. The method of claim 2, wherein: adjusting the encoding configuration further comprises decreasing an image encoding rate for encoding the image data. 4. The method of claim 1, wherein: encoding the image data based on the adjusted encoding configuration comprises generating intra-frames (i-frames) at an i-frame rate and generating predictive inter-frames (p-frames) at a p-frame rate; and adjusting the encoding configuration comprises adjusting the i-frame rate. 5. The method of claim 4, wherein: adjusting the encoding configuration further comprises adjusting the p-frame rate. 6. The method of claim 5, further comprising: transmitting the generated i-frames and p-frames to a video decoder at a predetermined transmission data rate wherein: the adjusting of the p-frame rate is based on the adjusting of the i-frame rate and the predetermined transmission data rate. 7. The method of claim 1, wherein: the input associated with the change of state comprises at least one of an input associated with controlling movement of the image capture device, an input associated with controlling an adjustment of a field of view of the image capture device, and an input associated with controlling movement of an element within the field of view of the image capture device; and adjusting the encoding configuration is based on a predicted difference between current captured image data and anticipated captured image data as affected by the change of state. 8. The method of claim 1, further comprising: adjusting the encoding configuration in response to receiving an input indicative of a change of a bandwidth available for transmission of encoded images. 9. The method of claim 1, wherein the input associated with the change of state of the surgical system comprises an input associated with a control command input at a surgeon console of a robotic surgical system. 10. A surgical system comprising: an endoscopic image capture device for capturing image data of a surgical site during a surgical procedure; and a video processor for generating video encoding configuration data to encode the image data, the processor configured to: receive an input associated with a change of state of the surgical system; and output adjusted video encoding configuration data based on the input. 11. The surgical system of claim 10, further comprising: an image encoder logically coupled to the processor and the endoscopic image capture device, the image encoder configured to: receive from the processor the video encoding configuration data; receive from the endoscopic image capture device the image data; and encode the received image data based on the received video encoding configuration data. 12. The surgical system of claim 11, further comprising: an input communication interface logically coupled to the processor to provide to the processor the input indicative of the change of state. 13. The surgical system of claim 12, further comprising: an output communication interface logically coupled to the image encoder to provide to a display the encoded image data. 14. The surgical system of claim 11, wherein: the adjusted video encoding configuration data comprises an intra-frames (i-frames) rate parameter and a predictive inter-frames (p-frames) rate parameter for encoding the image data based on the anticipated effect of the change of state. 15. The surgical system of claim 14, further comprising: an output communication interface logically coupled to the image encoder to provide to a display through a communication link the encoded image data, wherein: the processor is further configured to receive an input to the processor indicative of a communication link condition; and the adjusted video encoding configuration data comprises an intra-frames (i-frames) rate parameter and a predictive inter-frames (p-frames) rate parameter for encoding the captured image content of the field of view based on the input indicative of the communication link condition. 16. The surgical system of claim 10, wherein: the adjusted video encoding configuration data comprises an image encoding resolution for encoding the image data based on the anticipated effect of the change of state on the image data. 17. The surgical system of claim 16, wherein: the adjusted video encoding configuration data further comprises an image encoding rate for encoding the image data based on the anticipated effect of the change of state on the image data. 18. The surgical system of claim 10, wherein: the adjusted video encoding configuration data further comprises an image encoding rate for encoding the image data based on the anticipated effect of the change of state on the image data. 19. The surgical system of claim 10, further comprising: an output communication interface logically coupled to the image encoder to provide to a display encoded image data through a communication link, wherein: the video processor is further configured to receive an input indicative of a condition of the communication link; and the adjusted video encoding configuration data further comprises an image encoding resolution for encoding the image data based on the input indicative of the communication link condition. 20. The surgical system of claim 19, wherein: the adjusted video encoding configuration data further comprises an image encoding rate for encoding the image data based on the input indicative of the communication link condition. 21. The surgical system of claim 10, wherein the input associated with a change of state of the surgical system comprises at least one of an input associated with controlling movement of the image capture device, an input associated with controlling an adjustment of a field of view of the image capture device, and an input associated with controlling movement of an element within the field of view of the image capture device. 22. The surgical system of claim 10, wherein the input associated with a change of state of the surgical system comprises an input associated with a control command input at a surgeon console of a robotic surgical system.
2,400
7,228
7,228
13,623,043
2,421
Features of various implementations are used to enable determining what a particular consumer is watching on television in order to deliver matched functionality, content and/or services, as a part of an interactive television suite of technologies. In some implementations, the process of determining what a particular consumer is watching is enabled so that communication between the primary set-top box and a supplemental set-top box and/or television integrated device is reduced, thereby avoiding the need for one or more provider specific APIs. For example, one aspect of the disclosure is a computer-implemented method of identifying a media program by capturing display data from the media program, and extracting text from the display data in response to determining that the display data includes the text overlay, wherein the extracted text is associated with the media program.
1. A method of identifying a media program, comprising: at a first electronic device configured to receive the media program, the first electronic device including a processor and memory: in accordance with a determination that display data identifying the media program is not available to the first electronic device: transmitting, without user intervention, a code to a second electronic device that has access to the display data, the code causing the display data to be displayed; capturing display data from the media program; evaluating the display data to determine whether or not the display data includes a text overlay including information about the media program; and extracting text from the text overlay in response to determining that the display data includes the text overlay, wherein the extracted text is associated with the media program. 2. The method of claim 1, wherein capturing the display data includes performing a screen capture from a display device configured to display the media program. 3. The method of claim 1, wherein capturing the display data includes decoding data transmitted by the second electronic device to the display device. 4. The method of claim 1, further comprising comparing the extracted text to electronic program guide data to confirm identification of the playing broadcast media program. 5. (canceled) 6. The method of claim 1, wherein the code is an infrared code. 7. (canceled) 8. (canceled) 9. A computer program product enabling identification of a playing broadcast media program by a first electronic device including a processor and a memory, the computer program product including instructions, storable in a non-transitory memory and executable by a processor, that, when executed by a processor, cause the first electronic device to: in accordance with a determination that display data identifying the media program is not available to the first electronic device: transmit, without user intervention, a code to a second electronic device that has access to the display data, the code causing the display data to be displayed; capture display data from the media program; evaluate the display data to determine whether or not the display data includes a text overlay including information about the playing broadcast media program; and extract text in response to determining that the display data includes said text overlay, wherein the extracted text identifies the playing broadcast media program. 10. The computer program product of claim 9, wherein capturing the display data includes performing a screen capture from a display device configured to display the media program. 11. The computer program product of claim 9, wherein capturing the display data includes decoding data transmitted by the second electronic device to the display device. 12. The computer program product of claim 9, wherein the one or more programs further include instructions to: compare the extracted text to electronic program guide data to confirm identification of the playing broadcast media program. 13. The computer program product of claim 9, wherein the code is an infrared code. 14. A first electronic device configured to receive a media program, comprising: a processor and memory for storing one or more programs, wherein the one or more programs comprise instructions, which when executed by the processor, cause the first electronic device to: in accordance with a determination that display data identifying the media program is not available to the first electronic device: transmit, without user intervention, a code to a second electronic device that has access to the display data, the code causing the display data to be displayed; capture display data from the media program; evaluate the display data to determine whether or not the display data includes a text overlay including information about the playing broadcast media program; and extract text in response to determining that the display data includes said text overlay, wherein the extracted text identifies the playing broadcast media program. 15. The first electronic device of claim 14, wherein capturing the display data includes performing a screen capture from a display device configured to display the media program. 16. The first electronic device of claim 14, wherein capturing the display data includes decoding data transmitted by the second electronic device to the display device. 17. The first electronic device of claim 14, wherein the one or more programs further comprise instructions to: compare the extracted text to electronic program guide data to confirm identification of the playing broadcast media program. 18. The first electronic device of claim 14, wherein the code is an infrared code.
Features of various implementations are used to enable determining what a particular consumer is watching on television in order to deliver matched functionality, content and/or services, as a part of an interactive television suite of technologies. In some implementations, the process of determining what a particular consumer is watching is enabled so that communication between the primary set-top box and a supplemental set-top box and/or television integrated device is reduced, thereby avoiding the need for one or more provider specific APIs. For example, one aspect of the disclosure is a computer-implemented method of identifying a media program by capturing display data from the media program, and extracting text from the display data in response to determining that the display data includes the text overlay, wherein the extracted text is associated with the media program.1. A method of identifying a media program, comprising: at a first electronic device configured to receive the media program, the first electronic device including a processor and memory: in accordance with a determination that display data identifying the media program is not available to the first electronic device: transmitting, without user intervention, a code to a second electronic device that has access to the display data, the code causing the display data to be displayed; capturing display data from the media program; evaluating the display data to determine whether or not the display data includes a text overlay including information about the media program; and extracting text from the text overlay in response to determining that the display data includes the text overlay, wherein the extracted text is associated with the media program. 2. The method of claim 1, wherein capturing the display data includes performing a screen capture from a display device configured to display the media program. 3. The method of claim 1, wherein capturing the display data includes decoding data transmitted by the second electronic device to the display device. 4. The method of claim 1, further comprising comparing the extracted text to electronic program guide data to confirm identification of the playing broadcast media program. 5. (canceled) 6. The method of claim 1, wherein the code is an infrared code. 7. (canceled) 8. (canceled) 9. A computer program product enabling identification of a playing broadcast media program by a first electronic device including a processor and a memory, the computer program product including instructions, storable in a non-transitory memory and executable by a processor, that, when executed by a processor, cause the first electronic device to: in accordance with a determination that display data identifying the media program is not available to the first electronic device: transmit, without user intervention, a code to a second electronic device that has access to the display data, the code causing the display data to be displayed; capture display data from the media program; evaluate the display data to determine whether or not the display data includes a text overlay including information about the playing broadcast media program; and extract text in response to determining that the display data includes said text overlay, wherein the extracted text identifies the playing broadcast media program. 10. The computer program product of claim 9, wherein capturing the display data includes performing a screen capture from a display device configured to display the media program. 11. The computer program product of claim 9, wherein capturing the display data includes decoding data transmitted by the second electronic device to the display device. 12. The computer program product of claim 9, wherein the one or more programs further include instructions to: compare the extracted text to electronic program guide data to confirm identification of the playing broadcast media program. 13. The computer program product of claim 9, wherein the code is an infrared code. 14. A first electronic device configured to receive a media program, comprising: a processor and memory for storing one or more programs, wherein the one or more programs comprise instructions, which when executed by the processor, cause the first electronic device to: in accordance with a determination that display data identifying the media program is not available to the first electronic device: transmit, without user intervention, a code to a second electronic device that has access to the display data, the code causing the display data to be displayed; capture display data from the media program; evaluate the display data to determine whether or not the display data includes a text overlay including information about the playing broadcast media program; and extract text in response to determining that the display data includes said text overlay, wherein the extracted text identifies the playing broadcast media program. 15. The first electronic device of claim 14, wherein capturing the display data includes performing a screen capture from a display device configured to display the media program. 16. The first electronic device of claim 14, wherein capturing the display data includes decoding data transmitted by the second electronic device to the display device. 17. The first electronic device of claim 14, wherein the one or more programs further comprise instructions to: compare the extracted text to electronic program guide data to confirm identification of the playing broadcast media program. 18. The first electronic device of claim 14, wherein the code is an infrared code.
2,400
7,229
7,229
15,367,144
2,419
A publish/subscribe interface is used to enable a non-publish/subscribe first system (such as an IP network device) to obtain status information about a publish/subscribe device that cannot be pinged by the first system. The first system sends a status request to a domain name server associated with a system known to include the publish/subscribe device. The status request includes a domain name for the publish/subscribe device. Topic space maintained by a message broker in the publish/subscribe system includes status topics associated with publish/subscribe devices. The status topics contents reflect the current availability of the associated publish/subscribe device. The domain name is mapped to a status topic associated to the publish/subscribe device identified in the status request and the contents of that status topic are retrieved. If the contents have a first value, a “good” IP address is returned to the first system. If the contents have the second value, a “bad” IP address is returned. The return address is used in ping messages. If the ping operation succeeds, it is concluded the publish/subscribe device is online. If the ping operation fails, it is concluded that the publish/subscribe device is off-line.
1. A device for enabling a first computer network device to determine whether a second computer network device has an online status or an off-line status where the first computer network device cannot directly contact the second computer network device, the device comprising: a processor; a memory device for use by the processor, the memory device comprising instructions for execution by the processor to: receive a request from the first computer network device for a status of the second computer network device; determine whether the second computer network device is online or off-line by accessing information about the second computer network device from a publish/subscribe system; and indicate to the first computer network device whether the second computer network device is online or off-line based on said information from said publish/subscribe system. 2. The device of claim 1, wherein the processor is to: in response to a determination that the second computer network device is online, return a first network address to the first computer network device; and in response to a determination that the second computer network device is off-line, return a second network address to the first computer network device, wherein the second network address is a known bad address that will not provide a response to the first computer network device. 3. The device of claim 1, wherein the second computer network device is a publish/subscribe device and wherein the processor is to determine whether the second computer network device is online or off-line by mapping the received request to a status topic associated with the second computer network device. 4. The device of claim 3, wherein the processor is to determine whether the second computer network device is online or off-line by: subscribing to the status topic associated with the second computer network device; and receiving status information from the subscribed status topic. 5. The device of claim 1, wherein the processor is to determine whether the second computer network device is online or off-line by: associating status information having a first value to an online status; and associating status information having a second value to an off-line status. 6. The device of claim 1, wherein the processor is to store received status information for the second computer network device locally. 7. The device of claim 1, wherein said memory device comprises: topic space maintained by a message broker and a publish/subscribe system; and a status data storage location that comprises a status topic associated with said second computer network device. 8. The device of claim 7, wherein said processor to implement: a subscription component for establishing a subscription to said status topic associated to said second computer network device; and a message receiving component for receiving information about said status topic. 9. The device of claim 8, wherein said processor is to determine whether the information received by the message receiving component has said first value indicative of an online device status or said second value indicative of an off-line device status. 10. The device of claim 9, further comprising a local memory component for retaining the information received by said message receiving component. 11. The device of claim 1, farther comprising a domain name server for resolving network addresses. 12. A computer program product for enabling a first computer network device to determine whether a second computer network device has an online status or an off-line status where the first computer network device cannot directly contact the second computer network device, the computer program product comprising a non-transitory computer usable storage medium having computer usable program code embodied therewith, the computer usable program code comprising: computer usable program code configured to receive a request from the first computer network device for a status of the second computer network device; computer usable program code configured to determine whether the second computer network device is online or off-line by accessing information about the second computer network device from a publish/subscribe system; and computer usable program code configured to indicate to the first computer network device whether the second computer network device is online or off-line based on said information from said publish/subscribe system. 13. The computer program product of claim 12, further comprising: computer usable program code configured to, in response to a determination that the second computer network device is online, return a first network address to the first computer network device; and computer usable program code configured, to in response to a determination that the second computer network device is off-line, return a second network address to the first computer network device, wherein the second network address is a known bad address that will not provide a response to the first computer network device. 14. The computer program product of claim 13, wherein the computer usable program code configured to determine whether the second computer network device is online or off-line further comprises computer usable program code configured to map the received request to a status topic of the publish/subscribe system that is associated with the second computer network device. 15. The computer program product of claim 14, wherein the computer usable program code configured to determine whether the second computer network device is online or off-line further comprises: computer usable program code configured to subscribe to the status topic associated with the second computer network device; and computer usable program code configured to receive status information from the subscribed status topic. 16. The computer program product of claim 15, wherein the computer usable program code configured to determine whether the second computer network device is online or off-line further comprises: computer usable program code configured to associate status information having a first value to an online status; and computer usable program code configured to associate status information having a second value to an off-line status. 17. The computer program product of claim 16, further comprising computer usable program code configured to store received status information for the second computer network device locally.
A publish/subscribe interface is used to enable a non-publish/subscribe first system (such as an IP network device) to obtain status information about a publish/subscribe device that cannot be pinged by the first system. The first system sends a status request to a domain name server associated with a system known to include the publish/subscribe device. The status request includes a domain name for the publish/subscribe device. Topic space maintained by a message broker in the publish/subscribe system includes status topics associated with publish/subscribe devices. The status topics contents reflect the current availability of the associated publish/subscribe device. The domain name is mapped to a status topic associated to the publish/subscribe device identified in the status request and the contents of that status topic are retrieved. If the contents have a first value, a “good” IP address is returned to the first system. If the contents have the second value, a “bad” IP address is returned. The return address is used in ping messages. If the ping operation succeeds, it is concluded the publish/subscribe device is online. If the ping operation fails, it is concluded that the publish/subscribe device is off-line.1. A device for enabling a first computer network device to determine whether a second computer network device has an online status or an off-line status where the first computer network device cannot directly contact the second computer network device, the device comprising: a processor; a memory device for use by the processor, the memory device comprising instructions for execution by the processor to: receive a request from the first computer network device for a status of the second computer network device; determine whether the second computer network device is online or off-line by accessing information about the second computer network device from a publish/subscribe system; and indicate to the first computer network device whether the second computer network device is online or off-line based on said information from said publish/subscribe system. 2. The device of claim 1, wherein the processor is to: in response to a determination that the second computer network device is online, return a first network address to the first computer network device; and in response to a determination that the second computer network device is off-line, return a second network address to the first computer network device, wherein the second network address is a known bad address that will not provide a response to the first computer network device. 3. The device of claim 1, wherein the second computer network device is a publish/subscribe device and wherein the processor is to determine whether the second computer network device is online or off-line by mapping the received request to a status topic associated with the second computer network device. 4. The device of claim 3, wherein the processor is to determine whether the second computer network device is online or off-line by: subscribing to the status topic associated with the second computer network device; and receiving status information from the subscribed status topic. 5. The device of claim 1, wherein the processor is to determine whether the second computer network device is online or off-line by: associating status information having a first value to an online status; and associating status information having a second value to an off-line status. 6. The device of claim 1, wherein the processor is to store received status information for the second computer network device locally. 7. The device of claim 1, wherein said memory device comprises: topic space maintained by a message broker and a publish/subscribe system; and a status data storage location that comprises a status topic associated with said second computer network device. 8. The device of claim 7, wherein said processor to implement: a subscription component for establishing a subscription to said status topic associated to said second computer network device; and a message receiving component for receiving information about said status topic. 9. The device of claim 8, wherein said processor is to determine whether the information received by the message receiving component has said first value indicative of an online device status or said second value indicative of an off-line device status. 10. The device of claim 9, further comprising a local memory component for retaining the information received by said message receiving component. 11. The device of claim 1, farther comprising a domain name server for resolving network addresses. 12. A computer program product for enabling a first computer network device to determine whether a second computer network device has an online status or an off-line status where the first computer network device cannot directly contact the second computer network device, the computer program product comprising a non-transitory computer usable storage medium having computer usable program code embodied therewith, the computer usable program code comprising: computer usable program code configured to receive a request from the first computer network device for a status of the second computer network device; computer usable program code configured to determine whether the second computer network device is online or off-line by accessing information about the second computer network device from a publish/subscribe system; and computer usable program code configured to indicate to the first computer network device whether the second computer network device is online or off-line based on said information from said publish/subscribe system. 13. The computer program product of claim 12, further comprising: computer usable program code configured to, in response to a determination that the second computer network device is online, return a first network address to the first computer network device; and computer usable program code configured, to in response to a determination that the second computer network device is off-line, return a second network address to the first computer network device, wherein the second network address is a known bad address that will not provide a response to the first computer network device. 14. The computer program product of claim 13, wherein the computer usable program code configured to determine whether the second computer network device is online or off-line further comprises computer usable program code configured to map the received request to a status topic of the publish/subscribe system that is associated with the second computer network device. 15. The computer program product of claim 14, wherein the computer usable program code configured to determine whether the second computer network device is online or off-line further comprises: computer usable program code configured to subscribe to the status topic associated with the second computer network device; and computer usable program code configured to receive status information from the subscribed status topic. 16. The computer program product of claim 15, wherein the computer usable program code configured to determine whether the second computer network device is online or off-line further comprises: computer usable program code configured to associate status information having a first value to an online status; and computer usable program code configured to associate status information having a second value to an off-line status. 17. The computer program product of claim 16, further comprising computer usable program code configured to store received status information for the second computer network device locally.
2,400
7,230
7,230
14,154,755
2,454
According to some embodiments, a delivery system comprises an interface and one or more processors. The interface is operable to receive a current preference from a recipient. The current preference indicates how the recipient prefers messages to be delivered. The processors determine whether the current preference differs from a previous preference that the delivery system associates with the recipient. The interface communicates the current preference to a plurality of senders if the current preference differs from the previous preference. The senders are configured to store the current preference in local memory and to apply the current preference from local memory in response to a future determination to send a message to the recipient.
1. A delivery system, comprising: an interface operable to: receive a current preference from a recipient, the current preference indicating how the recipient prefers messages to be delivered; and one or more processors operable to: determine whether the current preference differs from a previous preference that the delivery system associates with the recipient; the one or more processors further operable to: communicate the current preference to a plurality of senders if the current preference differs from the previous preference, each sender configured to store the current preference in local memory and to apply the current preference from local memory in response to a future determination to send a message to the recipient. 2. The delivery system of claim 1, wherein the interface communicates the current preference according to a pre-determined time period. 3. The delivery system of claim 1, wherein the current preference comprises an encryption certificate of the recipient. 4. The delivery system of claim 1, wherein the current preference is made available to the plurality of senders concurrently. 5. The delivery system of claim 1, wherein the delivery system uses distributed file version management technology to distribute the current preference to the senders. 6. One or more non-transitory computer-readable media comprising logic, the logic when executed by one or more processors operable to: receive a current preference from a recipient, the current preference indicating how the recipient prefers messages to be delivered; determine whether the current preference differs from a previous preference that the delivery system associates with the recipient; and communicate the current preference to a plurality of senders if the current preference differs from the previous preference, each sender configured to store the current preference in local memory and to apply the current preference from local memory in response to a future determination to send a message to the recipient. 7. The logic of claim 6, the logic further operable to communicate the current preference according to a pre-determined time period. 8. The logic of claim 6, wherein the current preference comprises an encryption certificate of the recipient. 9. The logic of claim 6, wherein the current preference is made available to the plurality of senders concurrently. 10. The logic of claim 6, the logic further operable to communicate the current preference to the plurality of senders using distributed file version management technology. 11. A method, comprising: receiving a current preference from a recipient, the current preference indicating how the recipient prefers messages to be delivered; determining whether the current preference differs from a previous preference that the delivery system associates with the recipient; and communicating the current preference to a plurality of senders if the current preference differs from the previous preference, each sender configured to store the current preference in local memory and to apply the current preference from local memory in response to a future determination to send a message to the recipient. 12. The method of claim 11, wherein the current preference is communicated according to a pre-determined time period. 13. The method of claim 11, wherein the current preference comprises an encryption certificate of the recipient. 14. The method of claim 11, wherein the current preference is made available to the plurality of senders concurrently. 15. The method of claim 11, wherein the current preference is communicated to the plurality of senders using distributed file version management technology. 16. An apparatus, comprising: an interface operable to receive a preference from a remote resource, the preference indicating how a recipient prefers messages to be delivered to the recipient; and one or more processors operable to: store the preference in local memory; determine to send a message to the recipient after receiving the preference from the remote resource; obtain the preference in response to determining to send the message, the preference obtained from the local memory independently of sending a request for the preference to the remote resource; and apply the preference to the message; the interface further operable to send the message to the recipient. 17. The apparatus of claim 16, wherein the preference comprises an encryption certificate. 18. The apparatus of claim 16, the one or more processors further operable to: determine, based on the preference, whether the recipient supports decryption; and apply an encrypt-if-you-can policy to the message if the recipient supports decryption. 19. The apparatus of claim 16, the one or more processors further operable to periodically request updated preferences from the remote source according to a pre-determined time period. 20. The apparatus of claim 16, the one or more processors configured to use distributed file version management technology to receive the preference from the remote resource. 21. One or more non-transitory computer-readable media comprising logic, the logic when executed by one or more processors operable to facilitate distribution of an encryption key using file version management technology.
According to some embodiments, a delivery system comprises an interface and one or more processors. The interface is operable to receive a current preference from a recipient. The current preference indicates how the recipient prefers messages to be delivered. The processors determine whether the current preference differs from a previous preference that the delivery system associates with the recipient. The interface communicates the current preference to a plurality of senders if the current preference differs from the previous preference. The senders are configured to store the current preference in local memory and to apply the current preference from local memory in response to a future determination to send a message to the recipient.1. A delivery system, comprising: an interface operable to: receive a current preference from a recipient, the current preference indicating how the recipient prefers messages to be delivered; and one or more processors operable to: determine whether the current preference differs from a previous preference that the delivery system associates with the recipient; the one or more processors further operable to: communicate the current preference to a plurality of senders if the current preference differs from the previous preference, each sender configured to store the current preference in local memory and to apply the current preference from local memory in response to a future determination to send a message to the recipient. 2. The delivery system of claim 1, wherein the interface communicates the current preference according to a pre-determined time period. 3. The delivery system of claim 1, wherein the current preference comprises an encryption certificate of the recipient. 4. The delivery system of claim 1, wherein the current preference is made available to the plurality of senders concurrently. 5. The delivery system of claim 1, wherein the delivery system uses distributed file version management technology to distribute the current preference to the senders. 6. One or more non-transitory computer-readable media comprising logic, the logic when executed by one or more processors operable to: receive a current preference from a recipient, the current preference indicating how the recipient prefers messages to be delivered; determine whether the current preference differs from a previous preference that the delivery system associates with the recipient; and communicate the current preference to a plurality of senders if the current preference differs from the previous preference, each sender configured to store the current preference in local memory and to apply the current preference from local memory in response to a future determination to send a message to the recipient. 7. The logic of claim 6, the logic further operable to communicate the current preference according to a pre-determined time period. 8. The logic of claim 6, wherein the current preference comprises an encryption certificate of the recipient. 9. The logic of claim 6, wherein the current preference is made available to the plurality of senders concurrently. 10. The logic of claim 6, the logic further operable to communicate the current preference to the plurality of senders using distributed file version management technology. 11. A method, comprising: receiving a current preference from a recipient, the current preference indicating how the recipient prefers messages to be delivered; determining whether the current preference differs from a previous preference that the delivery system associates with the recipient; and communicating the current preference to a plurality of senders if the current preference differs from the previous preference, each sender configured to store the current preference in local memory and to apply the current preference from local memory in response to a future determination to send a message to the recipient. 12. The method of claim 11, wherein the current preference is communicated according to a pre-determined time period. 13. The method of claim 11, wherein the current preference comprises an encryption certificate of the recipient. 14. The method of claim 11, wherein the current preference is made available to the plurality of senders concurrently. 15. The method of claim 11, wherein the current preference is communicated to the plurality of senders using distributed file version management technology. 16. An apparatus, comprising: an interface operable to receive a preference from a remote resource, the preference indicating how a recipient prefers messages to be delivered to the recipient; and one or more processors operable to: store the preference in local memory; determine to send a message to the recipient after receiving the preference from the remote resource; obtain the preference in response to determining to send the message, the preference obtained from the local memory independently of sending a request for the preference to the remote resource; and apply the preference to the message; the interface further operable to send the message to the recipient. 17. The apparatus of claim 16, wherein the preference comprises an encryption certificate. 18. The apparatus of claim 16, the one or more processors further operable to: determine, based on the preference, whether the recipient supports decryption; and apply an encrypt-if-you-can policy to the message if the recipient supports decryption. 19. The apparatus of claim 16, the one or more processors further operable to periodically request updated preferences from the remote source according to a pre-determined time period. 20. The apparatus of claim 16, the one or more processors configured to use distributed file version management technology to receive the preference from the remote resource. 21. One or more non-transitory computer-readable media comprising logic, the logic when executed by one or more processors operable to facilitate distribution of an encryption key using file version management technology.
2,400
7,231
7,231
14,985,934
2,482
A rearview camera assembly includes a lens unit including a lens barrel having a sensor lens therein and a light sensor unit. The light sensor has a printed circuit board having a light sensor chip mounted thereon, a rear housing supporting the printed circuit board on a first side thereof, and a front housing coupled with the rear housing and supporting the printed circuit board on a second side thereof. The front housing defines a lens holder, and the lens barrel is received within the lens holder of the rear housing so as to align with the light sensor.
1. A rearview camera assembly, comprising: a lens unit including a lens barrel having a sensor lens therein; and a light sensor unit, including: a printed circuit board having a light sensor chip mounted thereon; a rear housing supporting the printed circuit board on a first side thereof; and a front housing coupled with the rear housing and supporting the printed circuit board on a second side thereof, the front housing defining a lens holder, the lens barrel being received within the lens holder of the rear housing so as to align with the light sensor. 2. The rearview camera assembly of claim 1, wherein the printed circuit board includes a connection feature coupled therewith and in electronic communication with the light sensor, the connection feature extending through the rear housing. 3. The rearview camera assembly of claim 2, further including a connector extending into the rear housing and coupling with the connection feature. 4. The rearview camera assembly of claim 1, wherein: the front housing is of a metallic material; the rear housing is of a metallic material; the printed circuit board is in electrical contact with the front housing and the rear housing; and the connector is in electrical contact with the rear housing. 5. The rearview camera assembly of claim 1, wherein: the front housing includes an outer flange defining a periphery thereof; and the rear housing is received within the periphery such that the flange at least partially overlaps the rear housing. 6. The rearview camera assembly of claim 1, wherein the front housing defines a plurality of stepped portions, the front housing supports the printed circuit board on at least the stepped portions. 7. The rearview camera assembly of claim 6, wherein the rear housing includes a plurality of bosses aligning with the stepped portions, the rear housing supporting the printed circuit board at least on the bosses. 8. The rearview camera assembly of claim 6, further including a plurality of screws, wherein; each of the plurality of screws extends through the rear housing and through the printed circuit board and engage with the front housing to couple the front housing to the rear housing. 9. A camera assembly, comprising: a lens unit including a lens barrel having a sensor lens therein; and a light sensor unit, including: a front housing defining a stepped profile including a first stepped region from a lateral portion thereof and a second stepped region from the first stepped region, the front housing further defining a lens holder within the second stepped region, the lens barrel being received within the lens holder; a front housing coupled with the rear housing; and a printed circuit board having a light sensor chip mounted thereon and positioned at least partially within the second stepped region of the front housing to align with the sensor lens, a portion of the printed circuit being received between corresponding portions of the rear housing and at least corresponding portion of the first stepped region of the front housing. 10. The camera assembly of claim 9, wherein the front housing is of a metallic material, the printed circuit board being electrically connected with the front housing. 11. The camera assembly of claim 9, wherein: the front housing includes an outer flange defining a periphery thereof; and the rear housing is received within the periphery such that the flange at least partially overlaps the rear housing. 12. The camera assembly of claim 9, wherein the first stepped region of the front housing supports the printed circuit board on a first side thereof. 13. The camera assembly of claim 12, wherein the rear housing includes a boss aligning with the first stepped region, the rear housing supporting the printed circuit board on a second side thereof on at least on the boss. 14. The camera assembly of claim 9, further including a screw, wherein; the screw extends through the rear housing and through the printed circuit board and engages with the front housing within he first stepped region to couple the front housing to the rear housing. 15. A vehicle rear vision system, comprising: a display within an interior of the vehicle; and a camera in communication with the display and coupled with the vehicle in a rear-facing position with respect thereto, the camera including: a lens barrel having a sensor lens therein; a printed circuit board having a light sensor chip mounted thereon; a rear housing; and a front housing coupled with the rear housing to enclose the printed circuit board therewith, the front housing defining a lens holder receiving the lens barrel aligned with the light sensor and a flange extending oppositely from the lens holder to overlap with at least a portion of the front housing. 16. The system of claim 15, wherein: the printed circuit board includes a connection feature coupled therewith and in electronic communication with the light sensor, the connection feature extending through the rear housing; the system further includes a connector extending into the rear housing and coupling with the connection feature. 17. The system of claim 15, wherein the front housing is of a metallic material, the printed circuit board being electrically connected with the front housing. 18. The system of claim 15, wherein the front housing defines a plurality of stepped portions, the front housing supporting a first side of the printed circuit board on at least the stepped portions. 19. The system of claim 18, wherein the rear housing includes a plurality of bosses aligning with the stepped portions, the rear housing supporting the printed circuit board at least on the bosses. 20. The system of claim 18, wherein: the camera further includes a plurality of screws; and each of the plurality of screws extends through the rear housing and through the printed circuit board and engage with the front housing to couple the front housing to the rear housing.
A rearview camera assembly includes a lens unit including a lens barrel having a sensor lens therein and a light sensor unit. The light sensor has a printed circuit board having a light sensor chip mounted thereon, a rear housing supporting the printed circuit board on a first side thereof, and a front housing coupled with the rear housing and supporting the printed circuit board on a second side thereof. The front housing defines a lens holder, and the lens barrel is received within the lens holder of the rear housing so as to align with the light sensor.1. A rearview camera assembly, comprising: a lens unit including a lens barrel having a sensor lens therein; and a light sensor unit, including: a printed circuit board having a light sensor chip mounted thereon; a rear housing supporting the printed circuit board on a first side thereof; and a front housing coupled with the rear housing and supporting the printed circuit board on a second side thereof, the front housing defining a lens holder, the lens barrel being received within the lens holder of the rear housing so as to align with the light sensor. 2. The rearview camera assembly of claim 1, wherein the printed circuit board includes a connection feature coupled therewith and in electronic communication with the light sensor, the connection feature extending through the rear housing. 3. The rearview camera assembly of claim 2, further including a connector extending into the rear housing and coupling with the connection feature. 4. The rearview camera assembly of claim 1, wherein: the front housing is of a metallic material; the rear housing is of a metallic material; the printed circuit board is in electrical contact with the front housing and the rear housing; and the connector is in electrical contact with the rear housing. 5. The rearview camera assembly of claim 1, wherein: the front housing includes an outer flange defining a periphery thereof; and the rear housing is received within the periphery such that the flange at least partially overlaps the rear housing. 6. The rearview camera assembly of claim 1, wherein the front housing defines a plurality of stepped portions, the front housing supports the printed circuit board on at least the stepped portions. 7. The rearview camera assembly of claim 6, wherein the rear housing includes a plurality of bosses aligning with the stepped portions, the rear housing supporting the printed circuit board at least on the bosses. 8. The rearview camera assembly of claim 6, further including a plurality of screws, wherein; each of the plurality of screws extends through the rear housing and through the printed circuit board and engage with the front housing to couple the front housing to the rear housing. 9. A camera assembly, comprising: a lens unit including a lens barrel having a sensor lens therein; and a light sensor unit, including: a front housing defining a stepped profile including a first stepped region from a lateral portion thereof and a second stepped region from the first stepped region, the front housing further defining a lens holder within the second stepped region, the lens barrel being received within the lens holder; a front housing coupled with the rear housing; and a printed circuit board having a light sensor chip mounted thereon and positioned at least partially within the second stepped region of the front housing to align with the sensor lens, a portion of the printed circuit being received between corresponding portions of the rear housing and at least corresponding portion of the first stepped region of the front housing. 10. The camera assembly of claim 9, wherein the front housing is of a metallic material, the printed circuit board being electrically connected with the front housing. 11. The camera assembly of claim 9, wherein: the front housing includes an outer flange defining a periphery thereof; and the rear housing is received within the periphery such that the flange at least partially overlaps the rear housing. 12. The camera assembly of claim 9, wherein the first stepped region of the front housing supports the printed circuit board on a first side thereof. 13. The camera assembly of claim 12, wherein the rear housing includes a boss aligning with the first stepped region, the rear housing supporting the printed circuit board on a second side thereof on at least on the boss. 14. The camera assembly of claim 9, further including a screw, wherein; the screw extends through the rear housing and through the printed circuit board and engages with the front housing within he first stepped region to couple the front housing to the rear housing. 15. A vehicle rear vision system, comprising: a display within an interior of the vehicle; and a camera in communication with the display and coupled with the vehicle in a rear-facing position with respect thereto, the camera including: a lens barrel having a sensor lens therein; a printed circuit board having a light sensor chip mounted thereon; a rear housing; and a front housing coupled with the rear housing to enclose the printed circuit board therewith, the front housing defining a lens holder receiving the lens barrel aligned with the light sensor and a flange extending oppositely from the lens holder to overlap with at least a portion of the front housing. 16. The system of claim 15, wherein: the printed circuit board includes a connection feature coupled therewith and in electronic communication with the light sensor, the connection feature extending through the rear housing; the system further includes a connector extending into the rear housing and coupling with the connection feature. 17. The system of claim 15, wherein the front housing is of a metallic material, the printed circuit board being electrically connected with the front housing. 18. The system of claim 15, wherein the front housing defines a plurality of stepped portions, the front housing supporting a first side of the printed circuit board on at least the stepped portions. 19. The system of claim 18, wherein the rear housing includes a plurality of bosses aligning with the stepped portions, the rear housing supporting the printed circuit board at least on the bosses. 20. The system of claim 18, wherein: the camera further includes a plurality of screws; and each of the plurality of screws extends through the rear housing and through the printed circuit board and engage with the front housing to couple the front housing to the rear housing.
2,400
7,232
7,232
13,944,670
2,424
A video or multimedia distribution system receives multiple video streams and transcodes them into a single stream of UDP packets with each of the plurality of video data packets for respective ones of the video streams being assigned a port number corresponding to the respective video stream. The UDP packets are routed to a plurality of Access Points (APs) for transmission throughout a vehicle, such as an aircraft or ship. A User Equipment (UE) communicates with the APs and selects one or more of the video streams for viewing on the UE by selecting the port number corresponding to the desired video streams. The UE can “change channels” to view other video streams by changing the port number to the port number of the desired video stream.
1. A system for the broadcast of a plurality of video streams to a plurality of mobile communication devices aboard a vehicle, comprising: a receiver configured to receive a plurality of video data streams using a unicast data protocol; a local video processor coupled to the receiver and configured to receive the unicast data streams and to combine the plurality of video streams into a single stream of UDP data packets for transmission with each of the plurality of video data packets for respective ones of the video streams being assigned a port number corresponding to the respective video stream; and at least one wireless access point (AP) communicatively coupled to the video processor to receive the video packets therefrom, the AP being configured to transmit the stream of UDP data packets. 2. The system of claim 1, further comprising a content provider server storing a plurality of data files to be transmitted to the vehicle using the unicast data protocol. 3. The system of claim 1 for use with a communication satellite wherein the receiver is a satellite receiver. 4. The system of claim 1, further comprising a digital video recorder coupled to the video processor and configured to store the received video data streams and to play them out to the video processor upon request. 5. The system of claim 1 wherein the video processor is further configured to generate guide data to provide information about the content of each of the plurality of data streams and data corresponding to the port number for each of the plurality of data streams. 6. The system of claim 5 wherein the guide data is generated as text data. 7. The system of claim 5 wherein the guide data is generated as graphic data. 8. The system of claim 5 wherein the guide data is generated as image data. 9. The system of claim 5 wherein the guide data is generated as a plurality of images wherein each image is indicative of the content of a corresponding one of the plurality of data streams. 10. The system of claim 5 wherein the guide data is generated as a reduced resolution video image derived from a corresponding one of the plurality of data streams. 11. The system of claim 1 the vehicle is an aircraft. 12. The system of claim 1 the vehicle is a ship. 13. The system of claim 12 wherein the at least one wireless access point (AP) comprises a plurality of APs distributed throughout the ship, the system further comprising an infrastructure configured to communicatively couple the video processor and the plurality of APs, the plurality of APs being configured to broadcast the stream of video packets throughout the ship. 14. A system for the broadcast of a plurality of video streams to a plurality of mobile communication devices aboard a vehicle, comprising: means for receiving a plurality of video data streams using a unicast data protocol; processor means for combining the plurality of unicast video streams into a single stream of video data packets for multicast or broadcast transmission with each of the plurality of video data packets for respective ones of the video streams being assigned a port number corresponding to the respective video stream; and transmitter means for receiving the video packets from the processor means and for broadcasting the stream of video packets as video packets. 15. The system of claim 14 for use with a communication satellite wherein the means for receiving is a satellite receiver. 16. The system of claim 14, further comprising means for storing the received video data streams and to play them out upon request. 17. The system of claim 14 wherein the means for processing is further configured to generate guide data to provide information about the content of each of the plurality of data streams and data corresponding to the port number for each of the plurality of data streams. 18. The system of claim 14 wherein transmitter means comprises a plurality of wireless access points (APs) configured to broadcast the stream of video packets throughout the vehicle. 19. A method for the broadcast of a plurality of video streams to a plurality of mobile communication devices aboard a vehicle, comprising: receiving a plurality of video data streams using a unicast data protocol; transcoding and combining the plurality of unicast video streams into a single stream of video data packets for UDP transmission with each of the plurality of video data packets for respective ones of the video streams being assigned a port number corresponding to the respective video stream; and transmitting the stream of video packets. 20. The method of claim 19 for use with a communication satellite wherein receiving the plurality of video data streams uses a satellite receiver. 21. The method of claim 19, further comprising storing the received video data streams and to playing out the stored video data streams upon request. 22. The method of claim 19, further comprising generating guide data to provide information about the content of each of the plurality of data streams and data corresponding to the port number for each of the plurality of data streams. 23. The method of claim 22, further comprising generating guide data as a plurality of data packets, the guide data packets being assigned a port number different from the port numbers associated with the data streams and combined into the single data stream. 24. The method of claim 19 wherein broadcasting the stream of video packets comprises using a plurality of wireless access points (APs) configured to broadcast the stream of video packets throughout the vehicle.
A video or multimedia distribution system receives multiple video streams and transcodes them into a single stream of UDP packets with each of the plurality of video data packets for respective ones of the video streams being assigned a port number corresponding to the respective video stream. The UDP packets are routed to a plurality of Access Points (APs) for transmission throughout a vehicle, such as an aircraft or ship. A User Equipment (UE) communicates with the APs and selects one or more of the video streams for viewing on the UE by selecting the port number corresponding to the desired video streams. The UE can “change channels” to view other video streams by changing the port number to the port number of the desired video stream.1. A system for the broadcast of a plurality of video streams to a plurality of mobile communication devices aboard a vehicle, comprising: a receiver configured to receive a plurality of video data streams using a unicast data protocol; a local video processor coupled to the receiver and configured to receive the unicast data streams and to combine the plurality of video streams into a single stream of UDP data packets for transmission with each of the plurality of video data packets for respective ones of the video streams being assigned a port number corresponding to the respective video stream; and at least one wireless access point (AP) communicatively coupled to the video processor to receive the video packets therefrom, the AP being configured to transmit the stream of UDP data packets. 2. The system of claim 1, further comprising a content provider server storing a plurality of data files to be transmitted to the vehicle using the unicast data protocol. 3. The system of claim 1 for use with a communication satellite wherein the receiver is a satellite receiver. 4. The system of claim 1, further comprising a digital video recorder coupled to the video processor and configured to store the received video data streams and to play them out to the video processor upon request. 5. The system of claim 1 wherein the video processor is further configured to generate guide data to provide information about the content of each of the plurality of data streams and data corresponding to the port number for each of the plurality of data streams. 6. The system of claim 5 wherein the guide data is generated as text data. 7. The system of claim 5 wherein the guide data is generated as graphic data. 8. The system of claim 5 wherein the guide data is generated as image data. 9. The system of claim 5 wherein the guide data is generated as a plurality of images wherein each image is indicative of the content of a corresponding one of the plurality of data streams. 10. The system of claim 5 wherein the guide data is generated as a reduced resolution video image derived from a corresponding one of the plurality of data streams. 11. The system of claim 1 the vehicle is an aircraft. 12. The system of claim 1 the vehicle is a ship. 13. The system of claim 12 wherein the at least one wireless access point (AP) comprises a plurality of APs distributed throughout the ship, the system further comprising an infrastructure configured to communicatively couple the video processor and the plurality of APs, the plurality of APs being configured to broadcast the stream of video packets throughout the ship. 14. A system for the broadcast of a plurality of video streams to a plurality of mobile communication devices aboard a vehicle, comprising: means for receiving a plurality of video data streams using a unicast data protocol; processor means for combining the plurality of unicast video streams into a single stream of video data packets for multicast or broadcast transmission with each of the plurality of video data packets for respective ones of the video streams being assigned a port number corresponding to the respective video stream; and transmitter means for receiving the video packets from the processor means and for broadcasting the stream of video packets as video packets. 15. The system of claim 14 for use with a communication satellite wherein the means for receiving is a satellite receiver. 16. The system of claim 14, further comprising means for storing the received video data streams and to play them out upon request. 17. The system of claim 14 wherein the means for processing is further configured to generate guide data to provide information about the content of each of the plurality of data streams and data corresponding to the port number for each of the plurality of data streams. 18. The system of claim 14 wherein transmitter means comprises a plurality of wireless access points (APs) configured to broadcast the stream of video packets throughout the vehicle. 19. A method for the broadcast of a plurality of video streams to a plurality of mobile communication devices aboard a vehicle, comprising: receiving a plurality of video data streams using a unicast data protocol; transcoding and combining the plurality of unicast video streams into a single stream of video data packets for UDP transmission with each of the plurality of video data packets for respective ones of the video streams being assigned a port number corresponding to the respective video stream; and transmitting the stream of video packets. 20. The method of claim 19 for use with a communication satellite wherein receiving the plurality of video data streams uses a satellite receiver. 21. The method of claim 19, further comprising storing the received video data streams and to playing out the stored video data streams upon request. 22. The method of claim 19, further comprising generating guide data to provide information about the content of each of the plurality of data streams and data corresponding to the port number for each of the plurality of data streams. 23. The method of claim 22, further comprising generating guide data as a plurality of data packets, the guide data packets being assigned a port number different from the port numbers associated with the data streams and combined into the single data stream. 24. The method of claim 19 wherein broadcasting the stream of video packets comprises using a plurality of wireless access points (APs) configured to broadcast the stream of video packets throughout the vehicle.
2,400
7,233
7,233
14,839,227
2,443
Methods and systems may provide for reducing workloads of neighboring virtual machine tenants in a cloud environment with shared storage using pro-active log offloading. Additionally, logging activity may be redirected to reduce input/output resource consumption. Trends in future input/output activities may be determined and preemptive action may be implemented to reduce performance impact of the neighboring tenants.
1. A method to enhance tenant performance in a cloud shared-storage environment, comprising: determining current input/output characteristics of an application enabled on a virtual machine; selecting and offloading logs based on trends found in the input/output characteristics; and aggregating portions of the logs that have been directed to separate file locations. 2. The method of claim 1, wherein the trends include predicting a future workload on a disk system. 3. The method of claim 2, wherein prior log-offloading activity is ranked by the virtual machine. 4. The method of claim 1, wherein a configuration of the disk system is controlled by monitoring the selecting and offloading of the logs. 5. The method of claim 1, wherein aggregating portions of the logs includes pulling the portions of the logs from remote locations and relocating the portions back into original positions in the virtual machine. 6. The method of claim 1, wherein aggregating portions of the logs includes a dynamic re-composition when requested by a user. 7. The method of claim 1, wherein the selecting and offloading of the logs includes, same types of information that are used in the cloud shared-storage environment across multiple logs, logs that are collected only for reports that generate purposes not for immediate consumption and action by other computer system components, and computer system dumps in case of a failure. 8. The method of claim 1, wherein determining the trends in the input/output characteristics further includes using a feedback loop to determine future input/output needs and what logs to offload and relocate.
Methods and systems may provide for reducing workloads of neighboring virtual machine tenants in a cloud environment with shared storage using pro-active log offloading. Additionally, logging activity may be redirected to reduce input/output resource consumption. Trends in future input/output activities may be determined and preemptive action may be implemented to reduce performance impact of the neighboring tenants.1. A method to enhance tenant performance in a cloud shared-storage environment, comprising: determining current input/output characteristics of an application enabled on a virtual machine; selecting and offloading logs based on trends found in the input/output characteristics; and aggregating portions of the logs that have been directed to separate file locations. 2. The method of claim 1, wherein the trends include predicting a future workload on a disk system. 3. The method of claim 2, wherein prior log-offloading activity is ranked by the virtual machine. 4. The method of claim 1, wherein a configuration of the disk system is controlled by monitoring the selecting and offloading of the logs. 5. The method of claim 1, wherein aggregating portions of the logs includes pulling the portions of the logs from remote locations and relocating the portions back into original positions in the virtual machine. 6. The method of claim 1, wherein aggregating portions of the logs includes a dynamic re-composition when requested by a user. 7. The method of claim 1, wherein the selecting and offloading of the logs includes, same types of information that are used in the cloud shared-storage environment across multiple logs, logs that are collected only for reports that generate purposes not for immediate consumption and action by other computer system components, and computer system dumps in case of a failure. 8. The method of claim 1, wherein determining the trends in the input/output characteristics further includes using a feedback loop to determine future input/output needs and what logs to offload and relocate.
2,400
7,234
7,234
12,851,538
2,445
Systems and arrangements are provided for filtering language. As presently preferred, these are configured to filter inappropriate language, symbols, words, etc on web sites or used in chat rooms. Embodiments create one or more arrays of inappropriate character strings representing, for example, obscene words and character combinations. Embodiments identify the inappropriate character strings, for example in chat text, and edit them to an appropriate form, for example with cartoon characters, and/or delete the inappropriate character strings. Preferably, at least one embodiment applies the content filter via executing a program of instructions, stored on a tangible storage medium, to achieve this functionality.
1. A method for content filtering, the method comprising the steps of: receiving an input of characters entered by a user on a client device; standardizing the input of characters into one or more character strings; and comparing the one or more character strings against a blacklist. 2. The method according to claim 1, wherein standardizing the input of characters into one or more character strings includes one or more of: removing one or more white spaces in the input of characters to form the one or more character strings; replacing one or more repeated characters in the input of characters with one or more standardized characters to form the one or more character strings; replacing one or more symbols in the input of characters with one or more letters to form the one or more character strings; and removing one or more punctuation characters in the input of characters to form the one or more character strings. 3. The method according to claim 3, wherein standardizing the input of characters into one or more character strings further includes one or more of: identifying one or more words represented by the one or more character strings; and identifying one or more phrases represented by the one or more character strings. 4. The method according to claim 3, wherein comparing the one or more character strings against a blacklist further comprises comparing one or more of the one or more words and the one or more phrases to the blacklist. 5. The method according to claim 4, further comprising flagging one or more input of characters identified as representing one or more of: one or more words and one or more phrases matching the blacklist. 6. The method according to claim 4, further comprising automatically deleting one or more input of characters identified as representing one or more of: one or more words and one or more phrases matching the blacklist. 7. The method according to claim 4, further comprising delaying posting on a web site one or more input of characters identified as representing one or more of: one or more words and one or more phrases matching the blacklist. 8. The method according to claim 5, further comprising receiving input indicating one or more flagged input of characters matching the blacklist are to be deleted. 9. The method according to claim 8, further comprising deleting the one or more flagged input characters matching the blacklist responsive to said indication. 10. The method according to claim 9, wherein: the input of characters comprises text input of characters communicated from the client device to a web server hosting a chat room; and the standardizing the input of characters into one or more character strings and the comparing the one or more character strings against a blacklist steps are performed by the web server. 11. A computer program product for content filtering comprising: a computer readable storage medium having computer readable program code embodied therewith, the computer readable program code comprising: computer readable program code configured to receive an input of characters entered by a user on a client device; computer readable program code configured to standardize the input of characters into one or more character strings; and computer readable program code configured to compare the one or more character strings against a blacklist. 12. The computer program product according to claim 11, wherein to standardize the input of characters into one or more character strings includes one or more of: removing one or more white spaces in the input of characters to form the one or more character strings; replacing one or more repeated characters in the input of characters with one or more standardized characters to form the one or more character strings; replacing one or more symbols in the input of characters with one or more letters to form the one or more character strings; and removing one or more punctuation characters in the input of characters to form the one or more character strings. 13. The computer program product according to claim 12, wherein to standardize the input of characters into one or more character strings further includes one or more of: identifying one or more words represented by the one or more character strings; and identifying one or more phrases represented by the one or more character strings. 14. The computer program product according to claim 13, wherein to compare the one or more character strings against a blacklist further comprises comparing one or more of the one or more words and the one or more phrases to the blacklist 15. The computer program product according to claim 14, further comprising computer readable program code configured to flag one or more input of characters identified as representing one or more of: one or more words and one or more phrases matching the blacklist. 16. The computer program product according to claim 14, further comprising computer readable program code configured to automatically delete one or more input of characters identified as representing one or more of: one or more words and one or more phrases matching the blacklist. 17. The computer program product according to claim 14, further comprising computer readable program code configured to delay posting on a web site one or more input of characters identified as representing one or more of: one or more words and one or more phrases matching the blacklist. 18. The computer program product according to claim 15, further comprising computer readable program code configured to receive input indicating one or more flagged input of characters matching the blacklist are to be deleted. 19. The computer program product according to claim 18, further comprising computer readable program code configured to delete the one or more flagged input characters matching the blacklist responsive to said indication. 20. A system for content filtering, the system comprising: one or more processors; and a memory operatively connected to the one or more processors; wherein, responsive to execution of computer readable program code accessible to the one or more processors, the one or more processors are configured to: receive an input of characters entered by a user on a client device; standardize the input of characters into one or more character strings; and compare the one or more character strings against a blacklist.
Systems and arrangements are provided for filtering language. As presently preferred, these are configured to filter inappropriate language, symbols, words, etc on web sites or used in chat rooms. Embodiments create one or more arrays of inappropriate character strings representing, for example, obscene words and character combinations. Embodiments identify the inappropriate character strings, for example in chat text, and edit them to an appropriate form, for example with cartoon characters, and/or delete the inappropriate character strings. Preferably, at least one embodiment applies the content filter via executing a program of instructions, stored on a tangible storage medium, to achieve this functionality.1. A method for content filtering, the method comprising the steps of: receiving an input of characters entered by a user on a client device; standardizing the input of characters into one or more character strings; and comparing the one or more character strings against a blacklist. 2. The method according to claim 1, wherein standardizing the input of characters into one or more character strings includes one or more of: removing one or more white spaces in the input of characters to form the one or more character strings; replacing one or more repeated characters in the input of characters with one or more standardized characters to form the one or more character strings; replacing one or more symbols in the input of characters with one or more letters to form the one or more character strings; and removing one or more punctuation characters in the input of characters to form the one or more character strings. 3. The method according to claim 3, wherein standardizing the input of characters into one or more character strings further includes one or more of: identifying one or more words represented by the one or more character strings; and identifying one or more phrases represented by the one or more character strings. 4. The method according to claim 3, wherein comparing the one or more character strings against a blacklist further comprises comparing one or more of the one or more words and the one or more phrases to the blacklist. 5. The method according to claim 4, further comprising flagging one or more input of characters identified as representing one or more of: one or more words and one or more phrases matching the blacklist. 6. The method according to claim 4, further comprising automatically deleting one or more input of characters identified as representing one or more of: one or more words and one or more phrases matching the blacklist. 7. The method according to claim 4, further comprising delaying posting on a web site one or more input of characters identified as representing one or more of: one or more words and one or more phrases matching the blacklist. 8. The method according to claim 5, further comprising receiving input indicating one or more flagged input of characters matching the blacklist are to be deleted. 9. The method according to claim 8, further comprising deleting the one or more flagged input characters matching the blacklist responsive to said indication. 10. The method according to claim 9, wherein: the input of characters comprises text input of characters communicated from the client device to a web server hosting a chat room; and the standardizing the input of characters into one or more character strings and the comparing the one or more character strings against a blacklist steps are performed by the web server. 11. A computer program product for content filtering comprising: a computer readable storage medium having computer readable program code embodied therewith, the computer readable program code comprising: computer readable program code configured to receive an input of characters entered by a user on a client device; computer readable program code configured to standardize the input of characters into one or more character strings; and computer readable program code configured to compare the one or more character strings against a blacklist. 12. The computer program product according to claim 11, wherein to standardize the input of characters into one or more character strings includes one or more of: removing one or more white spaces in the input of characters to form the one or more character strings; replacing one or more repeated characters in the input of characters with one or more standardized characters to form the one or more character strings; replacing one or more symbols in the input of characters with one or more letters to form the one or more character strings; and removing one or more punctuation characters in the input of characters to form the one or more character strings. 13. The computer program product according to claim 12, wherein to standardize the input of characters into one or more character strings further includes one or more of: identifying one or more words represented by the one or more character strings; and identifying one or more phrases represented by the one or more character strings. 14. The computer program product according to claim 13, wherein to compare the one or more character strings against a blacklist further comprises comparing one or more of the one or more words and the one or more phrases to the blacklist 15. The computer program product according to claim 14, further comprising computer readable program code configured to flag one or more input of characters identified as representing one or more of: one or more words and one or more phrases matching the blacklist. 16. The computer program product according to claim 14, further comprising computer readable program code configured to automatically delete one or more input of characters identified as representing one or more of: one or more words and one or more phrases matching the blacklist. 17. The computer program product according to claim 14, further comprising computer readable program code configured to delay posting on a web site one or more input of characters identified as representing one or more of: one or more words and one or more phrases matching the blacklist. 18. The computer program product according to claim 15, further comprising computer readable program code configured to receive input indicating one or more flagged input of characters matching the blacklist are to be deleted. 19. The computer program product according to claim 18, further comprising computer readable program code configured to delete the one or more flagged input characters matching the blacklist responsive to said indication. 20. A system for content filtering, the system comprising: one or more processors; and a memory operatively connected to the one or more processors; wherein, responsive to execution of computer readable program code accessible to the one or more processors, the one or more processors are configured to: receive an input of characters entered by a user on a client device; standardize the input of characters into one or more character strings; and compare the one or more character strings against a blacklist.
2,400
7,235
7,235
14,562,457
2,443
Methods and systems may provide for reducing workloads of neighboring virtual machine tenants in a cloud environment with shared storage using pro-active log offloading. Additionally, logging activity may be redirected to reduce input/output resource consumption. Trends in future input/output activities may be determined and preemptive action may be implemented to reduce performance impact of the neighboring tenants.
1. A computer program product comprising a cloud shared-storage medium and a computer usable code stored on the cloud shared-storage medium, where if executed by a processor, the computer usable code causes a computer to: determine current input/output characteristics of an application enabled on a virtual machine; predict a future workload on a disk system using the input/output characteristics; rank prior log-offloading activity on the disk system using the current input/output characteristics; select and offload logs based on trends found in the input/output characteristics; monitor the select and offload activity of the logs to control a configuration of the disk system; aggregate portions of the logs that have been directed to separate file locations; and pull the portions of the logs from remote locations and relocate the portions back into original positions in the virtual machine. 2. The computer program product of claim 1, wherein the computer usable code, if executed, causes the computer to aggregate portions of the logs as a dynamic re-composition when requested by a user. 3. The computer program product of claim 1, wherein the computer usable code, if executed, causes the computer to select and offload the logs with same types of information that are used in the cloud shared-storage environment across multiple logs, logs that are collected only for reports that generate purposes not for immediate consumption and action by other computer system components, and computer system dumps in case of a failure. 4. The computer program product of claim 1, wherein the computer usable code, if executed, causes the computer to use a feedback loop to determine future input/output needs and what logs to offload and relocate. 5-12. (canceled) 13. A computer program product, comprising: a cloud shared-storage medium; and computer usable code stored on the cloud shared-storage medium, where if executed by a processor, the computer usable code causes a computer to: determine current input/output characteristics of an application enabled on a virtual machine; select and offload logs based on trends found in the input/output characteristics; and aggregate portions of the logs that have been directed to separate file locations. 14. The computer program product of claim 13, wherein the computer usable code, if executed, causes the computer to predict a future workload on a disk system. 15. The computer program product of claim 14, wherein the computer usable code, if executed, causes the computer to rank prior log-offloading activity. 16. The computer program product of claim 13, wherein the computer usable code, if executed, causes the computer to monitor the selecting and offloading of the logs to control a configuration of the disk system. 17. The computer program product of claim 13, wherein the computer usable code, if executed, causes the computer to pull the portions of the logs from remote locations and relocate the portions back into original positions in the virtual machine. 18. The computer program product of claim 13, wherein the computer usable code, if executed, causes the computer to aggregate portions of the logs as a dynamic re-composition when requested by a user. 19. The computer program product of claim 13, wherein the computer usable code, if executed, causes the computer to select and offload the logs with same types of information that are used in the cloud shared-storage environment across multiple logs, logs that are collected only for reports that generate purposes not for immediate consumption and action by other computer system components, and computer system dumps in case of a failure. 20. The computer program product of claim 13, wherein the computer usable code, if executed, causes the computer to use a feedback loop to determine future input/output needs and what logs to offload and relocate.
Methods and systems may provide for reducing workloads of neighboring virtual machine tenants in a cloud environment with shared storage using pro-active log offloading. Additionally, logging activity may be redirected to reduce input/output resource consumption. Trends in future input/output activities may be determined and preemptive action may be implemented to reduce performance impact of the neighboring tenants.1. A computer program product comprising a cloud shared-storage medium and a computer usable code stored on the cloud shared-storage medium, where if executed by a processor, the computer usable code causes a computer to: determine current input/output characteristics of an application enabled on a virtual machine; predict a future workload on a disk system using the input/output characteristics; rank prior log-offloading activity on the disk system using the current input/output characteristics; select and offload logs based on trends found in the input/output characteristics; monitor the select and offload activity of the logs to control a configuration of the disk system; aggregate portions of the logs that have been directed to separate file locations; and pull the portions of the logs from remote locations and relocate the portions back into original positions in the virtual machine. 2. The computer program product of claim 1, wherein the computer usable code, if executed, causes the computer to aggregate portions of the logs as a dynamic re-composition when requested by a user. 3. The computer program product of claim 1, wherein the computer usable code, if executed, causes the computer to select and offload the logs with same types of information that are used in the cloud shared-storage environment across multiple logs, logs that are collected only for reports that generate purposes not for immediate consumption and action by other computer system components, and computer system dumps in case of a failure. 4. The computer program product of claim 1, wherein the computer usable code, if executed, causes the computer to use a feedback loop to determine future input/output needs and what logs to offload and relocate. 5-12. (canceled) 13. A computer program product, comprising: a cloud shared-storage medium; and computer usable code stored on the cloud shared-storage medium, where if executed by a processor, the computer usable code causes a computer to: determine current input/output characteristics of an application enabled on a virtual machine; select and offload logs based on trends found in the input/output characteristics; and aggregate portions of the logs that have been directed to separate file locations. 14. The computer program product of claim 13, wherein the computer usable code, if executed, causes the computer to predict a future workload on a disk system. 15. The computer program product of claim 14, wherein the computer usable code, if executed, causes the computer to rank prior log-offloading activity. 16. The computer program product of claim 13, wherein the computer usable code, if executed, causes the computer to monitor the selecting and offloading of the logs to control a configuration of the disk system. 17. The computer program product of claim 13, wherein the computer usable code, if executed, causes the computer to pull the portions of the logs from remote locations and relocate the portions back into original positions in the virtual machine. 18. The computer program product of claim 13, wherein the computer usable code, if executed, causes the computer to aggregate portions of the logs as a dynamic re-composition when requested by a user. 19. The computer program product of claim 13, wherein the computer usable code, if executed, causes the computer to select and offload the logs with same types of information that are used in the cloud shared-storage environment across multiple logs, logs that are collected only for reports that generate purposes not for immediate consumption and action by other computer system components, and computer system dumps in case of a failure. 20. The computer program product of claim 13, wherein the computer usable code, if executed, causes the computer to use a feedback loop to determine future input/output needs and what logs to offload and relocate.
2,400
7,236
7,236
14,723,838
2,457
Disclosed are various embodiments for a remotely-hosted auto-discovery service. An auto-discovery request received from a client device over a network can be accessed to identify a domain associated with the auto-discovery request. A digital certificate corresponding to the domain can be identified and a configuration file can be generated for a web server application that creates at least one virtual host for a uniform resource locator (URL) identified in the auto-discovery request. The digital certificate can be bound to the at least one virtual host to operate a secure connection with the client device. An enrollment response can be generated for communication to the client device over the network.
1. A non-transitory computer-readable medium embodying a program executable in at least one computing device comprising at least one hardware processor, the program, when executed by the at least one computing device, being configured to cause the at least one computing device to: access an auto-discovery request received from a client device over a network to identify a domain associated with the auto-discovery request; identify a digital certificate from a data store corresponding to the domain; access a configuration file for a web server application that creates at least one virtual host for a uniform resource locator (URL) identified in the auto-discovery request, the digital certificate being bound to the at least one virtual host to operate a secure connection with the client device; and generate an enrollment response for communication to the client device over the network. 2. The non-transitory computer-readable medium of claim 1, wherein the program, when executed by the at least one computing device, is further configured to cause the at least one computing device to access an upload of the digital certificate to validate the digital certificate for the domain prior to storage in the data store. 3. The non-transitory computer-readable medium of claim 1, wherein the domain associated with the auto-discovery request is identified based at least in part on an e-mail address associated with the client device. 4. The non-transitory computer-readable medium of claim 1, wherein the enrollment response comprises at least one enrollment URL and a group identifier. 5. The non-transitory computer-readable medium of claim 1, wherein the auto-discovery request is received from the client device based at least in part on a domain name system (DNS) record that points to an internet protocol (IP) address of the at least one computing device. 6. The non-transitory computer-readable medium of claim 5, wherein the program, when executed by the at least one computing device, is further configured to cause the at least one computing device to verify that the DNS record points to the IP address of the at least one computing device. 7. The non-transitory computer-readable medium of claim 1, wherein the web server application employs the configuration file to create the at least one virtual host without a restart of the at least one computing device. 8. A computer-implemented method, comprising: accessing an auto-discovery request received from a client device over a network to identify a domain associated with the auto-discovery request; identifying a digital certificate from a data store corresponding to the domain; accessing a configuration file for a web server application that creates at least one virtual host for a uniform resource locator (URL) identified in the auto-discovery request, the digital certificate being bound to the at least one virtual host to operate a secure connection with the client device; and generating an enrollment response for communication to the client device over the network. 9. The computer-implemented method of claim 8, further comprising accessing an upload of the digital certificate to validate the digital certificate for the domain prior to storage in the data store. 10. The computer-implemented method of claim 8, wherein the domain associated with the auto-discovery request is identified based at least in part on an e-mail address associated with the client device. 11. The computer-implemented method of claim 8, wherein the enrollment response comprises at least one enrollment URL and a group identifier. 12. The computer-implemented method of claim 8, wherein the auto-discovery request is received from the client device based at least in part on a domain name system (DNS) record that points to an internet protocol (IP) address of a remote auto-discovery service. 13. The computer-implemented method of claim 12, further comprising verifying that the DNS record points to the IP address of the at least one computing device. 14. The computer-implemented method of claim 8, wherein the web server application employs the configuration file to create the at least one virtual host without a restart of the web server application. 15. A system, comprising: at least one computing device in data communication with a client device over a network; and program code that, when executed by the at least one computing device, causes the at least one computing device to: access an auto-discovery request received from the client device over the network to identify a domain associated with the auto-discovery request; identify a digital certificate from a data store corresponding to the domain; access a configuration file for a web server application that creates at least one virtual host for a uniform resource locator (URL) identified in the auto-discovery request, the digital certificate being bound to the at least one virtual host to operate a secure connection with the client device; and generate an enrollment response for communication to the client device over the network. 16. The system of claim 15, further comprising program code that, when executed by the at least one computing device, causes the at least one computing device to access an upload of the digital certificate to validate the digital certificate for the domain prior to storage in the data store. 17. The system of claim 15, wherein the domain associated with the auto-discovery request is identified based at least in part on an e-mail address associated with the client device. 18. The system of claim 15, wherein the enrollment response comprises at least one enrollment URL and a group identifier. 19. The system of claim 15, wherein the auto-discovery request is received from the client device based at least in part on a domain name system (DNS) record that points to an internet protocol (IP) address of a remote auto-discovery service. 20. The system of claim 19, further comprising program code that, when executed by the at least one computing device, causes the at least one computing device to verify that the DNS record points to the IP address of the at least one computing device.
Disclosed are various embodiments for a remotely-hosted auto-discovery service. An auto-discovery request received from a client device over a network can be accessed to identify a domain associated with the auto-discovery request. A digital certificate corresponding to the domain can be identified and a configuration file can be generated for a web server application that creates at least one virtual host for a uniform resource locator (URL) identified in the auto-discovery request. The digital certificate can be bound to the at least one virtual host to operate a secure connection with the client device. An enrollment response can be generated for communication to the client device over the network.1. A non-transitory computer-readable medium embodying a program executable in at least one computing device comprising at least one hardware processor, the program, when executed by the at least one computing device, being configured to cause the at least one computing device to: access an auto-discovery request received from a client device over a network to identify a domain associated with the auto-discovery request; identify a digital certificate from a data store corresponding to the domain; access a configuration file for a web server application that creates at least one virtual host for a uniform resource locator (URL) identified in the auto-discovery request, the digital certificate being bound to the at least one virtual host to operate a secure connection with the client device; and generate an enrollment response for communication to the client device over the network. 2. The non-transitory computer-readable medium of claim 1, wherein the program, when executed by the at least one computing device, is further configured to cause the at least one computing device to access an upload of the digital certificate to validate the digital certificate for the domain prior to storage in the data store. 3. The non-transitory computer-readable medium of claim 1, wherein the domain associated with the auto-discovery request is identified based at least in part on an e-mail address associated with the client device. 4. The non-transitory computer-readable medium of claim 1, wherein the enrollment response comprises at least one enrollment URL and a group identifier. 5. The non-transitory computer-readable medium of claim 1, wherein the auto-discovery request is received from the client device based at least in part on a domain name system (DNS) record that points to an internet protocol (IP) address of the at least one computing device. 6. The non-transitory computer-readable medium of claim 5, wherein the program, when executed by the at least one computing device, is further configured to cause the at least one computing device to verify that the DNS record points to the IP address of the at least one computing device. 7. The non-transitory computer-readable medium of claim 1, wherein the web server application employs the configuration file to create the at least one virtual host without a restart of the at least one computing device. 8. A computer-implemented method, comprising: accessing an auto-discovery request received from a client device over a network to identify a domain associated with the auto-discovery request; identifying a digital certificate from a data store corresponding to the domain; accessing a configuration file for a web server application that creates at least one virtual host for a uniform resource locator (URL) identified in the auto-discovery request, the digital certificate being bound to the at least one virtual host to operate a secure connection with the client device; and generating an enrollment response for communication to the client device over the network. 9. The computer-implemented method of claim 8, further comprising accessing an upload of the digital certificate to validate the digital certificate for the domain prior to storage in the data store. 10. The computer-implemented method of claim 8, wherein the domain associated with the auto-discovery request is identified based at least in part on an e-mail address associated with the client device. 11. The computer-implemented method of claim 8, wherein the enrollment response comprises at least one enrollment URL and a group identifier. 12. The computer-implemented method of claim 8, wherein the auto-discovery request is received from the client device based at least in part on a domain name system (DNS) record that points to an internet protocol (IP) address of a remote auto-discovery service. 13. The computer-implemented method of claim 12, further comprising verifying that the DNS record points to the IP address of the at least one computing device. 14. The computer-implemented method of claim 8, wherein the web server application employs the configuration file to create the at least one virtual host without a restart of the web server application. 15. A system, comprising: at least one computing device in data communication with a client device over a network; and program code that, when executed by the at least one computing device, causes the at least one computing device to: access an auto-discovery request received from the client device over the network to identify a domain associated with the auto-discovery request; identify a digital certificate from a data store corresponding to the domain; access a configuration file for a web server application that creates at least one virtual host for a uniform resource locator (URL) identified in the auto-discovery request, the digital certificate being bound to the at least one virtual host to operate a secure connection with the client device; and generate an enrollment response for communication to the client device over the network. 16. The system of claim 15, further comprising program code that, when executed by the at least one computing device, causes the at least one computing device to access an upload of the digital certificate to validate the digital certificate for the domain prior to storage in the data store. 17. The system of claim 15, wherein the domain associated with the auto-discovery request is identified based at least in part on an e-mail address associated with the client device. 18. The system of claim 15, wherein the enrollment response comprises at least one enrollment URL and a group identifier. 19. The system of claim 15, wherein the auto-discovery request is received from the client device based at least in part on a domain name system (DNS) record that points to an internet protocol (IP) address of a remote auto-discovery service. 20. The system of claim 19, further comprising program code that, when executed by the at least one computing device, causes the at least one computing device to verify that the DNS record points to the IP address of the at least one computing device.
2,400
7,237
7,237
14,571,050
2,495
A process is provided for providing network content to a client computing device by one or more content providers in conjunction with a network computing provider. The client computing device requests a network resource from the network computing provider. The network computing provider processes the network resource request to identify embedded resources associated with the network resource, and determines whether any version of the network resource or associated embedded resources are available in a cache or data store associated with the network computing provider. The network computing provider provides the determined available content to the client computing device for storage or initial processing, and requests the most recent version of the network resource from a content provider. The network computing provider may obtain any additional content from the content provider or a content delivery network provider.
1. A computer-implemented method comprising: under control of a server system configured to act as an intermediary between client computing devices and content providers, executing a server-side browser application in communication with a separate client-side browser application executing remotely from the server system; receiving, from the client-side browser application, a request for a network resource, wherein the network resource comprises a markup file referencing one or more referenced resources separate from the markup file; and in response to receiving the request for the network resource, providing, by the server-side browser application, a first referenced resource of the one or more referenced resources to the client-side browser application without receiving a request from the client-side browser application for the first referenced resource. 2. The computer-implemented method of claim 1 further comprising: identifying the first referenced resource based at least partly on the request for the network resource; and subsequent to identifying the first referenced resource, retrieving the first referenced resource, without receiving a request from the client-side browser application for the first referenced resource, from one of a network-accessible content provider or a local cache of the server system. 3. The computer implemented method of claim 1 further comprising receiving the first referenced resource from a content delivery network server responsive to a request for the first referenced resource provided to the content delivery network server by a content provider associated with the network resource. 4. The computer-implemented method of claim 1 further comprising identifying the first referenced resource of the one or more referenced resources prior to obtaining the markup file from a network-accessible content provider. 5. A system comprising one or more server computing devices, the system configured to at least: receive, by a server-side browser application, a request for a network resource from a client computing device, wherein the network resource is associated with one or more embedded resources, and wherein the request for the network does not comprise a request for at least a first embedded resource of the one or more embedded resources; and in response to the request for the network resource, proactively provide the first embedded resource to the client computing device. 6. The system of claim 5, wherein the network resource comprises a base resource referencing the one or more embedded resources. 7. The system of claim 6 further configured to identify the first embedded resource of the one or more embedded resources prior to obtaining the base resource from a content provider. 8. The system of claim 5 further configured to process at least a portion of the first embedded resource using the server-side browser application prior to proactively providing the first embedded resource to the client computing device. 9. The system of claim 5 further configured to at least identify the first embedded resource based at least partly on one or more prior requests for the network resource, the one or more prior requests received prior to the request for the network resource. 10. The system of claim 5 further configured to at least retrieve the first embedded resource from a network-accessible content provider without receiving a request from the client computing device for the first embedded resource. 11. The system of claim 5 further configured to at least retrieve the first embedded resource from a cache local to a server computing device of the one or more server computing devices without receiving a request from the client computing device for the first embedded resource. 12. The system of claim 5 further configured to receive the first embedded resource from a content delivery network server responsive to a request provided to the content delivery network server by a content provider associated with the network resource. 13. The system of claim 5 further configured to at least provide one or more embedded resource availability identifiers to the content provider, the one or more embedded resource availability identifiers identifying an availability of at least one of the one or more embedded resources at a cache local to a server computing device of the one or more server computing devices. 14. The system of claim 13, wherein the first embedded resource is excluded from the request provided to the content delivery network server based at least partly on the one or more embedded resource availability identifiers. 15. The system of claim 13, wherein the one or more embedded resource availability identifiers include information associated with a version of the first embedded resource. 16. Non-transitory computer-readable storage having stored thereon an executable module, the executable module comprising: a client-side browser application configured to cause a client computing device to at least: transmit, to a browser application executing remotely from the client computing device, a request for a network resource, wherein the network resource is associated with one or more embedded resources; and in response to the request for the network resource, receive a first embedded resource of the one or more embedded resources without transmitting a request for the first embedded resource to the browser application executing remotely from the client computing device. 17. The non-transitory computer readable storage of claim 16, wherein the network resource comprises a base resource referencing the one or more embedded resources. 18. The non-transitory computer readable storage of claim 17, wherein the client-side browser application is configured to cause the client computing device to receive, responsive to the request for the network resource, the first embedded resource prior to receiving the base resource. 19. The non-transitory computer readable storage of claim 16, wherein the first embedded resource received by the client computing device comprises a version of the first embedded resource processed by the browser application executing remotely from the client computing device. 20. The non-transitory computer readable storage of claim 16, wherein the browser application executing remotely from the client computing device comprises a server-side browser application.
A process is provided for providing network content to a client computing device by one or more content providers in conjunction with a network computing provider. The client computing device requests a network resource from the network computing provider. The network computing provider processes the network resource request to identify embedded resources associated with the network resource, and determines whether any version of the network resource or associated embedded resources are available in a cache or data store associated with the network computing provider. The network computing provider provides the determined available content to the client computing device for storage or initial processing, and requests the most recent version of the network resource from a content provider. The network computing provider may obtain any additional content from the content provider or a content delivery network provider.1. A computer-implemented method comprising: under control of a server system configured to act as an intermediary between client computing devices and content providers, executing a server-side browser application in communication with a separate client-side browser application executing remotely from the server system; receiving, from the client-side browser application, a request for a network resource, wherein the network resource comprises a markup file referencing one or more referenced resources separate from the markup file; and in response to receiving the request for the network resource, providing, by the server-side browser application, a first referenced resource of the one or more referenced resources to the client-side browser application without receiving a request from the client-side browser application for the first referenced resource. 2. The computer-implemented method of claim 1 further comprising: identifying the first referenced resource based at least partly on the request for the network resource; and subsequent to identifying the first referenced resource, retrieving the first referenced resource, without receiving a request from the client-side browser application for the first referenced resource, from one of a network-accessible content provider or a local cache of the server system. 3. The computer implemented method of claim 1 further comprising receiving the first referenced resource from a content delivery network server responsive to a request for the first referenced resource provided to the content delivery network server by a content provider associated with the network resource. 4. The computer-implemented method of claim 1 further comprising identifying the first referenced resource of the one or more referenced resources prior to obtaining the markup file from a network-accessible content provider. 5. A system comprising one or more server computing devices, the system configured to at least: receive, by a server-side browser application, a request for a network resource from a client computing device, wherein the network resource is associated with one or more embedded resources, and wherein the request for the network does not comprise a request for at least a first embedded resource of the one or more embedded resources; and in response to the request for the network resource, proactively provide the first embedded resource to the client computing device. 6. The system of claim 5, wherein the network resource comprises a base resource referencing the one or more embedded resources. 7. The system of claim 6 further configured to identify the first embedded resource of the one or more embedded resources prior to obtaining the base resource from a content provider. 8. The system of claim 5 further configured to process at least a portion of the first embedded resource using the server-side browser application prior to proactively providing the first embedded resource to the client computing device. 9. The system of claim 5 further configured to at least identify the first embedded resource based at least partly on one or more prior requests for the network resource, the one or more prior requests received prior to the request for the network resource. 10. The system of claim 5 further configured to at least retrieve the first embedded resource from a network-accessible content provider without receiving a request from the client computing device for the first embedded resource. 11. The system of claim 5 further configured to at least retrieve the first embedded resource from a cache local to a server computing device of the one or more server computing devices without receiving a request from the client computing device for the first embedded resource. 12. The system of claim 5 further configured to receive the first embedded resource from a content delivery network server responsive to a request provided to the content delivery network server by a content provider associated with the network resource. 13. The system of claim 5 further configured to at least provide one or more embedded resource availability identifiers to the content provider, the one or more embedded resource availability identifiers identifying an availability of at least one of the one or more embedded resources at a cache local to a server computing device of the one or more server computing devices. 14. The system of claim 13, wherein the first embedded resource is excluded from the request provided to the content delivery network server based at least partly on the one or more embedded resource availability identifiers. 15. The system of claim 13, wherein the one or more embedded resource availability identifiers include information associated with a version of the first embedded resource. 16. Non-transitory computer-readable storage having stored thereon an executable module, the executable module comprising: a client-side browser application configured to cause a client computing device to at least: transmit, to a browser application executing remotely from the client computing device, a request for a network resource, wherein the network resource is associated with one or more embedded resources; and in response to the request for the network resource, receive a first embedded resource of the one or more embedded resources without transmitting a request for the first embedded resource to the browser application executing remotely from the client computing device. 17. The non-transitory computer readable storage of claim 16, wherein the network resource comprises a base resource referencing the one or more embedded resources. 18. The non-transitory computer readable storage of claim 17, wherein the client-side browser application is configured to cause the client computing device to receive, responsive to the request for the network resource, the first embedded resource prior to receiving the base resource. 19. The non-transitory computer readable storage of claim 16, wherein the first embedded resource received by the client computing device comprises a version of the first embedded resource processed by the browser application executing remotely from the client computing device. 20. The non-transitory computer readable storage of claim 16, wherein the browser application executing remotely from the client computing device comprises a server-side browser application.
2,400
7,238
7,238
14,792,220
2,421
In one embodiment, a method includes sending videos to users that use a video delivery service. The videos include shows that have episodes released sequentially. The method records historical records of video views for the video based on the sending of the videos to the users. For a show, a show-specific model is determined to predict future video views by performing: determining historical records of video views for different episodes of the show; training the show-specific model with the historical records, wherein the show-specific model models a decay curve with a regularizing term to regularize a decay speed; using the show-specific model to predict future video views for a future time range for episodes of the show; and outputting the future video views to an ad system configured to sell ads for the show.
1. A method comprising: sending, by a computing device, videos to users that use a video delivery service, wherein the videos include shows that have episodes released sequentially; recording, by the computing device, historical records of video views for the video based on the sending of the videos to the users; for a show, determining, by the computing device, a show-specific model to predict future video views by performing: determining, by the computing device, historical records of video views for different episodes of the show; training, by the computing device, the show-specific model with the historical records, wherein the show-specific model models a decay curve with a regularizing term to regularize a decay speed; using, by the computing device, the show-specific model to predict future video views for a future time range for episodes of the show; and outputting, by the computing device, the future video views to an ad system configured to sell ads for the show. 2. The method of claim 1, wherein the show-specific model comprises a log linear model for the decay curve with the regularizing term. 3. The method of claim 1, wherein the regularizing term follows a normal distribution. 4. The method of claim 3, wherein the normal distribution is substantially near −1 with a variance of σ. 5. The method of claim 1, further comprising: generating a seasonal first day views model that models first day views for different episodes in a season for the show. 6. The method of claim 5, wherein the seasonal first day views model changes the first day views based on different factors for the show over time. 7. The method of claim 5, wherein using the show-specific model to predict future video views comprises: using the first day views model to determine future video views for an unreleased episode. 8. The method of claim 1, further comprising: generating a seasonal week release and weekday model that models weekly releases of episodes of the shows and weekday releases of episodes. 9. The method of claim 8, wherein using the seasonal week release and weekday model to predict future video views comprises: using the seasonal week release and weekday model to determine future video views for an unreleased episode in a week and on a day of the week determined by the seasonal week release and weekday model. 10. The method of claim 8, wherein using the seasonal week release and weekday model to predict future video views comprises: estimating a hiatus for the show in which episodes for the show are not released. 11. The method of claim 1, further comprising: reviewing the historical records to determine any points that are considered outliers by a threshold; and removing the outlier points from the historical records. 12. The method of claim 1, further comprising: adding a slow growing term to the show-specific model. 13. The method of claim 1, wherein generating the show-specific model comprises: analyzing the historical records of a latest N number of episodes for the show to determine the show-specific model. 14. The method of claim 1, wherein generating the show-specific model comprises: aggregating the historical records of other movie shows into a virtual movie show to determine the show-specific model. 15. The method of claim 1, wherein the show-specific model is a long-form show-specific model, the method further comprising: determining a short-form show specific model for a shorter form of the video than that used for the long-form show-specific model; and using the long-form show-specific model and the short-form show-specific model to estimate the video views for the shorter form of the video. 16. A non-transitory computer-readable storage medium containing instructions, that when executed, control a computer system to be configured for: sending videos to users that use a video delivery service, wherein the videos include shows that have episodes released sequentially; recording historical records of video views for the video based on the sending of the videos to the users; for a show, determining a show-specific model to predict future video views by performing: determining historical records of video views for different episodes of the show; training the show-specific model with the historical records, wherein the show-specific model models a decay curve with a regularizing term to regularize a decay speed; using the show-specific model to predict future video views for a future time range for episodes of the show; and outputting the future video views to an ad system configured to sell ads for the show. 17. The non-transitory computer-readable storage medium of claim 16, wherein the show-specific model comprises a log linear model for the decay curve with the regularizing term. 18. The non-transitory computer-readable storage medium of claim 16, further comprising: adding a slow growing term to the show-specific model. 19. The non-transitory computer-readable storage medium of claim 16, wherein the regularizing term follows a normal distribution substantially near −1 with a variance of σ. 20. An apparatus comprising: one or more computer processors; and a non-transitory computer-readable storage medium comprising instructions, that when executed, control the one or more computer processors to be configured for: sending videos to users that use a video delivery service, wherein the videos include shows that have episodes released sequentially; recording historical records of video views for the video based on the sending of the videos to the users; for a show, determining a show-specific model to predict future video views by performing: determining historical records of video views for different episodes of the show; training the show-specific model with the historical records, wherein the show-specific model models a decay curve with a regularizing term to regularize a decay speed; using the show-specific model to predict future video views for a future time range for episodes of the show; and outputting the future video views to an ad system configured to sell ads for the show.
In one embodiment, a method includes sending videos to users that use a video delivery service. The videos include shows that have episodes released sequentially. The method records historical records of video views for the video based on the sending of the videos to the users. For a show, a show-specific model is determined to predict future video views by performing: determining historical records of video views for different episodes of the show; training the show-specific model with the historical records, wherein the show-specific model models a decay curve with a regularizing term to regularize a decay speed; using the show-specific model to predict future video views for a future time range for episodes of the show; and outputting the future video views to an ad system configured to sell ads for the show.1. A method comprising: sending, by a computing device, videos to users that use a video delivery service, wherein the videos include shows that have episodes released sequentially; recording, by the computing device, historical records of video views for the video based on the sending of the videos to the users; for a show, determining, by the computing device, a show-specific model to predict future video views by performing: determining, by the computing device, historical records of video views for different episodes of the show; training, by the computing device, the show-specific model with the historical records, wherein the show-specific model models a decay curve with a regularizing term to regularize a decay speed; using, by the computing device, the show-specific model to predict future video views for a future time range for episodes of the show; and outputting, by the computing device, the future video views to an ad system configured to sell ads for the show. 2. The method of claim 1, wherein the show-specific model comprises a log linear model for the decay curve with the regularizing term. 3. The method of claim 1, wherein the regularizing term follows a normal distribution. 4. The method of claim 3, wherein the normal distribution is substantially near −1 with a variance of σ. 5. The method of claim 1, further comprising: generating a seasonal first day views model that models first day views for different episodes in a season for the show. 6. The method of claim 5, wherein the seasonal first day views model changes the first day views based on different factors for the show over time. 7. The method of claim 5, wherein using the show-specific model to predict future video views comprises: using the first day views model to determine future video views for an unreleased episode. 8. The method of claim 1, further comprising: generating a seasonal week release and weekday model that models weekly releases of episodes of the shows and weekday releases of episodes. 9. The method of claim 8, wherein using the seasonal week release and weekday model to predict future video views comprises: using the seasonal week release and weekday model to determine future video views for an unreleased episode in a week and on a day of the week determined by the seasonal week release and weekday model. 10. The method of claim 8, wherein using the seasonal week release and weekday model to predict future video views comprises: estimating a hiatus for the show in which episodes for the show are not released. 11. The method of claim 1, further comprising: reviewing the historical records to determine any points that are considered outliers by a threshold; and removing the outlier points from the historical records. 12. The method of claim 1, further comprising: adding a slow growing term to the show-specific model. 13. The method of claim 1, wherein generating the show-specific model comprises: analyzing the historical records of a latest N number of episodes for the show to determine the show-specific model. 14. The method of claim 1, wherein generating the show-specific model comprises: aggregating the historical records of other movie shows into a virtual movie show to determine the show-specific model. 15. The method of claim 1, wherein the show-specific model is a long-form show-specific model, the method further comprising: determining a short-form show specific model for a shorter form of the video than that used for the long-form show-specific model; and using the long-form show-specific model and the short-form show-specific model to estimate the video views for the shorter form of the video. 16. A non-transitory computer-readable storage medium containing instructions, that when executed, control a computer system to be configured for: sending videos to users that use a video delivery service, wherein the videos include shows that have episodes released sequentially; recording historical records of video views for the video based on the sending of the videos to the users; for a show, determining a show-specific model to predict future video views by performing: determining historical records of video views for different episodes of the show; training the show-specific model with the historical records, wherein the show-specific model models a decay curve with a regularizing term to regularize a decay speed; using the show-specific model to predict future video views for a future time range for episodes of the show; and outputting the future video views to an ad system configured to sell ads for the show. 17. The non-transitory computer-readable storage medium of claim 16, wherein the show-specific model comprises a log linear model for the decay curve with the regularizing term. 18. The non-transitory computer-readable storage medium of claim 16, further comprising: adding a slow growing term to the show-specific model. 19. The non-transitory computer-readable storage medium of claim 16, wherein the regularizing term follows a normal distribution substantially near −1 with a variance of σ. 20. An apparatus comprising: one or more computer processors; and a non-transitory computer-readable storage medium comprising instructions, that when executed, control the one or more computer processors to be configured for: sending videos to users that use a video delivery service, wherein the videos include shows that have episodes released sequentially; recording historical records of video views for the video based on the sending of the videos to the users; for a show, determining a show-specific model to predict future video views by performing: determining historical records of video views for different episodes of the show; training the show-specific model with the historical records, wherein the show-specific model models a decay curve with a regularizing term to regularize a decay speed; using the show-specific model to predict future video views for a future time range for episodes of the show; and outputting the future video views to an ad system configured to sell ads for the show.
2,400
7,239
7,239
13,379,437
2,413
The invention proposes a method of encoding data packet by encoding type information and size information of said data packet into the same field. The invention also proposes a method of processing data packets received. The data packet comprises a header part and a message part. The header part comprises at least one bit for indicating the type of said data packet, said method comprising a step ( 101 ) of obtaining the size information of said data packet based on said at least one bit.
1. A method of processing data packet comprising a header part and a message part, said header part comprising at least one bit for indicating the type of said data packet, said method comprising: obtaining (101) the size information of said data packet, based on said at least one bit. 2. A method as claimed in claim 1, said method further comprising: identifying (102) said message part from said data packet according to the obtained size information. 3. A method as claimed in claim 2, wherein said data packet further comprises a checksum part indicating a first value; said method further comprising: calculating (103) a second value according to said identified message part; determining (104) whether said data packet is correct by comparing said second value with said first value. 4. A method as claimed in claim 3, wherein the calculating calculates the second value according to an exclusive-or algorithm. 5. A method as claimed in claim 3, wherein, if said determining determines that said data packet is incorrect; said method further comprises: discarding (105) said data packet. 6. A method as claimed in claim 1, wherein said data packet is associated with an unknown packet type according to said at least one bit. 7. A method as claimed in claim 3, wherein said data packet is received by a transmitter from a receiver and is associated with an unknown packet type according to said at least one bit, said transmitter transmitting power to said receiver inductively; said receiver sending said data packet by modulating the power drawn from said transmitter; wherein if said determining determines that the data packet is incorrect; said method further comprises: aborting (106) the transmission of power to the receiver. 8. A first device (300) for processing data packet comprising a header part and a message part, said header part comprising at least one bit for indicating the type of said data packet, said first device comprising: a first unit (301) for obtaining the size information of said data packet based on said at least one bit. 9. A first device as claimed in claim 8, said first device further comprising: a second unit (302) for identifying said message part from said data packet according to the obtained size information. 10. A first device as claimed in claim 9, wherein said data packet further comprises a checksum part indicating a first value; said first device further comprising: a third unit (303) for calculating a second value according to said identified message part; a fourth unit (304) for determining whether said data packet is correct or not by comparing said second value with said first value. 11. A first device as claimed in claim 9, said first device further comprising: a fifth unit (305) for discarding said data packet if the fourth unit determines that the data packet is incorrect. 12. A first device as claimed in claim 11, wherein said data packet is sent from a receiver and associated with an unknown packet type according to said at least one bit, and wherein said first device corresponds to a transmitter, said transmitter transmitting power to said receiver inductively; said receiver sending said data packet by modulating the power drawn from said transmitter; said first device further comprising: a sixth unit (306) for aborting the transmission of power if the fourth unit determines that the data packet is incorrect. 13. (canceled) 14. (canceled) 15. (canceled)
The invention proposes a method of encoding data packet by encoding type information and size information of said data packet into the same field. The invention also proposes a method of processing data packets received. The data packet comprises a header part and a message part. The header part comprises at least one bit for indicating the type of said data packet, said method comprising a step ( 101 ) of obtaining the size information of said data packet based on said at least one bit.1. A method of processing data packet comprising a header part and a message part, said header part comprising at least one bit for indicating the type of said data packet, said method comprising: obtaining (101) the size information of said data packet, based on said at least one bit. 2. A method as claimed in claim 1, said method further comprising: identifying (102) said message part from said data packet according to the obtained size information. 3. A method as claimed in claim 2, wherein said data packet further comprises a checksum part indicating a first value; said method further comprising: calculating (103) a second value according to said identified message part; determining (104) whether said data packet is correct by comparing said second value with said first value. 4. A method as claimed in claim 3, wherein the calculating calculates the second value according to an exclusive-or algorithm. 5. A method as claimed in claim 3, wherein, if said determining determines that said data packet is incorrect; said method further comprises: discarding (105) said data packet. 6. A method as claimed in claim 1, wherein said data packet is associated with an unknown packet type according to said at least one bit. 7. A method as claimed in claim 3, wherein said data packet is received by a transmitter from a receiver and is associated with an unknown packet type according to said at least one bit, said transmitter transmitting power to said receiver inductively; said receiver sending said data packet by modulating the power drawn from said transmitter; wherein if said determining determines that the data packet is incorrect; said method further comprises: aborting (106) the transmission of power to the receiver. 8. A first device (300) for processing data packet comprising a header part and a message part, said header part comprising at least one bit for indicating the type of said data packet, said first device comprising: a first unit (301) for obtaining the size information of said data packet based on said at least one bit. 9. A first device as claimed in claim 8, said first device further comprising: a second unit (302) for identifying said message part from said data packet according to the obtained size information. 10. A first device as claimed in claim 9, wherein said data packet further comprises a checksum part indicating a first value; said first device further comprising: a third unit (303) for calculating a second value according to said identified message part; a fourth unit (304) for determining whether said data packet is correct or not by comparing said second value with said first value. 11. A first device as claimed in claim 9, said first device further comprising: a fifth unit (305) for discarding said data packet if the fourth unit determines that the data packet is incorrect. 12. A first device as claimed in claim 11, wherein said data packet is sent from a receiver and associated with an unknown packet type according to said at least one bit, and wherein said first device corresponds to a transmitter, said transmitter transmitting power to said receiver inductively; said receiver sending said data packet by modulating the power drawn from said transmitter; said first device further comprising: a sixth unit (306) for aborting the transmission of power if the fourth unit determines that the data packet is incorrect. 13. (canceled) 14. (canceled) 15. (canceled)
2,400
7,240
7,240
15,385,397
2,416
A network ( 100 ) includes multiple gateways ( 135, 140 ) and a router ( 105 ) connected to at least one of the multiple gateways ( 135, 140 ). The router ( 105 ) is configured to receive packets that include multiple first virtual circuit identifiers associated with the multiple gateways in the network ( 100 ), assign second virtual circuit identifiers to the at least one connected gateway, and initiate transmission of a message to the at least one connected gateway informing the gateway of the first virtual circuit identifiers.
1. A packet-based network comprising: a first gateway node communicatively coupled between a first routing node and a first local area network (LAN); a second gateway node communicatively coupled between a second routing node and a second LAN; and at least one virtual circuit established between the first gateway node and the second gateway node operable to communicate Internet Protocol (IP) traffic between the first LAN and the second LAN, wherein the virtual circuit is identified in memory of the first gateway node using information received from the first routing node, the information comprising a virtual circuit identifier associated with the second gateway node, wherein the at least one virtual circuit is identified in memory of the second gateway node using information received from the second routing node, the information comprising a virtual circuit identifier associated with the first gateway node, wherein each of the first and second routing nodes and the first and second gateway nodes each include a gateway forwarding table for storing the virtual circuit identifiers associated with each of the gateway nodes. 2. The network as recited in claim 1, wherein the first routing node and the second routing node are operable to transmit one or more messages therebetween, the message to ultimately inform their respective connected gateway nodes of the virtual circuit identifiers associated with the other gateway node. 3. The network as recited in claim 1, wherein the first routing node updates at least one virtual circuit table stored at the first routing node using both of the virtual circuit identifier associated with the first gateway node and the virtual circuit identifier associated with the second gateway node. 4. The network as recited in claim 1, wherein the second routing node updates at least one virtual circuit table stored at the second routing node using both of the virtual circuit identifier associated with the first gateway node and the virtual circuit identifier associated with the second gateway node. 5. A method comprising: receiving a packet at a node; inspecting a header of the packet for an input virtual channel identifier (VCIin); determining an output port number (PNout) by referencing a virtual channel table stored on the node with the VCIin, the PNout referencing a port on the node; determining an output virtual channel identifier (VCIout) by referencing the virtual channel table with the VCIin; replacing the VCIin in the header of the packet with the determined VCIout; forwarding the packet to at least one of another node utilizing the VCIout and sent via the determined PNout; and updating the virtual channel table at the node with one or more changes to the virtual channels associated with the one or more gateways; wherein the virtual channel table includes a list of VCIout identifiers that reference one or more virtual channels associated with one or more gateways communicably connected to the node, and wherein the one or more gateways each include at least one virtual channel table for storing virtual channel entries associated with virtual channels utilized for incoming packets from one or more routers. 6. The method as recited in claim 5, wherein the node and the at least one of another node each comprise at least one of a router, switch, or gateway. 7. The method as recited in claim 5, further comprising the node initiating transmission of a packet to one or more neighboring routers, the packet informing the neighboring routers of the virtual channels associated with the one or more gateways. 8. The method as recited in claim 5, wherein the one or more gateways each include at least one gateway forwarding table to store virtual channel identifiers associated with the one or more other gateways. 9. The method as recited in claim 5, wherein the node includes at least one gateway forwarding table to store virtual channel identifiers associated with each of the one or more gateways. 10. A node comprising: a virtual channel table to store one or more input virtual channel identifier (VCIin) entries, one or more router output port (PNout) entries, and one or more output virtual channel identifier (VCIout) entries, wherein the one or more VCIout entries reference one or more virtual channels associated with one or more gateways communicably connected to the node; and a network interface operable to: receive a packet; inspect a header of the packet for a VCIin entry; determine a PNout entry by referencing the virtual channel table with the VCIin; determine a VCIout entry by referencing the virtual channel table with the VCIin; replace the VCIin in the header of the packet with the determined VCIout; and forward the packet to at least one of another node utilizing the VCIout and sent via the determined PNout, wherein the one or more gateways each include at least one gateway forwarding table to store virtual channel identifiers associated with the one or more other gateways, and wherein the one or more gateways each include at least one virtual channel table for storing virtual channel entries associated with virtual channels utilized for incoming packets from one or more router/switches. 13. The node as recited in claim 12, wherein the node and the at least one of another node each comprise at least one of a router, switch, or gateway. 14. The node as recited in claim 12, wherein the network interface is further operable to initiate transmission of a packet to one or more neighboring router/switches, the packet informing the neighboring router/switches of the virtual channels associated with the one or more gateways.
A network ( 100 ) includes multiple gateways ( 135, 140 ) and a router ( 105 ) connected to at least one of the multiple gateways ( 135, 140 ). The router ( 105 ) is configured to receive packets that include multiple first virtual circuit identifiers associated with the multiple gateways in the network ( 100 ), assign second virtual circuit identifiers to the at least one connected gateway, and initiate transmission of a message to the at least one connected gateway informing the gateway of the first virtual circuit identifiers.1. A packet-based network comprising: a first gateway node communicatively coupled between a first routing node and a first local area network (LAN); a second gateway node communicatively coupled between a second routing node and a second LAN; and at least one virtual circuit established between the first gateway node and the second gateway node operable to communicate Internet Protocol (IP) traffic between the first LAN and the second LAN, wherein the virtual circuit is identified in memory of the first gateway node using information received from the first routing node, the information comprising a virtual circuit identifier associated with the second gateway node, wherein the at least one virtual circuit is identified in memory of the second gateway node using information received from the second routing node, the information comprising a virtual circuit identifier associated with the first gateway node, wherein each of the first and second routing nodes and the first and second gateway nodes each include a gateway forwarding table for storing the virtual circuit identifiers associated with each of the gateway nodes. 2. The network as recited in claim 1, wherein the first routing node and the second routing node are operable to transmit one or more messages therebetween, the message to ultimately inform their respective connected gateway nodes of the virtual circuit identifiers associated with the other gateway node. 3. The network as recited in claim 1, wherein the first routing node updates at least one virtual circuit table stored at the first routing node using both of the virtual circuit identifier associated with the first gateway node and the virtual circuit identifier associated with the second gateway node. 4. The network as recited in claim 1, wherein the second routing node updates at least one virtual circuit table stored at the second routing node using both of the virtual circuit identifier associated with the first gateway node and the virtual circuit identifier associated with the second gateway node. 5. A method comprising: receiving a packet at a node; inspecting a header of the packet for an input virtual channel identifier (VCIin); determining an output port number (PNout) by referencing a virtual channel table stored on the node with the VCIin, the PNout referencing a port on the node; determining an output virtual channel identifier (VCIout) by referencing the virtual channel table with the VCIin; replacing the VCIin in the header of the packet with the determined VCIout; forwarding the packet to at least one of another node utilizing the VCIout and sent via the determined PNout; and updating the virtual channel table at the node with one or more changes to the virtual channels associated with the one or more gateways; wherein the virtual channel table includes a list of VCIout identifiers that reference one or more virtual channels associated with one or more gateways communicably connected to the node, and wherein the one or more gateways each include at least one virtual channel table for storing virtual channel entries associated with virtual channels utilized for incoming packets from one or more routers. 6. The method as recited in claim 5, wherein the node and the at least one of another node each comprise at least one of a router, switch, or gateway. 7. The method as recited in claim 5, further comprising the node initiating transmission of a packet to one or more neighboring routers, the packet informing the neighboring routers of the virtual channels associated with the one or more gateways. 8. The method as recited in claim 5, wherein the one or more gateways each include at least one gateway forwarding table to store virtual channel identifiers associated with the one or more other gateways. 9. The method as recited in claim 5, wherein the node includes at least one gateway forwarding table to store virtual channel identifiers associated with each of the one or more gateways. 10. A node comprising: a virtual channel table to store one or more input virtual channel identifier (VCIin) entries, one or more router output port (PNout) entries, and one or more output virtual channel identifier (VCIout) entries, wherein the one or more VCIout entries reference one or more virtual channels associated with one or more gateways communicably connected to the node; and a network interface operable to: receive a packet; inspect a header of the packet for a VCIin entry; determine a PNout entry by referencing the virtual channel table with the VCIin; determine a VCIout entry by referencing the virtual channel table with the VCIin; replace the VCIin in the header of the packet with the determined VCIout; and forward the packet to at least one of another node utilizing the VCIout and sent via the determined PNout, wherein the one or more gateways each include at least one gateway forwarding table to store virtual channel identifiers associated with the one or more other gateways, and wherein the one or more gateways each include at least one virtual channel table for storing virtual channel entries associated with virtual channels utilized for incoming packets from one or more router/switches. 13. The node as recited in claim 12, wherein the node and the at least one of another node each comprise at least one of a router, switch, or gateway. 14. The node as recited in claim 12, wherein the network interface is further operable to initiate transmission of a packet to one or more neighboring router/switches, the packet informing the neighboring router/switches of the virtual channels associated with the one or more gateways.
2,400
7,241
7,241
12,966,597
2,454
Within a social network, a user may establish a set of contacts who share with the user various content items and comments related thereto. However, these content items are often hosted by a content source outside of the social network, and the user may have to transition to the content source to view the content item, and then transition back to the social network to submit a comment. Instead, a device may monitor the social network to record shared content items. When the user requests a presentation of the content source, notifications of the content items hosted by the content source that have been shared with the user, including an identifier of the contact sharing the content item with the user (e.g., a depiction or avatar representation of the contact and a link to a social profile of the contact) may be included in the presentation.
1. A system configured to notify a user of content items hosted by a content source shared with the user by a contact within a social network, the system comprising: a content item receiving component configured to receive from a social network a content item hosted by a content source and shared with a user by a contact, store a notification of the content item; and a content source presenting component configured to, upon receiving from the user a request for a presentation of a content source: generate a presentation of the content source including at least one notification of a shared content items hosted by the content source and identifying the contact sharing the content item with the user; and present the presentation of the content source to the user. 2. The system of claim 1, the content source presenting component configured to: select at least one selected shared content item from the content items hosted by the content source and shared with the user by a contact within a social network, and generate the presentation of the content source including at least one notification of at least one selected shared content item. 3. The system of claim 1, the content source presenting component configured to select selected shared content items from the shared content items using at least one selectivity criterion selected from a selectivity criteria set comprising: a relevance selectivity criterion associated with a relevance of the shared content item to a content item hosted by the content source and viewed by the user; a social network selectivity criterion associated with the social network within which the content item was shared with the user; a content item type selectivity criterion associated with a content item type of the content item; and a contact selectivity criterion associated with the contact sharing the contact item with the user. 4. The system of claim 1: respective contacts associated with a contact depiction; and the content source presenting component configured to identify, within the notification of a content item, the contact sharing the content item with the user using a contact depiction of the contact. 5. The system of claim 1: at least one content item shared with the user by a first contact and a second contact; and the content source presenting component configured to generate a presentation of the content source aggregating notifications of the content item shared by the first contact and the second contact. 6. The system of claim 1, the content source presenting component configured to sort the notifications of content items according to the contact sharing the content item with the user. 7. The system of claim 6: at least one contact having a first social profile within a first social network and a second social profile within a second social network; and the content source presenting component configured to, while sorting the notifications of content items according to the contact sharing the content item with the user, group the content items shared by the first social profile and the second social profile. 8. The system of claim 1, the content source presenting component configured to: receive from a user at least one selected contact whose content items are to be included in the presentation of notifications, and generate the presentation of the content source including notifications of shared content items hosted by the content source and shared by the at least one selected contact. 9. The system of claim 1, the content source presenting component configured to include in the notifications content items shared by the user within the social network. 10. The system of claim 1, the content source presenting component configured to exclude from the notifications content items shared by the user within the social network. 11. The system of claim 1, the content source presenting component configured to generate a presentation of the content source including with the notification a content item representation of the content item. 12. The system of claim 1, the content source presenting component configured to: upon generating a first presentation of the content source, store a latest presentation time of the content source; and upon receiving a request to generate a second presentation of the content source: retrieve the latest presentation time of the content source, and generate a presentation of the content source comprising notifications of content items that have been shared with the user after the latest presentation time of the content source. 13. The system of claim 1, comprising: a content item updating component configured to, upon receiving from a social network a shared content item hosted by a content source while presenting the content source to the user, supplement the presentation of the content source with a notification of the shared content item. 14. The system of claim 1: respective contacts associated with at least one social profile; and the content source presenting component configured to generate a presentation of the content source including at least one reference to a social profile of the contact sharing the content item with the user. 15. The system of claim 1, the content source presenting component configured to, upon receiving a request to identify content items hosted by the content source and shared by a contact: identify the shared content items hosted by the content source, and present the shared content items to the user. 16. The system of claim 1, comprising: a contact messaging component configured to, upon receiving from the user a request to send a message to a contact identified in a notification of the presentation, send the message to a social network for delivery to the contact. 17. The system of claim 1, comprising: a contact chat initiating component configured to, upon receiving from the user a request to initiate a chat with a contact identified in a notification of the presentation, initiate a chat with the contact. 18. The system of claim 17: the notifications presented within a notification region of the presentation; and the contact chat initiating component configured to initiate the chat with the contact within the notification region of the presentation. 19. A method of presenting to a user content items shared with the user within a social network, respective content items hosted by a content source, the method utilizing a device having a processor and comprising: executing on the processor instructions configured to: retrieve from the social network the content items shared with the user; and upon receiving from the user a request for a presentation of a content source: retrieve the content items hosted by the content source that have been shared with the user within the social network; retrieve a contact identifier of the contact within the social network; and send the content items to the user for inclusion as notifications in the presentation of the content source. 20. A computer-readable storage medium comprising instructions that, when executed on a processor of a device, implement components of a system configured to notify a user of content items hosted by a content source shared with the user by a contact within a social network, respective contacts associated with a contact depiction, and at least one contact having a first social profile within a first social network and a second social profile within a second social network, the system comprising: a content item receiving component configured to receive from a social network a content item hosted by a content source and shared with a user by a contact, store a notification of the content item; and a content source presenting component configured to, upon receiving from the user a request for a presentation of a content source: retrieve a latest presentation time of the content source; generate a presentation of the content source including, within a notification region of the presentation, at least one notification of a content items hosted by the content source and shared with the user by a contact after the latest presentation time of the content source, respective notifications identifying the contact sharing the content item with the user by using a contact depiction of the contact and including a content item representation of the content item and a reference to a social profile of the contact within a social network; sort the notifications of content items according to the contact sharing the content item with the user, the sorting comprising, for contact having a first social profile within the first social network and a second social profile within a second social network, grouping the content items shared by the first social profile and the second social profile; present the presentation of the content source to the user; store a latest presentation time of the content source; upon receiving a request to identify content items hosted by the content source and shared by a contact: identify the shared content items hosted by the content source, and present the shared content items to the user; and upon receiving from a social network a shared content item hosted by a content source while presenting the content source to the user, supplement the presentation of the content source with a notification of the shared content item; a contact messaging component configured to, upon receiving from the user a request to send a message to a contact identified in a notification of the presentation, send the message to a social network for delivery to the contact; and a contact chat initiating component configured to, upon receiving from the user a request to initiate a chat with a contact identified in a notification of the presentation, initiate within the notification region of the presentation a chat with the contact.
Within a social network, a user may establish a set of contacts who share with the user various content items and comments related thereto. However, these content items are often hosted by a content source outside of the social network, and the user may have to transition to the content source to view the content item, and then transition back to the social network to submit a comment. Instead, a device may monitor the social network to record shared content items. When the user requests a presentation of the content source, notifications of the content items hosted by the content source that have been shared with the user, including an identifier of the contact sharing the content item with the user (e.g., a depiction or avatar representation of the contact and a link to a social profile of the contact) may be included in the presentation.1. A system configured to notify a user of content items hosted by a content source shared with the user by a contact within a social network, the system comprising: a content item receiving component configured to receive from a social network a content item hosted by a content source and shared with a user by a contact, store a notification of the content item; and a content source presenting component configured to, upon receiving from the user a request for a presentation of a content source: generate a presentation of the content source including at least one notification of a shared content items hosted by the content source and identifying the contact sharing the content item with the user; and present the presentation of the content source to the user. 2. The system of claim 1, the content source presenting component configured to: select at least one selected shared content item from the content items hosted by the content source and shared with the user by a contact within a social network, and generate the presentation of the content source including at least one notification of at least one selected shared content item. 3. The system of claim 1, the content source presenting component configured to select selected shared content items from the shared content items using at least one selectivity criterion selected from a selectivity criteria set comprising: a relevance selectivity criterion associated with a relevance of the shared content item to a content item hosted by the content source and viewed by the user; a social network selectivity criterion associated with the social network within which the content item was shared with the user; a content item type selectivity criterion associated with a content item type of the content item; and a contact selectivity criterion associated with the contact sharing the contact item with the user. 4. The system of claim 1: respective contacts associated with a contact depiction; and the content source presenting component configured to identify, within the notification of a content item, the contact sharing the content item with the user using a contact depiction of the contact. 5. The system of claim 1: at least one content item shared with the user by a first contact and a second contact; and the content source presenting component configured to generate a presentation of the content source aggregating notifications of the content item shared by the first contact and the second contact. 6. The system of claim 1, the content source presenting component configured to sort the notifications of content items according to the contact sharing the content item with the user. 7. The system of claim 6: at least one contact having a first social profile within a first social network and a second social profile within a second social network; and the content source presenting component configured to, while sorting the notifications of content items according to the contact sharing the content item with the user, group the content items shared by the first social profile and the second social profile. 8. The system of claim 1, the content source presenting component configured to: receive from a user at least one selected contact whose content items are to be included in the presentation of notifications, and generate the presentation of the content source including notifications of shared content items hosted by the content source and shared by the at least one selected contact. 9. The system of claim 1, the content source presenting component configured to include in the notifications content items shared by the user within the social network. 10. The system of claim 1, the content source presenting component configured to exclude from the notifications content items shared by the user within the social network. 11. The system of claim 1, the content source presenting component configured to generate a presentation of the content source including with the notification a content item representation of the content item. 12. The system of claim 1, the content source presenting component configured to: upon generating a first presentation of the content source, store a latest presentation time of the content source; and upon receiving a request to generate a second presentation of the content source: retrieve the latest presentation time of the content source, and generate a presentation of the content source comprising notifications of content items that have been shared with the user after the latest presentation time of the content source. 13. The system of claim 1, comprising: a content item updating component configured to, upon receiving from a social network a shared content item hosted by a content source while presenting the content source to the user, supplement the presentation of the content source with a notification of the shared content item. 14. The system of claim 1: respective contacts associated with at least one social profile; and the content source presenting component configured to generate a presentation of the content source including at least one reference to a social profile of the contact sharing the content item with the user. 15. The system of claim 1, the content source presenting component configured to, upon receiving a request to identify content items hosted by the content source and shared by a contact: identify the shared content items hosted by the content source, and present the shared content items to the user. 16. The system of claim 1, comprising: a contact messaging component configured to, upon receiving from the user a request to send a message to a contact identified in a notification of the presentation, send the message to a social network for delivery to the contact. 17. The system of claim 1, comprising: a contact chat initiating component configured to, upon receiving from the user a request to initiate a chat with a contact identified in a notification of the presentation, initiate a chat with the contact. 18. The system of claim 17: the notifications presented within a notification region of the presentation; and the contact chat initiating component configured to initiate the chat with the contact within the notification region of the presentation. 19. A method of presenting to a user content items shared with the user within a social network, respective content items hosted by a content source, the method utilizing a device having a processor and comprising: executing on the processor instructions configured to: retrieve from the social network the content items shared with the user; and upon receiving from the user a request for a presentation of a content source: retrieve the content items hosted by the content source that have been shared with the user within the social network; retrieve a contact identifier of the contact within the social network; and send the content items to the user for inclusion as notifications in the presentation of the content source. 20. A computer-readable storage medium comprising instructions that, when executed on a processor of a device, implement components of a system configured to notify a user of content items hosted by a content source shared with the user by a contact within a social network, respective contacts associated with a contact depiction, and at least one contact having a first social profile within a first social network and a second social profile within a second social network, the system comprising: a content item receiving component configured to receive from a social network a content item hosted by a content source and shared with a user by a contact, store a notification of the content item; and a content source presenting component configured to, upon receiving from the user a request for a presentation of a content source: retrieve a latest presentation time of the content source; generate a presentation of the content source including, within a notification region of the presentation, at least one notification of a content items hosted by the content source and shared with the user by a contact after the latest presentation time of the content source, respective notifications identifying the contact sharing the content item with the user by using a contact depiction of the contact and including a content item representation of the content item and a reference to a social profile of the contact within a social network; sort the notifications of content items according to the contact sharing the content item with the user, the sorting comprising, for contact having a first social profile within the first social network and a second social profile within a second social network, grouping the content items shared by the first social profile and the second social profile; present the presentation of the content source to the user; store a latest presentation time of the content source; upon receiving a request to identify content items hosted by the content source and shared by a contact: identify the shared content items hosted by the content source, and present the shared content items to the user; and upon receiving from a social network a shared content item hosted by a content source while presenting the content source to the user, supplement the presentation of the content source with a notification of the shared content item; a contact messaging component configured to, upon receiving from the user a request to send a message to a contact identified in a notification of the presentation, send the message to a social network for delivery to the contact; and a contact chat initiating component configured to, upon receiving from the user a request to initiate a chat with a contact identified in a notification of the presentation, initiate within the notification region of the presentation a chat with the contact.
2,400
7,242
7,242
14,896,957
2,478
A method of coordinating a communication network comprising a self-coordination network coordinator is provided, wherein the method comprises receiving dynamic context information at the self-coordination network coordinator and performing a coordination of at least one self-organising network function instance based on the received dynamic context information.
1. A method of coordinating a communication network comprising a self-coordination network coordinator, the method comprising: receiving dynamic context information at the self-coordination network coordinator; performing a coordination of at least one self-organizing network function instance based on the received dynamic context information. 2. The method according to claim 1, wherein the dynamic context information is received from a dynamic context database. 3. The method according to claim 2, further comprising updating dynamic context information in the dynamic context database. 4. The method according to claim 3, wherein the updating of the dynamic context information includes updating information relating to impact time of the at least one self-organizing network function; impact area of the at least one self-organizing network function; and/or coordination logic relating to the at least one self-organizing network function. 5. The method according to claim 1, wherein the coordinating of the at least one self-organising network function include the blocking and/or discarding of a request of the at least one self-organizing network function. 6. The method according to claim 2, further comprising: sending current fault data, and/or current performance data, and/or current configuration data to the dynamic context information database. 7. The method according to claim 1, wherein the dynamic context information include tracking information. 8. The method according to claim 1, wherein the dynamic context information relates to current impact area and/or current impact time and/or current coordination logic. 9. A self-coordination network coordinator comprising a receiving unit adapted to receive dynamic context information; and a processing unit adapted to perform a coordination of at least one self-organising network function instance based on the received dynamic context information. 10. The self-coordination network coordinator according to claim 9, wherein the self-coordination network coordinator comprises a dynamic context database adapted to store the dynamic context information. 11. A program element, which, when being executed by a processor, is adapted to control or carry out a method according to claim 1. 12. A computer-readable medium, in which a computer program is stored which, when being executed by a processor, is adapted to control or carry out a method according to claim 1.
A method of coordinating a communication network comprising a self-coordination network coordinator is provided, wherein the method comprises receiving dynamic context information at the self-coordination network coordinator and performing a coordination of at least one self-organising network function instance based on the received dynamic context information.1. A method of coordinating a communication network comprising a self-coordination network coordinator, the method comprising: receiving dynamic context information at the self-coordination network coordinator; performing a coordination of at least one self-organizing network function instance based on the received dynamic context information. 2. The method according to claim 1, wherein the dynamic context information is received from a dynamic context database. 3. The method according to claim 2, further comprising updating dynamic context information in the dynamic context database. 4. The method according to claim 3, wherein the updating of the dynamic context information includes updating information relating to impact time of the at least one self-organizing network function; impact area of the at least one self-organizing network function; and/or coordination logic relating to the at least one self-organizing network function. 5. The method according to claim 1, wherein the coordinating of the at least one self-organising network function include the blocking and/or discarding of a request of the at least one self-organizing network function. 6. The method according to claim 2, further comprising: sending current fault data, and/or current performance data, and/or current configuration data to the dynamic context information database. 7. The method according to claim 1, wherein the dynamic context information include tracking information. 8. The method according to claim 1, wherein the dynamic context information relates to current impact area and/or current impact time and/or current coordination logic. 9. A self-coordination network coordinator comprising a receiving unit adapted to receive dynamic context information; and a processing unit adapted to perform a coordination of at least one self-organising network function instance based on the received dynamic context information. 10. The self-coordination network coordinator according to claim 9, wherein the self-coordination network coordinator comprises a dynamic context database adapted to store the dynamic context information. 11. A program element, which, when being executed by a processor, is adapted to control or carry out a method according to claim 1. 12. A computer-readable medium, in which a computer program is stored which, when being executed by a processor, is adapted to control or carry out a method according to claim 1.
2,400
7,243
7,243
15,293,763
2,462
A method in a relay station includes communicating with a base station, determining if a control signal is included in a subframe, and decoding data in the subframe if the control signal is included in the subframe. The control signal includes a parameter which is related to a quantity of resource blocks.
1. A method in a relay station, the method comprising: communicating with a base station; determining if a control signal is included in a subframe; and decoding data in the subframe if the control signal is included in the subframe, wherein the control signal includes a parameter which is related to a quantity of resource blocks. 2. The method according to the claim 1, wherein the control signal is related to a relay Physical Downlink Control Channel (PDCCH). 3. The method according to the claim 1, wherein the data is related to a Physical Downlink Shared Channel (PDSCH). 4. A relay station, comprising: a transceiver configured to communicate with a base station; and a processor configured to determine if a control signal is included in a subframe, wherein the processor is further configured to decode data in the subframe if the control signal is included in the subframe, and wherein the control signal includes a parameter which is related to a quantity of resource blocks.
A method in a relay station includes communicating with a base station, determining if a control signal is included in a subframe, and decoding data in the subframe if the control signal is included in the subframe. The control signal includes a parameter which is related to a quantity of resource blocks.1. A method in a relay station, the method comprising: communicating with a base station; determining if a control signal is included in a subframe; and decoding data in the subframe if the control signal is included in the subframe, wherein the control signal includes a parameter which is related to a quantity of resource blocks. 2. The method according to the claim 1, wherein the control signal is related to a relay Physical Downlink Control Channel (PDCCH). 3. The method according to the claim 1, wherein the data is related to a Physical Downlink Shared Channel (PDSCH). 4. A relay station, comprising: a transceiver configured to communicate with a base station; and a processor configured to determine if a control signal is included in a subframe, wherein the processor is further configured to decode data in the subframe if the control signal is included in the subframe, and wherein the control signal includes a parameter which is related to a quantity of resource blocks.
2,400
7,244
7,244
14,527,680
2,436
There is provided a method of operating a security token, said security token comprising a secure element and a microcontroller unit being coupled to said secure element, wherein: the secure element receives an authentication command from a host device while the microcontroller unit is in a first sleep state; the secure element decodes the authentication command, sends a corresponding authentication request to the microcontroller unit and subsequently enters into a second sleep state; the microcontroller unit wakes up upon receiving the authentication request and subsequently determines an amount of available power; the microcontroller unit processes the authentication request only if the amount of available power exceeds a threshold. Furthermore, a corresponding computer program product and a corresponding security token are provided.
1. A method of operating a security token, said security token comprising a secure element and a microcontroller unit being coupled to said secure element, wherein: the secure element receives an authentication command from a host device while the microcontroller unit is in a first sleep state; the secure element decodes the authentication command, sends a corresponding authentication request to the microcontroller unit and subsequently enters into a second sleep state; the microcontroller unit wakes up upon receiving the authentication request and subsequently determines an amount of available power; and the microcontroller unit processes the authentication request only if the amount of available power exceeds a threshold. 2. A method as claimed in claim 1, wherein the microcontroller unit processes the authentication request by controlling a user interface for capturing user credentials. 3. A method as claimed in claim 2, wherein, when the microcontroller unit has captured the user credentials through said user interface, the microcontroller unit sends said user credentials to the secure element and subsequently returns to the first sleep state. 4. A method as claimed in claim 3, wherein the secure element wakes up upon receiving the user credentials and verifies said user credentials in order to generate an authentication result. 5. A method as claimed in claim 4, wherein the secure element, after having generated the authentication result, sends the authentication result to the host device and subsequently returns to the second sleep state. 6. A method as claimed in claim 1, wherein the microcontroller unit determines the amount of available power by measuring the voltage present on an antenna of said security token. 7. A method as claimed in claim 1, wherein the microcontroller unit, when the amount of available power does not exceed the threshold, further monitors said amount of available power and processes the authentication request if the amount of available power changes such that it exceeds the threshold. 8. A method as claimed in claim 1, wherein the secure element is in a third sleep state prior to receiving the authentication command, and wherein the secure element wakes up upon receiving said authentication command. 9. A method as claimed in claim 1, wherein the microcontroller unit is in a reset state prior to being in the first sleep state. 10. A method as claimed in claim 1, wherein the threshold is predetermined. 11. A computer program product comprising program elements which, when being executed by a secure element or a microcontroller unit, carry out or control steps of a method as claimed in claim 1. 12. A security token comprising a secure element and a microcontroller unit being coupled to said secure element, wherein: the secure element is arranged to receive an authentication command from a host device while the microcontroller unit is in a first sleep state; the secure element is arranged to decode the authentication command, to send a corresponding authentication request to the microcontroller unit and to subsequently enter into a second sleep state; the microcontroller unit is arranged to wake up upon receiving the authentication request and to subsequently determine an amount of available power; and the microcontroller unit is arranged to process the authentication request only if the amount of available power exceeds a threshold. 13. A security token as claimed in claim 12, said security token being a smart card.
There is provided a method of operating a security token, said security token comprising a secure element and a microcontroller unit being coupled to said secure element, wherein: the secure element receives an authentication command from a host device while the microcontroller unit is in a first sleep state; the secure element decodes the authentication command, sends a corresponding authentication request to the microcontroller unit and subsequently enters into a second sleep state; the microcontroller unit wakes up upon receiving the authentication request and subsequently determines an amount of available power; the microcontroller unit processes the authentication request only if the amount of available power exceeds a threshold. Furthermore, a corresponding computer program product and a corresponding security token are provided.1. A method of operating a security token, said security token comprising a secure element and a microcontroller unit being coupled to said secure element, wherein: the secure element receives an authentication command from a host device while the microcontroller unit is in a first sleep state; the secure element decodes the authentication command, sends a corresponding authentication request to the microcontroller unit and subsequently enters into a second sleep state; the microcontroller unit wakes up upon receiving the authentication request and subsequently determines an amount of available power; and the microcontroller unit processes the authentication request only if the amount of available power exceeds a threshold. 2. A method as claimed in claim 1, wherein the microcontroller unit processes the authentication request by controlling a user interface for capturing user credentials. 3. A method as claimed in claim 2, wherein, when the microcontroller unit has captured the user credentials through said user interface, the microcontroller unit sends said user credentials to the secure element and subsequently returns to the first sleep state. 4. A method as claimed in claim 3, wherein the secure element wakes up upon receiving the user credentials and verifies said user credentials in order to generate an authentication result. 5. A method as claimed in claim 4, wherein the secure element, after having generated the authentication result, sends the authentication result to the host device and subsequently returns to the second sleep state. 6. A method as claimed in claim 1, wherein the microcontroller unit determines the amount of available power by measuring the voltage present on an antenna of said security token. 7. A method as claimed in claim 1, wherein the microcontroller unit, when the amount of available power does not exceed the threshold, further monitors said amount of available power and processes the authentication request if the amount of available power changes such that it exceeds the threshold. 8. A method as claimed in claim 1, wherein the secure element is in a third sleep state prior to receiving the authentication command, and wherein the secure element wakes up upon receiving said authentication command. 9. A method as claimed in claim 1, wherein the microcontroller unit is in a reset state prior to being in the first sleep state. 10. A method as claimed in claim 1, wherein the threshold is predetermined. 11. A computer program product comprising program elements which, when being executed by a secure element or a microcontroller unit, carry out or control steps of a method as claimed in claim 1. 12. A security token comprising a secure element and a microcontroller unit being coupled to said secure element, wherein: the secure element is arranged to receive an authentication command from a host device while the microcontroller unit is in a first sleep state; the secure element is arranged to decode the authentication command, to send a corresponding authentication request to the microcontroller unit and to subsequently enter into a second sleep state; the microcontroller unit is arranged to wake up upon receiving the authentication request and to subsequently determine an amount of available power; and the microcontroller unit is arranged to process the authentication request only if the amount of available power exceeds a threshold. 13. A security token as claimed in claim 12, said security token being a smart card.
2,400
7,245
7,245
15,233,069
2,486
An image decoding method includes: restoring a selected prediction mode used in prediction at a time of coding; and decoding a current block included in coded image data to generate a decoded block, according to the prediction based on the selected prediction mode. The restoring includes: determining a first estimated prediction mode; determining a second estimated prediction mode different from the first estimated prediction mode; and restoring the selected prediction mode based on the mode information, the first estimated prediction mode, and the second estimated prediction mode.
1-5. (canceled) 6. An decoding method for decoding an image on a block-by-block basis, the decoding method comprising: decoding mode information that specifies one selected prediction mode, the one selected prediction mode being selected from among a plurality of prediction modes including a plurality of direction prediction modes and two predetermined prediction modes different from the plurality of direction prediction modes, the two predetermined prediction modes including a DC prediction mode; and decoding a current block to be decoded included in the image by predicting the current block using the selected one prediction mode, wherein the decoding mode information further includes: determining whether or not one of the two predetermined prediction mode is selected as the one selected prediction mode; and determining one of the plurality of prediction modes other than the two predetermined prediction modes as the one selected prediction mode when both of the two predetermined prediction mode are not selected as the selected one prediction mode. 7. An decoding apparatus for decoding an image on a block-by-block basis, the decoding apparatus comprising: a mode information decoding unit configured to decode mode information that specifies one selected prediction mode, the one selected prediction mode being selected from among a plurality of prediction modes including a plurality of direction prediction modes and two predetermined prediction modes different from the plurality of direction prediction modes, the two predetermined prediction modes including a DC prediction mode; and a decoding unit configured to decode a current block to be decoded included in the image by predicting the current block using the selected one prediction mode, wherein the mode information decoding unit is further configured to: determine whether or not one of the two predetermined prediction mode is selected as the one selected prediction mode; and determine one of the plurality of prediction modes other than the two predetermined prediction modes as the one selected prediction mode when both of the two predetermined prediction mode are not selected as the selected one prediction mode. 8. An decoding apparatus for decoding an image on a block-by-block basis, the decoding apparatus comprising: a processor; and a non-transitory memory having stored thereon executable instructions, which when executed, cause the processor to perform: decoding mode information that specifies one selected prediction mode, the one selected prediction mode being selected from among a plurality of prediction modes including a plurality of direction prediction modes and two predetermined prediction modes different from the plurality of direction prediction modes, the two predetermined prediction modes including a DC prediction mode; and decoding a current block to be decoded included in the image by predicting the current block using the selected one prediction mode, wherein the decoding mode information further includes: determining whether or not one of the two predetermined prediction mode is selected as the one selected prediction mode; and determining one of the plurality of prediction modes other than the two predetermined prediction modes as the one selected prediction mode when both of the two predetermined prediction mode are not selected as the selected one prediction mode.
An image decoding method includes: restoring a selected prediction mode used in prediction at a time of coding; and decoding a current block included in coded image data to generate a decoded block, according to the prediction based on the selected prediction mode. The restoring includes: determining a first estimated prediction mode; determining a second estimated prediction mode different from the first estimated prediction mode; and restoring the selected prediction mode based on the mode information, the first estimated prediction mode, and the second estimated prediction mode.1-5. (canceled) 6. An decoding method for decoding an image on a block-by-block basis, the decoding method comprising: decoding mode information that specifies one selected prediction mode, the one selected prediction mode being selected from among a plurality of prediction modes including a plurality of direction prediction modes and two predetermined prediction modes different from the plurality of direction prediction modes, the two predetermined prediction modes including a DC prediction mode; and decoding a current block to be decoded included in the image by predicting the current block using the selected one prediction mode, wherein the decoding mode information further includes: determining whether or not one of the two predetermined prediction mode is selected as the one selected prediction mode; and determining one of the plurality of prediction modes other than the two predetermined prediction modes as the one selected prediction mode when both of the two predetermined prediction mode are not selected as the selected one prediction mode. 7. An decoding apparatus for decoding an image on a block-by-block basis, the decoding apparatus comprising: a mode information decoding unit configured to decode mode information that specifies one selected prediction mode, the one selected prediction mode being selected from among a plurality of prediction modes including a plurality of direction prediction modes and two predetermined prediction modes different from the plurality of direction prediction modes, the two predetermined prediction modes including a DC prediction mode; and a decoding unit configured to decode a current block to be decoded included in the image by predicting the current block using the selected one prediction mode, wherein the mode information decoding unit is further configured to: determine whether or not one of the two predetermined prediction mode is selected as the one selected prediction mode; and determine one of the plurality of prediction modes other than the two predetermined prediction modes as the one selected prediction mode when both of the two predetermined prediction mode are not selected as the selected one prediction mode. 8. An decoding apparatus for decoding an image on a block-by-block basis, the decoding apparatus comprising: a processor; and a non-transitory memory having stored thereon executable instructions, which when executed, cause the processor to perform: decoding mode information that specifies one selected prediction mode, the one selected prediction mode being selected from among a plurality of prediction modes including a plurality of direction prediction modes and two predetermined prediction modes different from the plurality of direction prediction modes, the two predetermined prediction modes including a DC prediction mode; and decoding a current block to be decoded included in the image by predicting the current block using the selected one prediction mode, wherein the decoding mode information further includes: determining whether or not one of the two predetermined prediction mode is selected as the one selected prediction mode; and determining one of the plurality of prediction modes other than the two predetermined prediction modes as the one selected prediction mode when both of the two predetermined prediction mode are not selected as the selected one prediction mode.
2,400
7,246
7,246
13,194,783
2,421
An apparatus and method for effectively implementing a wireless television system may include a communications processor and a transmitter device that combine at least one of a local-area network interface, a wide-area network interface, and one or more television data interfaces for effectively performing a wireless network transmission process. A transmitted stream from the wireless television system may be received via wireless network processing for viewing local-area network data, wide-area network data (such as Internet data), or television data by flexibly utilizing various electronic devices such as a notepad personal computer, a personal digital assistant (PDA), or a handheld TV remote control device.
1-20. (canceled) 21. A system comprising: a network interface configured to receive a broadcast stream generated by a base station over a network, the broadcast stream including program information from a selected one of a plurality of program sources associated with the base station; a display controller configured to display the program information on a display; and an input module configured to generate control information in response to user inputs to the display system, wherein the control information is configured to select and control the selected one of the plurality of program sources associated with the base station, and to supply the control information to the network interface for transmission to the base station. 22. The system of claim 21 wherein each of the plurality of program sources is an audio/video component that is connected to a switcher associated with the base station. 23. The system of claim 21, wherein the control information comprises a first instruction based upon a first user input to the display system to select the selected program source from the plurality of program sources associated with the base station. 24. The system of claim 22, wherein the control information comprises a second instruction based upon a second user input to the display system to control the selected program source. 25. The system of claim 24 wherein the second instruction comprises an instruction to change a channel of the selected program source. 26. The system of claim 24 wherein the second instruction comprises an instruction to direct the selected program source to play a pre-recorded program. 27. The system of claim 26 wherein the control information comprises a third instruction to select the pre-recorded program on the selected program source. 28. The system of claim 21, wherein the network interface is configured to receive the broadcast stream at least in part over a wireless network. 29. The system of claim 21, wherein the network interface is configured to receive the broadcast stream at least in part over a wired network. 30. The system of claim 21, wherein the network interface is configured to receive the broadcast stream at least in part over a local area network. 31. The system of claim 21, wherein the network interface is configured to receive the broadcast stream at least in part over a wide area network. 32. The system of claim 21, wherein the network interface is configured to receive the broadcast stream at least in part over a packet switched network. 33. The system of claim 21, wherein the system is implemented within a personal computer. 34. The system of claim 21, wherein the system is implemented within a notepad computer. 35. The system of claim 21, wherein the system is implemented within a personal digital assistant. 36. The system of claim 21, wherein the display comprises a television. 37. A display system to present a broadcast stream on a display to a user, wherein the broadcast stream is generated by a base station from program information obtained from a selected one of a plurality of audio/video program sources that are connected to the base station via a switcher, the display system comprising: a network interface configured to receive the broadcast stream from the base station via a network; a display controller configured to display the program information on a display; and an input module configured to generate control information in response to inputs received from the user and to supply the control information to the network interface for transmission to the base station, wherein the control information comprises a first instruction in response to a first input from the user that directs the switcher to select the selected one of the plurality of audio/video program sources and a second instruction in response to a second input from the user that directs the base station to control the selected one of the plurality of audio/video program sources to thereby change the broadcast stream. 38. The display system of claim 37 wherein one of the plurality of audio/video program sources is a television tuner, and wherein the second instruction is configured to direct the base station to control the television tuner and thereby change a channel provided by the television tuner. 39. The display system of claim 37 wherein one of the plurality of audio/video program sources is a digital video recorder, and wherein the second instruction is configured to direct the base station to control the digital video recorder and thereby play a selected program that is recorded on the digital video recorder. 40. The display system of claim 37 wherein one of the plurality of audio/video program sources is a media player, and wherein the second instruction is configured to direct the base station to direct the media player to play a pre-recorded program. 41. A method executable by a client device comprising: receiving, at the client device, a broadcast stream generated by a base station over a network, the broadcast stream including program information from a selected one of a plurality of program sources associated with the base station; displaying the program information on a display; receiving user inputs to change the broadcast stream at the client device; generating control information at the client device in response to the user inputs to thereby select and control the selected one of the plurality of program sources associated with the base station; and supplying the control information from the client device to the base station via the network to control the selected one of the plurality of program sources and to thereby change the broadcast stream generated by the base station. 42. The method of claim 41 further comprising providing the program information for presentation on a supplemental display. 43. The method of claim 41, wherein the control information comprises a first instruction based upon a first one of the user inputs to select the selected program source from the plurality of program sources associated with the base station. 44. The method of claim 43, wherein the control information comprises a second instruction based upon a second one of the user inputs to the display system to control the selected program source. 45. The method of claim 44 wherein the second instruction comprises an instruction to change a channel of the selected program source. 46. The method of claim 44 wherein the second instruction comprises an instruction to direct the selected program source to play a pre-recorded program. 47. The method of claim 46 wherein the control information comprises a third instruction to select the pre-recorded program on the selected program source.
An apparatus and method for effectively implementing a wireless television system may include a communications processor and a transmitter device that combine at least one of a local-area network interface, a wide-area network interface, and one or more television data interfaces for effectively performing a wireless network transmission process. A transmitted stream from the wireless television system may be received via wireless network processing for viewing local-area network data, wide-area network data (such as Internet data), or television data by flexibly utilizing various electronic devices such as a notepad personal computer, a personal digital assistant (PDA), or a handheld TV remote control device.1-20. (canceled) 21. A system comprising: a network interface configured to receive a broadcast stream generated by a base station over a network, the broadcast stream including program information from a selected one of a plurality of program sources associated with the base station; a display controller configured to display the program information on a display; and an input module configured to generate control information in response to user inputs to the display system, wherein the control information is configured to select and control the selected one of the plurality of program sources associated with the base station, and to supply the control information to the network interface for transmission to the base station. 22. The system of claim 21 wherein each of the plurality of program sources is an audio/video component that is connected to a switcher associated with the base station. 23. The system of claim 21, wherein the control information comprises a first instruction based upon a first user input to the display system to select the selected program source from the plurality of program sources associated with the base station. 24. The system of claim 22, wherein the control information comprises a second instruction based upon a second user input to the display system to control the selected program source. 25. The system of claim 24 wherein the second instruction comprises an instruction to change a channel of the selected program source. 26. The system of claim 24 wherein the second instruction comprises an instruction to direct the selected program source to play a pre-recorded program. 27. The system of claim 26 wherein the control information comprises a third instruction to select the pre-recorded program on the selected program source. 28. The system of claim 21, wherein the network interface is configured to receive the broadcast stream at least in part over a wireless network. 29. The system of claim 21, wherein the network interface is configured to receive the broadcast stream at least in part over a wired network. 30. The system of claim 21, wherein the network interface is configured to receive the broadcast stream at least in part over a local area network. 31. The system of claim 21, wherein the network interface is configured to receive the broadcast stream at least in part over a wide area network. 32. The system of claim 21, wherein the network interface is configured to receive the broadcast stream at least in part over a packet switched network. 33. The system of claim 21, wherein the system is implemented within a personal computer. 34. The system of claim 21, wherein the system is implemented within a notepad computer. 35. The system of claim 21, wherein the system is implemented within a personal digital assistant. 36. The system of claim 21, wherein the display comprises a television. 37. A display system to present a broadcast stream on a display to a user, wherein the broadcast stream is generated by a base station from program information obtained from a selected one of a plurality of audio/video program sources that are connected to the base station via a switcher, the display system comprising: a network interface configured to receive the broadcast stream from the base station via a network; a display controller configured to display the program information on a display; and an input module configured to generate control information in response to inputs received from the user and to supply the control information to the network interface for transmission to the base station, wherein the control information comprises a first instruction in response to a first input from the user that directs the switcher to select the selected one of the plurality of audio/video program sources and a second instruction in response to a second input from the user that directs the base station to control the selected one of the plurality of audio/video program sources to thereby change the broadcast stream. 38. The display system of claim 37 wherein one of the plurality of audio/video program sources is a television tuner, and wherein the second instruction is configured to direct the base station to control the television tuner and thereby change a channel provided by the television tuner. 39. The display system of claim 37 wherein one of the plurality of audio/video program sources is a digital video recorder, and wherein the second instruction is configured to direct the base station to control the digital video recorder and thereby play a selected program that is recorded on the digital video recorder. 40. The display system of claim 37 wherein one of the plurality of audio/video program sources is a media player, and wherein the second instruction is configured to direct the base station to direct the media player to play a pre-recorded program. 41. A method executable by a client device comprising: receiving, at the client device, a broadcast stream generated by a base station over a network, the broadcast stream including program information from a selected one of a plurality of program sources associated with the base station; displaying the program information on a display; receiving user inputs to change the broadcast stream at the client device; generating control information at the client device in response to the user inputs to thereby select and control the selected one of the plurality of program sources associated with the base station; and supplying the control information from the client device to the base station via the network to control the selected one of the plurality of program sources and to thereby change the broadcast stream generated by the base station. 42. The method of claim 41 further comprising providing the program information for presentation on a supplemental display. 43. The method of claim 41, wherein the control information comprises a first instruction based upon a first one of the user inputs to select the selected program source from the plurality of program sources associated with the base station. 44. The method of claim 43, wherein the control information comprises a second instruction based upon a second one of the user inputs to the display system to control the selected program source. 45. The method of claim 44 wherein the second instruction comprises an instruction to change a channel of the selected program source. 46. The method of claim 44 wherein the second instruction comprises an instruction to direct the selected program source to play a pre-recorded program. 47. The method of claim 46 wherein the control information comprises a third instruction to select the pre-recorded program on the selected program source.
2,400
7,247
7,247
14,469,424
2,448
Embodiments of the disclosure provide techniques for partitioning a resource object into multiple resource components of a cluster of host computer nodes in a distributed resources system. The distributed resources system translates high-level policy requirements into a resource configuration that the system accommodates. The system determines an allocation based on the policy requirements and identifies resource configurations that are available. Upon selecting a resource configuration, the distributed resources system assigns the allocation and associated values to the selected configuration and publishes the new configuration to other host computer nodes in the cluster.
1. A method for partitioning a resource object into multiple resource components in a cluster of host computer nodes of a distributed resources system, the method comprising: determining an allocation for the resource components based on a set of requirements for the resource object; identifying one or more available resource configurations in the distributed resources system capable of accommodating the allocation; selecting one of the resource configurations; and assigning the allocation to the selected resource configuration. 2. The method of claim 1, further comprising, publishing a status of the assigned allocation to each host computer node in the cluster. 3. The method of claim 1, wherein the distributed resources system is a software-defined virtual storage area network, and wherein the host computer nodes provide storage to virtual machines. 4. The method of claim 2, wherein the resource configuration includes one or more disk groups having a solid state drive and one or more magnetic disks. 5. The method of claim 1, wherein the one of the resource configurations is selected at random. 6. The method of claim 1, wherein the selecting of one of the resource configurations is based on a fitness function that attempts to maintain balanced usage for different resource types with potentially different optimal placements. 7. The method of claim 1, wherein assigning the allocation to the one of the resource configurations further comprises: preparing a distributed transaction to create the resource components on one or more resources in the resource configuration; and committing the distributed transaction. 8. The method of claim 1, wherein the requirements provide a cache-miss profile. 9. A non-transitory computer readable storage medium storing instructions, which, when executed on a processor, performs an operation for partitioning a resource object into multiple resource components in a cluster of host computer nodes of a distributed resources system, the operation comprising: determining an allocation for the resource components based on a set of requirements for the resource object; identifying one or more available resource configurations in the distributed resources system capable of accommodating the allocation; selecting one of the resource configurations; and assigning the allocation to the selected resource configuration. 10. The computer-readable storage medium of claim 9, wherein the operation further comprises, publishing a status of the assigned allocation to each host computer node in the cluster. 11. The computer-readable storage medium of claim 9, wherein the distributed resources system is a software-defined virtual storage area network, and wherein the host computer nodes provide storage to virtual machines. 12. The computer-readable storage medium of claim 10, wherein the resource configuration includes one or more disk groups having a solid state drive and one or more magnetic disks. 13. The computer-readable storage medium of claim 9, wherein the one of the resource configurations is selected at random. 14. The computer-readable storage medium of claim 9, wherein the selecting of one of the resource configurations is based on a fitness function that attempts to maintain balanced usage for different resource types with potentially different optimal placements. 15. The computer-readable storage medium of claim 9, wherein assigning the allocation to the one of the resource configurations further comprises: preparing a distributed transaction to create the resource components on one or more resources in the resource configuration; and committing the distributed transaction. 16. The computer-readable storage medium of claim 9, wherein the requirements provide a cache-miss profile. 17. A system, comprising: a processor; and a memory hosting an application, which, when executed on the processor, performs an operation for partitioning a resource object into multiple resource components in a cluster of host computer nodes of a distributed resources system, the operation comprising: determining an allocation for the resource components based on a set of requirements for the resource object; identifying one or more available resource configurations in the distributed resources system capable of accommodating the allocation; selecting one of the resource configurations; and assigning the allocation to the selected resource configuration. 18. The system of claim 17, wherein the operation further comprises, publishing a status of the assigned allocation to each host computer node in the cluster. 19. The system of claim 17, wherein the distributed resources system is a software-defined virtual storage area network, and wherein the host computer nodes provide storage to virtual machines. 20. The system of claim 18, wherein the resource configuration includes one or more disk groups having a solid state drive and one or more magnetic disks. 21. The system of claim 17, wherein the one of the resource configurations is selected at random. 22. The system of claim 17, wherein the selecting of one of the resource configurations is based on a fitness function that attempts to maintain balanced usage for different resource types with potentially different optimal placements. 23. The system of claim 17, wherein assigning the allocation to the one of the resource configurations further comprises: preparing a distributed transaction to create the resource components on one or more resources in the resource configuration; and committing the distributed transaction. 24. The system of claim 17, wherein the requirements provide a cache-miss profile.
Embodiments of the disclosure provide techniques for partitioning a resource object into multiple resource components of a cluster of host computer nodes in a distributed resources system. The distributed resources system translates high-level policy requirements into a resource configuration that the system accommodates. The system determines an allocation based on the policy requirements and identifies resource configurations that are available. Upon selecting a resource configuration, the distributed resources system assigns the allocation and associated values to the selected configuration and publishes the new configuration to other host computer nodes in the cluster.1. A method for partitioning a resource object into multiple resource components in a cluster of host computer nodes of a distributed resources system, the method comprising: determining an allocation for the resource components based on a set of requirements for the resource object; identifying one or more available resource configurations in the distributed resources system capable of accommodating the allocation; selecting one of the resource configurations; and assigning the allocation to the selected resource configuration. 2. The method of claim 1, further comprising, publishing a status of the assigned allocation to each host computer node in the cluster. 3. The method of claim 1, wherein the distributed resources system is a software-defined virtual storage area network, and wherein the host computer nodes provide storage to virtual machines. 4. The method of claim 2, wherein the resource configuration includes one or more disk groups having a solid state drive and one or more magnetic disks. 5. The method of claim 1, wherein the one of the resource configurations is selected at random. 6. The method of claim 1, wherein the selecting of one of the resource configurations is based on a fitness function that attempts to maintain balanced usage for different resource types with potentially different optimal placements. 7. The method of claim 1, wherein assigning the allocation to the one of the resource configurations further comprises: preparing a distributed transaction to create the resource components on one or more resources in the resource configuration; and committing the distributed transaction. 8. The method of claim 1, wherein the requirements provide a cache-miss profile. 9. A non-transitory computer readable storage medium storing instructions, which, when executed on a processor, performs an operation for partitioning a resource object into multiple resource components in a cluster of host computer nodes of a distributed resources system, the operation comprising: determining an allocation for the resource components based on a set of requirements for the resource object; identifying one or more available resource configurations in the distributed resources system capable of accommodating the allocation; selecting one of the resource configurations; and assigning the allocation to the selected resource configuration. 10. The computer-readable storage medium of claim 9, wherein the operation further comprises, publishing a status of the assigned allocation to each host computer node in the cluster. 11. The computer-readable storage medium of claim 9, wherein the distributed resources system is a software-defined virtual storage area network, and wherein the host computer nodes provide storage to virtual machines. 12. The computer-readable storage medium of claim 10, wherein the resource configuration includes one or more disk groups having a solid state drive and one or more magnetic disks. 13. The computer-readable storage medium of claim 9, wherein the one of the resource configurations is selected at random. 14. The computer-readable storage medium of claim 9, wherein the selecting of one of the resource configurations is based on a fitness function that attempts to maintain balanced usage for different resource types with potentially different optimal placements. 15. The computer-readable storage medium of claim 9, wherein assigning the allocation to the one of the resource configurations further comprises: preparing a distributed transaction to create the resource components on one or more resources in the resource configuration; and committing the distributed transaction. 16. The computer-readable storage medium of claim 9, wherein the requirements provide a cache-miss profile. 17. A system, comprising: a processor; and a memory hosting an application, which, when executed on the processor, performs an operation for partitioning a resource object into multiple resource components in a cluster of host computer nodes of a distributed resources system, the operation comprising: determining an allocation for the resource components based on a set of requirements for the resource object; identifying one or more available resource configurations in the distributed resources system capable of accommodating the allocation; selecting one of the resource configurations; and assigning the allocation to the selected resource configuration. 18. The system of claim 17, wherein the operation further comprises, publishing a status of the assigned allocation to each host computer node in the cluster. 19. The system of claim 17, wherein the distributed resources system is a software-defined virtual storage area network, and wherein the host computer nodes provide storage to virtual machines. 20. The system of claim 18, wherein the resource configuration includes one or more disk groups having a solid state drive and one or more magnetic disks. 21. The system of claim 17, wherein the one of the resource configurations is selected at random. 22. The system of claim 17, wherein the selecting of one of the resource configurations is based on a fitness function that attempts to maintain balanced usage for different resource types with potentially different optimal placements. 23. The system of claim 17, wherein assigning the allocation to the one of the resource configurations further comprises: preparing a distributed transaction to create the resource components on one or more resources in the resource configuration; and committing the distributed transaction. 24. The system of claim 17, wherein the requirements provide a cache-miss profile.
2,400
7,248
7,248
14,234,454
2,486
The present invention relates to a device ( 10 ) for obtaining and processing measurement readings including at least a component representative of a physical phenomenon in a living being ( 16 ), comprising a sensor ( 12 ) for obtaining measurement readings from at least one body part of a living being ( 16 ) from a distance having at least a component representative of the physical phenomenon in the living being ( 16 ), an identification unit ( 26 ) for identifying the at least one body part of the living being ( 16 ); an extraction unit ( 38 ) for extracting at least one first signal from the measurement readings representing at least one component representative of the physical phenomenon, an evaluation unit ( 30 ) for obtaining adjustment information according to the at least one identified body part, and an adjustment unit ( 34 ) for adjusting the at least one first signal according to the adjustment information and for generating at least one output signal representing the physical phenomenon of the living being ( 16 ).
1. A device for obtaining and processing measurement readings including at least a component representative of a physical phenomenon in a living being, comprising: a sensor for obtaining measurement readings from at least one body part of a living being from a distance having at least a component representative of the physical phenomenon in the living being; an identification unit for identifying the at least one body part of the living being; an extraction unit for extracting at least one first signal from the measurement readings representing at least one component representative of the physical phenomenon; an evaluation unit for obtaining predetermined adjustment information according to the at least one identified body part; and an adjustment unit for adjusting the at least one first signal according to the adjustment information and for generating at least one output signal representing the physical phenomenon of the living being. 2. The device according to claim 1, wherein the physical phenomenon is blood oxygenation, pulse, heart rate variability, blood pressure, respiratory rate, depth of anesthesia and/or hypo- and hypervolemia 3. The device according to claim 1, wherein the sensor is a video camera. 4. The device according to claim 1, wherein the adjustment information is at least one calibration curve. 5. The device according to claim 1, wherein the extracting unit is adapted for extracting the at least one first signal from the measurement readings according to the at least one identified body part. 6. The device according to claim 5, wherein the identification unit is adapted for estimating motions of the at least one identified body part and wherein the extraction unit is adapted for extracting the at least one first signal in accordance with the estimated motions. 7. The device according to claim 5, further comprising an analyzing unit for comparing at least two first signals representing component representatives of the physical phenomenon from different body parts of the living being. 8. The device according to claim 7, wherein the analyzing unit is adapted for determining a difference between the at least two first signals and for generating a reporting signal if the difference exceeds a threshold. 9. The device according to claim 5, wherein the adjustment unit is adapted for generating the output signal based on at least two first signals. 10. The device according to claim 9, wherein the adjustment unit is adapted for determining a quality of the at least two first signals and for selecting at least one first signal based on the quality. 11. The device according to claim 9, wherein the adjustment unit is adapted for merging the at least two first signals for generating the output signal. 12. A method for obtaining and processing measurement readings including at least a component representative of a physical phenomenon in a living being, comprising the steps of: obtaining measurement readings from at least one body part of a living being from a distance having at least a component representative of the physical phenomenon in the living being; identifying the at least one body part of the living being; extracting at least one first signal from the measurement readings representing at least one component representative of the physical phenomenon; obtaining predetermined adjustment information according to the at least one identified body part; adjusting the at least one first signal according to the adjustment information; and generating at least one output signal representing the physical phenomenon of the living being. 13. A processor for processing measurement readings including at least a component representative of a physical phenomenon in a living being, comprising: an interface for receiving measurement readings from at least one body part of a living being obtained from a distance and having at least a component representative of the physical phenomenon in the living being; an identification unit for identifying the at least one body part of the living being; an extraction unit for extracting at least one first signal from the measurement readings representing at least one component representative of the physical phenomenon; an evaluation unit for obtaining predetermined adjustment information according to the at least one identified body part; and an adjustment unit for adjusting the at least one first signal according to the adjustment information and for generating at least one output signal representing the physical phenomenon of the living being. 14. A method for processing measurement readings including at least a component representative of a physical phenomenon in a living being, comprising the steps of: receiving measurement readings from at least one body part of a living being obtained from a distance and having at least a component representative of the physical phenomenon in the living being; identifying the at least one body part of the living being; extracting at least one first signal from the measurement readings representing at least one component representative of the physical phenomenon; obtaining predetermined adjustment information according to the at least one identified body part; adjusting the at least one first signal according to the adjustment information; and generating at least one output signal representing the physical phenomenon of the living being. 15. A computer program comprising program code means for causing a computer to carry out the steps of the method as claimed in claim 14 when said computer program is carried out on the computer.
The present invention relates to a device ( 10 ) for obtaining and processing measurement readings including at least a component representative of a physical phenomenon in a living being ( 16 ), comprising a sensor ( 12 ) for obtaining measurement readings from at least one body part of a living being ( 16 ) from a distance having at least a component representative of the physical phenomenon in the living being ( 16 ), an identification unit ( 26 ) for identifying the at least one body part of the living being ( 16 ); an extraction unit ( 38 ) for extracting at least one first signal from the measurement readings representing at least one component representative of the physical phenomenon, an evaluation unit ( 30 ) for obtaining adjustment information according to the at least one identified body part, and an adjustment unit ( 34 ) for adjusting the at least one first signal according to the adjustment information and for generating at least one output signal representing the physical phenomenon of the living being ( 16 ).1. A device for obtaining and processing measurement readings including at least a component representative of a physical phenomenon in a living being, comprising: a sensor for obtaining measurement readings from at least one body part of a living being from a distance having at least a component representative of the physical phenomenon in the living being; an identification unit for identifying the at least one body part of the living being; an extraction unit for extracting at least one first signal from the measurement readings representing at least one component representative of the physical phenomenon; an evaluation unit for obtaining predetermined adjustment information according to the at least one identified body part; and an adjustment unit for adjusting the at least one first signal according to the adjustment information and for generating at least one output signal representing the physical phenomenon of the living being. 2. The device according to claim 1, wherein the physical phenomenon is blood oxygenation, pulse, heart rate variability, blood pressure, respiratory rate, depth of anesthesia and/or hypo- and hypervolemia 3. The device according to claim 1, wherein the sensor is a video camera. 4. The device according to claim 1, wherein the adjustment information is at least one calibration curve. 5. The device according to claim 1, wherein the extracting unit is adapted for extracting the at least one first signal from the measurement readings according to the at least one identified body part. 6. The device according to claim 5, wherein the identification unit is adapted for estimating motions of the at least one identified body part and wherein the extraction unit is adapted for extracting the at least one first signal in accordance with the estimated motions. 7. The device according to claim 5, further comprising an analyzing unit for comparing at least two first signals representing component representatives of the physical phenomenon from different body parts of the living being. 8. The device according to claim 7, wherein the analyzing unit is adapted for determining a difference between the at least two first signals and for generating a reporting signal if the difference exceeds a threshold. 9. The device according to claim 5, wherein the adjustment unit is adapted for generating the output signal based on at least two first signals. 10. The device according to claim 9, wherein the adjustment unit is adapted for determining a quality of the at least two first signals and for selecting at least one first signal based on the quality. 11. The device according to claim 9, wherein the adjustment unit is adapted for merging the at least two first signals for generating the output signal. 12. A method for obtaining and processing measurement readings including at least a component representative of a physical phenomenon in a living being, comprising the steps of: obtaining measurement readings from at least one body part of a living being from a distance having at least a component representative of the physical phenomenon in the living being; identifying the at least one body part of the living being; extracting at least one first signal from the measurement readings representing at least one component representative of the physical phenomenon; obtaining predetermined adjustment information according to the at least one identified body part; adjusting the at least one first signal according to the adjustment information; and generating at least one output signal representing the physical phenomenon of the living being. 13. A processor for processing measurement readings including at least a component representative of a physical phenomenon in a living being, comprising: an interface for receiving measurement readings from at least one body part of a living being obtained from a distance and having at least a component representative of the physical phenomenon in the living being; an identification unit for identifying the at least one body part of the living being; an extraction unit for extracting at least one first signal from the measurement readings representing at least one component representative of the physical phenomenon; an evaluation unit for obtaining predetermined adjustment information according to the at least one identified body part; and an adjustment unit for adjusting the at least one first signal according to the adjustment information and for generating at least one output signal representing the physical phenomenon of the living being. 14. A method for processing measurement readings including at least a component representative of a physical phenomenon in a living being, comprising the steps of: receiving measurement readings from at least one body part of a living being obtained from a distance and having at least a component representative of the physical phenomenon in the living being; identifying the at least one body part of the living being; extracting at least one first signal from the measurement readings representing at least one component representative of the physical phenomenon; obtaining predetermined adjustment information according to the at least one identified body part; adjusting the at least one first signal according to the adjustment information; and generating at least one output signal representing the physical phenomenon of the living being. 15. A computer program comprising program code means for causing a computer to carry out the steps of the method as claimed in claim 14 when said computer program is carried out on the computer.
2,400
7,249
7,249
15,332,601
2,425
Methods and apparatus for using geocoding information from a user's mobile device to determine program and advertising media content to deliver to the user.
1. A method, comprising: identifying at a television receiver user geocoding information associated with a mobile device of at least one user; comparing the user geocoding information with a geocoded assets database containing locations of geocoded assets to identify matched locations the at least one user is currently in proximity to; receiving at the television receiver content information containing at least one of program content and advertising content, the content including geocoding information, embedded in the program or advertising content, the geocoding information identifying a location relevant to at least a portion of the content; receiving at the television receiver user content preferences for the at least one user; comparing the matched locations with the embedded geocoding information identifying the location relevant to the at least a portion of the content and with the user content preferences to determine content relevant to the at least one user; and presenting on a presentation device the content relevant to the at least one user, the presenting device presenting to the user in real time data regarding a geocoded asset that is physically close to the user's location. 2. The method of claim 1, further comprising: storing the user geocoding information on a user geocoding information database accessible by the television receiver; storing the received content information on a content information database accessible by the television receiver; and storing the user content preferences on a user profile information database accessible by the television receiver. 3. The method of claim 1 wherein identifying at the television receiver user geocoding information includes: receiving the user geocoding information from at least one of: a mobile device running a software application collecting user geocoding information, a wireless network provider in communication with the mobile device, and the mobile device connected via the Internet. 4. The method of claim 1 wherein presenting on the presentation device content relevant to the at least one user includes at least one of: presenting the content directly to the at least one user, notifying the at least one user that content is available for presentation, and querying the at least one user whether the content is to be recorded for future presentation. 5. The method of claim 1 wherein presenting on the presentation device content relevant to the at least one user includes presenting content at a time the at least one user is in proximity to the matched location. 6. The method of claim 2 wherein if there is more than one user, determining content relevant to the at least one user further includes: examining the matched locations for each user, examining the user profile information database to determine relationships between each of the users, and determining the proximity of the users to each other based on relationships between each of the users. 7. The method of claim 1, further comprising: querying the television receiver by the at least one user to determine whether the at least one user is currently in proximity to any matched locations. 8. The method of claim 1, wherein presenting on the presentation device content relevant to the at least one user includes: interrogating the at least one user to determine a preferred mode for presenting the content relevant to the at least one user; and presenting the content relevant to the at least one user in the preferred mode. 9. A system, comprising: a mobile device configured to determine user geocoding information associated with a location of a user; and a receiving device configured to: receive from the mobile device the user geocoding information associated with the user; store the received user geocoding information; compare the received user geocoding information with a geocoded assets database containing locations of geocoded assets to identify matched locations the user is in proximity to; receive content including embedded geocoding information identifying a location relevant to at least a portion of the content; compare the matched locations with the embedded geocoding information to determine content relevant to the user; and output the content relevant to the user. 10. The system of claim 9 wherein the receiving device is further configured to provide to the mobile device the output content relevant to the user. 11. The system of claim 9, further comprising a presentation device communicatively coupled to the receiving device, wherein the receiving device is further configured to provide to the presentation device the output content relevant to the user. 12. The system of claim 9 wherein the received content includes advertising content including embedded geocoding information identifying one or more locations for accepting an advertised offer. 13. The system of claim 9 wherein the received content includes program content including embedded geocoding information identifying at least one of: a filming location of a scene, a location represented in a scene, a location of an object appearing in a scene, and a location where a broadcast event is being held. 14. The system of claim 9 wherein the receiving device is further configured to receive user content preferences for the user, and to compare the matched locations with the embedded geocoding information and the user content preferences to determine the content relevant to the user. 15. The system of claim 14 wherein the receiving device is further configured to: extract content information from the received content, the extracted content information including the embedded geocoding information; store the extracted content information on a content information database; and store the received user content preferences on a user profile information database. 16. The system of claim 9 wherein the receiving device is a set top box. 17. A non-transitory computer-readable storage medium storing instructions which, when executed by a processing system in a receiving device, cause the processing system to: receive user geocoding information from a mobile device associated with a user; store the geocoding information on a user geocoding information database; compare the geocoding information with a geocoded assets database containing locations of geocoded assets to identify matched locations the user is currently in proximity to; receive content including embedded geocoding information identifying a location relevant to at least a portion of the content; receive user content preferences for the user; and compare the matched locations with the embedded geocoding information identifying the location relevant to the at least a portion of the content and the user content preferences to determine content relevant to the user. 18. The non-transitory computer-readable storage medium of claim 17 wherein the instructions, when executed by the processing system, further cause the processing system to: provide the determined content relevant to the user to the mobile device. 19. The non-transitory computer-readable storage medium of claim 17 wherein the instructions, when executed by the processing system, further cause the processing system to: provide the determined content relevant to the user to a presentation device communicatively coupled to the receiving device. 20. The non-transitory computer-readable storage medium of claim 17 wherein the instructions, when executed by the processing system, further cause the processing system to: extract content information from the received content, the extracted content information including the embedded geocoding information; store the extracted content information on a content information database; and store the received user content preferences on a user profile information database.
Methods and apparatus for using geocoding information from a user's mobile device to determine program and advertising media content to deliver to the user.1. A method, comprising: identifying at a television receiver user geocoding information associated with a mobile device of at least one user; comparing the user geocoding information with a geocoded assets database containing locations of geocoded assets to identify matched locations the at least one user is currently in proximity to; receiving at the television receiver content information containing at least one of program content and advertising content, the content including geocoding information, embedded in the program or advertising content, the geocoding information identifying a location relevant to at least a portion of the content; receiving at the television receiver user content preferences for the at least one user; comparing the matched locations with the embedded geocoding information identifying the location relevant to the at least a portion of the content and with the user content preferences to determine content relevant to the at least one user; and presenting on a presentation device the content relevant to the at least one user, the presenting device presenting to the user in real time data regarding a geocoded asset that is physically close to the user's location. 2. The method of claim 1, further comprising: storing the user geocoding information on a user geocoding information database accessible by the television receiver; storing the received content information on a content information database accessible by the television receiver; and storing the user content preferences on a user profile information database accessible by the television receiver. 3. The method of claim 1 wherein identifying at the television receiver user geocoding information includes: receiving the user geocoding information from at least one of: a mobile device running a software application collecting user geocoding information, a wireless network provider in communication with the mobile device, and the mobile device connected via the Internet. 4. The method of claim 1 wherein presenting on the presentation device content relevant to the at least one user includes at least one of: presenting the content directly to the at least one user, notifying the at least one user that content is available for presentation, and querying the at least one user whether the content is to be recorded for future presentation. 5. The method of claim 1 wherein presenting on the presentation device content relevant to the at least one user includes presenting content at a time the at least one user is in proximity to the matched location. 6. The method of claim 2 wherein if there is more than one user, determining content relevant to the at least one user further includes: examining the matched locations for each user, examining the user profile information database to determine relationships between each of the users, and determining the proximity of the users to each other based on relationships between each of the users. 7. The method of claim 1, further comprising: querying the television receiver by the at least one user to determine whether the at least one user is currently in proximity to any matched locations. 8. The method of claim 1, wherein presenting on the presentation device content relevant to the at least one user includes: interrogating the at least one user to determine a preferred mode for presenting the content relevant to the at least one user; and presenting the content relevant to the at least one user in the preferred mode. 9. A system, comprising: a mobile device configured to determine user geocoding information associated with a location of a user; and a receiving device configured to: receive from the mobile device the user geocoding information associated with the user; store the received user geocoding information; compare the received user geocoding information with a geocoded assets database containing locations of geocoded assets to identify matched locations the user is in proximity to; receive content including embedded geocoding information identifying a location relevant to at least a portion of the content; compare the matched locations with the embedded geocoding information to determine content relevant to the user; and output the content relevant to the user. 10. The system of claim 9 wherein the receiving device is further configured to provide to the mobile device the output content relevant to the user. 11. The system of claim 9, further comprising a presentation device communicatively coupled to the receiving device, wherein the receiving device is further configured to provide to the presentation device the output content relevant to the user. 12. The system of claim 9 wherein the received content includes advertising content including embedded geocoding information identifying one or more locations for accepting an advertised offer. 13. The system of claim 9 wherein the received content includes program content including embedded geocoding information identifying at least one of: a filming location of a scene, a location represented in a scene, a location of an object appearing in a scene, and a location where a broadcast event is being held. 14. The system of claim 9 wherein the receiving device is further configured to receive user content preferences for the user, and to compare the matched locations with the embedded geocoding information and the user content preferences to determine the content relevant to the user. 15. The system of claim 14 wherein the receiving device is further configured to: extract content information from the received content, the extracted content information including the embedded geocoding information; store the extracted content information on a content information database; and store the received user content preferences on a user profile information database. 16. The system of claim 9 wherein the receiving device is a set top box. 17. A non-transitory computer-readable storage medium storing instructions which, when executed by a processing system in a receiving device, cause the processing system to: receive user geocoding information from a mobile device associated with a user; store the geocoding information on a user geocoding information database; compare the geocoding information with a geocoded assets database containing locations of geocoded assets to identify matched locations the user is currently in proximity to; receive content including embedded geocoding information identifying a location relevant to at least a portion of the content; receive user content preferences for the user; and compare the matched locations with the embedded geocoding information identifying the location relevant to the at least a portion of the content and the user content preferences to determine content relevant to the user. 18. The non-transitory computer-readable storage medium of claim 17 wherein the instructions, when executed by the processing system, further cause the processing system to: provide the determined content relevant to the user to the mobile device. 19. The non-transitory computer-readable storage medium of claim 17 wherein the instructions, when executed by the processing system, further cause the processing system to: provide the determined content relevant to the user to a presentation device communicatively coupled to the receiving device. 20. The non-transitory computer-readable storage medium of claim 17 wherein the instructions, when executed by the processing system, further cause the processing system to: extract content information from the received content, the extracted content information including the embedded geocoding information; store the extracted content information on a content information database; and store the received user content preferences on a user profile information database.
2,400
7,250
7,250
14,344,030
2,439
Setting of security for communication is automatically changed for each application that is started up. An electronic device includes a communication unit which communicates with another electronic device, a storage unit which stores setting information of security for communication corresponding to each application, an execution control unit which starts up and executes one application among a plurality of applications used to communicate with the other electronic device and recruit a participant of a community, and a security control unit which reads the setting information corresponding to the application which has been started up from the storage unit and controls security for communication using the communication unit based on the read setting information when the execution control unit starts up the application.
1. An electronic device comprising: a communication unit which communicates with another electronic device; a storage unit which stores setting information of security for communication corresponding to each application; an execution control unit which starts up and executes one application among a plurality of applications used to communicate with the other electronic device and recruit a participant of a community; and a security control unit which reads the setting information corresponding to the application which has been started up from the storage unit and controls security for communication using the communication unit based on the read setting information when the execution control unit starts up the application. 2. The electronic device according to claim 1, wherein the security control unit returns a setting of security for the communication to a setting before the application is started up when a predetermined condition is satisfied after the application is started up. 3. The electronic device according to claim 2, wherein the security control unit returns the setting of security for the communication to the setting before the application is started up when a predetermined time passes after the application starts recruitment. 4. The electronic device according to claim 2, wherein the security control unit returns the setting of security for the communication to the setting before the application is started up when a manipulation used to terminate recruitment of the application is performed. 5. The electronic device according to claim 2, wherein the security control unit returns the setting of security for the communication to the setting before the application is started up when the number of participants of the community reaches a predetermined number. 6. The electronic device according to claim 2, wherein the security control unit returns the setting of security for the communication to the setting before the application is started up when the electronic device moves a predetermined distance or more from a position at which the application starts recruitment. 7. The electronic device according to claim 2, comprising an acceleration detection unit which detects acceleration of the electronic device, wherein the security control unit returns the setting of security for the communication to the setting before the application is started up when the acceleration detected using the acceleration detection unit satisfies a predetermined condition. 8. The electronic device according to claim 2, comprising a speed detection unit which detects a speed of the electronic device, wherein the security control unit returns the setting of security for the communication to the setting before the application is started up when the speed detected using the speed detection unit satisfies a predetermined condition. 9. The electronic device according to claim 2, wherein the security control unit returns the setting of security for the communication to the setting before the application is started up when access from the other electronic device to data other than data for recruitment is detected. 10. The electronic device according to claim 1, wherein the storage unit stores a connection distance setting which communicate with only another electronic device present within a predetermined distance from the electronic device as the setting information of security, and when the execution control unit starts up the application, the security control unit performs control to communicate with only the other electronic device present within the predetermined distance from the electronic device in a case in which the connection distance setting is set for the application that has been started up. 11. A security control method comprising: starting up and executing, by an electronic device, one application among a plurality of applications used to communicate with another electronic device and recruit a participant of a community; reading, by the electronic device, setting information corresponding to the application that has been started up from a storage unit which stores setting information of security for communication corresponding to each application; and controlling security for communication based on the read setting information. 12. A program which causes a computer of an electronic device to execute: an execution control function which starts up and executes one application among a plurality of applications used to communicate with another electronic device and recruit a participant of a community; and a security control function which reads setting information corresponding to the application that has been started up from a storage unit which stores setting information of security for communication corresponding to each application and controls security for communication based on the read setting information.
Setting of security for communication is automatically changed for each application that is started up. An electronic device includes a communication unit which communicates with another electronic device, a storage unit which stores setting information of security for communication corresponding to each application, an execution control unit which starts up and executes one application among a plurality of applications used to communicate with the other electronic device and recruit a participant of a community, and a security control unit which reads the setting information corresponding to the application which has been started up from the storage unit and controls security for communication using the communication unit based on the read setting information when the execution control unit starts up the application.1. An electronic device comprising: a communication unit which communicates with another electronic device; a storage unit which stores setting information of security for communication corresponding to each application; an execution control unit which starts up and executes one application among a plurality of applications used to communicate with the other electronic device and recruit a participant of a community; and a security control unit which reads the setting information corresponding to the application which has been started up from the storage unit and controls security for communication using the communication unit based on the read setting information when the execution control unit starts up the application. 2. The electronic device according to claim 1, wherein the security control unit returns a setting of security for the communication to a setting before the application is started up when a predetermined condition is satisfied after the application is started up. 3. The electronic device according to claim 2, wherein the security control unit returns the setting of security for the communication to the setting before the application is started up when a predetermined time passes after the application starts recruitment. 4. The electronic device according to claim 2, wherein the security control unit returns the setting of security for the communication to the setting before the application is started up when a manipulation used to terminate recruitment of the application is performed. 5. The electronic device according to claim 2, wherein the security control unit returns the setting of security for the communication to the setting before the application is started up when the number of participants of the community reaches a predetermined number. 6. The electronic device according to claim 2, wherein the security control unit returns the setting of security for the communication to the setting before the application is started up when the electronic device moves a predetermined distance or more from a position at which the application starts recruitment. 7. The electronic device according to claim 2, comprising an acceleration detection unit which detects acceleration of the electronic device, wherein the security control unit returns the setting of security for the communication to the setting before the application is started up when the acceleration detected using the acceleration detection unit satisfies a predetermined condition. 8. The electronic device according to claim 2, comprising a speed detection unit which detects a speed of the electronic device, wherein the security control unit returns the setting of security for the communication to the setting before the application is started up when the speed detected using the speed detection unit satisfies a predetermined condition. 9. The electronic device according to claim 2, wherein the security control unit returns the setting of security for the communication to the setting before the application is started up when access from the other electronic device to data other than data for recruitment is detected. 10. The electronic device according to claim 1, wherein the storage unit stores a connection distance setting which communicate with only another electronic device present within a predetermined distance from the electronic device as the setting information of security, and when the execution control unit starts up the application, the security control unit performs control to communicate with only the other electronic device present within the predetermined distance from the electronic device in a case in which the connection distance setting is set for the application that has been started up. 11. A security control method comprising: starting up and executing, by an electronic device, one application among a plurality of applications used to communicate with another electronic device and recruit a participant of a community; reading, by the electronic device, setting information corresponding to the application that has been started up from a storage unit which stores setting information of security for communication corresponding to each application; and controlling security for communication based on the read setting information. 12. A program which causes a computer of an electronic device to execute: an execution control function which starts up and executes one application among a plurality of applications used to communicate with another electronic device and recruit a participant of a community; and a security control function which reads setting information corresponding to the application that has been started up from a storage unit which stores setting information of security for communication corresponding to each application and controls security for communication based on the read setting information.
2,400
7,251
7,251
14,728,859
2,462
Protection of transmission and reception of clear channel assessment (CCA)-exempt transmission (CET) is disclosed in which channel reserving signals or protection signals may be transmitted by the transmitter or receiver of the CET. The transmitted signals may be received by the neighboring access points that could potentially cause interference with the reception of the CET.
1. A method of wireless communication, comprising: generating a control-reference transmission using network information; transmitting a channel reserving signals on an unlicensed carrier, prior to a scheduled transmission time of the control-reference transmission; and transmitting the control-reference transmission on the unlicensed carrier at the scheduled transmission time. 2. The method of claim 1, further comprising performing a clear channel assessment (CCA) on the unlicensed carrier, wherein the channel reserving signals are transmitted in response to the CCA indicating the unlicensed carrier is clear, and wherein the channel reserving signals include at least one of: a channel usage beacon signal (CUBS); a request to send (RTS) signal; or a clear to send (CTS) signal. 3. The method of claim 1, wherein the network information includes one or more of: synchronization information associated with a base station; a common reference signal (CRS) associated with the base station; a broadcast channel associated with the base station; timing information associated with the base station; frequency information associated with the base station; cell identifier (ID) of the base station; channel condition measurements associated with the base station; one or more network parameters associated with the base station; paging information associated with one or more user equipment (UE) served by the base station; and upcoming traffic information associated with the one or more UE served by the base station. 4. The method of claim 1, wherein the control-reference transmission includes a clear channel assessment exempt transmission (CET). 5. A method of wireless communication, comprising: generating a control-reference transmission using network information; selecting a location within a scheduled control-reference transmission window for transmission of the control-reference transmission over an unlicensed carrier; and transmitting the control-reference transmission on the unlicensed carrier at the location within the scheduled control-reference transmission window. 6. The method of claim 5, further comprising performing a clear channel assessment (CCA) on the unlicensed carrier, wherein the control-reference transmission is transmitted in response to the CCA indicating the unlicensed carrier is clear 7. The method of claim 5, wherein the location is selected based on a hopping function. 8. The method of claim 7, wherein the hopping function is predefined for each public land mobile number (PLMN) to which a base station is associated. 9. The method of claim 7, wherein the hopping function includes a randomized pattern known to a user equipment (UE). 10. The method of claim 5, wherein the network information includes one or more of: synchronization information associated with a base station; a common reference signal (CRS) associated with the base station; a broadcast channel associated with the base station; timing information associated with the base station; frequency information associated with the base station; cell identifier (ID) of the base station; channel condition measurements associated with the base station; one or more network parameters associated with the base station; paging information associated with one or more user equipment (UE) served by the base station; and upcoming traffic information associated with the one or more UE served by the base station. 11. The method of claim 5, wherein the control-reference transmission includes a clear channel assessment exempt transmission (CET). 12. A method of wireless communication, comprising: determining a schedule of a downlink control-reference transmission from a serving base station over an unlicensed carrier, transmitting a channel reserving signal over the unlicensed carrier prior to a next control-reference transmission according to the schedule; and receiving the next control-reference transmission over the unlicensed carrier. 13. The method of claim 12, wherein the schedule includes a location within a scheduled control-reference transmission window for transmission of the downlink control-reference transmission over the unlicensed carrier, wherein the location is based on a hopping function known to a user equipment (UE). 14. The method of claim 13, wherein the hopping function includes a randomized pattern. 15. The method of claim 12, wherein the channel reserving signals include at least one of: a channel usage beacon signal (CUBS); a request to send (RTS) signal; or a clear to send (CTS) signal. 16. The method of claim 12, further including: determining a failure to decode a previous control-reference transmission according to the schedule of the downlink control-reference transmission, wherein the transmitting the channel reserving signal is performed in response to the failure. 17. The method of claim 12, further including: monitoring a signal quality for each attempt to decode a paging occasion; and determining a low signal quality metric representing each time the signal quality failed to meet a decoding threshold level, wherein the transmitting the channel reserving signal is performed in response to the low signal quality metric exceeding a predetermined threshold. 18. The method of claim 12, further including: monitoring a failure rate of decoding a control-reference transmission according to the schedule of the downlink control-reference transmission; and adjusting a transmission power of the signal reserving signal based, at least in part, on the failure rate. 19. The method of claim 12, wherein the downlink control-reference transmission includes a clear channel assessment exempt transmission (CET). 20. A method of wireless communication, comprising: determining an expected duration of an uplink control-reference transmission reception for an expected uplink control-reference transmission transmitted from a user equipment (UE) served by a base station; transmitting a protection signal, wherein the protection signal identifies a protection duration of at least the duration of the expected duration of the uplink control-reference transmission reception; and monitoring for the expected uplink control-reference transmission. 21. The method of claim 20, further including: performing a clear channel assessment (CCA) on an unlicensed carrier; and transmitting a downlink control-reference transmission, wherein the control-reference transmission is transmitted in response to the CCA indicating the unlicensed carrier is clear, and wherein the protection signal is transmitted after the downlink control-reference transmission, but before the expected uplink control-reference transmission. 22. The method of claim 20, further including: determining a duration of a downlink control-reference transmission, wherein the expected duration identified by the protection signal further includes the duration of the downlink control-reference transmission. 23. The method of claim 20, wherein the protection signal includes at least one of: a request to send (RTS) signal; or a clear to send (CTS) signal. 24. The method of claim 20, wherein the control-reference transmission includes a clear channel assessment exempt transmission (CET). 25. An apparatus configured for wireless communication, comprising: means for generating a control-reference transmission using network information; means for transmitting a channel reserving signals on an unlicensed carrier, prior to a scheduled transmission time of the control-reference transmission; and means for transmitting the control-reference transmission on the unlicensed carrier at the scheduled transmission time. 26. The apparatus of claim 25, further comprising means for performing a clear channel assessment (CCA) on the unlicensed carrier, wherein the means for transmitting the channel reserving signals are executed in response to the CCA indicating the unlicensed carrier is clear, and wherein the channel reserving signals include at least one of: a channel usage beacon signal (CUBS); a request to send (RTS) signal; or a clear to send (CTS) signal. 27. The apparatus of claim 25, wherein the network information includes one or more of: synchronization information associated with a base station; a common reference signal (CRS) associated with the base station; a broadcast channel associated with the base station; timing information associated with the base station; frequency information associated with the base station; cell identifier (ID) of the base station; channel condition measurements associated with the base station; one or more network parameters associated with the base station; paging information associated with one or more user equipment (UE) served by the base station; and upcoming traffic information associated with the one or more UE served by the base station. 28. The apparatus of claim 25, wherein the control-reference transmission includes a clear channel assessment exempt transmission (CET). 29. An apparatus configured for wireless communication, comprising: means for generating a control-reference transmission using network information; means for selecting a location within a scheduled control-reference transmission window for transmission of the control-reference transmission over an unlicensed carrier; and means for transmitting the control-reference transmission on the unlicensed carrier at the location within the scheduled control-reference transmission window. 30. The apparatus of claim 29, further comprising means for performing a clear channel assessment (CCA) on the unlicensed carrier, wherein the means for transmitting the control-reference transmission are executed in response to the CCA indicating the unlicensed carrier is clear. 31. The apparatus of claim 29, wherein the location is selected based on a hopping function. 32. The apparatus of claim 31, wherein the hopping function is predefined for each public land mobile number (PLMN) to which a base station is associated. 33. The apparatus of claim 31, wherein the hopping function includes a randomized pattern known to a user equipment (UE). 34. The apparatus of claim 29, wherein the network information includes one or more of: synchronization information associated with a base station; a common reference signal (CRS) associated with the base station; a broadcast channel associated with the base station; timing information associated with the base station; frequency information associated with the base station; cell identifier (ID) of the base station; channel condition measurements associated with the base station; one or more network parameters associated with the base station; paging information associated with one or more user equipment (UE) served by the base station; and upcoming traffic information associated with the one or more UE served by the base station. 35. The apparatus of claim 29, wherein the control-reference transmission includes a clear channel assessment exempt transmission (CET). 36. An apparatus configured for wireless communication, comprising: means for determining a schedule of a downlink control-reference transmission from a serving base station over an unlicensed carrier; means for transmitting a channel reserving signal over the unlicensed carrier prior to a next control-reference transmission according to the schedule; and means for receiving the next control-reference transmission over the unlicensed carrier. 37. The apparatus of claim 36, wherein the schedule includes a location within a scheduled control-reference transmission window for transmission of the control-reference transmission over the unlicensed carrier, wherein the location is based on a hopping function known to a user equipment (UE). 38. The apparatus of claim 37, wherein the hopping function includes a randomized pattern. 39. The apparatus of claim 36, wherein the channel reserving signals include at least one of: a channel usage beacon signal (CUBS); a request to send (RTS) signal; or a clear to send (CTS) signal. 40. The apparatus of claim 36, further including: means for determining a failure to decode a previous control-reference transmission according to the schedule of the downlink control-reference transmission, wherein the means for transmitting the channel reserving signal is performed in response to the failure. 41. The apparatus of claim 36, further including: means for monitoring a signal quality for each attempt to decode a paging occasion; and means for determining a low signal quality metric representing each time the signal quality failed to meet a decoding threshold level, wherein the means for transmitting the channel reserving signal is performed in response to the low signal quality metric exceeding a predetermined threshold. 42. The apparatus of claim 36, further including: means for monitoring a failure rate of decoding a control-reference transmission according to the schedule of the downlink control-reference transmission; and means for adjusting a transmission power of the signal reserving signal based, at least in part, on the failure rate. 43. The apparatus of claim 36, wherein the control-reference transmission includes a clear channel assessment exempt transmission (CET). 44. An apparatus configured for wireless communication, comprising: means for determining an expected duration of an uplink control-reference transmission reception for an expected uplink control-reference transmission transmitted from a user equipment (UE) served by a base station; means for transmitting a protection signal, wherein the protection signal identifies a protection duration of at least the duration of the expected duration of the uplink control-reference transmission reception; and means for monitoring for the expected uplink control-reference transmission. 45. The apparatus of claim 44, further including: means for performing a clear channel assessment (CCA) on an unlicensed carrier; and means for transmitting a downlink control-reference transmission, wherein the control-reference transmission is transmitted in response to the CCA indicating the unlicensed carrier is clear, wherein the protection signal is transmitted after the downlink control-reference transmission, but before the expected uplink control-reference transmission. 46. The apparatus of claim 44, further including: means for determining a duration of a downlink control-reference transmission, wherein the protection duration identified by the protection signal further includes the duration of the downlink control-reference transmission. 47. The apparatus of claim 44, wherein the protection signal includes at least one of: a request to send (RTS) signal; or a clear to send (CTS) signal. 48. The apparatus of claim 44, wherein the control-reference transmission includes a clear channel assessment exempt transmission (CET). 49. A non-transitory computer-readable medium having program code recorded thereon, the program code including: program code for causing a computer to generate a control-reference transmission using network information; program code for causing the computer to transmit a channel reserving signals on an unlicensed carrier, prior to a scheduled transmission time of the control-reference transmission; and program code for causing the computer to transmit the control-reference transmission on the unlicensed carrier at the scheduled transmission time. 50. The non-transitory computer-readable medium of claim 49, further comprising program code for causing the computer to perform a clear channel assessment (CCA) on the unlicensed carrier, wherein the program code for causing the computer to transmit the channel reserving signals is executed in response to the CCA indicating the unlicensed carrier is clear, and wherein the channel reserving signals include at least one of: a channel usage beacon signal (CUBS); a request to send (RTS) signal; or a clear to send (CTS) signal. 51. The non-transitory computer-readable medium of claim 49, wherein the network information includes one or more of: synchronization information associated with a base station; a common reference signal (CRS) associated with the base station; a broadcast channel associated with the base station; timing information associated with the base station; frequency information associated with the base station; cell identifier (ID) of the base station; channel condition measurements associated with the base station; one or more network parameters associated with the base station; paging information associated with one or more user equipment (UE) served by the base station; and upcoming traffic information associated with the one or more UE served by the base station. 52. The non-transitory computer-readable medium of claim 49, wherein the control-reference transmission includes a clear channel assessment exempt transmission (CET). 53. A non-transitory computer-readable medium having program code recorded thereon, the program code including: program code for causing a computer to generate a control-reference transmission using network information; program code for causing the computer to select a location within a scheduled control-reference transmission window for transmission of a control-reference transmission over an unlicensed carrier; and program code for causing the computer to transmit the control-reference transmission on the unlicensed carrier at the location Within the scheduled control-reference transmission window. 54. The non-transitory computer-readable medium of claim 53, further comprising program code for causing the computer to perform a clear channel assessment (CCA) on the unlicensed carrier, wherein the program code for causing the computer to transmit the control-reference transmission is executed in response to the CCA indicating the unlicensed carrier is clear 55. The non-transitory computer-readable medium of claim 53, wherein the location is selected based on a hopping function. 56. The non-transitory computer-readable medium of claim 55, wherein the hopping function is predefined for each public land mobile number (PLMN) to which a base station is associated. 57. The non-transitory computer-readable medium of claim 55, wherein the hopping function includes a randomized pattern known to a user equipment (UE). 58. The non-transitory computer-readable medium of claim 53, wherein the network information includes one or more of: synchronization information associated with a base station; a common reference signal (CRS) associated with the base station; a broadcast channel associated with the base station; timing information associated with the base station; frequency information associated with the base station; cell identifier (ID) of the base station; channel condition measurements associated with the base station; one or more network parameters associated with the base station; paging information associated with one or more user equipment (UE) served by the base station; and upcoming traffic information associated with the one or more UE served by the base station. 59. The non-transitory computer-readable medium of claim 53, wherein the control-reference transmission includes a clear channel assessment exempt transmission (CET). 60. A non-transitory computer-readable medium having program code recorded thereon, the program code including: program code for causing a computer to determine a schedule of downlink control-reference transmission from a serving base station over an unlicensed carrier; program code for causing the computer to transmit a channel reserving signal over the unlicensed carrier prior to a next control-reference transmission according to the schedule; and program code for causing the computer to receive the next control-reference transmission over the unlicensed carrier. 61. The non-transitory computer-readable medium of claim 60, wherein the schedule includes a location within a scheduled control-reference transmission window for transmission of the control-reference transmission over the unlicensed carrier, wherein the location is based on a hopping function known to a user equipment (UE). 62. The non-transitory computer-readable medium of claim 61, wherein the hopping function includes a randomized pattern. 63. The non-transitory computer-readable medium of claim 60, wherein the channel reserving signals include at least one of: a channel usage beacon signal (CUBS); a request to send (RTS) signal; or a clear to send (CTS) signal. 64. The non-transitory computer-readable medium of claim 60, further including: program code for causing the computer to determine a failure to decode a previous control-reference transmission according to the schedule of the downlink control-reference transmission, wherein the program code for causing the computer to transmit the channel reserving signal is executed in response to the failure. 65. The non-transitory computer-readable medium of claim 60, further including: program code for causing the computer to monitor a signal quality for each attempt to decode a paging occasion; and program code for causing the computer to determine a low signal quality metric representing each time the signal quality failed to meet a decoding threshold level, wherein the program code for causing the computer to transmit the channel reserving signal is executed in response to the low signal quality metric exceeding a predetermined threshold. 66. The non-transitory computer-readable medium of claim 60, further including: program code for causing the computer to monitor a failure rate of decoding a control-reference transmission according to the schedule of the downlink control-reference transmission; and program code for causing the computer to adjust a transmission power of the signal reserving signal based, at least in part, on the failure rate. 67. The non-transitory computer-readable medium of claim 60, wherein the control-reference transmission includes a clear channel assessment exempt transmission (CET). 68. A non-transitory computer-readable medium having program code recorded thereon, the program code including: program code for causing a computer to determine an expected duration of an uplink control-reference transmission reception for an expected uplink control-reference transmission transmitted from a user equipment (UE) served by a base station; program code for causing the computer to transmit a protection signal, wherein the protection signal identifies a protection duration of at least the duration of the expected duration of the uplink control-reference transmission reception; and program code for causing the computer to monitor for the expected uplink control-reference transmission. 69. The non-transitory computer-readable medium of claim 68, further including: program code for causing the computer to perform a clear channel assessment (CCA) on the unlicensed carrier; and program code for causing the computer to transmit a downlink control-reference transmission, wherein the program code for causing the computer to transmit the control-reference transmission is executed in response to the CCA indicating the unlicensed carrier is clear, and wherein the protection signal is transmitted after the downlink control-reference transmission, but before the expected uplink control-reference transmission. 70. The non-transitory computer-readable medium of claim 68, further including: program code for causing the computer to determine a duration of a downlink control-reference transmission, wherein the expected duration identified by the protection signal further includes the duration of the downlink control-reference transmission. 71. The non-transitory computer-readable medium of claim 68, wherein the protection signal includes at least one of: a request to send (RTS) signal; or a clear to send (CTS) signal. 72. The non-transitory computer-readable medium of claim 68, wherein the control-reference transmission includes a clear channel assessment exempt transmission (CET). 73. An apparatus configured for wireless communication, the apparatus comprising: at least one processor; and a memory coupled to the at least one processor, wherein the at least one processor is configured: to generate a control-reference transmission using network information; to transmit a channel reserving signals on an unlicensed carrier, prior to a scheduled transmission time of the control-reference transmission; and to transmit the control-reference transmission on the unlicensed carrier at the scheduled transmission time. 74. The apparatus of claim 73, further comprising configuration of the at least one processor to perform a clear channel assessment (CCA) on the unlicensed carrier, wherein the channel reserving signals are transmitted in response to the CCA indicating the unlicensed carrier is clear, and wherein the channel reserving signals include at least one of: a channel usage beacon signal (CUBS); a request to send (RTS) signal; or a clear to send (CTS) signal. 75. The apparatus of claim 73, wherein the network information includes one or more of: synchronization information associated with a base station; a common reference signal (CRS) associated with the base station; a broadcast channel associated with the base station; timing information associated with the base station; frequency information associated with the base station; cell identifier (ID) of the base station; channel condition measurements associated with the base station; one or more network parameters associated with the base station; paging information associated with one or more user equipment (UE) served by the base station; and upcoming traffic information associated with the one or more UE served by the base station. 76. The apparatus of claim 73, wherein the control-reference transmission includes a clear channel assessment exempt transmission (CET). 77. An apparatus configured for wireless communication, the apparatus comprising: at least one processor, and a memory coupled to the at least one processor, wherein the at least one processor is configured: to generate a control-reference transmission using network information; to select a location within a scheduled control-reference transmission window for transmission of the control-reference transmission over an unlicensed carrier; and to transmit the control-reference transmission on the unlicensed carrier at the location within the scheduled control-reference transmission window. 78. The apparatus of claim 77, further comprising configuration of the at least one processor to perform a clear channel assessment (CCA) on the unlicensed carrier, wherein the control-reference transmission is transmitted in response to the CCA indicating the unlicensed carrier is clear 79. The apparatus of claim 77, wherein the location is selected based on a hopping function. 80. The apparatus of claim 79, wherein the hopping function is predefined for each public land mobile number (PLMN) to which a base station is associated. 81. The apparatus of claim 79, wherein the hopping function includes a randomized pattern known to a user equipment (UE). 82. The apparatus of claim 77, wherein the network information includes one or more of: synchronization information associated with a base station; a common reference signal (CRS) associated with the base station; a broadcast channel associated with the base station; timing information associated with the base station; frequency information associated with the base station; cell identifier (ID) of the base station; channel condition measurements associated with the base station; one or more network parameters associated with the base station; paging information associated with one or more user equipment (UE) served by the base station; and upcoming traffic information associated with the one or more UE served by the base station. 83. The apparatus of claim 77, wherein the control-reference transmission includes a clear channel assessment exempt transmission (CET). 84. An apparatus configured for wireless communication, the apparatus comprising: at least one processor; and a memory coupled to the at least one processor, wherein the at least one processor is configured: to determine a schedule of a downlink control-reference transmission from a serving base station over an unlicensed carrier, to transmit a channel reserving signal over the unlicensed carrier prior to a next control-reference transmission according to the schedule; and to receive the next control-reference transmission over the unlicensed carrier. 85. The apparatus of claim 84, wherein the schedule includes a location within a scheduled control-reference transmission window for transmission of the downlink control-reference transmission over the unlicensed carrier, wherein the location is based on a hopping function known to a user equipment (UE). 86. The apparatus of claim 85, wherein the hopping function includes a randomized pattern. 87. The apparatus of claim 84, wherein the channel reserving signals include at least one of: a channel usage beacon signal (CUBS); a request to send (RTS) signal; or a clear to send (CTS) signal. 88. The apparatus of claim 84, further including configuration of the at least one processor to determine a failure to decode a previous control-reference transmission according to the schedule of the downlink control-reference transmission, wherein the configuration of the at least one processor to transmit the channel reserving signal is performed in response to the failure. 89. The apparatus of claim 84, further including configuration of the at least one processor: to monitor a signal quality for each attempt to decode a paging occasion; and to determine a low signal quality metric representing each time the signal quality failed to meet a decoding threshold level, wherein the configuration of the at least one processor to transmit the channel reserving signal is performed in response to the low signal quality metric exceeding a predetermined threshold. 90. The apparatus of claim 84, further including configuration of the at least one processor: to monitor a failure rate of decoding a control-reference transmission according to the schedule of the downlink control-reference transmission; and to adjust a transmission power of the signal reserving signal based, at least in part, on the failure rate. 91. The apparatus of claim 84, wherein the control-reference transmission includes a clear channel assessment exempt transmission (CET). 92. An apparatus configured for wireless communication, the apparatus comprising: at least one processor; and a memory coupled to the at least one processor, wherein the at least one processor is configured: to determine an expected duration of an uplink control-reference transmission reception for an expected uplink control-reference transmission transmitted from a user equipment (UE) served by a base station; to transmit a protection signal, wherein the protection signal identifies a protection duration of at least the duration of the expected duration of the uplink control-reference transmission reception; and to monitor for the expected uplink control-reference transmission. 93. The apparatus of claim 92, further including configuration of the at least one processor: to perform a clear channel assessment (CCA) on the unlicensed carrier; and to transmit a downlink control-reference transmission, wherein the control-reference transmission is transmitted in response to the CCA indicating the unlicensed carrier is clear, and wherein the protection signal is transmitted after the downlink control-reference transmission, but before the expected uplink control-reference transmission. 94. The apparatus of claim 92, further including configuration of the at least one processor to determine a duration of a downlink control-reference transmission, wherein the expected duration identified by the protection signal further includes the duration of the downlink control-reference transmission. 95. The apparatus of claim 92, wherein the protection signal includes at least one of: a request to send (RTS) signal; or a clear to send (CTS) signal. 96. The apparatus of claim 92, wherein the control-reference transmission includes a clear channel assessment exempt transmission (CET).
Protection of transmission and reception of clear channel assessment (CCA)-exempt transmission (CET) is disclosed in which channel reserving signals or protection signals may be transmitted by the transmitter or receiver of the CET. The transmitted signals may be received by the neighboring access points that could potentially cause interference with the reception of the CET.1. A method of wireless communication, comprising: generating a control-reference transmission using network information; transmitting a channel reserving signals on an unlicensed carrier, prior to a scheduled transmission time of the control-reference transmission; and transmitting the control-reference transmission on the unlicensed carrier at the scheduled transmission time. 2. The method of claim 1, further comprising performing a clear channel assessment (CCA) on the unlicensed carrier, wherein the channel reserving signals are transmitted in response to the CCA indicating the unlicensed carrier is clear, and wherein the channel reserving signals include at least one of: a channel usage beacon signal (CUBS); a request to send (RTS) signal; or a clear to send (CTS) signal. 3. The method of claim 1, wherein the network information includes one or more of: synchronization information associated with a base station; a common reference signal (CRS) associated with the base station; a broadcast channel associated with the base station; timing information associated with the base station; frequency information associated with the base station; cell identifier (ID) of the base station; channel condition measurements associated with the base station; one or more network parameters associated with the base station; paging information associated with one or more user equipment (UE) served by the base station; and upcoming traffic information associated with the one or more UE served by the base station. 4. The method of claim 1, wherein the control-reference transmission includes a clear channel assessment exempt transmission (CET). 5. A method of wireless communication, comprising: generating a control-reference transmission using network information; selecting a location within a scheduled control-reference transmission window for transmission of the control-reference transmission over an unlicensed carrier; and transmitting the control-reference transmission on the unlicensed carrier at the location within the scheduled control-reference transmission window. 6. The method of claim 5, further comprising performing a clear channel assessment (CCA) on the unlicensed carrier, wherein the control-reference transmission is transmitted in response to the CCA indicating the unlicensed carrier is clear 7. The method of claim 5, wherein the location is selected based on a hopping function. 8. The method of claim 7, wherein the hopping function is predefined for each public land mobile number (PLMN) to which a base station is associated. 9. The method of claim 7, wherein the hopping function includes a randomized pattern known to a user equipment (UE). 10. The method of claim 5, wherein the network information includes one or more of: synchronization information associated with a base station; a common reference signal (CRS) associated with the base station; a broadcast channel associated with the base station; timing information associated with the base station; frequency information associated with the base station; cell identifier (ID) of the base station; channel condition measurements associated with the base station; one or more network parameters associated with the base station; paging information associated with one or more user equipment (UE) served by the base station; and upcoming traffic information associated with the one or more UE served by the base station. 11. The method of claim 5, wherein the control-reference transmission includes a clear channel assessment exempt transmission (CET). 12. A method of wireless communication, comprising: determining a schedule of a downlink control-reference transmission from a serving base station over an unlicensed carrier, transmitting a channel reserving signal over the unlicensed carrier prior to a next control-reference transmission according to the schedule; and receiving the next control-reference transmission over the unlicensed carrier. 13. The method of claim 12, wherein the schedule includes a location within a scheduled control-reference transmission window for transmission of the downlink control-reference transmission over the unlicensed carrier, wherein the location is based on a hopping function known to a user equipment (UE). 14. The method of claim 13, wherein the hopping function includes a randomized pattern. 15. The method of claim 12, wherein the channel reserving signals include at least one of: a channel usage beacon signal (CUBS); a request to send (RTS) signal; or a clear to send (CTS) signal. 16. The method of claim 12, further including: determining a failure to decode a previous control-reference transmission according to the schedule of the downlink control-reference transmission, wherein the transmitting the channel reserving signal is performed in response to the failure. 17. The method of claim 12, further including: monitoring a signal quality for each attempt to decode a paging occasion; and determining a low signal quality metric representing each time the signal quality failed to meet a decoding threshold level, wherein the transmitting the channel reserving signal is performed in response to the low signal quality metric exceeding a predetermined threshold. 18. The method of claim 12, further including: monitoring a failure rate of decoding a control-reference transmission according to the schedule of the downlink control-reference transmission; and adjusting a transmission power of the signal reserving signal based, at least in part, on the failure rate. 19. The method of claim 12, wherein the downlink control-reference transmission includes a clear channel assessment exempt transmission (CET). 20. A method of wireless communication, comprising: determining an expected duration of an uplink control-reference transmission reception for an expected uplink control-reference transmission transmitted from a user equipment (UE) served by a base station; transmitting a protection signal, wherein the protection signal identifies a protection duration of at least the duration of the expected duration of the uplink control-reference transmission reception; and monitoring for the expected uplink control-reference transmission. 21. The method of claim 20, further including: performing a clear channel assessment (CCA) on an unlicensed carrier; and transmitting a downlink control-reference transmission, wherein the control-reference transmission is transmitted in response to the CCA indicating the unlicensed carrier is clear, and wherein the protection signal is transmitted after the downlink control-reference transmission, but before the expected uplink control-reference transmission. 22. The method of claim 20, further including: determining a duration of a downlink control-reference transmission, wherein the expected duration identified by the protection signal further includes the duration of the downlink control-reference transmission. 23. The method of claim 20, wherein the protection signal includes at least one of: a request to send (RTS) signal; or a clear to send (CTS) signal. 24. The method of claim 20, wherein the control-reference transmission includes a clear channel assessment exempt transmission (CET). 25. An apparatus configured for wireless communication, comprising: means for generating a control-reference transmission using network information; means for transmitting a channel reserving signals on an unlicensed carrier, prior to a scheduled transmission time of the control-reference transmission; and means for transmitting the control-reference transmission on the unlicensed carrier at the scheduled transmission time. 26. The apparatus of claim 25, further comprising means for performing a clear channel assessment (CCA) on the unlicensed carrier, wherein the means for transmitting the channel reserving signals are executed in response to the CCA indicating the unlicensed carrier is clear, and wherein the channel reserving signals include at least one of: a channel usage beacon signal (CUBS); a request to send (RTS) signal; or a clear to send (CTS) signal. 27. The apparatus of claim 25, wherein the network information includes one or more of: synchronization information associated with a base station; a common reference signal (CRS) associated with the base station; a broadcast channel associated with the base station; timing information associated with the base station; frequency information associated with the base station; cell identifier (ID) of the base station; channel condition measurements associated with the base station; one or more network parameters associated with the base station; paging information associated with one or more user equipment (UE) served by the base station; and upcoming traffic information associated with the one or more UE served by the base station. 28. The apparatus of claim 25, wherein the control-reference transmission includes a clear channel assessment exempt transmission (CET). 29. An apparatus configured for wireless communication, comprising: means for generating a control-reference transmission using network information; means for selecting a location within a scheduled control-reference transmission window for transmission of the control-reference transmission over an unlicensed carrier; and means for transmitting the control-reference transmission on the unlicensed carrier at the location within the scheduled control-reference transmission window. 30. The apparatus of claim 29, further comprising means for performing a clear channel assessment (CCA) on the unlicensed carrier, wherein the means for transmitting the control-reference transmission are executed in response to the CCA indicating the unlicensed carrier is clear. 31. The apparatus of claim 29, wherein the location is selected based on a hopping function. 32. The apparatus of claim 31, wherein the hopping function is predefined for each public land mobile number (PLMN) to which a base station is associated. 33. The apparatus of claim 31, wherein the hopping function includes a randomized pattern known to a user equipment (UE). 34. The apparatus of claim 29, wherein the network information includes one or more of: synchronization information associated with a base station; a common reference signal (CRS) associated with the base station; a broadcast channel associated with the base station; timing information associated with the base station; frequency information associated with the base station; cell identifier (ID) of the base station; channel condition measurements associated with the base station; one or more network parameters associated with the base station; paging information associated with one or more user equipment (UE) served by the base station; and upcoming traffic information associated with the one or more UE served by the base station. 35. The apparatus of claim 29, wherein the control-reference transmission includes a clear channel assessment exempt transmission (CET). 36. An apparatus configured for wireless communication, comprising: means for determining a schedule of a downlink control-reference transmission from a serving base station over an unlicensed carrier; means for transmitting a channel reserving signal over the unlicensed carrier prior to a next control-reference transmission according to the schedule; and means for receiving the next control-reference transmission over the unlicensed carrier. 37. The apparatus of claim 36, wherein the schedule includes a location within a scheduled control-reference transmission window for transmission of the control-reference transmission over the unlicensed carrier, wherein the location is based on a hopping function known to a user equipment (UE). 38. The apparatus of claim 37, wherein the hopping function includes a randomized pattern. 39. The apparatus of claim 36, wherein the channel reserving signals include at least one of: a channel usage beacon signal (CUBS); a request to send (RTS) signal; or a clear to send (CTS) signal. 40. The apparatus of claim 36, further including: means for determining a failure to decode a previous control-reference transmission according to the schedule of the downlink control-reference transmission, wherein the means for transmitting the channel reserving signal is performed in response to the failure. 41. The apparatus of claim 36, further including: means for monitoring a signal quality for each attempt to decode a paging occasion; and means for determining a low signal quality metric representing each time the signal quality failed to meet a decoding threshold level, wherein the means for transmitting the channel reserving signal is performed in response to the low signal quality metric exceeding a predetermined threshold. 42. The apparatus of claim 36, further including: means for monitoring a failure rate of decoding a control-reference transmission according to the schedule of the downlink control-reference transmission; and means for adjusting a transmission power of the signal reserving signal based, at least in part, on the failure rate. 43. The apparatus of claim 36, wherein the control-reference transmission includes a clear channel assessment exempt transmission (CET). 44. An apparatus configured for wireless communication, comprising: means for determining an expected duration of an uplink control-reference transmission reception for an expected uplink control-reference transmission transmitted from a user equipment (UE) served by a base station; means for transmitting a protection signal, wherein the protection signal identifies a protection duration of at least the duration of the expected duration of the uplink control-reference transmission reception; and means for monitoring for the expected uplink control-reference transmission. 45. The apparatus of claim 44, further including: means for performing a clear channel assessment (CCA) on an unlicensed carrier; and means for transmitting a downlink control-reference transmission, wherein the control-reference transmission is transmitted in response to the CCA indicating the unlicensed carrier is clear, wherein the protection signal is transmitted after the downlink control-reference transmission, but before the expected uplink control-reference transmission. 46. The apparatus of claim 44, further including: means for determining a duration of a downlink control-reference transmission, wherein the protection duration identified by the protection signal further includes the duration of the downlink control-reference transmission. 47. The apparatus of claim 44, wherein the protection signal includes at least one of: a request to send (RTS) signal; or a clear to send (CTS) signal. 48. The apparatus of claim 44, wherein the control-reference transmission includes a clear channel assessment exempt transmission (CET). 49. A non-transitory computer-readable medium having program code recorded thereon, the program code including: program code for causing a computer to generate a control-reference transmission using network information; program code for causing the computer to transmit a channel reserving signals on an unlicensed carrier, prior to a scheduled transmission time of the control-reference transmission; and program code for causing the computer to transmit the control-reference transmission on the unlicensed carrier at the scheduled transmission time. 50. The non-transitory computer-readable medium of claim 49, further comprising program code for causing the computer to perform a clear channel assessment (CCA) on the unlicensed carrier, wherein the program code for causing the computer to transmit the channel reserving signals is executed in response to the CCA indicating the unlicensed carrier is clear, and wherein the channel reserving signals include at least one of: a channel usage beacon signal (CUBS); a request to send (RTS) signal; or a clear to send (CTS) signal. 51. The non-transitory computer-readable medium of claim 49, wherein the network information includes one or more of: synchronization information associated with a base station; a common reference signal (CRS) associated with the base station; a broadcast channel associated with the base station; timing information associated with the base station; frequency information associated with the base station; cell identifier (ID) of the base station; channel condition measurements associated with the base station; one or more network parameters associated with the base station; paging information associated with one or more user equipment (UE) served by the base station; and upcoming traffic information associated with the one or more UE served by the base station. 52. The non-transitory computer-readable medium of claim 49, wherein the control-reference transmission includes a clear channel assessment exempt transmission (CET). 53. A non-transitory computer-readable medium having program code recorded thereon, the program code including: program code for causing a computer to generate a control-reference transmission using network information; program code for causing the computer to select a location within a scheduled control-reference transmission window for transmission of a control-reference transmission over an unlicensed carrier; and program code for causing the computer to transmit the control-reference transmission on the unlicensed carrier at the location Within the scheduled control-reference transmission window. 54. The non-transitory computer-readable medium of claim 53, further comprising program code for causing the computer to perform a clear channel assessment (CCA) on the unlicensed carrier, wherein the program code for causing the computer to transmit the control-reference transmission is executed in response to the CCA indicating the unlicensed carrier is clear 55. The non-transitory computer-readable medium of claim 53, wherein the location is selected based on a hopping function. 56. The non-transitory computer-readable medium of claim 55, wherein the hopping function is predefined for each public land mobile number (PLMN) to which a base station is associated. 57. The non-transitory computer-readable medium of claim 55, wherein the hopping function includes a randomized pattern known to a user equipment (UE). 58. The non-transitory computer-readable medium of claim 53, wherein the network information includes one or more of: synchronization information associated with a base station; a common reference signal (CRS) associated with the base station; a broadcast channel associated with the base station; timing information associated with the base station; frequency information associated with the base station; cell identifier (ID) of the base station; channel condition measurements associated with the base station; one or more network parameters associated with the base station; paging information associated with one or more user equipment (UE) served by the base station; and upcoming traffic information associated with the one or more UE served by the base station. 59. The non-transitory computer-readable medium of claim 53, wherein the control-reference transmission includes a clear channel assessment exempt transmission (CET). 60. A non-transitory computer-readable medium having program code recorded thereon, the program code including: program code for causing a computer to determine a schedule of downlink control-reference transmission from a serving base station over an unlicensed carrier; program code for causing the computer to transmit a channel reserving signal over the unlicensed carrier prior to a next control-reference transmission according to the schedule; and program code for causing the computer to receive the next control-reference transmission over the unlicensed carrier. 61. The non-transitory computer-readable medium of claim 60, wherein the schedule includes a location within a scheduled control-reference transmission window for transmission of the control-reference transmission over the unlicensed carrier, wherein the location is based on a hopping function known to a user equipment (UE). 62. The non-transitory computer-readable medium of claim 61, wherein the hopping function includes a randomized pattern. 63. The non-transitory computer-readable medium of claim 60, wherein the channel reserving signals include at least one of: a channel usage beacon signal (CUBS); a request to send (RTS) signal; or a clear to send (CTS) signal. 64. The non-transitory computer-readable medium of claim 60, further including: program code for causing the computer to determine a failure to decode a previous control-reference transmission according to the schedule of the downlink control-reference transmission, wherein the program code for causing the computer to transmit the channel reserving signal is executed in response to the failure. 65. The non-transitory computer-readable medium of claim 60, further including: program code for causing the computer to monitor a signal quality for each attempt to decode a paging occasion; and program code for causing the computer to determine a low signal quality metric representing each time the signal quality failed to meet a decoding threshold level, wherein the program code for causing the computer to transmit the channel reserving signal is executed in response to the low signal quality metric exceeding a predetermined threshold. 66. The non-transitory computer-readable medium of claim 60, further including: program code for causing the computer to monitor a failure rate of decoding a control-reference transmission according to the schedule of the downlink control-reference transmission; and program code for causing the computer to adjust a transmission power of the signal reserving signal based, at least in part, on the failure rate. 67. The non-transitory computer-readable medium of claim 60, wherein the control-reference transmission includes a clear channel assessment exempt transmission (CET). 68. A non-transitory computer-readable medium having program code recorded thereon, the program code including: program code for causing a computer to determine an expected duration of an uplink control-reference transmission reception for an expected uplink control-reference transmission transmitted from a user equipment (UE) served by a base station; program code for causing the computer to transmit a protection signal, wherein the protection signal identifies a protection duration of at least the duration of the expected duration of the uplink control-reference transmission reception; and program code for causing the computer to monitor for the expected uplink control-reference transmission. 69. The non-transitory computer-readable medium of claim 68, further including: program code for causing the computer to perform a clear channel assessment (CCA) on the unlicensed carrier; and program code for causing the computer to transmit a downlink control-reference transmission, wherein the program code for causing the computer to transmit the control-reference transmission is executed in response to the CCA indicating the unlicensed carrier is clear, and wherein the protection signal is transmitted after the downlink control-reference transmission, but before the expected uplink control-reference transmission. 70. The non-transitory computer-readable medium of claim 68, further including: program code for causing the computer to determine a duration of a downlink control-reference transmission, wherein the expected duration identified by the protection signal further includes the duration of the downlink control-reference transmission. 71. The non-transitory computer-readable medium of claim 68, wherein the protection signal includes at least one of: a request to send (RTS) signal; or a clear to send (CTS) signal. 72. The non-transitory computer-readable medium of claim 68, wherein the control-reference transmission includes a clear channel assessment exempt transmission (CET). 73. An apparatus configured for wireless communication, the apparatus comprising: at least one processor; and a memory coupled to the at least one processor, wherein the at least one processor is configured: to generate a control-reference transmission using network information; to transmit a channel reserving signals on an unlicensed carrier, prior to a scheduled transmission time of the control-reference transmission; and to transmit the control-reference transmission on the unlicensed carrier at the scheduled transmission time. 74. The apparatus of claim 73, further comprising configuration of the at least one processor to perform a clear channel assessment (CCA) on the unlicensed carrier, wherein the channel reserving signals are transmitted in response to the CCA indicating the unlicensed carrier is clear, and wherein the channel reserving signals include at least one of: a channel usage beacon signal (CUBS); a request to send (RTS) signal; or a clear to send (CTS) signal. 75. The apparatus of claim 73, wherein the network information includes one or more of: synchronization information associated with a base station; a common reference signal (CRS) associated with the base station; a broadcast channel associated with the base station; timing information associated with the base station; frequency information associated with the base station; cell identifier (ID) of the base station; channel condition measurements associated with the base station; one or more network parameters associated with the base station; paging information associated with one or more user equipment (UE) served by the base station; and upcoming traffic information associated with the one or more UE served by the base station. 76. The apparatus of claim 73, wherein the control-reference transmission includes a clear channel assessment exempt transmission (CET). 77. An apparatus configured for wireless communication, the apparatus comprising: at least one processor, and a memory coupled to the at least one processor, wherein the at least one processor is configured: to generate a control-reference transmission using network information; to select a location within a scheduled control-reference transmission window for transmission of the control-reference transmission over an unlicensed carrier; and to transmit the control-reference transmission on the unlicensed carrier at the location within the scheduled control-reference transmission window. 78. The apparatus of claim 77, further comprising configuration of the at least one processor to perform a clear channel assessment (CCA) on the unlicensed carrier, wherein the control-reference transmission is transmitted in response to the CCA indicating the unlicensed carrier is clear 79. The apparatus of claim 77, wherein the location is selected based on a hopping function. 80. The apparatus of claim 79, wherein the hopping function is predefined for each public land mobile number (PLMN) to which a base station is associated. 81. The apparatus of claim 79, wherein the hopping function includes a randomized pattern known to a user equipment (UE). 82. The apparatus of claim 77, wherein the network information includes one or more of: synchronization information associated with a base station; a common reference signal (CRS) associated with the base station; a broadcast channel associated with the base station; timing information associated with the base station; frequency information associated with the base station; cell identifier (ID) of the base station; channel condition measurements associated with the base station; one or more network parameters associated with the base station; paging information associated with one or more user equipment (UE) served by the base station; and upcoming traffic information associated with the one or more UE served by the base station. 83. The apparatus of claim 77, wherein the control-reference transmission includes a clear channel assessment exempt transmission (CET). 84. An apparatus configured for wireless communication, the apparatus comprising: at least one processor; and a memory coupled to the at least one processor, wherein the at least one processor is configured: to determine a schedule of a downlink control-reference transmission from a serving base station over an unlicensed carrier, to transmit a channel reserving signal over the unlicensed carrier prior to a next control-reference transmission according to the schedule; and to receive the next control-reference transmission over the unlicensed carrier. 85. The apparatus of claim 84, wherein the schedule includes a location within a scheduled control-reference transmission window for transmission of the downlink control-reference transmission over the unlicensed carrier, wherein the location is based on a hopping function known to a user equipment (UE). 86. The apparatus of claim 85, wherein the hopping function includes a randomized pattern. 87. The apparatus of claim 84, wherein the channel reserving signals include at least one of: a channel usage beacon signal (CUBS); a request to send (RTS) signal; or a clear to send (CTS) signal. 88. The apparatus of claim 84, further including configuration of the at least one processor to determine a failure to decode a previous control-reference transmission according to the schedule of the downlink control-reference transmission, wherein the configuration of the at least one processor to transmit the channel reserving signal is performed in response to the failure. 89. The apparatus of claim 84, further including configuration of the at least one processor: to monitor a signal quality for each attempt to decode a paging occasion; and to determine a low signal quality metric representing each time the signal quality failed to meet a decoding threshold level, wherein the configuration of the at least one processor to transmit the channel reserving signal is performed in response to the low signal quality metric exceeding a predetermined threshold. 90. The apparatus of claim 84, further including configuration of the at least one processor: to monitor a failure rate of decoding a control-reference transmission according to the schedule of the downlink control-reference transmission; and to adjust a transmission power of the signal reserving signal based, at least in part, on the failure rate. 91. The apparatus of claim 84, wherein the control-reference transmission includes a clear channel assessment exempt transmission (CET). 92. An apparatus configured for wireless communication, the apparatus comprising: at least one processor; and a memory coupled to the at least one processor, wherein the at least one processor is configured: to determine an expected duration of an uplink control-reference transmission reception for an expected uplink control-reference transmission transmitted from a user equipment (UE) served by a base station; to transmit a protection signal, wherein the protection signal identifies a protection duration of at least the duration of the expected duration of the uplink control-reference transmission reception; and to monitor for the expected uplink control-reference transmission. 93. The apparatus of claim 92, further including configuration of the at least one processor: to perform a clear channel assessment (CCA) on the unlicensed carrier; and to transmit a downlink control-reference transmission, wherein the control-reference transmission is transmitted in response to the CCA indicating the unlicensed carrier is clear, and wherein the protection signal is transmitted after the downlink control-reference transmission, but before the expected uplink control-reference transmission. 94. The apparatus of claim 92, further including configuration of the at least one processor to determine a duration of a downlink control-reference transmission, wherein the expected duration identified by the protection signal further includes the duration of the downlink control-reference transmission. 95. The apparatus of claim 92, wherein the protection signal includes at least one of: a request to send (RTS) signal; or a clear to send (CTS) signal. 96. The apparatus of claim 92, wherein the control-reference transmission includes a clear channel assessment exempt transmission (CET).
2,400
7,252
7,252
15,273,879
2,463
Methods for wirelessly transmitting user data and control information using a plurality of transmission layers include encoding bits of control information to form control codewords and encoding bits of user data to form user data codewords. The method also includes generating a plurality of vector symbols based on the control codewords and the user data codewords. Each vector symbol includes a plurality of modulation symbols that are each associated with a transmission layer over which the associated modulation symbol will be transmitted. Generating the plurality of vector symbols includes interleaving bits of the control codewords and bits of the user data codewords so that the control information is carried in modulation symbols associated with the same transmission layers in the vector symbols transmitted during the subframe that carry the control information. The method also includes transmitting the plurality of vector symbols to a receiver over a plurality of transmission layers.
1. A method for wirelessly transmitting user data and control information using a plurality of transmission layers, comprising: encoding bits of a first type of control information to form one or more control codewords of the first type of control information; encoding bits of a second type of control information to form one or more control codewords of the second type of control information; encoding bits of user data to form one or more user data codewords; generating a plurality of vector symbols based on the control codewords of the first type of control information, the control codewords of the second type of control information, and the user data codewords, each vector symbol comprising a plurality of modulation symbols that are each associated with a transmission layer over which the associated modulation symbol will be transmitted, wherein generating the plurality of vector symbols comprises interleaving bits of the one or more control codewords of the first type of control information, bits of the one or more control codewords of the second type of control information, and bits of the one or more user data codewords such that: the first type of control information is carried in modulation symbols associated with all transmission layers in vector symbols transmitted during the subframe that carry the first type of control information, and at least one of the generated vector symbols that carries control information of the second type also carries user data; and transmitting the plurality of vector symbols to a receiver over a plurality of transmission layers. 2. The method of claim 1, wherein the second type of control information comprises a channel quality indication (CQI) and a precoder matrix indication (PMI). 3. The method of claim 1, wherein the second type of control information comprises a channel quality indication (CQI) information. 4. The method of claim 1, wherein the second type of control information comprises a precoder matrix indication (PMI). 5. The method of claim 1, wherein generating the plurality of vector symbols comprises mapping bits of at least one control codeword to a vector symbol in a manner such that for each pair of neighboring bits in the control codeword a first bit of the pair is mapped to at least a first layer of a corresponding vector symbol and a second bit of the pair is mapped to at least a second layer of the corresponding vector symbol different from the first layer. 6. The method of claim 1, wherein generating the plurality of vector symbols comprises: segmenting at least one codeword into at least two segments; and mapping bits of a first segment of the control word to at least a first layer of a corresponding vector symbol; and mapping bits of a second segment of the control word to at least a second layer of the corresponding vector symbol different from the first layer. 7. The method of claim 1, wherein generating the plurality of vector symbols comprises generating at least one vector symbol by: replicating one or more bits of control information for transmission to a plurality of encoders; encoding the replicated control information in parallel at the plurality of encoders; and mapping the encoded control information onto every layer of the vector symbol. 8. The method of claim 1, wherein the first type of control codewords comprises codewords carrying Hybrid Automatic Repeat ReQuest (HARQ) bits and rank indication (RI) bits. 9. The method of claim 1, wherein the first type of control codewords comprises codewords carrying Hybrid Automatic Repeat ReQuest (HARQ) bits. 10. The method of claim 1, wherein the first type of control codewords comprises codewords carrying rank indication (RI) bits. 11. The method of claim 1, wherein interleaving bits of the one or more control codewords and bits of the one or more user data codewords comprises: multiplexing a first control codeword and a first user data codeword before interleaving the bits of the one or more control codewords and the bits of the one or more user data codewords; and interleaving bits of the multiplexed first control codeword and first user data codeword with bits of a second control codeword. 12. An apparatus for wirelessly transmitting user data and control information using a plurality of transmission layers, comprising: a plurality of antennas; a transceiver operable to transmit vector symbols over a plurality of transmission layers using the plurality of antennas; and a processor operable to: encode bits of a first type of control information to form one or more control codewords of the first type of control information; encode bits of a second type of control information to form one or more codewords of the second type of control information encode bits of user data to form one or more user data codewords; generate a plurality of vector symbols based on the control codewords of the first type of control information, the control codewords of the second type of control information, and the user data codewords, each vector symbol comprising a plurality of modulation symbols that are each associated with a transmission layer over which the associated modulation symbol will be transmitted, wherein generating the plurality of vector symbols comprises interleaving bits of the one or more control codewords of the first type of control information, bits of the one or more control codewords of the second type of control information, and bits of the one or more user data codewords such that: the first type of control information is carried in modulation symbols associated with all transmission layers in vector symbols transmitted during the subframe that carry the first type of control information, and at least one of the generated vector symbols that carries control information of the second type also carries user data; and transmit the plurality of vector symbols to a receiver over a plurality of transmission layers using the transceiver. 13. The apparatus of claim 12, wherein the second type of control information comprises a channel quality indication (CQI) and a precoder matrix indication (PMI). 14. The apparatus of claim 12, wherein the first type of control codewords comprises codewords carrying Hybrid Automatic Repeat ReQuest (HARQ) bits and codewords carrying Rank Indication (RI) bits. 15. The apparatus of claim 12, wherein the first type of control codewords comprises codewords carrying Hybrid Automatic Repeat ReQuest (HARQ) bits. 16. The apparatus of claim 12, wherein the first type of control codewords comprises codewords carrying rank indication (RI) bits. 17. The apparatus of claim 12, wherein the second type of control information comprises a channel quality indication (CQI). 18. The apparatus of claim 12, wherein the second type of control information comprises a precoder matrix indication (PMI). 19. The apparatus of claim 12, wherein the plurality of vector symbols is transmitted to the receiver over a physical uplink shared channel (PUSCH).
Methods for wirelessly transmitting user data and control information using a plurality of transmission layers include encoding bits of control information to form control codewords and encoding bits of user data to form user data codewords. The method also includes generating a plurality of vector symbols based on the control codewords and the user data codewords. Each vector symbol includes a plurality of modulation symbols that are each associated with a transmission layer over which the associated modulation symbol will be transmitted. Generating the plurality of vector symbols includes interleaving bits of the control codewords and bits of the user data codewords so that the control information is carried in modulation symbols associated with the same transmission layers in the vector symbols transmitted during the subframe that carry the control information. The method also includes transmitting the plurality of vector symbols to a receiver over a plurality of transmission layers.1. A method for wirelessly transmitting user data and control information using a plurality of transmission layers, comprising: encoding bits of a first type of control information to form one or more control codewords of the first type of control information; encoding bits of a second type of control information to form one or more control codewords of the second type of control information; encoding bits of user data to form one or more user data codewords; generating a plurality of vector symbols based on the control codewords of the first type of control information, the control codewords of the second type of control information, and the user data codewords, each vector symbol comprising a plurality of modulation symbols that are each associated with a transmission layer over which the associated modulation symbol will be transmitted, wherein generating the plurality of vector symbols comprises interleaving bits of the one or more control codewords of the first type of control information, bits of the one or more control codewords of the second type of control information, and bits of the one or more user data codewords such that: the first type of control information is carried in modulation symbols associated with all transmission layers in vector symbols transmitted during the subframe that carry the first type of control information, and at least one of the generated vector symbols that carries control information of the second type also carries user data; and transmitting the plurality of vector symbols to a receiver over a plurality of transmission layers. 2. The method of claim 1, wherein the second type of control information comprises a channel quality indication (CQI) and a precoder matrix indication (PMI). 3. The method of claim 1, wherein the second type of control information comprises a channel quality indication (CQI) information. 4. The method of claim 1, wherein the second type of control information comprises a precoder matrix indication (PMI). 5. The method of claim 1, wherein generating the plurality of vector symbols comprises mapping bits of at least one control codeword to a vector symbol in a manner such that for each pair of neighboring bits in the control codeword a first bit of the pair is mapped to at least a first layer of a corresponding vector symbol and a second bit of the pair is mapped to at least a second layer of the corresponding vector symbol different from the first layer. 6. The method of claim 1, wherein generating the plurality of vector symbols comprises: segmenting at least one codeword into at least two segments; and mapping bits of a first segment of the control word to at least a first layer of a corresponding vector symbol; and mapping bits of a second segment of the control word to at least a second layer of the corresponding vector symbol different from the first layer. 7. The method of claim 1, wherein generating the plurality of vector symbols comprises generating at least one vector symbol by: replicating one or more bits of control information for transmission to a plurality of encoders; encoding the replicated control information in parallel at the plurality of encoders; and mapping the encoded control information onto every layer of the vector symbol. 8. The method of claim 1, wherein the first type of control codewords comprises codewords carrying Hybrid Automatic Repeat ReQuest (HARQ) bits and rank indication (RI) bits. 9. The method of claim 1, wherein the first type of control codewords comprises codewords carrying Hybrid Automatic Repeat ReQuest (HARQ) bits. 10. The method of claim 1, wherein the first type of control codewords comprises codewords carrying rank indication (RI) bits. 11. The method of claim 1, wherein interleaving bits of the one or more control codewords and bits of the one or more user data codewords comprises: multiplexing a first control codeword and a first user data codeword before interleaving the bits of the one or more control codewords and the bits of the one or more user data codewords; and interleaving bits of the multiplexed first control codeword and first user data codeword with bits of a second control codeword. 12. An apparatus for wirelessly transmitting user data and control information using a plurality of transmission layers, comprising: a plurality of antennas; a transceiver operable to transmit vector symbols over a plurality of transmission layers using the plurality of antennas; and a processor operable to: encode bits of a first type of control information to form one or more control codewords of the first type of control information; encode bits of a second type of control information to form one or more codewords of the second type of control information encode bits of user data to form one or more user data codewords; generate a plurality of vector symbols based on the control codewords of the first type of control information, the control codewords of the second type of control information, and the user data codewords, each vector symbol comprising a plurality of modulation symbols that are each associated with a transmission layer over which the associated modulation symbol will be transmitted, wherein generating the plurality of vector symbols comprises interleaving bits of the one or more control codewords of the first type of control information, bits of the one or more control codewords of the second type of control information, and bits of the one or more user data codewords such that: the first type of control information is carried in modulation symbols associated with all transmission layers in vector symbols transmitted during the subframe that carry the first type of control information, and at least one of the generated vector symbols that carries control information of the second type also carries user data; and transmit the plurality of vector symbols to a receiver over a plurality of transmission layers using the transceiver. 13. The apparatus of claim 12, wherein the second type of control information comprises a channel quality indication (CQI) and a precoder matrix indication (PMI). 14. The apparatus of claim 12, wherein the first type of control codewords comprises codewords carrying Hybrid Automatic Repeat ReQuest (HARQ) bits and codewords carrying Rank Indication (RI) bits. 15. The apparatus of claim 12, wherein the first type of control codewords comprises codewords carrying Hybrid Automatic Repeat ReQuest (HARQ) bits. 16. The apparatus of claim 12, wherein the first type of control codewords comprises codewords carrying rank indication (RI) bits. 17. The apparatus of claim 12, wherein the second type of control information comprises a channel quality indication (CQI). 18. The apparatus of claim 12, wherein the second type of control information comprises a precoder matrix indication (PMI). 19. The apparatus of claim 12, wherein the plurality of vector symbols is transmitted to the receiver over a physical uplink shared channel (PUSCH).
2,400
7,253
7,253
14,931,179
2,463
Methods, apparatus, and systems for implementing in Network Interface Controller (NIC) flow switching. Switching operations are effected via hardware-based forwarding mechanisms in apparatus such as NICs in a manner that does not employ use of computer system processor resources and is transparent to operating systems hosted by such computer systems. The forwarding mechanisms are configured to move or copy Media Access Control (MAC) frame data between receive (Rx) and transmit (Tx) queues associated with different NIC ports that may be on the same NIC or separate NICs. The hardware-based switching operations effect forwarding of MAC frames between NIC ports using memory operations, thus reducing external network traffic, internal interconnect traffic, and processor workload associated with packet processing.
1. A method implemented within a computer system having at least one host processor and having first and second Network Interface Controller (NIC) ports communicatively coupled to a physical network external to the computer system, the method comprising: receiving a Media Access Channel (MAC) frame at the first NIC port; determining the MAC frame is to be forwarded to the second NIC port; and effecting forwarding of the MAC frame from the first NIC port to the second NIC port by moving or copying data corresponding to the MAC frame from a first queue associated with the first NIC port to a second queue associated with the second NIC port using a hardware-based forwarding mechanism. 2. The method of claim 1, wherein the MAC frame includes a data payload corresponding to a portion of data being transferred from a first virtual machine (VM) hosted by the computer system and having a virtual network resource physically implemented by the first NIC port to a second VM hosted by the computer system and having a virtual network resource physically implemented by the second NIC port. 3. The method of claim 1, wherein the first and second NIC ports are ports in the same NIC. 4. The method of claim 1, wherein the first and second NIC ports are in separate NICs. 5. The method of claim 1, further comprising: receiving NIC port queue configuration information and MAC frame header forwarding filter data; receiving a MAC frame including a MAC frame header at a hardware forwarding mechanism associated with the first NIC port, the MAC frame including a header comprising a source MAC address and a destination MAC address; comparing the destination MAC address against the MAC frame header forwarding filter data to determine whether the MAC frame is destined for another NIC port in the computer system; and, if the MAC frame is destined for another NIC port in the computer system, copying or moving data corresponding to the MAC frame to a queue associated with the NIC port that is identified. 6. The method of claim 1, wherein effecting forwarding the MAC frame comprises writing data contained in the MAC frame to a receive queue for the second NIC port. 7. The method of claim 6, further comprising: writing the data to a transmit queue on the first NIC port; and moving or copying the data from the transmit queue to the receive queue. 8. The method of claim 7, wherein the first NIC port and the second NIC port are on the same NIC that includes local memory having respective address space allocated to transmit and receive queues for each of the first and second NIC ports, and further wherein the data contained in the MAC frame is moved from a transmit queue to a receive queue in the local memory. 9. The method of claim 8, wherein the transmit queue is mapped to the receive queue such that any MAC frames that are written to the transmit queue are automatically moved to the receive queue via a hardware mechanism. 10. The method of claim 7, wherein the first NIC port and second NIC ports are on separate NICs, the method further comprising: copying the data in the transmit queue on the first NIC port of the first NIC to a receive queue of the second NIC port on the second NIC using a memory write transaction comprising one or more packets transported via an interconnect between the first and second NICs. 11. The method of claim 7, wherein the computer system comprises a non-uniform memory access (NUMA) architecture employing first and second NUMA nodes, each NUMA node including a processor operatively coupled to a respective NIC, wherein the first NIC port is included in a first NIC of a first NUMA node and the second NIC port is included in a second NIC of a second NUMA node. 12. The method of claim 1, wherein the first queue comprises a receive queue associated with the first NIC port and the second queue comprises a receive queue associated with the second NIC port. 13. The method of claim 1, wherein the first queue comprises a transmit queue associated with the first NIC port and the second queue comprises a transmit queue associated with the second NIC port. 14. An apparatus, comprising: an interconnect interface; memory, having an address space; and a plurality of network ports coupled in communication via an internal interconnect, each network port having a network interface; wherein the apparatus further includes logic configured, upon operation of the apparatus, to allocate portions of the address space to sets of queues for each of the plurality of network ports, wherein each set of queues includes a plurality of receive (Rx) queues and a plurality of transmit (Tx) queues, wherein a portion of the Tx queues are Tx forwarding queues mapped to at least one of Rx and Tx queues in other network ports on the apparatus, and wherein at least one network port further includes at least one hardware-based forwarding mechanism, configured, upon operation of the apparatus, to, compare header data in a Media Access Control (MAC) frame against MAC frame header filter data to determine if the MAC frame is to be forwarded to another network port in the apparatus; and in response to a determination that the MAC frame is to be forwarded to another network port, moving or copying the MAC frame from a first queue allocated to the network port to a second queue allocated to the other network port. 15. The apparatus of claim 14, wherein the first queue comprises a Tx forwarding queue to the second queue comprises an Rx queue to which the Tx forwarding queue is mapped. 16. The apparatus of claim 14, wherein the apparatus is further configured, upon operation, to, receive Rx and Tx queue configuration information via the interconnect interface, the memory Rx and Tx queue configuration information defining memory address space allocations for each Rx and Tx queue; and configure the memory address space in accordance with Rx and Tx queue configuration information. 17. The apparatus of claim 16, wherein the apparatus is further configured, upon operation, to, receive MAC frame header filter data via the interconnect interface; receive queue forwarding data via the interconnect interface; and implement the MAC frame header filter data and queue forwarding data to effect moving data between pairs of queues, wherein the queues in a pair of queues are associated with different network ports. 18. The apparatus of claim 17, wherein the MAC header filter data and the queue forwarding data comprises a plurality of sets of data, wherein each set includes: a frame header pattern; a frame header mask; a from queue address offset; and a to queue address offset. 19. The apparatus of claim 14, wherein the plurality of network ports includes a first network port and a second network port, and wherein the apparatus is further configured, upon operation and when the first and second network ports are coupled to a network, to, receive a MAC frame at the first network port from the network; buffer the MAC frame in an Rx queue associated with the first network port; determine that the MAC frame is to be forwarded out of the second network port; and move the MAC frame from the Rx queue to a Tx queue of the second network port. 20. The apparatus of claim 19, wherein the first network port further comprises a second hardware forwarding mechanism that is configured to filter MAC frames received from the network and move MAC frames meeting corresponding filter criteria from Rx queues associated with the first network port to Tx queues associated with the second network port. 21. The apparatus of claim 14, wherein the apparatus comprises a network interface controller (NIC) and is further configured to be installed in a computer system having a plurality of NICs having a similar configuration, and wherein, upon operation, the apparatus is further configured to, facilitate forwarding of a MAC frame from a Tx forwarding queue to a receive queue in another NIC through use of a memory write transaction originating from the interconnect interface. 22. The apparatus of claim 21, wherein the interconnect interface comprises a Peripheral Component Interconnect Express (PCIe) interface, and the memory write transaction comprises a PCIe memory write transaction. 23. The apparatus of claim 14, wherein the plurality of network ports includes a first network port and a second network port, wherein the first network port comprises a second hardware forwarding mechanism and wherein the apparatus is further configured, upon operation and when the first and second network ports are coupled to a network, to, receive a MAC frame at the first network port from the network; buffer the MAC frame in a first Rx queue associated with the first network port; determine, via the second hardware forwarding mechanism, that the MAC frame is to be moved to a second Rx queue associated with the second network port; and move the MAC frame from the first Rx queue to the second Rx queue.
Methods, apparatus, and systems for implementing in Network Interface Controller (NIC) flow switching. Switching operations are effected via hardware-based forwarding mechanisms in apparatus such as NICs in a manner that does not employ use of computer system processor resources and is transparent to operating systems hosted by such computer systems. The forwarding mechanisms are configured to move or copy Media Access Control (MAC) frame data between receive (Rx) and transmit (Tx) queues associated with different NIC ports that may be on the same NIC or separate NICs. The hardware-based switching operations effect forwarding of MAC frames between NIC ports using memory operations, thus reducing external network traffic, internal interconnect traffic, and processor workload associated with packet processing.1. A method implemented within a computer system having at least one host processor and having first and second Network Interface Controller (NIC) ports communicatively coupled to a physical network external to the computer system, the method comprising: receiving a Media Access Channel (MAC) frame at the first NIC port; determining the MAC frame is to be forwarded to the second NIC port; and effecting forwarding of the MAC frame from the first NIC port to the second NIC port by moving or copying data corresponding to the MAC frame from a first queue associated with the first NIC port to a second queue associated with the second NIC port using a hardware-based forwarding mechanism. 2. The method of claim 1, wherein the MAC frame includes a data payload corresponding to a portion of data being transferred from a first virtual machine (VM) hosted by the computer system and having a virtual network resource physically implemented by the first NIC port to a second VM hosted by the computer system and having a virtual network resource physically implemented by the second NIC port. 3. The method of claim 1, wherein the first and second NIC ports are ports in the same NIC. 4. The method of claim 1, wherein the first and second NIC ports are in separate NICs. 5. The method of claim 1, further comprising: receiving NIC port queue configuration information and MAC frame header forwarding filter data; receiving a MAC frame including a MAC frame header at a hardware forwarding mechanism associated with the first NIC port, the MAC frame including a header comprising a source MAC address and a destination MAC address; comparing the destination MAC address against the MAC frame header forwarding filter data to determine whether the MAC frame is destined for another NIC port in the computer system; and, if the MAC frame is destined for another NIC port in the computer system, copying or moving data corresponding to the MAC frame to a queue associated with the NIC port that is identified. 6. The method of claim 1, wherein effecting forwarding the MAC frame comprises writing data contained in the MAC frame to a receive queue for the second NIC port. 7. The method of claim 6, further comprising: writing the data to a transmit queue on the first NIC port; and moving or copying the data from the transmit queue to the receive queue. 8. The method of claim 7, wherein the first NIC port and the second NIC port are on the same NIC that includes local memory having respective address space allocated to transmit and receive queues for each of the first and second NIC ports, and further wherein the data contained in the MAC frame is moved from a transmit queue to a receive queue in the local memory. 9. The method of claim 8, wherein the transmit queue is mapped to the receive queue such that any MAC frames that are written to the transmit queue are automatically moved to the receive queue via a hardware mechanism. 10. The method of claim 7, wherein the first NIC port and second NIC ports are on separate NICs, the method further comprising: copying the data in the transmit queue on the first NIC port of the first NIC to a receive queue of the second NIC port on the second NIC using a memory write transaction comprising one or more packets transported via an interconnect between the first and second NICs. 11. The method of claim 7, wherein the computer system comprises a non-uniform memory access (NUMA) architecture employing first and second NUMA nodes, each NUMA node including a processor operatively coupled to a respective NIC, wherein the first NIC port is included in a first NIC of a first NUMA node and the second NIC port is included in a second NIC of a second NUMA node. 12. The method of claim 1, wherein the first queue comprises a receive queue associated with the first NIC port and the second queue comprises a receive queue associated with the second NIC port. 13. The method of claim 1, wherein the first queue comprises a transmit queue associated with the first NIC port and the second queue comprises a transmit queue associated with the second NIC port. 14. An apparatus, comprising: an interconnect interface; memory, having an address space; and a plurality of network ports coupled in communication via an internal interconnect, each network port having a network interface; wherein the apparatus further includes logic configured, upon operation of the apparatus, to allocate portions of the address space to sets of queues for each of the plurality of network ports, wherein each set of queues includes a plurality of receive (Rx) queues and a plurality of transmit (Tx) queues, wherein a portion of the Tx queues are Tx forwarding queues mapped to at least one of Rx and Tx queues in other network ports on the apparatus, and wherein at least one network port further includes at least one hardware-based forwarding mechanism, configured, upon operation of the apparatus, to, compare header data in a Media Access Control (MAC) frame against MAC frame header filter data to determine if the MAC frame is to be forwarded to another network port in the apparatus; and in response to a determination that the MAC frame is to be forwarded to another network port, moving or copying the MAC frame from a first queue allocated to the network port to a second queue allocated to the other network port. 15. The apparatus of claim 14, wherein the first queue comprises a Tx forwarding queue to the second queue comprises an Rx queue to which the Tx forwarding queue is mapped. 16. The apparatus of claim 14, wherein the apparatus is further configured, upon operation, to, receive Rx and Tx queue configuration information via the interconnect interface, the memory Rx and Tx queue configuration information defining memory address space allocations for each Rx and Tx queue; and configure the memory address space in accordance with Rx and Tx queue configuration information. 17. The apparatus of claim 16, wherein the apparatus is further configured, upon operation, to, receive MAC frame header filter data via the interconnect interface; receive queue forwarding data via the interconnect interface; and implement the MAC frame header filter data and queue forwarding data to effect moving data between pairs of queues, wherein the queues in a pair of queues are associated with different network ports. 18. The apparatus of claim 17, wherein the MAC header filter data and the queue forwarding data comprises a plurality of sets of data, wherein each set includes: a frame header pattern; a frame header mask; a from queue address offset; and a to queue address offset. 19. The apparatus of claim 14, wherein the plurality of network ports includes a first network port and a second network port, and wherein the apparatus is further configured, upon operation and when the first and second network ports are coupled to a network, to, receive a MAC frame at the first network port from the network; buffer the MAC frame in an Rx queue associated with the first network port; determine that the MAC frame is to be forwarded out of the second network port; and move the MAC frame from the Rx queue to a Tx queue of the second network port. 20. The apparatus of claim 19, wherein the first network port further comprises a second hardware forwarding mechanism that is configured to filter MAC frames received from the network and move MAC frames meeting corresponding filter criteria from Rx queues associated with the first network port to Tx queues associated with the second network port. 21. The apparatus of claim 14, wherein the apparatus comprises a network interface controller (NIC) and is further configured to be installed in a computer system having a plurality of NICs having a similar configuration, and wherein, upon operation, the apparatus is further configured to, facilitate forwarding of a MAC frame from a Tx forwarding queue to a receive queue in another NIC through use of a memory write transaction originating from the interconnect interface. 22. The apparatus of claim 21, wherein the interconnect interface comprises a Peripheral Component Interconnect Express (PCIe) interface, and the memory write transaction comprises a PCIe memory write transaction. 23. The apparatus of claim 14, wherein the plurality of network ports includes a first network port and a second network port, wherein the first network port comprises a second hardware forwarding mechanism and wherein the apparatus is further configured, upon operation and when the first and second network ports are coupled to a network, to, receive a MAC frame at the first network port from the network; buffer the MAC frame in a first Rx queue associated with the first network port; determine, via the second hardware forwarding mechanism, that the MAC frame is to be moved to a second Rx queue associated with the second network port; and move the MAC frame from the first Rx queue to the second Rx queue.
2,400
7,254
7,254
14,128,996
2,449
A device, method and system of video and audio sharing among communication devices, may comprise a communication device for generating and sending a packet containing information related to the video and audio, and another communication device for receiving the packet and rendering the information related to the audio and video. In some embodiments, the communication device may comprise: an audio encoding module to encode a piece of audio into an audio bit stream; an avatar data extraction module to extract avatar data from a piece of video and generate an avatar data bit stream; and a synchronization module to generate synchronization information for synchronizing the audio bit stream with the avatar parameter stream. In some embodiments, the another communication device may comprise: an audio decoding module to decode an audio bit stream into decoded audio data; an Avatar animation module to animate an Avatar model based on an Avatar data bit stream to generate an animated Avatar model; and a synchronizing and rendering module to synchronize and render the decoded audio data and the animated Avatar model by utilizing the synchronization information.
1-30. (canceled) 31. A communication device, comprising: an audio encoding module to encode a piece of audio into an audio bit stream; an avatar data extraction module to extract avatar data from a piece of video and generate an avatar data bit stream; and a synchronization module to generate synchronization information for synchronizing the audio bit stream with the avatar parameter stream. 32. The communication device of claim 31, wherein the avatar data includes avatar parameters indicating at least one of movement and expression of an object presented in the video. 33. The communication device of claim 31, wherein the synchronization information is a time marker inserted in the audio bit stream and the avatar data bit stream. 34. The communication device of claim 31, wherein the synchronization information is generated based on a sampling rate of the audio bit stream and a sampling rate of the avatar data bit stream. 35. The communication device of claim 31, further comprises: a packaging module to package the audio bit stream, avatar data bit stream and the synchronization information into a packet; and a transmission module to transmit the packet to a server, regardless if another communication device going to receive the packet from the server is connected or not. 36. The communication device of claim 35, wherein the packet is an instant message. 37. The communication device of claim 35, wherein the packet is further to include an identifier of an object presented in the video. 38. A method, comprising: encoding a piece of audio into an audio bit stream; extracting avatar data from a piece of video to generate an avatar data bit stream; and generating synchronization information for synchronizing the audio bit stream with the avatar parameter stream; 39. The method of claim 38, wherein the avatar data includes avatar parameters indicating at least one of movement and expression of an object presented in the video. 40. The method of claim 38, wherein the synchronization information is a time marker inserted in the audio bit stream and the avatar data bit stream. 41. The method of claim 38, wherein the synchronization information is generated based on a sampling rate of the audio bit stream and a sampling rate of the avatar data bit stream. 42. The method of claim 38, further comprising: a packaging module to package the audio bit stream, avatar data bit stream and the synchronization information into a packet; and a transmission module to transmit the packet to a server, regardless if another communication device going to receive the packet from the server is connected or not. 43. The method of claim 42, wherein the packet is further to include an identifier of an object presented in the video. 44. A communication device, comprising: an audio decoding module to decode an audio bit stream into decoded audio data; an Avatar animation module to animate an Avatar model based on an Avatar data bit stream to generate an animated Avatar model; and a synchronizing and rendering module to synchronize and render the decoded audio data and the animated Avatar model by utilizing the synchronization information. 45. The communication device of claim 44, wherein the synchronization information is a time marker inserted in the audio bit stream and the avatar data bit stream. 46. The communication device of claim 44, further comprising: a receiving module to receive a packet from a server regardless if another communication device sending the packet is connected or not; and an unpacking module to unpack the packet into the audio bit stream, the avatar data bit stream and the synchronizing information. 47. The communication device of claim 44, wherein the avatar animation module is further to retrieve the avatar model corresponding to an object presented in a piece of video captured by another communication device. 48. The communication device of claim 44, wherein the avatar data includes avatar parameters indicating at least one of movement and expression of an object presented in a piece of video captured by another communication device. 49. The communication device of claim 46, wherein the packet further comprises an identifier to identify an object presented in a piece of video captured by another communication device. 50. A method, comprising: decoding an audio bit stream into decoded audio data; animating an Avatar model based on an Avatar data bit stream to generate an animated Avatar model; and synchronizing and rendering the decoded audio data and the animated Avatar model by utilizing the synchronization information. 51. The method of claim 50, wherein the synchronization information is a time marker inserted in the audio bit stream and the avatar data bit stream. 52. The method of claim 50, further comprising: receiving a packet from a server regardless if another communication device sending the packet is connected or not; and unpacking the packet into the audio bit stream, the avatar data bit stream and the synchronizing information. 53. The method of claim 50, wherein the avatar animation module is further to retrieve the avatar model corresponding to an object presented in a piece of video captured by another communication device. 54. The method of claim 50, wherein the avatar data includes Avatar parameters indicating at least one of movement and expression of an object presented in a piece of video captured by another communication device. 55. The method of claim 52, wherein the packet further comprises an identifier to identify an object presented in a piece of video captured by another communication device.
A device, method and system of video and audio sharing among communication devices, may comprise a communication device for generating and sending a packet containing information related to the video and audio, and another communication device for receiving the packet and rendering the information related to the audio and video. In some embodiments, the communication device may comprise: an audio encoding module to encode a piece of audio into an audio bit stream; an avatar data extraction module to extract avatar data from a piece of video and generate an avatar data bit stream; and a synchronization module to generate synchronization information for synchronizing the audio bit stream with the avatar parameter stream. In some embodiments, the another communication device may comprise: an audio decoding module to decode an audio bit stream into decoded audio data; an Avatar animation module to animate an Avatar model based on an Avatar data bit stream to generate an animated Avatar model; and a synchronizing and rendering module to synchronize and render the decoded audio data and the animated Avatar model by utilizing the synchronization information.1-30. (canceled) 31. A communication device, comprising: an audio encoding module to encode a piece of audio into an audio bit stream; an avatar data extraction module to extract avatar data from a piece of video and generate an avatar data bit stream; and a synchronization module to generate synchronization information for synchronizing the audio bit stream with the avatar parameter stream. 32. The communication device of claim 31, wherein the avatar data includes avatar parameters indicating at least one of movement and expression of an object presented in the video. 33. The communication device of claim 31, wherein the synchronization information is a time marker inserted in the audio bit stream and the avatar data bit stream. 34. The communication device of claim 31, wherein the synchronization information is generated based on a sampling rate of the audio bit stream and a sampling rate of the avatar data bit stream. 35. The communication device of claim 31, further comprises: a packaging module to package the audio bit stream, avatar data bit stream and the synchronization information into a packet; and a transmission module to transmit the packet to a server, regardless if another communication device going to receive the packet from the server is connected or not. 36. The communication device of claim 35, wherein the packet is an instant message. 37. The communication device of claim 35, wherein the packet is further to include an identifier of an object presented in the video. 38. A method, comprising: encoding a piece of audio into an audio bit stream; extracting avatar data from a piece of video to generate an avatar data bit stream; and generating synchronization information for synchronizing the audio bit stream with the avatar parameter stream; 39. The method of claim 38, wherein the avatar data includes avatar parameters indicating at least one of movement and expression of an object presented in the video. 40. The method of claim 38, wherein the synchronization information is a time marker inserted in the audio bit stream and the avatar data bit stream. 41. The method of claim 38, wherein the synchronization information is generated based on a sampling rate of the audio bit stream and a sampling rate of the avatar data bit stream. 42. The method of claim 38, further comprising: a packaging module to package the audio bit stream, avatar data bit stream and the synchronization information into a packet; and a transmission module to transmit the packet to a server, regardless if another communication device going to receive the packet from the server is connected or not. 43. The method of claim 42, wherein the packet is further to include an identifier of an object presented in the video. 44. A communication device, comprising: an audio decoding module to decode an audio bit stream into decoded audio data; an Avatar animation module to animate an Avatar model based on an Avatar data bit stream to generate an animated Avatar model; and a synchronizing and rendering module to synchronize and render the decoded audio data and the animated Avatar model by utilizing the synchronization information. 45. The communication device of claim 44, wherein the synchronization information is a time marker inserted in the audio bit stream and the avatar data bit stream. 46. The communication device of claim 44, further comprising: a receiving module to receive a packet from a server regardless if another communication device sending the packet is connected or not; and an unpacking module to unpack the packet into the audio bit stream, the avatar data bit stream and the synchronizing information. 47. The communication device of claim 44, wherein the avatar animation module is further to retrieve the avatar model corresponding to an object presented in a piece of video captured by another communication device. 48. The communication device of claim 44, wherein the avatar data includes avatar parameters indicating at least one of movement and expression of an object presented in a piece of video captured by another communication device. 49. The communication device of claim 46, wherein the packet further comprises an identifier to identify an object presented in a piece of video captured by another communication device. 50. A method, comprising: decoding an audio bit stream into decoded audio data; animating an Avatar model based on an Avatar data bit stream to generate an animated Avatar model; and synchronizing and rendering the decoded audio data and the animated Avatar model by utilizing the synchronization information. 51. The method of claim 50, wherein the synchronization information is a time marker inserted in the audio bit stream and the avatar data bit stream. 52. The method of claim 50, further comprising: receiving a packet from a server regardless if another communication device sending the packet is connected or not; and unpacking the packet into the audio bit stream, the avatar data bit stream and the synchronizing information. 53. The method of claim 50, wherein the avatar animation module is further to retrieve the avatar model corresponding to an object presented in a piece of video captured by another communication device. 54. The method of claim 50, wherein the avatar data includes Avatar parameters indicating at least one of movement and expression of an object presented in a piece of video captured by another communication device. 55. The method of claim 52, wherein the packet further comprises an identifier to identify an object presented in a piece of video captured by another communication device.
2,400
7,255
7,255
13,188,620
2,423
Systems and methods are presented for insertion of assets into a stream of content (e.g., audio and/or video programming). Such assets may be targeted to network users separate from the surrounding content and deliveries thereof confirmed. Among other things, these systems and methods enable a new advertising paradigm based on guaranteed delivery of targeted commercial impressions. In this regard, the systems and methods generally provide assets with broadcast network programming (e.g., via actual insertion and/or switching to an asset channel) based on actual audience observations. For example, asset providers may wish to target assets for delivery according to specific audience classifications (e.g., gender, income level, locale, age, etc.). Programming providers, such as television programmers and radio programmers (e.g., standard tower broadcast radio and satellite radio), may receive information from broadcast network users and insert the assets into available bandwidth based on that information.
1.-133. (canceled) 134. A method for use in connection with delivering assets to users of a communications network, said method comprising: receiving a request for dissemination of one or more assets via said communications network, said request defining one or more dissemination parameters relating to a desired dissemination of said assets; and satisfying said request by targeting delivery of said assets to network users associated with at least one programming event of said communications network, said targeting involving delivery of a first one of said assets to less than the whole of an audience of said at least one programming event at a time of delivery of said assets. 135. A method as set forth in claim 134, wherein said dissemination parameters identify at least one of an audience classification and an audience size independent of any identification of a specific asset delivery opportunity associated with a programming event. 136. A method as set forth in claim 134, further comprising: receiving, from a database of user information, one or more classification parameters associated with one of said network users; receiving one or more targeting parameters associated with ones of said assets; and comparing said classification parameters with said targeting parameters to identify said first one of said assets for said delivery. 137. A method as set forth in claim 136, wherein said classification parameters comprise one or more of economic, social, demographic, geographic, and user preference information associated with said network users. 138. A method as set forth in claim 136, wherein said targeting parameters comprise one or more of economic, social, demographic, geographic, and user preference information associated with a target audience for each of said assets. 139. A method as set forth in claim 136, wherein said satisfying said request comprises: broadcasting said first one of said assets to all of said network users along with said targeting parameters associated with said first one of said assets; and delivering said first one of said assets to network users whose classification parameters match said targeting parameters. 140. A method of claim 134, wherein a plurality of assets are delivered to a plurality of audience segments of a given programming event at a given time. 141. A method of claim 140, wherein said plurality of assets include assets of a given asset provider with differing target audiences. 142. A method of claim 140, wherein said plurality of assets include assets of two or more asset providers with differing target audiences. 143. A method of claim 134, wherein a given asset is delivered to network users of different programming event during a time window. 144. A method of claim 143, wherein said time window corresponds to temporally overlapping programming events of said communications network. 145. A method as set forth in claim 134, further comprising the step of confirming that said request for dissemination has been satisfied based on reports received from network users regarding delivery of said assets. 146. An apparatus for use in connection with delivering assets to users of a communications network, said apparatus comprising: a web interface system for receiving a request for dissemination of one or more assets that are each associated with one or more targeting parameters via said communications network, said request defining one or more dissemination parameters relating to a desired dissemination of said asset; and a platform operative for satisfying said request by targeting delivery of said assets to network users associated with at least one programming event of said communications network, said targeting involving delivery of a first one of said assets to less than the whole of an audience of said at least one programming event at a time of delivery of said assets. 147. An apparatus as set forth in claim 146, wherein said dissemination parameters identify at least one of an audience classification and an audience size independent of any identification of a specific asset delivery opportunity associated with a programming event. 148. An apparatus as set forth in claim 146, further comprising a memory structure for storing classification parameters associated with said network users, wherein said platform is further operative to compare said classification parameters with said targeting parameters to identify said first one of said assets for said delivery. 149. An apparatus as set forth in claim 148, wherein said classification parameters comprise one or more of economic, social, demographic, geographic, and user preference information associated with said network users. 150. An apparatus as set forth in claim 148, wherein said targeting parameters comprise one or more of economic, social, demographic, geographic, and user preference information associated with a target audience for each of said assets. 151. An apparatus as set forth in claim 146, wherein said platform is operative for different assets to be delivered to different audience segments of a given programming event at a given time. 152. An apparatus as set forth in claim 151, wherein said different assets include assets of a given asset provider with differing target audiences. 153. An apparatus as set forth in claim 151, wherein said different assets include assets of two or more asset providers with differing target audiences. 154. An apparatus as set forth in claim 146, wherein said platform operates to cause a given asset to be delivered to network users on different programming events during a time window. 155. An apparatus as set forth in claim 146, further comprising a measurement system for confirming that said request for dissemination has been satisfied based on reports received from network users regarding delivery of said assets. 156. A method for use in connection with delivering assets to users of a communications network, said method comprising: receiving information regarding requests, entered via an asset sales interface, for delivery of first and second assets via said communications network, said first and second requests including one or more targeting parameters defining a target audience for each of said first and second assets; associating said request information with a programming event and a time window for said delivery of said first and second assets; receiving, from a database of user information, one or more classification parameters associated with network users that form an audience of said programming event; comparing said targeting parameters of said first and second assets with said classification parameters of said users that form said audience to associate first and second audience segments within said programming event with said delivery of said first and second assets during said time window; and satisfying said first and second requests by causing said first asset to be delivered to users within said first audience segment of said programming event and said second asset to be delivered to users within said second audience segment of said programming event. 157. A method as set forth in claim 156, wherein said receiving information comprises receiving said targeting parameters entered via one or more input fields of said asset sales interface. 158. A method as set forth in claim 157, wherein said receiving said targeting parameters comprises receiving, via said input fields of said asset sales interface, at least an age and a gender of said target audience for each of said first and second assets. 159. A method as set forth in claim 157, wherein said receiving said targeting parameters comprises receiving, via said input fields of said asset sales interface, at least location and an age of said target audience for each of said first and second assets. 160. A method as set forth in claim 157, wherein said receiving said targeting parameters comprises receiving, via said input fields of said asset sales interface, at least a location and a gender of said target audience for each of said first and second assets. 161. A method as set forth in claim 157, wherein said targeting parameters comprise one or more economic, social, demographic, geographic, or user preference characteristics associated with said target audience for each of said first and second assets. 162. A method as set forth in claim 157, wherein said receiving said targeting parameters comprises receiving, via said input fields of said asset sales interface, at least a geographical location, a gender, and an age of said target audience for each of said first and second assets. 163. A method as set forth in claim 156, wherein said first and second assets include assets of a given asset provider with differing target audiences. 164. A method as set forth in claim 156, wherein said first and second assets include assets of first and second asset providers with differing target audiences. 165. A method as set forth in claim 156, wherein said satisfying said request comprises: broadcasting said first and second assets to all of said network users along with said targeting parameters that define said target audience for each of said first and second assets; and based on said comparing, delivering said first asset to said users within said first audience segment and said second asset to said users within said second audience segment. 166. A method as set forth in claim 156, further comprising receiving, via said asset sales interface, information regarding a request for delivery of a third asset for said programming event and said time window, said third request including one or more targeting parameters defining a target audience for said third asset, wherein said target audience for said third asset differs from said target audience for said first asset and said target audience for said second asset. 167. A method for use in connection with delivering assets to users of a communications network, said method comprising: receiving information regarding a plurality of requests for delivery of assets, entered via an asset sales interface, each said request including one or more targeting parameters defining a different target audience; associating said request information with a programming event and a time window for said delivery of said assets; receiving, from a database of user information, one or more classification parameters associated with users that form an audience of said programming event; matching said targeting parameters to said classification parameters to determine a plurality of audience segments within said programming event, each said audience segment corresponding to one of said assets; and satisfying said requests by causing said assets to be respectively delivered to users within said corresponding audience segments of said programming event. 168. A method as set forth in claim 167, wherein said receiving information comprises receiving said targeting parameters entered via one or more input fields of said asset sales interface. 169. A method as set forth in claim 168, wherein said targeting parameters comprise one or more economic, social, demographic, geographic, or user preference characteristics associated with said target audience for each said asset. 170. A method as set forth in claim 168, wherein said targeting parameters comprise at least a geographical location, a gender, and an age of said target audience for each said asset. 171. A method for use in connection with delivering assets to users of a communications network, said method comprising: receiving a request for dissemination of an asset via said communications network, said request including one or more targeting parameters defining a target audience for said asset; receiving, from a database of user information, one or more classification parameters associated with each of said network users; comparing said targeting parameters of said asset with said classification parameters of each said network user to determine a subset of said network users to receive said asset; and satisfying said request by aggregating said subset of said network users from across a plurality of programming events of said communication network. 172. A method as set forth in claim 171, wherein said subset of said network users is formed of users within said target audience for said asset. 173. A method as set forth in claim 171, wherein said classification parameters comprise one or more of economic, social, demographic, geographic, and user preference information associated with said network users. 174. A method as set forth in claim 171, wherein said targeting parameters comprise one or more of economic, social, demographic, geographic, and user preference information associated with said target audience for said asset. 175. A method as set forth in claim 171, wherein said aggregating comprises causing said asset to be delivered to said subset of said users of said plurality of programming transmission bands during a time window such that a sum of said subset of said users substantially satisfies said dissemination request. 176. A method as set forth in claim 175, wherein said time window corresponds to temporally overlapping programming events of said communication network. 177. A method as set forth in claim 175, wherein said asset is delivered to less than all network users on at least one of said plurality of programming events during said time window. 178. A method as set forth in claim 171, wherein a plurality of assets are delivered to a plurality of audience segments of a given programming event at a given time. 179. A method of claim 178, wherein said plurality of assets includes assets of a given asset provider with differing target audiences. 180. A method of claim 178, wherein said plurality of assets includes assets of two or more asset providers with differing target audiences. 181. A method as set forth in claim 171, wherein said targeting parameters further define a temporal limitation for delivery of said asset.
Systems and methods are presented for insertion of assets into a stream of content (e.g., audio and/or video programming). Such assets may be targeted to network users separate from the surrounding content and deliveries thereof confirmed. Among other things, these systems and methods enable a new advertising paradigm based on guaranteed delivery of targeted commercial impressions. In this regard, the systems and methods generally provide assets with broadcast network programming (e.g., via actual insertion and/or switching to an asset channel) based on actual audience observations. For example, asset providers may wish to target assets for delivery according to specific audience classifications (e.g., gender, income level, locale, age, etc.). Programming providers, such as television programmers and radio programmers (e.g., standard tower broadcast radio and satellite radio), may receive information from broadcast network users and insert the assets into available bandwidth based on that information.1.-133. (canceled) 134. A method for use in connection with delivering assets to users of a communications network, said method comprising: receiving a request for dissemination of one or more assets via said communications network, said request defining one or more dissemination parameters relating to a desired dissemination of said assets; and satisfying said request by targeting delivery of said assets to network users associated with at least one programming event of said communications network, said targeting involving delivery of a first one of said assets to less than the whole of an audience of said at least one programming event at a time of delivery of said assets. 135. A method as set forth in claim 134, wherein said dissemination parameters identify at least one of an audience classification and an audience size independent of any identification of a specific asset delivery opportunity associated with a programming event. 136. A method as set forth in claim 134, further comprising: receiving, from a database of user information, one or more classification parameters associated with one of said network users; receiving one or more targeting parameters associated with ones of said assets; and comparing said classification parameters with said targeting parameters to identify said first one of said assets for said delivery. 137. A method as set forth in claim 136, wherein said classification parameters comprise one or more of economic, social, demographic, geographic, and user preference information associated with said network users. 138. A method as set forth in claim 136, wherein said targeting parameters comprise one or more of economic, social, demographic, geographic, and user preference information associated with a target audience for each of said assets. 139. A method as set forth in claim 136, wherein said satisfying said request comprises: broadcasting said first one of said assets to all of said network users along with said targeting parameters associated with said first one of said assets; and delivering said first one of said assets to network users whose classification parameters match said targeting parameters. 140. A method of claim 134, wherein a plurality of assets are delivered to a plurality of audience segments of a given programming event at a given time. 141. A method of claim 140, wherein said plurality of assets include assets of a given asset provider with differing target audiences. 142. A method of claim 140, wherein said plurality of assets include assets of two or more asset providers with differing target audiences. 143. A method of claim 134, wherein a given asset is delivered to network users of different programming event during a time window. 144. A method of claim 143, wherein said time window corresponds to temporally overlapping programming events of said communications network. 145. A method as set forth in claim 134, further comprising the step of confirming that said request for dissemination has been satisfied based on reports received from network users regarding delivery of said assets. 146. An apparatus for use in connection with delivering assets to users of a communications network, said apparatus comprising: a web interface system for receiving a request for dissemination of one or more assets that are each associated with one or more targeting parameters via said communications network, said request defining one or more dissemination parameters relating to a desired dissemination of said asset; and a platform operative for satisfying said request by targeting delivery of said assets to network users associated with at least one programming event of said communications network, said targeting involving delivery of a first one of said assets to less than the whole of an audience of said at least one programming event at a time of delivery of said assets. 147. An apparatus as set forth in claim 146, wherein said dissemination parameters identify at least one of an audience classification and an audience size independent of any identification of a specific asset delivery opportunity associated with a programming event. 148. An apparatus as set forth in claim 146, further comprising a memory structure for storing classification parameters associated with said network users, wherein said platform is further operative to compare said classification parameters with said targeting parameters to identify said first one of said assets for said delivery. 149. An apparatus as set forth in claim 148, wherein said classification parameters comprise one or more of economic, social, demographic, geographic, and user preference information associated with said network users. 150. An apparatus as set forth in claim 148, wherein said targeting parameters comprise one or more of economic, social, demographic, geographic, and user preference information associated with a target audience for each of said assets. 151. An apparatus as set forth in claim 146, wherein said platform is operative for different assets to be delivered to different audience segments of a given programming event at a given time. 152. An apparatus as set forth in claim 151, wherein said different assets include assets of a given asset provider with differing target audiences. 153. An apparatus as set forth in claim 151, wherein said different assets include assets of two or more asset providers with differing target audiences. 154. An apparatus as set forth in claim 146, wherein said platform operates to cause a given asset to be delivered to network users on different programming events during a time window. 155. An apparatus as set forth in claim 146, further comprising a measurement system for confirming that said request for dissemination has been satisfied based on reports received from network users regarding delivery of said assets. 156. A method for use in connection with delivering assets to users of a communications network, said method comprising: receiving information regarding requests, entered via an asset sales interface, for delivery of first and second assets via said communications network, said first and second requests including one or more targeting parameters defining a target audience for each of said first and second assets; associating said request information with a programming event and a time window for said delivery of said first and second assets; receiving, from a database of user information, one or more classification parameters associated with network users that form an audience of said programming event; comparing said targeting parameters of said first and second assets with said classification parameters of said users that form said audience to associate first and second audience segments within said programming event with said delivery of said first and second assets during said time window; and satisfying said first and second requests by causing said first asset to be delivered to users within said first audience segment of said programming event and said second asset to be delivered to users within said second audience segment of said programming event. 157. A method as set forth in claim 156, wherein said receiving information comprises receiving said targeting parameters entered via one or more input fields of said asset sales interface. 158. A method as set forth in claim 157, wherein said receiving said targeting parameters comprises receiving, via said input fields of said asset sales interface, at least an age and a gender of said target audience for each of said first and second assets. 159. A method as set forth in claim 157, wherein said receiving said targeting parameters comprises receiving, via said input fields of said asset sales interface, at least location and an age of said target audience for each of said first and second assets. 160. A method as set forth in claim 157, wherein said receiving said targeting parameters comprises receiving, via said input fields of said asset sales interface, at least a location and a gender of said target audience for each of said first and second assets. 161. A method as set forth in claim 157, wherein said targeting parameters comprise one or more economic, social, demographic, geographic, or user preference characteristics associated with said target audience for each of said first and second assets. 162. A method as set forth in claim 157, wherein said receiving said targeting parameters comprises receiving, via said input fields of said asset sales interface, at least a geographical location, a gender, and an age of said target audience for each of said first and second assets. 163. A method as set forth in claim 156, wherein said first and second assets include assets of a given asset provider with differing target audiences. 164. A method as set forth in claim 156, wherein said first and second assets include assets of first and second asset providers with differing target audiences. 165. A method as set forth in claim 156, wherein said satisfying said request comprises: broadcasting said first and second assets to all of said network users along with said targeting parameters that define said target audience for each of said first and second assets; and based on said comparing, delivering said first asset to said users within said first audience segment and said second asset to said users within said second audience segment. 166. A method as set forth in claim 156, further comprising receiving, via said asset sales interface, information regarding a request for delivery of a third asset for said programming event and said time window, said third request including one or more targeting parameters defining a target audience for said third asset, wherein said target audience for said third asset differs from said target audience for said first asset and said target audience for said second asset. 167. A method for use in connection with delivering assets to users of a communications network, said method comprising: receiving information regarding a plurality of requests for delivery of assets, entered via an asset sales interface, each said request including one or more targeting parameters defining a different target audience; associating said request information with a programming event and a time window for said delivery of said assets; receiving, from a database of user information, one or more classification parameters associated with users that form an audience of said programming event; matching said targeting parameters to said classification parameters to determine a plurality of audience segments within said programming event, each said audience segment corresponding to one of said assets; and satisfying said requests by causing said assets to be respectively delivered to users within said corresponding audience segments of said programming event. 168. A method as set forth in claim 167, wherein said receiving information comprises receiving said targeting parameters entered via one or more input fields of said asset sales interface. 169. A method as set forth in claim 168, wherein said targeting parameters comprise one or more economic, social, demographic, geographic, or user preference characteristics associated with said target audience for each said asset. 170. A method as set forth in claim 168, wherein said targeting parameters comprise at least a geographical location, a gender, and an age of said target audience for each said asset. 171. A method for use in connection with delivering assets to users of a communications network, said method comprising: receiving a request for dissemination of an asset via said communications network, said request including one or more targeting parameters defining a target audience for said asset; receiving, from a database of user information, one or more classification parameters associated with each of said network users; comparing said targeting parameters of said asset with said classification parameters of each said network user to determine a subset of said network users to receive said asset; and satisfying said request by aggregating said subset of said network users from across a plurality of programming events of said communication network. 172. A method as set forth in claim 171, wherein said subset of said network users is formed of users within said target audience for said asset. 173. A method as set forth in claim 171, wherein said classification parameters comprise one or more of economic, social, demographic, geographic, and user preference information associated with said network users. 174. A method as set forth in claim 171, wherein said targeting parameters comprise one or more of economic, social, demographic, geographic, and user preference information associated with said target audience for said asset. 175. A method as set forth in claim 171, wherein said aggregating comprises causing said asset to be delivered to said subset of said users of said plurality of programming transmission bands during a time window such that a sum of said subset of said users substantially satisfies said dissemination request. 176. A method as set forth in claim 175, wherein said time window corresponds to temporally overlapping programming events of said communication network. 177. A method as set forth in claim 175, wherein said asset is delivered to less than all network users on at least one of said plurality of programming events during said time window. 178. A method as set forth in claim 171, wherein a plurality of assets are delivered to a plurality of audience segments of a given programming event at a given time. 179. A method of claim 178, wherein said plurality of assets includes assets of a given asset provider with differing target audiences. 180. A method of claim 178, wherein said plurality of assets includes assets of two or more asset providers with differing target audiences. 181. A method as set forth in claim 171, wherein said targeting parameters further define a temporal limitation for delivery of said asset.
2,400
7,256
7,256
14,870,675
2,453
A new approach is proposed that contemplates systems and methods to support flexible reconfiguration of a network chip by an external entity, such as a baseboard management controller (BMC), while maintaining a secured environment for the chip so that it can booted securely. Specifically, the network chip is configured to designate one or more of its networking ports to the BMC and allow the BMC to configure the designated networking ports without violating the secure areas of the network chip. To this end, the network chip is configured to allow the BMC to access a plurality of registers of the network chip via an Network Controller Sideband Interface (NC-SI) block of the network chip by issuing a plurality NC-SI compliant commands. By configuring the designated networking ports, the BMC is configured to establish a data path to a management software of a platform that includes the network chip though the designated networking ports.
1. A system to support flexible chip configuration while maintaining a secured boot environment, comprising: an external baseboard management controller (BMC) of a network chip configured to: directly access a plurality of registers of the network chip in order to configure one or more networking ports designated for communication with the external BMC without violating secure areas of the network chip; establish a data path to access a management software of a platform of the network chip over a network though the configured networking ports of the network chip; said network chip configured to: provide and designate the one or more networking ports for communication with the external BMC; receive and transmit data packets between the BMC and the management software through the designated networking ports over the network along the data path. 2. The system of claim 1, wherein: the network chip is a System On Chip (SOC), which includes one or more coprocessors/cores and memory units. 3. The system of claim 1, wherein: the external BMC is enabled to configure the networking ports of the network chip by itself so that the external BMC functions independently of the network chip. 4. The system of claim 3, wherein: the external BMC is configured to communicate with the management software over the network even when cores of the network chip are not functioning properly. 5. The system of claim 1, wherein: the network chip is configured to provide access to the networking ports by the external BMC without circumventing security feature of the network chip or allowing the external BMC to access to secured areas of the network chip used to boot the network chip securely. 6. The system of claim 1, wherein: the external BMC is configured to configure the networking ports of the network chip by initiating/issuing a plurality of NC-SI compliant commands to configure the plurality of registers of the network chip. 7. The system of claim 1, wherein: the plurality of registers being directly accessed by the external BMC include at least hose associated with networking-related components of the network chip, wherein the registers are responsible for interfacing to the network via the networking ports and/or merging/splitting the management traffic going from/to the external BMC. 8. The system of claim 1, wherein: the network chip is configured to designate the registers to be accessed by the external BMC to be in either a secure address map or a non-secure address map by configuring corresponding devices of the registers in the address space of the network chip. 9. The system of claim 1, wherein: the network chip is configured to assert fine grain control over which registers and/or networking ports the external BMC is allowed access. 10. The system of claim 1, wherein: the external BMC is configured to handle errors that may occur during operation or configuration of the network chip. 11. The system of claim 1, wherein: the network chip integrates an Network Controller Sideband Interface (NC-SI) block on the same chip, wherein the NC-SI block is configured to provide an interface and protocol control between the network chip and the external BMC over an NC-SI bus. 12. The system of claim 11, wherein: the external BMC works under in-band management, wherein it shares the one or more networking ports integrated in the network chip through the NC-SI interface block. 13. The system of claim 11, wherein: the NC-SI block is configured to provide a permissions table that contains values indicating allowed access to the registers in the network chip by the external BMC, wherein the default values in the permissions table allow minimal and non-secured access by the external BMC to only those to only those registers that are network related. 14. The system of claim 13, wherein: the NC-SI block is configured to match a requested address of the registers in a command by the external BMC that requires a read or write operation to one of the registers against these registers listed in the permissions table to determine allowed access to the registers by the external BMC. 15. The system of claim 13, wherein: the NC-SI block is configured to provide a secured register access indicator that enable permissions table checking. 16. The system of claim 13, wherein: the NC-SI block is configured to maintain the permissions table in a secured address space, wherein the permissions table cannot be changed except by a secured request. 17. The system of claim 11, wherein: the NC-SI block is configured to check access permission to the registers by the external BMC based on a plurality of pre-specified access policies. 18. The system of claim 11, wherein: the NC-SI block is configured to examine each of the packets to determine whether the packet is an NC-SI command or a pass through packet. 19. The system of claim 18, wherein: the NC-SI block is configured to either process the packet if it includes an NC-SI compliant command or pass the packet to the designated networking port to be transmitted over the network if it is a pass through packet. 20. The system of claim 19, wherein: the NC-SI block is configured to provide responses/processing results of the NC-SI command to the external BMC. 21. A method to support flexible chip configuration while maintaining a secured boot environment, comprising: providing and designating one or more networking ports of a network chip for communication with an external baseboard management controller (BMC) of the network chip; directly accessing a plurality of registers of the network chip in order to configure one or more networking ports designated for communication with the external BMC without violating secure areas of the network chip; establishing a data path to access a management software of a platform of the network chip over a network though the configured networking ports of the network chip; receiving and transmitting one or more data packets between the BMC and the management software through the designated networking ports over the network along the data path. 22. The method of claim 21, further comprising: enabling the external BMC to configure the networking ports of the network chip by itself so that the external BMC functions independently of the network chip. 23. The method of claim 22, further comprising: enabling the external BMC to communicate with the management software over the network even when cores of the network chip are not functioning properly. 24. The method of claim 21, further comprising: providing access to the networking ports by the external BMC without circumventing security feature of the network chip or allowing the external BMC to access to secured areas of the network chip used to boot the network chip securely. 75. The method of claim 21, further comprising: configuring the networking ports of the network chip by initiating/issuing a plurality of NC-SI compliant commands to configure the plurality of registers of the network chip. 26. The method of claim 21, further comprising: designating the registers to be accessed by the external BMC to be in either a secure address map or a non-secure address map by configuring corresponding devices of the registers in the address space of the network chip. 27. The method of claim 21, further comprising: asserting fine grain control over which registers and/or networking ports the external BMC is allowed access. 28. The method of claim 21, further comprising: handling errors that may occur during operation or configuration of the network chip. 29. The method of claim 21, further comprising: integrating an Network Controller Sideband Interface (NC-SI) block with the network chip on the same chip, wherein the NC-SI block is configured to provide an interface and protocol control between the network chip and the external BMC over an NC-SI bus. 30. The method of claim 29, further comprising: enabling the external BMC to work under in-band management, wherein it shares the one or more networking ports integrated in the network chip through the NC-SI interface block. 31. The method of claim 29, further comprising: providing a permissions table that contains values indicating allowed access to the registers in the network chip by the external BMC, wherein the default values in the permissions table allow minimal and non-secured access by the external BMC to only those to only those registers that are network related. 32. The method of claim 31, further comprising: matching a requested address of the registers in a command by the external BMC that requires a read or write operation to one of the registers against these registers listed in the permissions table to determine allowed access to the registers by the external BMC. 33. The method of claim 31, further comprising: providing a secured register access indicator that enable permissions table checking. 34. The method of claim 31, further comprising: maintaining the permissions table in a secured address space, wherein the permissions table cannot be changed except by a secured request. 35. The method of claim 29, further comprising: checking access permission to the registers by the external BMC based on a plurality of pre-specified access policies. 36. The method of claim 29, further comprising: examining each of the packets to determine whether the packet is an NC-SI command or a pass through packet. 37. The method of claim 36, further comprising: either processing the packet if it includes an NC-SI compliant command or passing the packet to the designated networking port to be transmitted over the network if it is a pass through packet. 38. The method of claim 37, further comprising: providing responses/processing results of the NC-SI command to the external BMC.
A new approach is proposed that contemplates systems and methods to support flexible reconfiguration of a network chip by an external entity, such as a baseboard management controller (BMC), while maintaining a secured environment for the chip so that it can booted securely. Specifically, the network chip is configured to designate one or more of its networking ports to the BMC and allow the BMC to configure the designated networking ports without violating the secure areas of the network chip. To this end, the network chip is configured to allow the BMC to access a plurality of registers of the network chip via an Network Controller Sideband Interface (NC-SI) block of the network chip by issuing a plurality NC-SI compliant commands. By configuring the designated networking ports, the BMC is configured to establish a data path to a management software of a platform that includes the network chip though the designated networking ports.1. A system to support flexible chip configuration while maintaining a secured boot environment, comprising: an external baseboard management controller (BMC) of a network chip configured to: directly access a plurality of registers of the network chip in order to configure one or more networking ports designated for communication with the external BMC without violating secure areas of the network chip; establish a data path to access a management software of a platform of the network chip over a network though the configured networking ports of the network chip; said network chip configured to: provide and designate the one or more networking ports for communication with the external BMC; receive and transmit data packets between the BMC and the management software through the designated networking ports over the network along the data path. 2. The system of claim 1, wherein: the network chip is a System On Chip (SOC), which includes one or more coprocessors/cores and memory units. 3. The system of claim 1, wherein: the external BMC is enabled to configure the networking ports of the network chip by itself so that the external BMC functions independently of the network chip. 4. The system of claim 3, wherein: the external BMC is configured to communicate with the management software over the network even when cores of the network chip are not functioning properly. 5. The system of claim 1, wherein: the network chip is configured to provide access to the networking ports by the external BMC without circumventing security feature of the network chip or allowing the external BMC to access to secured areas of the network chip used to boot the network chip securely. 6. The system of claim 1, wherein: the external BMC is configured to configure the networking ports of the network chip by initiating/issuing a plurality of NC-SI compliant commands to configure the plurality of registers of the network chip. 7. The system of claim 1, wherein: the plurality of registers being directly accessed by the external BMC include at least hose associated with networking-related components of the network chip, wherein the registers are responsible for interfacing to the network via the networking ports and/or merging/splitting the management traffic going from/to the external BMC. 8. The system of claim 1, wherein: the network chip is configured to designate the registers to be accessed by the external BMC to be in either a secure address map or a non-secure address map by configuring corresponding devices of the registers in the address space of the network chip. 9. The system of claim 1, wherein: the network chip is configured to assert fine grain control over which registers and/or networking ports the external BMC is allowed access. 10. The system of claim 1, wherein: the external BMC is configured to handle errors that may occur during operation or configuration of the network chip. 11. The system of claim 1, wherein: the network chip integrates an Network Controller Sideband Interface (NC-SI) block on the same chip, wherein the NC-SI block is configured to provide an interface and protocol control between the network chip and the external BMC over an NC-SI bus. 12. The system of claim 11, wherein: the external BMC works under in-band management, wherein it shares the one or more networking ports integrated in the network chip through the NC-SI interface block. 13. The system of claim 11, wherein: the NC-SI block is configured to provide a permissions table that contains values indicating allowed access to the registers in the network chip by the external BMC, wherein the default values in the permissions table allow minimal and non-secured access by the external BMC to only those to only those registers that are network related. 14. The system of claim 13, wherein: the NC-SI block is configured to match a requested address of the registers in a command by the external BMC that requires a read or write operation to one of the registers against these registers listed in the permissions table to determine allowed access to the registers by the external BMC. 15. The system of claim 13, wherein: the NC-SI block is configured to provide a secured register access indicator that enable permissions table checking. 16. The system of claim 13, wherein: the NC-SI block is configured to maintain the permissions table in a secured address space, wherein the permissions table cannot be changed except by a secured request. 17. The system of claim 11, wherein: the NC-SI block is configured to check access permission to the registers by the external BMC based on a plurality of pre-specified access policies. 18. The system of claim 11, wherein: the NC-SI block is configured to examine each of the packets to determine whether the packet is an NC-SI command or a pass through packet. 19. The system of claim 18, wherein: the NC-SI block is configured to either process the packet if it includes an NC-SI compliant command or pass the packet to the designated networking port to be transmitted over the network if it is a pass through packet. 20. The system of claim 19, wherein: the NC-SI block is configured to provide responses/processing results of the NC-SI command to the external BMC. 21. A method to support flexible chip configuration while maintaining a secured boot environment, comprising: providing and designating one or more networking ports of a network chip for communication with an external baseboard management controller (BMC) of the network chip; directly accessing a plurality of registers of the network chip in order to configure one or more networking ports designated for communication with the external BMC without violating secure areas of the network chip; establishing a data path to access a management software of a platform of the network chip over a network though the configured networking ports of the network chip; receiving and transmitting one or more data packets between the BMC and the management software through the designated networking ports over the network along the data path. 22. The method of claim 21, further comprising: enabling the external BMC to configure the networking ports of the network chip by itself so that the external BMC functions independently of the network chip. 23. The method of claim 22, further comprising: enabling the external BMC to communicate with the management software over the network even when cores of the network chip are not functioning properly. 24. The method of claim 21, further comprising: providing access to the networking ports by the external BMC without circumventing security feature of the network chip or allowing the external BMC to access to secured areas of the network chip used to boot the network chip securely. 75. The method of claim 21, further comprising: configuring the networking ports of the network chip by initiating/issuing a plurality of NC-SI compliant commands to configure the plurality of registers of the network chip. 26. The method of claim 21, further comprising: designating the registers to be accessed by the external BMC to be in either a secure address map or a non-secure address map by configuring corresponding devices of the registers in the address space of the network chip. 27. The method of claim 21, further comprising: asserting fine grain control over which registers and/or networking ports the external BMC is allowed access. 28. The method of claim 21, further comprising: handling errors that may occur during operation or configuration of the network chip. 29. The method of claim 21, further comprising: integrating an Network Controller Sideband Interface (NC-SI) block with the network chip on the same chip, wherein the NC-SI block is configured to provide an interface and protocol control between the network chip and the external BMC over an NC-SI bus. 30. The method of claim 29, further comprising: enabling the external BMC to work under in-band management, wherein it shares the one or more networking ports integrated in the network chip through the NC-SI interface block. 31. The method of claim 29, further comprising: providing a permissions table that contains values indicating allowed access to the registers in the network chip by the external BMC, wherein the default values in the permissions table allow minimal and non-secured access by the external BMC to only those to only those registers that are network related. 32. The method of claim 31, further comprising: matching a requested address of the registers in a command by the external BMC that requires a read or write operation to one of the registers against these registers listed in the permissions table to determine allowed access to the registers by the external BMC. 33. The method of claim 31, further comprising: providing a secured register access indicator that enable permissions table checking. 34. The method of claim 31, further comprising: maintaining the permissions table in a secured address space, wherein the permissions table cannot be changed except by a secured request. 35. The method of claim 29, further comprising: checking access permission to the registers by the external BMC based on a plurality of pre-specified access policies. 36. The method of claim 29, further comprising: examining each of the packets to determine whether the packet is an NC-SI command or a pass through packet. 37. The method of claim 36, further comprising: either processing the packet if it includes an NC-SI compliant command or passing the packet to the designated networking port to be transmitted over the network if it is a pass through packet. 38. The method of claim 37, further comprising: providing responses/processing results of the NC-SI command to the external BMC.
2,400
7,257
7,257
14,749,952
2,439
Identity authentication comprises: determining, in response to a request from a first device operated by a source user, that an identity authentication is to be performed for the source user; identifying a target user who is deemed to satisfy at least a preset condition, the target user being a user other than the source user; generating validation information to authenticate identity of the source user; sending the validation information to a second device operated by the target user; receiving a validation response from the first device operated by the source user; and performing identity authentication, including verifying whether the validation response received from the first device operated by the source user matches the validation information sent to the second device.
1. A method, comprising: determining, in response to a request from a first device operated by a source user, that an identity authentication is to be performed for the source user; identifying a target user who is deemed to satisfy at least a preset condition, the target user being a user other than the source user; generating validation information to authenticate identity of the source user; sending the validation information to a second device operated by the target user; receiving a validation response from the first device operated by the source user; and performing identity authentication, including verifying whether the validation response received from the first device operated by the source user matches the validation information sent to the second device. 2. The method of claim 1, wherein the identifying the target user comprises: determining a set of one or more associated users of the source user based at least in part on the source user's historical user information; using the historical user information to compute a set of one or more trust levels between the source user and respective ones of the set of one or more associated users; and selecting a set of one or more trusted users among the set of one or more associated users, the one or more trusted users each having a trust level that meets or exceeds a trust level threshold; wherein the target user is selected among the set of one or more trusted users. 3. The method of claim 2, wherein the historical user information comprises location-based services (LBS) information; and the set of one or more trust levels are computed based at least in part on the LBS information. 4. The method of claim 2, wherein the historical user information comprises WiFi hotspot scan information, and the set of one or more trust levels is computed based at least in part on the WiFi hotspot scan information. 5. The method of claim 2, wherein the historical user information comprises: communication information pertaining to a number of communications sent, received, or both by the first device, and the set of one or more trust levels is computed based at least in part on the communication information. 6. The method of claim 1, wherein the preset condition includes a distance requirement of the second device operated by the target user relative to the first device operated by the source user. 7. The method of claim 1, wherein the identifying the target user includes: determining a set of one or more nearby users associated with the source user; determining a set of one or more trusted users among the one or more nearby users; computing a set of one or more trust levels of the source user relative to respective ones of the set of one or more trusted users; and selecting among the set of one or more trusted users a set of one or more potential target users; wherein the target user is selected among the set of one or more potential target users. 8. The method of claim 7, wherein the set of one or more nearby users associated with the source user is determined based at least in part on source user information sent by the first device. 9. The method of claim 7, wherein the set of one or more nearby users associated with the source user is determined based at least in part on current LBS information of the first device. 10. The method of claim 7, wherein the set of one or more nearby users associated with the source user is determined based at least in part on WiFi hotspot scan information of the first device. 11. The method of claim 1, wherein identifying the target user further comprises: sending to the first device information pertaining to a plurality of potential target users and causing the information pertaining to the plurality of potential target users to be presented to the source user on the first device; and receiving from the first device a selection of the target user among the plurality of potential target users made by the source user. 12. A system comprising: one or more processors to: determine, in response to a request from a first device operated by a source user, that an identity authentication is to be performed for the source user; identify a target user who is deemed to satisfy at least a preset condition, the target user being a user other than the source user; generate validation information to authenticate identity of the source user; send the validation information to a second device operated by the target user; receive a validation response from the first device operated by the source user; and perform identity authentication, including verifying whether the validation response received from the first device operated by the source user matches the validation information sent to the second device; and one or more memories coupled to the one or more processors, configured to provide the one or more processors with instructions. 13. The system of claim 12, wherein to identify the target user comprises to: determine a set of one or more associated users of the source user based at least in part on the source user's historical user information; use the historical user information to compute a set of one or more trust levels between the source user and respective ones of the set of one or more associated users; and select a set of one or more trusted users among the set of one or more associated users, the one or more trusted users each having a trust level that meets or exceeds a trust level threshold; wherein the target user is selected among the set of one or more trusted users. 14. The system of claim 13, wherein the historical user information comprises location-based services (LBS) information; and the set of one or more trust levels are computed based at least in part on the LBS information. 15. The system of claim 13, wherein the historical user information comprises WiFi hotspot scan information, and the set of one or more trust levels is computed based at least in part on the WiFi hotspot scan information. 16. The system of claim 13, wherein the historical user information comprises: communication information pertaining to a number of communications sent, received, or both by the first device, and the set of one or more trust levels is computed based at least in part on the communication information. 17. The system of claim 12, wherein the preset condition includes a distance requirement of the second device operated by the target user relative to the first device operated by the source user. 18. The system of claim 12, wherein to identify the target user includes to: determine a set of one or more nearby users associated with the source user; determine a set of one or more trusted users among the one or more nearby users; compute a set of one or more trust levels of the source user relative to respective ones of the set of one or more trusted users; and select among the set of one or more trusted users a set of one or more potential target users; wherein the target user is selected among the set of one or more potential target users. 19. The system of claim 18, wherein the set of one or more nearby users associated with the source user is determined based at least in part on source user information sent by the first device. 20. The system of claim 18, wherein the set of one or more nearby users associated with the source user is determined based at least in part on current LBS information of the first device. 21. The system of claim 18, wherein the set of one or more nearby users associated with the source user is determined based at least in part on WiFi hotspot scan information of the first device. 22. The system of claim 12, wherein to identify the target user further includes to: send to the first device information pertaining to a plurality of potential target users and cause the information pertaining to the plurality of potential target users to be presented to the source user on the first device; and receive from the first device a selection of the target user among the plurality of potential target users made by the source user. 23. A computer program product, the computer program product being embodied in a tangible non-transitory computer readable storage medium and comprising computer instructions for: determining, in response to a request from a first device operated by a source user, that an identity authentication is to be performed for the source user; identifying a target user who is deemed to satisfy at least a preset condition, the target user being a user other than the source user; generating validation information to authenticate identity of the source user; sending the validation information to a second device operated by the target user; receiving a validation response from the first device operated by the source user; and performing identity authentication, including verifying whether the validation response received from the first device operated by the source user matches the validation information sent to the second device.
Identity authentication comprises: determining, in response to a request from a first device operated by a source user, that an identity authentication is to be performed for the source user; identifying a target user who is deemed to satisfy at least a preset condition, the target user being a user other than the source user; generating validation information to authenticate identity of the source user; sending the validation information to a second device operated by the target user; receiving a validation response from the first device operated by the source user; and performing identity authentication, including verifying whether the validation response received from the first device operated by the source user matches the validation information sent to the second device.1. A method, comprising: determining, in response to a request from a first device operated by a source user, that an identity authentication is to be performed for the source user; identifying a target user who is deemed to satisfy at least a preset condition, the target user being a user other than the source user; generating validation information to authenticate identity of the source user; sending the validation information to a second device operated by the target user; receiving a validation response from the first device operated by the source user; and performing identity authentication, including verifying whether the validation response received from the first device operated by the source user matches the validation information sent to the second device. 2. The method of claim 1, wherein the identifying the target user comprises: determining a set of one or more associated users of the source user based at least in part on the source user's historical user information; using the historical user information to compute a set of one or more trust levels between the source user and respective ones of the set of one or more associated users; and selecting a set of one or more trusted users among the set of one or more associated users, the one or more trusted users each having a trust level that meets or exceeds a trust level threshold; wherein the target user is selected among the set of one or more trusted users. 3. The method of claim 2, wherein the historical user information comprises location-based services (LBS) information; and the set of one or more trust levels are computed based at least in part on the LBS information. 4. The method of claim 2, wherein the historical user information comprises WiFi hotspot scan information, and the set of one or more trust levels is computed based at least in part on the WiFi hotspot scan information. 5. The method of claim 2, wherein the historical user information comprises: communication information pertaining to a number of communications sent, received, or both by the first device, and the set of one or more trust levels is computed based at least in part on the communication information. 6. The method of claim 1, wherein the preset condition includes a distance requirement of the second device operated by the target user relative to the first device operated by the source user. 7. The method of claim 1, wherein the identifying the target user includes: determining a set of one or more nearby users associated with the source user; determining a set of one or more trusted users among the one or more nearby users; computing a set of one or more trust levels of the source user relative to respective ones of the set of one or more trusted users; and selecting among the set of one or more trusted users a set of one or more potential target users; wherein the target user is selected among the set of one or more potential target users. 8. The method of claim 7, wherein the set of one or more nearby users associated with the source user is determined based at least in part on source user information sent by the first device. 9. The method of claim 7, wherein the set of one or more nearby users associated with the source user is determined based at least in part on current LBS information of the first device. 10. The method of claim 7, wherein the set of one or more nearby users associated with the source user is determined based at least in part on WiFi hotspot scan information of the first device. 11. The method of claim 1, wherein identifying the target user further comprises: sending to the first device information pertaining to a plurality of potential target users and causing the information pertaining to the plurality of potential target users to be presented to the source user on the first device; and receiving from the first device a selection of the target user among the plurality of potential target users made by the source user. 12. A system comprising: one or more processors to: determine, in response to a request from a first device operated by a source user, that an identity authentication is to be performed for the source user; identify a target user who is deemed to satisfy at least a preset condition, the target user being a user other than the source user; generate validation information to authenticate identity of the source user; send the validation information to a second device operated by the target user; receive a validation response from the first device operated by the source user; and perform identity authentication, including verifying whether the validation response received from the first device operated by the source user matches the validation information sent to the second device; and one or more memories coupled to the one or more processors, configured to provide the one or more processors with instructions. 13. The system of claim 12, wherein to identify the target user comprises to: determine a set of one or more associated users of the source user based at least in part on the source user's historical user information; use the historical user information to compute a set of one or more trust levels between the source user and respective ones of the set of one or more associated users; and select a set of one or more trusted users among the set of one or more associated users, the one or more trusted users each having a trust level that meets or exceeds a trust level threshold; wherein the target user is selected among the set of one or more trusted users. 14. The system of claim 13, wherein the historical user information comprises location-based services (LBS) information; and the set of one or more trust levels are computed based at least in part on the LBS information. 15. The system of claim 13, wherein the historical user information comprises WiFi hotspot scan information, and the set of one or more trust levels is computed based at least in part on the WiFi hotspot scan information. 16. The system of claim 13, wherein the historical user information comprises: communication information pertaining to a number of communications sent, received, or both by the first device, and the set of one or more trust levels is computed based at least in part on the communication information. 17. The system of claim 12, wherein the preset condition includes a distance requirement of the second device operated by the target user relative to the first device operated by the source user. 18. The system of claim 12, wherein to identify the target user includes to: determine a set of one or more nearby users associated with the source user; determine a set of one or more trusted users among the one or more nearby users; compute a set of one or more trust levels of the source user relative to respective ones of the set of one or more trusted users; and select among the set of one or more trusted users a set of one or more potential target users; wherein the target user is selected among the set of one or more potential target users. 19. The system of claim 18, wherein the set of one or more nearby users associated with the source user is determined based at least in part on source user information sent by the first device. 20. The system of claim 18, wherein the set of one or more nearby users associated with the source user is determined based at least in part on current LBS information of the first device. 21. The system of claim 18, wherein the set of one or more nearby users associated with the source user is determined based at least in part on WiFi hotspot scan information of the first device. 22. The system of claim 12, wherein to identify the target user further includes to: send to the first device information pertaining to a plurality of potential target users and cause the information pertaining to the plurality of potential target users to be presented to the source user on the first device; and receive from the first device a selection of the target user among the plurality of potential target users made by the source user. 23. A computer program product, the computer program product being embodied in a tangible non-transitory computer readable storage medium and comprising computer instructions for: determining, in response to a request from a first device operated by a source user, that an identity authentication is to be performed for the source user; identifying a target user who is deemed to satisfy at least a preset condition, the target user being a user other than the source user; generating validation information to authenticate identity of the source user; sending the validation information to a second device operated by the target user; receiving a validation response from the first device operated by the source user; and performing identity authentication, including verifying whether the validation response received from the first device operated by the source user matches the validation information sent to the second device.
2,400
7,258
7,258
15,040,044
2,433
A method and system. A computer iteratively processes a unique condition digest of at least two condition digests in each iteration of a loop for a sufficient number of iterations to process all condition digests of the at least two condition digests. The processing in each iteration includes concatenating a reference digest with the unique condition digest of the iteration to generate a concatenand and hashing the concatenand to generate a hashed concatenand that serves as the reference digest for the next iteration if the next iteration is performed. Each unique condition digest is a different condition digest in each iteration of the loop. The regenerated reference digest of the last iteration of the loop is a last digest.
1. A method, said method comprising: a computer iteratively processing a unique condition digest of a plurality of condition digests in each iteration of a loop for a sufficient number of iterations to process all condition digests of the plurality of condition digests, said processing in each iteration comprising concatenating a reference digest with the unique condition digest of the iteration to generate a concatenand and hashing the concatenand to generate a hashed concatenand that serves as the reference digest for the next iteration if the next iteration is performed, each unique condition digest being a different condition digest in each iteration of the loop, the regenerated reference digest of the last iteration of the loop being a last digest. 2. The method of claim 1, said method further comprising: said computer encrypting the last digest to generate a digital signature block that represents a data item and a plurality of conditions specified for a digital signature, said digital signature block comprising the digital signature. 3. The method of claim 2, wherein the digital signature block enables cryptographic verification of both the data item and the plurality of conditions. 4. The method of claim 2, wherein said encrypting comprises signing the last digest with the digital signature. 5. The method of claim 4, wherein said signing is performed by a signer and represents acceptance of the data item by the signer subject to the plurality of conditions. 6. The method of claim 4, wherein said signing is performed by a signer and represents acceptance of the data item by the signer, and wherein said acceptance is not subject to the plurality of conditions. 7. The method of claim 2, wherein the reference digest is equal to a digest of the data item, and wherein the digest of the data item is formed from a hashing of the data item. 8. The method of claim 2, said method further comprising: said computer hashing each condition of the plurality of conditions separately from each other and separately from the data item to generate the plurality of condition digests respectively corresponding to the plurality of conditions. 9. The method of claim 2, said method further comprising: said computer generating a communication, wherein the communication comprises the digital signature block, the data item, and the plurality of conditions; and said computer sending the communication across a network to a recipient. 10. The method of claim 2, said method further comprising: said computer generating a communication, wherein the communication comprises the digital signature block and does not comprise the data item and does not comprise the plurality of conditions; and said computer sending the communication across a network to a recipient. 11. The method of claim 2, wherein the method further comprises: said computer hashing a new condition to generate a digest of the new condition; said computer concatenating the digital signature block with the digest of the new condition to generate a new digest; said computer hashing the new digest to generate a hashed new digest; and said computer encrypting the hashed new digest to generate a new digital signature block that represents the data item, the plurality of conditions, and the new condition and enables cryptographic verification of the data item, the plurality of conditions, and the new condition. 12. A computer program product, comprising a machine-readable recording medium having program code recorded thereon, said program code upon being executed by a computer performs a method for generating a digital signature of a data item, said method comprising: said computer iteratively processing a unique condition digest of a plurality of condition digests in each iteration of a loop for a sufficient number of iterations to process all condition digests of the plurality of condition digests, said processing in each iteration comprising concatenating a reference digest with the unique condition digest of the iteration to generate a concatenand and hashing the concatenand to generate a hashed concatenand that serves as the reference digest for the next iteration if the next iteration is performed, each unique condition digest being a different condition digest in each iteration of the loop, the regenerated reference digest of the last iteration of the loop being a last digest. 13. The computer program product of claim 12, said method further comprising: said computer encrypting the last digest to generate a digital signature block that represents a data item and a plurality of conditions specified for a digital signature, said digital signature block comprising the digital signature. 14. The computer program product of claim 13, wherein the digital signature block enables cryptographic verification of both the data item and the plurality of conditions. 15. The computer program product of claim 13, wherein said encrypting comprises signing the last digest with the digital signature. 16. The computer program product of claim 13, wherein the reference digest is equal to a digest of the data item, and wherein the digest of the data item is formed from a hashing of the data item. 17. A data processing apparatus comprising a computer and a machine-readable recording medium coupled to the computer, said recording medium storing program code that when executed by the computer performs a method for generating a digital signature of a data item, said method comprising: said computer iteratively processing a unique condition digest of a plurality of condition digests in each iteration of a loop for a sufficient number of iterations to process all condition digests of the plurality of condition digests, said processing in each iteration comprising concatenating a reference digest with the unique condition digest of the iteration to generate a concatenand and hashing the concatenand to generate a hashed concatenand that serves as the reference digest for the next iteration if the next iteration is performed, each unique condition digest being a different condition digest in each iteration of the loop, the regenerated reference digest of the last iteration of the loop being a last digest. 18. The data processing apparatus of claim 17, said method further comprising: said computer encrypting the last digest to generate a digital signature block that represents a data item and a plurality of conditions specified for a digital signature, said digital signature block comprising the digital signature. 19. The data processing apparatus of claim 18, wherein the digital signature block enables cryptographic verification of both the data item and the plurality of conditions. 20. The data processing apparatus of claim 18, wherein said encrypting comprises signing the last digest with the digital signature.
A method and system. A computer iteratively processes a unique condition digest of at least two condition digests in each iteration of a loop for a sufficient number of iterations to process all condition digests of the at least two condition digests. The processing in each iteration includes concatenating a reference digest with the unique condition digest of the iteration to generate a concatenand and hashing the concatenand to generate a hashed concatenand that serves as the reference digest for the next iteration if the next iteration is performed. Each unique condition digest is a different condition digest in each iteration of the loop. The regenerated reference digest of the last iteration of the loop is a last digest.1. A method, said method comprising: a computer iteratively processing a unique condition digest of a plurality of condition digests in each iteration of a loop for a sufficient number of iterations to process all condition digests of the plurality of condition digests, said processing in each iteration comprising concatenating a reference digest with the unique condition digest of the iteration to generate a concatenand and hashing the concatenand to generate a hashed concatenand that serves as the reference digest for the next iteration if the next iteration is performed, each unique condition digest being a different condition digest in each iteration of the loop, the regenerated reference digest of the last iteration of the loop being a last digest. 2. The method of claim 1, said method further comprising: said computer encrypting the last digest to generate a digital signature block that represents a data item and a plurality of conditions specified for a digital signature, said digital signature block comprising the digital signature. 3. The method of claim 2, wherein the digital signature block enables cryptographic verification of both the data item and the plurality of conditions. 4. The method of claim 2, wherein said encrypting comprises signing the last digest with the digital signature. 5. The method of claim 4, wherein said signing is performed by a signer and represents acceptance of the data item by the signer subject to the plurality of conditions. 6. The method of claim 4, wherein said signing is performed by a signer and represents acceptance of the data item by the signer, and wherein said acceptance is not subject to the plurality of conditions. 7. The method of claim 2, wherein the reference digest is equal to a digest of the data item, and wherein the digest of the data item is formed from a hashing of the data item. 8. The method of claim 2, said method further comprising: said computer hashing each condition of the plurality of conditions separately from each other and separately from the data item to generate the plurality of condition digests respectively corresponding to the plurality of conditions. 9. The method of claim 2, said method further comprising: said computer generating a communication, wherein the communication comprises the digital signature block, the data item, and the plurality of conditions; and said computer sending the communication across a network to a recipient. 10. The method of claim 2, said method further comprising: said computer generating a communication, wherein the communication comprises the digital signature block and does not comprise the data item and does not comprise the plurality of conditions; and said computer sending the communication across a network to a recipient. 11. The method of claim 2, wherein the method further comprises: said computer hashing a new condition to generate a digest of the new condition; said computer concatenating the digital signature block with the digest of the new condition to generate a new digest; said computer hashing the new digest to generate a hashed new digest; and said computer encrypting the hashed new digest to generate a new digital signature block that represents the data item, the plurality of conditions, and the new condition and enables cryptographic verification of the data item, the plurality of conditions, and the new condition. 12. A computer program product, comprising a machine-readable recording medium having program code recorded thereon, said program code upon being executed by a computer performs a method for generating a digital signature of a data item, said method comprising: said computer iteratively processing a unique condition digest of a plurality of condition digests in each iteration of a loop for a sufficient number of iterations to process all condition digests of the plurality of condition digests, said processing in each iteration comprising concatenating a reference digest with the unique condition digest of the iteration to generate a concatenand and hashing the concatenand to generate a hashed concatenand that serves as the reference digest for the next iteration if the next iteration is performed, each unique condition digest being a different condition digest in each iteration of the loop, the regenerated reference digest of the last iteration of the loop being a last digest. 13. The computer program product of claim 12, said method further comprising: said computer encrypting the last digest to generate a digital signature block that represents a data item and a plurality of conditions specified for a digital signature, said digital signature block comprising the digital signature. 14. The computer program product of claim 13, wherein the digital signature block enables cryptographic verification of both the data item and the plurality of conditions. 15. The computer program product of claim 13, wherein said encrypting comprises signing the last digest with the digital signature. 16. The computer program product of claim 13, wherein the reference digest is equal to a digest of the data item, and wherein the digest of the data item is formed from a hashing of the data item. 17. A data processing apparatus comprising a computer and a machine-readable recording medium coupled to the computer, said recording medium storing program code that when executed by the computer performs a method for generating a digital signature of a data item, said method comprising: said computer iteratively processing a unique condition digest of a plurality of condition digests in each iteration of a loop for a sufficient number of iterations to process all condition digests of the plurality of condition digests, said processing in each iteration comprising concatenating a reference digest with the unique condition digest of the iteration to generate a concatenand and hashing the concatenand to generate a hashed concatenand that serves as the reference digest for the next iteration if the next iteration is performed, each unique condition digest being a different condition digest in each iteration of the loop, the regenerated reference digest of the last iteration of the loop being a last digest. 18. The data processing apparatus of claim 17, said method further comprising: said computer encrypting the last digest to generate a digital signature block that represents a data item and a plurality of conditions specified for a digital signature, said digital signature block comprising the digital signature. 19. The data processing apparatus of claim 18, wherein the digital signature block enables cryptographic verification of both the data item and the plurality of conditions. 20. The data processing apparatus of claim 18, wherein said encrypting comprises signing the last digest with the digital signature.
2,400
7,259
7,259
14,602,034
2,461
The disclosure provides for a compressed mode transmission gap in wireless communications. A user equipment (UE) may receiving a downlink dedicated physical channel (DPCH) having a slot-format and a spreading factor during a first compression interval. The downlink DPCH may not include a compressed-mode transmission gap during the first compression interval. The UE may receive the downlink DPCH having the same slot-format and the same spreading factor during a second compression interval. The UE may determine that the downlink DPCH includes a compressed-mode transmission gap during the second compression interval. A set of slots of the downlink DPCH during the transmission gap may be punctured. The UE may decode the downlink DPCH for the second compression interval based on a set of remaining slots received during the second compression interval. In an aspect, the UE may estimate a SIR based on a TPC command in a last slot of the transmission gap.
1. A method of providing a compressed mode transmission gap in wireless communications, comprising: receiving a downlink dedicated physical channel (DPCH) having a slot-format and a spreading factor during a first compression interval, wherein the downlink DPCH does not include a compressed-mode transmission gap during the first compression interval; receiving the downlink DPCH having the same slot-format and the same spreading factor during a second compression interval; determining that the downlink DPCH includes a compressed-mode transmission gap during the second compression interval, wherein a set of slots of the downlink DPCH during the transmission gap are punctured; and decoding the downlink DPCH for the second compression interval based on a set of remaining slots received during the second compression interval. 2. The method of claim 1, further comprising: estimating a downlink signal to interference ratio (SIR) based on the downlink DPCH received during the second compression interval; comparing the estimated downlink SIR to an adjusted SIR target, wherein the adjusted SIR target is increased based on the determination that the second compression interval includes a compressed mode transmission gap; and generating an uplink TPC command based on whether the estimated downlink SIR satisfies the adjusted SIR target. 3. The method of claim 2, wherein the slot-format includes no pilot signal and a TPC command is located at an end of a slot, wherein estimating the downlink SIR includes estimating the downlink SIR based on the TPC command having a fixed value received in a last slot of the transmission gap. 4. The method of claim 2, wherein the adjusted SIR target is the same as a SIR target configured for a 10 millisecond DPCH transmission. 5. The method of claim 1, wherein receiving the downlink DPCH having the slot-format using the spreading factor during the first compression interval includes decoding the downlink DPCH based on slots in a first 10 ms frame of the first compression interval. 6. The method of claim 1, wherein the downlink DPCH uses a 20 millisecond transmission in the second compression interval regardless of an uplink DPCH transmission mode. 7. The method of claim 1, further comprising: decoding, successfully, the downlink DPCH for the second compression interval before the end of the second compression interval based on the received downlink DPCH slots; and transmitting an acknowledgment that the downlink DPCH was decoded successfully during the second compression interval. 8. The method of claim 1, further comprising receiving a compressed mode configuration, wherein the compressed mode configuration sets a transmission gap length and transmission gap distance such that a total number of slots in transmission gaps in two consecutive compression intervals is less than or equal to 15. 9. The method of claim 1, wherein the DPCH in the second compression interval is transmitted with a boosted power when an effective coding rate of the DPCH exceeds a threshold. 10. An apparatus for providing a compressed mode transmission gap in wireless communications, comprising: a receiver configured to: receive a downlink dedicated physical channel (DPCH) having a slot-format and a spreading factor during a first compression interval, wherein the downlink DPCH does not include a compressed-mode transmission gap during the first compression interval, and receive the downlink DPCH having the same slot-format and the same spreading factor during a second compression interval; a transmit gap component configured to determine that the downlink DPCH includes a compressed-mode transmission gap during the second compression interval, wherein a set of slots of the downlink DPCH during the transmission gap are punctured; and a decoder configured to decode the downlink DPCH for the second compression interval based on a set of remaining slots received during the second compression interval. 11. The apparatus of claim 10, further comprising: a signal estimating component configured to: estimate a downlink SIR based on the downlink DPCH received during the second compression interval, and compare the estimated downlink SIR to an adjusted SIR target, wherein the adjusted SIR target is increased based on the determination that the second compression interval includes a compressed mode transmission gap; and a transmitter configured to generate an uplink TPC command based on whether the estimated downlink SIR satisfies the adjusted SIR target. 12. The apparatus of claim 11, wherein the slot-format includes no pilot signal and a TPC command is located at an end of a slot, wherein the signal estimating component is configured to estimate the downlink SIR based on the TPC command having a fixed value received in a last slot of the transmission gap. 13. The apparatus of claim 11, wherein the adjusted SIR target is the same as a SIR target configured for a 10 millisecond DPCH transmission. 14. The apparatus of claim 10, wherein the decoder is configured to decode the downlink DPCH having the slot-format using the spreading factor during the first compression interval based on slots in a first 10 millisecond frame of the first compression interval. 15. The apparatus of claim 10, wherein the downlink DPCH uses a 20 millisecond transmission in the second compression interval regardless of an uplink DPCH transmission mode. 16. The apparatus of claim 11, wherein the decoder is configured to decode the downlink DPCH for the second compression interval before the end of the second compression interval based on the received downlink DPCH slots, wherein the transmitter is configured to transmit an acknowledgment that the downlink DPCH was decoded successfully during the second compression interval. 17. The apparatus of claim 10, wherein a compressed mode configuration sets a transmission gap length and transmission gap distance such that a total number of slots in transmission gaps in two consecutive compression intervals is less than or equal to 15. 18. The apparatus of claim 10, wherein the DPCH in the second compression interval is transmitted with a boosted power when an effective coding rate of the DPCH exceeds a threshold. 19. An apparatus for providing a compressed mode transmission gap in wireless communications, comprising: means for receiving a downlink dedicated physical channel (DPCH) having a slot-format and a spreading factor during a first compression interval, wherein the downlink DPCH does not include a compressed-mode transmission gap during the first compression interval; means for receiving the downlink DPCH having the same slot-format and the same spreading factor during a second compression interval; means for determining that the downlink DPCH includes a compressed-mode transmission gap during the second compression interval, wherein a set of slots of the downlink DPCH during the transmission gap are punctured; and means for decoding the downlink DPCH for the second compression interval based on a set of remaining slots received during the second compression interval. 20. The apparatus of claim 19, further comprising: means for estimating a downlink signal to interference ratio (SIR) based on the downlink DPCH received during the second compression interval; means for comparing the estimated downlink SIR to an adjusted SIR target, wherein the adjusted SIR target is increased based on the determination that the second compression interval includes a compressed mode transmission gap; and means for generating an uplink TPC command based on whether the estimated downlink SIR satisfies the adjusted SIR target. 21. The apparatus of claim 20, wherein the slot-format includes no pilot signal and a TPC command is located at an end of a slot, wherein the means for estimating estimating is configured to estimate the downlink SIR based on the TPC command having a fixed value received in a last slot of the transmission gap. 22. The apparatus of claim 20, wherein the adjusted SIR target is the same as a SIR target configured for a 10 millisecond DPCH transmission. 23. The apparatus of claim 19, wherein means for receiving the downlink DPCH during the first compression interval is configured to decode the downlink DPCH based on slots in a first 10 ms frame of the first compression interval. 24. The apparatus of claim 19, wherein the downlink DPCH uses a 20 millisecond transmission in the second compression interval regardless of an uplink DPCH transmission mode. 25. The apparatus of claim 19, wherein the means for decoding are configured to decode the downlink DPCH for the second compression interval before the end of the second compression interval based on the received downlink DPCH slots, the apparatus further comprising means for transmitting an acknowledgment that the downlink DPCH was decoded successfully during the second compression interval. 26. The apparatus of claim 19, further comprising means for receiving a compressed mode configuration, wherein the compressed mode configuration sets a transmission gap length and transmission gap distance such that a total number of slots in transmission gaps in two consecutive compression intervals is less than or equal to 15. 27. A computer-readable medium storing computer executable code comprising: code for receiving a downlink dedicated physical channel (DPCH) having a slot-format and a spreading factor during a first compression interval, wherein the downlink DPCH does not include a compressed-mode transmission gap during the first compression interval; code for receiving the downlink DPCH having the same slot-format and the same spreading factor during a second compression interval; code for determining that the downlink DPCH includes a compressed-mode transmission gap during the second compression interval, wherein a set of slots of the downlink DPCH during the transmission gap are punctured; and code for decoding the downlink DPCH for the second compression interval based on a set of remaining slots received during the second compression interval. 28. The computer-readable medium of claim 27, further comprising: code for estimating a downlink signal to interference ratio (SIR) based on the downlink DPCH received during the second compression interval; code for comparing the estimated downlink SIR to an adjusted SIR target, wherein the adjusted SIR target is increased based on the determination that the second compression interval includes a compressed mode transmission gap; and generating an uplink TPC command based on whether the estimated downlink SIR satisfies the adjusted SIR target. 29. The computer-readable medium of claim 28, wherein the slot-format includes no pilot signal and a TPC command is located at an end of a slot, wherein the code for estimating the downlink SIR includes code for estimating the downlink SIR based on the TPC command having a fixed value received in a last slot of the transmission gap. 30. The computer-readable medium of claim 27, further comprising code for receiving a compressed mode configuration, wherein the compressed mode configuration sets a transmission gap length and transmission gap distance such that a total number of slots in transmission gaps in two consecutive compression intervals is less than or equal to 15.
The disclosure provides for a compressed mode transmission gap in wireless communications. A user equipment (UE) may receiving a downlink dedicated physical channel (DPCH) having a slot-format and a spreading factor during a first compression interval. The downlink DPCH may not include a compressed-mode transmission gap during the first compression interval. The UE may receive the downlink DPCH having the same slot-format and the same spreading factor during a second compression interval. The UE may determine that the downlink DPCH includes a compressed-mode transmission gap during the second compression interval. A set of slots of the downlink DPCH during the transmission gap may be punctured. The UE may decode the downlink DPCH for the second compression interval based on a set of remaining slots received during the second compression interval. In an aspect, the UE may estimate a SIR based on a TPC command in a last slot of the transmission gap.1. A method of providing a compressed mode transmission gap in wireless communications, comprising: receiving a downlink dedicated physical channel (DPCH) having a slot-format and a spreading factor during a first compression interval, wherein the downlink DPCH does not include a compressed-mode transmission gap during the first compression interval; receiving the downlink DPCH having the same slot-format and the same spreading factor during a second compression interval; determining that the downlink DPCH includes a compressed-mode transmission gap during the second compression interval, wherein a set of slots of the downlink DPCH during the transmission gap are punctured; and decoding the downlink DPCH for the second compression interval based on a set of remaining slots received during the second compression interval. 2. The method of claim 1, further comprising: estimating a downlink signal to interference ratio (SIR) based on the downlink DPCH received during the second compression interval; comparing the estimated downlink SIR to an adjusted SIR target, wherein the adjusted SIR target is increased based on the determination that the second compression interval includes a compressed mode transmission gap; and generating an uplink TPC command based on whether the estimated downlink SIR satisfies the adjusted SIR target. 3. The method of claim 2, wherein the slot-format includes no pilot signal and a TPC command is located at an end of a slot, wherein estimating the downlink SIR includes estimating the downlink SIR based on the TPC command having a fixed value received in a last slot of the transmission gap. 4. The method of claim 2, wherein the adjusted SIR target is the same as a SIR target configured for a 10 millisecond DPCH transmission. 5. The method of claim 1, wherein receiving the downlink DPCH having the slot-format using the spreading factor during the first compression interval includes decoding the downlink DPCH based on slots in a first 10 ms frame of the first compression interval. 6. The method of claim 1, wherein the downlink DPCH uses a 20 millisecond transmission in the second compression interval regardless of an uplink DPCH transmission mode. 7. The method of claim 1, further comprising: decoding, successfully, the downlink DPCH for the second compression interval before the end of the second compression interval based on the received downlink DPCH slots; and transmitting an acknowledgment that the downlink DPCH was decoded successfully during the second compression interval. 8. The method of claim 1, further comprising receiving a compressed mode configuration, wherein the compressed mode configuration sets a transmission gap length and transmission gap distance such that a total number of slots in transmission gaps in two consecutive compression intervals is less than or equal to 15. 9. The method of claim 1, wherein the DPCH in the second compression interval is transmitted with a boosted power when an effective coding rate of the DPCH exceeds a threshold. 10. An apparatus for providing a compressed mode transmission gap in wireless communications, comprising: a receiver configured to: receive a downlink dedicated physical channel (DPCH) having a slot-format and a spreading factor during a first compression interval, wherein the downlink DPCH does not include a compressed-mode transmission gap during the first compression interval, and receive the downlink DPCH having the same slot-format and the same spreading factor during a second compression interval; a transmit gap component configured to determine that the downlink DPCH includes a compressed-mode transmission gap during the second compression interval, wherein a set of slots of the downlink DPCH during the transmission gap are punctured; and a decoder configured to decode the downlink DPCH for the second compression interval based on a set of remaining slots received during the second compression interval. 11. The apparatus of claim 10, further comprising: a signal estimating component configured to: estimate a downlink SIR based on the downlink DPCH received during the second compression interval, and compare the estimated downlink SIR to an adjusted SIR target, wherein the adjusted SIR target is increased based on the determination that the second compression interval includes a compressed mode transmission gap; and a transmitter configured to generate an uplink TPC command based on whether the estimated downlink SIR satisfies the adjusted SIR target. 12. The apparatus of claim 11, wherein the slot-format includes no pilot signal and a TPC command is located at an end of a slot, wherein the signal estimating component is configured to estimate the downlink SIR based on the TPC command having a fixed value received in a last slot of the transmission gap. 13. The apparatus of claim 11, wherein the adjusted SIR target is the same as a SIR target configured for a 10 millisecond DPCH transmission. 14. The apparatus of claim 10, wherein the decoder is configured to decode the downlink DPCH having the slot-format using the spreading factor during the first compression interval based on slots in a first 10 millisecond frame of the first compression interval. 15. The apparatus of claim 10, wherein the downlink DPCH uses a 20 millisecond transmission in the second compression interval regardless of an uplink DPCH transmission mode. 16. The apparatus of claim 11, wherein the decoder is configured to decode the downlink DPCH for the second compression interval before the end of the second compression interval based on the received downlink DPCH slots, wherein the transmitter is configured to transmit an acknowledgment that the downlink DPCH was decoded successfully during the second compression interval. 17. The apparatus of claim 10, wherein a compressed mode configuration sets a transmission gap length and transmission gap distance such that a total number of slots in transmission gaps in two consecutive compression intervals is less than or equal to 15. 18. The apparatus of claim 10, wherein the DPCH in the second compression interval is transmitted with a boosted power when an effective coding rate of the DPCH exceeds a threshold. 19. An apparatus for providing a compressed mode transmission gap in wireless communications, comprising: means for receiving a downlink dedicated physical channel (DPCH) having a slot-format and a spreading factor during a first compression interval, wherein the downlink DPCH does not include a compressed-mode transmission gap during the first compression interval; means for receiving the downlink DPCH having the same slot-format and the same spreading factor during a second compression interval; means for determining that the downlink DPCH includes a compressed-mode transmission gap during the second compression interval, wherein a set of slots of the downlink DPCH during the transmission gap are punctured; and means for decoding the downlink DPCH for the second compression interval based on a set of remaining slots received during the second compression interval. 20. The apparatus of claim 19, further comprising: means for estimating a downlink signal to interference ratio (SIR) based on the downlink DPCH received during the second compression interval; means for comparing the estimated downlink SIR to an adjusted SIR target, wherein the adjusted SIR target is increased based on the determination that the second compression interval includes a compressed mode transmission gap; and means for generating an uplink TPC command based on whether the estimated downlink SIR satisfies the adjusted SIR target. 21. The apparatus of claim 20, wherein the slot-format includes no pilot signal and a TPC command is located at an end of a slot, wherein the means for estimating estimating is configured to estimate the downlink SIR based on the TPC command having a fixed value received in a last slot of the transmission gap. 22. The apparatus of claim 20, wherein the adjusted SIR target is the same as a SIR target configured for a 10 millisecond DPCH transmission. 23. The apparatus of claim 19, wherein means for receiving the downlink DPCH during the first compression interval is configured to decode the downlink DPCH based on slots in a first 10 ms frame of the first compression interval. 24. The apparatus of claim 19, wherein the downlink DPCH uses a 20 millisecond transmission in the second compression interval regardless of an uplink DPCH transmission mode. 25. The apparatus of claim 19, wherein the means for decoding are configured to decode the downlink DPCH for the second compression interval before the end of the second compression interval based on the received downlink DPCH slots, the apparatus further comprising means for transmitting an acknowledgment that the downlink DPCH was decoded successfully during the second compression interval. 26. The apparatus of claim 19, further comprising means for receiving a compressed mode configuration, wherein the compressed mode configuration sets a transmission gap length and transmission gap distance such that a total number of slots in transmission gaps in two consecutive compression intervals is less than or equal to 15. 27. A computer-readable medium storing computer executable code comprising: code for receiving a downlink dedicated physical channel (DPCH) having a slot-format and a spreading factor during a first compression interval, wherein the downlink DPCH does not include a compressed-mode transmission gap during the first compression interval; code for receiving the downlink DPCH having the same slot-format and the same spreading factor during a second compression interval; code for determining that the downlink DPCH includes a compressed-mode transmission gap during the second compression interval, wherein a set of slots of the downlink DPCH during the transmission gap are punctured; and code for decoding the downlink DPCH for the second compression interval based on a set of remaining slots received during the second compression interval. 28. The computer-readable medium of claim 27, further comprising: code for estimating a downlink signal to interference ratio (SIR) based on the downlink DPCH received during the second compression interval; code for comparing the estimated downlink SIR to an adjusted SIR target, wherein the adjusted SIR target is increased based on the determination that the second compression interval includes a compressed mode transmission gap; and generating an uplink TPC command based on whether the estimated downlink SIR satisfies the adjusted SIR target. 29. The computer-readable medium of claim 28, wherein the slot-format includes no pilot signal and a TPC command is located at an end of a slot, wherein the code for estimating the downlink SIR includes code for estimating the downlink SIR based on the TPC command having a fixed value received in a last slot of the transmission gap. 30. The computer-readable medium of claim 27, further comprising code for receiving a compressed mode configuration, wherein the compressed mode configuration sets a transmission gap length and transmission gap distance such that a total number of slots in transmission gaps in two consecutive compression intervals is less than or equal to 15.
2,400
7,260
7,260
13,928,290
2,445
A remote computing session management process is directed to the execution and management of aspects of virtual instances executed on data center computers at a program execution service (PES) platform. A computing session may be established between the PES platform and a computing device connected to the PES platform over a communications network. The data created by the user of the client computing device interacting with the virtual instance may be stored, and following an interruption of the remote computing session, the data may be used when re-establishing the remote computing session.
1. A system comprising: one or more computers of a Program Execution Service (PES) including processors and memory, the memory including instructions that, upon execution, cause the one or more computers to: receive a request from a client computing device to access a virtual desktop instance, the request identifying a user of the client computing device and a type of virtual desktop instance, wherein the type of virtual desktop instance identifies one or more of resources associated with an operating system hosted by the virtual desktop instance or a set of applications to be executed by the operating system; identify a virtual desktop instance of the type corresponding to the request; and provide, to the client computing device, access to the identified virtual desktop instance, the identified virtual desktop instance personalized according to desktop personalization information for the user and including one or more operating system folders mapped to storage in a data store for the user. 2. The system of claim 1, wherein the type is determined in accordance with information received from an administrator of an entity associated with the user. 3. The system of claim 1, wherein the type is determined in accordance with one or more selections of an operating system or one or more applications from the user. 4. The system of claim 1, wherein the type is determined in accordance with a selection by the user of one from a list of available types of virtual desktop instances. 5. A computer-implemented method comprising: receiving a request from a client computing device to access a type of virtual desktop instance, the request identifying a user of the client computing device, wherein the type of virtual desktop instance is selected by the user from a plurality of types presented; configuring a virtual desktop instance based on the type requested; and providing, to the client computing device, access to the configured virtual desktop instance, the virtual desktop instance personalized according to desktop personalization information for the user and including one or more operating system folders mapped to storage in a data store for the user. 6. The computer-implemented method of claim 5, wherein the plurality of types of virtual desktop instances presented is determined based on a user profile associated with the user. 7. The computer-implemented method of claim 6, wherein the user profile includes policy rules regarding users' respective access to resources associated with virtual desktop instances. 8. The computer-implemented method of claim 7 further comprising causing termination of access to the configured virtual desktop instance by the client computing device once a period of time of access to resources by the user equals a maximum period of time set by policy rules in the user profile. 9. The computer-implemented method of claim 7 further comprising calculating a cost associated with the access to the virtual instance by the client computing device, wherein the policy rules comprise an indication of a maximum cost authorized for respective users' access to resources. 10. The computer-implemented method of claim 9 further comprising causing termination of access to the virtual desktop instance once the cost calculated equals the maximum cost authorized for the user of the client computing device. 11. Non-transitory physical computer storage comprising computer-executable instructions that, when executed, direct a computing system to at least: receive a request from a computing device to access a type of virtual desktop instance, the request identifying a user of the client computing device, wherein the type of virtual desktop instance is selected by the user; configure a virtual desktop instance based on the type requested; and provide, to the computing device, access to the configured virtual desktop instance, the virtual desktop instance personalized according to desktop personalization information for the user and including one or more operating system folders mapped to storage in a data store for the user. 12. The non-transitory physical computer storage of claim 11, wherein the type of virtual desktop instance comprises one or more of an operating system or a set of applications executed on the virtual desktop instance. 13. The non-transitory physical computer storage of claim 11, wherein the computer-executable instructions, when executed, further direct the computing system to calculate a price associated with the access to the configured virtual desktop instance. 14. The non-transitory physical computer storage of claim 13, wherein the computer-executable instructions, when executed, further direct the computing system to indicate the calculated price to the user. 15. The non-transitory physical computer storage of claim 13, wherein the calculated price is based on the type of virtual desktop instance. 16. The non-transitory physical computer storage of claim 11, wherein the computer-executable instructions, when executed, further direct the computing system to receive a subsequent request from the computing device to access a different type of virtual desktop instance. 17. The non-transitory physical computer storage of claim 16, wherein the computer-executable instructions, when executed, further direct the computing system to calculate a price for accessing the different type of virtual desktop instance and to indicate the calculated price to the user. 18. The non-transitory physical computer storage of claim 16, wherein the computer-executable instructions, when executed, further direct the computing system to: configure another virtual desktop instance based on the different type requested; attach the other virtual desktop instance to the data store for the user; and provide, to the computing device, access to the other virtual desktop instance. 19. The non-transitory physical computer storage of claim 11, wherein the computer-executable instructions, when executed, further direct the computing system to receive a subsequent request from the client computing device to access an additional application executed by the virtual desktop instance. 20. The non-transitory physical computer storage of claim 19, wherein the computer-executable instructions, when executed, further direct the computing system to configure another virtual desktop instance including the additional application and provide, to the computing device, access to the other virtual desktop instance.
A remote computing session management process is directed to the execution and management of aspects of virtual instances executed on data center computers at a program execution service (PES) platform. A computing session may be established between the PES platform and a computing device connected to the PES platform over a communications network. The data created by the user of the client computing device interacting with the virtual instance may be stored, and following an interruption of the remote computing session, the data may be used when re-establishing the remote computing session.1. A system comprising: one or more computers of a Program Execution Service (PES) including processors and memory, the memory including instructions that, upon execution, cause the one or more computers to: receive a request from a client computing device to access a virtual desktop instance, the request identifying a user of the client computing device and a type of virtual desktop instance, wherein the type of virtual desktop instance identifies one or more of resources associated with an operating system hosted by the virtual desktop instance or a set of applications to be executed by the operating system; identify a virtual desktop instance of the type corresponding to the request; and provide, to the client computing device, access to the identified virtual desktop instance, the identified virtual desktop instance personalized according to desktop personalization information for the user and including one or more operating system folders mapped to storage in a data store for the user. 2. The system of claim 1, wherein the type is determined in accordance with information received from an administrator of an entity associated with the user. 3. The system of claim 1, wherein the type is determined in accordance with one or more selections of an operating system or one or more applications from the user. 4. The system of claim 1, wherein the type is determined in accordance with a selection by the user of one from a list of available types of virtual desktop instances. 5. A computer-implemented method comprising: receiving a request from a client computing device to access a type of virtual desktop instance, the request identifying a user of the client computing device, wherein the type of virtual desktop instance is selected by the user from a plurality of types presented; configuring a virtual desktop instance based on the type requested; and providing, to the client computing device, access to the configured virtual desktop instance, the virtual desktop instance personalized according to desktop personalization information for the user and including one or more operating system folders mapped to storage in a data store for the user. 6. The computer-implemented method of claim 5, wherein the plurality of types of virtual desktop instances presented is determined based on a user profile associated with the user. 7. The computer-implemented method of claim 6, wherein the user profile includes policy rules regarding users' respective access to resources associated with virtual desktop instances. 8. The computer-implemented method of claim 7 further comprising causing termination of access to the configured virtual desktop instance by the client computing device once a period of time of access to resources by the user equals a maximum period of time set by policy rules in the user profile. 9. The computer-implemented method of claim 7 further comprising calculating a cost associated with the access to the virtual instance by the client computing device, wherein the policy rules comprise an indication of a maximum cost authorized for respective users' access to resources. 10. The computer-implemented method of claim 9 further comprising causing termination of access to the virtual desktop instance once the cost calculated equals the maximum cost authorized for the user of the client computing device. 11. Non-transitory physical computer storage comprising computer-executable instructions that, when executed, direct a computing system to at least: receive a request from a computing device to access a type of virtual desktop instance, the request identifying a user of the client computing device, wherein the type of virtual desktop instance is selected by the user; configure a virtual desktop instance based on the type requested; and provide, to the computing device, access to the configured virtual desktop instance, the virtual desktop instance personalized according to desktop personalization information for the user and including one or more operating system folders mapped to storage in a data store for the user. 12. The non-transitory physical computer storage of claim 11, wherein the type of virtual desktop instance comprises one or more of an operating system or a set of applications executed on the virtual desktop instance. 13. The non-transitory physical computer storage of claim 11, wherein the computer-executable instructions, when executed, further direct the computing system to calculate a price associated with the access to the configured virtual desktop instance. 14. The non-transitory physical computer storage of claim 13, wherein the computer-executable instructions, when executed, further direct the computing system to indicate the calculated price to the user. 15. The non-transitory physical computer storage of claim 13, wherein the calculated price is based on the type of virtual desktop instance. 16. The non-transitory physical computer storage of claim 11, wherein the computer-executable instructions, when executed, further direct the computing system to receive a subsequent request from the computing device to access a different type of virtual desktop instance. 17. The non-transitory physical computer storage of claim 16, wherein the computer-executable instructions, when executed, further direct the computing system to calculate a price for accessing the different type of virtual desktop instance and to indicate the calculated price to the user. 18. The non-transitory physical computer storage of claim 16, wherein the computer-executable instructions, when executed, further direct the computing system to: configure another virtual desktop instance based on the different type requested; attach the other virtual desktop instance to the data store for the user; and provide, to the computing device, access to the other virtual desktop instance. 19. The non-transitory physical computer storage of claim 11, wherein the computer-executable instructions, when executed, further direct the computing system to receive a subsequent request from the client computing device to access an additional application executed by the virtual desktop instance. 20. The non-transitory physical computer storage of claim 19, wherein the computer-executable instructions, when executed, further direct the computing system to configure another virtual desktop instance including the additional application and provide, to the computing device, access to the other virtual desktop instance.
2,400
7,261
7,261
14,769,223
2,467
The present invention relates to a network node ( 14, 18, 21 ) and a method of a network node of controlling data delivery to a mobile terminal ( 11, 12, 13 ) in case of data rate throttling after having reached a data download cap. The method comprises the steps of acquiring (S 101 ) the data to be delivered to the mobile terminal, receiving (S 102 ) an indication that a data download cap for the mobile terminal has been reached, and buffering (S 103 ) the acquired data. The method further comprises the step of delivering (S 104 ) the buffered data to the mobile terminal in bursts.
1-11. (canceled) 12. A method by a network node of controlling data to be delivered to a mobile terminal, the method comprising: acquiring the data to be delivered to the mobile terminal; receiving an indication that a data download cap for the mobile terminal has been reached; and responsive to receiving the indication, buffering the acquired data and delivering the buffered data to the mobile terminal in bursts. 13. The method according to claim 12, further comprising: synchronizing, in case the acquired data pertains to separate communication sessions, the delivered bursts such that the delivered bursts of a first of the separate communication sessions at least partially overlap with the bursts of at least a second of the separate communication sessions. 14. The method according to claim 11, wherein the step of delivering the buffered data to the mobile terminal in bursts comprises: concatenating at least two buffered data subsets to form a burst to be delivered to the mobile terminal. 15. The method according to claim 12, further comprising: controlling a period of inactivity between bursts in the burst data delivered to the mobile terminal. 16. A network node for controlling data to be delivered to a mobile terminal, the network node comprising a processing circuit being arranged to: acquire the data to be delivered to the mobile terminal; receive an indication that a data download cap for the mobile terminal has been reached; and responsive to receiving the indication, buffer the acquired data and deliver the buffered data to the mobile terminal in bursts. 17. The network node according to claim 16, the processing circuit further being arranged to: synchronize, in case the acquired data pertains to separate communication sessions, the delivered bursts such that the delivered bursts of a first of the separate communication sessions at least partially overlap with the bursts of at least a second of the separate communication sessions. 18. The network node according to claim 16, the processing circuit further being arranged to: concatenate at least two buffered data subsets to form a burst to be delivered to the mobile terminal. 19. The network node according to claim 16, the processing circuit further being arranged to: control a period of inactivity between bursts in the burst data delivered to the mobile terminal. 20. The network node according to claim 16, said network node being one of: a radio base station (RBS), a base transceiver station (BTS), a NodeB, an eNodeB, a radio network controller (RNC), a base station controller (BSC), a Hypertext Transfer Protocol (HTTP) server, or a proxy server. 21. A computer readable medium storing a computer program comprising computer program instructions that, when executed by a processor of a network node, configure the network node to control data to be delivered to a mobile terminal, said computer program comprising program instructions configuring the network node to: acquire the data to be delivered to the mobile terminal; receive an indication that a data download cap for the mobile terminal has been reached; and responsive to receiving the indication, buffer the acquired data and deliver the buffered data to the mobile terminal in bursts.
The present invention relates to a network node ( 14, 18, 21 ) and a method of a network node of controlling data delivery to a mobile terminal ( 11, 12, 13 ) in case of data rate throttling after having reached a data download cap. The method comprises the steps of acquiring (S 101 ) the data to be delivered to the mobile terminal, receiving (S 102 ) an indication that a data download cap for the mobile terminal has been reached, and buffering (S 103 ) the acquired data. The method further comprises the step of delivering (S 104 ) the buffered data to the mobile terminal in bursts.1-11. (canceled) 12. A method by a network node of controlling data to be delivered to a mobile terminal, the method comprising: acquiring the data to be delivered to the mobile terminal; receiving an indication that a data download cap for the mobile terminal has been reached; and responsive to receiving the indication, buffering the acquired data and delivering the buffered data to the mobile terminal in bursts. 13. The method according to claim 12, further comprising: synchronizing, in case the acquired data pertains to separate communication sessions, the delivered bursts such that the delivered bursts of a first of the separate communication sessions at least partially overlap with the bursts of at least a second of the separate communication sessions. 14. The method according to claim 11, wherein the step of delivering the buffered data to the mobile terminal in bursts comprises: concatenating at least two buffered data subsets to form a burst to be delivered to the mobile terminal. 15. The method according to claim 12, further comprising: controlling a period of inactivity between bursts in the burst data delivered to the mobile terminal. 16. A network node for controlling data to be delivered to a mobile terminal, the network node comprising a processing circuit being arranged to: acquire the data to be delivered to the mobile terminal; receive an indication that a data download cap for the mobile terminal has been reached; and responsive to receiving the indication, buffer the acquired data and deliver the buffered data to the mobile terminal in bursts. 17. The network node according to claim 16, the processing circuit further being arranged to: synchronize, in case the acquired data pertains to separate communication sessions, the delivered bursts such that the delivered bursts of a first of the separate communication sessions at least partially overlap with the bursts of at least a second of the separate communication sessions. 18. The network node according to claim 16, the processing circuit further being arranged to: concatenate at least two buffered data subsets to form a burst to be delivered to the mobile terminal. 19. The network node according to claim 16, the processing circuit further being arranged to: control a period of inactivity between bursts in the burst data delivered to the mobile terminal. 20. The network node according to claim 16, said network node being one of: a radio base station (RBS), a base transceiver station (BTS), a NodeB, an eNodeB, a radio network controller (RNC), a base station controller (BSC), a Hypertext Transfer Protocol (HTTP) server, or a proxy server. 21. A computer readable medium storing a computer program comprising computer program instructions that, when executed by a processor of a network node, configure the network node to control data to be delivered to a mobile terminal, said computer program comprising program instructions configuring the network node to: acquire the data to be delivered to the mobile terminal; receive an indication that a data download cap for the mobile terminal has been reached; and responsive to receiving the indication, buffer the acquired data and deliver the buffered data to the mobile terminal in bursts.
2,400
7,262
7,262
13,141,495
2,477
A method ( 300 ) for enabling self-coexistence of devices in a flexible wireless system ( 200 ) that includes first and second wireless networks sharing a frequency band. The method includes discovering a second device operable in the second wireless network that overlaps with the first wireless network (S 310 ); reporting the discovered second device to a first device operable in the first wireless network (S 320 ); determining if an adjustment is needed between a first beacon period of the first device and a second beacon period of the second device (S 330 ); and adjusting a first beacon period start time (BPST) of the first device with a second BPST of the second device (S 370 ) if the adjustment is needed.
1. A method (300) for enabling self-coexistence of devices in a flexible wireless system (200) that includes first and second wireless networks sharing a frequency band, the method comprising: discovering a second device operable in the second wireless network that overlaps with the first wireless network (S310); reporting the discovered second device to a first device operable in the first wireless network (S320); determining if an adjustment is needed between a first beacon period of the first device and a second beacon period of the second device (S330); and adjusting a first beacon period start time (BPST) of the first device with a second BPST of the second device (S370) if the adjustment is needed. 2. The method of claim 1, wherein discovering the second device further comprises determining if a beacon received from the second device includes at least a second network identifier (NetID) different from a first NetID of the first device. 3. The method of claim 2, wherein reporting the discovered second device further comprises: generating a report information element (IE) to include at least the second NetID of the discovered second device; transmitting the report IE in the first beacon period of the first device if the first device is a beaconing device; and transmitting the report IE in a signaling window of the first device if the first device is a non-beaconing device. 4. The method of claim 1, wherein determining if the adjustment is needed further comprises determining if the first device should join a group that includes devices that should not adjust their BPST based on at least a configuration of the flexible wireless system (S340). 5. The method of claim 4, wherein the configuration of the flexible wireless system is selected from one of distributed-distributed, centralized-distributed, and centralized-centralized. 6. The method of claim 5, wherein if the configuration of the flexible wireless system is distributed-distributed, the group is defined to include devices having a largest number of reserved slots, a largest beacon period length, or a largest superframe number. 7. The method of claim 5, wherein if the configuration of the flexible wireless system is centralized-centralized, the group is defined to include a master device with a largest number of slave devices with active reservations or a master device with a largest number of reserved slots, and wherein if such master device is not found, including in the group devices with a largest overall number of reserved slots, a largest beacon period length, or a largest superframe number. 8. The method of claim 5, wherein if the configuration of the flexible wireless system is centralized-distributed the group is defined to include at least one slave device operating in a centralized mode with active reservation, and wherein if such slave device is not found, including in the group devices with a largest overall number of reserved slots, a largest beacon period length, or a largest superframe number. 9. The method of claim 4, wherein devices that are not included in the group are added to another group, wherein the devices in the another group adjust their BPST (S350 and S360). 10. The method of claim 1, wherein adjusting the first BPST further comprises: determining if the first device is a master device; setting a beacon slot number of the first device to a new beacon slot number if the first device is not a master device; and adjusting the first BPST of the first device and its slave device to a new BPST if the first device is a master device. 11. The method of claim 10, wherein setting the beacon slot number further comprises computing the new beacon slot number by adding to an old beacon slot number a highest occupied beacon slot number plus one and subtracting a signal slot count; wherein the number of the highest occupied beacon slot is indicated in a received beacon and the signal slot count is a number of signaling slots in a superframe. 12. The method of claim 10, wherein adjusting the first BPST of the first device and its slave device to a new BPST further comprises: setting a new BPST value by the master device; reporting to the slave device the new BPST value using a beacon; starting a timer to count a time for switching to the new BPST; and upon receiving an acknowledgment (ACK) message from each slave device or once the timer expires, switching to the new BPST. 13. The method of claim 1, further comprising promoting, by a master device, a non-beaconing discovering device to function as a beaconing device (400). 14. The method of claim 13, wherein promoting the non-beaconing discovering device is performed if: a promotion request is received by the master device (S410); or the discovered second device belongs to a newly discovered group that includes devices that are neighbors of the non-beaconing discovering device but not of other beaconing devices in a network (S440, S450, S460). 15. A network device (510) operable in self-coexistence with network devices in a flexible wireless system (200) that includes first and second wireless networks sharing a frequency band, the network device comprising: a detection unit (510) for discovering a second device operable in the second wireless network that overlaps with the first wireless network; an information element generator (520) for reporting the discovered second device to other network devices operable in the first wireless network; a decision unit (530) for determining if an adjustment is needed between a beacon period of the network device and a second beacon period of the second device; and a beacon period start time (BPST) adjustment unit (540) for adjusting a BPST of the network device with a second BPST of the second device, if the adjustment is needed.
A method ( 300 ) for enabling self-coexistence of devices in a flexible wireless system ( 200 ) that includes first and second wireless networks sharing a frequency band. The method includes discovering a second device operable in the second wireless network that overlaps with the first wireless network (S 310 ); reporting the discovered second device to a first device operable in the first wireless network (S 320 ); determining if an adjustment is needed between a first beacon period of the first device and a second beacon period of the second device (S 330 ); and adjusting a first beacon period start time (BPST) of the first device with a second BPST of the second device (S 370 ) if the adjustment is needed.1. A method (300) for enabling self-coexistence of devices in a flexible wireless system (200) that includes first and second wireless networks sharing a frequency band, the method comprising: discovering a second device operable in the second wireless network that overlaps with the first wireless network (S310); reporting the discovered second device to a first device operable in the first wireless network (S320); determining if an adjustment is needed between a first beacon period of the first device and a second beacon period of the second device (S330); and adjusting a first beacon period start time (BPST) of the first device with a second BPST of the second device (S370) if the adjustment is needed. 2. The method of claim 1, wherein discovering the second device further comprises determining if a beacon received from the second device includes at least a second network identifier (NetID) different from a first NetID of the first device. 3. The method of claim 2, wherein reporting the discovered second device further comprises: generating a report information element (IE) to include at least the second NetID of the discovered second device; transmitting the report IE in the first beacon period of the first device if the first device is a beaconing device; and transmitting the report IE in a signaling window of the first device if the first device is a non-beaconing device. 4. The method of claim 1, wherein determining if the adjustment is needed further comprises determining if the first device should join a group that includes devices that should not adjust their BPST based on at least a configuration of the flexible wireless system (S340). 5. The method of claim 4, wherein the configuration of the flexible wireless system is selected from one of distributed-distributed, centralized-distributed, and centralized-centralized. 6. The method of claim 5, wherein if the configuration of the flexible wireless system is distributed-distributed, the group is defined to include devices having a largest number of reserved slots, a largest beacon period length, or a largest superframe number. 7. The method of claim 5, wherein if the configuration of the flexible wireless system is centralized-centralized, the group is defined to include a master device with a largest number of slave devices with active reservations or a master device with a largest number of reserved slots, and wherein if such master device is not found, including in the group devices with a largest overall number of reserved slots, a largest beacon period length, or a largest superframe number. 8. The method of claim 5, wherein if the configuration of the flexible wireless system is centralized-distributed the group is defined to include at least one slave device operating in a centralized mode with active reservation, and wherein if such slave device is not found, including in the group devices with a largest overall number of reserved slots, a largest beacon period length, or a largest superframe number. 9. The method of claim 4, wherein devices that are not included in the group are added to another group, wherein the devices in the another group adjust their BPST (S350 and S360). 10. The method of claim 1, wherein adjusting the first BPST further comprises: determining if the first device is a master device; setting a beacon slot number of the first device to a new beacon slot number if the first device is not a master device; and adjusting the first BPST of the first device and its slave device to a new BPST if the first device is a master device. 11. The method of claim 10, wherein setting the beacon slot number further comprises computing the new beacon slot number by adding to an old beacon slot number a highest occupied beacon slot number plus one and subtracting a signal slot count; wherein the number of the highest occupied beacon slot is indicated in a received beacon and the signal slot count is a number of signaling slots in a superframe. 12. The method of claim 10, wherein adjusting the first BPST of the first device and its slave device to a new BPST further comprises: setting a new BPST value by the master device; reporting to the slave device the new BPST value using a beacon; starting a timer to count a time for switching to the new BPST; and upon receiving an acknowledgment (ACK) message from each slave device or once the timer expires, switching to the new BPST. 13. The method of claim 1, further comprising promoting, by a master device, a non-beaconing discovering device to function as a beaconing device (400). 14. The method of claim 13, wherein promoting the non-beaconing discovering device is performed if: a promotion request is received by the master device (S410); or the discovered second device belongs to a newly discovered group that includes devices that are neighbors of the non-beaconing discovering device but not of other beaconing devices in a network (S440, S450, S460). 15. A network device (510) operable in self-coexistence with network devices in a flexible wireless system (200) that includes first and second wireless networks sharing a frequency band, the network device comprising: a detection unit (510) for discovering a second device operable in the second wireless network that overlaps with the first wireless network; an information element generator (520) for reporting the discovered second device to other network devices operable in the first wireless network; a decision unit (530) for determining if an adjustment is needed between a beacon period of the network device and a second beacon period of the second device; and a beacon period start time (BPST) adjustment unit (540) for adjusting a BPST of the network device with a second BPST of the second device, if the adjustment is needed.
2,400
7,263
7,263
14,412,051
2,486
An apparatus (IP) and a method to point-wisely reconstruct 3D image a 3D image volume of one or more 3D image volumina (Vp, Vc, Vv) to record changes of configuration of an embolus (E) introduced in an embolization procedure into a region of interest (ROI) of an object (OB)
1. An image processing apparatus, comprising: an input unit for receiving from a first channel a stream of projection images of an object acquired along a first projection direction and from a second channel a stream of projection images of the object acquired along a second projection direction, the images in both channels acquired whilst a material volume of a material resident in the object undergoes a configuration change; an identifier configured to identify, based on i) a pair of an earlier first channel image and a later first channel image and on ii) a pair of an earlier second channel image and a later second channel image, image portions, one in the later first channel image and one in the later second channel image, said image portions indicative of the material volume's configuration change and indicative to a position where in the material volume said change occurred; a 3D image reconstructor configured to reconstruct, only upon the identifier successfully identifying said image portions, from the identified image portions a 3D image volume element, the so reconstructed 3D image volume element representative only of said identified image portions; and an output port configured to output the reconstructed 3D image volume element. 2. An image processing apparatus of any one of claim 1, wherein the reconstructor is configured to combine said reconstructed 3D image volume element and a previously reconstructed 3D volume element to so form a cumulative 3D volume, said cumulative 3D volume representative of the material volume's configuration up to acquisition time of the later projection image. 3. An image processing apparatus of claim 1, further comprising: a graphics display generator configured to generate for display on a screen a graphics display including a view of the reconstructed 3D image volume element, the so generated graphics display when displayed affording a view of only that part of the material volume where the configuration change occurred at acquisition time of the later projection image. 4. An image processing apparatus of claim 2, wherein the graphics display includes a view of the previously reconstructed image volume element, said previous image volume element reconstructed from a previously identified image portion indicative of a previous change of the material volume's configuration, the so generated view affording at least a partial view of the material volume's configuration up to acquisition time of the later projection image. 5. An image processing apparatus of claim 3, wherein the generated graphics display includes an overlaid silhouette of a region of interest in the object where the material volume resides. 6. An image processing apparatus of claim 1, further comprising a synchronizer, wherein upon failure of the identification operation and upon receipt at the input port of a subsequent first channel image and a subsequent second channel image, the synchronizer configured to form new pairs of images from the pairs of images by updating the later first channel for the subsequent first channel image and the later second channel image for the subsequent second channel image, the synchronizer thereby configured to maintain in the new pairs the earlier first and second channel images. 7. An image processing apparatus of claim 6, wherein the identification operation fails if a size and/or signal-to-noise ratio of at least one of the respective image portion in the subsequent first channel image or in the subsequent second channel image is less than a boundary value, and wherein the identification operation is successful if the size and/or signal-to-noise ratio of both, the image portion in the subsequent first channel image and the image portion in the subsequent second channel image is larger than the boundary value. 8. An image processing apparatus of claim 1, wherein the projection images are fluoroscopic images. 9. An image processing apparatus of claim 1, where the object is a part of a human or animal vasculature and the material volume is a quantity of embolization agent. 10. Method of image processing, comprising the steps of: receiving from a first channel a stream of projection images of an object acquired along a first projection direction and from a second channel a stream of projection images of the object acquired along a second projection direction, the images in both channels acquired whilst a volume of material is resident in the object and whilst said material volume is capable of undergoing a configuration change; identifying, based on i) a pair of an earlier first channel image and a later first channel image and on ii) a pair of an earlier second channel image and a later second channel image, image portions, one in the later first channel image and one in the later second channel image, said image portions indicative of the material volume's configuration change and indicative to a position where in the material volume said change occurred; only upon successfully identifying said image portions, reconstructing from the identified image portions a 3D image volume element, the so reconstructed 3D image volume element representative only of said identified image portions; and outputting the reconstructed 3D image volume element. 11. Method of claim 10, wherein, i) if the identification is successful and upon receiving a subsequent first channel image and a subsequent second channel image, forming new pairs of images from the pairs of images by updating the earlier first channel image for the later first channel image and replacing the later first channel image by the subsequent first channel image and by updating the earlier second channel image for the later second channel image and replacing the later second channel image by the subsequent second channel image, and then repeating the identification step based on said two new pairs, and wherein ii) if the identification fails and upon receiving a subsequent first channel image and a subsequent second channel image, forming new pairs of images from the pairs of images by updating the later first channel for the subsequent first channel image and the later second channel image for the subsequent second channel image, thereby maintaining the earlier first and second channel images, and then repeating the identification step based on said two new pairs. 12. Method of claim 11, wherein, wherein the step of identifying the two image portions results in a failure if a size and/or signal-to-noise ratio of at least one of the image portion in the subsequent first channel image or of the image portion in the subsequent second channel image is less than a size boundary value, and wherein the identification step is successful if the size and/or signal-to-noise ratio of both, the image portion in the subsequent first channel image and the image portion in the subsequent second channel image is larger than the boundary value. 13. An image processing system comprising: an apparatus of claim 1; an at least 2-channel x-ray imager supplying the two streams; the screen. 14. An image processing system of claim 13 wherein the x-ray imager is a bi-plane fluoroscope. 15. A computer program element for controlling an apparatus which, when being executed by a processing unit is adapted to perform the method steps of claim 10. 16. A computer readable medium having stored thereon the program element of claim 15.
An apparatus (IP) and a method to point-wisely reconstruct 3D image a 3D image volume of one or more 3D image volumina (Vp, Vc, Vv) to record changes of configuration of an embolus (E) introduced in an embolization procedure into a region of interest (ROI) of an object (OB)1. An image processing apparatus, comprising: an input unit for receiving from a first channel a stream of projection images of an object acquired along a first projection direction and from a second channel a stream of projection images of the object acquired along a second projection direction, the images in both channels acquired whilst a material volume of a material resident in the object undergoes a configuration change; an identifier configured to identify, based on i) a pair of an earlier first channel image and a later first channel image and on ii) a pair of an earlier second channel image and a later second channel image, image portions, one in the later first channel image and one in the later second channel image, said image portions indicative of the material volume's configuration change and indicative to a position where in the material volume said change occurred; a 3D image reconstructor configured to reconstruct, only upon the identifier successfully identifying said image portions, from the identified image portions a 3D image volume element, the so reconstructed 3D image volume element representative only of said identified image portions; and an output port configured to output the reconstructed 3D image volume element. 2. An image processing apparatus of any one of claim 1, wherein the reconstructor is configured to combine said reconstructed 3D image volume element and a previously reconstructed 3D volume element to so form a cumulative 3D volume, said cumulative 3D volume representative of the material volume's configuration up to acquisition time of the later projection image. 3. An image processing apparatus of claim 1, further comprising: a graphics display generator configured to generate for display on a screen a graphics display including a view of the reconstructed 3D image volume element, the so generated graphics display when displayed affording a view of only that part of the material volume where the configuration change occurred at acquisition time of the later projection image. 4. An image processing apparatus of claim 2, wherein the graphics display includes a view of the previously reconstructed image volume element, said previous image volume element reconstructed from a previously identified image portion indicative of a previous change of the material volume's configuration, the so generated view affording at least a partial view of the material volume's configuration up to acquisition time of the later projection image. 5. An image processing apparatus of claim 3, wherein the generated graphics display includes an overlaid silhouette of a region of interest in the object where the material volume resides. 6. An image processing apparatus of claim 1, further comprising a synchronizer, wherein upon failure of the identification operation and upon receipt at the input port of a subsequent first channel image and a subsequent second channel image, the synchronizer configured to form new pairs of images from the pairs of images by updating the later first channel for the subsequent first channel image and the later second channel image for the subsequent second channel image, the synchronizer thereby configured to maintain in the new pairs the earlier first and second channel images. 7. An image processing apparatus of claim 6, wherein the identification operation fails if a size and/or signal-to-noise ratio of at least one of the respective image portion in the subsequent first channel image or in the subsequent second channel image is less than a boundary value, and wherein the identification operation is successful if the size and/or signal-to-noise ratio of both, the image portion in the subsequent first channel image and the image portion in the subsequent second channel image is larger than the boundary value. 8. An image processing apparatus of claim 1, wherein the projection images are fluoroscopic images. 9. An image processing apparatus of claim 1, where the object is a part of a human or animal vasculature and the material volume is a quantity of embolization agent. 10. Method of image processing, comprising the steps of: receiving from a first channel a stream of projection images of an object acquired along a first projection direction and from a second channel a stream of projection images of the object acquired along a second projection direction, the images in both channels acquired whilst a volume of material is resident in the object and whilst said material volume is capable of undergoing a configuration change; identifying, based on i) a pair of an earlier first channel image and a later first channel image and on ii) a pair of an earlier second channel image and a later second channel image, image portions, one in the later first channel image and one in the later second channel image, said image portions indicative of the material volume's configuration change and indicative to a position where in the material volume said change occurred; only upon successfully identifying said image portions, reconstructing from the identified image portions a 3D image volume element, the so reconstructed 3D image volume element representative only of said identified image portions; and outputting the reconstructed 3D image volume element. 11. Method of claim 10, wherein, i) if the identification is successful and upon receiving a subsequent first channel image and a subsequent second channel image, forming new pairs of images from the pairs of images by updating the earlier first channel image for the later first channel image and replacing the later first channel image by the subsequent first channel image and by updating the earlier second channel image for the later second channel image and replacing the later second channel image by the subsequent second channel image, and then repeating the identification step based on said two new pairs, and wherein ii) if the identification fails and upon receiving a subsequent first channel image and a subsequent second channel image, forming new pairs of images from the pairs of images by updating the later first channel for the subsequent first channel image and the later second channel image for the subsequent second channel image, thereby maintaining the earlier first and second channel images, and then repeating the identification step based on said two new pairs. 12. Method of claim 11, wherein, wherein the step of identifying the two image portions results in a failure if a size and/or signal-to-noise ratio of at least one of the image portion in the subsequent first channel image or of the image portion in the subsequent second channel image is less than a size boundary value, and wherein the identification step is successful if the size and/or signal-to-noise ratio of both, the image portion in the subsequent first channel image and the image portion in the subsequent second channel image is larger than the boundary value. 13. An image processing system comprising: an apparatus of claim 1; an at least 2-channel x-ray imager supplying the two streams; the screen. 14. An image processing system of claim 13 wherein the x-ray imager is a bi-plane fluoroscope. 15. A computer program element for controlling an apparatus which, when being executed by a processing unit is adapted to perform the method steps of claim 10. 16. A computer readable medium having stored thereon the program element of claim 15.
2,400
7,264
7,264
15,582,789
2,487
A three-dimensional source device provides a three-dimensional display signal for a display via a high speed digital interface, such as HDMI. The three-dimensional display signal comprises a sequence of frames. The sequence of frames comprises units, each unit corresponding to frames comprising video information intended to be composited and displayed as a three-dimensional image. The three-dimensional source device includes three-dimensional transfer information comprising at least information about the video frames in the unit. The display detects the three-dimensional transfer information, and generates the display control signals based in dependence on the three-dimensional transfer information. The three-dimensional transfer information in an additional info frame packet comprises information about the multiplexing scheme for multiplexing frames into the three-dimensional display signal, the multiplexing scheme being selected of group of multiplexing schemes including frame alternating multiplexing, the three-dimensional transfer information indicating the number of frames being sequentially arranged within the video data period.
1. A source device for transferring three-dimensional image data to a three-dimensional display device, comprising: an input circuit that receives the three-dimensional image data; a processor circuit that: generates a three-dimensional display signal that comprises a sequence of frames corresponding to the three-dimensional image data in a three-dimensional video transfer format; wherein the sequence of frames comprises units, each unit corresponding to a number of frames arranged according to a multiplexing scheme for composing video information that forms each three-dimensional image that is to be displayed on the display device; wherein the three-dimensional video transfer format comprises a video data period during which pixels of video data are transmitted and a data island period during which auxiliary data is transmitted; wherein the auxiliary data includes three-dimensional transfer information comprising at least information about the multiplexing scheme, including the number of frames in a next unit in the sequence of frames, thereby enabling the display device to determine the number of frames in the next unit and correspondingly form a next three-dimensional image for display on a three-dimensional display; and an output unit that provides the three-dimensional display signal for use by the three-dimensional display device. 2. The source device of claim 1, wherein the auxiliary data is transmitted via packets, and the three-dimensional transfer information is included in one or more information frame packets. 3. The source device of claim 2, wherein the auxiliary data conforms to a High Definition Multimedia Interface (HDMI) standard. 4. The source device of claim 3, wherein the auxiliary data is included in Auxiliary Video Information (AVI) of the High Definition Multimedia Interface, which is transmitted once per unit. 5. The source device of claim 4, wherein the three-dimensional transfer information is included in one or both of: an HDMI Video Format Identification Code (HDMI_VIC), and an HDMI 3D Format (HDMI_3D_FMT) code. 6. The source device of claim 1, wherein the three-dimensional transfer information comprises: a pixel repeat rate, a format of the multiplexing scheme, and the number of frames in the next unit of the sequence of frames. 7. The source device of claim 1, wherein the multiplexing scheme is selected from a group comprising: field alternating multiplexing; line alternating multiplexing; side by side frame multiplexing; two-dimensional and depth frame multiplexing; and two-dimensional, depth, graphics and graphics depth frame multiplexing. 8. The source device of claim 1, wherein each unit is a period between two consecutive vertical synchronization signals. 9. A display device for rendering three-dimensional images, comprising: a three-dimensional display; an input circuit that receives a three-dimensional display signal that comprises a sequence of frames corresponding to three-dimensional image data in a three-dimensional video transfer format; wherein the sequence of frames comprises units, each unit corresponding to a number of frames arranged according to a multiplexing scheme for composing video information that forms each three-dimensional image that is to be displayed on the three-dimensional display; wherein the three-dimensional video transfer format comprises a video data period during which pixels of video data are transmitted and a data island period during which auxiliary data is transmitted; wherein the auxiliary data includes three-dimensional transfer information comprising at least information about the multiplexing scheme, including the number of frames in a next unit in the sequence of frames; a processor circuit that: processes the three-dimensional transfer information about the multiplexing scheme to determine the number of frames in the next unit in the sequence of frames; processes the number of frames in the next unit to create a next three-dimensional image based on the multiplexing scheme; and provides the next three-dimensional image to the three-dimensional display. 10-16. 17. A method of communicating three-dimensional image data from a source device to a display device, comprising: at the source device: receiving the three-dimensional image data at the source device; generating a three-dimensional display signal that comprises a sequence of frames corresponding to the three-dimensional image data in a three-dimensional video transfer format; wherein the sequence of frames comprises units, each unit corresponding to a number of frames arranged according to a multiplexing scheme for composing video information that forms each three-dimensional image that is to be displayed on the display device; wherein the three-dimensional video transfer format comprises a video data period during which pixels of video data are transmitted and a data island period during which auxiliary data is transmitted; wherein the auxiliary data includes three-dimensional transfer information comprising at least information about the multiplexing scheme, including the number of frames in a next unit in the sequence of frames, thereby enabling the display device to determine the number of frames in the next unit and correspondingly form a next three-dimensional image for display on a three-dimensional display; and communicating the three-dimensional display signal to the display device. 18. The method of claim 17, further comprising: at the display device: receiving the three-dimensional display signal; processing the three-dimensional transfer information about the multiplexing scheme to determine the number of frames in the next unit in the sequence of frames; processing the number of frames in the next unit to create a next three-dimensional image based on the multiplexing scheme; and providing the next three-dimensional image to a three-dimensional display. 19. The method of claim 18, wherein each unit is a period between two consecutive vertical synchronization signals. 20. The method of claim 17, wherein the auxiliary data is included in Auxiliary Video Information (AVI) of a High Definition Multimedia Interface (HDMI), which is transmitted once per unit; wherein the three-dimensional transfer information is included in one or both of: an HDMI Video Format Identification Code (HDMI_VIC), and an HDMI 3D Format (HDMI_3D_FMT) code; and wherein the three-dimensional transfer information comprises: a pixel repeat rate, a format of the multiplexing scheme, and the number of frames in the next unit of the sequence of frames.
A three-dimensional source device provides a three-dimensional display signal for a display via a high speed digital interface, such as HDMI. The three-dimensional display signal comprises a sequence of frames. The sequence of frames comprises units, each unit corresponding to frames comprising video information intended to be composited and displayed as a three-dimensional image. The three-dimensional source device includes three-dimensional transfer information comprising at least information about the video frames in the unit. The display detects the three-dimensional transfer information, and generates the display control signals based in dependence on the three-dimensional transfer information. The three-dimensional transfer information in an additional info frame packet comprises information about the multiplexing scheme for multiplexing frames into the three-dimensional display signal, the multiplexing scheme being selected of group of multiplexing schemes including frame alternating multiplexing, the three-dimensional transfer information indicating the number of frames being sequentially arranged within the video data period.1. A source device for transferring three-dimensional image data to a three-dimensional display device, comprising: an input circuit that receives the three-dimensional image data; a processor circuit that: generates a three-dimensional display signal that comprises a sequence of frames corresponding to the three-dimensional image data in a three-dimensional video transfer format; wherein the sequence of frames comprises units, each unit corresponding to a number of frames arranged according to a multiplexing scheme for composing video information that forms each three-dimensional image that is to be displayed on the display device; wherein the three-dimensional video transfer format comprises a video data period during which pixels of video data are transmitted and a data island period during which auxiliary data is transmitted; wherein the auxiliary data includes three-dimensional transfer information comprising at least information about the multiplexing scheme, including the number of frames in a next unit in the sequence of frames, thereby enabling the display device to determine the number of frames in the next unit and correspondingly form a next three-dimensional image for display on a three-dimensional display; and an output unit that provides the three-dimensional display signal for use by the three-dimensional display device. 2. The source device of claim 1, wherein the auxiliary data is transmitted via packets, and the three-dimensional transfer information is included in one or more information frame packets. 3. The source device of claim 2, wherein the auxiliary data conforms to a High Definition Multimedia Interface (HDMI) standard. 4. The source device of claim 3, wherein the auxiliary data is included in Auxiliary Video Information (AVI) of the High Definition Multimedia Interface, which is transmitted once per unit. 5. The source device of claim 4, wherein the three-dimensional transfer information is included in one or both of: an HDMI Video Format Identification Code (HDMI_VIC), and an HDMI 3D Format (HDMI_3D_FMT) code. 6. The source device of claim 1, wherein the three-dimensional transfer information comprises: a pixel repeat rate, a format of the multiplexing scheme, and the number of frames in the next unit of the sequence of frames. 7. The source device of claim 1, wherein the multiplexing scheme is selected from a group comprising: field alternating multiplexing; line alternating multiplexing; side by side frame multiplexing; two-dimensional and depth frame multiplexing; and two-dimensional, depth, graphics and graphics depth frame multiplexing. 8. The source device of claim 1, wherein each unit is a period between two consecutive vertical synchronization signals. 9. A display device for rendering three-dimensional images, comprising: a three-dimensional display; an input circuit that receives a three-dimensional display signal that comprises a sequence of frames corresponding to three-dimensional image data in a three-dimensional video transfer format; wherein the sequence of frames comprises units, each unit corresponding to a number of frames arranged according to a multiplexing scheme for composing video information that forms each three-dimensional image that is to be displayed on the three-dimensional display; wherein the three-dimensional video transfer format comprises a video data period during which pixels of video data are transmitted and a data island period during which auxiliary data is transmitted; wherein the auxiliary data includes three-dimensional transfer information comprising at least information about the multiplexing scheme, including the number of frames in a next unit in the sequence of frames; a processor circuit that: processes the three-dimensional transfer information about the multiplexing scheme to determine the number of frames in the next unit in the sequence of frames; processes the number of frames in the next unit to create a next three-dimensional image based on the multiplexing scheme; and provides the next three-dimensional image to the three-dimensional display. 10-16. 17. A method of communicating three-dimensional image data from a source device to a display device, comprising: at the source device: receiving the three-dimensional image data at the source device; generating a three-dimensional display signal that comprises a sequence of frames corresponding to the three-dimensional image data in a three-dimensional video transfer format; wherein the sequence of frames comprises units, each unit corresponding to a number of frames arranged according to a multiplexing scheme for composing video information that forms each three-dimensional image that is to be displayed on the display device; wherein the three-dimensional video transfer format comprises a video data period during which pixels of video data are transmitted and a data island period during which auxiliary data is transmitted; wherein the auxiliary data includes three-dimensional transfer information comprising at least information about the multiplexing scheme, including the number of frames in a next unit in the sequence of frames, thereby enabling the display device to determine the number of frames in the next unit and correspondingly form a next three-dimensional image for display on a three-dimensional display; and communicating the three-dimensional display signal to the display device. 18. The method of claim 17, further comprising: at the display device: receiving the three-dimensional display signal; processing the three-dimensional transfer information about the multiplexing scheme to determine the number of frames in the next unit in the sequence of frames; processing the number of frames in the next unit to create a next three-dimensional image based on the multiplexing scheme; and providing the next three-dimensional image to a three-dimensional display. 19. The method of claim 18, wherein each unit is a period between two consecutive vertical synchronization signals. 20. The method of claim 17, wherein the auxiliary data is included in Auxiliary Video Information (AVI) of a High Definition Multimedia Interface (HDMI), which is transmitted once per unit; wherein the three-dimensional transfer information is included in one or both of: an HDMI Video Format Identification Code (HDMI_VIC), and an HDMI 3D Format (HDMI_3D_FMT) code; and wherein the three-dimensional transfer information comprises: a pixel repeat rate, a format of the multiplexing scheme, and the number of frames in the next unit of the sequence of frames.
2,400
7,265
7,265
15,066,792
2,426
A technique for using an MSO-based network of DVRs to share content includes receiving a request for content from a first digital video recorder (DVR) in an establishment of a first customer in a multiple system's operator (MSO) video network including at least a second DVR in an establishment of a second customer. The establishment of the first customer is remote from the establishment of the second customer. Responsive to the request for contest, the MSO video network is queried for content satisfying the request. Responsive to identifying the content satisfying the request on the second DVR, the content satisfying the request is copied from the second DVR to the first DVR.
1. An apparatus comprising: at least one computer memory that is not a transitory signal and that comprises instructions executable by at least one processor to: receive a request from a first digital video recorder (DVR) in an establishment of a first customer in a multiple systems operator (MSO) video network to access the MSO video network; responsive to the request to access the MSO video network, rendering content on the first DVR available for access by other devices in the MSO video network; receive a request for content from the first DVR, the MSO video network including at least a second DVR in an establishment of a second customer, the establishment of the first customer being remote from the establishment of the second customer; responsive to the request for content, query the MSO video network for content satisfying the request; responsive to identifying the content satisfying the request on the second DVR, copy the content satisfying the request from the second DVR to the first DVR; and present a message to inform the first customer that by accessing content on the MSO network, the customer agrees to share content on first DVR with other members of the MSO network. 2. The apparatus of claim 1, comprising the at least one processor. 3. The apparatus of claim 1, wherein the computer memory is implemented by the first DVR. 4. The apparatus of claim 1, wherein the content includes two or more of: recorded programs, season passes, customer preferences. 5. The apparatus of claim 1, wherein the instructions are executable to: authenticate, by a multiple systems operator (MSO) communicating with the first and second DVRs, digital rights management (DRM) of the first and/or second DVR; and execute transfer of content from the second DVR to the first DVR responsive to successful authentication of the DRM. 6. The apparatus of claim 1, wherein the transfer of content is executed over infrastructure of the MSO. 7. The apparatus of claim 1, wherein the first DVR comprises at least one video input and at least one looping video output for the input. 8. An apparatus comprising: at least one computer memory that is not a transitory signal and that comprises instructions executable by at least one processor to: present on at least one display at least one user interface (UI) comprising: a prompt to access the MSO video network; an accept selector selectable to join the MSO video network; and a field into which a request for content on the MSO video network can be entered. 9. The apparatus of claim 8, comprising the at least one processor. 10. The apparatus of claim 8, wherein the computer memory is implemented by the first DVR. 11. The apparatus of claim 8, wherein the content includes two or more of: recorded programs, season passes, customer preferences. 12. The apparatus of claim 8, wherein the UI includes a decline selector selectable to refuse to join the MSO video network. 13. The apparatus of claim 8, wherein the instructions are executable to present on the display a name of source of content on the MSO video network satisfying the request for content. 14. The apparatus of claim 8, wherein the instructions are executable to present on the display a stream selector selectable to stream located content on the MSO video network satisfying the request for content cause the program to be streamed from the source of content to the first DVR. 15. The apparatus of claim 14, wherein the instructions are executable to present on the display a decline selector selectable to decline to stream the located content on the MSO video network satisfying the request for content. 16. The apparatus of claim 8, wherein the instructions are executable to present on the display a message to inform the first customer that by accessing content on the MSO video network, the first customer agrees to share content on the first DVR with other members of the MSO video network. 17. A method comprising: receiving at a first digital video recorder (DVR) a request for content; accessing a multiple systems operator (MSO) community network to search for the content; responsive to locating the content on a second DVR in the MSO community network remote from the first DVR, enabling access to the content by the first DVR; presenting a message to inform that by accessing content on the MSO community network, a user agrees to share content on first DVR with other members of the MSO community network; streaming the content from the second DVR to the first DVR responsive to selection of a first selector presented to a user of the first DVR adjacent the message; and not streaming the content from the second DVR to the first DVR responsive to selection of a second selector presented to a user of the first DVR. 18. The method of claim 17, comprising: streaming the content from the second DVR to the first DVR only responsive to a stream signal input to the first DVR. 19. The method of claim 17, comprising: streaming the content from the second DVR to the first DVR only responsive to digital rights management (DRM) being authenticated on at least one of the DVRs. 20. The method of claim 17, comprising: streaming the content from the second DVR to the first DVR over infrastructure of the MSO.
A technique for using an MSO-based network of DVRs to share content includes receiving a request for content from a first digital video recorder (DVR) in an establishment of a first customer in a multiple system's operator (MSO) video network including at least a second DVR in an establishment of a second customer. The establishment of the first customer is remote from the establishment of the second customer. Responsive to the request for contest, the MSO video network is queried for content satisfying the request. Responsive to identifying the content satisfying the request on the second DVR, the content satisfying the request is copied from the second DVR to the first DVR.1. An apparatus comprising: at least one computer memory that is not a transitory signal and that comprises instructions executable by at least one processor to: receive a request from a first digital video recorder (DVR) in an establishment of a first customer in a multiple systems operator (MSO) video network to access the MSO video network; responsive to the request to access the MSO video network, rendering content on the first DVR available for access by other devices in the MSO video network; receive a request for content from the first DVR, the MSO video network including at least a second DVR in an establishment of a second customer, the establishment of the first customer being remote from the establishment of the second customer; responsive to the request for content, query the MSO video network for content satisfying the request; responsive to identifying the content satisfying the request on the second DVR, copy the content satisfying the request from the second DVR to the first DVR; and present a message to inform the first customer that by accessing content on the MSO network, the customer agrees to share content on first DVR with other members of the MSO network. 2. The apparatus of claim 1, comprising the at least one processor. 3. The apparatus of claim 1, wherein the computer memory is implemented by the first DVR. 4. The apparatus of claim 1, wherein the content includes two or more of: recorded programs, season passes, customer preferences. 5. The apparatus of claim 1, wherein the instructions are executable to: authenticate, by a multiple systems operator (MSO) communicating with the first and second DVRs, digital rights management (DRM) of the first and/or second DVR; and execute transfer of content from the second DVR to the first DVR responsive to successful authentication of the DRM. 6. The apparatus of claim 1, wherein the transfer of content is executed over infrastructure of the MSO. 7. The apparatus of claim 1, wherein the first DVR comprises at least one video input and at least one looping video output for the input. 8. An apparatus comprising: at least one computer memory that is not a transitory signal and that comprises instructions executable by at least one processor to: present on at least one display at least one user interface (UI) comprising: a prompt to access the MSO video network; an accept selector selectable to join the MSO video network; and a field into which a request for content on the MSO video network can be entered. 9. The apparatus of claim 8, comprising the at least one processor. 10. The apparatus of claim 8, wherein the computer memory is implemented by the first DVR. 11. The apparatus of claim 8, wherein the content includes two or more of: recorded programs, season passes, customer preferences. 12. The apparatus of claim 8, wherein the UI includes a decline selector selectable to refuse to join the MSO video network. 13. The apparatus of claim 8, wherein the instructions are executable to present on the display a name of source of content on the MSO video network satisfying the request for content. 14. The apparatus of claim 8, wherein the instructions are executable to present on the display a stream selector selectable to stream located content on the MSO video network satisfying the request for content cause the program to be streamed from the source of content to the first DVR. 15. The apparatus of claim 14, wherein the instructions are executable to present on the display a decline selector selectable to decline to stream the located content on the MSO video network satisfying the request for content. 16. The apparatus of claim 8, wherein the instructions are executable to present on the display a message to inform the first customer that by accessing content on the MSO video network, the first customer agrees to share content on the first DVR with other members of the MSO video network. 17. A method comprising: receiving at a first digital video recorder (DVR) a request for content; accessing a multiple systems operator (MSO) community network to search for the content; responsive to locating the content on a second DVR in the MSO community network remote from the first DVR, enabling access to the content by the first DVR; presenting a message to inform that by accessing content on the MSO community network, a user agrees to share content on first DVR with other members of the MSO community network; streaming the content from the second DVR to the first DVR responsive to selection of a first selector presented to a user of the first DVR adjacent the message; and not streaming the content from the second DVR to the first DVR responsive to selection of a second selector presented to a user of the first DVR. 18. The method of claim 17, comprising: streaming the content from the second DVR to the first DVR only responsive to a stream signal input to the first DVR. 19. The method of claim 17, comprising: streaming the content from the second DVR to the first DVR only responsive to digital rights management (DRM) being authenticated on at least one of the DVRs. 20. The method of claim 17, comprising: streaming the content from the second DVR to the first DVR over infrastructure of the MSO.
2,400
7,266
7,266
11,572,961
2,461
A method of providing spectrum allocation fairness in a wireless network includes providing an unlicensed communication spectrum. The method also includes co-locating a plurality of wireless systems ( 101, 102, 103 ), wherein at least two of the subsystems have different bandwidth requirements and channel capacities. In addition, the method includes determining the bandwidth requirements of each of the systems and allocating a bandwidth ( 303, 304, 305 ) or a communication period ( 311, 312, 313 ) to each of the systems for a particular interval. A wireless system ( 100 ) that provides spectrum allocation fairness is also described.
1. A method of providing spectrum allocation fairness in a wireless network (100), the method comprising: providing an unlicensed communication spectrum; co-locating a plurality of wireless systems (101,102,103), wherein at least two of the plurality of wireless systems have different spectral bandwidths and channel capacities; and determining the bandwidth requirements of each of the systems and allocating a bandwidth (303,304,305) or a communication period (311,312,313) to each of the systems for a particular interval. 2. A method as recited in claim 1, wherein the method further comprises allocating Medium Access Control (MAC) sub-layer parameters to each system. 3. A method as recited in claim 2, further comprising adjusting the parameters prior to the providing. 4. A method as recited in claim 1, wherein the allocating of the bandwidth further comprises limiting each system to a transmission rate. 5. A method as recited in claim 1, wherein the allocating of the communication time further comprises providing a substantially identical communication time for each system. 6. A method as recited in claim 3, further comprising providing a control channel (106) that receives the MAC layer parameters and provides the adjusted MAC layer parameters. 7. A method as recited in claim 6, wherein the network is distributed. 8. A method as recited in claim 6, wherein the network is centralized. 9. A method as recited in claim 8, the method further comprising: selecting a device (107) from one of the systems as a central controller. 10. A method as recited in claim 9, wherein the central controller provides a certain time slot to at least one device of each system during which the device can transmit and/or receive information. 11. A method as recited in claim 7, wherein the method further comprises providing a control channel. 12. A wireless network, comprising: an unlicensed radio spectrum; a plurality of wireless systems (101,102,103) and at least two of the systems have different spectral bandwidth requirements and channel capacities, wherein based on the bandwidth requirements of each station, a bandwidth (303,304,305) or a communication period (311,312,313) is allocated to each of the systems for a particular interval. 13. A wireless network as recited in claim 12, wherein the method further comprises allocating Medium Access Control (MAC) sub-layer parameters to each system. 14. A wireless network as recited in claim 13, wherein a transmission rate of each system is limited in a particular interval of time. 15. A wireless network as recited in claim 12, wherein each system is granted a substantially identical communication time for a particular interval of time. 16. A method as recited in claim 14, further comprising a control channel that receives the MAC layer parameters provides adjusted MAC layer parameters. 17. A wireless network as recited in claim recited in claim 1, wherein the network is distributed. 18. A wireless network as recited in claim 1, wherein the network is centralized. 19. A wireless network as recited in claim 18, further comprising a centralized controller (107) selected from among a plurality of devices within the plurality of systems. 20. A wireless network as recited in claim 1, wherein a plurality of beacons (302,308) are transmitted to the systems at the commencement of each of a plurality of control information exchange intervals (301).
A method of providing spectrum allocation fairness in a wireless network includes providing an unlicensed communication spectrum. The method also includes co-locating a plurality of wireless systems ( 101, 102, 103 ), wherein at least two of the subsystems have different bandwidth requirements and channel capacities. In addition, the method includes determining the bandwidth requirements of each of the systems and allocating a bandwidth ( 303, 304, 305 ) or a communication period ( 311, 312, 313 ) to each of the systems for a particular interval. A wireless system ( 100 ) that provides spectrum allocation fairness is also described.1. A method of providing spectrum allocation fairness in a wireless network (100), the method comprising: providing an unlicensed communication spectrum; co-locating a plurality of wireless systems (101,102,103), wherein at least two of the plurality of wireless systems have different spectral bandwidths and channel capacities; and determining the bandwidth requirements of each of the systems and allocating a bandwidth (303,304,305) or a communication period (311,312,313) to each of the systems for a particular interval. 2. A method as recited in claim 1, wherein the method further comprises allocating Medium Access Control (MAC) sub-layer parameters to each system. 3. A method as recited in claim 2, further comprising adjusting the parameters prior to the providing. 4. A method as recited in claim 1, wherein the allocating of the bandwidth further comprises limiting each system to a transmission rate. 5. A method as recited in claim 1, wherein the allocating of the communication time further comprises providing a substantially identical communication time for each system. 6. A method as recited in claim 3, further comprising providing a control channel (106) that receives the MAC layer parameters and provides the adjusted MAC layer parameters. 7. A method as recited in claim 6, wherein the network is distributed. 8. A method as recited in claim 6, wherein the network is centralized. 9. A method as recited in claim 8, the method further comprising: selecting a device (107) from one of the systems as a central controller. 10. A method as recited in claim 9, wherein the central controller provides a certain time slot to at least one device of each system during which the device can transmit and/or receive information. 11. A method as recited in claim 7, wherein the method further comprises providing a control channel. 12. A wireless network, comprising: an unlicensed radio spectrum; a plurality of wireless systems (101,102,103) and at least two of the systems have different spectral bandwidth requirements and channel capacities, wherein based on the bandwidth requirements of each station, a bandwidth (303,304,305) or a communication period (311,312,313) is allocated to each of the systems for a particular interval. 13. A wireless network as recited in claim 12, wherein the method further comprises allocating Medium Access Control (MAC) sub-layer parameters to each system. 14. A wireless network as recited in claim 13, wherein a transmission rate of each system is limited in a particular interval of time. 15. A wireless network as recited in claim 12, wherein each system is granted a substantially identical communication time for a particular interval of time. 16. A method as recited in claim 14, further comprising a control channel that receives the MAC layer parameters provides adjusted MAC layer parameters. 17. A wireless network as recited in claim recited in claim 1, wherein the network is distributed. 18. A wireless network as recited in claim 1, wherein the network is centralized. 19. A wireless network as recited in claim 18, further comprising a centralized controller (107) selected from among a plurality of devices within the plurality of systems. 20. A wireless network as recited in claim 1, wherein a plurality of beacons (302,308) are transmitted to the systems at the commencement of each of a plurality of control information exchange intervals (301).
2,400
7,267
7,267
14,972,197
2,485
Techniques for imaging an iris are described. An example of an electronic device includes a camera and a Light Emitting Diode (LED) assembly to provide light for an iris image. The LED assembly comprises an LED and a tunable filter disposed over the LED. The tunable filter tunes the wavelength of the light emitted by the LED assembly.
1. An electronic device for imaging an iris, comprising: a camera; and a Light Emitting Diode (LED) assembly to provide a light for an iris image; the LED assembly comprising: an LED; and a tunable filter disposed over the LED, the tunable filter to tune a wavelength of the light emitted by the LED assembly. 2. The electronic device of claim 1, wherein the camera is to obtain a first iris image at a first wavelength of the light emitted by the LED assembly and a second iris image at a second wavelength of the light emitted by the LED assembly. 3. The electronic device of claim 2, comprising a comparing unit to compare a sharpness of the first iris image to the sharpness of the second iris image. 4. The electronic device of claim 3, comprising a selecting unit to select one of the first iris image and the second iris image to obtain a selected iris image, wherein the selected iris image has a better sharpness. 5. The electronic device of claim 4, comprising an identifying unit to identify a chosen wavelength of the light by determining the wavelength of light used to obtain the selected iris image. 6. The electronic device of claim 1, wherein the tunable filter comprises one or more liquid crystal (LC) layers. 7. The electronic device of claim 1, wherein the tunable filter comprises an interferometer. 8. The electronic device of claim 7, wherein the interferometer comprises a Fabry-Perot interferometer. 9. The electronic device of claim 1, comprising a lens disposed between the LED and the one or more LC layers. 10. The electronic device of claim 1, wherein the one or more LC layers are disposed between the LED and the lens. 11. The electronic device of claim 1, wherein a wavelength of the light emitted by the LED is in a range of 780-860 nm. 12. The electronic device of claim 1, comprising a proximity sensor to turn off the LED when the electronic device is too close to a user's eye. 13. A method, comprising: illuminating an iris of a user via an LED assembly; obtaining a first iris image from a camera using a first wavelength of a light emitted by the LED assembly; changing a wavelength of the light emitted by the LED assembly; obtaining a second iris image using a second wavelength of the light; comparing a sharpness of the first iris image to the sharpness of the second iris image; and selecting one of the first iris image and the second iris image to obtain a selected iris image, wherein the selected iris image has a better sharpness. 14. The method of claim 13, wherein changing a wavelength of the light comprises activating one or more LC layers. 15. The method of claim 13, comprising using a lens to focus the light emitted by the LED assembly. 16. The method of claim 13, comprising identifying a chosen wavelength of the light by determining the wavelength of light used to obtain the selected iris image. 17. The method of claim 16, comprising storing the chosen wavelength in memory. 18. The method of claim 17, comprising logging a user into a device using the chosen wavelength to obtain an iris image. 19. The method of claim 13, comprising turning off the LED when the device is too close to a user's eye. 20. A computer-readable medium, comprising instructions to direct a processor to: illuminate an iris of a user via an LED assembly; obtain a first iris image from a camera using a first wavelength of a light emitted by the LED assembly; change a wavelength of the light emitted by the LED assembly; obtain a second iris image using a second wavelength of the light; compare a sharpness of the first iris image to the sharpness of the second iris image; and select one of the first iris image and the second iris image to obtain a selected iris image, wherein the selected iris image has a better sharpness. 21. The computer-readable medium of claim 20, comprising instructions to direct the processor to change a wavelength of the light by activating one or more LC layers of an LC film. 22. The computer-readable medium of claim 20, comprising instructions to direct the processor to identify a chosen wavelength of the light by determining the wavelength of the light used to obtain the selected iris image. 23. The computer-readable medium of claim 22, comprising instructions to direct the processor to store the chosen wavelength in memory. 24. The computer-readable medium of claim 23, comprising instructions to direct the processor to log a user into a device using the chosen wavelength to obtain an iris image. 25. The computer-readable medium of claim 20, comprising instructions to direct the processor to turn off the LED when the device is too close to a user's eye.
Techniques for imaging an iris are described. An example of an electronic device includes a camera and a Light Emitting Diode (LED) assembly to provide light for an iris image. The LED assembly comprises an LED and a tunable filter disposed over the LED. The tunable filter tunes the wavelength of the light emitted by the LED assembly.1. An electronic device for imaging an iris, comprising: a camera; and a Light Emitting Diode (LED) assembly to provide a light for an iris image; the LED assembly comprising: an LED; and a tunable filter disposed over the LED, the tunable filter to tune a wavelength of the light emitted by the LED assembly. 2. The electronic device of claim 1, wherein the camera is to obtain a first iris image at a first wavelength of the light emitted by the LED assembly and a second iris image at a second wavelength of the light emitted by the LED assembly. 3. The electronic device of claim 2, comprising a comparing unit to compare a sharpness of the first iris image to the sharpness of the second iris image. 4. The electronic device of claim 3, comprising a selecting unit to select one of the first iris image and the second iris image to obtain a selected iris image, wherein the selected iris image has a better sharpness. 5. The electronic device of claim 4, comprising an identifying unit to identify a chosen wavelength of the light by determining the wavelength of light used to obtain the selected iris image. 6. The electronic device of claim 1, wherein the tunable filter comprises one or more liquid crystal (LC) layers. 7. The electronic device of claim 1, wherein the tunable filter comprises an interferometer. 8. The electronic device of claim 7, wherein the interferometer comprises a Fabry-Perot interferometer. 9. The electronic device of claim 1, comprising a lens disposed between the LED and the one or more LC layers. 10. The electronic device of claim 1, wherein the one or more LC layers are disposed between the LED and the lens. 11. The electronic device of claim 1, wherein a wavelength of the light emitted by the LED is in a range of 780-860 nm. 12. The electronic device of claim 1, comprising a proximity sensor to turn off the LED when the electronic device is too close to a user's eye. 13. A method, comprising: illuminating an iris of a user via an LED assembly; obtaining a first iris image from a camera using a first wavelength of a light emitted by the LED assembly; changing a wavelength of the light emitted by the LED assembly; obtaining a second iris image using a second wavelength of the light; comparing a sharpness of the first iris image to the sharpness of the second iris image; and selecting one of the first iris image and the second iris image to obtain a selected iris image, wherein the selected iris image has a better sharpness. 14. The method of claim 13, wherein changing a wavelength of the light comprises activating one or more LC layers. 15. The method of claim 13, comprising using a lens to focus the light emitted by the LED assembly. 16. The method of claim 13, comprising identifying a chosen wavelength of the light by determining the wavelength of light used to obtain the selected iris image. 17. The method of claim 16, comprising storing the chosen wavelength in memory. 18. The method of claim 17, comprising logging a user into a device using the chosen wavelength to obtain an iris image. 19. The method of claim 13, comprising turning off the LED when the device is too close to a user's eye. 20. A computer-readable medium, comprising instructions to direct a processor to: illuminate an iris of a user via an LED assembly; obtain a first iris image from a camera using a first wavelength of a light emitted by the LED assembly; change a wavelength of the light emitted by the LED assembly; obtain a second iris image using a second wavelength of the light; compare a sharpness of the first iris image to the sharpness of the second iris image; and select one of the first iris image and the second iris image to obtain a selected iris image, wherein the selected iris image has a better sharpness. 21. The computer-readable medium of claim 20, comprising instructions to direct the processor to change a wavelength of the light by activating one or more LC layers of an LC film. 22. The computer-readable medium of claim 20, comprising instructions to direct the processor to identify a chosen wavelength of the light by determining the wavelength of the light used to obtain the selected iris image. 23. The computer-readable medium of claim 22, comprising instructions to direct the processor to store the chosen wavelength in memory. 24. The computer-readable medium of claim 23, comprising instructions to direct the processor to log a user into a device using the chosen wavelength to obtain an iris image. 25. The computer-readable medium of claim 20, comprising instructions to direct the processor to turn off the LED when the device is too close to a user's eye.
2,400
7,268
7,268
13,533,071
2,458
Systems and methods for providing remote access to a cinematic production. A server may generate and cache frames for a cinematic production while creating frame descriptors that are placed in the catalogue. A synchronization process synchronizes the catalogue with one or more clients. Using the catalogue, the client is able to select desired frames for viewing before frames are received at the client from the server. The server may receive a request for frames from the client, where the request includes an identifier component of the frame descriptor in the catalogue. The requested frames are returned by the server to the client for display at the client.
1. A method of providing remote access to a cinematic production, comprising: generating a frame from the cinematic production at a server; generating a frame descriptor associated with the frame at the server; storing the frame in a first memory; storing the frame descriptor in a catalogue in a second memory; and synchronizing the catalogue with a remote client, wherein the frame descriptor is for providing a request for the frame. 2. The method of claim 1, further comprising storing the frame in a cache. 3. The method of claim 1, further comprising: receiving a request from the remote client for the frame; retrieving the frame; and communicating the frame to the remote client. 4. The method of claim 3, further comprising generating the frame in response to the request from the remote client. 5. The method of claim 3, wherein the request includes a unique identifier of the frame that is provided with the frame descriptor. 6. The method of claim 5, wherein the unique identifier is a globally unique identifier that is provided by the remote client. 7. The method of claim 3, further comprising: receiving plural requests for frames of the cinematic production from plural clients that are viewing the frames in a collaborative environment. 8. The method of claim 7, wherein the plural requests are for different views of the cinematic production. 9. The method of claim 1, further comprising dynamically updating the catalogue as frames generated or removed. 10. The method of claim 1, wherein generating the frame, synchronizing the catalogue with the client, and a process to receive requests for frames from remote clients are each performed asynchronously with respect to each other. 11. A method of remotely accessing a cinematic production, comprising: receiving a catalogue of frame descriptors from a server; requesting a frame of the cinematic production from the server using at least one frame identifier from the catalogue as a request; receiving the frame from the server; and caching the frame in a cache. 12. The method of claim 11, wherein the catalogue is a duplicate of a catalogue maintained at the server. 13. The method of claim 11, further comprising: providing a remote access program that executes on a processor of a client device requesting the frame, the remote access program being responsive to an input provided by a user interface program, wherein when the input is received by the remote access program, the remote access program produces the request for the frame. 14. The method of claim 13, wherein the request comprises one of a globally unique identifier (GUID) of the frame and a frame rate. 15. The method of claim 13, wherein each frame descriptor in the catalogue comprises the frame identifier and associated metadata. 16. The method of claim 11, further comprising maintaining the frame in the cache for retrieval in response to a subsequent request for the frame. 17. A computer-readable medium having stored thereon computer-executable instructions that when executed by a computing device perform a method comprising: receiving a request that initiates generating of frames of a cinematic production; generating the frames and placing them into a cache; placing a descriptor of each of the frames is into a catalogue; adding the frames to the cache as raw RGB images; and encoding the RGB images for communication to a remote client in accordance with the request. 18. The computer-readable medium of claim 17, further including instructions that perform the method comprising: receiving the descriptor as an identifier; and looking up the frame associated with the identifier. 19. The computer-readable medium of claim 18, wherein the descriptor includes the identifier and associated metadata provided by an application that created the cinematic production. 20. The computer-readable medium of claim 17, further including instructions that perform the method comprising synchronizing the catalogue with remote clients.
Systems and methods for providing remote access to a cinematic production. A server may generate and cache frames for a cinematic production while creating frame descriptors that are placed in the catalogue. A synchronization process synchronizes the catalogue with one or more clients. Using the catalogue, the client is able to select desired frames for viewing before frames are received at the client from the server. The server may receive a request for frames from the client, where the request includes an identifier component of the frame descriptor in the catalogue. The requested frames are returned by the server to the client for display at the client.1. A method of providing remote access to a cinematic production, comprising: generating a frame from the cinematic production at a server; generating a frame descriptor associated with the frame at the server; storing the frame in a first memory; storing the frame descriptor in a catalogue in a second memory; and synchronizing the catalogue with a remote client, wherein the frame descriptor is for providing a request for the frame. 2. The method of claim 1, further comprising storing the frame in a cache. 3. The method of claim 1, further comprising: receiving a request from the remote client for the frame; retrieving the frame; and communicating the frame to the remote client. 4. The method of claim 3, further comprising generating the frame in response to the request from the remote client. 5. The method of claim 3, wherein the request includes a unique identifier of the frame that is provided with the frame descriptor. 6. The method of claim 5, wherein the unique identifier is a globally unique identifier that is provided by the remote client. 7. The method of claim 3, further comprising: receiving plural requests for frames of the cinematic production from plural clients that are viewing the frames in a collaborative environment. 8. The method of claim 7, wherein the plural requests are for different views of the cinematic production. 9. The method of claim 1, further comprising dynamically updating the catalogue as frames generated or removed. 10. The method of claim 1, wherein generating the frame, synchronizing the catalogue with the client, and a process to receive requests for frames from remote clients are each performed asynchronously with respect to each other. 11. A method of remotely accessing a cinematic production, comprising: receiving a catalogue of frame descriptors from a server; requesting a frame of the cinematic production from the server using at least one frame identifier from the catalogue as a request; receiving the frame from the server; and caching the frame in a cache. 12. The method of claim 11, wherein the catalogue is a duplicate of a catalogue maintained at the server. 13. The method of claim 11, further comprising: providing a remote access program that executes on a processor of a client device requesting the frame, the remote access program being responsive to an input provided by a user interface program, wherein when the input is received by the remote access program, the remote access program produces the request for the frame. 14. The method of claim 13, wherein the request comprises one of a globally unique identifier (GUID) of the frame and a frame rate. 15. The method of claim 13, wherein each frame descriptor in the catalogue comprises the frame identifier and associated metadata. 16. The method of claim 11, further comprising maintaining the frame in the cache for retrieval in response to a subsequent request for the frame. 17. A computer-readable medium having stored thereon computer-executable instructions that when executed by a computing device perform a method comprising: receiving a request that initiates generating of frames of a cinematic production; generating the frames and placing them into a cache; placing a descriptor of each of the frames is into a catalogue; adding the frames to the cache as raw RGB images; and encoding the RGB images for communication to a remote client in accordance with the request. 18. The computer-readable medium of claim 17, further including instructions that perform the method comprising: receiving the descriptor as an identifier; and looking up the frame associated with the identifier. 19. The computer-readable medium of claim 18, wherein the descriptor includes the identifier and associated metadata provided by an application that created the cinematic production. 20. The computer-readable medium of claim 17, further including instructions that perform the method comprising synchronizing the catalogue with remote clients.
2,400
7,269
7,269
12,842,279
2,433
A non-transitory computer-readable storage medium storing a set of instructions executable by a processor. The set of instructions is operable to receive a request from a node to join a trusted ad hoc network. The set of instructions is further operable to authenticate the node to join the trusted ad hoc network. The authentication is performed based on a verification that the node will comply with a security policy of the trusted ad hoc network. The set of instructions is further operable to send, to the node, a verification that the trusted ad hoc network complies with the security policy. The set of instructions is further operable to add the node to the trusted ad hoc network.
1. A non-transitory computer readable storage medium storing a set of instructions executable by a processor, the set of instructions being operable to: receive a request from a node to join a trusted ad hoc network; authenticate the node to join the trusted ad hoc network, the authentication performed based on a verification that the node will comply with a security policy of the trusted ad hoc network; send, to the node, a verification that the trusted ad hoc network complies with the security policy; and add the node to the trusted ad hoc network. 2. The non-transitory computer readable storage medium of claim 1, wherein the verification is performed by verifying a report generated by a trusted agent operated by the node. 3. The non-transitory computer readable storage medium of claim 2, wherein the trusted agent includes a hardware component and a software component. 4. The non-transitory computer readable storage medium of claim 3, wherein the software component of the trusted agent operates as a portion of a kernel of an operating system of the node. 5. The non-transitory computer readable storage medium of claim 1, wherein the verification comprises one of verifying a system commitment to the security policy, verifying an enforcer commitment to the security policy, and verifying a boot status of the node. 6. The non-transitory computer readable storage medium of claim 1, wherein the trusted ad hoc network comprises a plurality of security policies. 7. The non-transitory computer readable storage medium of claim 6, wherein each of the plurality of security policies corresponds to an application executed by a plurality of nodes of the trusted ad hoc network. 8. The non-transitory computer readable storage medium of claim 1, wherein the instructions are further operable to: send, to the node, a key corresponding to the trusted ad hoc network. 9. The non-transitory computer readable storage medium of claim 1, wherein the instructions are further operable to: select, as a final key for the trusted ad hoc network, one of an initial key of the trusted ad hoc network and a key of a further trusted ad hoc network, the node being a member of the further trusted ad hoc network. 10. The non-transitory computer readable storage medium 9, wherein the selection is made based on a higher one of a hash value of the initial key of the trusted ad hoc network and a hash value of the key of the further trusted ad hoc network. 11. The non-transitory computer readable storage medium of claim 9, wherein the instructions are further operable to: invite a further node of the further trusted ad hoc network to join the trusted ad hoc network; and add the further node to the trusted ad hoc network, based on a verification of a membership of the further node in the further trusted ad hoc network. 12. A method, comprising: receiving a request from a node to join a trusted ad hoc network; authenticating the node to join the trusted ad hoc network, the authentication performed based on a verification that the node will comply with a security policy of the trusted ad hoc network; sending, to the node, a verification that the trusted ad hoc network complies with the security policy; and adding the node to the trusted ad hoc network. 13. The method of claim 12, wherein the verification is performed by verifying a report generated by a trusted agent operated by the node. 14. The method of claim 13, wherein the trusted agent includes a hardware component and a software component. 15. The method of claim 14, wherein the software component of the trusted agent operates as a portion of a kernel of an operating system of the node. 16. The method of claim 12, wherein the verification comprises one of verifying a system commitment to the security policy, verifying an enforcer commitment to the security policy, and verifying a boot status of the node. 17. The method of claim 12, wherein the trusted ad hoc network comprises a plurality of security policies. 18. The method of claim 176, wherein each of the plurality of security policies corresponds to an application executed by a plurality of nodes of the trusted ad hoc network. 19. The method of claim 12, further comprising: sending, to the node, a key corresponding to the trusted ad hoc network. 20. A device, comprising: a memory; and a processor configured to receive a request from a node to join a trusted ad hoc network of which the device is a member, the processor further configured to authenticate the node to join the trusted ad hoc network, the authentication performed based on a verification that the node will comply with a security policy of the trusted ad hoc network, the processor further configured to send, to the node, a verification that the trusted ad hoc network complies with the security policy, the processor further configured to add the node to the trusted ad hoc network.
A non-transitory computer-readable storage medium storing a set of instructions executable by a processor. The set of instructions is operable to receive a request from a node to join a trusted ad hoc network. The set of instructions is further operable to authenticate the node to join the trusted ad hoc network. The authentication is performed based on a verification that the node will comply with a security policy of the trusted ad hoc network. The set of instructions is further operable to send, to the node, a verification that the trusted ad hoc network complies with the security policy. The set of instructions is further operable to add the node to the trusted ad hoc network.1. A non-transitory computer readable storage medium storing a set of instructions executable by a processor, the set of instructions being operable to: receive a request from a node to join a trusted ad hoc network; authenticate the node to join the trusted ad hoc network, the authentication performed based on a verification that the node will comply with a security policy of the trusted ad hoc network; send, to the node, a verification that the trusted ad hoc network complies with the security policy; and add the node to the trusted ad hoc network. 2. The non-transitory computer readable storage medium of claim 1, wherein the verification is performed by verifying a report generated by a trusted agent operated by the node. 3. The non-transitory computer readable storage medium of claim 2, wherein the trusted agent includes a hardware component and a software component. 4. The non-transitory computer readable storage medium of claim 3, wherein the software component of the trusted agent operates as a portion of a kernel of an operating system of the node. 5. The non-transitory computer readable storage medium of claim 1, wherein the verification comprises one of verifying a system commitment to the security policy, verifying an enforcer commitment to the security policy, and verifying a boot status of the node. 6. The non-transitory computer readable storage medium of claim 1, wherein the trusted ad hoc network comprises a plurality of security policies. 7. The non-transitory computer readable storage medium of claim 6, wherein each of the plurality of security policies corresponds to an application executed by a plurality of nodes of the trusted ad hoc network. 8. The non-transitory computer readable storage medium of claim 1, wherein the instructions are further operable to: send, to the node, a key corresponding to the trusted ad hoc network. 9. The non-transitory computer readable storage medium of claim 1, wherein the instructions are further operable to: select, as a final key for the trusted ad hoc network, one of an initial key of the trusted ad hoc network and a key of a further trusted ad hoc network, the node being a member of the further trusted ad hoc network. 10. The non-transitory computer readable storage medium 9, wherein the selection is made based on a higher one of a hash value of the initial key of the trusted ad hoc network and a hash value of the key of the further trusted ad hoc network. 11. The non-transitory computer readable storage medium of claim 9, wherein the instructions are further operable to: invite a further node of the further trusted ad hoc network to join the trusted ad hoc network; and add the further node to the trusted ad hoc network, based on a verification of a membership of the further node in the further trusted ad hoc network. 12. A method, comprising: receiving a request from a node to join a trusted ad hoc network; authenticating the node to join the trusted ad hoc network, the authentication performed based on a verification that the node will comply with a security policy of the trusted ad hoc network; sending, to the node, a verification that the trusted ad hoc network complies with the security policy; and adding the node to the trusted ad hoc network. 13. The method of claim 12, wherein the verification is performed by verifying a report generated by a trusted agent operated by the node. 14. The method of claim 13, wherein the trusted agent includes a hardware component and a software component. 15. The method of claim 14, wherein the software component of the trusted agent operates as a portion of a kernel of an operating system of the node. 16. The method of claim 12, wherein the verification comprises one of verifying a system commitment to the security policy, verifying an enforcer commitment to the security policy, and verifying a boot status of the node. 17. The method of claim 12, wherein the trusted ad hoc network comprises a plurality of security policies. 18. The method of claim 176, wherein each of the plurality of security policies corresponds to an application executed by a plurality of nodes of the trusted ad hoc network. 19. The method of claim 12, further comprising: sending, to the node, a key corresponding to the trusted ad hoc network. 20. A device, comprising: a memory; and a processor configured to receive a request from a node to join a trusted ad hoc network of which the device is a member, the processor further configured to authenticate the node to join the trusted ad hoc network, the authentication performed based on a verification that the node will comply with a security policy of the trusted ad hoc network, the processor further configured to send, to the node, a verification that the trusted ad hoc network complies with the security policy, the processor further configured to add the node to the trusted ad hoc network.
2,400
7,270
7,270
14,534,184
2,483
A block prediction search method includes at least following steps: utilizing a data buffer to store bit-depth reduced sample values of a plurality of samples in a first pixel line; detecting occurrence of an edge in the first pixel line according to restored sample values derived from stored sample values in the data buffer; and determining a block prediction vector for a pixel group in a second pixel line different from the first pixel line, wherein the block prediction vector is determined based at least partly on a last edge count value indicative of a number of samples in the first pixel line that have gone by since the edge occurs.
1. A block prediction search method, comprising: utilizing a data buffer to store bit-depth reduced sample values of a plurality of samples in a first pixel line; detecting occurrence of an edge in the first pixel line according to restored sample values derived from stored sample values in the data buffer; and determining a block prediction vector for a pixel group in a second pixel line different from the first pixel line, wherein the block prediction vector is determined based at least partly on a last edge count value indicative of a number of samples in the first pixel line that have gone by since the edge occurs. 2. The block prediction search method of claim 1, wherein the samples in the first pixel line are reconstructed pixels of the first pixel line. 3. The block prediction search method of claim 1, wherein the samples in the first pixel line are decoded pixels of the first pixel line. 4. The block prediction search method of claim 1, wherein the block prediction search method is performed on both of a compressor and a decompressor. 5. A block prediction search method, comprising: utilizing a data buffer to store sample values corresponding to a plurality of samples in a first pixel line; computing a last edge count value according to sample values derived from stored sample values, each having a first bit depth in the data buffer, wherein the last edge count value is indicative of a number of samples in the first pixel line that have gone by since an edge occurs; computing sample difference information according to sample values derived from stored sample values, each having the first bit depth in the data buffer; and determining a block prediction vector for a pixel group in a second pixel line different from the first pixel line, wherein the block prediction vector is determined based at least partly on the last edge count value and the sample difference information. 6. The block prediction search method of claim 5, wherein the samples in the first pixel line are reconstructed pixels of the first pixel line. 7. The block prediction search method of claim 5, wherein the samples in the first pixel line are decoded pixels of the first pixel line. 8. The block prediction search method of claim 5, wherein the sample values stored in the data buffer are bit-depth reduced sample values of the samples in the first pixel line. 9. The block prediction search method of claim 5, wherein each of the sample values used for computing the last edge count value is a restored sample value with a second bit depth larger than the first bit depth, and each of the sample values used for computing the sample difference information is a restored sample value with the second bit depth. 10. The block prediction search method of claim 5, wherein the block prediction search method is performed on both of a compressor and a decompressor. 11. A block prediction search method, comprising: utilizing a data buffer to store bit-depth reduced sample values of a plurality of samples in a first pixel line; and determining a block prediction vector for a pixel group in a second pixel line different from the first pixel line, wherein data of the first pixel line that are used in computation of the block prediction vector are all obtained from restored sample values derived from stored sample values in the data buffer. 12. The block prediction search method of claim 11, wherein the samples in the first pixel line are reconstructed pixels of the first pixel line. 13. The block prediction search method of claim 11, wherein the samples in the first pixel line are decoded pixels of the first pixel line. 14. An image processing apparatus, comprising: a data buffer, configured to store bit-depth reduced sample values of a plurality of samples in a first pixel line; and a block prediction search circuit, comprising: a first processing circuit, configured to detect occurrence of an edge in the first pixel line according to restored sample values derived from stored sample values in the data buffer, and compute a last edge count value indicative of a number of samples in the first pixel line that have gone by since the edge occurs; and a second processing circuit, configured to determine a block prediction vector for a pixel group in a second pixel line different from the first pixel line, wherein the block prediction vector is determined based at least partly on the last edge count value. 15. The image processing apparatus of claim 14, wherein the samples in the first pixel line are reconstructed pixels of the first pixel line. 16. The image processing apparatus of claim 14, wherein the samples in the first pixel line are decoded pixels of the first pixel line. 17. The image processing apparatus of claim 14, wherein the block prediction search apparatus is part of each of a compressor and a decompressor. 18. An image processing apparatus, comprising: a data buffer, configured to store sample values corresponding to a plurality of samples in a first pixel line; and a block prediction search circuit, comprising: a first processing circuit, configured to compute a last edge count value according to sample values derived from stored sample values, each having a first bit depth in the data buffer, wherein the last edge count value is indicative of a number of samples in the first pixel line that have gone by since an edge occurs; and a second processing circuit, configured to compute sample difference information according to sample values derived from stored sample values, each having the first bit depth in the data buffer; and determine a block prediction vector for a pixel group in a second pixel line different from the first pixel line, wherein the block prediction vector is determined based at least partly on the last edge count value and the sample difference information. 19. The image processing apparatus of claim 18, wherein the samples in the first pixel line are reconstructed pixels of the first pixel line. 20. The image processing apparatus of claim 18, wherein the samples in the first pixel line are decoded pixels of the first pixel line. 21. The image processing apparatus of claim 18, wherein the sample values stored in the data buffer are bit-depth reduced sample values of the samples in the first pixel line. 22. The image processing apparatus of claim 18, wherein each of the sample values used by the first processing circuit for computing the last edge count value has a second bit depth larger than the first bit depth, and each of the sample values used by the second processing circuit for computing the sample difference information has the second bit depth. 23. The image processing apparatus of claim 18, wherein the block prediction search apparatus is part of each of a compressor and a decompressor. 24. An image processing apparatus, comprising: a data buffer, configured to store bit-depth reduced sample values of a plurality of samples in a first pixel line; and a block prediction search circuit, configured to determine a block prediction vector for a pixel group in a second pixel line different from the first pixel line, wherein data of the first pixel line that are used in computation of the block prediction vector are all obtained from restored sample values derived from stored sample values in the data buffer. 25. The image processing apparatus of claim 24, wherein the samples in the first pixel line are reconstructed pixels of the first pixel line. 26. The image processing apparatus of claim 24, wherein the samples in the first pixel line are decoded pixels of the first pixel line.
A block prediction search method includes at least following steps: utilizing a data buffer to store bit-depth reduced sample values of a plurality of samples in a first pixel line; detecting occurrence of an edge in the first pixel line according to restored sample values derived from stored sample values in the data buffer; and determining a block prediction vector for a pixel group in a second pixel line different from the first pixel line, wherein the block prediction vector is determined based at least partly on a last edge count value indicative of a number of samples in the first pixel line that have gone by since the edge occurs.1. A block prediction search method, comprising: utilizing a data buffer to store bit-depth reduced sample values of a plurality of samples in a first pixel line; detecting occurrence of an edge in the first pixel line according to restored sample values derived from stored sample values in the data buffer; and determining a block prediction vector for a pixel group in a second pixel line different from the first pixel line, wherein the block prediction vector is determined based at least partly on a last edge count value indicative of a number of samples in the first pixel line that have gone by since the edge occurs. 2. The block prediction search method of claim 1, wherein the samples in the first pixel line are reconstructed pixels of the first pixel line. 3. The block prediction search method of claim 1, wherein the samples in the first pixel line are decoded pixels of the first pixel line. 4. The block prediction search method of claim 1, wherein the block prediction search method is performed on both of a compressor and a decompressor. 5. A block prediction search method, comprising: utilizing a data buffer to store sample values corresponding to a plurality of samples in a first pixel line; computing a last edge count value according to sample values derived from stored sample values, each having a first bit depth in the data buffer, wherein the last edge count value is indicative of a number of samples in the first pixel line that have gone by since an edge occurs; computing sample difference information according to sample values derived from stored sample values, each having the first bit depth in the data buffer; and determining a block prediction vector for a pixel group in a second pixel line different from the first pixel line, wherein the block prediction vector is determined based at least partly on the last edge count value and the sample difference information. 6. The block prediction search method of claim 5, wherein the samples in the first pixel line are reconstructed pixels of the first pixel line. 7. The block prediction search method of claim 5, wherein the samples in the first pixel line are decoded pixels of the first pixel line. 8. The block prediction search method of claim 5, wherein the sample values stored in the data buffer are bit-depth reduced sample values of the samples in the first pixel line. 9. The block prediction search method of claim 5, wherein each of the sample values used for computing the last edge count value is a restored sample value with a second bit depth larger than the first bit depth, and each of the sample values used for computing the sample difference information is a restored sample value with the second bit depth. 10. The block prediction search method of claim 5, wherein the block prediction search method is performed on both of a compressor and a decompressor. 11. A block prediction search method, comprising: utilizing a data buffer to store bit-depth reduced sample values of a plurality of samples in a first pixel line; and determining a block prediction vector for a pixel group in a second pixel line different from the first pixel line, wherein data of the first pixel line that are used in computation of the block prediction vector are all obtained from restored sample values derived from stored sample values in the data buffer. 12. The block prediction search method of claim 11, wherein the samples in the first pixel line are reconstructed pixels of the first pixel line. 13. The block prediction search method of claim 11, wherein the samples in the first pixel line are decoded pixels of the first pixel line. 14. An image processing apparatus, comprising: a data buffer, configured to store bit-depth reduced sample values of a plurality of samples in a first pixel line; and a block prediction search circuit, comprising: a first processing circuit, configured to detect occurrence of an edge in the first pixel line according to restored sample values derived from stored sample values in the data buffer, and compute a last edge count value indicative of a number of samples in the first pixel line that have gone by since the edge occurs; and a second processing circuit, configured to determine a block prediction vector for a pixel group in a second pixel line different from the first pixel line, wherein the block prediction vector is determined based at least partly on the last edge count value. 15. The image processing apparatus of claim 14, wherein the samples in the first pixel line are reconstructed pixels of the first pixel line. 16. The image processing apparatus of claim 14, wherein the samples in the first pixel line are decoded pixels of the first pixel line. 17. The image processing apparatus of claim 14, wherein the block prediction search apparatus is part of each of a compressor and a decompressor. 18. An image processing apparatus, comprising: a data buffer, configured to store sample values corresponding to a plurality of samples in a first pixel line; and a block prediction search circuit, comprising: a first processing circuit, configured to compute a last edge count value according to sample values derived from stored sample values, each having a first bit depth in the data buffer, wherein the last edge count value is indicative of a number of samples in the first pixel line that have gone by since an edge occurs; and a second processing circuit, configured to compute sample difference information according to sample values derived from stored sample values, each having the first bit depth in the data buffer; and determine a block prediction vector for a pixel group in a second pixel line different from the first pixel line, wherein the block prediction vector is determined based at least partly on the last edge count value and the sample difference information. 19. The image processing apparatus of claim 18, wherein the samples in the first pixel line are reconstructed pixels of the first pixel line. 20. The image processing apparatus of claim 18, wherein the samples in the first pixel line are decoded pixels of the first pixel line. 21. The image processing apparatus of claim 18, wherein the sample values stored in the data buffer are bit-depth reduced sample values of the samples in the first pixel line. 22. The image processing apparatus of claim 18, wherein each of the sample values used by the first processing circuit for computing the last edge count value has a second bit depth larger than the first bit depth, and each of the sample values used by the second processing circuit for computing the sample difference information has the second bit depth. 23. The image processing apparatus of claim 18, wherein the block prediction search apparatus is part of each of a compressor and a decompressor. 24. An image processing apparatus, comprising: a data buffer, configured to store bit-depth reduced sample values of a plurality of samples in a first pixel line; and a block prediction search circuit, configured to determine a block prediction vector for a pixel group in a second pixel line different from the first pixel line, wherein data of the first pixel line that are used in computation of the block prediction vector are all obtained from restored sample values derived from stored sample values in the data buffer. 25. The image processing apparatus of claim 24, wherein the samples in the first pixel line are reconstructed pixels of the first pixel line. 26. The image processing apparatus of claim 24, wherein the samples in the first pixel line are decoded pixels of the first pixel line.
2,400
7,271
7,271
12,452,054
2,482
There are provided methods and apparatus at an encoder and decoder for supporting single loop decoding of multi-view coded video. An apparatus includes an encoder for encoding multi-view video content to enable single loop decoding of the multi-view video content when the multi-view video content is encoded using inter-view prediction. Similarly, a method is also described for encoding multi-view video content to support single loop decoding of the multi-view video content when the multi-view video content is encoded using inter-view prediction. Corresponding decoder apparatus and method are also described.
1. An apparatus, comprising: an encoder for encoding multi-view video content to enable single loop decoding of the multi-view video content when the multi-view video content is encoded using inter-view prediction. 2. The apparatus of claim 1, wherein the multi-view video content includes a reference view and other views, the other views capable of being reconstructed without a complete reconstruction of the reference view. 3. The apparatus of claim 1, wherein the inter-view prediction involves inferring at least one of motion information, inter prediction modes, intra prediction modes, reference indices, residual data, depth information, an illumination compensation offset, a deblocking strength, and disparity data from a reference view of the multi-view video content. 4. The apparatus of claim 1, wherein the inter-view prediction involves inferring information for a given view of the multi-view content from characteristics relating to at least one of at least a portion of at least one picture from a reference view of the multi-view video content with respect to the given view, and decoding information relating to the at least a portion of the at least one picture. 5. The apparatus of claim 1, wherein a high level syntax element is used to indicate that the single loop decoding is enabled for the multi-view video content. 6. The apparatus of claim 5, wherein the high level syntax element one of separately indicates whether the single loop decoding is enabled for anchor pictures and non-anchor pictures in the multi-view video content, indicates on a view basis whether the single loop decoding is enabled, indicates on a sequence basis whether the single loop decoding is enabled, and indicates that the single loop decoding is enabled for only non-anchor pictures in the multi-view video content. 7. A method, comprising: encoding multi-view video content to support single loop decoding of the multi-view video content when the multi-view video content is encoded using inter-view prediction. 8. The method of claim 7, wherein the multi-view video content includes a reference view and other views, the other views capable of being reconstructed without a complete reconstruction of the reference view. 9. The method of claim 7, wherein the inter-view prediction involves inferring at least one of motion information, inter prediction modes, intra prediction modes, reference indices, residual data, depth information, an illumination compensation offset, a deblocking strength, and disparity data from a reference view of the multi-view video content. 10. The method of claim 7, wherein the inter-view prediction involves inferring information for a given view of the multi-view content from characteristics relating to at least one of at least a portion of at least one picture from a reference view of the multi-view video content with respect to the given view, and decoding information relating to the at least a portion of the at least one picture. 11. The method of claim 7, wherein a high level syntax element is used to indicate that the single loop decoding is enabled for the multi-view video content. 12. The method of claim 11, wherein the high level syntax element one of separately indicates whether the single loop decoding is enabled for anchor pictures and non-anchor pictures in the multi-view video content, indicates on a view basis whether the single loop decoding is enabled, indicates on a sequence basis whether the single loop decoding is enabled, and indicates that the single loop decoding is enabled for only non-anchor pictures in the multi-view video content. 13. A storage media having video signal data encoded thereupon, comprising: multi-view video content encoded to support single loop decoding of the multi-view video content when the multi-view video content is encoded using inter-view prediction. 14. The storage media of claim 13, wherein the multi-view video content includes a reference view and other views, the other views capable of being reconstructed without a complete reconstruction of the reference view. 15. The storage media of claim 13, wherein the inter-view prediction involves inferring at least one of motion information, inter prediction modes, intra prediction modes, reference indices, residual data, depth information, an illumination compensation offset, a deblocking strength, and disparity data from a reference view of the multi-view video content. 16. The storage media of claim 13, wherein the inter-view prediction involves inferring information for a given view of the multi-view content from characteristics relating to at least one of at least a portion of at least one picture from a reference view of the multi-view video content with respect to the given view, and decoding information relating to the at least a portion of the at least one picture. 17. The storage media of claim 13, wherein a high level syntax element is used to indicate that the single loop decoding is enabled for the multi-view video content. 18. The storage media of claim 17, wherein the high level syntax element one of separately indicates whether the single loop decoding is enabled for anchor pictures and non-anchor pictures in the multi-view video content, indicates on a view basis whether the single loop decoding is enabled, indicates on a sequence basis whether the single loop decoding is enabled, and indicates that the single loop decoding is enabled for only non-anchor pictures in the multi-view video content.
There are provided methods and apparatus at an encoder and decoder for supporting single loop decoding of multi-view coded video. An apparatus includes an encoder for encoding multi-view video content to enable single loop decoding of the multi-view video content when the multi-view video content is encoded using inter-view prediction. Similarly, a method is also described for encoding multi-view video content to support single loop decoding of the multi-view video content when the multi-view video content is encoded using inter-view prediction. Corresponding decoder apparatus and method are also described.1. An apparatus, comprising: an encoder for encoding multi-view video content to enable single loop decoding of the multi-view video content when the multi-view video content is encoded using inter-view prediction. 2. The apparatus of claim 1, wherein the multi-view video content includes a reference view and other views, the other views capable of being reconstructed without a complete reconstruction of the reference view. 3. The apparatus of claim 1, wherein the inter-view prediction involves inferring at least one of motion information, inter prediction modes, intra prediction modes, reference indices, residual data, depth information, an illumination compensation offset, a deblocking strength, and disparity data from a reference view of the multi-view video content. 4. The apparatus of claim 1, wherein the inter-view prediction involves inferring information for a given view of the multi-view content from characteristics relating to at least one of at least a portion of at least one picture from a reference view of the multi-view video content with respect to the given view, and decoding information relating to the at least a portion of the at least one picture. 5. The apparatus of claim 1, wherein a high level syntax element is used to indicate that the single loop decoding is enabled for the multi-view video content. 6. The apparatus of claim 5, wherein the high level syntax element one of separately indicates whether the single loop decoding is enabled for anchor pictures and non-anchor pictures in the multi-view video content, indicates on a view basis whether the single loop decoding is enabled, indicates on a sequence basis whether the single loop decoding is enabled, and indicates that the single loop decoding is enabled for only non-anchor pictures in the multi-view video content. 7. A method, comprising: encoding multi-view video content to support single loop decoding of the multi-view video content when the multi-view video content is encoded using inter-view prediction. 8. The method of claim 7, wherein the multi-view video content includes a reference view and other views, the other views capable of being reconstructed without a complete reconstruction of the reference view. 9. The method of claim 7, wherein the inter-view prediction involves inferring at least one of motion information, inter prediction modes, intra prediction modes, reference indices, residual data, depth information, an illumination compensation offset, a deblocking strength, and disparity data from a reference view of the multi-view video content. 10. The method of claim 7, wherein the inter-view prediction involves inferring information for a given view of the multi-view content from characteristics relating to at least one of at least a portion of at least one picture from a reference view of the multi-view video content with respect to the given view, and decoding information relating to the at least a portion of the at least one picture. 11. The method of claim 7, wherein a high level syntax element is used to indicate that the single loop decoding is enabled for the multi-view video content. 12. The method of claim 11, wherein the high level syntax element one of separately indicates whether the single loop decoding is enabled for anchor pictures and non-anchor pictures in the multi-view video content, indicates on a view basis whether the single loop decoding is enabled, indicates on a sequence basis whether the single loop decoding is enabled, and indicates that the single loop decoding is enabled for only non-anchor pictures in the multi-view video content. 13. A storage media having video signal data encoded thereupon, comprising: multi-view video content encoded to support single loop decoding of the multi-view video content when the multi-view video content is encoded using inter-view prediction. 14. The storage media of claim 13, wherein the multi-view video content includes a reference view and other views, the other views capable of being reconstructed without a complete reconstruction of the reference view. 15. The storage media of claim 13, wherein the inter-view prediction involves inferring at least one of motion information, inter prediction modes, intra prediction modes, reference indices, residual data, depth information, an illumination compensation offset, a deblocking strength, and disparity data from a reference view of the multi-view video content. 16. The storage media of claim 13, wherein the inter-view prediction involves inferring information for a given view of the multi-view content from characteristics relating to at least one of at least a portion of at least one picture from a reference view of the multi-view video content with respect to the given view, and decoding information relating to the at least a portion of the at least one picture. 17. The storage media of claim 13, wherein a high level syntax element is used to indicate that the single loop decoding is enabled for the multi-view video content. 18. The storage media of claim 17, wherein the high level syntax element one of separately indicates whether the single loop decoding is enabled for anchor pictures and non-anchor pictures in the multi-view video content, indicates on a view basis whether the single loop decoding is enabled, indicates on a sequence basis whether the single loop decoding is enabled, and indicates that the single loop decoding is enabled for only non-anchor pictures in the multi-view video content.
2,400
7,272
7,272
14,876,960
2,426
According to one embodiment, a method for improving accessibility to a plurality of live-streamed media content is provided. The method may include generating a plurality data corresponding to a media source, whereby the media source may be a video game engine, a teleconferencing program, or a television broadcast. A plurality of media streams may be created from the received plurality of data, whereby at least one media stream from the created plurality of media streams provides a unique setting, such as a color blind setting or a language setting. The created plurality of media streams may be transmitted to a receiving user. Additionally, at least one of the transmitted plurality of media streams may be enabled to be selected by the receiving user and displayed accordingly.
1. A processor-implemented method for improving accessibility to a plurality of live-streamed media content, comprising: generating, by a processor, a plurality of live-streamed source media data corresponding to a plurality of user interactions with a video game program; creating a plurality of media streams from the generated plurality of live-streamed source media data, wherein a first media stream within the created plurality of media streams is a colorblind accessible stream, and wherein a second media stream within the plurality of created media streams is a non-colorblind accessible stream, and wherein the colorblind accessible stream substitutes at least one color depicted in the non-colorblind media stream with a more distinguishable color to a person with a colorblindness or a texture, and wherein the texture is selected from a group consisting of cross-hatching and dithering; and transmitting the created plurality of media streams to a receiving user. 2. The method of claim 1, further comprising: enabling at least one of the transmitted plurality of media streams to be selected by the receiving user. 3. The method of claim 2, further comprising: displaying the at least one selected media stream to the receiving user. 4. The method of claim 1, wherein the received media source comprises at least one of a video game engine, a teleconferencing program, and a television broadcast. 5. The method of claim 1, further comprising: performing post-processing on the created plurality of media streams. 6. The method of claim 5, wherein performing post-processing comprises at least one of adding a graphical overlay, a textual overlay, a watermark, and an audiovisual recording of a sending user associated with the media source. 7. The method of claim 1, wherein the plurality of media streams comprises at least one of a color blind accessible media stream, a non-color blind accessible media stream, a media stream having one or more on-screen elements in a first language, a media stream having one or more on-screen elements in a second language, and a media stream having one or more qualities selectable from an options menu. 8. The method of claim 1, wherein the first media stream includes a plurality of on-screen elements displayed in a first language and the second media stream includes the plurality of on-screen elements displayed in a second language, and wherein the plurality of on-screen elements includes a plurality of characters, a background, a heads-up display, and a plurality of menus. 9. A computer system for improving accessibility to a plurality of live-streamed media content, comprising: one or more processors, one or more computer-readable memories, one or more computer-readable tangible storage devices, and program instructions stored on at least one of the one or more storage devices for execution by at least one of the one or more processors via at least one of the one or more memories, wherein the computer system is capable of performing a method comprising: generating a plurality of live-streamed source media data corresponding to a plurality of user interactions with a video game program; creating a plurality of media streams from the generated plurality of live-streamed source media data, wherein a first media stream within the created plurality of media streams is a colorblind accessible stream, and wherein a second media stream within the plurality of created media streams is a non-colorblind accessible stream, and wherein the colorblind accessible stream substitutes at least one color depicted in the non-colorblind media stream with a more distinguishable color to a person with a colorblindness or a texture, and wherein the texture is selected from a group consisting of cross-hatching and dithering; and transmitting the created plurality of media streams to a receiving user. 10. The computer system of claim 9, further comprising: enabling at least one of the transmitted plurality of media streams to be selected by the receiving user. 11. The computer system of claim 10, further comprising: displaying the at least one selected media stream to the receiving user. 12. The computer system of claim 9, wherein the received media source comprises at least one of a video game engine, a teleconferencing program, and a television broadcast. 13. The computer system of claim 9, further comprising: performing post-processing on the created plurality of media streams. 14. The computer system of claim 13, wherein performing post-processing comprises at least one of adding a graphical overlay, a textual overlay, a watermark, and an audiovisual recording of a sending user associated with the media source. 15. The computer system of claim 9, wherein the plurality of media streams comprises at least one of a color blind accessible media stream, a non-color blind accessible media stream, a media stream having one or more on-screen elements in a first language, a media stream having one or more on-screen elements in a second language, and a media stream having one or more qualities selectable from an options menu. 16. A computer program product for improving accessibility to a plurality of live-streamed media content, comprising: one or more computer-readable storage devices and program instructions stored on at least one of the one or more tangible storage devices, the program instructions executable by a processor, the program instructions comprising: program instructions to generate a plurality of live-streamed source media data corresponding to a plurality of user interactions with a video game program; program instructions to create a plurality of media streams from the generated plurality of live-streamed source media data, wherein a first media stream within the created plurality of media streams is a colorblind accessible stream, and wherein a second media stream within the plurality of created media streams is a non-colorblind accessible stream, and wherein the colorblind accessible stream substitutes at least one color depicted in the non-colorblind media stream with a more distinguishable color to a person with a colorblindness or a texture, and wherein the texture is selected from a group consisting of cross-hatching and dithering; and program instructions to transmit the created plurality of media streams to a receiving user. 17. The computer program product of claim 16, further comprising: program instructions to enable at least one of the transmitted plurality of media streams to be selected by the receiving user; and program instructions to display the at least one selected media stream to the receiving user. 18. The computer program product of claim 16, further comprising: program instructions to performing post-processing on the created plurality of media streams. 19. The computer program product of claim 17, wherein performing post-processing comprises at least one of adding a graphical overlay, a textual overlay, a watermark, and an audiovisual recording of a sending user associated with the media source. 20. The computer program product of claim 16, wherein the plurality of media streams comprises at least one of a color blind accessible media stream, a non-color blind accessible media stream, a media stream having one or more on-screen elements in a first language, a media stream having one or more on-screen elements in a second language, and a media stream having one or more qualities selectable from an options menu.
According to one embodiment, a method for improving accessibility to a plurality of live-streamed media content is provided. The method may include generating a plurality data corresponding to a media source, whereby the media source may be a video game engine, a teleconferencing program, or a television broadcast. A plurality of media streams may be created from the received plurality of data, whereby at least one media stream from the created plurality of media streams provides a unique setting, such as a color blind setting or a language setting. The created plurality of media streams may be transmitted to a receiving user. Additionally, at least one of the transmitted plurality of media streams may be enabled to be selected by the receiving user and displayed accordingly.1. A processor-implemented method for improving accessibility to a plurality of live-streamed media content, comprising: generating, by a processor, a plurality of live-streamed source media data corresponding to a plurality of user interactions with a video game program; creating a plurality of media streams from the generated plurality of live-streamed source media data, wherein a first media stream within the created plurality of media streams is a colorblind accessible stream, and wherein a second media stream within the plurality of created media streams is a non-colorblind accessible stream, and wherein the colorblind accessible stream substitutes at least one color depicted in the non-colorblind media stream with a more distinguishable color to a person with a colorblindness or a texture, and wherein the texture is selected from a group consisting of cross-hatching and dithering; and transmitting the created plurality of media streams to a receiving user. 2. The method of claim 1, further comprising: enabling at least one of the transmitted plurality of media streams to be selected by the receiving user. 3. The method of claim 2, further comprising: displaying the at least one selected media stream to the receiving user. 4. The method of claim 1, wherein the received media source comprises at least one of a video game engine, a teleconferencing program, and a television broadcast. 5. The method of claim 1, further comprising: performing post-processing on the created plurality of media streams. 6. The method of claim 5, wherein performing post-processing comprises at least one of adding a graphical overlay, a textual overlay, a watermark, and an audiovisual recording of a sending user associated with the media source. 7. The method of claim 1, wherein the plurality of media streams comprises at least one of a color blind accessible media stream, a non-color blind accessible media stream, a media stream having one or more on-screen elements in a first language, a media stream having one or more on-screen elements in a second language, and a media stream having one or more qualities selectable from an options menu. 8. The method of claim 1, wherein the first media stream includes a plurality of on-screen elements displayed in a first language and the second media stream includes the plurality of on-screen elements displayed in a second language, and wherein the plurality of on-screen elements includes a plurality of characters, a background, a heads-up display, and a plurality of menus. 9. A computer system for improving accessibility to a plurality of live-streamed media content, comprising: one or more processors, one or more computer-readable memories, one or more computer-readable tangible storage devices, and program instructions stored on at least one of the one or more storage devices for execution by at least one of the one or more processors via at least one of the one or more memories, wherein the computer system is capable of performing a method comprising: generating a plurality of live-streamed source media data corresponding to a plurality of user interactions with a video game program; creating a plurality of media streams from the generated plurality of live-streamed source media data, wherein a first media stream within the created plurality of media streams is a colorblind accessible stream, and wherein a second media stream within the plurality of created media streams is a non-colorblind accessible stream, and wherein the colorblind accessible stream substitutes at least one color depicted in the non-colorblind media stream with a more distinguishable color to a person with a colorblindness or a texture, and wherein the texture is selected from a group consisting of cross-hatching and dithering; and transmitting the created plurality of media streams to a receiving user. 10. The computer system of claim 9, further comprising: enabling at least one of the transmitted plurality of media streams to be selected by the receiving user. 11. The computer system of claim 10, further comprising: displaying the at least one selected media stream to the receiving user. 12. The computer system of claim 9, wherein the received media source comprises at least one of a video game engine, a teleconferencing program, and a television broadcast. 13. The computer system of claim 9, further comprising: performing post-processing on the created plurality of media streams. 14. The computer system of claim 13, wherein performing post-processing comprises at least one of adding a graphical overlay, a textual overlay, a watermark, and an audiovisual recording of a sending user associated with the media source. 15. The computer system of claim 9, wherein the plurality of media streams comprises at least one of a color blind accessible media stream, a non-color blind accessible media stream, a media stream having one or more on-screen elements in a first language, a media stream having one or more on-screen elements in a second language, and a media stream having one or more qualities selectable from an options menu. 16. A computer program product for improving accessibility to a plurality of live-streamed media content, comprising: one or more computer-readable storage devices and program instructions stored on at least one of the one or more tangible storage devices, the program instructions executable by a processor, the program instructions comprising: program instructions to generate a plurality of live-streamed source media data corresponding to a plurality of user interactions with a video game program; program instructions to create a plurality of media streams from the generated plurality of live-streamed source media data, wherein a first media stream within the created plurality of media streams is a colorblind accessible stream, and wherein a second media stream within the plurality of created media streams is a non-colorblind accessible stream, and wherein the colorblind accessible stream substitutes at least one color depicted in the non-colorblind media stream with a more distinguishable color to a person with a colorblindness or a texture, and wherein the texture is selected from a group consisting of cross-hatching and dithering; and program instructions to transmit the created plurality of media streams to a receiving user. 17. The computer program product of claim 16, further comprising: program instructions to enable at least one of the transmitted plurality of media streams to be selected by the receiving user; and program instructions to display the at least one selected media stream to the receiving user. 18. The computer program product of claim 16, further comprising: program instructions to performing post-processing on the created plurality of media streams. 19. The computer program product of claim 17, wherein performing post-processing comprises at least one of adding a graphical overlay, a textual overlay, a watermark, and an audiovisual recording of a sending user associated with the media source. 20. The computer program product of claim 16, wherein the plurality of media streams comprises at least one of a color blind accessible media stream, a non-color blind accessible media stream, a media stream having one or more on-screen elements in a first language, a media stream having one or more on-screen elements in a second language, and a media stream having one or more qualities selectable from an options menu.
2,400
7,273
7,273
13,928,464
2,491
A user device generates a key for encrypting and decrypting data of an application suite, uses a long secret to encrypt the key, and stores the key locally only as encrypted. The key is stored, along with a user-provided short secret, in a non-volatile memory of a server. Preferably, the key is generated only if an indication is received from the server that the long secret is identical to a reference long secret. The user obtains the key either by presenting the short secret to the server or by presenting the long secret to the user device to enable the user device to decrypt the encrypted key.
1. A method of providing secure use of an application suite on a user device, comprising the steps of: at the user device: (a) generating an original version of a key; (b) encrypting said original version of said key, using a long secret, thereby providing an encrypted version of said key; and (c) storing said key, in any non-volatile memory of the user device, only as said encrypted version thereof. 2. The method of claim 1, further comprising the steps of: prior to said generating: (d) prompting a user of the user device for said long secret; and (e) upon receipt of said long secret: sending said long secret to a server; and wherein said generating is contingent on receiving, from said server, an indication that said long secret is identical to a reference long secret that is stored at said server. 3. The method of claim 2, further comprising the steps of: upon receiving, from said server, said indication that said long secret is identical to said reference long secret: (f) prompting said user for a reference short secret; (g) upon receipt of said reference short secret, sending said reference short secret to said server; and (h) subsequent to said generating, sending said original version of said key to said server. 4. The method of claim 1, further comprising the steps of: (d) subsequent to said storing, obtaining said original version of said key; and (e) using said original version of said key for an operation selected from the group consisting of encrypting data associated with the application suite and decrypting data associated with the application suite. 5. The method of claim 4, wherein said obtaining is effected by steps including: (i) establishing a communication channel with a server whereat said original version of said key is stored. 6. The method of claim 5, wherein said obtaining is effected by steps further including: (ii) prompting a user of the user device for a short secret, and (iii) upon receipt of said short secret, sending said short secret to said server. 7. The method of claim 6, wherein said obtaining is effected by steps further including: (iv) receiving said original version of said key from said server. 8. The method of claim 7, further comprising the step of: (f) if said communication channel becomes inoperative for a predetermined duration: ceasing said using of said original version of said key. 9. The method of claim 7, further comprising the step of: (f) if said communication channel becomes inoperative for less than a predetermined duration: prompting said user for said short secret, continuation of said using of said original version of said key being contingent on receipt of said short secret before said predetermined duration. 10. The method of claim 7, further comprising the step of: (f) if the user fails to interact with any application of the application suite for at least a predetermined duration: prompting said user for said short secret, continuation of said using of said original version of said key being contingent on receipt of said short secret. 11. The method of claim 6, wherein said obtaining is effected by steps further including: upon receiving from said server a refusal to provide said original version of said key: (iv) prompting said user for said long secret, and (v) upon receipt of said long secret, using said long secret to decrypt said encrypted version of said key. 12. The method of claim 5, further comprising the steps of: upon receiving from said server an indication that a reference long secret that is stored at said server has been replaced with a new reference long secret: (f) prompting a user of the user device for a new long secret; (g) upon receipt of said new long secret, sending said new long secret to said server; and (h) only upon receiving from said server an indication that said new long secret is identical to said new reference long secret: (i) encrypting said original version of said key, using said new long secret, thereby providing a new encrypted version of said key, and (ii) storing said key, in any non-volatile memory of the user device, only as said new encrypted version thereof. 13. The method of claim 4, wherein said obtaining is effected by steps including: (i) prompting said user for said long secret, and (ii) upon receipt of said long secret, using said long secret to decrypt said encrypted version of said key. 14. A method of providing secure use of an application suite on a user device, comprising the steps of: at a server: (a) establishing a communication channel with the user device; and (b) if credentials for a user of the user device are stored in a non-volatile memory of said server, said credentials including: (i) a reference short secret, and (ii) a key, then: upon receiving, from the user device, a request, for said key, that includes a short secret: sending said key to the user device only if said short secret is identical to said reference short secret. 15. The method of claim 14, further comprising the step of: (c) if said short secret is different from said reference short secret: sending the user device a notice of refusal to send said key to the user device. 16. The method of claim 14, further comprising the steps of: (c) upon receipt of a predetermined number of said requests that include a short secret that is different from said reference short secret: locking said credentials. 17. The method of claim 14, further comprising the steps of: (c) obtaining said credentials; and (d) storing said credentials in said non-volatile memory of said server. 18. The method of claim 17, further comprising the step of: (d) prior to obtaining said credentials, storing a reference long secret in a memory of said server; and wherein said obtaining is effected by steps including: (i) requesting a long secret from the user device, (ii) upon receipt of said long secret from the user device: only if said long secret is identical to said reference long secret: requesting said credentials from the user device. 19. The method of claim 18, further comprising the step of: (e) upon receipt of a predetermined number of instances of said long secret that are different from said reference long secret: locking said reference long secret. 20. The method of claim 18, further comprising the step of: (e) replacing said reference long secret with a new reference long secret. 21. The method of claim 20, wherein said obtaining and storing are effected in response to said replacing. 22. A user device comprising: (a) at least one non-volatile memory wherein is stored: (i) computer code of an application suite, and (ii) computer code for providing secure use of said application suite by: (A) generating an original version of a key to be used for an operation selected from the group consisting of encrypting data associated with said application suite and decrypting data associated with said application suite, (B) encrypting said original version of said key, using a long secret, thereby providing an encrypted version of said key, and (C) storing said key, in any of said at least one non-volatile memory, only as said encrypted version thereof; and (b) a processor for executing said computer code. 23. A non-transient computer-readable storage medium having computer-readable code embodied on the computer-readable storage medium, the computer-readable code for providing secure use of an application suite by a user device, the computer-readable code comprising program code for: (a) generating an original version of a key to be used for an operation selected from the group consisting of encrypting data associated with the application suite and decrypting data associated with the application suite; (b) encrypting said original version of said key, using a long secret, thereby providing an encrypted version of said key; and (c) storing said key, in any non-volatile memory of the user device, only as said encrypted version thereof. 24. A server comprising: (a) a communication interface for communicating with a user device; (b) a first non-volatile memory for storing credentials of a user of an application suite on said user device, said credentials including: (i) a reference short secret, and (ii) a key; (c) a second non-volatile memory wherein is stored computer code for: upon receiving, from the user device, via said communication interface, a request, for said key, that includes a short secret: sending said key to the user device only if said short secret is identical to said reference short secret; and (d) a processor for executing said computer code. 25. A non-transient computer-readable storage medium having computer-readable code embodied on the computer-readable storage medium, the computer-readable code for assisting a server in providing secure use of an application suite by a user device, the server having a non-volatile memory for storing credentials, of a user of the user device, that include a reference short secret and a key, the computer-readable code comprising program code for: upon receiving, from the user device, a request, for said key, that includes a short secret: sending said key to the user device only if said short secret is identical to said reference short secret.
A user device generates a key for encrypting and decrypting data of an application suite, uses a long secret to encrypt the key, and stores the key locally only as encrypted. The key is stored, along with a user-provided short secret, in a non-volatile memory of a server. Preferably, the key is generated only if an indication is received from the server that the long secret is identical to a reference long secret. The user obtains the key either by presenting the short secret to the server or by presenting the long secret to the user device to enable the user device to decrypt the encrypted key.1. A method of providing secure use of an application suite on a user device, comprising the steps of: at the user device: (a) generating an original version of a key; (b) encrypting said original version of said key, using a long secret, thereby providing an encrypted version of said key; and (c) storing said key, in any non-volatile memory of the user device, only as said encrypted version thereof. 2. The method of claim 1, further comprising the steps of: prior to said generating: (d) prompting a user of the user device for said long secret; and (e) upon receipt of said long secret: sending said long secret to a server; and wherein said generating is contingent on receiving, from said server, an indication that said long secret is identical to a reference long secret that is stored at said server. 3. The method of claim 2, further comprising the steps of: upon receiving, from said server, said indication that said long secret is identical to said reference long secret: (f) prompting said user for a reference short secret; (g) upon receipt of said reference short secret, sending said reference short secret to said server; and (h) subsequent to said generating, sending said original version of said key to said server. 4. The method of claim 1, further comprising the steps of: (d) subsequent to said storing, obtaining said original version of said key; and (e) using said original version of said key for an operation selected from the group consisting of encrypting data associated with the application suite and decrypting data associated with the application suite. 5. The method of claim 4, wherein said obtaining is effected by steps including: (i) establishing a communication channel with a server whereat said original version of said key is stored. 6. The method of claim 5, wherein said obtaining is effected by steps further including: (ii) prompting a user of the user device for a short secret, and (iii) upon receipt of said short secret, sending said short secret to said server. 7. The method of claim 6, wherein said obtaining is effected by steps further including: (iv) receiving said original version of said key from said server. 8. The method of claim 7, further comprising the step of: (f) if said communication channel becomes inoperative for a predetermined duration: ceasing said using of said original version of said key. 9. The method of claim 7, further comprising the step of: (f) if said communication channel becomes inoperative for less than a predetermined duration: prompting said user for said short secret, continuation of said using of said original version of said key being contingent on receipt of said short secret before said predetermined duration. 10. The method of claim 7, further comprising the step of: (f) if the user fails to interact with any application of the application suite for at least a predetermined duration: prompting said user for said short secret, continuation of said using of said original version of said key being contingent on receipt of said short secret. 11. The method of claim 6, wherein said obtaining is effected by steps further including: upon receiving from said server a refusal to provide said original version of said key: (iv) prompting said user for said long secret, and (v) upon receipt of said long secret, using said long secret to decrypt said encrypted version of said key. 12. The method of claim 5, further comprising the steps of: upon receiving from said server an indication that a reference long secret that is stored at said server has been replaced with a new reference long secret: (f) prompting a user of the user device for a new long secret; (g) upon receipt of said new long secret, sending said new long secret to said server; and (h) only upon receiving from said server an indication that said new long secret is identical to said new reference long secret: (i) encrypting said original version of said key, using said new long secret, thereby providing a new encrypted version of said key, and (ii) storing said key, in any non-volatile memory of the user device, only as said new encrypted version thereof. 13. The method of claim 4, wherein said obtaining is effected by steps including: (i) prompting said user for said long secret, and (ii) upon receipt of said long secret, using said long secret to decrypt said encrypted version of said key. 14. A method of providing secure use of an application suite on a user device, comprising the steps of: at a server: (a) establishing a communication channel with the user device; and (b) if credentials for a user of the user device are stored in a non-volatile memory of said server, said credentials including: (i) a reference short secret, and (ii) a key, then: upon receiving, from the user device, a request, for said key, that includes a short secret: sending said key to the user device only if said short secret is identical to said reference short secret. 15. The method of claim 14, further comprising the step of: (c) if said short secret is different from said reference short secret: sending the user device a notice of refusal to send said key to the user device. 16. The method of claim 14, further comprising the steps of: (c) upon receipt of a predetermined number of said requests that include a short secret that is different from said reference short secret: locking said credentials. 17. The method of claim 14, further comprising the steps of: (c) obtaining said credentials; and (d) storing said credentials in said non-volatile memory of said server. 18. The method of claim 17, further comprising the step of: (d) prior to obtaining said credentials, storing a reference long secret in a memory of said server; and wherein said obtaining is effected by steps including: (i) requesting a long secret from the user device, (ii) upon receipt of said long secret from the user device: only if said long secret is identical to said reference long secret: requesting said credentials from the user device. 19. The method of claim 18, further comprising the step of: (e) upon receipt of a predetermined number of instances of said long secret that are different from said reference long secret: locking said reference long secret. 20. The method of claim 18, further comprising the step of: (e) replacing said reference long secret with a new reference long secret. 21. The method of claim 20, wherein said obtaining and storing are effected in response to said replacing. 22. A user device comprising: (a) at least one non-volatile memory wherein is stored: (i) computer code of an application suite, and (ii) computer code for providing secure use of said application suite by: (A) generating an original version of a key to be used for an operation selected from the group consisting of encrypting data associated with said application suite and decrypting data associated with said application suite, (B) encrypting said original version of said key, using a long secret, thereby providing an encrypted version of said key, and (C) storing said key, in any of said at least one non-volatile memory, only as said encrypted version thereof; and (b) a processor for executing said computer code. 23. A non-transient computer-readable storage medium having computer-readable code embodied on the computer-readable storage medium, the computer-readable code for providing secure use of an application suite by a user device, the computer-readable code comprising program code for: (a) generating an original version of a key to be used for an operation selected from the group consisting of encrypting data associated with the application suite and decrypting data associated with the application suite; (b) encrypting said original version of said key, using a long secret, thereby providing an encrypted version of said key; and (c) storing said key, in any non-volatile memory of the user device, only as said encrypted version thereof. 24. A server comprising: (a) a communication interface for communicating with a user device; (b) a first non-volatile memory for storing credentials of a user of an application suite on said user device, said credentials including: (i) a reference short secret, and (ii) a key; (c) a second non-volatile memory wherein is stored computer code for: upon receiving, from the user device, via said communication interface, a request, for said key, that includes a short secret: sending said key to the user device only if said short secret is identical to said reference short secret; and (d) a processor for executing said computer code. 25. A non-transient computer-readable storage medium having computer-readable code embodied on the computer-readable storage medium, the computer-readable code for assisting a server in providing secure use of an application suite by a user device, the server having a non-volatile memory for storing credentials, of a user of the user device, that include a reference short secret and a key, the computer-readable code comprising program code for: upon receiving, from the user device, a request, for said key, that includes a short secret: sending said key to the user device only if said short secret is identical to said reference short secret.
2,400
7,274
7,274
13,766,781
2,451
An electronic message may be reconfigured to effect an enhanced notification using an input interface to receive at least one electronic message created by or on behalf of a message source for delivery to an intended recipient. A matching engine determines whether the electronic message corresponds to a predetermined definition of an enhanced notification. An enhancement engine reconfigures the electronic message to the enhanced notification if stored information related to the intended recipient indicates that the intended recipient is subscribed to receive the enhanced notification. Reconfiguring the electronic message may include reconfiguring the message to provide special handling, routing or presentation.
1.-49. (canceled) 50. A method comprising: identifying, using one or more processors, content of a first notification intended for a recipient; identifying, using the one or more processors, content of a second notification intended for the recipient; and prioritizing the display of the first notification over the display of the second notification based on the content of the first notification and the content of the second notification. 51. The method as recited in claim 50, wherein the content of the first notification indicates a delivery urgency. 52. The method as recited in claim 51, wherein the content of the second notification indicates no delivery urgency. 53. The method as recited in claim 50, wherein: the content of the first notification has a first period of relevancy; and the content of the second notification has a second period of relevancy that is longer than the first period of relevancy. 54. The method as recited in claim 50, wherein the content of the first notification relates to weather. 55. The method as recited in claim 50, wherein prioritizing the display of the first notification over the display of the second notification comprises displaying the first notification prior to the second notification. 56. The method as recited in claim 50, wherein the first notification comprises an icon. 57. The method as recited in claim 50, wherein the first notification comprises one or more of an icon, a text message, an email, a pop-up notification, a tactile alarm, a flashing indicator, or an audible alert. 58. The method as recited in claim 56, further comprising concurrently displaying the first notification in two different notification delivery formats. 59. The method as recited in claim 57, wherein the two different notification delivery formats comprise an icon and a pop-up notification. 60. The method as recited in claim 50, further comprising: receiving the first notification at a mobile device; and presenting the first notification on the mobile device. 61. The method as recited in claim 60, wherein the mobile device comprises a mobile phone. 62. A non-transitory computer-readable storage medium including a set of instructions that, when executed, cause at least one processor to perform steps comprising: identifying content of a first notification intended for a recipient; identifying content of a second notification intended for the recipient; and prioritizing the display of the first notification over the display of the second notification based on the content of the first notification and the content of the second notification. 63. The computer-readable storage medium as recited in claim 62, wherein: the content of the first notification indicates a delivery urgency; and the content of the second notification indicates no delivery urgency. 64. The computer-readable storage medium as recited in claim 62, wherein: the content of the first notification has a first period of relevancy; and the content of the second notification has a second period of relevancy that is longer than the first period of relevancy. 65. The computer-readable storage medium as recited in claim 64, wherein the content of the second notification relate to weather. 66. The computer-readable storage medium as recited in claim 65, wherein prioritizing the display of the first notification over the display of the second notification comprises displaying the first notification prior to the second notification. 67. The computer-readable storage medium as recited in claim 62, wherein the first notification comprises one or more of an icon, a text message, a tactile alarm, an email, a pop-up notification, a flashing indicator, or an audible alert. 68. The computer-readable storage medium as recited in claim 67, further comprising instructions that, when executed, cause the at least one processor to concurrently display the first notification in two different notification delivery formats. 69. The computer-readable storage medium as recited in claim 68, wherein the first notification is received at a mobile device. 70. The computer-readable storage medium as recited in claim 69, wherein the mobile device comprises a mobile phone. 71. A method comprising: identifying, using one or more processors, a type of a first notification intended for a recipient; identifying, using the one or more processors, a type of a second notification intended for the recipient; and prioritizing the display of the first notification over the display of the second notification based on the type of the first notification and the type of the second notification. 72. The method as recited in claim 71, further comprising: assessing one or more user preferences that indicate that a first type of notification is to be prioritized; and determining that the first notification is of the first type. 73. The method as recited in claim 71, wherein the type of the first notification is based on a source of the first notification and the type of the second notification is based on a source of the second notification. 74. The method as recited in claim 71, wherein prioritizing the display of the first notification over the display of the second notification comprises displaying the first notification prior to the second notification. 75. The method as recited in claim 71, wherein the first notification comprises an icon. 76. The method as recited in claim 71, wherein the first notification comprises one or more of an icon, a text message, an email, a pop-up notification, a flashing indicator, or an audible alert. 77. The method as recited in claim 71, further comprising receiving the first notification at a mobile device; and wherein an operating system of the mobile device functions as a delivery mechanism for the first and second notifications. 78. The method as recited in claim 77, wherein the mobile device comprises a mobile phone. 79. The method as recited in claim 77, wherein a source of the first notification is associated with a client application on the mobile device. 80. The method as recited in claim 79, wherein the client application comprises one of a task application, a calendar application, and a weather application. 81. A method comprising: analyzing, using one or more processors, a first electronic message; analyzing, using the one or more processors, a second electronic message; and delivering the first electronic message to an intended recipient prior to delivering the second electronic message to the intended recipient based at least in part upon the analyses of the first and second electronic messages. 82. The method as recited in claim 81, wherein: analyzing the first electronic message comprises determining a first period of relevancy of the first electronic message; analyzing the second electronic message comprises determining a second period of relevancy of the second electronic message; and the first period of relevancy ends before the second period of relevancy. 83. The method as recited in claim 82, wherein the first period of relevancy is shorter than the second period of relevancy. 84. The method as recited in claim 81, wherein delivering the first electronic message comprises determining sending the first electronic message to a mobile device associated with the intended recipient. 85. The method as recited in claim 84, further comprising configuring the first electronic message as a notification. 86. The method as recited in claim 85, further comprising providing additional information regarding the first electronic message upon recipient interaction with the notification. 87. The method as recited in claim 86, wherein providing additional information comprises providing access to the electronic message. 88. The method as recited in claim 85, wherein the notification comprises one of an icon, a text message, a pop-up notification, a flashing indicator, a tactile alarm, or an audible alert. 89. The method as recited in claim 84, further comprising receiving the first notification from a source associated with a client application on the mobile device. 90. The method as recited in claim 89, wherein the mobile device comprises a mobile phone. 91. A system comprising: an input interface configured to receive a first electronic message and a second electronic message both intended for a recipient; and at least one processor configured to: analyze the first electronic message; analyze the second electronic message; and prioritize delivery of the first electronic message over the second electronic message to the intended recipient based at least in part upon the analyses of the first and second electronic messages. 92. The system as recited in claim 91, wherein the at least one processor is further configured to: determine a period of relevancy of the first electronic message; determine a period of relevancy of the second electronic message ends after the period of relevancy of the first electronic message. 93. The system as recited in claim 92, wherein the at least one processor is further configured to: send the first electronic message via a first delivery mechanism; and send the second electronic message via a second delivery mechanism. 94. The system as recited in claim 92, wherein the at least one processor is further configured to prioritize delivery of the first electronic message by sending a notification related to the first electronic message to a mobile device associated with the intended recipient. 95. The system as recited in claim 94, wherein the at least one processor is further configured to provide access to the first electronic message upon user interaction with the notification. 96. The system as recited in claim 95, wherein the notification comprises one of an icon, a text message, a pop-up notification, a flashing indicator, a tactile alarm, or an audible alert.
An electronic message may be reconfigured to effect an enhanced notification using an input interface to receive at least one electronic message created by or on behalf of a message source for delivery to an intended recipient. A matching engine determines whether the electronic message corresponds to a predetermined definition of an enhanced notification. An enhancement engine reconfigures the electronic message to the enhanced notification if stored information related to the intended recipient indicates that the intended recipient is subscribed to receive the enhanced notification. Reconfiguring the electronic message may include reconfiguring the message to provide special handling, routing or presentation.1.-49. (canceled) 50. A method comprising: identifying, using one or more processors, content of a first notification intended for a recipient; identifying, using the one or more processors, content of a second notification intended for the recipient; and prioritizing the display of the first notification over the display of the second notification based on the content of the first notification and the content of the second notification. 51. The method as recited in claim 50, wherein the content of the first notification indicates a delivery urgency. 52. The method as recited in claim 51, wherein the content of the second notification indicates no delivery urgency. 53. The method as recited in claim 50, wherein: the content of the first notification has a first period of relevancy; and the content of the second notification has a second period of relevancy that is longer than the first period of relevancy. 54. The method as recited in claim 50, wherein the content of the first notification relates to weather. 55. The method as recited in claim 50, wherein prioritizing the display of the first notification over the display of the second notification comprises displaying the first notification prior to the second notification. 56. The method as recited in claim 50, wherein the first notification comprises an icon. 57. The method as recited in claim 50, wherein the first notification comprises one or more of an icon, a text message, an email, a pop-up notification, a tactile alarm, a flashing indicator, or an audible alert. 58. The method as recited in claim 56, further comprising concurrently displaying the first notification in two different notification delivery formats. 59. The method as recited in claim 57, wherein the two different notification delivery formats comprise an icon and a pop-up notification. 60. The method as recited in claim 50, further comprising: receiving the first notification at a mobile device; and presenting the first notification on the mobile device. 61. The method as recited in claim 60, wherein the mobile device comprises a mobile phone. 62. A non-transitory computer-readable storage medium including a set of instructions that, when executed, cause at least one processor to perform steps comprising: identifying content of a first notification intended for a recipient; identifying content of a second notification intended for the recipient; and prioritizing the display of the first notification over the display of the second notification based on the content of the first notification and the content of the second notification. 63. The computer-readable storage medium as recited in claim 62, wherein: the content of the first notification indicates a delivery urgency; and the content of the second notification indicates no delivery urgency. 64. The computer-readable storage medium as recited in claim 62, wherein: the content of the first notification has a first period of relevancy; and the content of the second notification has a second period of relevancy that is longer than the first period of relevancy. 65. The computer-readable storage medium as recited in claim 64, wherein the content of the second notification relate to weather. 66. The computer-readable storage medium as recited in claim 65, wherein prioritizing the display of the first notification over the display of the second notification comprises displaying the first notification prior to the second notification. 67. The computer-readable storage medium as recited in claim 62, wherein the first notification comprises one or more of an icon, a text message, a tactile alarm, an email, a pop-up notification, a flashing indicator, or an audible alert. 68. The computer-readable storage medium as recited in claim 67, further comprising instructions that, when executed, cause the at least one processor to concurrently display the first notification in two different notification delivery formats. 69. The computer-readable storage medium as recited in claim 68, wherein the first notification is received at a mobile device. 70. The computer-readable storage medium as recited in claim 69, wherein the mobile device comprises a mobile phone. 71. A method comprising: identifying, using one or more processors, a type of a first notification intended for a recipient; identifying, using the one or more processors, a type of a second notification intended for the recipient; and prioritizing the display of the first notification over the display of the second notification based on the type of the first notification and the type of the second notification. 72. The method as recited in claim 71, further comprising: assessing one or more user preferences that indicate that a first type of notification is to be prioritized; and determining that the first notification is of the first type. 73. The method as recited in claim 71, wherein the type of the first notification is based on a source of the first notification and the type of the second notification is based on a source of the second notification. 74. The method as recited in claim 71, wherein prioritizing the display of the first notification over the display of the second notification comprises displaying the first notification prior to the second notification. 75. The method as recited in claim 71, wherein the first notification comprises an icon. 76. The method as recited in claim 71, wherein the first notification comprises one or more of an icon, a text message, an email, a pop-up notification, a flashing indicator, or an audible alert. 77. The method as recited in claim 71, further comprising receiving the first notification at a mobile device; and wherein an operating system of the mobile device functions as a delivery mechanism for the first and second notifications. 78. The method as recited in claim 77, wherein the mobile device comprises a mobile phone. 79. The method as recited in claim 77, wherein a source of the first notification is associated with a client application on the mobile device. 80. The method as recited in claim 79, wherein the client application comprises one of a task application, a calendar application, and a weather application. 81. A method comprising: analyzing, using one or more processors, a first electronic message; analyzing, using the one or more processors, a second electronic message; and delivering the first electronic message to an intended recipient prior to delivering the second electronic message to the intended recipient based at least in part upon the analyses of the first and second electronic messages. 82. The method as recited in claim 81, wherein: analyzing the first electronic message comprises determining a first period of relevancy of the first electronic message; analyzing the second electronic message comprises determining a second period of relevancy of the second electronic message; and the first period of relevancy ends before the second period of relevancy. 83. The method as recited in claim 82, wherein the first period of relevancy is shorter than the second period of relevancy. 84. The method as recited in claim 81, wherein delivering the first electronic message comprises determining sending the first electronic message to a mobile device associated with the intended recipient. 85. The method as recited in claim 84, further comprising configuring the first electronic message as a notification. 86. The method as recited in claim 85, further comprising providing additional information regarding the first electronic message upon recipient interaction with the notification. 87. The method as recited in claim 86, wherein providing additional information comprises providing access to the electronic message. 88. The method as recited in claim 85, wherein the notification comprises one of an icon, a text message, a pop-up notification, a flashing indicator, a tactile alarm, or an audible alert. 89. The method as recited in claim 84, further comprising receiving the first notification from a source associated with a client application on the mobile device. 90. The method as recited in claim 89, wherein the mobile device comprises a mobile phone. 91. A system comprising: an input interface configured to receive a first electronic message and a second electronic message both intended for a recipient; and at least one processor configured to: analyze the first electronic message; analyze the second electronic message; and prioritize delivery of the first electronic message over the second electronic message to the intended recipient based at least in part upon the analyses of the first and second electronic messages. 92. The system as recited in claim 91, wherein the at least one processor is further configured to: determine a period of relevancy of the first electronic message; determine a period of relevancy of the second electronic message ends after the period of relevancy of the first electronic message. 93. The system as recited in claim 92, wherein the at least one processor is further configured to: send the first electronic message via a first delivery mechanism; and send the second electronic message via a second delivery mechanism. 94. The system as recited in claim 92, wherein the at least one processor is further configured to prioritize delivery of the first electronic message by sending a notification related to the first electronic message to a mobile device associated with the intended recipient. 95. The system as recited in claim 94, wherein the at least one processor is further configured to provide access to the first electronic message upon user interaction with the notification. 96. The system as recited in claim 95, wherein the notification comprises one of an icon, a text message, a pop-up notification, a flashing indicator, a tactile alarm, or an audible alert.
2,400
7,275
7,275
14,405,592
2,471
The invention relates to a device for the transmission and/or reception of signals in an MIMO system consisting of: a MIMO module consisting of N inputs/outputs to deliver or receive N signals, where N≧2, an antenna system for transmitting or receiving said N signals, said system consisting of at least one antenna with M angular sectors in a horizontal plane, said M angular sectors sensitively not covering each other and together forming a global angular sector of 360°, and switching means, mounted between the MIMO module and the antenna system, to connect P angular sectors of said multi-sector antenna, where 1≦P<M, with each of the N inputs/outputs of the MIMO module according to a switching diagram determined using control means in accordance with a criterion representing the quality of the reception of signals by said device or another device.
1. Device for the transmission and/or reception of signals in a MIMO system comprising: a MIMO module comprising N inputs/outputs to deliver or receive N signals, N being greater than or equal to 2; an antenna system to transmit or receive said N signals, wherein the antenna system comprises at least one multi-sector antenna, with M angular sectors in a horizontal plane capable of selectively receiving and/or transmitting said N signals in one or more of said M angular sectors where M>N, and in that the device further comprises a switching device, mounted between the MIMO module and the antenna system, to connect P angular sectors of the at least one multi-sector antenna, with 1≦P<M, with each of the N inputs/outputs of the MIMO module according to a switching diagram determined using a controller in accordance with a criteria representing the quality of the reception of signals by said device or another device. 2. Device according to claim 1, wherein the antenna system comprises N multi-sector antennas with M angular sectors and the switching of device comprises N switching circuits, each input/output of the MIMO module being connected to one of said N multi-sector antennas via one of said N switching circuits. 3. Device according to claim 2, wherein each of said N multi-sector antennas includes Q inputs/outputs, Q being less than or equal to 2M−1, each of said Q inputs/outputs being connected to a specific combination of angular sectors of the multi-sector antenna. 4. Device according to claim 2, wherein, for each multi-sector antenna, up to D angular sectors are connected via a switching circuit to a MIMO module input/output, where D<M. 5. Device according to claim 4, in which each of said N multi-sector antennas includes Q inputs/outputs, Q being equal to ∑ A = 1 D  M ! A !  ( M - A ) ! , each of said Q inputs/outputs being connected to a specific combination of angular sectors of the multi-sector antenna. 6. Device according to claim 4 wherein M is at least equal to 4 and D is at least equal to 3. 7. Device according to claim 1, wherein the antenna system comprises a multi-sector antenna with M angular sectors, where M>N, and the switching device comprises a switching circuit, said multi-sector antenna comprising M inputs/outputs, each input/output being connected to an angular sector of said antenna, said switching circuit being configured to selectively connect N antenna inputs/outputs to N inputs/outputs of the MIMO module. 8. Device according to claim 1, wherein M is equal to 6, each angular sector presenting an opening of around 60° in the horizontal plane. 9. Device according to claim 1, wherein the M angular sectors of the at least one multi-sector antenna present identical openings in a vertical plane. 10. Device according to claim 9, wherein the M angular sectors each present an opening of up to 120° between −60° and +60° in the vertical plane, preferably an opening of 60° inclusive between the angles −30° and +30° in the vertical plane.
The invention relates to a device for the transmission and/or reception of signals in an MIMO system consisting of: a MIMO module consisting of N inputs/outputs to deliver or receive N signals, where N≧2, an antenna system for transmitting or receiving said N signals, said system consisting of at least one antenna with M angular sectors in a horizontal plane, said M angular sectors sensitively not covering each other and together forming a global angular sector of 360°, and switching means, mounted between the MIMO module and the antenna system, to connect P angular sectors of said multi-sector antenna, where 1≦P<M, with each of the N inputs/outputs of the MIMO module according to a switching diagram determined using control means in accordance with a criterion representing the quality of the reception of signals by said device or another device.1. Device for the transmission and/or reception of signals in a MIMO system comprising: a MIMO module comprising N inputs/outputs to deliver or receive N signals, N being greater than or equal to 2; an antenna system to transmit or receive said N signals, wherein the antenna system comprises at least one multi-sector antenna, with M angular sectors in a horizontal plane capable of selectively receiving and/or transmitting said N signals in one or more of said M angular sectors where M>N, and in that the device further comprises a switching device, mounted between the MIMO module and the antenna system, to connect P angular sectors of the at least one multi-sector antenna, with 1≦P<M, with each of the N inputs/outputs of the MIMO module according to a switching diagram determined using a controller in accordance with a criteria representing the quality of the reception of signals by said device or another device. 2. Device according to claim 1, wherein the antenna system comprises N multi-sector antennas with M angular sectors and the switching of device comprises N switching circuits, each input/output of the MIMO module being connected to one of said N multi-sector antennas via one of said N switching circuits. 3. Device according to claim 2, wherein each of said N multi-sector antennas includes Q inputs/outputs, Q being less than or equal to 2M−1, each of said Q inputs/outputs being connected to a specific combination of angular sectors of the multi-sector antenna. 4. Device according to claim 2, wherein, for each multi-sector antenna, up to D angular sectors are connected via a switching circuit to a MIMO module input/output, where D<M. 5. Device according to claim 4, in which each of said N multi-sector antennas includes Q inputs/outputs, Q being equal to ∑ A = 1 D  M ! A !  ( M - A ) ! , each of said Q inputs/outputs being connected to a specific combination of angular sectors of the multi-sector antenna. 6. Device according to claim 4 wherein M is at least equal to 4 and D is at least equal to 3. 7. Device according to claim 1, wherein the antenna system comprises a multi-sector antenna with M angular sectors, where M>N, and the switching device comprises a switching circuit, said multi-sector antenna comprising M inputs/outputs, each input/output being connected to an angular sector of said antenna, said switching circuit being configured to selectively connect N antenna inputs/outputs to N inputs/outputs of the MIMO module. 8. Device according to claim 1, wherein M is equal to 6, each angular sector presenting an opening of around 60° in the horizontal plane. 9. Device according to claim 1, wherein the M angular sectors of the at least one multi-sector antenna present identical openings in a vertical plane. 10. Device according to claim 9, wherein the M angular sectors each present an opening of up to 120° between −60° and +60° in the vertical plane, preferably an opening of 60° inclusive between the angles −30° and +30° in the vertical plane.
2,400
7,276
7,276
15,087,867
2,495
Users of a social networking system initiate conversations between other users and additional users who may not be registered to use the social networking system. Each additional user is identified by an item of contact information, and conversation messages are sent to an additional user using the contact information. The conversations are associated with the item of contact information and saved in the social networking system. A user of the social networking system may subsequently claim the item of contact information. The claiming user is given access to the associated conversations if the social networking system can verify that the item of contact information belongs to the claiming user.
1. A method comprising: receiving, by an online system, a request to establish a conversation within the online system from an initiating user, the conversation including an initial message to a registered user of the online system and an additional user identified by an item of contact information not associated with any user of the online system, the item of contact information being associated with communication external to the online system; generating a conversation object by sending the initial message to the registered user within the online system and to the additional user via the item of contact information external to the online system, the conversation object including the initial message and the item of contact information for the additional user; receiving, subsequent to the conversation, a request from a claiming user of the online system claiming the item of contact information as belonging to a user profile of the claiming user; and generating an edge object between the conversation object and the user profile of the claiming user. 2. The method of claim 1, further comprising: receiving, at the online system, a reply to the initial message from the item of contact information, the reply sent by the additional user via the item of contact information associated with communication external to the online system; and adding the reply to the conversation object. 3. The method of claim 1, wherein receiving the request from the claiming user comprises: receiving a request from the claiming user to create a new user profile, the request identifying the item of contact information for the new user profile. 4. The method of claim 1, wherein receiving the request from the claiming user comprises: receiving a request from the claiming user to associate the item of contact information with an existing profile for a user of the online system. 5. The method of claim 1, wherein the item of contact information is associated with communication external to the online system. 6. The method of claim 1, further comprising: generating a record for the additional user including the item of contact information and an association with the conversation object. 7. The method of claim 6, further comprising: responsive to generating the record of the additional user, analyzing the record of the additional user to generate a prediction indicating that the item of contact information belongs to a predicted user of the online system; and sending a request to the predicted user to confirm whether the item of contact information belongs to the predicted user. 8. The method of claim 7, wherein receiving a claim by a claiming user comprises: receiving confirmation from the predicted user that the item of contact information belongs to the predicted user. 9. The method of claim 1, wherein generating the edge object between the conversation object and the user profile of the claiming user comprises making the conversation viewable to the claiming user. 10. A computer program product comprising a non-transitory computer-readable storage medium containing computer program code that, when executed by a processor, causes the processor to: store a user profile for each of a plurality of users of an online system; receive a request to establish a conversation within the online system from an initiating user, the conversation including an initial message to a registered user of the online system and an additional user identified by an item of contact information not associated with any user of the online system, the item of contact information being associated with communication external to the online system; generate a conversation object including sending the initial message to the registered user within the online system and to the additional user via the item of contact information external to the online system, the conversation object including the initial message and the item of contact information for the additional user; receive, subsequent to the conversation, a request from a claiming user of the online system claiming the item of contact information as belonging to a user profile of the claiming user; verify that the item of contact information belongs to the claiming user; and store an association between the conversation identified by the item of contact information claimed by the claiming user and the user profile of the claiming user. 11. The computer program product of claim 10, wherein storing the association between the conversation identified by the item of contact information claimed by the claiming user and the user profile of the claiming user includes generating an edge object between the conversation object and the user profile of the claiming user. 12. The computer program product of claim 10, wherein the computer program code that, when executed by the processor, further causes the processor to: create a record for the additional user including the item of contact information and an association with the conversation object; analyze the record of the additional user to generate a prediction indicating that the item of contact information belongs to a predicted user of the online system; and send a request to the predicted user to confirm whether the item of contact information belongs to the predicted user. 13. The computer program product of claim 10, wherein receiving the request from the claiming user claiming the item of contact information belongs to the user profile of the claiming user further comprises: receiving a request from the claiming user to create a new user profile, the request identifying the item of contact information for the new user profile. 14. The computer program product of claim 10, wherein the item of contact information is associated with communication external to the online system. 15. The computer program product of claim 14, wherein the item of contact information is an email address. 16. The method of claim 14, wherein the item of contact information is a phone number. 17. A method comprising: receiving a request to establish a conversation between one or more users of the online system and an additional user identified by an item of contact information; determining that the item of contact information is not stored as contact information for any user profile of a plurality of users of the online system; establishing the conversation between the one or more users of the online system and the additional user identified in the request by: sending, via the online system, a message to the one or more users; and sending, via the item of contact information, the message to the additional user; generating a conversation object from a record of the conversation; receiving a claim by the additional user, the claim identifying the item of contact information as belonging to a user profile of one of the plurality of users of the online system; and generating an edge object between the conversation object and the user profile of the claiming user. 18. The method of claim 17, further comprising: receiving, at the online system, a reply to the message from the item of contact information, the reply sent by the additional user via the item of contact information; and adding the reply to the established conversation for viewing by the one or more users of the online system. 19. The method of claim 17, wherein receiving a claim by the additional user comprises: receiving a request from the additional user to create a new user profile with the online system, the request identifying the item of contact information for the new user profile. 20. The method of claim 17, further comprising: responsive to receiving the claim from the additional user of the online system, verifying that the item of contact information belongs to the additional user.
Users of a social networking system initiate conversations between other users and additional users who may not be registered to use the social networking system. Each additional user is identified by an item of contact information, and conversation messages are sent to an additional user using the contact information. The conversations are associated with the item of contact information and saved in the social networking system. A user of the social networking system may subsequently claim the item of contact information. The claiming user is given access to the associated conversations if the social networking system can verify that the item of contact information belongs to the claiming user.1. A method comprising: receiving, by an online system, a request to establish a conversation within the online system from an initiating user, the conversation including an initial message to a registered user of the online system and an additional user identified by an item of contact information not associated with any user of the online system, the item of contact information being associated with communication external to the online system; generating a conversation object by sending the initial message to the registered user within the online system and to the additional user via the item of contact information external to the online system, the conversation object including the initial message and the item of contact information for the additional user; receiving, subsequent to the conversation, a request from a claiming user of the online system claiming the item of contact information as belonging to a user profile of the claiming user; and generating an edge object between the conversation object and the user profile of the claiming user. 2. The method of claim 1, further comprising: receiving, at the online system, a reply to the initial message from the item of contact information, the reply sent by the additional user via the item of contact information associated with communication external to the online system; and adding the reply to the conversation object. 3. The method of claim 1, wherein receiving the request from the claiming user comprises: receiving a request from the claiming user to create a new user profile, the request identifying the item of contact information for the new user profile. 4. The method of claim 1, wherein receiving the request from the claiming user comprises: receiving a request from the claiming user to associate the item of contact information with an existing profile for a user of the online system. 5. The method of claim 1, wherein the item of contact information is associated with communication external to the online system. 6. The method of claim 1, further comprising: generating a record for the additional user including the item of contact information and an association with the conversation object. 7. The method of claim 6, further comprising: responsive to generating the record of the additional user, analyzing the record of the additional user to generate a prediction indicating that the item of contact information belongs to a predicted user of the online system; and sending a request to the predicted user to confirm whether the item of contact information belongs to the predicted user. 8. The method of claim 7, wherein receiving a claim by a claiming user comprises: receiving confirmation from the predicted user that the item of contact information belongs to the predicted user. 9. The method of claim 1, wherein generating the edge object between the conversation object and the user profile of the claiming user comprises making the conversation viewable to the claiming user. 10. A computer program product comprising a non-transitory computer-readable storage medium containing computer program code that, when executed by a processor, causes the processor to: store a user profile for each of a plurality of users of an online system; receive a request to establish a conversation within the online system from an initiating user, the conversation including an initial message to a registered user of the online system and an additional user identified by an item of contact information not associated with any user of the online system, the item of contact information being associated with communication external to the online system; generate a conversation object including sending the initial message to the registered user within the online system and to the additional user via the item of contact information external to the online system, the conversation object including the initial message and the item of contact information for the additional user; receive, subsequent to the conversation, a request from a claiming user of the online system claiming the item of contact information as belonging to a user profile of the claiming user; verify that the item of contact information belongs to the claiming user; and store an association between the conversation identified by the item of contact information claimed by the claiming user and the user profile of the claiming user. 11. The computer program product of claim 10, wherein storing the association between the conversation identified by the item of contact information claimed by the claiming user and the user profile of the claiming user includes generating an edge object between the conversation object and the user profile of the claiming user. 12. The computer program product of claim 10, wherein the computer program code that, when executed by the processor, further causes the processor to: create a record for the additional user including the item of contact information and an association with the conversation object; analyze the record of the additional user to generate a prediction indicating that the item of contact information belongs to a predicted user of the online system; and send a request to the predicted user to confirm whether the item of contact information belongs to the predicted user. 13. The computer program product of claim 10, wherein receiving the request from the claiming user claiming the item of contact information belongs to the user profile of the claiming user further comprises: receiving a request from the claiming user to create a new user profile, the request identifying the item of contact information for the new user profile. 14. The computer program product of claim 10, wherein the item of contact information is associated with communication external to the online system. 15. The computer program product of claim 14, wherein the item of contact information is an email address. 16. The method of claim 14, wherein the item of contact information is a phone number. 17. A method comprising: receiving a request to establish a conversation between one or more users of the online system and an additional user identified by an item of contact information; determining that the item of contact information is not stored as contact information for any user profile of a plurality of users of the online system; establishing the conversation between the one or more users of the online system and the additional user identified in the request by: sending, via the online system, a message to the one or more users; and sending, via the item of contact information, the message to the additional user; generating a conversation object from a record of the conversation; receiving a claim by the additional user, the claim identifying the item of contact information as belonging to a user profile of one of the plurality of users of the online system; and generating an edge object between the conversation object and the user profile of the claiming user. 18. The method of claim 17, further comprising: receiving, at the online system, a reply to the message from the item of contact information, the reply sent by the additional user via the item of contact information; and adding the reply to the established conversation for viewing by the one or more users of the online system. 19. The method of claim 17, wherein receiving a claim by the additional user comprises: receiving a request from the additional user to create a new user profile with the online system, the request identifying the item of contact information for the new user profile. 20. The method of claim 17, further comprising: responsive to receiving the claim from the additional user of the online system, verifying that the item of contact information belongs to the additional user.
2,400
7,277
7,277
14,855,537
2,491
Systems and methods for generating and validating certified electronic credentials are disclosed. A certified electronic credential may comprise a computer-readable file representative of a credential bestowed upon a recipient, in which the file is protected with one or more document integrity and document usage security feature. A publisher may receive a certified electronic credential order from a credentialer and prepare a plurality of certified electronic credentials. The publisher may associate each credential with authentication information and a credential record, and retain a database of associated authentication information and credential records. The publisher may provide validation services, receiving a validation request through a credentialer's validation portal, and provide a response through the credentialer's portal indicative of the validity, additional information about the credential, and even an audit trail. A validating entity may receive credential validation through the credentialer with a heightened degree of confidence in the validation and lack of forgery.
1. An electronically implemented method for validating a certified electronic academic credential, the method comprising: storing, in a validation database, a plurality of certified electronic credential records corresponding to a plurality of certified electronic academic credentials and associated authentication information, each record associated with an authentication information and comprising an academic credential status; receiving a certified electronic credential validation request and proffered authentication information redirected from a credentialer validation portal available from a credentialer; identifying a certified electronic credential record in the validation database associated with the proffered authentication information; generating a validation response based on the identified certified electronic credential record; and transmitting the validation response to the credentialer validation portal. 2. The certified electronic credential validation method of claim 1, further comprising determining whether the proffered authentication information is associated with an invalid credential, and wherein the validation response comprises an unsuccessful response when the credential is invalid. 3. The certified electronic credential validation method of claim 1, further comprising receiving a credential update from a first credentialer, wherein the credential update modifies a certified electronic credential record associated with a credential issued by the first credentialer. 4. The certified electronic credential validation method of claim 1, wherein the validation response includes validating information associated with the identified certified electronic credential record. 5. The certified electronic credential validation method of claim 1, wherein the validating information comprises at least one of a recipient's identity, a confirmation of the credential(s) bestowed upon the recipient, a date associated with a credential, coursework, grade point average, class rank, and security clearance. 6. The certified electronic credential validation method of claim 1, wherein a validating entity submits the certified electronic credential validation request and proffered authentication information through the credentialer validation portal. 7. The certified electronic credential validation method of claim 1, wherein the validation response includes a validation transactional record. 8. The certified electronic credential validation method of claim 7, wherein the validation transactional record comprises at least one of: information relating to the validation response, the date of the validation response, the proffered authentication information, the credential associated with the proffered authentication information, and the identity of the credentialer. 9. The certified electronic credential validation method of claim 1, further comprising generating a record relating to the validation response and the transmittal of the validation response. 10. The certified electronic credential validating method of claim 8, wherein the validation transactional record comprises at least one document integrity security feature, and at least one document usage security feature. 11. The certified electronic credential validation method of claim 1, further comprising: receiving an order for a plurality of certified electronic credentials from an ordering credentialer; producing the plurality of certified electronic credentials; associating an authentication information with each certified electronic credential; and generating a certified electronic credential record for each certified electronic credential. 12. The certified electronic credential validation method of claim 11, wherein the each certified electronic credential record is associated with the authentication information associated with the respective certified electronic credential, and wherein producing the plurality of certified electronic credentials comprises placing at least a first portion of the associated authentication information on a viewable portion of each certified electronic credential. 13. The certified electronic credential validation method of claim 11, wherein each certified electronic credential comprises at least one document integrity security feature and at least one document usage security feature. 14. The certified electronic credential validation method of claim 11, wherein each certified electronic credential includes at least a second portion of the associated authentication information in machine-readable format. 15. The certified electronic credential validation method of claim 11, wherein the authentication information comprises a universal record locating number. 16. The certified electronic credential validation method of claim 1, wherein the authentication information comprises a universal record locating number. 17. The certified electronic credential validation method of claim 11, further comprising delivering the plurality of certified electronic credentials and associated authentication information to at least one of a plurality of recipients and a credentialer. 18. An electronically implemented method for generating and validating certified electronic academic credentials, the method comprising: receiving an order for a plurality of certified electronic credentials from an ordering credentialer; producing the plurality of certified electronic credentials; associating an authentication information with each certified electronic credential; generating a certified electronic credential record for each certified electronic credential; storing the plurality of certified electronic credential records and associated authentication information, each record associated with an authentication information, in a validation database and comprising an academic credential status; receiving a certified electronic credential validation request and proffered authentication information redirected from a credentialer validation portal provided by a credentialer; identifying a certified electronic credential record in the validation database associated with the proffered authentication information; generating a validation response based on the identified certified electronic credential record; and transmitting the validation response to the credentialer validation portal. 19. The certified electronic credential generation and validation method of claim 18, wherein producing a certified electronic credential includes generating a computer-readable file representative of a credential bestowed upon a recipient, the computer-readable file protected with at least one of: at least one document integrity security feature, and at least one document usage security feature. 20. The certified electronic credential generation and validation method of claim 19, wherein the at least one document integrity security feature is selected from the group comprising: an Adobe Digital Signature, a digital certificate, a tamper-evidencing feature, and a data alteration feature. 21. The certified electronic credential generation and validation method of claim 19, wherein the at least one document usage security feature is selected from the group comprising: file password protection, a printing restriction, printing disablement, a file copying restriction, file copying disablement, and image disruptions. 22. An electronic system for generating and validating certified electronic academic credentials, the system comprising: a certified electronic credentials order database having data relating to an order for a plurality of certified electronic academic credentials from an ordering credentialer; a validation database having (1) a plurality of authentication information, each authentication information associated with a certified electronic credential, and (2) a plurality of certified electronic credential records, each certified electronic credential record associated with a certified electronic credential and comprising an academic credential status; a validation request interface configured to receive a certified electronic credential validation request and proffered authentication information redirected from a credentialer validation portal provided by a credentialer; a computer processor configured to identify a certified electronic credential record in the validation database associated with the proffered authentication information, generate a validation response based on the identified certified electronic credential record; and transmit the validation response to the credentialer validation portal. 23. The certified electronic credential generating and validating system of claim 22, wherein a certified electronic credential comprises a computer-readable file representative of a credential bestowed upon a recipient, the computer-readable file protected with at least one of: at least one document integrity security feature, and at least one document usage security feature. 24. The certified electronic credential generating and validating system of claim 23, wherein the at least one document integrity security feature is selected from the group comprising: an Adobe Digital Signature, a digital certificate, a tamper-evidencing feature, and a data alteration feature. 25. The certified electronic credential generating and validating system of claim 23, wherein the at least one document usage security feature is selected from the group comprising: file password protection, a printing restriction, printing disablement, a file copying restriction, file copying disablement, and image disruptions. 26. The certified electronic credential generating and validating system of claim 22, wherein the validation response includes a validation transactional record. 27. The certified electronic credential generating and validating system of claim 26, wherein the validation transactional record comprises at least one of: information relating to the validation response, the date of the validation response, the proffered authentication information, the credential associated with the proffered authentication information, and the identity of the credentialer. 28. The certified electronic credential generating and validating system of claim 27, wherein the validation transactional record comprises at least one document integrity security feature, and at least one document usage security feature. 29. The certified electronic credential validation method of claim 1, wherein the validation response includes an indicium of the academic credential status. 30. The certified electronic credential validation method of claim 1, wherein the academic credential comprises one of a diploma, a license, a certificate indicative of an achievement, a transcript, an award.
Systems and methods for generating and validating certified electronic credentials are disclosed. A certified electronic credential may comprise a computer-readable file representative of a credential bestowed upon a recipient, in which the file is protected with one or more document integrity and document usage security feature. A publisher may receive a certified electronic credential order from a credentialer and prepare a plurality of certified electronic credentials. The publisher may associate each credential with authentication information and a credential record, and retain a database of associated authentication information and credential records. The publisher may provide validation services, receiving a validation request through a credentialer's validation portal, and provide a response through the credentialer's portal indicative of the validity, additional information about the credential, and even an audit trail. A validating entity may receive credential validation through the credentialer with a heightened degree of confidence in the validation and lack of forgery.1. An electronically implemented method for validating a certified electronic academic credential, the method comprising: storing, in a validation database, a plurality of certified electronic credential records corresponding to a plurality of certified electronic academic credentials and associated authentication information, each record associated with an authentication information and comprising an academic credential status; receiving a certified electronic credential validation request and proffered authentication information redirected from a credentialer validation portal available from a credentialer; identifying a certified electronic credential record in the validation database associated with the proffered authentication information; generating a validation response based on the identified certified electronic credential record; and transmitting the validation response to the credentialer validation portal. 2. The certified electronic credential validation method of claim 1, further comprising determining whether the proffered authentication information is associated with an invalid credential, and wherein the validation response comprises an unsuccessful response when the credential is invalid. 3. The certified electronic credential validation method of claim 1, further comprising receiving a credential update from a first credentialer, wherein the credential update modifies a certified electronic credential record associated with a credential issued by the first credentialer. 4. The certified electronic credential validation method of claim 1, wherein the validation response includes validating information associated with the identified certified electronic credential record. 5. The certified electronic credential validation method of claim 1, wherein the validating information comprises at least one of a recipient's identity, a confirmation of the credential(s) bestowed upon the recipient, a date associated with a credential, coursework, grade point average, class rank, and security clearance. 6. The certified electronic credential validation method of claim 1, wherein a validating entity submits the certified electronic credential validation request and proffered authentication information through the credentialer validation portal. 7. The certified electronic credential validation method of claim 1, wherein the validation response includes a validation transactional record. 8. The certified electronic credential validation method of claim 7, wherein the validation transactional record comprises at least one of: information relating to the validation response, the date of the validation response, the proffered authentication information, the credential associated with the proffered authentication information, and the identity of the credentialer. 9. The certified electronic credential validation method of claim 1, further comprising generating a record relating to the validation response and the transmittal of the validation response. 10. The certified electronic credential validating method of claim 8, wherein the validation transactional record comprises at least one document integrity security feature, and at least one document usage security feature. 11. The certified electronic credential validation method of claim 1, further comprising: receiving an order for a plurality of certified electronic credentials from an ordering credentialer; producing the plurality of certified electronic credentials; associating an authentication information with each certified electronic credential; and generating a certified electronic credential record for each certified electronic credential. 12. The certified electronic credential validation method of claim 11, wherein the each certified electronic credential record is associated with the authentication information associated with the respective certified electronic credential, and wherein producing the plurality of certified electronic credentials comprises placing at least a first portion of the associated authentication information on a viewable portion of each certified electronic credential. 13. The certified electronic credential validation method of claim 11, wherein each certified electronic credential comprises at least one document integrity security feature and at least one document usage security feature. 14. The certified electronic credential validation method of claim 11, wherein each certified electronic credential includes at least a second portion of the associated authentication information in machine-readable format. 15. The certified electronic credential validation method of claim 11, wherein the authentication information comprises a universal record locating number. 16. The certified electronic credential validation method of claim 1, wherein the authentication information comprises a universal record locating number. 17. The certified electronic credential validation method of claim 11, further comprising delivering the plurality of certified electronic credentials and associated authentication information to at least one of a plurality of recipients and a credentialer. 18. An electronically implemented method for generating and validating certified electronic academic credentials, the method comprising: receiving an order for a plurality of certified electronic credentials from an ordering credentialer; producing the plurality of certified electronic credentials; associating an authentication information with each certified electronic credential; generating a certified electronic credential record for each certified electronic credential; storing the plurality of certified electronic credential records and associated authentication information, each record associated with an authentication information, in a validation database and comprising an academic credential status; receiving a certified electronic credential validation request and proffered authentication information redirected from a credentialer validation portal provided by a credentialer; identifying a certified electronic credential record in the validation database associated with the proffered authentication information; generating a validation response based on the identified certified electronic credential record; and transmitting the validation response to the credentialer validation portal. 19. The certified electronic credential generation and validation method of claim 18, wherein producing a certified electronic credential includes generating a computer-readable file representative of a credential bestowed upon a recipient, the computer-readable file protected with at least one of: at least one document integrity security feature, and at least one document usage security feature. 20. The certified electronic credential generation and validation method of claim 19, wherein the at least one document integrity security feature is selected from the group comprising: an Adobe Digital Signature, a digital certificate, a tamper-evidencing feature, and a data alteration feature. 21. The certified electronic credential generation and validation method of claim 19, wherein the at least one document usage security feature is selected from the group comprising: file password protection, a printing restriction, printing disablement, a file copying restriction, file copying disablement, and image disruptions. 22. An electronic system for generating and validating certified electronic academic credentials, the system comprising: a certified electronic credentials order database having data relating to an order for a plurality of certified electronic academic credentials from an ordering credentialer; a validation database having (1) a plurality of authentication information, each authentication information associated with a certified electronic credential, and (2) a plurality of certified electronic credential records, each certified electronic credential record associated with a certified electronic credential and comprising an academic credential status; a validation request interface configured to receive a certified electronic credential validation request and proffered authentication information redirected from a credentialer validation portal provided by a credentialer; a computer processor configured to identify a certified electronic credential record in the validation database associated with the proffered authentication information, generate a validation response based on the identified certified electronic credential record; and transmit the validation response to the credentialer validation portal. 23. The certified electronic credential generating and validating system of claim 22, wherein a certified electronic credential comprises a computer-readable file representative of a credential bestowed upon a recipient, the computer-readable file protected with at least one of: at least one document integrity security feature, and at least one document usage security feature. 24. The certified electronic credential generating and validating system of claim 23, wherein the at least one document integrity security feature is selected from the group comprising: an Adobe Digital Signature, a digital certificate, a tamper-evidencing feature, and a data alteration feature. 25. The certified electronic credential generating and validating system of claim 23, wherein the at least one document usage security feature is selected from the group comprising: file password protection, a printing restriction, printing disablement, a file copying restriction, file copying disablement, and image disruptions. 26. The certified electronic credential generating and validating system of claim 22, wherein the validation response includes a validation transactional record. 27. The certified electronic credential generating and validating system of claim 26, wherein the validation transactional record comprises at least one of: information relating to the validation response, the date of the validation response, the proffered authentication information, the credential associated with the proffered authentication information, and the identity of the credentialer. 28. The certified electronic credential generating and validating system of claim 27, wherein the validation transactional record comprises at least one document integrity security feature, and at least one document usage security feature. 29. The certified electronic credential validation method of claim 1, wherein the validation response includes an indicium of the academic credential status. 30. The certified electronic credential validation method of claim 1, wherein the academic credential comprises one of a diploma, a license, a certificate indicative of an achievement, a transcript, an award.
2,400
7,278
7,278
14,800,915
2,465
A touch display panel includes a substrate, a plurality of data lines, a plurality of touch sensing lines, and a plurality of gate lines. The data lines are disposed above the substrate, and extend along a first direction. The touch sensing lines are disposed above the substrate, extend along a second direction different from the first direction, and intersect with the data lines. The gate lines are disposed above the substrate, extend along the second direction, and intersect with the data lines. The touch sensing lines or the gate lines and the data lines form touch sensing elements.
1. A touch display panel, comprising: a first substrate; a plurality of data lines, disposed above the first substrate, extending along a first direction; a plurality of touch sensing lines, disposed above the first substrate, extending along a second direction and intersecting with the plurality of data lines to form a plurality of touch sensing elements; a plurality of gate lines, disposed above the first substrate, extending along the second direction and intersecting with the gate lines and the data lines; and a plurality of thin-film transistors (TFTs), disposed above the first substrate, disposed adjacently to intersections of the gate lines and the data lines, each of the TFTs comprising a gate, a source and a drain, each of the gates electrically connected to one of the adjacent gate lines, the sources electrically connected to one of the adjacent data lines. 2. The touch display panel according to claim 1, further comprising: a plurality of pixel electrodes, disposed above the first substrate, electrically connected to the drains; at least one common line, disposed above the first substrate, extending along the first direction; and a shielding pattern, disposed between the touch sensing elements and the pixel electrodes, electrically connected to the at least one common line. 3. The touch display panel according to claim 2, wherein the shielding pattern comprises a plurality of shielding portions, and the shielding portions are disposed between parts at which the pixel electrodes overlap with the touch sensing lines and the data lines. 4. The touch display panel according to claim 3, wherein the shielding pattern further comprises a plurality of connecting portions, and each of the connecting portions connects any two of the adjacent shielding portions. 5. The touch display panel according to claim 4, further comprising: a dielectric layer, disposed between the at least one common line and the shielding pattern, comprising at least one via; wherein, the shielding pattern is electrically connected to the at least one common line via the at least one via. 6. The touch display panel according to claim 1, wherein the data lines transmit at least one pixel voltage signal in a display period and transmit at least one touch driving signal in a touch control period, and the display period does not overlap with the touch control period. 7. The touch display panel according to claim 2, further comprising: a second substrate, disposed opposite to the first substrate; a liquid crystal layer, disposed between the first substrate and the second substrate; a black matrix layer, disposed between the second substrate and the liquid crystal layer; a color filter layer, disposed between the second substrate and the liquid crystal layer; and a common electrode pattern, disposed between the first substrate and the liquid crystal layer; wherein, the pixel electrodes comprise a plurality of gaps, and the common electrode pattern extends into the gaps. 8. The touch display panel according to claim 2, further comprising: a second substrate, disposed opposite to the first substrate; a liquid crystal layer, disposed between the first substrate and the second substrate; a black matrix layer, disposed between the second substrate and the liquid crystal layer; a color filter layer, disposed between the second substrate and the liquid crystal layer; and a common electrode pattern, disposed between the second substrate and the liquid crystal layer. 9. The touch display panel according to claim 1, wherein the touch sensing lines further comprise a plurality of extension portions, and the extension portions of the touch sensing lines overlap with the data lines. 10. A touch display panel, comprising: a first substrate; a plurality of data lines, disposed above the first substrate, extending along a first direction; a plurality of gate lines, disposed above the first substrate, extending along a second direction and intersecting with the data lines, to form a plurality of touch sensing elements; a plurality of thin-film transistors (TFTs), disposed above the first substrate, disposed adjacently to intersections of the gate lines and the data lines, each of the TFTs comprising a gate, a source and a drain, each of the gates electrically connected to one of the adjacent gate lines, the sources electrically connected to one of the adjacent data lines; a plurality of pixel electrodes, disposed above the first substrate, electrically connected to the drains; at least one common line, disposed above the first substrate, extending along the first direction; and a shielding pattern, disposed between the touch sensing elements and the pixel electrodes, electrically connected to the at least one common line. 11. The touch display panel according to claim 10, wherein the shielding pattern comprises a plurality of shielding portions, and the shielding portions are disposed between parts at which the pixel electrodes overlap with the touch sensing lines and the data lines. 12. The touch display panel according to claim 11, wherein the shielding pattern further comprises a plurality of connecting portions, and each of the connecting portions connects any two of the adjacent shielding portions. 13. The touch display panel according to claim 12, further comprising: a dielectric layer, disposed between the at least one common line and the shielding pattern, comprising at least one via; wherein, the shielding pattern is electrically connected to the at least one common line via the at least one via, and the shielding portions are electrically connected to at least one of the common lines via the vias. 14. The touch display panel according to claim 10, wherein the gate lines transmit at least one pixel voltage signal in a display period and stop transmitting the at least one pixel switch signal in a touch control period, and the display period does not overlap with the touch control period. 15. The touch display panel according to claim 10, further comprising: a second substrate, disposed opposite to the first substrate; a liquid crystal layer, disposed between the first substrate and the second substrate; a black matrix layer, disposed between the second substrate and the liquid crystal layer; a color filter layer, disposed between the second substrate and the liquid crystal layer; and a common electrode pattern, disposed between the first substrate and the liquid crystal layer; wherein, the pixel electrodes comprise a plurality of gaps, and the common electrode pattern extends into the gaps. 16. The touch display panel according to claim 10, further comprising: a second substrate, disposed opposite to the first substrate; a liquid crystal layer, disposed between the first substrate and the second substrate; a black matrix layer, disposed between the second substrate and the liquid crystal layer; a color filter layer, disposed between the second substrate and the liquid crystal layer; and a common electrode pattern, disposed between the second substrate and the liquid crystal layer. 17. The touch display panel according to claim 10, wherein the touch sensing lines further comprise a plurality of extension portions, and the extension portions of the touch sensing lines overlap with the data lines.
A touch display panel includes a substrate, a plurality of data lines, a plurality of touch sensing lines, and a plurality of gate lines. The data lines are disposed above the substrate, and extend along a first direction. The touch sensing lines are disposed above the substrate, extend along a second direction different from the first direction, and intersect with the data lines. The gate lines are disposed above the substrate, extend along the second direction, and intersect with the data lines. The touch sensing lines or the gate lines and the data lines form touch sensing elements.1. A touch display panel, comprising: a first substrate; a plurality of data lines, disposed above the first substrate, extending along a first direction; a plurality of touch sensing lines, disposed above the first substrate, extending along a second direction and intersecting with the plurality of data lines to form a plurality of touch sensing elements; a plurality of gate lines, disposed above the first substrate, extending along the second direction and intersecting with the gate lines and the data lines; and a plurality of thin-film transistors (TFTs), disposed above the first substrate, disposed adjacently to intersections of the gate lines and the data lines, each of the TFTs comprising a gate, a source and a drain, each of the gates electrically connected to one of the adjacent gate lines, the sources electrically connected to one of the adjacent data lines. 2. The touch display panel according to claim 1, further comprising: a plurality of pixel electrodes, disposed above the first substrate, electrically connected to the drains; at least one common line, disposed above the first substrate, extending along the first direction; and a shielding pattern, disposed between the touch sensing elements and the pixel electrodes, electrically connected to the at least one common line. 3. The touch display panel according to claim 2, wherein the shielding pattern comprises a plurality of shielding portions, and the shielding portions are disposed between parts at which the pixel electrodes overlap with the touch sensing lines and the data lines. 4. The touch display panel according to claim 3, wherein the shielding pattern further comprises a plurality of connecting portions, and each of the connecting portions connects any two of the adjacent shielding portions. 5. The touch display panel according to claim 4, further comprising: a dielectric layer, disposed between the at least one common line and the shielding pattern, comprising at least one via; wherein, the shielding pattern is electrically connected to the at least one common line via the at least one via. 6. The touch display panel according to claim 1, wherein the data lines transmit at least one pixel voltage signal in a display period and transmit at least one touch driving signal in a touch control period, and the display period does not overlap with the touch control period. 7. The touch display panel according to claim 2, further comprising: a second substrate, disposed opposite to the first substrate; a liquid crystal layer, disposed between the first substrate and the second substrate; a black matrix layer, disposed between the second substrate and the liquid crystal layer; a color filter layer, disposed between the second substrate and the liquid crystal layer; and a common electrode pattern, disposed between the first substrate and the liquid crystal layer; wherein, the pixel electrodes comprise a plurality of gaps, and the common electrode pattern extends into the gaps. 8. The touch display panel according to claim 2, further comprising: a second substrate, disposed opposite to the first substrate; a liquid crystal layer, disposed between the first substrate and the second substrate; a black matrix layer, disposed between the second substrate and the liquid crystal layer; a color filter layer, disposed between the second substrate and the liquid crystal layer; and a common electrode pattern, disposed between the second substrate and the liquid crystal layer. 9. The touch display panel according to claim 1, wherein the touch sensing lines further comprise a plurality of extension portions, and the extension portions of the touch sensing lines overlap with the data lines. 10. A touch display panel, comprising: a first substrate; a plurality of data lines, disposed above the first substrate, extending along a first direction; a plurality of gate lines, disposed above the first substrate, extending along a second direction and intersecting with the data lines, to form a plurality of touch sensing elements; a plurality of thin-film transistors (TFTs), disposed above the first substrate, disposed adjacently to intersections of the gate lines and the data lines, each of the TFTs comprising a gate, a source and a drain, each of the gates electrically connected to one of the adjacent gate lines, the sources electrically connected to one of the adjacent data lines; a plurality of pixel electrodes, disposed above the first substrate, electrically connected to the drains; at least one common line, disposed above the first substrate, extending along the first direction; and a shielding pattern, disposed between the touch sensing elements and the pixel electrodes, electrically connected to the at least one common line. 11. The touch display panel according to claim 10, wherein the shielding pattern comprises a plurality of shielding portions, and the shielding portions are disposed between parts at which the pixel electrodes overlap with the touch sensing lines and the data lines. 12. The touch display panel according to claim 11, wherein the shielding pattern further comprises a plurality of connecting portions, and each of the connecting portions connects any two of the adjacent shielding portions. 13. The touch display panel according to claim 12, further comprising: a dielectric layer, disposed between the at least one common line and the shielding pattern, comprising at least one via; wherein, the shielding pattern is electrically connected to the at least one common line via the at least one via, and the shielding portions are electrically connected to at least one of the common lines via the vias. 14. The touch display panel according to claim 10, wherein the gate lines transmit at least one pixel voltage signal in a display period and stop transmitting the at least one pixel switch signal in a touch control period, and the display period does not overlap with the touch control period. 15. The touch display panel according to claim 10, further comprising: a second substrate, disposed opposite to the first substrate; a liquid crystal layer, disposed between the first substrate and the second substrate; a black matrix layer, disposed between the second substrate and the liquid crystal layer; a color filter layer, disposed between the second substrate and the liquid crystal layer; and a common electrode pattern, disposed between the first substrate and the liquid crystal layer; wherein, the pixel electrodes comprise a plurality of gaps, and the common electrode pattern extends into the gaps. 16. The touch display panel according to claim 10, further comprising: a second substrate, disposed opposite to the first substrate; a liquid crystal layer, disposed between the first substrate and the second substrate; a black matrix layer, disposed between the second substrate and the liquid crystal layer; a color filter layer, disposed between the second substrate and the liquid crystal layer; and a common electrode pattern, disposed between the second substrate and the liquid crystal layer. 17. The touch display panel according to claim 10, wherein the touch sensing lines further comprise a plurality of extension portions, and the extension portions of the touch sensing lines overlap with the data lines.
2,400
7,279
7,279
14,297,508
2,481
A display device includes a frame; and a transparent display module in the frame, the transparent display module including a horizontal cross-section including a closed curve and configured to emit light from opposite surfaces thereof.
1. A display device comprising: a frame; and a transparent display module in the frame, the transparent display module having a horizontal cross-section comprising a closed curve and configured to emit light from opposite surfaces thereof. 2. The display device of claim 1, wherein the horizontal cross-section of the display module has a circularly or ellipsoidally tubular shape. 3. The display device of claim 2, wherein the opposite surfaces of the display module comprise a first light emitting surface configured to display a first image, and a second light emitting surface opposite to the first light emitting surface and configured to display a second image, wherein the first light emitting surface faces outside in a radial direction of the display module, and the second light emitting surface faces inside in the radial direction of the display module. 4. The display device of claim 3, wherein the first light emitting surface and the second light emitting surface are configured to display images in 360 degrees with respect to a longitudinal central axis of the display module. 5. A display system comprising: a transparent display module having a horizontal cross-section comprising a closed curve and configured to emit light from opposite surfaces thereof; and a display region controller configured to control a position of a display region for displaying an image by the display module. 6. The display system of claim 5, wherein the horizontal cross-section of the display module has a circularly or ellipsoidally tubular shape, and the display module comprises a first light emitting surface facing outside in a radial direction of the display module, and a second light emitting surface facing inside in the radial direction. 7. The display system of claim 6, wherein the display region controller is configured to control the display region of the display module, wherein the display region comprises a first display region and a second display region, wherein the first display region is a portion of the first light emitting surface and is configured to display a first image, and wherein the second display region is a portion of the second light emitting surface opposite to the first display region with respect to a longitudinal central axis of the display module, and the second display region is configured to display a second image. 8. The display system of claim 7, further comprising an image storage configured to store the first image and the second image. 9. The display system of claim 7, further comprising an image input section configured to input the first image and the second image. 10. The display system of claim 7, wherein the second image is displayed in a same direction as the first image. 11. The display system of claim 10, wherein each of the first display region and the second display region has a circular arc or curve shaped cross-section with an angle of 180 degrees or smaller with respect to the longitudinal central axis. 12. The display system of claim 11, further comprising a camera configured to photograph a position of a viewer who views the transparent display module, wherein the display region controller comprises: a camera controller configured to control the camera according to the position of the viewer; and a position determiner configured to determine the position of the viewer photographed by the camera, and wherein the display region controller is configured to control positions of the first display region and the second display region according to the position of the viewer determined by the position determiner. 13. The display system of claim 12, wherein the display region controller is configured to control the first display region and the second display region such that the first image and the second image are displayed in a direction in which the viewer is located. 14. The display system of claim 7, wherein the first image is a foreground image, and the second image is a background image. 15. A display control method of a transparent display module, the transparent display module comprising: a horizontal cross-section comprising a closed curve, a first light emitting surface facing externally in a radial direction of the display module, and a second light emitting surface facing internally in the radial direction, wherein the transparent display module is configured to emit light from the first and second light emitting surfaces, the display control method comprising: determining a position of a viewer who views the transparent display module; and respectively providing a first display region on which a first image is displayed and a second display region on which a second image is displayed onto the first light emitting surface and the second light emitting surface in a direction in which the viewer is located. 16. The display control method of claim 15, wherein the determining of the position of the viewer who views the transparent display module comprises: tracking a position of a face or an eye of the viewer, and obtaining coordinates of the position of the face or eye of the viewer. 17. The display control method of claim 16, further comprising: comparing position coordinates of the face or eye with reference position coordinates; determining a movement amount of the face or eye; and moving positions of the first display region and the second display region according to the movement amount of the face or eye after determining the position of the viewer who views the transparent display module.
A display device includes a frame; and a transparent display module in the frame, the transparent display module including a horizontal cross-section including a closed curve and configured to emit light from opposite surfaces thereof.1. A display device comprising: a frame; and a transparent display module in the frame, the transparent display module having a horizontal cross-section comprising a closed curve and configured to emit light from opposite surfaces thereof. 2. The display device of claim 1, wherein the horizontal cross-section of the display module has a circularly or ellipsoidally tubular shape. 3. The display device of claim 2, wherein the opposite surfaces of the display module comprise a first light emitting surface configured to display a first image, and a second light emitting surface opposite to the first light emitting surface and configured to display a second image, wherein the first light emitting surface faces outside in a radial direction of the display module, and the second light emitting surface faces inside in the radial direction of the display module. 4. The display device of claim 3, wherein the first light emitting surface and the second light emitting surface are configured to display images in 360 degrees with respect to a longitudinal central axis of the display module. 5. A display system comprising: a transparent display module having a horizontal cross-section comprising a closed curve and configured to emit light from opposite surfaces thereof; and a display region controller configured to control a position of a display region for displaying an image by the display module. 6. The display system of claim 5, wherein the horizontal cross-section of the display module has a circularly or ellipsoidally tubular shape, and the display module comprises a first light emitting surface facing outside in a radial direction of the display module, and a second light emitting surface facing inside in the radial direction. 7. The display system of claim 6, wherein the display region controller is configured to control the display region of the display module, wherein the display region comprises a first display region and a second display region, wherein the first display region is a portion of the first light emitting surface and is configured to display a first image, and wherein the second display region is a portion of the second light emitting surface opposite to the first display region with respect to a longitudinal central axis of the display module, and the second display region is configured to display a second image. 8. The display system of claim 7, further comprising an image storage configured to store the first image and the second image. 9. The display system of claim 7, further comprising an image input section configured to input the first image and the second image. 10. The display system of claim 7, wherein the second image is displayed in a same direction as the first image. 11. The display system of claim 10, wherein each of the first display region and the second display region has a circular arc or curve shaped cross-section with an angle of 180 degrees or smaller with respect to the longitudinal central axis. 12. The display system of claim 11, further comprising a camera configured to photograph a position of a viewer who views the transparent display module, wherein the display region controller comprises: a camera controller configured to control the camera according to the position of the viewer; and a position determiner configured to determine the position of the viewer photographed by the camera, and wherein the display region controller is configured to control positions of the first display region and the second display region according to the position of the viewer determined by the position determiner. 13. The display system of claim 12, wherein the display region controller is configured to control the first display region and the second display region such that the first image and the second image are displayed in a direction in which the viewer is located. 14. The display system of claim 7, wherein the first image is a foreground image, and the second image is a background image. 15. A display control method of a transparent display module, the transparent display module comprising: a horizontal cross-section comprising a closed curve, a first light emitting surface facing externally in a radial direction of the display module, and a second light emitting surface facing internally in the radial direction, wherein the transparent display module is configured to emit light from the first and second light emitting surfaces, the display control method comprising: determining a position of a viewer who views the transparent display module; and respectively providing a first display region on which a first image is displayed and a second display region on which a second image is displayed onto the first light emitting surface and the second light emitting surface in a direction in which the viewer is located. 16. The display control method of claim 15, wherein the determining of the position of the viewer who views the transparent display module comprises: tracking a position of a face or an eye of the viewer, and obtaining coordinates of the position of the face or eye of the viewer. 17. The display control method of claim 16, further comprising: comparing position coordinates of the face or eye with reference position coordinates; determining a movement amount of the face or eye; and moving positions of the first display region and the second display region according to the movement amount of the face or eye after determining the position of the viewer who views the transparent display module.
2,400
7,280
7,280
14,569,358
2,414
Some embodiments provide an elastic architecture for providing a service in a computing system. To perform a service on the data messages, the service architecture uses a service node (SN) group that includes one primary service node (PSN) and zero or more secondary service nodes (SSNs). The service can be performed on a data message by either the PSN or one of the SSN. However, in addition to performing the service, the PSN also performs a load balancing operation that assesses the load on each service node (i.e., on the PSN or each SSN), and based on this assessment, has the data messages distributed to the service node(s) in its SN group. Based on the assessed load, the PSN in some embodiments also has one or more SSNs added to or removed from its SN group. To add or remove an SSN to or from the service node group, the PSN in some embodiments directs a set of controllers to add (e.g., instantiate or allocate) or remove the SSN to or from the SN group. Also, to assess the load on the service nodes, the PSN in some embodiments receives message load data from the controller set, which collects such data from each service node. In other embodiments, the PSN receives such load data directly from the SSNs.
1. A non-transitory machine readable medium of a primary service node (PSN), the medium storing a program for performing a service on data messages, the program comprising sets of instructions for: receiving a data message and identifying a service node (SN) in a SN group to perform the service on the data messages that are in the same flow as the received data message, said group comprising the PSN; when the PSN is the identified SN for the received data message's flow, performing the service on the received data message and on data messages in the same flow as the received data message; when another SN is the identified SN for the received data message's flow, directing the received data message to the other SN for the SN to perform the service on the received data message. 2. The non-transitory machine readable medium of claim 1, wherein the set of instructions for directing the received data message to the other SN comprises a set of instructions for directing data messages that are in the same flow as the received data message to the other SN for the SN to perform the service on the data messages in the same flow. 3. The non-transitory machine readable medium of claim 1, wherein the service is a non-load balancing service, the other SN is a secondary service node (SSN), and the SN group comprises a plurality of SSNs in addition to the PSN; wherein the set of instructions for identifying a service node comprises a set of instructions for performing load balancing operations to distribute data message flows, among the service nodes of the SN group. 4. The non-transitory machine readable medium of claim 3, wherein the load balancing operations are based on load balancing criteria that are defined to ensure even distribution of data message traffic load to the service nodes. 5. The non-transitory machine readable medium of claim 3, wherein the non-load balancing service is one of a firewall service, an intrusion detection service, and a WAN optimizer service. 6. The non-transitory machine readable medium of claim 3, wherein the set of instructions for performing the load balancing operations comprises a set of instructions for identifying at least one load balancing rule that identifies load balancing criteria for distributing the data message flows to the service nodes. 7. The non-transitory machine readable medium of claim 6, wherein the set of instructions for identifying the load balancing rule comprises a set of instructions for identifying the load balancing rule by using a set of data message header parameters associated with the SN group. 8. The non-transitory machine readable medium of claim 7, wherein the set of data message header parameters includes a virtual Internet Protocol (VIP) address associated with the SN group. 9. The non-transitory machine readable medium of claim 8, wherein the VIP address is the Internet Protocol (IP) address of the PSN. 10. The non-transitory machine readable medium of claim 1, wherein the set of instructions for directing the received data message to the other SN comprises a set of instructions for changing a destination media access control (MAC) address of the data message to the MAC address of the other SN. 11. The non-transitory machine readable medium of claim 1, wherein the set of instructions for directing the received data message to the other SN comprises a set of instructions for changing a destination Internet Protocol (IP) address of the data message to the IP address of the other SN. 12. The non-transitory machine readable medium of claim 1, wherein the set of instructions for directing the received data message to the other SN comprises a set of instructions for configuring a front end load balancer to send the received data message and the data messages that are part of the same flow as the received data message to the other SN. 13. The non-transitory machine readable medium of claim 1, wherein each service node includes a service virtual machine that executes on a host computing device in a system with a plurality of host computing devices; wherein the PSN further includes a load balancer that executes on the host computing device along with the PSN's SVM; and wherein the load balancer is an inline load balancer that intercepts data messages from the datapath of the PLB's SVM and identifies a service node in the SN group that should perform the service on the data message. 14. For a primary service node (PSN) of a service node (SN) group that comprises the PSN and at least one secondary service node (SSN), a method for performing a service on data messages, the method comprising: at the PSN, receiving a first data message and identifying the PSN as the service node to perform the service on the data messages that are in the same flow as the first data message; performing the service on the first data message and on data messages in the same flow as the first data message; at the PSN, receiving a second data message and identifying the SSN as the service node to perform the service on the data messages that are in the same flow as the second data message; directing the second data message and on data messages in the same flow as the second data message to the SSN. 15. The method of claim 14, wherein the service is a non-load balancing service, and the SN group comprises a plurality of SSNs, the method further comprising performing load balancing operations to distribute data message flows among the service nodes of the SN group. 16. The method of claim 15, wherein the load balancing operations are based on load balancing criteria that are defined to ensure even distribution of data message traffic load to the service nodes. 17. The method of claim 14, wherein directing the received data message to the SSN comprises changing a destination media access control (MAC) address of the data message to the MAC address of the SSN. 18. The method of claim 14, wherein directing the received data message to the SSN comprises changing a destination Internet Protocol (IP) address of the data message to the IP address of the other SN. 19. The method of claim 14, wherein directing the received data message to the SSN comprises configuring a front end load balancer to send the received data message and the data messages that are part of the same flow as the received data message to the other SN.
Some embodiments provide an elastic architecture for providing a service in a computing system. To perform a service on the data messages, the service architecture uses a service node (SN) group that includes one primary service node (PSN) and zero or more secondary service nodes (SSNs). The service can be performed on a data message by either the PSN or one of the SSN. However, in addition to performing the service, the PSN also performs a load balancing operation that assesses the load on each service node (i.e., on the PSN or each SSN), and based on this assessment, has the data messages distributed to the service node(s) in its SN group. Based on the assessed load, the PSN in some embodiments also has one or more SSNs added to or removed from its SN group. To add or remove an SSN to or from the service node group, the PSN in some embodiments directs a set of controllers to add (e.g., instantiate or allocate) or remove the SSN to or from the SN group. Also, to assess the load on the service nodes, the PSN in some embodiments receives message load data from the controller set, which collects such data from each service node. In other embodiments, the PSN receives such load data directly from the SSNs.1. A non-transitory machine readable medium of a primary service node (PSN), the medium storing a program for performing a service on data messages, the program comprising sets of instructions for: receiving a data message and identifying a service node (SN) in a SN group to perform the service on the data messages that are in the same flow as the received data message, said group comprising the PSN; when the PSN is the identified SN for the received data message's flow, performing the service on the received data message and on data messages in the same flow as the received data message; when another SN is the identified SN for the received data message's flow, directing the received data message to the other SN for the SN to perform the service on the received data message. 2. The non-transitory machine readable medium of claim 1, wherein the set of instructions for directing the received data message to the other SN comprises a set of instructions for directing data messages that are in the same flow as the received data message to the other SN for the SN to perform the service on the data messages in the same flow. 3. The non-transitory machine readable medium of claim 1, wherein the service is a non-load balancing service, the other SN is a secondary service node (SSN), and the SN group comprises a plurality of SSNs in addition to the PSN; wherein the set of instructions for identifying a service node comprises a set of instructions for performing load balancing operations to distribute data message flows, among the service nodes of the SN group. 4. The non-transitory machine readable medium of claim 3, wherein the load balancing operations are based on load balancing criteria that are defined to ensure even distribution of data message traffic load to the service nodes. 5. The non-transitory machine readable medium of claim 3, wherein the non-load balancing service is one of a firewall service, an intrusion detection service, and a WAN optimizer service. 6. The non-transitory machine readable medium of claim 3, wherein the set of instructions for performing the load balancing operations comprises a set of instructions for identifying at least one load balancing rule that identifies load balancing criteria for distributing the data message flows to the service nodes. 7. The non-transitory machine readable medium of claim 6, wherein the set of instructions for identifying the load balancing rule comprises a set of instructions for identifying the load balancing rule by using a set of data message header parameters associated with the SN group. 8. The non-transitory machine readable medium of claim 7, wherein the set of data message header parameters includes a virtual Internet Protocol (VIP) address associated with the SN group. 9. The non-transitory machine readable medium of claim 8, wherein the VIP address is the Internet Protocol (IP) address of the PSN. 10. The non-transitory machine readable medium of claim 1, wherein the set of instructions for directing the received data message to the other SN comprises a set of instructions for changing a destination media access control (MAC) address of the data message to the MAC address of the other SN. 11. The non-transitory machine readable medium of claim 1, wherein the set of instructions for directing the received data message to the other SN comprises a set of instructions for changing a destination Internet Protocol (IP) address of the data message to the IP address of the other SN. 12. The non-transitory machine readable medium of claim 1, wherein the set of instructions for directing the received data message to the other SN comprises a set of instructions for configuring a front end load balancer to send the received data message and the data messages that are part of the same flow as the received data message to the other SN. 13. The non-transitory machine readable medium of claim 1, wherein each service node includes a service virtual machine that executes on a host computing device in a system with a plurality of host computing devices; wherein the PSN further includes a load balancer that executes on the host computing device along with the PSN's SVM; and wherein the load balancer is an inline load balancer that intercepts data messages from the datapath of the PLB's SVM and identifies a service node in the SN group that should perform the service on the data message. 14. For a primary service node (PSN) of a service node (SN) group that comprises the PSN and at least one secondary service node (SSN), a method for performing a service on data messages, the method comprising: at the PSN, receiving a first data message and identifying the PSN as the service node to perform the service on the data messages that are in the same flow as the first data message; performing the service on the first data message and on data messages in the same flow as the first data message; at the PSN, receiving a second data message and identifying the SSN as the service node to perform the service on the data messages that are in the same flow as the second data message; directing the second data message and on data messages in the same flow as the second data message to the SSN. 15. The method of claim 14, wherein the service is a non-load balancing service, and the SN group comprises a plurality of SSNs, the method further comprising performing load balancing operations to distribute data message flows among the service nodes of the SN group. 16. The method of claim 15, wherein the load balancing operations are based on load balancing criteria that are defined to ensure even distribution of data message traffic load to the service nodes. 17. The method of claim 14, wherein directing the received data message to the SSN comprises changing a destination media access control (MAC) address of the data message to the MAC address of the SSN. 18. The method of claim 14, wherein directing the received data message to the SSN comprises changing a destination Internet Protocol (IP) address of the data message to the IP address of the other SN. 19. The method of claim 14, wherein directing the received data message to the SSN comprises configuring a front end load balancer to send the received data message and the data messages that are part of the same flow as the received data message to the other SN.
2,400
7,281
7,281
12,241,292
2,491
A remote automation system is described herein that allows application accessibility information to be used remotely and extended to allow custom UI elements to be automated. The remote automation system receives a request at a remote computer for automation data related to an application running on the remote computer. The remote automation system requests automation data from the application running on the remote computer and serializes the automation data for transmission to the client computer. The system transmits the serialized automation data to the client computer in response to the request. When the client computer receives the response, the system deserializes the automation data and provides the deserialized automation data to a local application on the client computer. Thus, the remote automation system allows users to view applications running on a remote system but run accessibility applications locally.
1. A computer-implemented method for providing automation data from a remote computer to a client computer, the method comprising: receiving at the remote computer a request over a network for automation data related to an application running on the remote computer; requesting automation data from the application running on the remote computer; collecting automation data received from the application; serializing the automation data to prepare the data for transmission to the client computer; and transmitting the serialized automation data to the client computer in response to the request. 2. The method of claim 1 wherein receiving the request comprises receiving the request through a Microsoft Terminal Services connection. 3. The method of claim 1 wherein the application implements a standard interface for retrieving automation data. 4. The method of claim 1 wherein the application provides custom UI automation data. 5. The method of claim 1 wherein the application includes executable instructions for handling custom UI item patterns. 6. The method of claim 1 wherein collecting automation data comprises gathering information about one or more properties of UI items associated with the application and organizing the data into a hierarchical format. 7. The method of claim 1 wherein serializing the automation data comprises placing the automation data into one or more packets for transmission. 8. A computer system for remoting extensible accessibility information, the system comprising: an information gathering component configured to gather accessibility information from an application running on a remote computer; a serializing component configured to marshal the gathered accessibility information into a format suitable for transmission over a network; a first transport component configured to transmit the marshaled accessibility information over the network to a client computer; a second transport component configured to receive marshaled accessibility information; and a deserializing component configured to deserialize the accessibility information and provide the deserialized accessibility information to an application running on the client computer. 9. The system of claim 8 further comprising a UI item data store configured to store information about each user interface property, event, and pattern that is accessible through the system, wherein the UI item data store contains one or more tables of pre-defined and application-provided UI items. 10. The system of claim 8 further comprising a coordinate translation component configured to reconcile inconsistencies in the accessibility information caused by differences in the remote computer and the client computer. 11. The system of claim 10 wherein the remote and client computers display a user interface element at different locations and the coordinate translation component modifies coordinates in the accessibility information based on locations of UI items on a desktop of the client computer. 12. The system of claim 8 further comprising: an item registration component configured to handle requests from applications to register new UI item properties; and an identifier assignment component configured to assign identifiers to new UI properties registered by applications. 13. The system of claim 12 wherein the identifier assignment component is further configured to assign identifiers such that no two UI properties in a particular process or associated with a particular automation interface instance have the same identifier. 14. The system of claim 12 wherein the item registration component is further configured to receive information about each property, including a name and description. 15. The system of claim 8 wherein the information gathering component is further configured to interface with proxies that translate accessibility data from a common format into a format of the system. 16. A computer-readable medium encoded with instructions for controlling a computer system to deserialize automation data received from a remote computer, by a method comprising: sending a request for automation data from a client computer to a remote computer; receiving a response including serialized automation data for one or more remote applications; deserializing the automation data to produce an in-memory representation of the automation data from the received response; translating one or more coordinates in the deserialized automation data to adjust for differences in the remote computer and the client computer; and providing the translated automation data to a local application on the client computer. 17. The computer-readable medium of claim 16 wherein the request includes information identifying an application window being displayed by the client computer of an application running on the remote computer. 18. The computer-readable medium of claim 16 wherein the automation data identifies a type and location of UI elements displayed by the remote applications. 19. The computer-readable medium of claim 16 wherein the automation data includes at least one of a property, an event, and a pattern associated with a UI item. 20. The computer-readable medium of claim 16 wherein the in-memory representation comprises one or more hierarchical data structures with logically arranged UI items.
A remote automation system is described herein that allows application accessibility information to be used remotely and extended to allow custom UI elements to be automated. The remote automation system receives a request at a remote computer for automation data related to an application running on the remote computer. The remote automation system requests automation data from the application running on the remote computer and serializes the automation data for transmission to the client computer. The system transmits the serialized automation data to the client computer in response to the request. When the client computer receives the response, the system deserializes the automation data and provides the deserialized automation data to a local application on the client computer. Thus, the remote automation system allows users to view applications running on a remote system but run accessibility applications locally.1. A computer-implemented method for providing automation data from a remote computer to a client computer, the method comprising: receiving at the remote computer a request over a network for automation data related to an application running on the remote computer; requesting automation data from the application running on the remote computer; collecting automation data received from the application; serializing the automation data to prepare the data for transmission to the client computer; and transmitting the serialized automation data to the client computer in response to the request. 2. The method of claim 1 wherein receiving the request comprises receiving the request through a Microsoft Terminal Services connection. 3. The method of claim 1 wherein the application implements a standard interface for retrieving automation data. 4. The method of claim 1 wherein the application provides custom UI automation data. 5. The method of claim 1 wherein the application includes executable instructions for handling custom UI item patterns. 6. The method of claim 1 wherein collecting automation data comprises gathering information about one or more properties of UI items associated with the application and organizing the data into a hierarchical format. 7. The method of claim 1 wherein serializing the automation data comprises placing the automation data into one or more packets for transmission. 8. A computer system for remoting extensible accessibility information, the system comprising: an information gathering component configured to gather accessibility information from an application running on a remote computer; a serializing component configured to marshal the gathered accessibility information into a format suitable for transmission over a network; a first transport component configured to transmit the marshaled accessibility information over the network to a client computer; a second transport component configured to receive marshaled accessibility information; and a deserializing component configured to deserialize the accessibility information and provide the deserialized accessibility information to an application running on the client computer. 9. The system of claim 8 further comprising a UI item data store configured to store information about each user interface property, event, and pattern that is accessible through the system, wherein the UI item data store contains one or more tables of pre-defined and application-provided UI items. 10. The system of claim 8 further comprising a coordinate translation component configured to reconcile inconsistencies in the accessibility information caused by differences in the remote computer and the client computer. 11. The system of claim 10 wherein the remote and client computers display a user interface element at different locations and the coordinate translation component modifies coordinates in the accessibility information based on locations of UI items on a desktop of the client computer. 12. The system of claim 8 further comprising: an item registration component configured to handle requests from applications to register new UI item properties; and an identifier assignment component configured to assign identifiers to new UI properties registered by applications. 13. The system of claim 12 wherein the identifier assignment component is further configured to assign identifiers such that no two UI properties in a particular process or associated with a particular automation interface instance have the same identifier. 14. The system of claim 12 wherein the item registration component is further configured to receive information about each property, including a name and description. 15. The system of claim 8 wherein the information gathering component is further configured to interface with proxies that translate accessibility data from a common format into a format of the system. 16. A computer-readable medium encoded with instructions for controlling a computer system to deserialize automation data received from a remote computer, by a method comprising: sending a request for automation data from a client computer to a remote computer; receiving a response including serialized automation data for one or more remote applications; deserializing the automation data to produce an in-memory representation of the automation data from the received response; translating one or more coordinates in the deserialized automation data to adjust for differences in the remote computer and the client computer; and providing the translated automation data to a local application on the client computer. 17. The computer-readable medium of claim 16 wherein the request includes information identifying an application window being displayed by the client computer of an application running on the remote computer. 18. The computer-readable medium of claim 16 wherein the automation data identifies a type and location of UI elements displayed by the remote applications. 19. The computer-readable medium of claim 16 wherein the automation data includes at least one of a property, an event, and a pattern associated with a UI item. 20. The computer-readable medium of claim 16 wherein the in-memory representation comprises one or more hierarchical data structures with logically arranged UI items.
2,400
7,282
7,282
15,150,210
2,464
A method and technique for communications over multiple protocol interfaces in a computing environment includes identifying a first communications protocol of a network interface for ingress data packet communications. Responsive to the identified first communications protocol of the network interface differing from a second communications protocol used for the data packet communications, fragmentation data according to a data packet fragmentation protocol corresponding to the second communications protocol is derived from an application layer header of the data packet communications. A logical packet is re-assembled from the data packet communications using the data packet fragmentation protocol and the fragmentation data.
1. A method, comprising: identify a first communications protocol of a network interface for ingress data packet communications; responsive to the identified first communications protocol of the network interface differing from a second communications protocol used for the data packet communications, derive fragmentation data according to a data packet fragmentation protocol corresponding to the second communications protocol from an application layer header of the data packet communications; and re-assemble a logical packet from the data packet communications using the data packet fragmentation protocol and the fragmentation data. 2. The method of claim 1, wherein deriving the fragmentation data comprises deriving an identifier value. 3. The method of claim 1, wherein deriving the fragmentation data comprises deriving a fragment offset value. 4. The method of claim 1, wherein deriving the fragmentation data comprises: deriving an identifier value; and deriving a fragment offset value. 5. The method of claim 1, wherein the first communications protocol is an IPv6 protocol, and the second communications protocol is an IPv4 protocol. 6. A system, comprising: a processor; and a memory storing interface logic executable by the processor to: identify a first communications protocol of a network interface for ingress data packet communications; responsive to the identified first communications protocol of the network interface differing from a second communications protocol used for the data packet communications, derive fragmentation data according to a data packet fragmentation protocol corresponding to the second communications protocol from an application layer header of the data packet communications; and re-assemble a logical packet from the data packet communications using the data packet fragmentation protocol and the fragmentation data. 7. The system of claim 6, wherein the logic is executable to derive the fragmentation data to include an identifier value. 8. The system of claim 6, wherein the logic is executable to derive the fragmentation data to include a fragment offset value. 9. The system of claim 6, wherein the logic is executable to derive the fragmentation data to include an identifier value and a fragment offset value. 10. The system of claim 6, wherein the first communications protocol is an IPv6 protocol, and the second communications protocol is an IPv4 protocol. 11. A computer program product for communications over multiple protocol interfaces in a computing environment, the computer program product comprising: a non-transitory computer readable medium having computer readable program code embodied therewith, the computer readable program code comprising computer readable program code configured to: identify a first communications protocol of a network interface for ingress data packet communications; responsive to the identified first communications protocol of the network interface differing from a second communications protocol used for the data packet communications, derive fragmentation data according to a data packet fragmentation protocol corresponding to the second communications protocol from an application layer header of the data packet communications; and re-assemble a logical packet from the data packet communications using the data packet fragmentation protocol and the fragmentation data. 12. The computer program product of claim 11, wherein the computer readable program code is configured to derive the fragmentation data to include an identifier value. 13. The computer program product of claim 11, wherein the computer readable program code is configured to derive the fragmentation data to include a fragment offset value. 14. The computer program product of claim 11, wherein the computer readable program code is configured to derive the fragmentation data to include an identifier value and a fragment offset value. 15. The computer program product of claim 11, wherein the first communications protocol is an IPv6 protocol, and the second communications protocol is an IPv4 protocol.
A method and technique for communications over multiple protocol interfaces in a computing environment includes identifying a first communications protocol of a network interface for ingress data packet communications. Responsive to the identified first communications protocol of the network interface differing from a second communications protocol used for the data packet communications, fragmentation data according to a data packet fragmentation protocol corresponding to the second communications protocol is derived from an application layer header of the data packet communications. A logical packet is re-assembled from the data packet communications using the data packet fragmentation protocol and the fragmentation data.1. A method, comprising: identify a first communications protocol of a network interface for ingress data packet communications; responsive to the identified first communications protocol of the network interface differing from a second communications protocol used for the data packet communications, derive fragmentation data according to a data packet fragmentation protocol corresponding to the second communications protocol from an application layer header of the data packet communications; and re-assemble a logical packet from the data packet communications using the data packet fragmentation protocol and the fragmentation data. 2. The method of claim 1, wherein deriving the fragmentation data comprises deriving an identifier value. 3. The method of claim 1, wherein deriving the fragmentation data comprises deriving a fragment offset value. 4. The method of claim 1, wherein deriving the fragmentation data comprises: deriving an identifier value; and deriving a fragment offset value. 5. The method of claim 1, wherein the first communications protocol is an IPv6 protocol, and the second communications protocol is an IPv4 protocol. 6. A system, comprising: a processor; and a memory storing interface logic executable by the processor to: identify a first communications protocol of a network interface for ingress data packet communications; responsive to the identified first communications protocol of the network interface differing from a second communications protocol used for the data packet communications, derive fragmentation data according to a data packet fragmentation protocol corresponding to the second communications protocol from an application layer header of the data packet communications; and re-assemble a logical packet from the data packet communications using the data packet fragmentation protocol and the fragmentation data. 7. The system of claim 6, wherein the logic is executable to derive the fragmentation data to include an identifier value. 8. The system of claim 6, wherein the logic is executable to derive the fragmentation data to include a fragment offset value. 9. The system of claim 6, wherein the logic is executable to derive the fragmentation data to include an identifier value and a fragment offset value. 10. The system of claim 6, wherein the first communications protocol is an IPv6 protocol, and the second communications protocol is an IPv4 protocol. 11. A computer program product for communications over multiple protocol interfaces in a computing environment, the computer program product comprising: a non-transitory computer readable medium having computer readable program code embodied therewith, the computer readable program code comprising computer readable program code configured to: identify a first communications protocol of a network interface for ingress data packet communications; responsive to the identified first communications protocol of the network interface differing from a second communications protocol used for the data packet communications, derive fragmentation data according to a data packet fragmentation protocol corresponding to the second communications protocol from an application layer header of the data packet communications; and re-assemble a logical packet from the data packet communications using the data packet fragmentation protocol and the fragmentation data. 12. The computer program product of claim 11, wherein the computer readable program code is configured to derive the fragmentation data to include an identifier value. 13. The computer program product of claim 11, wherein the computer readable program code is configured to derive the fragmentation data to include a fragment offset value. 14. The computer program product of claim 11, wherein the computer readable program code is configured to derive the fragmentation data to include an identifier value and a fragment offset value. 15. The computer program product of claim 11, wherein the first communications protocol is an IPv6 protocol, and the second communications protocol is an IPv4 protocol.
2,400
7,283
7,283
14,608,936
2,466
A method of supporting a Handover (HO) by a master evolved Node B (eNB) in a wireless communication system supporting dual connectivity of a User Equipment (UE) for the master eNB and a slave eNB is provided. The method includes when an HO of the UE to the slave eNB is determined, transmitting an HO request message to a target slave eNB, when a HO Ack message is received from the target slave eNB, transmitting an HO trigger request message including identification information of the target slave eNB to a source slave eNB, and when a resource release message is received from the target slave eNB, transmitting an HO success indicator to the source slave eNB.
1. A method of supporting a Handover (HO) by a master evolved Node B (eNB) in a wireless communication system supporting dual connectivity of a User Equipment (UE) for the master eNB and a slave eNB, the method comprising: when an HO of the UE to the slave eNB is determined, transmitting an HO request message to a target slave eNB; when a HO Ack message is received from the target slave eNB, transmitting an HO trigger request message including identification information of the target slave eNB to a source slave eNB; and when a resource release message is received from the target slave eNB, transmitting an HO success indicator to the source slave eNB. 2. The method of claim 1, wherein the HO request message includes at least one of information indicating that the UE is in a dual connectivity mode, identification information of the source slave eNB of the UE, and flow information related to the source slave eNB. 3. The method of claim 1, wherein transmitting the HO trigger request message comprises transmitting the HO trigger request message to the source slave eNB to allow the source slave eNB to transmit UE context information to the target slave eNB. 4. The method of claim 1, wherein transmitting the HO indicator comprises transmitting the HO indicator to the source slave eNB to allow the source slave eNB to delete the UE context information. 5. The method of claim 1, wherein the target slave eNB, having received the HO request message, does not perform an HO process with a core network. 6. The method of claim 1, wherein the target slave eNB, having received the HO request message, performs an HO process with a core network. 7. A method of supporting a Handover (HO) by a master evolved Node B (eNB) in a wireless communication system supporting dual connectivity of a user equipment (UE) for the master eNB and a slave eNB, the method comprising: when an HO of the UE to the master eNB is determined, transmitting an HO request message to a target master eNB; when an HO Ack message is received from the target master eNB, transmitting an HO trigger indicator to a source slave eNB; and when a resource release message is received from the target master eNB, transmitting an HO success indicator to the source slave eNB. 8. The method of claim 7, wherein the HO request message includes information indicating that the UE is in a dual connectivity mode, identification information of the source slave eNB of the UE, and flow information of the master eNB. 9. The method of claim 8, wherein the HO request message further includes flow information related to the source slave eNB. 10. The method of claim 7, wherein transmitting the HO trigger indicator comprises transmitting the HO trigger indicator to the source slave eNB to allow the source slave eNB to buffer a dual connectivity-related message until the HO is completed. 11. The method of claim 7, wherein transmitting the HO success indicator comprises transmitting the HO success indicator to the source slave eNB to allow the source slave eNB and the target master eNB to form dual connectivity. 12. A master evolved Node B (eNB) for supporting a Handover (HO) in a wireless communication system supporting dual connectivity of a User Equipment (UE) for the master eNB and a slave eNB, the master eNB comprising: a transceiver configured to transmit/receive signals to/from the UE or nodes of the wireless communication system; and a controller configured to transmit an HO request message to a target slave eNB when an HO of the UE to the slave eNB is determined, to transmit an HO trigger request message including identification information for the target slave eNB to a source slave eNB when an HO Ack message is received from the target slave eNB, and to transmit an HO success indicator to the source slave eNB when a resource release message is received from the target slave eNB. 13. The master eNB of claim 12, wherein the HO request message includes at least one of information indicating that the UE is in a dual connectivity mode, identification information of the source slave eNB of the UE, and flow information related to the source slave eNB. 14. The master eNB of claim 12, wherein the controller is further configured to transmit the HO trigger request message to the source slave eNB to allow the source slave eNB to transmit UE context information to the target slave eNB. 15. The master eNB of claim 12, wherein the controller is further configured to transmit the HO indicator to the source slave eNB to allow the source salve eNB to delete UE content information. 16. The master eNB of claim 12, wherein the target slave eNB, having received the HO request message, does not perform an HO process with a core network. 17. The master eNB of claim 12, wherein the target slave eNB, having received the HO request message, performs an HO process with a core network. 18. A master evolved Node B (eNB) for supporting a Handover (HO) in a wireless communication system supporting dual connectivity of a User Equipment (UE) for the master eNB and a slave eNB, the master eNB comprising: a transceiver configured to transmit/receive signals to/from the UE or nodes of the wireless communication system; and a controller configured to transmit an HO request message to a target master eNB when an HO of the UE to the master eNB is determined, to transmit an HO trigger indicator to a source slave eNB when an HO Ack message is received from the target master eNB, and to transmit an HO success indicator to the source slave eNB when a resource release message is received from the target master eNB. 19. The master eNB of claim 18, wherein the HO request message includes at least one of information indicating that the UE is in a dual connectivity mode, identification information of the source slave eNB of the UE, and flow information of the master eNB. 20. The master eNB of claim 19, wherein the HO request message further includes flow information related to the source slave eNB. 21. The master eNB of claim 18, wherein the controller is further configured to transmit the HO trigger indicator to the source slave eNB to allow the source slave eNB to buffer a dual connectivity-related message until the HO is completed. 22. The master eNB of claim 18, wherein the controller is further configured to transmit the HO success indicator to the source slave eNB to allow the source slave eNB and the target master eNB to form dual connectivity.
A method of supporting a Handover (HO) by a master evolved Node B (eNB) in a wireless communication system supporting dual connectivity of a User Equipment (UE) for the master eNB and a slave eNB is provided. The method includes when an HO of the UE to the slave eNB is determined, transmitting an HO request message to a target slave eNB, when a HO Ack message is received from the target slave eNB, transmitting an HO trigger request message including identification information of the target slave eNB to a source slave eNB, and when a resource release message is received from the target slave eNB, transmitting an HO success indicator to the source slave eNB.1. A method of supporting a Handover (HO) by a master evolved Node B (eNB) in a wireless communication system supporting dual connectivity of a User Equipment (UE) for the master eNB and a slave eNB, the method comprising: when an HO of the UE to the slave eNB is determined, transmitting an HO request message to a target slave eNB; when a HO Ack message is received from the target slave eNB, transmitting an HO trigger request message including identification information of the target slave eNB to a source slave eNB; and when a resource release message is received from the target slave eNB, transmitting an HO success indicator to the source slave eNB. 2. The method of claim 1, wherein the HO request message includes at least one of information indicating that the UE is in a dual connectivity mode, identification information of the source slave eNB of the UE, and flow information related to the source slave eNB. 3. The method of claim 1, wherein transmitting the HO trigger request message comprises transmitting the HO trigger request message to the source slave eNB to allow the source slave eNB to transmit UE context information to the target slave eNB. 4. The method of claim 1, wherein transmitting the HO indicator comprises transmitting the HO indicator to the source slave eNB to allow the source slave eNB to delete the UE context information. 5. The method of claim 1, wherein the target slave eNB, having received the HO request message, does not perform an HO process with a core network. 6. The method of claim 1, wherein the target slave eNB, having received the HO request message, performs an HO process with a core network. 7. A method of supporting a Handover (HO) by a master evolved Node B (eNB) in a wireless communication system supporting dual connectivity of a user equipment (UE) for the master eNB and a slave eNB, the method comprising: when an HO of the UE to the master eNB is determined, transmitting an HO request message to a target master eNB; when an HO Ack message is received from the target master eNB, transmitting an HO trigger indicator to a source slave eNB; and when a resource release message is received from the target master eNB, transmitting an HO success indicator to the source slave eNB. 8. The method of claim 7, wherein the HO request message includes information indicating that the UE is in a dual connectivity mode, identification information of the source slave eNB of the UE, and flow information of the master eNB. 9. The method of claim 8, wherein the HO request message further includes flow information related to the source slave eNB. 10. The method of claim 7, wherein transmitting the HO trigger indicator comprises transmitting the HO trigger indicator to the source slave eNB to allow the source slave eNB to buffer a dual connectivity-related message until the HO is completed. 11. The method of claim 7, wherein transmitting the HO success indicator comprises transmitting the HO success indicator to the source slave eNB to allow the source slave eNB and the target master eNB to form dual connectivity. 12. A master evolved Node B (eNB) for supporting a Handover (HO) in a wireless communication system supporting dual connectivity of a User Equipment (UE) for the master eNB and a slave eNB, the master eNB comprising: a transceiver configured to transmit/receive signals to/from the UE or nodes of the wireless communication system; and a controller configured to transmit an HO request message to a target slave eNB when an HO of the UE to the slave eNB is determined, to transmit an HO trigger request message including identification information for the target slave eNB to a source slave eNB when an HO Ack message is received from the target slave eNB, and to transmit an HO success indicator to the source slave eNB when a resource release message is received from the target slave eNB. 13. The master eNB of claim 12, wherein the HO request message includes at least one of information indicating that the UE is in a dual connectivity mode, identification information of the source slave eNB of the UE, and flow information related to the source slave eNB. 14. The master eNB of claim 12, wherein the controller is further configured to transmit the HO trigger request message to the source slave eNB to allow the source slave eNB to transmit UE context information to the target slave eNB. 15. The master eNB of claim 12, wherein the controller is further configured to transmit the HO indicator to the source slave eNB to allow the source salve eNB to delete UE content information. 16. The master eNB of claim 12, wherein the target slave eNB, having received the HO request message, does not perform an HO process with a core network. 17. The master eNB of claim 12, wherein the target slave eNB, having received the HO request message, performs an HO process with a core network. 18. A master evolved Node B (eNB) for supporting a Handover (HO) in a wireless communication system supporting dual connectivity of a User Equipment (UE) for the master eNB and a slave eNB, the master eNB comprising: a transceiver configured to transmit/receive signals to/from the UE or nodes of the wireless communication system; and a controller configured to transmit an HO request message to a target master eNB when an HO of the UE to the master eNB is determined, to transmit an HO trigger indicator to a source slave eNB when an HO Ack message is received from the target master eNB, and to transmit an HO success indicator to the source slave eNB when a resource release message is received from the target master eNB. 19. The master eNB of claim 18, wherein the HO request message includes at least one of information indicating that the UE is in a dual connectivity mode, identification information of the source slave eNB of the UE, and flow information of the master eNB. 20. The master eNB of claim 19, wherein the HO request message further includes flow information related to the source slave eNB. 21. The master eNB of claim 18, wherein the controller is further configured to transmit the HO trigger indicator to the source slave eNB to allow the source slave eNB to buffer a dual connectivity-related message until the HO is completed. 22. The master eNB of claim 18, wherein the controller is further configured to transmit the HO success indicator to the source slave eNB to allow the source slave eNB and the target master eNB to form dual connectivity.
2,400
7,284
7,284
14,542,481
2,435
A technique is introduced that can securely displaying decrypted images while preventing these decrypted images against an attempt to capture such. Some aspects of the technique include loading a cryptographic shader into a graphics processor unit (GPU) in the recipient's computer device separate from the CPU in the recipient's computer device. In some embodiments, the cryptographic shader that is loaded includes instructions that implement a white-box cryptographic algorithm to decrypt encrypted images. A cryptographic key is integrated within the white-box cryptographic algorithm so that the cryptographic key is protected from extraction. When the GPU receives the encrypted images, the cryptographic shader can perform decryption processes to generate decrypted images. The decrypted images are loaded by the GPU directly from the GPU into a frame buffer such that the decrypted images are to be displayed without any portion of the decrypted images passing through the CPU.
1. A method in a mobile computing device for protecting sensitive information that is to be displayed by the mobile computing device, the method comprising: loading a cryptographic shader into a graphics processor unit (GPU) in the mobile computing device separate from a central processing unit (CPU) in the mobile computing device, wherein the cryptographic shader includes instructions that implement a white-box cryptographic algorithm, wherein a cryptographic key is integrated within the white-box cryptographic algorithm so that the cryptographic key is protected from extraction, and wherein the white-box cryptographic algorithm is configured to decrypt encrypted images; receiving, at the mobile computing device, the sensitive information in the form of an encrypted image from a remote server via a wireless communication network, wherein the encrypted image has been encrypted by the remote server with the cryptographic key; transferring, by the CPU in the mobile computing device, the encrypted image from a main memory in the mobile computing device to the GPU; generating, by the GPU, a decrypted image by decrypting the encrypted image using the cryptographic shader loaded in the GPU; and loading the decrypted image directly from the GPU into a frame buffer that is coupled to the GPU and associated with a display device of the mobile computing device, for display by the display device, without any portion of the decrypted image passing through the CPU or the main memory. 2. The method of claim 1, further comprising: receiving a signal, from the remote server, that signifies a change in at least one of the cryptographic algorithm or the cryptographic key; and loading, in response to and based on the signal, a new cryptographic shader into the GPU in the mobile computing device, wherein the new cryptographic shader includes instructions that implement a different white-box cryptographic algorithm. 3. The method of claim 1, further comprising: receiving a signal from the remote server; and calculating a hash value based on a hash function using the received signal, wherein the hash value represents which cryptographic shader, out of a plurality of available cryptographic shaders stored in the main memory, is to be loaded into the GPU in order to correctly decrypt the encrypted image. 4. The method of claim 1, wherein said transferring comprises: the CPU loading the encrypted image from the main memory to an input buffer coupled to the GPU, wherein the decrypted image, after being decrypted by the cryptographic shader, is neither stored back to the input buffer nor the main memory. 5. The method of claim 1, further comprising: receiving the cryptographic shader from the remote server via a secured network communications protocol. 6. A method for protecting information to be displayed on a computing device, the method comprising: loading a cryptographic shader into a coprocessor unit in the computing device separate from a central processing unit (CPU) in the computing device, wherein the cryptographic shader includes instructions that implement a cryptographic algorithm configured to decrypt encrypted images; decrypting, by the cryptographic shader loaded in the coprocessor unit, an encrypted image to produce decrypted image data; and loading the decrypted image data directly from the coprocessor unit into a frame buffer that is coupled to the coprocessor unit and associated with a display of the computing device such that the decrypted image data does not pass through the CPU. 7. The method of claim 6, wherein the cryptographic algorithm is a white-box cryptographic algorithm within which a cryptographic key is integrated. 8. The method of claim 6, further comprising: prior to said decrypting, receiving the encrypted image from a remote server via a network, wherein the encrypted image has been encrypted by the remote server with an encryption key that corresponds to a cryptographic key integrated in the cryptographic algorithm. 9. The method of claim 6, further comprising: receiving a signal that signifies a change in at least one of the cryptographic algorithm or a cryptographic key integrated in the cryptographic algorithm; and loading, based on the signal, a new cryptographic shader into the coprocessor unit in the computing device, wherein the new cryptographic shader includes at least one of a different cryptographic algorithm or a different cryptographic key. 10. The method of claim 6, further comprising: receiving a signal; and locating, based on the received signal, the cryptographic shader from a plurality of available cryptographic shaders. 11. The method of claim 10, further comprising: receiving the plurality of available cryptographic shaders from a remote server. 12. The method of claim 6, further comprising: loading, by the CPU, the encrypted image from a main memory of the computing device to an input buffer coupled to the coprocessor unit in the computing device without storing the decrypted image data back to the input buffer or the main memory after decryption by the cryptographic shader. 13. The method of claim 6, further comprising: receiving the cryptographic shader from a remote server. 14. A computing device comprising: a communication device to receive an encrypted image from a remote device; a display; a central processor unit (CPU); and a graphics processor unit (GPU) separate from the CPU, wherein the CPU is configured to load a cryptographic shader into the GPU, wherein the cryptographic shader includes instructions that implement a cryptographic algorithm that is configured to decrypt encrypted images, wherein the GPU is configured to decrypt, by the cryptographic shader loaded in the GPU, the encrypted image to produce a decrypted image, and wherein the GPU is further configured to load image data decrypted from the encrypted image directly from the GPU into a frame buffer that is coupled to the GPU, such that the decrypted image is subsequently displayed by the display without the decrypted image data having passed through the CPU. 15. The device of claim 14, wherein the cryptographic algorithm is a white-box cryptographic algorithm within which a cryptographic key is integrated. 16. The device of claim 14, further comprising: communications circuitry configured to receive the encrypted image from a remote server via a network, wherein the encrypted image is encrypted by the remote server with an encryption key that corresponds to the cryptographic key integrated in the cryptographic algorithm. 17. The device of claim 14, wherein the CPU or the GPU is further configured to: in response to receiving a signal that signifies a change in at least one of the cryptographic algorithm or a cryptographic key integrated in the cryptographic algorithm, load, based on the signal, a new cryptographic shader into the GPU, wherein the new cryptographic shader includes either a different cryptographic algorithm or a different cryptographic key or both. 18. The device of claim 14, wherein the CPU or the GPU is further configured to: In response to receiving a signal, locate, based on the received signal, the cryptographic shader from a plurality of available cryptographic shaders. 19. The device of claim 18, further comprising: communications circuitry configured to receive the plurality of available cryptographic shaders from a remote server. 20. The device of claim 14, wherein the CPU is further configured to: load the encrypted image from a main memory to an input buffer coupled to the GPU, wherein the decrypted image data, after being decrypted by the cryptographic shader, is neither stored back to the input buffer nor the main memory.
A technique is introduced that can securely displaying decrypted images while preventing these decrypted images against an attempt to capture such. Some aspects of the technique include loading a cryptographic shader into a graphics processor unit (GPU) in the recipient's computer device separate from the CPU in the recipient's computer device. In some embodiments, the cryptographic shader that is loaded includes instructions that implement a white-box cryptographic algorithm to decrypt encrypted images. A cryptographic key is integrated within the white-box cryptographic algorithm so that the cryptographic key is protected from extraction. When the GPU receives the encrypted images, the cryptographic shader can perform decryption processes to generate decrypted images. The decrypted images are loaded by the GPU directly from the GPU into a frame buffer such that the decrypted images are to be displayed without any portion of the decrypted images passing through the CPU.1. A method in a mobile computing device for protecting sensitive information that is to be displayed by the mobile computing device, the method comprising: loading a cryptographic shader into a graphics processor unit (GPU) in the mobile computing device separate from a central processing unit (CPU) in the mobile computing device, wherein the cryptographic shader includes instructions that implement a white-box cryptographic algorithm, wherein a cryptographic key is integrated within the white-box cryptographic algorithm so that the cryptographic key is protected from extraction, and wherein the white-box cryptographic algorithm is configured to decrypt encrypted images; receiving, at the mobile computing device, the sensitive information in the form of an encrypted image from a remote server via a wireless communication network, wherein the encrypted image has been encrypted by the remote server with the cryptographic key; transferring, by the CPU in the mobile computing device, the encrypted image from a main memory in the mobile computing device to the GPU; generating, by the GPU, a decrypted image by decrypting the encrypted image using the cryptographic shader loaded in the GPU; and loading the decrypted image directly from the GPU into a frame buffer that is coupled to the GPU and associated with a display device of the mobile computing device, for display by the display device, without any portion of the decrypted image passing through the CPU or the main memory. 2. The method of claim 1, further comprising: receiving a signal, from the remote server, that signifies a change in at least one of the cryptographic algorithm or the cryptographic key; and loading, in response to and based on the signal, a new cryptographic shader into the GPU in the mobile computing device, wherein the new cryptographic shader includes instructions that implement a different white-box cryptographic algorithm. 3. The method of claim 1, further comprising: receiving a signal from the remote server; and calculating a hash value based on a hash function using the received signal, wherein the hash value represents which cryptographic shader, out of a plurality of available cryptographic shaders stored in the main memory, is to be loaded into the GPU in order to correctly decrypt the encrypted image. 4. The method of claim 1, wherein said transferring comprises: the CPU loading the encrypted image from the main memory to an input buffer coupled to the GPU, wherein the decrypted image, after being decrypted by the cryptographic shader, is neither stored back to the input buffer nor the main memory. 5. The method of claim 1, further comprising: receiving the cryptographic shader from the remote server via a secured network communications protocol. 6. A method for protecting information to be displayed on a computing device, the method comprising: loading a cryptographic shader into a coprocessor unit in the computing device separate from a central processing unit (CPU) in the computing device, wherein the cryptographic shader includes instructions that implement a cryptographic algorithm configured to decrypt encrypted images; decrypting, by the cryptographic shader loaded in the coprocessor unit, an encrypted image to produce decrypted image data; and loading the decrypted image data directly from the coprocessor unit into a frame buffer that is coupled to the coprocessor unit and associated with a display of the computing device such that the decrypted image data does not pass through the CPU. 7. The method of claim 6, wherein the cryptographic algorithm is a white-box cryptographic algorithm within which a cryptographic key is integrated. 8. The method of claim 6, further comprising: prior to said decrypting, receiving the encrypted image from a remote server via a network, wherein the encrypted image has been encrypted by the remote server with an encryption key that corresponds to a cryptographic key integrated in the cryptographic algorithm. 9. The method of claim 6, further comprising: receiving a signal that signifies a change in at least one of the cryptographic algorithm or a cryptographic key integrated in the cryptographic algorithm; and loading, based on the signal, a new cryptographic shader into the coprocessor unit in the computing device, wherein the new cryptographic shader includes at least one of a different cryptographic algorithm or a different cryptographic key. 10. The method of claim 6, further comprising: receiving a signal; and locating, based on the received signal, the cryptographic shader from a plurality of available cryptographic shaders. 11. The method of claim 10, further comprising: receiving the plurality of available cryptographic shaders from a remote server. 12. The method of claim 6, further comprising: loading, by the CPU, the encrypted image from a main memory of the computing device to an input buffer coupled to the coprocessor unit in the computing device without storing the decrypted image data back to the input buffer or the main memory after decryption by the cryptographic shader. 13. The method of claim 6, further comprising: receiving the cryptographic shader from a remote server. 14. A computing device comprising: a communication device to receive an encrypted image from a remote device; a display; a central processor unit (CPU); and a graphics processor unit (GPU) separate from the CPU, wherein the CPU is configured to load a cryptographic shader into the GPU, wherein the cryptographic shader includes instructions that implement a cryptographic algorithm that is configured to decrypt encrypted images, wherein the GPU is configured to decrypt, by the cryptographic shader loaded in the GPU, the encrypted image to produce a decrypted image, and wherein the GPU is further configured to load image data decrypted from the encrypted image directly from the GPU into a frame buffer that is coupled to the GPU, such that the decrypted image is subsequently displayed by the display without the decrypted image data having passed through the CPU. 15. The device of claim 14, wherein the cryptographic algorithm is a white-box cryptographic algorithm within which a cryptographic key is integrated. 16. The device of claim 14, further comprising: communications circuitry configured to receive the encrypted image from a remote server via a network, wherein the encrypted image is encrypted by the remote server with an encryption key that corresponds to the cryptographic key integrated in the cryptographic algorithm. 17. The device of claim 14, wherein the CPU or the GPU is further configured to: in response to receiving a signal that signifies a change in at least one of the cryptographic algorithm or a cryptographic key integrated in the cryptographic algorithm, load, based on the signal, a new cryptographic shader into the GPU, wherein the new cryptographic shader includes either a different cryptographic algorithm or a different cryptographic key or both. 18. The device of claim 14, wherein the CPU or the GPU is further configured to: In response to receiving a signal, locate, based on the received signal, the cryptographic shader from a plurality of available cryptographic shaders. 19. The device of claim 18, further comprising: communications circuitry configured to receive the plurality of available cryptographic shaders from a remote server. 20. The device of claim 14, wherein the CPU is further configured to: load the encrypted image from a main memory to an input buffer coupled to the GPU, wherein the decrypted image data, after being decrypted by the cryptographic shader, is neither stored back to the input buffer nor the main memory.
2,400
7,285
7,285
14,819,076
2,476
Network insights may be useful in various communication networks. For example, certain cellular or similar networks may benefit from the delivery of cellular network insights to subscriber devices based on virtual international mobile subscriber identity (IMSI). For example, a method can include detecting, by a device, at least one paging message over a cellular system. The method can also include extracting, from the at least one paging message, at least one cellular network insight including at least one cellular network condition. The paging message may include a virtual IMSI.
1. A method, comprising: detecting, by a device, at least one paging message over a cellular system; and extracting, from the at least one paging message, at least one cellular network insight comprising at least one cellular network condition. 2. The method of claim 1, wherein an international mobile subscriber identity (IMSI) value is used to convey that a cellular network insight is being provided. 3. The method of claim 2, wherein the IMSI value used is configured to additionally convey at least one of: uplink congestion, downlink congestion, or a randomization interval over which the user equipment should wait before performing access. 4. The method of claim 2, wherein the selection of the IMSI value, is further configured to convey which user equipment vendor category is being informed of the cellular network congestion information. 5. The method of claim 1, wherein the detecting is performed by an application on the device. 6. The method of claim 1, wherein the device comprises a user equipment. 7. The method of claim 1, wherein extracting the cellular networking insight comprises at least one of extracting cellular system information from the paging message; or verifying the paging message matches a predetermined value. 8. The method of claim 1, wherein the cellular network condition encoded in the at least one cellular network insight is configured to convey that the condition corresponds to at least one specific cellular network access point and wherein the condition is configured to convey at least one of a cellular access point congestion condition or an expected cellular network throughput condition. 9. A method, comprising: detecting, at a device, a first level of network congestion on a cellular network; and in response to the detecting of the first level of network congestion, transmitting a paging message, wherein the paging message comprises an international mobile subscriber identity (IMSI) value over the cellular network, wherein the IMSI value encodes the first level of network congestion on the cellular network. 10. The method of claim 9, wherein the transmitting is further contingent on detecting that at least one aware user equipment is known to be within a corresponding cell or tracking area, or is known to be checking the paging message at a corresponding discontinuous reception wake up/offset time. 11. The method of claim 9, wherein no re-paging is performed with respect to the paging message. 12. The method of claim 9, wherein the IMSI value is created locally at the device based on local knowledge of congestion on the uplink and/or downlink. 13. The method of claim 9, further comprising: detecting, by the device, a second level of network congestion on the cellular network; and in response to the detecting of the second level of network congestion, transmitting a second IMSI value over the cellular network, wherein the second IMSI value encodes the second level of network congestion. 14. The method of claim 9, wherein the detecting the first level is performed by an access node. 15. The method of claim 14, wherein the access node comprises at least one of an access point, a base station, or an evolved Node B. 16. An apparatus, comprising: at least one processor; and at least one memory including computer program code, wherein the at least one memory and the computer program code are configured to, with the at least one processor, cause the apparatus at least to detect, by a device, at least one paging message over a cellular system; and extract, from the at least one paging message, at least one cellular network insight comprising at least one cellular network condition. 17. The apparatus of claim 16, wherein an international mobile subscriber identity (IMSI) value is used to convey that a cellular network insight is being provided. 18. The apparatus of claim 17, wherein the IMSI value used is configured to additionally convey at least one of: uplink congestion, downlink congestion, or a randomization interval over which the user equipment should wait before performing access. 19. The apparatus of claim 17, wherein the selection of the IMSI value, is further configured to convey which user equipment vendor category is being informed of the cellular network congestion information. 20. The apparatus of claim 16, wherein the detection is performed by an application on the device. 21. The apparatus of claim 16, wherein the device comprises a user equipment. 22. The apparatus of claim 16, wherein extraction of the cellular networking insight comprises at least one of extracting cellular system information from the paging message; or verifying the paging message matches a predetermined value. 23. The apparatus of claim 16, wherein the cellular network condition encoded in the at least one cellular network insight is configured to convey that the condition corresponds to at least one specific cellular network access point and wherein the condition is configured to convey at least one of a cellular access point congestion condition or an expected cellular network throughput condition. 24. An apparatus, comprising: at least one processor; and at least one memory including computer program code, wherein the at least one memory and the computer program code are configured to, with the at least one processor, cause the apparatus at least to detect, at a device, a first level of network congestion on a cellular network; and in response to the detection of the first level of network congestion, transmit a paging message, wherein the paging message comprises an international mobile subscriber identity (IMSI) value over the cellular network, wherein the IMSI value encodes the first level of network congestion on the cellular network. 25. The apparatus of claim 24, wherein the transmission is further contingent on detecting that at least one aware user equipment is known to be within a corresponding cell or tracking area, or is known to be checking the paging message at a corresponding discontinuous reception wake up/offset time. 26. The apparatus of claim 24, wherein the at least one memory and the computer program code are configured to, with the at least one processor, cause the apparatus at least to omit re-paging with respect to the paging message. 27. The apparatus of claim 24, wherein the IMSI value is created locally at the device based on local knowledge of congestion on the uplink and/or downlink. 28. The apparatus of claim 24, wherein the at least one memory and the computer program code are configured to, with the at least one processor, cause the apparatus at least to: detect, by the device, a second level of network congestion on the cellular network; and in response to the detection of the second level of network congestion, transmit a second IMSI value over the cellular network, wherein the second IMSI value encodes the second level of network congestion. 29. The apparatus of claim 24, wherein the detection of the first level is performed by an access node. 30. The apparatus of claim 29, wherein the access node comprises at least one of an access point, a base station, or an evolved Node B.
Network insights may be useful in various communication networks. For example, certain cellular or similar networks may benefit from the delivery of cellular network insights to subscriber devices based on virtual international mobile subscriber identity (IMSI). For example, a method can include detecting, by a device, at least one paging message over a cellular system. The method can also include extracting, from the at least one paging message, at least one cellular network insight including at least one cellular network condition. The paging message may include a virtual IMSI.1. A method, comprising: detecting, by a device, at least one paging message over a cellular system; and extracting, from the at least one paging message, at least one cellular network insight comprising at least one cellular network condition. 2. The method of claim 1, wherein an international mobile subscriber identity (IMSI) value is used to convey that a cellular network insight is being provided. 3. The method of claim 2, wherein the IMSI value used is configured to additionally convey at least one of: uplink congestion, downlink congestion, or a randomization interval over which the user equipment should wait before performing access. 4. The method of claim 2, wherein the selection of the IMSI value, is further configured to convey which user equipment vendor category is being informed of the cellular network congestion information. 5. The method of claim 1, wherein the detecting is performed by an application on the device. 6. The method of claim 1, wherein the device comprises a user equipment. 7. The method of claim 1, wherein extracting the cellular networking insight comprises at least one of extracting cellular system information from the paging message; or verifying the paging message matches a predetermined value. 8. The method of claim 1, wherein the cellular network condition encoded in the at least one cellular network insight is configured to convey that the condition corresponds to at least one specific cellular network access point and wherein the condition is configured to convey at least one of a cellular access point congestion condition or an expected cellular network throughput condition. 9. A method, comprising: detecting, at a device, a first level of network congestion on a cellular network; and in response to the detecting of the first level of network congestion, transmitting a paging message, wherein the paging message comprises an international mobile subscriber identity (IMSI) value over the cellular network, wherein the IMSI value encodes the first level of network congestion on the cellular network. 10. The method of claim 9, wherein the transmitting is further contingent on detecting that at least one aware user equipment is known to be within a corresponding cell or tracking area, or is known to be checking the paging message at a corresponding discontinuous reception wake up/offset time. 11. The method of claim 9, wherein no re-paging is performed with respect to the paging message. 12. The method of claim 9, wherein the IMSI value is created locally at the device based on local knowledge of congestion on the uplink and/or downlink. 13. The method of claim 9, further comprising: detecting, by the device, a second level of network congestion on the cellular network; and in response to the detecting of the second level of network congestion, transmitting a second IMSI value over the cellular network, wherein the second IMSI value encodes the second level of network congestion. 14. The method of claim 9, wherein the detecting the first level is performed by an access node. 15. The method of claim 14, wherein the access node comprises at least one of an access point, a base station, or an evolved Node B. 16. An apparatus, comprising: at least one processor; and at least one memory including computer program code, wherein the at least one memory and the computer program code are configured to, with the at least one processor, cause the apparatus at least to detect, by a device, at least one paging message over a cellular system; and extract, from the at least one paging message, at least one cellular network insight comprising at least one cellular network condition. 17. The apparatus of claim 16, wherein an international mobile subscriber identity (IMSI) value is used to convey that a cellular network insight is being provided. 18. The apparatus of claim 17, wherein the IMSI value used is configured to additionally convey at least one of: uplink congestion, downlink congestion, or a randomization interval over which the user equipment should wait before performing access. 19. The apparatus of claim 17, wherein the selection of the IMSI value, is further configured to convey which user equipment vendor category is being informed of the cellular network congestion information. 20. The apparatus of claim 16, wherein the detection is performed by an application on the device. 21. The apparatus of claim 16, wherein the device comprises a user equipment. 22. The apparatus of claim 16, wherein extraction of the cellular networking insight comprises at least one of extracting cellular system information from the paging message; or verifying the paging message matches a predetermined value. 23. The apparatus of claim 16, wherein the cellular network condition encoded in the at least one cellular network insight is configured to convey that the condition corresponds to at least one specific cellular network access point and wherein the condition is configured to convey at least one of a cellular access point congestion condition or an expected cellular network throughput condition. 24. An apparatus, comprising: at least one processor; and at least one memory including computer program code, wherein the at least one memory and the computer program code are configured to, with the at least one processor, cause the apparatus at least to detect, at a device, a first level of network congestion on a cellular network; and in response to the detection of the first level of network congestion, transmit a paging message, wherein the paging message comprises an international mobile subscriber identity (IMSI) value over the cellular network, wherein the IMSI value encodes the first level of network congestion on the cellular network. 25. The apparatus of claim 24, wherein the transmission is further contingent on detecting that at least one aware user equipment is known to be within a corresponding cell or tracking area, or is known to be checking the paging message at a corresponding discontinuous reception wake up/offset time. 26. The apparatus of claim 24, wherein the at least one memory and the computer program code are configured to, with the at least one processor, cause the apparatus at least to omit re-paging with respect to the paging message. 27. The apparatus of claim 24, wherein the IMSI value is created locally at the device based on local knowledge of congestion on the uplink and/or downlink. 28. The apparatus of claim 24, wherein the at least one memory and the computer program code are configured to, with the at least one processor, cause the apparatus at least to: detect, by the device, a second level of network congestion on the cellular network; and in response to the detection of the second level of network congestion, transmit a second IMSI value over the cellular network, wherein the second IMSI value encodes the second level of network congestion. 29. The apparatus of claim 24, wherein the detection of the first level is performed by an access node. 30. The apparatus of claim 29, wherein the access node comprises at least one of an access point, a base station, or an evolved Node B.
2,400
7,286
7,286
13,682,415
2,453
Systems and computer program products may rank one user's connections in an electronic social network. The computer system may include a processor and a memory. The computer system may additionally include a program comprising a plurality of instructions stored in memory that are executed by the processor to identify one user's connections with other users in an electronic social network, and analyze a plurality of data sources for electronic communications between the one user and the other users. The program may additionally include a plurality of instructions stored in memory that are executed by the processor to calculate for each of the other users the probability that the one user will communicate with that other user based on the analyzed plurality of data sources, and rank the one user's connections with the other users based on the calculated probabilities.
1-8. (canceled) 9. A computer system, comprising: a processor; a memory; and a program comprising a plurality of instructions stored in the memory that are executed by the processor to: identify one user's connections with other users in an electronic social network; analyze a plurality of data sources for electronic communications between the one user and the other users; calculate for each of the other users the probability that the one user will communicate with that other user based on the analyzed plurality of data sources; and rank the one user's connections with the other users based on the calculated probabilities. 10. The computer system of claim 9, wherein the plurality of instructions further comprises instructions that are executed by the processor to create a graph that represents the one user, the other users, and the one user's connections with the other users. 11. The computer system of claim 10, wherein the plurality of instructions further comprises instructions that are executed by the processor to remove from the graph one or more of the one user's connections based on the ranked one user's connections. 12. The computer system of claim 11, wherein the plurality of instructions further comprises instructions that are executed by the processor to remove from the graph one or more of the one user's connections that are ranked lower than a predetermined threshold ranking. 13. The computer system of claim 9, wherein the plurality of instructions further comprises instructions that are executed by the processor to assign a relative importance value to each data source of the plurality of data sources. 14. The computer system of claim 13, wherein the plurality of instructions further comprises instructions that are executed by the processor to calculate for each of the other users the probability that the one user will communicate with that other user based on a subset of the analyzed plurality of data sources, the subset excluding one or more data sources with a relative importance value below a predetermined threshold importance value. 15. The computer system of claim 13, wherein the plurality of instructions further comprises instructions that are executed by the processor to weight electronic communications data from each data source of the plurality of data sources based on the assigned relative importance value of each data source. 16. The computer system of claim 15, wherein the plurality of instructions further comprises instructions that are executed by the processor to calculate for each of the other users the probability that the one user will communicate with that other user based on the weighted electronic communications data from each data source. 17. A computer program product for ranking one user's connections in an electronic social network, the computer program product comprising: at least one computer readable storage medium having computer readable program instructions embodied therewith, the computer readable program instructions, when read by a processor, being configured to: identify one user's connections with other users in an electronic social network; analyze a plurality of data sources for electronic communications between the one user and the other users; calculate for each of the other users the probability that the one user will communicate with that other user based on the analyzed plurality of data sources; and rank the one user's connections with the other users based on the calculated probabilities. 18. The computer program product of claim 17, wherein the computer readable program instructions, when read by a processor, are further configured to create a graph that represents the one user, the other users, and the one user's connections with the other users. 19. The computer program product of claim 18, wherein the computer readable program instructions, when read by a processor, are further configured to remove from the graph one or more of the one user's connections based on the ranked one user's connections. 20. The computer program product of claim 19, wherein the computer readable program instructions, when read by a processor, are further configured to remove from the graph one or more of the one user's connections that are ranked lower than a predetermined threshold ranking. 21. The computer program product of claim 17, wherein the computer readable program instructions, when read by a processor, are further configured to assign a relative importance value to each data source of the plurality of data sources. 22. The computer program product of claim 21, wherein the computer readable program instructions, when read by a processor, are further configured to calculate for each of the other users the probability that the one user will communicate with that other user based on a subset of the analyzed plurality of data sources, the subset excluding one or more data sources with a relative importance value below a predetermined threshold importance value. 23. The computer program product of claim 21, wherein the computer readable program instructions, when read by a processor, are further configured to weight electronic communications data from each data source of the plurality of data sources based on the assigned relative importance value of each data source. 24. The computer program product of claim 23, wherein the computer readable program instructions, when read by a processor, are further configured to calculate for each of the other users the probability that the one user will communicate with that other user based on the weighted electronic communications data from each data source.
Systems and computer program products may rank one user's connections in an electronic social network. The computer system may include a processor and a memory. The computer system may additionally include a program comprising a plurality of instructions stored in memory that are executed by the processor to identify one user's connections with other users in an electronic social network, and analyze a plurality of data sources for electronic communications between the one user and the other users. The program may additionally include a plurality of instructions stored in memory that are executed by the processor to calculate for each of the other users the probability that the one user will communicate with that other user based on the analyzed plurality of data sources, and rank the one user's connections with the other users based on the calculated probabilities.1-8. (canceled) 9. A computer system, comprising: a processor; a memory; and a program comprising a plurality of instructions stored in the memory that are executed by the processor to: identify one user's connections with other users in an electronic social network; analyze a plurality of data sources for electronic communications between the one user and the other users; calculate for each of the other users the probability that the one user will communicate with that other user based on the analyzed plurality of data sources; and rank the one user's connections with the other users based on the calculated probabilities. 10. The computer system of claim 9, wherein the plurality of instructions further comprises instructions that are executed by the processor to create a graph that represents the one user, the other users, and the one user's connections with the other users. 11. The computer system of claim 10, wherein the plurality of instructions further comprises instructions that are executed by the processor to remove from the graph one or more of the one user's connections based on the ranked one user's connections. 12. The computer system of claim 11, wherein the plurality of instructions further comprises instructions that are executed by the processor to remove from the graph one or more of the one user's connections that are ranked lower than a predetermined threshold ranking. 13. The computer system of claim 9, wherein the plurality of instructions further comprises instructions that are executed by the processor to assign a relative importance value to each data source of the plurality of data sources. 14. The computer system of claim 13, wherein the plurality of instructions further comprises instructions that are executed by the processor to calculate for each of the other users the probability that the one user will communicate with that other user based on a subset of the analyzed plurality of data sources, the subset excluding one or more data sources with a relative importance value below a predetermined threshold importance value. 15. The computer system of claim 13, wherein the plurality of instructions further comprises instructions that are executed by the processor to weight electronic communications data from each data source of the plurality of data sources based on the assigned relative importance value of each data source. 16. The computer system of claim 15, wherein the plurality of instructions further comprises instructions that are executed by the processor to calculate for each of the other users the probability that the one user will communicate with that other user based on the weighted electronic communications data from each data source. 17. A computer program product for ranking one user's connections in an electronic social network, the computer program product comprising: at least one computer readable storage medium having computer readable program instructions embodied therewith, the computer readable program instructions, when read by a processor, being configured to: identify one user's connections with other users in an electronic social network; analyze a plurality of data sources for electronic communications between the one user and the other users; calculate for each of the other users the probability that the one user will communicate with that other user based on the analyzed plurality of data sources; and rank the one user's connections with the other users based on the calculated probabilities. 18. The computer program product of claim 17, wherein the computer readable program instructions, when read by a processor, are further configured to create a graph that represents the one user, the other users, and the one user's connections with the other users. 19. The computer program product of claim 18, wherein the computer readable program instructions, when read by a processor, are further configured to remove from the graph one or more of the one user's connections based on the ranked one user's connections. 20. The computer program product of claim 19, wherein the computer readable program instructions, when read by a processor, are further configured to remove from the graph one or more of the one user's connections that are ranked lower than a predetermined threshold ranking. 21. The computer program product of claim 17, wherein the computer readable program instructions, when read by a processor, are further configured to assign a relative importance value to each data source of the plurality of data sources. 22. The computer program product of claim 21, wherein the computer readable program instructions, when read by a processor, are further configured to calculate for each of the other users the probability that the one user will communicate with that other user based on a subset of the analyzed plurality of data sources, the subset excluding one or more data sources with a relative importance value below a predetermined threshold importance value. 23. The computer program product of claim 21, wherein the computer readable program instructions, when read by a processor, are further configured to weight electronic communications data from each data source of the plurality of data sources based on the assigned relative importance value of each data source. 24. The computer program product of claim 23, wherein the computer readable program instructions, when read by a processor, are further configured to calculate for each of the other users the probability that the one user will communicate with that other user based on the weighted electronic communications data from each data source.
2,400
7,287
7,287
13,831,545
2,449
A mechanism for providing secure feature and key management in integrated circuits is described. An example integrated circuit includes a secure memory to store a secret key, and a security manager core, coupled to the secure memory, to receive a digitally signed command, verify a signature associated with the command using the secret key, and configure operation of the integrated circuit using the command.
1. A method comprising: receiving, by a security manager of an integrated circuit, a digitally signed command; obtaining, by the security manager, a secret key from a secure memory of the integrated circuit; verifying, by the security manager, a signature associated with the command using the secret key, and executing, by the security manager, the command to configure operation of the integrated circuit. 2. The method of claim 1 wherein executing the command comprises: updating a state of a feature of a plurality of features of the integrated circuit, wherein updating the state of the feature causes at least one of: locking the feature, unlocking the feature or configuring the feature. 3. The method of claim 2 wherein an update to the state of the feature is persistent or non-persistent. 4. The method of claim 1 wherein executing the command comprises: delivering one or more keys to one or more components of the integrated circuit, wherein the keys pertain to at least one of: encryption operations of the components, digital rights management operations of the components, password management operations of the components, or authentication operations of the components. 5. The method of claim 1 wherein executing the command comprises: identifying one or more hardware constants and storing the hardware constants in designated storage, the hardware constants comprising at least one of: a product chip identifier, one or more security keys, one or more base keys, or error correction data. 6. The method of claim 1 wherein the command is signed by a root authority, and the secret key is a public key of the root authority. 7. The method of claim 1 wherein the command is signed by a delegate authority. 8. The method of claim 7 wherein verifying the signature associated with the command comprises: obtaining delegate permissions and a public key of the delegate authority from a root signed block signed by a root authority; determining that the signature associated with the command is valid using the public key of the delegate authority; and determining that the command is permitted using the delegate permissions. 9. The method of claim 1 wherein the command is associated with an encrypted payload, the method further comprising: deriving a mixed key using a base key accessible to the security manager; deriving a transport key using the mixed key; decrypting the encrypted payload using the transport key; and delivering the decrypted payload to a feature. 10. An integrated circuit comprising: a secure memory to store a secret key; a security manager (SM) core, coupled to the secure memory, to: receive a digitally signed command; verify a signature associated with the command using the secret key; and configure operation of the integrated circuit using the command. 11. The integrated circuit of claim 10 further comprising: a plurality of features configurable by the SM core. 12. The integrated circuit of claim 11 further comprising: an extractor coupled to the SM core; and a plurality of sub-extractors coupled to the extractor, wherein each of the plurality of sub-extractors is also coupled to one of the plurality of features. 13. The integrated circuit of claim 11 wherein the SM core comprises: a crypto module to verify the signature of the command; an execution engine module to execute the command; a communications module to facilitate communications between the SM core and components of the integrated circuit; and a data storage module to manage internal storage of the SM core and to interface with the secure memory. 14. A method comprising: receiving, by a root authority system, data identifying a command that affects operation of an integrated circuit; singing, by the root authority system, the command using a root authority key to create a root signed block (RSB); and providing the RSB to a security manager of the integrated circuit. 15. The method of claim 14 wherein the RSB is provided to the security manager via a tester interface of the integrated circuit. 16. The method of claim 14 wherein the command instructs the security manager to update to a feature of the integrated circuit, wherein an update to the feature is persistent or non-persistent. 17. The method of claim 14 wherein the command is to deliver one or more keys to components of the integrated circuit, wherein the keys pertain to at least one of: encryption operations of the components, digital rights management operations of the components, password management operations of the components, or authentication operations of the components. 18. The method of claim 14 wherein the command is to store one or more hardware constants within the integrated circuit, the hardware constants comprising at least one of: a product chip identifier, one or more security keys, one or more base keys, or error correction data. 19. A method comprising: receiving, by a root authority system, input parameters indicating a command affecting operation of an integrated circuit; creating, by the root authority system, a root signed block (RSB) comprising the command and delegate permissions associated with a delegate authority system, the RSB being signed by the root authority system; and providing the RSB to a security manager of the integrated circuit. 20. The method of claim 19 wherein the delegate permissions define management capabilities of the delegate authority system over the security manager. 21. The method of claim 19 wherein the RSB further comprises a public key associated with the delegate authority system. 22. The method of claim 19 wherein the RSB further comprises a command template associated with the command. 23. The method of claim 19 wherein the RSB further comprises one or more requirements for a delegate authority signature. 24. The method of claim 19 further comprising delivering the RSB to the delegate authority system. 25. A method comprising: receiving, by a delegate authority system, input parameters including a command affecting operation of an integrated circuit; signing, by the delegate authority system, the delegate input parameters to create a delegate signed block (DSB); and providing the DSB to a security manager of the integrated circuit. 26. The method of claim 25 wherein the input parameters are received as part of a root signed block (RSB) provided by a root authority system. 27. The method of claim 26 wherein the DSB is associated with the RSB, the RSB being provided to the security manager. 28. The method of claim 26 wherein the RSB comprises one or more of: delegate permissions associated with the delegate authority system, a public key associated with the delegate authority system, a command template associated with the command, or requirements for a delegate authority signature. 29. The method of claim 28 wherein the delegate permissions define management capabilities of the delegate authority system over the security manager.
A mechanism for providing secure feature and key management in integrated circuits is described. An example integrated circuit includes a secure memory to store a secret key, and a security manager core, coupled to the secure memory, to receive a digitally signed command, verify a signature associated with the command using the secret key, and configure operation of the integrated circuit using the command.1. A method comprising: receiving, by a security manager of an integrated circuit, a digitally signed command; obtaining, by the security manager, a secret key from a secure memory of the integrated circuit; verifying, by the security manager, a signature associated with the command using the secret key, and executing, by the security manager, the command to configure operation of the integrated circuit. 2. The method of claim 1 wherein executing the command comprises: updating a state of a feature of a plurality of features of the integrated circuit, wherein updating the state of the feature causes at least one of: locking the feature, unlocking the feature or configuring the feature. 3. The method of claim 2 wherein an update to the state of the feature is persistent or non-persistent. 4. The method of claim 1 wherein executing the command comprises: delivering one or more keys to one or more components of the integrated circuit, wherein the keys pertain to at least one of: encryption operations of the components, digital rights management operations of the components, password management operations of the components, or authentication operations of the components. 5. The method of claim 1 wherein executing the command comprises: identifying one or more hardware constants and storing the hardware constants in designated storage, the hardware constants comprising at least one of: a product chip identifier, one or more security keys, one or more base keys, or error correction data. 6. The method of claim 1 wherein the command is signed by a root authority, and the secret key is a public key of the root authority. 7. The method of claim 1 wherein the command is signed by a delegate authority. 8. The method of claim 7 wherein verifying the signature associated with the command comprises: obtaining delegate permissions and a public key of the delegate authority from a root signed block signed by a root authority; determining that the signature associated with the command is valid using the public key of the delegate authority; and determining that the command is permitted using the delegate permissions. 9. The method of claim 1 wherein the command is associated with an encrypted payload, the method further comprising: deriving a mixed key using a base key accessible to the security manager; deriving a transport key using the mixed key; decrypting the encrypted payload using the transport key; and delivering the decrypted payload to a feature. 10. An integrated circuit comprising: a secure memory to store a secret key; a security manager (SM) core, coupled to the secure memory, to: receive a digitally signed command; verify a signature associated with the command using the secret key; and configure operation of the integrated circuit using the command. 11. The integrated circuit of claim 10 further comprising: a plurality of features configurable by the SM core. 12. The integrated circuit of claim 11 further comprising: an extractor coupled to the SM core; and a plurality of sub-extractors coupled to the extractor, wherein each of the plurality of sub-extractors is also coupled to one of the plurality of features. 13. The integrated circuit of claim 11 wherein the SM core comprises: a crypto module to verify the signature of the command; an execution engine module to execute the command; a communications module to facilitate communications between the SM core and components of the integrated circuit; and a data storage module to manage internal storage of the SM core and to interface with the secure memory. 14. A method comprising: receiving, by a root authority system, data identifying a command that affects operation of an integrated circuit; singing, by the root authority system, the command using a root authority key to create a root signed block (RSB); and providing the RSB to a security manager of the integrated circuit. 15. The method of claim 14 wherein the RSB is provided to the security manager via a tester interface of the integrated circuit. 16. The method of claim 14 wherein the command instructs the security manager to update to a feature of the integrated circuit, wherein an update to the feature is persistent or non-persistent. 17. The method of claim 14 wherein the command is to deliver one or more keys to components of the integrated circuit, wherein the keys pertain to at least one of: encryption operations of the components, digital rights management operations of the components, password management operations of the components, or authentication operations of the components. 18. The method of claim 14 wherein the command is to store one or more hardware constants within the integrated circuit, the hardware constants comprising at least one of: a product chip identifier, one or more security keys, one or more base keys, or error correction data. 19. A method comprising: receiving, by a root authority system, input parameters indicating a command affecting operation of an integrated circuit; creating, by the root authority system, a root signed block (RSB) comprising the command and delegate permissions associated with a delegate authority system, the RSB being signed by the root authority system; and providing the RSB to a security manager of the integrated circuit. 20. The method of claim 19 wherein the delegate permissions define management capabilities of the delegate authority system over the security manager. 21. The method of claim 19 wherein the RSB further comprises a public key associated with the delegate authority system. 22. The method of claim 19 wherein the RSB further comprises a command template associated with the command. 23. The method of claim 19 wherein the RSB further comprises one or more requirements for a delegate authority signature. 24. The method of claim 19 further comprising delivering the RSB to the delegate authority system. 25. A method comprising: receiving, by a delegate authority system, input parameters including a command affecting operation of an integrated circuit; signing, by the delegate authority system, the delegate input parameters to create a delegate signed block (DSB); and providing the DSB to a security manager of the integrated circuit. 26. The method of claim 25 wherein the input parameters are received as part of a root signed block (RSB) provided by a root authority system. 27. The method of claim 26 wherein the DSB is associated with the RSB, the RSB being provided to the security manager. 28. The method of claim 26 wherein the RSB comprises one or more of: delegate permissions associated with the delegate authority system, a public key associated with the delegate authority system, a command template associated with the command, or requirements for a delegate authority signature. 29. The method of claim 28 wherein the delegate permissions define management capabilities of the delegate authority system over the security manager.
2,400
7,288
7,288
14,564,965
2,478
An apparatus and method are provided for transmitting data and control information in a wireless communication system. The method includes determining a number of symbols for control information based on a number of data bits and scheduled resources; generating coded control information based on the number of symbols for the control information; generating coded data based on a modulation scheme; multiplexing the coded data and the coded control information; modulating the multiplexed coded control information and coded data by the modulation scheme; and transmitting the modulated coded control information and coded data on a channel based on the scheduled resources.
1. A method for transmitting data and control information, the method comprising the steps of: determining a number of symbols for control information based on a number of data bits and scheduled resources; generating coded control information based on the number of symbols for the control information; generating coded data based on a modulation scheme; multiplexing the coded data and the coded control information; modulating the multiplexed coded control information and coded data by the modulation scheme; and transmitting the modulated coded control information and coded data on a channel based on the scheduled resources. 2. The method of claim 1, wherein generating the coded control information is further based on the modulation scheme with the control information. 3. The method of claim 1, wherein the control information comprises acknowledge/non-acknowledge (ACK/NACK) information or a Channel Quality Indicator (CQI). 4. The method of claim 1, wherein the number of symbols for the control information is proportional to a quantity of the scheduled resources. 5. The method of claim 1, wherein the number of symbols for the control information is inversely proportional to the number of the data bits. 6. The method of claim 1, further comprising performing fast fourier transform (FFT) and performing inverse FFT (IFFT) to the modulated coded control information and coded data. 7. The method of claim 1, wherein the coded data is transmitted by using remaining resources not used for the coded control information. 8. An apparatus for transmitting data and control information, the apparatus comprising: a controller configure to: determine a number of symbols for control information based on a number of data bits and scheduled resources, generate coded control information based on the number of symbols for the control information, generate coded data based on a modulation scheme, multiplex the coded data and the coded control information, and modulate the multiplexed coded control information and coded data by the modulation scheme; and a transmitter configured to transmit the modulated coded control information and coded data on a channel based on the scheduled resources. 9. The apparatus of claim 8, wherein the coded control information is generated further based on the modulation scheme with the control information. 10. The apparatus of claim 8, the control information comprises acknowledge/non-acknowledge (ACK/NACK) information or a Channel Quality Indicator (CQI). 11. The apparatus of claim 8, wherein the number of symbols for the control information is proportional to a quantity of the scheduled resources. 12. The apparatus of claim 8, wherein the number of symbols for the control information is inversely proportional to a number of the data bits. 13. The apparatus of claim 8, wherein the controller is further configured to perform fast fourier transform (FFT) and perform inverse FFT (IFFT) to the modulated coded control information and coded data. 14. The apparatus of claim 8, wherein the transmitter transmits the coded data by using remaining resources not used for the coded control information. 15. A method for receiving data and control information, the method comprising the steps of: receiving coded control information and coded data on a channel based on scheduled resources; determining a number of symbols for the control information based on a number of data bits and the scheduled resources; demultiplexing the received coded control information and coded data based on the number of symbols for the control information; and demodulating the demultiplexed coded control information and coded data by a modulation scheme. 16. The method of claim 15, wherein the coded control information is generated based on the modulation scheme with the control information and the number of symbols for the control information. 17. The method of claim 15, wherein the control information comprises acknowledge/non-acknowledge (ACK/NACK) information or a Channel Quality Indicator (CQI). 18. The method of claim 15, wherein the number of symbols for the control information is proportional to a quantity of the scheduled resources. 19. The method of claim 15, wherein the number of symbols for the control information is inversely proportional to a number of the data bits. 20. The method of claim 15, further comprising performing inverse fast fourier transform (IFFT) and performing FFT to the received coded control information and coded data. 21. The method of claim 15, wherein the coded data is received by using remaining resources not used for the coded control information. 22. An apparatus for receiving data and control information, the apparatus comprising: a receiver configured to receive coded control information and coded data on a channel based on scheduled resources; and a controller configure to: determine a number of symbols for the control information based on a number of data bits and the scheduled resources, demultiplex the received coded control information and coded data based on the number of symbols for the control information, and demodulate the demultiplexed coded control information and coded data by a modulation scheme. 23. The method of claim 22, wherein the coded control information is generated based on the modulation scheme with the control information and the number of symbols for the control information. 24. The method of claim 22, wherein the control information comprises acknowledge/non-acknowledge (ACK/NACK) information or a Channel Quality Indicator (CQI). 25. The method of claim 22, wherein the number of symbols for the control information is proportional to a quantity of the scheduled resources. 26. The method of claim 22, wherein the number of symbols for the control information is inversely proportional to a number of the data bits. 27. The method of claim 22, wherein the controller is further configured to perform inverse fast fourier transform (IFFT) and perform FFT to the received coded control information and coded data. 28. The method of claim 27, wherein the receiver receives the coded data by using remaining resources not used for the coded control information.
An apparatus and method are provided for transmitting data and control information in a wireless communication system. The method includes determining a number of symbols for control information based on a number of data bits and scheduled resources; generating coded control information based on the number of symbols for the control information; generating coded data based on a modulation scheme; multiplexing the coded data and the coded control information; modulating the multiplexed coded control information and coded data by the modulation scheme; and transmitting the modulated coded control information and coded data on a channel based on the scheduled resources.1. A method for transmitting data and control information, the method comprising the steps of: determining a number of symbols for control information based on a number of data bits and scheduled resources; generating coded control information based on the number of symbols for the control information; generating coded data based on a modulation scheme; multiplexing the coded data and the coded control information; modulating the multiplexed coded control information and coded data by the modulation scheme; and transmitting the modulated coded control information and coded data on a channel based on the scheduled resources. 2. The method of claim 1, wherein generating the coded control information is further based on the modulation scheme with the control information. 3. The method of claim 1, wherein the control information comprises acknowledge/non-acknowledge (ACK/NACK) information or a Channel Quality Indicator (CQI). 4. The method of claim 1, wherein the number of symbols for the control information is proportional to a quantity of the scheduled resources. 5. The method of claim 1, wherein the number of symbols for the control information is inversely proportional to the number of the data bits. 6. The method of claim 1, further comprising performing fast fourier transform (FFT) and performing inverse FFT (IFFT) to the modulated coded control information and coded data. 7. The method of claim 1, wherein the coded data is transmitted by using remaining resources not used for the coded control information. 8. An apparatus for transmitting data and control information, the apparatus comprising: a controller configure to: determine a number of symbols for control information based on a number of data bits and scheduled resources, generate coded control information based on the number of symbols for the control information, generate coded data based on a modulation scheme, multiplex the coded data and the coded control information, and modulate the multiplexed coded control information and coded data by the modulation scheme; and a transmitter configured to transmit the modulated coded control information and coded data on a channel based on the scheduled resources. 9. The apparatus of claim 8, wherein the coded control information is generated further based on the modulation scheme with the control information. 10. The apparatus of claim 8, the control information comprises acknowledge/non-acknowledge (ACK/NACK) information or a Channel Quality Indicator (CQI). 11. The apparatus of claim 8, wherein the number of symbols for the control information is proportional to a quantity of the scheduled resources. 12. The apparatus of claim 8, wherein the number of symbols for the control information is inversely proportional to a number of the data bits. 13. The apparatus of claim 8, wherein the controller is further configured to perform fast fourier transform (FFT) and perform inverse FFT (IFFT) to the modulated coded control information and coded data. 14. The apparatus of claim 8, wherein the transmitter transmits the coded data by using remaining resources not used for the coded control information. 15. A method for receiving data and control information, the method comprising the steps of: receiving coded control information and coded data on a channel based on scheduled resources; determining a number of symbols for the control information based on a number of data bits and the scheduled resources; demultiplexing the received coded control information and coded data based on the number of symbols for the control information; and demodulating the demultiplexed coded control information and coded data by a modulation scheme. 16. The method of claim 15, wherein the coded control information is generated based on the modulation scheme with the control information and the number of symbols for the control information. 17. The method of claim 15, wherein the control information comprises acknowledge/non-acknowledge (ACK/NACK) information or a Channel Quality Indicator (CQI). 18. The method of claim 15, wherein the number of symbols for the control information is proportional to a quantity of the scheduled resources. 19. The method of claim 15, wherein the number of symbols for the control information is inversely proportional to a number of the data bits. 20. The method of claim 15, further comprising performing inverse fast fourier transform (IFFT) and performing FFT to the received coded control information and coded data. 21. The method of claim 15, wherein the coded data is received by using remaining resources not used for the coded control information. 22. An apparatus for receiving data and control information, the apparatus comprising: a receiver configured to receive coded control information and coded data on a channel based on scheduled resources; and a controller configure to: determine a number of symbols for the control information based on a number of data bits and the scheduled resources, demultiplex the received coded control information and coded data based on the number of symbols for the control information, and demodulate the demultiplexed coded control information and coded data by a modulation scheme. 23. The method of claim 22, wherein the coded control information is generated based on the modulation scheme with the control information and the number of symbols for the control information. 24. The method of claim 22, wherein the control information comprises acknowledge/non-acknowledge (ACK/NACK) information or a Channel Quality Indicator (CQI). 25. The method of claim 22, wherein the number of symbols for the control information is proportional to a quantity of the scheduled resources. 26. The method of claim 22, wherein the number of symbols for the control information is inversely proportional to a number of the data bits. 27. The method of claim 22, wherein the controller is further configured to perform inverse fast fourier transform (IFFT) and perform FFT to the received coded control information and coded data. 28. The method of claim 27, wherein the receiver receives the coded data by using remaining resources not used for the coded control information.
2,400
7,289
7,289
14,079,344
2,458
A system for computing an optimal deployment of at least one web application in a multi-datacenter system comprising a collector for collecting performance measurements with regard to a web application executed in the multi-datacenter system and grouping the performance measurements according to locations of a plurality of clients accessing the web application; a data repository for maintaining at least a performance table including at least the performance measurements grouped according to the plurality of client locations and a service level agreement (SLA) guaranteed to clients in the plurality of client locations; and an analyzer for processing at least information stored in the performance table for generating a recommendation on an optimal deployment of the web application in at least one combination of datacenters in the multi-datacenter system by computing an expected SLA that can be guaranteed to the clients in each combination of datacenters.
1. A method for an optimal deployment of at least one web application in a multi-datacenter system, comprising: collecting performance measurements with regard to a web application executed in the multi-datacenter system, wherein the performance measurements are collected from at least probes and measuring units that are communicatively connected to each datacenter in the multi-datacenter system; grouping the performance measurements according to locations of a plurality of clients accessing the web application; computing using the grouped performance measurements stored in the performance table an expected service level agreement (SLA) to clients in the plurality of client locations that can be guaranteed to the clients in each combination of the datacenters in the multi-datacenter system; determining an optimal deployment of the web application in at least one combination of the datacenters in the multi-datacenter system based in part on the computed expected SLA, wherein the optimal deployment ensures that the computed expected SLA satisfies a SLA guaranteed to the clients; and causing the deployment of the web application in the at least one combination of the datacenters in the multi-datacenter system according to the determined optimal deployment. 2. The method of claim 1, further comprising: maintaining in a data repository at least a performance table including at least one of: the grouped performance measurements, the service level agreement (SLA) guaranteed to clients in the plurality of client locations, or monetary costs associated with hosting the web application in each datacenter of the multi-datacenter system, wherein the monetary costs include a fixed cost and a usage cost set for the datacenter. 3. The method of claim 2, wherein the performance table lists the plurality of client locations and datacenters in the multi-datacenter system, wherein the performance table includes for each pair of a datacenter and a client location at least a computed usability indicator (UI) value, a projected transaction time (TT), for each client location a guaranteed SLA to clients in the client location, and a dynamic weight (W) determined based on a load generated by clients in the client location, and for each datacenter at least a maximum capacity (MC) and redirection capacity (RC) variable. 4. The method of claim 2, wherein the optimal deployment further ensures that a cost of the deployment of the at least one web application in the at least one combination of the datacenters does not exceed a predefined minimum monetary cost. 5. The method of claim 1, wherein the performance measurements include at least one of: round-trip time (RTT) measurements, transaction time (TT) measurements, relative load generated by the clients in each client location of the plurality of client locations, aggregated load of transactions generated by the clients in the plurality of client locations, or location information associated with a client location. 6. The method of claim 5, wherein the expected SLA of the clients is computed based on TT measurements measured with respect to a combination of datacenters currently hosting the web application and projected TT values respective to the client location and at least one other datacenter not currently hosting the web application, wherein the projected TT value respective to the client location and the other datacenter is derived based on a measured server transaction time (STT) value indicating an application response time in the combination of datacenters currently hosting the web application and the RTT measurements measured between a client in the client location and the at least one other datacenter. 7. The method of claim 3, wherein the optimal deployment is determined based on at least one of: the computed usability indicator (UI) value and the dynamic weight (W) value of each location and the fixed cost (FC), the usage cost (UC), and the maximum capacity (MC) value associated with each datacenter. 8. The method of claim 3, wherein determining the optimal deployment further comprising: processing information in the performance table to detect possible combinations of datacenters having a positive usability indicator (UI) value, wherein the positive UI value indicates that a respective combination of datacenters can support the SLA guaranteed to clients in the client location; for each detected combination of datacenters: aggregating for each datacenter in the detected combination the dynamic weights (W) of all client locations associated with the datacenter; removing the detected combination if the aggregated dynamic weights (W) for the datacenter are above any one of the maximum capacity (MC) variable and a redirection capacity (RC) variable defined for the datacenter; and selecting one of the remaining combinations of datacenters as the at least one combination of datacenters to deploy the web application. 9. The method of claim 8, wherein the usability indicator (UI) computed for a pair of a client location and a datacenter determines if the guaranteed SLA associated with the client location can be supported by the datacenter, wherein the usability indicator (UI) is computed based on the guaranteed SLA for the client location and the expected SLA value. 10. The method of claim 3, wherein generating the recommendation further comprising: processing information in the performance table to detect possible combinations of datacenters having a positive usability indicator (UI) value, wherein the positive UI value indicates that a respective combination of datacenters can support the SLA guaranteed to clients in the client location; for each detected combination of datacenters: aggregating for each datacenter in the detected combination the dynamic weights (W) of all client locations associated with the datacenter; removing the detected combination if the aggregated dynamic weights (W) for the datacenter are above any one of the maximum capacity (MC) variable and a redirection capacity (RC) variable defined for the datacenter; computing a total usage cost (TUC) of the combination; computing a total cost (TC) of the combination; and selecting a combination out of the remaining combinations that results in a lowest total cost (TC) as the at least one combination of datacenters to deploy the web application, thereby determining the optimal deployment for the web application. 11. A non-transitory computer readable medium having stored thereon instructions for causing one or more processing units to execute the method according to claim 1. 12. A multi-datacenter system, comprising: a plurality of datacenters for executing at least one web application, wherein a plurality of clients access the at least one web application from different locations through a network, each datacenter includes a probing module for measuring a round-trip time (RTT) from the datacenter to each client location of the plurality of client locations; at least one of the datacenters includes a transaction time (TT) measuring module measuring a response time of a web application and an advisory unit for recommending an optimal deployment of the web application in a combination of datacenters in the multi-datacenter system based in part on an expected service level agreement (SLA) that can be guaranteed to the clients in each combination of datacenters in the multi-datacenter system, wherein the recommendation of the optimal deployment is generated when the expected SLA satisfies the SLA guaranteed to the clients. 13. The multi-datacenter system of claim 12, wherein the advisory unit is further configured to: collect performance measurements with regard to the web application executed in the multi-datacenter system; group the performance measurements according to locations of a plurality of clients accessing the web application; maintain in a data repository at least a performance table including at least the performance measurements grouped according to the plurality of client locations, the performance table further includes a service level agreement (SLA) guaranteed to clients in the plurality of client locations; compute using information stored in the performance table the expected SLA; and generate the recommendation on the optimal deployment when the computed expected SLA satisfies the SLA guaranteed to the clients. 14. The multi-datacenter system of claim 12, wherein the advisor unit is further configured to maintain monetary costs associated with hosting the web application in one or more datacenters of the multi-datacenter system, and wherein the recommendation on the optimal deployment further satisfies a minimized monetary cost. 15. The multi-datacenter system of claim 12, further includes a configuration unit, wherein the configuration unit is programed to determine if the multi-datacenter system should be reconfigured based on the recommendation; and configures the multi-datacenter system to the optimal deployment. 16. A system for an optimal deployment of at least one web application in a multi-datacenter system, comprising: a network interface for allowing connectivity to datacenters in the multi-datacenter system, wherein the network interface is further configured to receive performance measurements with regard to a web application executed in the multi-datacenter system, wherein the performance measurements are received from at least probes and a measuring unit that are communicatively connected to each datacenter in the multi-datacenter system; a processor; and a memory connected to the processor, the memory contains instructions that when executed by the processor, configure the system to: group the performance measurements according to locations of a plurality of clients accessing the web application; compute using the grouped performance measurements stored in the performance table an expected service level agreement (SLA) to clients in the plurality of client locations that can be guaranteed to the clients in each combination of datacenters in the multi-datacenter system; determine an optimal deployment of the web application in at least one combination of datacenters in the multi-datacenter system based in part on the computed expected SLA, wherein the optimal deployment ensures that the computed expected SLA satisfies a SLA guaranteed to the clients; and cause the deployment of the web application in the at least one combination of datacenters in the multi-datacenter system according to the determined optimal deployment. 17. The system of claim 16, wherein the system is further configured to maintain in a data repository at least a performance table including at least one of: the grouped performance measurements, the service level agreement (SLA) guaranteed to clients in the plurality of client locations, or monetary costs associated with hosting the web application in each datacenter of the multi-datacenter system, wherein the monetary costs include a fixed cost and a usage cost set for the datacenter. 18. The system of claim 17, wherein the performance table lists the plurality of client locations and datacenters in the multi-datacenter system, wherein the performance table includes for each pair of a datacenter and a client location at least a computed usability indicator (UI) value, a projected TT, for each client location a guaranteed SLA to clients in the client location and a dynamic weight (W) determined based on the load generated by clients in the client location, and for each datacenter at least a maximum capacity (MC) and redirection capacity (RC) variable. 19. The system of claim 17, wherein the optimal deployment further ensures that a cost of the deployment of the at least one web application in the at least one combination of the datacenters does not exceed a predefined minimum monetary cost. 20. The system of claim 18, wherein the optimal deployment is determined based on at least one of: the computed usability indicator (UI) value and the dynamic weight (W) value of each location and the fixed cost (FC), the usage cost (UC), and the maximum capacity (MC) value associated with each datacenter.
A system for computing an optimal deployment of at least one web application in a multi-datacenter system comprising a collector for collecting performance measurements with regard to a web application executed in the multi-datacenter system and grouping the performance measurements according to locations of a plurality of clients accessing the web application; a data repository for maintaining at least a performance table including at least the performance measurements grouped according to the plurality of client locations and a service level agreement (SLA) guaranteed to clients in the plurality of client locations; and an analyzer for processing at least information stored in the performance table for generating a recommendation on an optimal deployment of the web application in at least one combination of datacenters in the multi-datacenter system by computing an expected SLA that can be guaranteed to the clients in each combination of datacenters.1. A method for an optimal deployment of at least one web application in a multi-datacenter system, comprising: collecting performance measurements with regard to a web application executed in the multi-datacenter system, wherein the performance measurements are collected from at least probes and measuring units that are communicatively connected to each datacenter in the multi-datacenter system; grouping the performance measurements according to locations of a plurality of clients accessing the web application; computing using the grouped performance measurements stored in the performance table an expected service level agreement (SLA) to clients in the plurality of client locations that can be guaranteed to the clients in each combination of the datacenters in the multi-datacenter system; determining an optimal deployment of the web application in at least one combination of the datacenters in the multi-datacenter system based in part on the computed expected SLA, wherein the optimal deployment ensures that the computed expected SLA satisfies a SLA guaranteed to the clients; and causing the deployment of the web application in the at least one combination of the datacenters in the multi-datacenter system according to the determined optimal deployment. 2. The method of claim 1, further comprising: maintaining in a data repository at least a performance table including at least one of: the grouped performance measurements, the service level agreement (SLA) guaranteed to clients in the plurality of client locations, or monetary costs associated with hosting the web application in each datacenter of the multi-datacenter system, wherein the monetary costs include a fixed cost and a usage cost set for the datacenter. 3. The method of claim 2, wherein the performance table lists the plurality of client locations and datacenters in the multi-datacenter system, wherein the performance table includes for each pair of a datacenter and a client location at least a computed usability indicator (UI) value, a projected transaction time (TT), for each client location a guaranteed SLA to clients in the client location, and a dynamic weight (W) determined based on a load generated by clients in the client location, and for each datacenter at least a maximum capacity (MC) and redirection capacity (RC) variable. 4. The method of claim 2, wherein the optimal deployment further ensures that a cost of the deployment of the at least one web application in the at least one combination of the datacenters does not exceed a predefined minimum monetary cost. 5. The method of claim 1, wherein the performance measurements include at least one of: round-trip time (RTT) measurements, transaction time (TT) measurements, relative load generated by the clients in each client location of the plurality of client locations, aggregated load of transactions generated by the clients in the plurality of client locations, or location information associated with a client location. 6. The method of claim 5, wherein the expected SLA of the clients is computed based on TT measurements measured with respect to a combination of datacenters currently hosting the web application and projected TT values respective to the client location and at least one other datacenter not currently hosting the web application, wherein the projected TT value respective to the client location and the other datacenter is derived based on a measured server transaction time (STT) value indicating an application response time in the combination of datacenters currently hosting the web application and the RTT measurements measured between a client in the client location and the at least one other datacenter. 7. The method of claim 3, wherein the optimal deployment is determined based on at least one of: the computed usability indicator (UI) value and the dynamic weight (W) value of each location and the fixed cost (FC), the usage cost (UC), and the maximum capacity (MC) value associated with each datacenter. 8. The method of claim 3, wherein determining the optimal deployment further comprising: processing information in the performance table to detect possible combinations of datacenters having a positive usability indicator (UI) value, wherein the positive UI value indicates that a respective combination of datacenters can support the SLA guaranteed to clients in the client location; for each detected combination of datacenters: aggregating for each datacenter in the detected combination the dynamic weights (W) of all client locations associated with the datacenter; removing the detected combination if the aggregated dynamic weights (W) for the datacenter are above any one of the maximum capacity (MC) variable and a redirection capacity (RC) variable defined for the datacenter; and selecting one of the remaining combinations of datacenters as the at least one combination of datacenters to deploy the web application. 9. The method of claim 8, wherein the usability indicator (UI) computed for a pair of a client location and a datacenter determines if the guaranteed SLA associated with the client location can be supported by the datacenter, wherein the usability indicator (UI) is computed based on the guaranteed SLA for the client location and the expected SLA value. 10. The method of claim 3, wherein generating the recommendation further comprising: processing information in the performance table to detect possible combinations of datacenters having a positive usability indicator (UI) value, wherein the positive UI value indicates that a respective combination of datacenters can support the SLA guaranteed to clients in the client location; for each detected combination of datacenters: aggregating for each datacenter in the detected combination the dynamic weights (W) of all client locations associated with the datacenter; removing the detected combination if the aggregated dynamic weights (W) for the datacenter are above any one of the maximum capacity (MC) variable and a redirection capacity (RC) variable defined for the datacenter; computing a total usage cost (TUC) of the combination; computing a total cost (TC) of the combination; and selecting a combination out of the remaining combinations that results in a lowest total cost (TC) as the at least one combination of datacenters to deploy the web application, thereby determining the optimal deployment for the web application. 11. A non-transitory computer readable medium having stored thereon instructions for causing one or more processing units to execute the method according to claim 1. 12. A multi-datacenter system, comprising: a plurality of datacenters for executing at least one web application, wherein a plurality of clients access the at least one web application from different locations through a network, each datacenter includes a probing module for measuring a round-trip time (RTT) from the datacenter to each client location of the plurality of client locations; at least one of the datacenters includes a transaction time (TT) measuring module measuring a response time of a web application and an advisory unit for recommending an optimal deployment of the web application in a combination of datacenters in the multi-datacenter system based in part on an expected service level agreement (SLA) that can be guaranteed to the clients in each combination of datacenters in the multi-datacenter system, wherein the recommendation of the optimal deployment is generated when the expected SLA satisfies the SLA guaranteed to the clients. 13. The multi-datacenter system of claim 12, wherein the advisory unit is further configured to: collect performance measurements with regard to the web application executed in the multi-datacenter system; group the performance measurements according to locations of a plurality of clients accessing the web application; maintain in a data repository at least a performance table including at least the performance measurements grouped according to the plurality of client locations, the performance table further includes a service level agreement (SLA) guaranteed to clients in the plurality of client locations; compute using information stored in the performance table the expected SLA; and generate the recommendation on the optimal deployment when the computed expected SLA satisfies the SLA guaranteed to the clients. 14. The multi-datacenter system of claim 12, wherein the advisor unit is further configured to maintain monetary costs associated with hosting the web application in one or more datacenters of the multi-datacenter system, and wherein the recommendation on the optimal deployment further satisfies a minimized monetary cost. 15. The multi-datacenter system of claim 12, further includes a configuration unit, wherein the configuration unit is programed to determine if the multi-datacenter system should be reconfigured based on the recommendation; and configures the multi-datacenter system to the optimal deployment. 16. A system for an optimal deployment of at least one web application in a multi-datacenter system, comprising: a network interface for allowing connectivity to datacenters in the multi-datacenter system, wherein the network interface is further configured to receive performance measurements with regard to a web application executed in the multi-datacenter system, wherein the performance measurements are received from at least probes and a measuring unit that are communicatively connected to each datacenter in the multi-datacenter system; a processor; and a memory connected to the processor, the memory contains instructions that when executed by the processor, configure the system to: group the performance measurements according to locations of a plurality of clients accessing the web application; compute using the grouped performance measurements stored in the performance table an expected service level agreement (SLA) to clients in the plurality of client locations that can be guaranteed to the clients in each combination of datacenters in the multi-datacenter system; determine an optimal deployment of the web application in at least one combination of datacenters in the multi-datacenter system based in part on the computed expected SLA, wherein the optimal deployment ensures that the computed expected SLA satisfies a SLA guaranteed to the clients; and cause the deployment of the web application in the at least one combination of datacenters in the multi-datacenter system according to the determined optimal deployment. 17. The system of claim 16, wherein the system is further configured to maintain in a data repository at least a performance table including at least one of: the grouped performance measurements, the service level agreement (SLA) guaranteed to clients in the plurality of client locations, or monetary costs associated with hosting the web application in each datacenter of the multi-datacenter system, wherein the monetary costs include a fixed cost and a usage cost set for the datacenter. 18. The system of claim 17, wherein the performance table lists the plurality of client locations and datacenters in the multi-datacenter system, wherein the performance table includes for each pair of a datacenter and a client location at least a computed usability indicator (UI) value, a projected TT, for each client location a guaranteed SLA to clients in the client location and a dynamic weight (W) determined based on the load generated by clients in the client location, and for each datacenter at least a maximum capacity (MC) and redirection capacity (RC) variable. 19. The system of claim 17, wherein the optimal deployment further ensures that a cost of the deployment of the at least one web application in the at least one combination of the datacenters does not exceed a predefined minimum monetary cost. 20. The system of claim 18, wherein the optimal deployment is determined based on at least one of: the computed usability indicator (UI) value and the dynamic weight (W) value of each location and the fixed cost (FC), the usage cost (UC), and the maximum capacity (MC) value associated with each datacenter.
2,400
7,290
7,290
12,745,352
2,447
A method and system implemented by a network entity. The method comprising accessing communication routing information associated to a party. The communication routing information being indicative of at least a first termination device to which incoming communications for the party are to be routed. The method further comprises monitoring at least one of location information, presence information and behavior information associated to the party and processing the communication routing information and the at least one of the location information, presence information and behavior information at least in part on the basis of modification information in an attempt to determine the suitability of modifying the communication routing information. When it is determined that the communication routing information is suitable for modification, causing the party to be advised.
1. A method implemented by a network entity, said method comprising: accessing communication routing information associated to a party, the communication routing information being indicative of at least one termination device to which incoming communications for the party are to be routed; monitoring behavior information associated to the party; processing the communication routing information and the behavior information at least in part on the basis of modification information in an attempt to determine if said communication routing information is suitable for modification; causing the party to be advised when said processing has determined that the communication routing information is suitable for modification. 2. A method as defined in claim 1, wherein the at least one termination device to which incoming communications for the party are to be routed, includes at least one first termination device to which incoming communications are to be routed. 3. A method as defined in claim 2, wherein the behavior information is indicative of a communication device from which the party has made an outgoing call, the modification information being indicative that the communication routing information is suitable for modification when the communication device from which the party has made an outgoing call is not the at least one first termination device specified in the communication routing information. 4. A method as defined in claim 2, wherein the behavior information is indicative that the party has logged on to a communication device, the modification information being indicative that the communication routing information is suitable for modification when the communication device is not the at least one first termination device specified in the communication routing information. 5. A method as defined in claim 2, wherein the behavior information is indicative that the party has logged on to a communication device, the modification information being indicative that the communication routing information is suitable for modification when a communication device in proximity to a location where said party has logged on to the communication device is not the at least one termination device specified in the communication routing information. 6. A method as defined in claim 2, wherein the behavior information is indicative that a communication device associated with the party shouldn't be disturbed, the modification information being indicative that the communication routing information is suitable for modification when the communication device that shouldn't be disturbed is the at least one first termination device specified in said communication routing information. 7. A method as defined in claim 2, further comprising: determining a suggestion as to how to modify said communication routing information; and providing said suggestion to the party. 8. A method as defined in claim 7, wherein when the party originates an outgoing call from a communication device that is not the at least one first termination device, the suggestion being to modify the communication routing information such that the communication device on which the customer has originated an outgoing call becomes one of the at least one first termination devices specified in the communication routing information. 9. A method as defined in claim 7, wherein when the party is in proximity to an associated communication device that has a cheaper cost structure than the at least one first termination device, the suggestion being to modify the communication routing information such that the communication device with the cheaper cost structure becomes one of the at least one first termination devices specified in the communication routing information. 10. A method as defined in claim 7, wherein when the party is not in proximity to the at least one first termination device, the suggestion being to modify the communication routing information such that a communication device that is in proximity to the customer becomes one of the at least one first termination devices specified in the communication routing information. 11. A method as defined in claim 7, wherein under a given set of circumstances the suggestion being to modify the communication routing information such that an incoming communication for the party is routed to an alternative termination device that has been identified as being a more desirable termination device under the given set of circumstance. 12. A method as defined in claim 7, wherein when a user of the at least one first termination device should not be disturbed, the suggestion being to modify the communication routing information such that an incoming communication for the party is routed to voice mail. 13. A method as defined in claim 7, further comprising: requesting authorization from the party to modify the communication routing information in accordance with said suggestion provided to the party; and modifying the communication routing information in accordance with said suggestion provided to the party upon authorization received from the party. 14. A method as defined in claim 1, wherein the party is advised via an instant text message when said processing has determined that the communication routing information is suitable for modification. 15. A method as defined in claim 1, wherein the party is advised via IVR when said processing has determined that the communication routing information is suitable for modification. 16. A method as defined in claim 1, wherein the party is advised via email when said processing has determined that the communication routing information is suitable for modification. 17. A softswitch configured to implement the method defined in claim 1. 18. A network entity comprising: an interface operative for: accessing communication routing information associated to a party, the communication routing information being indicative of at least one termination device to which incoming communications for the party are to be routed; monitoring behavior information associated to the party; a processing entity operative for: processing the communication routing information and the behavior information at least in part on the basis of modification information in an attempt to determine if said communication routing information is suitable for modification; causing the party to be advised when said processing has determined that the communication routing information is suitable for modification. 19. A network entity as defined in claim 18, wherein the at least one termination device to which incoming communications for the party are to be routed, includes at least one first termination device to which incoming communications are to be routed. 20. A network entity as defined in claim 19, wherein the behavior information is indicative of a communication device from which the party has made an outgoing call, the modification information being indicative that the communication routing information is suitable for modification when the communication device from which the party has made an outgoing call is not the at least one first termination device specified in the communication routing information. 21. A network entity as defined in claim 19, wherein the behavior information is indicative that the party has logged on to a communication device, the modification information being indicative that the communication routing information is suitable for modification when the communication device is not the at least one first termination device specified in the communication routing information. 22. A network entity as defined in claim 19, wherein the behavior information is indicative that the party has logged on to a communication device, the modification information being indicative that the communication routing information is suitable for modification when a communication device in proximity to a location where said party has logged on to the communication device is not the at least one first termination device specified in the communication routing information. 23. A network entity as defined in claim 19, wherein the behavior information is indicative that a communication device associated with the party shouldn't be disturbed, the modification information being indicative that the communication routing information is suitable for modification when the communication device that shouldn't be disturbed is the at least one first termination device specified in said communication routing information. 24. A network entity as defined in claim 19, wherein the processing entity is further operative for: determining a suggestion as to how to modify said communication routing information; and providing said suggestion to the party. 25. A network entity as defined in claim 24, wherein when the party originates an outgoing call from a communication device that is not the at least one first termination device, the suggestion being to modify the communication routing information such that the communication device on which the customer has originated an outgoing call becomes one of the at least one first termination devices specified in the communication routing information. 26. A network entity as defined in claim 24, wherein when the party is in proximity to an associated communication device that has a cheaper cost structure than the at least one first termination device, the suggestion being to modify the communication routing information such that the communication device with the cheaper cost structure becomes one of the at least one first termination devices specified in the communication routing information. 27. A network entity as defined in claim 24, wherein when the party is not in proximity to the at least one first termination device, the suggestion being to modify the communication routing information such that a communication device that is in proximity to the customer becomes one of the at least one first termination devices specified in the communication routing information. 28. A network entity as defined in claim 24, wherein under a given set of circumstances the suggestion being to modify the communication routing information such that an incoming communication for the party is routed to an alternative termination device that has been identified as being a more desirable termination device under the given set of circumstance. 29. A network entity as defined in claim 24, wherein when a user of the at least one first termination device should not be disturbed, the suggestion being to modify the communication routing information such that an incoming communication for the user is routed to voice mail. 30. A network entity as defined in claim 24, further comprising: requesting authorization from the party to modify the communication routing information in accordance with said suggestion provided to the party; and modifying the communication routing information in accordance with said suggestion provided to the party upon authorization received from the party. 31. A network entity as defined in claim 19, wherein the party is advised via an instant text message when said processing has determined that the communication routing information is suitable for modification. 32. A network entity as defined in claim 19, wherein the party is advised via IVR when said processing has determined that the communication routing information is suitable for modification. 33. A network entity as defined in claim 19, wherein the party is advised via email when said processing has determined that the communication routing information is suitable for modification. 34. A computer-readable storage medium comprising a program element for execution by a processing unit to implement a modification entity, said program element comprising: first program code for accessing communication routing information associated to a party, the communication routing information being indicative of at least one termination device to which incoming communications for the party are to be routed; second program code for monitoring behavior information associated to the party; third program code for processing the communication routing information and the behavior information at least in part on the basis of modification information in an attempt to determine the suitability of modifying said communication routing information; and fourth program code for causing the party to be advised when said processing has determined that the communication routing information is suitable for modification. 35. A method implemented by a network entity, said method comprising: accessing communication routing information associated to a party, the communication routing information being indicative of at least one termination device to which incoming communications for the party are to be routed; monitoring location information associated to the party; processing the communication routing information and the location information at least in part on the basis of modification information in an attempt to determine if said communication routing information is suitable for modification; causing the party to be advised when said processing has determined that the communication routing information is suitable for modification. 36. A method as defined in claim 35, wherein the at least one termination device to which incoming communications for the party are to be routed, includes at least one first termination device to which incoming communications are to be routed. 37. A method as defined in claim 36, wherein the location information is indicative of a geographical position of the party, the modification information being indicative that the communication routing information is suitable for being modified when the geographical position of the party is not in proximity to the at least one first termination device specified in said communication routing information. 38. A method as defined in claim 36, wherein the location information is indicative of a geographical position of the party, the modification information being indicative that the communication routing information is suitable for modification when the party is in proximity to an alternative communication device having a cheaper cost structure than the at least one first termination device specified in said communication routing information. 39. A method as defined in claim 36, wherein monitoring the location information associated to the party is performed by monitoring one of GPS coordinates and cellular triangulation coordinates. 40. A network entity comprising: an interface operative for: accessing communication routing information associated to a party, the communication routing information being indicative of at least one termination device to which incoming communications for the party are to be routed; monitoring location information associated to the party; a processing entity operative for: processing the communication routing information and the location information at least in part on the basis of modification information in an attempt to determine if said communication routing information is suitable for modification; causing the party to be advised when said processing has determined that the communication routing information is suitable for modification. 41. A method implemented by a network entity, said method comprising: accessing communication routing information associated to a party, the communication routing information being indicative of at least one termination device to which incoming communications for the party are to be routed; monitoring behavior information associated to the party; processing the communication routing information and the behavior information at least in part on the basis of modification information in an attempt to determine if said communication routing information is suitable for modification; causing said communication routing information to be modified upon determination that the communication routing information is suitable for modification. 42. A method as defined in claim 41, wherein the at least one termination device to which incoming communications for the party are to be routed, includes at least one first termination device to which incoming communications are to be routed, wherein the behavior information is indicative of a communication device from which the party has made an outgoing call, the modification information being indicative that the communication routing information is suitable for modification when the communication device from which the party has made an outgoing call is not the at least, one first termination device specified in the communication routing information. 43. A method as defined in claim 41, wherein the at least one termination device to which incoming communications for the party are to be routed, includes at least one first termination device to which incoming communications are to be routed, wherein the behavior information is indicative of a communication device from which the party has made an outgoing call, the modification information being indicative that the communication routing information is suitable for modification when the communication device from which the party has made an outgoing call is not the at least one first termination device specified in the communication routing information. 44. A method as defined in claim 41, wherein the at least one termination device to which incoming communications for the party are to be routed, includes at least one first termination device to which incoming communications are to be routed, wherein the behavior information is indicative that the party has logged on to a communication device, the modification information being indicative that the communication routing information is suitable for modification when the communication device is not the at least one first termination device specified in the communication routing information. 45. A method as defined in claim 41, wherein the at least one termination device to which incoming communications for the party are to be routed, includes at least, one first termination device to which incoming communications are to be routed, wherein the behavior information is indicative that a communication device associated with the party shouldn't be disturbed, the modification information being indicative that the communication routing information is suitable for modification when the communication device that shouldn't be disturbed is the at least one first termination device specified in said communication routing information. 46. A network entity comprising: an interface operative for: accessing communication routing information associated to a party, the communication routing information being indicative of at least one termination device to which incoming communications for the party are to be routed; monitoring behavior information associated to the party; a processing entity operative for: processing the communication routing information and the behavior information at least in part on the basis of modification information in an attempt to determine if said communication routing information is suitable for modification; causing said communication routing information to be modified upon determination that the communication routing information is suitable for modification.
A method and system implemented by a network entity. The method comprising accessing communication routing information associated to a party. The communication routing information being indicative of at least a first termination device to which incoming communications for the party are to be routed. The method further comprises monitoring at least one of location information, presence information and behavior information associated to the party and processing the communication routing information and the at least one of the location information, presence information and behavior information at least in part on the basis of modification information in an attempt to determine the suitability of modifying the communication routing information. When it is determined that the communication routing information is suitable for modification, causing the party to be advised.1. A method implemented by a network entity, said method comprising: accessing communication routing information associated to a party, the communication routing information being indicative of at least one termination device to which incoming communications for the party are to be routed; monitoring behavior information associated to the party; processing the communication routing information and the behavior information at least in part on the basis of modification information in an attempt to determine if said communication routing information is suitable for modification; causing the party to be advised when said processing has determined that the communication routing information is suitable for modification. 2. A method as defined in claim 1, wherein the at least one termination device to which incoming communications for the party are to be routed, includes at least one first termination device to which incoming communications are to be routed. 3. A method as defined in claim 2, wherein the behavior information is indicative of a communication device from which the party has made an outgoing call, the modification information being indicative that the communication routing information is suitable for modification when the communication device from which the party has made an outgoing call is not the at least one first termination device specified in the communication routing information. 4. A method as defined in claim 2, wherein the behavior information is indicative that the party has logged on to a communication device, the modification information being indicative that the communication routing information is suitable for modification when the communication device is not the at least one first termination device specified in the communication routing information. 5. A method as defined in claim 2, wherein the behavior information is indicative that the party has logged on to a communication device, the modification information being indicative that the communication routing information is suitable for modification when a communication device in proximity to a location where said party has logged on to the communication device is not the at least one termination device specified in the communication routing information. 6. A method as defined in claim 2, wherein the behavior information is indicative that a communication device associated with the party shouldn't be disturbed, the modification information being indicative that the communication routing information is suitable for modification when the communication device that shouldn't be disturbed is the at least one first termination device specified in said communication routing information. 7. A method as defined in claim 2, further comprising: determining a suggestion as to how to modify said communication routing information; and providing said suggestion to the party. 8. A method as defined in claim 7, wherein when the party originates an outgoing call from a communication device that is not the at least one first termination device, the suggestion being to modify the communication routing information such that the communication device on which the customer has originated an outgoing call becomes one of the at least one first termination devices specified in the communication routing information. 9. A method as defined in claim 7, wherein when the party is in proximity to an associated communication device that has a cheaper cost structure than the at least one first termination device, the suggestion being to modify the communication routing information such that the communication device with the cheaper cost structure becomes one of the at least one first termination devices specified in the communication routing information. 10. A method as defined in claim 7, wherein when the party is not in proximity to the at least one first termination device, the suggestion being to modify the communication routing information such that a communication device that is in proximity to the customer becomes one of the at least one first termination devices specified in the communication routing information. 11. A method as defined in claim 7, wherein under a given set of circumstances the suggestion being to modify the communication routing information such that an incoming communication for the party is routed to an alternative termination device that has been identified as being a more desirable termination device under the given set of circumstance. 12. A method as defined in claim 7, wherein when a user of the at least one first termination device should not be disturbed, the suggestion being to modify the communication routing information such that an incoming communication for the party is routed to voice mail. 13. A method as defined in claim 7, further comprising: requesting authorization from the party to modify the communication routing information in accordance with said suggestion provided to the party; and modifying the communication routing information in accordance with said suggestion provided to the party upon authorization received from the party. 14. A method as defined in claim 1, wherein the party is advised via an instant text message when said processing has determined that the communication routing information is suitable for modification. 15. A method as defined in claim 1, wherein the party is advised via IVR when said processing has determined that the communication routing information is suitable for modification. 16. A method as defined in claim 1, wherein the party is advised via email when said processing has determined that the communication routing information is suitable for modification. 17. A softswitch configured to implement the method defined in claim 1. 18. A network entity comprising: an interface operative for: accessing communication routing information associated to a party, the communication routing information being indicative of at least one termination device to which incoming communications for the party are to be routed; monitoring behavior information associated to the party; a processing entity operative for: processing the communication routing information and the behavior information at least in part on the basis of modification information in an attempt to determine if said communication routing information is suitable for modification; causing the party to be advised when said processing has determined that the communication routing information is suitable for modification. 19. A network entity as defined in claim 18, wherein the at least one termination device to which incoming communications for the party are to be routed, includes at least one first termination device to which incoming communications are to be routed. 20. A network entity as defined in claim 19, wherein the behavior information is indicative of a communication device from which the party has made an outgoing call, the modification information being indicative that the communication routing information is suitable for modification when the communication device from which the party has made an outgoing call is not the at least one first termination device specified in the communication routing information. 21. A network entity as defined in claim 19, wherein the behavior information is indicative that the party has logged on to a communication device, the modification information being indicative that the communication routing information is suitable for modification when the communication device is not the at least one first termination device specified in the communication routing information. 22. A network entity as defined in claim 19, wherein the behavior information is indicative that the party has logged on to a communication device, the modification information being indicative that the communication routing information is suitable for modification when a communication device in proximity to a location where said party has logged on to the communication device is not the at least one first termination device specified in the communication routing information. 23. A network entity as defined in claim 19, wherein the behavior information is indicative that a communication device associated with the party shouldn't be disturbed, the modification information being indicative that the communication routing information is suitable for modification when the communication device that shouldn't be disturbed is the at least one first termination device specified in said communication routing information. 24. A network entity as defined in claim 19, wherein the processing entity is further operative for: determining a suggestion as to how to modify said communication routing information; and providing said suggestion to the party. 25. A network entity as defined in claim 24, wherein when the party originates an outgoing call from a communication device that is not the at least one first termination device, the suggestion being to modify the communication routing information such that the communication device on which the customer has originated an outgoing call becomes one of the at least one first termination devices specified in the communication routing information. 26. A network entity as defined in claim 24, wherein when the party is in proximity to an associated communication device that has a cheaper cost structure than the at least one first termination device, the suggestion being to modify the communication routing information such that the communication device with the cheaper cost structure becomes one of the at least one first termination devices specified in the communication routing information. 27. A network entity as defined in claim 24, wherein when the party is not in proximity to the at least one first termination device, the suggestion being to modify the communication routing information such that a communication device that is in proximity to the customer becomes one of the at least one first termination devices specified in the communication routing information. 28. A network entity as defined in claim 24, wherein under a given set of circumstances the suggestion being to modify the communication routing information such that an incoming communication for the party is routed to an alternative termination device that has been identified as being a more desirable termination device under the given set of circumstance. 29. A network entity as defined in claim 24, wherein when a user of the at least one first termination device should not be disturbed, the suggestion being to modify the communication routing information such that an incoming communication for the user is routed to voice mail. 30. A network entity as defined in claim 24, further comprising: requesting authorization from the party to modify the communication routing information in accordance with said suggestion provided to the party; and modifying the communication routing information in accordance with said suggestion provided to the party upon authorization received from the party. 31. A network entity as defined in claim 19, wherein the party is advised via an instant text message when said processing has determined that the communication routing information is suitable for modification. 32. A network entity as defined in claim 19, wherein the party is advised via IVR when said processing has determined that the communication routing information is suitable for modification. 33. A network entity as defined in claim 19, wherein the party is advised via email when said processing has determined that the communication routing information is suitable for modification. 34. A computer-readable storage medium comprising a program element for execution by a processing unit to implement a modification entity, said program element comprising: first program code for accessing communication routing information associated to a party, the communication routing information being indicative of at least one termination device to which incoming communications for the party are to be routed; second program code for monitoring behavior information associated to the party; third program code for processing the communication routing information and the behavior information at least in part on the basis of modification information in an attempt to determine the suitability of modifying said communication routing information; and fourth program code for causing the party to be advised when said processing has determined that the communication routing information is suitable for modification. 35. A method implemented by a network entity, said method comprising: accessing communication routing information associated to a party, the communication routing information being indicative of at least one termination device to which incoming communications for the party are to be routed; monitoring location information associated to the party; processing the communication routing information and the location information at least in part on the basis of modification information in an attempt to determine if said communication routing information is suitable for modification; causing the party to be advised when said processing has determined that the communication routing information is suitable for modification. 36. A method as defined in claim 35, wherein the at least one termination device to which incoming communications for the party are to be routed, includes at least one first termination device to which incoming communications are to be routed. 37. A method as defined in claim 36, wherein the location information is indicative of a geographical position of the party, the modification information being indicative that the communication routing information is suitable for being modified when the geographical position of the party is not in proximity to the at least one first termination device specified in said communication routing information. 38. A method as defined in claim 36, wherein the location information is indicative of a geographical position of the party, the modification information being indicative that the communication routing information is suitable for modification when the party is in proximity to an alternative communication device having a cheaper cost structure than the at least one first termination device specified in said communication routing information. 39. A method as defined in claim 36, wherein monitoring the location information associated to the party is performed by monitoring one of GPS coordinates and cellular triangulation coordinates. 40. A network entity comprising: an interface operative for: accessing communication routing information associated to a party, the communication routing information being indicative of at least one termination device to which incoming communications for the party are to be routed; monitoring location information associated to the party; a processing entity operative for: processing the communication routing information and the location information at least in part on the basis of modification information in an attempt to determine if said communication routing information is suitable for modification; causing the party to be advised when said processing has determined that the communication routing information is suitable for modification. 41. A method implemented by a network entity, said method comprising: accessing communication routing information associated to a party, the communication routing information being indicative of at least one termination device to which incoming communications for the party are to be routed; monitoring behavior information associated to the party; processing the communication routing information and the behavior information at least in part on the basis of modification information in an attempt to determine if said communication routing information is suitable for modification; causing said communication routing information to be modified upon determination that the communication routing information is suitable for modification. 42. A method as defined in claim 41, wherein the at least one termination device to which incoming communications for the party are to be routed, includes at least one first termination device to which incoming communications are to be routed, wherein the behavior information is indicative of a communication device from which the party has made an outgoing call, the modification information being indicative that the communication routing information is suitable for modification when the communication device from which the party has made an outgoing call is not the at least, one first termination device specified in the communication routing information. 43. A method as defined in claim 41, wherein the at least one termination device to which incoming communications for the party are to be routed, includes at least one first termination device to which incoming communications are to be routed, wherein the behavior information is indicative of a communication device from which the party has made an outgoing call, the modification information being indicative that the communication routing information is suitable for modification when the communication device from which the party has made an outgoing call is not the at least one first termination device specified in the communication routing information. 44. A method as defined in claim 41, wherein the at least one termination device to which incoming communications for the party are to be routed, includes at least one first termination device to which incoming communications are to be routed, wherein the behavior information is indicative that the party has logged on to a communication device, the modification information being indicative that the communication routing information is suitable for modification when the communication device is not the at least one first termination device specified in the communication routing information. 45. A method as defined in claim 41, wherein the at least one termination device to which incoming communications for the party are to be routed, includes at least, one first termination device to which incoming communications are to be routed, wherein the behavior information is indicative that a communication device associated with the party shouldn't be disturbed, the modification information being indicative that the communication routing information is suitable for modification when the communication device that shouldn't be disturbed is the at least one first termination device specified in said communication routing information. 46. A network entity comprising: an interface operative for: accessing communication routing information associated to a party, the communication routing information being indicative of at least one termination device to which incoming communications for the party are to be routed; monitoring behavior information associated to the party; a processing entity operative for: processing the communication routing information and the behavior information at least in part on the basis of modification information in an attempt to determine if said communication routing information is suitable for modification; causing said communication routing information to be modified upon determination that the communication routing information is suitable for modification.
2,400
7,291
7,291
12,879,482
2,485
Embodiments relate to insertions in 3D video. Virtual camera models enable insertions to be reconciled relative to left and right channels of the 3D video to maximize 3D accuracy and realism of the insertions. Cameras are formed as composites, and can be derived from other models. The camera models can be based on a visual analysis of the 3D video, and can be based on 3D camera data including toe-in and ocular spacing. The camera data may be derived from information collected using instrumentation connect to a 3D camera system, derived based on visual analysis of the 3D video, or derived using a combination of information collected using instrumentation and visual analysis of 3D video. Insertions can be made on-site or at a remote site, and camera data can be embedded in the 3D video and/or separately transmitted to a remote site. Insertions can be adjusted in 3D space based on a type of insertion, the 3D video scene composition, and/or user feedback, including interactive adjustment of 3D insertions and adjustments in view of user sensitivity to eye strain.
1. A method comprising: determining a first camera data parameter based on at least a first channel of a 3D video; determining a second camera data parameter based on at least a relationship between the first channel of the 3D video and a second channel of the 3D video; generating a composite camera model reconciled with the first camera data parameter and the second camera data parameter; and inserting an enhancement into the 3D video based on the composite camera model. 2. The method of claim 1, further comprising reconciling the first camera data parameter and the second camera data parameter. 3. The method of claim 1, further comprising deriving the camera data parameters based on visual analysis of at least one of the first and second channels of the 3D video. 4. The method of claim 1, wherein the camera data parameters include ocular spacing or toe angle. 5. The method of claim 1, further comprising automatically calibrating a 3D camera system associated with the 3D video, based on the camera data parameters. 6. The method of claim 1, wherein at least one of the first and second camera data parameters is obtained from a 3D camera system associated with the 3D video. 7. The method of claim 1, further comprising determining the first and second camera data parameters based on a search analysis of at least the first channel. 8. The method of claim 7, wherein the search analysis is based on voxels. 9. The method of claim 7, further comprising constraining the search analysis based on a relationship between the first and second channels of the 3D video. 10. The method of claim 1, further comprising updating the first and second camera data parameters based on at least tracking analysis of the first channel. 11. The method of claim 10, wherein the tracking analysis is based on voxels. 12. The method of claim 1, further comprising occluding the enhancement based on the composite camera model. 13. The method of claim 12, further comprising occluding the enhancement based on a target object distance determined from parallax information associated with first and second channels of the 3D video. 14. The method of claim 1, further comprising interactively positioning the enhancement at a 3D location according to received input. 15. The method of claim 14, wherein the enhancement is a telestration graphic. 16. The method of claim 1, wherein the enhancement is a rendered three-dimensional visual element. 17. The method of claim 1, further comprising automatically positioning the enhancement at a 3D location according to a scene composition of the 3D video and a type of the enhancement. 18. The method of claim 17, wherein the enhancement is at least one of an integrated graphic, a score box graphic, a telestration graphic, a subtitle, closed captioning, a pop-up graphic, an overlay graphic, and a burn-in graphic. 19. The method of claim 1, further comprising updating the enhancement to track, in 3D space, a point of interest associated with the 3D video, based on at least camera data including ocular spacing or toe angle. 20. The method of claim 1, wherein the camera data parameters include ocular spacing or toe angle, and the inserting is performed remotely from an on-site production pipe-line stage. 21. The method of claim 20, further comprising receiving the camera data parameters at pipe-line stages remote from the on-site production pipe-line stage. 22. The method of claim 20, further comprising embedding the camera data parameters into the 3D video at the on-site production pipe-line stage. 23. The method of claim 20, further comprising inserting a target place holder for the enhancement into the 3D video, wherein the inserting the enhancement is performed at downstream stages in the 3D video pipe-line based on the target place holder. 24. The method of claim 23, wherein the target place holder is generated at the on-site production pipe-line stage. 25. The method of claim 23, wherein the target place holder is generated at a centralized location downstream from the on-site production pipe-line stage. 26. A method comprising: determining a first camera data parameter based on at least a first channel of a 3D video; deriving a second camera data parameter based on a relationship between the first channel and a second channel of the 3D video; and inserting an enhancement into the 3D video based on the first and second camera data parameters. 27. A method comprising: determining a reference camera model based on at least a first channel of a 3D video and a second channel of the 3D video; deriving a first camera model based on the reference camera model and an offset associated with the first channel and a second channel of the 3D video; deriving a second camera model based on the reference camera model and the offset; and inserting an enhancement into the 3D video based on the first and second camera models. 28. A method comprising: determining a first camera model based on at least visual analysis of a first channel of a 3D video; determining a second camera model based on at least visual analysis of a second channel of the 3D video; generating a composite camera model by reconciling the first camera model and the second camera model; and inserting a score box into the 3D video based on the composite camera model. 29. A system comprising: a first search module for determining a first camera model based on at least a first channel of a 3D video; a second search module for determining a second camera model based on at least a second channel of the 3D video; a controller module for generating a composite camera model by reconciling the first camera model and the second camera model; and a mixer module for inserting an enhancement into the 3D video based on the composite camera model. 30. A method comprising: receiving a first camera data parameter associated at least with a first channel of a 3D video; receiving a second camera data parameter associated with the first channel of the 3D video relative to a second channel of the 3D video; and inserting an enhancement into the 3D video based on at least the first and second camera data parameters, wherein the inserting is performed remotely from an on-site production pipe-line stage. 31. The method of claim 30, further comprising generating a composite camera model based on at least the first and second camera data parameters. 32. The method of claim 30, wherein the second camera data parameter is ocular spacing or toe angle of the 3D video. 33. The method of claim 30, wherein the first and second camera data parameters are transmitted from the on-site production pipe-line stage.
Embodiments relate to insertions in 3D video. Virtual camera models enable insertions to be reconciled relative to left and right channels of the 3D video to maximize 3D accuracy and realism of the insertions. Cameras are formed as composites, and can be derived from other models. The camera models can be based on a visual analysis of the 3D video, and can be based on 3D camera data including toe-in and ocular spacing. The camera data may be derived from information collected using instrumentation connect to a 3D camera system, derived based on visual analysis of the 3D video, or derived using a combination of information collected using instrumentation and visual analysis of 3D video. Insertions can be made on-site or at a remote site, and camera data can be embedded in the 3D video and/or separately transmitted to a remote site. Insertions can be adjusted in 3D space based on a type of insertion, the 3D video scene composition, and/or user feedback, including interactive adjustment of 3D insertions and adjustments in view of user sensitivity to eye strain.1. A method comprising: determining a first camera data parameter based on at least a first channel of a 3D video; determining a second camera data parameter based on at least a relationship between the first channel of the 3D video and a second channel of the 3D video; generating a composite camera model reconciled with the first camera data parameter and the second camera data parameter; and inserting an enhancement into the 3D video based on the composite camera model. 2. The method of claim 1, further comprising reconciling the first camera data parameter and the second camera data parameter. 3. The method of claim 1, further comprising deriving the camera data parameters based on visual analysis of at least one of the first and second channels of the 3D video. 4. The method of claim 1, wherein the camera data parameters include ocular spacing or toe angle. 5. The method of claim 1, further comprising automatically calibrating a 3D camera system associated with the 3D video, based on the camera data parameters. 6. The method of claim 1, wherein at least one of the first and second camera data parameters is obtained from a 3D camera system associated with the 3D video. 7. The method of claim 1, further comprising determining the first and second camera data parameters based on a search analysis of at least the first channel. 8. The method of claim 7, wherein the search analysis is based on voxels. 9. The method of claim 7, further comprising constraining the search analysis based on a relationship between the first and second channels of the 3D video. 10. The method of claim 1, further comprising updating the first and second camera data parameters based on at least tracking analysis of the first channel. 11. The method of claim 10, wherein the tracking analysis is based on voxels. 12. The method of claim 1, further comprising occluding the enhancement based on the composite camera model. 13. The method of claim 12, further comprising occluding the enhancement based on a target object distance determined from parallax information associated with first and second channels of the 3D video. 14. The method of claim 1, further comprising interactively positioning the enhancement at a 3D location according to received input. 15. The method of claim 14, wherein the enhancement is a telestration graphic. 16. The method of claim 1, wherein the enhancement is a rendered three-dimensional visual element. 17. The method of claim 1, further comprising automatically positioning the enhancement at a 3D location according to a scene composition of the 3D video and a type of the enhancement. 18. The method of claim 17, wherein the enhancement is at least one of an integrated graphic, a score box graphic, a telestration graphic, a subtitle, closed captioning, a pop-up graphic, an overlay graphic, and a burn-in graphic. 19. The method of claim 1, further comprising updating the enhancement to track, in 3D space, a point of interest associated with the 3D video, based on at least camera data including ocular spacing or toe angle. 20. The method of claim 1, wherein the camera data parameters include ocular spacing or toe angle, and the inserting is performed remotely from an on-site production pipe-line stage. 21. The method of claim 20, further comprising receiving the camera data parameters at pipe-line stages remote from the on-site production pipe-line stage. 22. The method of claim 20, further comprising embedding the camera data parameters into the 3D video at the on-site production pipe-line stage. 23. The method of claim 20, further comprising inserting a target place holder for the enhancement into the 3D video, wherein the inserting the enhancement is performed at downstream stages in the 3D video pipe-line based on the target place holder. 24. The method of claim 23, wherein the target place holder is generated at the on-site production pipe-line stage. 25. The method of claim 23, wherein the target place holder is generated at a centralized location downstream from the on-site production pipe-line stage. 26. A method comprising: determining a first camera data parameter based on at least a first channel of a 3D video; deriving a second camera data parameter based on a relationship between the first channel and a second channel of the 3D video; and inserting an enhancement into the 3D video based on the first and second camera data parameters. 27. A method comprising: determining a reference camera model based on at least a first channel of a 3D video and a second channel of the 3D video; deriving a first camera model based on the reference camera model and an offset associated with the first channel and a second channel of the 3D video; deriving a second camera model based on the reference camera model and the offset; and inserting an enhancement into the 3D video based on the first and second camera models. 28. A method comprising: determining a first camera model based on at least visual analysis of a first channel of a 3D video; determining a second camera model based on at least visual analysis of a second channel of the 3D video; generating a composite camera model by reconciling the first camera model and the second camera model; and inserting a score box into the 3D video based on the composite camera model. 29. A system comprising: a first search module for determining a first camera model based on at least a first channel of a 3D video; a second search module for determining a second camera model based on at least a second channel of the 3D video; a controller module for generating a composite camera model by reconciling the first camera model and the second camera model; and a mixer module for inserting an enhancement into the 3D video based on the composite camera model. 30. A method comprising: receiving a first camera data parameter associated at least with a first channel of a 3D video; receiving a second camera data parameter associated with the first channel of the 3D video relative to a second channel of the 3D video; and inserting an enhancement into the 3D video based on at least the first and second camera data parameters, wherein the inserting is performed remotely from an on-site production pipe-line stage. 31. The method of claim 30, further comprising generating a composite camera model based on at least the first and second camera data parameters. 32. The method of claim 30, wherein the second camera data parameter is ocular spacing or toe angle of the 3D video. 33. The method of claim 30, wherein the first and second camera data parameters are transmitted from the on-site production pipe-line stage.
2,400
7,292
7,292
14,752,635
2,434
Examples perform asynchronous encrypted live migration of virtual machines (VM) from a source host to a destination host. The encryption of the memory blocks of the VM is performed optionally before a request for live migration is received or after said request. The more resource intensive decryption of the memory blocks of the VM is performed by the destination host in a resource efficient manner, reducing the downtime apparent to users. Some examples contemplate decrypting memory blocks of the transmitted VM on-demand and opportunistically, according to a pre-determined rate, or in accordance with parameters established by a user.
1. A system comprising: a memory area associated with a computing device, said memory area storing memory blocks; and a processor programmed to: encrypt, at a first host, one or more memory blocks associated with a source virtual machine (VM); transfer the one or more encrypted memory blocks to the one or more second hosts; and decrypt, on-demand and opportunistically, at the one or more second hosts, the one or more encrypted memory blocks. 2. The system of claim 1, wherein the processor is programmed to: receive a request associated with one or more first memory blocks of the one or more encrypted memory blocks; and selectively decrypt, at the one or more second hosts, the one or more first memory blocks after receiving the request during a first phase of a plurality of phases. 3. The system of claim 2, wherein the processor is programmed to decrypt, at the one or more second hosts, one or more second memory blocks of the one or more encrypted memory blocks at a predetermined rate during a second phase of the plurality of phases. 4. The system of claim 1, wherein the processor is programmed to decrypt, at the one or more second hosts, the one or more encrypted memory blocks at a predetermined rate. 5. The system of claim 1, wherein the processor is programmed to: identify one or more first memory blocks of the one or more memory blocks associated with a first priority of a plurality of priorities; identify one or more second memory blocks of the one or more memory blocks associated with a second priority of the plurality of priorities; decrypt, at the one or more second hosts, the one or more first memory blocks associated with the first priority before the one or more second memory blocks associated with the second priority are decrypted. 6. The system of claim 1, wherein the processor is programmed to: associate the one or more memory blocks with a flag after encrypting the one or more memory blocks; and disassociate the one or more memory blocks from the flag after decrypting the one or more encrypted memory blocks. 7. The system of claim 1, wherein the processor is further programmed to: determine whether one or more first memory blocks of the one or more memory blocks are encrypted with a first parameter; and when the one or more first memory blocks are determined to be encrypted with the first parameter, encrypt, at the first host, the one or more first encrypted memory blocks with a second parameter. 8. The system of claim 1, wherein the processor is further programmed to: calculate one or more hashes of the memory blocks; encrypt the one or more calculated hashes; transfer the one or more encrypted hashes to one or more destination hosts; and decrypt the one or more hashes at the one or more destination hosts. 9. A method for encrypting memory blocks, said method comprising: encrypting one or more memory blocks associated with a source host with a first parameter; transferring the one or more encrypted memory blocks to one or more destination hosts; and decrypting the one or more encrypted memory blocks on-demand and opportunistically. 10. The method of claim 9, further comprising: identifying one or more first memory blocks of the one or more memory blocks associated with a first priority of a plurality of priorities; identifying one or more second memory blocks of the one or more memory blocks associated with a second priority of the plurality of priorities, wherein decrypting the one or more encrypted memory blocks comprises decrypting the one or more first memory blocks associated with the first priority, and decrypting the one or more second memory blocks associated with the second priority after the one or more first memory blocks are decrypted. 11. The method of claim 9, further comprising identifying a pattern associated with the encryption of the one or more memory blocks, wherein decrypting the one or more encrypted memory blocks comprises decrypting the one or more encrypted memory blocks based on the pattern. 12. The method of claim 9, further comprising determining whether one or more first memory blocks of the one or more memory blocks are encrypted with a second parameter, wherein encrypting one or more memory blocks comprises, when the one or more first memory blocks are determined to be encrypted with the second parameter, encrypting the one or more first encrypted memory blocks with the first parameter, such that the encryption with the first parameter and the encryption with the second parameter are nested. 13. The method of claim 9, further comprising receiving a request associated with one or more first memory blocks of the one or more encrypted memory blocks, wherein decrypting the one or more encrypted memory blocks comprises selectively decrypting the one or more first memory blocks after receiving the request during a first phase of a plurality of phases. 14. The method of claim 13, wherein decrypting the one or more encrypted memory blocks comprises decrypting one or more second memory blocks of the one or more encrypted memory blocks at a predetermined rate during a second phase of the plurality of phases. 15. The method of claim 9, wherein transferring the one or more memory blocks further comprises: optionally downgrading locks on one or more disks of a source host from an exclusive mode to a non-exclusive mode, wherein a destination hosts opens the disks in non-exclusive mode while the source host is executing; suspending execution of the source host; transferring virtual memory of the source host to the destination host, wherein the destination host begins execution after restoration of the virtual memory at the destination host; and optionally closing the disks on the source host, wherein the destination host upgrades the locks from the non-exclusive mode to the exclusive mode. 16. The method of claim 15, wherein transferring the virtual memory further comprises pre-copying the virtual memory from the source host to the destination host after downgrading the locks. 17. One or more computer-readable storage media including computer-executable instructions that, when executed, cause at least one processor to: encrypt, at a first host, one or more memory blocks associated with a first parameter; transfer the one or more encrypted memory blocks to one or more destination hosts; and decrypt, at one or more second hosts, the one or more encrypted memory blocks on-demand and opportunistically. 18. The one or more computer-readable storage media of claim 17, wherein the computer-executable instructions, when executed, cause at least one processor to: receive a request associated with one or more first memory blocks of the one or more encrypted memory blocks; selectively decrypt, at the one or more second hosts, the one or more first memory blocks after receiving the request during a first phase of a plurality of phases; and decrypt, at the one or more second hosts, one or more second memory blocks of the one or more encrypted memory blocks at a predetermined rate during a second phase of the plurality of phases. 19. The one or more computer-readable storage media of claim 17, wherein the computer-executable instructions, when executed, cause at least one processor to: identify one or more first memory blocks of the one or more memory blocks associated with a first priority of a plurality of priorities; identify one or more second memory blocks of the one or more memory blocks associated with a second priority of the plurality of priorities; decrypt, at the one or more second hosts, the one or more first memory blocks associated with the first priority before the one or more second memory blocks associated with the second priority are decrypted. 20. The one or more computer-readable storage media of claim 17, wherein the computer-executable instructions, when executed, cause at least one processor to: determine whether one or more first memory blocks of the one or more memory blocks are encrypted with a second parameter before the one or more first memory blocks are encrypted with the first parameter; and when the one or more first memory blocks are determined to be encrypted with the second parameter, encrypt the one or more first encrypted memory blocks with the first parameter, such that the encryption with the first parameter and the encryption with the second parameter are nested.
Examples perform asynchronous encrypted live migration of virtual machines (VM) from a source host to a destination host. The encryption of the memory blocks of the VM is performed optionally before a request for live migration is received or after said request. The more resource intensive decryption of the memory blocks of the VM is performed by the destination host in a resource efficient manner, reducing the downtime apparent to users. Some examples contemplate decrypting memory blocks of the transmitted VM on-demand and opportunistically, according to a pre-determined rate, or in accordance with parameters established by a user.1. A system comprising: a memory area associated with a computing device, said memory area storing memory blocks; and a processor programmed to: encrypt, at a first host, one or more memory blocks associated with a source virtual machine (VM); transfer the one or more encrypted memory blocks to the one or more second hosts; and decrypt, on-demand and opportunistically, at the one or more second hosts, the one or more encrypted memory blocks. 2. The system of claim 1, wherein the processor is programmed to: receive a request associated with one or more first memory blocks of the one or more encrypted memory blocks; and selectively decrypt, at the one or more second hosts, the one or more first memory blocks after receiving the request during a first phase of a plurality of phases. 3. The system of claim 2, wherein the processor is programmed to decrypt, at the one or more second hosts, one or more second memory blocks of the one or more encrypted memory blocks at a predetermined rate during a second phase of the plurality of phases. 4. The system of claim 1, wherein the processor is programmed to decrypt, at the one or more second hosts, the one or more encrypted memory blocks at a predetermined rate. 5. The system of claim 1, wherein the processor is programmed to: identify one or more first memory blocks of the one or more memory blocks associated with a first priority of a plurality of priorities; identify one or more second memory blocks of the one or more memory blocks associated with a second priority of the plurality of priorities; decrypt, at the one or more second hosts, the one or more first memory blocks associated with the first priority before the one or more second memory blocks associated with the second priority are decrypted. 6. The system of claim 1, wherein the processor is programmed to: associate the one or more memory blocks with a flag after encrypting the one or more memory blocks; and disassociate the one or more memory blocks from the flag after decrypting the one or more encrypted memory blocks. 7. The system of claim 1, wherein the processor is further programmed to: determine whether one or more first memory blocks of the one or more memory blocks are encrypted with a first parameter; and when the one or more first memory blocks are determined to be encrypted with the first parameter, encrypt, at the first host, the one or more first encrypted memory blocks with a second parameter. 8. The system of claim 1, wherein the processor is further programmed to: calculate one or more hashes of the memory blocks; encrypt the one or more calculated hashes; transfer the one or more encrypted hashes to one or more destination hosts; and decrypt the one or more hashes at the one or more destination hosts. 9. A method for encrypting memory blocks, said method comprising: encrypting one or more memory blocks associated with a source host with a first parameter; transferring the one or more encrypted memory blocks to one or more destination hosts; and decrypting the one or more encrypted memory blocks on-demand and opportunistically. 10. The method of claim 9, further comprising: identifying one or more first memory blocks of the one or more memory blocks associated with a first priority of a plurality of priorities; identifying one or more second memory blocks of the one or more memory blocks associated with a second priority of the plurality of priorities, wherein decrypting the one or more encrypted memory blocks comprises decrypting the one or more first memory blocks associated with the first priority, and decrypting the one or more second memory blocks associated with the second priority after the one or more first memory blocks are decrypted. 11. The method of claim 9, further comprising identifying a pattern associated with the encryption of the one or more memory blocks, wherein decrypting the one or more encrypted memory blocks comprises decrypting the one or more encrypted memory blocks based on the pattern. 12. The method of claim 9, further comprising determining whether one or more first memory blocks of the one or more memory blocks are encrypted with a second parameter, wherein encrypting one or more memory blocks comprises, when the one or more first memory blocks are determined to be encrypted with the second parameter, encrypting the one or more first encrypted memory blocks with the first parameter, such that the encryption with the first parameter and the encryption with the second parameter are nested. 13. The method of claim 9, further comprising receiving a request associated with one or more first memory blocks of the one or more encrypted memory blocks, wherein decrypting the one or more encrypted memory blocks comprises selectively decrypting the one or more first memory blocks after receiving the request during a first phase of a plurality of phases. 14. The method of claim 13, wherein decrypting the one or more encrypted memory blocks comprises decrypting one or more second memory blocks of the one or more encrypted memory blocks at a predetermined rate during a second phase of the plurality of phases. 15. The method of claim 9, wherein transferring the one or more memory blocks further comprises: optionally downgrading locks on one or more disks of a source host from an exclusive mode to a non-exclusive mode, wherein a destination hosts opens the disks in non-exclusive mode while the source host is executing; suspending execution of the source host; transferring virtual memory of the source host to the destination host, wherein the destination host begins execution after restoration of the virtual memory at the destination host; and optionally closing the disks on the source host, wherein the destination host upgrades the locks from the non-exclusive mode to the exclusive mode. 16. The method of claim 15, wherein transferring the virtual memory further comprises pre-copying the virtual memory from the source host to the destination host after downgrading the locks. 17. One or more computer-readable storage media including computer-executable instructions that, when executed, cause at least one processor to: encrypt, at a first host, one or more memory blocks associated with a first parameter; transfer the one or more encrypted memory blocks to one or more destination hosts; and decrypt, at one or more second hosts, the one or more encrypted memory blocks on-demand and opportunistically. 18. The one or more computer-readable storage media of claim 17, wherein the computer-executable instructions, when executed, cause at least one processor to: receive a request associated with one or more first memory blocks of the one or more encrypted memory blocks; selectively decrypt, at the one or more second hosts, the one or more first memory blocks after receiving the request during a first phase of a plurality of phases; and decrypt, at the one or more second hosts, one or more second memory blocks of the one or more encrypted memory blocks at a predetermined rate during a second phase of the plurality of phases. 19. The one or more computer-readable storage media of claim 17, wherein the computer-executable instructions, when executed, cause at least one processor to: identify one or more first memory blocks of the one or more memory blocks associated with a first priority of a plurality of priorities; identify one or more second memory blocks of the one or more memory blocks associated with a second priority of the plurality of priorities; decrypt, at the one or more second hosts, the one or more first memory blocks associated with the first priority before the one or more second memory blocks associated with the second priority are decrypted. 20. The one or more computer-readable storage media of claim 17, wherein the computer-executable instructions, when executed, cause at least one processor to: determine whether one or more first memory blocks of the one or more memory blocks are encrypted with a second parameter before the one or more first memory blocks are encrypted with the first parameter; and when the one or more first memory blocks are determined to be encrypted with the second parameter, encrypt the one or more first encrypted memory blocks with the first parameter, such that the encryption with the first parameter and the encryption with the second parameter are nested.
2,400
7,293
7,293
14,089,169
2,419
Video information intended to be reproduced on a television screen often includes additional information such as graphics information or subtitles in addition to the main information such as film images. This additional information is transmitted separately, so that the user may choose whether the additional information is to be displayed or not. According to present embodiments, the transmitted video signal includes information relating to the duration for which the additional information is to remain on the display. The additional information can be displayed exactly for the duration of the desired time. When a video disc or tape is used for transferring video information, this is advantageous in trick modes, such as Fast Forward.
1. A method of producing a presentation, comprising: providing basic information including information frames during the presentation of the basic information to an audience; and providing overlay information during the presentation of the basic information, the overlay information including a predetermined duration of time indicating the duration during the display in which a portion of the overlay information is substituted for a portion of each respective frame of a plurality of the information frames. 2. A method of producing a presentation, comprising: providing basic information including a series of subsequent frames during the presentation of the basic information to an audience, each frame being presented for a predetermined nominal frame period; providing overlay information during the presentation, the overlay information including a predetermined overlay duration of time during which the presentation of the overlay portion is substituted for respective portions of the presentation of a plurality of the subsequent frames, the overlay duration exceeding the nominal frame period. 3. A method of producing a presentation, comprising: providing basic information to be presented at a variable presentation rate; and providing overlay information including a predetermined overlay duration of time during which the overlay information is substituted for portions of the basic information during the presentation, the overlay duration being independent of the presentation rate. 4. A method of producing a presentation, comprising: providing a series of frames; providing overlay information; substituting the overlay information for a portion of each respective frame of multiple frames depending on a predetermined overlay duration during a presentation of the series of frames. 5. A presentation device, comprising: an input for receiving a series of frames and overlay information including a duration; means for presenting the frames to an audience; means for substituting, during the presenting, the same portion of the overlap information for a portion of each frame in the same area of each frame of multiple subsequent frames during the presenting.
Video information intended to be reproduced on a television screen often includes additional information such as graphics information or subtitles in addition to the main information such as film images. This additional information is transmitted separately, so that the user may choose whether the additional information is to be displayed or not. According to present embodiments, the transmitted video signal includes information relating to the duration for which the additional information is to remain on the display. The additional information can be displayed exactly for the duration of the desired time. When a video disc or tape is used for transferring video information, this is advantageous in trick modes, such as Fast Forward.1. A method of producing a presentation, comprising: providing basic information including information frames during the presentation of the basic information to an audience; and providing overlay information during the presentation of the basic information, the overlay information including a predetermined duration of time indicating the duration during the display in which a portion of the overlay information is substituted for a portion of each respective frame of a plurality of the information frames. 2. A method of producing a presentation, comprising: providing basic information including a series of subsequent frames during the presentation of the basic information to an audience, each frame being presented for a predetermined nominal frame period; providing overlay information during the presentation, the overlay information including a predetermined overlay duration of time during which the presentation of the overlay portion is substituted for respective portions of the presentation of a plurality of the subsequent frames, the overlay duration exceeding the nominal frame period. 3. A method of producing a presentation, comprising: providing basic information to be presented at a variable presentation rate; and providing overlay information including a predetermined overlay duration of time during which the overlay information is substituted for portions of the basic information during the presentation, the overlay duration being independent of the presentation rate. 4. A method of producing a presentation, comprising: providing a series of frames; providing overlay information; substituting the overlay information for a portion of each respective frame of multiple frames depending on a predetermined overlay duration during a presentation of the series of frames. 5. A presentation device, comprising: an input for receiving a series of frames and overlay information including a duration; means for presenting the frames to an audience; means for substituting, during the presenting, the same portion of the overlap information for a portion of each frame in the same area of each frame of multiple subsequent frames during the presenting.
2,400
7,294
7,294
12,946,701
2,482
A system and method providing semi-private conversation using an area microphone between one local user in a group of local users and a remote user. The local and remote users may be in different physical environments, using devices coupled by a network. A conversational relationship is defined between a local user and a remote user. The local user's voice is isolated from other voices in the environment, and transmitted to the remote user. Directional output technology may be used to direct the local user's utterances to the remote user in the remote environment.
1. A method of providing a semi-private conversation between a local user and a remote user, comprising: receiving voice input from at least a first user of at least two users in a first physical environment via an area microphone; localizing a voice in the first physical environment; associating a voice with the first user; isolating utterances of the first user in the first environment; and directing the isolated utterances of the first user in the first environment to a second user in a second physical environment. 2. The method of claim 1 further including the step of tracking user locations in the physical environment and focusing the area microphone on the user location. 3. The method of claim 2 further including tracking user location by detecting user location in a field of view of a depth camera. 4. The method of claim 3 further including the step of recording a voice print of the user and associating the voice print with a skeletal model of the user. 5. The method of claim 1 further including the step of determining a conversational relationship between the first user and a user in the second physical environment. 6. The method of claim 5 wherein the conversational relationship comprises the first user and a second user acting as teammates in a game. 7. The method of claim 1 wherein the method further includes receiving isolated utterances from the second user in the second physical environment and routing the utterances to the first user in the first physical environment. 8. The method of claim 7 wherein routing comprises providing isolated utterances from the second user to a directional output aimed at the first user. 9. The method of claim 1 wherein the step of localization includes combining spatial filtering with regularization on the input to provide at least two outputs. 10. A system including at least a motion capture system and an audio input, comprising: a motion capture device including at least one area microphone; a processing device including instructions causing the processing device to: localizing a voice received via the capture device from a first user of a plurality of users in a first physical environment; associating the voice with the first user; isolating utterances of the first user in the first environment; and directing the isolated utterances of the first user in the first environment to a second user in a second environment; and a directional audio output device coupled to the processing device directing audio output from a remote user. 11. The system of claim 10 wherein the instructions further include tracking at least a first local user and a second local user in a first physical environment, each local user having a conversational relationship with a remote user in a second physical environment 12. The system of claim 10 wherein the instructions further include receiving isolated utterances from the second user in the second physical environment and routing the utterances to the first user in the first physical environment. 13. The system of claim 10 wherein the directional output comprises an array of ultrasonic speakers. 14. The system of claim 10 wherein the directional output comprises at least a first movable speaker and a second movable speaker. 15. A method providing a semi-private communications between local users and remote users, the local users and remote users connected via a network, comprising: tracking at least a first local user and a second local user in a first physical environment, each local user having a conversational relationship with a remote user in a second physical environment; associating a voice source with the first local user and the second local user; isolating utterances of the first local user; routing isolated utterances of the first user in the first environment to a first remote user in the second environment; isolating utterances of the second local user; and routing the isolated utterances of the second user in the first environment to a second remote user in the second environment. 16. The method of claim 15 wherein the steps of isolating includes combining spatial filtering with regularization on the input to provide an isolated output. 17. The method of claim 16 wherein the method further includes the step of tracking user locations in the physical environment and focusing the area microphone on the user location. 18. The method of claim 17 wherein routing comprises providing the isolated utterances from the second user to a directional output aimed at the first user. 19. The method of claim 18 further including the step of receiving isolated utterances from the first remote user in the second physical environment and routing the utterances to the first local user in the first physical environment. 20. The method of claim 19 wherein at least one of the first remote user and the second remote user utilizes a headset.
A system and method providing semi-private conversation using an area microphone between one local user in a group of local users and a remote user. The local and remote users may be in different physical environments, using devices coupled by a network. A conversational relationship is defined between a local user and a remote user. The local user's voice is isolated from other voices in the environment, and transmitted to the remote user. Directional output technology may be used to direct the local user's utterances to the remote user in the remote environment.1. A method of providing a semi-private conversation between a local user and a remote user, comprising: receiving voice input from at least a first user of at least two users in a first physical environment via an area microphone; localizing a voice in the first physical environment; associating a voice with the first user; isolating utterances of the first user in the first environment; and directing the isolated utterances of the first user in the first environment to a second user in a second physical environment. 2. The method of claim 1 further including the step of tracking user locations in the physical environment and focusing the area microphone on the user location. 3. The method of claim 2 further including tracking user location by detecting user location in a field of view of a depth camera. 4. The method of claim 3 further including the step of recording a voice print of the user and associating the voice print with a skeletal model of the user. 5. The method of claim 1 further including the step of determining a conversational relationship between the first user and a user in the second physical environment. 6. The method of claim 5 wherein the conversational relationship comprises the first user and a second user acting as teammates in a game. 7. The method of claim 1 wherein the method further includes receiving isolated utterances from the second user in the second physical environment and routing the utterances to the first user in the first physical environment. 8. The method of claim 7 wherein routing comprises providing isolated utterances from the second user to a directional output aimed at the first user. 9. The method of claim 1 wherein the step of localization includes combining spatial filtering with regularization on the input to provide at least two outputs. 10. A system including at least a motion capture system and an audio input, comprising: a motion capture device including at least one area microphone; a processing device including instructions causing the processing device to: localizing a voice received via the capture device from a first user of a plurality of users in a first physical environment; associating the voice with the first user; isolating utterances of the first user in the first environment; and directing the isolated utterances of the first user in the first environment to a second user in a second environment; and a directional audio output device coupled to the processing device directing audio output from a remote user. 11. The system of claim 10 wherein the instructions further include tracking at least a first local user and a second local user in a first physical environment, each local user having a conversational relationship with a remote user in a second physical environment 12. The system of claim 10 wherein the instructions further include receiving isolated utterances from the second user in the second physical environment and routing the utterances to the first user in the first physical environment. 13. The system of claim 10 wherein the directional output comprises an array of ultrasonic speakers. 14. The system of claim 10 wherein the directional output comprises at least a first movable speaker and a second movable speaker. 15. A method providing a semi-private communications between local users and remote users, the local users and remote users connected via a network, comprising: tracking at least a first local user and a second local user in a first physical environment, each local user having a conversational relationship with a remote user in a second physical environment; associating a voice source with the first local user and the second local user; isolating utterances of the first local user; routing isolated utterances of the first user in the first environment to a first remote user in the second environment; isolating utterances of the second local user; and routing the isolated utterances of the second user in the first environment to a second remote user in the second environment. 16. The method of claim 15 wherein the steps of isolating includes combining spatial filtering with regularization on the input to provide an isolated output. 17. The method of claim 16 wherein the method further includes the step of tracking user locations in the physical environment and focusing the area microphone on the user location. 18. The method of claim 17 wherein routing comprises providing the isolated utterances from the second user to a directional output aimed at the first user. 19. The method of claim 18 further including the step of receiving isolated utterances from the first remote user in the second physical environment and routing the utterances to the first local user in the first physical environment. 20. The method of claim 19 wherein at least one of the first remote user and the second remote user utilizes a headset.
2,400
7,295
7,295
12,784,942
2,484
Apparatus and methods are provided to implement a technique for an interactive video system that allows a user to place supplemental items such as images on a main image being displayed. In one implementation, a user causes images of flying food to be displayed on top of a playing movie. Supplemental item data may be provided on the same media as is the main item data, e.g., on an optical disc, and control information may be provided on the media to control how supplemental item data is applied and presented.
1. A system for enhancing a main item of video data with a supplemental item, comprising: a. a processor having a capability for executing programming to implement playback of items of video data; b. means for receiving video data for display; c. means for receiving a non-transitory computer-readable medium; d. storage means for storing data retrieved from the non-transitory computer-readable medium or data received from a network, or a combination of both types of data; e. memory in communication with the video data receiving means bearing computer-readable instructions capable of causing the video data receiving means to render the main item of video data and to direct a signal corresponding to the rendered video data to an output jack; and f. memory bearing computer-readable instructions capable of causing a rendering of a supplemental item. 2. The system of claim 1, wherein the memory bearing computer-readable instructions capable of causing a rendering of a supplemental item includes memory in communication with the video data receiving means bearing computer-readable instructions capable of causing the video data receiving means to render a supplemental item in addition to the main item of video data and direct a signal corresponding to the rendered supplemental item to the output jack. 3. The system of claim 2, wherein the addition includes a superposition of the supplemental item of video data on top of the main item of video data. 4. The system of claim 1, wherein the video data receiving means is selected from the group consisting of: a video graphics card, a graphical processing unit, an integrated chipset, and combinations thereof. 5. The system of claim 2, further comprising memory in communication with the video data receiving means bearing computer-readable instructions capable of causing the video data receiving means to render a removal of the supplemental item and direct a signal corresponding to the rendering to the output jack. 6. The system of claim 1, wherein the supplemental item includes an audio effect. 7. The system of claim 2, wherein the supplemental item of video data is associated with a type of image, an image location, or both. 8. The system of claim 7, further comprising memory in communication with the processor bearing computer-readable instructions capable of causing the processor to render one or more options by the video data receiving means, the options corresponding to suggested supplemental items. 9. The system of claim 5, wherein the removal rendering begins following the passage of a predetermined period of time. 10. The system of claim 5, wherein the removal rendering begins upon user indication. 11. A method for enhancing a main item of video data, comprising: a. during playback of a main item of video data, receiving a signal indicating that a supplemental item is to be added to the main item of video data; and b. responding to the received signal by adding the supplemental item to the main item of video data. 12. The method of claim 11, wherein the receiving a signal includes receiving an indication from a user that a supplemental item mode is to be entered. 13. The method of claim 11, further comprising displaying a number of options, the options corresponding to different supplemental items. 14. The method of claim 13, further comprising receiving a signal corresponding to a chosen option, the chosen option corresponding to a supplemental item to add. 15. The method of claim 11, further comprising receiving a user input, the user input indicating a location at which a supplemental item is to be displayed. 16. The method of claim 15, further comprising receiving a signal corresponding to a chosen option, the chosen option corresponding to a location at which a supplemental item is to be displayed. 17. The method of claim 11, wherein the adding includes superposing the supplemental item on top of the main item of video data. 18. A computer-readable medium, comprising instructions for causing a computing device to perform the method of claim 11. 19. A computer-readable medium, comprising instructions for causing a computing device to perform a method for enhancing a main item of video data, the computer-readable medium comprising: a. an asset file, the asset file including a main item of video data; and b. a control file, the control file including computer-readable instructions for enabling a user to enhance a viewing experience of the asset file, the enhancing including adding a supplemental item to the main item of video data. 20. The computer-readable medium of claim 19, wherein the control file further includes computer-readable instructions for enabling a user to enter an enhancement mode of the control file. 21. The computer-readable medium of claim 19, wherein the adding includes superposing the supplemental item on top of the main item of video data. 22. The computer-readable medium of claim 19, further comprising a supplemental asset file corresponding to the supplemental item of video data, the supplemental asset file including graphical data corresponding to the supplemental item. 23. The computer-readable medium of claim 22, wherein the supplemental asset file further comprises audio data corresponding to the supplemental item. 24. The computer-readable medium of claim 22, wherein the supplemental asset file includes animation data corresponding to the supplemental item. 25. The computer-readable medium of claim 21, wherein the adding occurs upon user indication. 26. The computer-readable medium of claim 19, wherein the control file further includes computer-readable instructions for enabling a user to choose a supplemental item to be added in the adding step. 27. The computer-readable medium of claim 19, wherein the control file further includes computer-readable instructions for enabling a user to choose a location at which the supplemental item is to be added in the adding step. 28. A system for enhancing a main item of video data with a supplemental item, comprising: a. a processor having a capability for executing programming to implement playback of items of video data; b. means for receiving video data for display; c. means for receiving a non-transitory computer-readable medium; d. storage means for storing data retrieved from the non-transitory computer-readable medium or data received from a network, or a combination of both types of data; e. memory in communication with the video data receiving means bearing computer-readable instructions capable of causing the video data receiving means to render the main item of video data and to direct a signal corresponding to the rendered video data to an output jack; and f. memory in communication with the video data receiving means bearing computer-readable instructions capable of causing the video data receiving means to render a modification of the main item of video data and direct a signal corresponding to the rendered and modified main item of video data to the output jack. 29. A method for enhancing a main item of video data, comprising: a. during playback of a main item of video data, receiving a signal indicating that a modification of the main item of video data is to occur; and b. responding to the received signal by modifying the main item of video data. 30. A computer-readable medium, comprising instructions for causing a computing device to perform a method for enhancing a main item of video data, the computer-readable medium comprising: a. an asset file, the asset file including a main item of video data; and b. a control file, the control file including computer-readable instructions for enabling a user to enhance a viewing experience of the asset file, the enhancing including modifying the main item of video data.
Apparatus and methods are provided to implement a technique for an interactive video system that allows a user to place supplemental items such as images on a main image being displayed. In one implementation, a user causes images of flying food to be displayed on top of a playing movie. Supplemental item data may be provided on the same media as is the main item data, e.g., on an optical disc, and control information may be provided on the media to control how supplemental item data is applied and presented.1. A system for enhancing a main item of video data with a supplemental item, comprising: a. a processor having a capability for executing programming to implement playback of items of video data; b. means for receiving video data for display; c. means for receiving a non-transitory computer-readable medium; d. storage means for storing data retrieved from the non-transitory computer-readable medium or data received from a network, or a combination of both types of data; e. memory in communication with the video data receiving means bearing computer-readable instructions capable of causing the video data receiving means to render the main item of video data and to direct a signal corresponding to the rendered video data to an output jack; and f. memory bearing computer-readable instructions capable of causing a rendering of a supplemental item. 2. The system of claim 1, wherein the memory bearing computer-readable instructions capable of causing a rendering of a supplemental item includes memory in communication with the video data receiving means bearing computer-readable instructions capable of causing the video data receiving means to render a supplemental item in addition to the main item of video data and direct a signal corresponding to the rendered supplemental item to the output jack. 3. The system of claim 2, wherein the addition includes a superposition of the supplemental item of video data on top of the main item of video data. 4. The system of claim 1, wherein the video data receiving means is selected from the group consisting of: a video graphics card, a graphical processing unit, an integrated chipset, and combinations thereof. 5. The system of claim 2, further comprising memory in communication with the video data receiving means bearing computer-readable instructions capable of causing the video data receiving means to render a removal of the supplemental item and direct a signal corresponding to the rendering to the output jack. 6. The system of claim 1, wherein the supplemental item includes an audio effect. 7. The system of claim 2, wherein the supplemental item of video data is associated with a type of image, an image location, or both. 8. The system of claim 7, further comprising memory in communication with the processor bearing computer-readable instructions capable of causing the processor to render one or more options by the video data receiving means, the options corresponding to suggested supplemental items. 9. The system of claim 5, wherein the removal rendering begins following the passage of a predetermined period of time. 10. The system of claim 5, wherein the removal rendering begins upon user indication. 11. A method for enhancing a main item of video data, comprising: a. during playback of a main item of video data, receiving a signal indicating that a supplemental item is to be added to the main item of video data; and b. responding to the received signal by adding the supplemental item to the main item of video data. 12. The method of claim 11, wherein the receiving a signal includes receiving an indication from a user that a supplemental item mode is to be entered. 13. The method of claim 11, further comprising displaying a number of options, the options corresponding to different supplemental items. 14. The method of claim 13, further comprising receiving a signal corresponding to a chosen option, the chosen option corresponding to a supplemental item to add. 15. The method of claim 11, further comprising receiving a user input, the user input indicating a location at which a supplemental item is to be displayed. 16. The method of claim 15, further comprising receiving a signal corresponding to a chosen option, the chosen option corresponding to a location at which a supplemental item is to be displayed. 17. The method of claim 11, wherein the adding includes superposing the supplemental item on top of the main item of video data. 18. A computer-readable medium, comprising instructions for causing a computing device to perform the method of claim 11. 19. A computer-readable medium, comprising instructions for causing a computing device to perform a method for enhancing a main item of video data, the computer-readable medium comprising: a. an asset file, the asset file including a main item of video data; and b. a control file, the control file including computer-readable instructions for enabling a user to enhance a viewing experience of the asset file, the enhancing including adding a supplemental item to the main item of video data. 20. The computer-readable medium of claim 19, wherein the control file further includes computer-readable instructions for enabling a user to enter an enhancement mode of the control file. 21. The computer-readable medium of claim 19, wherein the adding includes superposing the supplemental item on top of the main item of video data. 22. The computer-readable medium of claim 19, further comprising a supplemental asset file corresponding to the supplemental item of video data, the supplemental asset file including graphical data corresponding to the supplemental item. 23. The computer-readable medium of claim 22, wherein the supplemental asset file further comprises audio data corresponding to the supplemental item. 24. The computer-readable medium of claim 22, wherein the supplemental asset file includes animation data corresponding to the supplemental item. 25. The computer-readable medium of claim 21, wherein the adding occurs upon user indication. 26. The computer-readable medium of claim 19, wherein the control file further includes computer-readable instructions for enabling a user to choose a supplemental item to be added in the adding step. 27. The computer-readable medium of claim 19, wherein the control file further includes computer-readable instructions for enabling a user to choose a location at which the supplemental item is to be added in the adding step. 28. A system for enhancing a main item of video data with a supplemental item, comprising: a. a processor having a capability for executing programming to implement playback of items of video data; b. means for receiving video data for display; c. means for receiving a non-transitory computer-readable medium; d. storage means for storing data retrieved from the non-transitory computer-readable medium or data received from a network, or a combination of both types of data; e. memory in communication with the video data receiving means bearing computer-readable instructions capable of causing the video data receiving means to render the main item of video data and to direct a signal corresponding to the rendered video data to an output jack; and f. memory in communication with the video data receiving means bearing computer-readable instructions capable of causing the video data receiving means to render a modification of the main item of video data and direct a signal corresponding to the rendered and modified main item of video data to the output jack. 29. A method for enhancing a main item of video data, comprising: a. during playback of a main item of video data, receiving a signal indicating that a modification of the main item of video data is to occur; and b. responding to the received signal by modifying the main item of video data. 30. A computer-readable medium, comprising instructions for causing a computing device to perform a method for enhancing a main item of video data, the computer-readable medium comprising: a. an asset file, the asset file including a main item of video data; and b. a control file, the control file including computer-readable instructions for enabling a user to enhance a viewing experience of the asset file, the enhancing including modifying the main item of video data.
2,400
7,296
7,296
14,319,162
2,433
A first interface is transmitted from the server computer system to a user computer system, the first interface having a field for entering a mobile telephone number. A mobile phone number entered into the field for the mobile phone number is received from the user computer system at the server computer system. A password is generated and transmitting from the server computer system to a mobile device having a mobile phone number corresponding to the mobile phone number received from the user computer system and a second interface is transmitted from the server computer system to the user computer system, the second interface including a field for entering the password. A follow-up message is transmitted from the server computer system to the mobile device if the password is not received from the user computer system at the server computer system within a predetermined period of time.
1. A computer-based method of providing access to a user-specific homepage, comprising: transmitting a phone number interface to a user computer in response to receiving an indication that a download selector has been activated; receiving, from the phone number interface, an identifier associated with a mobile device; transmitting a password to the mobile device associated with the identifier; determining whether the password transmitted to the mobile device has been used to complete registration of the user within a predetermined amount of time; if the password has been used to complete registration of the user within the predetermined amount of time, providing the user access to the user-specific homepage; and if the predetermined amount of time has expired prior to the password being used to complete registration of the user, transmitting a follow-up message to the mobile device. 2. The computer-based method of claim 1, wherein the password is used to complete registration by entering the password at a web page displayed on the user computer. 3. The computer-based method of claim 1, further comprising: transmitting an SMS message to the mobile device, wherein the SMS message includes a link to media content purchased via the user specific homepage. 4. The computer-based method of claim 3, wherein the media content purchased via the user specific homepage comprises a ringtone. 5. The computer-based method of claim 1, further comprising: receiving an opt-in message from the mobile device, wherein the opt-in message is generated in response to the user selecting a link in the follow-up message; and providing the user access to the user-specific homepage in response to the opt-in message. 6. The computer based method of claim 1, further comprising: providing the user access to a general homepage prior to completing registration, wherein the general homepage is configured to allow the user to listen to an audio track, but prevent download of the audio track. 7. The computer based method of claim 6, wherein the general homepage includes a download selector configured to initiate a registration processes in response to being selected. 8. A non-transitory computer-readable medium having stored thereon a set of instructions which, when executed by a processor of a computer carries out a method comprising: transmitting a phone number interface to a user computer in response to receiving an indication that a download selector has been activated; receiving, from the phone number interface, an identifier associated with a mobile device; transmitting a password to the mobile device associated with the identifier; determine whether the password transmitted to the mobile device has been used to complete registration of the user within a predetermined amount of time; if the password has been used to complete registration of the user within the predetermined amount of time, provide the user access to the user-specific homepage; and if the predetermined amount of time has expired prior to the password being used to complete registration of the user, transmit a follow-up message to the mobile device. 9. The non-transitory computer-readable medium of claim 8, wherein the password is used to complete registration by entering the password at a web page displayed on the user computer. 10. The non-transitory computer-readable medium of claim 8, wherein the method carried out by the processor further comprises: transmitting an SMS message to the mobile device, wherein the SMS message includes a link to media content purchased via the user specific homepage. 11. The non-transitory computer-readable medium of claim 10, wherein the media content purchased via the user specific homepage comprises a ringtone. 12. The non-transitory computer-readable medium of claim 8, wherein the method carried out by the processor further comprises: receiving an opt-in message from the mobile device, wherein the opt-in message is generated in response to the user selecting a link in the follow-up message; and providing the user access to the user-specific homepage in response to the opt-in message. 13. The non-transitory computer-readable medium of claim 8, wherein the method carried out by the processor further comprises: providing the user access to a general homepage prior to completing registration, wherein the general homepage is configured to allow the user to listen to an audio track, but prevent download of the audio track. 14. The non-transitory computer-readable medium of claim 13, wherein the general homepage includes a download selector configured to initiate a registration processes in response to being selected. 15. A computer system comprising: a memory and a processor connected to the memory; a computer program stored in the memory and executable by the processor, wherein the computer program is configured to register and provide access to registered-user website content, the computer program including: at least one instruction to transmit a phone number interface to a user computer in response to receiving an indication that a download selector has been activated; at least one instruction to receive, from the phone number interface, an identifier associated with a mobile device; at least one instruction to transmit a password to the mobile device associated with the identifier; at least one instruction to determine whether the password transmitted to the mobile device has been used to complete registration of the user within a predetermined amount of time; at least one instruction to provide the user access to the user-specific homepage if the password has been used to complete registration of the user within the predetermined amount of time; and at least one instruction to, transmit a follow-up message to the mobile device if the predetermined amount of time has expired prior to the password being used to complete registration of the user. 16. The computer system of claim 15, wherein the password is used to complete registration by entering the password at a web page displayed on the user computer. 17. The computer system of claim 15, further comprising: at least one instruction to transmit an SMS message to the mobile device, wherein the SMS message includes a link to media content purchased via the user specific homepage. 18. The computer system of claim 15, further comprising: at least one instruction to receive an opt-in message from the mobile device, wherein the opt-in message is generated in response to the user selecting a link in the follow-up message; and at least one instruction to provide the user access to the user-specific homepage in response to the opt-in message. 19. The computer system of claim 15, further comprising: at least one instruction to provide the user access to a general homepage prior to completing registration, wherein the general homepage is configured to allow the user to listen to an audio track, but prevent download of the audio track. 20. The computer system of claim 15, wherein the general homepage includes a download selector configured to initiate a registration processes in response to being selected.
A first interface is transmitted from the server computer system to a user computer system, the first interface having a field for entering a mobile telephone number. A mobile phone number entered into the field for the mobile phone number is received from the user computer system at the server computer system. A password is generated and transmitting from the server computer system to a mobile device having a mobile phone number corresponding to the mobile phone number received from the user computer system and a second interface is transmitted from the server computer system to the user computer system, the second interface including a field for entering the password. A follow-up message is transmitted from the server computer system to the mobile device if the password is not received from the user computer system at the server computer system within a predetermined period of time.1. A computer-based method of providing access to a user-specific homepage, comprising: transmitting a phone number interface to a user computer in response to receiving an indication that a download selector has been activated; receiving, from the phone number interface, an identifier associated with a mobile device; transmitting a password to the mobile device associated with the identifier; determining whether the password transmitted to the mobile device has been used to complete registration of the user within a predetermined amount of time; if the password has been used to complete registration of the user within the predetermined amount of time, providing the user access to the user-specific homepage; and if the predetermined amount of time has expired prior to the password being used to complete registration of the user, transmitting a follow-up message to the mobile device. 2. The computer-based method of claim 1, wherein the password is used to complete registration by entering the password at a web page displayed on the user computer. 3. The computer-based method of claim 1, further comprising: transmitting an SMS message to the mobile device, wherein the SMS message includes a link to media content purchased via the user specific homepage. 4. The computer-based method of claim 3, wherein the media content purchased via the user specific homepage comprises a ringtone. 5. The computer-based method of claim 1, further comprising: receiving an opt-in message from the mobile device, wherein the opt-in message is generated in response to the user selecting a link in the follow-up message; and providing the user access to the user-specific homepage in response to the opt-in message. 6. The computer based method of claim 1, further comprising: providing the user access to a general homepage prior to completing registration, wherein the general homepage is configured to allow the user to listen to an audio track, but prevent download of the audio track. 7. The computer based method of claim 6, wherein the general homepage includes a download selector configured to initiate a registration processes in response to being selected. 8. A non-transitory computer-readable medium having stored thereon a set of instructions which, when executed by a processor of a computer carries out a method comprising: transmitting a phone number interface to a user computer in response to receiving an indication that a download selector has been activated; receiving, from the phone number interface, an identifier associated with a mobile device; transmitting a password to the mobile device associated with the identifier; determine whether the password transmitted to the mobile device has been used to complete registration of the user within a predetermined amount of time; if the password has been used to complete registration of the user within the predetermined amount of time, provide the user access to the user-specific homepage; and if the predetermined amount of time has expired prior to the password being used to complete registration of the user, transmit a follow-up message to the mobile device. 9. The non-transitory computer-readable medium of claim 8, wherein the password is used to complete registration by entering the password at a web page displayed on the user computer. 10. The non-transitory computer-readable medium of claim 8, wherein the method carried out by the processor further comprises: transmitting an SMS message to the mobile device, wherein the SMS message includes a link to media content purchased via the user specific homepage. 11. The non-transitory computer-readable medium of claim 10, wherein the media content purchased via the user specific homepage comprises a ringtone. 12. The non-transitory computer-readable medium of claim 8, wherein the method carried out by the processor further comprises: receiving an opt-in message from the mobile device, wherein the opt-in message is generated in response to the user selecting a link in the follow-up message; and providing the user access to the user-specific homepage in response to the opt-in message. 13. The non-transitory computer-readable medium of claim 8, wherein the method carried out by the processor further comprises: providing the user access to a general homepage prior to completing registration, wherein the general homepage is configured to allow the user to listen to an audio track, but prevent download of the audio track. 14. The non-transitory computer-readable medium of claim 13, wherein the general homepage includes a download selector configured to initiate a registration processes in response to being selected. 15. A computer system comprising: a memory and a processor connected to the memory; a computer program stored in the memory and executable by the processor, wherein the computer program is configured to register and provide access to registered-user website content, the computer program including: at least one instruction to transmit a phone number interface to a user computer in response to receiving an indication that a download selector has been activated; at least one instruction to receive, from the phone number interface, an identifier associated with a mobile device; at least one instruction to transmit a password to the mobile device associated with the identifier; at least one instruction to determine whether the password transmitted to the mobile device has been used to complete registration of the user within a predetermined amount of time; at least one instruction to provide the user access to the user-specific homepage if the password has been used to complete registration of the user within the predetermined amount of time; and at least one instruction to, transmit a follow-up message to the mobile device if the predetermined amount of time has expired prior to the password being used to complete registration of the user. 16. The computer system of claim 15, wherein the password is used to complete registration by entering the password at a web page displayed on the user computer. 17. The computer system of claim 15, further comprising: at least one instruction to transmit an SMS message to the mobile device, wherein the SMS message includes a link to media content purchased via the user specific homepage. 18. The computer system of claim 15, further comprising: at least one instruction to receive an opt-in message from the mobile device, wherein the opt-in message is generated in response to the user selecting a link in the follow-up message; and at least one instruction to provide the user access to the user-specific homepage in response to the opt-in message. 19. The computer system of claim 15, further comprising: at least one instruction to provide the user access to a general homepage prior to completing registration, wherein the general homepage is configured to allow the user to listen to an audio track, but prevent download of the audio track. 20. The computer system of claim 15, wherein the general homepage includes a download selector configured to initiate a registration processes in response to being selected.
2,400
7,297
7,297
13,230,734
2,462
Many services measure quality of service (QoS) according to abstract metrics based on general heuristics of QoS determinants (e.g., VoIP service providers may presume that QoS is predominantly determined by network performance). However, users' QoS perceptions are often based on their experiences with particular activities of the service, which may utilize different service paths having different QoS determinants. Therefore, QoS may be measured by identifying the activities of the service, and the dependencies among the components of such services; for respective activities and dependencies, identifying a service path from the source to the user, and the segments comprising the service path; measuring the quality of the segments of the service path; and calculating the QoS of the activity according to the QoS of the segments of the service path providing the activity. This approach may yield QoS information of greater relevance to the users' experience and with greater analytic value.
1. A method of identifying a service quality of a service comprising activities provided by sources to users on a computer having a processor, the method comprising: executing instructions on the processor configured to: for respective activities of the service: identify a service path of the activity from the source to the user; identify at least two segments in the service path; and for respective segments of the service path, measure a service quality metric of the activity provided along the segment; and identify the service quality of the activity of the service according to the service quality metrics of the segments of the service path. 2. The method of claim 1, respective segments of the service path of the activity having a segment type selected from a segment type set comprising: a server data center segment type; an infrastructural network segment type; a local carrier network segment type; a user network segment type; and a user client segment type. 3. The method of claim 1: at least one network segment of the service path spanning two locations; and segmenting the service path comprising: segmenting the network segment into network location segments respectively representing the locations spanned by the network segment. 4. The method of claim 1: the activity of the service comprising at least two components respectively provided by a source; identifying the service path of the activity comprising: for respective components of the activity, identifying a component path for the component from the source of the component to the user; identifying the segments of the service path comprising: for respective component paths, segmenting the component path into at least two segments; measuring the service quality metrics comprising: for respective segments of the component paths, measuring a service quality metric of the component provided along the component path; and identifying the service quality of the activity comprising: for respective components of the activity, identifying a component quality of the components according to the service quality metrics of the segments of the component path providing the component service; and identifying the service quality of the activity according to the service quality metrics of the segments of the component paths of the activity. 5. The method of claim 1: the service provided by at least one server; and measuring the service quality metrics of the segments of the service paths of an activity of the service comprising: installing on at least one server a service quality measuring client configured to measure service quality metrics of at least one segment of the service paths of the activities; and receiving from the service quality measuring client at least one service quality metric of the segment detected during uses by at least one user of activities having service paths involving the segment. 6. The method of claim 1: the activity accessed by respective users through a device; and measuring the service quality metrics of the segments of the service paths of an activity comprising: installing on the device a service quality measuring client configured to measure service quality metrics of the segments of the service paths of the activities; and receiving from the service quality measuring client at least one service quality metric of the segment detected during use of activities having service paths including the segment. 7. The method of claim 1: at least one segment of at least one service path of at least one activity provided by a service provider; and measuring the service quality metrics of the segment comprising: receiving from the service provider service quality metrics of the segment detected during uses of activities having service paths including the segment. 8. The method of claim 1, measuring the service quality metrics of the segment of the service path of an activity comprising: enabling an activity simulating service to: generate simulated uses of the activity of the service, and measure the service quality metrics of the activity during simulated uses of the activity; and receiving from the activity simulating service service quality metrics of the segment detected during simulated uses of activities having service paths including the segment. 9. The method of claim 1: the activity accessed by respective users; and measuring the service quality metrics of the segments of the service paths of an activity comprising: receiving from a user a service quality metric of the activity; and applying the service quality metric as service quality metrics of the segments of the service paths of the activity. 10. The method of claim 1: respective activities associated with an activity identifier; the instructions configured to, upon using a segment of a service path to provide an activity, associate the activity identifier of the activity with the segment; and identifying the service path of an activity comprising: identifying segments associated with the activity identifier of the activity. 11. The method of claim 1, the instructions configured to: for respective segments, identify a service quality metric threshold; and identify a segment exhibiting a poor service quality metric below the service quality metric threshold of the identified segment. 12. The method of claim 11, detecting the poor service segment quality metric of a segment of service path of an activity comprising: upon detecting a poor service quality metric of an activity of the service that is performable by a user: identifying the service path of the activity performable by the user; identifying the segments segmenting the service path providing the activity to the user; for respective segments of the service path, measuring the service quality metrics of the segments of the service path of the activity; and identifying at least one segment having a poor service quality metric below a service quality metric threshold and contributing to the poor service quality metric of the activity of the service. 13. The method of claim 11, the instructions configured to: for respective segments, identify at least one dependency of the segment on at least one other segment of the segment path; and upon detecting the poor service quality metric of an identified segment, determine whether the poor service quality metric of the identified segment is caused by the service quality of at least one other segment with which the identified segment has a dependency. 14. The method of claim 11: the service administrated by at least one administrator; and the instructions configured to, upon detecting a poor service quality metric below a service quality metric threshold for a segment of the service path of the activity, alert the administrator of the poor service quality metric of an identified segment. 15. The method of claim 11: the activity provided for respective users along a service path; and the instructions configured to, upon detecting a poor service quality metric below a service quality metric threshold for a segment of the service path of the activity, identify users performing the activity along a service path including an identified segment. 16. The method of claim 15, the instructions configured to detect a user response of the users of the activity to the poor service quality metric of the segment within the service path of the activity. 17. The method of claim 11: the activity provided, for respective users of a user set, along a service path; and the instructions configured to, upon detecting a poor service quality metric below a service quality metric threshold for a segment of the service path of the activity: identify at least one user of activities having service paths including an identified segment; and notify identified users of the activities of the identified segment having the poor service quality metric. 18. The method of claim 1, the instructions configured to: upon measuring a first service quality metric of a segment, store the first service quality metric as a historical service segment quality metric of the segment; and upon measuring a second service quality metric of the segment: compare the second service quality metric of the segment with historical service segment quality metrics of the segment; and identify a service quality metric change in the service quality metrics of the segment. 19. A method of diagnosing poor service quality of a service provided by sources to users, the method performed on a computer having a processor comprising: sending to the computer instructions that, when executed by the processor: for respective activities of the service, identify a service path of the activity from the source to the users; for the service paths of respective activities, identify at least two segments; for respective segments, measure a service quality metric indicating the service quality of the activity provided along the segment; and identify at least one segment having a poor service quality metric contributing to the poor service quality of the activities of the service. 20. A computer-readable storage medium comprising instructions that, when executed on a processor of a computer, identify a service quality of a service comprising activities respectively associated with an activity identifier provided to users of devices by sources comprising at least one server administrated by at least one administrator, by: for respective activities of the service: identifying a service path of the activity from the source to the user; identifying at least two segments in the service path, respective segments of the service path of the activity having a segment type selected from a segment type set comprising: a server data center segment type; an infrastructural network segment type; a local carrier network segment type; a user network segment type; and a user client segment type, at least one segment of at least one service path of at least one activity provided by a service provider; upon using a segment of a service path to provide the activity, associating the activity identifier of the activity with the segment; for respective segments, identifying at least one dependency of the segment on at least one other segment of the segment path; for respective segments of the service path, measuring a service quality metric of the activity provided along the segment by: installing on at least one server a service quality measuring client configured to measure service quality metrics of at least one segment of the service paths of the activities; receiving from the service quality measuring client at least one service quality metric of the segment detected during uses by at least one user of activities having service paths involving the segment; installing on the device a service quality measuring client configured to measure service quality metrics of the segments of the service paths of the activities; receiving from the service quality measuring client at least one service quality metric of the segment detected during use of activities having service paths including the segment; receiving from the service provider service quality metrics of the segment detected during uses of activities having service paths including the segment; enabling an activity simulating service to: generate simulated uses of the activity of the service, and measure the service quality metrics of the activity during simulated uses of the activity; receiving from the activity simulating service service quality metrics of the segment detected during simulated uses of activities having service paths including the segment; and upon receiving from a user a service quality metric of the activity, applying the service quality metric as service quality metrics of the segments of the service paths of the activity; identifying the service quality of the activity of the service according to the service quality metrics of the segments of the service path; upon measuring a first service quality metric of a segment, storing the first service quality metric as a historical service segment quality metric of the segment; upon measuring a second service quality metric of the segment: comparing the second service quality metric of the segment with historical service segment quality metrics of the segment; and identifying a service quality metric change in the service quality metrics of the segment; and upon identifying a identified segment exhibiting a poor service quality metric below a service quality metric threshold associated with the identified segment: determining whether the poor service quality metric of the identified segment is caused by the service quality of at least one other segment with which the identified segment has a dependency; identifying users performing the activity along a service path including an identified segment; notifying identified users of the activities of the identified segment having the poor service quality metric; detecting a user response of the users of the activity to the poor service quality metric of the segment within the service path of the activity; and alerting an administrator of the service of the poor service quality metric of the identified segment.
Many services measure quality of service (QoS) according to abstract metrics based on general heuristics of QoS determinants (e.g., VoIP service providers may presume that QoS is predominantly determined by network performance). However, users' QoS perceptions are often based on their experiences with particular activities of the service, which may utilize different service paths having different QoS determinants. Therefore, QoS may be measured by identifying the activities of the service, and the dependencies among the components of such services; for respective activities and dependencies, identifying a service path from the source to the user, and the segments comprising the service path; measuring the quality of the segments of the service path; and calculating the QoS of the activity according to the QoS of the segments of the service path providing the activity. This approach may yield QoS information of greater relevance to the users' experience and with greater analytic value.1. A method of identifying a service quality of a service comprising activities provided by sources to users on a computer having a processor, the method comprising: executing instructions on the processor configured to: for respective activities of the service: identify a service path of the activity from the source to the user; identify at least two segments in the service path; and for respective segments of the service path, measure a service quality metric of the activity provided along the segment; and identify the service quality of the activity of the service according to the service quality metrics of the segments of the service path. 2. The method of claim 1, respective segments of the service path of the activity having a segment type selected from a segment type set comprising: a server data center segment type; an infrastructural network segment type; a local carrier network segment type; a user network segment type; and a user client segment type. 3. The method of claim 1: at least one network segment of the service path spanning two locations; and segmenting the service path comprising: segmenting the network segment into network location segments respectively representing the locations spanned by the network segment. 4. The method of claim 1: the activity of the service comprising at least two components respectively provided by a source; identifying the service path of the activity comprising: for respective components of the activity, identifying a component path for the component from the source of the component to the user; identifying the segments of the service path comprising: for respective component paths, segmenting the component path into at least two segments; measuring the service quality metrics comprising: for respective segments of the component paths, measuring a service quality metric of the component provided along the component path; and identifying the service quality of the activity comprising: for respective components of the activity, identifying a component quality of the components according to the service quality metrics of the segments of the component path providing the component service; and identifying the service quality of the activity according to the service quality metrics of the segments of the component paths of the activity. 5. The method of claim 1: the service provided by at least one server; and measuring the service quality metrics of the segments of the service paths of an activity of the service comprising: installing on at least one server a service quality measuring client configured to measure service quality metrics of at least one segment of the service paths of the activities; and receiving from the service quality measuring client at least one service quality metric of the segment detected during uses by at least one user of activities having service paths involving the segment. 6. The method of claim 1: the activity accessed by respective users through a device; and measuring the service quality metrics of the segments of the service paths of an activity comprising: installing on the device a service quality measuring client configured to measure service quality metrics of the segments of the service paths of the activities; and receiving from the service quality measuring client at least one service quality metric of the segment detected during use of activities having service paths including the segment. 7. The method of claim 1: at least one segment of at least one service path of at least one activity provided by a service provider; and measuring the service quality metrics of the segment comprising: receiving from the service provider service quality metrics of the segment detected during uses of activities having service paths including the segment. 8. The method of claim 1, measuring the service quality metrics of the segment of the service path of an activity comprising: enabling an activity simulating service to: generate simulated uses of the activity of the service, and measure the service quality metrics of the activity during simulated uses of the activity; and receiving from the activity simulating service service quality metrics of the segment detected during simulated uses of activities having service paths including the segment. 9. The method of claim 1: the activity accessed by respective users; and measuring the service quality metrics of the segments of the service paths of an activity comprising: receiving from a user a service quality metric of the activity; and applying the service quality metric as service quality metrics of the segments of the service paths of the activity. 10. The method of claim 1: respective activities associated with an activity identifier; the instructions configured to, upon using a segment of a service path to provide an activity, associate the activity identifier of the activity with the segment; and identifying the service path of an activity comprising: identifying segments associated with the activity identifier of the activity. 11. The method of claim 1, the instructions configured to: for respective segments, identify a service quality metric threshold; and identify a segment exhibiting a poor service quality metric below the service quality metric threshold of the identified segment. 12. The method of claim 11, detecting the poor service segment quality metric of a segment of service path of an activity comprising: upon detecting a poor service quality metric of an activity of the service that is performable by a user: identifying the service path of the activity performable by the user; identifying the segments segmenting the service path providing the activity to the user; for respective segments of the service path, measuring the service quality metrics of the segments of the service path of the activity; and identifying at least one segment having a poor service quality metric below a service quality metric threshold and contributing to the poor service quality metric of the activity of the service. 13. The method of claim 11, the instructions configured to: for respective segments, identify at least one dependency of the segment on at least one other segment of the segment path; and upon detecting the poor service quality metric of an identified segment, determine whether the poor service quality metric of the identified segment is caused by the service quality of at least one other segment with which the identified segment has a dependency. 14. The method of claim 11: the service administrated by at least one administrator; and the instructions configured to, upon detecting a poor service quality metric below a service quality metric threshold for a segment of the service path of the activity, alert the administrator of the poor service quality metric of an identified segment. 15. The method of claim 11: the activity provided for respective users along a service path; and the instructions configured to, upon detecting a poor service quality metric below a service quality metric threshold for a segment of the service path of the activity, identify users performing the activity along a service path including an identified segment. 16. The method of claim 15, the instructions configured to detect a user response of the users of the activity to the poor service quality metric of the segment within the service path of the activity. 17. The method of claim 11: the activity provided, for respective users of a user set, along a service path; and the instructions configured to, upon detecting a poor service quality metric below a service quality metric threshold for a segment of the service path of the activity: identify at least one user of activities having service paths including an identified segment; and notify identified users of the activities of the identified segment having the poor service quality metric. 18. The method of claim 1, the instructions configured to: upon measuring a first service quality metric of a segment, store the first service quality metric as a historical service segment quality metric of the segment; and upon measuring a second service quality metric of the segment: compare the second service quality metric of the segment with historical service segment quality metrics of the segment; and identify a service quality metric change in the service quality metrics of the segment. 19. A method of diagnosing poor service quality of a service provided by sources to users, the method performed on a computer having a processor comprising: sending to the computer instructions that, when executed by the processor: for respective activities of the service, identify a service path of the activity from the source to the users; for the service paths of respective activities, identify at least two segments; for respective segments, measure a service quality metric indicating the service quality of the activity provided along the segment; and identify at least one segment having a poor service quality metric contributing to the poor service quality of the activities of the service. 20. A computer-readable storage medium comprising instructions that, when executed on a processor of a computer, identify a service quality of a service comprising activities respectively associated with an activity identifier provided to users of devices by sources comprising at least one server administrated by at least one administrator, by: for respective activities of the service: identifying a service path of the activity from the source to the user; identifying at least two segments in the service path, respective segments of the service path of the activity having a segment type selected from a segment type set comprising: a server data center segment type; an infrastructural network segment type; a local carrier network segment type; a user network segment type; and a user client segment type, at least one segment of at least one service path of at least one activity provided by a service provider; upon using a segment of a service path to provide the activity, associating the activity identifier of the activity with the segment; for respective segments, identifying at least one dependency of the segment on at least one other segment of the segment path; for respective segments of the service path, measuring a service quality metric of the activity provided along the segment by: installing on at least one server a service quality measuring client configured to measure service quality metrics of at least one segment of the service paths of the activities; receiving from the service quality measuring client at least one service quality metric of the segment detected during uses by at least one user of activities having service paths involving the segment; installing on the device a service quality measuring client configured to measure service quality metrics of the segments of the service paths of the activities; receiving from the service quality measuring client at least one service quality metric of the segment detected during use of activities having service paths including the segment; receiving from the service provider service quality metrics of the segment detected during uses of activities having service paths including the segment; enabling an activity simulating service to: generate simulated uses of the activity of the service, and measure the service quality metrics of the activity during simulated uses of the activity; receiving from the activity simulating service service quality metrics of the segment detected during simulated uses of activities having service paths including the segment; and upon receiving from a user a service quality metric of the activity, applying the service quality metric as service quality metrics of the segments of the service paths of the activity; identifying the service quality of the activity of the service according to the service quality metrics of the segments of the service path; upon measuring a first service quality metric of a segment, storing the first service quality metric as a historical service segment quality metric of the segment; upon measuring a second service quality metric of the segment: comparing the second service quality metric of the segment with historical service segment quality metrics of the segment; and identifying a service quality metric change in the service quality metrics of the segment; and upon identifying a identified segment exhibiting a poor service quality metric below a service quality metric threshold associated with the identified segment: determining whether the poor service quality metric of the identified segment is caused by the service quality of at least one other segment with which the identified segment has a dependency; identifying users performing the activity along a service path including an identified segment; notifying identified users of the activities of the identified segment having the poor service quality metric; detecting a user response of the users of the activity to the poor service quality metric of the segment within the service path of the activity; and alerting an administrator of the service of the poor service quality metric of the identified segment.
2,400
7,298
7,298
10,853,099
2,419
The present invention relates generally to a system and method for the monitoring of email and other message traffic on a network. The intent of the monitoring to determine if message traffic is abnormal, thus indicating unwanted messages such as spam. A number of methods may be utilized by the invention to recognize unwanted messages, including the calculation of fanout, the number of messages sent by a unique host, unique email address or domain. Also included is fanin, the number of messages received from unique hosts, unique domains or unique email addresses. Further components consider the number of error messages received from a host, variations in bandwidth from a host, and variations in message content from a host.
1. A method for detecting sources of abnormal message traffic on a network, said method comprising the steps of: a) utilizing an abnormality detection engine to detect said abnormal message traffic; and b) reporting on said abnormal message traffic. 2. The method of claim 1 wherein said abnormality detection engine consists of one or more of components selected from the set of: a fanout detector, a fanin detector, an error response detector; a bandwidth variation detector; or a message content detector. 3. The method of claim 1 wherein said traffic is email. 4. The method of claim 1 wherein said traffic comprises HTTP messages. 5. The method of claim 2, wherein said fanout detector detects an abnormal amount of traffic to multiple hosts from a single address. 6. The method of claim 5, wherein said fanout detector utilizes a threshold to determine said abnormal amount of traffic. 7. The method of claim 2, wherein said fanin detector detects an abnormal amount of traffic from multiple hosts to a single address. 8. The method of claim 7, wherein said fanin detector utilizes a threshold to determine said abnormal amount of traffic. 9. The method of claim 2, wherein said error response detector detects an abnormal amount of error messages. 10. The method of claim 9, wherein said error response detector utilizes a threshold to determine said abnormal amount of error messages. 11. The method of claim 2, wherein said bandwidth variation detector detects a steady rate of messages. 12. The method of claim 11, wherein said bandwidth variation detector utilizes a threshold to determine said steady rate of messages. 13. The method of claim 2, wherein said message content detector detects if messages coming from a single source are largely the same. 14. The method of claim 13, wherein said message content detector utilizes a threshold to determine if said messages coming from a single source are largely the same. 15. A system for detecting sources of abnormal traffic in a network, said system comprising an abnormality detection engine, said abnormality detection engine accepting messages to and from said network and providing a report as output, said abnormality detection engine comprising one or more abnormality detectors, selected from the set of: a fanout detector, a fanin detector, an error response detector, a bandwidth variation detector; or a variation in message content detector. 16. The system of claim 15 wherein said traffic is email. 17. The system of claim 15 wherein said traffic comprises HTTP messages. 18. The system of claim 15, wherein said fanout detector detects an abnormal amount of traffic to multiple hosts from a single address. 19. The system of claim 18, wherein said fanout detector utilizes a threshold to determine said abnormal amount of traffic. 20. The system of claim 15, wherein said fanin detector detects an abnormal amount of traffic from multiple hosts to a single address. 21. The system of claim 20, wherein said fanin detector utilizes a threshold to determine said abnormal amount of traffic. 22. The system of claim 15, wherein said error response detector detects an abnormal amount of error messages. 23. The system of claim 22, wherein said error response detector utilizes a threshold to determine said abnormal amount of error messages. 24. The system of claim 15, wherein said bandwidth variation detector detects a steady rate of messages. 25. The system of claim 24, wherein said bandwidth variation detector utilizes a threshold to determine said steady rate of messages. 26. The system of claim 15, wherein said message content detector detects if messages coming from a single source are largely the same. 27. The system of claim 26, wherein said message content detector utilizes a threshold to determine if said messages coming from a single source are largely the same. 28. A computer readable medium, for detecting sources of abnormal message traffic on a network, said medium comprising instructions for: a) utilizing an abnormality detection engine to detect said abnormal message traffic; and b) reporting on said abnormal message traffic. 29. The medium of claim 28 wherein said abnormality detection engine consists of instructions for one or more of a fanout detector, a fanin detector, an error response detector, a bandwidth variation detector; or a variation in message content detector.
The present invention relates generally to a system and method for the monitoring of email and other message traffic on a network. The intent of the monitoring to determine if message traffic is abnormal, thus indicating unwanted messages such as spam. A number of methods may be utilized by the invention to recognize unwanted messages, including the calculation of fanout, the number of messages sent by a unique host, unique email address or domain. Also included is fanin, the number of messages received from unique hosts, unique domains or unique email addresses. Further components consider the number of error messages received from a host, variations in bandwidth from a host, and variations in message content from a host.1. A method for detecting sources of abnormal message traffic on a network, said method comprising the steps of: a) utilizing an abnormality detection engine to detect said abnormal message traffic; and b) reporting on said abnormal message traffic. 2. The method of claim 1 wherein said abnormality detection engine consists of one or more of components selected from the set of: a fanout detector, a fanin detector, an error response detector; a bandwidth variation detector; or a message content detector. 3. The method of claim 1 wherein said traffic is email. 4. The method of claim 1 wherein said traffic comprises HTTP messages. 5. The method of claim 2, wherein said fanout detector detects an abnormal amount of traffic to multiple hosts from a single address. 6. The method of claim 5, wherein said fanout detector utilizes a threshold to determine said abnormal amount of traffic. 7. The method of claim 2, wherein said fanin detector detects an abnormal amount of traffic from multiple hosts to a single address. 8. The method of claim 7, wherein said fanin detector utilizes a threshold to determine said abnormal amount of traffic. 9. The method of claim 2, wherein said error response detector detects an abnormal amount of error messages. 10. The method of claim 9, wherein said error response detector utilizes a threshold to determine said abnormal amount of error messages. 11. The method of claim 2, wherein said bandwidth variation detector detects a steady rate of messages. 12. The method of claim 11, wherein said bandwidth variation detector utilizes a threshold to determine said steady rate of messages. 13. The method of claim 2, wherein said message content detector detects if messages coming from a single source are largely the same. 14. The method of claim 13, wherein said message content detector utilizes a threshold to determine if said messages coming from a single source are largely the same. 15. A system for detecting sources of abnormal traffic in a network, said system comprising an abnormality detection engine, said abnormality detection engine accepting messages to and from said network and providing a report as output, said abnormality detection engine comprising one or more abnormality detectors, selected from the set of: a fanout detector, a fanin detector, an error response detector, a bandwidth variation detector; or a variation in message content detector. 16. The system of claim 15 wherein said traffic is email. 17. The system of claim 15 wherein said traffic comprises HTTP messages. 18. The system of claim 15, wherein said fanout detector detects an abnormal amount of traffic to multiple hosts from a single address. 19. The system of claim 18, wherein said fanout detector utilizes a threshold to determine said abnormal amount of traffic. 20. The system of claim 15, wherein said fanin detector detects an abnormal amount of traffic from multiple hosts to a single address. 21. The system of claim 20, wherein said fanin detector utilizes a threshold to determine said abnormal amount of traffic. 22. The system of claim 15, wherein said error response detector detects an abnormal amount of error messages. 23. The system of claim 22, wherein said error response detector utilizes a threshold to determine said abnormal amount of error messages. 24. The system of claim 15, wherein said bandwidth variation detector detects a steady rate of messages. 25. The system of claim 24, wherein said bandwidth variation detector utilizes a threshold to determine said steady rate of messages. 26. The system of claim 15, wherein said message content detector detects if messages coming from a single source are largely the same. 27. The system of claim 26, wherein said message content detector utilizes a threshold to determine if said messages coming from a single source are largely the same. 28. A computer readable medium, for detecting sources of abnormal message traffic on a network, said medium comprising instructions for: a) utilizing an abnormality detection engine to detect said abnormal message traffic; and b) reporting on said abnormal message traffic. 29. The medium of claim 28 wherein said abnormality detection engine consists of instructions for one or more of a fanout detector, a fanin detector, an error response detector, a bandwidth variation detector; or a variation in message content detector.
2,400
7,299
7,299
14,285,028
2,461
Methods, apparatus and software for implementing enhanced data center congestion management for non-TCP traffic. Non-congested transmit latencies are determined for transmission of packets or Ethernet frames along paths between source and destination end-end-nodes when congestion along the paths is not present or minimal. Transmit latencies are similarly measured along the same source-destination paths during ongoing operations during which traffic congestion may vary. Based on whether a difference between the transmit latency for a packet or frame and the non-congested transmit latency for the path exceeds a threshold, the path is marked as congested or not congested. A rate at which the non-TCP packets are transmitted along the path is then managed as function of a rate at which the path is marked as congested. In one implementation, non-TCP traffic is managed by mimicking a Data Center TCP technique, under which the congestion marking status of the path is substituted as an input to a DCTP algorithm in place of the normally-used ECN-Echo flag input. The congestion window output by the DCTCP algorithm is then used to manage the rate at which non-TCP packets to be forwarded via the path are transmitted from a source end-node.
1. A method for implementing congestion management of non-TCP (Transmission Control Protocol) traffic in a network, comprising: determining a non-congested transit latency for a path between a source end-node and a destination end-node, wherein the path traverses at least one switch; measuring transmit latencies for transfer of non-TCP packets or Ethernet frames encapsulating non-TCP packets along the path; determining, for transfer of at least a portion of the non-TCP packets or Ethernet frames, whether to mark the path as congested or not congested based on a difference between the transit latency measured for the non-TCP packet or Ethernet frame and the non-congested transit latency for the path; and managing a rate at which the non-TCP packets are transmitted from the source end-node to be forwarded via the path to the destination end-node based as a function of a rate at which the path is marked as congested. 2. The method of claim 1, further comprising mimicking Data Center TCP (DCTCP) for non-TCP traffic by: inputting into a DCTCP algorithm a congestion marking status of the path in place of using a congestion marking status conveyed via an ECN-Echo flag as an input to the DCTCP algorithm; and employing a congestion windows (cwnd) output by the DCTCP algorithm to manage the rate at which the non-TCP packets are transmitted from the source end-node. 3. The method of claim 1, wherein the non-congested transit latency is measured along a one-way path from the source end-node to the destination end-node, and the transmit latencies for the transfer of the non-TCP packets or the Ethernet frames is measured along the same one-way path. 4. The method of claim 3, further comprising: measuring a best frame transfer time (BFTT) along a source-destination path from the source end-node to the destination end-node, and storing the BTT for the source-destination path; for each of a plurality of Ethernet frames encapsulating non-TCP packets, measuring a frame transfer time (FTT) along the source-destination path for the Ethernet frames; subtracting the BFTT from the FTT and determining whether the result of the subtraction exceeds a threshold; if the result of the subtraction exceeds the threshold, marking a congestion flag in an ACK packet that is returned from the destination end-node to the source-destination end-node, otherwise leaving the congestion flag in the ACK packet unmarked; detecting a marked status of the ACK packet via inspection of the congestion flag; and employing the marked status to implement congestion management for the path. 5. The method of claim 1, wherein the non-congested transit latency is measured along a source-destination round-trip path from the source end-node to the destination end-node and back to the source end-node, and the transmit latencies for the transfer of non-TCP packets or Ethernet frames is measured along the same roundtrip path. 6. The method of claim 5, further comprising: measuring a best roundtrip transfer time (BRTT) along the source-destination round-trip path, and storing the BRTT for the source-destination roundtrip path; for each of a plurality of Ethernet frames encapsulating non-TCP packets, measuring a roundtrip transfer time (RTT) along the source-destination roundtrip path for the Ethernet frames; subtracting the BRTT from the RTT and determining whether the result of the subtraction exceeds a threshold; if the result of the subtraction exceeds the threshold, marking the source-destination path as congested, otherwise, not marking the source-destination path as congested; and employing the marked status of the source-destination path to implement congestion management for the source-destination path. 7. The method of claim 1, wherein the method is implemented for a plurality of paths between a plurality of source and destination end-nodes, the plurality of paths collectively traversing a plurality of switches, and wherein the method is implemented without any modification to the switches. 8. The method of claim 1, wherein the method is implemented by modifying at least one of software or hardware components configured to implement a conventional non-TCP protocol only at the source end-node, wherein the destination end-node employs conventional software and hardware components for implementing the non-TCP protocol. 9. The method of claim 1, wherein the non-TCP traffic comprises one of RDMA over Converged Ethernet (RoCE) traffic or Fiber Channel over Ethernet traffic. 10. The method of claim 1, wherein the method is facilitated via the use of timestamps corresponding to when an Ethernet frame is transmitted from a transmit port and received at a receive port, and further wherein at least one timestamp is added to a field in the Ethernet frame. 11. A server apparatus, configured to be implemented as an end-node in a data center, the server apparatus having a processor operatively coupled to memory and operatively coupled to a network interface configured to support network communication using an Ethernet protocol, the apparatus further configured, upon operation, to: facilitate operation of the server apparatus as a source end-node; transmit Ethernet frames outbound from the transmit port toward a destination end-node, at least a portion of the Ethernet frames encapsulating non-TCP (Transmission Control Protocol) packets, the Ethernet frames to be forwarded along a source-destination path between the server apparatus and the destination end-node and traversing at least one switch; retrieve path congestion marking indicia received from the destination end-node for transfer of at least a portion of the Ethernet frames encapsulating non-TCP packets, the path congestion marking indicia identifying whether or not the source-destination path was marked as congested for transfer of an Ethernet frame based on a difference between a transit latency measured for the Ethernet frame by the destination end-node and a non-congested transit latency for the source-destination path; and manage a rate at which the non-TCP packets are transmitted outbound from the transmit port to be forwarded via the source-destination path to the destination end-node based as a function of a rate at which the path is marked as congested. 12. The server apparatus of claim 11, wherein the apparatus is further configured to: input the path congestion marking indicia into a DCTCP (Data Center TCP) algorithm in place of using a congestion marking status conveyed via an ECN-Echo flag as an input to the DCTCP algorithm; update a congestion windows (cwnd) via the DCTCP algorithm; and employ cwnd to manage the rate at which non-TCP packets are transmitted outbound from the transmit port to be forwarded via the source-destination path to the destination end-node. 13. The server apparatus of claim 11, wherein the apparatus is further configured to timestamp an Ethernet frame encapsulating a non-TCP packet proximate to when the Ethernet frame is transmitted from the transmit port. 14. The server apparatus of claim 13, wherein the timestamp is added via a software-based Ethernet MAC (Media Access Channel) layer or sub-layer implemented via execution of software on the processor. 15. The server apparatus of claim 13, wherein the timestamp is added via a hardware-based Ethernet MAC (Media Access Channel) layer or sub-layer implemented by the network interface. 16. The server apparatus of claim 11, wherein the apparatus is further configured to: facilitate operation of the server apparatus as a destination end-node; retrieve a source transit timestamp contained in an Ethernet frame including an encapsulated non-TCP packet transmitted from a source end-node along a source-destination path from the source end-node to the server apparatus, the source transit timestamp identifying a time at which the Ethernet frame was transmitted from the source end-node; retrieve a destination receive timestamp identifying a time at which the Ethernet frame is received at the receive port; and calculate a frame transit time (FTT) based on a difference between the destination receive timestamp and the source transit timestamp. 17. The server apparatus of claim 16, wherein the apparatus is further configured to: retrieve a best frame transit time BFTT corresponding to a non-congested transit latency for the source-destination path; determine whether a difference between the FTT for an Ethernet frame and the BFTT exceeds a threshold; and if the difference between the FTT and BFTT exceeds the threshold, return an ACK packet containing indicia indicating the source-destination path is marked as congested, otherwise, return an ACK packet containing indicia indicating the source-destination path is not marked as congested. 18. A machine-readable non-transitory storage medium having instructions stored thereon configured to be executed on a host processor of a server comprising a source end-node to enable the source end-node to: transmit Ethernet frames outbound from a transmit port of the source end-node toward a destination end-node, the Ethernet frames to be forwarded along a path between the source end-node and the destination end-node including at least one switch; determine a non-congested transit latency for the path; at least one of, determine, for transfer of at least a portion of the Ethernet frames encapsulating non-TCP packets, whether to mark the path as congested or not congested based on a difference between a transit latency measured for the Ethernet frame and the non-congested transit latency for the path; or retrieve path congestion marking indicia received from the destination end-node for transfer of at least a portion of the Ethernet frames encapsulating non-TCP packets, the path congestion marking indicia identifying whether or not the path was marked as congested for transfer of an Ethernet frame based on a difference between a transit latency measured for the Ethernet frame by the destination end-node and the non-congested transit latency for the path; and manage a rate at which the non-TCP packets are transmitted outbound from the transmit port of the source end-node to be forwarded via the path to the destination end-node based as a function of a rate at which the path is marked as congested. 19. The machine-readable non-transitory storage medium of claim 18, wherein the instructions are configured to enable the source end-node to: maintain an estimate a of the fraction of Ethernet frames that are marked, which is updated once for every window of data using the equation, a←(1−g)×a+g×F where F is the fraction of packets that were marked in the last window of data, and g is a weight between 0 and 1 given to new samples against the past in the estimation of a; input a into the following equation to adjust a size of a congestion window (cwnd), cwnd←cwnd×(1−a/2); and employ cwnd to manage rate at which the non-TCP packets are transmitted outbound from the transmit port of the source end-node to be forwarded via the path to the destination end-node. 20. The machine-readable non-transitory storage medium of claim 18, wherein the non-congested transit latency is determined by measuring transit latency along a source-destination round-trip path from the source end-node to the destination end-node and back to the source end-node, and the transmit latencies for the transfer of the Ethernet frames encapsulating non-TCP packets is measured along the same roundtrip path. 21. The machine-readable non-transitory storage medium of claim 20, wherein the instructions are configured to enable the source end-node to: measure a best roundtrip transfer time (BRTT) along the source-destination round-trip path, and storing the BRTT for the source-destination roundtrip path; for each of a plurality of Ethernet frames encapsulating non-TCP packets, measure a roundtrip transfer time (RTT) along the source-destination roundtrip path for the Ethernet frames; subtract the BRTT from the RTT and determining whether the result of the subtraction exceeds a threshold; if the result of the subtraction exceeds the threshold, marking the source-destination path as congested, otherwise, not marking the source-destination path as congested; and employ the marked status of the source-destination path to implement congestion management for the source-destination path. 22. The machine-readable non-transitory storage medium of claim 21, wherein the instructions are configured to embed a source transit timestamp in an Ethernet frame indicating when the Ethernet frame was transmitted outbound from the transmit port of the source end-node. 23. The machine-readable non-transitory storage medium of claim 22, wherein path congestion marking indicia is received from the destination end-node, and wherein the instructions are configured to inspect a congestion flag in an ACK packet comprising the path congestion marking indicia that is returned by the destination end-node in response to receiving an Ethernet frame encapsulating a non-TCP packet from the source-node, the congestion flag including indicia to whether a source-destination path along which the Ethernet frame was forwarded was congested when the Ethernet frame traversed the source-destination path. 24. The machine-readable non-transitory storage medium of claim 23, further having instructions stored thereon configured to be executed on a host processor of a server comprising a destination end-node to enable the destination end-node to: retrieve a source transit timestamp contained in an Ethernet frame including an encapsulated non-TCP packet transmitted from a source end-node along a source-destination path from the source end-node to the destination end-node, the source transit timestamp identifying a time at which the Ethernet frame was transmitted from the source end-node; retrieve a destination receive timestamp identifying a time at which the Ethernet frame is received at the destination end-node; and calculate a frame transit time (FTT) based on a difference between the destination receive timestamp and the source transit timestamp. 25. The machine-readable non-transitory storage medium of claim 24, wherein the instructions are further configured, upon execution, to: retrieve a best frame transit time BFTT corresponding to a non-congested transit latency for the source-destination path; determine whether a difference between the FTT for an Ethernet frame and the BFTT exceeds a threshold; and if the difference between the FTT and BFTT exceeds the threshold, returning an ACK packet containing indicia indicating the source-destination path is marked as congested, otherwise, returning an ACK packet containing indicia indicating the source-destination path is not marked as congested.
Methods, apparatus and software for implementing enhanced data center congestion management for non-TCP traffic. Non-congested transmit latencies are determined for transmission of packets or Ethernet frames along paths between source and destination end-end-nodes when congestion along the paths is not present or minimal. Transmit latencies are similarly measured along the same source-destination paths during ongoing operations during which traffic congestion may vary. Based on whether a difference between the transmit latency for a packet or frame and the non-congested transmit latency for the path exceeds a threshold, the path is marked as congested or not congested. A rate at which the non-TCP packets are transmitted along the path is then managed as function of a rate at which the path is marked as congested. In one implementation, non-TCP traffic is managed by mimicking a Data Center TCP technique, under which the congestion marking status of the path is substituted as an input to a DCTP algorithm in place of the normally-used ECN-Echo flag input. The congestion window output by the DCTCP algorithm is then used to manage the rate at which non-TCP packets to be forwarded via the path are transmitted from a source end-node.1. A method for implementing congestion management of non-TCP (Transmission Control Protocol) traffic in a network, comprising: determining a non-congested transit latency for a path between a source end-node and a destination end-node, wherein the path traverses at least one switch; measuring transmit latencies for transfer of non-TCP packets or Ethernet frames encapsulating non-TCP packets along the path; determining, for transfer of at least a portion of the non-TCP packets or Ethernet frames, whether to mark the path as congested or not congested based on a difference between the transit latency measured for the non-TCP packet or Ethernet frame and the non-congested transit latency for the path; and managing a rate at which the non-TCP packets are transmitted from the source end-node to be forwarded via the path to the destination end-node based as a function of a rate at which the path is marked as congested. 2. The method of claim 1, further comprising mimicking Data Center TCP (DCTCP) for non-TCP traffic by: inputting into a DCTCP algorithm a congestion marking status of the path in place of using a congestion marking status conveyed via an ECN-Echo flag as an input to the DCTCP algorithm; and employing a congestion windows (cwnd) output by the DCTCP algorithm to manage the rate at which the non-TCP packets are transmitted from the source end-node. 3. The method of claim 1, wherein the non-congested transit latency is measured along a one-way path from the source end-node to the destination end-node, and the transmit latencies for the transfer of the non-TCP packets or the Ethernet frames is measured along the same one-way path. 4. The method of claim 3, further comprising: measuring a best frame transfer time (BFTT) along a source-destination path from the source end-node to the destination end-node, and storing the BTT for the source-destination path; for each of a plurality of Ethernet frames encapsulating non-TCP packets, measuring a frame transfer time (FTT) along the source-destination path for the Ethernet frames; subtracting the BFTT from the FTT and determining whether the result of the subtraction exceeds a threshold; if the result of the subtraction exceeds the threshold, marking a congestion flag in an ACK packet that is returned from the destination end-node to the source-destination end-node, otherwise leaving the congestion flag in the ACK packet unmarked; detecting a marked status of the ACK packet via inspection of the congestion flag; and employing the marked status to implement congestion management for the path. 5. The method of claim 1, wherein the non-congested transit latency is measured along a source-destination round-trip path from the source end-node to the destination end-node and back to the source end-node, and the transmit latencies for the transfer of non-TCP packets or Ethernet frames is measured along the same roundtrip path. 6. The method of claim 5, further comprising: measuring a best roundtrip transfer time (BRTT) along the source-destination round-trip path, and storing the BRTT for the source-destination roundtrip path; for each of a plurality of Ethernet frames encapsulating non-TCP packets, measuring a roundtrip transfer time (RTT) along the source-destination roundtrip path for the Ethernet frames; subtracting the BRTT from the RTT and determining whether the result of the subtraction exceeds a threshold; if the result of the subtraction exceeds the threshold, marking the source-destination path as congested, otherwise, not marking the source-destination path as congested; and employing the marked status of the source-destination path to implement congestion management for the source-destination path. 7. The method of claim 1, wherein the method is implemented for a plurality of paths between a plurality of source and destination end-nodes, the plurality of paths collectively traversing a plurality of switches, and wherein the method is implemented without any modification to the switches. 8. The method of claim 1, wherein the method is implemented by modifying at least one of software or hardware components configured to implement a conventional non-TCP protocol only at the source end-node, wherein the destination end-node employs conventional software and hardware components for implementing the non-TCP protocol. 9. The method of claim 1, wherein the non-TCP traffic comprises one of RDMA over Converged Ethernet (RoCE) traffic or Fiber Channel over Ethernet traffic. 10. The method of claim 1, wherein the method is facilitated via the use of timestamps corresponding to when an Ethernet frame is transmitted from a transmit port and received at a receive port, and further wherein at least one timestamp is added to a field in the Ethernet frame. 11. A server apparatus, configured to be implemented as an end-node in a data center, the server apparatus having a processor operatively coupled to memory and operatively coupled to a network interface configured to support network communication using an Ethernet protocol, the apparatus further configured, upon operation, to: facilitate operation of the server apparatus as a source end-node; transmit Ethernet frames outbound from the transmit port toward a destination end-node, at least a portion of the Ethernet frames encapsulating non-TCP (Transmission Control Protocol) packets, the Ethernet frames to be forwarded along a source-destination path between the server apparatus and the destination end-node and traversing at least one switch; retrieve path congestion marking indicia received from the destination end-node for transfer of at least a portion of the Ethernet frames encapsulating non-TCP packets, the path congestion marking indicia identifying whether or not the source-destination path was marked as congested for transfer of an Ethernet frame based on a difference between a transit latency measured for the Ethernet frame by the destination end-node and a non-congested transit latency for the source-destination path; and manage a rate at which the non-TCP packets are transmitted outbound from the transmit port to be forwarded via the source-destination path to the destination end-node based as a function of a rate at which the path is marked as congested. 12. The server apparatus of claim 11, wherein the apparatus is further configured to: input the path congestion marking indicia into a DCTCP (Data Center TCP) algorithm in place of using a congestion marking status conveyed via an ECN-Echo flag as an input to the DCTCP algorithm; update a congestion windows (cwnd) via the DCTCP algorithm; and employ cwnd to manage the rate at which non-TCP packets are transmitted outbound from the transmit port to be forwarded via the source-destination path to the destination end-node. 13. The server apparatus of claim 11, wherein the apparatus is further configured to timestamp an Ethernet frame encapsulating a non-TCP packet proximate to when the Ethernet frame is transmitted from the transmit port. 14. The server apparatus of claim 13, wherein the timestamp is added via a software-based Ethernet MAC (Media Access Channel) layer or sub-layer implemented via execution of software on the processor. 15. The server apparatus of claim 13, wherein the timestamp is added via a hardware-based Ethernet MAC (Media Access Channel) layer or sub-layer implemented by the network interface. 16. The server apparatus of claim 11, wherein the apparatus is further configured to: facilitate operation of the server apparatus as a destination end-node; retrieve a source transit timestamp contained in an Ethernet frame including an encapsulated non-TCP packet transmitted from a source end-node along a source-destination path from the source end-node to the server apparatus, the source transit timestamp identifying a time at which the Ethernet frame was transmitted from the source end-node; retrieve a destination receive timestamp identifying a time at which the Ethernet frame is received at the receive port; and calculate a frame transit time (FTT) based on a difference between the destination receive timestamp and the source transit timestamp. 17. The server apparatus of claim 16, wherein the apparatus is further configured to: retrieve a best frame transit time BFTT corresponding to a non-congested transit latency for the source-destination path; determine whether a difference between the FTT for an Ethernet frame and the BFTT exceeds a threshold; and if the difference between the FTT and BFTT exceeds the threshold, return an ACK packet containing indicia indicating the source-destination path is marked as congested, otherwise, return an ACK packet containing indicia indicating the source-destination path is not marked as congested. 18. A machine-readable non-transitory storage medium having instructions stored thereon configured to be executed on a host processor of a server comprising a source end-node to enable the source end-node to: transmit Ethernet frames outbound from a transmit port of the source end-node toward a destination end-node, the Ethernet frames to be forwarded along a path between the source end-node and the destination end-node including at least one switch; determine a non-congested transit latency for the path; at least one of, determine, for transfer of at least a portion of the Ethernet frames encapsulating non-TCP packets, whether to mark the path as congested or not congested based on a difference between a transit latency measured for the Ethernet frame and the non-congested transit latency for the path; or retrieve path congestion marking indicia received from the destination end-node for transfer of at least a portion of the Ethernet frames encapsulating non-TCP packets, the path congestion marking indicia identifying whether or not the path was marked as congested for transfer of an Ethernet frame based on a difference between a transit latency measured for the Ethernet frame by the destination end-node and the non-congested transit latency for the path; and manage a rate at which the non-TCP packets are transmitted outbound from the transmit port of the source end-node to be forwarded via the path to the destination end-node based as a function of a rate at which the path is marked as congested. 19. The machine-readable non-transitory storage medium of claim 18, wherein the instructions are configured to enable the source end-node to: maintain an estimate a of the fraction of Ethernet frames that are marked, which is updated once for every window of data using the equation, a←(1−g)×a+g×F where F is the fraction of packets that were marked in the last window of data, and g is a weight between 0 and 1 given to new samples against the past in the estimation of a; input a into the following equation to adjust a size of a congestion window (cwnd), cwnd←cwnd×(1−a/2); and employ cwnd to manage rate at which the non-TCP packets are transmitted outbound from the transmit port of the source end-node to be forwarded via the path to the destination end-node. 20. The machine-readable non-transitory storage medium of claim 18, wherein the non-congested transit latency is determined by measuring transit latency along a source-destination round-trip path from the source end-node to the destination end-node and back to the source end-node, and the transmit latencies for the transfer of the Ethernet frames encapsulating non-TCP packets is measured along the same roundtrip path. 21. The machine-readable non-transitory storage medium of claim 20, wherein the instructions are configured to enable the source end-node to: measure a best roundtrip transfer time (BRTT) along the source-destination round-trip path, and storing the BRTT for the source-destination roundtrip path; for each of a plurality of Ethernet frames encapsulating non-TCP packets, measure a roundtrip transfer time (RTT) along the source-destination roundtrip path for the Ethernet frames; subtract the BRTT from the RTT and determining whether the result of the subtraction exceeds a threshold; if the result of the subtraction exceeds the threshold, marking the source-destination path as congested, otherwise, not marking the source-destination path as congested; and employ the marked status of the source-destination path to implement congestion management for the source-destination path. 22. The machine-readable non-transitory storage medium of claim 21, wherein the instructions are configured to embed a source transit timestamp in an Ethernet frame indicating when the Ethernet frame was transmitted outbound from the transmit port of the source end-node. 23. The machine-readable non-transitory storage medium of claim 22, wherein path congestion marking indicia is received from the destination end-node, and wherein the instructions are configured to inspect a congestion flag in an ACK packet comprising the path congestion marking indicia that is returned by the destination end-node in response to receiving an Ethernet frame encapsulating a non-TCP packet from the source-node, the congestion flag including indicia to whether a source-destination path along which the Ethernet frame was forwarded was congested when the Ethernet frame traversed the source-destination path. 24. The machine-readable non-transitory storage medium of claim 23, further having instructions stored thereon configured to be executed on a host processor of a server comprising a destination end-node to enable the destination end-node to: retrieve a source transit timestamp contained in an Ethernet frame including an encapsulated non-TCP packet transmitted from a source end-node along a source-destination path from the source end-node to the destination end-node, the source transit timestamp identifying a time at which the Ethernet frame was transmitted from the source end-node; retrieve a destination receive timestamp identifying a time at which the Ethernet frame is received at the destination end-node; and calculate a frame transit time (FTT) based on a difference between the destination receive timestamp and the source transit timestamp. 25. The machine-readable non-transitory storage medium of claim 24, wherein the instructions are further configured, upon execution, to: retrieve a best frame transit time BFTT corresponding to a non-congested transit latency for the source-destination path; determine whether a difference between the FTT for an Ethernet frame and the BFTT exceeds a threshold; and if the difference between the FTT and BFTT exceeds the threshold, returning an ACK packet containing indicia indicating the source-destination path is marked as congested, otherwise, returning an ACK packet containing indicia indicating the source-destination path is not marked as congested.
2,400