Unnamed: 0
int64
0
350k
level_0
int64
0
351k
ApplicationNumber
int64
9.75M
96.1M
ArtUnit
int64
1.6k
3.99k
Abstract
stringlengths
1
8.37k
Claims
stringlengths
3
292k
abstract-claims
stringlengths
68
293k
TechCenter
int64
1.6k
3.9k
7,300
7,300
14,735,099
2,431
A user inputs a password entry at a computer, which processes the entry using a function to obtain a plurality of sub-entries that are sent to a server. Each sub-entry is generated by padding the password entry to obtain a fix-length password entry from which are generated a number of strings in which different combinations of k characters are missing and then passed through a one-way function. The server receives the sub-entries and compares each sub-entry with stored password verifiers for the user to determine if they match. If at least one sub-entry matches a password verifier, the user is authenticated and a notification is sent to the user via the computer. If no sub-entry matches a password verifier, then the user is not authorized. Up to k typing errors can be accepted in the password entry.
1. An apparatus for processing a password entry comprising: an interface configured to receive a password entry comprising a string of characters; and a processor configured to: generate a plurality of sub-entries from the password entry, wherein each sub-entry is equal to the string of characters less a different combination of k characters, where k is an integer; and generate password verifiers by respectively using a function on each sub-entry. 2. The apparatus of claim 1, wherein the function is a one-way hash function or an encryption function. 3. The apparatus of claim 1, wherein the processor is further configured to pad the password entry to obtain a padded password entry of length L, where L is an integer, and to generate the plurality of sub-entries from the padded password entry. 4. The apparatus of claim 1, wherein the apparatus is a user device and the interface is a user interface and wherein the user device further comprises a communication interface configured to output the password verifiers to an authentication apparatus. 5. A method for processing a password entry comprising: receiving by an interface a password entry comprising a string of characters; generating by a processor a plurality of sub-entries from the password entry, wherein each sub-entry is equal to the string of characters less a different combination of k characters, where k is an integer; and generating by the processor password verifiers by respectively using a function on each sub-entry. 6. An apparatus for authentication of a password entry input by a user, the apparatus comprising: a memory configured to store M password verifiers for a user, where M is an integer; and a processor configured to: obtain N obtained password verifiers representative of the password entry, where N is an integer; compare each of the obtained password verifiers with the stored password verifiers; and authenticate the password entry upon determination that at least one obtained password verifiers matches a stored password verifier. 7. The apparatus of claim 6, further comprising an interface configured to receive the obtained password verifiers from a user device and to send the obtained password verifiers to the processor. 8. The apparatus of claim 6, further comprising an interface configured to receive the password entry from a user device and to send the password entry to the processor, wherein the processor is further configured to use a function to generate the stored password verifiers. 9. The apparatus of claim 6, wherein the stored password verifiers and the obtained password verifiers are ordered and wherein the processor is configured to compare each obtained password verifier only with the stored password verifier with the same order. 10. A method for authentication of a password entry input by a user comprising: obtaining by a processor N obtained password verifiers representative of the password entry; comparing by the processor the obtained password verifiers with M stored password verifiers; and authenticating by the processor the password entry upon determination that at least one obtained password verifier matches a stored password verifier. 11. Computer program product which is stored on a non-transitory computer readable medium and comprises program code instructions executable by a processor for implementing the steps of a method according to claim 5.
A user inputs a password entry at a computer, which processes the entry using a function to obtain a plurality of sub-entries that are sent to a server. Each sub-entry is generated by padding the password entry to obtain a fix-length password entry from which are generated a number of strings in which different combinations of k characters are missing and then passed through a one-way function. The server receives the sub-entries and compares each sub-entry with stored password verifiers for the user to determine if they match. If at least one sub-entry matches a password verifier, the user is authenticated and a notification is sent to the user via the computer. If no sub-entry matches a password verifier, then the user is not authorized. Up to k typing errors can be accepted in the password entry.1. An apparatus for processing a password entry comprising: an interface configured to receive a password entry comprising a string of characters; and a processor configured to: generate a plurality of sub-entries from the password entry, wherein each sub-entry is equal to the string of characters less a different combination of k characters, where k is an integer; and generate password verifiers by respectively using a function on each sub-entry. 2. The apparatus of claim 1, wherein the function is a one-way hash function or an encryption function. 3. The apparatus of claim 1, wherein the processor is further configured to pad the password entry to obtain a padded password entry of length L, where L is an integer, and to generate the plurality of sub-entries from the padded password entry. 4. The apparatus of claim 1, wherein the apparatus is a user device and the interface is a user interface and wherein the user device further comprises a communication interface configured to output the password verifiers to an authentication apparatus. 5. A method for processing a password entry comprising: receiving by an interface a password entry comprising a string of characters; generating by a processor a plurality of sub-entries from the password entry, wherein each sub-entry is equal to the string of characters less a different combination of k characters, where k is an integer; and generating by the processor password verifiers by respectively using a function on each sub-entry. 6. An apparatus for authentication of a password entry input by a user, the apparatus comprising: a memory configured to store M password verifiers for a user, where M is an integer; and a processor configured to: obtain N obtained password verifiers representative of the password entry, where N is an integer; compare each of the obtained password verifiers with the stored password verifiers; and authenticate the password entry upon determination that at least one obtained password verifiers matches a stored password verifier. 7. The apparatus of claim 6, further comprising an interface configured to receive the obtained password verifiers from a user device and to send the obtained password verifiers to the processor. 8. The apparatus of claim 6, further comprising an interface configured to receive the password entry from a user device and to send the password entry to the processor, wherein the processor is further configured to use a function to generate the stored password verifiers. 9. The apparatus of claim 6, wherein the stored password verifiers and the obtained password verifiers are ordered and wherein the processor is configured to compare each obtained password verifier only with the stored password verifier with the same order. 10. A method for authentication of a password entry input by a user comprising: obtaining by a processor N obtained password verifiers representative of the password entry; comparing by the processor the obtained password verifiers with M stored password verifiers; and authenticating by the processor the password entry upon determination that at least one obtained password verifier matches a stored password verifier. 11. Computer program product which is stored on a non-transitory computer readable medium and comprises program code instructions executable by a processor for implementing the steps of a method according to claim 5.
2,400
7,301
7,301
14,586,512
2,447
Novel tools and techniques are provided for tracking website performance and providing a user with website performance data. Embodiments include systems, methods and apparatus for identifying that the user has accessed a website from a user device, obtaining one or more website performance metrics and forwarding one or more website performance metrics to a performance information generator associated with a website performance tracking server. A performance information message is then created by the performance information generator and the performance information message is transmitted to the user device. The performance information message may be displayed to the user on the user device. In selected embodiments, the performance information message is displayed to the user in real-time as the user accesses the website.
1. A method of providing a user with website performance data comprising: identifying, at a server, that a user has accessed a website on a user device; obtaining, with the server, one or more website performance metrics; forwarding the one or more website performance metrics to a performance information generator associated with the server; generating a performance information message containing website performance information based upon the one or more website performance metrics; transmitting the performance information message to the user device; and displaying the performance information message to the user on the user device as the user accesses the website. 2. The method of claim 1 further comprising: identifying the accessed website with a deep packet inspection engine running in association with the server; replicating the accessed website on a browser emulator associated with the server; executing selected performance tests on the replicated website to determine one or more website performance metrics; forwarding the determined website performance metrics to the performance information generator; and storing the determined website performance metrics to a database of website performance metrics. 3. The method of claim 2 further comprising: obtaining one or more website performance metrics from data storage maintained by one or more of, a provider access network, a content provider network and a content server. 4. The method of claim 3 further comprising: providing the user with a user interface on the user device; accepting input from the user, through the user interface, said input comprising a user assessment of the website performance; and storing the user website performance assessment obtained from the user to the database of website performance metrics. 5. The method of claim 4 further comprising: obtaining website traffic data with a traffic measurement engine associated with the server; storing the website traffic data to the database of website performance metrics; forwarding the one or more website performance metrics and the website traffic data to the performance information generator; generating a performance information message containing website performance information correlated with contemporaneous website traffic based upon the one or more website performance metrics and the website traffic data; and displaying the performance information message containing website performance information correlated with contemporaneous web site traffic to the user on the user device as the user accesses the website. 6. The method of claim 1 further comprising: identifying the accessed website with a deep packet inspection engine running in association with the server; accessing a database of website performance metrics to determine that website performance metrics have been previously compiled and stored in the database; verifying that the compiled and stored website performance metrics have been compiled within a selected period of time before identifying the accessed website; and forwarding the compiled and stored website performance metrics to the performance information generator. 7. The method of claim 1 wherein the one or more website performance metrics comprise one or more of a website size, a quantity of embedded applications in the website, a required processing power to process the embedded applications, an average load of the website connection to a network, an average delay associated with the website connection to a network; an average user assessment of website performance and the performance of alternative websites providing similar content. 8. The method of claim 1 further comprising: providing the user with a user interface on the user device; and accepting input from the user through the user interface selectively permitting the display of the performance information message containing website performance information. 9. The method of claim 8 further comprising: generating a detailed performance information message containing numerical website performance information based upon the one or more website performance metrics; generating a simplified performance information message containing graphic website performance information based upon the one or more website performance metrics; transmitting the detailed performance information message and the simplified performance information message to the user device; accepting input from the user, through the user interface, selecting one of the detailed performance information message and the simplified performance information message for display; and displaying the selected performance information message to the user on the user device. 10. The method of claim 9 further comprising: determining user device performance information; and displaying user device performance information to the user on the user device. 11. An apparatus comprising: a non-transitory server readable medium having encoded thereon a set of instructions that, when executed by one or more servers, causes the apparatus to perform one or more operations for providing a user with website performance data, the set of instructions comprising: instructions for identifying, that a user has accessed a website on a user device; instructions for obtaining one or more website performance metrics; instructions for forwarding the one or more website performance metrics to a performance information generator associated with the server; instructions for generating a performance information message containing website performance information based upon the one or more website performance metrics; instructions for transmitting the performance information message to the user device; and instructions for displaying the performance information message to the user on the user device as the user accesses the website. 12. The apparatus of claim 11 wherein the set of instructions further comprises: instructions for identifying the accessed website with a deep packet inspection engine running on the server; instructions for replicating the accessed website on a browser emulator associated with the server; instructions for executing selected performance tests on the replicated website to determine one or more website performance metrics; instructions for forwarding the determined website performance metrics to the performance information generator; and instructions for storing the determined website performance metrics to a database of website performance metrics. 13. The apparatus of claim 12, wherein the set of instructions further comprises: instructions for obtaining one or more website performance metrics from data storage maintained by one or more of, a provider access network, a content provider network and a content server. 14. The apparatus of claim 13 wherein the set of instructions further comprises: instructions for providing the user with a user interface on the user device; instructions for accepting input from the user, through the user interface, said input comprising a user assessment of the website performance; and instructions for storing the user website performance assessment obtained from the user to the database of website performance metrics. 15. The apparatus of claim 14 wherein the set of instructions further comprises: instructions for obtaining website traffic data with a traffic measurement engine in communication with the server; instructions for storing the website traffic data to the database of website performance metrics; instructions for forwarding the one or more website performance metrics and the website traffic data to a performance information generator; instructions for generating a performance information message containing website performance information correlated with contemporaneous website traffic based upon the one or more website performance metrics and the web site traffic data; and instructions for displaying the performance information message containing website performance information correlated with contemporaneous website traffic to the user on the user device as the user accesses the website. 16. The apparatus of claim 11 wherein the set of instructions further comprises: instructions for identifying the accessed website with a deep packet inspection engine running on the server; instructions for accessing a database of website performance metrics to determine that website performance metrics have been previously compiled and stored in the database; instructions for verifying that the compiled and stored website performance metrics have been compiled within a selected period of time before identifying the accessed website; and instructions for forwarding the compiled and stored website performance metrics to the performance information generator. 17. The apparatus of claim 11 wherein the set of instructions further comprises: instructions for providing the user with a user interface on the user device; and instructions for accepting input from the user through the user interface selectively permitting the display of the performance information message containing website performance information. 18. The apparatus of claim 16 wherein the set of instructions further comprises: instructions for generating a detailed performance information message containing numerical website performance information based upon the one or more website performance metrics; instructions for generating a simplified performance information message containing graphic website performance information based upon the one or more website performance metrics; instructions for transmitting the detailed performance information message and the simplified performance information message to the user device; instructions for accepting input from the user, through the user interface, selecting one of the detailed performance information message and the simplified performance information message for display; instructions for displaying the selected performance information message to the user on the user device; and instructions for displaying user device performance information to the user on the user device. 19. A website performance tracking server comprising: a deep packet inspection engine providing for the determination that a user has accessed a website on a user device; a browser emulator providing for replication of the accessed website and the execution of selected performance tests on the replicated website to determine one or more website performance metrics; a performance measurement engine providing for the generation of a performance information message containing website performance information based upon the one or more website performance metrics and further providing for the transmission of the performance information message to the user device as the user accesses the website; and data storage providing for the storage of the one or more website performance metrics. 20. The website performance tracking server of claim 18 further comprising a network connection providing for the receipt of input from a user, through a user interface, said input comprising a user assessment of the website performance.
Novel tools and techniques are provided for tracking website performance and providing a user with website performance data. Embodiments include systems, methods and apparatus for identifying that the user has accessed a website from a user device, obtaining one or more website performance metrics and forwarding one or more website performance metrics to a performance information generator associated with a website performance tracking server. A performance information message is then created by the performance information generator and the performance information message is transmitted to the user device. The performance information message may be displayed to the user on the user device. In selected embodiments, the performance information message is displayed to the user in real-time as the user accesses the website.1. A method of providing a user with website performance data comprising: identifying, at a server, that a user has accessed a website on a user device; obtaining, with the server, one or more website performance metrics; forwarding the one or more website performance metrics to a performance information generator associated with the server; generating a performance information message containing website performance information based upon the one or more website performance metrics; transmitting the performance information message to the user device; and displaying the performance information message to the user on the user device as the user accesses the website. 2. The method of claim 1 further comprising: identifying the accessed website with a deep packet inspection engine running in association with the server; replicating the accessed website on a browser emulator associated with the server; executing selected performance tests on the replicated website to determine one or more website performance metrics; forwarding the determined website performance metrics to the performance information generator; and storing the determined website performance metrics to a database of website performance metrics. 3. The method of claim 2 further comprising: obtaining one or more website performance metrics from data storage maintained by one or more of, a provider access network, a content provider network and a content server. 4. The method of claim 3 further comprising: providing the user with a user interface on the user device; accepting input from the user, through the user interface, said input comprising a user assessment of the website performance; and storing the user website performance assessment obtained from the user to the database of website performance metrics. 5. The method of claim 4 further comprising: obtaining website traffic data with a traffic measurement engine associated with the server; storing the website traffic data to the database of website performance metrics; forwarding the one or more website performance metrics and the website traffic data to the performance information generator; generating a performance information message containing website performance information correlated with contemporaneous website traffic based upon the one or more website performance metrics and the website traffic data; and displaying the performance information message containing website performance information correlated with contemporaneous web site traffic to the user on the user device as the user accesses the website. 6. The method of claim 1 further comprising: identifying the accessed website with a deep packet inspection engine running in association with the server; accessing a database of website performance metrics to determine that website performance metrics have been previously compiled and stored in the database; verifying that the compiled and stored website performance metrics have been compiled within a selected period of time before identifying the accessed website; and forwarding the compiled and stored website performance metrics to the performance information generator. 7. The method of claim 1 wherein the one or more website performance metrics comprise one or more of a website size, a quantity of embedded applications in the website, a required processing power to process the embedded applications, an average load of the website connection to a network, an average delay associated with the website connection to a network; an average user assessment of website performance and the performance of alternative websites providing similar content. 8. The method of claim 1 further comprising: providing the user with a user interface on the user device; and accepting input from the user through the user interface selectively permitting the display of the performance information message containing website performance information. 9. The method of claim 8 further comprising: generating a detailed performance information message containing numerical website performance information based upon the one or more website performance metrics; generating a simplified performance information message containing graphic website performance information based upon the one or more website performance metrics; transmitting the detailed performance information message and the simplified performance information message to the user device; accepting input from the user, through the user interface, selecting one of the detailed performance information message and the simplified performance information message for display; and displaying the selected performance information message to the user on the user device. 10. The method of claim 9 further comprising: determining user device performance information; and displaying user device performance information to the user on the user device. 11. An apparatus comprising: a non-transitory server readable medium having encoded thereon a set of instructions that, when executed by one or more servers, causes the apparatus to perform one or more operations for providing a user with website performance data, the set of instructions comprising: instructions for identifying, that a user has accessed a website on a user device; instructions for obtaining one or more website performance metrics; instructions for forwarding the one or more website performance metrics to a performance information generator associated with the server; instructions for generating a performance information message containing website performance information based upon the one or more website performance metrics; instructions for transmitting the performance information message to the user device; and instructions for displaying the performance information message to the user on the user device as the user accesses the website. 12. The apparatus of claim 11 wherein the set of instructions further comprises: instructions for identifying the accessed website with a deep packet inspection engine running on the server; instructions for replicating the accessed website on a browser emulator associated with the server; instructions for executing selected performance tests on the replicated website to determine one or more website performance metrics; instructions for forwarding the determined website performance metrics to the performance information generator; and instructions for storing the determined website performance metrics to a database of website performance metrics. 13. The apparatus of claim 12, wherein the set of instructions further comprises: instructions for obtaining one or more website performance metrics from data storage maintained by one or more of, a provider access network, a content provider network and a content server. 14. The apparatus of claim 13 wherein the set of instructions further comprises: instructions for providing the user with a user interface on the user device; instructions for accepting input from the user, through the user interface, said input comprising a user assessment of the website performance; and instructions for storing the user website performance assessment obtained from the user to the database of website performance metrics. 15. The apparatus of claim 14 wherein the set of instructions further comprises: instructions for obtaining website traffic data with a traffic measurement engine in communication with the server; instructions for storing the website traffic data to the database of website performance metrics; instructions for forwarding the one or more website performance metrics and the website traffic data to a performance information generator; instructions for generating a performance information message containing website performance information correlated with contemporaneous website traffic based upon the one or more website performance metrics and the web site traffic data; and instructions for displaying the performance information message containing website performance information correlated with contemporaneous website traffic to the user on the user device as the user accesses the website. 16. The apparatus of claim 11 wherein the set of instructions further comprises: instructions for identifying the accessed website with a deep packet inspection engine running on the server; instructions for accessing a database of website performance metrics to determine that website performance metrics have been previously compiled and stored in the database; instructions for verifying that the compiled and stored website performance metrics have been compiled within a selected period of time before identifying the accessed website; and instructions for forwarding the compiled and stored website performance metrics to the performance information generator. 17. The apparatus of claim 11 wherein the set of instructions further comprises: instructions for providing the user with a user interface on the user device; and instructions for accepting input from the user through the user interface selectively permitting the display of the performance information message containing website performance information. 18. The apparatus of claim 16 wherein the set of instructions further comprises: instructions for generating a detailed performance information message containing numerical website performance information based upon the one or more website performance metrics; instructions for generating a simplified performance information message containing graphic website performance information based upon the one or more website performance metrics; instructions for transmitting the detailed performance information message and the simplified performance information message to the user device; instructions for accepting input from the user, through the user interface, selecting one of the detailed performance information message and the simplified performance information message for display; instructions for displaying the selected performance information message to the user on the user device; and instructions for displaying user device performance information to the user on the user device. 19. A website performance tracking server comprising: a deep packet inspection engine providing for the determination that a user has accessed a website on a user device; a browser emulator providing for replication of the accessed website and the execution of selected performance tests on the replicated website to determine one or more website performance metrics; a performance measurement engine providing for the generation of a performance information message containing website performance information based upon the one or more website performance metrics and further providing for the transmission of the performance information message to the user device as the user accesses the website; and data storage providing for the storage of the one or more website performance metrics. 20. The website performance tracking server of claim 18 further comprising a network connection providing for the receipt of input from a user, through a user interface, said input comprising a user assessment of the website performance.
2,400
7,302
7,302
14,993,636
2,414
A communication system is presented in which a base station is provided for communicating with a plurality of mobile communication devices in a cellular communication system. The base station operates one of more communication cells and communicates subframes, with each of the plurality of communication devices within the cell(s), each comprising the communication resources of a control region for communicating a control channel and the communication resources of a data region for communicating a respective data channel. The base station communicates a control channel having a first DMRS sequence in a control region of some subframes and a control channel having a second DMRS sequence in a control region of other subframes. The second control channel may be transmitted in a radio beam focussed spatially in a direction of a communication device. The first control channel may be transmitted omnidirectionally throughout the cell(s).
1. A mobile communication device which communicates with a communication apparatus, the mobile communication device comprising: a memory storing instructions; and one or more processors configured to execute the instructions to: receive at least one control signal of a first physical downlink control channel (PDCCH); receive at least one control signal of a second PDCCH based on first mapping for a first antenna port set or second mapping for a second antenna port set, wherein the first antenna port set and the second antenna port set are associated with demodulation reference signal (DMRS); and demodulate the second PDCCH based on the DMRS. 2. A mobile communication device according to claim 1, wherein the first antenna port set comprises two antenna ports. 3. A mobile communication device according to claim 1, wherein the second antenna port set comprises two antenna ports. 4. A mobile communication device according to claim 1, wherein the first mapping comprises at least one resource element. 5. A mobile communication device according to claim 1, wherein the second mapping comprises at least one resource element. 6. A communication apparatus which communicates with a mobile communication device, the communication apparatus comprising: a memory storing instructions; and one or more processors configured to execute the instructions to: transmit at least one control signal of a first physical downlink control channel (PDCCH); and transmit at least one control signal of a second PDCCH based on first mapping for a first antenna port set or second mapping for a second antenna port set, wherein the first antenna port set and the second antenna port set are associated with demodulation reference signal (DMRS), wherein the DMRS is for the second PDCCH demodulation in the mobile communication device. 7. A communication apparatus according to claim 6, wherein the first antenna port set comprises two antenna ports. 8. A communication apparatus according to claim 6, wherein the second antenna port set comprises two antenna ports. 9. A communication apparatus according to claim 6, wherein the first mapping comprises at least one resource element. 10. A communication apparatus according to claim 6, wherein the second mapping comprises at least one resource element. 11. A communication control method in a mobile communication device which communicate with a communication apparatus, the communication control method comprising: receiving at least one control signal of a first physical downlink control channel (PDCCH); receiving at least one control signal of a second PDCCH based on first mapping for a first antenna port set or second mapping for a second antenna port set, wherein the first antenna port set and the second antenna port set are associated with demodulation reference signal (DMRS); and demodulating the second PDCCH based on the DMRS. 12. A communication control method in a communication apparatus which communicates with a mobile communication device, the communication control method comprising: transmitting at least one control signal of a first physical downlink control channel (PDCCH); and transmitting at least one control signal of a second PDCCH based on first mapping for a first antenna port set or second mapping for a second antenna port set, wherein the first antenna port set and the second antenna port set are associated with demodulation reference signal (DMRS), wherein the DMRS is for the second PDCCH demodulation in the mobile communication device.
A communication system is presented in which a base station is provided for communicating with a plurality of mobile communication devices in a cellular communication system. The base station operates one of more communication cells and communicates subframes, with each of the plurality of communication devices within the cell(s), each comprising the communication resources of a control region for communicating a control channel and the communication resources of a data region for communicating a respective data channel. The base station communicates a control channel having a first DMRS sequence in a control region of some subframes and a control channel having a second DMRS sequence in a control region of other subframes. The second control channel may be transmitted in a radio beam focussed spatially in a direction of a communication device. The first control channel may be transmitted omnidirectionally throughout the cell(s).1. A mobile communication device which communicates with a communication apparatus, the mobile communication device comprising: a memory storing instructions; and one or more processors configured to execute the instructions to: receive at least one control signal of a first physical downlink control channel (PDCCH); receive at least one control signal of a second PDCCH based on first mapping for a first antenna port set or second mapping for a second antenna port set, wherein the first antenna port set and the second antenna port set are associated with demodulation reference signal (DMRS); and demodulate the second PDCCH based on the DMRS. 2. A mobile communication device according to claim 1, wherein the first antenna port set comprises two antenna ports. 3. A mobile communication device according to claim 1, wherein the second antenna port set comprises two antenna ports. 4. A mobile communication device according to claim 1, wherein the first mapping comprises at least one resource element. 5. A mobile communication device according to claim 1, wherein the second mapping comprises at least one resource element. 6. A communication apparatus which communicates with a mobile communication device, the communication apparatus comprising: a memory storing instructions; and one or more processors configured to execute the instructions to: transmit at least one control signal of a first physical downlink control channel (PDCCH); and transmit at least one control signal of a second PDCCH based on first mapping for a first antenna port set or second mapping for a second antenna port set, wherein the first antenna port set and the second antenna port set are associated with demodulation reference signal (DMRS), wherein the DMRS is for the second PDCCH demodulation in the mobile communication device. 7. A communication apparatus according to claim 6, wherein the first antenna port set comprises two antenna ports. 8. A communication apparatus according to claim 6, wherein the second antenna port set comprises two antenna ports. 9. A communication apparatus according to claim 6, wherein the first mapping comprises at least one resource element. 10. A communication apparatus according to claim 6, wherein the second mapping comprises at least one resource element. 11. A communication control method in a mobile communication device which communicate with a communication apparatus, the communication control method comprising: receiving at least one control signal of a first physical downlink control channel (PDCCH); receiving at least one control signal of a second PDCCH based on first mapping for a first antenna port set or second mapping for a second antenna port set, wherein the first antenna port set and the second antenna port set are associated with demodulation reference signal (DMRS); and demodulating the second PDCCH based on the DMRS. 12. A communication control method in a communication apparatus which communicates with a mobile communication device, the communication control method comprising: transmitting at least one control signal of a first physical downlink control channel (PDCCH); and transmitting at least one control signal of a second PDCCH based on first mapping for a first antenna port set or second mapping for a second antenna port set, wherein the first antenna port set and the second antenna port set are associated with demodulation reference signal (DMRS), wherein the DMRS is for the second PDCCH demodulation in the mobile communication device.
2,400
7,303
7,303
15,147,427
2,495
The present invention relates to an information processing apparatus allowing proper communication with a communication partner in accordance with a communication time of the communication partner.
1. An electronic device comprising: circuitry configured to transmit a random number to share secret information between the electronic device and another electronic device, wherein the random number is transmitted using transmission control protocol (TCP); receive the secret information based on the random number from the another electronic device; count a time elapsed from transmitting the random number; and compare the secret information with expected authentication data generated at the electronic device, wherein transmission of content data is authorized when a result of the comparing indicates that the secret information matches the expected authentication data and the secret information is received at the electronic device before a predetermined time elapsed from transmitting the random number expires. 2. The electronic device of claim 1, wherein transmission of content data is not authorized when the result of the comparing indicates that the secret information does not match the expected authentication data. 3. The electronic device of claim 1, wherein transmission of content data is not authorized when the secret information is not received at the electronic device before a predetermined time elapsed from transmitting the random number expires. 4. The electronic device of claim 1, wherein the circuitry includes a processor configured to execute a program stored in memory and an interface connected to a communication interface, which is configured to communicate with the another electronic device. 5. The electronic device of claim 8, wherein the circuitry is configured to output a video signal to a display. 6. The electronic device of claim 1, further comprising: a user interface configured to receive a user input. 7. The electronic device of claim 1, further comprising: a memory configured to store data to be transmitted to the another electronic device. 8. The electronic device of claim 1, further comprising: a communication interface. 9. The electronic device of claim 8, wherein the communication interface is an Ethernet interface. 10. The electronic device of claim 1, wherein the another electronic device is a target for a locality check by the electronic device. 11. The electronic device of claim 1, wherein a secret key is shared between the electronic device and the another electronic device. 12. The electronic device of claim 2, wherein the secret key is shared between the electronic device and the another electronic device before the random number is transmitted. 13. A method performed by an electronic device, the method comprising: transmitting a random number to share secret information between the electronic device and another electronic device, wherein the random number is transmitted using transmission control protocol (TCP); receiving the secret information based on the random number from the another electronic device; counting a time elapsed from transmitting the random number; and comparing the secret information with expected authentication data generated at the electronic device, wherein transmission of content data is authorized when a result of the comparing indicates that the secret information matches the expected authentication data and the secret information is received at the electronic device before a predetermined time elapsed from transmitting the random number expires. 14. The method of claim 13, wherein transmission of content data is not authorized when the result of the comparing indicates that the secret information does not match the expected authentication data. 15. The method of claim 13, wherein transmission of content data is not authorized when the secret information is not received at the electronic device before a predetermined time elapsed from transmitting the random number expires. 16. A non-transitory computer-readable medium including computer-program instructions, which when executed by an electronic device, cause the electronic device to: transmit a random number to share secret information between the electronic device and another electronic device, wherein the random number is transmitted using transmission control protocol (TCP); receive the secret information based on the random number from the another electronic device; count a time elapsed from transmitting the random number; and compare the secret information with expected authentication data generated at the electronic device, wherein transmission of content data is authorized when a result of the comparing indicates that the secret information matches the expected authentication data and the secret information is received at the electronic device before a predetermined time elapsed from transmitting the random number expires. 17. The non-transitory computer-readable medium of claim 16, wherein transmission of content data is not authorized when the result of the comparing indicates that the secret information does not match the expected authentication data. 18. The non-transitory computer-readable medium of claim 16, wherein transmission of content data is not authorized when the secret information is not received at the electronic device before a predetermined time elapsed from transmitting the random number expires.
The present invention relates to an information processing apparatus allowing proper communication with a communication partner in accordance with a communication time of the communication partner.1. An electronic device comprising: circuitry configured to transmit a random number to share secret information between the electronic device and another electronic device, wherein the random number is transmitted using transmission control protocol (TCP); receive the secret information based on the random number from the another electronic device; count a time elapsed from transmitting the random number; and compare the secret information with expected authentication data generated at the electronic device, wherein transmission of content data is authorized when a result of the comparing indicates that the secret information matches the expected authentication data and the secret information is received at the electronic device before a predetermined time elapsed from transmitting the random number expires. 2. The electronic device of claim 1, wherein transmission of content data is not authorized when the result of the comparing indicates that the secret information does not match the expected authentication data. 3. The electronic device of claim 1, wherein transmission of content data is not authorized when the secret information is not received at the electronic device before a predetermined time elapsed from transmitting the random number expires. 4. The electronic device of claim 1, wherein the circuitry includes a processor configured to execute a program stored in memory and an interface connected to a communication interface, which is configured to communicate with the another electronic device. 5. The electronic device of claim 8, wherein the circuitry is configured to output a video signal to a display. 6. The electronic device of claim 1, further comprising: a user interface configured to receive a user input. 7. The electronic device of claim 1, further comprising: a memory configured to store data to be transmitted to the another electronic device. 8. The electronic device of claim 1, further comprising: a communication interface. 9. The electronic device of claim 8, wherein the communication interface is an Ethernet interface. 10. The electronic device of claim 1, wherein the another electronic device is a target for a locality check by the electronic device. 11. The electronic device of claim 1, wherein a secret key is shared between the electronic device and the another electronic device. 12. The electronic device of claim 2, wherein the secret key is shared between the electronic device and the another electronic device before the random number is transmitted. 13. A method performed by an electronic device, the method comprising: transmitting a random number to share secret information between the electronic device and another electronic device, wherein the random number is transmitted using transmission control protocol (TCP); receiving the secret information based on the random number from the another electronic device; counting a time elapsed from transmitting the random number; and comparing the secret information with expected authentication data generated at the electronic device, wherein transmission of content data is authorized when a result of the comparing indicates that the secret information matches the expected authentication data and the secret information is received at the electronic device before a predetermined time elapsed from transmitting the random number expires. 14. The method of claim 13, wherein transmission of content data is not authorized when the result of the comparing indicates that the secret information does not match the expected authentication data. 15. The method of claim 13, wherein transmission of content data is not authorized when the secret information is not received at the electronic device before a predetermined time elapsed from transmitting the random number expires. 16. A non-transitory computer-readable medium including computer-program instructions, which when executed by an electronic device, cause the electronic device to: transmit a random number to share secret information between the electronic device and another electronic device, wherein the random number is transmitted using transmission control protocol (TCP); receive the secret information based on the random number from the another electronic device; count a time elapsed from transmitting the random number; and compare the secret information with expected authentication data generated at the electronic device, wherein transmission of content data is authorized when a result of the comparing indicates that the secret information matches the expected authentication data and the secret information is received at the electronic device before a predetermined time elapsed from transmitting the random number expires. 17. The non-transitory computer-readable medium of claim 16, wherein transmission of content data is not authorized when the result of the comparing indicates that the secret information does not match the expected authentication data. 18. The non-transitory computer-readable medium of claim 16, wherein transmission of content data is not authorized when the secret information is not received at the electronic device before a predetermined time elapsed from transmitting the random number expires.
2,400
7,304
7,304
15,036,563
2,422
A method of conducting wireless fiber inspection includes obtaining a video stream from an inspection probe and transmitting the video stream over a Wi-Fi network. The method further includes creating the Wi-Fi network using a Wi-Fi hotspot, performing image analysis on the obtained video stream, and transmitting the image analysis along with the video stream over the Wi-Fi network.
1. A method, performed by an apparatus including at least one processor, of conducting wireless fiber inspection, the method comprising: obtaining a video stream from an inspection probe; and transmitting the video stream over a Wi-Fi network. 2. The method of claim 1, wherein the transmitting the video stream further comprises creating the Wi-Fi network using a Wi-Fi hotspot and transmitting the video stream over a Wi-Fi network. 3. The method of claim 1, further comprising: performing image analysis on the obtained video stream; and transmitting the image analysis along with the video stream over the Wi-Fi network. 4. The method of claim 1, further comprising: obtaining encrypted license key; and transmitting the encrypted license key along with the video stream over the Wi-Fi network. 5. A method, performed by an apparatus including at least one processor, of conducting wireless fiber inspection, the method comprising: receiving a video stream and image analysis information over a Wi-Fi network; decrypting the image analysis information; and displaying at least one of the video stream and the decrypted image analysis information. 6. A method, performed by an apparatus including at least one processor, of conducting wireless fiber inspection, the method comprising: receiving a video stream over a Wi-Fi network; performing image analysis on the received video stream; and displaying at least one of the video stream and image analysis. 7. The method of claim 6, further comprising: receiving an encrypted license key over the Wi-Fi network; and decrypting the received license key, wherein the performing further comprises performing the image analysis on the video stream using the decrypted license key. 8. An apparatus for conducting wireless fiber inspection, the apparatus comprising: an inspection probe; a processor configured to obtain a video stream from the inspection probe; and a communication interface configured to transmit the video stream over a Wi-Fi network. 9. The apparatus of claim 8, further comprising: a Wi-Fi hotspot configured to create the Wi-Fi network. 10. The apparatus of claim 8, wherein the processor is further configured to perform image analysis on the obtained video stream, and the communication interface is further configured to transmit the image analysis along with the video stream over the Wi-Fi network. 11. The apparatus of claim 8, wherein the processor is further configured to obtain an encrypted license key, and the communication interface is further configured to transmit the encrypted license key along with the video stream over the Wi-Fi network. 12. A non-transitory computer readable recording medium storing a program used in an apparatus, including at least one processor, for conducting wireless fiber inspection, the program causing said at least one processor to: obtain a video stream from an inspection probe; and transmit the video stream over a Wi-Fi network. 13. The non-transitory computer readable recording medium of claim 12, wherein the program further causes said at least one processor to: create the Wi-Fi network using a Wi-Fi hotspot. 14. The non-transitory computer readable recording medium of claim 12, wherein the program further causes said at least one processor to: perform image analysis on the obtained video stream; and transmit the image analysis along with the video stream over the Wi-Fi network. 15. The non-transitory computer readable recording medium of claim 12, wherein the program further causes said at least one processor to: obtain encrypted license key; and transmit the encrypted license key along with the video stream over the Wi-Fi network.
A method of conducting wireless fiber inspection includes obtaining a video stream from an inspection probe and transmitting the video stream over a Wi-Fi network. The method further includes creating the Wi-Fi network using a Wi-Fi hotspot, performing image analysis on the obtained video stream, and transmitting the image analysis along with the video stream over the Wi-Fi network.1. A method, performed by an apparatus including at least one processor, of conducting wireless fiber inspection, the method comprising: obtaining a video stream from an inspection probe; and transmitting the video stream over a Wi-Fi network. 2. The method of claim 1, wherein the transmitting the video stream further comprises creating the Wi-Fi network using a Wi-Fi hotspot and transmitting the video stream over a Wi-Fi network. 3. The method of claim 1, further comprising: performing image analysis on the obtained video stream; and transmitting the image analysis along with the video stream over the Wi-Fi network. 4. The method of claim 1, further comprising: obtaining encrypted license key; and transmitting the encrypted license key along with the video stream over the Wi-Fi network. 5. A method, performed by an apparatus including at least one processor, of conducting wireless fiber inspection, the method comprising: receiving a video stream and image analysis information over a Wi-Fi network; decrypting the image analysis information; and displaying at least one of the video stream and the decrypted image analysis information. 6. A method, performed by an apparatus including at least one processor, of conducting wireless fiber inspection, the method comprising: receiving a video stream over a Wi-Fi network; performing image analysis on the received video stream; and displaying at least one of the video stream and image analysis. 7. The method of claim 6, further comprising: receiving an encrypted license key over the Wi-Fi network; and decrypting the received license key, wherein the performing further comprises performing the image analysis on the video stream using the decrypted license key. 8. An apparatus for conducting wireless fiber inspection, the apparatus comprising: an inspection probe; a processor configured to obtain a video stream from the inspection probe; and a communication interface configured to transmit the video stream over a Wi-Fi network. 9. The apparatus of claim 8, further comprising: a Wi-Fi hotspot configured to create the Wi-Fi network. 10. The apparatus of claim 8, wherein the processor is further configured to perform image analysis on the obtained video stream, and the communication interface is further configured to transmit the image analysis along with the video stream over the Wi-Fi network. 11. The apparatus of claim 8, wherein the processor is further configured to obtain an encrypted license key, and the communication interface is further configured to transmit the encrypted license key along with the video stream over the Wi-Fi network. 12. A non-transitory computer readable recording medium storing a program used in an apparatus, including at least one processor, for conducting wireless fiber inspection, the program causing said at least one processor to: obtain a video stream from an inspection probe; and transmit the video stream over a Wi-Fi network. 13. The non-transitory computer readable recording medium of claim 12, wherein the program further causes said at least one processor to: create the Wi-Fi network using a Wi-Fi hotspot. 14. The non-transitory computer readable recording medium of claim 12, wherein the program further causes said at least one processor to: perform image analysis on the obtained video stream; and transmit the image analysis along with the video stream over the Wi-Fi network. 15. The non-transitory computer readable recording medium of claim 12, wherein the program further causes said at least one processor to: obtain encrypted license key; and transmit the encrypted license key along with the video stream over the Wi-Fi network.
2,400
7,305
7,305
14,152,443
2,442
A computer implemented method and apparatus for managing activities in a web conference. The method and apparatus segment participants of a web conference into a plurality of groups and presents to each group in the plurality of groups one or more conference activities. The one or more conference activities for a first group in the plurality of groups are different from the one or more conference activities for a second group in the plurality of groups.
1. A computer implemented method comprising: segmenting participants of a web conference into a plurality of groups; and presenting to each group in the plurality of groups one or more conference activities, wherein the one or more conference activities for a first group in the plurality of groups is different from the one or more conference activities for a second group in the plurality of groups. 2. The method of claim 1, wherein segmenting is based on a participant response to a conference activity. 3. The method of claim 1, wherein segmenting is based on static information, wherein static information is identifying information regarding a participant. 4. The method of claim 1, wherein a conference activity is at least one of a plurality of presentation slides, a poll, or a text chat message. 5. The method of claim 1, wherein conference activities are at least one of a pre-defined conference activity or a conference activity created during the web conference. 6. The method of claim 5, wherein the created conference activity comprises a time to display the conference activity and one or more groups to whom the conference activity is to be displayed. 7. The method of claim 1, further comprising presenting a host of the web conference a display comprising a view of what is presented to each group in the plurality of groups. 8. An apparatus for managing activities in a web conference comprising: a computer having one or more processors and further comprising: a conference management module for segmenting participants of a web conference into a plurality of groups, and presenting to each group in the plurality of groups one or more conference activities, wherein the one or more conference activities for a first group in the plurality of groups is different from the one or more conference activities for a second group in the plurality of groups. 9. The apparatus of claim 8, wherein the conference management module segments based on a participant response to a conference activity. 10. The apparatus of claim 8, wherein the conference management module segments based on static information, wherein static information is identifying information regarding a participant. 11. The apparatus of claim 8, wherein the one or more conference activities is at least one of a plurality of presentation slides, a poll, or a text chat message. 12. The apparatus of claim 8, wherein the one or more conference activities are at least one of a pre-defined conference activity or a conference activity created during the web conference, and wherein the created conference activity comprises a time to display the conference activity and one or more groups to whom the conference activity is to be displayed. 13. The apparatus of claim 8, wherein the conference management module presents a host of the web conference a display comprising a view of what is presented to each group in the plurality of groups. 14. A non-transient computer readable medium for storing computer instructions that, when executed by at least one processor causes the at least one processor to perform a method for managing activities in a web conference comprising: segmenting participants of a web conference into a plurality of groups; and presenting to each group in the plurality of groups one or more conference activities, wherein the one or more conference activities for a first group in the plurality of groups is different from the one or more conference activities for a second group in the plurality of groups. 15. The computer readable medium of claim 14, wherein segmenting is based on a participant response to a conference activity. 16. The computer readable medium of claim 14, wherein segmenting is based on static information, wherein static information is identifying information regarding a participant. 17. The computer readable medium of claim 14, wherein a conference activity is at least one of a plurality of presentation slides, a poll, or a text chat message. 18. The computer readable medium of claim 14, wherein conference activities are at least one of a pre-defined conference activity or a conference activity created during the web conference. 19. The computer readable medium of claim 18, wherein the created conference activity comprises a time to display the conference activity and one or more groups to whom the conference activity is to be displayed. 20. The computer readable medium of claim 14, further comprising presenting a host of the web conference a display comprising a view of what is presented to each group in the plurality of groups.
A computer implemented method and apparatus for managing activities in a web conference. The method and apparatus segment participants of a web conference into a plurality of groups and presents to each group in the plurality of groups one or more conference activities. The one or more conference activities for a first group in the plurality of groups are different from the one or more conference activities for a second group in the plurality of groups.1. A computer implemented method comprising: segmenting participants of a web conference into a plurality of groups; and presenting to each group in the plurality of groups one or more conference activities, wherein the one or more conference activities for a first group in the plurality of groups is different from the one or more conference activities for a second group in the plurality of groups. 2. The method of claim 1, wherein segmenting is based on a participant response to a conference activity. 3. The method of claim 1, wherein segmenting is based on static information, wherein static information is identifying information regarding a participant. 4. The method of claim 1, wherein a conference activity is at least one of a plurality of presentation slides, a poll, or a text chat message. 5. The method of claim 1, wherein conference activities are at least one of a pre-defined conference activity or a conference activity created during the web conference. 6. The method of claim 5, wherein the created conference activity comprises a time to display the conference activity and one or more groups to whom the conference activity is to be displayed. 7. The method of claim 1, further comprising presenting a host of the web conference a display comprising a view of what is presented to each group in the plurality of groups. 8. An apparatus for managing activities in a web conference comprising: a computer having one or more processors and further comprising: a conference management module for segmenting participants of a web conference into a plurality of groups, and presenting to each group in the plurality of groups one or more conference activities, wherein the one or more conference activities for a first group in the plurality of groups is different from the one or more conference activities for a second group in the plurality of groups. 9. The apparatus of claim 8, wherein the conference management module segments based on a participant response to a conference activity. 10. The apparatus of claim 8, wherein the conference management module segments based on static information, wherein static information is identifying information regarding a participant. 11. The apparatus of claim 8, wherein the one or more conference activities is at least one of a plurality of presentation slides, a poll, or a text chat message. 12. The apparatus of claim 8, wherein the one or more conference activities are at least one of a pre-defined conference activity or a conference activity created during the web conference, and wherein the created conference activity comprises a time to display the conference activity and one or more groups to whom the conference activity is to be displayed. 13. The apparatus of claim 8, wherein the conference management module presents a host of the web conference a display comprising a view of what is presented to each group in the plurality of groups. 14. A non-transient computer readable medium for storing computer instructions that, when executed by at least one processor causes the at least one processor to perform a method for managing activities in a web conference comprising: segmenting participants of a web conference into a plurality of groups; and presenting to each group in the plurality of groups one or more conference activities, wherein the one or more conference activities for a first group in the plurality of groups is different from the one or more conference activities for a second group in the plurality of groups. 15. The computer readable medium of claim 14, wherein segmenting is based on a participant response to a conference activity. 16. The computer readable medium of claim 14, wherein segmenting is based on static information, wherein static information is identifying information regarding a participant. 17. The computer readable medium of claim 14, wherein a conference activity is at least one of a plurality of presentation slides, a poll, or a text chat message. 18. The computer readable medium of claim 14, wherein conference activities are at least one of a pre-defined conference activity or a conference activity created during the web conference. 19. The computer readable medium of claim 18, wherein the created conference activity comprises a time to display the conference activity and one or more groups to whom the conference activity is to be displayed. 20. The computer readable medium of claim 14, further comprising presenting a host of the web conference a display comprising a view of what is presented to each group in the plurality of groups.
2,400
7,306
7,306
13,138,459
2,483
Several implementations relate to 3D video formats. One or more implementations provide adaptations to MVC and SVC to allow 3D video formats to be used. According to a general aspect, a set of images including video and depth is encoded. The set of images is related according to a particular 3D video format, and are encoded in a manner that exploits redundancy between the set of images. The encoded images are arranged in a bitstream in a particular order, based on the particular 3D video format that relates to the images. The particular order is indicated in the bitstream using signaling information. According to another general aspect, a bitstream is accessed that includes the encoded set of images. The signaling information is also accessed. The set of images is decoded using the signaling information.
1. A method comprising: encoding a set of images, including a video image and a depth image corresponding to the video image, that are related according to a particular 3D video format, the set of images being encoded in a manner that exploits redundancy between images in the set of images; arranging the encoded images in a bitstream in a particular order, based on the particular 3D video format that relates to the images, wherein the bitstream includes multiple views or multiple layers, and wherein specific components of the particular 3D video format are assigned to one or more of the multiple views or the multiple layers, and one or more of the multiple views or the multiple layers is capable of being used as a reference for another of the multiple views or another of the multiple layers to exploit redundancy there between; and indicating the particular order using signaling information. 2. The method of claim 1 wherein the signaling information is included in an SEI message or other high-level syntax. 3. The method of claim 1 wherein the bitstream is compliant with one or more a multi-view video coding extension or a scalable video coding extension of the International Organization for Standardization/International Electrotechnical Commission Moving Picture Experts Group-4 Part 10 Advanced Video Coding standard/International Telecommunication Union, Telecommunication Sector H.264 recommendation. 4. (canceled) 5. The method of claim 1 wherein the particular 3D video format is one of a plurality of different 3D video formats according to which the encoded images may be arranged, and the signaling information indicates the particular 3D video format from among the plurality of different 3D video formats. 6. The method of claim 1 wherein the set of images includes a two-dimensional video image and a corresponding depth image. 7. The method of claim 6 wherein the two-dimensional video image and the corresponding depth image are from a first view point, and the set of images further includes another two-dimensional video image and another depth image from a second view point, the other depth image corresponding to the other two-dimensional video image. 8. The method of claim 6 wherein the set of images further includes an occlusion video image and an occlusion depth image. 9. The method of claim 8 wherein the occlusion video image and the occlusion depth image are from a first view point, and the set of images further includes another occlusion video image and another occlusion depth image from a second view point, the other occlusion depth image corresponding to the other occlusion video image. 10. An apparatus comprising: means for encoding a set of images, including a video image and a depth image corresponding to the video image, that are related according to a particular 3D video format, the set of images being encoded in a manner that exploits redundancy between images in the set of images; means for arranging the encoded images in a bitstream in a particular order, based on the particular 3D video format that relates to the images, wherein the bitstream includes multiple views or multiple layers, and wherein specific components of the particular 3D video format are assigned to one or more of the multiple views or the multiple layers, and one or more of the multiple views or the multiple layers is capable of being used as a reference for another of the multiple views or another of the multiple layers to exploit redundancy there between; and means for indicating the particular order using signaling information. 11. A processor readable medium having stored thereon instructions for causing a processor to perform at least the following: encoding a set of images, including a video image and a depth image corresponding to the video image, that are related according to a particular 3D video format, the set of images being encoded in a manner that exploits redundancy between images in the set of images; arranging the encoded images in a bitstream in a particular order, based on the particular 3D video format that relates to the images, wherein the bitstream includes multiple views or multiple layers, and wherein specific components of the particular 3D video format are assigned to one or more of the multiple views or the multiple layers, and one or more of the multiple views or the multiple layers is capable of being used as a reference for another of the multiple views or another of the multiple layers to exploit redundancy there between; and indicating the particular order using signaling information. 12. An apparatus comprising a processor configured to perform at least the following: encoding a set of images, including a video image and a depth image corresponding to the video image, that are related according to a particular 3D video format, the set of images being encoded in a manner that exploits redundancy between images in the set of images; arranging the encoded images in a bitstream in a particular order, based on the particular 3D video format that relates to the images, wherein the bitstream includes multiple views or multiple layers, and wherein specific components of the particular 3D video format are assigned to one or more of the multiple views or the multiple layers, and one or more of the multiple views or the multiple layers is capable of being used as a reference for another of the multiple views or another of the multiple layers to exploit redundancy there between; and indicating the particular order using signaling information. 13. An apparatus comprising: an encoder for encoding a set of images, including a video image and a depth image corresponding to the video image, that are related according to a particular 3D video format, the set of images being encoded in a manner that exploits redundancy between images in the set of images; a bitstream multiplexer for arranging the encoded images in a bitstream in a particular order, based on the particular 3D video format that relates to the images, wherein the bitstream includes multiple views or multiple layers, and wherein specific components of the particular 3D video format are assigned to one or more of the multiple views or the multiple layers, and one or more of the multiple views or the multiple layers is capable of being used as a reference for another of the multiple views or another of the multiple layers to exploit redundancy there between; and a message composer for indicating the particular order using signaling information. 14. An apparatus comprising: an encoder for encoding a set of images, including a video image and a depth image corresponding to the video image, that are related according to a particular 3D video format, the set of images being encoded in a manner that exploits redundancy between images in the set of images; a bitstream multiplexer for arranging the encoded images in a bitstream in a particular order, based on the particular 3D video format that relates to the images, wherein the bitstream includes multiple views or multiple layers, and wherein specific components of the particular 3D video format are assigned to one or more of the multiple views or the multiple layers, and one or more of the multiple views or the multiple layers is capable of being used as a reference for another of the multiple views or another of the multiple layers to exploit redundancy there between; a message composer for indicating, in the bitstream, the particular order using signaling information; and a modulator for modulating a signal that includes the encoded images and the signaling information. 15. A method comprising: accessing a bitstream that includes an encoded set of images, the set of images including a video image and a depth image corresponding to the video image, and the set of images being related according to a particular 3D video format, the set of images being encoded in a manner that exploits redundancy between images in the set of images; accessing signaling information indicating a particular order in which the encoded set of images are arranged in the bitstream, the particular order being based on the particular 3D video format that relates to the set of images, wherein the bitstream includes multiple views or multiple layers, and wherein specific components of the particular 3D video format are assigned to one or more of the multiple views or the multiple layers, and one or more of the multiple views or the multiple layers is capable of being used as a reference for another of the multiple views or another of the multiple layers to exploit redundancy there between; and decoding the set of images using the signaling information. 16. An apparatus comprising: means for accessing a bitstream that includes an encoded set of images, the set of images including a video image and a depth image corresponding to the video image, and the set of images being related according to a particular 3D video format, the set of images being encoded in a manner that exploits redundancy between images in the set of images; means for accessing signaling information indicating a particular order in which the encoded set of images are arranged in the bitstream, the particular order being based on the particular 3D video format that relates to the set of images, wherein the bitstream includes multiple views or multiple layers, and wherein specific components of the particular 3D video format are assigned to one or more of the multiple views or the multiple layers, and one or more of the multiple views or the multiple layers is capable of being used as a reference for another of the multiple views or another of the multiple layers to exploit redundancy there between; and means for decoding the set of images using the signaling information. 17. A processor readable medium having stored thereon instructions for causing a processor to perform at least the following: accessing a bitstream that includes an encoded set of images, the set of images including a video image and a depth image corresponding to the video image, and the set of images being related according to a particular 3D video format, the set of images being encoded in a manner that exploits redundancy between images in the set of images; accessing signaling information indicating a particular order in which the encoded set of images are arranged in the bitstream, the particular order being based on the particular 3D video format that relates to the set of images, wherein the bitstream includes multiple views or multiple layers, and wherein specific components of the particular 3D video format are assigned to one or more of the multiple views or the multiple layers, and one or more of the multiple views or the multiple layers is capable of being used as a reference for another of the multiple views or another of the multiple layers to exploit redundancy there between; and decoding the set of images using the signaling information. 18. An apparatus comprising a processor configured to perform at least the following: accessing a bitstream that includes an encoded set of images, the set of images including a video image and a depth image corresponding to the video image, and the set of images being related according to a particular 3D video format, the set of images being encoded in a manner that exploits redundancy between images in the set of images; accessing signaling information indicating a particular order in which the encoded set of images are arranged in the bitstream, the particular order being based on the particular 3D video format that relates to the set of images, wherein the bitstream includes multiple views or multiple layers, and wherein specific components of the particular 3D video format are assigned to one or more of the multiple views or the multiple layers, and one or more of the multiple views or the multiple layers is capable of being used as a reference for another of the multiple views or another of the multiple layers to exploit redundancy there between; and decoding the set of images using the signaling information. 19. An apparatus comprising: a bitstream de-multiplexer for accessing a bitstream that includes an encoded set of images, the set of images including a video image and a depth image corresponding to the video image, and the set of images being related according to a particular 3D video format, the set of images being encoded in a manner that exploits redundancy between images in the set of images; a message parser for accessing signaling information indicating a particular order in which the encoded set of images are arranged in the bitstream, the particular order being based on the particular 3D video format that relates to the set of images, wherein the bitstream includes multiple views or multiple layers, and wherein specific components of the particular 3D video format are assigned to one or more of the multiple views or the multiple layers, and one or more of the multiple views or the multiple layers is capable of being used as a reference for another of the multiple views or another of the multiple layers to exploit redundancy there between; and a decoder for decoding the set of images using the signaling information. 20. The apparatus of claim 19 wherein the apparatus is implemented in at least one of a video encoder or a video decoder. 21. An apparatus comprising: a demodulator for demodulating a signal including a bitstream, the bitstream including an encoded set of images, the set of images including a video image and a depth image corresponding to the video image, and the set of images being related according to a particular 3D video format, the set of images being encoded in a manner that exploits redundancy between images in the set of images; a bitstream de-multiplexer for accessing the bitstream; a message parser for accessing signaling information indicating a particular order in which the encoded set of images are arranged in the bitstream, the particular order being based on the particular 3D video format that relates to the set of images, wherein the bitstream includes multiple views or multiple layers, and wherein specific components of the particular 3D video format are assigned to one or more of the multiple views or the multiple layers, and one or more of the multiple views or the multiple layers is capable of being used as a reference for another of the multiple views or another of the multiple layers to exploit redundancy there between; and a decoder for decoding the set of images using the signaling information. 22. (canceled) 23. (canceled) 24. (canceled) 25. A processor readable medium having stored thereon a video signal structure, the video signal structure comprising a signaling section including signaling information indicating a particular order in which an encoded set of images are arranged in a bitstream, the particular order being based on a particular 3D video format that relates to the set of images, wherein the bitstream includes multiple views or multiple layers, and wherein specific components of the particular 3D video format are assigned to one or more of the multiple views or the multiple layers, and one or more of the multiple views or the multiple layers is capable of being used as a reference for another of the multiple views or another of the multiple layers to exploit redundancy there between. 26. The method of claim 15 wherein the signaling information is included in an SEI message or other high-level syntax. 27. The method of claim 15 wherein the bitstream is compliant with one or more a multi-view video coding extension or a scalable video coding extension of the International Organization for Standardization/International Electrotechnical Commission Moving Picture Experts Group-4 Part 10 Advanced Video Coding standard/International Telecommunication Union, Telecommunication Sector H.264 recommendation. 28. The method of claim 15 wherein the particular 3D video format is one of a plurality of different 3D video formats according to which the encoded set of images may be arranged, and the signaling information indicates the particular 3D video format from among the plurality of different 3D video formats.
Several implementations relate to 3D video formats. One or more implementations provide adaptations to MVC and SVC to allow 3D video formats to be used. According to a general aspect, a set of images including video and depth is encoded. The set of images is related according to a particular 3D video format, and are encoded in a manner that exploits redundancy between the set of images. The encoded images are arranged in a bitstream in a particular order, based on the particular 3D video format that relates to the images. The particular order is indicated in the bitstream using signaling information. According to another general aspect, a bitstream is accessed that includes the encoded set of images. The signaling information is also accessed. The set of images is decoded using the signaling information.1. A method comprising: encoding a set of images, including a video image and a depth image corresponding to the video image, that are related according to a particular 3D video format, the set of images being encoded in a manner that exploits redundancy between images in the set of images; arranging the encoded images in a bitstream in a particular order, based on the particular 3D video format that relates to the images, wherein the bitstream includes multiple views or multiple layers, and wherein specific components of the particular 3D video format are assigned to one or more of the multiple views or the multiple layers, and one or more of the multiple views or the multiple layers is capable of being used as a reference for another of the multiple views or another of the multiple layers to exploit redundancy there between; and indicating the particular order using signaling information. 2. The method of claim 1 wherein the signaling information is included in an SEI message or other high-level syntax. 3. The method of claim 1 wherein the bitstream is compliant with one or more a multi-view video coding extension or a scalable video coding extension of the International Organization for Standardization/International Electrotechnical Commission Moving Picture Experts Group-4 Part 10 Advanced Video Coding standard/International Telecommunication Union, Telecommunication Sector H.264 recommendation. 4. (canceled) 5. The method of claim 1 wherein the particular 3D video format is one of a plurality of different 3D video formats according to which the encoded images may be arranged, and the signaling information indicates the particular 3D video format from among the plurality of different 3D video formats. 6. The method of claim 1 wherein the set of images includes a two-dimensional video image and a corresponding depth image. 7. The method of claim 6 wherein the two-dimensional video image and the corresponding depth image are from a first view point, and the set of images further includes another two-dimensional video image and another depth image from a second view point, the other depth image corresponding to the other two-dimensional video image. 8. The method of claim 6 wherein the set of images further includes an occlusion video image and an occlusion depth image. 9. The method of claim 8 wherein the occlusion video image and the occlusion depth image are from a first view point, and the set of images further includes another occlusion video image and another occlusion depth image from a second view point, the other occlusion depth image corresponding to the other occlusion video image. 10. An apparatus comprising: means for encoding a set of images, including a video image and a depth image corresponding to the video image, that are related according to a particular 3D video format, the set of images being encoded in a manner that exploits redundancy between images in the set of images; means for arranging the encoded images in a bitstream in a particular order, based on the particular 3D video format that relates to the images, wherein the bitstream includes multiple views or multiple layers, and wherein specific components of the particular 3D video format are assigned to one or more of the multiple views or the multiple layers, and one or more of the multiple views or the multiple layers is capable of being used as a reference for another of the multiple views or another of the multiple layers to exploit redundancy there between; and means for indicating the particular order using signaling information. 11. A processor readable medium having stored thereon instructions for causing a processor to perform at least the following: encoding a set of images, including a video image and a depth image corresponding to the video image, that are related according to a particular 3D video format, the set of images being encoded in a manner that exploits redundancy between images in the set of images; arranging the encoded images in a bitstream in a particular order, based on the particular 3D video format that relates to the images, wherein the bitstream includes multiple views or multiple layers, and wherein specific components of the particular 3D video format are assigned to one or more of the multiple views or the multiple layers, and one or more of the multiple views or the multiple layers is capable of being used as a reference for another of the multiple views or another of the multiple layers to exploit redundancy there between; and indicating the particular order using signaling information. 12. An apparatus comprising a processor configured to perform at least the following: encoding a set of images, including a video image and a depth image corresponding to the video image, that are related according to a particular 3D video format, the set of images being encoded in a manner that exploits redundancy between images in the set of images; arranging the encoded images in a bitstream in a particular order, based on the particular 3D video format that relates to the images, wherein the bitstream includes multiple views or multiple layers, and wherein specific components of the particular 3D video format are assigned to one or more of the multiple views or the multiple layers, and one or more of the multiple views or the multiple layers is capable of being used as a reference for another of the multiple views or another of the multiple layers to exploit redundancy there between; and indicating the particular order using signaling information. 13. An apparatus comprising: an encoder for encoding a set of images, including a video image and a depth image corresponding to the video image, that are related according to a particular 3D video format, the set of images being encoded in a manner that exploits redundancy between images in the set of images; a bitstream multiplexer for arranging the encoded images in a bitstream in a particular order, based on the particular 3D video format that relates to the images, wherein the bitstream includes multiple views or multiple layers, and wherein specific components of the particular 3D video format are assigned to one or more of the multiple views or the multiple layers, and one or more of the multiple views or the multiple layers is capable of being used as a reference for another of the multiple views or another of the multiple layers to exploit redundancy there between; and a message composer for indicating the particular order using signaling information. 14. An apparatus comprising: an encoder for encoding a set of images, including a video image and a depth image corresponding to the video image, that are related according to a particular 3D video format, the set of images being encoded in a manner that exploits redundancy between images in the set of images; a bitstream multiplexer for arranging the encoded images in a bitstream in a particular order, based on the particular 3D video format that relates to the images, wherein the bitstream includes multiple views or multiple layers, and wherein specific components of the particular 3D video format are assigned to one or more of the multiple views or the multiple layers, and one or more of the multiple views or the multiple layers is capable of being used as a reference for another of the multiple views or another of the multiple layers to exploit redundancy there between; a message composer for indicating, in the bitstream, the particular order using signaling information; and a modulator for modulating a signal that includes the encoded images and the signaling information. 15. A method comprising: accessing a bitstream that includes an encoded set of images, the set of images including a video image and a depth image corresponding to the video image, and the set of images being related according to a particular 3D video format, the set of images being encoded in a manner that exploits redundancy between images in the set of images; accessing signaling information indicating a particular order in which the encoded set of images are arranged in the bitstream, the particular order being based on the particular 3D video format that relates to the set of images, wherein the bitstream includes multiple views or multiple layers, and wherein specific components of the particular 3D video format are assigned to one or more of the multiple views or the multiple layers, and one or more of the multiple views or the multiple layers is capable of being used as a reference for another of the multiple views or another of the multiple layers to exploit redundancy there between; and decoding the set of images using the signaling information. 16. An apparatus comprising: means for accessing a bitstream that includes an encoded set of images, the set of images including a video image and a depth image corresponding to the video image, and the set of images being related according to a particular 3D video format, the set of images being encoded in a manner that exploits redundancy between images in the set of images; means for accessing signaling information indicating a particular order in which the encoded set of images are arranged in the bitstream, the particular order being based on the particular 3D video format that relates to the set of images, wherein the bitstream includes multiple views or multiple layers, and wherein specific components of the particular 3D video format are assigned to one or more of the multiple views or the multiple layers, and one or more of the multiple views or the multiple layers is capable of being used as a reference for another of the multiple views or another of the multiple layers to exploit redundancy there between; and means for decoding the set of images using the signaling information. 17. A processor readable medium having stored thereon instructions for causing a processor to perform at least the following: accessing a bitstream that includes an encoded set of images, the set of images including a video image and a depth image corresponding to the video image, and the set of images being related according to a particular 3D video format, the set of images being encoded in a manner that exploits redundancy between images in the set of images; accessing signaling information indicating a particular order in which the encoded set of images are arranged in the bitstream, the particular order being based on the particular 3D video format that relates to the set of images, wherein the bitstream includes multiple views or multiple layers, and wherein specific components of the particular 3D video format are assigned to one or more of the multiple views or the multiple layers, and one or more of the multiple views or the multiple layers is capable of being used as a reference for another of the multiple views or another of the multiple layers to exploit redundancy there between; and decoding the set of images using the signaling information. 18. An apparatus comprising a processor configured to perform at least the following: accessing a bitstream that includes an encoded set of images, the set of images including a video image and a depth image corresponding to the video image, and the set of images being related according to a particular 3D video format, the set of images being encoded in a manner that exploits redundancy between images in the set of images; accessing signaling information indicating a particular order in which the encoded set of images are arranged in the bitstream, the particular order being based on the particular 3D video format that relates to the set of images, wherein the bitstream includes multiple views or multiple layers, and wherein specific components of the particular 3D video format are assigned to one or more of the multiple views or the multiple layers, and one or more of the multiple views or the multiple layers is capable of being used as a reference for another of the multiple views or another of the multiple layers to exploit redundancy there between; and decoding the set of images using the signaling information. 19. An apparatus comprising: a bitstream de-multiplexer for accessing a bitstream that includes an encoded set of images, the set of images including a video image and a depth image corresponding to the video image, and the set of images being related according to a particular 3D video format, the set of images being encoded in a manner that exploits redundancy between images in the set of images; a message parser for accessing signaling information indicating a particular order in which the encoded set of images are arranged in the bitstream, the particular order being based on the particular 3D video format that relates to the set of images, wherein the bitstream includes multiple views or multiple layers, and wherein specific components of the particular 3D video format are assigned to one or more of the multiple views or the multiple layers, and one or more of the multiple views or the multiple layers is capable of being used as a reference for another of the multiple views or another of the multiple layers to exploit redundancy there between; and a decoder for decoding the set of images using the signaling information. 20. The apparatus of claim 19 wherein the apparatus is implemented in at least one of a video encoder or a video decoder. 21. An apparatus comprising: a demodulator for demodulating a signal including a bitstream, the bitstream including an encoded set of images, the set of images including a video image and a depth image corresponding to the video image, and the set of images being related according to a particular 3D video format, the set of images being encoded in a manner that exploits redundancy between images in the set of images; a bitstream de-multiplexer for accessing the bitstream; a message parser for accessing signaling information indicating a particular order in which the encoded set of images are arranged in the bitstream, the particular order being based on the particular 3D video format that relates to the set of images, wherein the bitstream includes multiple views or multiple layers, and wherein specific components of the particular 3D video format are assigned to one or more of the multiple views or the multiple layers, and one or more of the multiple views or the multiple layers is capable of being used as a reference for another of the multiple views or another of the multiple layers to exploit redundancy there between; and a decoder for decoding the set of images using the signaling information. 22. (canceled) 23. (canceled) 24. (canceled) 25. A processor readable medium having stored thereon a video signal structure, the video signal structure comprising a signaling section including signaling information indicating a particular order in which an encoded set of images are arranged in a bitstream, the particular order being based on a particular 3D video format that relates to the set of images, wherein the bitstream includes multiple views or multiple layers, and wherein specific components of the particular 3D video format are assigned to one or more of the multiple views or the multiple layers, and one or more of the multiple views or the multiple layers is capable of being used as a reference for another of the multiple views or another of the multiple layers to exploit redundancy there between. 26. The method of claim 15 wherein the signaling information is included in an SEI message or other high-level syntax. 27. The method of claim 15 wherein the bitstream is compliant with one or more a multi-view video coding extension or a scalable video coding extension of the International Organization for Standardization/International Electrotechnical Commission Moving Picture Experts Group-4 Part 10 Advanced Video Coding standard/International Telecommunication Union, Telecommunication Sector H.264 recommendation. 28. The method of claim 15 wherein the particular 3D video format is one of a plurality of different 3D video formats according to which the encoded set of images may be arranged, and the signaling information indicates the particular 3D video format from among the plurality of different 3D video formats.
2,400
7,307
7,307
13,462,826
2,483
A multiple-view virtual camera system comprising one or more image source units, an image processing unit, a parameter setting unit in signal communication with the image processing unit, and a display in signal communication with the image processing unit. The display is configured to display images generated by the image processing unit to a user of the virtual camera system, where the displayed images are configured according to image-related parameters input by a user of the multiple-view camera system through the parameter setting unit. The parameter setting unit may include a user interface, such as a single-touch or multi-touch touchscreen display, configured to accept input from the user that adjusts the parameters that are transmitted to the image processing unit and utilized by the image processing unit. A method of interactively controlling the virtual camera system by a user of a motor vehicle is also disclosed.
1. A multiple-view camera system for a motor vehicle, the multiple-view camera system comprising: one or more image source units; an image processing unit in signal communication with each of the one or more image source units, configured to receive multiple images from each of the one or more image source units; a parameter setting unit in signal communication with the image processing unit, configured to transmit to the image processing unit image-related parameters input by a user of the multiple-view camera system, where the image-related parameters are utilized by the image processing unit to generate images for display to the user; and a display in signal communication with the image processing unit, configured to display to the user the display images generated by the image processing unit. 2. The multiple-view camera system of claim 1, where the one or more image source units include two video cameras, with one located at the front of the motor vehicle and the other located at the rear of the motor vehicle. 3. The multiple-view camera system of claim 2, where the one or more image source units further includes two additional video cameras, with one located at a driver's side of the motor vehicle and the other located at a passenger's side of the motor vehicle. 4. The multiple-view camera system of claim 2, where the image processing unit is configured to generate a three-dimensional (“3D”) image from images collected by the video cameras. 5. The multiple-view camera system of claim 2, where the image-related parameters are input into the parameter setting unit by the user through a graphical user interface in signal communication with the image processing unit. 6. The multiple-view camera system of claim 5, where the graphical user interface is a touchscreen configured to read single-touch and multi-touch gestures input by the user. 7. The multiple-view camera system of claim 1, where the image-related parameters are used to position a virtual camera of the multiple-view camera system relative to the motor vehicle, where a position of the virtual camera is defined by a three-dimensional world coordinate system comprising three axes. 8. The multiple-view camera system of claim 7, where the image-related parameters used to position the virtual camera are generated from single-touch and multi-touch gestures input to the parameter setting unit by the user using a touchscreen. 9. The multiple-view camera system of claim 8, where the virtual camera is translated along each of its three axes by double-touch gestures input by the user. 10. The multiple-view camera system of claim 8, where the virtual camera is rotated about each of its three axes by single-touch gestures input by the user. 11. The multiple-view camera system of claim 8, where a focal length of the virtual camera is changed by double-touch zoom-in and zoom-out gestures input by the user. 12. A method of interactively controlling a multiple-view camera system in a motor vehicle, the method comprising: collecting one or more images from a plurality of image source units in the motor vehicle; inputting image-related parameters into the multiple-view camera system through a graphical user interface by a user of the motor vehicle; generating an image for display to the user responsive to the image-related parameters; and displaying the image for display to the user on a display in the motor vehicle. 13. The method of claim 12, where the image source units are video cameras and the step of collecting includes collecting one or more images from the video cameras. 14. The method of claim 13, where the graphical user interface includes a touchscreen. 15. The method of claim 14, where the step of inputting image-related parameters includes interpreting gestures made on the touchscreen by the user. 16. The method of claim 15, where the gestures made on the touchscreen include single-touch and multi-touch gestures. 17. The method of claim 16, where the step of generating an image for display includes: positioning a virtual camera of the multiple-view camera system relative to the motor vehicle responsive to the image-related parameters; selecting all or portions of the images collected from the image source units based on the position of the virtual camera; and generating a three-dimensional (“3D”) image for display to the user from the selected images. 18. The method of claim 17, where the virtual camera is defined relative to the motor vehicle by a three-dimensional world coordinate system comprising three axes. 19. The method of claim 18, where the step of positioning the virtual camera includes translating the virtual camera along each of its three axes responsive to double-touch gestures input by the user. 20. The method of claim 18, where the step of positioning the virtual camera includes rotating the virtual camera around each of its three axes by single-touch gestures input by the user.
A multiple-view virtual camera system comprising one or more image source units, an image processing unit, a parameter setting unit in signal communication with the image processing unit, and a display in signal communication with the image processing unit. The display is configured to display images generated by the image processing unit to a user of the virtual camera system, where the displayed images are configured according to image-related parameters input by a user of the multiple-view camera system through the parameter setting unit. The parameter setting unit may include a user interface, such as a single-touch or multi-touch touchscreen display, configured to accept input from the user that adjusts the parameters that are transmitted to the image processing unit and utilized by the image processing unit. A method of interactively controlling the virtual camera system by a user of a motor vehicle is also disclosed.1. A multiple-view camera system for a motor vehicle, the multiple-view camera system comprising: one or more image source units; an image processing unit in signal communication with each of the one or more image source units, configured to receive multiple images from each of the one or more image source units; a parameter setting unit in signal communication with the image processing unit, configured to transmit to the image processing unit image-related parameters input by a user of the multiple-view camera system, where the image-related parameters are utilized by the image processing unit to generate images for display to the user; and a display in signal communication with the image processing unit, configured to display to the user the display images generated by the image processing unit. 2. The multiple-view camera system of claim 1, where the one or more image source units include two video cameras, with one located at the front of the motor vehicle and the other located at the rear of the motor vehicle. 3. The multiple-view camera system of claim 2, where the one or more image source units further includes two additional video cameras, with one located at a driver's side of the motor vehicle and the other located at a passenger's side of the motor vehicle. 4. The multiple-view camera system of claim 2, where the image processing unit is configured to generate a three-dimensional (“3D”) image from images collected by the video cameras. 5. The multiple-view camera system of claim 2, where the image-related parameters are input into the parameter setting unit by the user through a graphical user interface in signal communication with the image processing unit. 6. The multiple-view camera system of claim 5, where the graphical user interface is a touchscreen configured to read single-touch and multi-touch gestures input by the user. 7. The multiple-view camera system of claim 1, where the image-related parameters are used to position a virtual camera of the multiple-view camera system relative to the motor vehicle, where a position of the virtual camera is defined by a three-dimensional world coordinate system comprising three axes. 8. The multiple-view camera system of claim 7, where the image-related parameters used to position the virtual camera are generated from single-touch and multi-touch gestures input to the parameter setting unit by the user using a touchscreen. 9. The multiple-view camera system of claim 8, where the virtual camera is translated along each of its three axes by double-touch gestures input by the user. 10. The multiple-view camera system of claim 8, where the virtual camera is rotated about each of its three axes by single-touch gestures input by the user. 11. The multiple-view camera system of claim 8, where a focal length of the virtual camera is changed by double-touch zoom-in and zoom-out gestures input by the user. 12. A method of interactively controlling a multiple-view camera system in a motor vehicle, the method comprising: collecting one or more images from a plurality of image source units in the motor vehicle; inputting image-related parameters into the multiple-view camera system through a graphical user interface by a user of the motor vehicle; generating an image for display to the user responsive to the image-related parameters; and displaying the image for display to the user on a display in the motor vehicle. 13. The method of claim 12, where the image source units are video cameras and the step of collecting includes collecting one or more images from the video cameras. 14. The method of claim 13, where the graphical user interface includes a touchscreen. 15. The method of claim 14, where the step of inputting image-related parameters includes interpreting gestures made on the touchscreen by the user. 16. The method of claim 15, where the gestures made on the touchscreen include single-touch and multi-touch gestures. 17. The method of claim 16, where the step of generating an image for display includes: positioning a virtual camera of the multiple-view camera system relative to the motor vehicle responsive to the image-related parameters; selecting all or portions of the images collected from the image source units based on the position of the virtual camera; and generating a three-dimensional (“3D”) image for display to the user from the selected images. 18. The method of claim 17, where the virtual camera is defined relative to the motor vehicle by a three-dimensional world coordinate system comprising three axes. 19. The method of claim 18, where the step of positioning the virtual camera includes translating the virtual camera along each of its three axes responsive to double-touch gestures input by the user. 20. The method of claim 18, where the step of positioning the virtual camera includes rotating the virtual camera around each of its three axes by single-touch gestures input by the user.
2,400
7,308
7,308
14,104,753
2,461
A method, device and system for creating resources during a user equipment (UE) hands over from a non-3 rd Generation Partnership Project (non-3GPP) system to a 3GPP system are provided. A serving gateway (Serving GW) receives a first resource request message, such as Create Default Bearer Request message, including handover indication information indicating the handover from a mobility management network device, e.g., a MME. As the received resource request message includes the handover indication information, the Serving GW includes the handover indication information in a second resource request message and then sends the second resource request message to a PDN GW. After receiving the second resource request message, the PDN GW policy and charging control (PCC) rules to be used by the UE in the 3GPP access system so as to create the resources used by the UE in the 3GPP system.
1. A method for creating resources during handover of procedure a user equipment (UE) from a non-3rd Generation Partnership Project (non-3GPP) access system to a 3GPP access system, the method comprising: receiving, by a serving gateway (Serving GW), a first resource request message from a mobility management network device, the first resource request message including handover indication information; in response to the received handover indication information included in the first resource request message, the Serving GW including the handover indication information in a second resource request message and sending the second resource request message to an anchor gateway; and receiving, by a packet data network gateway (PDN GW), the second resource request message including the handover indication information from the serving gateway; and obtaining, by the anchor gateway, policy and charging control (PCC) rules to be used by the UE in the 3GPP access system, after the anchor gateway receives the second resource request message. 2. The method of claim 1, wherein each of the first and second resource request messages comprises a Create Default Bearer Request message or a Create Packet Data Protocol (PDP) context message. 3. The method of claim 1, wherein the non-3GPP access system is one of a Code Division Multiple Access (CDMA) access system, a Wireless Local Area Network (WLAN) access system, and a Worldwide Interoperability for Microwave Access (Wimax) access system. 4. The method of claim 1, wherein the 3GPP access system comprises a System Architecture Evolution (SAE) system.
A method, device and system for creating resources during a user equipment (UE) hands over from a non-3 rd Generation Partnership Project (non-3GPP) system to a 3GPP system are provided. A serving gateway (Serving GW) receives a first resource request message, such as Create Default Bearer Request message, including handover indication information indicating the handover from a mobility management network device, e.g., a MME. As the received resource request message includes the handover indication information, the Serving GW includes the handover indication information in a second resource request message and then sends the second resource request message to a PDN GW. After receiving the second resource request message, the PDN GW policy and charging control (PCC) rules to be used by the UE in the 3GPP access system so as to create the resources used by the UE in the 3GPP system.1. A method for creating resources during handover of procedure a user equipment (UE) from a non-3rd Generation Partnership Project (non-3GPP) access system to a 3GPP access system, the method comprising: receiving, by a serving gateway (Serving GW), a first resource request message from a mobility management network device, the first resource request message including handover indication information; in response to the received handover indication information included in the first resource request message, the Serving GW including the handover indication information in a second resource request message and sending the second resource request message to an anchor gateway; and receiving, by a packet data network gateway (PDN GW), the second resource request message including the handover indication information from the serving gateway; and obtaining, by the anchor gateway, policy and charging control (PCC) rules to be used by the UE in the 3GPP access system, after the anchor gateway receives the second resource request message. 2. The method of claim 1, wherein each of the first and second resource request messages comprises a Create Default Bearer Request message or a Create Packet Data Protocol (PDP) context message. 3. The method of claim 1, wherein the non-3GPP access system is one of a Code Division Multiple Access (CDMA) access system, a Wireless Local Area Network (WLAN) access system, and a Worldwide Interoperability for Microwave Access (Wimax) access system. 4. The method of claim 1, wherein the 3GPP access system comprises a System Architecture Evolution (SAE) system.
2,400
7,309
7,309
13,331,815
2,492
In one implementation, an application security system accesses an attack description and a data set from an application. The data set based on an attack data set. The application security system correlates the data set with the attack description, and reports a security vulnerability for the application if the data set satisfies the attack description.
1. A processor-readable medium storing code representing instructions that when executed at a processor cause the processor to: access an attack description; access a data set from an application, the data set based on an attack data set; correlate the data set with the attack description; and report a security vulnerability for the application if the data set satisfies the attack description. 2. The processor-readable medium of claim 1, further comprising code representing instructions that when executed at a processor cause the processor to: receive a correlation type identifier associated with the attack description, correlating the data set with the attack description is based on the correlation type identifier. 3. The processor-readable medium of claim 1, further comprising code representing instructions that when executed at a processor cause the processor to: receive an ignore parameter associated with the attack description, the security vulnerability is reported if the data set satisfies the attack description and the ignore parameter has a do not ignore value. 4. The processor-readable medium of claim 1, further comprising code representing instructions that when executed at a processor cause the processor to: receive the attack description, the attack description including a copy of the data set. 5. The processor-readable medium of claim 1, further comprising code representing instructions that when executed at a processor cause the processor to: intercept execution of the application, accessing the data set in response to intercepting execution of the application. 6. The processor-readable medium of claim 1, wherein: the attack data set is received at the application via a communications channel between a scanner and the application; and the attack description is received via the communications channel. 7. The processor-readable medium of claim 1, wherein: the attack data set is received at the application via an HTTP communications channel between a scanner and the application; the attack description is received via a header of the HTTP communications channel. 8. The processor-readable medium of claim 1, further comprising code representing instructions that when executed at a processor cause the processor to: decode the attack description before the data set is correlated with the attack description. 9. The processor-readable medium of claim 1, further comprising code representing instructions that when executed at a processor cause the processor to: monitor execution of the application. 10. The processor-readable medium of claim 1, further comprising code representing instructions that when executed at a processor cause the processor to: determine whether the data set satisfies a security rule, the security vulnerability is reported if the data set satisfies the attack description and satisfies the security rule. 11. A system for application security testing, comprising; a communications module to receive an attack description; an intercept module to access a data set at an application, the data set based on an attack data set; and a correlation module to determine whether the data set satisfies the attack description. 12. The system of 11, further comprising: a report module to report a security vulnerability for the application if the data set satisfies the attack description. 13. The system of claim 11, wherein: the communications module is configured to receive a correlation type identifier associated with the attack description; and the correlation module is selected based on the correlation type identifier. 14. The system of claim 11, wherein: the communications module is configured to receive the attack description via a communications channel between a scanner and the application. 15. The system of claim 11, wherein: the communications module is configured to receive the attack description via a header of an HTTP communications channel between a scanner and the application. 16. A processor-readable medium storing code representing instructions that when executed at a processor cause the processor to: provide an attack data set to an application via a communications channel; and provide an attack description to an observer via the communications channel. 17. The processor-readable medium of claim 16, wherein the communications channel is an HTTP communications channel. 18. The processor-readable medium of claim 16, wherein: the communications channel is an HTTP communications session; and the attack description is provided within a header of the HTTP communications session. 19. The processor-readable medium of claim 16, further comprising code representing instructions that when executed at a processor cause the processor to: provide a correlation type identifier associated with the attack description to the observer via the communications channel. 20. The processor-readable medium of claim 16, wherein the attack description includes a copy of the attack data set.
In one implementation, an application security system accesses an attack description and a data set from an application. The data set based on an attack data set. The application security system correlates the data set with the attack description, and reports a security vulnerability for the application if the data set satisfies the attack description.1. A processor-readable medium storing code representing instructions that when executed at a processor cause the processor to: access an attack description; access a data set from an application, the data set based on an attack data set; correlate the data set with the attack description; and report a security vulnerability for the application if the data set satisfies the attack description. 2. The processor-readable medium of claim 1, further comprising code representing instructions that when executed at a processor cause the processor to: receive a correlation type identifier associated with the attack description, correlating the data set with the attack description is based on the correlation type identifier. 3. The processor-readable medium of claim 1, further comprising code representing instructions that when executed at a processor cause the processor to: receive an ignore parameter associated with the attack description, the security vulnerability is reported if the data set satisfies the attack description and the ignore parameter has a do not ignore value. 4. The processor-readable medium of claim 1, further comprising code representing instructions that when executed at a processor cause the processor to: receive the attack description, the attack description including a copy of the data set. 5. The processor-readable medium of claim 1, further comprising code representing instructions that when executed at a processor cause the processor to: intercept execution of the application, accessing the data set in response to intercepting execution of the application. 6. The processor-readable medium of claim 1, wherein: the attack data set is received at the application via a communications channel between a scanner and the application; and the attack description is received via the communications channel. 7. The processor-readable medium of claim 1, wherein: the attack data set is received at the application via an HTTP communications channel between a scanner and the application; the attack description is received via a header of the HTTP communications channel. 8. The processor-readable medium of claim 1, further comprising code representing instructions that when executed at a processor cause the processor to: decode the attack description before the data set is correlated with the attack description. 9. The processor-readable medium of claim 1, further comprising code representing instructions that when executed at a processor cause the processor to: monitor execution of the application. 10. The processor-readable medium of claim 1, further comprising code representing instructions that when executed at a processor cause the processor to: determine whether the data set satisfies a security rule, the security vulnerability is reported if the data set satisfies the attack description and satisfies the security rule. 11. A system for application security testing, comprising; a communications module to receive an attack description; an intercept module to access a data set at an application, the data set based on an attack data set; and a correlation module to determine whether the data set satisfies the attack description. 12. The system of 11, further comprising: a report module to report a security vulnerability for the application if the data set satisfies the attack description. 13. The system of claim 11, wherein: the communications module is configured to receive a correlation type identifier associated with the attack description; and the correlation module is selected based on the correlation type identifier. 14. The system of claim 11, wherein: the communications module is configured to receive the attack description via a communications channel between a scanner and the application. 15. The system of claim 11, wherein: the communications module is configured to receive the attack description via a header of an HTTP communications channel between a scanner and the application. 16. A processor-readable medium storing code representing instructions that when executed at a processor cause the processor to: provide an attack data set to an application via a communications channel; and provide an attack description to an observer via the communications channel. 17. The processor-readable medium of claim 16, wherein the communications channel is an HTTP communications channel. 18. The processor-readable medium of claim 16, wherein: the communications channel is an HTTP communications session; and the attack description is provided within a header of the HTTP communications session. 19. The processor-readable medium of claim 16, further comprising code representing instructions that when executed at a processor cause the processor to: provide a correlation type identifier associated with the attack description to the observer via the communications channel. 20. The processor-readable medium of claim 16, wherein the attack description includes a copy of the attack data set.
2,400
7,310
7,310
13,261,843
2,486
The present invention provides low complexity planar mode coding in which a first prediction value is calculated using linear interpolation between a value of respective horizontal boundary pixels and a value of one of vertical boundary pixels, and a second prediction value is calculated using linear interpolation between a value of respective vertical boundary pixels and a value of one of the horizontal boundary pixels. The first and second prediction values are then averaged to derive a respective prediction pixel value in a prediction block. A residual between the prediction block and a target block is signaled to a decoder.
1. A video encoding method for predicting pixel values in a target block under a planar mode, the method comprising computer executable steps executed by a processor of a video encoder to implement: calculating a first prediction value using linear interpolation between a value of respective horizontal boundary pixels and a value of one of vertical boundary pixels; calculating a second prediction value using linear interpolation between a value of respective vertical boundary pixels and a value of one of the horizontal boundary pixels; and averaging the first and second prediction values to derive a respective prediction pixel value in a prediction block. 2. The method according to claim 1, further comprising signaling a residual between the prediction block and the target block. 3. The method according to claim 2, further comprising: switching from a primary set of transform kernel HN(i.j) to a secondary set of transform kernel GN (i.,j); and transforming the residual, using the secondary set of transform kernel GN(i.,j). 4. The method according to claim 3, wherein the secondary set of transform kernel GN(i.,j) is defined by one of the following equations: G N  ( i , j ) = k i × sin  ( ( 2  i - 1 )  jπ 2  N + 1 ) ; ( a ) G N  ( i , j ) = k i × sin  ( ( 2  i - 1 )  ( 2  j - 1 )  π 4  N ) ; and ( b ) G N  ( i , j ) = k i × cos  ( ( i - 1 )  ( 2  j - 1 )  π 2  N ) . ( c ) 5. The method according to claim 3, wherein the secondary set of transform kernel GN(i.,j) for size N×N is defined by the primary set of transform kernel HM(i.j) for size M×M, where M>N. 6. The method according to claim 5, wherein the secondary set of transform kernel GN(i.,j) is defined by G N(i,j)=k i ×H 2N(2i,N+1−j), if transform kernels of size 2N×2N(H 2N) are supported, or G N(i,j)=H N(i,j) otherwise. 7. A video decoding method for predicting pixel values in a target block under a planar mode, the method comprising computer executable steps executed by a processor of a video decoder to implement: calculating a first prediction value using linear interpolation between a value of respective horizontal boundary pixels and a value of one of vertical boundary pixels; calculating a second prediction value using linear interpolation between a value of respective vertical boundary pixels and a value of one of the horizontal boundary pixels; and averaging the first and second prediction values to derive a respective prediction pixel value in a prediction block. 8. The method according to claim 7, further comprising: decoding a residual signaled from an encoder which was generated under the planar mode at an encoder; and adding the decoded residual to the prediction block to reconstruct image data. 9. A video encoder that predicts pixel values in a target block under a planar mode, comprising a processor of a computer system and a memory that stores programs executable by the processor to: calculate a first prediction value using linear interpolation between a value of respective horizontal boundary pixels and a value of one of vertical boundary pixels; calculate a second prediction value using linear interpolation between a value of respective vertical boundary pixels and a value of one of the horizontal boundary pixels; and average the first and second prediction values to derive a respective prediction pixel value in a prediction block. 10. The video encoder according to claim 9, wherein the processor signals a residual between the prediction block and the target block. 11. The video encoder according to claim 10, wherein the processor: switch from a primary set of transform kernel HN(i.j) to a secondary set of transform kernel GN(i.,j); and transform the residual, using the secondary set of transform kernel GN(i.,j). 12. The video encoder according to claim 11, wherein the secondary set of transform kernel GN(i.,j) is defined by one of the following equations: G N  ( i , j ) = k i × sin  ( ( 2  i - 1 )  jπ 2  N + 1 ) ; ( a ) G N  ( i , j ) = k i × sin  ( ( 2  i - 1 )  ( 2  j - 1 )  π 4  N ) ; and ( b ) G N  ( i , j ) = k i × cos  ( ( i - 1 )  ( 2  j - 1 )  π 2  N ) . ( c ) 13. The video encoder according to claim 11, wherein the secondary set of transform kernel GN(i.,j) for size N×N is defined by the primary set of transform kernel HM(i.j) for size M×M, where M>N. 14. The video encoder according to claim 13, wherein the secondary set of transform kernel GN(i.,j) is defined by G N(i,j)=k i ×H F 2N(2i,N+1−j), if transform kernels of size 2N×2N(H F 2N) are supported, or G N(i,j)=H F N(i,j) otherwise. 15. A video decoder that predicts pixel values in a target block under a planar mode, comprising a processor of a computer system and a memory that stores programs executable by the processor to: calculate a first prediction value using linear interpolation between a value of respective horizontal boundary pixels and a value of one of vertical boundary pixels; calculate a second prediction value using linear interpolation between a value of respective vertical boundary pixels and a value of one of the horizontal boundary pixels; and average the first and second prediction values to derive a respective prediction pixel value in a prediction block. 16. The video decoder according to claim 19, wherein the processor further: decodes a residual signaled from an encoder; and adds the decoded residual to the prediction block.
The present invention provides low complexity planar mode coding in which a first prediction value is calculated using linear interpolation between a value of respective horizontal boundary pixels and a value of one of vertical boundary pixels, and a second prediction value is calculated using linear interpolation between a value of respective vertical boundary pixels and a value of one of the horizontal boundary pixels. The first and second prediction values are then averaged to derive a respective prediction pixel value in a prediction block. A residual between the prediction block and a target block is signaled to a decoder.1. A video encoding method for predicting pixel values in a target block under a planar mode, the method comprising computer executable steps executed by a processor of a video encoder to implement: calculating a first prediction value using linear interpolation between a value of respective horizontal boundary pixels and a value of one of vertical boundary pixels; calculating a second prediction value using linear interpolation between a value of respective vertical boundary pixels and a value of one of the horizontal boundary pixels; and averaging the first and second prediction values to derive a respective prediction pixel value in a prediction block. 2. The method according to claim 1, further comprising signaling a residual between the prediction block and the target block. 3. The method according to claim 2, further comprising: switching from a primary set of transform kernel HN(i.j) to a secondary set of transform kernel GN (i.,j); and transforming the residual, using the secondary set of transform kernel GN(i.,j). 4. The method according to claim 3, wherein the secondary set of transform kernel GN(i.,j) is defined by one of the following equations: G N  ( i , j ) = k i × sin  ( ( 2  i - 1 )  jπ 2  N + 1 ) ; ( a ) G N  ( i , j ) = k i × sin  ( ( 2  i - 1 )  ( 2  j - 1 )  π 4  N ) ; and ( b ) G N  ( i , j ) = k i × cos  ( ( i - 1 )  ( 2  j - 1 )  π 2  N ) . ( c ) 5. The method according to claim 3, wherein the secondary set of transform kernel GN(i.,j) for size N×N is defined by the primary set of transform kernel HM(i.j) for size M×M, where M>N. 6. The method according to claim 5, wherein the secondary set of transform kernel GN(i.,j) is defined by G N(i,j)=k i ×H 2N(2i,N+1−j), if transform kernels of size 2N×2N(H 2N) are supported, or G N(i,j)=H N(i,j) otherwise. 7. A video decoding method for predicting pixel values in a target block under a planar mode, the method comprising computer executable steps executed by a processor of a video decoder to implement: calculating a first prediction value using linear interpolation between a value of respective horizontal boundary pixels and a value of one of vertical boundary pixels; calculating a second prediction value using linear interpolation between a value of respective vertical boundary pixels and a value of one of the horizontal boundary pixels; and averaging the first and second prediction values to derive a respective prediction pixel value in a prediction block. 8. The method according to claim 7, further comprising: decoding a residual signaled from an encoder which was generated under the planar mode at an encoder; and adding the decoded residual to the prediction block to reconstruct image data. 9. A video encoder that predicts pixel values in a target block under a planar mode, comprising a processor of a computer system and a memory that stores programs executable by the processor to: calculate a first prediction value using linear interpolation between a value of respective horizontal boundary pixels and a value of one of vertical boundary pixels; calculate a second prediction value using linear interpolation between a value of respective vertical boundary pixels and a value of one of the horizontal boundary pixels; and average the first and second prediction values to derive a respective prediction pixel value in a prediction block. 10. The video encoder according to claim 9, wherein the processor signals a residual between the prediction block and the target block. 11. The video encoder according to claim 10, wherein the processor: switch from a primary set of transform kernel HN(i.j) to a secondary set of transform kernel GN(i.,j); and transform the residual, using the secondary set of transform kernel GN(i.,j). 12. The video encoder according to claim 11, wherein the secondary set of transform kernel GN(i.,j) is defined by one of the following equations: G N  ( i , j ) = k i × sin  ( ( 2  i - 1 )  jπ 2  N + 1 ) ; ( a ) G N  ( i , j ) = k i × sin  ( ( 2  i - 1 )  ( 2  j - 1 )  π 4  N ) ; and ( b ) G N  ( i , j ) = k i × cos  ( ( i - 1 )  ( 2  j - 1 )  π 2  N ) . ( c ) 13. The video encoder according to claim 11, wherein the secondary set of transform kernel GN(i.,j) for size N×N is defined by the primary set of transform kernel HM(i.j) for size M×M, where M>N. 14. The video encoder according to claim 13, wherein the secondary set of transform kernel GN(i.,j) is defined by G N(i,j)=k i ×H F 2N(2i,N+1−j), if transform kernels of size 2N×2N(H F 2N) are supported, or G N(i,j)=H F N(i,j) otherwise. 15. A video decoder that predicts pixel values in a target block under a planar mode, comprising a processor of a computer system and a memory that stores programs executable by the processor to: calculate a first prediction value using linear interpolation between a value of respective horizontal boundary pixels and a value of one of vertical boundary pixels; calculate a second prediction value using linear interpolation between a value of respective vertical boundary pixels and a value of one of the horizontal boundary pixels; and average the first and second prediction values to derive a respective prediction pixel value in a prediction block. 16. The video decoder according to claim 19, wherein the processor further: decodes a residual signaled from an encoder; and adds the decoded residual to the prediction block.
2,400
7,311
7,311
14,557,741
2,465
A communication resource generates a communication to indicate a primary identifier assigned to a wireless network. Additionally, the communication resource populates the communication with data indicating that the wireless network includes multiple available wireless sub-networks. The communication resource broadcasts the communication as a wireless signal in an airspace. A mobile communication device receives the broadcasted wireless signal. The mobile communication device processes the received wireless signal to learn of a primary identifier assigned to the available wireless network. The mobile communication device further processes the data received in the wireless communication to learn of secondary identifiers (which may require retrieval or be located in the received communication) specifying the different wireless sub-networks that are available. Via selection of one of the secondary identifiers, the user or mobile communication device selects a corresponding one of the multiple available wireless sub-networks to establish a wireless communication link.
1. A method comprising: generating a communication to indicate a primary identifier assigned to a wireless network supported by a wireless access point; populating the communication with data indicating that the wireless network includes multiple available wireless sub-networks; and transmitting the communication as a wireless signal from the wireless access point to a mobile communication device. 2. The method as in claim 1 further comprising: receiving a request from the mobile communication device for configuration information indicating identities of the multiple wireless sub-networks; and in response to receiving the request, transmitting the configuration information to the mobile communication device, the configuration information indicating the identities of the multiple wireless sub-networks. 3. The method as in claim 2, wherein transmitting the configuration information further comprises: transmitting the configuration information in a unicast message to the mobile communication device. 4. The method as in claim 1, wherein the wireless network supports open authentication. 5. The method as in claim 1, wherein the communication indicates that the wireless network supports multiple secondary SSIDs, the multiple secondary SSIDs specifying identities, security policy information and traffic policy information of the multiple wireless sub-networks. 6. The method as in claim 1, wherein populating the communication with data includes: setting a bit in a data field of the communication to a predetermined state to indicate that the wireless network includes multiple wireless sub-networks. 7. The method as in claim 1, wherein populating the communication with data includes populating the communication with configuration information indicating identities of each of the multiple wireless sub-networks. 8. The method as in claim 1 further comprising: receiving a probe request from the mobile communication device, the probe request including the primary identifier assigned to the wireless network and a secondary identifier specifying a selected one of the multiple available sub-networks; and in response to receiving the probe request: producing a probe response to include the primary identifier and the secondary identifier, and transmitting the probe response to the mobile communication device. 9. The method as in claim 8, wherein producing the probe response to include the primary identifier and the secondary identifier further comprises: populating data fields of the probe response with the primary identifier and the secondary identifier. 10. The method as in claim 1 further comprising: establishing a communication session between the mobile communication device and the wireless access point over a selected sub-network specified by a secondary identifier received from the mobile communication device; receiving communications from the mobile communication over the selected wireless sub-network from the mobile communication device, the received communications including the primary identifier and secondary identifier; mapping the secondary identifier in the received communications to a VLAN (Virtual Local Area Network) associated with the selected sub-network; and transmitting the received communications over the VLAN. 11. A method comprising: receiving a wireless communication from a wireless access point, the wireless communication including a primary identifier assigned to a wireless network supported by the wireless access point; processing data received in the wireless communication, the data indicating that the wireless network includes multiple available wireless sub-networks; and selecting amongst the multiple available wireless sub-networks to communicate with the wireless access point. 12. The method as in claim 1, wherein selecting amongst the multiple available wireless sub-networks includes: transmitting a request from the mobile communication device to the wireless access point for configuration information indicating identities of the multiple available wireless sub-networks; and in response to transmitting the request, receiving the configuration information at the mobile communication device, the configuration information indicating the identities of the multiple available wireless sub-networks. 13. The method as in claim 12, wherein receiving the configuration information further comprises: receiving the configuration information in a unicast message transmitted from the wireless access point to the mobile communication device. 14. The method as in claim 11, wherein the wireless network supports open authentication. 15. The method as in claim 11, wherein the wireless communication received from the wireless access point indicates that the wireless network supports multiple secondary SSIDs, the multiple secondary SSIDs specifying identities of the multiple available wireless sub-networks. 16. The method as in claim 11, wherein processing the data received in the wireless communication further comprises: detecting that a data field of the wireless communication is set to a predetermined state, indicating that the wireless network includes multiple available wireless sub-networks. 17. The method as in claim 11 further comprising: processing configuration information in the received wireless communication to identify identities of each of the multiple wireless sub-networks. 18. The method as in claim 11 further comprising: transmitting a probe request from the mobile communication device to the wireless access point, the probe request including the primary identifier assigned to the wireless network and a secondary identifier specifying a selected one of the multiple available sub-networks; and in response to transmitting the probe request: receiving a probe response including the primary identifier and the secondary identifier. 19. The method as in claim 1, wherein the wireless signal is a broadcast signal. 20. The method as in claim 1, wherein the wireless signal is a broadcasted beacon signal. 21. A computer system comprising: computer processor hardware; and a hardware storage resource coupled to the computer processor hardware, the hardware storage resource storing instructions that, when executed by the computer processor hardware, causes the computer processor hardware to perform operations of: generating a communication to indicate a primary identifier assigned to a wireless network supported by a wireless access point; populating the communication with data indicating that the wireless network includes multiple available wireless sub-networks; and transmitting the communication as a wireless signal from the wireless access point to a mobile communication device. 22. The computer system as in claim 21, wherein the computer processor hardware further performs operations of: receiving a request from the mobile communication device for configuration information indicating identities of the multiple wireless sub-networks; and in response to receiving the request, transmitting the configuration information to the mobile communication device, the configuration information indicating the identities of the multiple wireless sub-networks. 23. The computer system as in claim 22, wherein the computer processor hardware further performs operations of: transmitting the configuration information in a unicast message to the mobile communication device. 24. The computer system as in claim 21, wherein the wireless network supports open authentication. 25. The computer system as in claim 21, wherein the communication indicates that the wireless network supports multiple secondary SSIDs, the multiple secondary SSIDs specifying identities of the multiple wireless sub-networks. 26. The computer system as in claim 21, wherein populating the communication with data includes: setting a bit in a data field of the communication to a predetermined state to indicate that the wireless network includes multiple wireless sub-networks. 27. The computer system as in claim 21, wherein populating the communication with data includes populating the communication with configuration information indicating identities of each of the multiple wireless sub-networks. 28. The computer system as in claim 21, wherein the computer processor hardware further performs operations of: receiving a probe request from the mobile communication device, the probe request including the primary identifier assigned to the wireless network and a secondary identifier specifying a selected one of the multiple available sub-networks; and in response to receiving the probe request: producing a probe response to include the primary identifier and the secondary identifier, and transmitting the probe response to the mobile communication device. 29. The computer system as in claim 28, wherein producing the probe response to include the primary identifier and the secondary identifier further comprises: populating data fields of the probe response with the primary identifier and the secondary identifier. 30. The computer system as in claim 21, wherein the wireless signal is a broadcast signal. 31. The computer system as in claim 21, wherein the computer processor hardware further performs operations of: establishing a communication session between the mobile communication device and the wireless access point over a selected sub-network specified by a secondary identifier received from the mobile communication device; receiving communications from the mobile communication over the selected wireless sub-network from the mobile communication device, the received communications including the primary identifier and secondary identifier; mapping the secondary identifier in the received communications to a VLAN (Virtual Local Area Network) associated with the selected sub-network; and transmitting the received communications over the VLAN. 32. Computer-readable storage hardware having instructions stored thereon, the instructions, when carried out by computer processor hardware, causes the computer processor hardware to perform operations of: generating a communication to indicate a primary identifier assigned to a wireless network supported by a wireless access point; populating the communication with data indicating that the wireless network includes multiple available wireless sub-networks; and transmitting the communication as a wireless signal from the wireless access point to a mobile communication device.
A communication resource generates a communication to indicate a primary identifier assigned to a wireless network. Additionally, the communication resource populates the communication with data indicating that the wireless network includes multiple available wireless sub-networks. The communication resource broadcasts the communication as a wireless signal in an airspace. A mobile communication device receives the broadcasted wireless signal. The mobile communication device processes the received wireless signal to learn of a primary identifier assigned to the available wireless network. The mobile communication device further processes the data received in the wireless communication to learn of secondary identifiers (which may require retrieval or be located in the received communication) specifying the different wireless sub-networks that are available. Via selection of one of the secondary identifiers, the user or mobile communication device selects a corresponding one of the multiple available wireless sub-networks to establish a wireless communication link.1. A method comprising: generating a communication to indicate a primary identifier assigned to a wireless network supported by a wireless access point; populating the communication with data indicating that the wireless network includes multiple available wireless sub-networks; and transmitting the communication as a wireless signal from the wireless access point to a mobile communication device. 2. The method as in claim 1 further comprising: receiving a request from the mobile communication device for configuration information indicating identities of the multiple wireless sub-networks; and in response to receiving the request, transmitting the configuration information to the mobile communication device, the configuration information indicating the identities of the multiple wireless sub-networks. 3. The method as in claim 2, wherein transmitting the configuration information further comprises: transmitting the configuration information in a unicast message to the mobile communication device. 4. The method as in claim 1, wherein the wireless network supports open authentication. 5. The method as in claim 1, wherein the communication indicates that the wireless network supports multiple secondary SSIDs, the multiple secondary SSIDs specifying identities, security policy information and traffic policy information of the multiple wireless sub-networks. 6. The method as in claim 1, wherein populating the communication with data includes: setting a bit in a data field of the communication to a predetermined state to indicate that the wireless network includes multiple wireless sub-networks. 7. The method as in claim 1, wherein populating the communication with data includes populating the communication with configuration information indicating identities of each of the multiple wireless sub-networks. 8. The method as in claim 1 further comprising: receiving a probe request from the mobile communication device, the probe request including the primary identifier assigned to the wireless network and a secondary identifier specifying a selected one of the multiple available sub-networks; and in response to receiving the probe request: producing a probe response to include the primary identifier and the secondary identifier, and transmitting the probe response to the mobile communication device. 9. The method as in claim 8, wherein producing the probe response to include the primary identifier and the secondary identifier further comprises: populating data fields of the probe response with the primary identifier and the secondary identifier. 10. The method as in claim 1 further comprising: establishing a communication session between the mobile communication device and the wireless access point over a selected sub-network specified by a secondary identifier received from the mobile communication device; receiving communications from the mobile communication over the selected wireless sub-network from the mobile communication device, the received communications including the primary identifier and secondary identifier; mapping the secondary identifier in the received communications to a VLAN (Virtual Local Area Network) associated with the selected sub-network; and transmitting the received communications over the VLAN. 11. A method comprising: receiving a wireless communication from a wireless access point, the wireless communication including a primary identifier assigned to a wireless network supported by the wireless access point; processing data received in the wireless communication, the data indicating that the wireless network includes multiple available wireless sub-networks; and selecting amongst the multiple available wireless sub-networks to communicate with the wireless access point. 12. The method as in claim 1, wherein selecting amongst the multiple available wireless sub-networks includes: transmitting a request from the mobile communication device to the wireless access point for configuration information indicating identities of the multiple available wireless sub-networks; and in response to transmitting the request, receiving the configuration information at the mobile communication device, the configuration information indicating the identities of the multiple available wireless sub-networks. 13. The method as in claim 12, wherein receiving the configuration information further comprises: receiving the configuration information in a unicast message transmitted from the wireless access point to the mobile communication device. 14. The method as in claim 11, wherein the wireless network supports open authentication. 15. The method as in claim 11, wherein the wireless communication received from the wireless access point indicates that the wireless network supports multiple secondary SSIDs, the multiple secondary SSIDs specifying identities of the multiple available wireless sub-networks. 16. The method as in claim 11, wherein processing the data received in the wireless communication further comprises: detecting that a data field of the wireless communication is set to a predetermined state, indicating that the wireless network includes multiple available wireless sub-networks. 17. The method as in claim 11 further comprising: processing configuration information in the received wireless communication to identify identities of each of the multiple wireless sub-networks. 18. The method as in claim 11 further comprising: transmitting a probe request from the mobile communication device to the wireless access point, the probe request including the primary identifier assigned to the wireless network and a secondary identifier specifying a selected one of the multiple available sub-networks; and in response to transmitting the probe request: receiving a probe response including the primary identifier and the secondary identifier. 19. The method as in claim 1, wherein the wireless signal is a broadcast signal. 20. The method as in claim 1, wherein the wireless signal is a broadcasted beacon signal. 21. A computer system comprising: computer processor hardware; and a hardware storage resource coupled to the computer processor hardware, the hardware storage resource storing instructions that, when executed by the computer processor hardware, causes the computer processor hardware to perform operations of: generating a communication to indicate a primary identifier assigned to a wireless network supported by a wireless access point; populating the communication with data indicating that the wireless network includes multiple available wireless sub-networks; and transmitting the communication as a wireless signal from the wireless access point to a mobile communication device. 22. The computer system as in claim 21, wherein the computer processor hardware further performs operations of: receiving a request from the mobile communication device for configuration information indicating identities of the multiple wireless sub-networks; and in response to receiving the request, transmitting the configuration information to the mobile communication device, the configuration information indicating the identities of the multiple wireless sub-networks. 23. The computer system as in claim 22, wherein the computer processor hardware further performs operations of: transmitting the configuration information in a unicast message to the mobile communication device. 24. The computer system as in claim 21, wherein the wireless network supports open authentication. 25. The computer system as in claim 21, wherein the communication indicates that the wireless network supports multiple secondary SSIDs, the multiple secondary SSIDs specifying identities of the multiple wireless sub-networks. 26. The computer system as in claim 21, wherein populating the communication with data includes: setting a bit in a data field of the communication to a predetermined state to indicate that the wireless network includes multiple wireless sub-networks. 27. The computer system as in claim 21, wherein populating the communication with data includes populating the communication with configuration information indicating identities of each of the multiple wireless sub-networks. 28. The computer system as in claim 21, wherein the computer processor hardware further performs operations of: receiving a probe request from the mobile communication device, the probe request including the primary identifier assigned to the wireless network and a secondary identifier specifying a selected one of the multiple available sub-networks; and in response to receiving the probe request: producing a probe response to include the primary identifier and the secondary identifier, and transmitting the probe response to the mobile communication device. 29. The computer system as in claim 28, wherein producing the probe response to include the primary identifier and the secondary identifier further comprises: populating data fields of the probe response with the primary identifier and the secondary identifier. 30. The computer system as in claim 21, wherein the wireless signal is a broadcast signal. 31. The computer system as in claim 21, wherein the computer processor hardware further performs operations of: establishing a communication session between the mobile communication device and the wireless access point over a selected sub-network specified by a secondary identifier received from the mobile communication device; receiving communications from the mobile communication over the selected wireless sub-network from the mobile communication device, the received communications including the primary identifier and secondary identifier; mapping the secondary identifier in the received communications to a VLAN (Virtual Local Area Network) associated with the selected sub-network; and transmitting the received communications over the VLAN. 32. Computer-readable storage hardware having instructions stored thereon, the instructions, when carried out by computer processor hardware, causes the computer processor hardware to perform operations of: generating a communication to indicate a primary identifier assigned to a wireless network supported by a wireless access point; populating the communication with data indicating that the wireless network includes multiple available wireless sub-networks; and transmitting the communication as a wireless signal from the wireless access point to a mobile communication device.
2,400
7,312
7,312
14,987,111
2,422
An optical system includes a central portion having a magnification per unit angle of view which increases from a center to an outside at an increase rate and a circumferential portion being outside the central portion and having a magnification per unit of view which increases from the central portion to an outside at an increase rate smaller than the increase rate of the central portion.
1. (canceled) 2. An optical system, comprising: a plurality of lenses, wherein: a first area of an angle of view of the optical system, which is an area where a subject image incident on each of the lenses is not overlapped, includes a magnification per unit angle of view which increases with an angle of view, a second area of an angle of view which is outside the first area includes a magnification per unit angle of view which changes with the angle of view with a rate of increase of the magnification per unit angle of view being reduced as the angle of view increases, and the second area is an area where images, from two lenses of the plurality of lenses, overlap each other. 3. The optical system according to claim 2, wherein: the two lenses face away from each other and receive light from opposite sides of the optical system. 4. An imaging device, comprising: the optical system according to claim 2, wherein the imaging device images an imaging target of a solid angle of 4π radian using the optical system according to claim 2.
An optical system includes a central portion having a magnification per unit angle of view which increases from a center to an outside at an increase rate and a circumferential portion being outside the central portion and having a magnification per unit of view which increases from the central portion to an outside at an increase rate smaller than the increase rate of the central portion.1. (canceled) 2. An optical system, comprising: a plurality of lenses, wherein: a first area of an angle of view of the optical system, which is an area where a subject image incident on each of the lenses is not overlapped, includes a magnification per unit angle of view which increases with an angle of view, a second area of an angle of view which is outside the first area includes a magnification per unit angle of view which changes with the angle of view with a rate of increase of the magnification per unit angle of view being reduced as the angle of view increases, and the second area is an area where images, from two lenses of the plurality of lenses, overlap each other. 3. The optical system according to claim 2, wherein: the two lenses face away from each other and receive light from opposite sides of the optical system. 4. An imaging device, comprising: the optical system according to claim 2, wherein the imaging device images an imaging target of a solid angle of 4π radian using the optical system according to claim 2.
2,400
7,313
7,313
14,285,131
2,485
Methods and systems for providing content are disclosed. An example method can comprise receiving an encoding parameter associated with a first content transmission. The encoding parameter can indicate a level of complexity to encode the first content transmission. The method can comprise selecting, based on the encoding parameter, a second content transmission. The second content transmission can be encoded at a second bit rate that is different than a first bit rate of the first content transmission. The method can also comprise generating a third content transmission. The third content transmission can comprise the second content transmission.
1. A method, comprising: receiving an encoding parameter associated with a first content transmission, wherein the encoding parameter indicates a level of complexity to encode the first content transmission; selecting, based on the encoding parameter, a second content transmission, wherein the second content transmission is encoded at a second bit rate that is different than a first bit rate of the first content transmission; and generating a third content transmission, wherein the third content transmission comprises the second content transmission. 2. The method of claim 1, wherein selecting, based on the encoding parameter, the second content transmission comprises selecting the second content transmission to adjust bandwidth allocation within the third content transmission for at least one of the first content transmission and a fourth content transmission. 3. The method of claim 1, wherein the first content transmission is a source transmission encoded at the first bit rate and the second content transmission is the source transmission encoded at the second bit rate, and wherein the first content transmission and the second content transmission are configured as content transmissions of an adaptive bit rate transmission. 4. The method of claim 1, wherein receiving the encoding parameter associated with the first content transmission comprises receiving the encoding parameter in at least one of a metadata field of the first content transmission and a data transmission separate from the first content transmission. 5. The method of claim 4, wherein the metadata field of the first content transmission is a private adaptation field of the first content transmission. 6. The method of claim 1, wherein receiving the encoding parameter associated with the first content transmission comprises receiving at least one of an encoding quantization level, a predictive flame error, a relative size of an inter-coded frame with respect to an intra-coded frame, a number of motion vectors to encode a frame, and a quantizing step size. 7. The method of claim 1, further comprising comparing the encoding parameter to a previous encoding parameter indicative of a level of complexity to encode the first content transmission at a previous time, and wherein selecting, based on the encoding parameter, the second content transmission is based on a difference between the encoding parameter and the previous encoding parameter. 8. The method of claim 1, wherein the encoding parameter comprises a value indicating at least one of a low complexity to encode, a medium complexity to encode, and a high complexity to encode. 9. The method of claim 1, wherein the third content transmission also comprises the first content transmission, and wherein the first content transmission comprises first content and the second content transmission comprises second content, and wherein the first content transmission is associated with a first bandwidth priority and the second content transmission is associated with a second bandwidth priority. 10. A method, comprising: determining an encoding parameter indicative of a level of complexity to encode a first content transmission; providing the encoding parameter to a device; and receiving a request from the device for a second content transmission based on the encoding parameter, wherein the second content transmission is encoded at a second bit rate that is different than a first bit rate of the first content transmission. 11. The method of claim 10, wherein the device is a statistical multiplexer configured to request the second content transmission to adjust bandwidth allocation within a third content transmission for at least one of the first content transmission and a fourth content transmission. 12. The method of claim 10, further comprising encoding a source transmission at a plurality of bit rates, and wherein the first content transmission comprises the source transmission encoded at one of the plurality of bit rates and the second content transmission comprises the source transmission encoded at another of the plurality of bit rates. 13. The method of claim 10, wherein providing the encoding parameter to the device comprises providing the encoding parameter in at least one of a metadata field of the first content transmission and a data transmission separate from the first content transmission. 14. The method of claim 13, wherein the metadata field of the first content transmission is a private adaptation field of the first content transmission. 15. The method of claim 10, wherein determining an encoding parameter comprises determining at least one of an encoding quantization level, a predictive frame error, a relative size of an inter-coded frame with respect to an intra-coded frame, a number of motion vectors to encode a frame, and a quantizing step size. 16. The method of claim 10, wherein the device is configured to compare the encoding parameter to a previous encoding parameter indicative of a level of complexity to encode the first content transmission at a previous time, and wherein the request from the device for the second content transmission is based on a difference between the encoding parameter and the previous encoding parameter. 17. The method of claim 10, wherein the encoding parameter comprises a value indicating at least one of a low complexity to encode, a medium complexity to encode, and a high complexity to encode. 18. The method of claim 10, wherein the device is configured to generate a third content transmission comprising the first content transmission and the second content transmission, wherein the first content transmission comprises first content and the second content transmission comprises second content, and wherein the first content transmission is associated with a first bandwidth priority and the second content transmission is associated with a second bandwidth priority. 19. A system, comprising: an encoder configured to, encode a plurality of content transmissions, determine an encoding parameter indicative of a level of complexity to encode a content transmission of the plurality of content transmissions; and a device configured to, receive the encoding parameter from the encoder, select, based on the encoding parameter, at least one of the plurality of content transmissions, and provide the selected at least one of the plurality of content transmissions in a multiplexed content transmission. 20. The system of claim 19, wherein the device is configured to select the at least one of the plurality of content transmission to adjust bandwidth allocation within the multiplexed content transmission for at least one of the content transmissions of the plurality of content transmissions and an additional content transmission of the plurality of content transmissions.
Methods and systems for providing content are disclosed. An example method can comprise receiving an encoding parameter associated with a first content transmission. The encoding parameter can indicate a level of complexity to encode the first content transmission. The method can comprise selecting, based on the encoding parameter, a second content transmission. The second content transmission can be encoded at a second bit rate that is different than a first bit rate of the first content transmission. The method can also comprise generating a third content transmission. The third content transmission can comprise the second content transmission.1. A method, comprising: receiving an encoding parameter associated with a first content transmission, wherein the encoding parameter indicates a level of complexity to encode the first content transmission; selecting, based on the encoding parameter, a second content transmission, wherein the second content transmission is encoded at a second bit rate that is different than a first bit rate of the first content transmission; and generating a third content transmission, wherein the third content transmission comprises the second content transmission. 2. The method of claim 1, wherein selecting, based on the encoding parameter, the second content transmission comprises selecting the second content transmission to adjust bandwidth allocation within the third content transmission for at least one of the first content transmission and a fourth content transmission. 3. The method of claim 1, wherein the first content transmission is a source transmission encoded at the first bit rate and the second content transmission is the source transmission encoded at the second bit rate, and wherein the first content transmission and the second content transmission are configured as content transmissions of an adaptive bit rate transmission. 4. The method of claim 1, wherein receiving the encoding parameter associated with the first content transmission comprises receiving the encoding parameter in at least one of a metadata field of the first content transmission and a data transmission separate from the first content transmission. 5. The method of claim 4, wherein the metadata field of the first content transmission is a private adaptation field of the first content transmission. 6. The method of claim 1, wherein receiving the encoding parameter associated with the first content transmission comprises receiving at least one of an encoding quantization level, a predictive flame error, a relative size of an inter-coded frame with respect to an intra-coded frame, a number of motion vectors to encode a frame, and a quantizing step size. 7. The method of claim 1, further comprising comparing the encoding parameter to a previous encoding parameter indicative of a level of complexity to encode the first content transmission at a previous time, and wherein selecting, based on the encoding parameter, the second content transmission is based on a difference between the encoding parameter and the previous encoding parameter. 8. The method of claim 1, wherein the encoding parameter comprises a value indicating at least one of a low complexity to encode, a medium complexity to encode, and a high complexity to encode. 9. The method of claim 1, wherein the third content transmission also comprises the first content transmission, and wherein the first content transmission comprises first content and the second content transmission comprises second content, and wherein the first content transmission is associated with a first bandwidth priority and the second content transmission is associated with a second bandwidth priority. 10. A method, comprising: determining an encoding parameter indicative of a level of complexity to encode a first content transmission; providing the encoding parameter to a device; and receiving a request from the device for a second content transmission based on the encoding parameter, wherein the second content transmission is encoded at a second bit rate that is different than a first bit rate of the first content transmission. 11. The method of claim 10, wherein the device is a statistical multiplexer configured to request the second content transmission to adjust bandwidth allocation within a third content transmission for at least one of the first content transmission and a fourth content transmission. 12. The method of claim 10, further comprising encoding a source transmission at a plurality of bit rates, and wherein the first content transmission comprises the source transmission encoded at one of the plurality of bit rates and the second content transmission comprises the source transmission encoded at another of the plurality of bit rates. 13. The method of claim 10, wherein providing the encoding parameter to the device comprises providing the encoding parameter in at least one of a metadata field of the first content transmission and a data transmission separate from the first content transmission. 14. The method of claim 13, wherein the metadata field of the first content transmission is a private adaptation field of the first content transmission. 15. The method of claim 10, wherein determining an encoding parameter comprises determining at least one of an encoding quantization level, a predictive frame error, a relative size of an inter-coded frame with respect to an intra-coded frame, a number of motion vectors to encode a frame, and a quantizing step size. 16. The method of claim 10, wherein the device is configured to compare the encoding parameter to a previous encoding parameter indicative of a level of complexity to encode the first content transmission at a previous time, and wherein the request from the device for the second content transmission is based on a difference between the encoding parameter and the previous encoding parameter. 17. The method of claim 10, wherein the encoding parameter comprises a value indicating at least one of a low complexity to encode, a medium complexity to encode, and a high complexity to encode. 18. The method of claim 10, wherein the device is configured to generate a third content transmission comprising the first content transmission and the second content transmission, wherein the first content transmission comprises first content and the second content transmission comprises second content, and wherein the first content transmission is associated with a first bandwidth priority and the second content transmission is associated with a second bandwidth priority. 19. A system, comprising: an encoder configured to, encode a plurality of content transmissions, determine an encoding parameter indicative of a level of complexity to encode a content transmission of the plurality of content transmissions; and a device configured to, receive the encoding parameter from the encoder, select, based on the encoding parameter, at least one of the plurality of content transmissions, and provide the selected at least one of the plurality of content transmissions in a multiplexed content transmission. 20. The system of claim 19, wherein the device is configured to select the at least one of the plurality of content transmission to adjust bandwidth allocation within the multiplexed content transmission for at least one of the content transmissions of the plurality of content transmissions and an additional content transmission of the plurality of content transmissions.
2,400
7,314
7,314
13,630,038
2,446
Methods and systems for providing media contention controls at a virtual desktop infrastructure (VDI) device are provided. More particularly, a VDI desktop media controller (DMC) application is provided. The VDI DMC application is executed by the VDI client device. Accordingly, the VDI DMC application provides local control of media. In addition, the VDI DMC application can provide for local control of multiple media streams received simultaneously.
1. A method for controlling media in connection with a virtualized device, comprising: providing a first endpoint, wherein the first endpoint is a virtual desktop infrastructure (VDI) client device; providing a media controller application that is executed on the first VDI client device; receiving at the first VDI client device a first media stream, wherein the first media stream is provided from a VDI server in association with virtualized operations executed by the VDI server on behalf of the first VDI client device; receiving at the first VDI client device a second media stream, wherein the second media stream is provided from a second endpoint in association with a communication session including the VDI client device and the second endpoint, and wherein at least portions of the first and second media streams are received at the same time; applying the media controller application to control handling of the first media stream and the second media stream. 2. The method of claim 1, wherein applying the media controller application to control handling of the first media stream and the second media stream includes at least one of: controlling a volume, muting, storing, jitter, echo cancellation. 3. The method of claim 1, wherein the first and second media streams are merged at the media controller application. 4. The method of claim 3, wherein the first media stream is formatted according to a proprietary protocol, and wherein the second media stream is formatted according to a real-time transport protocol (RTP). 5. The method of claim 3, wherein the first media stream is managed by the VDI server. 6. The method of claim 5, wherein the media controller application generates a window displayed to a user by the VDI client, wherein the window provides a user interface for controlling the first and second media streams. 7. The method of claim 6, further comprising: providing a softphone application that is executed by the first client; providing a control link between the media controller application and the softphone application, wherein the softphone application receives the second media stream and passes the second media stream to the media controller application. 8. The method of claim 7, further comprising: providing a VDI communicator application that is executed by the first VDI client device; providing a control link between the media controller application and the VDI communicator application, wherein the VDI communicator application receives the first media stream and passes the first media stream to the media controller application. 9. The method of claim 8, further comprising: using the media controller application, controlling at least one of: operation of the softphone application; operation of the VDI communicator application; output of the first media stream through an output device of the first VDI client device; output of the second media stream through the output device of the first VDI client device. 10. The method of claim 8, further comprising: using the media controller application, routing at least one of the first and second media streams to a selected device associated with the VDI client device, wherein the associated device is part of a personal trust circle for a user of the first VDI client device. 11. The method of claim 8, further comprising: receiving from a user of the first VDI client device first sign-on and authentication credentials, wherein the first sign-on and authentication credentials log the first user on to the VDI client device, the media controller application, the softphone, and the VDI communicator application. 12. The method of claim 1, wherein the first and second media streams are virtual private network (VPN) streams, wherein the VDI client device includes a first VPN client associated with the first media stream, wherein the VDI client device includes a second VPN client associated with the second media stream, and wherein the media controller application operates as a local VPN manager. 13. The method of claim 1, wherein the first media stream includes a video stream, wherein the first media stream is provided to a VDI communicator application, wherein the VDI communicator application merges the first media stream with the second media stream. 14. The method of claim 1, wherein the first VDI client device is integrated into a headset. 15. The method of claim 1, wherein the media controller application includes a TTY (teletype) function, wherein a first media stream converted by the TTY function is merged with the second media stream. 16. A system, comprising: a virtual desktop infrastructure (VDI) client device, including: a display; a speaker; memory; a processor; application programming stored in the memory and executed by the processor, the application programming including: a unified communications application, wherein the unified communications application is operable to receive a first media stream directed to the VDI client device from a communication endpoint in communication with the VDI client device; a virtual desktop infrastructure (VDI) receiver application, wherein the VDI receiver application is operable to receive at least one of a second media stream and data from a VDI server in communication with the VDI client device; a desktop media controller (DMC) application, wherein the DMC application is operable to receive the first media stream from the unified communications application, to receive the at least one of the second media and the data from the VDI server, and to control the output of the first media stream and the at least one of the second media stream and the data from the VDI server by at least one of the speaker and the display. 17. The system of claim 16, further comprising: a first communication endpoint in communication with the VDI client device, wherein the first communication endpoint provides the first media stream to the unified communications application; a first VDI server, wherein the first VDI server provides the second media stream to the VDI receiver application, wherein the DMC application, in response to user input, controls an output of an audio component of the first media stream and an audio component of the second media stream by the speaker. 18. A computer readable medium having stored thereon computer-executable instructions, the computer executable instructions causing a processor to execute a method for performing media contention on a virtual desktop infrastructure (VDI) client device, the computer readable instructions comprising: instructions to communicate with a first communication endpoint using a first media stream; instructions to communicate with a VDI server using a second media stream; instructions to provide unified control of the first and second media streams, wherein an output of at least one of the first and second media streams is controlled. 19. The computer readable medium of claim 18, wherein the instructions to communicate with a first communication endpoint are included as part of a unified communications application, wherein the instructions to communicate with a VDI server are included as part of a VDI receiver application, and wherein the instructions to provide unified control of the first and second media streams are included as part of a VDI desktop media controller application. 20. The computer readable medium of claim 19, wherein the first media stream is a real-time protocol media stream, and wherein the second media stream is a proprietary media stream.
Methods and systems for providing media contention controls at a virtual desktop infrastructure (VDI) device are provided. More particularly, a VDI desktop media controller (DMC) application is provided. The VDI DMC application is executed by the VDI client device. Accordingly, the VDI DMC application provides local control of media. In addition, the VDI DMC application can provide for local control of multiple media streams received simultaneously.1. A method for controlling media in connection with a virtualized device, comprising: providing a first endpoint, wherein the first endpoint is a virtual desktop infrastructure (VDI) client device; providing a media controller application that is executed on the first VDI client device; receiving at the first VDI client device a first media stream, wherein the first media stream is provided from a VDI server in association with virtualized operations executed by the VDI server on behalf of the first VDI client device; receiving at the first VDI client device a second media stream, wherein the second media stream is provided from a second endpoint in association with a communication session including the VDI client device and the second endpoint, and wherein at least portions of the first and second media streams are received at the same time; applying the media controller application to control handling of the first media stream and the second media stream. 2. The method of claim 1, wherein applying the media controller application to control handling of the first media stream and the second media stream includes at least one of: controlling a volume, muting, storing, jitter, echo cancellation. 3. The method of claim 1, wherein the first and second media streams are merged at the media controller application. 4. The method of claim 3, wherein the first media stream is formatted according to a proprietary protocol, and wherein the second media stream is formatted according to a real-time transport protocol (RTP). 5. The method of claim 3, wherein the first media stream is managed by the VDI server. 6. The method of claim 5, wherein the media controller application generates a window displayed to a user by the VDI client, wherein the window provides a user interface for controlling the first and second media streams. 7. The method of claim 6, further comprising: providing a softphone application that is executed by the first client; providing a control link between the media controller application and the softphone application, wherein the softphone application receives the second media stream and passes the second media stream to the media controller application. 8. The method of claim 7, further comprising: providing a VDI communicator application that is executed by the first VDI client device; providing a control link between the media controller application and the VDI communicator application, wherein the VDI communicator application receives the first media stream and passes the first media stream to the media controller application. 9. The method of claim 8, further comprising: using the media controller application, controlling at least one of: operation of the softphone application; operation of the VDI communicator application; output of the first media stream through an output device of the first VDI client device; output of the second media stream through the output device of the first VDI client device. 10. The method of claim 8, further comprising: using the media controller application, routing at least one of the first and second media streams to a selected device associated with the VDI client device, wherein the associated device is part of a personal trust circle for a user of the first VDI client device. 11. The method of claim 8, further comprising: receiving from a user of the first VDI client device first sign-on and authentication credentials, wherein the first sign-on and authentication credentials log the first user on to the VDI client device, the media controller application, the softphone, and the VDI communicator application. 12. The method of claim 1, wherein the first and second media streams are virtual private network (VPN) streams, wherein the VDI client device includes a first VPN client associated with the first media stream, wherein the VDI client device includes a second VPN client associated with the second media stream, and wherein the media controller application operates as a local VPN manager. 13. The method of claim 1, wherein the first media stream includes a video stream, wherein the first media stream is provided to a VDI communicator application, wherein the VDI communicator application merges the first media stream with the second media stream. 14. The method of claim 1, wherein the first VDI client device is integrated into a headset. 15. The method of claim 1, wherein the media controller application includes a TTY (teletype) function, wherein a first media stream converted by the TTY function is merged with the second media stream. 16. A system, comprising: a virtual desktop infrastructure (VDI) client device, including: a display; a speaker; memory; a processor; application programming stored in the memory and executed by the processor, the application programming including: a unified communications application, wherein the unified communications application is operable to receive a first media stream directed to the VDI client device from a communication endpoint in communication with the VDI client device; a virtual desktop infrastructure (VDI) receiver application, wherein the VDI receiver application is operable to receive at least one of a second media stream and data from a VDI server in communication with the VDI client device; a desktop media controller (DMC) application, wherein the DMC application is operable to receive the first media stream from the unified communications application, to receive the at least one of the second media and the data from the VDI server, and to control the output of the first media stream and the at least one of the second media stream and the data from the VDI server by at least one of the speaker and the display. 17. The system of claim 16, further comprising: a first communication endpoint in communication with the VDI client device, wherein the first communication endpoint provides the first media stream to the unified communications application; a first VDI server, wherein the first VDI server provides the second media stream to the VDI receiver application, wherein the DMC application, in response to user input, controls an output of an audio component of the first media stream and an audio component of the second media stream by the speaker. 18. A computer readable medium having stored thereon computer-executable instructions, the computer executable instructions causing a processor to execute a method for performing media contention on a virtual desktop infrastructure (VDI) client device, the computer readable instructions comprising: instructions to communicate with a first communication endpoint using a first media stream; instructions to communicate with a VDI server using a second media stream; instructions to provide unified control of the first and second media streams, wherein an output of at least one of the first and second media streams is controlled. 19. The computer readable medium of claim 18, wherein the instructions to communicate with a first communication endpoint are included as part of a unified communications application, wherein the instructions to communicate with a VDI server are included as part of a VDI receiver application, and wherein the instructions to provide unified control of the first and second media streams are included as part of a VDI desktop media controller application. 20. The computer readable medium of claim 19, wherein the first media stream is a real-time protocol media stream, and wherein the second media stream is a proprietary media stream.
2,400
7,315
7,315
14,095,438
2,454
Embodiments of the invention provide a method, system and apparatus for centralized session management in an aggregated application environment. In one embodiment, a centralized session management method can include aggregating a set of applications in a host aggregation environment. Subsequently, each of the applications can be centrally kept alive so as to avoid a time out condition in any one of the applications so long as interactivity is detected within any one of the applications or within the host aggregation environment. In one aspect of the invention, the aggregating step can include aggregating a set of portlets in a portal environment.
1-18. (canceled) 19. A computer-implemented method performed by a server, comprising: aggregating a set of applications in a host aggregation environment; monitoring for interactivity within the applications; separately monitoring for interactivity within the host aggregation environment; and centrally keeping alive, upon a detection of interactivity within any one of the applications or the host aggregation environment, all of the applications. 20. The method of claim 19, wherein the centrally keeping alive includes forwarding a keep alive directive to at least one of the applications. 21. The method of claim 20, wherein the keep-alive directive is forwarded to individual agents respectively corresponding to individual ones of the applications. 22. The method of claim 19, wherein the centrally keeping alive avoids a time out condition within all of the applications. 23. The method of claim 19, wherein the set of applications are a set of portlets, and the host aggregation environment is a portal environment. 24. The method of claim 19, wherein the detection includes receipt of a notification of interactivity from an agent corresponding to an application in which interactivity is detected. 25. A server, comprising: at least one processor, wherein the at least one processor is configured to initiate and/or perform: aggregating a set of applications in a host aggregation environment; monitoring for interactivity within the applications; separately monitoring for interactivity within the host aggregation environment; and centrally keeping alive, upon a detection of interactivity within any one of the applications or the host aggregation environment, all of the applications. 26. The server of claim 25, wherein the centrally keeping alive includes forwarding a keep alive directive to at least one of the applications. 27. The server of claim 26, wherein the keep-alive directive is forwarded to individual agents respectively corresponding to individual ones of the applications. 28. The server of claim 25, wherein the centrally keeping alive avoids a time out condition within all of the applications. 29. The server of claim 25, wherein the set of applications are a set of portlets, and the host aggregation environment is a portal environment. 30. The server of claim 25, wherein the detection includes receipt of a notification of interactivity from an agent corresponding to an application in which interactivity is detected. 31. A computer program product, comprising: a computer usable storage device having stored therein computer usable program code, which when executed by a computer hardware device, causes the computer hardware device to perform: aggregating a set of applications in a host aggregation environment; monitoring for interactivity within the applications; separately monitoring for interactivity within the host aggregation environment; and centrally keeping alive, upon a detection of interactivity within any one of the applications or the host aggregation environment, all of the applications. 32. The computer program product of claim 31, wherein the centrally keeping alive includes forwarding a keep alive directive to at least one of the applications. 33. The computer program product of claim 32, wherein the keep-alive directive is forwarded to individual agents respectively corresponding to individual ones of the applications. 34. The computer program product of claim 31, wherein the centrally keeping alive avoids a time out condition within all of the applications. 35. The computer program product of claim 31, wherein the set of applications are a set of portlets, and the host aggregation environment is a portal environment. 36. The computer program product of claim 31, wherein the detection includes receipt of a notification of interactivity from an agent corresponding to an application in which interactivity is detected.
Embodiments of the invention provide a method, system and apparatus for centralized session management in an aggregated application environment. In one embodiment, a centralized session management method can include aggregating a set of applications in a host aggregation environment. Subsequently, each of the applications can be centrally kept alive so as to avoid a time out condition in any one of the applications so long as interactivity is detected within any one of the applications or within the host aggregation environment. In one aspect of the invention, the aggregating step can include aggregating a set of portlets in a portal environment.1-18. (canceled) 19. A computer-implemented method performed by a server, comprising: aggregating a set of applications in a host aggregation environment; monitoring for interactivity within the applications; separately monitoring for interactivity within the host aggregation environment; and centrally keeping alive, upon a detection of interactivity within any one of the applications or the host aggregation environment, all of the applications. 20. The method of claim 19, wherein the centrally keeping alive includes forwarding a keep alive directive to at least one of the applications. 21. The method of claim 20, wherein the keep-alive directive is forwarded to individual agents respectively corresponding to individual ones of the applications. 22. The method of claim 19, wherein the centrally keeping alive avoids a time out condition within all of the applications. 23. The method of claim 19, wherein the set of applications are a set of portlets, and the host aggregation environment is a portal environment. 24. The method of claim 19, wherein the detection includes receipt of a notification of interactivity from an agent corresponding to an application in which interactivity is detected. 25. A server, comprising: at least one processor, wherein the at least one processor is configured to initiate and/or perform: aggregating a set of applications in a host aggregation environment; monitoring for interactivity within the applications; separately monitoring for interactivity within the host aggregation environment; and centrally keeping alive, upon a detection of interactivity within any one of the applications or the host aggregation environment, all of the applications. 26. The server of claim 25, wherein the centrally keeping alive includes forwarding a keep alive directive to at least one of the applications. 27. The server of claim 26, wherein the keep-alive directive is forwarded to individual agents respectively corresponding to individual ones of the applications. 28. The server of claim 25, wherein the centrally keeping alive avoids a time out condition within all of the applications. 29. The server of claim 25, wherein the set of applications are a set of portlets, and the host aggregation environment is a portal environment. 30. The server of claim 25, wherein the detection includes receipt of a notification of interactivity from an agent corresponding to an application in which interactivity is detected. 31. A computer program product, comprising: a computer usable storage device having stored therein computer usable program code, which when executed by a computer hardware device, causes the computer hardware device to perform: aggregating a set of applications in a host aggregation environment; monitoring for interactivity within the applications; separately monitoring for interactivity within the host aggregation environment; and centrally keeping alive, upon a detection of interactivity within any one of the applications or the host aggregation environment, all of the applications. 32. The computer program product of claim 31, wherein the centrally keeping alive includes forwarding a keep alive directive to at least one of the applications. 33. The computer program product of claim 32, wherein the keep-alive directive is forwarded to individual agents respectively corresponding to individual ones of the applications. 34. The computer program product of claim 31, wherein the centrally keeping alive avoids a time out condition within all of the applications. 35. The computer program product of claim 31, wherein the set of applications are a set of portlets, and the host aggregation environment is a portal environment. 36. The computer program product of claim 31, wherein the detection includes receipt of a notification of interactivity from an agent corresponding to an application in which interactivity is detected.
2,400
7,316
7,316
14,262,034
2,472
A method and an apparatus are provided for receiving a scheduling request in a mobile communication system. Information related to Scheduling Request (SR) transmission resources is transmitted to a User Equipment (UE). An SR is received from the UE. For the received SR, the UE checks whether at least one Buffer Status Report (BSR) is triggered and canceled, and the SR is received if the at least one BSR is triggered and not canceled
1. A method for receiving a scheduling request in a mobile communication system, the method comprising: transmitting information related to Scheduling Request (SR) transmission resources to a User Equipment (UE); and receiving an SR from the UE, wherein for the received SR, the UE checks whether at least one Buffer Status Report (BSR) is triggered and canceled, and the SR is received if the at least one BSR is triggered and not canceled. 2. The method of claim 1, wherein: the at least one BSR is a regular BSR; and the SR is received if the at least one regular BSR is triggered and not canceled. 3. The method of claim 1, further comprising receiving a Medium Access Control (MAC) Packet Data Unit (PDU) including the at least one BSR from the UE; wherein the SR is not received, if the MAC PDU is received. 4. The method of claim 2, wherein the regular BSR is triggered if data becomes available for uplink transmission with high priority. 5. The method of claim 1, wherein a random access process is initiated if a number of SR transmissions by the UE is equal to a maximum number of SR transmissions. 6. The method of claim 1, wherein the SR is not received, if a random access process is initiated before the SR is received. 7. The method of claim 1, wherein uplink transmission resources are released if a number of SR transmissions by the UE is equal to a maximum value. 8. The method of claim 7, wherein the number of SR transmissions by the UE is set to zero (0), if there is no other pending SR and the SR is triggered. 9. The method of claim 1, wherein whether the BSR is canceled is checked in every Transmission Time Interval (TTI). 10. An apparatus for receiving a scheduling request in a mobile communication system, the apparatus comprising: a transmitter configured to transmit information related to Scheduling Request (SR) transmission resources to a User Equipment (UE); and a receiver configured to receive an SR from the UE; wherein for the received SR, the UE checks whether at least one Buffer Status Report (BSR) is triggered and canceled, and the SR is received if the at least one BSR is triggered and not canceled. 11. The apparatus of claim 10, wherein the at least one BSR is a regular BSR, and the receiver receives the SR, if the regular BSR is triggered and not canceled. 12. The apparatus of claim 10, wherein the receiver receives a Medium Access Control (MAC) Packet Data Unit (PDU) including the at least one BSR from the UE, and does not receive the SR. 13. The apparatus of claim 11, wherein the regular BSR is triggered if data becomes available for uplink transmission with a high priority. 14. The apparatus of claim 10, wherein a random access process is started if a number of SR transmissions by the UE is equal to a maximum number of SR transmissions. 15. The apparatus of claim 10, wherein the receiver does not receive the SR, if a random access process is initiated before the SR is received. 16. The apparatus of claim 10, wherein uplink transmission resources are released if a number of SR transmissions by the UE is equal to a maximum value. 17. The apparatus of claim 16, wherein the number of SR transmissions by the UE is set to zero (0), if there is no other pending SR and the SR is triggered. 18. The apparatus of claim 10, wherein whether the BSR is canceled is checked in every Transmission Time Interval (TTI).
A method and an apparatus are provided for receiving a scheduling request in a mobile communication system. Information related to Scheduling Request (SR) transmission resources is transmitted to a User Equipment (UE). An SR is received from the UE. For the received SR, the UE checks whether at least one Buffer Status Report (BSR) is triggered and canceled, and the SR is received if the at least one BSR is triggered and not canceled1. A method for receiving a scheduling request in a mobile communication system, the method comprising: transmitting information related to Scheduling Request (SR) transmission resources to a User Equipment (UE); and receiving an SR from the UE, wherein for the received SR, the UE checks whether at least one Buffer Status Report (BSR) is triggered and canceled, and the SR is received if the at least one BSR is triggered and not canceled. 2. The method of claim 1, wherein: the at least one BSR is a regular BSR; and the SR is received if the at least one regular BSR is triggered and not canceled. 3. The method of claim 1, further comprising receiving a Medium Access Control (MAC) Packet Data Unit (PDU) including the at least one BSR from the UE; wherein the SR is not received, if the MAC PDU is received. 4. The method of claim 2, wherein the regular BSR is triggered if data becomes available for uplink transmission with high priority. 5. The method of claim 1, wherein a random access process is initiated if a number of SR transmissions by the UE is equal to a maximum number of SR transmissions. 6. The method of claim 1, wherein the SR is not received, if a random access process is initiated before the SR is received. 7. The method of claim 1, wherein uplink transmission resources are released if a number of SR transmissions by the UE is equal to a maximum value. 8. The method of claim 7, wherein the number of SR transmissions by the UE is set to zero (0), if there is no other pending SR and the SR is triggered. 9. The method of claim 1, wherein whether the BSR is canceled is checked in every Transmission Time Interval (TTI). 10. An apparatus for receiving a scheduling request in a mobile communication system, the apparatus comprising: a transmitter configured to transmit information related to Scheduling Request (SR) transmission resources to a User Equipment (UE); and a receiver configured to receive an SR from the UE; wherein for the received SR, the UE checks whether at least one Buffer Status Report (BSR) is triggered and canceled, and the SR is received if the at least one BSR is triggered and not canceled. 11. The apparatus of claim 10, wherein the at least one BSR is a regular BSR, and the receiver receives the SR, if the regular BSR is triggered and not canceled. 12. The apparatus of claim 10, wherein the receiver receives a Medium Access Control (MAC) Packet Data Unit (PDU) including the at least one BSR from the UE, and does not receive the SR. 13. The apparatus of claim 11, wherein the regular BSR is triggered if data becomes available for uplink transmission with a high priority. 14. The apparatus of claim 10, wherein a random access process is started if a number of SR transmissions by the UE is equal to a maximum number of SR transmissions. 15. The apparatus of claim 10, wherein the receiver does not receive the SR, if a random access process is initiated before the SR is received. 16. The apparatus of claim 10, wherein uplink transmission resources are released if a number of SR transmissions by the UE is equal to a maximum value. 17. The apparatus of claim 16, wherein the number of SR transmissions by the UE is set to zero (0), if there is no other pending SR and the SR is triggered. 18. The apparatus of claim 10, wherein whether the BSR is canceled is checked in every Transmission Time Interval (TTI).
2,400
7,317
7,317
13,944,642
2,488
A thermal imaging camera comprises an infrared lens assembly and associated IR sensor for detecting thermal images of a target scene, a processor, and at least one additional sensor. The at least one additional sensor is configured to provide measurement data to the processor, where it is compared to a predetermined requirement. If the measurement data satisfies the predetermined requirement, the camera will prompt the user via a display. During use, the camera can prompt the user to provide annotation data, conduct a thermographic inspection, inspect the target scene, or perform other tasks based on the measurement data.
1. A portable, hand-held thermal imaging camera comprising: an infrared (IR) lens assembly having an associated IR sensor for detecting thermal images of a target scene; a display; a processor; and at least one additional, non-IR sensor, the additional sensor configured to provide measurement data to the processor, the processor analyzing whether the measurement data satisfies a predetermined requirement and causing the camera to prompt the user via the display in response to the measurement data when the measurement data satisfies the predetermined requirement. 2. The camera of claim 1, wherein the at least one additional sensor is external to the camera. 3. The camera of claim 2, wherein the at least one additional sensor is in wireless communication with the camera. 4. The camera of claim 3, wherein the camera detects that data is available from the additional sensor, and establishes wireless communication therewith. 5. The camera of claim 4, wherein upon detecting that data is available from the additional sensor, the camera alerts the user via a prompt that wireless data is available. 6. The camera of claim 3, wherein the at least one additional sensor in wireless communication with the camera comprises at least one of a voltage and a current measuring device. 7. The camera of claim 3, wherein the camera is in wireless communication with a plurality of additional sensors. 8. The camera of claim 2, wherein the camera prompts the user to annotate an image. 9. The camera of claim 8, wherein, if the user applies an annotation to the image, the annotation is automatically applied to subsequent images. 10. The camera of claim 8, wherein the annotation is selectable by the user from a menu. 11. The camera of claim 10, wherein the menu comprises a tree structure. 12. The camera of claim 8, further comprising a user interface and configured to: receive annotation data from the user, via the user interface, in response to the prompt; and store the annotation data in association with a captured image such that the received annotation data may be recalled when the captured image is recalled. 13. The camera of claim 1, wherein the prompt instructs the user to perform a particular task. 14. A non-transitory computer-readable medium containing executable instructions causing one or more processors to perform a method to prompt a user of a thermal imaging camera to perform an action, the method comprising: receiving a first signal from a first sensor, the first sensor being a non-imaging sensor; determining if the first signal satisfies a first predetermined requirement; prompting the user to perform an action if the first signal satisfies the first predetermined requirement. 15. The computer readable medium of claim 14, wherein prompting the user to perform an action comprises prompting the user to provide annotation data to the camera. 16. The computer readable medium of claim 15, wherein prompting the user to provide annotation data occurs only after an image is acquired. 17. The computer readable medium of claim 15, wherein the annotation data is selectable from a predetermined list of annotations. 18. The computer readable medium of claim 17, wherein the predetermined list of annotations comprises a tree structure through which the user can navigate. 19. The computer readable medium of claim 15, further configured to associate the annotation data to an acquired thermal image such that the annotation data may be recalled when the captured image is recalled. 20. The computer readable medium of claim 14, wherein the first sensor is an additional, non-imaging sensor selectable by the user. 21. The computer readable medium of claim 14, wherein the action is entering data via a user interface in response to the prompt. 22. A method for prompting a user of a thermal imaging camera to perform a task, the method comprising: providing a thermal imaging camera comprising a processor, an infrared (IR) lens assembly, an IR sensor, a first additional sensor, and a display; detecting, with the first additional sensor, a first parameter; comparing the first parameter to a first predetermined requirement with the processor; and prompting the user with a first prompt via the display if the first parameter satisfies the first predetermined requirement. 23. The method of claim 22, wherein the task comprises annotating a thermal image. 24. The method of claim 23, wherein the step of prompting the user to annotate a thermal image occurs only when an image is acquired. 25. The method of claim 22, wherein the thermal imaging camera further comprises a second additional sensor; and the method further comprises detecting a second parameter with the second additional sensor; comparing the second parameter to a second predetermined requirement; and if the second parameter satisfies the second predetermined requirement, prompting the user with a second prompt via the display. 26. The method of claim 22, wherein the task comprises performing a thermographic inspection. 27. The method of claim 22, wherein the task comprises entering data via a user interface in response to the prompt. 28. The method of claim 27, further comprising the step of receiving data from the user and storing the received data in association with an image captured by the camera such that the received data may be recalled when the captured image is recalled. 29. The method of claim 27, wherein the data provides an annotation to an image captured by the camera.
A thermal imaging camera comprises an infrared lens assembly and associated IR sensor for detecting thermal images of a target scene, a processor, and at least one additional sensor. The at least one additional sensor is configured to provide measurement data to the processor, where it is compared to a predetermined requirement. If the measurement data satisfies the predetermined requirement, the camera will prompt the user via a display. During use, the camera can prompt the user to provide annotation data, conduct a thermographic inspection, inspect the target scene, or perform other tasks based on the measurement data.1. A portable, hand-held thermal imaging camera comprising: an infrared (IR) lens assembly having an associated IR sensor for detecting thermal images of a target scene; a display; a processor; and at least one additional, non-IR sensor, the additional sensor configured to provide measurement data to the processor, the processor analyzing whether the measurement data satisfies a predetermined requirement and causing the camera to prompt the user via the display in response to the measurement data when the measurement data satisfies the predetermined requirement. 2. The camera of claim 1, wherein the at least one additional sensor is external to the camera. 3. The camera of claim 2, wherein the at least one additional sensor is in wireless communication with the camera. 4. The camera of claim 3, wherein the camera detects that data is available from the additional sensor, and establishes wireless communication therewith. 5. The camera of claim 4, wherein upon detecting that data is available from the additional sensor, the camera alerts the user via a prompt that wireless data is available. 6. The camera of claim 3, wherein the at least one additional sensor in wireless communication with the camera comprises at least one of a voltage and a current measuring device. 7. The camera of claim 3, wherein the camera is in wireless communication with a plurality of additional sensors. 8. The camera of claim 2, wherein the camera prompts the user to annotate an image. 9. The camera of claim 8, wherein, if the user applies an annotation to the image, the annotation is automatically applied to subsequent images. 10. The camera of claim 8, wherein the annotation is selectable by the user from a menu. 11. The camera of claim 10, wherein the menu comprises a tree structure. 12. The camera of claim 8, further comprising a user interface and configured to: receive annotation data from the user, via the user interface, in response to the prompt; and store the annotation data in association with a captured image such that the received annotation data may be recalled when the captured image is recalled. 13. The camera of claim 1, wherein the prompt instructs the user to perform a particular task. 14. A non-transitory computer-readable medium containing executable instructions causing one or more processors to perform a method to prompt a user of a thermal imaging camera to perform an action, the method comprising: receiving a first signal from a first sensor, the first sensor being a non-imaging sensor; determining if the first signal satisfies a first predetermined requirement; prompting the user to perform an action if the first signal satisfies the first predetermined requirement. 15. The computer readable medium of claim 14, wherein prompting the user to perform an action comprises prompting the user to provide annotation data to the camera. 16. The computer readable medium of claim 15, wherein prompting the user to provide annotation data occurs only after an image is acquired. 17. The computer readable medium of claim 15, wherein the annotation data is selectable from a predetermined list of annotations. 18. The computer readable medium of claim 17, wherein the predetermined list of annotations comprises a tree structure through which the user can navigate. 19. The computer readable medium of claim 15, further configured to associate the annotation data to an acquired thermal image such that the annotation data may be recalled when the captured image is recalled. 20. The computer readable medium of claim 14, wherein the first sensor is an additional, non-imaging sensor selectable by the user. 21. The computer readable medium of claim 14, wherein the action is entering data via a user interface in response to the prompt. 22. A method for prompting a user of a thermal imaging camera to perform a task, the method comprising: providing a thermal imaging camera comprising a processor, an infrared (IR) lens assembly, an IR sensor, a first additional sensor, and a display; detecting, with the first additional sensor, a first parameter; comparing the first parameter to a first predetermined requirement with the processor; and prompting the user with a first prompt via the display if the first parameter satisfies the first predetermined requirement. 23. The method of claim 22, wherein the task comprises annotating a thermal image. 24. The method of claim 23, wherein the step of prompting the user to annotate a thermal image occurs only when an image is acquired. 25. The method of claim 22, wherein the thermal imaging camera further comprises a second additional sensor; and the method further comprises detecting a second parameter with the second additional sensor; comparing the second parameter to a second predetermined requirement; and if the second parameter satisfies the second predetermined requirement, prompting the user with a second prompt via the display. 26. The method of claim 22, wherein the task comprises performing a thermographic inspection. 27. The method of claim 22, wherein the task comprises entering data via a user interface in response to the prompt. 28. The method of claim 27, further comprising the step of receiving data from the user and storing the received data in association with an image captured by the camera such that the received data may be recalled when the captured image is recalled. 29. The method of claim 27, wherein the data provides an annotation to an image captured by the camera.
2,400
7,318
7,318
14,510,427
2,439
User validation accuracy is improved without inconveniencing a user. When an authentication request packet is received from a terminal and the authentication is successful based on a user ID and a password, an HTTP header, user-agent information, and access source IP address are extracted from the packet, and user authentication is performed by verifying the IP address and the user-agent information against usage history information where at most two sets of the IP address and the user-agent information extracted from the authentication request packet which is received from the same user previously are registered. When the set of the IP address and the UA information corresponding to the new extracted IP address and the new extracted UA information is registered in the usage history information, the authentication is successful, and the usage history information is overwritten with the new IP address and the new UA information.
1. A user validation apparatus comprising: a storage unit; an extraction unit configured to extract user-agent information and an access source internet protocol (IP) address in an HTTP header of a packet received from a terminal device by applying HTTP as a protocol of an application layer; an information management unit configured to store the user-agent information and IP address extracted by the extraction unit from the packet received from the terminal device operated by an individual user, in the storage unit so as to correspond to user identification information of the individual user; a determination unit configured to determine that a user operating a given terminal device is a conditionally valid user, when: (a) the user-agent information extracted by the extraction unit corresponds to each of two sets of user-agent information stored as usage history information in the storage unit, but the extracted IP address does not correspond to either of two IP addresses stored as usage history information in the storage unit, or (b) the extracted IP address corresponds to each of the two stored IP addresses, but the extracted user-agent information does not correspond to either of the two stored sets of user-agent information; and a re-authentication unit configured to request re-authentication through a web page to the terminal device, when the determination unit determines that the user is the conditionally valid user. 2. An authentication apparatus, comprising: a storage unit; an extraction unit configured to extract user-agent information related to a software running in a terminal device and an access source internet protocol (IP) address from a packet header received from the terminal device; an information management unit configured to store the user-agent information and IP address extracted by the extraction unit from the packet received from the terminal device, operated by a user, in the storage unit; and a determination unit configured to determine that a user operating a given terminal device is: (i) a valid user when user login information is identical to stored user login information, the extracted user-agent information corresponds to each of two sets of user-agent information stored as usage history information in the storage unit, and the extracted IP address corresponds to each of two IP addresses stored as usage history information in the storage unit, (ii) an invalid user when the user login information is not identical to the stored user login information, and (iii) a conditionally valid user when the user login information is identical to the stored user login information, and: (a) the user-agent information extracted by the extraction unit corresponds to each of the two stored sets of user-agent information, but the extracted IP address does not correspond to either of the two stored IP addresses, or (b) the extracted IP address corresponds to each of the two stored IP addresses, but the extracted user-agent information does not correspond to either of the two stored sets of user-agent information. 3. The authentication apparatus according to claim 2, further comprising: a re-authentication unit configured to request re-authentication through a web page to the terminal device, when the user is determined to be the conditionally valid user. 4. An authentication apparatus, comprising: a storage unit; an extraction unit configured to extract user-agent information related to a software running in a terminal device and an access source internet protocol (IP) address from a packet header received from the terminal device; an information management unit configured to store the user-agent information and IP address extracted by the extraction unit; a determination unit configured to determine that a user operating a given terminal device is (i) a valid user when user login information is identical to stored user login information, the extracted user-agent information corresponds to each of two sets of user-agent information stored as usage history information in the storage unit, and the extracted IP address corresponds to each of two IP addresses stored as usage history information in the storage unit, (ii) an invalid user when the user login information is not identical to the stored user login information, and (iii) a conditionally valid user when the user login information is identical to the stored user login information, and: (a) the user-agent information extracted by the extraction unit corresponds to each of the two stored sets of user-agent information, but the extracted IP address does not correspond to either of the two stored sets of IP addresses, or (b) the extracted IP address corresponds to each of the two stored sets of IP addresses, but the extracted user-agent information does not correspond to either of the two stored sets of user-agent information; and a re-authentication unit configured to request re-authentication through a web page to the terminal device, when the determination unit determines that the user is the conditionally valid user. 5. The user validation apparatus of claim 1, wherein the user-agent information comprises at least one of: a version of the operating system (OS) of the terminal device, a browser of the terminal device, a number of patches of the browser of the OS and a number of updates of the browser. 6. The authentication apparatus of claim 2, wherein the user-agent information comprises at least one of: a version of the operating system (OS) of the terminal device, a browser of the terminal device, a number of patches of the browser of the OS and a number of updates of the browser. 7. The authentication apparatus of claim 4, wherein the user-agent information comprises at least one of: a version of the operating system (OS) of the terminal device, a browser of the terminal device, a number of patches of the browser of the OS and a number of updates of the browser. 8. The user validation apparatus of claim 1, wherein the two stored sets of user-agent information comprise: a latest user-agent information and a previous user-agent information. 9. The authentication apparatus of claim 2, wherein the two stored sets of user-agent information comprise: a latest user-agent information and a previous user-agent information. 10. The authentication apparatus of claim 4, wherein the two stored sets of user-agent information comprise: a latest user-agent information and a previous user-agent information. 11. The user validation apparatus of claim 1, wherein the two stored IP addresses comprise: a latest IP address and a previous IP address. 12. The authentication apparatus of claim 2, wherein the two stored IP addresses comprise: a latest IP address and a previous IP address. 13. The authentication apparatus of claim 4, wherein the two stored IP addresses comprise: a latest IP address and a previous IP address.
User validation accuracy is improved without inconveniencing a user. When an authentication request packet is received from a terminal and the authentication is successful based on a user ID and a password, an HTTP header, user-agent information, and access source IP address are extracted from the packet, and user authentication is performed by verifying the IP address and the user-agent information against usage history information where at most two sets of the IP address and the user-agent information extracted from the authentication request packet which is received from the same user previously are registered. When the set of the IP address and the UA information corresponding to the new extracted IP address and the new extracted UA information is registered in the usage history information, the authentication is successful, and the usage history information is overwritten with the new IP address and the new UA information.1. A user validation apparatus comprising: a storage unit; an extraction unit configured to extract user-agent information and an access source internet protocol (IP) address in an HTTP header of a packet received from a terminal device by applying HTTP as a protocol of an application layer; an information management unit configured to store the user-agent information and IP address extracted by the extraction unit from the packet received from the terminal device operated by an individual user, in the storage unit so as to correspond to user identification information of the individual user; a determination unit configured to determine that a user operating a given terminal device is a conditionally valid user, when: (a) the user-agent information extracted by the extraction unit corresponds to each of two sets of user-agent information stored as usage history information in the storage unit, but the extracted IP address does not correspond to either of two IP addresses stored as usage history information in the storage unit, or (b) the extracted IP address corresponds to each of the two stored IP addresses, but the extracted user-agent information does not correspond to either of the two stored sets of user-agent information; and a re-authentication unit configured to request re-authentication through a web page to the terminal device, when the determination unit determines that the user is the conditionally valid user. 2. An authentication apparatus, comprising: a storage unit; an extraction unit configured to extract user-agent information related to a software running in a terminal device and an access source internet protocol (IP) address from a packet header received from the terminal device; an information management unit configured to store the user-agent information and IP address extracted by the extraction unit from the packet received from the terminal device, operated by a user, in the storage unit; and a determination unit configured to determine that a user operating a given terminal device is: (i) a valid user when user login information is identical to stored user login information, the extracted user-agent information corresponds to each of two sets of user-agent information stored as usage history information in the storage unit, and the extracted IP address corresponds to each of two IP addresses stored as usage history information in the storage unit, (ii) an invalid user when the user login information is not identical to the stored user login information, and (iii) a conditionally valid user when the user login information is identical to the stored user login information, and: (a) the user-agent information extracted by the extraction unit corresponds to each of the two stored sets of user-agent information, but the extracted IP address does not correspond to either of the two stored IP addresses, or (b) the extracted IP address corresponds to each of the two stored IP addresses, but the extracted user-agent information does not correspond to either of the two stored sets of user-agent information. 3. The authentication apparatus according to claim 2, further comprising: a re-authentication unit configured to request re-authentication through a web page to the terminal device, when the user is determined to be the conditionally valid user. 4. An authentication apparatus, comprising: a storage unit; an extraction unit configured to extract user-agent information related to a software running in a terminal device and an access source internet protocol (IP) address from a packet header received from the terminal device; an information management unit configured to store the user-agent information and IP address extracted by the extraction unit; a determination unit configured to determine that a user operating a given terminal device is (i) a valid user when user login information is identical to stored user login information, the extracted user-agent information corresponds to each of two sets of user-agent information stored as usage history information in the storage unit, and the extracted IP address corresponds to each of two IP addresses stored as usage history information in the storage unit, (ii) an invalid user when the user login information is not identical to the stored user login information, and (iii) a conditionally valid user when the user login information is identical to the stored user login information, and: (a) the user-agent information extracted by the extraction unit corresponds to each of the two stored sets of user-agent information, but the extracted IP address does not correspond to either of the two stored sets of IP addresses, or (b) the extracted IP address corresponds to each of the two stored sets of IP addresses, but the extracted user-agent information does not correspond to either of the two stored sets of user-agent information; and a re-authentication unit configured to request re-authentication through a web page to the terminal device, when the determination unit determines that the user is the conditionally valid user. 5. The user validation apparatus of claim 1, wherein the user-agent information comprises at least one of: a version of the operating system (OS) of the terminal device, a browser of the terminal device, a number of patches of the browser of the OS and a number of updates of the browser. 6. The authentication apparatus of claim 2, wherein the user-agent information comprises at least one of: a version of the operating system (OS) of the terminal device, a browser of the terminal device, a number of patches of the browser of the OS and a number of updates of the browser. 7. The authentication apparatus of claim 4, wherein the user-agent information comprises at least one of: a version of the operating system (OS) of the terminal device, a browser of the terminal device, a number of patches of the browser of the OS and a number of updates of the browser. 8. The user validation apparatus of claim 1, wherein the two stored sets of user-agent information comprise: a latest user-agent information and a previous user-agent information. 9. The authentication apparatus of claim 2, wherein the two stored sets of user-agent information comprise: a latest user-agent information and a previous user-agent information. 10. The authentication apparatus of claim 4, wherein the two stored sets of user-agent information comprise: a latest user-agent information and a previous user-agent information. 11. The user validation apparatus of claim 1, wherein the two stored IP addresses comprise: a latest IP address and a previous IP address. 12. The authentication apparatus of claim 2, wherein the two stored IP addresses comprise: a latest IP address and a previous IP address. 13. The authentication apparatus of claim 4, wherein the two stored IP addresses comprise: a latest IP address and a previous IP address.
2,400
7,319
7,319
14,050,034
2,425
A method of controlling delivery of video programs from video distribution equipment to video receiver devices includes receiving messages at the video distribution equipment from a mobile terminal operated by a user. The messages contain user defined identifiers that are associated with equipment identifiers of different ones of the video receiver devices. The user defined identifiers are stored associated with the equipment identifiers in a subscriber account. Delivery of video programs from the video distribution equipment to the video receiver devices is controlled in response to commands received from the mobile terminal which request delivery of identified video programs to identified ones of the user defined identifiers. Related video distribution equipment and mobile terminals are disclosed.
1. A method of controlling delivery of video programs from video distribution equipment to video receiver devices, the method comprising: receiving, at the video distribution equipment from a mobile terminal operated by a user, messages containing user defined identifiers that are associated with equipment identifiers of different ones of the video receiver devices, wherein the receiving further comprises communicating images to the video receiver devices that are registered with a subscriber account, wherein each of the video receiver devices receives a different image, and receiving, in each of the messages from the mobile terminal, image selection data that identifies one of the images that is selected by the user as corresponding to one of the images observed by the user through one of the video receiver devices and receiving a user defined identifier for the one of the video receiver devices; storing the user defined identifiers associated with the equipment identifiers in the subscriber account; and controlling delivery of video programs from the video distribution equipment to the video receiver devices in response to commands received from the mobile terminal requesting delivery of identified video programs to identified ones of the user defined identifiers. 2. The method of claim 1, wherein controlling delivery of video programs from the video distribution equipment to the video receiver devices comprises: receiving at the video distribution equipment from the mobile terminal a command requesting delivery of one of the video programs to one of the user defined identifiers; identifying, from the subscriber account, one of the equipment identifiers that is associated with the one of the user defined identifiers; and delivering the one of the video programs to one of the video receiver devices having the identified one of the equipment identifiers. 3. The method of claim 1, further comprising: generating the equipment identifier for one of the video receiver devices in response to the mobile terminal scanning an optical machine readable representation of the equipment identifier from the one of the video receiver devices; receiving the user defined identifier for the one of the video receiver devices; and generating one of the messages using the equipment identifier and the received user defined identifier for the one of the video receiver devices. 4. The method of claim 1, wherein storing the user defined identifiers associated with the equipment identifiers in the subscriber account comprises: looking-up the subscriber account in response to the equipment identifier contained in one of the messages; and storing in the subscriber account the user defined identifier logically associated with the equipment identifier contained in the one of the messages. 5. The method of claim 1, wherein receiving, at the video distribution equipment from the mobile terminal operated by the user, messages containing user defined identifiers that are associated with equipment identifiers of different ones of the video receiver devices further comprises: communicating the images to the mobile terminal for display to the user; and receiving, in each of the messages from the mobile terminal, image selection data that identifies one of the images displayed on the mobile terminal that is selected by the user as corresponding to one of the images observed by the user through one of the video receiver devices and receiving the user defined identifier for the one of the video receiver devices. 6. The method of claim 5, wherein storing the user defined identifiers associated with the equipment identifiers in the subscriber account comprises: storing image-to-device associations between the images and the equipment identifiers of the video receiver devices; determining from the image-to-device associations one of the equipment identifiers that is associated with the image selection data that is received in one of the messages from the mobile terminal; and storing in the subscriber account the user defined identifier from the one of the messages logically associated with the equipment identifier determined from the image-to-device associations. 7. The method of claim 1, wherein storing the user defined identifiers associated with the equipment identifiers in the subscriber account comprises: storing image-to-device associations between the images and the video receiver devices; determining from the image-to-device associations one of the equipment identifiers that is associated with the picture of one of the images that is received in one of the messages from the mobile terminal; and storing in the subscriber account the user defined identifier from the one of the messages logically associated with the equipment identifier determined from the image-to-device associations. 8. The method of claim 1, wherein communicating images to the video receiver devices that are registered with the subscriber account comprises: identifying equipment identifiers for the video receiver devices registered with the subscriber account; associating a different one of the images with each the equipment identifiers; and communicating the images and associated equipment identifiers to the video receiver devices. 9. The method of claim 8, wherein communicating the images and associated equipment identifiers to the video receiver devices comprises: transcoding each of the images into a video stream to generate a plurality of video streams; communicating the video streams to the video receiver devices, wherein each of the video streams are communicated using a different carrier frequency; and communicating force tune commands containing the equipment identifiers of the video receiver devices to cause each of the video receiver devices to tune to a different one of the carrier frequencies to receive one of the video streams containing one of the images associated with the equipment identifier for the video receiver device. 10. Video distribution equipment that controls delivery of video programs to video receiver devices, the video distribution equipment is configured to: communicate images to the video receiver devices that are registered with a subscriber account, wherein each of the video receiver devices receives a different image; receive messages from a mobile terminal containing user defined identifiers that are associated with equipment identifiers of different ones of the video receiver devices; receive in each of the messages from the mobile terminal image selection data corresponding to images displayed through one of the video receiver devices and to receive the user defined identifier for the one of the video receiver devices; determine from the image-to-device associations one of the equipment identifiers that is associated with the image selection data that is received in one of the messages from the mobile terminal; store in the subscriber account the user defined identifier from the one of the messages logically associated with the equipment identifier determined from the image-to-device associations; store the user defined identifiers associated with the equipment identifiers in a subscriber account; and control delivery of video programs to the video receiver devices in response to commands received from the mobile terminal requesting delivery of identified video programs to identified ones of the user defined identifiers. 11. The video distribution equipment of claim 10, further configured to: receive a command from the mobile terminal requesting delivery of one of the video programs to one of the user defined identifiers; identify, from the subscriber account, one of the equipment identifiers that is associated with the one of the user defined identifiers; and deliver the one of the video programs to one of the video receiver devices having the identified one of the equipment identifiers. 12. The video distribution equipment of claim 10, further configured to: store image-to-device associations between the images and the equipment identifiers of the video receiver devices; communicate the images to the mobile terminal for display to the user; receive, in each of the messages from the mobile terminal, image selection data that identifies one of the images displayed on the mobile terminal that is selected by the user as corresponding to one of the images observed by the user through one of the video receiver devices and to receive the user defined identifier for the one of the video receiver devices; determine from the image-to-device associations one of the equipment identifiers that is associated with the image selection data that is received in one of the messages from the mobile terminal; and store in the subscriber account the user defined identifier from the one of the messages logically associated with the equipment identifier determined from the image-to-device associations. 13. The video distribution equipment of claim 10, further configured to communicate images to the video receiver devices that are registered with the subscriber account by: identifying equipment identifiers for the video receiver devices registered with the subscriber account; associating a different one of the images with each the equipment identifiers; and transcoding each of the images into a video stream to generate a plurality of video streams; communicating the video streams to the video receiver devices, wherein each of the video streams are communicated using a different carrier frequency; and communicating force tune commands containing the equipment identifiers of the video receiver devices to cause each of the video receiver devices to tune to a different one of the carrier frequencies to receive one of the video streams containing one of the images associated with the equipment identifier for the video receiver device. 14. A mobile terminal comprising: a user interface that is configured to receive user defined identifiers for video receiver devices from a user; a transceiver that is configured to communicate with video distribution equipment; at least one microprocessor that is configured to communicate, through the transceiver, commands including user defined identifiers for the video receiver devices to control delivery of video programs from the video distribution equipment to the video receiver devices, wherein the at least one microprocessor is further configured to communicate image selection data that corresponds to one of the images observed by the user through one of the video receiver devices. 15. The mobile terminal of claim 14, further comprising: a display device, wherein the microprocessor is further configured to: receive a plurality of images that are different from each other; display the images on the display device; receive through the user interface an image selection data that identifies one of the images displayed on the display device that has been selected by the user as corresponding to one of the images observed by the user through one of the video receiver devices; receive through the user interface a user defined identifier for the one of the video receiver devices; and communicate to the video distribution equipment a message containing the image selection data and the user defined identifier for the one of the video receiver devices. 16. The mobile terminal of claim 14, further comprising: a camera device, wherein the microprocessor is further configured to: operate the camera device responsive to a command from the user to take a picture of an image that the video distribution equipment displays through one of the video receiver devices on a display device that is separate from the mobile terminal; receive through the user interface a user defined identifier for the one of the video receiver devices; and communicate to the video distribution equipment a message containing the picture of the image and the user defined identifier for the one of the video receiver devices. 17. The mobile terminal of claim 14, wherein the microprocessor is further configured to: communicate a command to the video distribution equipment that contains the user defined identifier for one of the video receiver devices and an instruction for the video distribution equipment to redirect a video program that the video distribution equipment is communicating to one video receiver device to instead be communicated to another video receiver device that is associated with the user defined identifier.
A method of controlling delivery of video programs from video distribution equipment to video receiver devices includes receiving messages at the video distribution equipment from a mobile terminal operated by a user. The messages contain user defined identifiers that are associated with equipment identifiers of different ones of the video receiver devices. The user defined identifiers are stored associated with the equipment identifiers in a subscriber account. Delivery of video programs from the video distribution equipment to the video receiver devices is controlled in response to commands received from the mobile terminal which request delivery of identified video programs to identified ones of the user defined identifiers. Related video distribution equipment and mobile terminals are disclosed.1. A method of controlling delivery of video programs from video distribution equipment to video receiver devices, the method comprising: receiving, at the video distribution equipment from a mobile terminal operated by a user, messages containing user defined identifiers that are associated with equipment identifiers of different ones of the video receiver devices, wherein the receiving further comprises communicating images to the video receiver devices that are registered with a subscriber account, wherein each of the video receiver devices receives a different image, and receiving, in each of the messages from the mobile terminal, image selection data that identifies one of the images that is selected by the user as corresponding to one of the images observed by the user through one of the video receiver devices and receiving a user defined identifier for the one of the video receiver devices; storing the user defined identifiers associated with the equipment identifiers in the subscriber account; and controlling delivery of video programs from the video distribution equipment to the video receiver devices in response to commands received from the mobile terminal requesting delivery of identified video programs to identified ones of the user defined identifiers. 2. The method of claim 1, wherein controlling delivery of video programs from the video distribution equipment to the video receiver devices comprises: receiving at the video distribution equipment from the mobile terminal a command requesting delivery of one of the video programs to one of the user defined identifiers; identifying, from the subscriber account, one of the equipment identifiers that is associated with the one of the user defined identifiers; and delivering the one of the video programs to one of the video receiver devices having the identified one of the equipment identifiers. 3. The method of claim 1, further comprising: generating the equipment identifier for one of the video receiver devices in response to the mobile terminal scanning an optical machine readable representation of the equipment identifier from the one of the video receiver devices; receiving the user defined identifier for the one of the video receiver devices; and generating one of the messages using the equipment identifier and the received user defined identifier for the one of the video receiver devices. 4. The method of claim 1, wherein storing the user defined identifiers associated with the equipment identifiers in the subscriber account comprises: looking-up the subscriber account in response to the equipment identifier contained in one of the messages; and storing in the subscriber account the user defined identifier logically associated with the equipment identifier contained in the one of the messages. 5. The method of claim 1, wherein receiving, at the video distribution equipment from the mobile terminal operated by the user, messages containing user defined identifiers that are associated with equipment identifiers of different ones of the video receiver devices further comprises: communicating the images to the mobile terminal for display to the user; and receiving, in each of the messages from the mobile terminal, image selection data that identifies one of the images displayed on the mobile terminal that is selected by the user as corresponding to one of the images observed by the user through one of the video receiver devices and receiving the user defined identifier for the one of the video receiver devices. 6. The method of claim 5, wherein storing the user defined identifiers associated with the equipment identifiers in the subscriber account comprises: storing image-to-device associations between the images and the equipment identifiers of the video receiver devices; determining from the image-to-device associations one of the equipment identifiers that is associated with the image selection data that is received in one of the messages from the mobile terminal; and storing in the subscriber account the user defined identifier from the one of the messages logically associated with the equipment identifier determined from the image-to-device associations. 7. The method of claim 1, wherein storing the user defined identifiers associated with the equipment identifiers in the subscriber account comprises: storing image-to-device associations between the images and the video receiver devices; determining from the image-to-device associations one of the equipment identifiers that is associated with the picture of one of the images that is received in one of the messages from the mobile terminal; and storing in the subscriber account the user defined identifier from the one of the messages logically associated with the equipment identifier determined from the image-to-device associations. 8. The method of claim 1, wherein communicating images to the video receiver devices that are registered with the subscriber account comprises: identifying equipment identifiers for the video receiver devices registered with the subscriber account; associating a different one of the images with each the equipment identifiers; and communicating the images and associated equipment identifiers to the video receiver devices. 9. The method of claim 8, wherein communicating the images and associated equipment identifiers to the video receiver devices comprises: transcoding each of the images into a video stream to generate a plurality of video streams; communicating the video streams to the video receiver devices, wherein each of the video streams are communicated using a different carrier frequency; and communicating force tune commands containing the equipment identifiers of the video receiver devices to cause each of the video receiver devices to tune to a different one of the carrier frequencies to receive one of the video streams containing one of the images associated with the equipment identifier for the video receiver device. 10. Video distribution equipment that controls delivery of video programs to video receiver devices, the video distribution equipment is configured to: communicate images to the video receiver devices that are registered with a subscriber account, wherein each of the video receiver devices receives a different image; receive messages from a mobile terminal containing user defined identifiers that are associated with equipment identifiers of different ones of the video receiver devices; receive in each of the messages from the mobile terminal image selection data corresponding to images displayed through one of the video receiver devices and to receive the user defined identifier for the one of the video receiver devices; determine from the image-to-device associations one of the equipment identifiers that is associated with the image selection data that is received in one of the messages from the mobile terminal; store in the subscriber account the user defined identifier from the one of the messages logically associated with the equipment identifier determined from the image-to-device associations; store the user defined identifiers associated with the equipment identifiers in a subscriber account; and control delivery of video programs to the video receiver devices in response to commands received from the mobile terminal requesting delivery of identified video programs to identified ones of the user defined identifiers. 11. The video distribution equipment of claim 10, further configured to: receive a command from the mobile terminal requesting delivery of one of the video programs to one of the user defined identifiers; identify, from the subscriber account, one of the equipment identifiers that is associated with the one of the user defined identifiers; and deliver the one of the video programs to one of the video receiver devices having the identified one of the equipment identifiers. 12. The video distribution equipment of claim 10, further configured to: store image-to-device associations between the images and the equipment identifiers of the video receiver devices; communicate the images to the mobile terminal for display to the user; receive, in each of the messages from the mobile terminal, image selection data that identifies one of the images displayed on the mobile terminal that is selected by the user as corresponding to one of the images observed by the user through one of the video receiver devices and to receive the user defined identifier for the one of the video receiver devices; determine from the image-to-device associations one of the equipment identifiers that is associated with the image selection data that is received in one of the messages from the mobile terminal; and store in the subscriber account the user defined identifier from the one of the messages logically associated with the equipment identifier determined from the image-to-device associations. 13. The video distribution equipment of claim 10, further configured to communicate images to the video receiver devices that are registered with the subscriber account by: identifying equipment identifiers for the video receiver devices registered with the subscriber account; associating a different one of the images with each the equipment identifiers; and transcoding each of the images into a video stream to generate a plurality of video streams; communicating the video streams to the video receiver devices, wherein each of the video streams are communicated using a different carrier frequency; and communicating force tune commands containing the equipment identifiers of the video receiver devices to cause each of the video receiver devices to tune to a different one of the carrier frequencies to receive one of the video streams containing one of the images associated with the equipment identifier for the video receiver device. 14. A mobile terminal comprising: a user interface that is configured to receive user defined identifiers for video receiver devices from a user; a transceiver that is configured to communicate with video distribution equipment; at least one microprocessor that is configured to communicate, through the transceiver, commands including user defined identifiers for the video receiver devices to control delivery of video programs from the video distribution equipment to the video receiver devices, wherein the at least one microprocessor is further configured to communicate image selection data that corresponds to one of the images observed by the user through one of the video receiver devices. 15. The mobile terminal of claim 14, further comprising: a display device, wherein the microprocessor is further configured to: receive a plurality of images that are different from each other; display the images on the display device; receive through the user interface an image selection data that identifies one of the images displayed on the display device that has been selected by the user as corresponding to one of the images observed by the user through one of the video receiver devices; receive through the user interface a user defined identifier for the one of the video receiver devices; and communicate to the video distribution equipment a message containing the image selection data and the user defined identifier for the one of the video receiver devices. 16. The mobile terminal of claim 14, further comprising: a camera device, wherein the microprocessor is further configured to: operate the camera device responsive to a command from the user to take a picture of an image that the video distribution equipment displays through one of the video receiver devices on a display device that is separate from the mobile terminal; receive through the user interface a user defined identifier for the one of the video receiver devices; and communicate to the video distribution equipment a message containing the picture of the image and the user defined identifier for the one of the video receiver devices. 17. The mobile terminal of claim 14, wherein the microprocessor is further configured to: communicate a command to the video distribution equipment that contains the user defined identifier for one of the video receiver devices and an instruction for the video distribution equipment to redirect a video program that the video distribution equipment is communicating to one video receiver device to instead be communicated to another video receiver device that is associated with the user defined identifier.
2,400
7,320
7,320
14,571,477
2,425
A media encoder for encoding a stream of media data blocks is provided having an encoder pipeline comprising a sequence of processing modules for processing a stream of media data blocks, and a pipeline configurator configured effect a switch in the encoder pipeline from one or more first encode parameters to one or more second encode parameters. The first processing module of the pipeline can be configured to associate a trigger value with at least a first media data block processed at the first processing module in accordance with second encode parameters, the trigger value passing to subsequent modules so as to cause those modules to adopt the second encode parameters.
1. A media encoder for encoding a stream of media data blocks, the media encoder comprising: an encoder pipeline configured to process a stream of media data blocks in accordance with one or more first encode parameters, the encoder pipeline comprising a sequence of processing modules including a first processing module and one or more subsequent processing modules; and a pipeline configurator configured to, in order to effect a switch in the encoder pipeline from the one or more first encode parameters to one or more second encode parameters, cause the subsequent processing modules of the pipeline to enter a trigger mode and cause the first processing module to adopt the second encode parameters; the first processing module being configured to, on adopting the second encode parameters, associate a trigger value with at least a first media data block processed at the first processing module in accordance with the second encode parameters; and in trigger mode, each of the subsequent processing modules being configured to, in response to receiving the trigger value, adopt the second encode parameters. 2. A media encoder as claimed in claim 1, the first media data block being the first media data block for processing at the first processing module in accordance with the second encode parameters. 3. A media encoder as claimed in claim 1, wherein the first processing module is configured to, on being caused to adopt the second encode parameters, complete any current processing according to the first set of encode parameters and process the next media data block received for processing at the first processing module in accordance with the second set of encode parameters, that next media data block being the first media data block. 4. A media encoder as claimed in claim 1, the pipeline configurator being configured to cause the subsequent processing modules of the pipeline to enter their trigger modes prior to causing the first processing module to adopt the second encode parameters. 5. A media encoder as claimed in claim 1, the pipeline configurator being configured to cause the subsequent processing modules of the pipeline to enter their trigger modes in reverse order with respect to the order of the subsequent processing modules in the pipeline. 6. A media encoder as claimed in claim 1, the pipeline configurator being configured to, on causing the subsequent processing modules of the pipeline to enter a trigger mode, make available at least some of the second encode parameters to the subsequent modules. 7. A media encoder as claimed in claim 6, the subsequent processing modules of the pipeline being configured to cache the at least some of the second encode parameters for adoption on receiving the trigger value. 8. A media encoder as claimed in claim 1, the pipeline configurator being configured to, on causing the first processing module to adopt the second encode parameters, make available at least some of the second encode parameters to the first processing module. 9. A media encoder as claimed in claim 1, the trigger value being a state of a trigger flag capable of being toggled between two or more states and: the first processing module is configured to, on adopting the second encode parameters, toggle the state of the trigger flag from a first state to a second state and include the toggled trigger flag in the first and subsequent media data blocks of the stream; and the subsequent modules are configured to, in trigger mode, maintain the state of the last received trigger flag and adopt the second encode parameters in response to receiving the trigger value only if the trigger value differs from the maintained state. 10. A media encoder as claimed in claim 1, the first processing module being configured to write the trigger value to the at least the first media data blocks or metadata associated with the at least the first media data blocks. 11. A media encoder as claimed in claim 1, the first processing module being a preprocessor for processing media data blocks prior to their encoding at an encoder of the encoder pipeline. 12. A media encoder as claimed in claim 1, one or more of the subsequent modules being an encoder for encoding media data blocks. 13. A media encoder as claimed in claim 1, wherein the media data blocks are video frames and the first and second encode parameters include one or more of frame size, frame rate and bitrate. 14. A method of switching encode configurations at an encoder pipeline adapted for processing a stream of media data blocks in accordance with one or more encode parameters, the encoder pipeline comprising a sequence of processing modules including a first processing module and one or more subsequent processing modules, the method comprising, in order to switch the encoder pipeline from one or more first encode parameters to one or more second encode parameters: causing the subsequent processing modules of the pipeline to enter a trigger mode; causing the first processing module of the pipeline to adopt the second encode parameters; the first processing module, on adopting the second encode parameters: associating a trigger flag with at least a first media data block processed at the first processing module in accordance with the second encode parameters; and each of the subsequent processing modules in response to receiving the trigger flag associated with the first media data block: adopting the second encode parameters; and processing the first media data block in accordance with the second encode parameters. 15. A non-transitory computer readable storage medium having stored thereon computer readable instructions that, when executed at a computer system for generating a representation of a digital circuit from definitions of circuit elements and data defining rules for combining those circuit elements, cause the computer system to: generate an encoder pipeline configured to process a stream of media data blocks in accordance with one or more first encode parameters, the encoder pipeline comprising a sequence of processing modules including a first processing module and one or more subsequent processing modules; and generate a pipeline configurator configured to, in order to effect a switch in the encoder pipeline from the one or more first encode parameters to one or more second encode parameters, cause the subsequent processing modules of the pipeline to enter a trigger mode and cause the first processing module to adopt the second encode parameters; the first processing module being configured to, on adopting the second encode parameters, associate a trigger value with at least a first media data block processed at the first processing module in accordance with the second encode parameters; and in trigger mode, each of the subsequent processing modules being configured to, in response to receiving the trigger value, adopt the second encode parameters. 16. A non-transitory computer readable storage medium having stored thereon computer executable instructions that when executed cause at least one processor to switch an encoder pipeline from one or more first encode parameters to one or more second encode parameters for encoding a stream of media data blocks, by: causing subsequent processing modules subsequent to a first processing module of the pipeline to enter a trigger mode; causing the first processing module of the pipeline to adopt the second encode parameters, the first processing module, on adopting the second encode parameters, associating a trigger flag with at least a first media data block processed at the first processing module in accordance with the second encode parameters; and each of the subsequent processing modules in response to receiving the trigger flag associated with the first media data block, adopting the second encode parameters; and processing the first media data block in accordance with the second encode parameters.
A media encoder for encoding a stream of media data blocks is provided having an encoder pipeline comprising a sequence of processing modules for processing a stream of media data blocks, and a pipeline configurator configured effect a switch in the encoder pipeline from one or more first encode parameters to one or more second encode parameters. The first processing module of the pipeline can be configured to associate a trigger value with at least a first media data block processed at the first processing module in accordance with second encode parameters, the trigger value passing to subsequent modules so as to cause those modules to adopt the second encode parameters.1. A media encoder for encoding a stream of media data blocks, the media encoder comprising: an encoder pipeline configured to process a stream of media data blocks in accordance with one or more first encode parameters, the encoder pipeline comprising a sequence of processing modules including a first processing module and one or more subsequent processing modules; and a pipeline configurator configured to, in order to effect a switch in the encoder pipeline from the one or more first encode parameters to one or more second encode parameters, cause the subsequent processing modules of the pipeline to enter a trigger mode and cause the first processing module to adopt the second encode parameters; the first processing module being configured to, on adopting the second encode parameters, associate a trigger value with at least a first media data block processed at the first processing module in accordance with the second encode parameters; and in trigger mode, each of the subsequent processing modules being configured to, in response to receiving the trigger value, adopt the second encode parameters. 2. A media encoder as claimed in claim 1, the first media data block being the first media data block for processing at the first processing module in accordance with the second encode parameters. 3. A media encoder as claimed in claim 1, wherein the first processing module is configured to, on being caused to adopt the second encode parameters, complete any current processing according to the first set of encode parameters and process the next media data block received for processing at the first processing module in accordance with the second set of encode parameters, that next media data block being the first media data block. 4. A media encoder as claimed in claim 1, the pipeline configurator being configured to cause the subsequent processing modules of the pipeline to enter their trigger modes prior to causing the first processing module to adopt the second encode parameters. 5. A media encoder as claimed in claim 1, the pipeline configurator being configured to cause the subsequent processing modules of the pipeline to enter their trigger modes in reverse order with respect to the order of the subsequent processing modules in the pipeline. 6. A media encoder as claimed in claim 1, the pipeline configurator being configured to, on causing the subsequent processing modules of the pipeline to enter a trigger mode, make available at least some of the second encode parameters to the subsequent modules. 7. A media encoder as claimed in claim 6, the subsequent processing modules of the pipeline being configured to cache the at least some of the second encode parameters for adoption on receiving the trigger value. 8. A media encoder as claimed in claim 1, the pipeline configurator being configured to, on causing the first processing module to adopt the second encode parameters, make available at least some of the second encode parameters to the first processing module. 9. A media encoder as claimed in claim 1, the trigger value being a state of a trigger flag capable of being toggled between two or more states and: the first processing module is configured to, on adopting the second encode parameters, toggle the state of the trigger flag from a first state to a second state and include the toggled trigger flag in the first and subsequent media data blocks of the stream; and the subsequent modules are configured to, in trigger mode, maintain the state of the last received trigger flag and adopt the second encode parameters in response to receiving the trigger value only if the trigger value differs from the maintained state. 10. A media encoder as claimed in claim 1, the first processing module being configured to write the trigger value to the at least the first media data blocks or metadata associated with the at least the first media data blocks. 11. A media encoder as claimed in claim 1, the first processing module being a preprocessor for processing media data blocks prior to their encoding at an encoder of the encoder pipeline. 12. A media encoder as claimed in claim 1, one or more of the subsequent modules being an encoder for encoding media data blocks. 13. A media encoder as claimed in claim 1, wherein the media data blocks are video frames and the first and second encode parameters include one or more of frame size, frame rate and bitrate. 14. A method of switching encode configurations at an encoder pipeline adapted for processing a stream of media data blocks in accordance with one or more encode parameters, the encoder pipeline comprising a sequence of processing modules including a first processing module and one or more subsequent processing modules, the method comprising, in order to switch the encoder pipeline from one or more first encode parameters to one or more second encode parameters: causing the subsequent processing modules of the pipeline to enter a trigger mode; causing the first processing module of the pipeline to adopt the second encode parameters; the first processing module, on adopting the second encode parameters: associating a trigger flag with at least a first media data block processed at the first processing module in accordance with the second encode parameters; and each of the subsequent processing modules in response to receiving the trigger flag associated with the first media data block: adopting the second encode parameters; and processing the first media data block in accordance with the second encode parameters. 15. A non-transitory computer readable storage medium having stored thereon computer readable instructions that, when executed at a computer system for generating a representation of a digital circuit from definitions of circuit elements and data defining rules for combining those circuit elements, cause the computer system to: generate an encoder pipeline configured to process a stream of media data blocks in accordance with one or more first encode parameters, the encoder pipeline comprising a sequence of processing modules including a first processing module and one or more subsequent processing modules; and generate a pipeline configurator configured to, in order to effect a switch in the encoder pipeline from the one or more first encode parameters to one or more second encode parameters, cause the subsequent processing modules of the pipeline to enter a trigger mode and cause the first processing module to adopt the second encode parameters; the first processing module being configured to, on adopting the second encode parameters, associate a trigger value with at least a first media data block processed at the first processing module in accordance with the second encode parameters; and in trigger mode, each of the subsequent processing modules being configured to, in response to receiving the trigger value, adopt the second encode parameters. 16. A non-transitory computer readable storage medium having stored thereon computer executable instructions that when executed cause at least one processor to switch an encoder pipeline from one or more first encode parameters to one or more second encode parameters for encoding a stream of media data blocks, by: causing subsequent processing modules subsequent to a first processing module of the pipeline to enter a trigger mode; causing the first processing module of the pipeline to adopt the second encode parameters, the first processing module, on adopting the second encode parameters, associating a trigger flag with at least a first media data block processed at the first processing module in accordance with the second encode parameters; and each of the subsequent processing modules in response to receiving the trigger flag associated with the first media data block, adopting the second encode parameters; and processing the first media data block in accordance with the second encode parameters.
2,400
7,321
7,321
13,354,640
2,421
A network device may pair with a particular satellite dish by storing a security key uniquely associated with the particular satellite dish. The network device may then receive encrypted data from the particular satellite dish, and decrypt the received encrypted data utilizing the security key. One or more circuits of the network device may be operable to prevent the network device from decrypting data from any satellite dish other than the particular satellite dish. The network device may be operable such that the security key is the only key that the network device can utilize for decrypting signals received via a particular interface and/or from a particular address. One or more circuits collocated with a satellite dish may be operable to encrypt data utilizing a security key stored in the one or more circuits. The security key may be unique to the one or more circuits and/or satellite dish.
1. A system comprising: one or more circuits for use in a network device, said one or more circuits being operable to: pair with a particular satellite dish by storing a security key uniquely associated with said particular satellite dish; receive encrypted data from said particular satellite dish; decrypt said received encrypted data utilizing said security key. 2. The system of claim 1, wherein said one or more circuits are operable to prevent said network device from decrypting data from any satellite dish other than said particular satellite dish. 3. The system of claim 1, wherein said one or more circuits are operable such that said security key is the only key that said network device can utilize for decrypting signals received via a particular interface and/or from a particular address. 4. The system of claim 1, wherein said security key is written to said one or more circuits while said one or more circuits are configured into a service mode. 5. The system of claim 1, wherein said security key is received via a link that is out-of-band with a link between said network device and said particular satellite dish. 6. The system of claim 1, wherein: said one or more circuits comprise one-time-programmable (OTP) memory; and said security key is stored in said OTP memory. 7. The system of claim 1, wherein: said one or more circuits comprise an electrically erasable programmable read only memory (EEPROM); and said security key is stored in said EEPROM. 8. The system of claim 1, wherein: said one or more circuits comprise flash memory; and said security key is stored in said flash memory. 9. A method comprising: performing by one or more circuits in a network device: pairing with a particular satellite dish by storing a security key uniquely associated with said particular satellite dish; receiving encrypted data from said particular satellite dish; decrypting said received encrypted data utilizing said security key. 10. The method of claim 9, comprising preventing said network device from decrypting data from any satellite dish other than said particular satellite dish. 11. The method of claim 9, wherein said security key is the only key that the network device can utilize for decrypting signals received via a particular interface and/or from a particular address. 12. The method of claim 9, comprising writing said security key to said one or more circuits while said one or more circuits are configured into a service mode. 13. The method of claim 9, comprising receiving said security key via a link that is out-of-band with a link between said network device and said particular satellite dish. 14. The method of claim 9, wherein: said one or more circuits comprise one-time-programmable (OTP) memory; and said storing comprises storing the security key in said OTP memory. 15. The method of claim 9, wherein: said one or more circuits comprise an electrically erasable programmable read only memory (EEPROM); and said storing comprises storing the security key in said EEPROM. 16. The method of claim 9, wherein: said one or more circuits comprise flash memory; and said security key is stored in said flash memory. 17. A system comprising: one or more circuits collocated with a satellite dish, said one or more circuits being operable to: encrypt data utilizing a security key stored in said one or more circuits, wherein said security key is unique to said satellite dish; and transmit said encrypted data. 18. The system of claim 17, wherein said one or more circuits are operable to transmit said encrypted data over an Internet Protocol (IP) network. 19. The system of claim 17, wherein said security key can be read from said one or more circuits only while said one or more circuits are configured into a service mode. 20. The system of claim 17, wherein said one or more circuits are operable to transmit said security key to a network device while said one or more circuits are configured into a service mode. 21. The system of claim 17, wherein: said one or more circuits comprise one-time-programmable (OTP) memory; and said security key is stored in said OTP memory. 22. The system of claim 17, wherein: said one or more circuits comprise an electrically erasable programmable read only memory (EEPROM); and said security key is stored in said EEPROM. 23. The system of claim 17, wherein: said one or more circuits comprise flash memory; and said security key is stored in said flash memory.
A network device may pair with a particular satellite dish by storing a security key uniquely associated with the particular satellite dish. The network device may then receive encrypted data from the particular satellite dish, and decrypt the received encrypted data utilizing the security key. One or more circuits of the network device may be operable to prevent the network device from decrypting data from any satellite dish other than the particular satellite dish. The network device may be operable such that the security key is the only key that the network device can utilize for decrypting signals received via a particular interface and/or from a particular address. One or more circuits collocated with a satellite dish may be operable to encrypt data utilizing a security key stored in the one or more circuits. The security key may be unique to the one or more circuits and/or satellite dish.1. A system comprising: one or more circuits for use in a network device, said one or more circuits being operable to: pair with a particular satellite dish by storing a security key uniquely associated with said particular satellite dish; receive encrypted data from said particular satellite dish; decrypt said received encrypted data utilizing said security key. 2. The system of claim 1, wherein said one or more circuits are operable to prevent said network device from decrypting data from any satellite dish other than said particular satellite dish. 3. The system of claim 1, wherein said one or more circuits are operable such that said security key is the only key that said network device can utilize for decrypting signals received via a particular interface and/or from a particular address. 4. The system of claim 1, wherein said security key is written to said one or more circuits while said one or more circuits are configured into a service mode. 5. The system of claim 1, wherein said security key is received via a link that is out-of-band with a link between said network device and said particular satellite dish. 6. The system of claim 1, wherein: said one or more circuits comprise one-time-programmable (OTP) memory; and said security key is stored in said OTP memory. 7. The system of claim 1, wherein: said one or more circuits comprise an electrically erasable programmable read only memory (EEPROM); and said security key is stored in said EEPROM. 8. The system of claim 1, wherein: said one or more circuits comprise flash memory; and said security key is stored in said flash memory. 9. A method comprising: performing by one or more circuits in a network device: pairing with a particular satellite dish by storing a security key uniquely associated with said particular satellite dish; receiving encrypted data from said particular satellite dish; decrypting said received encrypted data utilizing said security key. 10. The method of claim 9, comprising preventing said network device from decrypting data from any satellite dish other than said particular satellite dish. 11. The method of claim 9, wherein said security key is the only key that the network device can utilize for decrypting signals received via a particular interface and/or from a particular address. 12. The method of claim 9, comprising writing said security key to said one or more circuits while said one or more circuits are configured into a service mode. 13. The method of claim 9, comprising receiving said security key via a link that is out-of-band with a link between said network device and said particular satellite dish. 14. The method of claim 9, wherein: said one or more circuits comprise one-time-programmable (OTP) memory; and said storing comprises storing the security key in said OTP memory. 15. The method of claim 9, wherein: said one or more circuits comprise an electrically erasable programmable read only memory (EEPROM); and said storing comprises storing the security key in said EEPROM. 16. The method of claim 9, wherein: said one or more circuits comprise flash memory; and said security key is stored in said flash memory. 17. A system comprising: one or more circuits collocated with a satellite dish, said one or more circuits being operable to: encrypt data utilizing a security key stored in said one or more circuits, wherein said security key is unique to said satellite dish; and transmit said encrypted data. 18. The system of claim 17, wherein said one or more circuits are operable to transmit said encrypted data over an Internet Protocol (IP) network. 19. The system of claim 17, wherein said security key can be read from said one or more circuits only while said one or more circuits are configured into a service mode. 20. The system of claim 17, wherein said one or more circuits are operable to transmit said security key to a network device while said one or more circuits are configured into a service mode. 21. The system of claim 17, wherein: said one or more circuits comprise one-time-programmable (OTP) memory; and said security key is stored in said OTP memory. 22. The system of claim 17, wherein: said one or more circuits comprise an electrically erasable programmable read only memory (EEPROM); and said security key is stored in said EEPROM. 23. The system of claim 17, wherein: said one or more circuits comprise flash memory; and said security key is stored in said flash memory.
2,400
7,322
7,322
14,245,173
2,419
Certain aspects of the present disclosure relate to methods and apparatus for employing multiple subframe configurations. A UE may identify a first reference subframe configuration (RSC) to use as a reference for hybrid automatic repeat request (HARQ) operations for transmissions on an uplink, and a second RSC to use as a reference for HARQ operations for transmissions on a downlink. The UE may communicate with at least a node on the uplink and the downlink based on the first and second RSCs. In aspects, a base station (BS) may identify a first RSC to use as a reference for HARQ operations for transmissions on an uplink, identify a second RSC to use as a reference for HARQ operations for transmissions on a downlink, and communicate with at least one UE on the uplink and the downlink based on the first and second RSCs.
1. A method for wireless communications by a user equipment (UE), comprising: identifying a first reference subframe configuration to use as a reference for hybrid automatic repeat request (HARQ) operations for transmissions on an uplink; identifying a second reference subframe configuration to use as a reference for HARQ operations for transmissions on a downlink; and communicating with at least a node on the uplink and the downlink based on the first and second reference subframe configurations. 2. The method of claim 1, further comprising identifying a current subframe configuration for sending transmissions on the uplink and receiving transmissions on the downlink, wherein the current subframe configuration is different from at least one of the first or second reference subframe configurations. 3. The method of claim 1, wherein the second reference subframe configuration for transmissions on the downlink is identified from at least two reference subframe configurations. 4. The method of claim 3, wherein the at least two reference subframe configurations comprise at least one of time division duplex (TDD) Uplink/Downlink (UL/DL) subframe configuration #2 and TDD UL/DL subframe configuration #5, or TDD UL/DL subframe configuration of a 5 ms switching periodicity and TDD UL/DL subframe configuration of a 10 ms switching periodicity. 5. The method of claim 1, further comprising: interpreting an information field in a downlink control information (DCI) format for scheduling on the uplink based on the second reference subframe configuration, wherein the information field comprises an uplink index field; and wherein for at least one second reference subframe configuration, interpreting an information field in a DCI format for scheduling on the uplink based on the second reference subframe configuration includes interpreting the uplink index field as at least one of a downlink assignment field indicating a total number of downlink assignments or an uplink index field indicating one or more uplink subframes to be scheduled. 6. The method of claim 1, wherein at least the second reference subframe configuration for transmissions on the downlink is received semi-statically via radio resource control (RRC) signaling. 7. The method of claim 1, wherein at least the first reference subframe configuration for transmissions on the uplink is received via broadcast signaling including a System Information Block (SIB) Type 1. 8. The method of claim 1, further comprising: determining at least one of a number of HARQ processes, a scheduling timing, or HARQ timing for the uplink based on the first reference subframe configuration; and determining at least one of a number of HARQ processes or HARQ timing for the downlink based on the second reference subframe configuration. 9. The method of claim 1, further comprising determining transmission of at least one of a periodic channel state information feedback and a periodic scheduling request based on the second reference subframe configuration. 10. The method of claim 1, wherein HARQ operations include HARQ timing. 11. A method for wireless communications by a base station (BS), comprising: identifying a first reference subframe configuration to use as a reference for hybrid automatic repeat request (HARQ) operations for transmissions on an uplink; identifying a second reference subframe configuration to use as a reference for HARQ operations for transmissions on a downlink; and communicating with at least one user equipment (UE) on the uplink and the downlink based on the first and second reference subframe configurations. 12. The method of claim 11, wherein the second reference subframe configuration for transmissions on the downlink is identified from at least one of time division duplex (TDD) Uplink/Downlink (UL/DL) subframe configuration of a 5 ms switching periodicity or TDD UL/DL subframe configuration of a 10 ms switching periodicity. 13. The method of claim 11, further comprising: providing information in an information field in a downlink control information (DCI) format for scheduling in the uplink, the information provided based on the second reference subframe configuration, wherein the information field comprises an uplink index field; and wherein for at least one second reference subframe configuration, providing information in an information field in a DCI format for scheduling in the uplink includes providing, in an uplink index field, at least one of downlink assignment information indicating a total number of downlink assignments or information indicating one or more uplink subframes to be scheduled. 14. The method of claim 11, wherein at least the second reference subframe configuration for transmissions on the downlink is semi-statically signaled via radio resource control (RRC) signaling. 15. The method of claim 11, wherein at least the first reference subframe configuration for transmissions on the uplink is signaled via broadcast signaling including a System Information Block (SIB) Type 1. 16. The method of claim 11, further comprising: identifying another reference subframe configuration for at least one of the transmissions on the uplink or the transmissions on the downlink based on actual traffic or load of a network over which the BS communicates with the UE. 17. The method of claim 11, wherein HARQ operations include HARQ timing. 18. An apparatus for wireless communications, comprising: a processor configured to: identify a first reference subframe configuration to use as a reference for hybrid automatic repeat request (HARQ) operations for transmissions on an uplink; identify a second reference subframe configuration to use as a reference for HARQ operations for transmissions on a downlink; and communicate with at least a node on the uplink and the downlink based on the first and second reference subframe configurations; and a memory coupled to the processor. 19. The apparatus of claim 18, wherein the processor is further configured to identify a current subframe configuration for sending transmissions on the uplink and receiving transmissions on the downlink, wherein the current subframe configuration is different from at least one of the first or second reference subframe configurations. 20. The apparatus of claim 18, wherein the second reference subframe configuration for transmissions on the downlink is identified from at least two reference subframe configurations and the at least two reference subframe configurations comprise time division duplex (TDD), Uplink/Downlink (UL/DL) subframe configuration of a 5 ms switching periodicity and TDD UL/DL subframe configuration of a 10 ms switching periodicity. 21. The apparatus of claim 18, further comprising: wherein the processor is further configured to interpret an information field in a downlink control information (DCI) format for scheduling on the uplink based on the second reference subframe configuration, wherein the information field comprises an uplink index field; and wherein for at least one second reference subframe configuration, interpreting an information field in a DCI format for scheduling on the uplink based on the second reference subframe configuration includes interpreting the uplink index field as at least one of a downlink assignment field indicating a total number of downlink assignments or an uplink index field indicating one or more uplink subframes to be scheduled. 22. The apparatus of claim 18, wherein the processor is further configured to receive at least the second reference subframe configuration for the downlink semi-statically via radio resource control (RRC) signaling. 23. The apparatus of claim 18, wherein at least the first reference subframe configuration for the uplink via broadcast signaling including System Information Block (SIB) Type 1. 24. The apparatus of claim 18, the processor is further configured to: determine at least one of a number of HARQ processes, a scheduling timing or HARQ timing for the uplink based on the first reference subframe configuration; and determine at least one of a number of HARQ processes or HARQ timing for the downlink based on the second reference subframe configuration. 25. An apparatus for wireless communications, comprising: a processor configured to: identify a first reference subframe configuration to use as a reference for hybrid automatic repeat request (HARQ) operations for transmissions on an uplink; identify a second reference subframe configuration to use as a reference for HARQ operations for transmissions on a downlink; and communicate with at least one user equipment (UE) on the uplink and the downlink based on the first and second reference subframe configurations; and a memory coupled to the processor. 26. The apparatus of claim 25, wherein the second reference subframe configuration for the downlink is identified from at least one of at least time division duplex (TDD) Uplink/Downlink (UL/DL) subframe configuration #2 or TDD UL/DL subframe configuration #5, or TDD UL/DL subframe configuration of a 5 ms switching periodicity or TDD UL/DL subframe configuration of a 10 ms switching periodicity. 27. The apparatus of claim 25, wherein the processor is further configured to: provide information in an information field in a downlink control information (DCI) format for scheduling in the uplink, the information provided based on the second reference subframe configuration, wherein the information field comprises an uplink index field; and wherein for at least one second reference subframe configuration, providing information in an information field in a DCI format for scheduling in the uplink includes providing, in an uplink index field, at least one of downlink assignment information indicating a total number of downlink assignments or information indicating one or more uplink subframes to be scheduled. 28. The apparatus of claim 25, wherein the processor is further configured to signal at least the second reference subframe configuration for the downlink semi-statically via Radio Resource Control (RRC) signaling. 29. The apparatus of claim 25, wherein the processor is further configured to signal at least the first reference subframe configuration for the uplink via broadcast signaling including System Information Block (SIB) Type 1. 30. The apparatus of claim 25, wherein the processor is further configured to identify another reference subframe configuration for at least one of the uplink or the downlink based on actual traffic or load of a network over which the apparatus communicates with the UE.
Certain aspects of the present disclosure relate to methods and apparatus for employing multiple subframe configurations. A UE may identify a first reference subframe configuration (RSC) to use as a reference for hybrid automatic repeat request (HARQ) operations for transmissions on an uplink, and a second RSC to use as a reference for HARQ operations for transmissions on a downlink. The UE may communicate with at least a node on the uplink and the downlink based on the first and second RSCs. In aspects, a base station (BS) may identify a first RSC to use as a reference for HARQ operations for transmissions on an uplink, identify a second RSC to use as a reference for HARQ operations for transmissions on a downlink, and communicate with at least one UE on the uplink and the downlink based on the first and second RSCs.1. A method for wireless communications by a user equipment (UE), comprising: identifying a first reference subframe configuration to use as a reference for hybrid automatic repeat request (HARQ) operations for transmissions on an uplink; identifying a second reference subframe configuration to use as a reference for HARQ operations for transmissions on a downlink; and communicating with at least a node on the uplink and the downlink based on the first and second reference subframe configurations. 2. The method of claim 1, further comprising identifying a current subframe configuration for sending transmissions on the uplink and receiving transmissions on the downlink, wherein the current subframe configuration is different from at least one of the first or second reference subframe configurations. 3. The method of claim 1, wherein the second reference subframe configuration for transmissions on the downlink is identified from at least two reference subframe configurations. 4. The method of claim 3, wherein the at least two reference subframe configurations comprise at least one of time division duplex (TDD) Uplink/Downlink (UL/DL) subframe configuration #2 and TDD UL/DL subframe configuration #5, or TDD UL/DL subframe configuration of a 5 ms switching periodicity and TDD UL/DL subframe configuration of a 10 ms switching periodicity. 5. The method of claim 1, further comprising: interpreting an information field in a downlink control information (DCI) format for scheduling on the uplink based on the second reference subframe configuration, wherein the information field comprises an uplink index field; and wherein for at least one second reference subframe configuration, interpreting an information field in a DCI format for scheduling on the uplink based on the second reference subframe configuration includes interpreting the uplink index field as at least one of a downlink assignment field indicating a total number of downlink assignments or an uplink index field indicating one or more uplink subframes to be scheduled. 6. The method of claim 1, wherein at least the second reference subframe configuration for transmissions on the downlink is received semi-statically via radio resource control (RRC) signaling. 7. The method of claim 1, wherein at least the first reference subframe configuration for transmissions on the uplink is received via broadcast signaling including a System Information Block (SIB) Type 1. 8. The method of claim 1, further comprising: determining at least one of a number of HARQ processes, a scheduling timing, or HARQ timing for the uplink based on the first reference subframe configuration; and determining at least one of a number of HARQ processes or HARQ timing for the downlink based on the second reference subframe configuration. 9. The method of claim 1, further comprising determining transmission of at least one of a periodic channel state information feedback and a periodic scheduling request based on the second reference subframe configuration. 10. The method of claim 1, wherein HARQ operations include HARQ timing. 11. A method for wireless communications by a base station (BS), comprising: identifying a first reference subframe configuration to use as a reference for hybrid automatic repeat request (HARQ) operations for transmissions on an uplink; identifying a second reference subframe configuration to use as a reference for HARQ operations for transmissions on a downlink; and communicating with at least one user equipment (UE) on the uplink and the downlink based on the first and second reference subframe configurations. 12. The method of claim 11, wherein the second reference subframe configuration for transmissions on the downlink is identified from at least one of time division duplex (TDD) Uplink/Downlink (UL/DL) subframe configuration of a 5 ms switching periodicity or TDD UL/DL subframe configuration of a 10 ms switching periodicity. 13. The method of claim 11, further comprising: providing information in an information field in a downlink control information (DCI) format for scheduling in the uplink, the information provided based on the second reference subframe configuration, wherein the information field comprises an uplink index field; and wherein for at least one second reference subframe configuration, providing information in an information field in a DCI format for scheduling in the uplink includes providing, in an uplink index field, at least one of downlink assignment information indicating a total number of downlink assignments or information indicating one or more uplink subframes to be scheduled. 14. The method of claim 11, wherein at least the second reference subframe configuration for transmissions on the downlink is semi-statically signaled via radio resource control (RRC) signaling. 15. The method of claim 11, wherein at least the first reference subframe configuration for transmissions on the uplink is signaled via broadcast signaling including a System Information Block (SIB) Type 1. 16. The method of claim 11, further comprising: identifying another reference subframe configuration for at least one of the transmissions on the uplink or the transmissions on the downlink based on actual traffic or load of a network over which the BS communicates with the UE. 17. The method of claim 11, wherein HARQ operations include HARQ timing. 18. An apparatus for wireless communications, comprising: a processor configured to: identify a first reference subframe configuration to use as a reference for hybrid automatic repeat request (HARQ) operations for transmissions on an uplink; identify a second reference subframe configuration to use as a reference for HARQ operations for transmissions on a downlink; and communicate with at least a node on the uplink and the downlink based on the first and second reference subframe configurations; and a memory coupled to the processor. 19. The apparatus of claim 18, wherein the processor is further configured to identify a current subframe configuration for sending transmissions on the uplink and receiving transmissions on the downlink, wherein the current subframe configuration is different from at least one of the first or second reference subframe configurations. 20. The apparatus of claim 18, wherein the second reference subframe configuration for transmissions on the downlink is identified from at least two reference subframe configurations and the at least two reference subframe configurations comprise time division duplex (TDD), Uplink/Downlink (UL/DL) subframe configuration of a 5 ms switching periodicity and TDD UL/DL subframe configuration of a 10 ms switching periodicity. 21. The apparatus of claim 18, further comprising: wherein the processor is further configured to interpret an information field in a downlink control information (DCI) format for scheduling on the uplink based on the second reference subframe configuration, wherein the information field comprises an uplink index field; and wherein for at least one second reference subframe configuration, interpreting an information field in a DCI format for scheduling on the uplink based on the second reference subframe configuration includes interpreting the uplink index field as at least one of a downlink assignment field indicating a total number of downlink assignments or an uplink index field indicating one or more uplink subframes to be scheduled. 22. The apparatus of claim 18, wherein the processor is further configured to receive at least the second reference subframe configuration for the downlink semi-statically via radio resource control (RRC) signaling. 23. The apparatus of claim 18, wherein at least the first reference subframe configuration for the uplink via broadcast signaling including System Information Block (SIB) Type 1. 24. The apparatus of claim 18, the processor is further configured to: determine at least one of a number of HARQ processes, a scheduling timing or HARQ timing for the uplink based on the first reference subframe configuration; and determine at least one of a number of HARQ processes or HARQ timing for the downlink based on the second reference subframe configuration. 25. An apparatus for wireless communications, comprising: a processor configured to: identify a first reference subframe configuration to use as a reference for hybrid automatic repeat request (HARQ) operations for transmissions on an uplink; identify a second reference subframe configuration to use as a reference for HARQ operations for transmissions on a downlink; and communicate with at least one user equipment (UE) on the uplink and the downlink based on the first and second reference subframe configurations; and a memory coupled to the processor. 26. The apparatus of claim 25, wherein the second reference subframe configuration for the downlink is identified from at least one of at least time division duplex (TDD) Uplink/Downlink (UL/DL) subframe configuration #2 or TDD UL/DL subframe configuration #5, or TDD UL/DL subframe configuration of a 5 ms switching periodicity or TDD UL/DL subframe configuration of a 10 ms switching periodicity. 27. The apparatus of claim 25, wherein the processor is further configured to: provide information in an information field in a downlink control information (DCI) format for scheduling in the uplink, the information provided based on the second reference subframe configuration, wherein the information field comprises an uplink index field; and wherein for at least one second reference subframe configuration, providing information in an information field in a DCI format for scheduling in the uplink includes providing, in an uplink index field, at least one of downlink assignment information indicating a total number of downlink assignments or information indicating one or more uplink subframes to be scheduled. 28. The apparatus of claim 25, wherein the processor is further configured to signal at least the second reference subframe configuration for the downlink semi-statically via Radio Resource Control (RRC) signaling. 29. The apparatus of claim 25, wherein the processor is further configured to signal at least the first reference subframe configuration for the uplink via broadcast signaling including System Information Block (SIB) Type 1. 30. The apparatus of claim 25, wherein the processor is further configured to identify another reference subframe configuration for at least one of the uplink or the downlink based on actual traffic or load of a network over which the apparatus communicates with the UE.
2,400
7,323
7,323
14,377,852
2,466
In a method for avoiding an error detection of control channels in a mobile-radio device, a transmitter device transmits control signals on control channels which are received and decoded by the mobile-radio device. A control channel contains a bit sequence and a check-value of the bit sequence. In the case of a successful check-value comparison, the mobile-radio device accepts the control channel and otherwise rejects the control channel. A control channel, which has not been allocated to a mobile-radio device is defined with a filler sequence which dedicates in the case of a check-value comparison and always leads to the rejection of the control channel.
1-8. (canceled) 9. A method comprising: generating a data sequence for a control channel of a wireless communications network, wherein the control channel is not assigned to any mobile radio devices of the network, and wherein the data sequence is generated based on a filler data sequence and a check-value; transmitting the data sequence over the control channel, wherein the filler data sequence and check-value are configured in a manner whereby a check-value determination, performed by a mobile radio device of the network that receives the data sequence over the control channel, will necessarily fail. 10. The method according to claim 9, wherein the filler data sequence comprises only zeros. 11. The method according to claim 1, wherein the data sequence for the control channel comprises the filler data sequence as a basic definition. 12. The method according to claim 1, wherein the method is used for testing spurious emissions of the mobile-radio device. 13. An apparatus comprising: a processor module configured to generate a data sequence for a control channel of a wireless communications network, wherein the control channel is not assigned to any mobile radio devices of the network, and wherein the data sequence is generated based on a filler data sequence and a check-value; and a transmitter module configured to transmit the data sequence over the control channel, wherein the filler data sequence and check-value are configured in a manner whereby a check-value determination, performed by a mobile radio device of the network that receives the data sequence over the control channel, will necessarily fail. 14. The apparatus according to claim 13, wherein the filler data sequence comprises only zeros. 15. The apparatus according to claim 13, wherein the apparatus is used as a tester for testing spurious emissions of the mobile radio device. 16. The apparatus according to claim 13, wherein the apparatus is used for a base station, and the wireless communications network comprises one of an LTE or an LTE-A mobile-radio network.
In a method for avoiding an error detection of control channels in a mobile-radio device, a transmitter device transmits control signals on control channels which are received and decoded by the mobile-radio device. A control channel contains a bit sequence and a check-value of the bit sequence. In the case of a successful check-value comparison, the mobile-radio device accepts the control channel and otherwise rejects the control channel. A control channel, which has not been allocated to a mobile-radio device is defined with a filler sequence which dedicates in the case of a check-value comparison and always leads to the rejection of the control channel.1-8. (canceled) 9. A method comprising: generating a data sequence for a control channel of a wireless communications network, wherein the control channel is not assigned to any mobile radio devices of the network, and wherein the data sequence is generated based on a filler data sequence and a check-value; transmitting the data sequence over the control channel, wherein the filler data sequence and check-value are configured in a manner whereby a check-value determination, performed by a mobile radio device of the network that receives the data sequence over the control channel, will necessarily fail. 10. The method according to claim 9, wherein the filler data sequence comprises only zeros. 11. The method according to claim 1, wherein the data sequence for the control channel comprises the filler data sequence as a basic definition. 12. The method according to claim 1, wherein the method is used for testing spurious emissions of the mobile-radio device. 13. An apparatus comprising: a processor module configured to generate a data sequence for a control channel of a wireless communications network, wherein the control channel is not assigned to any mobile radio devices of the network, and wherein the data sequence is generated based on a filler data sequence and a check-value; and a transmitter module configured to transmit the data sequence over the control channel, wherein the filler data sequence and check-value are configured in a manner whereby a check-value determination, performed by a mobile radio device of the network that receives the data sequence over the control channel, will necessarily fail. 14. The apparatus according to claim 13, wherein the filler data sequence comprises only zeros. 15. The apparatus according to claim 13, wherein the apparatus is used as a tester for testing spurious emissions of the mobile radio device. 16. The apparatus according to claim 13, wherein the apparatus is used for a base station, and the wireless communications network comprises one of an LTE or an LTE-A mobile-radio network.
2,400
7,324
7,324
14,252,243
2,447
A system is provided that provides a current interne protocol address associated with a remote computing device. The system includes a server configured for connection to the remote computing device over a first network and to a local computing device over a second network. The server has a computer program encoded thereon that includes code for: receiving a request for a resource from a web browser on the remote computing device and obtaining the current internet protocol address from the request. The program further includes code for providing the current internet protocol address to the local computing device.
1. A system for providing a current internet protocol address associated with a remote computing device, comprising: a server configured for connection to said remote computing device over a first network and a local computing device over a second network, said server having a computer program encoded thereon including code for: receiving a request for a resource from a web browser on said remote computing device; obtaining said current internet protocol address from said request; and, providing said current internet protocol address to the local computing device. 2. The system of claim I wherein said computer program includes code for: retrieving stored authentication information from a memory; and, comparing entered authentication information received from said remote computing device against said stored authentication information. 3. The system of claim 1 wherein said entered authentication information includes an electronic mail address and a password. 4. The system of claim 3 wherein said entered authentication information further includes a device identifier for said remote computing device. 5. The system of claim I wherein said computer program includes code for comparing said current internet protocol address to a prior internet protocol address for said remote computing device. 6. The system of claim 5 wherein said computer program includes code for writing said current internet protocol address to a memory when said current internet protocol address differs from said prior internet protocol address. 7. The system of claim 5 wherein execution of said code for providing is conditioned on said current internet protocol address being different from said prior internet protocol address. 8. The system of claim 1 wherein said computer program is further configured, in providing said current internet protocol address, to generate an electronic mail message containing said current internet protocol address. 9. The system of claim 1 wherein said computer program is further configured, in providing said current internet protocol address, to generate an electronic mail message containing a link to a website page containing said current internet protocol address. 10. The system of claim 1 wherein said computer program is further configured, in providing said current internet protocol address, to generate a website page in a browser on said local computing device, said website page displaying said current internet protocol address. 11. The system of claim 1 wherein said computer program is further configured, in providing said current internet protocol address, to generate a text message. 12. The system of claim 1 wherein said remote computing devices comprises a router. 13. The system of claim 1 wherein said remote computing device comprises a personal computer. 14. The system of claim 1 wherein said local computing device comprises a personal computer. 15. The system of claim I wherein said local computing device comprises a cellular communications device. 16. The system of claim 1 wherein said computer program further includes code for re-execute said code for receiving, obtaining and providing after a predetermined period of time. 17. An article of manufacture, comprising: a non-transitory computer storage medium having a computer program encoded thereon for providing a current internet protocol address associated with a remote computing device, said computer program including code for: receiving a request for a resource from a web browser on said remote computing device; obtaining said current internet protocol address from said request; and, providing said current internet protocol address to a local computing device. 18. A method for providing a current internet protocol address associated with a remote computing device, comprising the steps of: receiving a request for a resource from a web browser on said remote computing device over a first network; obtaining said current internet protocol address from said request; and, providing said current internet protocol address to a local computing device over a second network.
A system is provided that provides a current interne protocol address associated with a remote computing device. The system includes a server configured for connection to the remote computing device over a first network and to a local computing device over a second network. The server has a computer program encoded thereon that includes code for: receiving a request for a resource from a web browser on the remote computing device and obtaining the current internet protocol address from the request. The program further includes code for providing the current internet protocol address to the local computing device.1. A system for providing a current internet protocol address associated with a remote computing device, comprising: a server configured for connection to said remote computing device over a first network and a local computing device over a second network, said server having a computer program encoded thereon including code for: receiving a request for a resource from a web browser on said remote computing device; obtaining said current internet protocol address from said request; and, providing said current internet protocol address to the local computing device. 2. The system of claim I wherein said computer program includes code for: retrieving stored authentication information from a memory; and, comparing entered authentication information received from said remote computing device against said stored authentication information. 3. The system of claim 1 wherein said entered authentication information includes an electronic mail address and a password. 4. The system of claim 3 wherein said entered authentication information further includes a device identifier for said remote computing device. 5. The system of claim I wherein said computer program includes code for comparing said current internet protocol address to a prior internet protocol address for said remote computing device. 6. The system of claim 5 wherein said computer program includes code for writing said current internet protocol address to a memory when said current internet protocol address differs from said prior internet protocol address. 7. The system of claim 5 wherein execution of said code for providing is conditioned on said current internet protocol address being different from said prior internet protocol address. 8. The system of claim 1 wherein said computer program is further configured, in providing said current internet protocol address, to generate an electronic mail message containing said current internet protocol address. 9. The system of claim 1 wherein said computer program is further configured, in providing said current internet protocol address, to generate an electronic mail message containing a link to a website page containing said current internet protocol address. 10. The system of claim 1 wherein said computer program is further configured, in providing said current internet protocol address, to generate a website page in a browser on said local computing device, said website page displaying said current internet protocol address. 11. The system of claim 1 wherein said computer program is further configured, in providing said current internet protocol address, to generate a text message. 12. The system of claim 1 wherein said remote computing devices comprises a router. 13. The system of claim 1 wherein said remote computing device comprises a personal computer. 14. The system of claim 1 wherein said local computing device comprises a personal computer. 15. The system of claim I wherein said local computing device comprises a cellular communications device. 16. The system of claim 1 wherein said computer program further includes code for re-execute said code for receiving, obtaining and providing after a predetermined period of time. 17. An article of manufacture, comprising: a non-transitory computer storage medium having a computer program encoded thereon for providing a current internet protocol address associated with a remote computing device, said computer program including code for: receiving a request for a resource from a web browser on said remote computing device; obtaining said current internet protocol address from said request; and, providing said current internet protocol address to a local computing device. 18. A method for providing a current internet protocol address associated with a remote computing device, comprising the steps of: receiving a request for a resource from a web browser on said remote computing device over a first network; obtaining said current internet protocol address from said request; and, providing said current internet protocol address to a local computing device over a second network.
2,400
7,325
7,325
14,158,994
2,454
Systems, methods, and other embodiments associated with logging event messages in a computing grid using a distributed memory are described. In one embodiment, a method includes storing, in a distributed memory, a batch of log messages received from one of a plurality of handlers. Storing the batch in the distributed memory includes storing the batch in one of a plurality of memories that are part of the distributed memory and storing the batch with a group of batches from the plurality of handlers. The example method may also include generating, after a predefined period of time has elapsed, a formal log from the group of batches. The predefined period of time is an amount of time after a reporting period within which batches from the reporting period are expected to arrive in the distributed memory. The formal log includes sorted messages from the group of batches.
1. A non-transitory computer-storage medium storing computer-executable instructions that when executed by a computer cause the computer to perform a method for processing log messages from a plurality of handlers that are distributed among a plurality of hosts in a computing grid, the method comprising: storing, in one or more of a plurality of memories that are part of a distributed memory, log messages of a batch received from one of the plurality of handlers; and generating, after a predefined period of time has elapsed for receiving a group of batches, a formal log from log messages of the group of batches that include the batch, and wherein generating the formal log includes sorting messages in the group of batches. 2. The non-transitory computer-storage medium of claim 1, wherein storing the log messages of the batch in the distributed memory includes storing the log messages of the batch with log messages from the group of batches received from the plurality of handlers, wherein storing the log messages of the batch includes collecting the log messages with log messages from the group of batches in order to store log messages generated during the reporting period together in the distributed memory, wherein log messages from the reporting period are log messages that occur within a same period of time, wherein the batch and the group of batches are collected in the distributed memory in an unordered state until the formal log is generated, and wherein the predefined period of time is an amount of time after a reporting period within which batches from the reporting period are expected to arrive in the distributed memory. 3. The non-transitory computer-storage medium of claim 1, further comprising: tracking each of the plurality of handlers by monitoring when each batch in the group of batches arrives in the distributed memory, wherein each batch of the group of batches is a heartbeat communication that is provided to the distributed memory at a regular periodic interval from one of the plurality of handlers, and wherein each of the group of batches is a set of log messages captured by one of the plurality of handlers about a component. 4. The non-transitory computer-storage medium of claim 1, further comprising: dynamically modifying the distributed memory to change a size of the distributed memory in response to a current storage load, wherein the current storage load includes an amount of data being stored and an amount of data that is being received for storage, and wherein modifying the distributed memory includes dynamically adding memory by expanding the distributed memory to include additional hosts. 5. The non-transitory computer-storage medium of claim 1, further comprising: writing the formal log to a persistent memory after the formal log has been generated, wherein the formal log is generated after the predefined period of time to account for time skews in receiving batches in the group of batches. 6. The non-transitory computer-storage medium of claim 1, further comprising appending the formal log to a log history that is stored in the distributed memory, wherein the log history is comprised of one or more previous formal logs that include previous batches of log messages that have been sorted and assigned unique identifiers; and maintaining the formal log in the distributed memory to provide access to the log messages in a sorted format. 7. The non-transitory computer-storage medium of claim 6, further comprising: evicting one or more messages from the log history in the distributed memory upon a time limit for the one or more messages expiring; and providing access to the log history in the distributed memory to permit analyzing the formal log. 8. The non-transitory computer-storage medium of claim 1, further comprising: registering a handler as part of the plurality of handlers by providing configuration information to the handler in response to a request from the handler to join a distributed logging system, wherein the plurality of handlers are part of the computing grid that dynamically registers and deregisters components as a current processing load changes. 9. The non-transitory computer-storage medium of claim 1, wherein the predefined period of time spans multiple heartbeat communications from each of the plurality of handlers, wherein each of the multiple heartbeat communications includes a batch of log messages, and wherein a handler of the plurality of handlers provides an empty batch as a heartbeat communication when no log messages have been collected. 10. A computing system for processing log messages from a plurality of handlers that are distributed among a plurality of hosts in a computing grid, comprising: log proxy logic configured to store batches of log messages in a distributed memory, wherein the log proxy logic is configured to receive each of the batches from one of a plurality of handlers, wherein each of the batches includes log messages logged by one of the plurality of handlers about an associated component; and log writer logic configured to generate a formal log from the batches of log messages stored in the distributed memory by collating and sorting log messages in the batches of log messages. 11. The computing system of claim 10, wherein the log writer logic is configured to generate the formal log based, at least in part, on a universal timestamp for each of the log messages, and by assigning a unique identifier to each of the log messages in the group of batches, wherein the log writer logic is configured to generate the formal log after a predefined period of time for receiving the batches of log messages for a reporting period, wherein the predefined period of time includes an amount of time after the reporting period within which batches from the plurality of handlers are expected to be received in the distributed memory, wherein log messages from the reporting period are log messages that occur within a same period of time, and wherein the batches are collected in the distributed memory in an unordered state until the log writer logic generates the formal log. 12. The computing system of claim 10, wherein the log proxy logic is configured to track the plurality of handlers by monitoring when each of the batches are received, wherein each of the batches is a heartbeat communication that is provided to the log proxy logic at a regular periodic interval from one of the plurality of handlers, and wherein each of the batches includes a set of log messages captured by one of the plurality of handlers about a component. 13. The computing system of claim 10, further comprising: log server logic configured to dynamically modify the distributed memory to change a size of the distributed memory in response to a current storage load, wherein the current storage load includes an amount of data being stored and an amount of data that is being received for storage, and wherein the log server logic is configured to modify the distributed memory by adding additional hosts to expand the distributed memory. 14. The computing system of claim 10, wherein the log writer logic is configured to append the formal log to a log history in the distributed memory that includes at least one previous formal log, wherein the log history includes previous batches of log messages that have been sorted and assigned unique identifiers, and wherein the log writer logic is configured to persist the formal log to a persistent memory after collating and sorting the log messages in the batches. 15. The computing system of claim 10, wherein the log writer logic is configured to maintain a log history in the distributed memory to provide access to log messages in the log history in a sorted format, wherein the log history includes at least the formal log. 16. The computing system of claim 10, further comprising: a log evictor logic configured to delete one or more log messages from the log history in the distributed memory upon a time limit for the one or more messages expiring. 17. The computing system of claim 10, wherein the log server logic is configured to analyze the log history in the distributed memory by querying the log history using at least one of, unique identifiers previously assigned to the log messages, a process identifier associated with a log message, a component identifier, a host identifier, and a text phrase embedded within a log message. 18. The computing system of claim 10, wherein the log writer logic is configured to write the formal log to a persistent memory after the formal log has been generated. 19. A computer-implemented method for processing event messages from a plurality of handlers that are distributed among a plurality of hosts in a computing grid, the method comprising: periodically formatting a plurality of event messages in a distributed memory to generate a formal log by (i) collating and sorting the plurality of event messages based, at least in part, on a timestamp for each of the plurality of event messages and (ii) assigning a unique identifier to each of the plurality of event messages, wherein the plurality of event messages are comprised of batches of event messages received from the plurality of hosts for a reporting period, and wherein periodically formatting includes formatting the plurality of event messages after a predefined period of time that includes an amount of time after the reporting period within which the batches from the plurality of handlers are expected to be received in the distributed memory; and maintaining the formal log in the distributed memory to provide access to the plurality of event messages in a sorted format. 20. The computer-implemented method of claim 19, further comprising: appending the formal log to a log history in the distributed memory that is comprised of previous formal logs; and deleting event messages from the log history according to an oldest event message first when the log history is greater than a predefined size.
Systems, methods, and other embodiments associated with logging event messages in a computing grid using a distributed memory are described. In one embodiment, a method includes storing, in a distributed memory, a batch of log messages received from one of a plurality of handlers. Storing the batch in the distributed memory includes storing the batch in one of a plurality of memories that are part of the distributed memory and storing the batch with a group of batches from the plurality of handlers. The example method may also include generating, after a predefined period of time has elapsed, a formal log from the group of batches. The predefined period of time is an amount of time after a reporting period within which batches from the reporting period are expected to arrive in the distributed memory. The formal log includes sorted messages from the group of batches.1. A non-transitory computer-storage medium storing computer-executable instructions that when executed by a computer cause the computer to perform a method for processing log messages from a plurality of handlers that are distributed among a plurality of hosts in a computing grid, the method comprising: storing, in one or more of a plurality of memories that are part of a distributed memory, log messages of a batch received from one of the plurality of handlers; and generating, after a predefined period of time has elapsed for receiving a group of batches, a formal log from log messages of the group of batches that include the batch, and wherein generating the formal log includes sorting messages in the group of batches. 2. The non-transitory computer-storage medium of claim 1, wherein storing the log messages of the batch in the distributed memory includes storing the log messages of the batch with log messages from the group of batches received from the plurality of handlers, wherein storing the log messages of the batch includes collecting the log messages with log messages from the group of batches in order to store log messages generated during the reporting period together in the distributed memory, wherein log messages from the reporting period are log messages that occur within a same period of time, wherein the batch and the group of batches are collected in the distributed memory in an unordered state until the formal log is generated, and wherein the predefined period of time is an amount of time after a reporting period within which batches from the reporting period are expected to arrive in the distributed memory. 3. The non-transitory computer-storage medium of claim 1, further comprising: tracking each of the plurality of handlers by monitoring when each batch in the group of batches arrives in the distributed memory, wherein each batch of the group of batches is a heartbeat communication that is provided to the distributed memory at a regular periodic interval from one of the plurality of handlers, and wherein each of the group of batches is a set of log messages captured by one of the plurality of handlers about a component. 4. The non-transitory computer-storage medium of claim 1, further comprising: dynamically modifying the distributed memory to change a size of the distributed memory in response to a current storage load, wherein the current storage load includes an amount of data being stored and an amount of data that is being received for storage, and wherein modifying the distributed memory includes dynamically adding memory by expanding the distributed memory to include additional hosts. 5. The non-transitory computer-storage medium of claim 1, further comprising: writing the formal log to a persistent memory after the formal log has been generated, wherein the formal log is generated after the predefined period of time to account for time skews in receiving batches in the group of batches. 6. The non-transitory computer-storage medium of claim 1, further comprising appending the formal log to a log history that is stored in the distributed memory, wherein the log history is comprised of one or more previous formal logs that include previous batches of log messages that have been sorted and assigned unique identifiers; and maintaining the formal log in the distributed memory to provide access to the log messages in a sorted format. 7. The non-transitory computer-storage medium of claim 6, further comprising: evicting one or more messages from the log history in the distributed memory upon a time limit for the one or more messages expiring; and providing access to the log history in the distributed memory to permit analyzing the formal log. 8. The non-transitory computer-storage medium of claim 1, further comprising: registering a handler as part of the plurality of handlers by providing configuration information to the handler in response to a request from the handler to join a distributed logging system, wherein the plurality of handlers are part of the computing grid that dynamically registers and deregisters components as a current processing load changes. 9. The non-transitory computer-storage medium of claim 1, wherein the predefined period of time spans multiple heartbeat communications from each of the plurality of handlers, wherein each of the multiple heartbeat communications includes a batch of log messages, and wherein a handler of the plurality of handlers provides an empty batch as a heartbeat communication when no log messages have been collected. 10. A computing system for processing log messages from a plurality of handlers that are distributed among a plurality of hosts in a computing grid, comprising: log proxy logic configured to store batches of log messages in a distributed memory, wherein the log proxy logic is configured to receive each of the batches from one of a plurality of handlers, wherein each of the batches includes log messages logged by one of the plurality of handlers about an associated component; and log writer logic configured to generate a formal log from the batches of log messages stored in the distributed memory by collating and sorting log messages in the batches of log messages. 11. The computing system of claim 10, wherein the log writer logic is configured to generate the formal log based, at least in part, on a universal timestamp for each of the log messages, and by assigning a unique identifier to each of the log messages in the group of batches, wherein the log writer logic is configured to generate the formal log after a predefined period of time for receiving the batches of log messages for a reporting period, wherein the predefined period of time includes an amount of time after the reporting period within which batches from the plurality of handlers are expected to be received in the distributed memory, wherein log messages from the reporting period are log messages that occur within a same period of time, and wherein the batches are collected in the distributed memory in an unordered state until the log writer logic generates the formal log. 12. The computing system of claim 10, wherein the log proxy logic is configured to track the plurality of handlers by monitoring when each of the batches are received, wherein each of the batches is a heartbeat communication that is provided to the log proxy logic at a regular periodic interval from one of the plurality of handlers, and wherein each of the batches includes a set of log messages captured by one of the plurality of handlers about a component. 13. The computing system of claim 10, further comprising: log server logic configured to dynamically modify the distributed memory to change a size of the distributed memory in response to a current storage load, wherein the current storage load includes an amount of data being stored and an amount of data that is being received for storage, and wherein the log server logic is configured to modify the distributed memory by adding additional hosts to expand the distributed memory. 14. The computing system of claim 10, wherein the log writer logic is configured to append the formal log to a log history in the distributed memory that includes at least one previous formal log, wherein the log history includes previous batches of log messages that have been sorted and assigned unique identifiers, and wherein the log writer logic is configured to persist the formal log to a persistent memory after collating and sorting the log messages in the batches. 15. The computing system of claim 10, wherein the log writer logic is configured to maintain a log history in the distributed memory to provide access to log messages in the log history in a sorted format, wherein the log history includes at least the formal log. 16. The computing system of claim 10, further comprising: a log evictor logic configured to delete one or more log messages from the log history in the distributed memory upon a time limit for the one or more messages expiring. 17. The computing system of claim 10, wherein the log server logic is configured to analyze the log history in the distributed memory by querying the log history using at least one of, unique identifiers previously assigned to the log messages, a process identifier associated with a log message, a component identifier, a host identifier, and a text phrase embedded within a log message. 18. The computing system of claim 10, wherein the log writer logic is configured to write the formal log to a persistent memory after the formal log has been generated. 19. A computer-implemented method for processing event messages from a plurality of handlers that are distributed among a plurality of hosts in a computing grid, the method comprising: periodically formatting a plurality of event messages in a distributed memory to generate a formal log by (i) collating and sorting the plurality of event messages based, at least in part, on a timestamp for each of the plurality of event messages and (ii) assigning a unique identifier to each of the plurality of event messages, wherein the plurality of event messages are comprised of batches of event messages received from the plurality of hosts for a reporting period, and wherein periodically formatting includes formatting the plurality of event messages after a predefined period of time that includes an amount of time after the reporting period within which the batches from the plurality of handlers are expected to be received in the distributed memory; and maintaining the formal log in the distributed memory to provide access to the plurality of event messages in a sorted format. 20. The computer-implemented method of claim 19, further comprising: appending the formal log to a log history in the distributed memory that is comprised of previous formal logs; and deleting event messages from the log history according to an oldest event message first when the log history is greater than a predefined size.
2,400
7,326
7,326
14,012,597
2,435
Embodiments of the present invention are directed to systems and methods for protecting data assets on a device. In embodiments of the invention, a data protection module dynamically and statically searches for one or more data assets and identifies the data assets based on one or more security and privacy attributes. The data assets are classified based on a policy and protected using one or more protection mechanisms. Additionally, data assets are ranked and a security and privacy map is generated and maintained. The security and privacy map may include association of the data assets with their location, ranking, protection mechanism, etc. In some embodiments, a user interface is provided on the device for viewing and generating the policy and/or the security and privacy map.
1. A method for protecting data assets on a computing device, the method comprising: searching, by a data protection module run by a processor, for at least one data asset on the computing device; identifying, by the data protection module run by the processor, the at least one data asset based on at least one attribute associated with the at least one data asset; classifying the at least one data asset; and generating a map using the classification of the data asset. 2. The method of claim 1, further comprising: ranking the at least one data asset. 3. The method of claim 1, wherein the steps of the searching, identifying and classifying are based on a policy set by one or more entities. 4. The method of claim 3, further comprising: protecting the at least one data asset according to the policy. 5. The method of claim 4, wherein the protecting the at least one data asset includes one or more of an encryption, de-contexting, tokenization, masking, hashing, or deletion of the data asset. 6. The method of claim 3, wherein the one or more entities include an application owner, a user of the computing device, a financial institution, a payment processing network, or an additional service provider. 7. The method of claim 1, wherein the data protection module is part of a downloadable application. 8. The method of claim 1, wherein the data protection module is a standalone application module on the computing device. 9. The method of claim 3, wherein the policy includes a sub-classification of the at least one data asset. 10. A computing device comprising: a processor; and a computer readable medium coupled to the processor, the computer readable medium comprising code, executable by the processor for implementing a method comprising: searching, by a data protection module, for at least one data asset on the computing device; identifying, by the data protection module, the at least one data asset based on at least one attribute associated with the at least one data asset; classifying the at least one data asset; and generating a map using the classification of the data asset. 11. The computing device of claim 10, further comprising: ranking the at least one data asset. 12. The computing device of claim 10, wherein the steps of the searching, identifying and classifying are based on a policy set by one or more entities. 13. The computing device of claim 12, further comprising: protecting the at least one data asset according to the policy. 14. The computing device of claim 13, wherein the protecting the at least one data asset includes one or more of an encryption, de-contexting, tokenization, masking, hashing, or deletion of the data asset. 15. The computing device of claim 10, wherein the data protection module is part of a downloadable application. 16. The computing device of claim 10, wherein the data protection module is a standalone application module. 17. The computing device of claim 10, wherein the computing device is a mobile phone. 18. A system comprising: a server computer; and a computing device communicatively coupled to the server computer through a communications network, the computing device comprising a processor and a computer readable medium coupled to the processor, the computer readable medium comprising code, executable by the processor for implementing a method comprising: searching, by a data protection module, for at least one data asset on the computing device; identifying, by the data protection module, the at least one data asset based on at least one attribute associated with the at least one data asset; classifying the at least one data asset; and generating a map using the classification of the data asset. 19. The system of claim 18, wherein the steps of the searching, identifying and classifying are based on a policy set by one or more entities. 20. The system of claim 18, wherein the data protection module is part of a downloadable application.
Embodiments of the present invention are directed to systems and methods for protecting data assets on a device. In embodiments of the invention, a data protection module dynamically and statically searches for one or more data assets and identifies the data assets based on one or more security and privacy attributes. The data assets are classified based on a policy and protected using one or more protection mechanisms. Additionally, data assets are ranked and a security and privacy map is generated and maintained. The security and privacy map may include association of the data assets with their location, ranking, protection mechanism, etc. In some embodiments, a user interface is provided on the device for viewing and generating the policy and/or the security and privacy map.1. A method for protecting data assets on a computing device, the method comprising: searching, by a data protection module run by a processor, for at least one data asset on the computing device; identifying, by the data protection module run by the processor, the at least one data asset based on at least one attribute associated with the at least one data asset; classifying the at least one data asset; and generating a map using the classification of the data asset. 2. The method of claim 1, further comprising: ranking the at least one data asset. 3. The method of claim 1, wherein the steps of the searching, identifying and classifying are based on a policy set by one or more entities. 4. The method of claim 3, further comprising: protecting the at least one data asset according to the policy. 5. The method of claim 4, wherein the protecting the at least one data asset includes one or more of an encryption, de-contexting, tokenization, masking, hashing, or deletion of the data asset. 6. The method of claim 3, wherein the one or more entities include an application owner, a user of the computing device, a financial institution, a payment processing network, or an additional service provider. 7. The method of claim 1, wherein the data protection module is part of a downloadable application. 8. The method of claim 1, wherein the data protection module is a standalone application module on the computing device. 9. The method of claim 3, wherein the policy includes a sub-classification of the at least one data asset. 10. A computing device comprising: a processor; and a computer readable medium coupled to the processor, the computer readable medium comprising code, executable by the processor for implementing a method comprising: searching, by a data protection module, for at least one data asset on the computing device; identifying, by the data protection module, the at least one data asset based on at least one attribute associated with the at least one data asset; classifying the at least one data asset; and generating a map using the classification of the data asset. 11. The computing device of claim 10, further comprising: ranking the at least one data asset. 12. The computing device of claim 10, wherein the steps of the searching, identifying and classifying are based on a policy set by one or more entities. 13. The computing device of claim 12, further comprising: protecting the at least one data asset according to the policy. 14. The computing device of claim 13, wherein the protecting the at least one data asset includes one or more of an encryption, de-contexting, tokenization, masking, hashing, or deletion of the data asset. 15. The computing device of claim 10, wherein the data protection module is part of a downloadable application. 16. The computing device of claim 10, wherein the data protection module is a standalone application module. 17. The computing device of claim 10, wherein the computing device is a mobile phone. 18. A system comprising: a server computer; and a computing device communicatively coupled to the server computer through a communications network, the computing device comprising a processor and a computer readable medium coupled to the processor, the computer readable medium comprising code, executable by the processor for implementing a method comprising: searching, by a data protection module, for at least one data asset on the computing device; identifying, by the data protection module, the at least one data asset based on at least one attribute associated with the at least one data asset; classifying the at least one data asset; and generating a map using the classification of the data asset. 19. The system of claim 18, wherein the steps of the searching, identifying and classifying are based on a policy set by one or more entities. 20. The system of claim 18, wherein the data protection module is part of a downloadable application.
2,400
7,327
7,327
14,738,598
2,461
One or more aspects of the present disclosure provide for the reliable transmission of control information utilizing a plurality of physical communication links or channels. In some aspects, multi-link diversity may be utilized, wherein control information is jointly encoded and transmitted across a plurality of physical links. In other aspects, selection diversity may be utilized, wherein control information is transmitted across one or more selected links based on a determination that the selected link or links have the best quality, and therefore reliability. Associated data information may be handled in the same way or in a different manner in various aspects of the disclosure.
1. A method of wireless communication, comprising: jointly encoding control information across a plurality of physical links; allocating a portion of the encoded control information to each of the plurality of physical links; and transmitting the encoded control information on each of the plurality of physical links. 2. The method of claim 1, further comprising transmitting data information on each of the plurality of physical links. 3. The method of claim 1, further comprising transmitting the encoded control information substantially simultaneously on each of the plurality of physical links. 4. The method of claim 1, wherein the plurality of physical links correspond to two or more radio access technologies. 5. The method of claim 1, wherein the plurality of physical links correspond to physical channels in different bands. 6. The method of claim 1, wherein the plurality of physical links correspond to a plurality of multiple-input multiple-output (MIMO) configurations. 7. A method of wireless communication, comprising: determining one or more characteristics of a plurality of physical links; selecting one or more physical links from among the plurality of physical links in accordance with the determined characteristics; and transmitting control information on the selected one or more physical links. 8. The method of claim 7, wherein the selecting one or more physical links comprises receiving an indication from a scheduling entity identifying the one or more physical links. 9. The method of claim 7, further comprising transmitting data information on each of the plurality of physical links. 10. The method of claim 7, wherein a first physical link of the plurality of physical links is a link with a first user, and wherein a second physical link of the plurality of physical links is a link with a second user; wherein the selecting one or more physical links comprises selecting the first physical link for the first user and selecting the second physical link for the second user; and wherein the transmitting control information comprises transmitting first control information for the first user on the selected first physical link, and transmitting second control information for the second user on the selected second physical link. 11. An apparatus configured for wireless communication, comprising: an encoder for encoding control information across a plurality of physical links; a scheduler for allocating a portion of the encoded control information to each of the plurality of physical links; and at least one transceiver for transmitting the encoded control information on each of the plurality of physical links. 12. The apparatus of claim 11, wherein the at least one transceiver is further configured for transmitting data information on each of the plurality of physical links. 13. The apparatus of claim 11, wherein the at least one transceiver is further configured for transmitting the encoded control information substantially simultaneously on each of the plurality of physical links. 14. The apparatus of claim 11, wherein the plurality of physical links correspond to two or more radio access technologies. 15. The apparatus of claim 11, wherein the plurality of physical links correspond to physical channels in different bands. 16. The apparatus of claim 11, wherein the plurality of physical links correspond to a plurality of multiple-input multiple-output (MIMO) configurations. 17. An apparatus configured for wireless communication, comprising: at least one transceiver for communicating over a plurality of physical links; a computer-readable storage medium; and at least one processor communicatively coupled to the at least one transceiver and the computer-readable storage medium, wherein the at least one processor is configured to: determine one or more characteristics of the plurality of physical links; select one or more physical links from among the plurality of physical links in accordance with the determined characteristics; and transmit control information on the selected one or more physical links utilizing the at least one transceiver. 18. The apparatus of claim 17, wherein the at least one processor, being configured to select one or more physical links, is further configured to receive an indication from a scheduling entity identifying the one or more physical links. 19. The apparatus of claim 17, wherein the at least one processor is further configured to transmit data information on each of the plurality of physical links utilizing the at least one transceiver. 20. The apparatus of claim 17, wherein a first physical link of the plurality of physical links is a link with a first user, and wherein a second physical link of the plurality of physical links is a link with a second user; wherein the at least one processor, being configured to select one or more physical links, is further configured to select the first physical link for the first user and to select the second physical link for the second user; and wherein the at least one processor, being configured to transmit control information, is further configured to transmit first control information for the first user on the selected first physical link, and to transmit second control information for the second user on the selected second physical link.
One or more aspects of the present disclosure provide for the reliable transmission of control information utilizing a plurality of physical communication links or channels. In some aspects, multi-link diversity may be utilized, wherein control information is jointly encoded and transmitted across a plurality of physical links. In other aspects, selection diversity may be utilized, wherein control information is transmitted across one or more selected links based on a determination that the selected link or links have the best quality, and therefore reliability. Associated data information may be handled in the same way or in a different manner in various aspects of the disclosure.1. A method of wireless communication, comprising: jointly encoding control information across a plurality of physical links; allocating a portion of the encoded control information to each of the plurality of physical links; and transmitting the encoded control information on each of the plurality of physical links. 2. The method of claim 1, further comprising transmitting data information on each of the plurality of physical links. 3. The method of claim 1, further comprising transmitting the encoded control information substantially simultaneously on each of the plurality of physical links. 4. The method of claim 1, wherein the plurality of physical links correspond to two or more radio access technologies. 5. The method of claim 1, wherein the plurality of physical links correspond to physical channels in different bands. 6. The method of claim 1, wherein the plurality of physical links correspond to a plurality of multiple-input multiple-output (MIMO) configurations. 7. A method of wireless communication, comprising: determining one or more characteristics of a plurality of physical links; selecting one or more physical links from among the plurality of physical links in accordance with the determined characteristics; and transmitting control information on the selected one or more physical links. 8. The method of claim 7, wherein the selecting one or more physical links comprises receiving an indication from a scheduling entity identifying the one or more physical links. 9. The method of claim 7, further comprising transmitting data information on each of the plurality of physical links. 10. The method of claim 7, wherein a first physical link of the plurality of physical links is a link with a first user, and wherein a second physical link of the plurality of physical links is a link with a second user; wherein the selecting one or more physical links comprises selecting the first physical link for the first user and selecting the second physical link for the second user; and wherein the transmitting control information comprises transmitting first control information for the first user on the selected first physical link, and transmitting second control information for the second user on the selected second physical link. 11. An apparatus configured for wireless communication, comprising: an encoder for encoding control information across a plurality of physical links; a scheduler for allocating a portion of the encoded control information to each of the plurality of physical links; and at least one transceiver for transmitting the encoded control information on each of the plurality of physical links. 12. The apparatus of claim 11, wherein the at least one transceiver is further configured for transmitting data information on each of the plurality of physical links. 13. The apparatus of claim 11, wherein the at least one transceiver is further configured for transmitting the encoded control information substantially simultaneously on each of the plurality of physical links. 14. The apparatus of claim 11, wherein the plurality of physical links correspond to two or more radio access technologies. 15. The apparatus of claim 11, wherein the plurality of physical links correspond to physical channels in different bands. 16. The apparatus of claim 11, wherein the plurality of physical links correspond to a plurality of multiple-input multiple-output (MIMO) configurations. 17. An apparatus configured for wireless communication, comprising: at least one transceiver for communicating over a plurality of physical links; a computer-readable storage medium; and at least one processor communicatively coupled to the at least one transceiver and the computer-readable storage medium, wherein the at least one processor is configured to: determine one or more characteristics of the plurality of physical links; select one or more physical links from among the plurality of physical links in accordance with the determined characteristics; and transmit control information on the selected one or more physical links utilizing the at least one transceiver. 18. The apparatus of claim 17, wherein the at least one processor, being configured to select one or more physical links, is further configured to receive an indication from a scheduling entity identifying the one or more physical links. 19. The apparatus of claim 17, wherein the at least one processor is further configured to transmit data information on each of the plurality of physical links utilizing the at least one transceiver. 20. The apparatus of claim 17, wherein a first physical link of the plurality of physical links is a link with a first user, and wherein a second physical link of the plurality of physical links is a link with a second user; wherein the at least one processor, being configured to select one or more physical links, is further configured to select the first physical link for the first user and to select the second physical link for the second user; and wherein the at least one processor, being configured to transmit control information, is further configured to transmit first control information for the first user on the selected first physical link, and to transmit second control information for the second user on the selected second physical link.
2,400
7,328
7,328
15,500,657
2,422
The present subject matter relates to data storage in a computing system. In an example, the computing system includes a projector unit including a projector memory. The projector memory may store calibration data pertaining to a plurality of components of the computing system in the projector memory. The plurality of components may include the projector unit and a display unit. Further, the calibration data corresponds to information pertaining to calibrations performed during factory calibration of each of the plurality of components.
1. A computing system comprising: a processor; and a projector unit coupled to the processor, the projector unit comprising: a projector memory; and a projector application programming interface (API) to store calibration data pertaining to a plurality of components of the computing system in the projector memory, the plurality of components comprising the projector unit and a display unit of the computing system, wherein the calibration data corresponds to information pertaining to calibrations performed during factory calibration of each of the plurality of components. 2. The computing system of claim 1, wherein the projector API is to further store configuration data corresponding to each of the plurality of components in the projector memory, the configuration data comprising information pertaining to device configuration of each of the plurality of components. 3. The computing system of claim 2, wherein the projector unit comprises a data restoration module to call the projector API for obtaining device data pertaining to a component, from among the plurality of components, from the projector memory, the device data including at least one of the calibration data and the configuration data. 4. The computing system of claim 1, wherein the projector memory is a persistent memory storage device. 5. The computing system of claim 1, wherein the projector memory comprises at least one of an Electrically Erasable Programmable Read-Only Memory (EEPROM) and a flash memory. 6. The computing system of claim 1, wherein the projector API is to perform a predefined data type declaration command to allocate a memory location in the projector memory for storing the calibration data. 7. The computing system of claim 1, wherein the computing system further comprises the plurality of components, the plurality of components comprising at least one of: a plurality of display units coupled to the processor; and a plurality of sensors coupled to the processor. 8. A computing system comprising: a processor; a plurality of display units coupled to the processor; and a projector unit coupled to the processor, the projector unit comprising a projector memory to store device data pertaining to each of the plurality of display units and the projector unit, wherein the device data includes at least one of calibration data and configuration data. 9. The computing system of claim 8, wherein the projector unit includes a projector application programming interface (API) to perform input-output operations on the projector memory. 10. The computing system of claim 8, wherein the computing system further comprises an image capturing unit coupled to the processor, and wherein the projector memory includes the device data pertaining to the image capturing unit. 11. The computing system of claim 8, wherein the computing system further comprises a sensor cluster unit coupled to the processor, the sensor cluster unit comprising an image capturing unit, and wherein the device data pertaining to the sensor cluster unit is stored in the projector memory. 12. The computing system as claimed in claim 8, wherein the projector memory is a persistent memory storage device. 13. A method comprising: obtaining calibration data pertaining to each of a plurality of components of a computing system, the plurality of components comprising a projector unit and a display unit, wherein the calibration data corresponds to information pertaining to calibrations performed during factory calibration of each of the plurality of components; and storing the calibration data pertaining to each of the plurality of components in a projector memory of the projector unit. 14. The method as claimed in claim 13, wherein the method further comprises: obtaining configuration data pertaining to each of the plurality of components, the configuration data comprising information pertaining to device configuration of each of the plurality of components; and storing the configuration data pertaining to each of the plurality of components in the projector memory of the projector unit. 15. The method as claimed in claim 13, wherein the method further comprises gathering, from the projector memory, the calibration data pertaining to a component from among the plurality of components, on receiving a request to provide the calibration data.
The present subject matter relates to data storage in a computing system. In an example, the computing system includes a projector unit including a projector memory. The projector memory may store calibration data pertaining to a plurality of components of the computing system in the projector memory. The plurality of components may include the projector unit and a display unit. Further, the calibration data corresponds to information pertaining to calibrations performed during factory calibration of each of the plurality of components.1. A computing system comprising: a processor; and a projector unit coupled to the processor, the projector unit comprising: a projector memory; and a projector application programming interface (API) to store calibration data pertaining to a plurality of components of the computing system in the projector memory, the plurality of components comprising the projector unit and a display unit of the computing system, wherein the calibration data corresponds to information pertaining to calibrations performed during factory calibration of each of the plurality of components. 2. The computing system of claim 1, wherein the projector API is to further store configuration data corresponding to each of the plurality of components in the projector memory, the configuration data comprising information pertaining to device configuration of each of the plurality of components. 3. The computing system of claim 2, wherein the projector unit comprises a data restoration module to call the projector API for obtaining device data pertaining to a component, from among the plurality of components, from the projector memory, the device data including at least one of the calibration data and the configuration data. 4. The computing system of claim 1, wherein the projector memory is a persistent memory storage device. 5. The computing system of claim 1, wherein the projector memory comprises at least one of an Electrically Erasable Programmable Read-Only Memory (EEPROM) and a flash memory. 6. The computing system of claim 1, wherein the projector API is to perform a predefined data type declaration command to allocate a memory location in the projector memory for storing the calibration data. 7. The computing system of claim 1, wherein the computing system further comprises the plurality of components, the plurality of components comprising at least one of: a plurality of display units coupled to the processor; and a plurality of sensors coupled to the processor. 8. A computing system comprising: a processor; a plurality of display units coupled to the processor; and a projector unit coupled to the processor, the projector unit comprising a projector memory to store device data pertaining to each of the plurality of display units and the projector unit, wherein the device data includes at least one of calibration data and configuration data. 9. The computing system of claim 8, wherein the projector unit includes a projector application programming interface (API) to perform input-output operations on the projector memory. 10. The computing system of claim 8, wherein the computing system further comprises an image capturing unit coupled to the processor, and wherein the projector memory includes the device data pertaining to the image capturing unit. 11. The computing system of claim 8, wherein the computing system further comprises a sensor cluster unit coupled to the processor, the sensor cluster unit comprising an image capturing unit, and wherein the device data pertaining to the sensor cluster unit is stored in the projector memory. 12. The computing system as claimed in claim 8, wherein the projector memory is a persistent memory storage device. 13. A method comprising: obtaining calibration data pertaining to each of a plurality of components of a computing system, the plurality of components comprising a projector unit and a display unit, wherein the calibration data corresponds to information pertaining to calibrations performed during factory calibration of each of the plurality of components; and storing the calibration data pertaining to each of the plurality of components in a projector memory of the projector unit. 14. The method as claimed in claim 13, wherein the method further comprises: obtaining configuration data pertaining to each of the plurality of components, the configuration data comprising information pertaining to device configuration of each of the plurality of components; and storing the configuration data pertaining to each of the plurality of components in the projector memory of the projector unit. 15. The method as claimed in claim 13, wherein the method further comprises gathering, from the projector memory, the calibration data pertaining to a component from among the plurality of components, on receiving a request to provide the calibration data.
2,400
7,329
7,329
13,378,115
2,431
A system for providing bi-directional visualization of authority of users over SACs in an enterprise-wide network, the system including functionality for providing user-wise visualization of the authority of a given user over at least one SAC in respect of which the user has authority, and functionality for providing SAC-wise visualization for a given SAC of the authority of at least one user over the given SAC.
1. A system for providing bi-directional visualization of authority of users over SACs in an enterprise-wide network, the system comprising: functionality for providing user-wise visualization of the authority of a given user over at least one SAC in respect of which the user has authority; and functionality for providing SAC-wise visualization for a given SAC of the authority of at least one user over said given SAC. 2. A system according to claim 1 and wherein: said SACs do not include data elements; and said functionality for providing user-wise visualization does not provide visualization of authority of a given user over data elements. 3. A system according to claim 1 and wherein: said SACs do not include data elements; and said functionality for providing user-wise visualization also provides visualization of authority of a given user over data elements. 4. A system according to claim 1 and wherein: said SACs include data elements; and said functionality for providing user-wise visualization does not provide visualization of authority of a given user over said data elements. 5. A system according to claim 1 and wherein: said SACs include data elements; and said functionality for providing user-wise visualization also provides visualization of authority of a given user over said data elements. 6. A system according to claim 1 and also comprising: functionality for providing user-wise monitoring and reporting of the exercise of authority by a given user over at least one SAC with respect to which the user has authority; and functionality for providing SAC-wise monitoring and reporting of the exercise of authority over a given SAC by at least one user having authority over said given SAC. 7. A system for providing monitoring and bi-directional reporting of the exercise of authority by users and SACs in an enterprise-wide network, the system comprising: functionality for providing user-wise monitoring and reporting of the exercise of authority by a given user over at least one SAC with respect to which the user has authority; and functionality for providing SAC-wise monitoring and reporting of the exercise of authority over a given SAC by at least one user having authority over said given SAC. 8. A system according to claim 7 and also comprising: functionality for providing user-wise visualization of the authority of a given user over at least one SAC in respect of which the user has authority; and functionality for providing SAC-wise visualization for a given SAC of the authority of at least one user over said given SAC. 9. A system according to claim 8 and wherein: said SACs do not include data elements; and said functionality for providing user-wise visualization does not provide visualization of authority of a given user over data elements. 10. A system according to claim 8 and wherein: said SACs do not include data elements; and said functionality for providing user-wise visualization also provides visualization of authority of a given user over data elements. 11. A system according to claim 8 and wherein: said SACs include data elements; and said functionality for providing user-wise visualization does not provide visualization of authority of a given user over said data elements. 12. A system according to claim 8 and wherein: said SACs include data elements; and said functionality for providing user-wise visualization also provides visualization of authority of a given user over said data elements. 13. A method for providing bi-directional visualization of authority of users over SACs in an enterprise-wide network, the method comprising: providing user-wise visualization of the authority of a given user over at least one SAC in respect of which the user has authority; and providing SAC-wise visualization for a given SAC of the authority of at least one user over said given SAC. 14. A method according to claim 13 and wherein: said SACs do not include data elements; and said providing user-wise visualization does not include providing visualization of authority of a given user over data elements. 15. A method according to claim 13 and wherein: said SACs do not include data elements; and said providing user-wise visualization also includes providing visualization of authority of a given user over data elements. 16. A method according to claim 13 and wherein: said SACs include data elements; and said providing user-wise visualization does not include providing visualization of authority of a given user over said data elements. 17. A method according to claim 13 and wherein: said SACs include data elements; and said providing user-wise visualization also includes providing visualization of authority of a given user over said data elements. 18. A method according to claim 13 and also comprising: providing user-wise monitoring and reporting of the exercise of authority by a given user over at least one SAC with respect to which the user has authority; and providing SAC-wise monitoring and reporting of the exercise of authority over a given SAC by at least one user having authority over said given SAC. 19. A method for providing monitoring and bi-directional reporting of the exercise of authority by users and SACs in an enterprise-wide network, the method comprising: providing user-wise monitoring and reporting of the exercise of authority by a given user over at least one SAC with respect to which the user has authority; and providing SAC-wise monitoring and reporting of the exercise of authority over a given SAC by at least one user having authority over said given SAC. 20. A method according to claim 19 and also comprising: providing user-wise visualization of the authority of a given user over at least one SAC in respect of which the user has authority; and providing SAC-wise visualization for a given SAC of the authority of at least one user over said given SAC. 21. A method according to claim 20 and wherein: said SACs do not include data elements; and said providing user-wise visualization does not include providing visualization of authority of a given user over data elements. 22. A method according to claim 20 and wherein: said SACs do not include data elements; and said providing user-wise visualization also includes providing visualization of authority of a given user over data elements. 23. A method according to claim 20 and wherein: said SACs include data elements; and said providing user-wise visualization does not include providing visualization of authority of a given user over said data elements. 24. A method according to claim 20 and wherein: said SACs include data elements; and said providing user-wise visualization also includes providing visualization of authority of a given user over said data elements.
A system for providing bi-directional visualization of authority of users over SACs in an enterprise-wide network, the system including functionality for providing user-wise visualization of the authority of a given user over at least one SAC in respect of which the user has authority, and functionality for providing SAC-wise visualization for a given SAC of the authority of at least one user over the given SAC.1. A system for providing bi-directional visualization of authority of users over SACs in an enterprise-wide network, the system comprising: functionality for providing user-wise visualization of the authority of a given user over at least one SAC in respect of which the user has authority; and functionality for providing SAC-wise visualization for a given SAC of the authority of at least one user over said given SAC. 2. A system according to claim 1 and wherein: said SACs do not include data elements; and said functionality for providing user-wise visualization does not provide visualization of authority of a given user over data elements. 3. A system according to claim 1 and wherein: said SACs do not include data elements; and said functionality for providing user-wise visualization also provides visualization of authority of a given user over data elements. 4. A system according to claim 1 and wherein: said SACs include data elements; and said functionality for providing user-wise visualization does not provide visualization of authority of a given user over said data elements. 5. A system according to claim 1 and wherein: said SACs include data elements; and said functionality for providing user-wise visualization also provides visualization of authority of a given user over said data elements. 6. A system according to claim 1 and also comprising: functionality for providing user-wise monitoring and reporting of the exercise of authority by a given user over at least one SAC with respect to which the user has authority; and functionality for providing SAC-wise monitoring and reporting of the exercise of authority over a given SAC by at least one user having authority over said given SAC. 7. A system for providing monitoring and bi-directional reporting of the exercise of authority by users and SACs in an enterprise-wide network, the system comprising: functionality for providing user-wise monitoring and reporting of the exercise of authority by a given user over at least one SAC with respect to which the user has authority; and functionality for providing SAC-wise monitoring and reporting of the exercise of authority over a given SAC by at least one user having authority over said given SAC. 8. A system according to claim 7 and also comprising: functionality for providing user-wise visualization of the authority of a given user over at least one SAC in respect of which the user has authority; and functionality for providing SAC-wise visualization for a given SAC of the authority of at least one user over said given SAC. 9. A system according to claim 8 and wherein: said SACs do not include data elements; and said functionality for providing user-wise visualization does not provide visualization of authority of a given user over data elements. 10. A system according to claim 8 and wherein: said SACs do not include data elements; and said functionality for providing user-wise visualization also provides visualization of authority of a given user over data elements. 11. A system according to claim 8 and wherein: said SACs include data elements; and said functionality for providing user-wise visualization does not provide visualization of authority of a given user over said data elements. 12. A system according to claim 8 and wherein: said SACs include data elements; and said functionality for providing user-wise visualization also provides visualization of authority of a given user over said data elements. 13. A method for providing bi-directional visualization of authority of users over SACs in an enterprise-wide network, the method comprising: providing user-wise visualization of the authority of a given user over at least one SAC in respect of which the user has authority; and providing SAC-wise visualization for a given SAC of the authority of at least one user over said given SAC. 14. A method according to claim 13 and wherein: said SACs do not include data elements; and said providing user-wise visualization does not include providing visualization of authority of a given user over data elements. 15. A method according to claim 13 and wherein: said SACs do not include data elements; and said providing user-wise visualization also includes providing visualization of authority of a given user over data elements. 16. A method according to claim 13 and wherein: said SACs include data elements; and said providing user-wise visualization does not include providing visualization of authority of a given user over said data elements. 17. A method according to claim 13 and wherein: said SACs include data elements; and said providing user-wise visualization also includes providing visualization of authority of a given user over said data elements. 18. A method according to claim 13 and also comprising: providing user-wise monitoring and reporting of the exercise of authority by a given user over at least one SAC with respect to which the user has authority; and providing SAC-wise monitoring and reporting of the exercise of authority over a given SAC by at least one user having authority over said given SAC. 19. A method for providing monitoring and bi-directional reporting of the exercise of authority by users and SACs in an enterprise-wide network, the method comprising: providing user-wise monitoring and reporting of the exercise of authority by a given user over at least one SAC with respect to which the user has authority; and providing SAC-wise monitoring and reporting of the exercise of authority over a given SAC by at least one user having authority over said given SAC. 20. A method according to claim 19 and also comprising: providing user-wise visualization of the authority of a given user over at least one SAC in respect of which the user has authority; and providing SAC-wise visualization for a given SAC of the authority of at least one user over said given SAC. 21. A method according to claim 20 and wherein: said SACs do not include data elements; and said providing user-wise visualization does not include providing visualization of authority of a given user over data elements. 22. A method according to claim 20 and wherein: said SACs do not include data elements; and said providing user-wise visualization also includes providing visualization of authority of a given user over data elements. 23. A method according to claim 20 and wherein: said SACs include data elements; and said providing user-wise visualization does not include providing visualization of authority of a given user over said data elements. 24. A method according to claim 20 and wherein: said SACs include data elements; and said providing user-wise visualization also includes providing visualization of authority of a given user over said data elements.
2,400
7,330
7,330
12,346,258
2,443
Apparatus and method by which Internet Protocol (IP) traffic can be transferred (i.e. handoff) between two different terminals operating according to two different technology standards in two different systems with two different IP addresses. For example, a session handoff can be made between a terminal in Wireless Local Area Network (WLAN) a terminal in a 3GPP UMTS or between a terminal in CDMA2000 and a terminal in a 3GPP UMTS. These terminals can be either physically separate entities or logical entities that are encapsulated within a common enclosure.
1. A method for handing off a communication session from a first terminal having a first internet protocol (IP) address to a second terminal having a second IP address, the method comprising: requesting a handoff of a current communication session from the first terminal to the second; obtaining connection information associated with the second terminal, the connection information including the second IP address associated with the second terminal; and rerouting the current communication session from the first terminal to the second terminal based on the second IP address. 2. The method of claim 1 further comprising: receiving a confirmation of the second IP address. 3. The method of claim 1 wherein the obtaining the second IP address further comprises: checking an existence of the second IP address. 4. The method of claim 1 wherein the obtaining the connection information further comprises: obtaining the connection information from the subscriber in the event that the first system does not have the connection information. 5. The method of claim 1 further comprising: obtaining a system ID and a terminal ID of the second terminal. 6. The method of claim 1 wherein the first and second terminals are separate independent entities. 7. The method of claim 1 further comprising: receiving an alert at the first terminal to ensure that the second terminal is on and is connected. 8. The method of claim 1 further comprising: contacting a home subscriber server (HSS) to obtain the second IP address. 9. The method of claim 1 further comprising receiving input from a user at the first terminal, and wherein the requesting the handoff is performed in response to the user input. 10. The method of claim 1 wherein the requesting the handoff is performed in response to a link performance metric. 11. The method of claim 10, wherein the link performance metric is a power measurement of an active communication link. 12. The method of claim 10, wherein the link performance metric is a physical layer frame error rate. 13. The method of claim 10, wherein the link performance metric is a medium access control (MAC) layer frame error rate. 14. The method of claim 10, wherein the link performance metric is an internet protocol (IP) frame error rate.
Apparatus and method by which Internet Protocol (IP) traffic can be transferred (i.e. handoff) between two different terminals operating according to two different technology standards in two different systems with two different IP addresses. For example, a session handoff can be made between a terminal in Wireless Local Area Network (WLAN) a terminal in a 3GPP UMTS or between a terminal in CDMA2000 and a terminal in a 3GPP UMTS. These terminals can be either physically separate entities or logical entities that are encapsulated within a common enclosure.1. A method for handing off a communication session from a first terminal having a first internet protocol (IP) address to a second terminal having a second IP address, the method comprising: requesting a handoff of a current communication session from the first terminal to the second; obtaining connection information associated with the second terminal, the connection information including the second IP address associated with the second terminal; and rerouting the current communication session from the first terminal to the second terminal based on the second IP address. 2. The method of claim 1 further comprising: receiving a confirmation of the second IP address. 3. The method of claim 1 wherein the obtaining the second IP address further comprises: checking an existence of the second IP address. 4. The method of claim 1 wherein the obtaining the connection information further comprises: obtaining the connection information from the subscriber in the event that the first system does not have the connection information. 5. The method of claim 1 further comprising: obtaining a system ID and a terminal ID of the second terminal. 6. The method of claim 1 wherein the first and second terminals are separate independent entities. 7. The method of claim 1 further comprising: receiving an alert at the first terminal to ensure that the second terminal is on and is connected. 8. The method of claim 1 further comprising: contacting a home subscriber server (HSS) to obtain the second IP address. 9. The method of claim 1 further comprising receiving input from a user at the first terminal, and wherein the requesting the handoff is performed in response to the user input. 10. The method of claim 1 wherein the requesting the handoff is performed in response to a link performance metric. 11. The method of claim 10, wherein the link performance metric is a power measurement of an active communication link. 12. The method of claim 10, wherein the link performance metric is a physical layer frame error rate. 13. The method of claim 10, wherein the link performance metric is a medium access control (MAC) layer frame error rate. 14. The method of claim 10, wherein the link performance metric is an internet protocol (IP) frame error rate.
2,400
7,331
7,331
15,031,503
2,439
A method and system for providing predictive analytics which include calculating forecast trend curves utilizing historical events, determining which of the forecast trend curves best fit the historical events to form a first best fit forecast trend curve, comparing predicted events from the first best fit forecast trend curve with real-time events, based on the real-time security events deviating from the first best fit forecast trend curve by a threshold amount, calculating additional forecast trend curves utilizing the real-time events, and determining which of the forecast trend curves and first best fit forecast trend curve best fits the real-time events to form a second best fit forecast trend curve.
1. A predictive analytics device, comprising: a trend calculation engine to calculate a first plurality of model forecast trend curves utilizing historical events; a best fit determination engine to determine which of the first plurality of model forecast trend curves best fits the historical events to form a first best fit forecast trend curve; and a comparison engine to compare predicted events from the first best fit forecast trend curve with the real-time events and determine that the predicted events from the first best fit forecast trend curve deviate by more than a threshold from the real-time events; wherein the calculation engine further is to calculate, based on the real-time events deviating from the predicted events from the first best fit forecast trend curve by a threshold, a second plurality of model forecast trend curves utilizing the real-time events; and wherein the best fit determination engine is further to determine which of the second plurality of forecast trend curves and first best fit forecast trend curve best fits the real-time events to form a second best fit forecast trend curve. 2. The device of claim 1, wherein the first best fit forecast trend curve comprises a plurality of best fit forecast trend sub-curves. 3. The device of claim 1, wherein the comparison engine is further to determine the threshold based on a number of predicted events from the first best fit forecast trend curve that deviate from the real-time events. 4. The device of claim 1, wherein the comparison engine is further to determine the threshold based on an amount the predicted events from the first best fit forecast trend curve deviates from the real-time events. 5. The device of claim 1, wherein the calculation engine is further to calculate, based on the real-time events deviating from predicted events from the second best fit forecast trend curve by a threshold amount, a third plurality of model forecast trend curves utilizing the real-time events; and wherein the best fit determination engine is further to determine which of the third plurality of model forecast trend curves and second best fit forecast trend curve best fits the real-time events to form a third best fit forecast trend curve. 6. A non-transitory machine-readable storage medium storing instructions that, if executed by at least one processor of a device for providing predictive analytics for real-time security events, cause the device to: calculate a first plurality of forecast trend curves utilizing different mathematical formulas for each of the first plurality of forecast trend curves and utilizing historical security events; determine which of the first plurality of forecast trend curves best fits the historical security events to form a first best fit forecast trend curve; compare predicted security events from the first best fit forecast trend curve with real-time security events; calculate, based on the real-time security events deviating from the predicted security events from the first best fit forecast trend curve by a threshold amount, a second plurality of forecast trend curves utilizing a different mathematical formula from the formula utilized to form the first best fit forecast trend curve and utilizing the real-time security events; and determine which of the second plurality of forecast trend curves and first best fit forecast trend curve best fits the real-time security events to form a second best fit forecast trend curve. 7. The non-transitory machine-readable storage medium of claim 6, further comprising instructions that, if executed by the at least one processor, causes the device to: calculate, based on the real-time security events deviating from predicted security events from the second best fit forecast trend curve by a threshold amount, a third plurality of forecast trend curves utilizing a different mathematical formula from the formula utilized to form the second best fit forecast trend curve and utilizing the real-time security events; and determine which of the third plurality of forecast trend curves and second best fit forecast trend curve best fits the real-time security events to form a third best fit forecast trend curve. 8. The non-transitory machine-readable storage medium of claim 6, wherein the first best fit forecast trend curve comprises a plurality of best fit forecast trend sub-curves. 9. The non-transitory machine-readable storage medium of claim 8, further comprising instructions that, if executed by the at least one processor, causes the device to determine the threshold based on a variation percentage between the predicted security events from the first best fit forecast trend curve and the real-time events. 10. The non-transitory machine-readable storage medium of claim 8, wherein the real-time security events comprise network activity security events, user activity security events, or node activity security events. 11. A method for providing predictive analytics utilizing real-time security events comprising: calculating, by at least one processor, a first plurality of forecast trend curves utilizing historical security events; determining, by the at least one processor, which of the first plurality of forecast trend curves best fits the historical security events to form a first best fit forecast trend curve; comparing, by the at least one processor, predicted security events from the first best fit forecast trend curve with real-time security events; calculating, by the at least one processor, based on the real-time security events deviating from the predicted security events from the first best fit forecast trend curve by a threshold amount, a second plurality of forecast trend curves utilizing the real-time security events; and determining, by the at least one processor, which of the second plurality of forecast trend curves and first best fit forecast trend curve best fits the real-time security events to form a second best fit forecast trend curve. 12. The method of claim 11, further comprising: calculating, by the at least one processor, based on the real-time security events deviating from predicted security events from the second best fit forecast trend curve by a threshold amount, a third plurality of forecast trend curves utilizing the real-time security events; and determining, by the at least one processor, which of the third plurality of forecast trend curves and second best fit forecast trend curve best fits the real-time security events to form a third best fit forecast trend curve. 13. The method of claim 11, wherein the first best fit forecast trend curve comprises a plurality of best fit forecast trend sub-curves. 14. The method of claim 11, further comprising determining, by the at least one processor, the threshold based on a number of predicted security events from the first best fit forecast trend curve deviating from the real-time security events. 15. The method of claim 11, wherein the real-time security events comprise network activity security events, user activity security events, or node activity security events.
A method and system for providing predictive analytics which include calculating forecast trend curves utilizing historical events, determining which of the forecast trend curves best fit the historical events to form a first best fit forecast trend curve, comparing predicted events from the first best fit forecast trend curve with real-time events, based on the real-time security events deviating from the first best fit forecast trend curve by a threshold amount, calculating additional forecast trend curves utilizing the real-time events, and determining which of the forecast trend curves and first best fit forecast trend curve best fits the real-time events to form a second best fit forecast trend curve.1. A predictive analytics device, comprising: a trend calculation engine to calculate a first plurality of model forecast trend curves utilizing historical events; a best fit determination engine to determine which of the first plurality of model forecast trend curves best fits the historical events to form a first best fit forecast trend curve; and a comparison engine to compare predicted events from the first best fit forecast trend curve with the real-time events and determine that the predicted events from the first best fit forecast trend curve deviate by more than a threshold from the real-time events; wherein the calculation engine further is to calculate, based on the real-time events deviating from the predicted events from the first best fit forecast trend curve by a threshold, a second plurality of model forecast trend curves utilizing the real-time events; and wherein the best fit determination engine is further to determine which of the second plurality of forecast trend curves and first best fit forecast trend curve best fits the real-time events to form a second best fit forecast trend curve. 2. The device of claim 1, wherein the first best fit forecast trend curve comprises a plurality of best fit forecast trend sub-curves. 3. The device of claim 1, wherein the comparison engine is further to determine the threshold based on a number of predicted events from the first best fit forecast trend curve that deviate from the real-time events. 4. The device of claim 1, wherein the comparison engine is further to determine the threshold based on an amount the predicted events from the first best fit forecast trend curve deviates from the real-time events. 5. The device of claim 1, wherein the calculation engine is further to calculate, based on the real-time events deviating from predicted events from the second best fit forecast trend curve by a threshold amount, a third plurality of model forecast trend curves utilizing the real-time events; and wherein the best fit determination engine is further to determine which of the third plurality of model forecast trend curves and second best fit forecast trend curve best fits the real-time events to form a third best fit forecast trend curve. 6. A non-transitory machine-readable storage medium storing instructions that, if executed by at least one processor of a device for providing predictive analytics for real-time security events, cause the device to: calculate a first plurality of forecast trend curves utilizing different mathematical formulas for each of the first plurality of forecast trend curves and utilizing historical security events; determine which of the first plurality of forecast trend curves best fits the historical security events to form a first best fit forecast trend curve; compare predicted security events from the first best fit forecast trend curve with real-time security events; calculate, based on the real-time security events deviating from the predicted security events from the first best fit forecast trend curve by a threshold amount, a second plurality of forecast trend curves utilizing a different mathematical formula from the formula utilized to form the first best fit forecast trend curve and utilizing the real-time security events; and determine which of the second plurality of forecast trend curves and first best fit forecast trend curve best fits the real-time security events to form a second best fit forecast trend curve. 7. The non-transitory machine-readable storage medium of claim 6, further comprising instructions that, if executed by the at least one processor, causes the device to: calculate, based on the real-time security events deviating from predicted security events from the second best fit forecast trend curve by a threshold amount, a third plurality of forecast trend curves utilizing a different mathematical formula from the formula utilized to form the second best fit forecast trend curve and utilizing the real-time security events; and determine which of the third plurality of forecast trend curves and second best fit forecast trend curve best fits the real-time security events to form a third best fit forecast trend curve. 8. The non-transitory machine-readable storage medium of claim 6, wherein the first best fit forecast trend curve comprises a plurality of best fit forecast trend sub-curves. 9. The non-transitory machine-readable storage medium of claim 8, further comprising instructions that, if executed by the at least one processor, causes the device to determine the threshold based on a variation percentage between the predicted security events from the first best fit forecast trend curve and the real-time events. 10. The non-transitory machine-readable storage medium of claim 8, wherein the real-time security events comprise network activity security events, user activity security events, or node activity security events. 11. A method for providing predictive analytics utilizing real-time security events comprising: calculating, by at least one processor, a first plurality of forecast trend curves utilizing historical security events; determining, by the at least one processor, which of the first plurality of forecast trend curves best fits the historical security events to form a first best fit forecast trend curve; comparing, by the at least one processor, predicted security events from the first best fit forecast trend curve with real-time security events; calculating, by the at least one processor, based on the real-time security events deviating from the predicted security events from the first best fit forecast trend curve by a threshold amount, a second plurality of forecast trend curves utilizing the real-time security events; and determining, by the at least one processor, which of the second plurality of forecast trend curves and first best fit forecast trend curve best fits the real-time security events to form a second best fit forecast trend curve. 12. The method of claim 11, further comprising: calculating, by the at least one processor, based on the real-time security events deviating from predicted security events from the second best fit forecast trend curve by a threshold amount, a third plurality of forecast trend curves utilizing the real-time security events; and determining, by the at least one processor, which of the third plurality of forecast trend curves and second best fit forecast trend curve best fits the real-time security events to form a third best fit forecast trend curve. 13. The method of claim 11, wherein the first best fit forecast trend curve comprises a plurality of best fit forecast trend sub-curves. 14. The method of claim 11, further comprising determining, by the at least one processor, the threshold based on a number of predicted security events from the first best fit forecast trend curve deviating from the real-time security events. 15. The method of claim 11, wherein the real-time security events comprise network activity security events, user activity security events, or node activity security events.
2,400
7,332
7,332
12,782,404
2,482
A mug shot acquisition system is disclosed that includes an image acquisition interface that is operative to receive digital mug shot images from an imaging device. An image viewing display is responsive to the image acquisition interface and operative to display the received digital mug shot images. One or more standards-based image adjustment software tools allow the digital mug shot images to be adjusted to meet at least one predetermined mug shot image uniformity standard. The system also includes a software interface responsive to requests to initiate one or more operations by the mug shot acquisition system, and an image export interface operative to export digital mug shot images adjusted based on the standards-based image adjustment software.
1. A mug shot acquisition system, comprising: an image acquisition interface operative to receive digital mug shot images from an imaging device, an image viewing display responsive to the image acquisition interface and operative to display the received digital mug shot images, one or more standards-based image adjustment software tools operative to allow the digital mug shot images to be adjusted to meet at least one predetermined mug shot image uniformity standard, a software interface responsive to requests to initiate one or more operations by the mug shot acquisition system, and an image export interface operative to export digital mug shot images adjusted based on the standards-based image adjustment software. 2. The apparatus of claim 1 wherein the system further includes storage for machine-readable standards and wherein the standards based-image adjustment software tools include at least one tool that automatically applies a standard. 3. The apparatus of claim 1 wherein the standards-based image adjustment software tools include standards compliance display indicators that are operative to indicate a degree of compliance of an image with at least one predetermined standard. 4. The apparatus of claim 1 wherein the standards-based image adjustment software tool includes a background calibration tool operative to apply at least one predetermined standard to a background against which a digital mug shot image is to be acquired. 5. The apparatus of claim 4 wherein the background calibration tool is operative to evaluate a background for uniformity of illumination against a predetermined standard for uniformity of illumination and is operative to present an indication of compliance to the standard to the user. 6. The apparatus of claim 5 wherein the background calibration tool is operative to provide at least one spatial indicator to convey spatial information about non-uniformity of illumination. 7. The apparatus of claim 4 wherein the background calibration tool is operative to apply at least one predetermined image color content standard to the digital mug shot images. 8. The apparatus of claim 1 wherein the standards-based image adjustment software is operative to apply at least one predetermined pixel-size standard to the digital mug shot images. 9. The apparatus of claim 1 wherein the standards-based image adjustment software tools include an exposure validation tool operative to validate an exposure level for at least one digital mug shot image according to a predetermined standard. 10. The apparatus of claim 9 wherein the exposure validation tool is operative to detect hot spots and shadows. 11. The apparatus of claim 1 wherein the standards-based image adjustment software tools include a framing tool. 12. The apparatus of claim 11 wherein the framing tool provides automated assistance to a system user in framing the face, head, and shoulders according to a predetermined standard. 13. The apparatus of claim 11 wherein the framing tool is operative to provide at least one on-screen movable image alignment reference that is operative to be displayed in the display at the same time as is a digital mug shot image. 14. The apparatus of claim 13 wherein the framing tool includes automatic subject tracking logic operative to automatically position the at least on reference relative to at least one anatomical feature of the mug shot subject. 15. The apparatus of claim 11 wherein the framing tool includes manual guide positioning logic responsive to user input to manually position the at least one reference relative to the at least one anatomical feature of the mug shot subject. 16. The apparatus of claim 11 wherein the framing tool is operative to provide references for a width, a horizontal mid-point, and an eye level of a subject face. 17. The apparatus of claim 1 wherein the image acquisition interface is a universal interface that is operative to acquire digital mug shot images from different types of image sources. 18. The apparatus of claim 17 wherein the image acquisition interface is operative to interface with still image cameras and video cameras. 19. The apparatus of claim 1 wherein the image acquisition interface is operative to convey an acquisition triggering control to the image source while an image received from the interface is being displayed on the display. 20. The apparatus of claim 1 wherein the display includes a window in a larger display device associated with a general-purpose computer. 21. The apparatus of claim 1 wherein the standards-based image adjustment software tools include a depth-of-field validation tool operative to apply a predetermined depth of field standard to the digital mug shot images. 22. The apparatus of claim 1 wherein the image acquisition interface is responsive to one or more image acquisition controls displayed in the display. 23. The apparatus of claim 1 wherein the image acquisition interface is a digital camera interface and includes a digital camera cable and wherein the system further includes a digital camera mount within range of the digital camera cable. 24. The apparatus of claim 1 further including user interface logic operative to display a pose selection control, a capture control, and a camera window in the display. 25. The apparatus of claim 24 wherein the user interface logic is further operative to display a thumbnail icon area that presents icons that each correspond to different types of mug shot images. 26. The apparatus of claim 1 wherein the software interface is responsive to a launch command to launch the mug shot acquisition system. 27. The apparatus of claim 26 wherein the software interface is responsive to the launch command together with at least one parameter. 28. The apparatus of claim 1 wherein the software interface is constructed to allow a transfer of control that does not provide any significant cue that different programs are being used. 29. The apparatus of claim 1 wherein the software interface is constructed to allow a transfer of control from a records management system. 30. A mug shot acquisition system, comprising: means for receiving digital mug shot images from an imaging device, means for displaying the received digital mug shot images, standards-based image adjustment means for allowing the digital mug shot images to be adjusted to meet at least one predetermined mug shot image uniformity standard, means responsive to software requests to initiate one or more operations by the mug shot acquisition system, and means for exporting digital mug shot images adjusted based on the standards-based image adjustment means.
A mug shot acquisition system is disclosed that includes an image acquisition interface that is operative to receive digital mug shot images from an imaging device. An image viewing display is responsive to the image acquisition interface and operative to display the received digital mug shot images. One or more standards-based image adjustment software tools allow the digital mug shot images to be adjusted to meet at least one predetermined mug shot image uniformity standard. The system also includes a software interface responsive to requests to initiate one or more operations by the mug shot acquisition system, and an image export interface operative to export digital mug shot images adjusted based on the standards-based image adjustment software.1. A mug shot acquisition system, comprising: an image acquisition interface operative to receive digital mug shot images from an imaging device, an image viewing display responsive to the image acquisition interface and operative to display the received digital mug shot images, one or more standards-based image adjustment software tools operative to allow the digital mug shot images to be adjusted to meet at least one predetermined mug shot image uniformity standard, a software interface responsive to requests to initiate one or more operations by the mug shot acquisition system, and an image export interface operative to export digital mug shot images adjusted based on the standards-based image adjustment software. 2. The apparatus of claim 1 wherein the system further includes storage for machine-readable standards and wherein the standards based-image adjustment software tools include at least one tool that automatically applies a standard. 3. The apparatus of claim 1 wherein the standards-based image adjustment software tools include standards compliance display indicators that are operative to indicate a degree of compliance of an image with at least one predetermined standard. 4. The apparatus of claim 1 wherein the standards-based image adjustment software tool includes a background calibration tool operative to apply at least one predetermined standard to a background against which a digital mug shot image is to be acquired. 5. The apparatus of claim 4 wherein the background calibration tool is operative to evaluate a background for uniformity of illumination against a predetermined standard for uniformity of illumination and is operative to present an indication of compliance to the standard to the user. 6. The apparatus of claim 5 wherein the background calibration tool is operative to provide at least one spatial indicator to convey spatial information about non-uniformity of illumination. 7. The apparatus of claim 4 wherein the background calibration tool is operative to apply at least one predetermined image color content standard to the digital mug shot images. 8. The apparatus of claim 1 wherein the standards-based image adjustment software is operative to apply at least one predetermined pixel-size standard to the digital mug shot images. 9. The apparatus of claim 1 wherein the standards-based image adjustment software tools include an exposure validation tool operative to validate an exposure level for at least one digital mug shot image according to a predetermined standard. 10. The apparatus of claim 9 wherein the exposure validation tool is operative to detect hot spots and shadows. 11. The apparatus of claim 1 wherein the standards-based image adjustment software tools include a framing tool. 12. The apparatus of claim 11 wherein the framing tool provides automated assistance to a system user in framing the face, head, and shoulders according to a predetermined standard. 13. The apparatus of claim 11 wherein the framing tool is operative to provide at least one on-screen movable image alignment reference that is operative to be displayed in the display at the same time as is a digital mug shot image. 14. The apparatus of claim 13 wherein the framing tool includes automatic subject tracking logic operative to automatically position the at least on reference relative to at least one anatomical feature of the mug shot subject. 15. The apparatus of claim 11 wherein the framing tool includes manual guide positioning logic responsive to user input to manually position the at least one reference relative to the at least one anatomical feature of the mug shot subject. 16. The apparatus of claim 11 wherein the framing tool is operative to provide references for a width, a horizontal mid-point, and an eye level of a subject face. 17. The apparatus of claim 1 wherein the image acquisition interface is a universal interface that is operative to acquire digital mug shot images from different types of image sources. 18. The apparatus of claim 17 wherein the image acquisition interface is operative to interface with still image cameras and video cameras. 19. The apparatus of claim 1 wherein the image acquisition interface is operative to convey an acquisition triggering control to the image source while an image received from the interface is being displayed on the display. 20. The apparatus of claim 1 wherein the display includes a window in a larger display device associated with a general-purpose computer. 21. The apparatus of claim 1 wherein the standards-based image adjustment software tools include a depth-of-field validation tool operative to apply a predetermined depth of field standard to the digital mug shot images. 22. The apparatus of claim 1 wherein the image acquisition interface is responsive to one or more image acquisition controls displayed in the display. 23. The apparatus of claim 1 wherein the image acquisition interface is a digital camera interface and includes a digital camera cable and wherein the system further includes a digital camera mount within range of the digital camera cable. 24. The apparatus of claim 1 further including user interface logic operative to display a pose selection control, a capture control, and a camera window in the display. 25. The apparatus of claim 24 wherein the user interface logic is further operative to display a thumbnail icon area that presents icons that each correspond to different types of mug shot images. 26. The apparatus of claim 1 wherein the software interface is responsive to a launch command to launch the mug shot acquisition system. 27. The apparatus of claim 26 wherein the software interface is responsive to the launch command together with at least one parameter. 28. The apparatus of claim 1 wherein the software interface is constructed to allow a transfer of control that does not provide any significant cue that different programs are being used. 29. The apparatus of claim 1 wherein the software interface is constructed to allow a transfer of control from a records management system. 30. A mug shot acquisition system, comprising: means for receiving digital mug shot images from an imaging device, means for displaying the received digital mug shot images, standards-based image adjustment means for allowing the digital mug shot images to be adjusted to meet at least one predetermined mug shot image uniformity standard, means responsive to software requests to initiate one or more operations by the mug shot acquisition system, and means for exporting digital mug shot images adjusted based on the standards-based image adjustment means.
2,400
7,333
7,333
14,859,611
2,492
In one embodiment, a first device includes: a first logic to generate a first token when a user adapts the first device in approximate contact to the user, the first token including a first timestamp; a storage to store the first token and a second token, the second token obtained from an authenticator and associated with an authentication of the user to a second device, the second token including a second timestamp; and a communication module to communicate the first and second tokens to the second device to cause the second device to authenticate the user based at least in part on the first and second tokens. Other embodiments are described and claimed.
1. A first device comprising: a first logic to generate a first token when a user adapts the first device in approximate contact to the user, the first token including a first timestamp; a storage to store the first token and a second token, the second token obtained from an authenticator and associated with an authentication of the user to a second device, the second token including a second timestamp; and a communication module to communicate the first token and the second token to the second device to cause the second device to authenticate the user based on the first and second tokens. 2. The first device of claim 1, further comprising a controller to remove at least the first token when the first user is no longer in the approximate contact to the first device. 3. The first device of claim 2, further comprising a sensor to detect when the user is in the approximate contact to the first device. 4. The first device of claim 1, wherein the first token includes a plurality of fields including a first field to store the first timestamp and a second field to store a location identifier, the location identifier corresponding to a location at which the user adapted the first device in approximate contact to the user. 5. The first device of claim 4, wherein the second token includes a plurality of fields including a first field to store the second timestamp and a second field to store a location identifier associated with a location at which the user authenticated to the second device. 6. The first device of claim 5, wherein the second token further includes a third field to store an authentication factor indicator to indicate an authentication factor associated with the second token and a fourth field to store an authentication confidence indicator to indicate a level of authentication confidence associated with the authentication of the user by the authentication factor. 7. The first device of claim 1, wherein the storage is to store a third token, wherein the second token is associated with a first factor of the user authentication to the second device and the third token is associated with a second factor of the user authentication to the second device. 8. The first device of claim 1, wherein the authenticator comprises a remote authentication service. 9. The first device of claim 1, wherein the first device comprises a wearable module including at least one core, a power delivery circuit, at least one sensor, and wherein the communication module comprises a short-range wireless transceiver. 10. At least one computer readable storage medium comprising instructions that when executed enable a computing system to: generate a second token having a second timestamp, responsive to authentication of a user to the computing system at a first time; send the second token to a wearable device associated with the user to enable storage of the second token in the wearable device; receive a first token and the second token from the wearable device and determine whether to authenticate the user to the computing system at a second time according to a security policy; and if the user is authenticated at the second time, grant access to a protected session within the computing system. 11. The at least one computer readable storage medium of claim 10, further comprising instructions that when executed enable the computing system to authenticate the user to the computing system at the first time according to a multi-factor authentication. 12. The at least one computer readable storage medium of claim 11, further comprising instructions that when executed enable the computing system to generate the second token responsive to a first authentication factor of the multi-factor authentication and store an authentication indicator in a first field of the second token to indicate an authentication factor associated with the first authentication factor. 13. The at least one computer readable storage medium of claim 12, further comprising instructions that when executed enable the computing system to generate the second token further responsive to a second authentication factor of the multi-factor authentication and store an authentication indicator in a second field of the second token to indicate an authentication factor associated with the second authentication factor. 14. The at least one computer readable storage medium of claim 10, further comprising instructions that when executed enable the computing system to send the first token and the second token to a remote authentication server, and provide a grant indication received from the remote authentication server to the wearable device when the user is authenticated at the second time. 15. The at least one computer readable storage medium of claim 14, wherein the remote authentication server is to enable the user to access a second computing system when the wearable device is adapted in close proximity to the user, based at least in part on the first token and the second token. 16. The at least one computer readable storage medium of claim 10, further comprising instructions that when executed enable the computing system to prevent continued access to the protected session responsive to receipt of a loss of trust indication from the wearable device. 17. The at least one computer readable storage medium of claim 10, further comprising instructions that when executed enable the computing system to send the first token from the computing system to a second computing system to enable the second computing system to automatically authenticate the user when the wearable device is adapted in close proximity to the user and the wearable device is within a threshold proximity of the second computing system. 18. A system comprising: a first processor to execute one or more applications, including a cellular telephone application; and a second processor comprising a secure logic to generate and store a first token in a non-volatile storage when a user is authenticated to the system and send the first token to a second device when the second device is adapted in approximate contact to the user and is in close proximity to the system, wherein the secure logic is to remove at least the first token from the non-volatile storage responsive to disassociation of the user from the second device. 19. The system of claim 18, wherein the secure logic is to remove at least the first token responsive to a loss of trust assertion from the second device, the second device comprising a logic to determine the user disassociation based on which the loss of trust assertion is generated. 20. The system of claim 19, wherein the secure logic is to communicate at least the first token to a second computing system to enable the second computing system to automatically authenticate the user when the second device is adapted in the approximate contact to the user and the second device is within a threshold proximity of the second computing system.
In one embodiment, a first device includes: a first logic to generate a first token when a user adapts the first device in approximate contact to the user, the first token including a first timestamp; a storage to store the first token and a second token, the second token obtained from an authenticator and associated with an authentication of the user to a second device, the second token including a second timestamp; and a communication module to communicate the first and second tokens to the second device to cause the second device to authenticate the user based at least in part on the first and second tokens. Other embodiments are described and claimed.1. A first device comprising: a first logic to generate a first token when a user adapts the first device in approximate contact to the user, the first token including a first timestamp; a storage to store the first token and a second token, the second token obtained from an authenticator and associated with an authentication of the user to a second device, the second token including a second timestamp; and a communication module to communicate the first token and the second token to the second device to cause the second device to authenticate the user based on the first and second tokens. 2. The first device of claim 1, further comprising a controller to remove at least the first token when the first user is no longer in the approximate contact to the first device. 3. The first device of claim 2, further comprising a sensor to detect when the user is in the approximate contact to the first device. 4. The first device of claim 1, wherein the first token includes a plurality of fields including a first field to store the first timestamp and a second field to store a location identifier, the location identifier corresponding to a location at which the user adapted the first device in approximate contact to the user. 5. The first device of claim 4, wherein the second token includes a plurality of fields including a first field to store the second timestamp and a second field to store a location identifier associated with a location at which the user authenticated to the second device. 6. The first device of claim 5, wherein the second token further includes a third field to store an authentication factor indicator to indicate an authentication factor associated with the second token and a fourth field to store an authentication confidence indicator to indicate a level of authentication confidence associated with the authentication of the user by the authentication factor. 7. The first device of claim 1, wherein the storage is to store a third token, wherein the second token is associated with a first factor of the user authentication to the second device and the third token is associated with a second factor of the user authentication to the second device. 8. The first device of claim 1, wherein the authenticator comprises a remote authentication service. 9. The first device of claim 1, wherein the first device comprises a wearable module including at least one core, a power delivery circuit, at least one sensor, and wherein the communication module comprises a short-range wireless transceiver. 10. At least one computer readable storage medium comprising instructions that when executed enable a computing system to: generate a second token having a second timestamp, responsive to authentication of a user to the computing system at a first time; send the second token to a wearable device associated with the user to enable storage of the second token in the wearable device; receive a first token and the second token from the wearable device and determine whether to authenticate the user to the computing system at a second time according to a security policy; and if the user is authenticated at the second time, grant access to a protected session within the computing system. 11. The at least one computer readable storage medium of claim 10, further comprising instructions that when executed enable the computing system to authenticate the user to the computing system at the first time according to a multi-factor authentication. 12. The at least one computer readable storage medium of claim 11, further comprising instructions that when executed enable the computing system to generate the second token responsive to a first authentication factor of the multi-factor authentication and store an authentication indicator in a first field of the second token to indicate an authentication factor associated with the first authentication factor. 13. The at least one computer readable storage medium of claim 12, further comprising instructions that when executed enable the computing system to generate the second token further responsive to a second authentication factor of the multi-factor authentication and store an authentication indicator in a second field of the second token to indicate an authentication factor associated with the second authentication factor. 14. The at least one computer readable storage medium of claim 10, further comprising instructions that when executed enable the computing system to send the first token and the second token to a remote authentication server, and provide a grant indication received from the remote authentication server to the wearable device when the user is authenticated at the second time. 15. The at least one computer readable storage medium of claim 14, wherein the remote authentication server is to enable the user to access a second computing system when the wearable device is adapted in close proximity to the user, based at least in part on the first token and the second token. 16. The at least one computer readable storage medium of claim 10, further comprising instructions that when executed enable the computing system to prevent continued access to the protected session responsive to receipt of a loss of trust indication from the wearable device. 17. The at least one computer readable storage medium of claim 10, further comprising instructions that when executed enable the computing system to send the first token from the computing system to a second computing system to enable the second computing system to automatically authenticate the user when the wearable device is adapted in close proximity to the user and the wearable device is within a threshold proximity of the second computing system. 18. A system comprising: a first processor to execute one or more applications, including a cellular telephone application; and a second processor comprising a secure logic to generate and store a first token in a non-volatile storage when a user is authenticated to the system and send the first token to a second device when the second device is adapted in approximate contact to the user and is in close proximity to the system, wherein the secure logic is to remove at least the first token from the non-volatile storage responsive to disassociation of the user from the second device. 19. The system of claim 18, wherein the secure logic is to remove at least the first token responsive to a loss of trust assertion from the second device, the second device comprising a logic to determine the user disassociation based on which the loss of trust assertion is generated. 20. The system of claim 19, wherein the secure logic is to communicate at least the first token to a second computing system to enable the second computing system to automatically authenticate the user when the second device is adapted in the approximate contact to the user and the second device is within a threshold proximity of the second computing system.
2,400
7,334
7,334
14,489,146
2,419
Certain aspects of the present disclosure generally relate to wireless communications, and more specifically, coverage enhancements for physical broadcast channel (PBCH). According to certain aspects, a method is provided for wireless communications by a user equipment (UE). The method generally includes receiving a physical downlink shared channel (PDSCH) transmission, receiving a different type downlink transmission, with transmit power boosted relative to the PDSCH transmission, receiving information regarding relative transmit power of the PDSCH transmission relative to a common reference signal (CRS) based on the transmit power of the different type downlink transmission, and processing the PDSCH transmission based on the information.
1. A method for wireless communications by a user equipment (UE), comprising: receiving a physical downlink shared channel (PDSCH) transmission; receiving a different type downlink transmission, with transmit power boosted relative to the PDSCH transmission; receiving information regarding relative transmit power of the PDSCH transmission relative to a common reference signal (CRS) based on the transmit power of the different type downlink transmission; and processing the PDSCH transmission based on the information. 2. The method of claim 1, wherein: the different type downlink transmission comprises a physical broadcast channel (PBCH) transmission, wherein: a transmit power of the PBCH transmission is boosted based on a set of one or more power allocation parameters, and the set of one or more power allocation parameters comprises at least one power allocation parameter for PBCH symbols and at least one power allocation parameter for non-PBCH symbols. 3. The method of claim 2, further comprising receiving signaling regarding a power adjustment for null tones. 4. The method of claim 2, further comprising receiving rate matching information for the PBCH transmission via at least one of a system information block (SIB), radio resource control (RRC) signaling, new PBCH rate matching information, or reuse of quasi-collocation signaling. 5. The method of claim 2, further comprising receiving signaling regarding a power adjustment for PDSCH symbols not used for the PBCH transmission. 6. The method of claim 1, wherein the different type downlink transmission comprises at least one synchronization signal. 7. A method for wireless communications by a base station (BS), comprising: transmitting a physical broadcast channel (PBCH) in at least one subframe of a radio frame; and repeating transmission of the PBCH in at least one of: the same subframe or in a different subframe of the radio frame. 8. The method of claim 7, wherein repeated transmission of the PBCH is only performed with certain operating bandwidths. 9. The method of claim 7, wherein repeating transmission of the PBCH comprises repeating transmission of the PBCH in the same subframe using different symbols than the transmitted PBCH. 10. The method of claim 7, wherein repeating transmission of the PBCH comprises repeating transmission of the PBCH in the same subframe using different frequency resources. 11. The method of claim 7, wherein repeating transmission of the PBCH comprises repeating transmission of the PBCH with a same version and payload in each transmission. 12. The method of claim 7, wherein repeated transmission of the PBCH is only performed in certain radio frames. 13. The method of claim 7, further comprising signaling rate matching information for the repeated PBCH transmission via at least one of a system information block (SIB), radio resource control (RRC) signaling, new PBCH rate matching information, or reuse of quasi-collocation signaling. 14. The method of claim 7, wherein repeated transmission of the PBCH is triggered by reception of a bundled random access channel (RACH) transmission from a user equipment (UE). 15. A method for wireless communications by a user equipment (UE), comprising: receiving rate matching information for a repeated physical broadcast channel (PBCH) transmission in a radio frame; and processing downlink transmissions in the radio frame, based on the rate matching information. 16. The method of claim 15, wherein the PBCH transmission is repeated in at least one of a same subframe or in different subframes of the radio frame. 17. The method of claim 15, wherein the rate matching information is signaled via at least one of a system information block (SIB), radio resource control (RRC) signaling, new PBCH rate matching information, or reuse of quasi-collocation signaling. 18. A method for wireless communications by a base station (BS), comprising: receiving a bundled random access channel (RACH) transmission from a user equipment (UE); and triggering bundled transmission of broadcast information, in response to receiving the bundled RACH transmission. 19. The method of claim 18, wherein the bundled transmission of broadcast information comprises at least one system information block (SIB). 20. The method of claim 19, wherein the bundled transmission of broadcast information comprises only a subset of available SIBs. 21. The method of claim 18, wherein the bundled transmission of broadcast information comprises at least a physical broadcast channel (PBCH). 22. The method of claim 21, wherein the bundled transmission of broadcast information further comprises at least one system information block (SIB). 23. The method of claim 18, further comprising transmitting a bundled transmission of a system information block (SIB) that indicates a bundled physical RACH (PRACH) configuration prior to receiving the bundled RACH transmission.
Certain aspects of the present disclosure generally relate to wireless communications, and more specifically, coverage enhancements for physical broadcast channel (PBCH). According to certain aspects, a method is provided for wireless communications by a user equipment (UE). The method generally includes receiving a physical downlink shared channel (PDSCH) transmission, receiving a different type downlink transmission, with transmit power boosted relative to the PDSCH transmission, receiving information regarding relative transmit power of the PDSCH transmission relative to a common reference signal (CRS) based on the transmit power of the different type downlink transmission, and processing the PDSCH transmission based on the information.1. A method for wireless communications by a user equipment (UE), comprising: receiving a physical downlink shared channel (PDSCH) transmission; receiving a different type downlink transmission, with transmit power boosted relative to the PDSCH transmission; receiving information regarding relative transmit power of the PDSCH transmission relative to a common reference signal (CRS) based on the transmit power of the different type downlink transmission; and processing the PDSCH transmission based on the information. 2. The method of claim 1, wherein: the different type downlink transmission comprises a physical broadcast channel (PBCH) transmission, wherein: a transmit power of the PBCH transmission is boosted based on a set of one or more power allocation parameters, and the set of one or more power allocation parameters comprises at least one power allocation parameter for PBCH symbols and at least one power allocation parameter for non-PBCH symbols. 3. The method of claim 2, further comprising receiving signaling regarding a power adjustment for null tones. 4. The method of claim 2, further comprising receiving rate matching information for the PBCH transmission via at least one of a system information block (SIB), radio resource control (RRC) signaling, new PBCH rate matching information, or reuse of quasi-collocation signaling. 5. The method of claim 2, further comprising receiving signaling regarding a power adjustment for PDSCH symbols not used for the PBCH transmission. 6. The method of claim 1, wherein the different type downlink transmission comprises at least one synchronization signal. 7. A method for wireless communications by a base station (BS), comprising: transmitting a physical broadcast channel (PBCH) in at least one subframe of a radio frame; and repeating transmission of the PBCH in at least one of: the same subframe or in a different subframe of the radio frame. 8. The method of claim 7, wherein repeated transmission of the PBCH is only performed with certain operating bandwidths. 9. The method of claim 7, wherein repeating transmission of the PBCH comprises repeating transmission of the PBCH in the same subframe using different symbols than the transmitted PBCH. 10. The method of claim 7, wherein repeating transmission of the PBCH comprises repeating transmission of the PBCH in the same subframe using different frequency resources. 11. The method of claim 7, wherein repeating transmission of the PBCH comprises repeating transmission of the PBCH with a same version and payload in each transmission. 12. The method of claim 7, wherein repeated transmission of the PBCH is only performed in certain radio frames. 13. The method of claim 7, further comprising signaling rate matching information for the repeated PBCH transmission via at least one of a system information block (SIB), radio resource control (RRC) signaling, new PBCH rate matching information, or reuse of quasi-collocation signaling. 14. The method of claim 7, wherein repeated transmission of the PBCH is triggered by reception of a bundled random access channel (RACH) transmission from a user equipment (UE). 15. A method for wireless communications by a user equipment (UE), comprising: receiving rate matching information for a repeated physical broadcast channel (PBCH) transmission in a radio frame; and processing downlink transmissions in the radio frame, based on the rate matching information. 16. The method of claim 15, wherein the PBCH transmission is repeated in at least one of a same subframe or in different subframes of the radio frame. 17. The method of claim 15, wherein the rate matching information is signaled via at least one of a system information block (SIB), radio resource control (RRC) signaling, new PBCH rate matching information, or reuse of quasi-collocation signaling. 18. A method for wireless communications by a base station (BS), comprising: receiving a bundled random access channel (RACH) transmission from a user equipment (UE); and triggering bundled transmission of broadcast information, in response to receiving the bundled RACH transmission. 19. The method of claim 18, wherein the bundled transmission of broadcast information comprises at least one system information block (SIB). 20. The method of claim 19, wherein the bundled transmission of broadcast information comprises only a subset of available SIBs. 21. The method of claim 18, wherein the bundled transmission of broadcast information comprises at least a physical broadcast channel (PBCH). 22. The method of claim 21, wherein the bundled transmission of broadcast information further comprises at least one system information block (SIB). 23. The method of claim 18, further comprising transmitting a bundled transmission of a system information block (SIB) that indicates a bundled physical RACH (PRACH) configuration prior to receiving the bundled RACH transmission.
2,400
7,335
7,335
14,290,176
2,431
A security token is conceived, in particular a smart card, being adapted to support multi-factor user authentication, said security token comprising: a tactile sensing user interface being adapted to capture a stream of input data corresponding to a sequence of positions of a finger engaging with said tactile sensing user interface and representing a user-specific credential for authorizing a transaction; a conversion unit being adapted to convert said stream of input data into a machine-readable credential; a computation unit being adapted to compute a machine-readable authentication code based on the machine-readable credential; a contact-bound interface being adapted to transmit said machine-readable authentication code to a first transaction device; a contactless interface being adapted to transmit said machine-readable authentication code to a second transaction device.
1. A security token, in particular a smart card, being adapted to support multi-factor user authentication, said security token comprising: a tactile sensing user interface being adapted to capture a stream of input data corresponding to a sequence of positions of a finger engaging with said tactile sensing user interface and representing a user-specific credential for authorizing a transaction; a conversion unit being adapted to convert said stream of input data into a machine-readable credential; a computation unit being adapted to compute a machine-readable authentication code based on the machine-readable credential; a contact-bound interface being adapted to transmit said machine-readable authentication code to a first transaction device; a contactless interface being adapted to transmit said machine-readable authentication code to a second transaction device. 2. The security token as claimed in claim 1, further comprising a comparison unit being adapted to compare the machine-readable authentication code with a machine-readable reference code stored in the security token and to generate a corresponding authentication result, and wherein the contact-bound interface and the contactless interface are further adapted to transmit said authentication result to the first transaction device and the second transaction device, respectively. 3. The security token as claimed in claim 1, wherein the user-specific credential is a personal identification number or a challenge key. 4. The security token as claimed in claim 1, wherein the contact-bound interface conforms to the standard ISO/IEC 7816. 5. The security token as claimed in claim 1, wherein the contactless interface conforms to the standard ISO/IEC 14443. 6. The security token as claimed in claim 1, wherein the computation unit is configurable by a host application which is external to the security token. 7. The security token as claimed in claim 1, wherein the stream of input data includes device-specific non-linearities. 8. The security token as claimed in claim 1, further comprising an optical feedback unit. 9. The security token as claimed in claim 1, further comprising an audio feedback unit. 10. The security token as claimed in claim 1, further being adapted to transfer display data to an external display device via near field communication. 11. The security token as claimed in claim 1, further being adapted to transfer display data to an external display device through a contactless reader device. 12. The security token as claimed in claim 1, further being adapted to transfer display data to an external display device through a contact-bound reader device. 13. The security token as claimed in claim 1, further being adapted to transfer display data to an external display device through a modem. 14. The transaction authorization system comprising a security token as claimed in claim 1 and a transaction device. 15. The transaction authorization system as claimed in claim 14, wherein the transaction device is one of a personal computer, a POS-terminal and an ATM.
A security token is conceived, in particular a smart card, being adapted to support multi-factor user authentication, said security token comprising: a tactile sensing user interface being adapted to capture a stream of input data corresponding to a sequence of positions of a finger engaging with said tactile sensing user interface and representing a user-specific credential for authorizing a transaction; a conversion unit being adapted to convert said stream of input data into a machine-readable credential; a computation unit being adapted to compute a machine-readable authentication code based on the machine-readable credential; a contact-bound interface being adapted to transmit said machine-readable authentication code to a first transaction device; a contactless interface being adapted to transmit said machine-readable authentication code to a second transaction device.1. A security token, in particular a smart card, being adapted to support multi-factor user authentication, said security token comprising: a tactile sensing user interface being adapted to capture a stream of input data corresponding to a sequence of positions of a finger engaging with said tactile sensing user interface and representing a user-specific credential for authorizing a transaction; a conversion unit being adapted to convert said stream of input data into a machine-readable credential; a computation unit being adapted to compute a machine-readable authentication code based on the machine-readable credential; a contact-bound interface being adapted to transmit said machine-readable authentication code to a first transaction device; a contactless interface being adapted to transmit said machine-readable authentication code to a second transaction device. 2. The security token as claimed in claim 1, further comprising a comparison unit being adapted to compare the machine-readable authentication code with a machine-readable reference code stored in the security token and to generate a corresponding authentication result, and wherein the contact-bound interface and the contactless interface are further adapted to transmit said authentication result to the first transaction device and the second transaction device, respectively. 3. The security token as claimed in claim 1, wherein the user-specific credential is a personal identification number or a challenge key. 4. The security token as claimed in claim 1, wherein the contact-bound interface conforms to the standard ISO/IEC 7816. 5. The security token as claimed in claim 1, wherein the contactless interface conforms to the standard ISO/IEC 14443. 6. The security token as claimed in claim 1, wherein the computation unit is configurable by a host application which is external to the security token. 7. The security token as claimed in claim 1, wherein the stream of input data includes device-specific non-linearities. 8. The security token as claimed in claim 1, further comprising an optical feedback unit. 9. The security token as claimed in claim 1, further comprising an audio feedback unit. 10. The security token as claimed in claim 1, further being adapted to transfer display data to an external display device via near field communication. 11. The security token as claimed in claim 1, further being adapted to transfer display data to an external display device through a contactless reader device. 12. The security token as claimed in claim 1, further being adapted to transfer display data to an external display device through a contact-bound reader device. 13. The security token as claimed in claim 1, further being adapted to transfer display data to an external display device through a modem. 14. The transaction authorization system comprising a security token as claimed in claim 1 and a transaction device. 15. The transaction authorization system as claimed in claim 14, wherein the transaction device is one of a personal computer, a POS-terminal and an ATM.
2,400
7,336
7,336
14,935,522
2,432
Various embodiments include a honeypot system configured to trigger malicious activities by malicious applications using a behavioral analysis algorithm and dynamic resource provisioning. A method performed by a processor of a computing device, which may be a mobile computing device, may include determining whether or not a target application currently executing on the computing device is potentially malicious based, at least in part, on the analysis, predicting a triggering condition of the target application in response to determining the target application is potentially malicious, provisioning one or more resources based, at least in part, on the predicted triggering condition, monitoring activities of the target application corresponding to the provisioned one or more resources, and determining whether or not the target application is a malicious application based, at least in part, on the monitored activities. The resources may be device components (e.g., network interface(s), sensor(s), etc.) and/or data (e.g., files, etc.).
1. A method implemented in a honeypot system for triggering malicious activities by applications, comprising: predicting, via a processor of a computing device, a triggering condition of a target application in response to determining that the target application is potentially malicious; provisioning, via the processor, one or more resources based, at least in part, on the predicted triggering condition; monitoring, via the processor, activities of the target application corresponding to the provisioned one or more resources; and determining, via the processor, whether or not the target application is a malicious application based, at least in part, on the monitored activities. 2. The method of claim 1, wherein monitoring, via the processor, activities of the target application comprises monitoring a group of applications that may have the same triggering condition. 3. The method of claim 1, further comprising: determining, via the processor, whether an application currently executing on the computing device is potentially malicious; and designating the application as the target application in response to determining that the application is potentially malicious. 4. The method of claim 3, wherein determining, via the processor, whether the application currently executing on the computing device is potentially malicious comprises: analyzing, via the processor, at least one of a permission of the application corresponding to accessing resources of the computing device and stored activity data indicating previous activities of the application. 5. The method of claim 1, wherein the one or more resources comprises one or both of one or more device components and data. 6. The method of claim 5, wherein the one or more device components comprise at least one member of the group consisting of an installed application, an operating system, a network interface, a processing unit, a data storage unit, a coupled device, an output unit, an input unit, and a sensor. 7. The method of claim 5, wherein the data comprises at least one member of the group consisting of a contact list, a stored file, personal information, networking conditions data, subscription information, location information, system information, known vulnerability information, and sensor data. 8. The method of claim 1, wherein predicting, via the processor, the triggering condition of the target application in response to determining the target application is potentially malicious comprises: evaluating, via the processor, at least one of a permission of the target application, any resources previously accessible to the target application, and stored activity data indicating previous activities of the target application. 9. The method of claim 1, wherein provisioning, via the processor, the one or more resources based, at least in part, on the predicted triggering condition comprises at least one of: adjusting, via the processor, a resource previously visible to the target application based, at least in part, on the predicted triggering condition; and configuring, via the processor, a resource that was previously invisible to the target application so that the resource becomes visible to the target application. 10. The method of claim 1, wherein provisioning, via the processor, the one or more resources based, at least in part, on the predicted triggering condition comprises: creating, via the processor, a virtual resource based, at least in part, on the predicted triggering condition, wherein the virtual resource represents an emulated device component or data that is not actually present within or supported by the computing device. 11. The method of claim 1, wherein monitoring, via the processor, activities of the target application corresponding to the provisioned one or more resources comprises: detecting, via the processor, an application programming interface (API) call made by the target application. 12. The method of claim 1, wherein determining, via the processor, whether the target application is a malicious application based, at least in part, on the monitored activities comprises: evaluating, via the processor, the monitored activities and stored activity data indicating previous activities of the target application. 13. The method of claim 1, further comprising updating, via the processor, stored activity data for the target application including information regarding resources that were provisioned in response to determining that the target application is a malicious application. 14. The method of claim 1, further comprising transmitting a report message indicating the triggering condition for the target application in response to determining that the target application is a malicious application. 15. A computing device, comprising: a memory; and a processor coupled to the memory and configured with processor-executable instructions to perform operations comprising: predicting a triggering condition of a target application in response to determining that the target application is potentially malicious; provisioning one or more resources based, at least in part, on the predicted triggering condition; monitoring activities of the target application corresponding to the provisioned one or more resources; and determining whether or not the target application is malicious based, at least in part, on the monitored activities. 16. The computing device of claim 15, wherein the processor is configured with processor-executable instructions to perform operations such that monitoring activities of the target application comprises monitoring a group of applications that may have the same triggering condition. 17. The computing device of claim 15, wherein the processor is configured with processor-executable instructions to perform operations further comprising: determining whether an application currently executing on the computing device is potentially malicious; and designating the application as the target application in response to determining that the application is potentially malicious. 18. The computing device of claim 17, wherein the processor is configured with processor-executable instructions to perform operations such that determining whether an application currently executing on the computing device is potentially malicious comprises: analyzing at least one of a permission of the one or more target applications corresponding to accessing resources of the computing device and stored activity data indicating previous activities of the one or more target applications. 19. The computing device of claim 15, wherein the one or more resources comprises one or both of one or more device components and data. 20. The computing device of claim 19, wherein the one or more device components comprise at least one member of the group consisting of an installed application, an operating system, a network interface, a processing unit, a data storage unit, a coupled device, an output unit, an input unit, and a sensor. 21. The computing device of claim 19, wherein computing device is a mobile computing device, and the data comprises at least one member of the group consisting of a contact list, a stored file, personal information, networking conditions data, subscription information, location information, system information, known vulnerability information, and sensor data. 22. The computing device of claim 15, wherein the processor is configured with processor-executable instructions to perform operations such that predicting the triggering condition of the target application in response to determining the target application is potentially malicious comprises: evaluating at least one of a permission of the target application, any resources previously accessible to the target application, and stored activity data indicating previous activities of the target application. 23. The computing device of claim 15, wherein the processor is configured with processor-executable instructions to perform operations such that provisioning the one or more resources based, at least in part, on the predicted triggering condition comprises at least one of: adjusting a resource previously visible to the target application based, at least in part, on the predicted triggering condition; and configuring a resource that was previously invisible to the target application so that the resource becomes visible to the target application. 24. The computing device of claim 15, wherein the processor is configured with processor-executable instructions to perform operations such that provisioning the one or more resources based, at least in part, on the predicted triggering condition comprises: creating a virtual resource based, at least in part, on the predicted triggering condition, wherein the virtual resource represents an emulated device component or data that is not actually present within or supported by the computing device. 25. The computing device of claim 15, wherein the processor is configured with processor-executable instructions to perform operations such that monitoring activities of the target application corresponding to the provisioned one or more resources comprises: detecting an application programming interface (API) call made by the target application. 26. The computing device of claim 15, wherein the processor is configured with processor-executable instructions to perform operations such that determining whether the target application is malicious based, at least in part, on the monitored activities comprises: evaluating the monitored activities and stored activity data indicating previous activities of the target application. 27. The computing device of claim 15, wherein the processor is configured with processor-executable instructions to perform operations further comprising updating stored activity data for the target application including information regarding resources that were provisioned in response to determining that the target application is malicious. 28. The computing device of claim 15, wherein the processor is configured with processor-executable instructions to perform operations further comprising transmitting a report message indicating the triggering condition for the target application in response to determining that the target application is malicious. 29. A non-transitory processor-readable storage medium having stored thereon processor-executable instructions configured to cause a processor of a computing device to perform operations comprising: predicting a triggering condition of one or more target applications in response to determining that the one or more target applications are potentially malicious; provisioning one or more resources based, at least in part, on the predicted triggering condition; monitoring activities of the one or more target applications corresponding to the provisioned one or more resources; and determining whether or not any of the one or more target applications are malicious based, at least in part, on the monitored activities. 30. A computing device, comprising: means for predicting a triggering condition of one or more target applications in response to determining that the one or more target applications are potentially malicious; means for provisioning one or more resources based, at least in part, on the predicted triggering condition; means for monitoring activities of the one or more target applications corresponding to the provisioned one or more resources; and means for determining whether or not any of the one or more target applications are malicious based, at least in part, on the monitored activities.
Various embodiments include a honeypot system configured to trigger malicious activities by malicious applications using a behavioral analysis algorithm and dynamic resource provisioning. A method performed by a processor of a computing device, which may be a mobile computing device, may include determining whether or not a target application currently executing on the computing device is potentially malicious based, at least in part, on the analysis, predicting a triggering condition of the target application in response to determining the target application is potentially malicious, provisioning one or more resources based, at least in part, on the predicted triggering condition, monitoring activities of the target application corresponding to the provisioned one or more resources, and determining whether or not the target application is a malicious application based, at least in part, on the monitored activities. The resources may be device components (e.g., network interface(s), sensor(s), etc.) and/or data (e.g., files, etc.).1. A method implemented in a honeypot system for triggering malicious activities by applications, comprising: predicting, via a processor of a computing device, a triggering condition of a target application in response to determining that the target application is potentially malicious; provisioning, via the processor, one or more resources based, at least in part, on the predicted triggering condition; monitoring, via the processor, activities of the target application corresponding to the provisioned one or more resources; and determining, via the processor, whether or not the target application is a malicious application based, at least in part, on the monitored activities. 2. The method of claim 1, wherein monitoring, via the processor, activities of the target application comprises monitoring a group of applications that may have the same triggering condition. 3. The method of claim 1, further comprising: determining, via the processor, whether an application currently executing on the computing device is potentially malicious; and designating the application as the target application in response to determining that the application is potentially malicious. 4. The method of claim 3, wherein determining, via the processor, whether the application currently executing on the computing device is potentially malicious comprises: analyzing, via the processor, at least one of a permission of the application corresponding to accessing resources of the computing device and stored activity data indicating previous activities of the application. 5. The method of claim 1, wherein the one or more resources comprises one or both of one or more device components and data. 6. The method of claim 5, wherein the one or more device components comprise at least one member of the group consisting of an installed application, an operating system, a network interface, a processing unit, a data storage unit, a coupled device, an output unit, an input unit, and a sensor. 7. The method of claim 5, wherein the data comprises at least one member of the group consisting of a contact list, a stored file, personal information, networking conditions data, subscription information, location information, system information, known vulnerability information, and sensor data. 8. The method of claim 1, wherein predicting, via the processor, the triggering condition of the target application in response to determining the target application is potentially malicious comprises: evaluating, via the processor, at least one of a permission of the target application, any resources previously accessible to the target application, and stored activity data indicating previous activities of the target application. 9. The method of claim 1, wherein provisioning, via the processor, the one or more resources based, at least in part, on the predicted triggering condition comprises at least one of: adjusting, via the processor, a resource previously visible to the target application based, at least in part, on the predicted triggering condition; and configuring, via the processor, a resource that was previously invisible to the target application so that the resource becomes visible to the target application. 10. The method of claim 1, wherein provisioning, via the processor, the one or more resources based, at least in part, on the predicted triggering condition comprises: creating, via the processor, a virtual resource based, at least in part, on the predicted triggering condition, wherein the virtual resource represents an emulated device component or data that is not actually present within or supported by the computing device. 11. The method of claim 1, wherein monitoring, via the processor, activities of the target application corresponding to the provisioned one or more resources comprises: detecting, via the processor, an application programming interface (API) call made by the target application. 12. The method of claim 1, wherein determining, via the processor, whether the target application is a malicious application based, at least in part, on the monitored activities comprises: evaluating, via the processor, the monitored activities and stored activity data indicating previous activities of the target application. 13. The method of claim 1, further comprising updating, via the processor, stored activity data for the target application including information regarding resources that were provisioned in response to determining that the target application is a malicious application. 14. The method of claim 1, further comprising transmitting a report message indicating the triggering condition for the target application in response to determining that the target application is a malicious application. 15. A computing device, comprising: a memory; and a processor coupled to the memory and configured with processor-executable instructions to perform operations comprising: predicting a triggering condition of a target application in response to determining that the target application is potentially malicious; provisioning one or more resources based, at least in part, on the predicted triggering condition; monitoring activities of the target application corresponding to the provisioned one or more resources; and determining whether or not the target application is malicious based, at least in part, on the monitored activities. 16. The computing device of claim 15, wherein the processor is configured with processor-executable instructions to perform operations such that monitoring activities of the target application comprises monitoring a group of applications that may have the same triggering condition. 17. The computing device of claim 15, wherein the processor is configured with processor-executable instructions to perform operations further comprising: determining whether an application currently executing on the computing device is potentially malicious; and designating the application as the target application in response to determining that the application is potentially malicious. 18. The computing device of claim 17, wherein the processor is configured with processor-executable instructions to perform operations such that determining whether an application currently executing on the computing device is potentially malicious comprises: analyzing at least one of a permission of the one or more target applications corresponding to accessing resources of the computing device and stored activity data indicating previous activities of the one or more target applications. 19. The computing device of claim 15, wherein the one or more resources comprises one or both of one or more device components and data. 20. The computing device of claim 19, wherein the one or more device components comprise at least one member of the group consisting of an installed application, an operating system, a network interface, a processing unit, a data storage unit, a coupled device, an output unit, an input unit, and a sensor. 21. The computing device of claim 19, wherein computing device is a mobile computing device, and the data comprises at least one member of the group consisting of a contact list, a stored file, personal information, networking conditions data, subscription information, location information, system information, known vulnerability information, and sensor data. 22. The computing device of claim 15, wherein the processor is configured with processor-executable instructions to perform operations such that predicting the triggering condition of the target application in response to determining the target application is potentially malicious comprises: evaluating at least one of a permission of the target application, any resources previously accessible to the target application, and stored activity data indicating previous activities of the target application. 23. The computing device of claim 15, wherein the processor is configured with processor-executable instructions to perform operations such that provisioning the one or more resources based, at least in part, on the predicted triggering condition comprises at least one of: adjusting a resource previously visible to the target application based, at least in part, on the predicted triggering condition; and configuring a resource that was previously invisible to the target application so that the resource becomes visible to the target application. 24. The computing device of claim 15, wherein the processor is configured with processor-executable instructions to perform operations such that provisioning the one or more resources based, at least in part, on the predicted triggering condition comprises: creating a virtual resource based, at least in part, on the predicted triggering condition, wherein the virtual resource represents an emulated device component or data that is not actually present within or supported by the computing device. 25. The computing device of claim 15, wherein the processor is configured with processor-executable instructions to perform operations such that monitoring activities of the target application corresponding to the provisioned one or more resources comprises: detecting an application programming interface (API) call made by the target application. 26. The computing device of claim 15, wherein the processor is configured with processor-executable instructions to perform operations such that determining whether the target application is malicious based, at least in part, on the monitored activities comprises: evaluating the monitored activities and stored activity data indicating previous activities of the target application. 27. The computing device of claim 15, wherein the processor is configured with processor-executable instructions to perform operations further comprising updating stored activity data for the target application including information regarding resources that were provisioned in response to determining that the target application is malicious. 28. The computing device of claim 15, wherein the processor is configured with processor-executable instructions to perform operations further comprising transmitting a report message indicating the triggering condition for the target application in response to determining that the target application is malicious. 29. A non-transitory processor-readable storage medium having stored thereon processor-executable instructions configured to cause a processor of a computing device to perform operations comprising: predicting a triggering condition of one or more target applications in response to determining that the one or more target applications are potentially malicious; provisioning one or more resources based, at least in part, on the predicted triggering condition; monitoring activities of the one or more target applications corresponding to the provisioned one or more resources; and determining whether or not any of the one or more target applications are malicious based, at least in part, on the monitored activities. 30. A computing device, comprising: means for predicting a triggering condition of one or more target applications in response to determining that the one or more target applications are potentially malicious; means for provisioning one or more resources based, at least in part, on the predicted triggering condition; means for monitoring activities of the one or more target applications corresponding to the provisioned one or more resources; and means for determining whether or not any of the one or more target applications are malicious based, at least in part, on the monitored activities.
2,400
7,337
7,337
14,503,050
2,484
A system that includes at least two time delayed playback (TDP) devices for recording and playback. Each of the two TDP devices may perform a method that includes recording a first feed to be used at least partially as a playback of a second feed, determining whether a failure results in a missed feed portion from the recording of the first feed, the missed feed portion being at a known time and lasting a known time amount. When there is a failure, the method includes providing a backup recording corresponding to the missed feed portion from the other TDP device that is recording the first feed in parallel with the first TDP device and transmitting the playback of the second feed including the backup recording at the known time and lasting the known time amount.
1. A method, comprising: recording, by a first time delayed playback (TDP) device, a first feed to be used at least partially as a playback of a second feed; determining, by the first TDP device, whether a failure results in a missed feed portion from the recording of the first feed, the missed feed portion being at a known time and lasting a known time amount; providing a backup recording corresponding to the missed feed portion from a second TDP device that is recording the first feed in parallel with the first TDP device; and transmitting the playback of the second feed including the backup recording at the known time and lasting the known time amount. 2. The method of claim 1, wherein the first and second TDP devices record the first feed in chunks of predetermined time increments. 3. The method of claim 2, wherein the first TDP device records a first set of at least one of the chunks prior to the failure and a second set of at least one of the chunks subsequent to the failure and wherein the second TDP device records at least a third set of at least one of the chunks corresponding to the backup recording, the playback including the first, second, and third sets. 4. The method of claim 2, wherein the chunks are named in one of a numerical order, a date/time order, and a combination thereof, the date/time order being determined based upon a time source shared between the first and second TDP devices. 5. The method of claim 2, further comprising: determining, by the first TDP device, whether each chunk that is recorded is playable. 6. The method of claim 5, further comprising: determining, by the first TDP device, at least one broken chunk that is one of missing, incomplete, damaged, truncated, and a combination thereof; and providing a further backup recording corresponding to the at least one broken chunk from the second TDP device, the playback of the second feed further including the further backup recording. 7. The method of claim 1, further comprising: receiving, by the first TDP device, the backup recording from the second TDP device; combining, by the first TDP device, the recorded first feed and the backup recording to generate the playback of the second feed. 8. The method of claim 1, wherein the playback of the second feed includes the recorded first feed from the first TDP device and the backup recording from the second TDP device. 9. The method of claim 1, wherein the failure is an issue of the first TDP device that prevents the first TDP device from recording, the first TDP device continuing to record the first feed upon the issue being resolved. 10. The method of claim 1, wherein the first feed is an east coast feed and the second feed is a west coast feed. 11. A system, comprising: a first time delayed playback (TDP) device recording a first feed to be used at least partially as a playback of a second feed; and a second TDP device recording the first feed in parallel with the first TDP device, wherein the first TDP device determines whether a failure results in a missed feed portion from the recording of the first feed, the missed feed portion being at a known time and lasting a known time amount, wherein the second TDP device provides a backup recording corresponding to the missed feed portion, wherein the playback of the second feed including the backup recording at the known time and lasting the known time amount is transmitted. 12. The system of claim 11, wherein the first and second TDP devices record the first feed in chunks of predetermined time increments. 13. The system of claim 12, wherein the first TDP device records a first set of at least one of the chunks prior to the failure and a second set of at least one of the chunks subsequent to the failure and wherein the second TDP device records at least a third set of at least one of the chunks corresponding to the backup recording, the playback including the first, second, and third sets. 14. The system of claim 12, wherein the chunks are named in one of a numerical order, a date/time order, and a combination thereof, the date/time order being determined based upon a time source shared between the first and second TDP devices. 15. The system of claim 12, wherein the first TDP device determines whether each chunk that is recorded is playable. 16. The system of claim 15, wherein the first TDP device determines at least one broken chunk that is one of missing, incomplete, damaged, truncated, and a combination thereof, and wherein the second TDP device provides a further backup recording corresponding to the at least one broken chunk, the playback of the second feed further including the further backup recording. 17. The system of claim 11, wherein the first TDP device receives the backup recording from the second TDP device and combines the recorded first feed and the backup recording to generate the playback. 18. The system of claim 11, wherein the playback of the second feed includes the recorded first feed from the first TDP device and the backup recording from the second TDP device. 19. The system of claim 11, wherein the failure is an issue of the first TDP device that prevents the first TDP device from recording, the first TDP device continuing to record the first feed upon the issue being resolved. 20. A non-transitory computer readable storage medium with an executable program stored thereon, wherein the program instructs a microprocessor to perform operations comprising: recording a first feed to be used at least partially as a playback of a second feed; determining whether a failure results in a missed feed portion for the first feed from recording, the missed feed portion being at a known time and lasting a known time amount; providing a backup recording corresponding to the missed feed portion from a second TDP device that is recording the first feed in parallel with the first TDP device; and transmitting the playback of the second feed including the backup recording at the known time and lasting the known time amount.
A system that includes at least two time delayed playback (TDP) devices for recording and playback. Each of the two TDP devices may perform a method that includes recording a first feed to be used at least partially as a playback of a second feed, determining whether a failure results in a missed feed portion from the recording of the first feed, the missed feed portion being at a known time and lasting a known time amount. When there is a failure, the method includes providing a backup recording corresponding to the missed feed portion from the other TDP device that is recording the first feed in parallel with the first TDP device and transmitting the playback of the second feed including the backup recording at the known time and lasting the known time amount.1. A method, comprising: recording, by a first time delayed playback (TDP) device, a first feed to be used at least partially as a playback of a second feed; determining, by the first TDP device, whether a failure results in a missed feed portion from the recording of the first feed, the missed feed portion being at a known time and lasting a known time amount; providing a backup recording corresponding to the missed feed portion from a second TDP device that is recording the first feed in parallel with the first TDP device; and transmitting the playback of the second feed including the backup recording at the known time and lasting the known time amount. 2. The method of claim 1, wherein the first and second TDP devices record the first feed in chunks of predetermined time increments. 3. The method of claim 2, wherein the first TDP device records a first set of at least one of the chunks prior to the failure and a second set of at least one of the chunks subsequent to the failure and wherein the second TDP device records at least a third set of at least one of the chunks corresponding to the backup recording, the playback including the first, second, and third sets. 4. The method of claim 2, wherein the chunks are named in one of a numerical order, a date/time order, and a combination thereof, the date/time order being determined based upon a time source shared between the first and second TDP devices. 5. The method of claim 2, further comprising: determining, by the first TDP device, whether each chunk that is recorded is playable. 6. The method of claim 5, further comprising: determining, by the first TDP device, at least one broken chunk that is one of missing, incomplete, damaged, truncated, and a combination thereof; and providing a further backup recording corresponding to the at least one broken chunk from the second TDP device, the playback of the second feed further including the further backup recording. 7. The method of claim 1, further comprising: receiving, by the first TDP device, the backup recording from the second TDP device; combining, by the first TDP device, the recorded first feed and the backup recording to generate the playback of the second feed. 8. The method of claim 1, wherein the playback of the second feed includes the recorded first feed from the first TDP device and the backup recording from the second TDP device. 9. The method of claim 1, wherein the failure is an issue of the first TDP device that prevents the first TDP device from recording, the first TDP device continuing to record the first feed upon the issue being resolved. 10. The method of claim 1, wherein the first feed is an east coast feed and the second feed is a west coast feed. 11. A system, comprising: a first time delayed playback (TDP) device recording a first feed to be used at least partially as a playback of a second feed; and a second TDP device recording the first feed in parallel with the first TDP device, wherein the first TDP device determines whether a failure results in a missed feed portion from the recording of the first feed, the missed feed portion being at a known time and lasting a known time amount, wherein the second TDP device provides a backup recording corresponding to the missed feed portion, wherein the playback of the second feed including the backup recording at the known time and lasting the known time amount is transmitted. 12. The system of claim 11, wherein the first and second TDP devices record the first feed in chunks of predetermined time increments. 13. The system of claim 12, wherein the first TDP device records a first set of at least one of the chunks prior to the failure and a second set of at least one of the chunks subsequent to the failure and wherein the second TDP device records at least a third set of at least one of the chunks corresponding to the backup recording, the playback including the first, second, and third sets. 14. The system of claim 12, wherein the chunks are named in one of a numerical order, a date/time order, and a combination thereof, the date/time order being determined based upon a time source shared between the first and second TDP devices. 15. The system of claim 12, wherein the first TDP device determines whether each chunk that is recorded is playable. 16. The system of claim 15, wherein the first TDP device determines at least one broken chunk that is one of missing, incomplete, damaged, truncated, and a combination thereof, and wherein the second TDP device provides a further backup recording corresponding to the at least one broken chunk, the playback of the second feed further including the further backup recording. 17. The system of claim 11, wherein the first TDP device receives the backup recording from the second TDP device and combines the recorded first feed and the backup recording to generate the playback. 18. The system of claim 11, wherein the playback of the second feed includes the recorded first feed from the first TDP device and the backup recording from the second TDP device. 19. The system of claim 11, wherein the failure is an issue of the first TDP device that prevents the first TDP device from recording, the first TDP device continuing to record the first feed upon the issue being resolved. 20. A non-transitory computer readable storage medium with an executable program stored thereon, wherein the program instructs a microprocessor to perform operations comprising: recording a first feed to be used at least partially as a playback of a second feed; determining whether a failure results in a missed feed portion for the first feed from recording, the missed feed portion being at a known time and lasting a known time amount; providing a backup recording corresponding to the missed feed portion from a second TDP device that is recording the first feed in parallel with the first TDP device; and transmitting the playback of the second feed including the backup recording at the known time and lasting the known time amount.
2,400
7,338
7,338
13,937,884
2,491
A circuit for secure operation includes a plurality of mutually exclusive circuit zones including a first circuit zone having a first level of security and a second circuit zone having a second level of security less than the first level of security and one or more gate circuits each providing limited transfer of data between the circuit zones, the gate circuits providing all data connectivity between the first circuit zone and the second circuit zone and statically configured to prevent unmodified transfer of data from the first circuit zone to the second circuit zone.
1. A circuit for secure operation comprising: a plurality of mutually exclusive circuit zones including a first circuit zone having a first level of security and a second circuit zone having a second level of security less than the first level of security; one or more gate circuits each providing limited transfer of data between the circuit zones, the gate circuits providing all data connectivity between the first circuit zone and the second circuit zone and statically configured to prevent unmodified transfer of data from the first circuit zone to the second circuit zone. 2. The circuit of claim 1 wherein each gate circuit implements a function defined by its circuit to process input data and provide output data via interfaces, each of the interfaces located in a single corresponding circuit zone of the plurality of circuit zones. 3. The circuit of claim 2 wherein the function implemented by at least some of the gate circuits includes a cryptographic procedure utilizing a cryptographic key. 4. The circuit of claim 2 wherein each of the one or more gate circuits follows a design that enforces a security policy with the interfaces located in the corresponding circuit zones to prevent unmodified transfers of data between at least some of said circuit zones. 5. The circuit of claim 1 wherein the one or more gate circuits include one or more of an encryption gate circuit, a controlled transfer gate circuit, a decryption gate circuit, a signing gate circuit, a secure hash function gate circuit, and a public key generation gate circuit. 6. The circuit of claim 1 wherein each circuit zone of at least some of the circuit zones comprises a memory local to that circuit zone, wherein at least some of the gate circuits include an interface for accessing memory locations in said memory. 7. The circuit of claim 1 wherein the gate circuits comprise an encryption gate circuit configured to accept a key via a first interface in the first circuit zone, to accept unencrypted data via a second interface, and to provide encrypted data via third interface in the second circuit zone. 8. The circuit of claim 1 wherein the gate circuits comprise a decryption gate circuit configured to accept a key via a first interface in the first circuit zone, to accept encrypted data via a second interface in the second circuit zone, and to provide decrypted data via a third interface in the second circuit zone. 9. The circuit of claim 1 wherein the first circuit zone comprises a key generation circuit for generation of a key value without disclosure of said key value to the second circuit zone. 10. The circuit of claim 1 wherein the device is configured to use a key value provided to a gate circuit to encrypt data in at least one of the first circuit zone and the second circuit zone to provide corresponding encrypted data to the second circuit zone without disclosure of the key value into the second circuit zone. 11. The circuit of claim 1 wherein the device is configured to use a key value provided to a gate circuit to decrypt data in the second circuit zone to provide corresponding decrypted data to the first circuit zone without disclosure of the key value into the second circuit zone. 12. The circuit of claim 1 further comprising a key initialization circuit comprising at least one of a non-volatile storage in the first circuit zone, a Physical Unclonable Function (PUF) in the first circuit zone, and port for passing a value from outside the device to the first circuit zone. 13. The circuit of claim 1 wherein the device includes a programmable processor located outside the first security zone, wherein the circuit is configured to validate software for controlling the processor according to key values stored in the first circuit zone. 14. The circuit of claim 1 wherein the device comprises a Field Programmable Gate Array (FPGA) configured according to configuration data to implement circuit zones and gate circuits. 15. The circuit of claim 1 wherein the device comprises an Application Specific Integrated Circuit (ASIC). 16. Data stored on a non-transitory computer readable medium comprising configuration instructions for configuring a circuit having: a plurality of mutually exclusive circuit zones including a first circuit zone having a first level of security and a second circuit zone having a second level of security less than the first level of security; one or more gate circuits each providing limited transfer of data between the circuit zones, the gate circuits providing all data connectivity between the first circuit zone and the second circuit zone and statically configured to prevent unmodified transfer of data from the first circuit zone to the second circuit zone. 17. The data of claim 16 wherein the configuration instructions include hardware description language (HDL) instructions. 18. The data of claim 16 wherein the configuration instructions include instructions for configuring a Field Programmable Gate Array (FPGA). 19. A method for operating a device having a first circuit zone having a first level of security and a second circuit zone, mutually exclusive from the first circuit zone and having a second level of security less than the first level of security, the method comprising: maintaining data in the first circuit zone; providing first data in the first circuit zone to an interface in the first circuit zone to a first gate circuit, the first gate circuit coupling the first circuit zone and the second circuit zone; processing the first data in a first gate circuit to produce second data; providing the second data from the first gate circuit through a second interface in the second circuit zone; wherein the first gate circuit is configured by its circuit design to process the first data to produce the second data such that disclosure of the second data does not disclose of the first data. 20. The method of claim 19 wherein processing the first data in the first gate circuit to produce second data comprises forming the second data according to a cryptographic procedure according to a key value in the first data. 21. The method of claim 20 wherein the cryptographic procedure comprises at least one of an encryption procedure, a signing procedure, and a public key generation procedure. 22. The method of claim 19 wherein processing the first data in the first gate circuit to produce second data comprises forming the second data as a secure hash of the first data. 23. The method of claim 19 further comprising: maintaining third data in the second circuit zone; providing the third data in the second circuit zone to a third interface in the second circuit zone to a second gate circuit, the second gate circuit coupling the first circuit zone and the second circuit zone; processing the third data in a second gate circuit to produce fourth data; providing the fourth data from the second gate circuit through a fourth interface in the first circuit zone; wherein the second gate circuit is configured by its circuit design to process the third data to produce the fourth data such that disclosure of the fourth data does not disclose the third data. 24. The method of claim 19 wherein processing the third data in the second gate circuit to produce fourth data comprises forming the fourth data according to a decryption procedure according to a key value in the first circuit zone.
A circuit for secure operation includes a plurality of mutually exclusive circuit zones including a first circuit zone having a first level of security and a second circuit zone having a second level of security less than the first level of security and one or more gate circuits each providing limited transfer of data between the circuit zones, the gate circuits providing all data connectivity between the first circuit zone and the second circuit zone and statically configured to prevent unmodified transfer of data from the first circuit zone to the second circuit zone.1. A circuit for secure operation comprising: a plurality of mutually exclusive circuit zones including a first circuit zone having a first level of security and a second circuit zone having a second level of security less than the first level of security; one or more gate circuits each providing limited transfer of data between the circuit zones, the gate circuits providing all data connectivity between the first circuit zone and the second circuit zone and statically configured to prevent unmodified transfer of data from the first circuit zone to the second circuit zone. 2. The circuit of claim 1 wherein each gate circuit implements a function defined by its circuit to process input data and provide output data via interfaces, each of the interfaces located in a single corresponding circuit zone of the plurality of circuit zones. 3. The circuit of claim 2 wherein the function implemented by at least some of the gate circuits includes a cryptographic procedure utilizing a cryptographic key. 4. The circuit of claim 2 wherein each of the one or more gate circuits follows a design that enforces a security policy with the interfaces located in the corresponding circuit zones to prevent unmodified transfers of data between at least some of said circuit zones. 5. The circuit of claim 1 wherein the one or more gate circuits include one or more of an encryption gate circuit, a controlled transfer gate circuit, a decryption gate circuit, a signing gate circuit, a secure hash function gate circuit, and a public key generation gate circuit. 6. The circuit of claim 1 wherein each circuit zone of at least some of the circuit zones comprises a memory local to that circuit zone, wherein at least some of the gate circuits include an interface for accessing memory locations in said memory. 7. The circuit of claim 1 wherein the gate circuits comprise an encryption gate circuit configured to accept a key via a first interface in the first circuit zone, to accept unencrypted data via a second interface, and to provide encrypted data via third interface in the second circuit zone. 8. The circuit of claim 1 wherein the gate circuits comprise a decryption gate circuit configured to accept a key via a first interface in the first circuit zone, to accept encrypted data via a second interface in the second circuit zone, and to provide decrypted data via a third interface in the second circuit zone. 9. The circuit of claim 1 wherein the first circuit zone comprises a key generation circuit for generation of a key value without disclosure of said key value to the second circuit zone. 10. The circuit of claim 1 wherein the device is configured to use a key value provided to a gate circuit to encrypt data in at least one of the first circuit zone and the second circuit zone to provide corresponding encrypted data to the second circuit zone without disclosure of the key value into the second circuit zone. 11. The circuit of claim 1 wherein the device is configured to use a key value provided to a gate circuit to decrypt data in the second circuit zone to provide corresponding decrypted data to the first circuit zone without disclosure of the key value into the second circuit zone. 12. The circuit of claim 1 further comprising a key initialization circuit comprising at least one of a non-volatile storage in the first circuit zone, a Physical Unclonable Function (PUF) in the first circuit zone, and port for passing a value from outside the device to the first circuit zone. 13. The circuit of claim 1 wherein the device includes a programmable processor located outside the first security zone, wherein the circuit is configured to validate software for controlling the processor according to key values stored in the first circuit zone. 14. The circuit of claim 1 wherein the device comprises a Field Programmable Gate Array (FPGA) configured according to configuration data to implement circuit zones and gate circuits. 15. The circuit of claim 1 wherein the device comprises an Application Specific Integrated Circuit (ASIC). 16. Data stored on a non-transitory computer readable medium comprising configuration instructions for configuring a circuit having: a plurality of mutually exclusive circuit zones including a first circuit zone having a first level of security and a second circuit zone having a second level of security less than the first level of security; one or more gate circuits each providing limited transfer of data between the circuit zones, the gate circuits providing all data connectivity between the first circuit zone and the second circuit zone and statically configured to prevent unmodified transfer of data from the first circuit zone to the second circuit zone. 17. The data of claim 16 wherein the configuration instructions include hardware description language (HDL) instructions. 18. The data of claim 16 wherein the configuration instructions include instructions for configuring a Field Programmable Gate Array (FPGA). 19. A method for operating a device having a first circuit zone having a first level of security and a second circuit zone, mutually exclusive from the first circuit zone and having a second level of security less than the first level of security, the method comprising: maintaining data in the first circuit zone; providing first data in the first circuit zone to an interface in the first circuit zone to a first gate circuit, the first gate circuit coupling the first circuit zone and the second circuit zone; processing the first data in a first gate circuit to produce second data; providing the second data from the first gate circuit through a second interface in the second circuit zone; wherein the first gate circuit is configured by its circuit design to process the first data to produce the second data such that disclosure of the second data does not disclose of the first data. 20. The method of claim 19 wherein processing the first data in the first gate circuit to produce second data comprises forming the second data according to a cryptographic procedure according to a key value in the first data. 21. The method of claim 20 wherein the cryptographic procedure comprises at least one of an encryption procedure, a signing procedure, and a public key generation procedure. 22. The method of claim 19 wherein processing the first data in the first gate circuit to produce second data comprises forming the second data as a secure hash of the first data. 23. The method of claim 19 further comprising: maintaining third data in the second circuit zone; providing the third data in the second circuit zone to a third interface in the second circuit zone to a second gate circuit, the second gate circuit coupling the first circuit zone and the second circuit zone; processing the third data in a second gate circuit to produce fourth data; providing the fourth data from the second gate circuit through a fourth interface in the first circuit zone; wherein the second gate circuit is configured by its circuit design to process the third data to produce the fourth data such that disclosure of the fourth data does not disclose the third data. 24. The method of claim 19 wherein processing the third data in the second gate circuit to produce fourth data comprises forming the fourth data according to a decryption procedure according to a key value in the first circuit zone.
2,400
7,339
7,339
15,099,384
2,426
An automated network-based test system for set top box devices is disclosed. According to certain embodiments, the network-based testing system using Simple Network Management Protocol facilitates remote testing of thousands of set-top boxes, where groups of these set top boxes can be located in various locations that are remote from a main controller server that is running the tests remotely.
1. A system comprising: plurality of video and audio analyzers, wherein each video and audio analyzer of at least a subset of the plurality of video and audio analyzers is configured to send input signals to a corresponding set top box (STB) of a plurality of STBs under test for testing a corresponding STB; a main test controller that is remote from the plurality of video and audio analyzers, the main test controller communicating with the plurality of video and audio analyzers via Ethernet; a headend controller connected to at least one of the plurality of video and audio analyzers, the headend controller configured to communicate with at least one STB under test; and a jump server connected across a network to the headend controller, the jump server also connected across a remote link and across a gateway to the main test controller. 2. The system of claim 1, further comprising a secondary test controller configured to control a video and audio generator that streams video and audio test patterns to at least a subset of the plurality of STBs under test via corresponding video and audio analyzers. 3. The system of claim 1, wherein the main test controller is configured to analyze output signals outputted by at least a subset of the plurality of STBs under test. 4. The system of claim 1, wherein the main test controller is configured to resolve host IP values for each STB of at least a subset of the plurality of STBs under test. 5. The system of claim 1, wherein the main test controller is configured to cause each video and audio analyzer of at least a subset of the plurality of video and audio analyzers to generate infra-red (IR) signals for sending the IR signals to a corresponding STB under test. 6. The system of claim 1, wherein the plurality of video and audio analyzers reside in a virtual local area network (VLAN), and wherein the main test controller establishes communication with the jump server using a secure Internet protocol. 7. The system of claim 1, wherein: each STB under test is configured to communicate with the main test controller using Simple Network Management Protocol (SNMP); the jump server is configured to execute SNMP commands to collect diagnostic and health status of each STB under test; and the headend controller is configured to transmit Data Over Cable Service Interface Specification (DOCSIS) signaling to each STB under test using SNMP, and send signals via a Cable Modem Termination System (CMTS) and a DOCSIS set-top box gateway (DSG channel). 8. A system comprising: a plurality of video and audio analyzers, wherein each video and audio analyzer of at least a subset of the plurality of video and audio analyzers is configured to send input signals to a corresponding set top box (STB) of a plurality of STBs under test for testing a corresponding STB; a main test controller that is remote from the plurality of video and audio analyzers, the main test controller communicating with the plurality of video and audio analyzers via Ethernet; a headend controller connected to at least one of the plurality of video and audio analyzers, the headend controller configured to communicate with at least one STB under test; and a router connected across a network to the headend controller, the router also connected across a remote link and across a gateway to the main test controller. 9. The system of claim 8, wherein the main test controller is configured to analyze output signals outputted by at least a subset of the plurality of STBs under test. 10. The system of claim 8, wherein the main test controller is configured to cause each video and audio analyzer of at least a subset of the plurality of video and audio analyzers to generate infra-red (IR) signals for sending the IR signals to a corresponding STB under test. 11. The system of claim 8, wherein: each STB under test is configured to communicate with the main test controller using Simple Network Management Protocol (SNMP); the main test controller is configured to execute SNMP commands to collect diagnostic and health status of each STB under test; and the headend controller is configured to transmit Data Over Cable Service Interface Specification (DOCSIS) signaling to each STB under test using SNMP, and send signals via a Cable Modem Termination System (CMTS) and a DOCSIS set-top box gateway (DSG channel). 12. A method of automatically testing plurality of devices, comprising the steps of: outputting video and audio signals from at least a subset of a plurality of set-top boxes (STBs) under test; receiving, at at least a subset of a plurality of video and audio analyzers, the video and audio signals output from the at least a subset of the plurality of STBs under test; converting to digitized reading values, at the at least a subset of the plurality of video and audio analyzers, the video and audio signals received from the at least a subset of the plurality of STBs; transmitting, to a main controller, the digitized reading values from the at least a subset of the plurality of video and audio analyzers; and analyzing, at the main controller, the digitized reading values received from the at least a subset of the video and audio analyzers, analysis of the digitized reading values comprising calculations of aspects of the video and audio signals. 13. The method of claim 12, wherein the step of transmitting the digitized reading values further comprises the steps of, prior to the analyzing: transmitting the RF signals across a VLAN from the headend controller to a jump server; and transmitting the RF signals from the jump server to the main controller across a remote link. 14. The method of claim 12, wherein aspects of the video and audio signals analyzed by the main controller comprise at least one of hue, saturation, lightness, color space, and audio quality parameters.
An automated network-based test system for set top box devices is disclosed. According to certain embodiments, the network-based testing system using Simple Network Management Protocol facilitates remote testing of thousands of set-top boxes, where groups of these set top boxes can be located in various locations that are remote from a main controller server that is running the tests remotely.1. A system comprising: plurality of video and audio analyzers, wherein each video and audio analyzer of at least a subset of the plurality of video and audio analyzers is configured to send input signals to a corresponding set top box (STB) of a plurality of STBs under test for testing a corresponding STB; a main test controller that is remote from the plurality of video and audio analyzers, the main test controller communicating with the plurality of video and audio analyzers via Ethernet; a headend controller connected to at least one of the plurality of video and audio analyzers, the headend controller configured to communicate with at least one STB under test; and a jump server connected across a network to the headend controller, the jump server also connected across a remote link and across a gateway to the main test controller. 2. The system of claim 1, further comprising a secondary test controller configured to control a video and audio generator that streams video and audio test patterns to at least a subset of the plurality of STBs under test via corresponding video and audio analyzers. 3. The system of claim 1, wherein the main test controller is configured to analyze output signals outputted by at least a subset of the plurality of STBs under test. 4. The system of claim 1, wherein the main test controller is configured to resolve host IP values for each STB of at least a subset of the plurality of STBs under test. 5. The system of claim 1, wherein the main test controller is configured to cause each video and audio analyzer of at least a subset of the plurality of video and audio analyzers to generate infra-red (IR) signals for sending the IR signals to a corresponding STB under test. 6. The system of claim 1, wherein the plurality of video and audio analyzers reside in a virtual local area network (VLAN), and wherein the main test controller establishes communication with the jump server using a secure Internet protocol. 7. The system of claim 1, wherein: each STB under test is configured to communicate with the main test controller using Simple Network Management Protocol (SNMP); the jump server is configured to execute SNMP commands to collect diagnostic and health status of each STB under test; and the headend controller is configured to transmit Data Over Cable Service Interface Specification (DOCSIS) signaling to each STB under test using SNMP, and send signals via a Cable Modem Termination System (CMTS) and a DOCSIS set-top box gateway (DSG channel). 8. A system comprising: a plurality of video and audio analyzers, wherein each video and audio analyzer of at least a subset of the plurality of video and audio analyzers is configured to send input signals to a corresponding set top box (STB) of a plurality of STBs under test for testing a corresponding STB; a main test controller that is remote from the plurality of video and audio analyzers, the main test controller communicating with the plurality of video and audio analyzers via Ethernet; a headend controller connected to at least one of the plurality of video and audio analyzers, the headend controller configured to communicate with at least one STB under test; and a router connected across a network to the headend controller, the router also connected across a remote link and across a gateway to the main test controller. 9. The system of claim 8, wherein the main test controller is configured to analyze output signals outputted by at least a subset of the plurality of STBs under test. 10. The system of claim 8, wherein the main test controller is configured to cause each video and audio analyzer of at least a subset of the plurality of video and audio analyzers to generate infra-red (IR) signals for sending the IR signals to a corresponding STB under test. 11. The system of claim 8, wherein: each STB under test is configured to communicate with the main test controller using Simple Network Management Protocol (SNMP); the main test controller is configured to execute SNMP commands to collect diagnostic and health status of each STB under test; and the headend controller is configured to transmit Data Over Cable Service Interface Specification (DOCSIS) signaling to each STB under test using SNMP, and send signals via a Cable Modem Termination System (CMTS) and a DOCSIS set-top box gateway (DSG channel). 12. A method of automatically testing plurality of devices, comprising the steps of: outputting video and audio signals from at least a subset of a plurality of set-top boxes (STBs) under test; receiving, at at least a subset of a plurality of video and audio analyzers, the video and audio signals output from the at least a subset of the plurality of STBs under test; converting to digitized reading values, at the at least a subset of the plurality of video and audio analyzers, the video and audio signals received from the at least a subset of the plurality of STBs; transmitting, to a main controller, the digitized reading values from the at least a subset of the plurality of video and audio analyzers; and analyzing, at the main controller, the digitized reading values received from the at least a subset of the video and audio analyzers, analysis of the digitized reading values comprising calculations of aspects of the video and audio signals. 13. The method of claim 12, wherein the step of transmitting the digitized reading values further comprises the steps of, prior to the analyzing: transmitting the RF signals across a VLAN from the headend controller to a jump server; and transmitting the RF signals from the jump server to the main controller across a remote link. 14. The method of claim 12, wherein aspects of the video and audio signals analyzed by the main controller comprise at least one of hue, saturation, lightness, color space, and audio quality parameters.
2,400
7,340
7,340
14,478,011
2,469
Methods and systems for communicating are disclosed. A method includes obtaining input communication symbols selected from a set of communication symbols, converting input communication symbols into transmittable waveforms using non-periodic functions, and transmitting transmittable waveforms over a communication channel. Another method includes receiving transmittable waveforms constructed using non-periodic functions and transmitted over a communication channel, and demodulating transmittable waveforms. A system includes a modulator adapted to obtain input communication symbols selected from a set of communication symbols and adapted to convert input communication symbols into transmittable waveforms using non-periodic functions, and a transmitter or transceiver adapted to transmit transmittable waveforms over a communication channel. Another system includes a receiver or transceiver adapted to receive transmittable waveforms transmitted over a communication channel and constructed using non-periodic functions, and a demodulator adapted to demodulate transmittable waveforms.
1. A method for communicating comprising: obtaining one or a plurality of input communication symbols selected from a set of communication symbols; converting the one or a plurality of input communication symbols into one or a plurality of transmittable waveforms using one or a plurality of non-periodic functions selected from a set of non-periodic functions; and transmitting the one or a plurality of transmittable waveforms over a communication channel. 2. The method for communicating of claim 1, wherein each non-periodic function in the set of non-periodic functions differs from other non-periodic functions in the set of non-periodic functions by at least one of an amplitude, a phase, a frequency, a time direction, a time shift, a rotational direction, and a growth. 3. The method for communicating of claim 1, wherein at least one of the one or a plurality of input communication symbols and the set of non-periodic functions is obtained from at least one of a modulator, a computer-readable media, a computer, a satellite communication device and a mobile device. 4. The method for communicating of claim 1, wherein one or a plurality of portions of at least one of the one or a plurality of transmittable waveforms corresponds to at least one of the one or a plurality of input communication symbols. 5. The method for communicating of claim 1, wherein the one or a plurality of transmittable waveforms is at least one of generated and transmitted over the communication channel using two-component transmission. 6. The method for communicating of claim 5, wherein the one or a plurality of transmittable waveforms is at least one of generated and transmitted over the communication channel further using intra-symbol time multiplexing. 7. A method for communicating comprising: receiving one or a plurality of transmittable waveforms transmitted over a communication channel; and demodulating the one or a plurality of transmittable waveforms, wherein the one or a plurality of transmittable waveforms are constructed using one or a plurality of non-periodic functions selected from a set of non-periodic functions. 8. The method for communicating of claim 7, further comprising communicating one or a plurality of output communication symbols to at least one of a user, a computer-readable media, a computer, a satellite communication device and a mobile device. 9. The method for communicating of claim 7, wherein each non-periodic function in the set of non-periodic functions differs from other non-periodic functions in the set of non-periodic functions by at least one of an amplitude, a phase, a frequency, a time direction, a time shift, a rotational direction, and a growth. 10. The method for communicating of claim 7, wherein one or a plurality of portions of at least one of the one or a plurality of transmittable waveforms corresponds to at least one of one or a plurality of input communication symbols. 11. The method for communicating of claim 7, wherein the one or a plurality of transmittable waveforms is at least one of generated and transmitted over the communication channel using two-component transmission. 12. The method for communicating of claim 11, wherein the one or a plurality of transmittable waveforms is at least one of generated and transmitted over the communication channel further using intra-symbol time multiplexing. 13. The method for communicating of claim 7, wherein at least one of the one or a plurality of transmittable waveforms comprises a head portion and a tail portion, such that the tail portion returns the communication channel to initial conditions. 14. The method for communicating of claim 7, wherein the one or a plurality of transmittable waveforms is received using at least one of a receiver and a transceiver. 15. A system for communicating comprising: a modulator adapted to obtain one or a plurality of input communication symbols selected from a set of communication symbols, and to convert the one or a plurality of input communication symbols into one or a plurality of transmittable waveforms using one or a plurality of non-periodic functions selected from a set of non-periodic functions; and at least one of a transmitter and a first transceiver adapted to transmit the one or a plurality of transmittable waveforms over a communication channel. 16. The system for communicating of claim 15, wherein each non-periodic function in the set of non-periodic functions differs from other non-periodic functions in the set of non-periodic functions by at least one of an amplitude, a phase, a frequency, a time direction, a time shift, a rotational direction, and a growth. 17. The system for communicating of claim 15, wherein at least one of the one or a plurality of input communication symbols and the set of non-periodic functions is obtained from at least one of a modulator, a computer-readable media, a computer, a satellite communication device and a mobile device. 18. The system for communicating of claim 15, wherein one or a plurality of portions of at least one of the one or a plurality of transmittable waveforms corresponds to at least one of the one or a plurality of input communication symbols. 19. The system for communicating of claim 15, wherein the one or a plurality of transmittable waveforms is at least one of generated and transmitted over the communication channel using two-component transmission. 20. The system for communicating of claim 19, wherein the one or a plurality of transmittable waveforms is at least one of generated and transmitted over the communication channel further using intra-symbol time multiplexing.
Methods and systems for communicating are disclosed. A method includes obtaining input communication symbols selected from a set of communication symbols, converting input communication symbols into transmittable waveforms using non-periodic functions, and transmitting transmittable waveforms over a communication channel. Another method includes receiving transmittable waveforms constructed using non-periodic functions and transmitted over a communication channel, and demodulating transmittable waveforms. A system includes a modulator adapted to obtain input communication symbols selected from a set of communication symbols and adapted to convert input communication symbols into transmittable waveforms using non-periodic functions, and a transmitter or transceiver adapted to transmit transmittable waveforms over a communication channel. Another system includes a receiver or transceiver adapted to receive transmittable waveforms transmitted over a communication channel and constructed using non-periodic functions, and a demodulator adapted to demodulate transmittable waveforms.1. A method for communicating comprising: obtaining one or a plurality of input communication symbols selected from a set of communication symbols; converting the one or a plurality of input communication symbols into one or a plurality of transmittable waveforms using one or a plurality of non-periodic functions selected from a set of non-periodic functions; and transmitting the one or a plurality of transmittable waveforms over a communication channel. 2. The method for communicating of claim 1, wherein each non-periodic function in the set of non-periodic functions differs from other non-periodic functions in the set of non-periodic functions by at least one of an amplitude, a phase, a frequency, a time direction, a time shift, a rotational direction, and a growth. 3. The method for communicating of claim 1, wherein at least one of the one or a plurality of input communication symbols and the set of non-periodic functions is obtained from at least one of a modulator, a computer-readable media, a computer, a satellite communication device and a mobile device. 4. The method for communicating of claim 1, wherein one or a plurality of portions of at least one of the one or a plurality of transmittable waveforms corresponds to at least one of the one or a plurality of input communication symbols. 5. The method for communicating of claim 1, wherein the one or a plurality of transmittable waveforms is at least one of generated and transmitted over the communication channel using two-component transmission. 6. The method for communicating of claim 5, wherein the one or a plurality of transmittable waveforms is at least one of generated and transmitted over the communication channel further using intra-symbol time multiplexing. 7. A method for communicating comprising: receiving one or a plurality of transmittable waveforms transmitted over a communication channel; and demodulating the one or a plurality of transmittable waveforms, wherein the one or a plurality of transmittable waveforms are constructed using one or a plurality of non-periodic functions selected from a set of non-periodic functions. 8. The method for communicating of claim 7, further comprising communicating one or a plurality of output communication symbols to at least one of a user, a computer-readable media, a computer, a satellite communication device and a mobile device. 9. The method for communicating of claim 7, wherein each non-periodic function in the set of non-periodic functions differs from other non-periodic functions in the set of non-periodic functions by at least one of an amplitude, a phase, a frequency, a time direction, a time shift, a rotational direction, and a growth. 10. The method for communicating of claim 7, wherein one or a plurality of portions of at least one of the one or a plurality of transmittable waveforms corresponds to at least one of one or a plurality of input communication symbols. 11. The method for communicating of claim 7, wherein the one or a plurality of transmittable waveforms is at least one of generated and transmitted over the communication channel using two-component transmission. 12. The method for communicating of claim 11, wherein the one or a plurality of transmittable waveforms is at least one of generated and transmitted over the communication channel further using intra-symbol time multiplexing. 13. The method for communicating of claim 7, wherein at least one of the one or a plurality of transmittable waveforms comprises a head portion and a tail portion, such that the tail portion returns the communication channel to initial conditions. 14. The method for communicating of claim 7, wherein the one or a plurality of transmittable waveforms is received using at least one of a receiver and a transceiver. 15. A system for communicating comprising: a modulator adapted to obtain one or a plurality of input communication symbols selected from a set of communication symbols, and to convert the one or a plurality of input communication symbols into one or a plurality of transmittable waveforms using one or a plurality of non-periodic functions selected from a set of non-periodic functions; and at least one of a transmitter and a first transceiver adapted to transmit the one or a plurality of transmittable waveforms over a communication channel. 16. The system for communicating of claim 15, wherein each non-periodic function in the set of non-periodic functions differs from other non-periodic functions in the set of non-periodic functions by at least one of an amplitude, a phase, a frequency, a time direction, a time shift, a rotational direction, and a growth. 17. The system for communicating of claim 15, wherein at least one of the one or a plurality of input communication symbols and the set of non-periodic functions is obtained from at least one of a modulator, a computer-readable media, a computer, a satellite communication device and a mobile device. 18. The system for communicating of claim 15, wherein one or a plurality of portions of at least one of the one or a plurality of transmittable waveforms corresponds to at least one of the one or a plurality of input communication symbols. 19. The system for communicating of claim 15, wherein the one or a plurality of transmittable waveforms is at least one of generated and transmitted over the communication channel using two-component transmission. 20. The system for communicating of claim 19, wherein the one or a plurality of transmittable waveforms is at least one of generated and transmitted over the communication channel further using intra-symbol time multiplexing.
2,400
7,341
7,341
14,634,008
2,431
Systems, methods, and computer-readable storage media for authenticating a user account with a synchronized content management system are disclosed. A synchronized online content management system may receive a request from a client device to access content in the content management system via a web browser that is running on the client device. The system may identify that a client-side application for the content management system has been installed on the client device and that the client-side application is already logged into a user account with the content management system. The system can cause the web browser to open a local host connection to the client-side application such that the web browser may be able to obtain from the client application some user account identifying information for the user account. The system can then cause the web browser to log into the user account by using the user account identifying information.
1. A computer-implemented method comprising: receiving, at a synchronized content management system, a request from a device to access the synchronized content management system via a web browser running on the device; identifying a client-side application installed on the device, the client-side application being associated with the synchronized content management system; determining that the client-side application is logged into a user account with the synchronized content management system; causing the web browser to open a local host connection to a local host server run by the client-side application wherein the web browser automatically accesses user account identifying information for the user account at the local host server through the local host connection; and causing the web browser to log into the user account by using the user account identifying information. 2. The computer-implemented method of claim 1, wherein the user account identifying information is at least one of a name, a username, an email address, a password, a token, and a cryptographic nonce. 3. The computer-implemented method of claim 1, wherein the web browser logs into the user account without receiving, from a user of the device, user credentials associated with the user account. 4. (canceled) 5. The computer-implemented method of claim 1, further comprising: sending a confirmation request to the web browser, the confirmation request asking a user of the device to confirm whether to log into the user account; when a positive confirmation is received from the user in response to the confirmation request, causing the web browser to log in to the user account without requiring the user to provide login credentials; and when a negative confirmation is received from the user in response to the confirmation request, causing the web browser to request the login credentials from the user. 6. A system comprising: a processor; and a non-transitory computer-readable storage medium storing instructions which, when executed by the processor, cause the processor to perform operations comprising: sending, from a client device to a synchronized content management system, a request to access the synchronized content management system via a web browser running on the client device; establishing a local host connection between the web browser and a local host server run by a client-side application associated with the synchronized content management system; receiving user account identifying information from the local host server run by the client-side application via the local host connection; and logging the web browser into the user account automatically by using the user account identifying information. 7. The system of claim 6, wherein the client-side application runs on the client device. 8. The system of claim 6, wherein the client-side application is logged into the user account before the request is sent. 9. (canceled) 10. The system of claim 6, wherein logging the web browser into the user account comprises: upon navigating to a website associated with the synchronized content management system, transmitting the user account identifying information to the synchronized content management system via the web browser. 11. The system of claim 10, wherein logging the web browser into the user account further comprises: presenting, to a user of the client device, a choice between a first option to log into the user account and a second option to log into a new user account; receiving a user input in response to the choice; when the user input indicates that the user prefers the first option, logging the web browser into the user account; and when the user input indicates that the user prefers the second option, requesting to the user to enter credentials for the new user account and logging the web browser into the new user account by using the credentials. 12. The system of claim 6, wherein the user account identifying information is at least one of a name, a username, an email address, a password, a token, and a cryptographic nonce. 13. The system of claim 6, wherein logging the web browser into the user account is performed at a website associated with the synchronized content management system and without the web browser receiving, from a user of the client device, user credentials associated with the user account. 14. A non-transitory computer-readable storage device storing instructions which, when executed by a processor, cause the processor to perform operations comprising: at a client application, on a client device, associated with a content management system, logging into a user account associated with the content management system; upon receiving a request from a web browser, on the client device, automatically establishing a communication channel between the web browser and the client application, establishing the communication channel via a local host server run by the client application on the client device; and providing user account identifying information to the web browser via the communication channel, thereby enabling the web browser to automatically log into the user account using the user account identifying information. 15. The non-transitory computer-readable storage device of claim 14, wherein the user account identifying information is at least one of a name, a username, an email address, a password, a token, and a cryptographic nonce. 16. (canceled) 17. The non-transitory computer-readable storage device of claim 14, storing additional instructions which, when executed by the processor, cause the processor to perform further operations comprising: prior to establishing the communication channel, verifying that the request comes from a legitimate source. 18. The non-transitory computer-readable storage device of claim 17, wherein verifying that the request comes from the legitimate source comprises: determining whether the request comes from a local connection. 19. The non-transitory computer-readable storage device of claim 17, wherein verifying that the request comes from the legitimate source comprises: determining whether the request comes from a website associated with the content management system by examining an origin header associated with the request. 20. The non-transitory computer-readable storage device of claim 17, wherein verifying that the request comes from the legitimate source comprises: determining whether the request comes from a known web browser.
Systems, methods, and computer-readable storage media for authenticating a user account with a synchronized content management system are disclosed. A synchronized online content management system may receive a request from a client device to access content in the content management system via a web browser that is running on the client device. The system may identify that a client-side application for the content management system has been installed on the client device and that the client-side application is already logged into a user account with the content management system. The system can cause the web browser to open a local host connection to the client-side application such that the web browser may be able to obtain from the client application some user account identifying information for the user account. The system can then cause the web browser to log into the user account by using the user account identifying information.1. A computer-implemented method comprising: receiving, at a synchronized content management system, a request from a device to access the synchronized content management system via a web browser running on the device; identifying a client-side application installed on the device, the client-side application being associated with the synchronized content management system; determining that the client-side application is logged into a user account with the synchronized content management system; causing the web browser to open a local host connection to a local host server run by the client-side application wherein the web browser automatically accesses user account identifying information for the user account at the local host server through the local host connection; and causing the web browser to log into the user account by using the user account identifying information. 2. The computer-implemented method of claim 1, wherein the user account identifying information is at least one of a name, a username, an email address, a password, a token, and a cryptographic nonce. 3. The computer-implemented method of claim 1, wherein the web browser logs into the user account without receiving, from a user of the device, user credentials associated with the user account. 4. (canceled) 5. The computer-implemented method of claim 1, further comprising: sending a confirmation request to the web browser, the confirmation request asking a user of the device to confirm whether to log into the user account; when a positive confirmation is received from the user in response to the confirmation request, causing the web browser to log in to the user account without requiring the user to provide login credentials; and when a negative confirmation is received from the user in response to the confirmation request, causing the web browser to request the login credentials from the user. 6. A system comprising: a processor; and a non-transitory computer-readable storage medium storing instructions which, when executed by the processor, cause the processor to perform operations comprising: sending, from a client device to a synchronized content management system, a request to access the synchronized content management system via a web browser running on the client device; establishing a local host connection between the web browser and a local host server run by a client-side application associated with the synchronized content management system; receiving user account identifying information from the local host server run by the client-side application via the local host connection; and logging the web browser into the user account automatically by using the user account identifying information. 7. The system of claim 6, wherein the client-side application runs on the client device. 8. The system of claim 6, wherein the client-side application is logged into the user account before the request is sent. 9. (canceled) 10. The system of claim 6, wherein logging the web browser into the user account comprises: upon navigating to a website associated with the synchronized content management system, transmitting the user account identifying information to the synchronized content management system via the web browser. 11. The system of claim 10, wherein logging the web browser into the user account further comprises: presenting, to a user of the client device, a choice between a first option to log into the user account and a second option to log into a new user account; receiving a user input in response to the choice; when the user input indicates that the user prefers the first option, logging the web browser into the user account; and when the user input indicates that the user prefers the second option, requesting to the user to enter credentials for the new user account and logging the web browser into the new user account by using the credentials. 12. The system of claim 6, wherein the user account identifying information is at least one of a name, a username, an email address, a password, a token, and a cryptographic nonce. 13. The system of claim 6, wherein logging the web browser into the user account is performed at a website associated with the synchronized content management system and without the web browser receiving, from a user of the client device, user credentials associated with the user account. 14. A non-transitory computer-readable storage device storing instructions which, when executed by a processor, cause the processor to perform operations comprising: at a client application, on a client device, associated with a content management system, logging into a user account associated with the content management system; upon receiving a request from a web browser, on the client device, automatically establishing a communication channel between the web browser and the client application, establishing the communication channel via a local host server run by the client application on the client device; and providing user account identifying information to the web browser via the communication channel, thereby enabling the web browser to automatically log into the user account using the user account identifying information. 15. The non-transitory computer-readable storage device of claim 14, wherein the user account identifying information is at least one of a name, a username, an email address, a password, a token, and a cryptographic nonce. 16. (canceled) 17. The non-transitory computer-readable storage device of claim 14, storing additional instructions which, when executed by the processor, cause the processor to perform further operations comprising: prior to establishing the communication channel, verifying that the request comes from a legitimate source. 18. The non-transitory computer-readable storage device of claim 17, wherein verifying that the request comes from the legitimate source comprises: determining whether the request comes from a local connection. 19. The non-transitory computer-readable storage device of claim 17, wherein verifying that the request comes from the legitimate source comprises: determining whether the request comes from a website associated with the content management system by examining an origin header associated with the request. 20. The non-transitory computer-readable storage device of claim 17, wherein verifying that the request comes from the legitimate source comprises: determining whether the request comes from a known web browser.
2,400
7,342
7,342
12,736,463
2,485
Methods and apparatus are provided for template matching prediction in video encoding and decoding. An apparatus includes an encoder for encoding a target block in a picture by determining at least one predictor for the target block and respectively utilizing the at least one predictor as a template to search for at least one additional predictor for the target block.
1. An apparatus, comprising: an encoder for encoding a target block in a picture by determining at least one predictor for the target block and respectively utilizing the at least one predictor as a template to search for at least one additional predictor for the target block. 2. The apparatus of claim 1, wherein the at least one predictor is an intra predictor, an inter predictor, or a combination thereof. 3. The apparatus of claim 2, wherein side information for the at least one predictor is at least one of implicitly coded and explicitly coded. 4. The apparatus of claim 1, wherein the at least one additional predictor is obtained using a template matching prediction process and a multi-hypothesis motion compensation prediction process. 5. The apparatus of claim 4, wherein an explicit motion estimation process is used to determine the at least one predictor and the template matching prediction process is used to search for the at least one additional predictor with respect to multiple reference lists. 6. The apparatus of claim 5, wherein the explicit motion estimation process is constrained to a particular one of the multiple reference lists, and the template matching prediction process is constrained to a different one of the multiple reference lists. 7. The apparatus of claim 5, wherein the at least one predictor comprises a first predictor and a second predictor obtained by respectively applying the explicit motion estimation process and an implicit motion estimation process with respect to a first reference list and a second reference list from among the multiple reference lists, and wherein the at least one additional predictor comprises a first additional predictor and a second additional predictor obtained by respectively utilizing the first predictor and the second predictor in the template matching prediction process with respect to the second reference list and the first reference list. 8. The apparatus of claim 7, wherein the first predictor and the second additional predictor reside in different reference pictures. 9. The apparatus of claim 5, wherein the explicit motion estimation process is used in a particular one reference picture corresponding to a particular one of the multiple reference lists, and the template matching prediction process is used in the particular one reference picture or a different reference picture corresponding to a different one of the multiple reference lists. 10. The apparatus of claim 4, wherein the at least one prediction is derived or estimated using a motion vector predictor. 11. A method, comprising: encoding a target block in a picture by determining at least one predictor for the target block and respectively utilizing the at least one predictor as a template to search for at least one additional predictor for the target block. 12. The method of claim 11, wherein the at least one predictor is an intra predictor, an inter predictor, or a combination thereof. 13. The method of claim 12, wherein side information for the at least one predictor is at least one of implicitly coded and explicitly coded. 14. The method of claim 11, wherein the at least one additional predictor is obtained using a template matching prediction process and a multi-hypothesis motion compensation prediction process. 15. The method of claim 14, wherein an explicit motion estimation process is used to determine the at least one predictor and the template matching prediction process is used to search for the at least one additional predictor with respect to multiple reference lists. 16. The method of claim 15, wherein the explicit motion estimation process is constrained to a particular one of the multiple reference lists, and the template matching prediction process is constrained to a different one of the multiple reference lists. 17. The method of claim 15, wherein the at least one predictor comprises a first predictor and a second predictor obtained by respectively applying the explicit motion estimation process and an implicit motion estimation process with respect to a first reference list and a second reference list from among the multiple reference lists, and wherein the at least one additional predictor comprises a first additional predictor and a second additional predictor obtained by respectively utilizing the first predictor and the second predictor in the template matching prediction process with respect to the second reference list and the first reference list. 18. The method of claim 17, wherein the first predictor and the second additional predictor reside in different reference pictures. 19. The method of claim 15, wherein the explicit motion estimation process is used in a particular one reference picture corresponding to a particular one of the multiple reference lists, and the template matching prediction process is used in the particular one reference picture or a different reference picture corresponding to a different one of the multiple reference lists. 20. The method of claim 14, wherein the at least one prediction is derived or estimated using a motion vector predictor. 21. An apparatus, comprising: a decoder for decoding a target block in a picture by determining at least one predictor for the target block and respectively utilizing the at least one predictor as a template to search for at least one additional predictor for the target block. 22. The apparatus of claim 21, wherein the at least one predictor is an intra predictor, an inter predictor, or a combination thereof. 23. The apparatus of claim 22, wherein side information for the at least one predictor is at least one of derived and explicitly decoded. 24. The apparatus of claim 21, wherein the at least one additional predictor is obtained using a template matching prediction process and a multi-hypothesis motion compensation prediction process. 25. The apparatus of claim 24, wherein an explicit motion estimation process is used to determine the at least one predictor and the template matching prediction process is used to search for the at least one additional predictor with respect to multiple reference lists. 26. The apparatus of claim 25, wherein the explicit motion estimation process is constrained to a particular one of the multiple reference lists, and the template matching prediction process is constrained to a different one of the multiple reference lists. 27. The apparatus of claim 25, wherein the at least one predictor comprises a first predictor and a second predictor obtained by respectively applying the explicit motion estimation process and an implicit motion estimation process with respect to a first reference list and a second reference list from among the multiple reference lists, and wherein the at least one additional predictor comprises a first additional predictor and a second additional predictor obtained by respectively utilizing the first predictor and the second predictor in the template matching prediction process with respect to the second reference list and the first reference list. 28. The apparatus of claim 27, wherein the first predictor and the second additional predictor reside in different reference pictures. 29. The apparatus of claim 25, wherein the explicit motion estimation process is used in a particular one reference picture corresponding to a particular one of the multiple reference lists, and the template matching prediction process is used in the particular one reference picture or a different reference picture corresponding to a different one of the multiple reference lists. 30. The apparatus of claim 24, wherein the at least one prediction is derived or estimated using a motion vector predictor. 31. A method, comprising: decoding a target block in a picture by determining at least one predictor for the target block and respectively utilizing the at least one predictor as a template to search for at least one additional predictor for the target block. 32. The method of claim 31, wherein the at least one predictor is an intra predictor, an inter predictor, or a combination thereof. 33. The method of claim 32, wherein side information for the at least one predictor is at least one of derived and explicitly decoded. 34. The method of claim 31, wherein the at least one additional predictor is obtained using a template matching prediction process and a multi-hypothesis motion compensation prediction process. 35. The method of claim 34, wherein an explicit motion estimation process is used to determine the at least one predictor and the template matching prediction process is used to search for the at least one additional predictor with respect to multiple reference lists. 36. The method of claim 35, wherein the explicit motion estimation process is constrained to a particular one of the multiple reference lists, and the template matching prediction process is constrained to a different one of the multiple reference lists. 37. The method of claim 35, wherein the at least one predictor comprises a first predictor and a second predictor obtained by respectively applying the explicit motion estimation process and an implicit motion estimation process, with respect to a first reference list and a second reference list from among the multiple reference lists, and wherein the at least one additional predictor comprises a first additional predictor and a second additional predictor obtained by respectively utilizing the first predictor and the second predictor in the template matching prediction process with respect to the second reference list and the first reference list. 38. The method of claim 37, wherein the first predictor and the second additional predictor reside in different reference pictures. 39. The method of claim 35, wherein the explicit motion estimation process is used in a particular one reference picture corresponding to a particular one of the multiple reference lists, and the template matching prediction process is used in the particular one reference picture or a different reference picture corresponding to a different one of the multiple reference lists. 40. The method of claim 34, wherein the at least one prediction is derived or estimated using a motion vector predictor. 41. A storage media having video signal data encoded thereupon, comprising: a target block in a picture encoded by determining at least one predictor for the target block and respectively utilizing the at least one predictor as a template to search for at least one additional predictor for the target block.
Methods and apparatus are provided for template matching prediction in video encoding and decoding. An apparatus includes an encoder for encoding a target block in a picture by determining at least one predictor for the target block and respectively utilizing the at least one predictor as a template to search for at least one additional predictor for the target block.1. An apparatus, comprising: an encoder for encoding a target block in a picture by determining at least one predictor for the target block and respectively utilizing the at least one predictor as a template to search for at least one additional predictor for the target block. 2. The apparatus of claim 1, wherein the at least one predictor is an intra predictor, an inter predictor, or a combination thereof. 3. The apparatus of claim 2, wherein side information for the at least one predictor is at least one of implicitly coded and explicitly coded. 4. The apparatus of claim 1, wherein the at least one additional predictor is obtained using a template matching prediction process and a multi-hypothesis motion compensation prediction process. 5. The apparatus of claim 4, wherein an explicit motion estimation process is used to determine the at least one predictor and the template matching prediction process is used to search for the at least one additional predictor with respect to multiple reference lists. 6. The apparatus of claim 5, wherein the explicit motion estimation process is constrained to a particular one of the multiple reference lists, and the template matching prediction process is constrained to a different one of the multiple reference lists. 7. The apparatus of claim 5, wherein the at least one predictor comprises a first predictor and a second predictor obtained by respectively applying the explicit motion estimation process and an implicit motion estimation process with respect to a first reference list and a second reference list from among the multiple reference lists, and wherein the at least one additional predictor comprises a first additional predictor and a second additional predictor obtained by respectively utilizing the first predictor and the second predictor in the template matching prediction process with respect to the second reference list and the first reference list. 8. The apparatus of claim 7, wherein the first predictor and the second additional predictor reside in different reference pictures. 9. The apparatus of claim 5, wherein the explicit motion estimation process is used in a particular one reference picture corresponding to a particular one of the multiple reference lists, and the template matching prediction process is used in the particular one reference picture or a different reference picture corresponding to a different one of the multiple reference lists. 10. The apparatus of claim 4, wherein the at least one prediction is derived or estimated using a motion vector predictor. 11. A method, comprising: encoding a target block in a picture by determining at least one predictor for the target block and respectively utilizing the at least one predictor as a template to search for at least one additional predictor for the target block. 12. The method of claim 11, wherein the at least one predictor is an intra predictor, an inter predictor, or a combination thereof. 13. The method of claim 12, wherein side information for the at least one predictor is at least one of implicitly coded and explicitly coded. 14. The method of claim 11, wherein the at least one additional predictor is obtained using a template matching prediction process and a multi-hypothesis motion compensation prediction process. 15. The method of claim 14, wherein an explicit motion estimation process is used to determine the at least one predictor and the template matching prediction process is used to search for the at least one additional predictor with respect to multiple reference lists. 16. The method of claim 15, wherein the explicit motion estimation process is constrained to a particular one of the multiple reference lists, and the template matching prediction process is constrained to a different one of the multiple reference lists. 17. The method of claim 15, wherein the at least one predictor comprises a first predictor and a second predictor obtained by respectively applying the explicit motion estimation process and an implicit motion estimation process with respect to a first reference list and a second reference list from among the multiple reference lists, and wherein the at least one additional predictor comprises a first additional predictor and a second additional predictor obtained by respectively utilizing the first predictor and the second predictor in the template matching prediction process with respect to the second reference list and the first reference list. 18. The method of claim 17, wherein the first predictor and the second additional predictor reside in different reference pictures. 19. The method of claim 15, wherein the explicit motion estimation process is used in a particular one reference picture corresponding to a particular one of the multiple reference lists, and the template matching prediction process is used in the particular one reference picture or a different reference picture corresponding to a different one of the multiple reference lists. 20. The method of claim 14, wherein the at least one prediction is derived or estimated using a motion vector predictor. 21. An apparatus, comprising: a decoder for decoding a target block in a picture by determining at least one predictor for the target block and respectively utilizing the at least one predictor as a template to search for at least one additional predictor for the target block. 22. The apparatus of claim 21, wherein the at least one predictor is an intra predictor, an inter predictor, or a combination thereof. 23. The apparatus of claim 22, wherein side information for the at least one predictor is at least one of derived and explicitly decoded. 24. The apparatus of claim 21, wherein the at least one additional predictor is obtained using a template matching prediction process and a multi-hypothesis motion compensation prediction process. 25. The apparatus of claim 24, wherein an explicit motion estimation process is used to determine the at least one predictor and the template matching prediction process is used to search for the at least one additional predictor with respect to multiple reference lists. 26. The apparatus of claim 25, wherein the explicit motion estimation process is constrained to a particular one of the multiple reference lists, and the template matching prediction process is constrained to a different one of the multiple reference lists. 27. The apparatus of claim 25, wherein the at least one predictor comprises a first predictor and a second predictor obtained by respectively applying the explicit motion estimation process and an implicit motion estimation process with respect to a first reference list and a second reference list from among the multiple reference lists, and wherein the at least one additional predictor comprises a first additional predictor and a second additional predictor obtained by respectively utilizing the first predictor and the second predictor in the template matching prediction process with respect to the second reference list and the first reference list. 28. The apparatus of claim 27, wherein the first predictor and the second additional predictor reside in different reference pictures. 29. The apparatus of claim 25, wherein the explicit motion estimation process is used in a particular one reference picture corresponding to a particular one of the multiple reference lists, and the template matching prediction process is used in the particular one reference picture or a different reference picture corresponding to a different one of the multiple reference lists. 30. The apparatus of claim 24, wherein the at least one prediction is derived or estimated using a motion vector predictor. 31. A method, comprising: decoding a target block in a picture by determining at least one predictor for the target block and respectively utilizing the at least one predictor as a template to search for at least one additional predictor for the target block. 32. The method of claim 31, wherein the at least one predictor is an intra predictor, an inter predictor, or a combination thereof. 33. The method of claim 32, wherein side information for the at least one predictor is at least one of derived and explicitly decoded. 34. The method of claim 31, wherein the at least one additional predictor is obtained using a template matching prediction process and a multi-hypothesis motion compensation prediction process. 35. The method of claim 34, wherein an explicit motion estimation process is used to determine the at least one predictor and the template matching prediction process is used to search for the at least one additional predictor with respect to multiple reference lists. 36. The method of claim 35, wherein the explicit motion estimation process is constrained to a particular one of the multiple reference lists, and the template matching prediction process is constrained to a different one of the multiple reference lists. 37. The method of claim 35, wherein the at least one predictor comprises a first predictor and a second predictor obtained by respectively applying the explicit motion estimation process and an implicit motion estimation process, with respect to a first reference list and a second reference list from among the multiple reference lists, and wherein the at least one additional predictor comprises a first additional predictor and a second additional predictor obtained by respectively utilizing the first predictor and the second predictor in the template matching prediction process with respect to the second reference list and the first reference list. 38. The method of claim 37, wherein the first predictor and the second additional predictor reside in different reference pictures. 39. The method of claim 35, wherein the explicit motion estimation process is used in a particular one reference picture corresponding to a particular one of the multiple reference lists, and the template matching prediction process is used in the particular one reference picture or a different reference picture corresponding to a different one of the multiple reference lists. 40. The method of claim 34, wherein the at least one prediction is derived or estimated using a motion vector predictor. 41. A storage media having video signal data encoded thereupon, comprising: a target block in a picture encoded by determining at least one predictor for the target block and respectively utilizing the at least one predictor as a template to search for at least one additional predictor for the target block.
2,400
7,343
7,343
12,771,071
2,449
A server-based environment for management of widget programs distributable to remote execution and display devices is provided. Embodiments of the present invention provide a set of tools for operator development of widget programs, operator provisioning of the widget programs and user selection of programs or parameters for the widget programs. Embodiments of the present invention further provide for operator-determined widget program or widget program functionality distribution.
1. A method comprising: importing a widget program package into a widget management system, wherein the widget program package comprises a widget program executable by a remote network node; restricting access to the widget program to a subset of customers of the widget management system; and providing the widget program to a customer of the widget management system for installation on the remote network node, wherein the customer of the widget management system is a member of the subset of customers. 2. The method of claim 1 wherein said providing comprises: selecting the customer of the widget management system from all customers of the widget management system; and automatically transmitting the widget program to the remote network node associated with the customer. 3. The method of claim 1 wherein said restricting access comprises: assigning the widget program to a service tier, wherein the subset of customers are members of the service tier. 4. The method of claim 3 wherein said providing comprises: identifying a customer service tier associated with the customer of the widget management system; displaying, to the customer, information associated with the widget management program, if the customer service tier matches the service tier assigned to the widget program; and transmitting the widget program to the remote network node associated with the customer, if the customer selects the widget program. 5. The method of claim 3 further comprising: defining the service tier to correspond to a customer purchased level of service. 6. The method of claim 3 further comprising: assigning a range of functionality of the widget program to the service tier. 7. The method of claim 1 wherein the widget program package further comprises: a widget manifest file describing the widget program, wherein the widget manifest file comprises one or more of a minimum firmware version of the remote network node, a version number of the widget program, a property definition of the widget program, a run mode of the widget program, an identifier for a widget engine, and an editor key. 8. The method of claim 7 wherein the property definition comprises one or more of an admin property definition editable by an management portal account having authority to modify widget admin properties, a premise default property definition specifying an initial default setting editable by an end-user account, and a user property definition. 9. The method of claim 7 wherein the run mode of the widget program comprises one of: a static run mode providing that an icon associated with the widget program does not change; a persistent run mode providing that the icon associated with the widget program changes with new data as the data arrives; and a persistent with persistent window run mode providing that the icon associated with the widget program changes with new data as the data arrives and a window associated with the widget program is instantiated off screen when not displayed on a display device. 10. The method of claim 1 wherein said restricting access comprises: associating the widget program with a customer service, wherein the subset of customers subscribe to the customer service. 11. A widget management system comprising: a database server configured to store a widget program package, wherein the widget program package comprises a widget program executable by a remote network node; a management portal server configured to restrict access to the widget program to a subset of users of the widget management system; and a third server configured to provide the widget program to a customer of the widget management system for installation on a remote network node, wherein the customer of the widget management system is a member of the subset of customers. 12. The widget management system of claim 11 wherein the third server is configured to perform said providing by being further configured to: select the customer of the widget management system from all customers of the widget management system; and automatically transmit the widget program to the remote network node associated with the customer. 13. The widget management system of claim 11 wherein the management portal server is configured to restrict access to the widget program by further being configured to: assign the widget program to a service tier, wherein the subset of customers are members of the service tier. 14. The widget management system of claim 13 wherein the third server is configured to perform said providing by being further configured to: identify a customer service tier associated with the customer of the widget management system; display, to the customer, information associated with the widget management program, if the customer service tier matches the service tier assigned to the widget program; and transmit the widget program to the remote network node associated with the customer, if the customer selects the widget program. 15. The widget management system of claim 13 wherein the management portal server is further configured to: define the service tier to correspond to a customer purchased level of service. 16. The widget management system of claim 13 wherein the management portal server is further configured to: assign a range of functionality of the widget program to the service tier. 17. The widget management system of claim 11 wherein the widget program package further comprises: a widget manifest file describing the widget program, wherein the widget manifest file comprises one or more of a minimum firmware version of the remote network node, a version number of the widget program, a property definition of the widget program, a run mode of the widget program, an identifier for a widget engine, and an editor key. 18. The widget management system of claim 17 wherein the property definition comprises one or more of an admin property definition editable by an management portal account having authority to modify widget admin properties, a premise default property definition specifying an initial default setting editable by an end-user account, and a user property definition. 19. The widget management system of claim 17 wherein the run mode of the widget program comprises one of: a static run mode providing that an icon associated with the widget program does not change when displayed on the remote network node; a persistent run mode providing that the icon associated with the widget program changes with new data as the data arrives when displayed on the remote network node; and a persistent with persistent window run mode providing that the icon associated with the widget program changes with new data as the data arrives and a window associated with the widget program is instantiated off screen when not displayed on the remote network node. 20. The widget management system of claim 11 wherein the management portal server is configured to restrict access to the widget program by further being configured to: associate the widget program with a customer service, wherein the subset of customers subscribe to the customer service. 21. A widget management system comprising: means for importing a widget program package into the widget management system, wherein the widget program package comprises a widget program executable by a remote network node; means for restricting access to the widget program to a subset of customers of the widget management system; and means for providing the widget program to a customer of the widget management system for installation on the remote network node, wherein the customer of the widget management system is a member of the subset of customers. 22. The widget management system of claim 21 wherein said means for providing comprises: means for selecting the customer of the widget management system from all customers of the widget management system; and means for automatically transmitting the widget program to the remote network node associated with the customer. 23. The widget management system of claim 21 wherein said means for providing comprises: means for assigning the widget program to a service tier, wherein the subset of customers are members of the service tier; means for identifying a customer service tier associated with the customer of the widget management system; means for displaying, to the customer, information associated with the widget management program, if the customer service tier matches the service tier assigned to the widget program; and means for transmitting the widget program to the remote network node associated with the customer, if the customer selects the widget program. 24. The widget management system of claim 21 further comprising: means for defining the service tier to correspond to a customer purchased level of service.
A server-based environment for management of widget programs distributable to remote execution and display devices is provided. Embodiments of the present invention provide a set of tools for operator development of widget programs, operator provisioning of the widget programs and user selection of programs or parameters for the widget programs. Embodiments of the present invention further provide for operator-determined widget program or widget program functionality distribution.1. A method comprising: importing a widget program package into a widget management system, wherein the widget program package comprises a widget program executable by a remote network node; restricting access to the widget program to a subset of customers of the widget management system; and providing the widget program to a customer of the widget management system for installation on the remote network node, wherein the customer of the widget management system is a member of the subset of customers. 2. The method of claim 1 wherein said providing comprises: selecting the customer of the widget management system from all customers of the widget management system; and automatically transmitting the widget program to the remote network node associated with the customer. 3. The method of claim 1 wherein said restricting access comprises: assigning the widget program to a service tier, wherein the subset of customers are members of the service tier. 4. The method of claim 3 wherein said providing comprises: identifying a customer service tier associated with the customer of the widget management system; displaying, to the customer, information associated with the widget management program, if the customer service tier matches the service tier assigned to the widget program; and transmitting the widget program to the remote network node associated with the customer, if the customer selects the widget program. 5. The method of claim 3 further comprising: defining the service tier to correspond to a customer purchased level of service. 6. The method of claim 3 further comprising: assigning a range of functionality of the widget program to the service tier. 7. The method of claim 1 wherein the widget program package further comprises: a widget manifest file describing the widget program, wherein the widget manifest file comprises one or more of a minimum firmware version of the remote network node, a version number of the widget program, a property definition of the widget program, a run mode of the widget program, an identifier for a widget engine, and an editor key. 8. The method of claim 7 wherein the property definition comprises one or more of an admin property definition editable by an management portal account having authority to modify widget admin properties, a premise default property definition specifying an initial default setting editable by an end-user account, and a user property definition. 9. The method of claim 7 wherein the run mode of the widget program comprises one of: a static run mode providing that an icon associated with the widget program does not change; a persistent run mode providing that the icon associated with the widget program changes with new data as the data arrives; and a persistent with persistent window run mode providing that the icon associated with the widget program changes with new data as the data arrives and a window associated with the widget program is instantiated off screen when not displayed on a display device. 10. The method of claim 1 wherein said restricting access comprises: associating the widget program with a customer service, wherein the subset of customers subscribe to the customer service. 11. A widget management system comprising: a database server configured to store a widget program package, wherein the widget program package comprises a widget program executable by a remote network node; a management portal server configured to restrict access to the widget program to a subset of users of the widget management system; and a third server configured to provide the widget program to a customer of the widget management system for installation on a remote network node, wherein the customer of the widget management system is a member of the subset of customers. 12. The widget management system of claim 11 wherein the third server is configured to perform said providing by being further configured to: select the customer of the widget management system from all customers of the widget management system; and automatically transmit the widget program to the remote network node associated with the customer. 13. The widget management system of claim 11 wherein the management portal server is configured to restrict access to the widget program by further being configured to: assign the widget program to a service tier, wherein the subset of customers are members of the service tier. 14. The widget management system of claim 13 wherein the third server is configured to perform said providing by being further configured to: identify a customer service tier associated with the customer of the widget management system; display, to the customer, information associated with the widget management program, if the customer service tier matches the service tier assigned to the widget program; and transmit the widget program to the remote network node associated with the customer, if the customer selects the widget program. 15. The widget management system of claim 13 wherein the management portal server is further configured to: define the service tier to correspond to a customer purchased level of service. 16. The widget management system of claim 13 wherein the management portal server is further configured to: assign a range of functionality of the widget program to the service tier. 17. The widget management system of claim 11 wherein the widget program package further comprises: a widget manifest file describing the widget program, wherein the widget manifest file comprises one or more of a minimum firmware version of the remote network node, a version number of the widget program, a property definition of the widget program, a run mode of the widget program, an identifier for a widget engine, and an editor key. 18. The widget management system of claim 17 wherein the property definition comprises one or more of an admin property definition editable by an management portal account having authority to modify widget admin properties, a premise default property definition specifying an initial default setting editable by an end-user account, and a user property definition. 19. The widget management system of claim 17 wherein the run mode of the widget program comprises one of: a static run mode providing that an icon associated with the widget program does not change when displayed on the remote network node; a persistent run mode providing that the icon associated with the widget program changes with new data as the data arrives when displayed on the remote network node; and a persistent with persistent window run mode providing that the icon associated with the widget program changes with new data as the data arrives and a window associated with the widget program is instantiated off screen when not displayed on the remote network node. 20. The widget management system of claim 11 wherein the management portal server is configured to restrict access to the widget program by further being configured to: associate the widget program with a customer service, wherein the subset of customers subscribe to the customer service. 21. A widget management system comprising: means for importing a widget program package into the widget management system, wherein the widget program package comprises a widget program executable by a remote network node; means for restricting access to the widget program to a subset of customers of the widget management system; and means for providing the widget program to a customer of the widget management system for installation on the remote network node, wherein the customer of the widget management system is a member of the subset of customers. 22. The widget management system of claim 21 wherein said means for providing comprises: means for selecting the customer of the widget management system from all customers of the widget management system; and means for automatically transmitting the widget program to the remote network node associated with the customer. 23. The widget management system of claim 21 wherein said means for providing comprises: means for assigning the widget program to a service tier, wherein the subset of customers are members of the service tier; means for identifying a customer service tier associated with the customer of the widget management system; means for displaying, to the customer, information associated with the widget management program, if the customer service tier matches the service tier assigned to the widget program; and means for transmitting the widget program to the remote network node associated with the customer, if the customer selects the widget program. 24. The widget management system of claim 21 further comprising: means for defining the service tier to correspond to a customer purchased level of service.
2,400
7,344
7,344
14,316,939
2,486
A trailering assist system for a vehicle includes a camera disposed at a vehicle, with the camera having a field of view rearward of the vehicle that encompasses a trailer that is being towed by the vehicle. The camera is operable to capture image data. A control of the system includes an image processor operable to process captured image data. Responsive to input of vehicle parameters and processing of captured image data by the image processor, the trailering assist system is operable to determine an estimated trailer angle and an estimated vehicle steering wheel angle. The control compares the estimated vehicle steering wheel angle to a measured or determined or actual vehicle steering wheel angle to determine an error value. The control is operable to generate an output when the error value is at or above a threshold level.
1. A trailering assist system for a vehicle, said trailering assist system comprising: a camera disposed at a vehicle equipped with said trailering assist system; wherein said camera comprises a two dimensional array of photosensing elements; wherein said camera has a field of view rearward of the equipped vehicle that encompasses a trailer that is being towed by the equipped vehicle, and wherein said camera is operable to capture image data; a control; said control comprising an image processor operable to process captured image data; wherein said control receives an input of vehicle parameters; wherein, responsive to receipt of said input of vehicle parameters and to processing of captured image data by said image processor, said trailering assist system is operable to determine an estimated trailer angle and an estimated steering wheel angle of the equipped vehicle; wherein the estimated trailer angle comprises an estimation of an angle of a longitudinal axis of the trailer relative to a longitudinal axis of the equipped vehicle; wherein said control compares said estimated vehicle steering wheel angle to an actual steering wheel angle of the equipped vehicle to determine an error value; and wherein said control is operable to generate an output responsive to said error value being at or above a threshold level. 2. The trailering assist system of claim 1, wherein said control generates an alert to a driver of the equipped vehicle when said error value is at or above the threshold level. 3. The trailering assist system of claim 2, wherein said alert comprises at least one of an audible alert and a visual alert. 4. The trailering assist system of claim 1, comprising a video display screen disposed in the equipped vehicle for viewing by a driver of the equipped vehicle, wherein said video display screen displays images of the scene rearward of the equipped vehicle to assist the driver during a reversing maneuver of the equipped vehicle. 5. The trailering assist system of claim 4, wherein said video display screen displays a graphic overlay representative of the trailer to assist the driver during the reversing maneuver of the equipped vehicle. 6. The trailering assist system of claim 5, wherein said control is operable to alert the driver of the equipped vehicle when said error value is at or above the threshold level to assist the driver in adjusting the steering angle of the equipped vehicle to guide the trailer towards a target location. 7. The trailering assist system of claim 5, wherein said video display screen is operable to display information for viewing by the driver of the equipped vehicle to assist the driver in driving the equipped vehicle with the trailer. 8. The trailering assist system of claim 7, wherein said video display screen is operable to display a predicted path that the trailer and equipped vehicle are traveling along responsive at least in part to the estimated trailer angle. 9. The trailering assist system of claim 8, wherein said video display screen is operable to display an appropriate path for the equipped vehicle and trailer to follow to reverse the trailer towards a target location. 10. The trailering assist system of claim 1, wherein said input of vehicle parameters includes input of at least some of (i) speed of the equipped vehicle, (ii) measured steering wheel angle of the equipped vehicle, (iii) trailer length of the towed trailer, (iv) vehicle length of the equipped vehicle, (v) vehicle width of the equipped vehicle and (vi) trailer hitch point from a rear axle of the equipped vehicle. 11. The trailering assist system of claim 1, wherein said control generates an alert signal to alert the driver of a potentially hazardous situation while the equipped vehicle is reversing with the trailer. 12. A trailering assist system for a vehicle, said trailering assist system comprising: a camera disposed at a vehicle equipped with said trailering assist system; wherein said camera comprises a two dimensional array of photosensing elements; wherein said camera has a field of view rearward of the equipped vehicle that encompasses a trailer that is being towed by the equipped vehicle, and wherein said camera is operable to capture image data; a control; said control comprising an image processor operable to process captured image data; wherein said control receives an input of vehicle parameters; wherein said input of vehicle parameters includes input of at least some of (i) speed of the equipped vehicle, (ii) measured steering wheel angle of the equipped vehicle, (iii) trailer length of the towed trailer, (iv) vehicle length of the equipped vehicle, (v) vehicle width of the equipped vehicle and (vi) trailer hitch point from a rear axle of the equipped vehicle; wherein, responsive to receipt of said input of vehicle parameters and to processing of captured image data by said image processor, said trailering assist system is operable to determine an estimated trailer angle and an estimated steering wheel angle of the equipped vehicle; wherein the estimated trailer angle comprises an estimation of an angle of a longitudinal axis of the trailer relative to a longitudinal axis of the equipped vehicle; wherein said control compares said estimated vehicle steering wheel angle to an actual steering wheel angle of the equipped vehicle to determine an error value; a video display screen disposed in the equipped vehicle for viewing by a driver of the equipped vehicle, wherein said video display screen displays images of the scene rearward of the equipped vehicle to assist the driver during a reversing maneuver of the equipped vehicle; and wherein said control is operable to generate an alert to a driver of the equipped vehicle responsive to said error value being at or above a threshold level. 13. The trailering assist system of claim 12, wherein said alert comprises at least one of an audible alert and a visual alert. 14. The trailering assist system of claim 12, wherein said video display screen displays a graphic overlay representative of the trailer to assist the driver during the reversing maneuver of the equipped vehicle. 15. The trailering assist system of claim 12, wherein said control is operable to alert the driver of the equipped vehicle when said error value is at or above the threshold level to assist the driver in adjusting the steering angle of the equipped vehicle to guide the trailer towards a target location during the reversing maneuver of the equipped vehicle. 16. The trailering assist system of claim 12, wherein said video display screen is operable to display information for viewing by the driver of the equipped vehicle to assist the driver in driving the equipped vehicle with the trailer, and wherein said video display screen is operable to display a predicted path that the trailer and equipped vehicle are traveling along responsive at least in part to the estimated trailer angle. 17. The trailering assist system of claim 16, wherein said video display screen is operable to display an appropriate path for the equipped vehicle and trailer to follow to reverse the trailer towards a target location. 18. A trailering assist system for a vehicle, said trailering assist system comprising: a camera disposed at a vehicle equipped with said trailering assist system; wherein said camera comprises a two dimensional array of photosensing elements; wherein said camera has a field of view rearward of the equipped vehicle that encompasses a trailer that is being towed by the equipped vehicle, and wherein said camera is operable to capture image data; a control; said control comprising an image processor operable to process captured image data; wherein said control receives an input of vehicle parameters; wherein said input of vehicle parameters includes input of at least some of (i) speed of the equipped vehicle, (ii) measured steering wheel angle of the equipped vehicle, (iii) trailer length of the towed trailer, (iv) vehicle length of the equipped vehicle, (v) vehicle width of the equipped vehicle and (vi) trailer hitch point from a rear axle of the equipped vehicle; wherein, responsive to receipt of said input of vehicle parameters and to processing of captured image data by said image processor, said trailering assist system is operable to determine an estimated trailer angle and an estimated steering wheel angle of the equipped vehicle; wherein the estimated trailer angle comprises an estimation of an angle of a longitudinal axis of the trailer relative to a longitudinal axis of the equipped vehicle; wherein said control compares said estimated vehicle steering wheel angle to an actual steering wheel angle of the equipped vehicle to determine an error value; wherein said control is operable to generate an output responsive to said error value being at or above a threshold level; a video display screen disposed in the equipped vehicle for viewing by a driver of the equipped vehicle, wherein said video display screen displays images of the scene rearward of the equipped vehicle to assist the driver during a reversing maneuver of the equipped vehicle; wherein said video display screen is operable to display a predicted path that the trailer and equipped vehicle are traveling along responsive at least in part to the estimated trailer angle; and wherein said control is operable to alert the driver of the equipped vehicle when said error value is at or above the threshold level to assist the driver in adjusting the steering angle of the equipped vehicle to guide the trailer towards a target location. 19. The trailering assist system of claim 18, wherein said control generates an alert to a driver of the equipped vehicle when said error value is at or above the threshold level, and wherein said alert comprises at least one of an audible alert and a visual alert. 20. The trailering assist system of claim 18, wherein said video display screen is operable to display an appropriate path for the equipped vehicle and trailer to follow to reverse the trailer towards a target location during the reversing maneuver of the equipped vehicle.
A trailering assist system for a vehicle includes a camera disposed at a vehicle, with the camera having a field of view rearward of the vehicle that encompasses a trailer that is being towed by the vehicle. The camera is operable to capture image data. A control of the system includes an image processor operable to process captured image data. Responsive to input of vehicle parameters and processing of captured image data by the image processor, the trailering assist system is operable to determine an estimated trailer angle and an estimated vehicle steering wheel angle. The control compares the estimated vehicle steering wheel angle to a measured or determined or actual vehicle steering wheel angle to determine an error value. The control is operable to generate an output when the error value is at or above a threshold level.1. A trailering assist system for a vehicle, said trailering assist system comprising: a camera disposed at a vehicle equipped with said trailering assist system; wherein said camera comprises a two dimensional array of photosensing elements; wherein said camera has a field of view rearward of the equipped vehicle that encompasses a trailer that is being towed by the equipped vehicle, and wherein said camera is operable to capture image data; a control; said control comprising an image processor operable to process captured image data; wherein said control receives an input of vehicle parameters; wherein, responsive to receipt of said input of vehicle parameters and to processing of captured image data by said image processor, said trailering assist system is operable to determine an estimated trailer angle and an estimated steering wheel angle of the equipped vehicle; wherein the estimated trailer angle comprises an estimation of an angle of a longitudinal axis of the trailer relative to a longitudinal axis of the equipped vehicle; wherein said control compares said estimated vehicle steering wheel angle to an actual steering wheel angle of the equipped vehicle to determine an error value; and wherein said control is operable to generate an output responsive to said error value being at or above a threshold level. 2. The trailering assist system of claim 1, wherein said control generates an alert to a driver of the equipped vehicle when said error value is at or above the threshold level. 3. The trailering assist system of claim 2, wherein said alert comprises at least one of an audible alert and a visual alert. 4. The trailering assist system of claim 1, comprising a video display screen disposed in the equipped vehicle for viewing by a driver of the equipped vehicle, wherein said video display screen displays images of the scene rearward of the equipped vehicle to assist the driver during a reversing maneuver of the equipped vehicle. 5. The trailering assist system of claim 4, wherein said video display screen displays a graphic overlay representative of the trailer to assist the driver during the reversing maneuver of the equipped vehicle. 6. The trailering assist system of claim 5, wherein said control is operable to alert the driver of the equipped vehicle when said error value is at or above the threshold level to assist the driver in adjusting the steering angle of the equipped vehicle to guide the trailer towards a target location. 7. The trailering assist system of claim 5, wherein said video display screen is operable to display information for viewing by the driver of the equipped vehicle to assist the driver in driving the equipped vehicle with the trailer. 8. The trailering assist system of claim 7, wherein said video display screen is operable to display a predicted path that the trailer and equipped vehicle are traveling along responsive at least in part to the estimated trailer angle. 9. The trailering assist system of claim 8, wherein said video display screen is operable to display an appropriate path for the equipped vehicle and trailer to follow to reverse the trailer towards a target location. 10. The trailering assist system of claim 1, wherein said input of vehicle parameters includes input of at least some of (i) speed of the equipped vehicle, (ii) measured steering wheel angle of the equipped vehicle, (iii) trailer length of the towed trailer, (iv) vehicle length of the equipped vehicle, (v) vehicle width of the equipped vehicle and (vi) trailer hitch point from a rear axle of the equipped vehicle. 11. The trailering assist system of claim 1, wherein said control generates an alert signal to alert the driver of a potentially hazardous situation while the equipped vehicle is reversing with the trailer. 12. A trailering assist system for a vehicle, said trailering assist system comprising: a camera disposed at a vehicle equipped with said trailering assist system; wherein said camera comprises a two dimensional array of photosensing elements; wherein said camera has a field of view rearward of the equipped vehicle that encompasses a trailer that is being towed by the equipped vehicle, and wherein said camera is operable to capture image data; a control; said control comprising an image processor operable to process captured image data; wherein said control receives an input of vehicle parameters; wherein said input of vehicle parameters includes input of at least some of (i) speed of the equipped vehicle, (ii) measured steering wheel angle of the equipped vehicle, (iii) trailer length of the towed trailer, (iv) vehicle length of the equipped vehicle, (v) vehicle width of the equipped vehicle and (vi) trailer hitch point from a rear axle of the equipped vehicle; wherein, responsive to receipt of said input of vehicle parameters and to processing of captured image data by said image processor, said trailering assist system is operable to determine an estimated trailer angle and an estimated steering wheel angle of the equipped vehicle; wherein the estimated trailer angle comprises an estimation of an angle of a longitudinal axis of the trailer relative to a longitudinal axis of the equipped vehicle; wherein said control compares said estimated vehicle steering wheel angle to an actual steering wheel angle of the equipped vehicle to determine an error value; a video display screen disposed in the equipped vehicle for viewing by a driver of the equipped vehicle, wherein said video display screen displays images of the scene rearward of the equipped vehicle to assist the driver during a reversing maneuver of the equipped vehicle; and wherein said control is operable to generate an alert to a driver of the equipped vehicle responsive to said error value being at or above a threshold level. 13. The trailering assist system of claim 12, wherein said alert comprises at least one of an audible alert and a visual alert. 14. The trailering assist system of claim 12, wherein said video display screen displays a graphic overlay representative of the trailer to assist the driver during the reversing maneuver of the equipped vehicle. 15. The trailering assist system of claim 12, wherein said control is operable to alert the driver of the equipped vehicle when said error value is at or above the threshold level to assist the driver in adjusting the steering angle of the equipped vehicle to guide the trailer towards a target location during the reversing maneuver of the equipped vehicle. 16. The trailering assist system of claim 12, wherein said video display screen is operable to display information for viewing by the driver of the equipped vehicle to assist the driver in driving the equipped vehicle with the trailer, and wherein said video display screen is operable to display a predicted path that the trailer and equipped vehicle are traveling along responsive at least in part to the estimated trailer angle. 17. The trailering assist system of claim 16, wherein said video display screen is operable to display an appropriate path for the equipped vehicle and trailer to follow to reverse the trailer towards a target location. 18. A trailering assist system for a vehicle, said trailering assist system comprising: a camera disposed at a vehicle equipped with said trailering assist system; wherein said camera comprises a two dimensional array of photosensing elements; wherein said camera has a field of view rearward of the equipped vehicle that encompasses a trailer that is being towed by the equipped vehicle, and wherein said camera is operable to capture image data; a control; said control comprising an image processor operable to process captured image data; wherein said control receives an input of vehicle parameters; wherein said input of vehicle parameters includes input of at least some of (i) speed of the equipped vehicle, (ii) measured steering wheel angle of the equipped vehicle, (iii) trailer length of the towed trailer, (iv) vehicle length of the equipped vehicle, (v) vehicle width of the equipped vehicle and (vi) trailer hitch point from a rear axle of the equipped vehicle; wherein, responsive to receipt of said input of vehicle parameters and to processing of captured image data by said image processor, said trailering assist system is operable to determine an estimated trailer angle and an estimated steering wheel angle of the equipped vehicle; wherein the estimated trailer angle comprises an estimation of an angle of a longitudinal axis of the trailer relative to a longitudinal axis of the equipped vehicle; wherein said control compares said estimated vehicle steering wheel angle to an actual steering wheel angle of the equipped vehicle to determine an error value; wherein said control is operable to generate an output responsive to said error value being at or above a threshold level; a video display screen disposed in the equipped vehicle for viewing by a driver of the equipped vehicle, wherein said video display screen displays images of the scene rearward of the equipped vehicle to assist the driver during a reversing maneuver of the equipped vehicle; wherein said video display screen is operable to display a predicted path that the trailer and equipped vehicle are traveling along responsive at least in part to the estimated trailer angle; and wherein said control is operable to alert the driver of the equipped vehicle when said error value is at or above the threshold level to assist the driver in adjusting the steering angle of the equipped vehicle to guide the trailer towards a target location. 19. The trailering assist system of claim 18, wherein said control generates an alert to a driver of the equipped vehicle when said error value is at or above the threshold level, and wherein said alert comprises at least one of an audible alert and a visual alert. 20. The trailering assist system of claim 18, wherein said video display screen is operable to display an appropriate path for the equipped vehicle and trailer to follow to reverse the trailer towards a target location during the reversing maneuver of the equipped vehicle.
2,400
7,345
7,345
14,563,006
2,468
Embodiments described herein provide usage authorization control for group communications. In one embodiment, a network element identifies a group communication for an end user of User Equipment (UE), and identifies a group ID for the group communication. The network element retrieves a user profile of the end user from a Home Subscriber Server (HSS), and determines from the user profile and the group ID whether the end user is a member of the group. The network element provides, on the condition that the end user is a member of the group, the group ID to the HSS and receives group usage rules for the group from the HSS. The network element allows the group communication on the condition that the group communication is permitted by one or more of the group usage rules.
1. An apparatus comprising: a network element configured to identify a group communication for an end user of User Equipment (UE), and to identify a group ID for the group communication; the network element configured to retrieve a user profile of the end user from a Home Subscriber Server (HSS), and to determine from the user profile and the group ID whether the end user is a member of the group; and the network element is configured to provide, on the condition that the end user is a member of the group, the group ID to the HSS and receive group usage rules for the group from the HSS, and to allow the group communication on the condition that the group communication is permitted by one or more of the group usage rules. 2. The apparatus of claim 1 wherein: the network element is configured to determine that the end user is a member of the group on the condition that the group ID is included in the user profile. 3. The apparatus of claim 1 wherein: the network element is configured to reject the group communication for the end user on the condition that the group ID of the end user is missing from the user profile. 4. The apparatus of claim 1 wherein: the network element is configured to use the group ID to identify members of the group from the user, and to forward the group communication to UEs of the identified members. 5. The apparatus of claim 1 wherein: the group communication comprises a Mobile Terminated (MT) group communication; and wherein the end user is a receiving end user, the network element is configured to identify an originating end user for the MT group communication, and the network element is configured to exclude the receiving end user from the MT group communication on the condition that the user profile of the receiving end user and the group ID indicate that the originating end user is not a member of the group. 6. The apparatus of claim 1 wherein the group usage rules define at least one of: a type of service authorized for the group communication; and an allowable content for the group communication. 7. The apparatus of claim 1 wherein the group usage rules define at least one of: a time at which the group communication is allowed to be sent by the end user; and a time at which the group communication is allowed to be received by the end user. 8. The apparatus of claim 1 wherein the group usage rules define at least one of: whether the end user is permitted generate a Mobile Originated (MO) group communication; and whether the end user is permitted receive a Mobile Terminated (MT) group communication. 9. A method for usage authorization control for group communications, the method comprising: identifying, by a network element, a group communication for an end user of User Equipment (UE); identifying, by the network element, a group ID for the group communication; querying, by the network element, a Home Subscriber Server (HSS) for a user profile for the end user; processing, by the network element, the user profile using the group ID to determine whether the end user is a member of the group; performing, on the condition that the end user is a member of the group, the steps of: querying, by the network element, the HSS with the group ID for group usage rules for the group; and determining, by the network element, whether to allow the group communication based on the group usage rules. 10. The method of claim 9 further comprising determining that the end user is a member of the group by identifying, by the network element, that the group ID is included in the user profile. 11. The method of claim 9 further comprising: rejecting, by the network element, the group communication for the end user on the condition that the group ID is missing from the user profile . 12. The method of claim 9 further comprising: processing, by the network element, the user profile using the group ID to identify members of the group; and forwarding, by the network element, the group communication to UEs of the members. 13. The method of claim 9 wherein: the group communication comprises a Mobile Terminated (MT) group communication and the end user is a receiving end user; and the method further comprises: identifying, by the network element, an originating end user for the MT group communication; determining, by the network element, whether the originating end user is a member of the group using the user profile of the receiving end user and the group ID ; and rejecting, by the network element, the MT group communication for the receiving end user on the condition that the originating end user is not a member of the group. 14. The method of claim 9 wherein the group usage rules define at least one of: a type of service authorized for the group communication; and an allowable content for the group communication. 15. The method of claim 9 wherein the group usage rules define at least one of: a time at which the group communication is allowed to be sent by the end user; and a time at which the group communication is allowed to be received by the end user. 16. The method of claim 9 wherein the group usage rules define at least one of: whether the end user is permitted to generate a Mobile Originated (MO) group communication; and whether the end user is permitted to receive a Mobile Terminated (MT) group communication. 17. An apparatus comprising: a terminating network element configured to identify an originating end user of a Mobile Terminated (MT) group communication directed to a receiving end user, and to identify a group ID for the group communication; the terminating network element configured to allow the MT group communication only on the condition that group usage rules provided by a Home Subscriber Server (HSS) indicate that the receiving end user and the originating end user are members of a group identified by the group ID. 18. The apparatus of claim 17 wherein: the terminating network element is configured to determine that the end user is a member of the group on the condition that the group ID is included in a user profile for the end user. 19. The apparatus of claim 17 wherein: the terminating network element is configured to determine that the receiving end user and the originating end user are members of the group by obtaining the user profile from a Home Subscriber Server (HSS) and determining that the receiving end user and the originating end user are both associated with the group ID; and the terminating network element is further configured to send, on the condition that the originating end user and the receiving end user are members of the group, the group ID toward the HSS and receive the group usage rules for the group. 20. The apparatus of claim 17 wherein the group usage rules define at least one of: a type of service authorized for the group communication; an allowable content for the group communication; a time at which the group communication is allowed to be sent by the end user; a time at which the group communication is allowed to be received by the end user; whether the end user is permitted to generate a Mobile Originated (MO) group communication; and whether the end user is permitted to receive a Mobile Terminated (MT) group communication.
Embodiments described herein provide usage authorization control for group communications. In one embodiment, a network element identifies a group communication for an end user of User Equipment (UE), and identifies a group ID for the group communication. The network element retrieves a user profile of the end user from a Home Subscriber Server (HSS), and determines from the user profile and the group ID whether the end user is a member of the group. The network element provides, on the condition that the end user is a member of the group, the group ID to the HSS and receives group usage rules for the group from the HSS. The network element allows the group communication on the condition that the group communication is permitted by one or more of the group usage rules.1. An apparatus comprising: a network element configured to identify a group communication for an end user of User Equipment (UE), and to identify a group ID for the group communication; the network element configured to retrieve a user profile of the end user from a Home Subscriber Server (HSS), and to determine from the user profile and the group ID whether the end user is a member of the group; and the network element is configured to provide, on the condition that the end user is a member of the group, the group ID to the HSS and receive group usage rules for the group from the HSS, and to allow the group communication on the condition that the group communication is permitted by one or more of the group usage rules. 2. The apparatus of claim 1 wherein: the network element is configured to determine that the end user is a member of the group on the condition that the group ID is included in the user profile. 3. The apparatus of claim 1 wherein: the network element is configured to reject the group communication for the end user on the condition that the group ID of the end user is missing from the user profile. 4. The apparatus of claim 1 wherein: the network element is configured to use the group ID to identify members of the group from the user, and to forward the group communication to UEs of the identified members. 5. The apparatus of claim 1 wherein: the group communication comprises a Mobile Terminated (MT) group communication; and wherein the end user is a receiving end user, the network element is configured to identify an originating end user for the MT group communication, and the network element is configured to exclude the receiving end user from the MT group communication on the condition that the user profile of the receiving end user and the group ID indicate that the originating end user is not a member of the group. 6. The apparatus of claim 1 wherein the group usage rules define at least one of: a type of service authorized for the group communication; and an allowable content for the group communication. 7. The apparatus of claim 1 wherein the group usage rules define at least one of: a time at which the group communication is allowed to be sent by the end user; and a time at which the group communication is allowed to be received by the end user. 8. The apparatus of claim 1 wherein the group usage rules define at least one of: whether the end user is permitted generate a Mobile Originated (MO) group communication; and whether the end user is permitted receive a Mobile Terminated (MT) group communication. 9. A method for usage authorization control for group communications, the method comprising: identifying, by a network element, a group communication for an end user of User Equipment (UE); identifying, by the network element, a group ID for the group communication; querying, by the network element, a Home Subscriber Server (HSS) for a user profile for the end user; processing, by the network element, the user profile using the group ID to determine whether the end user is a member of the group; performing, on the condition that the end user is a member of the group, the steps of: querying, by the network element, the HSS with the group ID for group usage rules for the group; and determining, by the network element, whether to allow the group communication based on the group usage rules. 10. The method of claim 9 further comprising determining that the end user is a member of the group by identifying, by the network element, that the group ID is included in the user profile. 11. The method of claim 9 further comprising: rejecting, by the network element, the group communication for the end user on the condition that the group ID is missing from the user profile . 12. The method of claim 9 further comprising: processing, by the network element, the user profile using the group ID to identify members of the group; and forwarding, by the network element, the group communication to UEs of the members. 13. The method of claim 9 wherein: the group communication comprises a Mobile Terminated (MT) group communication and the end user is a receiving end user; and the method further comprises: identifying, by the network element, an originating end user for the MT group communication; determining, by the network element, whether the originating end user is a member of the group using the user profile of the receiving end user and the group ID ; and rejecting, by the network element, the MT group communication for the receiving end user on the condition that the originating end user is not a member of the group. 14. The method of claim 9 wherein the group usage rules define at least one of: a type of service authorized for the group communication; and an allowable content for the group communication. 15. The method of claim 9 wherein the group usage rules define at least one of: a time at which the group communication is allowed to be sent by the end user; and a time at which the group communication is allowed to be received by the end user. 16. The method of claim 9 wherein the group usage rules define at least one of: whether the end user is permitted to generate a Mobile Originated (MO) group communication; and whether the end user is permitted to receive a Mobile Terminated (MT) group communication. 17. An apparatus comprising: a terminating network element configured to identify an originating end user of a Mobile Terminated (MT) group communication directed to a receiving end user, and to identify a group ID for the group communication; the terminating network element configured to allow the MT group communication only on the condition that group usage rules provided by a Home Subscriber Server (HSS) indicate that the receiving end user and the originating end user are members of a group identified by the group ID. 18. The apparatus of claim 17 wherein: the terminating network element is configured to determine that the end user is a member of the group on the condition that the group ID is included in a user profile for the end user. 19. The apparatus of claim 17 wherein: the terminating network element is configured to determine that the receiving end user and the originating end user are members of the group by obtaining the user profile from a Home Subscriber Server (HSS) and determining that the receiving end user and the originating end user are both associated with the group ID; and the terminating network element is further configured to send, on the condition that the originating end user and the receiving end user are members of the group, the group ID toward the HSS and receive the group usage rules for the group. 20. The apparatus of claim 17 wherein the group usage rules define at least one of: a type of service authorized for the group communication; an allowable content for the group communication; a time at which the group communication is allowed to be sent by the end user; a time at which the group communication is allowed to be received by the end user; whether the end user is permitted to generate a Mobile Originated (MO) group communication; and whether the end user is permitted to receive a Mobile Terminated (MT) group communication.
2,400
7,346
7,346
14,810,687
2,465
A method and apparatus for processing IVR input in a call setup message are provided herein. The method includes receiving at an IVR system a call setup message including information associated with one or more data fields; parsing the information included in the call setup message; and directing the call based on the information included in the call setup message.
1. A computer-implemented method for processing interactive voice response (IVR) input in a call setup request, comprising: receiving at an IVR system a call setup message including information associated with one or more data fields; parsing the information included in the call setup message; and directing the call based on the information included in the call setup message. 2. The method of claim 1, further comprising transmitting a message including one or more data fields that are accepted by the IVR system. 3. The method of claim 1, wherein directing comprises routing the call through one or more IVR menus of the IVR system. 4. The method of claim 1, wherein the information associated with the one or more data fields is received in one or more headers of the call setup message. 5. The method of claim 1, wherein the data fields include at least one of a location, a personal identification number (PIN), a telephone extension, a user name, a conference PIN, credit card information, a telephone number to which a call can be returned, a zip code, an area code, an account number, or one or more answers to security questions. 6. The method of claim 1, further comprising: identifying additional information required by the IVR system to route the call; sending a request for the additional information; receiving the additional information; parsing the additional information; and further directing the call based on the additional information. 7. The method of claim 6, wherein the additional information is provided by a user. 8. The method of claim 6, further comprising receiving the additional information in one of a SIP INVITE, SIP UPDATE, SIP NOTIFY, or SIP INFO message. 9. A system for processing interactive voice response (IVR) input in a call setup message, comprising: a header parser configured to receive at an IVR system a call setup message including information associated with one or more data fields; and parse the information included in the call setup message; and a call router configured to direct the call based on the information included in the call setup message. 10. The system of claim 9, further comprising a field publisher configured to transmit a message including one or more data fields that are accepted by the IVR system. 11. The system of claim 9, wherein directing comprises routing the call through one or more IVR menus of the IVR system. 12. The system of claim 9, wherein the information associated with one or more data fields is received in one or more headers of the call setup message. 13. The system of claim 9, wherein the data fields include at least one of a location, a personal identification number (PIN), a telephone extension, a user name, a conference PIN, credit card information, a telephone number to which a call can be returned, a zip code, an area code, an account number, or one or more answers to security questions. 14. The system of claim 9, further comprising an information requestor configured to identify additional information required by the IVR system to route the call; send a request for the additional information receive the additional information; parse the additional information; and further direct the call based on the additional information. 15. The system of claim 14, wherein the additional information is received in one of a SIP INVITE, SIP UPDATE, SIP NOTIFY, or SIP INFO message.
A method and apparatus for processing IVR input in a call setup message are provided herein. The method includes receiving at an IVR system a call setup message including information associated with one or more data fields; parsing the information included in the call setup message; and directing the call based on the information included in the call setup message.1. A computer-implemented method for processing interactive voice response (IVR) input in a call setup request, comprising: receiving at an IVR system a call setup message including information associated with one or more data fields; parsing the information included in the call setup message; and directing the call based on the information included in the call setup message. 2. The method of claim 1, further comprising transmitting a message including one or more data fields that are accepted by the IVR system. 3. The method of claim 1, wherein directing comprises routing the call through one or more IVR menus of the IVR system. 4. The method of claim 1, wherein the information associated with the one or more data fields is received in one or more headers of the call setup message. 5. The method of claim 1, wherein the data fields include at least one of a location, a personal identification number (PIN), a telephone extension, a user name, a conference PIN, credit card information, a telephone number to which a call can be returned, a zip code, an area code, an account number, or one or more answers to security questions. 6. The method of claim 1, further comprising: identifying additional information required by the IVR system to route the call; sending a request for the additional information; receiving the additional information; parsing the additional information; and further directing the call based on the additional information. 7. The method of claim 6, wherein the additional information is provided by a user. 8. The method of claim 6, further comprising receiving the additional information in one of a SIP INVITE, SIP UPDATE, SIP NOTIFY, or SIP INFO message. 9. A system for processing interactive voice response (IVR) input in a call setup message, comprising: a header parser configured to receive at an IVR system a call setup message including information associated with one or more data fields; and parse the information included in the call setup message; and a call router configured to direct the call based on the information included in the call setup message. 10. The system of claim 9, further comprising a field publisher configured to transmit a message including one or more data fields that are accepted by the IVR system. 11. The system of claim 9, wherein directing comprises routing the call through one or more IVR menus of the IVR system. 12. The system of claim 9, wherein the information associated with one or more data fields is received in one or more headers of the call setup message. 13. The system of claim 9, wherein the data fields include at least one of a location, a personal identification number (PIN), a telephone extension, a user name, a conference PIN, credit card information, a telephone number to which a call can be returned, a zip code, an area code, an account number, or one or more answers to security questions. 14. The system of claim 9, further comprising an information requestor configured to identify additional information required by the IVR system to route the call; send a request for the additional information receive the additional information; parse the additional information; and further direct the call based on the additional information. 15. The system of claim 14, wherein the additional information is received in one of a SIP INVITE, SIP UPDATE, SIP NOTIFY, or SIP INFO message.
2,400
7,347
7,347
13,429,093
2,447
Techniques for manipulation of user experience state are described. A user experience can include various types of content that a user may consume, such as video content, images, audio content, text documents, and so on. Further, a “composition” can be created using various combinations of user experiences, such as still images inset to video content, a navigable map presented with images of geographical locations associated with the map, and so on. In implementations, techniques enable user experiences included as part of a composition to interact such that behaviors associated with one user experience can affect another user experience, and vice-versa.
1. A computer-implemented method, comprising: detecting a change to a logical state of a user experience; generating at least one state sliver that includes state information about the change to the logical state of the user experience; and emitting a state stream that includes the at least one state sliver for receipt by one or more external entities. 2. A method as described in claim 1, wherein the change to the logical state occurs in response to a user interaction with the user experience. 3. A method as described in claim 1, wherein the change to the logical state occurs in response to a scripted event associated with the user experience. 4. A method as described in claim 1, wherein the state sliver is part of a standardized set of state slivers that may be utilized by different entities to receive and propagate state information. 5. A method as described in claim 1, wherein the state information includes attributes of content associated with the user experience. 6. A method as described in claim 1, wherein said generating comprises determining a difference between a current logical state of the user experience and a previous logical state of the user experience. 7. A method as described in claim 1, wherein said generating comprises including the state sliver as part of a sliver collection that includes a target property that indicates a user experience property to which the sliver collection is targeted. 8. A method as described in claim 7, wherein the sliver collection includes at least one other state sliver that includes other state information for the user experience. 9. A method as described in claim 1, wherein said emitting comprises providing the state stream to a broker module that is configured to: apply at least one transformation rule to the state sliver to generate transformed state information; and provide the transformed state information to at least one external entity. 10. A computer-implemented method, comprising: receiving one or more incoming state slivers from a first source, the one or more state slivers including logical state information for the first source; processing the one or more state slivers based on the logical state information to generate one or more outgoing state slivers; and providing the one or more outgoing state slivers for receipt by a second source to enable the second source to effect one or more changes to the second source based on state information from the one or more outgoing state slivers. 11. A method as described in claim 10, wherein the event comprises one or more of a scripted event or a user interaction with content associated with the first source. 12. A method as described in claim 10, wherein said receiving comprises receiving the one or more state slivers as part of a state sliver collection that includes multiple state slivers, each of the multiple state slivers being of a different type and including different state information for the first source. 13. A method as described in claim 10, wherein the second source comprises a user experience associated with a particular type of content, and wherein the one or more changes comprise one or more changes to an instance of the particular type of content. 14. A method as described in claim 10, wherein said processing comprises applying at least one transformation rule from a set of transformation rules to the one or more state slivers to generate the one or more outgoing state slivers. 15. A method as described in claim 10, wherein said providing comprises providing the one or more processed state slivers as part of a state sliver collection that includes a partial attribute, the partial attribute indicating whether state conditions for the second source that are not specified in the state sliver collection are to be preserved according to previous state conditions or are to be set to default values. 16. A computer-implemented method, comprising: parsing an incoming stream of state slivers to determine one or more updates to information included in the state slivers; aggregating the one or more updates into updated state information for a user experience; and calling one or more user experience functionalities to manipulate a logical state of the user experience based on the updated state information. 17. A method as described in claim 16, wherein the incoming stream of state slivers are included as part of one or more sliver collections included in a state stream received from an external source. 18. A method as described in claim 16, wherein said aggregating comprises applying one or more transformation rules to the state information. 19. A method as described in claim 16, wherein said aggregating comprises accessing one or more external resources to process at least a portion of the information included in the state slivers to produce at least a portion of the updated state information. 20. A method as described in claim 16, further comprising: interpolating, prior to said calling, one or more intermediate values for the logical state of the user experience, the intermediate values corresponding to a logical state for the user experience not specified in the incoming stream the state slivers; and providing the intermediate values to the one or more user experience functionalities to be used to manipulate at least a portion of the logical state of the user experience.
Techniques for manipulation of user experience state are described. A user experience can include various types of content that a user may consume, such as video content, images, audio content, text documents, and so on. Further, a “composition” can be created using various combinations of user experiences, such as still images inset to video content, a navigable map presented with images of geographical locations associated with the map, and so on. In implementations, techniques enable user experiences included as part of a composition to interact such that behaviors associated with one user experience can affect another user experience, and vice-versa.1. A computer-implemented method, comprising: detecting a change to a logical state of a user experience; generating at least one state sliver that includes state information about the change to the logical state of the user experience; and emitting a state stream that includes the at least one state sliver for receipt by one or more external entities. 2. A method as described in claim 1, wherein the change to the logical state occurs in response to a user interaction with the user experience. 3. A method as described in claim 1, wherein the change to the logical state occurs in response to a scripted event associated with the user experience. 4. A method as described in claim 1, wherein the state sliver is part of a standardized set of state slivers that may be utilized by different entities to receive and propagate state information. 5. A method as described in claim 1, wherein the state information includes attributes of content associated with the user experience. 6. A method as described in claim 1, wherein said generating comprises determining a difference between a current logical state of the user experience and a previous logical state of the user experience. 7. A method as described in claim 1, wherein said generating comprises including the state sliver as part of a sliver collection that includes a target property that indicates a user experience property to which the sliver collection is targeted. 8. A method as described in claim 7, wherein the sliver collection includes at least one other state sliver that includes other state information for the user experience. 9. A method as described in claim 1, wherein said emitting comprises providing the state stream to a broker module that is configured to: apply at least one transformation rule to the state sliver to generate transformed state information; and provide the transformed state information to at least one external entity. 10. A computer-implemented method, comprising: receiving one or more incoming state slivers from a first source, the one or more state slivers including logical state information for the first source; processing the one or more state slivers based on the logical state information to generate one or more outgoing state slivers; and providing the one or more outgoing state slivers for receipt by a second source to enable the second source to effect one or more changes to the second source based on state information from the one or more outgoing state slivers. 11. A method as described in claim 10, wherein the event comprises one or more of a scripted event or a user interaction with content associated with the first source. 12. A method as described in claim 10, wherein said receiving comprises receiving the one or more state slivers as part of a state sliver collection that includes multiple state slivers, each of the multiple state slivers being of a different type and including different state information for the first source. 13. A method as described in claim 10, wherein the second source comprises a user experience associated with a particular type of content, and wherein the one or more changes comprise one or more changes to an instance of the particular type of content. 14. A method as described in claim 10, wherein said processing comprises applying at least one transformation rule from a set of transformation rules to the one or more state slivers to generate the one or more outgoing state slivers. 15. A method as described in claim 10, wherein said providing comprises providing the one or more processed state slivers as part of a state sliver collection that includes a partial attribute, the partial attribute indicating whether state conditions for the second source that are not specified in the state sliver collection are to be preserved according to previous state conditions or are to be set to default values. 16. A computer-implemented method, comprising: parsing an incoming stream of state slivers to determine one or more updates to information included in the state slivers; aggregating the one or more updates into updated state information for a user experience; and calling one or more user experience functionalities to manipulate a logical state of the user experience based on the updated state information. 17. A method as described in claim 16, wherein the incoming stream of state slivers are included as part of one or more sliver collections included in a state stream received from an external source. 18. A method as described in claim 16, wherein said aggregating comprises applying one or more transformation rules to the state information. 19. A method as described in claim 16, wherein said aggregating comprises accessing one or more external resources to process at least a portion of the information included in the state slivers to produce at least a portion of the updated state information. 20. A method as described in claim 16, further comprising: interpolating, prior to said calling, one or more intermediate values for the logical state of the user experience, the intermediate values corresponding to a logical state for the user experience not specified in the incoming stream the state slivers; and providing the intermediate values to the one or more user experience functionalities to be used to manipulate at least a portion of the logical state of the user experience.
2,400
7,348
7,348
13,615,198
2,449
Displaying electronic information in an instant-messaging application includes accessing a first electronic message providing information describing a first user that has an identifier included in a set of identifiers of users of an instant messaging application. A second electronic message providing information describing a second user that has an identifier included in the set of identifiers of users of an instant messaging application is accessed. Content contained within the first and second messages is analyzed to determine that at least a portion of content is common to the first and second electronic messages. Based upon the content analysis, an indication that the first and second messages include common content is provided to the user. Alternatively or additionally, an indication that two users are in physical proximity to a geographic location may be provided in response to detecting that the two users are within a threshold distance from the geographic location.
1. A method of displaying electronic information in an instant-messaging application, the method comprising: accessing a first electronic message that provides information describing a first user that has an identifier included in a set of identifiers of users of an instant messaging application; accessing a second electronic message that provides information describing a second user that has an identifier included in the set of identifiers of users of an instant messaging application; analyzing content contained within the first and second electronic messages to determine that at least a portion of the content is common to both the first and second electronic messages; and based upon the content analysis, indicating to a user whether the first and second electronic messages include common content. 2-42. (canceled)
Displaying electronic information in an instant-messaging application includes accessing a first electronic message providing information describing a first user that has an identifier included in a set of identifiers of users of an instant messaging application. A second electronic message providing information describing a second user that has an identifier included in the set of identifiers of users of an instant messaging application is accessed. Content contained within the first and second messages is analyzed to determine that at least a portion of content is common to the first and second electronic messages. Based upon the content analysis, an indication that the first and second messages include common content is provided to the user. Alternatively or additionally, an indication that two users are in physical proximity to a geographic location may be provided in response to detecting that the two users are within a threshold distance from the geographic location.1. A method of displaying electronic information in an instant-messaging application, the method comprising: accessing a first electronic message that provides information describing a first user that has an identifier included in a set of identifiers of users of an instant messaging application; accessing a second electronic message that provides information describing a second user that has an identifier included in the set of identifiers of users of an instant messaging application; analyzing content contained within the first and second electronic messages to determine that at least a portion of the content is common to both the first and second electronic messages; and based upon the content analysis, indicating to a user whether the first and second electronic messages include common content. 2-42. (canceled)
2,400
7,349
7,349
14,015,305
2,436
Animal data is stored in memory accessible to a server. The server allows users to access the animal data, such as across a communication network. In some embodiments an identifier for an animal is stored with animal information. The identifier can be used to control access to animal records and to quickly locate animal information associated with a particular animal.
1. An animal data management system comprising: a server for registering an animal by receiving animal data including a first biometric identifier; a memory configured to store the animal data including the first biometric identifier; a user system for accessing the animal data from the memory; 2. The animal data management system of claim 1, further comprising: a video remote interpreting device connected to the user system. 3. The animal data management system of claim 1, further comprising: a DNA reader connected to the user system. 4. The animal data management system of claim 1, wherein the animal data further includes: a health certificate with the signature of a veterinarian confirming the animal is free of an infectious disease.
Animal data is stored in memory accessible to a server. The server allows users to access the animal data, such as across a communication network. In some embodiments an identifier for an animal is stored with animal information. The identifier can be used to control access to animal records and to quickly locate animal information associated with a particular animal.1. An animal data management system comprising: a server for registering an animal by receiving animal data including a first biometric identifier; a memory configured to store the animal data including the first biometric identifier; a user system for accessing the animal data from the memory; 2. The animal data management system of claim 1, further comprising: a video remote interpreting device connected to the user system. 3. The animal data management system of claim 1, further comprising: a DNA reader connected to the user system. 4. The animal data management system of claim 1, wherein the animal data further includes: a health certificate with the signature of a veterinarian confirming the animal is free of an infectious disease.
2,400
7,350
7,350
13,799,964
2,497
Methods and systems for managing data assets and rights thereto are disclosed. One method can comprise generating an access token representing access rights of one or more users or device. A request for access to data can be received from the one or more users and the request can be granted or denied based upon the access rights of the one or more users. The access token can be modified based upon granting or denying the request.
1. A method comprising: generating an access token representing access rights of a user; receiving a request for access to data; granting the request based upon the access rights of the user, wherein granting request is dependent upon a location of the user, data type, access type, delivery type, or time duration relating to data, or a combination thereof; and modifying the access token based upon granting the request. 2. The method of claim 1, wherein the access rights comprise a right to download data, a right to present data, a right to stream data, a right to store data, a right to transmit data, or a right to share data, or a combination thereof. 3. The method of claim 1, wherein the access token comprises a threshold based on one or more access types. 4. The method of claim 1, wherein the request for access comprises a request for a particular access type. 5. The method of claim 4, wherein the type of access comprises download, transmit, copy, stream, present, or share, or a combination thereof. 6. The method of claim 1, wherein granting the request comprises facilitating interaction with the data. 7. The method of claim 1, wherein modifying the access token comprises modifying a check-in/check-out state associated with one or more access rights represented by the access token. 8. The method of claim 1, wherein modifying the access token is dependent upon a location of the one or more users, data type, access type, delivery type, or time duration relating to data, or a combination thereof. 9. A method comprising: generating an access token representing access rights associated with a data asset and one or more devices; receiving a request for access to the data asset from the one or more devices; and granting the request based upon the access rights associated with the data asset and the one or more devices; and modifying the access token based upon granting the request. 10. The method of claim 9, wherein the access rights comprise a right to download data, a right to present data, a right to stream data, a right to store data, a right to transmit data, or a right to share data, or a combination thereof. 11. The method of claim 9, wherein granting the request is dependent upon a location of the one or more devices, data type, access type, or time duration relating to data, or a combination thereof. 12. The method of claim 9, wherein the request for access comprises a type of access. 13. The method of claim 12, wherein the type of access comprises download, transmit, stream, present, or share, or a combination thereof. 14. The method of claim 9, wherein granting the request comprises facilitating access to the data asset. 15. The method of claim 9, wherein modifying the access token comprises modifying a check-in/check-out state associated with one or more access rights represented by the access token. 16. The method of claim 9, wherein modifying the access token is dependent upon a location of the one or more devices, data type, delivery type, access type, or time duration relating to data, or a combination thereof. 17. A method comprising: generating an access token representing access rights of a group of users; determining a number of access requests granted to the group of users; modifying the access token based upon the number of access requests; and when the number of access requests exceeds an access threshold, denying one or more subsequent access requests. 18. The method of claim 17, wherein the access rights comprise a right to download data, a right to present data, a right to stream data, a right to store data, a right to transmit data, or a right to share data, or a combination thereof. 19. The method of claim 17, wherein modifying the access token comprises modifying the access rights represented by the access token. 20. The method of claim 17, wherein the access threshold is dependent upon a location of the one or more users, data type, access type, or time duration relating to data, or a combination thereof.
Methods and systems for managing data assets and rights thereto are disclosed. One method can comprise generating an access token representing access rights of one or more users or device. A request for access to data can be received from the one or more users and the request can be granted or denied based upon the access rights of the one or more users. The access token can be modified based upon granting or denying the request.1. A method comprising: generating an access token representing access rights of a user; receiving a request for access to data; granting the request based upon the access rights of the user, wherein granting request is dependent upon a location of the user, data type, access type, delivery type, or time duration relating to data, or a combination thereof; and modifying the access token based upon granting the request. 2. The method of claim 1, wherein the access rights comprise a right to download data, a right to present data, a right to stream data, a right to store data, a right to transmit data, or a right to share data, or a combination thereof. 3. The method of claim 1, wherein the access token comprises a threshold based on one or more access types. 4. The method of claim 1, wherein the request for access comprises a request for a particular access type. 5. The method of claim 4, wherein the type of access comprises download, transmit, copy, stream, present, or share, or a combination thereof. 6. The method of claim 1, wherein granting the request comprises facilitating interaction with the data. 7. The method of claim 1, wherein modifying the access token comprises modifying a check-in/check-out state associated with one or more access rights represented by the access token. 8. The method of claim 1, wherein modifying the access token is dependent upon a location of the one or more users, data type, access type, delivery type, or time duration relating to data, or a combination thereof. 9. A method comprising: generating an access token representing access rights associated with a data asset and one or more devices; receiving a request for access to the data asset from the one or more devices; and granting the request based upon the access rights associated with the data asset and the one or more devices; and modifying the access token based upon granting the request. 10. The method of claim 9, wherein the access rights comprise a right to download data, a right to present data, a right to stream data, a right to store data, a right to transmit data, or a right to share data, or a combination thereof. 11. The method of claim 9, wherein granting the request is dependent upon a location of the one or more devices, data type, access type, or time duration relating to data, or a combination thereof. 12. The method of claim 9, wherein the request for access comprises a type of access. 13. The method of claim 12, wherein the type of access comprises download, transmit, stream, present, or share, or a combination thereof. 14. The method of claim 9, wherein granting the request comprises facilitating access to the data asset. 15. The method of claim 9, wherein modifying the access token comprises modifying a check-in/check-out state associated with one or more access rights represented by the access token. 16. The method of claim 9, wherein modifying the access token is dependent upon a location of the one or more devices, data type, delivery type, access type, or time duration relating to data, or a combination thereof. 17. A method comprising: generating an access token representing access rights of a group of users; determining a number of access requests granted to the group of users; modifying the access token based upon the number of access requests; and when the number of access requests exceeds an access threshold, denying one or more subsequent access requests. 18. The method of claim 17, wherein the access rights comprise a right to download data, a right to present data, a right to stream data, a right to store data, a right to transmit data, or a right to share data, or a combination thereof. 19. The method of claim 17, wherein modifying the access token comprises modifying the access rights represented by the access token. 20. The method of claim 17, wherein the access threshold is dependent upon a location of the one or more users, data type, access type, or time duration relating to data, or a combination thereof.
2,400
7,351
7,351
14,327,148
2,457
A method includes generating a description of a specific geographic context, and providing the description of the specific geographic context to a network server. The method also includes receiving, from the network server: (i) an ordered list of items, each including respective geographic data related to the specific geographic context, and (ii) an indication of an action to be executed at the client device when a user accesses an end of the list of items via the user interface. The list of items is presented to a user via a user interface, and, in response to an indication that the end of the list of items is reached by the user, the indicated action is executed.
1. A method implemented in a client device for providing geographic content via a user interface of the client device, the method comprising: generating, by one or more processors, a description of a geographic context of the client device; providing, by the one or more processors, the description of the geographic context to a network server; receiving, from the network server, in response to the provided description of the geographic context: (i) an ordered list of items, each item including respective geographic data selected at the network server in accordance with the geographic context, and (ii) an indication of an action to be automatically executed by a software application at the client device when a user reaches an end of the ordered list of items via the user interface; presenting, by the software application, the ordered list of items to be presented to a user via the user interface of the client device; and in response to an indication that the end of the ordered list of items is reached by the user, automatically executing, by the software application, the indicated action. 2. The method of claim 1, wherein the action to be executed at the client device when the user reaches the end of the ordered list of items includes presenting an advertisement to the user via the user interface. 3. The method of claim 1, wherein the action to be executed at the client device when the user reaches the end of the ordered list of items includes opening, on the user interface, at least one of a web browser, email, text messaging, or phone call application. 4. The method of claim 1, wherein the action to be executed at the client device when the user reaches the end of the ordered list of items includes requesting, by the one or more processors from the network server, at least one of an additional list of items or additional map data for displaying a digital map. 5. The method of claim 1, further comprising receiving an indication that the user reaches the end of the ordered list of items in response to the user scrolling through the list of items on the user interface. 6. The method of claim 1, wherein generating the description of the geographic context includes generating a geographic query. 7. The method of claim 1, wherein generating the description of the geographic context includes generating an indication of at least one of a current map viewport or a zoom level. 8. The method of claim 1, wherein the action to be executed at the client device, when the user reaches the end of the ordered list of items, includes a plurality of different tasks to be performed by the client device, each task corresponding to a different function of an application executed by the client device. 9. The method of claim 8, further comprising, in response to the indication that the end of the ordered list of items is reached by the user, executing, by the one or more processors, each of the plurality of tasks in the action. 10. The method of claim 1, wherein generating the description of the geographic context includes one of: (i) generating an indication of one or more geographic locations corresponding to a current location of the client device, or (ii) generating an indication of a user-specified location received via a user interface of the client device. 11. The method of claim 1, wherein the respective geographic data in each item includes at least two or more of a passage of text, an image, a video, an audio clip, or a hyperlink related to the geographic context. 12. A method in a network server for generating and communicating server-specified actions to client devices, the method comprising: receiving a description of a geographic context of a client device; in response to receiving the description of the geographic context, generating, by one or more processors, an ordered list of selectable items, each selectable item in the ordered list including interactive digital content selected based on the description of the geographic context; selecting, by the one or more processors, an action to be automatically executed by a software application on the client device when a user of the client device reaches an end of the ordered list of selectable items; and providing, by the one or more processors, the ordered list of selectable items and an indication of the action to the client device. 13. The method of claim 12, wherein receiving a description of the geographic context includes automatically inferring the geographic context based on at least one of: (i) a history of data previously sent from the network server to the client device, or (ii) a history of user interaction with the client device. 14. The method of claim 13, further comprising analyzing, by the one or more processors, the at least one of the history of data previously sent from the network server to the client device or the history of user interaction with the client device to generate the geographic context corresponding to the client device. 15. The method of claim 12, wherein selecting the action includes selecting the action based on similarities of points of interest, the points of interest corresponding to the interactive digital content included in the ordered list of selectable items. 16. The method of claim 12, wherein selecting the action includes selecting the action based on a user profile corresponding to the user of the client device. 17. A system comprising: one or more processors; and a non-transitory computer-readable medium storing thereon instructions that, when executed by the one or more processors, cause the system to: receive a description of a geographic context of a client device, in response to receiving the description of the geographic context, generate an ordered list of items, each item in the ordered list including interactive digital content selected based on the description of the geographic context, select an action to be automatically executed by a software application on the client device when a user of the client device reaches an end of the ordered list of items, and provide the ordered list of items and an indication of the action to the client device. 18. The system of claim 17, wherein the interactive digital content includes at least two or more of a passage of text, an image, a video, an audio clip, or a hyperlink. 19. The system of claim 18, wherein receiving a description of the geographic context includes automatically inferring the geographic context based on at least one of: (i) a history of data previously sent from the network server to the client device, or (ii) a history of user interaction with the client device. 20. The system of claim 19, wherein the instruction further cause the system to analyze the at least one of the history of data previously sent from the network server to the client device or the history of user interaction with the client device to generate the geographic context corresponding to the client device.
A method includes generating a description of a specific geographic context, and providing the description of the specific geographic context to a network server. The method also includes receiving, from the network server: (i) an ordered list of items, each including respective geographic data related to the specific geographic context, and (ii) an indication of an action to be executed at the client device when a user accesses an end of the list of items via the user interface. The list of items is presented to a user via a user interface, and, in response to an indication that the end of the list of items is reached by the user, the indicated action is executed.1. A method implemented in a client device for providing geographic content via a user interface of the client device, the method comprising: generating, by one or more processors, a description of a geographic context of the client device; providing, by the one or more processors, the description of the geographic context to a network server; receiving, from the network server, in response to the provided description of the geographic context: (i) an ordered list of items, each item including respective geographic data selected at the network server in accordance with the geographic context, and (ii) an indication of an action to be automatically executed by a software application at the client device when a user reaches an end of the ordered list of items via the user interface; presenting, by the software application, the ordered list of items to be presented to a user via the user interface of the client device; and in response to an indication that the end of the ordered list of items is reached by the user, automatically executing, by the software application, the indicated action. 2. The method of claim 1, wherein the action to be executed at the client device when the user reaches the end of the ordered list of items includes presenting an advertisement to the user via the user interface. 3. The method of claim 1, wherein the action to be executed at the client device when the user reaches the end of the ordered list of items includes opening, on the user interface, at least one of a web browser, email, text messaging, or phone call application. 4. The method of claim 1, wherein the action to be executed at the client device when the user reaches the end of the ordered list of items includes requesting, by the one or more processors from the network server, at least one of an additional list of items or additional map data for displaying a digital map. 5. The method of claim 1, further comprising receiving an indication that the user reaches the end of the ordered list of items in response to the user scrolling through the list of items on the user interface. 6. The method of claim 1, wherein generating the description of the geographic context includes generating a geographic query. 7. The method of claim 1, wherein generating the description of the geographic context includes generating an indication of at least one of a current map viewport or a zoom level. 8. The method of claim 1, wherein the action to be executed at the client device, when the user reaches the end of the ordered list of items, includes a plurality of different tasks to be performed by the client device, each task corresponding to a different function of an application executed by the client device. 9. The method of claim 8, further comprising, in response to the indication that the end of the ordered list of items is reached by the user, executing, by the one or more processors, each of the plurality of tasks in the action. 10. The method of claim 1, wherein generating the description of the geographic context includes one of: (i) generating an indication of one or more geographic locations corresponding to a current location of the client device, or (ii) generating an indication of a user-specified location received via a user interface of the client device. 11. The method of claim 1, wherein the respective geographic data in each item includes at least two or more of a passage of text, an image, a video, an audio clip, or a hyperlink related to the geographic context. 12. A method in a network server for generating and communicating server-specified actions to client devices, the method comprising: receiving a description of a geographic context of a client device; in response to receiving the description of the geographic context, generating, by one or more processors, an ordered list of selectable items, each selectable item in the ordered list including interactive digital content selected based on the description of the geographic context; selecting, by the one or more processors, an action to be automatically executed by a software application on the client device when a user of the client device reaches an end of the ordered list of selectable items; and providing, by the one or more processors, the ordered list of selectable items and an indication of the action to the client device. 13. The method of claim 12, wherein receiving a description of the geographic context includes automatically inferring the geographic context based on at least one of: (i) a history of data previously sent from the network server to the client device, or (ii) a history of user interaction with the client device. 14. The method of claim 13, further comprising analyzing, by the one or more processors, the at least one of the history of data previously sent from the network server to the client device or the history of user interaction with the client device to generate the geographic context corresponding to the client device. 15. The method of claim 12, wherein selecting the action includes selecting the action based on similarities of points of interest, the points of interest corresponding to the interactive digital content included in the ordered list of selectable items. 16. The method of claim 12, wherein selecting the action includes selecting the action based on a user profile corresponding to the user of the client device. 17. A system comprising: one or more processors; and a non-transitory computer-readable medium storing thereon instructions that, when executed by the one or more processors, cause the system to: receive a description of a geographic context of a client device, in response to receiving the description of the geographic context, generate an ordered list of items, each item in the ordered list including interactive digital content selected based on the description of the geographic context, select an action to be automatically executed by a software application on the client device when a user of the client device reaches an end of the ordered list of items, and provide the ordered list of items and an indication of the action to the client device. 18. The system of claim 17, wherein the interactive digital content includes at least two or more of a passage of text, an image, a video, an audio clip, or a hyperlink. 19. The system of claim 18, wherein receiving a description of the geographic context includes automatically inferring the geographic context based on at least one of: (i) a history of data previously sent from the network server to the client device, or (ii) a history of user interaction with the client device. 20. The system of claim 19, wherein the instruction further cause the system to analyze the at least one of the history of data previously sent from the network server to the client device or the history of user interaction with the client device to generate the geographic context corresponding to the client device.
2,400
7,352
7,352
13,955,711
2,444
Remotely controlling Web Real-Time Communications (WebRTC) client functionality via WebRTC data channels, and related methods, systems, and computer-readable media are disclosed. In this regard, in one embodiment, a method for remotely controlling WebRTC client functionality comprises establishing, by a first WebRTC client executing on a first computing device and a second WebRTC client executing on a second computing device, a WebRTC media channel between the first WebRTC client and the second WebRTC client. The method further comprises establishing, between the first WebRTC client and the second WebRTC client, a WebRTC data channel affiliated with the WebRTC media channel. The method also comprises receiving, by the second WebRTC client, a client control signal originating from the first WebRTC client via the WebRTC data channel. The method additionally comprises, responsive to receiving the client control signal via the WebRTC data channel, modifying a functionality associated with the second WebRTC client.
1. A method for remotely controlling Web Real-Time Communications (WebRTC) client functionality, comprising: establishing, by a first WebRTC client executing on a first computing device and a second WebRTC client executing on a second computing device, a WebRTC media channel between the first WebRTC client and the second WebRTC client; establishing, between the first WebRTC client and the second WebRTC client, a WebRTC data channel affiliated with the WebRTC media channel; receiving, by the second WebRTC client, a client control signal originating from the first WebRTC client via the WebRTC data channel; and responsive to receiving the client control signal via the WebRTC data channel, modifying a functionality associated with the second WebRTC client. 2. The method of claim 1, wherein modifying the functionality associated with the second WebRTC client comprises modifying an attribute associated with a device communicatively coupled to the second WebRTC client based on the client control signal. 3. The method of claim 2, wherein the device communicatively coupled to the second WebRTC client comprises a device selected from the group consisting of a microphone, a speaker, a video camera, a webcam, a still camera, a video display, a building automation device, a voice synthesizer, an audio alarm, a visual alarm, and a sensor. 4. The method of claim 2, wherein the attribute associated with the device comprises a speaker volume, a speaker muting, a microphone volume, a microphone muting, a microphone directionality, a microphone sensitivity, an audio equalization profile, a camera directionality, a camera focus, a camera zoom, a camera sensitivity, a camera aperture, a camera F-stop, a display resolution, a display brightness, or a display color profile, or combinations thereof. 5. The method of claim 1, wherein modifying the functionality associated with the second WebRTC client comprises initiating or modifying execution of an application on the second computing device based on the client control signal. 6. The method of claim 1, further comprising receiving, by the first WebRTC client, an authorization from the second WebRTC client to modify the functionality associated with the second WebRTC client. 7. The method of claim 1, wherein establishing the WebRTC data channel affiliated with the WebRTC media channel comprises establishing the WebRTC data channel over a same peer connection used in establishing the WebRTC media channel. 8. The method of claim 1, wherein establishing the WebRTC data channel affiliated with the WebRTC media channel comprises establishing the WebRTC data channel using a same cryptographic keying material used in establishing the WebRTC media channel. 9. A system for remotely controlling Web Real-Time Communications (WebRTC) client functionality, comprising: at least one communications interface; a first computing device associated with the at least one communications interface and comprising a first WebRTC client, the first WebRTC client comprising a WebRTC client control agent; and a second computing device associated with the at least one communications interface and comprising a second WebRTC client, the second WebRTC client comprising a WebRTC functionality modification agent; the first WebRTC client and the second WebRTC client configured to establish a WebRTC media channel between the first WebRTC client and the second WebRTC client; and the WebRTC client control agent and the WebRTC functionality modification agent configured to establish a WebRTC data channel affiliated with the WebRTC media channel; the WebRTC functionality modification agent further configured to: receive a client control signal originating from the WebRTC client control agent via the WebRTC data channel; and responsive to receiving the client control signal via the WebRTC data channel, modify a functionality associated with the second WebRTC client. 10. The system of claim 9, wherein the WebRTC functionality modification agent is configured to modify the functionality associated with the second WebRTC client by modifying an attribute associated with a device communicatively coupled to the second WebRTC client. 11. The system of claim 10, wherein the WebRTC functionality modification agent is configured to modify the attribute associated with the device selected from the group consisting of a microphone, a speaker, a video camera, a webcam, a still camera, a video display, and a building automation device. 12. The system of claim 10, wherein the WebRTC functionality modification agent is configured to modify the attribute comprising a speaker volume, a speaker muting, a microphone volume, a microphone muting, a microphone directionality, a microphone sensitivity, an audio equalization profile, a camera directionality, a camera focus, a camera zoom, a camera sensitivity, a camera aperture, a camera F-stop, a display resolution, a display brightness, or a display color profile, or combinations thereof. 13. The system of claim 9, wherein the WebRTC functionality modification agent is configured to modify the functionality associated with the second WebRTC client by launching an application on the second computing device. 14. The system of claim 9, wherein the WebRTC client control agent is configured to receive an authorization from the WebRTC functionality modification agent to modify the functionality associated with the second WebRTC client. 15. A non-transitory computer-readable medium having stored thereon computer-executable instructions to cause a processor to implement a method, comprising: establishing a Web Real-Time Communications (WebRTC) media channel between a first WebRTC client and a second WebRTC client; establishing, between the first WebRTC client and the second WebRTC client, a WebRTC data channel affiliated with the WebRTC media channel; receiving, by the second WebRTC client, a client control signal originating from the first WebRTC client via the WebRTC data channel; and responsive to receiving the client control signal via the WebRTC data channel, modifying a functionality associated with the second WebRTC client. 16. The non-transitory computer-readable medium of claim 15 having stored thereon the computer-executable instructions to cause the processor to implement the method, wherein modifying the functionality associated with the second WebRTC client comprises modifying an attribute associated with a device communicatively coupled to the second WebRTC client. 17. The non-transitory computer-readable medium of claim 16 having stored thereon the computer-executable instructions to cause the processor to implement the method, wherein the device communicatively coupled to the second WebRTC client comprises a device selected from the group consisting of a microphone, a speaker, a video camera, a webcam, a still camera, a video display, and a building automation device. 18. The non-transitory computer-readable medium of claim 17 having stored thereon the computer-executable instructions to cause the processor to implement the method, wherein the attribute associated with the device comprises a speaker volume, a speaker muting, a microphone volume, a microphone muting, a microphone directionality, a microphone sensitivity, an audio equalization profile, a camera directionality, a camera focus, a camera zoom, a camera sensitivity, a camera aperture, a camera F-stop, a display resolution, a display brightness, or a display color profile, or combinations thereof. 19. The non-transitory computer-readable medium of claim 15 having stored thereon the computer-executable instructions to cause the processor to implement the method, wherein modifying the functionality associated with the second WebRTC client comprises launching an application on a computing device executing the second WebRTC client. 20. The non-transitory computer-readable medium of claim 15 having stored thereon the computer-executable instructions to cause the processor to implement the method, further comprising receiving, by the first WebRTC client, an authorization from the second WebRTC client to modify the functionality associated with the second WebRTC client.
Remotely controlling Web Real-Time Communications (WebRTC) client functionality via WebRTC data channels, and related methods, systems, and computer-readable media are disclosed. In this regard, in one embodiment, a method for remotely controlling WebRTC client functionality comprises establishing, by a first WebRTC client executing on a first computing device and a second WebRTC client executing on a second computing device, a WebRTC media channel between the first WebRTC client and the second WebRTC client. The method further comprises establishing, between the first WebRTC client and the second WebRTC client, a WebRTC data channel affiliated with the WebRTC media channel. The method also comprises receiving, by the second WebRTC client, a client control signal originating from the first WebRTC client via the WebRTC data channel. The method additionally comprises, responsive to receiving the client control signal via the WebRTC data channel, modifying a functionality associated with the second WebRTC client.1. A method for remotely controlling Web Real-Time Communications (WebRTC) client functionality, comprising: establishing, by a first WebRTC client executing on a first computing device and a second WebRTC client executing on a second computing device, a WebRTC media channel between the first WebRTC client and the second WebRTC client; establishing, between the first WebRTC client and the second WebRTC client, a WebRTC data channel affiliated with the WebRTC media channel; receiving, by the second WebRTC client, a client control signal originating from the first WebRTC client via the WebRTC data channel; and responsive to receiving the client control signal via the WebRTC data channel, modifying a functionality associated with the second WebRTC client. 2. The method of claim 1, wherein modifying the functionality associated with the second WebRTC client comprises modifying an attribute associated with a device communicatively coupled to the second WebRTC client based on the client control signal. 3. The method of claim 2, wherein the device communicatively coupled to the second WebRTC client comprises a device selected from the group consisting of a microphone, a speaker, a video camera, a webcam, a still camera, a video display, a building automation device, a voice synthesizer, an audio alarm, a visual alarm, and a sensor. 4. The method of claim 2, wherein the attribute associated with the device comprises a speaker volume, a speaker muting, a microphone volume, a microphone muting, a microphone directionality, a microphone sensitivity, an audio equalization profile, a camera directionality, a camera focus, a camera zoom, a camera sensitivity, a camera aperture, a camera F-stop, a display resolution, a display brightness, or a display color profile, or combinations thereof. 5. The method of claim 1, wherein modifying the functionality associated with the second WebRTC client comprises initiating or modifying execution of an application on the second computing device based on the client control signal. 6. The method of claim 1, further comprising receiving, by the first WebRTC client, an authorization from the second WebRTC client to modify the functionality associated with the second WebRTC client. 7. The method of claim 1, wherein establishing the WebRTC data channel affiliated with the WebRTC media channel comprises establishing the WebRTC data channel over a same peer connection used in establishing the WebRTC media channel. 8. The method of claim 1, wherein establishing the WebRTC data channel affiliated with the WebRTC media channel comprises establishing the WebRTC data channel using a same cryptographic keying material used in establishing the WebRTC media channel. 9. A system for remotely controlling Web Real-Time Communications (WebRTC) client functionality, comprising: at least one communications interface; a first computing device associated with the at least one communications interface and comprising a first WebRTC client, the first WebRTC client comprising a WebRTC client control agent; and a second computing device associated with the at least one communications interface and comprising a second WebRTC client, the second WebRTC client comprising a WebRTC functionality modification agent; the first WebRTC client and the second WebRTC client configured to establish a WebRTC media channel between the first WebRTC client and the second WebRTC client; and the WebRTC client control agent and the WebRTC functionality modification agent configured to establish a WebRTC data channel affiliated with the WebRTC media channel; the WebRTC functionality modification agent further configured to: receive a client control signal originating from the WebRTC client control agent via the WebRTC data channel; and responsive to receiving the client control signal via the WebRTC data channel, modify a functionality associated with the second WebRTC client. 10. The system of claim 9, wherein the WebRTC functionality modification agent is configured to modify the functionality associated with the second WebRTC client by modifying an attribute associated with a device communicatively coupled to the second WebRTC client. 11. The system of claim 10, wherein the WebRTC functionality modification agent is configured to modify the attribute associated with the device selected from the group consisting of a microphone, a speaker, a video camera, a webcam, a still camera, a video display, and a building automation device. 12. The system of claim 10, wherein the WebRTC functionality modification agent is configured to modify the attribute comprising a speaker volume, a speaker muting, a microphone volume, a microphone muting, a microphone directionality, a microphone sensitivity, an audio equalization profile, a camera directionality, a camera focus, a camera zoom, a camera sensitivity, a camera aperture, a camera F-stop, a display resolution, a display brightness, or a display color profile, or combinations thereof. 13. The system of claim 9, wherein the WebRTC functionality modification agent is configured to modify the functionality associated with the second WebRTC client by launching an application on the second computing device. 14. The system of claim 9, wherein the WebRTC client control agent is configured to receive an authorization from the WebRTC functionality modification agent to modify the functionality associated with the second WebRTC client. 15. A non-transitory computer-readable medium having stored thereon computer-executable instructions to cause a processor to implement a method, comprising: establishing a Web Real-Time Communications (WebRTC) media channel between a first WebRTC client and a second WebRTC client; establishing, between the first WebRTC client and the second WebRTC client, a WebRTC data channel affiliated with the WebRTC media channel; receiving, by the second WebRTC client, a client control signal originating from the first WebRTC client via the WebRTC data channel; and responsive to receiving the client control signal via the WebRTC data channel, modifying a functionality associated with the second WebRTC client. 16. The non-transitory computer-readable medium of claim 15 having stored thereon the computer-executable instructions to cause the processor to implement the method, wherein modifying the functionality associated with the second WebRTC client comprises modifying an attribute associated with a device communicatively coupled to the second WebRTC client. 17. The non-transitory computer-readable medium of claim 16 having stored thereon the computer-executable instructions to cause the processor to implement the method, wherein the device communicatively coupled to the second WebRTC client comprises a device selected from the group consisting of a microphone, a speaker, a video camera, a webcam, a still camera, a video display, and a building automation device. 18. The non-transitory computer-readable medium of claim 17 having stored thereon the computer-executable instructions to cause the processor to implement the method, wherein the attribute associated with the device comprises a speaker volume, a speaker muting, a microphone volume, a microphone muting, a microphone directionality, a microphone sensitivity, an audio equalization profile, a camera directionality, a camera focus, a camera zoom, a camera sensitivity, a camera aperture, a camera F-stop, a display resolution, a display brightness, or a display color profile, or combinations thereof. 19. The non-transitory computer-readable medium of claim 15 having stored thereon the computer-executable instructions to cause the processor to implement the method, wherein modifying the functionality associated with the second WebRTC client comprises launching an application on a computing device executing the second WebRTC client. 20. The non-transitory computer-readable medium of claim 15 having stored thereon the computer-executable instructions to cause the processor to implement the method, further comprising receiving, by the first WebRTC client, an authorization from the second WebRTC client to modify the functionality associated with the second WebRTC client.
2,400
7,353
7,353
14,862,772
2,424
Methods and systems for managing data and/or operations on data are disclosed. A method can comprise receiving content from a first storage medium for playback. The received content can comprise a stored first portion of a transport stream. At least a portion of the received content can be caused to playback. A playback position of the at least a portion of the received content can be determined relative to a live position of the transport stream. If the determined playback position of the at least a portion of the received content is outside a predetermined threshold proximity to the live position, a second portion of the transport stream can be stored to the first storage medium. If the determined playback position of the received content is within the predetermined threshold proximity to the live position, the second portion of the transport stream can be stored to a second storage medium.
1. A method comprising: receiving, by one or more computing devices, content from a first storage medium for playback, wherein the received content comprises a stored first portion of a transport stream; causing, by the one or more computing devices, playback of at least a portion of the received content; determining, by the one or more computing devices, a playback position of the at least the portion of the received content relative to a live position of the transport stream; storing, by the one or more computing devices, a second portion of the transport stream to the first storage medium if the determined playback position of the at least a portion of the received content is outside a predetermined threshold proximity to the live position; and storing, by the one or more computing devices, the second portion of the transport stream to a second storage medium if the determined playback position of the at least a portion of the received content is within the predetermined threshold proximity to the live position. 2. The method of claim 1, wherein the received content comprises one or more of audio information, video information, and index information. 3. The method of claim 1, wherein the transport stream comprises a single program transport stream. 4. The method of claim 1, wherein the receiving the content comprises accessing index information and accessing one or more of audio and video information based upon the accessed index information. 5. The method of claim 1, wherein the first storage medium comprises flash memory. 6. The method of claim 1, wherein the second storage medium comprises random access memory. 7. The method of claim 1, wherein the playback position comprises one or more of an absolute time position, a relative time position, an absolute frame position, or a relative frame position, or a combination thereof. 8. A method comprising: receiving, by one or more computing devices, content from a storage medium for playback, wherein the received content comprises a stored portion of a transport stream; causing, by the one or more computing devices, playback of the received content; determining, by the one or more computing devices, a playback position of the received content relative to a live position of the transport stream; and storing, by the one or more computing devices, at least a first portion of the transport stream to a first partition of the storage medium and at least a second portion of the transport stream to a second partition of the storage medium in response to a determination that the determined playback position of the received content is within a predetermined threshold proximity to the live position. 9. The method of claim 8, wherein the received content comprises audio information, video information, index information, or a combination thereof. 10. The method of claim 8, wherein the transport stream comprises a single program transport stream. 11. The method of claim 8, wherein the receiving the content comprises accessing index information and accessing one or more of audio and video information based upon the accessed index information. 12. The method of claim 8, wherein the first portion of the transport stream comprises one or more of video information and audio information and the second portion comprises index information. 13. The method of claim 8, wherein the at least the second portion of the transport stream is stored to the second partition of the storage medium in smaller data block sizes compared to the first portion of the transport stream stored in the first partition of the storage medium. 14. The method of claim 8, wherein the storage medium comprises flash memory. 15. The method of claim 8, wherein the playback position comprises one or more of an absolute time position, a relative time position, an absolute frame position, or a relative frame position, or a combination thereof. 16. A method comprising: receiving, by one or more computing devices, content from a storage medium for playback, wherein the received content comprises a stored portion of a transport stream; causing, by the one or more computing devices, playback of the received content; determining, by the one or more computing devices, a playback position of the received content relative to a live position of the transport stream; and responsive to a determination that the determined playback position of the received content is within a predetermined threshold proximity to the live position, storing, by the one or more computing devices, at least a first portion of the transport stream to a first portion of a data block having a finite block size and at least a second portion of the transport stream to a second portion of the data block, wherein the second portion of the data block is configured to be read prior to the first portion of the data block. 17. The method of claim 16, wherein the received content comprises audio information, video information, index information, or a combination thereof. 18. The method of claim 16, wherein the receiving the content comprises accessing index information and accessing one or more of audio and video information based upon the accessed index information. 19. The method of claim 16, wherein the first portion of the transport stream comprises one or more of video information and audio information and the second portion comprises index information. 20. The method of claim 16, wherein the storage medium comprises flash memory.
Methods and systems for managing data and/or operations on data are disclosed. A method can comprise receiving content from a first storage medium for playback. The received content can comprise a stored first portion of a transport stream. At least a portion of the received content can be caused to playback. A playback position of the at least a portion of the received content can be determined relative to a live position of the transport stream. If the determined playback position of the at least a portion of the received content is outside a predetermined threshold proximity to the live position, a second portion of the transport stream can be stored to the first storage medium. If the determined playback position of the received content is within the predetermined threshold proximity to the live position, the second portion of the transport stream can be stored to a second storage medium.1. A method comprising: receiving, by one or more computing devices, content from a first storage medium for playback, wherein the received content comprises a stored first portion of a transport stream; causing, by the one or more computing devices, playback of at least a portion of the received content; determining, by the one or more computing devices, a playback position of the at least the portion of the received content relative to a live position of the transport stream; storing, by the one or more computing devices, a second portion of the transport stream to the first storage medium if the determined playback position of the at least a portion of the received content is outside a predetermined threshold proximity to the live position; and storing, by the one or more computing devices, the second portion of the transport stream to a second storage medium if the determined playback position of the at least a portion of the received content is within the predetermined threshold proximity to the live position. 2. The method of claim 1, wherein the received content comprises one or more of audio information, video information, and index information. 3. The method of claim 1, wherein the transport stream comprises a single program transport stream. 4. The method of claim 1, wherein the receiving the content comprises accessing index information and accessing one or more of audio and video information based upon the accessed index information. 5. The method of claim 1, wherein the first storage medium comprises flash memory. 6. The method of claim 1, wherein the second storage medium comprises random access memory. 7. The method of claim 1, wherein the playback position comprises one or more of an absolute time position, a relative time position, an absolute frame position, or a relative frame position, or a combination thereof. 8. A method comprising: receiving, by one or more computing devices, content from a storage medium for playback, wherein the received content comprises a stored portion of a transport stream; causing, by the one or more computing devices, playback of the received content; determining, by the one or more computing devices, a playback position of the received content relative to a live position of the transport stream; and storing, by the one or more computing devices, at least a first portion of the transport stream to a first partition of the storage medium and at least a second portion of the transport stream to a second partition of the storage medium in response to a determination that the determined playback position of the received content is within a predetermined threshold proximity to the live position. 9. The method of claim 8, wherein the received content comprises audio information, video information, index information, or a combination thereof. 10. The method of claim 8, wherein the transport stream comprises a single program transport stream. 11. The method of claim 8, wherein the receiving the content comprises accessing index information and accessing one or more of audio and video information based upon the accessed index information. 12. The method of claim 8, wherein the first portion of the transport stream comprises one or more of video information and audio information and the second portion comprises index information. 13. The method of claim 8, wherein the at least the second portion of the transport stream is stored to the second partition of the storage medium in smaller data block sizes compared to the first portion of the transport stream stored in the first partition of the storage medium. 14. The method of claim 8, wherein the storage medium comprises flash memory. 15. The method of claim 8, wherein the playback position comprises one or more of an absolute time position, a relative time position, an absolute frame position, or a relative frame position, or a combination thereof. 16. A method comprising: receiving, by one or more computing devices, content from a storage medium for playback, wherein the received content comprises a stored portion of a transport stream; causing, by the one or more computing devices, playback of the received content; determining, by the one or more computing devices, a playback position of the received content relative to a live position of the transport stream; and responsive to a determination that the determined playback position of the received content is within a predetermined threshold proximity to the live position, storing, by the one or more computing devices, at least a first portion of the transport stream to a first portion of a data block having a finite block size and at least a second portion of the transport stream to a second portion of the data block, wherein the second portion of the data block is configured to be read prior to the first portion of the data block. 17. The method of claim 16, wherein the received content comprises audio information, video information, index information, or a combination thereof. 18. The method of claim 16, wherein the receiving the content comprises accessing index information and accessing one or more of audio and video information based upon the accessed index information. 19. The method of claim 16, wherein the first portion of the transport stream comprises one or more of video information and audio information and the second portion comprises index information. 20. The method of claim 16, wherein the storage medium comprises flash memory.
2,400
7,354
7,354
14,114,941
2,481
A video quantization parameter encoder includes: a prediction unit 11 for generating a predicted quantization parameter from a past reconstructed quantization parameter; a computing unit 12 for generating a delta quantization parameter from a quantization parameter and the predicted quantization parameter; and quantization parameter encoding means 13 for binary arithmetic encoding a first bin indicating whether or not the delta quantization parameter is significant, a second bin indicating whether the delta quantization parameter is positive or negative, and other bins indicating an absolute value of the delta quantization parameter, in the case where the delta quantization parameter is significant.
1. A video quantization parameter encoding method for encoding a quantization parameter for a video encoding process that is based on context-based adaptive binary arithmetic encoding, the video quantization parameter encoding method comprising: generating a predicted quantization parameter from a past reconstructed quantization parameter; generating a delta quantization parameter from a quantization parameter and the predicted quantization parameter; and binary arithmetic encoding a first bin indicating whether or not the delta quantization parameter is significant, a second bin indicating whether the delta quantization parameter is positive or negative, and other bins indicating an absolute value of the delta quantization parameter, in the case where the delta quantization parameter is significant. 2. The video quantization parameter encoding method according to claim 1, wherein the binary arithmetic encoding is performed using different contexts for the second bin and bins other than the second bin. 3. A video quantization parameter decoding method for decoding a quantization parameter for a video decoding process that is based on context-based adaptive binary arithmetic encoding, the video quantization parameter decoding method comprising: generating a predicted quantization parameter from a past reconstructed quantization parameter; and binary arithmetic decoding a first bin indicating whether or not a delta quantization parameter is significant, a second bin indicating whether the delta quantization parameter is positive or negative, and other bins indicating an absolute value of the delta quantization parameter. 4. The video quantization parameter decoding method according to claim 3, wherein the binary arithmetic decoding is performed using different contexts for the second bin and bins other than the second bin. 5. A video quantization parameter encoder for encoding a quantization parameter for a video encoding process that is based on context-based adaptive binary arithmetic encoding, the video quantization parameter encoder comprising: a prediction unit which generates a predicted quantization parameter from a past reconstructed quantization parameter; a computing unit which generates a delta quantization parameter from a quantization parameter and the predicted quantization parameter; and a quantization parameter encoding unit which performs binary arithmetic encoding a first bin indicating whether or not the delta quantization parameter is significant, a second bin indicating whether the delta quantization parameter is positive or negative, and other bins indicating an absolute value of the delta quantization parameter, in the case where the delta quantization parameter is significant. 6. The video quantization parameter encoder according to claim 5, wherein the quantization parameter encoding unit performs the binary arithmetic encoding using different contexts for the second bin and bins other than the second bin. 7. A video quantization parameter decoder for decoding a quantization parameter for a video decoding process that is based on context-based adaptive binary arithmetic encoding, the video quantization parameter decoder comprising: prediction unit which generates a predicted quantization parameter from a past reconstructed quantization parameter; and quantization parameter decoding unit which performs binary arithmetic decoding a first bin indicating whether or not a delta quantization parameter is significant, a second bin indicating whether the delta quantization parameter is positive or negative, and other bins indicating an absolute value of the delta quantization parameter. 8. The video quantization parameter decoder according to claim 7, wherein the quantization parameter decoding unit performs the binary arithmetic decoding using different contexts for the second bin and bins other than the second bin. 9. A computer readable information recording medium storing a video quantization parameter encoding program which, when executed by a processor, performs a method for encoding a quantization parameter for a video encoding process that is based on context-based adaptive binary arithmetic encoding, comprising: generating a predicted quantization parameter from a past reconstructed quantization parameter; generating a delta quantization parameter from a quantization parameter and the predicted quantization parameter; and arithmetic encoding a first bin indicating whether or not the delta quantization parameter is significant, a second bin indicating whether the delta quantization parameter is positive or negative, and other bins indicating an absolute value of the delta quantization parameter, in the case where the delta quantization parameter is significant. 10. A computer readable information recording medium storing a video quantization parameter decoding program which, when executed by a processor, performs a method for decoding a quantization parameter for a video decoding process that is based on context-based adaptive binary arithmetic encoding, comprising: generating a predicted quantization parameter from a past reconstructed quantization parameter; and binary arithmetic decoding a first bin indicating whether or not a delta quantization parameter is significant, a second bin indicating whether the delta quantization parameter is positive or negative, and other bins indicating an absolute value of the delta quantization parameter.
A video quantization parameter encoder includes: a prediction unit 11 for generating a predicted quantization parameter from a past reconstructed quantization parameter; a computing unit 12 for generating a delta quantization parameter from a quantization parameter and the predicted quantization parameter; and quantization parameter encoding means 13 for binary arithmetic encoding a first bin indicating whether or not the delta quantization parameter is significant, a second bin indicating whether the delta quantization parameter is positive or negative, and other bins indicating an absolute value of the delta quantization parameter, in the case where the delta quantization parameter is significant.1. A video quantization parameter encoding method for encoding a quantization parameter for a video encoding process that is based on context-based adaptive binary arithmetic encoding, the video quantization parameter encoding method comprising: generating a predicted quantization parameter from a past reconstructed quantization parameter; generating a delta quantization parameter from a quantization parameter and the predicted quantization parameter; and binary arithmetic encoding a first bin indicating whether or not the delta quantization parameter is significant, a second bin indicating whether the delta quantization parameter is positive or negative, and other bins indicating an absolute value of the delta quantization parameter, in the case where the delta quantization parameter is significant. 2. The video quantization parameter encoding method according to claim 1, wherein the binary arithmetic encoding is performed using different contexts for the second bin and bins other than the second bin. 3. A video quantization parameter decoding method for decoding a quantization parameter for a video decoding process that is based on context-based adaptive binary arithmetic encoding, the video quantization parameter decoding method comprising: generating a predicted quantization parameter from a past reconstructed quantization parameter; and binary arithmetic decoding a first bin indicating whether or not a delta quantization parameter is significant, a second bin indicating whether the delta quantization parameter is positive or negative, and other bins indicating an absolute value of the delta quantization parameter. 4. The video quantization parameter decoding method according to claim 3, wherein the binary arithmetic decoding is performed using different contexts for the second bin and bins other than the second bin. 5. A video quantization parameter encoder for encoding a quantization parameter for a video encoding process that is based on context-based adaptive binary arithmetic encoding, the video quantization parameter encoder comprising: a prediction unit which generates a predicted quantization parameter from a past reconstructed quantization parameter; a computing unit which generates a delta quantization parameter from a quantization parameter and the predicted quantization parameter; and a quantization parameter encoding unit which performs binary arithmetic encoding a first bin indicating whether or not the delta quantization parameter is significant, a second bin indicating whether the delta quantization parameter is positive or negative, and other bins indicating an absolute value of the delta quantization parameter, in the case where the delta quantization parameter is significant. 6. The video quantization parameter encoder according to claim 5, wherein the quantization parameter encoding unit performs the binary arithmetic encoding using different contexts for the second bin and bins other than the second bin. 7. A video quantization parameter decoder for decoding a quantization parameter for a video decoding process that is based on context-based adaptive binary arithmetic encoding, the video quantization parameter decoder comprising: prediction unit which generates a predicted quantization parameter from a past reconstructed quantization parameter; and quantization parameter decoding unit which performs binary arithmetic decoding a first bin indicating whether or not a delta quantization parameter is significant, a second bin indicating whether the delta quantization parameter is positive or negative, and other bins indicating an absolute value of the delta quantization parameter. 8. The video quantization parameter decoder according to claim 7, wherein the quantization parameter decoding unit performs the binary arithmetic decoding using different contexts for the second bin and bins other than the second bin. 9. A computer readable information recording medium storing a video quantization parameter encoding program which, when executed by a processor, performs a method for encoding a quantization parameter for a video encoding process that is based on context-based adaptive binary arithmetic encoding, comprising: generating a predicted quantization parameter from a past reconstructed quantization parameter; generating a delta quantization parameter from a quantization parameter and the predicted quantization parameter; and arithmetic encoding a first bin indicating whether or not the delta quantization parameter is significant, a second bin indicating whether the delta quantization parameter is positive or negative, and other bins indicating an absolute value of the delta quantization parameter, in the case where the delta quantization parameter is significant. 10. A computer readable information recording medium storing a video quantization parameter decoding program which, when executed by a processor, performs a method for decoding a quantization parameter for a video decoding process that is based on context-based adaptive binary arithmetic encoding, comprising: generating a predicted quantization parameter from a past reconstructed quantization parameter; and binary arithmetic decoding a first bin indicating whether or not a delta quantization parameter is significant, a second bin indicating whether the delta quantization parameter is positive or negative, and other bins indicating an absolute value of the delta quantization parameter.
2,400
7,355
7,355
14,739,975
2,431
Disclosed are various examples for single-sign on by way of managed mobile devices. For example, an identity provider service can receive a request for an identity assertion from an application executed in a client device. The identity provider service can then detect a platform associated with the client device. A response to the request can be sent based at least in part on the platform, where the response requests authentication by a management credential. Data generated by the management credential is received from the client device, and the management credential is determined to be valid for the identity assertion. The identity assertion is then sent to the client device in response to determining that the management credential is valid for the identity assertion.
1. A non-transitory computer-readable medium embodying a program executable in a server computing device, the program, when executed by the server computing device, being configured to cause the server computing device to at least: receive a request for an identity assertion from an application executed in a mobile device; detect a platform associated with the mobile device; send to the mobile device a response to the request based at least in part on the platform, the response requesting authentication by a management credential; receive data generated by the management credential from the mobile device; determine that the management credential is valid for the identity assertion; and send the identity assertion to the mobile device in response to determining that the management credential is valid for the identity assertion. 2. The non-transitory computer-readable medium of claim 1, wherein the mobile device has access to the management credential in response to authentication by a device management service of a user of the mobile device. 3. The non-transitory computer-readable medium of claim 1, wherein, when the platform is iOS, the request is generated by an iOS-specific certificate adapter. 4. The non-transitory computer-readable medium of claim 1, wherein, when the platform is ANDROID, the request is generated by a certificate adapter. 5. The non-transitory computer-readable medium of claim 1, wherein the management credential corresponds to a device management certificate maintained by a management application executed in the mobile device, the management application being configured to manage the application. 6. The non-transitory computer-readable medium of claim 1, wherein the program, when executed by the server computing device, is further configured to cause the server computing device to at least: receive a second request for a second identity assertion from a second application executed in the mobile device; send to the mobile device a second response to the second request based at least in part on the platform, the response requesting authentication by the management credential; receive the data generated by the management credential from the mobile device; determine that the management credential is valid for the second identity assertion; and send the second identity assertion to the mobile device in response to determining that the management credential is valid for the second identity assertion. 7. A system, comprising: at least one computing device; and an identity provider service executable by the at least one computing device, the identity provider service configured to cause the at least one computing device to at least: receive a request for an identity assertion from an application executed in a mobile device; determine that the application corresponds to a webview of a native application rather than a browser; send to the mobile device a response, the response requesting authentication by a management credential; receive data generated by the management credential from the mobile device; determine that the management credential is valid for the identity assertion; and send the identity assertion to the mobile device in response to determining that the management credential is valid for the identity assertion. 8. The system of claim 7, wherein the identity provider service is further configured to cause the at least one computing device to at least: detect a platform associated with the mobile device; and wherein the response sent to the mobile device is generated based at least in part on the platform. 9. The system of claim 7, wherein the identity provider service is further configured to cause the at least one computing device to at least generate the response to the request by an iOS-specific certificate adapter. 10. The system of claim 7, wherein the request for the identity assertion is redirected to the identity provider service from a service provider. 11. The system of claim 7, wherein the response to the request is a hypertext transfer protocol (HTTP) response having a 401 authentication required status code. 12. A method, comprising: receiving a request for an identity assertion from an application executed in a client device; detecting a platform associated with the client device; sending to the client device a response to the request based at least in part on the platform, the response requesting authentication by a management credential, the management credential corresponding to a secure certificate or a Kerberos profile; receiving data generated by the management credential from the client device; determining that the management credential is valid for the identity assertion; and sending the identity assertion to the client device in response to determining that the management credential is valid for the identity assertion. 13. The method of claim 12, wherein the client device has access to the management credential in response to authentication by a device management service of a user of the client device. 14. The method of claim 12, wherein the request for the identity assertion is redirected from a service provider. 15. The method of claim 12, further comprising detecting that the client device complies with a set of access rules. 16. The method of claim 12, further comprising, in response to determining that the platform corresponds to iOS, generating the response to the request by an iOS-specific certificate adapter. 17. The method of claim 12, wherein the identity assertion is a security assertion markup language (SAML) assertion. 18. The method of claim 12, wherein the response to the request is a hypertext transfer protocol (HTTP) response having a 401 authentication required status code. 19. The method of claim 12, wherein the response to the request in turn requests Kerberos protocol authentication. 20. The method of claim 12, wherein the management credential corresponds to a device management certificate maintained by a management application executed in the client device.
Disclosed are various examples for single-sign on by way of managed mobile devices. For example, an identity provider service can receive a request for an identity assertion from an application executed in a client device. The identity provider service can then detect a platform associated with the client device. A response to the request can be sent based at least in part on the platform, where the response requests authentication by a management credential. Data generated by the management credential is received from the client device, and the management credential is determined to be valid for the identity assertion. The identity assertion is then sent to the client device in response to determining that the management credential is valid for the identity assertion.1. A non-transitory computer-readable medium embodying a program executable in a server computing device, the program, when executed by the server computing device, being configured to cause the server computing device to at least: receive a request for an identity assertion from an application executed in a mobile device; detect a platform associated with the mobile device; send to the mobile device a response to the request based at least in part on the platform, the response requesting authentication by a management credential; receive data generated by the management credential from the mobile device; determine that the management credential is valid for the identity assertion; and send the identity assertion to the mobile device in response to determining that the management credential is valid for the identity assertion. 2. The non-transitory computer-readable medium of claim 1, wherein the mobile device has access to the management credential in response to authentication by a device management service of a user of the mobile device. 3. The non-transitory computer-readable medium of claim 1, wherein, when the platform is iOS, the request is generated by an iOS-specific certificate adapter. 4. The non-transitory computer-readable medium of claim 1, wherein, when the platform is ANDROID, the request is generated by a certificate adapter. 5. The non-transitory computer-readable medium of claim 1, wherein the management credential corresponds to a device management certificate maintained by a management application executed in the mobile device, the management application being configured to manage the application. 6. The non-transitory computer-readable medium of claim 1, wherein the program, when executed by the server computing device, is further configured to cause the server computing device to at least: receive a second request for a second identity assertion from a second application executed in the mobile device; send to the mobile device a second response to the second request based at least in part on the platform, the response requesting authentication by the management credential; receive the data generated by the management credential from the mobile device; determine that the management credential is valid for the second identity assertion; and send the second identity assertion to the mobile device in response to determining that the management credential is valid for the second identity assertion. 7. A system, comprising: at least one computing device; and an identity provider service executable by the at least one computing device, the identity provider service configured to cause the at least one computing device to at least: receive a request for an identity assertion from an application executed in a mobile device; determine that the application corresponds to a webview of a native application rather than a browser; send to the mobile device a response, the response requesting authentication by a management credential; receive data generated by the management credential from the mobile device; determine that the management credential is valid for the identity assertion; and send the identity assertion to the mobile device in response to determining that the management credential is valid for the identity assertion. 8. The system of claim 7, wherein the identity provider service is further configured to cause the at least one computing device to at least: detect a platform associated with the mobile device; and wherein the response sent to the mobile device is generated based at least in part on the platform. 9. The system of claim 7, wherein the identity provider service is further configured to cause the at least one computing device to at least generate the response to the request by an iOS-specific certificate adapter. 10. The system of claim 7, wherein the request for the identity assertion is redirected to the identity provider service from a service provider. 11. The system of claim 7, wherein the response to the request is a hypertext transfer protocol (HTTP) response having a 401 authentication required status code. 12. A method, comprising: receiving a request for an identity assertion from an application executed in a client device; detecting a platform associated with the client device; sending to the client device a response to the request based at least in part on the platform, the response requesting authentication by a management credential, the management credential corresponding to a secure certificate or a Kerberos profile; receiving data generated by the management credential from the client device; determining that the management credential is valid for the identity assertion; and sending the identity assertion to the client device in response to determining that the management credential is valid for the identity assertion. 13. The method of claim 12, wherein the client device has access to the management credential in response to authentication by a device management service of a user of the client device. 14. The method of claim 12, wherein the request for the identity assertion is redirected from a service provider. 15. The method of claim 12, further comprising detecting that the client device complies with a set of access rules. 16. The method of claim 12, further comprising, in response to determining that the platform corresponds to iOS, generating the response to the request by an iOS-specific certificate adapter. 17. The method of claim 12, wherein the identity assertion is a security assertion markup language (SAML) assertion. 18. The method of claim 12, wherein the response to the request is a hypertext transfer protocol (HTTP) response having a 401 authentication required status code. 19. The method of claim 12, wherein the response to the request in turn requests Kerberos protocol authentication. 20. The method of claim 12, wherein the management credential corresponds to a device management certificate maintained by a management application executed in the client device.
2,400
7,356
7,356
14,921,229
2,441
Computer program products, apparatus, and methods for processing digital messages to recipients at destination domains are provided. A plurality of profiles are established, each profile for handling digital to a specific domain or set of domains. A request to process a plurality of outbound digital messages is handled by, for each given digital message, processing the given digital message by (i) determining a destination domain for digital messages, (ii) reading a profile for the determined destination domain for the digital messages and (iii) based on at least one parameter set in the profile: (a) sending the given digital message to the determined destination domain in accordance with the profile when permitted by the at least one parameter set in the profile, or (b) not sending the digital message to the determined destination domain when required by the at least one parameter set in the profile.
1. A method of processing a digital message, comprising: on a digital message system having one or more processors and memory storing one or more programs for execution by the one or more processors: receiving a request from a remote computer system to deliver an outbound digital message to at least one recipient at a particular destination domain; determining the destination domain for the outbound digital message; reading a profile associated with the destination domain of the outbound digital message, the profile comprising one or more parameters that correspond to the incoming digital message policy of the destination domain, wherein at least one parameter in the profile is a quota on a number of digital messages or a maximum amount of data that may be sent from the digital message system to the destination domain in a given period of time; determining whether the quota is exceeded for the destination domain prior to sending the outbound digital message to the destination domain; and, (i) in accordance with a determination that the quota is not exceeded for the destination domain, sending the outbound digital message to the destination domain in accordance with the profile when permitted by the at least one parameter in the profile, or (ii) in accordance with a determination that the quota is exceeded for the destination domain, holding the outbound digital message for a period of time without sending the outbound digital message to the destination domain, wherein the digital message is not sent to the destination domain by the digital message system during a time when the quota is exceeded, and, subsequent to the period of time and during a time when the quota is not exceeded, resuming sending the held outbound digital message to the destination domain. 2. The method of claim 1, further comprising: receiving a message notification from the destination domain in response to the sending of the outbound digital message to the destination domain by the digital message system; and updating the profile for the destination domain in response to the message notification. 3. The method of claim 2, wherein the message notification is a delivery failure notification indicating that the outbound digital message was not delivered to the destination domain and the updating step comprises: updating the profile associated with the destination domain to postpone delivery of any digital message from the digital message system to the destination domain for a period of time. 4. The method of claim 1, wherein the profile associated with the destination domain further comprises: a connection time out period such that, when the digital message system attempts to establish contact with the destination domain in order to deliver a digital message and connection is not established within the connection time out period, the delivery of the digital message is deemed to have failed; and a maximum number of attempts parameter that determines a number of times the digital message system will attempt to deliver a digital message to the destination domain before permanently aborting any attempt to deliver the digital message to the destination domain. 5. The method of claim 1, the method further comprising: automatically obtaining an update, without user intervention, to the profile associated with the destination domain from an external system. 6. A digital message system, for processing a digital message, comprising: one or more processors; and memory storing one or more programs to be executed by the one or more processors; the one or more programs comprising instructions for: receiving a request from a remote computer system to deliver an outbound digital message to at least one recipient at a particular destination domain; determining the destination domain for the outbound digital message; reading a profile associated with the destination domain of the outbound digital message, the profile comprising one or more parameters that correspond to the incoming digital message policy of the destination domain, wherein at least one parameter in the profile is a quota on a number of digital messages or a maximum amount of data that may be sent from the digital message system to the destination domain in a given period of time; determining whether the quota is exceeded for the destination domain prior to sending the outbound digital message to the destination domain; and, (i) in accordance with a determination that the quota is not exceeded for the destination domain, sending the outbound digital message to the destination domain in accordance with the profile, or (ii) in accordance with a determination that the quota is exceeded for the destination domain, holding the outbound digital message for a period of time without sending the outbound digital message to the destination domain, wherein the digital message is not sent to the destination domain by the digital message system during a time when the quota is exceeded, and, subsequent to the period of time and during a time when the quota is not exceeded, resuming sending the held outbound digital message to the destination domain. 7. The digital message system of claim 6, the one or more programs further comprising instructions for: receiving a message notification from the destination domain in response to the sending of the outbound digital message to the destination domain by the digital message system; and updating the profile for the destination domain in response to the message notification. 8. The digital message system of claim 7, wherein the message notification is a delivery failure notification indicating that the outbound digital message was not delivered to the destination domain and the updating step comprises: updating the profile associated with the destination domain to postpone delivery of any digital message from the digital message system to the destination domain for a period of time. 9. The digital message system of claim 6, wherein the profile associated with the destination domain further comprises: a connection time out period such that, when the digital message system attempts to establish contact with the destination domain in order to deliver a digital message and connection is not established within the connection time out period, the delivery of the digital message is deemed to have failed; and a maximum number of attempts parameter that determines a number of times the digital message system will attempt to deliver a digital message to the destination domain before permanently aborting any attempt to deliver the digital message to the destination domain. 10. A non-transitory computer readable storage medium storing one or more programs configured for execution by a computer, the one or more programs comprising instructions for: receiving a request from a remote computer system to deliver an outbound digital message to at least one recipient at a particular destination domain; determining the destination domain for the outbound digital message; reading a profile associated with the destination domain of the outbound digital message, the profile comprising one or more parameters that correspond to the incoming digital message policy of the destination domain, wherein at least one parameter in the profile is a quota on a number of digital messages or a maximum amount of data that may be sent from the digital message system to the destination domain in a given period of time; determining whether the quota is exceeded for the destination domain prior to sending the outbound digital message to the destination domain; and, (i) in accordance with a determination that the quota is not exceeded for the destination domain, sending the outbound digital message to the destination domain in accordance with the profile when permitted by the at least one parameter in the profile, or (ii) in accordance with a determination that the quota is exceeded for the destination domain, holding the outbound digital message for a period of time without sending the outbound digital message to the destination domain, wherein the digital message is not sent to the destination domain by the digital message system during a time when the quota is exceeded, and, subsequent to the period of time and during a time when the quota is not exceeded, resuming sending the held outbound message to the destination domain. 11. The non-transitory computer readable storage medium of claim 10, the one or more programs further comprising instructions for: receiving a message notification from the destination domain in response to the sending of the outbound digital message to the destination domain by the digital message system; and updating the profile for the destination domain in response to the message notification. 12. The non-transitory computer readable storage medium of claim 11, wherein the message notification is a delivery failure notification indicating that the outbound digital message was not delivered to the destination domain and the updating step comprises: updating the profile associated with the destination domain to postpone delivery of any digital message from the digital message system to the destination domain for a period of time. 13. The non-transitory computer readable storage medium of claim 10, wherein the profile associated with the destination domain further comprises: a connection time out period such that, when the digital message system attempts to establish contact with the destination domain in order to deliver a digital message and connection is not established within the connection time out period, the delivery of the digital message is deemed to have failed; and a maximum number of attempts parameter that determines a number of times the digital message system will attempt to deliver a digital message to the destination domain before permanently aborting any attempt to deliver the digital message to the destination domain. 14. The method of claim 1, wherein the outbound digital message is an E-mail. 15. The digital message system of claim 6, wherein the outbound digital message is an E-mail. 16. The non-transitory computer readable storage medium of claim 10, wherein the outbound digital message is an E-mail. 17. The method of claim 1, wherein the outbound digital message is a text message distinct form E-mail. 18. The digital message system of claim 6, wherein the outbound digital message is a text message. 19. The non-transitory computer readable storage medium of claim 10, wherein the outbound digital message is a text message. 20. The method of claim 1, wherein the sending the outbound digital message to the destination domain in accordance with the profile when permitted by the at least one parameter in the profile is done in accordance with a SMTP based process. 21. A method of processing a digital message, comprising: on a digital message system having one or more processors and memory storing one or more programs for execution by the one or more processors: receiving a request from a remote computer system to deliver an outbound digital message to at least one recipient at a particular destination domain; determining the destination domain for the outbound digital message; reading a profile associated with the destination domain of the outbound digital message, the profile comprising one or more parameters that correspond to an incoming digital message policy of the destination domain, wherein at least one parameter in the profile is a quota on a number of digital messages or a maximum amount of data that may be sent from the digital message system to the destination domain in a given period of time; and, based on the at least one parameter in the profile: (i) sending the outbound digital message to the destination domain in accordance with the profile when permitted by the at least one parameter in the profile, or (ii) holding the outbound digital message without sending the outbound digital message to the destination domain when required by the at least one parameter in the profile, wherein the digital message is not sent to the destination domain by the digital message system during a time when the quota is exceeded. 22. The method of claim 21, wherein the incoming digital message policy is based on feedback sent from the destination domain. 23. A method of processing a digital message, comprising: on a digital message system having one or more processors and memory storing one or more programs for execution by the one or more processors: receiving a request from a remote computer system to deliver an outbound digital message to at least one recipient at a particular destination domain; determining the destination domain for the outbound digital message; reading a profile associated with the destination domain of the outbound digital message, the profile comprising one or more parameters that correspond to an incoming digital message policy of the destination domain, wherein at least one parameter in the profile is a quota on a number of digital messages or a maximum amount of data that may be sent from the digital message system to the destination domain in a given period of time; and, determining that the quota is exceeded for the destination domain prior to sending the outbound digital message to the destination domain; in accordance with a determination that the quota is exceeded for the destination domain, holding the outbound digital message for a period of time without sending the outbound digital message to the destination domain, wherein the digital message is not sent to the destination domain by the digital message system during a time when the quota is exceeded; subsequent to the period of time, determining that the quota is not exceeded for the destination domain; and, in accordance with a determination that the quota is not exceeded for the destination domain, sending the held outbound digital message to the destination domain in accordance with the profile. 24. The method of claim 23, including: in accordance with the determination that the quota is exceeded for the destination domain, updating one or more parameters in the profile associated with the destination domain to indicate that transmission of the digital message to the destination domain should be deferred; and, in accordance with the determination that the quota is not exceeded for the destination domain, updating the one or more parameters in the profile associated with the destination domain to indicate that transmission of the digital message to the destination domain may resume. 25. The method of claim 1, further comprising, in accordance with a determination that a predetermined evaluation integral has elapsed, evaluating whether a condition has been set, wherein the condition is set when: a number of time outs exceeds a maximum allowable number of time outs during the predetermined evaluation integral, a number of spam block notifications exceeds a maximum allowable number of spam block notifications during the predetermined evaluation integral, or a message delivery failure rate exceeds a maximum allowable message delivery failure rate during the predetermined evaluation integral, wherein, when the condition is set, the outbound digital message is deferred irrespective of the quota determination. 26. The method of claim 25, further comprising: updating the profile associated with the destination domain in accordance with the evaluation of the condition. 27. The digital message system of claim 6, wherein the one or more programs further comprise instructions for, in accordance with a determination that a predetermined evaluation integral has elapsed, evaluating whether a condition has been set, wherein the condition is set when: a number of time outs exceeds a maximum allowable number of time outs during the predetermined evaluation integral, a number of spam block notifications exceeds a maximum allowable number of spam block notifications during the predetermined evaluation integral, or a message delivery failure rate exceeds a maximum allowable message delivery failure rate during the predetermined evaluation integral, wherein, when the condition is set, the outbound digital message is deferred irrespective of the quota determination. 28. The non-transitory computer readable storage medium of claim 10, the one or more programs further comprising instructions for, in accordance with a determination that a predetermined evaluation integral has elapsed, evaluating whether a condition has been set, wherein the condition is set when: a number of time outs exceeds a maximum allowable number of time outs during the predetermined evaluation integral, a number of spam block notifications exceeds a maximum allowable number of spam block notifications during the predetermined evaluation integral, or a message delivery failure rate exceeds a maximum allowable message delivery failure rate during the predetermined evaluation integral, wherein, when the condition is set, the outbound digital message is deferred irrespective of the quota determination. 29. The method of claim 21, further comprising, in accordance with a determination that a predetermined evaluation integral has elapsed, evaluating whether a condition has been set, wherein the condition is set when: a number of time outs exceeds a maximum allowable number of time outs during the predetermined evaluation integral, a number of spam block notifications exceeds a maximum allowable number of spam block notifications during the predetermined evaluation integral, or a message delivery failure rate exceeds a maximum allowable message delivery failure rate during the predetermined evaluation integral, wherein, when the condition is set, the outbound digital message is deferred irrespective of the quota determination.
Computer program products, apparatus, and methods for processing digital messages to recipients at destination domains are provided. A plurality of profiles are established, each profile for handling digital to a specific domain or set of domains. A request to process a plurality of outbound digital messages is handled by, for each given digital message, processing the given digital message by (i) determining a destination domain for digital messages, (ii) reading a profile for the determined destination domain for the digital messages and (iii) based on at least one parameter set in the profile: (a) sending the given digital message to the determined destination domain in accordance with the profile when permitted by the at least one parameter set in the profile, or (b) not sending the digital message to the determined destination domain when required by the at least one parameter set in the profile.1. A method of processing a digital message, comprising: on a digital message system having one or more processors and memory storing one or more programs for execution by the one or more processors: receiving a request from a remote computer system to deliver an outbound digital message to at least one recipient at a particular destination domain; determining the destination domain for the outbound digital message; reading a profile associated with the destination domain of the outbound digital message, the profile comprising one or more parameters that correspond to the incoming digital message policy of the destination domain, wherein at least one parameter in the profile is a quota on a number of digital messages or a maximum amount of data that may be sent from the digital message system to the destination domain in a given period of time; determining whether the quota is exceeded for the destination domain prior to sending the outbound digital message to the destination domain; and, (i) in accordance with a determination that the quota is not exceeded for the destination domain, sending the outbound digital message to the destination domain in accordance with the profile when permitted by the at least one parameter in the profile, or (ii) in accordance with a determination that the quota is exceeded for the destination domain, holding the outbound digital message for a period of time without sending the outbound digital message to the destination domain, wherein the digital message is not sent to the destination domain by the digital message system during a time when the quota is exceeded, and, subsequent to the period of time and during a time when the quota is not exceeded, resuming sending the held outbound digital message to the destination domain. 2. The method of claim 1, further comprising: receiving a message notification from the destination domain in response to the sending of the outbound digital message to the destination domain by the digital message system; and updating the profile for the destination domain in response to the message notification. 3. The method of claim 2, wherein the message notification is a delivery failure notification indicating that the outbound digital message was not delivered to the destination domain and the updating step comprises: updating the profile associated with the destination domain to postpone delivery of any digital message from the digital message system to the destination domain for a period of time. 4. The method of claim 1, wherein the profile associated with the destination domain further comprises: a connection time out period such that, when the digital message system attempts to establish contact with the destination domain in order to deliver a digital message and connection is not established within the connection time out period, the delivery of the digital message is deemed to have failed; and a maximum number of attempts parameter that determines a number of times the digital message system will attempt to deliver a digital message to the destination domain before permanently aborting any attempt to deliver the digital message to the destination domain. 5. The method of claim 1, the method further comprising: automatically obtaining an update, without user intervention, to the profile associated with the destination domain from an external system. 6. A digital message system, for processing a digital message, comprising: one or more processors; and memory storing one or more programs to be executed by the one or more processors; the one or more programs comprising instructions for: receiving a request from a remote computer system to deliver an outbound digital message to at least one recipient at a particular destination domain; determining the destination domain for the outbound digital message; reading a profile associated with the destination domain of the outbound digital message, the profile comprising one or more parameters that correspond to the incoming digital message policy of the destination domain, wherein at least one parameter in the profile is a quota on a number of digital messages or a maximum amount of data that may be sent from the digital message system to the destination domain in a given period of time; determining whether the quota is exceeded for the destination domain prior to sending the outbound digital message to the destination domain; and, (i) in accordance with a determination that the quota is not exceeded for the destination domain, sending the outbound digital message to the destination domain in accordance with the profile, or (ii) in accordance with a determination that the quota is exceeded for the destination domain, holding the outbound digital message for a period of time without sending the outbound digital message to the destination domain, wherein the digital message is not sent to the destination domain by the digital message system during a time when the quota is exceeded, and, subsequent to the period of time and during a time when the quota is not exceeded, resuming sending the held outbound digital message to the destination domain. 7. The digital message system of claim 6, the one or more programs further comprising instructions for: receiving a message notification from the destination domain in response to the sending of the outbound digital message to the destination domain by the digital message system; and updating the profile for the destination domain in response to the message notification. 8. The digital message system of claim 7, wherein the message notification is a delivery failure notification indicating that the outbound digital message was not delivered to the destination domain and the updating step comprises: updating the profile associated with the destination domain to postpone delivery of any digital message from the digital message system to the destination domain for a period of time. 9. The digital message system of claim 6, wherein the profile associated with the destination domain further comprises: a connection time out period such that, when the digital message system attempts to establish contact with the destination domain in order to deliver a digital message and connection is not established within the connection time out period, the delivery of the digital message is deemed to have failed; and a maximum number of attempts parameter that determines a number of times the digital message system will attempt to deliver a digital message to the destination domain before permanently aborting any attempt to deliver the digital message to the destination domain. 10. A non-transitory computer readable storage medium storing one or more programs configured for execution by a computer, the one or more programs comprising instructions for: receiving a request from a remote computer system to deliver an outbound digital message to at least one recipient at a particular destination domain; determining the destination domain for the outbound digital message; reading a profile associated with the destination domain of the outbound digital message, the profile comprising one or more parameters that correspond to the incoming digital message policy of the destination domain, wherein at least one parameter in the profile is a quota on a number of digital messages or a maximum amount of data that may be sent from the digital message system to the destination domain in a given period of time; determining whether the quota is exceeded for the destination domain prior to sending the outbound digital message to the destination domain; and, (i) in accordance with a determination that the quota is not exceeded for the destination domain, sending the outbound digital message to the destination domain in accordance with the profile when permitted by the at least one parameter in the profile, or (ii) in accordance with a determination that the quota is exceeded for the destination domain, holding the outbound digital message for a period of time without sending the outbound digital message to the destination domain, wherein the digital message is not sent to the destination domain by the digital message system during a time when the quota is exceeded, and, subsequent to the period of time and during a time when the quota is not exceeded, resuming sending the held outbound message to the destination domain. 11. The non-transitory computer readable storage medium of claim 10, the one or more programs further comprising instructions for: receiving a message notification from the destination domain in response to the sending of the outbound digital message to the destination domain by the digital message system; and updating the profile for the destination domain in response to the message notification. 12. The non-transitory computer readable storage medium of claim 11, wherein the message notification is a delivery failure notification indicating that the outbound digital message was not delivered to the destination domain and the updating step comprises: updating the profile associated with the destination domain to postpone delivery of any digital message from the digital message system to the destination domain for a period of time. 13. The non-transitory computer readable storage medium of claim 10, wherein the profile associated with the destination domain further comprises: a connection time out period such that, when the digital message system attempts to establish contact with the destination domain in order to deliver a digital message and connection is not established within the connection time out period, the delivery of the digital message is deemed to have failed; and a maximum number of attempts parameter that determines a number of times the digital message system will attempt to deliver a digital message to the destination domain before permanently aborting any attempt to deliver the digital message to the destination domain. 14. The method of claim 1, wherein the outbound digital message is an E-mail. 15. The digital message system of claim 6, wherein the outbound digital message is an E-mail. 16. The non-transitory computer readable storage medium of claim 10, wherein the outbound digital message is an E-mail. 17. The method of claim 1, wherein the outbound digital message is a text message distinct form E-mail. 18. The digital message system of claim 6, wherein the outbound digital message is a text message. 19. The non-transitory computer readable storage medium of claim 10, wherein the outbound digital message is a text message. 20. The method of claim 1, wherein the sending the outbound digital message to the destination domain in accordance with the profile when permitted by the at least one parameter in the profile is done in accordance with a SMTP based process. 21. A method of processing a digital message, comprising: on a digital message system having one or more processors and memory storing one or more programs for execution by the one or more processors: receiving a request from a remote computer system to deliver an outbound digital message to at least one recipient at a particular destination domain; determining the destination domain for the outbound digital message; reading a profile associated with the destination domain of the outbound digital message, the profile comprising one or more parameters that correspond to an incoming digital message policy of the destination domain, wherein at least one parameter in the profile is a quota on a number of digital messages or a maximum amount of data that may be sent from the digital message system to the destination domain in a given period of time; and, based on the at least one parameter in the profile: (i) sending the outbound digital message to the destination domain in accordance with the profile when permitted by the at least one parameter in the profile, or (ii) holding the outbound digital message without sending the outbound digital message to the destination domain when required by the at least one parameter in the profile, wherein the digital message is not sent to the destination domain by the digital message system during a time when the quota is exceeded. 22. The method of claim 21, wherein the incoming digital message policy is based on feedback sent from the destination domain. 23. A method of processing a digital message, comprising: on a digital message system having one or more processors and memory storing one or more programs for execution by the one or more processors: receiving a request from a remote computer system to deliver an outbound digital message to at least one recipient at a particular destination domain; determining the destination domain for the outbound digital message; reading a profile associated with the destination domain of the outbound digital message, the profile comprising one or more parameters that correspond to an incoming digital message policy of the destination domain, wherein at least one parameter in the profile is a quota on a number of digital messages or a maximum amount of data that may be sent from the digital message system to the destination domain in a given period of time; and, determining that the quota is exceeded for the destination domain prior to sending the outbound digital message to the destination domain; in accordance with a determination that the quota is exceeded for the destination domain, holding the outbound digital message for a period of time without sending the outbound digital message to the destination domain, wherein the digital message is not sent to the destination domain by the digital message system during a time when the quota is exceeded; subsequent to the period of time, determining that the quota is not exceeded for the destination domain; and, in accordance with a determination that the quota is not exceeded for the destination domain, sending the held outbound digital message to the destination domain in accordance with the profile. 24. The method of claim 23, including: in accordance with the determination that the quota is exceeded for the destination domain, updating one or more parameters in the profile associated with the destination domain to indicate that transmission of the digital message to the destination domain should be deferred; and, in accordance with the determination that the quota is not exceeded for the destination domain, updating the one or more parameters in the profile associated with the destination domain to indicate that transmission of the digital message to the destination domain may resume. 25. The method of claim 1, further comprising, in accordance with a determination that a predetermined evaluation integral has elapsed, evaluating whether a condition has been set, wherein the condition is set when: a number of time outs exceeds a maximum allowable number of time outs during the predetermined evaluation integral, a number of spam block notifications exceeds a maximum allowable number of spam block notifications during the predetermined evaluation integral, or a message delivery failure rate exceeds a maximum allowable message delivery failure rate during the predetermined evaluation integral, wherein, when the condition is set, the outbound digital message is deferred irrespective of the quota determination. 26. The method of claim 25, further comprising: updating the profile associated with the destination domain in accordance with the evaluation of the condition. 27. The digital message system of claim 6, wherein the one or more programs further comprise instructions for, in accordance with a determination that a predetermined evaluation integral has elapsed, evaluating whether a condition has been set, wherein the condition is set when: a number of time outs exceeds a maximum allowable number of time outs during the predetermined evaluation integral, a number of spam block notifications exceeds a maximum allowable number of spam block notifications during the predetermined evaluation integral, or a message delivery failure rate exceeds a maximum allowable message delivery failure rate during the predetermined evaluation integral, wherein, when the condition is set, the outbound digital message is deferred irrespective of the quota determination. 28. The non-transitory computer readable storage medium of claim 10, the one or more programs further comprising instructions for, in accordance with a determination that a predetermined evaluation integral has elapsed, evaluating whether a condition has been set, wherein the condition is set when: a number of time outs exceeds a maximum allowable number of time outs during the predetermined evaluation integral, a number of spam block notifications exceeds a maximum allowable number of spam block notifications during the predetermined evaluation integral, or a message delivery failure rate exceeds a maximum allowable message delivery failure rate during the predetermined evaluation integral, wherein, when the condition is set, the outbound digital message is deferred irrespective of the quota determination. 29. The method of claim 21, further comprising, in accordance with a determination that a predetermined evaluation integral has elapsed, evaluating whether a condition has been set, wherein the condition is set when: a number of time outs exceeds a maximum allowable number of time outs during the predetermined evaluation integral, a number of spam block notifications exceeds a maximum allowable number of spam block notifications during the predetermined evaluation integral, or a message delivery failure rate exceeds a maximum allowable message delivery failure rate during the predetermined evaluation integral, wherein, when the condition is set, the outbound digital message is deferred irrespective of the quota determination.
2,400
7,357
7,357
14,456,163
2,482
A vision system of a vehicle includes a camera, a head unit and a plurality of circuit cards. The camera has a field of view exterior of the vehicle. The head unit includes a video display for displaying images derived from a video feed from the camera. The circuit cards each include at least one video line connector configured to communicate with a video feed from the camera. The head unit includes a circuit connector configured to connect to a selected one of the circuit cards. The circuit cards provide different processing functions via universal connection with the circuit connector of the head unit and the video feed from the camera. A selected circuit card connects to the circuit connector and receives the video feed from the camera and provides the processing functions associated with the selected circuit card and outputs an output signal to the circuit connector.
1. A vision system of a vehicle, said vision system comprising: a camera disposed at a vehicle and having a field of view exterior of the vehicle; a head unit comprising a video display for displaying images derived from a video feed from said camera; a plurality of circuit cards each comprising a video line connector configured to connect to the video feed from said camera; wherein said head unit comprises a circuit connector configured to connect to a selected one of said circuit cards; wherein said plurality of circuit cards provide different processing functions via universal connection with said circuit connector of said head unit and the video feed from said camera; and wherein the selected circuit card receives the video feed from said camera and provides the respective processing functions associated with the selected circuit card and outputs an output signal to said circuit connector of said head unit. 2. The vision system of claim 1, wherein at least some of said plurality of circuit cards are operable to generate a video output to said video display screen responsive to processing of the video feed from said camera. 3. The vision system of claim 2, wherein at least one of said plurality of circuit cards comprises software to provide an overlay at displayed images derived from the video feed of said camera. 4. The vision system of claim 1, wherein said circuit cards generate said outputs to provide respective selected types of displayed images. 5. The vision system of claim 1, wherein at least one of said plurality of circuit cards comprises an image processor for processing image data captured by said camera for detection of objects present in the field of view of said camera. 6. The vision system of claim 1, wherein at least one of said plurality of circuit cards comprises a plurality of video line connectors for connecting to a plurality of video feeds from multiple cameras of the vehicle. 7. The vision system of claim 6, wherein at least one said plurality of video line connections comprises a NTSC connection. 8. The vision system of claim 6, wherein at least one said plurality of video line connections comprises one of (i) a CameraLink connection, (ii) an Ethernet connection, (iii) a MOST connection, (iv) a DVI connection, (v) a MIPICSI2 connection and (vi) a Flexray connection. 9. The vision system of claim 6, comprising a video display screen operable to display video images derived from the video feeds from said cameras, wherein at least one of said plurality of circuit cards comprises software to provide a top down display responsive to the video feeds from said multiple cameras. 10. The vision system of claim 1, wherein said camera and cabling of said camera are common for selection of any of said plurality of circuit cards. 11. The vision system of claim 1, wherein said circuit cards are individually programmable to provide updates to software of said circuit cards. 12. A vision system of a vehicle, said vision system comprising: a plurality of cameras disposed at a vehicle and having respective fields of view exterior of the vehicle; a head unit comprising a video display for displaying images derived from video feeds from said cameras; a plurality of circuit cards each comprising a plurality of video line connectors configured to connect to the video feeds from said cameras; wherein said head unit comprises a circuit connector configured to connect to a selected one of said circuit cards; wherein said plurality of circuit cards provide different processing functions via universal connection with said circuit connector of said head unit and the video feeds from said cameras; wherein the selected circuit card receives the video feeds from said cameras and provides the respective processing functions associated with the selected circuit card and outputs an output signal to said circuit connector of said head unit; and wherein at least one of said plurality of circuit cards is operable to provide a top down display at said video display screen responsive to the video feeds from said cameras. 13. The vision system of claim 12, wherein at least one of said plurality of circuit cards comprises software to provide an overlay at displayed images derived from the video feeds of said cameras. 14. The vision system of claim 12, wherein said circuit cards generate said outputs to provide respective selected types of displayed images. 15. The vision system of claim 12, wherein at least one of said plurality of circuit cards comprises an image processor for processing image data captured by said cameras for detection of objects present in the fields of view of said cameras. 16. The vision system of claim 12, wherein said cameras and cabling of said cameras are common for selection of any of said plurality of circuit cards. 17. The vision system of claim 12, wherein said circuit cards are individually programmable to provide updates to software of said circuit cards. 18. A vision system of a vehicle, said vision system comprising: a plurality of cameras disposed at a vehicle and having respective fields of view exterior of the vehicle; a head unit comprising a video display for displaying images derived from video feeds from said cameras; a plurality of circuit cards each comprising a plurality of video line connectors configured to connect to the video feeds from said cameras; wherein said head unit comprises a circuit connector configured to connect to a selected one of said circuit cards; wherein said plurality of circuit cards provide different processing functions via universal connection with said circuit connector of said head unit and the video feeds from said cameras; wherein the selected circuit card receives the video feeds from said cameras and provides the respective processing functions associated with the selected circuit card and outputs an output signal to said circuit connector of said head unit; wherein at least some of said plurality of circuit cards are operable to generate a video output to said video display screen responsive to processing of the video feeds from said cameras; wherein said circuit cards generate said outputs to provide respective selected types of displayed images; and wherein at least one of said plurality of circuit cards is operable to process the video feeds to provide a top down display at said video display screen. 19. The vision system of claim 18, wherein at least one of said plurality of circuit cards comprises an image processor for processing image data captured by at least one of said cameras for detection of objects present in the field of view of said at least one of said cameras. 20. The vision system of claim 18, wherein said circuit cards are individually programmable to provide updates to software of said circuit cards.
A vision system of a vehicle includes a camera, a head unit and a plurality of circuit cards. The camera has a field of view exterior of the vehicle. The head unit includes a video display for displaying images derived from a video feed from the camera. The circuit cards each include at least one video line connector configured to communicate with a video feed from the camera. The head unit includes a circuit connector configured to connect to a selected one of the circuit cards. The circuit cards provide different processing functions via universal connection with the circuit connector of the head unit and the video feed from the camera. A selected circuit card connects to the circuit connector and receives the video feed from the camera and provides the processing functions associated with the selected circuit card and outputs an output signal to the circuit connector.1. A vision system of a vehicle, said vision system comprising: a camera disposed at a vehicle and having a field of view exterior of the vehicle; a head unit comprising a video display for displaying images derived from a video feed from said camera; a plurality of circuit cards each comprising a video line connector configured to connect to the video feed from said camera; wherein said head unit comprises a circuit connector configured to connect to a selected one of said circuit cards; wherein said plurality of circuit cards provide different processing functions via universal connection with said circuit connector of said head unit and the video feed from said camera; and wherein the selected circuit card receives the video feed from said camera and provides the respective processing functions associated with the selected circuit card and outputs an output signal to said circuit connector of said head unit. 2. The vision system of claim 1, wherein at least some of said plurality of circuit cards are operable to generate a video output to said video display screen responsive to processing of the video feed from said camera. 3. The vision system of claim 2, wherein at least one of said plurality of circuit cards comprises software to provide an overlay at displayed images derived from the video feed of said camera. 4. The vision system of claim 1, wherein said circuit cards generate said outputs to provide respective selected types of displayed images. 5. The vision system of claim 1, wherein at least one of said plurality of circuit cards comprises an image processor for processing image data captured by said camera for detection of objects present in the field of view of said camera. 6. The vision system of claim 1, wherein at least one of said plurality of circuit cards comprises a plurality of video line connectors for connecting to a plurality of video feeds from multiple cameras of the vehicle. 7. The vision system of claim 6, wherein at least one said plurality of video line connections comprises a NTSC connection. 8. The vision system of claim 6, wherein at least one said plurality of video line connections comprises one of (i) a CameraLink connection, (ii) an Ethernet connection, (iii) a MOST connection, (iv) a DVI connection, (v) a MIPICSI2 connection and (vi) a Flexray connection. 9. The vision system of claim 6, comprising a video display screen operable to display video images derived from the video feeds from said cameras, wherein at least one of said plurality of circuit cards comprises software to provide a top down display responsive to the video feeds from said multiple cameras. 10. The vision system of claim 1, wherein said camera and cabling of said camera are common for selection of any of said plurality of circuit cards. 11. The vision system of claim 1, wherein said circuit cards are individually programmable to provide updates to software of said circuit cards. 12. A vision system of a vehicle, said vision system comprising: a plurality of cameras disposed at a vehicle and having respective fields of view exterior of the vehicle; a head unit comprising a video display for displaying images derived from video feeds from said cameras; a plurality of circuit cards each comprising a plurality of video line connectors configured to connect to the video feeds from said cameras; wherein said head unit comprises a circuit connector configured to connect to a selected one of said circuit cards; wherein said plurality of circuit cards provide different processing functions via universal connection with said circuit connector of said head unit and the video feeds from said cameras; wherein the selected circuit card receives the video feeds from said cameras and provides the respective processing functions associated with the selected circuit card and outputs an output signal to said circuit connector of said head unit; and wherein at least one of said plurality of circuit cards is operable to provide a top down display at said video display screen responsive to the video feeds from said cameras. 13. The vision system of claim 12, wherein at least one of said plurality of circuit cards comprises software to provide an overlay at displayed images derived from the video feeds of said cameras. 14. The vision system of claim 12, wherein said circuit cards generate said outputs to provide respective selected types of displayed images. 15. The vision system of claim 12, wherein at least one of said plurality of circuit cards comprises an image processor for processing image data captured by said cameras for detection of objects present in the fields of view of said cameras. 16. The vision system of claim 12, wherein said cameras and cabling of said cameras are common for selection of any of said plurality of circuit cards. 17. The vision system of claim 12, wherein said circuit cards are individually programmable to provide updates to software of said circuit cards. 18. A vision system of a vehicle, said vision system comprising: a plurality of cameras disposed at a vehicle and having respective fields of view exterior of the vehicle; a head unit comprising a video display for displaying images derived from video feeds from said cameras; a plurality of circuit cards each comprising a plurality of video line connectors configured to connect to the video feeds from said cameras; wherein said head unit comprises a circuit connector configured to connect to a selected one of said circuit cards; wherein said plurality of circuit cards provide different processing functions via universal connection with said circuit connector of said head unit and the video feeds from said cameras; wherein the selected circuit card receives the video feeds from said cameras and provides the respective processing functions associated with the selected circuit card and outputs an output signal to said circuit connector of said head unit; wherein at least some of said plurality of circuit cards are operable to generate a video output to said video display screen responsive to processing of the video feeds from said cameras; wherein said circuit cards generate said outputs to provide respective selected types of displayed images; and wherein at least one of said plurality of circuit cards is operable to process the video feeds to provide a top down display at said video display screen. 19. The vision system of claim 18, wherein at least one of said plurality of circuit cards comprises an image processor for processing image data captured by at least one of said cameras for detection of objects present in the field of view of said at least one of said cameras. 20. The vision system of claim 18, wherein said circuit cards are individually programmable to provide updates to software of said circuit cards.
2,400
7,358
7,358
14,069,565
2,443
A system and method for optimizing defragmentation of content in a content delivery network (CDN). In an example, a manifest available to the content delivery node with respect to a particular content as well as segment files stored in a database cache of the content delivery node are analyzed to determine if any segment files referenced by the manifest are absent from the database cache. If so, one or more delivery rules associated with the content delivery node based on historical ABR asset delivery patterns may be applied to determine representations of the absent segment files that satisfy the one or more delivery rules. After determining compliant representations of the absent segment files, they may be pulled from another content delivery node of the CDN (e.g., a parent node or an edge server node).
1. A method operative at a content delivery node of a content delivery network (CDN) configured to deliver adaptive streaming content, the method comprising: analyzing a manifest available to the content delivery node with respect to a particular content and segment files stored in a database cache of the content delivery node to determine if any segment files referenced by the manifest are absent from the database cache; if so, applying one or more delivery rules associated with the content delivery node to determine representations of the absent segment files that satisfy the one or more delivery rules, wherein the delivery rules are established based on historical delivery patterns of one or more adaptive bitrate (ABR) assets downloaded at the content delivery node; and pulling, from another content delivery node of the CDN, only the representations of the absent segment files satisfying the one or more delivery rules and storing the pulled representations in the database of the content delivery node. 2. The method as recited in claim 1, wherein the ABR assets comprise at least one of video components, audio track components and one or more subtitle languages. 3. The method as recited in claim 2, wherein the historical delivery patterns are obtained for all the video components, all the audio track components, and all subtitle languages downloaded over a period of time at the content delivery node. 4. The method as recited in claim 3, wherein the delivery rules for the content delivery node comprise at least one of a video delivery rule based on bit rates of video components downloaded from the content delivery node, an audio delivery rule based on audio language tracks downloaded from the content delivery node, and a subtitle delivery rule based on subtitle language selections downloaded from the content delivery node. 5. The method as recited in claim 1, wherein the act of pulling the representations of the absent segment files satisfying the one or more delivery rules from another content delivery node comprises pulling the representations of the absent segments files from a regional server node or an edge server node. 6. The method as recited in claim 1, wherein the manifest comprises a master manifest that includes one or more child manifests, each referencing one or more representations of the particular content's video, audio and subtitle components. 7. The method as recited in claim 1, further comprising: determining, prior to analyzing the manifest, that a defragmentation timer value is within a period of minimum network usage timeframe; and determining, prior to analyzing the manifest, that the particular content's ABR package is within a popularity window. 8. The method as recited in claim 1, wherein the one or more delivery rules are retrieved from a management node. 9. The method as recited in claim 1, wherein one or more delivery rules are determined based on the ABR asset delivery patterns maintained at the content delivery node. 10. A content delivery node operative within a content delivery network (CDN) configured to deliver adaptive streaming content, the content delivery node comprising: one or more processors; a database cache for storing segment files of content streamed to the content delivery node; and a content defragmentation module embodied in a persistent memory coupled to the one or more processors, the content defragmentation module having instructions executable by the one or more processors and configured to: analyze a manifest available to the content delivery node with respect to a particular content and segment files stored in the database cache of the content delivery node to determine if any segment files referenced by the manifest are absent from the database cache; if so, apply one or more delivery rules associated with the content delivery node to determine representations of the absent segment files that satisfy the one or more delivery rules, wherein the delivery rules are established based on historical delivery patterns of one or more adaptive bitrate (ABR) assets downloaded at the content delivery node; and pull, from another content delivery node of the CDN, only the representations of the absent segment files satisfying the one or more delivery rules and store the pulled representations in the database cache of the content delivery node. 11. The content delivery node as recited in claim 10, wherein the ABR assets comprise at least one of video components, audio track components and one or more subtitle languages. 12. The content delivery node as recited in claim 11, wherein the historical delivery patterns are obtained for all the video components, all the audio track components, and all subtitle languages downloaded over a period of time at the content delivery node. 13. The content delivery node as recited in claim 12, wherein the delivery rules for the content delivery node comprise at least one of a video delivery rule based on bit rates of video components downloaded from the content delivery node, an audio delivery rule based on audio language tracks downloaded from the content delivery node, and a subtitle delivery rule based on subtitle language selections downloaded from the content delivery node. 14. The content delivery node as recited in claim 10, wherein the instructions to pull the representations of the absent segment files satisfying the one or more delivery rules from another content delivery node comprise instructions to pull the representations of the absent segment files from a regional server node. 15. The content delivery node as recited in claim 10, wherein the instructions to pull the representations of the absent segment files satisfying the one or more delivery rules from another content delivery node comprise instructions to pull the representations of the absent segment files from an edge server node. 16. The content delivery node as recited in claim 10, wherein the manifest comprises a master manifest that includes one or more child manifests, each referencing one or more representations of the particular content's video, audio and subtitle components. 17. The content delivery node as recited in claim 10, wherein the content defragmentation module further comprises instructions configured to: determine, prior to analyzing the manifest, that a defragmentation timer value provided by a timer is within a period of minimum network usage timeframe; and determine, prior to analyzing the manifest, that the particular content's ABR package is within a popularity window. 18. The content delivery node as recited in claim 10, wherein the one or more delivery rules are retrieved from a management node. 19. The content delivery node as recited in claim 1, wherein one or more delivery rules are determined based on the ABR asset delivery patterns locally stored at the content delivery node. 20. A non-transitory computer-readable medium containing instructions stored thereon which, when executed by a computer system configured to operate as a content delivery node in association with a content delivery network, perform the acts: analyzing a manifest available to the content delivery node with respect to a particular content and segment files stored in a database cache of the content delivery node to determine if any segment files referenced by the manifest are absent from the database cache; if so, applying one or more delivery rules associated with the content delivery node to determine representations of the absent segment files that satisfy the one or more delivery rules, wherein the delivery rules are established based on historical delivery patterns of one or more adaptive bitrate (ABR) assets downloaded at the content delivery node; and pulling, from another content delivery node of the CDN, only the representations of the absent segment files satisfying the one or more delivery rules and storing the pulled representations in the database of the content delivery node. 21. The non-transitory computer-readable medium as recited in claim 20 further comprising: instructions configured to determine, prior to analyzing the manifest, that a defragmentation timer value provided by a timer is within a period of minimum network usage timeframe. 22. The non-transitory computer-readable medium as recited in claim 20 further comprising: instructions configured to determine, prior to analyzing the manifest, that the particular content's ABR package is within a popularity window.
A system and method for optimizing defragmentation of content in a content delivery network (CDN). In an example, a manifest available to the content delivery node with respect to a particular content as well as segment files stored in a database cache of the content delivery node are analyzed to determine if any segment files referenced by the manifest are absent from the database cache. If so, one or more delivery rules associated with the content delivery node based on historical ABR asset delivery patterns may be applied to determine representations of the absent segment files that satisfy the one or more delivery rules. After determining compliant representations of the absent segment files, they may be pulled from another content delivery node of the CDN (e.g., a parent node or an edge server node).1. A method operative at a content delivery node of a content delivery network (CDN) configured to deliver adaptive streaming content, the method comprising: analyzing a manifest available to the content delivery node with respect to a particular content and segment files stored in a database cache of the content delivery node to determine if any segment files referenced by the manifest are absent from the database cache; if so, applying one or more delivery rules associated with the content delivery node to determine representations of the absent segment files that satisfy the one or more delivery rules, wherein the delivery rules are established based on historical delivery patterns of one or more adaptive bitrate (ABR) assets downloaded at the content delivery node; and pulling, from another content delivery node of the CDN, only the representations of the absent segment files satisfying the one or more delivery rules and storing the pulled representations in the database of the content delivery node. 2. The method as recited in claim 1, wherein the ABR assets comprise at least one of video components, audio track components and one or more subtitle languages. 3. The method as recited in claim 2, wherein the historical delivery patterns are obtained for all the video components, all the audio track components, and all subtitle languages downloaded over a period of time at the content delivery node. 4. The method as recited in claim 3, wherein the delivery rules for the content delivery node comprise at least one of a video delivery rule based on bit rates of video components downloaded from the content delivery node, an audio delivery rule based on audio language tracks downloaded from the content delivery node, and a subtitle delivery rule based on subtitle language selections downloaded from the content delivery node. 5. The method as recited in claim 1, wherein the act of pulling the representations of the absent segment files satisfying the one or more delivery rules from another content delivery node comprises pulling the representations of the absent segments files from a regional server node or an edge server node. 6. The method as recited in claim 1, wherein the manifest comprises a master manifest that includes one or more child manifests, each referencing one or more representations of the particular content's video, audio and subtitle components. 7. The method as recited in claim 1, further comprising: determining, prior to analyzing the manifest, that a defragmentation timer value is within a period of minimum network usage timeframe; and determining, prior to analyzing the manifest, that the particular content's ABR package is within a popularity window. 8. The method as recited in claim 1, wherein the one or more delivery rules are retrieved from a management node. 9. The method as recited in claim 1, wherein one or more delivery rules are determined based on the ABR asset delivery patterns maintained at the content delivery node. 10. A content delivery node operative within a content delivery network (CDN) configured to deliver adaptive streaming content, the content delivery node comprising: one or more processors; a database cache for storing segment files of content streamed to the content delivery node; and a content defragmentation module embodied in a persistent memory coupled to the one or more processors, the content defragmentation module having instructions executable by the one or more processors and configured to: analyze a manifest available to the content delivery node with respect to a particular content and segment files stored in the database cache of the content delivery node to determine if any segment files referenced by the manifest are absent from the database cache; if so, apply one or more delivery rules associated with the content delivery node to determine representations of the absent segment files that satisfy the one or more delivery rules, wherein the delivery rules are established based on historical delivery patterns of one or more adaptive bitrate (ABR) assets downloaded at the content delivery node; and pull, from another content delivery node of the CDN, only the representations of the absent segment files satisfying the one or more delivery rules and store the pulled representations in the database cache of the content delivery node. 11. The content delivery node as recited in claim 10, wherein the ABR assets comprise at least one of video components, audio track components and one or more subtitle languages. 12. The content delivery node as recited in claim 11, wherein the historical delivery patterns are obtained for all the video components, all the audio track components, and all subtitle languages downloaded over a period of time at the content delivery node. 13. The content delivery node as recited in claim 12, wherein the delivery rules for the content delivery node comprise at least one of a video delivery rule based on bit rates of video components downloaded from the content delivery node, an audio delivery rule based on audio language tracks downloaded from the content delivery node, and a subtitle delivery rule based on subtitle language selections downloaded from the content delivery node. 14. The content delivery node as recited in claim 10, wherein the instructions to pull the representations of the absent segment files satisfying the one or more delivery rules from another content delivery node comprise instructions to pull the representations of the absent segment files from a regional server node. 15. The content delivery node as recited in claim 10, wherein the instructions to pull the representations of the absent segment files satisfying the one or more delivery rules from another content delivery node comprise instructions to pull the representations of the absent segment files from an edge server node. 16. The content delivery node as recited in claim 10, wherein the manifest comprises a master manifest that includes one or more child manifests, each referencing one or more representations of the particular content's video, audio and subtitle components. 17. The content delivery node as recited in claim 10, wherein the content defragmentation module further comprises instructions configured to: determine, prior to analyzing the manifest, that a defragmentation timer value provided by a timer is within a period of minimum network usage timeframe; and determine, prior to analyzing the manifest, that the particular content's ABR package is within a popularity window. 18. The content delivery node as recited in claim 10, wherein the one or more delivery rules are retrieved from a management node. 19. The content delivery node as recited in claim 1, wherein one or more delivery rules are determined based on the ABR asset delivery patterns locally stored at the content delivery node. 20. A non-transitory computer-readable medium containing instructions stored thereon which, when executed by a computer system configured to operate as a content delivery node in association with a content delivery network, perform the acts: analyzing a manifest available to the content delivery node with respect to a particular content and segment files stored in a database cache of the content delivery node to determine if any segment files referenced by the manifest are absent from the database cache; if so, applying one or more delivery rules associated with the content delivery node to determine representations of the absent segment files that satisfy the one or more delivery rules, wherein the delivery rules are established based on historical delivery patterns of one or more adaptive bitrate (ABR) assets downloaded at the content delivery node; and pulling, from another content delivery node of the CDN, only the representations of the absent segment files satisfying the one or more delivery rules and storing the pulled representations in the database of the content delivery node. 21. The non-transitory computer-readable medium as recited in claim 20 further comprising: instructions configured to determine, prior to analyzing the manifest, that a defragmentation timer value provided by a timer is within a period of minimum network usage timeframe. 22. The non-transitory computer-readable medium as recited in claim 20 further comprising: instructions configured to determine, prior to analyzing the manifest, that the particular content's ABR package is within a popularity window.
2,400
7,359
7,359
13,896,158
2,416
Implementations described and claimed herein provide systems and methods for differentiating a portion of network traffic having an Internet Protocol-based attribute with reasonable certainty. In one implementation, data corresponding to a delivery of network traffic across a communications network is received. A first filter is applied to obtain a first subset of the data based on one or more characteristics of originating access traffic. The first subset includes network traffic known to originate with the Internet Protocol-based attribute. A second filter is applied to data excluded from the first subset based on one or more characteristics of terminating access traffic to obtain a second subset of the data. The second subset includes network traffic known to terminate with the Internet Protocol-based attribute. The first subset is correlated with the second subset to identify the portion of network traffic having the Internet Protocol-based attribute.
1. A method comprising: identifying one or more origination attributes of a communication based on one or more characteristics of a network from which the communication originated; identifying one or more termination attributes of the communication based on one or more characteristics of a destination end of the communication, the termination attributes being identified where the one or more origination attributes include at least one Internet Protocol-based attribute; and characterizing the communication, using a processor, based on a correlation of the origination attributes and the termination attributes, the correlation determining whether the origination attributes and the termination attributes include the at least one Internet Protocol-based attribute. 2. The method of claim 1, wherein the at least one Internet Protocol-based attribute is Internet Protocol-enhanced functionality. 3. The method of claim 1, wherein the communication is a call. 4. The method of claim 1, wherein the one or more characteristics of the origination network include a known origination of communications having a specific origination attribute. 5. The method of claim 1, wherein the one or more characteristics of the destination end include a known termination of communications having a specific termination attribute. 6. The method of claim 1, further comprising: delivering the communication to the destination end based on the at least one Internet Protocol-based attribute. 7. The method of claim 6, wherein the communication is delivered where the at least one Internet Protocol-based attribute is present in both the origination attributes and the termination attributes. 8. A method comprising: receiving data corresponding to a delivery of network traffic across a communications network, a portion of the network traffic having an Internet Protocol-based attribute; applying a first filter to obtain a first subset of the data based on one or more characteristics of originating access traffic, the first subset including network traffic known to originate with the Internet Protocol-based attribute; applying a second filter to data excluded from the first subset, the second filter being applied based on one or more characteristics of terminating access traffic to obtain a second subset of the data, the second subset including network traffic known to terminate with the Internet Protocol-based attribute; and correlating the first subset with the second subset, using a processor, to identify the portion of network traffic having the Internet Protocol-based attribute. 9. The method of claim 8, wherein the Internet Protocol-based attribute is Internet Protocol-enhanced functionality. 10. The method of claim 8, wherein the Internet Protocol-based attribute is origination or termination in Internet Protocol format. 11. The method of claim 8, wherein the communications network is a Voice over Internet Protocol network. 12. The method of claim 8, wherein the portion of network traffic having the Internet Protocol-based attribute represents a percentage of traffic exchanged over Public Switched Telephone Network facilities that originates or terminates in Internet Protocol format. 13. The method of claim 8, wherein the first filter correlates the one or more characteristics of originating access traffic with internal data to identify the first subset. 14. The method of claim 8, wherein the second filter correlates the one or more characteristics of terminating access traffic with internal data and industry data to identify the second subset. 15. A system comprising: an attribute analyzer configured to differentiate a portion of network traffic exchanged over a communications network having an Internet Protocol-based attribute based on a correlation of a first subset of the network traffic with a second subset of the network traffic, the first subset including network traffic known to originate with the Internet Protocol-based attribute, the second subset including network traffic excluded from the first subset that is known to terminate with the Internet Protocol-based attribute. 16. The system of claim 15, wherein the Internet Protocol-based attribute is Internet Protocol-enhanced functionality. 17. The system of claim 15, wherein the Internet Protocol-based attribute is origination or termination in Internet Protocol format. 18. The system of claim 15, wherein the communications network is a Voice over Internet Protocol network. 19. The system of claim 15, wherein the second subset is identified based on one or more characteristics of terminating access traffic from the communications network. 20. The system of claim 15, wherein the first subset is identified based on one or more characteristics of originating access traffic to the communications network.
Implementations described and claimed herein provide systems and methods for differentiating a portion of network traffic having an Internet Protocol-based attribute with reasonable certainty. In one implementation, data corresponding to a delivery of network traffic across a communications network is received. A first filter is applied to obtain a first subset of the data based on one or more characteristics of originating access traffic. The first subset includes network traffic known to originate with the Internet Protocol-based attribute. A second filter is applied to data excluded from the first subset based on one or more characteristics of terminating access traffic to obtain a second subset of the data. The second subset includes network traffic known to terminate with the Internet Protocol-based attribute. The first subset is correlated with the second subset to identify the portion of network traffic having the Internet Protocol-based attribute.1. A method comprising: identifying one or more origination attributes of a communication based on one or more characteristics of a network from which the communication originated; identifying one or more termination attributes of the communication based on one or more characteristics of a destination end of the communication, the termination attributes being identified where the one or more origination attributes include at least one Internet Protocol-based attribute; and characterizing the communication, using a processor, based on a correlation of the origination attributes and the termination attributes, the correlation determining whether the origination attributes and the termination attributes include the at least one Internet Protocol-based attribute. 2. The method of claim 1, wherein the at least one Internet Protocol-based attribute is Internet Protocol-enhanced functionality. 3. The method of claim 1, wherein the communication is a call. 4. The method of claim 1, wherein the one or more characteristics of the origination network include a known origination of communications having a specific origination attribute. 5. The method of claim 1, wherein the one or more characteristics of the destination end include a known termination of communications having a specific termination attribute. 6. The method of claim 1, further comprising: delivering the communication to the destination end based on the at least one Internet Protocol-based attribute. 7. The method of claim 6, wherein the communication is delivered where the at least one Internet Protocol-based attribute is present in both the origination attributes and the termination attributes. 8. A method comprising: receiving data corresponding to a delivery of network traffic across a communications network, a portion of the network traffic having an Internet Protocol-based attribute; applying a first filter to obtain a first subset of the data based on one or more characteristics of originating access traffic, the first subset including network traffic known to originate with the Internet Protocol-based attribute; applying a second filter to data excluded from the first subset, the second filter being applied based on one or more characteristics of terminating access traffic to obtain a second subset of the data, the second subset including network traffic known to terminate with the Internet Protocol-based attribute; and correlating the first subset with the second subset, using a processor, to identify the portion of network traffic having the Internet Protocol-based attribute. 9. The method of claim 8, wherein the Internet Protocol-based attribute is Internet Protocol-enhanced functionality. 10. The method of claim 8, wherein the Internet Protocol-based attribute is origination or termination in Internet Protocol format. 11. The method of claim 8, wherein the communications network is a Voice over Internet Protocol network. 12. The method of claim 8, wherein the portion of network traffic having the Internet Protocol-based attribute represents a percentage of traffic exchanged over Public Switched Telephone Network facilities that originates or terminates in Internet Protocol format. 13. The method of claim 8, wherein the first filter correlates the one or more characteristics of originating access traffic with internal data to identify the first subset. 14. The method of claim 8, wherein the second filter correlates the one or more characteristics of terminating access traffic with internal data and industry data to identify the second subset. 15. A system comprising: an attribute analyzer configured to differentiate a portion of network traffic exchanged over a communications network having an Internet Protocol-based attribute based on a correlation of a first subset of the network traffic with a second subset of the network traffic, the first subset including network traffic known to originate with the Internet Protocol-based attribute, the second subset including network traffic excluded from the first subset that is known to terminate with the Internet Protocol-based attribute. 16. The system of claim 15, wherein the Internet Protocol-based attribute is Internet Protocol-enhanced functionality. 17. The system of claim 15, wherein the Internet Protocol-based attribute is origination or termination in Internet Protocol format. 18. The system of claim 15, wherein the communications network is a Voice over Internet Protocol network. 19. The system of claim 15, wherein the second subset is identified based on one or more characteristics of terminating access traffic from the communications network. 20. The system of claim 15, wherein the first subset is identified based on one or more characteristics of originating access traffic to the communications network.
2,400
7,360
7,360
15,490,076
2,447
A cloud gateway for coupling an industrial system to a cloud platform is provided. The cloud gateway collects data from one or more industrial controllers, meters, sensors, or other devices comprising an industrial automation system. The cloud gateway optionally performs additional transformations on the data to add context, summarize, filter, reformat, and/or encrypt the data. The cloud gateway then sends data to a cloud platform for use by one or more cloud-based applications or services. The cloud gateway can facilitate cloud-based data collection from both fixed-location and mobile industrial systems. The cloud gateway can also support store-and-forward logic, allowing industrial data to be temporarily stored in local storage in the event that communication between the cloud gateway and the cloud platform is disrupted.
1. A cloud gateway device, comprising: a memory that stores executable components; and a processor, operatively coupled to the memory, that executes the executable components, the executable components comprising: a network infrastructure component configured to control routing of data packets between different networks; a device interface component configured to retrieve data from one or more data tags of an industrial device associated with an industrial automation system, wherein the one or more data tags are defined in a configuration file associated with the cloud gateway device; a transformation component configured to add contextual metadata to the data and to at least one of compress, aggregate, filter, or re-format the data to yield transformed data; and a cloud interface component configured to couple the cloud gateway device to a cloud platform identified by the configuration file and to send the transformed data to the cloud platform. 2. The cloud gateway device of claim 1, wherein the contextual metadata comprises at least one of date information, time information, shift information, an identity of a production area, an identity of a product, machine state information, an employee identifier, a lot number, an identity of an active alarm, or a hierarchical organizational tag. 3. The cloud gateway device of claim 1, wherein the configuration file identifies a uniform resource locator corresponding to at least one of the cloud platform or an application that executes on the cloud platform. 4. The cloud gateway device of claim 1, wherein the configuration file further identifies one or more communication parameters for the cloud gateway device. 5. The cloud gateway device of claim 1, wherein the executable components further comprise an encryption component configured to encrypt the data prior to sending the transformed data to the cloud platform. 6. The cloud gateway device of claim 1, wherein the cloud interface component is configured to send the transformed data to the cloud platform via a wireless radio. 7. The cloud gateway device of claim 1, wherein the cloud gateway device comprises at least one of a firewall device, a network router, a network hub, or a network switch. 8. The cloud gateway device of claim 1, wherein the cloud gateway device comprises at least one of an industrial controller, a telemetry device, or a sensor. 9. The cloud gateway device of claim 1, wherein the executable components further comprise: a communication diagnostic component configured to determine a status of a communication link between the cloud interface component and the cloud platform; and a storage control component configured to store the data in a local storage of the cloud gateway device in response to a determination by the communication diagnostic component that the communication link is not operational. 10. The cloud gateway device of claim 1, wherein the industrial device comprises at least one of an industrial controller, an I/O device, a telemetry devices, a motion control device, a motor drive, a human-machine interface device, an industrial robot, a barcode marker, a barcode reader, or a vision system device. 11. The cloud gateway device of claim 1, wherein the cloud interface component is configured to send the transformed data to the cloud platform at an upload frequency controlled by a cloud-based application from the cloud platform. 12. A method for sending industrial data to a cloud platform, comprising: routing, by a device comprising a processor, data packets between two or more networks; reading, by the device, data from one or more data tags of an industrial device associated with an industrial automation system, wherein the one or more data tags are identified in a configuration file associated with the device; appending, by the device, contextual metadata to the data to yield contextualized data; at least one of compressing, aggregating, filtering, or re-formatting the contextualized data, by the device, to yield transformed data; and sending, by the device, the transformed data to at least one of a cloud-based service or a cloud-based application residing on a cloud platform, wherein the at least one of the cloud-based service or the cloud-based application is identified in the configuration file. 13. The method of claim 12, wherein the appending the contextual metadata comprises appending at least one of date information, time information, shift information, an identity of a production area, an identity of a product, machine state information, an employee identifier, a lot number, an identity of an active alarm, or a hierarchical organizational tag. 14. The method of claim 12, further comprising encrypting, by the device, the data prior to the sending. 15. The method of claim 12, further comprising: determining, by the device, a status of a communication link between the device and the cloud platform; and in response to determining that the communication link is not operational, storing, by the device, the data in a local storage of the device. 16. The method of claim 12, wherein the reading comprises reading the data from at least one of industrial controller, an I/O device, a telemetry devices, a motion control device, a motor drive, a human-machine interface device, an industrial robot, a barcode marker, a barcode reader, or a vision system device. 17. The method of claim 12, wherein the sending comprises sending the transformed data via a wireless radio. 18. A computer-readable medium having stored thereon executable instructions that, in response to execution, cause a gateway device to perform operations, the operations comprising: routing data packets between multiple networks; collecting data from one or more data tags of an industrial device of an industrial automation system, wherein the one or more data tags are specified in a configuration file associated with the gateway device; adding contextual metadata to the data to yield contextualized data; at least one of compressing, aggregating, filtering, or re-formatting the contextualized data to yield transformed data; and sending the transformed data to at least one of a cloud-based service or a cloud-based application residing on a cloud platform, wherein the at least one of the cloud-based service or the cloud-based application is specified in the configuration file. 19. The computer-readable medium of claim 18, wherein the adding the contextual metadata comprises adding at least one of date information, time information, shift information, an identity of a production area, an identity of a product, machine state information, an employee identifier, a lot number, an identity of an active alarm, or a hierarchical organizational tag. 20. The computer-readable medium of claim 18, wherein the collecting comprises retrieving the data from at least one of industrial controller, an I/O device, a telemetry devices, a motion control device, a motor drive, a human-machine interface device, an industrial robot, a barcode marker, a barcode reader, or a vision system device.
A cloud gateway for coupling an industrial system to a cloud platform is provided. The cloud gateway collects data from one or more industrial controllers, meters, sensors, or other devices comprising an industrial automation system. The cloud gateway optionally performs additional transformations on the data to add context, summarize, filter, reformat, and/or encrypt the data. The cloud gateway then sends data to a cloud platform for use by one or more cloud-based applications or services. The cloud gateway can facilitate cloud-based data collection from both fixed-location and mobile industrial systems. The cloud gateway can also support store-and-forward logic, allowing industrial data to be temporarily stored in local storage in the event that communication between the cloud gateway and the cloud platform is disrupted.1. A cloud gateway device, comprising: a memory that stores executable components; and a processor, operatively coupled to the memory, that executes the executable components, the executable components comprising: a network infrastructure component configured to control routing of data packets between different networks; a device interface component configured to retrieve data from one or more data tags of an industrial device associated with an industrial automation system, wherein the one or more data tags are defined in a configuration file associated with the cloud gateway device; a transformation component configured to add contextual metadata to the data and to at least one of compress, aggregate, filter, or re-format the data to yield transformed data; and a cloud interface component configured to couple the cloud gateway device to a cloud platform identified by the configuration file and to send the transformed data to the cloud platform. 2. The cloud gateway device of claim 1, wherein the contextual metadata comprises at least one of date information, time information, shift information, an identity of a production area, an identity of a product, machine state information, an employee identifier, a lot number, an identity of an active alarm, or a hierarchical organizational tag. 3. The cloud gateway device of claim 1, wherein the configuration file identifies a uniform resource locator corresponding to at least one of the cloud platform or an application that executes on the cloud platform. 4. The cloud gateway device of claim 1, wherein the configuration file further identifies one or more communication parameters for the cloud gateway device. 5. The cloud gateway device of claim 1, wherein the executable components further comprise an encryption component configured to encrypt the data prior to sending the transformed data to the cloud platform. 6. The cloud gateway device of claim 1, wherein the cloud interface component is configured to send the transformed data to the cloud platform via a wireless radio. 7. The cloud gateway device of claim 1, wherein the cloud gateway device comprises at least one of a firewall device, a network router, a network hub, or a network switch. 8. The cloud gateway device of claim 1, wherein the cloud gateway device comprises at least one of an industrial controller, a telemetry device, or a sensor. 9. The cloud gateway device of claim 1, wherein the executable components further comprise: a communication diagnostic component configured to determine a status of a communication link between the cloud interface component and the cloud platform; and a storage control component configured to store the data in a local storage of the cloud gateway device in response to a determination by the communication diagnostic component that the communication link is not operational. 10. The cloud gateway device of claim 1, wherein the industrial device comprises at least one of an industrial controller, an I/O device, a telemetry devices, a motion control device, a motor drive, a human-machine interface device, an industrial robot, a barcode marker, a barcode reader, or a vision system device. 11. The cloud gateway device of claim 1, wherein the cloud interface component is configured to send the transformed data to the cloud platform at an upload frequency controlled by a cloud-based application from the cloud platform. 12. A method for sending industrial data to a cloud platform, comprising: routing, by a device comprising a processor, data packets between two or more networks; reading, by the device, data from one or more data tags of an industrial device associated with an industrial automation system, wherein the one or more data tags are identified in a configuration file associated with the device; appending, by the device, contextual metadata to the data to yield contextualized data; at least one of compressing, aggregating, filtering, or re-formatting the contextualized data, by the device, to yield transformed data; and sending, by the device, the transformed data to at least one of a cloud-based service or a cloud-based application residing on a cloud platform, wherein the at least one of the cloud-based service or the cloud-based application is identified in the configuration file. 13. The method of claim 12, wherein the appending the contextual metadata comprises appending at least one of date information, time information, shift information, an identity of a production area, an identity of a product, machine state information, an employee identifier, a lot number, an identity of an active alarm, or a hierarchical organizational tag. 14. The method of claim 12, further comprising encrypting, by the device, the data prior to the sending. 15. The method of claim 12, further comprising: determining, by the device, a status of a communication link between the device and the cloud platform; and in response to determining that the communication link is not operational, storing, by the device, the data in a local storage of the device. 16. The method of claim 12, wherein the reading comprises reading the data from at least one of industrial controller, an I/O device, a telemetry devices, a motion control device, a motor drive, a human-machine interface device, an industrial robot, a barcode marker, a barcode reader, or a vision system device. 17. The method of claim 12, wherein the sending comprises sending the transformed data via a wireless radio. 18. A computer-readable medium having stored thereon executable instructions that, in response to execution, cause a gateway device to perform operations, the operations comprising: routing data packets between multiple networks; collecting data from one or more data tags of an industrial device of an industrial automation system, wherein the one or more data tags are specified in a configuration file associated with the gateway device; adding contextual metadata to the data to yield contextualized data; at least one of compressing, aggregating, filtering, or re-formatting the contextualized data to yield transformed data; and sending the transformed data to at least one of a cloud-based service or a cloud-based application residing on a cloud platform, wherein the at least one of the cloud-based service or the cloud-based application is specified in the configuration file. 19. The computer-readable medium of claim 18, wherein the adding the contextual metadata comprises adding at least one of date information, time information, shift information, an identity of a production area, an identity of a product, machine state information, an employee identifier, a lot number, an identity of an active alarm, or a hierarchical organizational tag. 20. The computer-readable medium of claim 18, wherein the collecting comprises retrieving the data from at least one of industrial controller, an I/O device, a telemetry devices, a motion control device, a motor drive, a human-machine interface device, an industrial robot, a barcode marker, a barcode reader, or a vision system device.
2,400
7,361
7,361
13,420,306
2,476
A mobile terminal 3 judges whether or not the mobile terminal is able to make a transition to a DTX period during Active, and, when judging that the mobile terminal is able to make a transition to a DTX period during Active, notifies a base station 2 to that effect. If the base station 2 judges that the mobile terminal is able to make a transition to a DRX period during Active when triggered by the notification from the mobile terminal 3 , the base station temporarily stops supply of electric power to the data transmission processing units and the data reception processing units of the mobile terminal 3.
1. A mobile communication system in which when a mobile terminal and a base station carryout radio communication with each other, the mobile terminal measures quality of a downlink communication path and transmits a result of the measurement of the quality to the base station, and the base station carries out downlink scheduling according to the result of the measurement of the quality, characterized in that in a case in which a timing at which to transmit the result of the measurement of the quality to the base station coincides with a timing at which to transmit a positive response signal or a negative response signal to the base station, the mobile terminal transmits either the positive response signal or the negative response signal without transmitting the result of the measurement of the quality. 2. A mobile terminal including a quality measurement means for measuring quality of a downlink communication path, and a transmitting means for transmitting a result of the measurement made by the quality measurement means to a base station, characterized in that in a case in which a timing at which to transmit the result of the measurement made by the quality measurement means to the base station coincides with a timing at which to transmit a positive response signal or a negative response signal to the base station, the transmitting means transmits either the positive response signal or the negative response signal without transmitting the result of the measurement made by the quality measurement means.
A mobile terminal 3 judges whether or not the mobile terminal is able to make a transition to a DTX period during Active, and, when judging that the mobile terminal is able to make a transition to a DTX period during Active, notifies a base station 2 to that effect. If the base station 2 judges that the mobile terminal is able to make a transition to a DRX period during Active when triggered by the notification from the mobile terminal 3 , the base station temporarily stops supply of electric power to the data transmission processing units and the data reception processing units of the mobile terminal 3.1. A mobile communication system in which when a mobile terminal and a base station carryout radio communication with each other, the mobile terminal measures quality of a downlink communication path and transmits a result of the measurement of the quality to the base station, and the base station carries out downlink scheduling according to the result of the measurement of the quality, characterized in that in a case in which a timing at which to transmit the result of the measurement of the quality to the base station coincides with a timing at which to transmit a positive response signal or a negative response signal to the base station, the mobile terminal transmits either the positive response signal or the negative response signal without transmitting the result of the measurement of the quality. 2. A mobile terminal including a quality measurement means for measuring quality of a downlink communication path, and a transmitting means for transmitting a result of the measurement made by the quality measurement means to a base station, characterized in that in a case in which a timing at which to transmit the result of the measurement made by the quality measurement means to the base station coincides with a timing at which to transmit a positive response signal or a negative response signal to the base station, the transmitting means transmits either the positive response signal or the negative response signal without transmitting the result of the measurement made by the quality measurement means.
2,400
7,362
7,362
13,709,732
2,472
A call routing system for use with a wireless telephone systems is disclosed. The system, which monitors the subscriber's current physical location, determines the device to which a call should be terminated, and routes the call. The device can be any IP telephone, including a cable television system adapted to IP telephony. The system routes calls without direct subscriber actions, without a second telephone number, regardless of the time of day and day of week. Various options can also apply to a call, determined by subscriber-established preferences, when specified criteria are met, or calls can be limited to/from specified telephone numbers. The system and method uses signaling techniques that will allow routing of the call, along with any authorization or restrictions, to be done remotely from the actual switching of the call. Call events are transmitted to the call routing system while the communications path of the call is held at the switching system awaiting call routing information. The identity of the subscriber is established using existing means that are used to authenticate the user. The wireless phone user does not have to enter any additional codes or identification to obtain access to the call routing system.
1. A method for controlling telephone calls in a wireless communications network having a switch in communication with a plurality of wireless devices, wherein one or more of said wireless devices are associated with a subscriber account, wherein said switch determines where said wireless devices receive calls and said switch connects said devices to calling parties, said method comprising the steps of: determining if said wireless devices is located within a private IP network; notifying a service control point device to route telephone calls to said private IP network; monitoring said wireless communications network to determine the destination of the telephone call, wherein voice communications for said call are routed through an IP Gateway device; connecting said call to an IP-capable device within said private IP network; re-routing said call when said wireless device exits said private IP network.
A call routing system for use with a wireless telephone systems is disclosed. The system, which monitors the subscriber's current physical location, determines the device to which a call should be terminated, and routes the call. The device can be any IP telephone, including a cable television system adapted to IP telephony. The system routes calls without direct subscriber actions, without a second telephone number, regardless of the time of day and day of week. Various options can also apply to a call, determined by subscriber-established preferences, when specified criteria are met, or calls can be limited to/from specified telephone numbers. The system and method uses signaling techniques that will allow routing of the call, along with any authorization or restrictions, to be done remotely from the actual switching of the call. Call events are transmitted to the call routing system while the communications path of the call is held at the switching system awaiting call routing information. The identity of the subscriber is established using existing means that are used to authenticate the user. The wireless phone user does not have to enter any additional codes or identification to obtain access to the call routing system.1. A method for controlling telephone calls in a wireless communications network having a switch in communication with a plurality of wireless devices, wherein one or more of said wireless devices are associated with a subscriber account, wherein said switch determines where said wireless devices receive calls and said switch connects said devices to calling parties, said method comprising the steps of: determining if said wireless devices is located within a private IP network; notifying a service control point device to route telephone calls to said private IP network; monitoring said wireless communications network to determine the destination of the telephone call, wherein voice communications for said call are routed through an IP Gateway device; connecting said call to an IP-capable device within said private IP network; re-routing said call when said wireless device exits said private IP network.
2,400
7,363
7,363
14,838,889
2,431
A botnet detector collects data associated with flows between a pair of network elements. The botnet detector processes the flow data to determine whether some of the flows are associated with botnet beaconing and/or tunneling. For example, the botnet detector may determine whether some of the flows occur at a regular interval or whether some of the flows are associated with extended length sessions, respectively. To determine whether some of the flows occur at a regular interval, the botnet detector may convert the flow data to the frequency domain and may determine an interval associated with a highest vector magnitude. If the botnet detector determines that the pair of network elements are exchanging beaconing or tunneling signals, the botnet detector may forward a notification that the pair of network elements are associated with the botnet.
1. A method comprising: collecting, by a processor, flow data associated with flows between a pair of network elements; processing, by the processor, the flow data to identify that a subset of the flows, between the pair of network elements, occur at a regular interval; determining, by the processor, that the pair of network elements are associated with a botnet based on identifying that the subset of the flows occur at the regular interval; and forwarding, by the processor, a notification, wherein the notification indicates that the pair of network elements are associated with the botnet. 2. The method of claim 1, wherein processing the flow data includes: determining, based on the flow data, sessions between the pair of network elements, wherein the sessions relate to transmitting packets of the flows; identifying one or more of the sessions that last longer than a threshold duration; identifying one or more of the flows associated with the one or more sessions; and determining the regular interval based on an interval associated with the one or more flows. 3. The method of claim 1, wherein processing the flow data includes: determining a plurality of intervals associated with the flows between the pair of network elements; identifying a most commonly occurring one of the plurality of intervals associated with the flows between the pair of network elements; and identifying the regular interval based on the most commonly occurring interval. 4. The method of claim 3, wherein identifying the regular interval based on the most commonly occurring interval includes: identifying a range of intervals that includes the most commonly occurring interval; identifying a subset of the flows associated with the range of intervals; and determining that the most commonly occurring interval corresponds to the regular interval when the subset of the flows includes at least a threshold number of flows. 5. The method of claim 1, wherein processing the flow data includes converting the flow data to the frequency domain data; determining an interval associated with a highest magnitude among intervals associated with the flows between the pair of network elements; and determining the regular interval based on the interval. 6. The method of claim 5, wherein converting the flow data to the frequency domain includes applying a fast Fourier transform to the flow data. 7. The method of claim 5, wherein processing the flow data further includes: identifying a range of intervals that include the determined interval; determining an average magnitude associated with the range of intervals; calculating a sharpness value based on a comparison of the magnitude associated with the interval and average magnitude associated with the range of intervals; and determining that the interval corresponds to the regular interval when the sharpness value satisfies a threshold value. 8. A device comprising: a memory configured to store instructions; and a processor configured to execute one or more of the instructions to: collect flow data associated with flows between a pair of network elements; process the flow data to identify that a subset of the flows, between the pair of network elements, occur at a regular interval; determine that the pair of network elements are associated with a botnet based on identifying that the subset of the flows occur at the regular interval; and forward a notification, wherein the notification indicates that the pair of network elements are associated with the botnet. 9. The device of claim 8, wherein the processor, when processing the flow data, is further configured to execute one or more of the instructions to: determine, based on the flow data, a number of sessions between the pair of network elements, wherein the number of sessions relate to transmitting packets of the flows; identify one or more of the sessions that last longer than a threshold duration; identify one or more of the flows associated with the one or more sessions; and determine the regular interval based on an interval associated with the one or more flows. 10. The device of claim 8, wherein the processor, when processing the flow data, is further configured to execute one or more of the instructions to: determine a plurality of intervals associated with the flows between the pair of network elements; identify a most commonly occurring one of the plurality of intervals associated with the flows between the pair of network elements; and identify the regular interval based on the most commonly occurring interval. 11. The device of claim 10, wherein the processor, when identifying the regular interval based on the most commonly occurring interval, is further configured to execute one or more of the instructions to: identify a range of intervals that include the most commonly occurring interval; identify a subset of the flows associated with range of intervals; and determine that most commonly occurring interval corresponds to the regular interval when the subset of the flows includes at least a threshold number of flows. 12. The device of claim 8, wherein the processor, when processing the flow data, is further configured to execute one or more of the instructions to: convert the flow data to the frequency domain data; determine an interval associated with a highest magnitude among intervals associated with the flows between the pair of network elements; and determine the regular interval based on the determined interval. 13. The device of claim 12, wherein the processor, when determining the interval, is further configured to execute one or more of the instructions to: identify first intervals included in the intervals, wherein the first intervals include a smallest interval associated with the flows between the pair of network elements; identify second intervals included in the intervals, wherein the second intervals include a largest interval associated with the flows between the pair of network elements; filter the intervals to form third intervals, wherein filtering the intervals includes removing the first intervals and the second intervals from the intervals; and determine the interval from the third intervals. 14. The device of claim 12, wherein the processor, when processing the data, is further configured to execute one or more of the instructions to: identify a range of intervals that include the determined interval; determine an average magnitude associated with the range of intervals; calculate a sharpness value based on a comparison of the magnitude associated with the interval and average magnitude associated with the range of intervals; and determine that the interval corresponds to the regular interval when the sharpness value exceeds a threshold value. 15. A non-transitory computer-readable medium to store instructions, wherein the instructions comprise: one or more instructions that, when executed by a processor associated with a device, cause the processor to: collect flow data associated with flows between a pair of network elements; process the flow data to identify that a subset of the flows, between the pair of network elements, occur at a regular interval; determine that the pair of network elements are associated with a botnet based on identifying that the subset of the flows occur at the regular interval; and forward a notification, wherein the notification indicates that the pair of network elements are associated with the botnet. 16. The non-transitory computer-readable medium of claim 15, wherein the one or more instructions further cause the processor, when processing the flow data, to: determine, based on the flow data, a number of sessions between the pair of network elements, wherein the sessions relate to transmitting the flows; identify one or more of the sessions that last longer than a threshold duration; identify one or more of the flows associated with the one or more sessions; and determine the regular interval based on an interval associated with the one or more flows. 17. The non-transitory computer-readable medium of claim 15, wherein the one or more instructions further cause the processor, when processing the flow data, to: determine a plurality of intervals associated with the flows between the pair of network elements; identify a most commonly occurring one of the plurality of intervals associated with the flows between the pair of network elements; and identify the regular interval based on the most commonly occurring interval. 18. The non-transitory computer-readable medium of claim 17, wherein the one or more instructions further cause the processor, when processing the flow data, to: identify a range of intervals that include the most commonly occurring interval; identify a subset of the flows associated with range of intervals; and determine that most commonly occurring interval corresponds to the regular interval when the subset of the flows includes at least a threshold number of flows. 19. The non-transitory computer-readable medium of claim 15, wherein the one or more instructions further cause the processor, when processing the flow data, to: convert the flow data to the frequency domain data; determine an interval associated with a highest magnitude among intervals associated with the flows between the pair of network elements; and determine the regular interval based on the determined interval. 20. The non-transitory computer-readable medium of claim 19, wherein the one or more instructions further cause the processor, when processing the data, to: identify a range of intervals that include the determined interval; determine an average magnitude associated with the range of intervals; calculate a sharpness value based on a comparison of the magnitude associated with the interval and average magnitude associated with the range of intervals; and determine that the interval corresponds to the regular interval when the sharpness value satisfies a threshold value.
A botnet detector collects data associated with flows between a pair of network elements. The botnet detector processes the flow data to determine whether some of the flows are associated with botnet beaconing and/or tunneling. For example, the botnet detector may determine whether some of the flows occur at a regular interval or whether some of the flows are associated with extended length sessions, respectively. To determine whether some of the flows occur at a regular interval, the botnet detector may convert the flow data to the frequency domain and may determine an interval associated with a highest vector magnitude. If the botnet detector determines that the pair of network elements are exchanging beaconing or tunneling signals, the botnet detector may forward a notification that the pair of network elements are associated with the botnet.1. A method comprising: collecting, by a processor, flow data associated with flows between a pair of network elements; processing, by the processor, the flow data to identify that a subset of the flows, between the pair of network elements, occur at a regular interval; determining, by the processor, that the pair of network elements are associated with a botnet based on identifying that the subset of the flows occur at the regular interval; and forwarding, by the processor, a notification, wherein the notification indicates that the pair of network elements are associated with the botnet. 2. The method of claim 1, wherein processing the flow data includes: determining, based on the flow data, sessions between the pair of network elements, wherein the sessions relate to transmitting packets of the flows; identifying one or more of the sessions that last longer than a threshold duration; identifying one or more of the flows associated with the one or more sessions; and determining the regular interval based on an interval associated with the one or more flows. 3. The method of claim 1, wherein processing the flow data includes: determining a plurality of intervals associated with the flows between the pair of network elements; identifying a most commonly occurring one of the plurality of intervals associated with the flows between the pair of network elements; and identifying the regular interval based on the most commonly occurring interval. 4. The method of claim 3, wherein identifying the regular interval based on the most commonly occurring interval includes: identifying a range of intervals that includes the most commonly occurring interval; identifying a subset of the flows associated with the range of intervals; and determining that the most commonly occurring interval corresponds to the regular interval when the subset of the flows includes at least a threshold number of flows. 5. The method of claim 1, wherein processing the flow data includes converting the flow data to the frequency domain data; determining an interval associated with a highest magnitude among intervals associated with the flows between the pair of network elements; and determining the regular interval based on the interval. 6. The method of claim 5, wherein converting the flow data to the frequency domain includes applying a fast Fourier transform to the flow data. 7. The method of claim 5, wherein processing the flow data further includes: identifying a range of intervals that include the determined interval; determining an average magnitude associated with the range of intervals; calculating a sharpness value based on a comparison of the magnitude associated with the interval and average magnitude associated with the range of intervals; and determining that the interval corresponds to the regular interval when the sharpness value satisfies a threshold value. 8. A device comprising: a memory configured to store instructions; and a processor configured to execute one or more of the instructions to: collect flow data associated with flows between a pair of network elements; process the flow data to identify that a subset of the flows, between the pair of network elements, occur at a regular interval; determine that the pair of network elements are associated with a botnet based on identifying that the subset of the flows occur at the regular interval; and forward a notification, wherein the notification indicates that the pair of network elements are associated with the botnet. 9. The device of claim 8, wherein the processor, when processing the flow data, is further configured to execute one or more of the instructions to: determine, based on the flow data, a number of sessions between the pair of network elements, wherein the number of sessions relate to transmitting packets of the flows; identify one or more of the sessions that last longer than a threshold duration; identify one or more of the flows associated with the one or more sessions; and determine the regular interval based on an interval associated with the one or more flows. 10. The device of claim 8, wherein the processor, when processing the flow data, is further configured to execute one or more of the instructions to: determine a plurality of intervals associated with the flows between the pair of network elements; identify a most commonly occurring one of the plurality of intervals associated with the flows between the pair of network elements; and identify the regular interval based on the most commonly occurring interval. 11. The device of claim 10, wherein the processor, when identifying the regular interval based on the most commonly occurring interval, is further configured to execute one or more of the instructions to: identify a range of intervals that include the most commonly occurring interval; identify a subset of the flows associated with range of intervals; and determine that most commonly occurring interval corresponds to the regular interval when the subset of the flows includes at least a threshold number of flows. 12. The device of claim 8, wherein the processor, when processing the flow data, is further configured to execute one or more of the instructions to: convert the flow data to the frequency domain data; determine an interval associated with a highest magnitude among intervals associated with the flows between the pair of network elements; and determine the regular interval based on the determined interval. 13. The device of claim 12, wherein the processor, when determining the interval, is further configured to execute one or more of the instructions to: identify first intervals included in the intervals, wherein the first intervals include a smallest interval associated with the flows between the pair of network elements; identify second intervals included in the intervals, wherein the second intervals include a largest interval associated with the flows between the pair of network elements; filter the intervals to form third intervals, wherein filtering the intervals includes removing the first intervals and the second intervals from the intervals; and determine the interval from the third intervals. 14. The device of claim 12, wherein the processor, when processing the data, is further configured to execute one or more of the instructions to: identify a range of intervals that include the determined interval; determine an average magnitude associated with the range of intervals; calculate a sharpness value based on a comparison of the magnitude associated with the interval and average magnitude associated with the range of intervals; and determine that the interval corresponds to the regular interval when the sharpness value exceeds a threshold value. 15. A non-transitory computer-readable medium to store instructions, wherein the instructions comprise: one or more instructions that, when executed by a processor associated with a device, cause the processor to: collect flow data associated with flows between a pair of network elements; process the flow data to identify that a subset of the flows, between the pair of network elements, occur at a regular interval; determine that the pair of network elements are associated with a botnet based on identifying that the subset of the flows occur at the regular interval; and forward a notification, wherein the notification indicates that the pair of network elements are associated with the botnet. 16. The non-transitory computer-readable medium of claim 15, wherein the one or more instructions further cause the processor, when processing the flow data, to: determine, based on the flow data, a number of sessions between the pair of network elements, wherein the sessions relate to transmitting the flows; identify one or more of the sessions that last longer than a threshold duration; identify one or more of the flows associated with the one or more sessions; and determine the regular interval based on an interval associated with the one or more flows. 17. The non-transitory computer-readable medium of claim 15, wherein the one or more instructions further cause the processor, when processing the flow data, to: determine a plurality of intervals associated with the flows between the pair of network elements; identify a most commonly occurring one of the plurality of intervals associated with the flows between the pair of network elements; and identify the regular interval based on the most commonly occurring interval. 18. The non-transitory computer-readable medium of claim 17, wherein the one or more instructions further cause the processor, when processing the flow data, to: identify a range of intervals that include the most commonly occurring interval; identify a subset of the flows associated with range of intervals; and determine that most commonly occurring interval corresponds to the regular interval when the subset of the flows includes at least a threshold number of flows. 19. The non-transitory computer-readable medium of claim 15, wherein the one or more instructions further cause the processor, when processing the flow data, to: convert the flow data to the frequency domain data; determine an interval associated with a highest magnitude among intervals associated with the flows between the pair of network elements; and determine the regular interval based on the determined interval. 20. The non-transitory computer-readable medium of claim 19, wherein the one or more instructions further cause the processor, when processing the data, to: identify a range of intervals that include the determined interval; determine an average magnitude associated with the range of intervals; calculate a sharpness value based on a comparison of the magnitude associated with the interval and average magnitude associated with the range of intervals; and determine that the interval corresponds to the regular interval when the sharpness value satisfies a threshold value.
2,400
7,364
7,364
14,577,148
2,432
A non-transitory machine-readable storage medium encoded with instructions for a keyed cryptographic operation having a first and second portion for execution by a cryptographic system mapping an input message to an output message, including: instructions for outputting first cryptographic data from a first portion the cryptographic operation to a secure hardware device implementing a secure function on the data; instructions for receiving output data from the secure hardware device; instructions for implementing an inverse of the secure function on the output data; and instructions for performing a second portion of the cryptographic operation on the inverted output data, wherein the instructions for implementing an inverse of the secure function on the output data are securely merged with the instructions for performing the second portion of the cryptographic operation on the inverted output data so that the inverted output is not accessible to an attacker.
1. A non-transitory machine-readable storage medium encoded with instructions for a keyed cryptographic operation having a first and second portion for execution by a cryptographic system mapping an input message to an output message, comprising: instructions for outputting first cryptographic data from a first portion the cryptographic operation to a secure hardware device implementing a secure function on the data; instructions for receiving output data from the secure hardware device; instructions for implementing an inverse of the secure function on the output data; and instructions for performing a second portion of the cryptographic operation on the inverted output data, wherein the instructions for implementing an inverse of the secure function on the output data are securely merged with the instructions for performing the second portion of the cryptographic operation on the inverted output data so that the inverted output is not accessible to an attacker. 2. The non-transitory machine-readable storage medium of claim 1, further comprising instructions for outputting second cryptographic data from a first portion the cryptographic operation to the second portion of the cryptographic operation. 3. The non-transitory machine-readable storage medium of claim 1, wherein instructions for implementing an inverse of the secure function on the output data and instructions for performing a second portion of the cryptographic operation on the inverted output data include lookup tables. 4. The non-transitory machine-readable storage medium of claim 1, wherein instructions for implementing an inverse of the secure function on the output data and instructions for performing a second portion of the cryptographic operation on the inverted output data include state machines. 5. The non-transitory machine-readable storage medium of claim 1, wherein input parameters specify the inverse of the secure function. 6. The non-transitory machine-readable storage medium of claim 1, wherein the hardware device implementing a secure function is a processor and the secure function is implemented in an operating system on the processor. 7. The non-transitory machine-readable storage medium of claim 1, wherein the hardware device implementing a secure function is a processor implementing a TrustZone and the secure function is a program running in the TrustZone. 8. A non-transitory machine-readable storage medium encoded with instructions for a keyed cryptographic operation having a first and second portion for execution by a cryptographic system mapping an input message to an output message, comprising: instructions for performing a first portion the cryptographic operation to produce cryptographic data; instructions for implementing an inverse of a secure function on a first portion of the cryptographic data; instructions for outputting inverted cryptographic data to a hardware device implementing a secure function on the data; instructions for receiving output data from the hardware device; and instructions for performing a second portion of the cryptographic operation on the hardware device output data, wherein the instructions for implementing an inverse of a secure function on a portions of the cryptographic data are securely merged with the instructions for implementing an inverse of a secure function on the cryptographic data so that the inverted output is not accessible to an attacker. 9. The non-transitory machine-readable storage medium of claim 8, further comprising instructions for outputting second cryptographic data from a first portion the cryptographic operation to the second portion of the cryptographic operation. 10. The non-transitory machine-readable storage medium of claim 8, wherein instructions for implementing an inverse of a secure function on a portions of the cryptographic data and the instructions for implementing an inverse of a secure function on the cryptographic data include lookup tables. 11. The non-transitory machine-readable storage medium of claim 8, wherein instructions for implementing an inverse of a secure function on a portions of the cryptographic data and the instructions for implementing an inverse of a secure function on the cryptographic data include state machines. 12. The non-transitory machine-readable storage medium of claim 8, wherein input parameters specify the inverse of the secure function. 13. The non-transitory machine-readable storage medium of claim 8, wherein the hardware device implementing a secure function is a processor and the secure function is implemented in an operating system on the processor. 14. The non-transitory machine-readable storage medium of claim 8, wherein the hardware device implementing a secure function is a processor implementing a TrustZone and the secure function is a program running in the TrustZone. 15. A non-transitory machine-readable storage medium encoded with instructions for a keyed cryptographic operation for execution by a cryptographic system mapping an input message having a first portion to an output message, comprising: instructions for receiving output data from a hardware device implementing a secure function on the first portion of the input message; instructions for implementing an inverse of the secure function on the output data; and instructions for performing the cryptographic operation on the inverted output data, wherein instructions for implementing an inverse of the secure function on the output data are securely merged with the instructions for performing the cryptographic operation on the inverted output data so that the inverted output is not accessible to an attacker. 16. The non-transitory machine-readable storage medium of claim 15, further comprising instructions for performing the cryptographic operation on a second portion of the input message. 17. The non-transitory machine-readable storage medium of claim 15, wherein instructions for implementing an inverse of the secure function on the output data and the instructions for performing the cryptographic operation on the inverted output data include lookup tables. 18. The non-transitory machine-readable storage medium of claim 15, wherein instructions for implementing an inverse of the secure function on the output data and the instructions for performing the cryptographic operation on the inverted output data include state machines. 19. The non-transitory machine-readable storage medium of claim 15, wherein input parameters specify the inverse of the secure function. 20. The non-transitory machine-readable storage medium of claim 15, wherein the hardware device implementing a secure function is a processor and the secure function is implemented in an operating system on the processor. 21. The non-transitory machine-readable storage medium of claim 15, wherein the hardware device implementing a secure function is a processor implementing a TrustZone and the secure function is a program running in the TrustZone. 22. A non-transitory machine-readable storage medium encoded with instructions for a keyed cryptographic operation for execution by a cryptographic system mapping an input message to an output message, comprising: instructions for performing the cryptographic operation to produce cryptographic data having a first portion; instructions for implementing an inverse of a secure function on the first portion of the cryptographic data; instructions for outputting inverted cryptographic data to a hardware device implementing the secure function, wherein the instructions for implementing an inverse of a secure function on the first portion of the cryptographic data are securely merged with the instructions for outputting inverted cryptographic data to a hardware device implementing the secure function so that the inverted output is not accessible to an attacker. 23. The non-transitory machine-readable storage medium of claim 22, further comprising instructions for outputting second cryptographic data from the cryptographic operation. 24. The non-transitory machine-readable storage medium of claim 22, wherein instructions for implementing an inverse of a secure function on the first portion of the cryptographic data and the instructions for outputting inverted cryptographic data include lookup tables. 25. The non-transitory machine-readable storage medium of claim 22, wherein instructions for implementing an inverse of a secure function on the first portion of the cryptographic data and the instructions for outputting inverted cryptographic data include state machines. 26. The non-transitory machine-readable storage medium of claim 22, wherein input parameters specify the inverse of the secure function. 27. The non-transitory machine-readable storage medium of claim 22, wherein the hardware device implementing a secure function is a processor and the secure function is implemented in an operating system on the processor. 28. The non-transitory machine-readable storage medium of claim 22, wherein the hardware device implementing a secure function is a processor implementing a TrustZone and the secure function is a program running in the TrustZone.
A non-transitory machine-readable storage medium encoded with instructions for a keyed cryptographic operation having a first and second portion for execution by a cryptographic system mapping an input message to an output message, including: instructions for outputting first cryptographic data from a first portion the cryptographic operation to a secure hardware device implementing a secure function on the data; instructions for receiving output data from the secure hardware device; instructions for implementing an inverse of the secure function on the output data; and instructions for performing a second portion of the cryptographic operation on the inverted output data, wherein the instructions for implementing an inverse of the secure function on the output data are securely merged with the instructions for performing the second portion of the cryptographic operation on the inverted output data so that the inverted output is not accessible to an attacker.1. A non-transitory machine-readable storage medium encoded with instructions for a keyed cryptographic operation having a first and second portion for execution by a cryptographic system mapping an input message to an output message, comprising: instructions for outputting first cryptographic data from a first portion the cryptographic operation to a secure hardware device implementing a secure function on the data; instructions for receiving output data from the secure hardware device; instructions for implementing an inverse of the secure function on the output data; and instructions for performing a second portion of the cryptographic operation on the inverted output data, wherein the instructions for implementing an inverse of the secure function on the output data are securely merged with the instructions for performing the second portion of the cryptographic operation on the inverted output data so that the inverted output is not accessible to an attacker. 2. The non-transitory machine-readable storage medium of claim 1, further comprising instructions for outputting second cryptographic data from a first portion the cryptographic operation to the second portion of the cryptographic operation. 3. The non-transitory machine-readable storage medium of claim 1, wherein instructions for implementing an inverse of the secure function on the output data and instructions for performing a second portion of the cryptographic operation on the inverted output data include lookup tables. 4. The non-transitory machine-readable storage medium of claim 1, wherein instructions for implementing an inverse of the secure function on the output data and instructions for performing a second portion of the cryptographic operation on the inverted output data include state machines. 5. The non-transitory machine-readable storage medium of claim 1, wherein input parameters specify the inverse of the secure function. 6. The non-transitory machine-readable storage medium of claim 1, wherein the hardware device implementing a secure function is a processor and the secure function is implemented in an operating system on the processor. 7. The non-transitory machine-readable storage medium of claim 1, wherein the hardware device implementing a secure function is a processor implementing a TrustZone and the secure function is a program running in the TrustZone. 8. A non-transitory machine-readable storage medium encoded with instructions for a keyed cryptographic operation having a first and second portion for execution by a cryptographic system mapping an input message to an output message, comprising: instructions for performing a first portion the cryptographic operation to produce cryptographic data; instructions for implementing an inverse of a secure function on a first portion of the cryptographic data; instructions for outputting inverted cryptographic data to a hardware device implementing a secure function on the data; instructions for receiving output data from the hardware device; and instructions for performing a second portion of the cryptographic operation on the hardware device output data, wherein the instructions for implementing an inverse of a secure function on a portions of the cryptographic data are securely merged with the instructions for implementing an inverse of a secure function on the cryptographic data so that the inverted output is not accessible to an attacker. 9. The non-transitory machine-readable storage medium of claim 8, further comprising instructions for outputting second cryptographic data from a first portion the cryptographic operation to the second portion of the cryptographic operation. 10. The non-transitory machine-readable storage medium of claim 8, wherein instructions for implementing an inverse of a secure function on a portions of the cryptographic data and the instructions for implementing an inverse of a secure function on the cryptographic data include lookup tables. 11. The non-transitory machine-readable storage medium of claim 8, wherein instructions for implementing an inverse of a secure function on a portions of the cryptographic data and the instructions for implementing an inverse of a secure function on the cryptographic data include state machines. 12. The non-transitory machine-readable storage medium of claim 8, wherein input parameters specify the inverse of the secure function. 13. The non-transitory machine-readable storage medium of claim 8, wherein the hardware device implementing a secure function is a processor and the secure function is implemented in an operating system on the processor. 14. The non-transitory machine-readable storage medium of claim 8, wherein the hardware device implementing a secure function is a processor implementing a TrustZone and the secure function is a program running in the TrustZone. 15. A non-transitory machine-readable storage medium encoded with instructions for a keyed cryptographic operation for execution by a cryptographic system mapping an input message having a first portion to an output message, comprising: instructions for receiving output data from a hardware device implementing a secure function on the first portion of the input message; instructions for implementing an inverse of the secure function on the output data; and instructions for performing the cryptographic operation on the inverted output data, wherein instructions for implementing an inverse of the secure function on the output data are securely merged with the instructions for performing the cryptographic operation on the inverted output data so that the inverted output is not accessible to an attacker. 16. The non-transitory machine-readable storage medium of claim 15, further comprising instructions for performing the cryptographic operation on a second portion of the input message. 17. The non-transitory machine-readable storage medium of claim 15, wherein instructions for implementing an inverse of the secure function on the output data and the instructions for performing the cryptographic operation on the inverted output data include lookup tables. 18. The non-transitory machine-readable storage medium of claim 15, wherein instructions for implementing an inverse of the secure function on the output data and the instructions for performing the cryptographic operation on the inverted output data include state machines. 19. The non-transitory machine-readable storage medium of claim 15, wherein input parameters specify the inverse of the secure function. 20. The non-transitory machine-readable storage medium of claim 15, wherein the hardware device implementing a secure function is a processor and the secure function is implemented in an operating system on the processor. 21. The non-transitory machine-readable storage medium of claim 15, wherein the hardware device implementing a secure function is a processor implementing a TrustZone and the secure function is a program running in the TrustZone. 22. A non-transitory machine-readable storage medium encoded with instructions for a keyed cryptographic operation for execution by a cryptographic system mapping an input message to an output message, comprising: instructions for performing the cryptographic operation to produce cryptographic data having a first portion; instructions for implementing an inverse of a secure function on the first portion of the cryptographic data; instructions for outputting inverted cryptographic data to a hardware device implementing the secure function, wherein the instructions for implementing an inverse of a secure function on the first portion of the cryptographic data are securely merged with the instructions for outputting inverted cryptographic data to a hardware device implementing the secure function so that the inverted output is not accessible to an attacker. 23. The non-transitory machine-readable storage medium of claim 22, further comprising instructions for outputting second cryptographic data from the cryptographic operation. 24. The non-transitory machine-readable storage medium of claim 22, wherein instructions for implementing an inverse of a secure function on the first portion of the cryptographic data and the instructions for outputting inverted cryptographic data include lookup tables. 25. The non-transitory machine-readable storage medium of claim 22, wherein instructions for implementing an inverse of a secure function on the first portion of the cryptographic data and the instructions for outputting inverted cryptographic data include state machines. 26. The non-transitory machine-readable storage medium of claim 22, wherein input parameters specify the inverse of the secure function. 27. The non-transitory machine-readable storage medium of claim 22, wherein the hardware device implementing a secure function is a processor and the secure function is implemented in an operating system on the processor. 28. The non-transitory machine-readable storage medium of claim 22, wherein the hardware device implementing a secure function is a processor implementing a TrustZone and the secure function is a program running in the TrustZone.
2,400
7,365
7,365
13,802,671
2,482
A computer-implemented method for placing a window object within a computer-generated scene. The computer-generated scene includes a pair of stereoscopic cameras adapted to capture an image of at least one computer-generated object and the window object. A left portion and right portion of the image along the left and right edges of the image are obtained. The nearest computer-generated object to the pair of stereoscopic cameras within the left and right portions of the image is identified. The window object is placed between the identified computer-generated object and the stereoscopic cameras at an offset distance from the identified computer-generated object.
1. A computer-implemented method for placing a window object within a computer-generated scene, the computer-generated scene including a pair of stereoscopic cameras adapted to capture an image of at least one computer-generated object and the window object, the method comprising: obtaining a left portion and right portion of the image along the left and right edges of the image; identifying the nearest computer-generated object to the pair of stereoscopic cameras within the left and right portions of the image; placing the window object between the identified computer-generated object and the stereoscopic cameras at an offset distance from the identified computer-generated object; and storing, in a computer memory, the location of the window object. 2. The computer-implemented method of claim 1, further comprising, creating a stereoscopic image of the computer-generated scene using the pair of stereoscopic cameras, wherein a portion of the computer-generated object is hidden behind the stereo window; and storing, in the computer memory, the stereoscopic image. 3. The computer-implemented method of claim 1, wherein the window object separated from the computer-generated object by an offset that is less than a width of the computer-generated object. 4. The computer-implemented method of claim 1, wherein the left and right portions of the image are 48 pixels wide. 5. The computer-implemented method of claim 1, wherein the left and right portions of the image are 60 percent of height of the image. 6. The computer-implemented method of claim 1, wherein the window object comprises two vertical bar-shaped surfaces, and wherein the vertical bar-shaped surfaces are depicted, respectively, near a left and right portion of a stereoscopic image produced using the pair of stereoscopic cameras. 7. A computer-implemented method for placing a window object within a computer-generated scene, the computer-generated scene including a pair of stereoscopic cameras adapted to capture an image of at least one computer-generated object and the window object, the method comprising: obtaining a timeline for a film sequence, the timeline comprising a plurality of time entries; for each of at least two time entries of the plurality of time entries: obtaining a left portion and right portion of the image along the left and right edges of the image; identifying the nearest computer-generated object to the pair of stereoscopic cameras within the left and right portions of the image; placing the window object between the identified computer-generated object and the stereoscopic cameras at an offset distance from the identified computer-generated object; and storing, in a computer memory, the location of the window object. 8. A computer-implemented method for placing a window object within a computer-generated scene, the computer-generated scene including a pair of stereoscopic cameras adapted to capture an image of at least one computer-generated object and the window object, the method comprising: obtaining a timeline for a film sequence, the timeline comprising a plurality of time entries; obtaining a window object location distribution, wherein the window object location distribution comprises one window object location for at least two time entries of the plurality of time entries; calculating a statistical measurement of the window object location distribution; if the statistical measurement is less than a threshold value: calculating a static window object location based on a statistical mean of the window object location distribution, and storing, in the computer memory, the static window object location as the window object location for each of the at least two time entries; and if the standard deviation is greater than or equal to a threshold value: calculating a set of smoothed window object locations based on the window object location distribution and a smoothing function, and storing, in the computer memory, the set of smoothed window object locations as the window object locations for each of the at least two time entries. 9. The computer-implemented method of claim 8, wherein the smoothing function is a low-pass filter. 10. A computer system for placing a window object within a computer-generated scene, the computer-generated scene including a pair of stereoscopic cameras adapted to capture an image of at least one computer-generated object and the window object, the system comprising: a memory; a processor for executing computer-readable instructions, the instructions for: obtaining a left portion and right portion of the image along the left and right edges of the image; identifying the nearest computer-generated object to the pair of stereoscopic cameras within the left and right portions of the image; placing the window object between the identified computer-generated object and the stereoscopic cameras at an offset distance from the identified computer-generated object; and storing, in the computer memory, the location of the window object. 11. The computer system of claim 10, the instructions further comprising, creating a stereoscopic image of the computer-generated scene with the pair of stereoscopic cameras, wherein a portion of the computer-generated object is hidden behind the stereo window; and storing, in the computer memory, the stereoscopic image. 12. The computer system of claim 10, wherein the window object separated from the computer-generated object by an offset that is less than a width of the computer-generated object. 13. The computer system of claim 10, wherein the left and right portions of the image are 48 pixels wide. 14. The computer system of claim 10, wherein the left and right portions of the image are 60 percent of height of the image. 15. The computer system of claim 10, wherein the window object comprises two vertical bar-shaped surfaces, and wherein the vertical bar-shaped surfaces are depicted, respectively, near a left and right edge portion of a stereoscopic image produced using the pair of stereoscopic cameras. 16. A computer system for placing a window object within a computer-generated scene, the computer-generated scene including a pair of stereoscopic cameras adapted to capture an image of at least one computer-generated object and the window object, the system comprising: a memory; a processor for executing computer-readable instructions, the instructions for: obtaining a timeline for a film sequence, the timeline comprising a plurality of time entries; for each of at least two time entries of the plurality of time entries: obtaining a left portion and right portion of the image along the left and right edges of the image; identifying the nearest computer-generated object to the pair of stereoscopic cameras within the left and right portions of the image; placing the window object between the identified computer-generated object and the stereoscopic cameras at an offset distance from the identified computer-generated object; and storing, in the computer memory, the location of the window object. 17. A computer system for placing a window object within a computer-generated scene, the computer-generated scene including a pair of stereoscopic cameras adapted to capture an image of at least one computer-generated object and the window object, the system comprising: a memory; a processor for executing computer-readable instructions, the instructions for: obtaining a timeline for a film sequence, the timeline comprising a plurality of time entries; obtaining a window object location distribution, wherein the window object location distribution comprises one window object location for at least two time entries of the plurality of time entries; calculating a statistical measurement of the window object location distribution; if the statistical measurement is less than a threshold value: calculating a static window object location based on a statistical mean of the window object location distribution, and storing, in the computer memory, the static window object location as the window object location for each of the at least two time entries; and if the standard deviation is greater than or equal to a threshold value: calculating a set of smoothed window object locations based on the window object location distribution and a smoothing function, and storing, in the computer memory, the set of smoothed window object locations as the window object locations for each of the at least two time entries. 18. The computer system of claim 17, wherein the smoothing function is a low-pass filter. 19. A non-transitory computer-readable storage medium including computer-readable instructions that when executed on a computer processor cause the computer processor to place a window object within a computer-generated scene, the computer-generated scene including a pair of stereoscopic cameras adapted to capture an image of at least one computer-generated object and the window object, the instructions comprising: obtaining a left portion and right portion of the image along the left and right edges of the image; identifying the nearest computer-generated object to the pair of stereoscopic cameras within the left and right portions of the image; placing the window object between the identified computer-generated object and the stereoscopic cameras at an offset distance from the identified computer-generated object; and storing, in the computer memory, the location of the window object. 20. The non-transitory computer-readable storage medium 19, the instructions further comprising, creating a stereoscopic image of the computer-generated scene with the pair of stereoscopic cameras, wherein a portion of the computer-generated object is hidden behind the stereo window; and storing, in the computer memory, the stereoscopic image. 21. The non-transitory computer-readable storage medium of claim 19, wherein the window object separated from the computer-generated object by an offset that is less than a width of the computer-generated object. 22. The non-transitory computer-readable storage medium of claim 19, wherein the left and right portions of the image are 48 pixels wide. 23. The non-transitory computer-readable storage medium of claim 19, wherein the left and right portions of the image are 60 percent of height of the image. 24. The non-transitory computer-readable storage medium of claim 19, wherein the window object comprises two vertical bar-shaped surfaces, and wherein the vertical bar-shaped surfaces are depicted, respectively near a left and right edge portion of a stereoscopic image produced using the pair of stereoscopic cameras. 25. A non-transitory computer-readable storage medium including computer-readable instructions that when executed on a computer processor cause the computer processor to place a window object within a computer-generated scene, the computer-generated scene including a pair of stereoscopic cameras adapted to capture an image of at least one computer-generated object and the window object, the instructions comprising: obtaining a timeline for a film sequence, the timeline comprising a plurality of time entries; for each of at least two time entries of the plurality of time entries: obtaining a left portion and right portion of the image along the left and right edges of the image; identifying the nearest computer-generated object to the pair of stereoscopic cameras within the left and right portions of the image; placing the window object between the identified computer-generated object and the stereoscopic cameras at an offset distance from the identified computer-generated object; and storing, in the computer memory, the location of the window object. 26. A non-transitory computer-readable storage medium including computer-readable instructions that when executed on a computer processor cause the computer processor to place a window object within a computer-generated scene, the computer-generated scene including a pair of stereoscopic cameras adapted to capture an image of at least one computer-generated object and the window object, the method comprising: obtaining a timeline for a film sequence, the timeline comprising a plurality of time entries; obtaining a window object location distribution, wherein the window object location distribution comprises one window object location for at least two time entries of the plurality of time entries; calculating a statistical measurement of the window object location distribution; if the statistical measurement is less than a threshold value: calculating a static window object location based on a statistical mean of the window object location distribution, and storing, in a computer memory, the static window object location as the window object location for each of the at least two time entries; and if the statistical measurement is greater than or equal to a threshold value: calculating a set of smoothed window object locations based on the window object location distribution and a smoothing function, and storing, in the computer memory, the set of smoothed window object locations as the window object locations for each of the at least two time entries. 27. The non-transitory computer-readable storage medium of claim 26, wherein the smoothing function is a low-pass filter.
A computer-implemented method for placing a window object within a computer-generated scene. The computer-generated scene includes a pair of stereoscopic cameras adapted to capture an image of at least one computer-generated object and the window object. A left portion and right portion of the image along the left and right edges of the image are obtained. The nearest computer-generated object to the pair of stereoscopic cameras within the left and right portions of the image is identified. The window object is placed between the identified computer-generated object and the stereoscopic cameras at an offset distance from the identified computer-generated object.1. A computer-implemented method for placing a window object within a computer-generated scene, the computer-generated scene including a pair of stereoscopic cameras adapted to capture an image of at least one computer-generated object and the window object, the method comprising: obtaining a left portion and right portion of the image along the left and right edges of the image; identifying the nearest computer-generated object to the pair of stereoscopic cameras within the left and right portions of the image; placing the window object between the identified computer-generated object and the stereoscopic cameras at an offset distance from the identified computer-generated object; and storing, in a computer memory, the location of the window object. 2. The computer-implemented method of claim 1, further comprising, creating a stereoscopic image of the computer-generated scene using the pair of stereoscopic cameras, wherein a portion of the computer-generated object is hidden behind the stereo window; and storing, in the computer memory, the stereoscopic image. 3. The computer-implemented method of claim 1, wherein the window object separated from the computer-generated object by an offset that is less than a width of the computer-generated object. 4. The computer-implemented method of claim 1, wherein the left and right portions of the image are 48 pixels wide. 5. The computer-implemented method of claim 1, wherein the left and right portions of the image are 60 percent of height of the image. 6. The computer-implemented method of claim 1, wherein the window object comprises two vertical bar-shaped surfaces, and wherein the vertical bar-shaped surfaces are depicted, respectively, near a left and right portion of a stereoscopic image produced using the pair of stereoscopic cameras. 7. A computer-implemented method for placing a window object within a computer-generated scene, the computer-generated scene including a pair of stereoscopic cameras adapted to capture an image of at least one computer-generated object and the window object, the method comprising: obtaining a timeline for a film sequence, the timeline comprising a plurality of time entries; for each of at least two time entries of the plurality of time entries: obtaining a left portion and right portion of the image along the left and right edges of the image; identifying the nearest computer-generated object to the pair of stereoscopic cameras within the left and right portions of the image; placing the window object between the identified computer-generated object and the stereoscopic cameras at an offset distance from the identified computer-generated object; and storing, in a computer memory, the location of the window object. 8. A computer-implemented method for placing a window object within a computer-generated scene, the computer-generated scene including a pair of stereoscopic cameras adapted to capture an image of at least one computer-generated object and the window object, the method comprising: obtaining a timeline for a film sequence, the timeline comprising a plurality of time entries; obtaining a window object location distribution, wherein the window object location distribution comprises one window object location for at least two time entries of the plurality of time entries; calculating a statistical measurement of the window object location distribution; if the statistical measurement is less than a threshold value: calculating a static window object location based on a statistical mean of the window object location distribution, and storing, in the computer memory, the static window object location as the window object location for each of the at least two time entries; and if the standard deviation is greater than or equal to a threshold value: calculating a set of smoothed window object locations based on the window object location distribution and a smoothing function, and storing, in the computer memory, the set of smoothed window object locations as the window object locations for each of the at least two time entries. 9. The computer-implemented method of claim 8, wherein the smoothing function is a low-pass filter. 10. A computer system for placing a window object within a computer-generated scene, the computer-generated scene including a pair of stereoscopic cameras adapted to capture an image of at least one computer-generated object and the window object, the system comprising: a memory; a processor for executing computer-readable instructions, the instructions for: obtaining a left portion and right portion of the image along the left and right edges of the image; identifying the nearest computer-generated object to the pair of stereoscopic cameras within the left and right portions of the image; placing the window object between the identified computer-generated object and the stereoscopic cameras at an offset distance from the identified computer-generated object; and storing, in the computer memory, the location of the window object. 11. The computer system of claim 10, the instructions further comprising, creating a stereoscopic image of the computer-generated scene with the pair of stereoscopic cameras, wherein a portion of the computer-generated object is hidden behind the stereo window; and storing, in the computer memory, the stereoscopic image. 12. The computer system of claim 10, wherein the window object separated from the computer-generated object by an offset that is less than a width of the computer-generated object. 13. The computer system of claim 10, wherein the left and right portions of the image are 48 pixels wide. 14. The computer system of claim 10, wherein the left and right portions of the image are 60 percent of height of the image. 15. The computer system of claim 10, wherein the window object comprises two vertical bar-shaped surfaces, and wherein the vertical bar-shaped surfaces are depicted, respectively, near a left and right edge portion of a stereoscopic image produced using the pair of stereoscopic cameras. 16. A computer system for placing a window object within a computer-generated scene, the computer-generated scene including a pair of stereoscopic cameras adapted to capture an image of at least one computer-generated object and the window object, the system comprising: a memory; a processor for executing computer-readable instructions, the instructions for: obtaining a timeline for a film sequence, the timeline comprising a plurality of time entries; for each of at least two time entries of the plurality of time entries: obtaining a left portion and right portion of the image along the left and right edges of the image; identifying the nearest computer-generated object to the pair of stereoscopic cameras within the left and right portions of the image; placing the window object between the identified computer-generated object and the stereoscopic cameras at an offset distance from the identified computer-generated object; and storing, in the computer memory, the location of the window object. 17. A computer system for placing a window object within a computer-generated scene, the computer-generated scene including a pair of stereoscopic cameras adapted to capture an image of at least one computer-generated object and the window object, the system comprising: a memory; a processor for executing computer-readable instructions, the instructions for: obtaining a timeline for a film sequence, the timeline comprising a plurality of time entries; obtaining a window object location distribution, wherein the window object location distribution comprises one window object location for at least two time entries of the plurality of time entries; calculating a statistical measurement of the window object location distribution; if the statistical measurement is less than a threshold value: calculating a static window object location based on a statistical mean of the window object location distribution, and storing, in the computer memory, the static window object location as the window object location for each of the at least two time entries; and if the standard deviation is greater than or equal to a threshold value: calculating a set of smoothed window object locations based on the window object location distribution and a smoothing function, and storing, in the computer memory, the set of smoothed window object locations as the window object locations for each of the at least two time entries. 18. The computer system of claim 17, wherein the smoothing function is a low-pass filter. 19. A non-transitory computer-readable storage medium including computer-readable instructions that when executed on a computer processor cause the computer processor to place a window object within a computer-generated scene, the computer-generated scene including a pair of stereoscopic cameras adapted to capture an image of at least one computer-generated object and the window object, the instructions comprising: obtaining a left portion and right portion of the image along the left and right edges of the image; identifying the nearest computer-generated object to the pair of stereoscopic cameras within the left and right portions of the image; placing the window object between the identified computer-generated object and the stereoscopic cameras at an offset distance from the identified computer-generated object; and storing, in the computer memory, the location of the window object. 20. The non-transitory computer-readable storage medium 19, the instructions further comprising, creating a stereoscopic image of the computer-generated scene with the pair of stereoscopic cameras, wherein a portion of the computer-generated object is hidden behind the stereo window; and storing, in the computer memory, the stereoscopic image. 21. The non-transitory computer-readable storage medium of claim 19, wherein the window object separated from the computer-generated object by an offset that is less than a width of the computer-generated object. 22. The non-transitory computer-readable storage medium of claim 19, wherein the left and right portions of the image are 48 pixels wide. 23. The non-transitory computer-readable storage medium of claim 19, wherein the left and right portions of the image are 60 percent of height of the image. 24. The non-transitory computer-readable storage medium of claim 19, wherein the window object comprises two vertical bar-shaped surfaces, and wherein the vertical bar-shaped surfaces are depicted, respectively near a left and right edge portion of a stereoscopic image produced using the pair of stereoscopic cameras. 25. A non-transitory computer-readable storage medium including computer-readable instructions that when executed on a computer processor cause the computer processor to place a window object within a computer-generated scene, the computer-generated scene including a pair of stereoscopic cameras adapted to capture an image of at least one computer-generated object and the window object, the instructions comprising: obtaining a timeline for a film sequence, the timeline comprising a plurality of time entries; for each of at least two time entries of the plurality of time entries: obtaining a left portion and right portion of the image along the left and right edges of the image; identifying the nearest computer-generated object to the pair of stereoscopic cameras within the left and right portions of the image; placing the window object between the identified computer-generated object and the stereoscopic cameras at an offset distance from the identified computer-generated object; and storing, in the computer memory, the location of the window object. 26. A non-transitory computer-readable storage medium including computer-readable instructions that when executed on a computer processor cause the computer processor to place a window object within a computer-generated scene, the computer-generated scene including a pair of stereoscopic cameras adapted to capture an image of at least one computer-generated object and the window object, the method comprising: obtaining a timeline for a film sequence, the timeline comprising a plurality of time entries; obtaining a window object location distribution, wherein the window object location distribution comprises one window object location for at least two time entries of the plurality of time entries; calculating a statistical measurement of the window object location distribution; if the statistical measurement is less than a threshold value: calculating a static window object location based on a statistical mean of the window object location distribution, and storing, in a computer memory, the static window object location as the window object location for each of the at least two time entries; and if the statistical measurement is greater than or equal to a threshold value: calculating a set of smoothed window object locations based on the window object location distribution and a smoothing function, and storing, in the computer memory, the set of smoothed window object locations as the window object locations for each of the at least two time entries. 27. The non-transitory computer-readable storage medium of claim 26, wherein the smoothing function is a low-pass filter.
2,400
7,366
7,366
14,137,358
2,487
Techniques for encapsulating video streams containing multiple coded views in a media file are described herein. In one example, a method includes parsing a track of multiview video data, wherein the track includes at least one depth view. The method further includes parsing information to determine a spatial resolution associated with the depth view, wherein decoding the spatial resolution does not require parsing of a sequence parameter set of the depth view. Another example method includes composing a track of multiview video data, wherein the track includes the one or more views. The example method further includes composing information to indicate a spatial resolution associated with the depth view, wherein decoding the spatial resolution does not require parsing of a sequence parameter set of the depth view.
1. A method of processing video data, the method comprising: parsing a track of multiview video data, wherein the track includes at least one depth view; and parsing information to determine a spatial resolution associated with the depth view, wherein decoding the spatial resolution does not require parsing of a sequence parameter set of the depth view. 2. The method of claim 1, wherein parsing information further comprises parsing the spatial resolution from a 3VC Depth Resolution box from at least one of a 3VC Configuration Box and directly from a sample entry. 3. The method of claim 1, further comprising: parsing a 3VC decoder configuration record from the 3VC Configuration Box, wherein the 3VC Configuration Box is included in at least one of a sample entry of type ‘3vc1’ that allows extractors and a sample entry type ‘3vc2’ that disallows extractors. 4. The method of claim 1, further comprising: parsing a view identifier box from at least one of a sample entry and a multi-view group entry to determine at least one of whether a texture view or a depth view of a reference view is required for decoding at least one of the one or more views in the track, whether the track includes only depth views or texture and depth views, and, for each view included in the track, whether the view is a texture view or a depth view, wherein the at least one of the sample entry and the multi-view group entry are associated with the track. 5. The method of claim 1, wherein the multiview video data is a first set of multiview video data, and wherein the track further includes at least one texture view, the method further comprising: parsing a second set of multiview video data based on the first set of multiview video data, wherein parsing information comprises parsing information to determine whether the first texture view, the first depth view, or both the first texture and first depth view of the first set of multiview video data are needed to decode the second set of multiview video data. 6. The method of claim 1, further comprising: parsing a supplemental enhancement information (SEI) message box to determine a three dimensional scalability information SEI message associated with one or more of the views. 7. The method of claim 1, further comprising: parsing a three-dimensional video coding (3VC) decoder configuration record to determine a width and a height of the depth view. 8. The method of claim 1, wherein the track is a first track, the method further comprising: parsing a second track of multiview video data, wherein the second track includes a texture view corresponding to the depth view, wherein the texture view is not included in the first track. 9. A device comprising: a memory configured to store video data; and one or more processors configured to: parse a track of multiview video data, wherein the track includes one or more views, including at least one depth view; and parse information to determine a spatial resolution associated with the depth view, wherein decoding the spatial resolution does not require parsing of a sequence parameter set of the depth view. 10. The device of claim 9, wherein parse information further comprises parse the spatial resolution from a 3VC Depth Resolution box from at least one of a 3VC Configuration Box and directly from a sample entry. 11. The device of claim 9, the device further configured to: parse a 3VC decoder configuration record from the 3VC Configuration Box, wherein the 3VC Configuration Box is included in at least one of a sample entry of type ‘3vc1’ that allows extractors and a sample entry type ‘3vc2’ that disallows extractors. 12. The device of claim 9, the device further configured to: parse a view identifier box from at least one of a sample entry and a multi-view group entry to determine at least one of whether a texture view or a depth view of a reference view is required for decoding at least one of the one or more views in the track, whether the track includes only depth views or texture and depth views, and, for each view included in the track, whether the view is a texture view or a depth view, wherein the at least one of the sample entry and the multi-view group entry are associated with the track. 13. The device of claim 9, wherein the multiview video data is a first set of multiview video data, and wherein the track further includes at least one texture view, the device further configured to: parse a second set of multiview video data based on the first set of multiview video data, wherein parsing information comprises parsing information to determine whether the first texture view, the first depth view, or both the first texture and first depth view of the first set of multiview video data are needed to decode the second set of multiview video data. 14. The device of claim 9, further configured to: parse a supplemental enhancement information (SEI) message box to determine a three dimensional scalability information SEI message associated with one or more of the views. 15. The device of claim 9, further configured to: parse a three-dimensional video coding (3VC) decoder configuration record to determine a width and a height of the depth view. 16. The device of claim 9, wherein the track is a first track, the device further configured to: parse a second track of multiview video data, wherein the second track includes a texture view corresponding to the depth view, wherein the texture view is not included in the first track. 17. A non-transitory computer-readable storage medium having instructions stored thereon that upon execution cause one or more processors of a video coding device to: parse a track of multiview video data, wherein the track includes one or more views, including at least one depth view; and parse information to determine a spatial resolution associated with the depth view, wherein decoding the spatial resolution does not require parsing of a sequence parameter set of the depth view. 18. The non-transitory computer-readable storage medium of claim 17, wherein parse information further comprises parse the spatial resolution from a 3VC Depth Resolution box from at least one of a 3VC Configuration Box and directly from a sample entry. 19. The non-transitory computer-readable storage medium of claim 17, the instructions stored thereon further cause the one or more processors of the video coding device to: parse a 3VC decoder configuration record from the 3VC Configuration Box, wherein the 3VC Configuration Box is included in at least one of a sample entry of type ‘3vc1’ that allows extractors and a sample entry type ‘3vc2’ that disallows extractors. 20. An apparatus configured to parse a video file including coded video content, the apparatus comprising: means for parsing a track of multiview video data, wherein the track includes one or more views, including at least one depth view; and means for parsing information to determine a spatial resolution associated with the depth view, wherein decoding the spatial resolution does not require parsing of a sequence parameter set of the depth view. 21. The apparatus of claim 20, wherein means for parsing information further comprises means for parsing the spatial resolution from a 3VC Depth Resolution box from at least one of a 3VC Configuration Box and directly from a sample entry. 22. The apparatus of claim 20, further comprising: means for parsing a 3VC decoder configuration record from the 3VC Configuration Box, wherein the 3VC Configuration Box is included in at least one of a sample entry of type ‘3vc1’ that allows extractors and a sample entry type ‘3vc2’ that disallows extractors. 23. A method of processing video data, the method comprising: composing a track of multiview video data, wherein the track includes the one or more views; and composing information to indicate a spatial resolution associated with the depth view, wherein decoding the spatial resolution does not require parsing of a sequence parameter set of the depth view. 24. The method of claim 23, wherein composing information further comprises composing the spatial resolution in a 3VC Depth Resolution box in at least one of a 3VC Configuration Box and directly in a sample entry. 25. The method of claim 23, further comprising: composing a 3VC decoder configuration record in the 3VC Configuration Box, wherein the 3VC Configuration Box is included in at least one of a sample entry of type ‘3vc1’ that allows extractors and a sample entry type ‘3vc2’ that disallows extractors. 26. The method of claim 23, further comprising: composing a view identifier box from at least one of a sample entry and a multi-view group entry to indicate at least one of whether a texture view or a depth view of a reference view is required for decoding at least one of the one or more views in the track, whether the track includes only depth views or texture and depth views, and, for each view included in the track, whether the view is a texture view or a depth view, wherein the at least one of the sample entry and the multi-view group entry are associated with the track. 27. The method of claim 23, wherein the multiview video data is a first set of multiview video data, and wherein the track further includes at least one texture view, the method further comprising: composing a second set of multiview video data based on the first set of multiview video data, wherein composing information further comprises composing information to indicate whether the first texture view, the first depth view, or both the first texture and first depth view of the first set of multiview video data are needed to decode the second set of multiview video data. 28. The method of claim 23, further comprising: composing a supplemental enhancement information (SEI) message box to indicate a three dimensional scalability information SEI message associated with one or more of the views. 29. The method of claim 23, further comprising: composing a three-dimensional video coding (3VC) decoder configuration record to indicate a width and a height of the depth view. 30. The method of claim 23, wherein the track is a first track, the method further comprising: composing a second track of multiview video data, wherein the second track includes a texture view corresponding to the depth view, wherein the texture view is not included in the first track. 31. A device comprising: a memory configured to store video data; and one or more processors configured to: compose a track of multiview video data, wherein the track includes one or more views, including at least one depth view; and compose information to indicate a spatial resolution associated with the depth view, wherein decoding the spatial resolution does not require parsing of a sequence parameter set of the depth view. 32. The device of claim 31, wherein parse information further comprises compose the spatial resolution in a 3VC Depth Resolution box in at least one of a 3VC Configuration Box and directly in a sample entry. 33. The device of claim 31, the device further configured to: compose a 3VC decoder configuration record in the 3VC Configuration Box, wherein the 3VC Configuration Box is included in at least one of a sample entry of type ‘3vc1’ that allows extractors and a sample entry type ‘3vc2’ that disallows extractors. 34. The device of claim 31, the device further configured to: compose a view identifier box from at least one of a sample entry and a multi-view group entry to indicate at least one of whether a texture view or a depth view of a reference view is required for decoding at least one of the one or more views in the track, whether the track includes only depth views or texture and depth views, and, for each view included in the track, whether the view is a texture view or a depth view, wherein the at least one of the sample entry and the multi-view group entry are associated with the track. 35. The device of claim 31, wherein the multiview video data is a first set of multiview video data, and wherein the track further includes at least one texture view, the device further configured to: compose a second set of multiview video data based on the first set of multiview video data, wherein composing information further comprises composing information to indicate whether the first texture view, the first depth view, or both the first texture and first depth view of the first set of multiview video data are needed to decode the second set of multiview video data. 36. The device of claim 31, further configured to: compose a supplemental enhancement information (SEI) message box to indicate a three dimensional scalability information SEI message associated with one or more of the views. 37. The device of claim 31, further configured to: compose a three-dimensional video coding (3VC) decoder configuration record to indicate a width and a height of the depth view. 38. The device of claim 31, wherein the track is a first track, the device further configured to: compose a second track of multiview video data, wherein the second track includes a texture view corresponding to the depth view, wherein the texture view is not included in the first track. 39. A non-transitory computer-readable storage medium having instructions stored thereon that upon execution cause one or more processors of a video coding device to: compose a track of multiview video data, wherein the track includes one or more views, including at least one depth view; and compose information to indicate a spatial resolution associated with the depth view, wherein decoding the spatial resolution does not require parsing of a sequence parameter set of the depth view. 40. The non-transitory computer-readable storage medium of claim 39, wherein compose information further comprises compose the spatial resolution in a 3VC Depth Resolution box in at least one of a 3VC Configuration Box and directly in a sample entry. 41. The non-transitory computer-readable storage medium of claim 39, the instructions stored thereon further cause the one or more processors of the video coding device to: compose a 3VC decoder configuration record in the 3VC Configuration Box, wherein the 3VC Configuration Box is included in at least one of a sample entry of type ‘3vc1’ that allows extractors and a sample entry type ‘3vc2’ that disallows extractors. 42. An apparatus configured to parse a video file including coded video content, the apparatus comprising: means for composing a track of multiview video data, wherein the track includes one or more views, including at least one depth view; and means for composing information to indicate a spatial resolution associated with the depth view, wherein decoding the spatial resolution does not require parsing of a sequence parameter set of the depth view. 43. The apparatus of claim 42, wherein means for composing information further comprises means for composing the spatial resolution in a 3VC Depth Resolution box in at least one of a 3VC Configuration Box and directly in a sample entry. 44. The apparatus of claim 42, further comprising: means for composing a 3VC decoder configuration record in the 3VC Configuration Box, wherein the 3VC Configuration Box is included in at least one of a sample entry of type ‘3vc1’ that allows extractors and a sample entry type ‘3vc2’ that disallows extractors.
Techniques for encapsulating video streams containing multiple coded views in a media file are described herein. In one example, a method includes parsing a track of multiview video data, wherein the track includes at least one depth view. The method further includes parsing information to determine a spatial resolution associated with the depth view, wherein decoding the spatial resolution does not require parsing of a sequence parameter set of the depth view. Another example method includes composing a track of multiview video data, wherein the track includes the one or more views. The example method further includes composing information to indicate a spatial resolution associated with the depth view, wherein decoding the spatial resolution does not require parsing of a sequence parameter set of the depth view.1. A method of processing video data, the method comprising: parsing a track of multiview video data, wherein the track includes at least one depth view; and parsing information to determine a spatial resolution associated with the depth view, wherein decoding the spatial resolution does not require parsing of a sequence parameter set of the depth view. 2. The method of claim 1, wherein parsing information further comprises parsing the spatial resolution from a 3VC Depth Resolution box from at least one of a 3VC Configuration Box and directly from a sample entry. 3. The method of claim 1, further comprising: parsing a 3VC decoder configuration record from the 3VC Configuration Box, wherein the 3VC Configuration Box is included in at least one of a sample entry of type ‘3vc1’ that allows extractors and a sample entry type ‘3vc2’ that disallows extractors. 4. The method of claim 1, further comprising: parsing a view identifier box from at least one of a sample entry and a multi-view group entry to determine at least one of whether a texture view or a depth view of a reference view is required for decoding at least one of the one or more views in the track, whether the track includes only depth views or texture and depth views, and, for each view included in the track, whether the view is a texture view or a depth view, wherein the at least one of the sample entry and the multi-view group entry are associated with the track. 5. The method of claim 1, wherein the multiview video data is a first set of multiview video data, and wherein the track further includes at least one texture view, the method further comprising: parsing a second set of multiview video data based on the first set of multiview video data, wherein parsing information comprises parsing information to determine whether the first texture view, the first depth view, or both the first texture and first depth view of the first set of multiview video data are needed to decode the second set of multiview video data. 6. The method of claim 1, further comprising: parsing a supplemental enhancement information (SEI) message box to determine a three dimensional scalability information SEI message associated with one or more of the views. 7. The method of claim 1, further comprising: parsing a three-dimensional video coding (3VC) decoder configuration record to determine a width and a height of the depth view. 8. The method of claim 1, wherein the track is a first track, the method further comprising: parsing a second track of multiview video data, wherein the second track includes a texture view corresponding to the depth view, wherein the texture view is not included in the first track. 9. A device comprising: a memory configured to store video data; and one or more processors configured to: parse a track of multiview video data, wherein the track includes one or more views, including at least one depth view; and parse information to determine a spatial resolution associated with the depth view, wherein decoding the spatial resolution does not require parsing of a sequence parameter set of the depth view. 10. The device of claim 9, wherein parse information further comprises parse the spatial resolution from a 3VC Depth Resolution box from at least one of a 3VC Configuration Box and directly from a sample entry. 11. The device of claim 9, the device further configured to: parse a 3VC decoder configuration record from the 3VC Configuration Box, wherein the 3VC Configuration Box is included in at least one of a sample entry of type ‘3vc1’ that allows extractors and a sample entry type ‘3vc2’ that disallows extractors. 12. The device of claim 9, the device further configured to: parse a view identifier box from at least one of a sample entry and a multi-view group entry to determine at least one of whether a texture view or a depth view of a reference view is required for decoding at least one of the one or more views in the track, whether the track includes only depth views or texture and depth views, and, for each view included in the track, whether the view is a texture view or a depth view, wherein the at least one of the sample entry and the multi-view group entry are associated with the track. 13. The device of claim 9, wherein the multiview video data is a first set of multiview video data, and wherein the track further includes at least one texture view, the device further configured to: parse a second set of multiview video data based on the first set of multiview video data, wherein parsing information comprises parsing information to determine whether the first texture view, the first depth view, or both the first texture and first depth view of the first set of multiview video data are needed to decode the second set of multiview video data. 14. The device of claim 9, further configured to: parse a supplemental enhancement information (SEI) message box to determine a three dimensional scalability information SEI message associated with one or more of the views. 15. The device of claim 9, further configured to: parse a three-dimensional video coding (3VC) decoder configuration record to determine a width and a height of the depth view. 16. The device of claim 9, wherein the track is a first track, the device further configured to: parse a second track of multiview video data, wherein the second track includes a texture view corresponding to the depth view, wherein the texture view is not included in the first track. 17. A non-transitory computer-readable storage medium having instructions stored thereon that upon execution cause one or more processors of a video coding device to: parse a track of multiview video data, wherein the track includes one or more views, including at least one depth view; and parse information to determine a spatial resolution associated with the depth view, wherein decoding the spatial resolution does not require parsing of a sequence parameter set of the depth view. 18. The non-transitory computer-readable storage medium of claim 17, wherein parse information further comprises parse the spatial resolution from a 3VC Depth Resolution box from at least one of a 3VC Configuration Box and directly from a sample entry. 19. The non-transitory computer-readable storage medium of claim 17, the instructions stored thereon further cause the one or more processors of the video coding device to: parse a 3VC decoder configuration record from the 3VC Configuration Box, wherein the 3VC Configuration Box is included in at least one of a sample entry of type ‘3vc1’ that allows extractors and a sample entry type ‘3vc2’ that disallows extractors. 20. An apparatus configured to parse a video file including coded video content, the apparatus comprising: means for parsing a track of multiview video data, wherein the track includes one or more views, including at least one depth view; and means for parsing information to determine a spatial resolution associated with the depth view, wherein decoding the spatial resolution does not require parsing of a sequence parameter set of the depth view. 21. The apparatus of claim 20, wherein means for parsing information further comprises means for parsing the spatial resolution from a 3VC Depth Resolution box from at least one of a 3VC Configuration Box and directly from a sample entry. 22. The apparatus of claim 20, further comprising: means for parsing a 3VC decoder configuration record from the 3VC Configuration Box, wherein the 3VC Configuration Box is included in at least one of a sample entry of type ‘3vc1’ that allows extractors and a sample entry type ‘3vc2’ that disallows extractors. 23. A method of processing video data, the method comprising: composing a track of multiview video data, wherein the track includes the one or more views; and composing information to indicate a spatial resolution associated with the depth view, wherein decoding the spatial resolution does not require parsing of a sequence parameter set of the depth view. 24. The method of claim 23, wherein composing information further comprises composing the spatial resolution in a 3VC Depth Resolution box in at least one of a 3VC Configuration Box and directly in a sample entry. 25. The method of claim 23, further comprising: composing a 3VC decoder configuration record in the 3VC Configuration Box, wherein the 3VC Configuration Box is included in at least one of a sample entry of type ‘3vc1’ that allows extractors and a sample entry type ‘3vc2’ that disallows extractors. 26. The method of claim 23, further comprising: composing a view identifier box from at least one of a sample entry and a multi-view group entry to indicate at least one of whether a texture view or a depth view of a reference view is required for decoding at least one of the one or more views in the track, whether the track includes only depth views or texture and depth views, and, for each view included in the track, whether the view is a texture view or a depth view, wherein the at least one of the sample entry and the multi-view group entry are associated with the track. 27. The method of claim 23, wherein the multiview video data is a first set of multiview video data, and wherein the track further includes at least one texture view, the method further comprising: composing a second set of multiview video data based on the first set of multiview video data, wherein composing information further comprises composing information to indicate whether the first texture view, the first depth view, or both the first texture and first depth view of the first set of multiview video data are needed to decode the second set of multiview video data. 28. The method of claim 23, further comprising: composing a supplemental enhancement information (SEI) message box to indicate a three dimensional scalability information SEI message associated with one or more of the views. 29. The method of claim 23, further comprising: composing a three-dimensional video coding (3VC) decoder configuration record to indicate a width and a height of the depth view. 30. The method of claim 23, wherein the track is a first track, the method further comprising: composing a second track of multiview video data, wherein the second track includes a texture view corresponding to the depth view, wherein the texture view is not included in the first track. 31. A device comprising: a memory configured to store video data; and one or more processors configured to: compose a track of multiview video data, wherein the track includes one or more views, including at least one depth view; and compose information to indicate a spatial resolution associated with the depth view, wherein decoding the spatial resolution does not require parsing of a sequence parameter set of the depth view. 32. The device of claim 31, wherein parse information further comprises compose the spatial resolution in a 3VC Depth Resolution box in at least one of a 3VC Configuration Box and directly in a sample entry. 33. The device of claim 31, the device further configured to: compose a 3VC decoder configuration record in the 3VC Configuration Box, wherein the 3VC Configuration Box is included in at least one of a sample entry of type ‘3vc1’ that allows extractors and a sample entry type ‘3vc2’ that disallows extractors. 34. The device of claim 31, the device further configured to: compose a view identifier box from at least one of a sample entry and a multi-view group entry to indicate at least one of whether a texture view or a depth view of a reference view is required for decoding at least one of the one or more views in the track, whether the track includes only depth views or texture and depth views, and, for each view included in the track, whether the view is a texture view or a depth view, wherein the at least one of the sample entry and the multi-view group entry are associated with the track. 35. The device of claim 31, wherein the multiview video data is a first set of multiview video data, and wherein the track further includes at least one texture view, the device further configured to: compose a second set of multiview video data based on the first set of multiview video data, wherein composing information further comprises composing information to indicate whether the first texture view, the first depth view, or both the first texture and first depth view of the first set of multiview video data are needed to decode the second set of multiview video data. 36. The device of claim 31, further configured to: compose a supplemental enhancement information (SEI) message box to indicate a three dimensional scalability information SEI message associated with one or more of the views. 37. The device of claim 31, further configured to: compose a three-dimensional video coding (3VC) decoder configuration record to indicate a width and a height of the depth view. 38. The device of claim 31, wherein the track is a first track, the device further configured to: compose a second track of multiview video data, wherein the second track includes a texture view corresponding to the depth view, wherein the texture view is not included in the first track. 39. A non-transitory computer-readable storage medium having instructions stored thereon that upon execution cause one or more processors of a video coding device to: compose a track of multiview video data, wherein the track includes one or more views, including at least one depth view; and compose information to indicate a spatial resolution associated with the depth view, wherein decoding the spatial resolution does not require parsing of a sequence parameter set of the depth view. 40. The non-transitory computer-readable storage medium of claim 39, wherein compose information further comprises compose the spatial resolution in a 3VC Depth Resolution box in at least one of a 3VC Configuration Box and directly in a sample entry. 41. The non-transitory computer-readable storage medium of claim 39, the instructions stored thereon further cause the one or more processors of the video coding device to: compose a 3VC decoder configuration record in the 3VC Configuration Box, wherein the 3VC Configuration Box is included in at least one of a sample entry of type ‘3vc1’ that allows extractors and a sample entry type ‘3vc2’ that disallows extractors. 42. An apparatus configured to parse a video file including coded video content, the apparatus comprising: means for composing a track of multiview video data, wherein the track includes one or more views, including at least one depth view; and means for composing information to indicate a spatial resolution associated with the depth view, wherein decoding the spatial resolution does not require parsing of a sequence parameter set of the depth view. 43. The apparatus of claim 42, wherein means for composing information further comprises means for composing the spatial resolution in a 3VC Depth Resolution box in at least one of a 3VC Configuration Box and directly in a sample entry. 44. The apparatus of claim 42, further comprising: means for composing a 3VC decoder configuration record in the 3VC Configuration Box, wherein the 3VC Configuration Box is included in at least one of a sample entry of type ‘3vc1’ that allows extractors and a sample entry type ‘3vc2’ that disallows extractors.
2,400
7,367
7,367
14,329,779
2,441
Methods and apparatus to collect impressions using media object characteristics are disclosed. A disclosed example method involves, based on first instructions associated with a collector media object presented at a client device, collecting a first characteristic of the collector media object and collecting second characteristics corresponding to a plurality of second media objects that are presented at the client device concurrently with the collector media object. The example method also involves, based on second instructions associated with the collector media object, reporting multiple impressions corresponding to the collector media object and to the second media objects by sending the first and second characteristics and an identifier associated with the client device in a single communication to an audience measurement entity.
1. A method comprising: based on first instructions associated with a collector media object presented at a client device, collecting a first characteristic of the collector media object and collecting second characteristics corresponding to a plurality of second media objects that are presented at the client device concurrently with the collector media object; and based on second instructions associated with the collector media object, reporting multiple impressions corresponding to the collector media object and to the second media objects by sending the first and second characteristics and an identifier associated with the client device in a single communication to an audience measurement entity. 2. A method as defined in claim 1, further comprising sending a second communication to a database proprietor to request demographics information associated with the client device. 3. A method as defined in claim 2, wherein the sending of the second communication to the database proprietor is based on a rule located in the collector media object. 4. A method as defined in claim 2, wherein the sending of the second communication to the database proprietor is based on an address of the database proprietor located in a redirect request received at the client device. 5. A method as defined in claim 2, wherein the identifier is a first cookie corresponding to the audience measurement entity, and wherein sending the second communication comprises sending a second cookie corresponding to the database proprietor in the second communication. 6. A method as defined in claim 2, wherein the database proprietor is a social network service. 7. A method as defined in claim 1, wherein the first characteristic is first metadata encoded in the collector media object, and the second characteristics are at least one of second metadata encoded in the second media objects or signatures generated based on the second media objects. 8. A method as defined in claim 1, wherein the second characteristics are signatures of the second media objects, and collecting the signatures comprises performing a screen capture, and generating the signatures based on corresponding images of the second media objects. 9. A method as defined in claim 1, further comprising, based on the second instructions located in the collector media object, sending a uniform resource locator of a host website of the collector media object and the second media objects to the audience measurement entity. 10. A method as defined in claim 1, wherein each of the collector media object and the second media objects comprise at least one of an advertisement, video, or audio. 11. A method comprising: receiving a communication from a collector media object presented at a client device, the communication including a first characteristic corresponding to the collector media object, and second characteristics respectively corresponding to a plurality of second media objects concurrently presented with the collector media object at the client device; receiving demographic information from a database proprietor; and associating the demographic information with the first and second characteristics based on the first and second characteristics being received in the same communication from the client device. 12. A method as defined in claim 11, wherein the collector media object and the second media objects are presented on a web page rendered at the client device. 13. A method as defined in claim 11, wherein the client device is at least one of a computer, a television, a tablet, or a mobile telephone. 14. A method as defined in claim 11, wherein each of the collector media object and the second media objects comprise at least one of an advertisement, video, or audio. 15. A method as defined in claim 11, further comprising: requesting from a database proprietor demographic information corresponding to the client device; and receiving from the database proprietor the requested demographic information as part of a parameter in a hypertext transfer protocol request. 16. A method as defined in claim 11, further comprising receiving a first identifier in the communication from the client device, the first identifier corresponding to an audience measurement entity, and sending the client device a redirect request instructing the client device to send a database proprietor a second communication including a second identifier corresponding to the database proprietor. 17. A method as defined in claim 16, wherein the first identifier is a first cookie corresponding to the audience measurement entity at a first internet domain, and the second identifier is a second cookie corresponding to the database proprietor at a second internet domain. 18. A method as defined in claim 11, further comprising logging impressions for media corresponding to the collector media object and the second media objects, and wherein associating the demographic information with the first and second characteristics based on the first and second characteristics being received in the same communication comprises associating the demographic information with the logged impressions. 19. A tangible computer readable storage medium comprising instructions that, when executed, cause a machine to at least: based on first instructions associated with a collector media object presented at a client device, collect a first characteristic of the collector media object and collecting second characteristics corresponding to a plurality of second media objects that are presented at the client device concurrently with the collector media object; and based on second instructions associated with the collector media object, report multiple impressions corresponding to the collector media object and to the second media objects by sending the first and second characteristics and an identifier associated with the client device in a single communication to an audience measurement entity. 20. A tangible computer readable storage medium as defined in claim 19, wherein the instructions further cause the machine to send a second communication to a database proprietor to request demographics information associated with the client device.
Methods and apparatus to collect impressions using media object characteristics are disclosed. A disclosed example method involves, based on first instructions associated with a collector media object presented at a client device, collecting a first characteristic of the collector media object and collecting second characteristics corresponding to a plurality of second media objects that are presented at the client device concurrently with the collector media object. The example method also involves, based on second instructions associated with the collector media object, reporting multiple impressions corresponding to the collector media object and to the second media objects by sending the first and second characteristics and an identifier associated with the client device in a single communication to an audience measurement entity.1. A method comprising: based on first instructions associated with a collector media object presented at a client device, collecting a first characteristic of the collector media object and collecting second characteristics corresponding to a plurality of second media objects that are presented at the client device concurrently with the collector media object; and based on second instructions associated with the collector media object, reporting multiple impressions corresponding to the collector media object and to the second media objects by sending the first and second characteristics and an identifier associated with the client device in a single communication to an audience measurement entity. 2. A method as defined in claim 1, further comprising sending a second communication to a database proprietor to request demographics information associated with the client device. 3. A method as defined in claim 2, wherein the sending of the second communication to the database proprietor is based on a rule located in the collector media object. 4. A method as defined in claim 2, wherein the sending of the second communication to the database proprietor is based on an address of the database proprietor located in a redirect request received at the client device. 5. A method as defined in claim 2, wherein the identifier is a first cookie corresponding to the audience measurement entity, and wherein sending the second communication comprises sending a second cookie corresponding to the database proprietor in the second communication. 6. A method as defined in claim 2, wherein the database proprietor is a social network service. 7. A method as defined in claim 1, wherein the first characteristic is first metadata encoded in the collector media object, and the second characteristics are at least one of second metadata encoded in the second media objects or signatures generated based on the second media objects. 8. A method as defined in claim 1, wherein the second characteristics are signatures of the second media objects, and collecting the signatures comprises performing a screen capture, and generating the signatures based on corresponding images of the second media objects. 9. A method as defined in claim 1, further comprising, based on the second instructions located in the collector media object, sending a uniform resource locator of a host website of the collector media object and the second media objects to the audience measurement entity. 10. A method as defined in claim 1, wherein each of the collector media object and the second media objects comprise at least one of an advertisement, video, or audio. 11. A method comprising: receiving a communication from a collector media object presented at a client device, the communication including a first characteristic corresponding to the collector media object, and second characteristics respectively corresponding to a plurality of second media objects concurrently presented with the collector media object at the client device; receiving demographic information from a database proprietor; and associating the demographic information with the first and second characteristics based on the first and second characteristics being received in the same communication from the client device. 12. A method as defined in claim 11, wherein the collector media object and the second media objects are presented on a web page rendered at the client device. 13. A method as defined in claim 11, wherein the client device is at least one of a computer, a television, a tablet, or a mobile telephone. 14. A method as defined in claim 11, wherein each of the collector media object and the second media objects comprise at least one of an advertisement, video, or audio. 15. A method as defined in claim 11, further comprising: requesting from a database proprietor demographic information corresponding to the client device; and receiving from the database proprietor the requested demographic information as part of a parameter in a hypertext transfer protocol request. 16. A method as defined in claim 11, further comprising receiving a first identifier in the communication from the client device, the first identifier corresponding to an audience measurement entity, and sending the client device a redirect request instructing the client device to send a database proprietor a second communication including a second identifier corresponding to the database proprietor. 17. A method as defined in claim 16, wherein the first identifier is a first cookie corresponding to the audience measurement entity at a first internet domain, and the second identifier is a second cookie corresponding to the database proprietor at a second internet domain. 18. A method as defined in claim 11, further comprising logging impressions for media corresponding to the collector media object and the second media objects, and wherein associating the demographic information with the first and second characteristics based on the first and second characteristics being received in the same communication comprises associating the demographic information with the logged impressions. 19. A tangible computer readable storage medium comprising instructions that, when executed, cause a machine to at least: based on first instructions associated with a collector media object presented at a client device, collect a first characteristic of the collector media object and collecting second characteristics corresponding to a plurality of second media objects that are presented at the client device concurrently with the collector media object; and based on second instructions associated with the collector media object, report multiple impressions corresponding to the collector media object and to the second media objects by sending the first and second characteristics and an identifier associated with the client device in a single communication to an audience measurement entity. 20. A tangible computer readable storage medium as defined in claim 19, wherein the instructions further cause the machine to send a second communication to a database proprietor to request demographics information associated with the client device.
2,400
7,368
7,368
14,042,564
2,455
A relationship view system generates a relationship view of information for a relationship between a user and another person for display to the user. The relationship view system identifies information relating to the person. For each of a plurality of information types, the relationship view system identifies items of that information type that are related to both the user and the person. The relationship view system then generates a display page for displaying information relating to the identified items of each information type. The generated display page thus displays information related to both the user and the person for multiple information types simultaneously.
1. A computer-readable storage medium storing computer-executable instructions for controlling a computing device to generate a relationship view of information for a user, the computer-executable instructions comprising instructions that: receive an indication of a focus for the relationship view, the focus being a collection entity of one or more members; provide for display information relating to the collection entity; and for each of a plurality of information types, identify items of that information type that are related to both the user and the focus; and provide for display information relating to the identified items of that information type wherein information for multiple information types is provided for simultaneous display and wherein information provided for display is related to both the user and the focus. 2. The computer-readable storage medium of claim 1 wherein the instructions that identify items interface with an external system to identify items of at least one information type. 3. The computer-readable storage medium of claim 1 wherein an information type is selected from the group consisting of persons, conversations, meetings, and documents. 4. The computer-readable storage medium of claim 1 wherein the collection entity includes only one person. 5. The computer-readable storage medium of claim 1 wherein information types include conversations, meetings, and documents. 6. The computer-readable storage medium of claim 1 wherein the conversations are of different conversation types that are selected from a group consisting of electronic mail messages, instant messages, voice mails, and telephone calls. 7. The computer-readable storage medium of claim 1 including instructions that receive an indication of multiple focuses and wherein the identified items are related to the user and each of the multiple focuses. 8. The computer-readable storage medium of claim 1 wherein the information for each information type is provided for display in a separate panel. 9. The computer-readable storage medium of claim 1 including instructions for providing the information for display as a hover card. 10. The computer-readable storage medium of claim 9 wherein the provided information is to be displayed as a hover card when the received indication is based on hovering over an item. 11. The computer-readable storage medium of claim 9 wherein the information for display as a hover card is a condensed form of the identified information. 12. A method performed by a computing device to display a relationship view of information for a user, the method comprising: receiving an indication of a person; identifying electronic mail messages that include both the user and the person as participants; identifying meetings for which both the person and the user are invited; identifying documents to which both the person and the user have access; and displaying, simultaneously on a display, contact information for that person and electronic mail message information relating to identified electronic mail messages, meeting information relating to identified meetings, and document information relating to identified documents. 13. The method of claim 12 wherein the electronic mail message information, the meeting information, and the document information are displayed in separate panels. 14. The method of claim 12 including in response to receiving an indication of a meeting, displaying simultaneously meeting information relating to that meeting, contact information of invitees to that meeting, and electronic mail message information for the electronic mail message that relates to the meeting and that includes the user as a participant. 15. The method of claim 12 including identifying additional items selected from the group of instant messages, voice mails, and telephone calls that include both the user and the person as participants and displaying information about the identified items simultaneously with the other displayed information. 16. A computing device for displaying a relationship view of information relating to a user and a person, the computing device comprising: one or more computer-readable storage media storing computer-executable instructions that display contact information about the person; and for each of a plurality of information types, identify items of that information type that relate to both the user and the person; and display, simultaneously with the contact information, information relating to the identified items of that information type so that the displayed information relating to the identified items relates to both the user and the person; and a processor that executes the computer-executable instructions stored in the one or more computer-readable storage medium. 17. The computing device of claim 16 wherein an information type is selected from a group consisting of conversations, meetings, and documents. 18. The computing device of claim 16 wherein the information for the information types are displayed in separate panels. 19. The computing device of claim 16 wherein the instructions that identify the item of an information type are from an external system. 20. The computing device of claim 19 wherein the external system is a social networking system.
A relationship view system generates a relationship view of information for a relationship between a user and another person for display to the user. The relationship view system identifies information relating to the person. For each of a plurality of information types, the relationship view system identifies items of that information type that are related to both the user and the person. The relationship view system then generates a display page for displaying information relating to the identified items of each information type. The generated display page thus displays information related to both the user and the person for multiple information types simultaneously.1. A computer-readable storage medium storing computer-executable instructions for controlling a computing device to generate a relationship view of information for a user, the computer-executable instructions comprising instructions that: receive an indication of a focus for the relationship view, the focus being a collection entity of one or more members; provide for display information relating to the collection entity; and for each of a plurality of information types, identify items of that information type that are related to both the user and the focus; and provide for display information relating to the identified items of that information type wherein information for multiple information types is provided for simultaneous display and wherein information provided for display is related to both the user and the focus. 2. The computer-readable storage medium of claim 1 wherein the instructions that identify items interface with an external system to identify items of at least one information type. 3. The computer-readable storage medium of claim 1 wherein an information type is selected from the group consisting of persons, conversations, meetings, and documents. 4. The computer-readable storage medium of claim 1 wherein the collection entity includes only one person. 5. The computer-readable storage medium of claim 1 wherein information types include conversations, meetings, and documents. 6. The computer-readable storage medium of claim 1 wherein the conversations are of different conversation types that are selected from a group consisting of electronic mail messages, instant messages, voice mails, and telephone calls. 7. The computer-readable storage medium of claim 1 including instructions that receive an indication of multiple focuses and wherein the identified items are related to the user and each of the multiple focuses. 8. The computer-readable storage medium of claim 1 wherein the information for each information type is provided for display in a separate panel. 9. The computer-readable storage medium of claim 1 including instructions for providing the information for display as a hover card. 10. The computer-readable storage medium of claim 9 wherein the provided information is to be displayed as a hover card when the received indication is based on hovering over an item. 11. The computer-readable storage medium of claim 9 wherein the information for display as a hover card is a condensed form of the identified information. 12. A method performed by a computing device to display a relationship view of information for a user, the method comprising: receiving an indication of a person; identifying electronic mail messages that include both the user and the person as participants; identifying meetings for which both the person and the user are invited; identifying documents to which both the person and the user have access; and displaying, simultaneously on a display, contact information for that person and electronic mail message information relating to identified electronic mail messages, meeting information relating to identified meetings, and document information relating to identified documents. 13. The method of claim 12 wherein the electronic mail message information, the meeting information, and the document information are displayed in separate panels. 14. The method of claim 12 including in response to receiving an indication of a meeting, displaying simultaneously meeting information relating to that meeting, contact information of invitees to that meeting, and electronic mail message information for the electronic mail message that relates to the meeting and that includes the user as a participant. 15. The method of claim 12 including identifying additional items selected from the group of instant messages, voice mails, and telephone calls that include both the user and the person as participants and displaying information about the identified items simultaneously with the other displayed information. 16. A computing device for displaying a relationship view of information relating to a user and a person, the computing device comprising: one or more computer-readable storage media storing computer-executable instructions that display contact information about the person; and for each of a plurality of information types, identify items of that information type that relate to both the user and the person; and display, simultaneously with the contact information, information relating to the identified items of that information type so that the displayed information relating to the identified items relates to both the user and the person; and a processor that executes the computer-executable instructions stored in the one or more computer-readable storage medium. 17. The computing device of claim 16 wherein an information type is selected from a group consisting of conversations, meetings, and documents. 18. The computing device of claim 16 wherein the information for the information types are displayed in separate panels. 19. The computing device of claim 16 wherein the instructions that identify the item of an information type are from an external system. 20. The computing device of claim 19 wherein the external system is a social networking system.
2,400
7,369
7,369
13,679,419
2,493
An on-line invention disclosure system includes a user computer ( 14 ) and a web server ( 12 ) having an identification subsystem ( 30 ). A database ( 18 ) is coupled to the server ( 12 ). The server provides user screens to the user to prompt users to provide user information to the server. The server receives disclosure information from the users and stores information in the database ( 18 ) and prompts the users to provide a password. Upon the proper password, access to the disclosure is granted. Before granting a docket number, approval is received from each of the inventors.
1-23. (canceled) 24. A method of forming an online invention disclosure comprising: forming an invention disclosure online by entering a plurality of selected information including a first inventor identification information; as the plurality of selected information is entered, storing the information in a central storage location; and prompting approval of said first inventor.
An on-line invention disclosure system includes a user computer ( 14 ) and a web server ( 12 ) having an identification subsystem ( 30 ). A database ( 18 ) is coupled to the server ( 12 ). The server provides user screens to the user to prompt users to provide user information to the server. The server receives disclosure information from the users and stores information in the database ( 18 ) and prompts the users to provide a password. Upon the proper password, access to the disclosure is granted. Before granting a docket number, approval is received from each of the inventors.1-23. (canceled) 24. A method of forming an online invention disclosure comprising: forming an invention disclosure online by entering a plurality of selected information including a first inventor identification information; as the plurality of selected information is entered, storing the information in a central storage location; and prompting approval of said first inventor.
2,400
7,370
7,370
15,098,422
2,433
An automated malware identification and reverse engineering tool is provided. Subroutine categories may be learned by machine learning. A program may then be reverse-engineered and classified, and subroutines that are potentially indicative of malware may be identified. These subroutines may be reviewed by a reverse engineer to determine whether the program is malware in a more directed and efficient manner.
1. A computer-implemented method, comprising: automatically labeling each subroutine in a program, by a computing system, in a function call graph; applying a probabilistic approach, by the computing system, to identify at least one subroutine as potentially indicative of malware; and providing an indication of the at least one identified subroutine, by the computing system, to an analyst for further analysis. 2. The computer-implemented method of claim 1, wherein the probabilistic approach further comprises: modeling subroutine labels, by the computing system, using a Support Vector Machine (SVM) or Gaussian process. 3. The computer-implemented method of claim 1, wherein the automatic labeling of each subroutine further comprises: labeling each subroutine, by the computing system, as file I/O, process/thread, network, GUI, registry, and/or exploit. 4. The computer-implemented method of claim 1, wherein the automatic labeling of each subroutine further comprises: using a multiview approach, by the computing system, to construct a subroutine kernel matrix for use in the automatic labeling. 5. The computer-implemented method of claim 4, wherein different views of the multiview approach comprise instructions contained within each subroutine, Application Programming Interface (API) calls contained within each subroutine, and neighbor information for each subroutine. 6. The computer-implemented method of claim 5, wherein any combination of, API calls, neighbor information, and/or API calls is used for classification of each subroutine. 7. The computer-implemented method of claim 1, wherein the automatic labeling further comprises: using of neighborhood information, by the computing system, to determine subroutine function, with an assumption that neighboring subroutines of a subroutine x are likely to perform a similar function to neighboring subroutines of a subroutine y, given that x and y have a same label. 8. The computer-implemented method of claim 1, further comprising: receiving a training program and a list of subroutines labeled in a plurality of categories, by the computing system; and learning an identification strategy of how to identify the categories based on the received list of subroutines and labels, by the computing system, wherein the automatic labeling of each subroutine is based on the learned identification strategy. 9. The computer-implemented method of claim 8, wherein the subroutines are modeled as a Markov chain with the categories as nodes of a Markov chain graph. 10. The computer-implemented method of claim 1, wherein in the function call graph, edge weights for edges originating at a vertex vi are required to sum to 1, such that Σi→jeij=1. 11. The computer-implemented method of claim 1, wherein an n×n (n=|V|) adjacency matrix is used to represent the function call graph, where for each entry aij in the matrix, aij=eij. 12. A computer program embodied on a non-transitory computer-readable medium, the program configured to cause at least one processor to: receive a training program and list of subroutines labeled in a plurality of categories; learn an identification strategy of how to identify the categories based on the received subroutines and labels; and label new subroutines based on the learned identification strategy. 13. The computer program of claim 12, the program further configured to cause the at least one processor to: apply a probabilistic approach to identify at least one subroutine as potentially indicative of malware; and provide an indication of the at least one identified subroutine, by the computing system, to an analyst for further analysis. 14. The computer program of claim 13, wherein in the function call graph, edge weights for edges originating at a vertex vi are required to sum to 1, such that Σi→jeij=1. 15. The computer program of claim 13, wherein an n×n (n=|V|) adjacency matrix is used to represent the function call graph, where for each entry aij in the matrix, aij=eij. 16. The computer program of claim 12, wherein the subroutines are modeled as a Markov chain with the categories as nodes of a Markov chain graph. 17. An apparatus, comprising: memory storing computer program instructions; and at least one processor configured to execute the stored computer program instructions, wherein the at least one processor, by executing the stored computer program instructions, is configured to: receive a training program and list of subroutines labeled in a plurality of categories, learn an identification strategy of how to identify the categories based on the received subroutines and labels, automatically label new subroutines in a function call graph based on the learned identification strategy, and apply a probabilistic approach to identify at least one subroutine as potentially indicative of malware. 18. The apparatus of claim 17, wherein the at least one processor is further configured to: provide an indication of the at least one identified subroutine to an analyst for further analysis. 19. The apparatus of claim 17, wherein the at least one processor is further configured to: label each subroutine as file I/O, process/thread, network, GUI, registry, and/or exploit. 20. The apparatus of claim 17, wherein the at least one processor is further configured to: use a multiview approach to construct a subroutine kernel matrix for use in the automatic labeling, wherein different views of the multiview approach comprise instructions contained within each subroutine, Application Programming Interface (API) calls contained within each subroutine, and neighbor information for each subroutine.
An automated malware identification and reverse engineering tool is provided. Subroutine categories may be learned by machine learning. A program may then be reverse-engineered and classified, and subroutines that are potentially indicative of malware may be identified. These subroutines may be reviewed by a reverse engineer to determine whether the program is malware in a more directed and efficient manner.1. A computer-implemented method, comprising: automatically labeling each subroutine in a program, by a computing system, in a function call graph; applying a probabilistic approach, by the computing system, to identify at least one subroutine as potentially indicative of malware; and providing an indication of the at least one identified subroutine, by the computing system, to an analyst for further analysis. 2. The computer-implemented method of claim 1, wherein the probabilistic approach further comprises: modeling subroutine labels, by the computing system, using a Support Vector Machine (SVM) or Gaussian process. 3. The computer-implemented method of claim 1, wherein the automatic labeling of each subroutine further comprises: labeling each subroutine, by the computing system, as file I/O, process/thread, network, GUI, registry, and/or exploit. 4. The computer-implemented method of claim 1, wherein the automatic labeling of each subroutine further comprises: using a multiview approach, by the computing system, to construct a subroutine kernel matrix for use in the automatic labeling. 5. The computer-implemented method of claim 4, wherein different views of the multiview approach comprise instructions contained within each subroutine, Application Programming Interface (API) calls contained within each subroutine, and neighbor information for each subroutine. 6. The computer-implemented method of claim 5, wherein any combination of, API calls, neighbor information, and/or API calls is used for classification of each subroutine. 7. The computer-implemented method of claim 1, wherein the automatic labeling further comprises: using of neighborhood information, by the computing system, to determine subroutine function, with an assumption that neighboring subroutines of a subroutine x are likely to perform a similar function to neighboring subroutines of a subroutine y, given that x and y have a same label. 8. The computer-implemented method of claim 1, further comprising: receiving a training program and a list of subroutines labeled in a plurality of categories, by the computing system; and learning an identification strategy of how to identify the categories based on the received list of subroutines and labels, by the computing system, wherein the automatic labeling of each subroutine is based on the learned identification strategy. 9. The computer-implemented method of claim 8, wherein the subroutines are modeled as a Markov chain with the categories as nodes of a Markov chain graph. 10. The computer-implemented method of claim 1, wherein in the function call graph, edge weights for edges originating at a vertex vi are required to sum to 1, such that Σi→jeij=1. 11. The computer-implemented method of claim 1, wherein an n×n (n=|V|) adjacency matrix is used to represent the function call graph, where for each entry aij in the matrix, aij=eij. 12. A computer program embodied on a non-transitory computer-readable medium, the program configured to cause at least one processor to: receive a training program and list of subroutines labeled in a plurality of categories; learn an identification strategy of how to identify the categories based on the received subroutines and labels; and label new subroutines based on the learned identification strategy. 13. The computer program of claim 12, the program further configured to cause the at least one processor to: apply a probabilistic approach to identify at least one subroutine as potentially indicative of malware; and provide an indication of the at least one identified subroutine, by the computing system, to an analyst for further analysis. 14. The computer program of claim 13, wherein in the function call graph, edge weights for edges originating at a vertex vi are required to sum to 1, such that Σi→jeij=1. 15. The computer program of claim 13, wherein an n×n (n=|V|) adjacency matrix is used to represent the function call graph, where for each entry aij in the matrix, aij=eij. 16. The computer program of claim 12, wherein the subroutines are modeled as a Markov chain with the categories as nodes of a Markov chain graph. 17. An apparatus, comprising: memory storing computer program instructions; and at least one processor configured to execute the stored computer program instructions, wherein the at least one processor, by executing the stored computer program instructions, is configured to: receive a training program and list of subroutines labeled in a plurality of categories, learn an identification strategy of how to identify the categories based on the received subroutines and labels, automatically label new subroutines in a function call graph based on the learned identification strategy, and apply a probabilistic approach to identify at least one subroutine as potentially indicative of malware. 18. The apparatus of claim 17, wherein the at least one processor is further configured to: provide an indication of the at least one identified subroutine to an analyst for further analysis. 19. The apparatus of claim 17, wherein the at least one processor is further configured to: label each subroutine as file I/O, process/thread, network, GUI, registry, and/or exploit. 20. The apparatus of claim 17, wherein the at least one processor is further configured to: use a multiview approach to construct a subroutine kernel matrix for use in the automatic labeling, wherein different views of the multiview approach comprise instructions contained within each subroutine, Application Programming Interface (API) calls contained within each subroutine, and neighbor information for each subroutine.
2,400
7,371
7,371
14,100,738
2,449
A first server includes a processor and a memory accessible to the processor. The memory bears instructions executable by the processor to determine that a server is present that has not had settings other than at most default settings applied to a basic input output system (BIOS) executable by the server to boot the server. The instructions are also executable by the processor to, based at least in part on a determination that the server is the same model of server as the apparatus, has the same BIOS version as the apparatus, and/or has the same baseboard management controller (BMC) version as the apparatus, facilitate over a peer to peer server network at least some settings in the apparatus to be provisioned to the server to establish the at least some settings in the server.
1. An apparatus, comprising: a processor; and a memory accessible to the processor and bearing instructions executable by the processor to: determine that a new computer system is present that has not had settings other than at most default settings applied to a basic input output system (BIOS) executable by the new computer system to boot the new computer system; based at least in part on a determination that the new computer system is the same model of computer as the apparatus, has the same BIOS version as the apparatus, and has the same baseboard management controller (BMC) version as the apparatus, facilitate at least some settings in the apparatus to be provisioned to the new computer system to establish the at least some settings in the new computer system. 2. The apparatus of claim 1, wherein the at least some settings include BIOS settings. 3. The apparatus of claim 1, the instructions are further executable by the processor to facilitate at least some settings in the apparatus to be provisioned to the new computer system responsive to a determination that the new computer system has the same hard disk drive storage capacity as the apparatus. 4. The apparatus of claim 1, the instructions are further executable by the processor to facilitate at least some settings in the apparatus to be provisioned to the new computer system by accepting a pull request from the new computer system for the settings. 5. The apparatus of claim 1, the instructions are further executable by the processor to facilitate at least some settings in the apparatus to be provisioned to the new computer system by sending the settings to the new computer system without a request for the settings from the new computer system. 6. The apparatus of claim 1, wherein the apparatus and the new computer system communicate peer-to-peer with each other. 7. The apparatus of claim 1, the instructions are further executable by the processor to encapsulate the settings in extensible markup language (XML) and provide the settings in XML to the new computer system such that the new computer system can omit establishing settings it will not use. 8. A method, comprising: responsive to a new computer system (NCS) establishing communication with a peer-to-peer network, determining whether an existing computer system (ECS) can provide boot settings to the NCS; and responsive to a determination that the ECS can provide the boot settings to the NCS, making the boot settings available to the ECS from the NCS. 9. The method of claim 8, wherein the boot settings are basic input output system (BIOS) settings. 10. The method of claim 8, comprising: determining that the NCS has not had settings other than at most default settings applied to a basic input output system (BIOS); and based at least in part on determining that the NCS is the same model of computer as the ECS, has the same BIOS version as the ECS, and has the same baseboard management controller (BMC) version as the ECS, making the boot settings available to the ECS from the NCS. 11. The method of claim 8, comprising making the boot settings available to the ECS from the NCS responsive to a determination that the NCS has the same hard disk drive storage capacity as the ECS. 12. The method of claim 8, comprising making the boot settings available to the ECS from the NCS by accepting a pull request from the NCS for the settings. 13. The method of claim 8, comprising making the boot settings available to the ECS from the NCS by sending the settings to the NCS without a request for the settings from the NCS. 14. The method of claim 8, comprising encapsulating the settings in extensible markup language (XML) and providing the settings in XML to the NCS such that the NCS can omit establishing settings it will not use. 15. A system, comprising: a processor; and a memory accessible to the processor and bearing instructions executable by the processor to: establish communication with an apparatus over a peer to peer network; automatically receive, from a baseboard management controller (BMC) of the apparatus, boot settings; and automatically establish the boot settings in the system. 16. The system of claim 15, wherein the system is the same model of server as the apparatus, has the same BIOS version as the apparatus, and has the same BMC version as the apparatus. 17. The system of claim 15, wherein the instructions are further executable by the processor to initiate a pull request to the apparatus for the settings. 18. The system of claim 15, wherein the instructions are further executable by the processor to receive the settings from the apparatus without requesting the settings from the apparatus. 19. The system of claim 15, wherein the apparatus and the system communicate peer-to-peer with each other. 20. The system of claim 15, wherein the instructions are further executable by the processor to receive the settings in extensible markup language (XML) and to omit establishing settings in XML it will not use. 21. A computer readable storage medium that is not a carrier wave, the computer readable storage medium bearing instructions executable by the processor to: establish communication with a first server over a peer to peer server network; automatically receive, from a baseboard management controller (BMC) of the first server, boot settings; and apply the boot settings to a second server that communicates over the peer to peer server network.
A first server includes a processor and a memory accessible to the processor. The memory bears instructions executable by the processor to determine that a server is present that has not had settings other than at most default settings applied to a basic input output system (BIOS) executable by the server to boot the server. The instructions are also executable by the processor to, based at least in part on a determination that the server is the same model of server as the apparatus, has the same BIOS version as the apparatus, and/or has the same baseboard management controller (BMC) version as the apparatus, facilitate over a peer to peer server network at least some settings in the apparatus to be provisioned to the server to establish the at least some settings in the server.1. An apparatus, comprising: a processor; and a memory accessible to the processor and bearing instructions executable by the processor to: determine that a new computer system is present that has not had settings other than at most default settings applied to a basic input output system (BIOS) executable by the new computer system to boot the new computer system; based at least in part on a determination that the new computer system is the same model of computer as the apparatus, has the same BIOS version as the apparatus, and has the same baseboard management controller (BMC) version as the apparatus, facilitate at least some settings in the apparatus to be provisioned to the new computer system to establish the at least some settings in the new computer system. 2. The apparatus of claim 1, wherein the at least some settings include BIOS settings. 3. The apparatus of claim 1, the instructions are further executable by the processor to facilitate at least some settings in the apparatus to be provisioned to the new computer system responsive to a determination that the new computer system has the same hard disk drive storage capacity as the apparatus. 4. The apparatus of claim 1, the instructions are further executable by the processor to facilitate at least some settings in the apparatus to be provisioned to the new computer system by accepting a pull request from the new computer system for the settings. 5. The apparatus of claim 1, the instructions are further executable by the processor to facilitate at least some settings in the apparatus to be provisioned to the new computer system by sending the settings to the new computer system without a request for the settings from the new computer system. 6. The apparatus of claim 1, wherein the apparatus and the new computer system communicate peer-to-peer with each other. 7. The apparatus of claim 1, the instructions are further executable by the processor to encapsulate the settings in extensible markup language (XML) and provide the settings in XML to the new computer system such that the new computer system can omit establishing settings it will not use. 8. A method, comprising: responsive to a new computer system (NCS) establishing communication with a peer-to-peer network, determining whether an existing computer system (ECS) can provide boot settings to the NCS; and responsive to a determination that the ECS can provide the boot settings to the NCS, making the boot settings available to the ECS from the NCS. 9. The method of claim 8, wherein the boot settings are basic input output system (BIOS) settings. 10. The method of claim 8, comprising: determining that the NCS has not had settings other than at most default settings applied to a basic input output system (BIOS); and based at least in part on determining that the NCS is the same model of computer as the ECS, has the same BIOS version as the ECS, and has the same baseboard management controller (BMC) version as the ECS, making the boot settings available to the ECS from the NCS. 11. The method of claim 8, comprising making the boot settings available to the ECS from the NCS responsive to a determination that the NCS has the same hard disk drive storage capacity as the ECS. 12. The method of claim 8, comprising making the boot settings available to the ECS from the NCS by accepting a pull request from the NCS for the settings. 13. The method of claim 8, comprising making the boot settings available to the ECS from the NCS by sending the settings to the NCS without a request for the settings from the NCS. 14. The method of claim 8, comprising encapsulating the settings in extensible markup language (XML) and providing the settings in XML to the NCS such that the NCS can omit establishing settings it will not use. 15. A system, comprising: a processor; and a memory accessible to the processor and bearing instructions executable by the processor to: establish communication with an apparatus over a peer to peer network; automatically receive, from a baseboard management controller (BMC) of the apparatus, boot settings; and automatically establish the boot settings in the system. 16. The system of claim 15, wherein the system is the same model of server as the apparatus, has the same BIOS version as the apparatus, and has the same BMC version as the apparatus. 17. The system of claim 15, wherein the instructions are further executable by the processor to initiate a pull request to the apparatus for the settings. 18. The system of claim 15, wherein the instructions are further executable by the processor to receive the settings from the apparatus without requesting the settings from the apparatus. 19. The system of claim 15, wherein the apparatus and the system communicate peer-to-peer with each other. 20. The system of claim 15, wherein the instructions are further executable by the processor to receive the settings in extensible markup language (XML) and to omit establishing settings in XML it will not use. 21. A computer readable storage medium that is not a carrier wave, the computer readable storage medium bearing instructions executable by the processor to: establish communication with a first server over a peer to peer server network; automatically receive, from a baseboard management controller (BMC) of the first server, boot settings; and apply the boot settings to a second server that communicates over the peer to peer server network.
2,400
7,372
7,372
14,476,230
2,457
Video data signals are encoded such that the encoded video data signal comprises at least a primary and at least a secondary video data signal. The primary and secondary video data signal are jointly compressed. The primary video data signal is compressed in a self-contained manner, and the secondary video data signal is compressed using data from the primary video data signal. The jointly compressed video data signal is split into separate bitstreams, at least a primary bitstream comprising data for the primary video data signal and at least a secondary bitstream comprising data for the secondary video data signal, whereafter the primary and secondary bitstreams are multiplexed into a multiplexed signal, and the primary and secondary signals are provided with separate codes.
1. A method for encoding a video data signal including a first signal and a second signal, the method comprising act of: interleaving frames of the first signal with frames of the second signal to form a combined signal; encoding by an encoder the combined signal to form an encoded combined signal, wherein the encoding act encodes the first signal in a self-contained manner without using information from the second signal and encodes the second signal using information from the first signal; splitting the encoded signal into separate primary bitstreams including a first bitstream including data for the first signal and a second bitstream including data for the second signal; and providing the first bitstream with a first code to form a first coded bitstream; and providing the second bitstream with a second code to form a second coded bitstream, wherein the second code is different from the first code. 2. The method of claim 1, further comprising an act of outputting the first coded bitstream and the second coded bitstream. 3. The method of claim 1, wherein the first coded bitstream comprises data for frames of one of a plurality of views of a three-dimensional (3D) video signal, and the second coded bitstream comprises data for frames of a different view of the plurality of views of the 3D video signal. 4. The method of claim 1, wherein the first coded bitstream comprises data for low frequency frames, and the second coded bitstream comprises higher frequency frames. 5. The method of claim 1, wherein the first coded bitstream comprises data for a base layer, and the second coded bitstream comprises the video data for an enhancement layer. 6. The method of claim 1, wherein the encoding act compresses the first signal with a lower quantization factor than the second signal. 7. The method of claim 1, further comprising an act of regularly interchanging frames of the first signal and the second signal. 8. A system for encoding a video data signal including a first signal and a second signal, the method comprising act of: an interleave configured to interleave the first signal and the second signal to form a combined signal; an encoder configured to encode the combined signal to form an encoded combined signal, wherein the encoding act encodes the first signal in a self-contained manner without using information from the second signal and encodes the second signal using information from the first signal; a splitter configured to split the encoded signal into separate primary bitstreams including a first bitstream including data for the first signal and a second bitstream including data for the second signal; and a multiplexer configured to provide the first bitstream with a first code to form a first coded bitstream, and to provide the second bitstream with a second code to form a second coded bitstream, wherein the second code is different from the first code. 9. The system of claim 8, wherein the combined signal comprise interleaved primary and secondary pluralities of frames of left and right stereo views, respectively. 10. The method of claim 8, wherein the interleaver is further configured to interleave frames of more than two views from more than the first signal and the second signal. 11. The system of claim 8, wherein the first signal and the second signal are received from a high frequency camera. 12. The system of claim 8, further comprising a recording device for recording the first bitstream and the second bitstream. 13. A non-transitory computer readable medium comprising computer instructions which, when executed by a processor, configure the processor to perform a method of encoding a video signal including a first signal and a second signal, the method comprising act of: interleaving the first signal and the second signal to form a combined signal; encoding by an encoder the combined signal to form an encoded combined signal, wherein the encoding act encodes the first signal in a self-contained manner without using information from the second signal and encodes the second signal using information from the first signal; splitting the encoded signal into separate primary bitstreams including a first bitstream including data for the first signal and a second bitstream including data for the second signal; and providing the first bitstream with a first code to form a first coded bitstream; and providing the second bitstream with a second code to form a second coded bitstream, wherein the second code is different from the first code. 14. A method of decoding a video signals, the method comprising act of: receiving a first bitstream having a first code and a second bitstream having a second code which is different from the first code, the first bitstream and the second bitstream having been split from a coded signal of a combined signal formed by interleaving frames of first and second signals, wherein the first signal has been encoded in a self-contained and the second signal has been encoded using the frames of the first signal; demultiplexing the first bitstream and the second bitstream into primary and secondary video signals; merging the primary and secondary video signals into a merged signal; and decompressing the merged signal such that in decompression of the primary video signal only data from the primary video signal is used, and in decompression of the secondary video signal, data of the primary video signal is used. 15. The method of claim 14, wherein the merged signal includes a plurality of interleaved frames, and after decompressing the frames are de-interleaved to provide two or more views. 16. The method of claim 14, wherein the primary and secondary video signals form a left and a right view. 17. The method of claim 16, wherein the left and right views each include more than one view of a multi-view image. 18. The method of claim 14, wherein the primary video signal comprises data on a base layer and the secondary video signal comprises data on an enhancement layer. 19. A system for decoding video signals, the system comprising: a receiver configured to receive a first bitstream having a first code and a second bitstream having a second code which is different from the first code, the first bitstream and the second bitstream having been split from a coded signal of a combined signal formed by interleaving frames of first and second signals, wherein the first signal has been encoded in a self-contained and the second signal has been encoded using the frames of the first signal; a demultiplexer configured to demultiplex the first bitstream and the second bitstream into primary and secondary video signals; a merger configured to merge the primary and secondary video signals into a merged signal; and a decoder configured to decompress the merged signal such that in decompression of the primary video signal only data from the primary video signal is used, and in decompression of the secondary video signal, data of the primary video signal is used. 20. The system of claim 19, wherein the merged signal forms an interleaved plurality of frames and the system further comprises a de-interleaver configured to de-interleave, after decompressing, the interleaved plurality of frames to provide two or more views. 21. The system of in claim 20, further comprising a display device for displaying the two or more views. 22. A non-transitory computer readable medium comprising computer instructions which, when executed by a processor, configure the processor to perform a method of decoding video signals, the method comprising acts of: receiving a first bitstream having a first code and a second bitstream having a second code which is different from the first code, the first bitstream and the second bitstream having been split from a coded signal of a combined signal formed by interleaving frames of first and second signals, wherein the first signal has been encoded in a self-contained and the second signal has been encoded using the frames of the first signal; demultiplexing the first bitstream and the second bitstream into primary and secondary video signals; merging the primary and secondary video signals into a merged signal; and decompressing the merged signal such that in decompression of the primary video signal only data from the primary video signal is used, and in decompression of the secondary video signal, data of the primary video signal is used.
Video data signals are encoded such that the encoded video data signal comprises at least a primary and at least a secondary video data signal. The primary and secondary video data signal are jointly compressed. The primary video data signal is compressed in a self-contained manner, and the secondary video data signal is compressed using data from the primary video data signal. The jointly compressed video data signal is split into separate bitstreams, at least a primary bitstream comprising data for the primary video data signal and at least a secondary bitstream comprising data for the secondary video data signal, whereafter the primary and secondary bitstreams are multiplexed into a multiplexed signal, and the primary and secondary signals are provided with separate codes.1. A method for encoding a video data signal including a first signal and a second signal, the method comprising act of: interleaving frames of the first signal with frames of the second signal to form a combined signal; encoding by an encoder the combined signal to form an encoded combined signal, wherein the encoding act encodes the first signal in a self-contained manner without using information from the second signal and encodes the second signal using information from the first signal; splitting the encoded signal into separate primary bitstreams including a first bitstream including data for the first signal and a second bitstream including data for the second signal; and providing the first bitstream with a first code to form a first coded bitstream; and providing the second bitstream with a second code to form a second coded bitstream, wherein the second code is different from the first code. 2. The method of claim 1, further comprising an act of outputting the first coded bitstream and the second coded bitstream. 3. The method of claim 1, wherein the first coded bitstream comprises data for frames of one of a plurality of views of a three-dimensional (3D) video signal, and the second coded bitstream comprises data for frames of a different view of the plurality of views of the 3D video signal. 4. The method of claim 1, wherein the first coded bitstream comprises data for low frequency frames, and the second coded bitstream comprises higher frequency frames. 5. The method of claim 1, wherein the first coded bitstream comprises data for a base layer, and the second coded bitstream comprises the video data for an enhancement layer. 6. The method of claim 1, wherein the encoding act compresses the first signal with a lower quantization factor than the second signal. 7. The method of claim 1, further comprising an act of regularly interchanging frames of the first signal and the second signal. 8. A system for encoding a video data signal including a first signal and a second signal, the method comprising act of: an interleave configured to interleave the first signal and the second signal to form a combined signal; an encoder configured to encode the combined signal to form an encoded combined signal, wherein the encoding act encodes the first signal in a self-contained manner without using information from the second signal and encodes the second signal using information from the first signal; a splitter configured to split the encoded signal into separate primary bitstreams including a first bitstream including data for the first signal and a second bitstream including data for the second signal; and a multiplexer configured to provide the first bitstream with a first code to form a first coded bitstream, and to provide the second bitstream with a second code to form a second coded bitstream, wherein the second code is different from the first code. 9. The system of claim 8, wherein the combined signal comprise interleaved primary and secondary pluralities of frames of left and right stereo views, respectively. 10. The method of claim 8, wherein the interleaver is further configured to interleave frames of more than two views from more than the first signal and the second signal. 11. The system of claim 8, wherein the first signal and the second signal are received from a high frequency camera. 12. The system of claim 8, further comprising a recording device for recording the first bitstream and the second bitstream. 13. A non-transitory computer readable medium comprising computer instructions which, when executed by a processor, configure the processor to perform a method of encoding a video signal including a first signal and a second signal, the method comprising act of: interleaving the first signal and the second signal to form a combined signal; encoding by an encoder the combined signal to form an encoded combined signal, wherein the encoding act encodes the first signal in a self-contained manner without using information from the second signal and encodes the second signal using information from the first signal; splitting the encoded signal into separate primary bitstreams including a first bitstream including data for the first signal and a second bitstream including data for the second signal; and providing the first bitstream with a first code to form a first coded bitstream; and providing the second bitstream with a second code to form a second coded bitstream, wherein the second code is different from the first code. 14. A method of decoding a video signals, the method comprising act of: receiving a first bitstream having a first code and a second bitstream having a second code which is different from the first code, the first bitstream and the second bitstream having been split from a coded signal of a combined signal formed by interleaving frames of first and second signals, wherein the first signal has been encoded in a self-contained and the second signal has been encoded using the frames of the first signal; demultiplexing the first bitstream and the second bitstream into primary and secondary video signals; merging the primary and secondary video signals into a merged signal; and decompressing the merged signal such that in decompression of the primary video signal only data from the primary video signal is used, and in decompression of the secondary video signal, data of the primary video signal is used. 15. The method of claim 14, wherein the merged signal includes a plurality of interleaved frames, and after decompressing the frames are de-interleaved to provide two or more views. 16. The method of claim 14, wherein the primary and secondary video signals form a left and a right view. 17. The method of claim 16, wherein the left and right views each include more than one view of a multi-view image. 18. The method of claim 14, wherein the primary video signal comprises data on a base layer and the secondary video signal comprises data on an enhancement layer. 19. A system for decoding video signals, the system comprising: a receiver configured to receive a first bitstream having a first code and a second bitstream having a second code which is different from the first code, the first bitstream and the second bitstream having been split from a coded signal of a combined signal formed by interleaving frames of first and second signals, wherein the first signal has been encoded in a self-contained and the second signal has been encoded using the frames of the first signal; a demultiplexer configured to demultiplex the first bitstream and the second bitstream into primary and secondary video signals; a merger configured to merge the primary and secondary video signals into a merged signal; and a decoder configured to decompress the merged signal such that in decompression of the primary video signal only data from the primary video signal is used, and in decompression of the secondary video signal, data of the primary video signal is used. 20. The system of claim 19, wherein the merged signal forms an interleaved plurality of frames and the system further comprises a de-interleaver configured to de-interleave, after decompressing, the interleaved plurality of frames to provide two or more views. 21. The system of in claim 20, further comprising a display device for displaying the two or more views. 22. A non-transitory computer readable medium comprising computer instructions which, when executed by a processor, configure the processor to perform a method of decoding video signals, the method comprising acts of: receiving a first bitstream having a first code and a second bitstream having a second code which is different from the first code, the first bitstream and the second bitstream having been split from a coded signal of a combined signal formed by interleaving frames of first and second signals, wherein the first signal has been encoded in a self-contained and the second signal has been encoded using the frames of the first signal; demultiplexing the first bitstream and the second bitstream into primary and secondary video signals; merging the primary and secondary video signals into a merged signal; and decompressing the merged signal such that in decompression of the primary video signal only data from the primary video signal is used, and in decompression of the secondary video signal, data of the primary video signal is used.
2,400
7,373
7,373
13,302,051
2,457
Novel tools and techniques to give a customer greater visibility into network performance and/or utilization, particularly with respect to the customer's broadband connection to a provider's access network (and/or the Internet more generally). Some tools can track the amount of bandwidth assigned to each class of service on a customer's broadband connection, and/or the bandwidth provided to each of the devices on the customer's premises network. These values can be used as inputs to a state machine that governs the use of the broadband connection.
1. A customer service point in communication with an Internet service provider access network and a customer device the customer service point comprising: a first communication interface; a second communication interface; one or more processors in communication with the first and second communication interfaces; and a computer readable medium in communication with the one or more processors, the computer readable medium having encoded thereon a set of instructions executable by the computer system to perform one or more operations, the set of instructions comprising: instructions for communicating with the Internet via the first communication interface; instructions for communicating with the customer device via the second communication interface; instructions for maintaining a class of service state for a connection between the customer device and the Internet; instructions for receiving, from the customer, configuration information for configuring the class of service state; instructions for modifying the class of service state in response to receiving the configuration information; instructions for determining one or more network performance statistics pertaining to network performance between the customer device and at least one other network point; and instructions for providing, to the customer, the one or more network performance statistics. 2. The customer service point of claim 1, wherein the customer service point is implemented within a residential gateway located at a subscriber premises. 3. The customer service point of claim 1, wherein the class of service state comprises network utilization information. 4. The customer service point of claim 1, wherein the class of service state comprises network capacity information. 5. The customer service point of claim 1, wherein the class of service state comprises class of service associations with one or more customer applications. 6. The customer service point of claim 1, wherein the class of service state comprises an amount of bandwidth assigned to each of a plurality of classes of service. 7. The customer service point of claim 1, wherein the customer service point is incorporated within a device located in the access network. 8. The customer service point of claim 1, wherein the at least one other network point comprises an Internet drain between the access network and the Internet. 9. The customer service point of claim 1, wherein the at least one other network point comprises a device within the access network. 10. The customer service point of claim 9, wherein the device within the access network is an edge router. 11. The customer service point of claim 10, wherein the edge router is adjacent an Internet drain. 12. The customer service point of claim 1, wherein the set of instructions further comprises instructions for providing a graphical user interface for interaction with the customer. 13. The customer service point of claim 12, wherein the instructions for providing a graphical user interface comprise instructions for providing the graphical user interface via a web page served by the customer service point. 14. The customer service point of claim 12, wherein the instructions for receiving configuration information for configuring the class of service state comprise instructions for receiving the configuration information via the graphical user interface. 15. The customer service point of claim 14, wherein the instructions for receiving the configuration information via the graphical user interface comprise: instructions for displaying, with the graphical user interface, a graphical representation of the class of service state; and instructions for receiving, via the graphical user interface, user input for modifying the class of service state, wherein the user input comprises manipulation of one or more graphical objects corresponding to the class of service state. 16. The customer service point of claim 15, wherein the graphical representation of the class of service state comprises a first plurality of graphical objects representing classes of service and a second plurality of graphical objects representing types of network traffic, and wherein the user input comprises dragging one of the second plurality of graphical objects into one of the first plurality of graphical objects. 17. The customer service point of claim 12, wherein the instructions for providing the one or more network performance statistics comprise instructions for displaying the one or more network performance statistics with the graphical user interface. 18. The customer service point of claim 1, wherein at least one of the communication interfaces is a wireless communication interface. 19. The customer service point of claim 1, wherein the instructions for receiving configuration information comprise instructions for receiving, from an application on the client device or on a computer in communication with the client device, a request for service priority. 20. The customer service point of claim 1, wherein the set of instructions further comprises: instructions for generating an alarm in the event of a packet loss condition. 21. The customer service point of claim 1, wherein the set of instructions further comprises: instructions for providing, to the customer, a busy indicator if network conditions indicate that insufficient bandwidth exists to satisfy a requested network session. 22. The customer service point of claim 1, wherein the instructions for determining one or more network performance statistics comprise instructions for receiving network performance information from one or more network devices. 23. The customer service point of claim 22, wherein the one or more network devices is a plurality of network devices comprising a first network device at a customer end of the access network and a second network device at an Internet end of the access network. 24. The customer service point of claim 1, wherein the one or more network performance statistics comprise a measurement of network latency. 25. The customer service point of claim 1, wherein the one or more network performance statistics comprise a measurement of network throughput. 26. The customer service point of claim 25, wherein the measurement of network throughput comprises at least one measurement selected from the group consisting of accepted bits per second and rejected bits per second. 27. The customer service point of claim 1, wherein the one or more network performance statistics comprise a measurement network throughput delivered to a residential gateway. 28. The customer service point of claim 1, further comprising: instructions for providing an application programming interface (“API”); wherein: the instructions for receiving configuration information comprise instructions for receiving configuration information from the customer device via the API; and the instructions for providing the one or more network performance statistics comprise instructions for provide the one or more network performance statistics to the customer device via the API. 29. A method, comprising: maintaining, at a customer service point comprising a processor, a first communication interface, and a second communication interface, a class of service state for a connection between a customer device in communication with the first communication interface and the Internet in communication with the second communication interface; receiving, from the customer, configuration information for configuring the class of service state; and modifying the class of service state in response to receiving the configuration information. 30. An apparatus, comprising: a computer readable medium having encoded thereon a set of instructions for causing a customer service point to perform one or more operations, the customer service point comprising a processor, a first communication interface, and a second communication interface, a customer device being communication with the first communication interface and the Internet being in communication with the second communication interface, the set of instructions being executable by the processor and comprising: instructions for determining one or more network performance statistics pertaining to network performance between the customer device and at least one other network point; and instructions for providing, to the customer, the one or more network performance statistics.
Novel tools and techniques to give a customer greater visibility into network performance and/or utilization, particularly with respect to the customer's broadband connection to a provider's access network (and/or the Internet more generally). Some tools can track the amount of bandwidth assigned to each class of service on a customer's broadband connection, and/or the bandwidth provided to each of the devices on the customer's premises network. These values can be used as inputs to a state machine that governs the use of the broadband connection.1. A customer service point in communication with an Internet service provider access network and a customer device the customer service point comprising: a first communication interface; a second communication interface; one or more processors in communication with the first and second communication interfaces; and a computer readable medium in communication with the one or more processors, the computer readable medium having encoded thereon a set of instructions executable by the computer system to perform one or more operations, the set of instructions comprising: instructions for communicating with the Internet via the first communication interface; instructions for communicating with the customer device via the second communication interface; instructions for maintaining a class of service state for a connection between the customer device and the Internet; instructions for receiving, from the customer, configuration information for configuring the class of service state; instructions for modifying the class of service state in response to receiving the configuration information; instructions for determining one or more network performance statistics pertaining to network performance between the customer device and at least one other network point; and instructions for providing, to the customer, the one or more network performance statistics. 2. The customer service point of claim 1, wherein the customer service point is implemented within a residential gateway located at a subscriber premises. 3. The customer service point of claim 1, wherein the class of service state comprises network utilization information. 4. The customer service point of claim 1, wherein the class of service state comprises network capacity information. 5. The customer service point of claim 1, wherein the class of service state comprises class of service associations with one or more customer applications. 6. The customer service point of claim 1, wherein the class of service state comprises an amount of bandwidth assigned to each of a plurality of classes of service. 7. The customer service point of claim 1, wherein the customer service point is incorporated within a device located in the access network. 8. The customer service point of claim 1, wherein the at least one other network point comprises an Internet drain between the access network and the Internet. 9. The customer service point of claim 1, wherein the at least one other network point comprises a device within the access network. 10. The customer service point of claim 9, wherein the device within the access network is an edge router. 11. The customer service point of claim 10, wherein the edge router is adjacent an Internet drain. 12. The customer service point of claim 1, wherein the set of instructions further comprises instructions for providing a graphical user interface for interaction with the customer. 13. The customer service point of claim 12, wherein the instructions for providing a graphical user interface comprise instructions for providing the graphical user interface via a web page served by the customer service point. 14. The customer service point of claim 12, wherein the instructions for receiving configuration information for configuring the class of service state comprise instructions for receiving the configuration information via the graphical user interface. 15. The customer service point of claim 14, wherein the instructions for receiving the configuration information via the graphical user interface comprise: instructions for displaying, with the graphical user interface, a graphical representation of the class of service state; and instructions for receiving, via the graphical user interface, user input for modifying the class of service state, wherein the user input comprises manipulation of one or more graphical objects corresponding to the class of service state. 16. The customer service point of claim 15, wherein the graphical representation of the class of service state comprises a first plurality of graphical objects representing classes of service and a second plurality of graphical objects representing types of network traffic, and wherein the user input comprises dragging one of the second plurality of graphical objects into one of the first plurality of graphical objects. 17. The customer service point of claim 12, wherein the instructions for providing the one or more network performance statistics comprise instructions for displaying the one or more network performance statistics with the graphical user interface. 18. The customer service point of claim 1, wherein at least one of the communication interfaces is a wireless communication interface. 19. The customer service point of claim 1, wherein the instructions for receiving configuration information comprise instructions for receiving, from an application on the client device or on a computer in communication with the client device, a request for service priority. 20. The customer service point of claim 1, wherein the set of instructions further comprises: instructions for generating an alarm in the event of a packet loss condition. 21. The customer service point of claim 1, wherein the set of instructions further comprises: instructions for providing, to the customer, a busy indicator if network conditions indicate that insufficient bandwidth exists to satisfy a requested network session. 22. The customer service point of claim 1, wherein the instructions for determining one or more network performance statistics comprise instructions for receiving network performance information from one or more network devices. 23. The customer service point of claim 22, wherein the one or more network devices is a plurality of network devices comprising a first network device at a customer end of the access network and a second network device at an Internet end of the access network. 24. The customer service point of claim 1, wherein the one or more network performance statistics comprise a measurement of network latency. 25. The customer service point of claim 1, wherein the one or more network performance statistics comprise a measurement of network throughput. 26. The customer service point of claim 25, wherein the measurement of network throughput comprises at least one measurement selected from the group consisting of accepted bits per second and rejected bits per second. 27. The customer service point of claim 1, wherein the one or more network performance statistics comprise a measurement network throughput delivered to a residential gateway. 28. The customer service point of claim 1, further comprising: instructions for providing an application programming interface (“API”); wherein: the instructions for receiving configuration information comprise instructions for receiving configuration information from the customer device via the API; and the instructions for providing the one or more network performance statistics comprise instructions for provide the one or more network performance statistics to the customer device via the API. 29. A method, comprising: maintaining, at a customer service point comprising a processor, a first communication interface, and a second communication interface, a class of service state for a connection between a customer device in communication with the first communication interface and the Internet in communication with the second communication interface; receiving, from the customer, configuration information for configuring the class of service state; and modifying the class of service state in response to receiving the configuration information. 30. An apparatus, comprising: a computer readable medium having encoded thereon a set of instructions for causing a customer service point to perform one or more operations, the customer service point comprising a processor, a first communication interface, and a second communication interface, a customer device being communication with the first communication interface and the Internet being in communication with the second communication interface, the set of instructions being executable by the processor and comprising: instructions for determining one or more network performance statistics pertaining to network performance between the customer device and at least one other network point; and instructions for providing, to the customer, the one or more network performance statistics.
2,400
7,374
7,374
15,144,389
2,451
A method, apparatus, system, and computer readable storage medium provide the ability to identify an internet connected household (ICH). An Internet Protocol (IP) address is received at an Internet entity. Determinations are made regarding whether device activity from the IP address does not exceed a defined activity threshold and whether an IP assignment age for the IP address is greater than a defined threshold age. Based on the determinations, the IP address can be identified as belonging to an ICH or not.
1. A system for identifying an internet connected household (ICH), comprising: a computer comprising a processor and an Internet connection; an Internet entity executed by the processor on the computer: receiving an Internet Protocol (IP) address via the Internet connection; determining a device activity status based on whether device activity from the IP address does not exceed a defined activity threshold; determining an IP assignment age status based on whether an IP assignment age for the IP address is greater than a defined threshold age; and based on the device activity status and the IP assignment age status, determining whether the IP address is associated with an ICH. 2. The system of claim 1, wherein: the IP address is attached to a Hypertext Transfer Protocol (HTTP) request received by the Internet entity; and the Internet entity has a web server. 3. The system of claim 1, wherein the Internet entity: determines a residential internet service status based on whether the IP address belongs to an Internet Service Provider (ISP) that provides residential internet service; and wherein, the Internet entity determines whether the IP address is associated with an ICH further based on the residential internet service status. 4. The system of claim 3, wherein the Internet entity determines the residential internet service status by: determining, based on information obtained from a regional internet registry (RIR), the ISP that has been assigned an IP range block that includes the IP address; and classifying the ISP as providing residential internet service based on publicly available information regarding the ISP. 5. The system of claim 3, wherein the Internet entity determines the residential internet service status by: receiving an additional IP address at the Internet entity; determining whether the additional IP address belongs to a second ISP that does not provide residential internet service; and filtering out the additional IP address from further processing. 6. The system of claim 1, wherein the Internet entity determines the device activity status by: monitoring activity from the IP address over a defined period of time; determining the defined activity threshold for a level of activity for internet connected households; and determining that the level of activity from the IP address does not exceed the defined activity threshold. 7. The system of claim 1, wherein the Internet entity determines the device activity status by: receiving an additional IP address at the Internet entity; and determining that device activity from the additional IP address is below the defined activity threshold; determining that the additional IP address is associated with a non-household based on the device activity; and filtering out the non-household and the additional IP address from further processing. 8. The system of claim 1, wherein the Internet entity determines the IP assignment age status by: observing a number of IP addresses from an interne service provider (ISP) over a defined period of time; calculating the IP assignment age for the IP address by monitoring the number of IP addresses to identify if and when one or more of the number of IP addresses have been reassigned such that the one or more of the number of IP addresses are connected; and determining that the IP assignment age is greater than the defined threshold age. 9. The system of claim 8, wherein two IP addresses belonging to the ISP are connected when a user has generated activity from both of the two IP addresses. 10. The system of claim 1, wherein the defined threshold age is a configurable number of days. 11. The system of claim 1, wherein: based on the determining steps, the Internet entity measures the ICH's exposure to content from a specific content owner. 12. The system of claim 1, wherein the Internet entity: creates a data store based on the device activity from the ICH, wherein the data store comprises interests, activity, and actions from a device; and based on the data store, dynamically selects content to be delivered to the device.
A method, apparatus, system, and computer readable storage medium provide the ability to identify an internet connected household (ICH). An Internet Protocol (IP) address is received at an Internet entity. Determinations are made regarding whether device activity from the IP address does not exceed a defined activity threshold and whether an IP assignment age for the IP address is greater than a defined threshold age. Based on the determinations, the IP address can be identified as belonging to an ICH or not.1. A system for identifying an internet connected household (ICH), comprising: a computer comprising a processor and an Internet connection; an Internet entity executed by the processor on the computer: receiving an Internet Protocol (IP) address via the Internet connection; determining a device activity status based on whether device activity from the IP address does not exceed a defined activity threshold; determining an IP assignment age status based on whether an IP assignment age for the IP address is greater than a defined threshold age; and based on the device activity status and the IP assignment age status, determining whether the IP address is associated with an ICH. 2. The system of claim 1, wherein: the IP address is attached to a Hypertext Transfer Protocol (HTTP) request received by the Internet entity; and the Internet entity has a web server. 3. The system of claim 1, wherein the Internet entity: determines a residential internet service status based on whether the IP address belongs to an Internet Service Provider (ISP) that provides residential internet service; and wherein, the Internet entity determines whether the IP address is associated with an ICH further based on the residential internet service status. 4. The system of claim 3, wherein the Internet entity determines the residential internet service status by: determining, based on information obtained from a regional internet registry (RIR), the ISP that has been assigned an IP range block that includes the IP address; and classifying the ISP as providing residential internet service based on publicly available information regarding the ISP. 5. The system of claim 3, wherein the Internet entity determines the residential internet service status by: receiving an additional IP address at the Internet entity; determining whether the additional IP address belongs to a second ISP that does not provide residential internet service; and filtering out the additional IP address from further processing. 6. The system of claim 1, wherein the Internet entity determines the device activity status by: monitoring activity from the IP address over a defined period of time; determining the defined activity threshold for a level of activity for internet connected households; and determining that the level of activity from the IP address does not exceed the defined activity threshold. 7. The system of claim 1, wherein the Internet entity determines the device activity status by: receiving an additional IP address at the Internet entity; and determining that device activity from the additional IP address is below the defined activity threshold; determining that the additional IP address is associated with a non-household based on the device activity; and filtering out the non-household and the additional IP address from further processing. 8. The system of claim 1, wherein the Internet entity determines the IP assignment age status by: observing a number of IP addresses from an interne service provider (ISP) over a defined period of time; calculating the IP assignment age for the IP address by monitoring the number of IP addresses to identify if and when one or more of the number of IP addresses have been reassigned such that the one or more of the number of IP addresses are connected; and determining that the IP assignment age is greater than the defined threshold age. 9. The system of claim 8, wherein two IP addresses belonging to the ISP are connected when a user has generated activity from both of the two IP addresses. 10. The system of claim 1, wherein the defined threshold age is a configurable number of days. 11. The system of claim 1, wherein: based on the determining steps, the Internet entity measures the ICH's exposure to content from a specific content owner. 12. The system of claim 1, wherein the Internet entity: creates a data store based on the device activity from the ICH, wherein the data store comprises interests, activity, and actions from a device; and based on the data store, dynamically selects content to be delivered to the device.
2,400
7,375
7,375
13,803,875
2,485
Systems, methods, and devices for thermal detection. A thermal detection device includes a visual sensor, a thermal sensor (e.g., a thermopile array), a controller, a user interface, a display, and a removable and rechargeable battery pack. The thermal detection device also includes a plurality of additional software and hardware modules configured to perform or execute various functions and operations of the thermal detection device. An output from the visual sensor and an output from the thermal sensor are combined by the controller or the plurality of additional modules to generate a combined image for display on the display.
1. A thermal detection device comprising: an outer housing; a visual camera configured to generate a first signal related to a visual image of a scene; a thermopile array including a plurality of pixels; a first control unit connected to the thermopile array and configured to generate a second signal related to a thermal image of the scene, the second signal associated with a temperature sensed by at least one of the plurality of pixels in the thermopile array, the first control unit positioned within a sub-housing, the sub-housing including at least one metallic side surface; a second control unit electrically connected to the visual camera and the first control unit, the second control unit configured to receive a temperature signal related to a temperature of the thermopile array, and compensate the second signal based on the temperature signal; and a display configured to display the visual image based on the first signal and the thermal image based on the compensated second signal. 2. The thermal detection device of claim 1, wherein a removable and rechargeable battery pack is configured to be inserted into a handle portion of the outer housing for providing power to the thermal detection device. 3. The thermal detection device of claim 1, wherein the second signal is compensated based on a thermal map of the plurality of pixels in the thermopile array. 4. The thermal detection device of claim 1, wherein the thermopile array has a resolution of less than or equal to 160 pixels by 160 pixels. 5. The thermal detection device of claim 4, wherein the thermopile array has a resolution of less than or equal to 64 pixels by 64 pixels. 6. The thermal detection device of claim 1, wherein the thermal detection device does not include a shutter. 7. The thermal detection device of claim 6, wherein one of the first control unit and the second control unit is further configured to access, from memory, a pixel gain value for each of the plurality of pixels within the thermopile array. 8. The thermal detection device of claim 7, wherein one of the first control unit and the second control unit is further configured to calculate new pixel gain values for each of the plurality of pixels within the thermopile array based on the accessed pixel gain values and a condition of the thermal detection device. 9. The thermal detection device of claim 8, wherein the condition of the thermal detection device is the temperature related to the thermopile array. 10. The thermal detection device of claim 6, further comprising a thermocouple operable for making contact temperature measurements. 11. The thermal detection device of claim 1, wherein the sub-housing is positioned substantially within the outer housing. 12. The thermal detection device of claim 11, wherein each side surface of the sub-housing is metallic. 13. The thermal detection device of claim 1, wherein the at least one metallic side surface is made of aluminum. 14. The thermal detection device of claim 1, further comprising a first ambient temperature sensor positioned above the sub-housing, and a second ambient temperature sensor positioned below the sub-housing, the first ambient temperature sensor providing the temperature signal to the second control unit, the second ambient temperature sensor providing a second temperature signal to the second control unit. 15. A thermal detection device comprising: a visual camera; a thermopile array including a plurality of pixels; a rechargeable lithium-based battery pack configured to be inserted into a handle portion of the thermal detection device for providing power to the thermal detection device; a controller including a processor and a memory, the controller configured to receive a first signal from the visual camera related to a visual image of a scene, receive a second signal from the thermopile array related to a thermal image of the scene, the second signal associated with a temperature sensed by at least one of the plurality of pixels in the thermopile array, receive a temperature signal related to a temperature of the thermopile array, and compensate the second signal based on the temperature signal; and a display configured to display the visual image based on the first signal and the thermal image based on the compensated second signal. 16. The thermal detection device of claim 15, wherein the thermal detection device does not include a shutter. 17. The thermal detection device of claim 16, wherein the controller is further configured to access, from memory, a pixel gain value for each of the plurality of pixels within the thermopile array. 18. The thermal detection device of claim 17, wherein the controller is further configured to calculate new pixel gain values for each of the plurality of pixels within the thermopile array based on the accessed pixel gain values and a condition of the thermal detection device. 19. The thermal detection device of claim 18, wherein the condition of the thermal detection device is the temperature related to the thermopile array. 20. The thermal detection device of claim 15, wherein the thermopile array has a resolution of less than or equal to 32 pixels by 32 pixels.
Systems, methods, and devices for thermal detection. A thermal detection device includes a visual sensor, a thermal sensor (e.g., a thermopile array), a controller, a user interface, a display, and a removable and rechargeable battery pack. The thermal detection device also includes a plurality of additional software and hardware modules configured to perform or execute various functions and operations of the thermal detection device. An output from the visual sensor and an output from the thermal sensor are combined by the controller or the plurality of additional modules to generate a combined image for display on the display.1. A thermal detection device comprising: an outer housing; a visual camera configured to generate a first signal related to a visual image of a scene; a thermopile array including a plurality of pixels; a first control unit connected to the thermopile array and configured to generate a second signal related to a thermal image of the scene, the second signal associated with a temperature sensed by at least one of the plurality of pixels in the thermopile array, the first control unit positioned within a sub-housing, the sub-housing including at least one metallic side surface; a second control unit electrically connected to the visual camera and the first control unit, the second control unit configured to receive a temperature signal related to a temperature of the thermopile array, and compensate the second signal based on the temperature signal; and a display configured to display the visual image based on the first signal and the thermal image based on the compensated second signal. 2. The thermal detection device of claim 1, wherein a removable and rechargeable battery pack is configured to be inserted into a handle portion of the outer housing for providing power to the thermal detection device. 3. The thermal detection device of claim 1, wherein the second signal is compensated based on a thermal map of the plurality of pixels in the thermopile array. 4. The thermal detection device of claim 1, wherein the thermopile array has a resolution of less than or equal to 160 pixels by 160 pixels. 5. The thermal detection device of claim 4, wherein the thermopile array has a resolution of less than or equal to 64 pixels by 64 pixels. 6. The thermal detection device of claim 1, wherein the thermal detection device does not include a shutter. 7. The thermal detection device of claim 6, wherein one of the first control unit and the second control unit is further configured to access, from memory, a pixel gain value for each of the plurality of pixels within the thermopile array. 8. The thermal detection device of claim 7, wherein one of the first control unit and the second control unit is further configured to calculate new pixel gain values for each of the plurality of pixels within the thermopile array based on the accessed pixel gain values and a condition of the thermal detection device. 9. The thermal detection device of claim 8, wherein the condition of the thermal detection device is the temperature related to the thermopile array. 10. The thermal detection device of claim 6, further comprising a thermocouple operable for making contact temperature measurements. 11. The thermal detection device of claim 1, wherein the sub-housing is positioned substantially within the outer housing. 12. The thermal detection device of claim 11, wherein each side surface of the sub-housing is metallic. 13. The thermal detection device of claim 1, wherein the at least one metallic side surface is made of aluminum. 14. The thermal detection device of claim 1, further comprising a first ambient temperature sensor positioned above the sub-housing, and a second ambient temperature sensor positioned below the sub-housing, the first ambient temperature sensor providing the temperature signal to the second control unit, the second ambient temperature sensor providing a second temperature signal to the second control unit. 15. A thermal detection device comprising: a visual camera; a thermopile array including a plurality of pixels; a rechargeable lithium-based battery pack configured to be inserted into a handle portion of the thermal detection device for providing power to the thermal detection device; a controller including a processor and a memory, the controller configured to receive a first signal from the visual camera related to a visual image of a scene, receive a second signal from the thermopile array related to a thermal image of the scene, the second signal associated with a temperature sensed by at least one of the plurality of pixels in the thermopile array, receive a temperature signal related to a temperature of the thermopile array, and compensate the second signal based on the temperature signal; and a display configured to display the visual image based on the first signal and the thermal image based on the compensated second signal. 16. The thermal detection device of claim 15, wherein the thermal detection device does not include a shutter. 17. The thermal detection device of claim 16, wherein the controller is further configured to access, from memory, a pixel gain value for each of the plurality of pixels within the thermopile array. 18. The thermal detection device of claim 17, wherein the controller is further configured to calculate new pixel gain values for each of the plurality of pixels within the thermopile array based on the accessed pixel gain values and a condition of the thermal detection device. 19. The thermal detection device of claim 18, wherein the condition of the thermal detection device is the temperature related to the thermopile array. 20. The thermal detection device of claim 15, wherein the thermopile array has a resolution of less than or equal to 32 pixels by 32 pixels.
2,400
7,376
7,376
14,741,112
2,461
Virtual machine environments are provided in the switches that form a network, with the virtual machines executing network services previously performed by dedicated appliances. The virtual machines can be executed on a single multi-core processor in combination with normal switch functions or on dedicated services processor boards. Packet processors analyze incoming packets and add a services tag containing services entries to any packets. Each switch reviews the services tag and performs any network services resident on that switch. This allows services to be deployed at the optimal locations in the network. The network services may be deployed by use of drag and drop operations. A topology view is presented, along with network services that may be deployed. Services may be selected and dragged to a single switch or multiple switches. The management tool deploys the network services software, with virtual machines being instantiated on the switches as needed.
1. A network device comprising: at least one processor core and associated memory; a memory storing a network services table indicating to which of a plurality of software service instances the network device will route received packets and from which the network device will receive packets operated on by the software services instances; a packet analyzer coupled to said at least one processor core and said network services table which reviews received packets for a services tag and compares the services tag to said network service table to determine to which of a plurality of software service instances the network device will route packets; and a router coupled to said at least one processor core, said packet analyzer, and said network service table and for coupling to the plurality of software service instances to which the network device will route packets, the router for routing the received packets as determined by said packet analyzer. 2. The network device of claim 1, wherein the network device is a network switch, the network device further comprising: a switch processor and associated memory, said switch processor performing switch management functions. 3. The network device of claim 1, wherein the network device receives an indication that an additional software service instance to which the network device will route received packets and from which the network device will receive packets operated on by the software services instance has been added, wherein said network services table is updated to contain the additional software service instance, and wherein said packet analyzer utilizes said updated table. 4. The network device of claim 1, wherein said services tag includes: a service tag identifier; and at least one service entry, each services entry including: a type of service indication; and a service level indication. 5. A method of operating a network device, the method comprising the steps of: analyzing received packets for a services tag; comparing the services tag to a network service table indicating to which of a plurality of software service instances the network device will route received packets and from which the network device will receive packets operated on by the software services instances to determine to which of a plurality of software service instances the network device will route packets; and routing the received packets as determined by said comparing step. 6. The method of claim 5, further comprising the steps of: receiving an indication that an additional software service instance to which the network device will route received packets and from which the network device will receive packets operated on by the software services instance has been added, updating said network services table to contain the additional software service instance, and analyzing utilizing said updated table. 7. The method of claim 5, wherein said services tag includes: a service tag identifier; and at least one service entry, each services entry including: a type of service indication; and a service level indication.
Virtual machine environments are provided in the switches that form a network, with the virtual machines executing network services previously performed by dedicated appliances. The virtual machines can be executed on a single multi-core processor in combination with normal switch functions or on dedicated services processor boards. Packet processors analyze incoming packets and add a services tag containing services entries to any packets. Each switch reviews the services tag and performs any network services resident on that switch. This allows services to be deployed at the optimal locations in the network. The network services may be deployed by use of drag and drop operations. A topology view is presented, along with network services that may be deployed. Services may be selected and dragged to a single switch or multiple switches. The management tool deploys the network services software, with virtual machines being instantiated on the switches as needed.1. A network device comprising: at least one processor core and associated memory; a memory storing a network services table indicating to which of a plurality of software service instances the network device will route received packets and from which the network device will receive packets operated on by the software services instances; a packet analyzer coupled to said at least one processor core and said network services table which reviews received packets for a services tag and compares the services tag to said network service table to determine to which of a plurality of software service instances the network device will route packets; and a router coupled to said at least one processor core, said packet analyzer, and said network service table and for coupling to the plurality of software service instances to which the network device will route packets, the router for routing the received packets as determined by said packet analyzer. 2. The network device of claim 1, wherein the network device is a network switch, the network device further comprising: a switch processor and associated memory, said switch processor performing switch management functions. 3. The network device of claim 1, wherein the network device receives an indication that an additional software service instance to which the network device will route received packets and from which the network device will receive packets operated on by the software services instance has been added, wherein said network services table is updated to contain the additional software service instance, and wherein said packet analyzer utilizes said updated table. 4. The network device of claim 1, wherein said services tag includes: a service tag identifier; and at least one service entry, each services entry including: a type of service indication; and a service level indication. 5. A method of operating a network device, the method comprising the steps of: analyzing received packets for a services tag; comparing the services tag to a network service table indicating to which of a plurality of software service instances the network device will route received packets and from which the network device will receive packets operated on by the software services instances to determine to which of a plurality of software service instances the network device will route packets; and routing the received packets as determined by said comparing step. 6. The method of claim 5, further comprising the steps of: receiving an indication that an additional software service instance to which the network device will route received packets and from which the network device will receive packets operated on by the software services instance has been added, updating said network services table to contain the additional software service instance, and analyzing utilizing said updated table. 7. The method of claim 5, wherein said services tag includes: a service tag identifier; and at least one service entry, each services entry including: a type of service indication; and a service level indication.
2,400
7,377
7,377
14,741,066
2,461
Virtual machine environments are provided in the switches that form a network, with the virtual machines executing network services previously performed by dedicated appliances. The virtual machines can be executed on a single multi-core processor in combination with normal switch functions or on dedicated services processor boards. Packet processors analyze incoming packets and add a services tag containing services entries to any packets. Each switch reviews the services tag and performs any network services resident on that switch. This allows services to be deployed at the optimal locations in the network. The network services may be deployed by use of drag and drop operations. A topology view is presented, along with network services that may be deployed. Services may be selected and dragged to a single switch or multiple switches. The management tool deploys the network services software, with virtual machines being instantiated on the switches as needed.
1. A network device comprising: at least one processor core and associated memory; a plurality of service software instances executing on said at least one processor core and stored in said associated memory, at least one of said plurality of service software instances providing a network service; a memory storing a local network services table; and a packet analyzer coupled to said at least one processor core and said local network service table which reviews received packets for a services tag, compares the services tag to said local network service table to determine network services to be performed by the network device and directs the received packet to a service software instance of said plurality of service software instances which is providing one of the determined network services, wherein said at least one service software instance providing network services updates the services tag in the received packet after performing said at least one service software instance's operations. 2. The network device of claim 1, wherein multiple of said plurality of service software instance are providing network services related to the received packet, and wherein each of said multiple of said plurality of service software instances performs each of said multiple of said plurality of service software instances' operations prior to the received packet leaving the network device. 3. The network device of claim 1, wherein the network device is a network switch, the network device further comprising: a switch processor and associated memory, said switch processor performing switch management functions. 4. The network device of claim 3, further comprising: a services processor board, wherein said at least one processor core is on said services processor board. 5. The network device of claim 4, wherein said at least one processor core is x86 compatible. 6. The network device of claim 1, wherein the network device receives instructions to perform an additional network service, wherein an additional service software instance is instantiated to perform said additional network service, wherein said local network services table is updated to contain the additional network service, and wherein said packet analyzer utilizes said updated table. 7. The network device of claim 1, wherein said services tag includes: a service tag identifier; and at least one service entry, each services entry including: a type of service indication; and a service level indication. 8. A method of operating a network device, the method comprising: executing a plurality of service software instances on at least one processor core, at least one of said plurality of service software instances providing a network service; analyzing received packets for a services tag; comparing the services tag to a local network service table to determine network services to be performed locally; and directing the received packet to a service software instance of said plurality service software instances which is providing one of the determined network services, wherein said at least one service software instance providing network services updates the services tag in the received packet after performing said at least one service software instance's operations. 9. The method of claim 8, wherein multiple of said plurality of service software instances are providing network services related to the received packet, and wherein each of said multiple of said plurality of service software instances performs each of said multiple of said plurality of service software instances' operations prior to the received packet leaving the network device. 10. The method of claim 8, further comprising: performing device management functions on a device processor. 11. The method of claim 10, wherein said at least one processor core is on a services processor board. 12. The method of claim 11, wherein said at least one processor core is x86 compatible. 13. The method of claim 8, further comprising: receiving instructions to perform an additional network service, instantiating an additional service software instance to perform said additional network service, updating said local network services table to contain the additional network service, and analyzing utilizing said updated table. 14. The method of claim 8, wherein said services tag includes: a service tag identifier; and at least one service entry, each services entry including: a type of service indication; and a service level indication.
Virtual machine environments are provided in the switches that form a network, with the virtual machines executing network services previously performed by dedicated appliances. The virtual machines can be executed on a single multi-core processor in combination with normal switch functions or on dedicated services processor boards. Packet processors analyze incoming packets and add a services tag containing services entries to any packets. Each switch reviews the services tag and performs any network services resident on that switch. This allows services to be deployed at the optimal locations in the network. The network services may be deployed by use of drag and drop operations. A topology view is presented, along with network services that may be deployed. Services may be selected and dragged to a single switch or multiple switches. The management tool deploys the network services software, with virtual machines being instantiated on the switches as needed.1. A network device comprising: at least one processor core and associated memory; a plurality of service software instances executing on said at least one processor core and stored in said associated memory, at least one of said plurality of service software instances providing a network service; a memory storing a local network services table; and a packet analyzer coupled to said at least one processor core and said local network service table which reviews received packets for a services tag, compares the services tag to said local network service table to determine network services to be performed by the network device and directs the received packet to a service software instance of said plurality of service software instances which is providing one of the determined network services, wherein said at least one service software instance providing network services updates the services tag in the received packet after performing said at least one service software instance's operations. 2. The network device of claim 1, wherein multiple of said plurality of service software instance are providing network services related to the received packet, and wherein each of said multiple of said plurality of service software instances performs each of said multiple of said plurality of service software instances' operations prior to the received packet leaving the network device. 3. The network device of claim 1, wherein the network device is a network switch, the network device further comprising: a switch processor and associated memory, said switch processor performing switch management functions. 4. The network device of claim 3, further comprising: a services processor board, wherein said at least one processor core is on said services processor board. 5. The network device of claim 4, wherein said at least one processor core is x86 compatible. 6. The network device of claim 1, wherein the network device receives instructions to perform an additional network service, wherein an additional service software instance is instantiated to perform said additional network service, wherein said local network services table is updated to contain the additional network service, and wherein said packet analyzer utilizes said updated table. 7. The network device of claim 1, wherein said services tag includes: a service tag identifier; and at least one service entry, each services entry including: a type of service indication; and a service level indication. 8. A method of operating a network device, the method comprising: executing a plurality of service software instances on at least one processor core, at least one of said plurality of service software instances providing a network service; analyzing received packets for a services tag; comparing the services tag to a local network service table to determine network services to be performed locally; and directing the received packet to a service software instance of said plurality service software instances which is providing one of the determined network services, wherein said at least one service software instance providing network services updates the services tag in the received packet after performing said at least one service software instance's operations. 9. The method of claim 8, wherein multiple of said plurality of service software instances are providing network services related to the received packet, and wherein each of said multiple of said plurality of service software instances performs each of said multiple of said plurality of service software instances' operations prior to the received packet leaving the network device. 10. The method of claim 8, further comprising: performing device management functions on a device processor. 11. The method of claim 10, wherein said at least one processor core is on a services processor board. 12. The method of claim 11, wherein said at least one processor core is x86 compatible. 13. The method of claim 8, further comprising: receiving instructions to perform an additional network service, instantiating an additional service software instance to perform said additional network service, updating said local network services table to contain the additional network service, and analyzing utilizing said updated table. 14. The method of claim 8, wherein said services tag includes: a service tag identifier; and at least one service entry, each services entry including: a type of service indication; and a service level indication.
2,400
7,378
7,378
14,691,264
2,454
Telephonic and other endpoints often make presence information of other users available on the endpoint. Systems whereby every user sends a notification to every other user quickly becomes resource intensive. Providing presence information only to users subscribed to the presence of other users helps; but, maintaining such subscriptions is often overlooked. Providing automatic subscriptions based upon a triggering event allows presence information to be provided to associated users. The presence information may be time limited to allow for an appropriate amount of presence information to be provided for a duration most likely determined to be relevant. Upon expiration of the subscription, the utilized resources are released without requiring any human intervention.
1. A system, comprising: a presence server; an input interface of the presence server configured to receive a triggering event from a triggering device; wherein the triggering device notifies the presence server, via the input interface, of a triggering event associating the first user with the second user; wherein the presence server, in response to the triggering event, automatically and without human intervention, subscribes the first user to presence data for the second user; and an output interface of the presence server configured to provide presence information of the second user to a first endpoint associated with the first user while the first user is subscribed to the presence data of the second user. 2. The system of claim 1, wherein the presence server unsubscribe the first user to the presence data of the second user upon receiving, via the input interface, a termination event negating the triggering event. 3. The system of claim 1, wherein the first endpoint comprises the triggering device. 4. The system of claim 1, wherein the subscription is a time limited subscription determined by an event type of the triggering event. 5. The system of claim 3, wherein the presence server is further configured to unsubscribe the first user to the presence of the second user upon expiration of the time limited subscription. 6. The system of claim 3, wherein the presence server is further configured to extend the time limited subscription upon the first user having a previously existing time limited subscription to the presence of the second user. 7. The system of claim 1, wherein the presence server is configured to subscribe the first user to the presence of the second user, comprising a first set of presence data, and in response to the triggering event, the presence server is further configured to subscribe the first user to at least one additional subscription event not enabled by the first set of presence data. 8. The system of claim 7, wherein the presence server is further configured to automatically unsubscribe the first user from the at least one additional subscription event not enabled by the first set of presence data, after the predetermined duration of time after the subscription. 9. The system of claim 1, wherein the presence server is further configured to subscribe the first user to the presence of the second user upon determining the first user does not have a previously existing subscription to the second user. 10. The system of claim 1, wherein the presence server is further configured to, upon receiving the triggering event via the input interface, subscribe the second user to the presence of the first user and wherein the output interface is further configured to provide presence information of the first user to the second endpoint while the second user is subscribed to the presence data of the first user. 11. A method, comprising: receiving a triggering event from a triggering device indicating an association between a first user and a second user; in response to the triggering event, automatically and without human intervention, subscribing the first user to presence data for the second user; receiving presence data of the second user from a second endpoint associated with the second user; and determining the first user is presently subscribed to the presence data of the second user, and in response to the determining, outputting the presence data of the second user to a first endpoint associated with the first user. 12. The method of claim 11, wherein the presence data for the second user is determined by a presences datum reported by the second endpoint. 13. The method of claim 11, wherein subscribing further comprises subscribing the first user to a time limited subscription. 14. The method of claim 13, wherein the time limited subscription has a duration determined by an event type of the triggering event. 15. The method of claim 11, wherein subscribing comprises maintaining a previously existing subscription to the second user. 16. The system of claim 15, wherein the previously existing subscription to the second user comprises blocking the first endpoint from receiving presences information of the second user. 17. A non-transitory computer-readable medium that when read by a computer causes the computer to perform: receiving a triggering event from a triggering device indicating an association between a first user and a second user; in response to the triggering event, automatically and without human intervention, subscribing the first user to presence data for the second user; receiving presence data of the second user from a second endpoint associated with the second user; and determining the first user is presently subscribed to the presence data of the second user, and in response to the determining, outputting the presence data of the second user to a first endpoint associated with the first user. 18. The non-transitory computer-readable medium of claim 17, wherein the instructions for subscribing further comprise instructions for subscribing the first user to a time limited subscription. 19. The non-transitory computer-readable medium of claim 18, wherein the time limited subscription has a duration determined by an event type of the triggering event. 20. The non-transitory computer-readable medium of claim 11, wherein the instructions further comprise instructions to subscribe the second user to the presence of the first user in response to the triggering event.
Telephonic and other endpoints often make presence information of other users available on the endpoint. Systems whereby every user sends a notification to every other user quickly becomes resource intensive. Providing presence information only to users subscribed to the presence of other users helps; but, maintaining such subscriptions is often overlooked. Providing automatic subscriptions based upon a triggering event allows presence information to be provided to associated users. The presence information may be time limited to allow for an appropriate amount of presence information to be provided for a duration most likely determined to be relevant. Upon expiration of the subscription, the utilized resources are released without requiring any human intervention.1. A system, comprising: a presence server; an input interface of the presence server configured to receive a triggering event from a triggering device; wherein the triggering device notifies the presence server, via the input interface, of a triggering event associating the first user with the second user; wherein the presence server, in response to the triggering event, automatically and without human intervention, subscribes the first user to presence data for the second user; and an output interface of the presence server configured to provide presence information of the second user to a first endpoint associated with the first user while the first user is subscribed to the presence data of the second user. 2. The system of claim 1, wherein the presence server unsubscribe the first user to the presence data of the second user upon receiving, via the input interface, a termination event negating the triggering event. 3. The system of claim 1, wherein the first endpoint comprises the triggering device. 4. The system of claim 1, wherein the subscription is a time limited subscription determined by an event type of the triggering event. 5. The system of claim 3, wherein the presence server is further configured to unsubscribe the first user to the presence of the second user upon expiration of the time limited subscription. 6. The system of claim 3, wherein the presence server is further configured to extend the time limited subscription upon the first user having a previously existing time limited subscription to the presence of the second user. 7. The system of claim 1, wherein the presence server is configured to subscribe the first user to the presence of the second user, comprising a first set of presence data, and in response to the triggering event, the presence server is further configured to subscribe the first user to at least one additional subscription event not enabled by the first set of presence data. 8. The system of claim 7, wherein the presence server is further configured to automatically unsubscribe the first user from the at least one additional subscription event not enabled by the first set of presence data, after the predetermined duration of time after the subscription. 9. The system of claim 1, wherein the presence server is further configured to subscribe the first user to the presence of the second user upon determining the first user does not have a previously existing subscription to the second user. 10. The system of claim 1, wherein the presence server is further configured to, upon receiving the triggering event via the input interface, subscribe the second user to the presence of the first user and wherein the output interface is further configured to provide presence information of the first user to the second endpoint while the second user is subscribed to the presence data of the first user. 11. A method, comprising: receiving a triggering event from a triggering device indicating an association between a first user and a second user; in response to the triggering event, automatically and without human intervention, subscribing the first user to presence data for the second user; receiving presence data of the second user from a second endpoint associated with the second user; and determining the first user is presently subscribed to the presence data of the second user, and in response to the determining, outputting the presence data of the second user to a first endpoint associated with the first user. 12. The method of claim 11, wherein the presence data for the second user is determined by a presences datum reported by the second endpoint. 13. The method of claim 11, wherein subscribing further comprises subscribing the first user to a time limited subscription. 14. The method of claim 13, wherein the time limited subscription has a duration determined by an event type of the triggering event. 15. The method of claim 11, wherein subscribing comprises maintaining a previously existing subscription to the second user. 16. The system of claim 15, wherein the previously existing subscription to the second user comprises blocking the first endpoint from receiving presences information of the second user. 17. A non-transitory computer-readable medium that when read by a computer causes the computer to perform: receiving a triggering event from a triggering device indicating an association between a first user and a second user; in response to the triggering event, automatically and without human intervention, subscribing the first user to presence data for the second user; receiving presence data of the second user from a second endpoint associated with the second user; and determining the first user is presently subscribed to the presence data of the second user, and in response to the determining, outputting the presence data of the second user to a first endpoint associated with the first user. 18. The non-transitory computer-readable medium of claim 17, wherein the instructions for subscribing further comprise instructions for subscribing the first user to a time limited subscription. 19. The non-transitory computer-readable medium of claim 18, wherein the time limited subscription has a duration determined by an event type of the triggering event. 20. The non-transitory computer-readable medium of claim 11, wherein the instructions further comprise instructions to subscribe the second user to the presence of the first user in response to the triggering event.
2,400
7,379
7,379
14,285,885
2,426
Two-tuner media device systems and methods are operable to pre-tune a second tuner in anticipation of a channel surfing activity. An exemplary embodiment receives a first content stream associated with a currently presented channel at a first tuner, determines an anticipated channel based upon the currently presented channel and a historical channel surfing pattern, receives a second content stream associated with the anticipated channel at a second tuner, detects an initiation of a channel surfing activity, and presents at least a video portion of the second content stream associated with the anticipated channel in response to detecting the initiation of the channel surfing activity.
1. A channel surfing method implemented in a two-tuner media device, the method comprising: receiving a first content stream associated with a currently presented channel at a first tuner; receiving a user specification of a program channel identifier, wherein the user specified program channel identifier causes a second tuner to become tuned to a second content stream identified by the user specified program channel identifier; receiving the second content stream associated with a channel identified by the user specified program channel identifier at the second tuner; detecting an initiation of a channel surfing activity; and presenting at least a video portion of the second content stream associated with the channel identified by the user specified program channel identifier in response to detecting the initiation of the channel surfing activity, wherein the video portion of the second content stream and a video portion of the first content stream are concurrently presented. 2. The method of claim 1, further comprising: tuning the second tuner to receive the second content stream in response to receiving the user specified program channel identifier. 3. The method of claim 1, wherein the user specified program channel identifier is a first program channel identifier, and wherein the detected channel surfing activity corresponds to a selection of a second program channel identifier of a surfed to channel that is different from the channel of the first program channel identifier, and further comprising: tuning the first tuner to receive a third content stream corresponding to the channel of the second program channel identifier, wherein the second tuner remains tuned to the second content stream. 4. The method of claim 1, further comprising: presenting a notification on a display prior to detecting the initiation of the channel surfing activity, wherein the notification indicates the user specified program channel identifier that the second tuner is currently tuned to. 5. The method of claim 1, wherein the user specified program channel identifier is a first user specified program channel identifier, and wherein prior to detecting the channel surfing activity, the method further comprising: presenting an electronic program guide (EPG) on a display, wherein the presented EPG indicates a current user specified program channel identifier that the second tuner is currently tuned to; receiving a new user specified program channel identifier, wherein the new user specified program channel identifier is associated with a third content stream identified by the new user specified program channel identifier; and pre-tuning the second tuner to receive the third content stream 6. The method of claim 5, further comprising: presenting at least a video portion of the third content stream associated with the new user specified program channel identifier in response to detecting the initiation of the channel surfing activity, wherein the video portion of the third content stream and the video portion of the first content stream are concurrently presented. 7. The method of claim 1, further comprising: tuning the second tuner to receive the second content stream in response to detecting the initiation of the channel surfing activity. 8. A media device system, comprising: a program content stream interface with a plurality of tuners configured to receive a first content stream associated with a currently presented channel at a first tuner of the plurality of tuners, and configured to receive a second content stream associated with a second channel at a second tuner of the plurality of tuners; a memory configured to store a user specification of a program channel identifier, wherein receipt of the user specified program channel identifier causes the second tuner to become tuned to the second content stream identified by the user specified program channel identifier upon an initiation of a channel surfing activity; and a processor system configured to: detect the initiation of the channel surfing activity; and in response to detecting the initiation of the channel surfing activity, operate the second tuner to tune to the second channel identified by the user specified program channel identifier. 9. The media device system of claim 8, wherein at least a video portion of the second content stream associated with the second channel is presented concurrently with the first content stream in response to the detection of the initiation of the channel surfing activity. 10. The media device system of claim 8, wherein the detected initiation of the channel surfing activity corresponds to a selection of a third program channel identifier of a surfed to channel that is different from the program channel identifier of the channel of the second program channel identifier, and wherein the processor system instructs the first tuner to receive a third content stream corresponding to the surfed to channel, and wherein the second tuner remains tuned to the channel of the second program channel identifier that has been specified by the user, and wherein presentation is changed such that at least a video portion of the second content stream associated with the second channel is presented concurrently with the third content stream. 11. The media device system of claim 10, wherein the plurality of tuners is only the first tuner and the second tuner. 12. The media device system of claim 8, further comprising: a remote control interface configured to receive user instructions in a wireless signal generated by a remote control, wherein the received user instructions specify the user specified program channel identifier. 13. The media device system of claim 8, wherein the user specified program channel identifier is a first user specified program channel identifier, and wherein prior to detecting the channel surfing activity, the processor system further configured to: present an electronic program guide (EPG) on a display, wherein the presented EPG indicates a current user specified program channel identifier that the second tuner is currently tuned to; receive a new user specified program channel identifier, wherein the new user specified program channel identifier is associated with a third content stream identified by the new user specified program channel identifier; pre-tune the second tuner to receive the third content stream; and in response to detecting the initiation of the channel surfing activity, present at least a video portion of the third content stream associated with the new user specified program channel identifier, wherein the video portion of the third content stream and a video portion of the first content stream are concurrently presented. 14. A channel surfing method implemented in a media device, the method comprising: receiving a first content stream at a first tuner, the first content stream associated with a currently presented channel; receiving a user specified program channel identifier to determine a program channel identifier change, wherein the program channel identifier change is associated with a channel identified by the user specified program channel identifier; pre-tuning a second tuner to receive a second content stream associated with the identified channel in response to receiving the user specified program channel identifier; detecting an initiation of a channel surfing activity; and presenting at least a video portion of the second content stream concurrently with the first content stream in response to detecting the initiation of the channel surfing activity. 15. The method of claim 14, wherein the detected channel surfing activity corresponds to a selection of a program channel identifier corresponding to the channel identified by the user specified program channel identifier. 16. The method of claim 14, wherein the detected channel surfing activity corresponds to a selection of a program channel identifier corresponding to a surfed to channel that is different from the channel identified by the user specified program channel identifier, and further comprising: tuning the first tuner to receive a third content stream corresponding to the program channel identifier of the surfed to channel, wherein the second tuner remains tuned to the channel identified by the user specified program channel identifier. 17. The method of claim 16, further comprising: presenting at least the video portion of the second content stream concurrently with the third content stream in response to detecting the initiation of the channel surfing activity to the program channel identifier of the surfed to channel. 18. The method of claim 14, further comprising: presenting a notification on a display prior to detecting the initiation of the channel surfing activity, wherein the notification indicates the user specified program channel identifier of the channel that the second tuner is currently tuned to. 19. The method of claim 14, wherein the user specified program channel identifier is a first user specified program channel identifier, and wherein prior to detecting the channel surfing activity, the method further comprising: presenting an electronic program guide (EPG) on a display, wherein the presented EPG indicates a current user specified program channel identifier that the second tuner is currently tuned to; receiving a new user specified program channel identifier, wherein the program channel identifier change is associated with a new channel identified by the new user specified program channel identifier; and pre-tuning the second tuner to receive a new content stream associated with the new channel identified by the new user specified program channel identifier.
Two-tuner media device systems and methods are operable to pre-tune a second tuner in anticipation of a channel surfing activity. An exemplary embodiment receives a first content stream associated with a currently presented channel at a first tuner, determines an anticipated channel based upon the currently presented channel and a historical channel surfing pattern, receives a second content stream associated with the anticipated channel at a second tuner, detects an initiation of a channel surfing activity, and presents at least a video portion of the second content stream associated with the anticipated channel in response to detecting the initiation of the channel surfing activity.1. A channel surfing method implemented in a two-tuner media device, the method comprising: receiving a first content stream associated with a currently presented channel at a first tuner; receiving a user specification of a program channel identifier, wherein the user specified program channel identifier causes a second tuner to become tuned to a second content stream identified by the user specified program channel identifier; receiving the second content stream associated with a channel identified by the user specified program channel identifier at the second tuner; detecting an initiation of a channel surfing activity; and presenting at least a video portion of the second content stream associated with the channel identified by the user specified program channel identifier in response to detecting the initiation of the channel surfing activity, wherein the video portion of the second content stream and a video portion of the first content stream are concurrently presented. 2. The method of claim 1, further comprising: tuning the second tuner to receive the second content stream in response to receiving the user specified program channel identifier. 3. The method of claim 1, wherein the user specified program channel identifier is a first program channel identifier, and wherein the detected channel surfing activity corresponds to a selection of a second program channel identifier of a surfed to channel that is different from the channel of the first program channel identifier, and further comprising: tuning the first tuner to receive a third content stream corresponding to the channel of the second program channel identifier, wherein the second tuner remains tuned to the second content stream. 4. The method of claim 1, further comprising: presenting a notification on a display prior to detecting the initiation of the channel surfing activity, wherein the notification indicates the user specified program channel identifier that the second tuner is currently tuned to. 5. The method of claim 1, wherein the user specified program channel identifier is a first user specified program channel identifier, and wherein prior to detecting the channel surfing activity, the method further comprising: presenting an electronic program guide (EPG) on a display, wherein the presented EPG indicates a current user specified program channel identifier that the second tuner is currently tuned to; receiving a new user specified program channel identifier, wherein the new user specified program channel identifier is associated with a third content stream identified by the new user specified program channel identifier; and pre-tuning the second tuner to receive the third content stream 6. The method of claim 5, further comprising: presenting at least a video portion of the third content stream associated with the new user specified program channel identifier in response to detecting the initiation of the channel surfing activity, wherein the video portion of the third content stream and the video portion of the first content stream are concurrently presented. 7. The method of claim 1, further comprising: tuning the second tuner to receive the second content stream in response to detecting the initiation of the channel surfing activity. 8. A media device system, comprising: a program content stream interface with a plurality of tuners configured to receive a first content stream associated with a currently presented channel at a first tuner of the plurality of tuners, and configured to receive a second content stream associated with a second channel at a second tuner of the plurality of tuners; a memory configured to store a user specification of a program channel identifier, wherein receipt of the user specified program channel identifier causes the second tuner to become tuned to the second content stream identified by the user specified program channel identifier upon an initiation of a channel surfing activity; and a processor system configured to: detect the initiation of the channel surfing activity; and in response to detecting the initiation of the channel surfing activity, operate the second tuner to tune to the second channel identified by the user specified program channel identifier. 9. The media device system of claim 8, wherein at least a video portion of the second content stream associated with the second channel is presented concurrently with the first content stream in response to the detection of the initiation of the channel surfing activity. 10. The media device system of claim 8, wherein the detected initiation of the channel surfing activity corresponds to a selection of a third program channel identifier of a surfed to channel that is different from the program channel identifier of the channel of the second program channel identifier, and wherein the processor system instructs the first tuner to receive a third content stream corresponding to the surfed to channel, and wherein the second tuner remains tuned to the channel of the second program channel identifier that has been specified by the user, and wherein presentation is changed such that at least a video portion of the second content stream associated with the second channel is presented concurrently with the third content stream. 11. The media device system of claim 10, wherein the plurality of tuners is only the first tuner and the second tuner. 12. The media device system of claim 8, further comprising: a remote control interface configured to receive user instructions in a wireless signal generated by a remote control, wherein the received user instructions specify the user specified program channel identifier. 13. The media device system of claim 8, wherein the user specified program channel identifier is a first user specified program channel identifier, and wherein prior to detecting the channel surfing activity, the processor system further configured to: present an electronic program guide (EPG) on a display, wherein the presented EPG indicates a current user specified program channel identifier that the second tuner is currently tuned to; receive a new user specified program channel identifier, wherein the new user specified program channel identifier is associated with a third content stream identified by the new user specified program channel identifier; pre-tune the second tuner to receive the third content stream; and in response to detecting the initiation of the channel surfing activity, present at least a video portion of the third content stream associated with the new user specified program channel identifier, wherein the video portion of the third content stream and a video portion of the first content stream are concurrently presented. 14. A channel surfing method implemented in a media device, the method comprising: receiving a first content stream at a first tuner, the first content stream associated with a currently presented channel; receiving a user specified program channel identifier to determine a program channel identifier change, wherein the program channel identifier change is associated with a channel identified by the user specified program channel identifier; pre-tuning a second tuner to receive a second content stream associated with the identified channel in response to receiving the user specified program channel identifier; detecting an initiation of a channel surfing activity; and presenting at least a video portion of the second content stream concurrently with the first content stream in response to detecting the initiation of the channel surfing activity. 15. The method of claim 14, wherein the detected channel surfing activity corresponds to a selection of a program channel identifier corresponding to the channel identified by the user specified program channel identifier. 16. The method of claim 14, wherein the detected channel surfing activity corresponds to a selection of a program channel identifier corresponding to a surfed to channel that is different from the channel identified by the user specified program channel identifier, and further comprising: tuning the first tuner to receive a third content stream corresponding to the program channel identifier of the surfed to channel, wherein the second tuner remains tuned to the channel identified by the user specified program channel identifier. 17. The method of claim 16, further comprising: presenting at least the video portion of the second content stream concurrently with the third content stream in response to detecting the initiation of the channel surfing activity to the program channel identifier of the surfed to channel. 18. The method of claim 14, further comprising: presenting a notification on a display prior to detecting the initiation of the channel surfing activity, wherein the notification indicates the user specified program channel identifier of the channel that the second tuner is currently tuned to. 19. The method of claim 14, wherein the user specified program channel identifier is a first user specified program channel identifier, and wherein prior to detecting the channel surfing activity, the method further comprising: presenting an electronic program guide (EPG) on a display, wherein the presented EPG indicates a current user specified program channel identifier that the second tuner is currently tuned to; receiving a new user specified program channel identifier, wherein the program channel identifier change is associated with a new channel identified by the new user specified program channel identifier; and pre-tuning the second tuner to receive a new content stream associated with the new channel identified by the new user specified program channel identifier.
2,400
7,380
7,380
14,450,495
2,476
Aspects of the present disclosure involve systems, methods, computer program products, and the like, for implementing a high-quality Video over Internet Protocol (VoIP) network accessible through a public network, such as the Internet. More particularly, a user of a telecommunication network may access the VoIP through an Internet connection or other public network connection and is then connected to a virtual local loop for transmission across the VoIP. As such, the public network may act as an egress and/or ingress to the VoIP allowing users with public network connectivity access to the network. Thus, a virtual local loop providing the desired services and quality from the telecommunications network may be created for a user of the network, without the need of the user to directly connect into the VoIP
1. A method for providing services over a telecommunications network, the method comprising: receiving a request for telecommunication services from a requesting device, the telecommunications services comprising transmission of one or more high-definition multimedia signals through the telecommunications network; accessing an equipment database associated with the telecommunications network to determine a customer identification associated with the requesting device; registering an encoding device with the telecommunications network based at least on the customer identification; scheduling one or more components in response to the request from the requesting device; creating a virtual private network (VPN) in the telecommunications network comprising the encoding device configured to encode the one or more high-definition multimedia signals; and commissioning the one or more components for transmission of the one or more high-definition multimedia signals through the telecommunications network. 2. The method of claim 1 wherein the request for telecommunication services is received from the requesting device utilizing a public access network. 3. The method of claim 2 wherein the public access network is the Internet. 4. The method of claim 1 wherein the request for telecommunication services is received from the encoding device. 5. The method of claim 1 wherein the request for telecommunication services comprises a date and time corresponding to a multimedia event; and scheduling the one or more components in response to the request comprises reserving the one or more components at the date and time for the multimedia event in the request. 6. The method of claim 1 wherein the VPN further comprises a decoder device associated with the customer, the decoder configured to receive an encoded high-definition multimedia signal from the encoding device and decode the encoded high-definition multimedia signal. 7. The method of claim 6 further comprising: detecting the encoding device as connected to the telecommunications network; and analyzing the encoding device to obtain one or more identifiers of the encoding device. 8. The method of claim 7 further comprising: comparing the one or more identifiers of the encoding device to at least one entry in the equipment database associated with the telecommunications network to determine a customer identification associated with the encoding device. 9. A system for operating a telecommunications network, the system comprising: a network component comprising: a processor; and a computer-readable medium associated with the processor and including instructions stored thereon and executable by the processor to: receive a request for telecommunication services from a requesting device, the telecommunications services comprising transmission of one or more high-definition multimedia signals through the telecommunications network; access an equipment database associated with the telecommunications network to determine a customer identification associated with the requesting device; register an encoding device with the telecommunications network based at least on the customer identification; schedule one or more components in response to the request from the requesting device; create a virtual private network (VPN) in the telecommunications network comprising the encoding device configured to encode the one or more high-definition multimedia signals; and commission the one or more components for transmission of the one or more high-definition multimedia signals through the telecommunications network. 10. The system of claim 9 wherein the request for telecommunication services is received from the requesting device utilizing a public access network. 11. The system of claim 10 wherein the public access network is the Internet. 12. The system of claim 9 wherein the request for telecommunication services comprises a date and time corresponding to a multimedia event and the instructions to schedule the one or more components in response to the request comprise reserving the one or more components at the date and time for the multimedia event in the request. 13. The system of claim 9 wherein the VPN further comprises a decoder device associated with the customer, the decoder configured to receive an encoded high-definition multimedia signal from the encoding device and decode the encoded high-definition multimedia signal. 14. The system of claim 13 wherein the instructions executable by the processor further: detect the encoding device as connected to the telecommunications network; and analyze the encoding device to obtain one or more identifiers of the encoding device. 15. The system of claim 14 wherein the instructions executable by the processor further: compare the one or more identifiers of the encoding device to at least one entry in the equipment database associated with the telecommunications network to determine a customer identification associated with the encoding device. 16. A telecommunications network comprising: a registrar configured to register a user device with a Video on Internet Protocol (VoIP) network based at least on a request for telecommunication services received from a requesting device, the telecommunications services comprising transmission of one or more high-definition multimedia signals through the telecommunications network and the user device configured to encode the one or more high-definition multimedia signals; an equipment database for storing a customer identification associated with the requesting device; a scheduler for scheduling one or more components of the VoIP network in response to the request from the requesting device, the one or more components of the VoIP and the user device comprising a virtual private network (VPN); and a controller for commissioning the one or more components of the VoIP network for transmission of the one or more high-definition multimedia signals through the telecommunications network. 17. The telecommunications network of claim 16 further comprising: a user interface controller for receiving the request for telecommunication services from the requesting device. 18. The telecommunications network of claim 17 wherein the user interface controller comprises an application program interface (API) configured to translate one or more instructions from the requesting device. 19. The telecommunications network of claim 16 wherein the request for telecommunication services is received from the requesting device utilizing a public access network. 20. The telecommunications network of claim 19 wherein the public access network is the Internet.
Aspects of the present disclosure involve systems, methods, computer program products, and the like, for implementing a high-quality Video over Internet Protocol (VoIP) network accessible through a public network, such as the Internet. More particularly, a user of a telecommunication network may access the VoIP through an Internet connection or other public network connection and is then connected to a virtual local loop for transmission across the VoIP. As such, the public network may act as an egress and/or ingress to the VoIP allowing users with public network connectivity access to the network. Thus, a virtual local loop providing the desired services and quality from the telecommunications network may be created for a user of the network, without the need of the user to directly connect into the VoIP1. A method for providing services over a telecommunications network, the method comprising: receiving a request for telecommunication services from a requesting device, the telecommunications services comprising transmission of one or more high-definition multimedia signals through the telecommunications network; accessing an equipment database associated with the telecommunications network to determine a customer identification associated with the requesting device; registering an encoding device with the telecommunications network based at least on the customer identification; scheduling one or more components in response to the request from the requesting device; creating a virtual private network (VPN) in the telecommunications network comprising the encoding device configured to encode the one or more high-definition multimedia signals; and commissioning the one or more components for transmission of the one or more high-definition multimedia signals through the telecommunications network. 2. The method of claim 1 wherein the request for telecommunication services is received from the requesting device utilizing a public access network. 3. The method of claim 2 wherein the public access network is the Internet. 4. The method of claim 1 wherein the request for telecommunication services is received from the encoding device. 5. The method of claim 1 wherein the request for telecommunication services comprises a date and time corresponding to a multimedia event; and scheduling the one or more components in response to the request comprises reserving the one or more components at the date and time for the multimedia event in the request. 6. The method of claim 1 wherein the VPN further comprises a decoder device associated with the customer, the decoder configured to receive an encoded high-definition multimedia signal from the encoding device and decode the encoded high-definition multimedia signal. 7. The method of claim 6 further comprising: detecting the encoding device as connected to the telecommunications network; and analyzing the encoding device to obtain one or more identifiers of the encoding device. 8. The method of claim 7 further comprising: comparing the one or more identifiers of the encoding device to at least one entry in the equipment database associated with the telecommunications network to determine a customer identification associated with the encoding device. 9. A system for operating a telecommunications network, the system comprising: a network component comprising: a processor; and a computer-readable medium associated with the processor and including instructions stored thereon and executable by the processor to: receive a request for telecommunication services from a requesting device, the telecommunications services comprising transmission of one or more high-definition multimedia signals through the telecommunications network; access an equipment database associated with the telecommunications network to determine a customer identification associated with the requesting device; register an encoding device with the telecommunications network based at least on the customer identification; schedule one or more components in response to the request from the requesting device; create a virtual private network (VPN) in the telecommunications network comprising the encoding device configured to encode the one or more high-definition multimedia signals; and commission the one or more components for transmission of the one or more high-definition multimedia signals through the telecommunications network. 10. The system of claim 9 wherein the request for telecommunication services is received from the requesting device utilizing a public access network. 11. The system of claim 10 wherein the public access network is the Internet. 12. The system of claim 9 wherein the request for telecommunication services comprises a date and time corresponding to a multimedia event and the instructions to schedule the one or more components in response to the request comprise reserving the one or more components at the date and time for the multimedia event in the request. 13. The system of claim 9 wherein the VPN further comprises a decoder device associated with the customer, the decoder configured to receive an encoded high-definition multimedia signal from the encoding device and decode the encoded high-definition multimedia signal. 14. The system of claim 13 wherein the instructions executable by the processor further: detect the encoding device as connected to the telecommunications network; and analyze the encoding device to obtain one or more identifiers of the encoding device. 15. The system of claim 14 wherein the instructions executable by the processor further: compare the one or more identifiers of the encoding device to at least one entry in the equipment database associated with the telecommunications network to determine a customer identification associated with the encoding device. 16. A telecommunications network comprising: a registrar configured to register a user device with a Video on Internet Protocol (VoIP) network based at least on a request for telecommunication services received from a requesting device, the telecommunications services comprising transmission of one or more high-definition multimedia signals through the telecommunications network and the user device configured to encode the one or more high-definition multimedia signals; an equipment database for storing a customer identification associated with the requesting device; a scheduler for scheduling one or more components of the VoIP network in response to the request from the requesting device, the one or more components of the VoIP and the user device comprising a virtual private network (VPN); and a controller for commissioning the one or more components of the VoIP network for transmission of the one or more high-definition multimedia signals through the telecommunications network. 17. The telecommunications network of claim 16 further comprising: a user interface controller for receiving the request for telecommunication services from the requesting device. 18. The telecommunications network of claim 17 wherein the user interface controller comprises an application program interface (API) configured to translate one or more instructions from the requesting device. 19. The telecommunications network of claim 16 wherein the request for telecommunication services is received from the requesting device utilizing a public access network. 20. The telecommunications network of claim 19 wherein the public access network is the Internet.
2,400
7,381
7,381
14,730,519
2,425
Systems and methods for managing the storage and delivery of recorded content in a network digital video recorder (DVR) system are disclosed. A plurality of requests to record a program may be received, wherein the program may comprise a plurality of segments. A segment from the plurality of segments may be determined to be copied to a first storage. A copy of the segment may be received from a second storage and a plurality of copies of the segment may be created in the first storage from the copy of the segment received from the second storage. The quantity of the plurality of copies of the segment may be equal to the quantity of the plurality of requests to record the program.
1. A method comprising: receiving, by a network digital video recorder system, a plurality of requests to record a content asset, wherein the network digital video recorder system comprising a plurality of recording agents and the content asset comprising a plurality of segments stored in a storage medium; determining a segment from the plurality of segments to copy to a recording storage; determining a recording agent from the plurality of recording agents; and causing, via the determined recording agent, based on a single access of the segment from the storage medium, a plurality of copies of the segment to be created in the recording storage, wherein a quantity of the plurality of copies of the segment equals a quantity of the plurality of requests to record the content asset. 2. The method of claim 1, wherein the causing the plurality of copies of the segment to be created in the recording storage comprises causing at least a portion of the plurality of copies of the segment to be written to a hard disk of the recording storage in sequence. 3. The method of claim 1, further comprising: determining a second segment from the plurality of segments to copy to the recording storage; determining a second recording agent from the plurality of recording agents; and causing, via the determined second recording agent, based on a single access of the second segment from the storage medium, a plurality of copies of the second segment to be created in the recording storage, wherein a quantity of the plurality of copies of the second segment equals the quantity of the plurality of requests to record the content asset. 4. A method comprising: receiving a plurality of requests to record a content asset, wherein the content asset comprises a plurality of segments; determining a segment from the plurality of segments to copy to a first storage; receiving a copy of the segment from a second storage; and causing a plurality of copies of the segment to be created in the first storage using the copy of the segment received from the second storage, wherein a quantity of the plurality of copies of the segment equals a quantity of the plurality of requests to record the content asset. 5. The method of claim 4, wherein the causing the plurality of copies of the segment to be created in the first storage comprises causing at least a portion of the plurality of copies of the segment to be written to a hard disk of the first storage in sequence. 6. The method of claim 4, further comprising: determining a recording agent from a plurality of recording agents, wherein the receiving the copy of the segment from the second storage comprises the determined recording agent receiving the copy of the segment; and wherein the causing the plurality of copies of the segment to be created in the first storage comprises the determined recording agent causing the plurality of copies of the segment to be created in the first storage. 7. The method of claim 6, further comprising: determining a state of each of the plurality of recording agents, wherein the determining the recording agent from the plurality of recording agents is based, at least in part, on the state of each of the plurality of recording agents. 8. The method of claim 6, further comprising: querying a queue of available recording agents; and receiving an indication of an available recording agent in the queue of available recording agents, wherein the determining the recording agent of the plurality of recording agents is based, at least in part, on the indication of the available recording agent in the queue of available recording agents. 9. The method of claim 6, further comprising: receiving a request indicative of availability from one or more recording agents of the plurality of recording agents, wherein the determining the recording agent of the plurality of recording agents is based, at least in part, on the request indicative of availability from the one or more recording agents of the plurality of recording agents. 10. The method of claim 4, further comprising: receiving an information file associated with the content asset, wherein the information file comprises an indication of the plurality of segments comprising the content asset and the determining the segment from the plurality of segments to copy to the first storage is based, at least in part, on the information file. 11. The method of claim 4, further comprising: determining a second segment from the plurality of segments to copy to the first storage; receiving a copy of the second segment from the second storage; and causing a plurality of copies of the second segment to be created in the first storage using the copy of the second segment received from the second storage, wherein a quantity of the plurality of copies of the second segment equals the quantity of the plurality of requests to record the content asset. 12. The method of claim 4, wherein the causing the plurality of copies of the segment to be created in the first storage comprises providing an instruction indicating a file location of the segment in the second storage and a quantity of copies to be made in the first storage equaling the quantity of the plurality of requests to record the content asset. 13. The method of claim 4, wherein the causing the plurality of copies of the segment to be created in the first storage comprises causing a first set of copies of the segment to be written to a first hard disk of the first storage in sequence, and causing a second set of copies of the segment to be written to a second hard disk of the first storage in sequence. 14.-20. (canceled) 21. A method comprising: receiving a plurality of requests to store a content asset, wherein the content asset comprises a plurality of segments stored in a first storage; determining a segment from the plurality of segments to copy to a second storage; determining a location of the segment in the first storage; and based on a single access of the segment at the determined location in the first storage, causing a plurality of copies of the segment to be created in the second storage, wherein a quantity of the plurality of copies of the segment equals a quantity of the plurality of requests to store the content asset. 22. The method of claim 21, wherein the causing the plurality of copies of the segment to be created in the second storage comprises causing at least a portion of the plurality of copies of the segment to be written to a hard disk of the second storage in sequence. 23. The method of claim 21, further comprising: determining a recording agent from a plurality of recording agents; wherein the causing the plurality of copies of the segment to be created in the second storage comprises the determined recording agent causing the plurality of copies of the segment to be created in the second storage based on a single access of the segment at the location in the first storage. 24. The method of claim 23, further comprising: determining a state of each of the plurality of recording agents, wherein the determining the recording agent from the plurality of recording agents is based, at least in part, on the state of each of the plurality of recording agents. 25. The method of claim 23, further comprising querying a queue of available recording agents; and receiving an indication of an available recording agent in the queue of available recording agents, wherein the determining the recording agent of the plurality of recording agents is based, at least in part, on the indication of the available recording agent in the queue of available recording agents. 26. The method of claim 21, further comprising: receiving an information file associated with the content asset, wherein the information file comprises an indication of a location of each of the plurality of segments in the first storage, wherein the determining the location in the first storage of the segment is based, at least in part, on the information file. 27. The method of claim 21, wherein the causing the plurality of copies of the segment to be created in the second storage comprises providing an instruction indicating the location of the segment in the first storage and a quantity of copies to be created in the second storage equaling the quantity of the plurality of requests to store the content asset.
Systems and methods for managing the storage and delivery of recorded content in a network digital video recorder (DVR) system are disclosed. A plurality of requests to record a program may be received, wherein the program may comprise a plurality of segments. A segment from the plurality of segments may be determined to be copied to a first storage. A copy of the segment may be received from a second storage and a plurality of copies of the segment may be created in the first storage from the copy of the segment received from the second storage. The quantity of the plurality of copies of the segment may be equal to the quantity of the plurality of requests to record the program.1. A method comprising: receiving, by a network digital video recorder system, a plurality of requests to record a content asset, wherein the network digital video recorder system comprising a plurality of recording agents and the content asset comprising a plurality of segments stored in a storage medium; determining a segment from the plurality of segments to copy to a recording storage; determining a recording agent from the plurality of recording agents; and causing, via the determined recording agent, based on a single access of the segment from the storage medium, a plurality of copies of the segment to be created in the recording storage, wherein a quantity of the plurality of copies of the segment equals a quantity of the plurality of requests to record the content asset. 2. The method of claim 1, wherein the causing the plurality of copies of the segment to be created in the recording storage comprises causing at least a portion of the plurality of copies of the segment to be written to a hard disk of the recording storage in sequence. 3. The method of claim 1, further comprising: determining a second segment from the plurality of segments to copy to the recording storage; determining a second recording agent from the plurality of recording agents; and causing, via the determined second recording agent, based on a single access of the second segment from the storage medium, a plurality of copies of the second segment to be created in the recording storage, wherein a quantity of the plurality of copies of the second segment equals the quantity of the plurality of requests to record the content asset. 4. A method comprising: receiving a plurality of requests to record a content asset, wherein the content asset comprises a plurality of segments; determining a segment from the plurality of segments to copy to a first storage; receiving a copy of the segment from a second storage; and causing a plurality of copies of the segment to be created in the first storage using the copy of the segment received from the second storage, wherein a quantity of the plurality of copies of the segment equals a quantity of the plurality of requests to record the content asset. 5. The method of claim 4, wherein the causing the plurality of copies of the segment to be created in the first storage comprises causing at least a portion of the plurality of copies of the segment to be written to a hard disk of the first storage in sequence. 6. The method of claim 4, further comprising: determining a recording agent from a plurality of recording agents, wherein the receiving the copy of the segment from the second storage comprises the determined recording agent receiving the copy of the segment; and wherein the causing the plurality of copies of the segment to be created in the first storage comprises the determined recording agent causing the plurality of copies of the segment to be created in the first storage. 7. The method of claim 6, further comprising: determining a state of each of the plurality of recording agents, wherein the determining the recording agent from the plurality of recording agents is based, at least in part, on the state of each of the plurality of recording agents. 8. The method of claim 6, further comprising: querying a queue of available recording agents; and receiving an indication of an available recording agent in the queue of available recording agents, wherein the determining the recording agent of the plurality of recording agents is based, at least in part, on the indication of the available recording agent in the queue of available recording agents. 9. The method of claim 6, further comprising: receiving a request indicative of availability from one or more recording agents of the plurality of recording agents, wherein the determining the recording agent of the plurality of recording agents is based, at least in part, on the request indicative of availability from the one or more recording agents of the plurality of recording agents. 10. The method of claim 4, further comprising: receiving an information file associated with the content asset, wherein the information file comprises an indication of the plurality of segments comprising the content asset and the determining the segment from the plurality of segments to copy to the first storage is based, at least in part, on the information file. 11. The method of claim 4, further comprising: determining a second segment from the plurality of segments to copy to the first storage; receiving a copy of the second segment from the second storage; and causing a plurality of copies of the second segment to be created in the first storage using the copy of the second segment received from the second storage, wherein a quantity of the plurality of copies of the second segment equals the quantity of the plurality of requests to record the content asset. 12. The method of claim 4, wherein the causing the plurality of copies of the segment to be created in the first storage comprises providing an instruction indicating a file location of the segment in the second storage and a quantity of copies to be made in the first storage equaling the quantity of the plurality of requests to record the content asset. 13. The method of claim 4, wherein the causing the plurality of copies of the segment to be created in the first storage comprises causing a first set of copies of the segment to be written to a first hard disk of the first storage in sequence, and causing a second set of copies of the segment to be written to a second hard disk of the first storage in sequence. 14.-20. (canceled) 21. A method comprising: receiving a plurality of requests to store a content asset, wherein the content asset comprises a plurality of segments stored in a first storage; determining a segment from the plurality of segments to copy to a second storage; determining a location of the segment in the first storage; and based on a single access of the segment at the determined location in the first storage, causing a plurality of copies of the segment to be created in the second storage, wherein a quantity of the plurality of copies of the segment equals a quantity of the plurality of requests to store the content asset. 22. The method of claim 21, wherein the causing the plurality of copies of the segment to be created in the second storage comprises causing at least a portion of the plurality of copies of the segment to be written to a hard disk of the second storage in sequence. 23. The method of claim 21, further comprising: determining a recording agent from a plurality of recording agents; wherein the causing the plurality of copies of the segment to be created in the second storage comprises the determined recording agent causing the plurality of copies of the segment to be created in the second storage based on a single access of the segment at the location in the first storage. 24. The method of claim 23, further comprising: determining a state of each of the plurality of recording agents, wherein the determining the recording agent from the plurality of recording agents is based, at least in part, on the state of each of the plurality of recording agents. 25. The method of claim 23, further comprising querying a queue of available recording agents; and receiving an indication of an available recording agent in the queue of available recording agents, wherein the determining the recording agent of the plurality of recording agents is based, at least in part, on the indication of the available recording agent in the queue of available recording agents. 26. The method of claim 21, further comprising: receiving an information file associated with the content asset, wherein the information file comprises an indication of a location of each of the plurality of segments in the first storage, wherein the determining the location in the first storage of the segment is based, at least in part, on the information file. 27. The method of claim 21, wherein the causing the plurality of copies of the segment to be created in the second storage comprises providing an instruction indicating the location of the segment in the first storage and a quantity of copies to be created in the second storage equaling the quantity of the plurality of requests to store the content asset.
2,400
7,382
7,382
14,385,973
2,471
The invention proposes a method of linking extended PUCCH resources for ACK/NACK implicitly to eCCEs used by EPDCCH. According to an embodiment of the invention, extended PUCCH resources for ACK/NACK are indexed based on the numbering of eCCEs. As compared with a method of indexing extended PUCCH resources for ACK/NACK through explicit linking, this method of implicit linking can save a significant signaling overhead and facilitate a standardization course. Furthermore this method further addresses the problem in the prior art of the lack of a linkage between extended PUCCH resources for ACK/NACK implicitly to eCCEs used by EPDCCH.
1. A method, in a base station of a communication system, of linking extended PUCCH resources for ACK/NACK implicitly to eCCEs used by EPDCCH, wherein the base station serves user equipments, the EPDCCH uses the eCCEs for transmission, and the method comprises the steps of: numbering the plurality of extended PUCCH resources for the ACK/NACK, wherein each of the plurality of extended PUCCH resources corresponds to one user equipment; numbering the eCCEs used by all the EPDCCHs; determining an linkage between the numbering of the extended PUCCH resources and the numbering of the eCCEs; sharing with the user equipment the linkage and information associated with the numbering of the extended PUCCH resources; and transmitting number information associated with the eCCEs to the user equipment. 2. The method according to claim 1, wherein the determining further comprises: determining the linkage between the numbering of the extended PUCCH resources and the numbering of the eCCEs according to a boundary index. 3. The method according to claim 1, wherein the transmitting further comprises: the number information includes an offset factor when the eCCEs of the EPDCCH resources are numbered subsequent to numbering of CCEs of legacy PDCCH resources. 4. The method according to claim 1, wherein the transmitting further comprises: the number information includes the numbering of the eCCEs when the eCCEs of the EPDCCH resources are numbered separately. 5. The method according to claim 1, wherein the method further comprises: according to numbering of eCCEs corresponding to a receiving user equipment and based upon the linkage, determining extended PUCCH resource for the ACK/NACK for the user equipment, and receiving the ACK/NACK from the user equipment over the determined resource. 6. A method, in a user equipment of a communication system, of linking extended PUCCH resources for ACK/NACK implicitly to eCCEs used by EPDCCH, wherein the user equipment is served by a base station, the EPDCCH uses the eCCEs for transmission, and the method comprises: sharing, with the base station, information associated with numbering of the extended PUCCH resources and a linkage between the numbering of the extended PUCCH resources and numbering of the eCCEs; receiving number information associated with the eCCEs from the base station; and determining the numbering of the extended PUCCH resource for the ACK/NACK based upon the number information and the linkage. 7. The method according to claim 6, wherein the linkage is a linkage between the numbering of the extended PUCCH resources and the numbering of the eCCEs according to a boundary index. 8. The method according to claim 6, wherein the number information includes an offset factor when the eCCEs of the EPDCCH resources are numbered subsequent to numbering of CCEs of legacy PDCCH resources. 9. The method according to claim 6, wherein the number information includes the numbering of the eCCEs when the eCCEs of the EPDCCH resources are numbered separately. 10. The method according to claim 6, wherein the method further comprises: transmitting the ACK/NACK to the base station over the extended PUCCH resource corresponding to the determined numbering of the extended PUCCH resource for the ACK/NACK, according to the information associated with the numbering of the extended PUCCH resources. 11. A method, in a base station of a communication system, of linking extended PUCCH resources for ACK/NACK implicitly to eCCEs used by EPDCCH, wherein the base station serves user equipments, the EPDCCH uses the eCCEs for transmission, and the method comprises: numbering the plurality of extended PUCCH resources for ACK/NACK, wherein each of the plurality of extended PUCCH resources corresponds to one user equipment; determining an linkage between the numbering of the extended PUCCH resources and numbering of the eCCEs according to a predetermined parameter; and sharing with the user equipment the linkage and information associated with the numbering of the extended PUCCH resources. 12. The method according to claim 11, wherein the method further comprises the step of: according to numbering of eCCEs corresponding to a receiving user equipment and based upon the linkage, determining extended PUCCH resource for the ACK/NACK for the user equipment, and receiving the ACK/NACK from the user equipment over the determined resource. 13. The method according to claim 11, wherein the predetermined parameter includes a sequence number of a physical resource block pair occupied by the user equipment, the total number of eCCEs in the physical resource block pair, DM-RS configuration information and a boundary index. 14. A method, in a user equipment of a communication system, of linking extended PUCCH resources for ACK/NACK implicitly to eCCEs used by EPDCCH, wherein the user equipment is served by a base station, the EPDCCH uses the eCCEs for transmission, and the method comprises: sharing, with the base station, information associated with numbering of the extended PUCCH resources and a linkage between the numbering of the extended PUCCH resources and numbering of the eCCEs, wherein the linkage is determined according to a predetermined parameter; numbering eCCEs in a physical resource block pair allocated to the user equipment; and determining the numbering of the extended PUCCH resource for the ACK/NACK based upon the number information of the eCCEs and the linkage; and transmitting the ACK/NACK to the base station over the extended PUCCH resource corresponding to the determined numbering of the extended PUCCH resources for the ACK/NACK, according to the information associated with the numbering of the extended PUCCH resources. 15. (canceled) 16. The method according to claim 14, wherein the predetermined parameter includes a sequence number of a physical resource block pair occupied by the user equipment, the total number of eCCEs in the physical resource block pair, DM-RS configuration information and a boundary index.
The invention proposes a method of linking extended PUCCH resources for ACK/NACK implicitly to eCCEs used by EPDCCH. According to an embodiment of the invention, extended PUCCH resources for ACK/NACK are indexed based on the numbering of eCCEs. As compared with a method of indexing extended PUCCH resources for ACK/NACK through explicit linking, this method of implicit linking can save a significant signaling overhead and facilitate a standardization course. Furthermore this method further addresses the problem in the prior art of the lack of a linkage between extended PUCCH resources for ACK/NACK implicitly to eCCEs used by EPDCCH.1. A method, in a base station of a communication system, of linking extended PUCCH resources for ACK/NACK implicitly to eCCEs used by EPDCCH, wherein the base station serves user equipments, the EPDCCH uses the eCCEs for transmission, and the method comprises the steps of: numbering the plurality of extended PUCCH resources for the ACK/NACK, wherein each of the plurality of extended PUCCH resources corresponds to one user equipment; numbering the eCCEs used by all the EPDCCHs; determining an linkage between the numbering of the extended PUCCH resources and the numbering of the eCCEs; sharing with the user equipment the linkage and information associated with the numbering of the extended PUCCH resources; and transmitting number information associated with the eCCEs to the user equipment. 2. The method according to claim 1, wherein the determining further comprises: determining the linkage between the numbering of the extended PUCCH resources and the numbering of the eCCEs according to a boundary index. 3. The method according to claim 1, wherein the transmitting further comprises: the number information includes an offset factor when the eCCEs of the EPDCCH resources are numbered subsequent to numbering of CCEs of legacy PDCCH resources. 4. The method according to claim 1, wherein the transmitting further comprises: the number information includes the numbering of the eCCEs when the eCCEs of the EPDCCH resources are numbered separately. 5. The method according to claim 1, wherein the method further comprises: according to numbering of eCCEs corresponding to a receiving user equipment and based upon the linkage, determining extended PUCCH resource for the ACK/NACK for the user equipment, and receiving the ACK/NACK from the user equipment over the determined resource. 6. A method, in a user equipment of a communication system, of linking extended PUCCH resources for ACK/NACK implicitly to eCCEs used by EPDCCH, wherein the user equipment is served by a base station, the EPDCCH uses the eCCEs for transmission, and the method comprises: sharing, with the base station, information associated with numbering of the extended PUCCH resources and a linkage between the numbering of the extended PUCCH resources and numbering of the eCCEs; receiving number information associated with the eCCEs from the base station; and determining the numbering of the extended PUCCH resource for the ACK/NACK based upon the number information and the linkage. 7. The method according to claim 6, wherein the linkage is a linkage between the numbering of the extended PUCCH resources and the numbering of the eCCEs according to a boundary index. 8. The method according to claim 6, wherein the number information includes an offset factor when the eCCEs of the EPDCCH resources are numbered subsequent to numbering of CCEs of legacy PDCCH resources. 9. The method according to claim 6, wherein the number information includes the numbering of the eCCEs when the eCCEs of the EPDCCH resources are numbered separately. 10. The method according to claim 6, wherein the method further comprises: transmitting the ACK/NACK to the base station over the extended PUCCH resource corresponding to the determined numbering of the extended PUCCH resource for the ACK/NACK, according to the information associated with the numbering of the extended PUCCH resources. 11. A method, in a base station of a communication system, of linking extended PUCCH resources for ACK/NACK implicitly to eCCEs used by EPDCCH, wherein the base station serves user equipments, the EPDCCH uses the eCCEs for transmission, and the method comprises: numbering the plurality of extended PUCCH resources for ACK/NACK, wherein each of the plurality of extended PUCCH resources corresponds to one user equipment; determining an linkage between the numbering of the extended PUCCH resources and numbering of the eCCEs according to a predetermined parameter; and sharing with the user equipment the linkage and information associated with the numbering of the extended PUCCH resources. 12. The method according to claim 11, wherein the method further comprises the step of: according to numbering of eCCEs corresponding to a receiving user equipment and based upon the linkage, determining extended PUCCH resource for the ACK/NACK for the user equipment, and receiving the ACK/NACK from the user equipment over the determined resource. 13. The method according to claim 11, wherein the predetermined parameter includes a sequence number of a physical resource block pair occupied by the user equipment, the total number of eCCEs in the physical resource block pair, DM-RS configuration information and a boundary index. 14. A method, in a user equipment of a communication system, of linking extended PUCCH resources for ACK/NACK implicitly to eCCEs used by EPDCCH, wherein the user equipment is served by a base station, the EPDCCH uses the eCCEs for transmission, and the method comprises: sharing, with the base station, information associated with numbering of the extended PUCCH resources and a linkage between the numbering of the extended PUCCH resources and numbering of the eCCEs, wherein the linkage is determined according to a predetermined parameter; numbering eCCEs in a physical resource block pair allocated to the user equipment; and determining the numbering of the extended PUCCH resource for the ACK/NACK based upon the number information of the eCCEs and the linkage; and transmitting the ACK/NACK to the base station over the extended PUCCH resource corresponding to the determined numbering of the extended PUCCH resources for the ACK/NACK, according to the information associated with the numbering of the extended PUCCH resources. 15. (canceled) 16. The method according to claim 14, wherein the predetermined parameter includes a sequence number of a physical resource block pair occupied by the user equipment, the total number of eCCEs in the physical resource block pair, DM-RS configuration information and a boundary index.
2,400
7,383
7,383
14,218,965
2,433
Aspects of the disclosure relates to managed access to content and/or services. In certain aspects, tokens or other artifacts can be utilized for authentication and authorization.
1. A method, comprising: receiving a token request for a network token via a computing platform comprising at least one processor functionally coupled to at least one memory device, the token request comprising a logical address; generating, via the computing platform, the network token in response to the request, the network token comprising address information representative of the logical address. 2. The method of claim 1, wherein generating the network token comprises generating hashed information representative of one or more of a content location, a service account, a device identifier, an expiration period for the network token, the logical address, a cryptographic secret, a switching interval for the cryptographic secret, or the signature identity; generating information indicative of an index of cryptographic key associated with a cryptographic algorithm for generating the hashed information; and generating information indicative of the expiration period for the network token. 3. The method of claim 1, wherein generating the network token comprises generating hashed information representative of one or more of a content location, a service account, a device identifier, an expiration period for the network token, the logical address, a cryptographic secret, a switching interval for the cryptographic secret, or the signature identity. 4. The method of claim 3, wherein generating the hashed information comprises generating a hash-based message authentication code (HMAC) based at least on one or more of the content location, the service account, the device identifier, the expiration period for the network token, the logical address, the cryptographic secret, or the signature identity. 5. The method of claim 1, further comprising determining, via the computing platform, the logical address from a second token request for the network token prior to receiving the token request. 6. The method of claim 1, wherein the network token comprises resource location information indicative of content location, and wherein the resource location is included in a predetermined group of content locations. 7. The method of claim 1, further comprising receiving a content request via the computing platform, and validating a second network token contained in the content request. 8. The method of claim 7, wherein receiving the content request via the computing platform comprises receiving information indicative of a signed content location according to a communication protocol, wherein the signed content location comprises a resource location contained in the second network token and a group of parameters representative of hashed information representative of one or more of a content location, a service account, a device identifier, an expiration period for the network token, the logical address, a cryptographic secret, a switching interval for the cryptographic secret, or the signature identity. 9. A system, comprising: at least one memory device comprising computer-executable instructions encoded thereon; and at least one processor functionally coupled to the at least one memory and configured, by the computer-executable instructions, to receive a token request for a network token, the token request comprising a logical address; to generate the network token in response to the request, the network token comprising address information representative of the logical address. 10. The system of claim 1, wherein generating the network token comprises generating hashed information representative of one or more of a content location, a service account, a device identifier, an expiration period for the network token, the logical address, a cryptographic secret, a switching interval for the cryptographic secret, or the signature identity; generating information indicative of an index of cryptographic key associated with a cryptographic algorithm for generating the hashed information; and generating information indicative of the expiration period for the network token. 11. The system of claim 1, wherein the at least one processor is further configured to generating hashed information representative of one or more of a content location, a service account, a device identifier, an expiration period for the network token, the logical address, a cryptographic secret, a switching interval for the cryptographic secret, or the signature identity. 12. The system of claim 3, wherein the at least one processor is further configured to generating a hash-based message authentication code (HMAC) based at least on one or more of the content location, the service account, the device identifier, the expiration period for the network token, the logical address, the cryptographic secret, or the signature identity. 13. The system of claim 1, the at least one processor is further configured to determining, via the computing platform, the logical address from a second token request for the network token prior to receiving the token request. 14. The system of claim 1, wherein the network token comprises resource location information indicative of content location, and wherein the resource location is included in a predetermined group of content locations. 15. The system of claim 1, the at least one processor is further configured to receiving a content request via the computing platform, and validating a second network token contained in the content request. 16. The system of claim 7, wherein the at least one processor is further configured to receiving information indicative of a signed content location according to a communication protocol, wherein the signed content location comprises a resource location contained in the second network token and a group of parameters representative of hashed information representative of one or more of a content location, a service account, a device identifier, an expiration period for the network token, the logical address, a cryptographic secret, a switching interval for the cryptographic secret, or the signature identity. 17. At least one non-transitory storage medium having instructions for content delivery encoded thereon that, in response to execution, cause at least one computing platform having at least one processor to perform operations comprising: receiving a token request for a network token, the token request comprising a logical address; generating the network token in response to the request, the network token comprising address information representative of the logical address.
Aspects of the disclosure relates to managed access to content and/or services. In certain aspects, tokens or other artifacts can be utilized for authentication and authorization.1. A method, comprising: receiving a token request for a network token via a computing platform comprising at least one processor functionally coupled to at least one memory device, the token request comprising a logical address; generating, via the computing platform, the network token in response to the request, the network token comprising address information representative of the logical address. 2. The method of claim 1, wherein generating the network token comprises generating hashed information representative of one or more of a content location, a service account, a device identifier, an expiration period for the network token, the logical address, a cryptographic secret, a switching interval for the cryptographic secret, or the signature identity; generating information indicative of an index of cryptographic key associated with a cryptographic algorithm for generating the hashed information; and generating information indicative of the expiration period for the network token. 3. The method of claim 1, wherein generating the network token comprises generating hashed information representative of one or more of a content location, a service account, a device identifier, an expiration period for the network token, the logical address, a cryptographic secret, a switching interval for the cryptographic secret, or the signature identity. 4. The method of claim 3, wherein generating the hashed information comprises generating a hash-based message authentication code (HMAC) based at least on one or more of the content location, the service account, the device identifier, the expiration period for the network token, the logical address, the cryptographic secret, or the signature identity. 5. The method of claim 1, further comprising determining, via the computing platform, the logical address from a second token request for the network token prior to receiving the token request. 6. The method of claim 1, wherein the network token comprises resource location information indicative of content location, and wherein the resource location is included in a predetermined group of content locations. 7. The method of claim 1, further comprising receiving a content request via the computing platform, and validating a second network token contained in the content request. 8. The method of claim 7, wherein receiving the content request via the computing platform comprises receiving information indicative of a signed content location according to a communication protocol, wherein the signed content location comprises a resource location contained in the second network token and a group of parameters representative of hashed information representative of one or more of a content location, a service account, a device identifier, an expiration period for the network token, the logical address, a cryptographic secret, a switching interval for the cryptographic secret, or the signature identity. 9. A system, comprising: at least one memory device comprising computer-executable instructions encoded thereon; and at least one processor functionally coupled to the at least one memory and configured, by the computer-executable instructions, to receive a token request for a network token, the token request comprising a logical address; to generate the network token in response to the request, the network token comprising address information representative of the logical address. 10. The system of claim 1, wherein generating the network token comprises generating hashed information representative of one or more of a content location, a service account, a device identifier, an expiration period for the network token, the logical address, a cryptographic secret, a switching interval for the cryptographic secret, or the signature identity; generating information indicative of an index of cryptographic key associated with a cryptographic algorithm for generating the hashed information; and generating information indicative of the expiration period for the network token. 11. The system of claim 1, wherein the at least one processor is further configured to generating hashed information representative of one or more of a content location, a service account, a device identifier, an expiration period for the network token, the logical address, a cryptographic secret, a switching interval for the cryptographic secret, or the signature identity. 12. The system of claim 3, wherein the at least one processor is further configured to generating a hash-based message authentication code (HMAC) based at least on one or more of the content location, the service account, the device identifier, the expiration period for the network token, the logical address, the cryptographic secret, or the signature identity. 13. The system of claim 1, the at least one processor is further configured to determining, via the computing platform, the logical address from a second token request for the network token prior to receiving the token request. 14. The system of claim 1, wherein the network token comprises resource location information indicative of content location, and wherein the resource location is included in a predetermined group of content locations. 15. The system of claim 1, the at least one processor is further configured to receiving a content request via the computing platform, and validating a second network token contained in the content request. 16. The system of claim 7, wherein the at least one processor is further configured to receiving information indicative of a signed content location according to a communication protocol, wherein the signed content location comprises a resource location contained in the second network token and a group of parameters representative of hashed information representative of one or more of a content location, a service account, a device identifier, an expiration period for the network token, the logical address, a cryptographic secret, a switching interval for the cryptographic secret, or the signature identity. 17. At least one non-transitory storage medium having instructions for content delivery encoded thereon that, in response to execution, cause at least one computing platform having at least one processor to perform operations comprising: receiving a token request for a network token, the token request comprising a logical address; generating the network token in response to the request, the network token comprising address information representative of the logical address.
2,400
7,384
7,384
13,657,859
2,452
A local area social networking server limits social networking activity to people likely to be in close physical proximity to one another and likely to be engaged in similar activities, even people previously unknown to each other, by only permitting social networking between computing devices that are connected to one another through a common local area network. The server identifies recipient devices for a message that (i) are coupled to the same local area network as the sending device, (ii) are associated with demographic characteristics that match those specified for the message as intended recipients, and (iii) are indicated by receptivity data to be receptive to the message and the sender.
1. A method for facilitating a local area social network between two or more computing devices, the method comprising: receiving a message from a sending one of the computing devices through a local area network; identifying one or more recipient ones of the computing devices by: determining that the recipient computing devices are connected through the local area network, determining that the recipient computing devices are specified by a delivery specification of the message, and determining that the recipient computing devices are receptive to receiving the message; and sending the message to the recipient computing devices. 2. The method of claim 1 wherein the delivery specification of the message includes data specifying one or more demographic characteristics of people to whom the message should be sent; and further wherein determining that the recipient computing devices are specified by a delivery specification of the message comprises comparing the demographic characteristics specified in the delivery specification to one or more demographic characteristics received from each of the computing devices. 3. The method of claim 1 wherein determining that the recipient computing devices are receptive to receiving the message comprises comparing the demographic characteristics specified in the delivery specification to receptivity data received from each of the computing devices. 4. The method of claim 1 wherein determining that the recipient computing devices are receptive to receiving the message comprises comparing one or more demographic characteristics received from the sending computing device to receptivity data received from each of the computing devices. 5-10. (canceled) 11. A computer system comprising: at least one processor; a computer readable medium that is operatively coupled to the processor; network access circuitry that is operatively coupled to the processor; and local area social networking server logic (i) that executes in the processor from the computer readable medium and (ii) that, when executed by the processor, causes the computer to facilitate a local area social network between two or more computing devices by at least: receiving a message from a sending one of the computing devices through a local area network; identifying one or more recipient ones of the computing devices by: (i) determining that the recipient computing devices are connected through the local area network, (ii) determining that the recipient computing devices are specified by a delivery specification of the message, and (iii) determining that the recipient computing devices are receptive to receiving the message; and sending the message to the recipient computing devices. 12-15. (canceled) 16. The method of claim 2 wherein determining that the recipient computing devices are receptive to receiving the message comprises comparing the demographic characteristics specified in the delivery specification to receptivity data received from each of the computing devices. 17. The method of claim 3 wherein determining that the recipient cnarrower in scopeomputing devices are receptive to receiving the message comprises comparing one or more demographic characteristics received from the sending computing device to receptivity data received from each of the computing devices.
A local area social networking server limits social networking activity to people likely to be in close physical proximity to one another and likely to be engaged in similar activities, even people previously unknown to each other, by only permitting social networking between computing devices that are connected to one another through a common local area network. The server identifies recipient devices for a message that (i) are coupled to the same local area network as the sending device, (ii) are associated with demographic characteristics that match those specified for the message as intended recipients, and (iii) are indicated by receptivity data to be receptive to the message and the sender.1. A method for facilitating a local area social network between two or more computing devices, the method comprising: receiving a message from a sending one of the computing devices through a local area network; identifying one or more recipient ones of the computing devices by: determining that the recipient computing devices are connected through the local area network, determining that the recipient computing devices are specified by a delivery specification of the message, and determining that the recipient computing devices are receptive to receiving the message; and sending the message to the recipient computing devices. 2. The method of claim 1 wherein the delivery specification of the message includes data specifying one or more demographic characteristics of people to whom the message should be sent; and further wherein determining that the recipient computing devices are specified by a delivery specification of the message comprises comparing the demographic characteristics specified in the delivery specification to one or more demographic characteristics received from each of the computing devices. 3. The method of claim 1 wherein determining that the recipient computing devices are receptive to receiving the message comprises comparing the demographic characteristics specified in the delivery specification to receptivity data received from each of the computing devices. 4. The method of claim 1 wherein determining that the recipient computing devices are receptive to receiving the message comprises comparing one or more demographic characteristics received from the sending computing device to receptivity data received from each of the computing devices. 5-10. (canceled) 11. A computer system comprising: at least one processor; a computer readable medium that is operatively coupled to the processor; network access circuitry that is operatively coupled to the processor; and local area social networking server logic (i) that executes in the processor from the computer readable medium and (ii) that, when executed by the processor, causes the computer to facilitate a local area social network between two or more computing devices by at least: receiving a message from a sending one of the computing devices through a local area network; identifying one or more recipient ones of the computing devices by: (i) determining that the recipient computing devices are connected through the local area network, (ii) determining that the recipient computing devices are specified by a delivery specification of the message, and (iii) determining that the recipient computing devices are receptive to receiving the message; and sending the message to the recipient computing devices. 12-15. (canceled) 16. The method of claim 2 wherein determining that the recipient computing devices are receptive to receiving the message comprises comparing the demographic characteristics specified in the delivery specification to receptivity data received from each of the computing devices. 17. The method of claim 3 wherein determining that the recipient cnarrower in scopeomputing devices are receptive to receiving the message comprises comparing one or more demographic characteristics received from the sending computing device to receptivity data received from each of the computing devices.
2,400
7,385
7,385
13,319,147
2,465
The invention proposes to introduce a method for a Radio Access Network for providing “Local Switching” between call legs of a call. Within said method the Radio Access Network receives a call identifier for a leg of a call from a Core Network to be handled by the Radio Access Network. The Radio Access Network stores said received call identifier, compares said received call identifier with stored call identifiers for call legs of calls via said Radio Access Network. If said received call identifier matches a stored call identifier the Radio Access Networks establish local switching of call legs identified by the matching call identifier. In an alternative embodiment, the invention proposes to introduce a method for a Core Network for providing local switching for call legs of a call. Within said method the Core Network receives or generates a call identifier for a leg of a call. The Core Network stores said received call identifier and identifies a respective Radio Access Network for said leg of said call. Thereafter, the Core Network compares said call received identifier with stored call identifiers for call legs of calls via said identified Radio Access Network. If said received call identifier matches a stored call identifier enforce local switching of call legs identified by the matching call identifier. The invention furthermore provides for respective Nodes of the respective Networks employing the invention.
1-23. (canceled) 24. A method implemented in a Radio Access Network for providing local switching for call legs of a call, comprising: receiving, from a Core Network, a call identifier for a first leg of a call to be handled by the Radio Access Network; storing the received call identifier in memory; comparing the received call identifier with previously stored call identifiers for call legs of calls supported by the Radio Access Network; and responsive to the received call identifier matching one of the previously stored call identifiers, establishing local switching between the call legs corresponding to the matching call identifiers. 25. The method of claim 24, further comprising: sending the Core Network an indication that the Radio Access Network supports Local Switching. 26. The method of claim 24, further comprising: receiving from the Core Network an indication that Local Switching is allowed, is not allowed, or is no longer allowed. 27. The method of claim 24, further comprising: sending the Core Network an indication that the Radio Access Network has established Local Switching between the call legs corresponding to the matching call identifiers. 28. The method of claim 24, further comprising: removing the received call identifier from memory once the call leg corresponding to the received call identifier is terminated. 29. The method of claim 24, wherein the received call identifier is received in the course of a call set-up for the call or in the course of a handover for the call. 30. The method of claim 24, wherein the step of establishing local switching establishes a User Plane in the Radio Access Network such that User Plane traffic between the locally switched call legs bypasses the Core Network, the method further comprising: sending the Core Network an indication indicating that the Radio Access Network either has to break or has broken Local Switching for the ongoing call, and also indicating that the Radio Access network either has to reestablish or has reestablished the User Plane through the Core Network. 31. The method of claim 24, wherein the step of establishing local switching establishes 1 User Plane in the Radio Access Network such that User Plane traffic between the locally switched call legs bypasses the Core Network, the method further comprising: receiving from the Core Network an indication indicating that the Radio Access Network shall either break or shall refrain from establishing Local Switching for the ongoing call, and also indicating that the User Plane will be reestablished or shall be maintained through the Core Network; and receiving from the Core Network an indication of the extent to which the Local Switching shall be established, and the extent to which the User Plane shall be provided between the Core Network and the Radio Access Network. 32. A method implemented in a Core Network for providing local switching for call legs of a call, comprising: receiving or generating a first call identifier for a leg of a call; storing the first call identifier in memory; identifying a respective Radio Access Network for the leg of the call; comparing the first call identifier with previously stored call identifiers for call legs of calls supported by the identified Radio Access Network; and responsive to the first identifier matching one of the previously stored call identifiers, initiating local switching between the call legs corresponding to the matching call identifiers. 33. The method of claim 32, further comprising: identifying that the identified Radio Access Network supports Local Switching. 34. The method of claim 32, further comprising: sending an indication to the Radio Access Network that Local Switching is allowed, is not allowed, or is no longer allowed. 35. The method of claim 32, further comprising: removing the first call identifier from memory responsive to the call leg corresponding to the first call identifier being terminated. 36. The method of claim 32, wherein the first call identifier is received or generated in the course of a call set-up for the call or in the course of a handover for the call. 37. A Radio Access Network Node adapted for providing local switching for call legs of a call, comprising: a receiver circuit configured to receive a call identifier for a leg of a call from a Core Network to be handled by the Radio Access Network Node; memory configured to store the received call identifier; and a control circuit operatively connected to the receiver circuit and the memory, and being configured to: compare the received call identifier with previously stored call identifiers for call legs of calls supported by the Radio Access Network Node; determine if the received call identifier matches one of the previously stored call identifiers; and provide local switching between the call legs corresponding to the matching call identifiers. 38. The Radio Access Network Node of claim 37, further comprising: a transmitter circuit configured to send the Core Network an indication that the Radio Access Network Node supports Local Switching. 39. The Radio Access Network Node of claim 37, wherein the control circuit is configured to remove the received call identifier from memory once the call leg corresponding to the received call identifier is terminated. 40. The Radio Access Network Node of claim 37, wherein the received call identifier is received in the course of a call set-up for the call or in the course of a handover for the call. 41. The Radio Access Network of claim 37, wherein the receiver circuit is further configured to receive from the Core Network an indication indicating whether the Radio Access Network is allowed, is not allowed, or is no longer allowed to perform Local Switching. 42. A Core Network Node adapted for providing local switching for call legs of a call, comprising: a receiver circuit configured to receive or to generate a first call identifier for a call or a leg of a call; memory configured to store the first a first call identifier; and a control circuit operatively connected to the receiver circuit and the memory, the control circuit being configured to: identify a respective Radio Access Network for the leg of the call; compare the first call identifier with previously stored call identifiers for call legs of calls supported by the identified Radio Access Network; determine if the first call identifier matches one of the previously stored call identifiers; and initiate, in the identified Radio Access Network, local switching of the call legs corresponding to the matching call identifiers. 43. The Core Network Node of claim 42, wherein the control circuit is further configured to identify that the identified Radio Access Network supports Local Switching. 44. The Core Network Node of claim 42, wherein the control circuit is further configured to send an indication to the Radio Access Network that Local Switching is allowed, is not allowed, or is no longer allowed. 45. The Core Network Node of claim 42, wherein the control circuit is further configured to remove the first call identifier from memory once the call leg corresponding to the first call identifier is terminated. 46. The Core Network Node of claim 42, wherein the receiver circuit is configured to receive or generate the first call identifier in the course of a call set-up for the call or in the course of a handover for the call.
The invention proposes to introduce a method for a Radio Access Network for providing “Local Switching” between call legs of a call. Within said method the Radio Access Network receives a call identifier for a leg of a call from a Core Network to be handled by the Radio Access Network. The Radio Access Network stores said received call identifier, compares said received call identifier with stored call identifiers for call legs of calls via said Radio Access Network. If said received call identifier matches a stored call identifier the Radio Access Networks establish local switching of call legs identified by the matching call identifier. In an alternative embodiment, the invention proposes to introduce a method for a Core Network for providing local switching for call legs of a call. Within said method the Core Network receives or generates a call identifier for a leg of a call. The Core Network stores said received call identifier and identifies a respective Radio Access Network for said leg of said call. Thereafter, the Core Network compares said call received identifier with stored call identifiers for call legs of calls via said identified Radio Access Network. If said received call identifier matches a stored call identifier enforce local switching of call legs identified by the matching call identifier. The invention furthermore provides for respective Nodes of the respective Networks employing the invention.1-23. (canceled) 24. A method implemented in a Radio Access Network for providing local switching for call legs of a call, comprising: receiving, from a Core Network, a call identifier for a first leg of a call to be handled by the Radio Access Network; storing the received call identifier in memory; comparing the received call identifier with previously stored call identifiers for call legs of calls supported by the Radio Access Network; and responsive to the received call identifier matching one of the previously stored call identifiers, establishing local switching between the call legs corresponding to the matching call identifiers. 25. The method of claim 24, further comprising: sending the Core Network an indication that the Radio Access Network supports Local Switching. 26. The method of claim 24, further comprising: receiving from the Core Network an indication that Local Switching is allowed, is not allowed, or is no longer allowed. 27. The method of claim 24, further comprising: sending the Core Network an indication that the Radio Access Network has established Local Switching between the call legs corresponding to the matching call identifiers. 28. The method of claim 24, further comprising: removing the received call identifier from memory once the call leg corresponding to the received call identifier is terminated. 29. The method of claim 24, wherein the received call identifier is received in the course of a call set-up for the call or in the course of a handover for the call. 30. The method of claim 24, wherein the step of establishing local switching establishes a User Plane in the Radio Access Network such that User Plane traffic between the locally switched call legs bypasses the Core Network, the method further comprising: sending the Core Network an indication indicating that the Radio Access Network either has to break or has broken Local Switching for the ongoing call, and also indicating that the Radio Access network either has to reestablish or has reestablished the User Plane through the Core Network. 31. The method of claim 24, wherein the step of establishing local switching establishes 1 User Plane in the Radio Access Network such that User Plane traffic between the locally switched call legs bypasses the Core Network, the method further comprising: receiving from the Core Network an indication indicating that the Radio Access Network shall either break or shall refrain from establishing Local Switching for the ongoing call, and also indicating that the User Plane will be reestablished or shall be maintained through the Core Network; and receiving from the Core Network an indication of the extent to which the Local Switching shall be established, and the extent to which the User Plane shall be provided between the Core Network and the Radio Access Network. 32. A method implemented in a Core Network for providing local switching for call legs of a call, comprising: receiving or generating a first call identifier for a leg of a call; storing the first call identifier in memory; identifying a respective Radio Access Network for the leg of the call; comparing the first call identifier with previously stored call identifiers for call legs of calls supported by the identified Radio Access Network; and responsive to the first identifier matching one of the previously stored call identifiers, initiating local switching between the call legs corresponding to the matching call identifiers. 33. The method of claim 32, further comprising: identifying that the identified Radio Access Network supports Local Switching. 34. The method of claim 32, further comprising: sending an indication to the Radio Access Network that Local Switching is allowed, is not allowed, or is no longer allowed. 35. The method of claim 32, further comprising: removing the first call identifier from memory responsive to the call leg corresponding to the first call identifier being terminated. 36. The method of claim 32, wherein the first call identifier is received or generated in the course of a call set-up for the call or in the course of a handover for the call. 37. A Radio Access Network Node adapted for providing local switching for call legs of a call, comprising: a receiver circuit configured to receive a call identifier for a leg of a call from a Core Network to be handled by the Radio Access Network Node; memory configured to store the received call identifier; and a control circuit operatively connected to the receiver circuit and the memory, and being configured to: compare the received call identifier with previously stored call identifiers for call legs of calls supported by the Radio Access Network Node; determine if the received call identifier matches one of the previously stored call identifiers; and provide local switching between the call legs corresponding to the matching call identifiers. 38. The Radio Access Network Node of claim 37, further comprising: a transmitter circuit configured to send the Core Network an indication that the Radio Access Network Node supports Local Switching. 39. The Radio Access Network Node of claim 37, wherein the control circuit is configured to remove the received call identifier from memory once the call leg corresponding to the received call identifier is terminated. 40. The Radio Access Network Node of claim 37, wherein the received call identifier is received in the course of a call set-up for the call or in the course of a handover for the call. 41. The Radio Access Network of claim 37, wherein the receiver circuit is further configured to receive from the Core Network an indication indicating whether the Radio Access Network is allowed, is not allowed, or is no longer allowed to perform Local Switching. 42. A Core Network Node adapted for providing local switching for call legs of a call, comprising: a receiver circuit configured to receive or to generate a first call identifier for a call or a leg of a call; memory configured to store the first a first call identifier; and a control circuit operatively connected to the receiver circuit and the memory, the control circuit being configured to: identify a respective Radio Access Network for the leg of the call; compare the first call identifier with previously stored call identifiers for call legs of calls supported by the identified Radio Access Network; determine if the first call identifier matches one of the previously stored call identifiers; and initiate, in the identified Radio Access Network, local switching of the call legs corresponding to the matching call identifiers. 43. The Core Network Node of claim 42, wherein the control circuit is further configured to identify that the identified Radio Access Network supports Local Switching. 44. The Core Network Node of claim 42, wherein the control circuit is further configured to send an indication to the Radio Access Network that Local Switching is allowed, is not allowed, or is no longer allowed. 45. The Core Network Node of claim 42, wherein the control circuit is further configured to remove the first call identifier from memory once the call leg corresponding to the first call identifier is terminated. 46. The Core Network Node of claim 42, wherein the receiver circuit is configured to receive or generate the first call identifier in the course of a call set-up for the call or in the course of a handover for the call.
2,400
7,386
7,386
11,918,546
2,468
This invention concerns a method for managing access to reception services of resources of a distribution gateway within a local area network. The gateway comprises means for receiving digital services and the capacity to distribute over the local area network to clients the received services. It consists in using levels of priority among the users and modes for booking of the services to manage access conflicts.
1. Method of selection of digital services through a device called client connected to a local area network, the said local area network comprising a device called distribution gateway, the said distribution gateway possessing means of reception of digital services as well as means of distribution on the local area network of the received services, comprising at least the following steps at the client level: reception of a list of digital services accessible through the distribution gateway, sending of a query requesting the reception of a service from this list, wherein the query comprises a level of priority associated with the query. 2. Method according to claim 1, wherein the level of priority associated with the query is a level of priority relating to the user at the origin of the query on the client. 3. Method according to claim 1, wherein the level of priority associated with the query is a level of priority relating to the device at the origin of the query on the client. 4. Method according to claim 1 comprising furthermore a display step of the list of digital services accessible through the distribution gateway specifying for each service if it can be selected depending on the level of priority relating to the user of the client. 5. Method according to claim 1 comprising furthermore a display step of the list of digital services accessible through the distribution gateway specifying for each service if it can be selected depending on the level of priority relating to the client device. 6. Method according to claim 1, wherein the query also comprises a mode of reservation of the means of reception. 7. Method according to claim 6, wherein the mode of reservation comprises a mode in which access to a tuner is exclusive. 8. Method according to claim 6, wherein the mode of reservation comprises a mode in which access to a service is exclusive. 9. Method according to claim 6, wherein the mode of reservation comprises a mode in which access to a service is authorized for at least a second client of the services transported on the same transport stream as well as of the service reserved by the client. 10. Query service method through a device called distribution gateway connected to a local area network, the said distribution gateway possessing means of reception of digital services as well as means of distribution of the digital services received on the local area network meant for device called clients connected to the local area network comprising at least the following steps: sending of the list of digital services available; reception of a query for a digital service comprising a level of priority; determination of the capacity of the gateway to serve the query; wherein the method comprises furthermore, in case of incapacity of the gateway to serve the query due to the servicing of at least one previous query, a step of choice of the query to be privileged between the query received and the at least one previous query, according to the level of priority comprised in the query. 11. Method according to claim 10, wherein, the queries comprising furthermore a level of reservation of the means of reception, the step of choice of the query to be privileged between the query received and the at least one previous query is also made according to this level of reservation. 12. Client device connectable to a local area network comprising means of reception of a list of digital services from a distribution device of digital services possessing means of reception of digital services, means of reception of digital services, means of sending a query requesting for the distribution of at least one digital service among the digital services from a list of services received, wherein the means of sending a query requesting for the distribution of at least one digital service among the digital services from a list of services received comprise furthermore means to include in the query a level of priority. 13. A device according to claim 12, wherein the level of priority relates to the user of the device. 14. A device according to claim 12, wherein the level of priority relates to the device itself. 15. A device according to claim 12 comprising furthermore means to include in the query a mode of reservation of the means of reception of the distribution device. 16. A distribution device of digital services on a local area network comprising means of reception of digital services, means of sending to a client of the local area network a list of digital services accessible by the device, means of reception of a query requesting for the distribution of at least one service among the accessible services, wherein, in case of incapacity of the gateway to serve the query due to the servicing of at least one previous query, the device possesses furthermore means of choice of the query to be to be privileged between the query received and the at least one previous query, according to the level of priority comprised in the query. 17. A device according to claim 16, the queries comprising furthermore a level of reservation of the means of reception, the means of choice making this choice furthermore according to the mode of reservation contained in the received and previous queries.
This invention concerns a method for managing access to reception services of resources of a distribution gateway within a local area network. The gateway comprises means for receiving digital services and the capacity to distribute over the local area network to clients the received services. It consists in using levels of priority among the users and modes for booking of the services to manage access conflicts.1. Method of selection of digital services through a device called client connected to a local area network, the said local area network comprising a device called distribution gateway, the said distribution gateway possessing means of reception of digital services as well as means of distribution on the local area network of the received services, comprising at least the following steps at the client level: reception of a list of digital services accessible through the distribution gateway, sending of a query requesting the reception of a service from this list, wherein the query comprises a level of priority associated with the query. 2. Method according to claim 1, wherein the level of priority associated with the query is a level of priority relating to the user at the origin of the query on the client. 3. Method according to claim 1, wherein the level of priority associated with the query is a level of priority relating to the device at the origin of the query on the client. 4. Method according to claim 1 comprising furthermore a display step of the list of digital services accessible through the distribution gateway specifying for each service if it can be selected depending on the level of priority relating to the user of the client. 5. Method according to claim 1 comprising furthermore a display step of the list of digital services accessible through the distribution gateway specifying for each service if it can be selected depending on the level of priority relating to the client device. 6. Method according to claim 1, wherein the query also comprises a mode of reservation of the means of reception. 7. Method according to claim 6, wherein the mode of reservation comprises a mode in which access to a tuner is exclusive. 8. Method according to claim 6, wherein the mode of reservation comprises a mode in which access to a service is exclusive. 9. Method according to claim 6, wherein the mode of reservation comprises a mode in which access to a service is authorized for at least a second client of the services transported on the same transport stream as well as of the service reserved by the client. 10. Query service method through a device called distribution gateway connected to a local area network, the said distribution gateway possessing means of reception of digital services as well as means of distribution of the digital services received on the local area network meant for device called clients connected to the local area network comprising at least the following steps: sending of the list of digital services available; reception of a query for a digital service comprising a level of priority; determination of the capacity of the gateway to serve the query; wherein the method comprises furthermore, in case of incapacity of the gateway to serve the query due to the servicing of at least one previous query, a step of choice of the query to be privileged between the query received and the at least one previous query, according to the level of priority comprised in the query. 11. Method according to claim 10, wherein, the queries comprising furthermore a level of reservation of the means of reception, the step of choice of the query to be privileged between the query received and the at least one previous query is also made according to this level of reservation. 12. Client device connectable to a local area network comprising means of reception of a list of digital services from a distribution device of digital services possessing means of reception of digital services, means of reception of digital services, means of sending a query requesting for the distribution of at least one digital service among the digital services from a list of services received, wherein the means of sending a query requesting for the distribution of at least one digital service among the digital services from a list of services received comprise furthermore means to include in the query a level of priority. 13. A device according to claim 12, wherein the level of priority relates to the user of the device. 14. A device according to claim 12, wherein the level of priority relates to the device itself. 15. A device according to claim 12 comprising furthermore means to include in the query a mode of reservation of the means of reception of the distribution device. 16. A distribution device of digital services on a local area network comprising means of reception of digital services, means of sending to a client of the local area network a list of digital services accessible by the device, means of reception of a query requesting for the distribution of at least one service among the accessible services, wherein, in case of incapacity of the gateway to serve the query due to the servicing of at least one previous query, the device possesses furthermore means of choice of the query to be to be privileged between the query received and the at least one previous query, according to the level of priority comprised in the query. 17. A device according to claim 16, the queries comprising furthermore a level of reservation of the means of reception, the means of choice making this choice furthermore according to the mode of reservation contained in the received and previous queries.
2,400
7,387
7,387
14,463,138
2,424
Standard video (and audio) data are combined or blended with immersive video (and audio) data. The data may be collected together, and the standard video views may be a default or reflect a primary view or scene for certain content. The immersive video views may be adjacent or around the primary view, and are available for viewing based upon audience input. The data are blended temporally and spatially to synchronize and align them for virtually seamless transition between the standard video view and the immersive video views. Blending may be performed before distribution, after distribution, or some combination of these.
1. A method comprising: accessing a standard video view; accessing a corresponding immersive video view; displaying at least a portion of the standard video view for an audience playback system; receiving an audience request for at least a portion of the immersive video view; and displaying the requested view. 2. The method of claim 1, comprising blending the standard video view and the immersive video view. 3. The method of claim 2, wherein the standard and immersive video views are blended prior to distribution to the playback system. 4. The method of claim 2, wherein the standard and immersive video views are blended at least partially on the playback system. 5. The method of claim 1, wherein the audience request is made via a different data channel than a channel via which the standard video view and/or the immersive video view is conveyed to the audience playback system. 6. The method of claim 1, wherein the audience request is made via a hand-held audience feedback device. 7. The method of claim 1, wherein the audience request is made via an audience motion sensor. 8. The method of claim 1, comprising displaying audience viewable indicia of availability of the immersive view. 9. The method of claim 1, wherein the standard video view is displayed until an audience request is made to move from the standard video view to an adjacent scene that is not part of the standard video view, the adjacent scene being part of the immersive video view. 10. A method comprising: accessing a standard video view; accessing a corresponding immersive video view; blending the standard video view and the immersive video view; and storing, distributing, and displaying the blended standard and immersive video views. 11. The method of claim 10, wherein the standard video view and the immersive video view are blended by reference to image matching data derived from the standard video view and the immersive video view. 12. The method of claim 10, wherein the standard video view and the immersive video view are blended by reference to audio data from the standard video view and the immersive video view. 13. The method of claim 10, wherein the standard video view and the immersive video view are blended prior to distribution to an audience. 14. The method of claim 10, wherein the standard video view and the immersive video view are blended at least partially on an audience playback system. 15. The method of claim 10, wherein blending the standard video view and the immersive video view at least partially aligns the standard video view and the immersive video view temporally and spatially. 16. The method of claim 10, wherein blending the standard video view and the immersive video view at least partially aligns the standard video view and the immersive video view temporally and spatially via fingerprint data. 17. A system comprising: data storage storing a standard video view and a corresponding immersive video view; a processing system configured to access the standard and immersive video views, and to blend the standard and immersive video views; a distribution system configured to distribute the standard and immersive video views either before or after blending for viewing by an audience. 18. The system of claim 17, wherein the processing system is separate from an audience playback system on which the standard and immersive video views are displayed. 19. The system of claim 17, wherein the processing system is at least partially part of an audience playback system on which the standard and immersive video views are displayed. 20. The system of claim 17, wherein the processing system blends the standard video view and the immersive video view by reference to image matching data derived from the standard video view and the immersive video view. 21. The system of claim 17, wherein blending the standard video view and the immersive video view at least partially aligns the standard video view and the immersive video view temporally and spatially. 22. The method of claim 17, wherein blending the standard video view and the immersive video view at least partially aligns the standard video view and the immersive video view temporally and spatially via fingerprint data. 23. A video file comprising: a standard video component comprising a primary view for desired content that may be rendered on an audience playback device; and an immersive video component comprising immersive views that at least partially surround the primary view. 24. The video file of claim 23, wherein the file comprises coded data sufficient to render the standard video component and the immersive video component on the audience playback device. 25. The video file of claim 23, wherein the file comprises synchronization data that coordinates at least one of temporal and spatial characteristics of the standard video component and the immersive video component. 26. The video file of claim 23, wherein the file comprises coded data that produces an audience perceptible indication that the immersive views are available for viewing. 27. The video file of claim 23, wherein the immersive views are available for viewing for only a portion of the standard video component.
Standard video (and audio) data are combined or blended with immersive video (and audio) data. The data may be collected together, and the standard video views may be a default or reflect a primary view or scene for certain content. The immersive video views may be adjacent or around the primary view, and are available for viewing based upon audience input. The data are blended temporally and spatially to synchronize and align them for virtually seamless transition between the standard video view and the immersive video views. Blending may be performed before distribution, after distribution, or some combination of these.1. A method comprising: accessing a standard video view; accessing a corresponding immersive video view; displaying at least a portion of the standard video view for an audience playback system; receiving an audience request for at least a portion of the immersive video view; and displaying the requested view. 2. The method of claim 1, comprising blending the standard video view and the immersive video view. 3. The method of claim 2, wherein the standard and immersive video views are blended prior to distribution to the playback system. 4. The method of claim 2, wherein the standard and immersive video views are blended at least partially on the playback system. 5. The method of claim 1, wherein the audience request is made via a different data channel than a channel via which the standard video view and/or the immersive video view is conveyed to the audience playback system. 6. The method of claim 1, wherein the audience request is made via a hand-held audience feedback device. 7. The method of claim 1, wherein the audience request is made via an audience motion sensor. 8. The method of claim 1, comprising displaying audience viewable indicia of availability of the immersive view. 9. The method of claim 1, wherein the standard video view is displayed until an audience request is made to move from the standard video view to an adjacent scene that is not part of the standard video view, the adjacent scene being part of the immersive video view. 10. A method comprising: accessing a standard video view; accessing a corresponding immersive video view; blending the standard video view and the immersive video view; and storing, distributing, and displaying the blended standard and immersive video views. 11. The method of claim 10, wherein the standard video view and the immersive video view are blended by reference to image matching data derived from the standard video view and the immersive video view. 12. The method of claim 10, wherein the standard video view and the immersive video view are blended by reference to audio data from the standard video view and the immersive video view. 13. The method of claim 10, wherein the standard video view and the immersive video view are blended prior to distribution to an audience. 14. The method of claim 10, wherein the standard video view and the immersive video view are blended at least partially on an audience playback system. 15. The method of claim 10, wherein blending the standard video view and the immersive video view at least partially aligns the standard video view and the immersive video view temporally and spatially. 16. The method of claim 10, wherein blending the standard video view and the immersive video view at least partially aligns the standard video view and the immersive video view temporally and spatially via fingerprint data. 17. A system comprising: data storage storing a standard video view and a corresponding immersive video view; a processing system configured to access the standard and immersive video views, and to blend the standard and immersive video views; a distribution system configured to distribute the standard and immersive video views either before or after blending for viewing by an audience. 18. The system of claim 17, wherein the processing system is separate from an audience playback system on which the standard and immersive video views are displayed. 19. The system of claim 17, wherein the processing system is at least partially part of an audience playback system on which the standard and immersive video views are displayed. 20. The system of claim 17, wherein the processing system blends the standard video view and the immersive video view by reference to image matching data derived from the standard video view and the immersive video view. 21. The system of claim 17, wherein blending the standard video view and the immersive video view at least partially aligns the standard video view and the immersive video view temporally and spatially. 22. The method of claim 17, wherein blending the standard video view and the immersive video view at least partially aligns the standard video view and the immersive video view temporally and spatially via fingerprint data. 23. A video file comprising: a standard video component comprising a primary view for desired content that may be rendered on an audience playback device; and an immersive video component comprising immersive views that at least partially surround the primary view. 24. The video file of claim 23, wherein the file comprises coded data sufficient to render the standard video component and the immersive video component on the audience playback device. 25. The video file of claim 23, wherein the file comprises synchronization data that coordinates at least one of temporal and spatial characteristics of the standard video component and the immersive video component. 26. The video file of claim 23, wherein the file comprises coded data that produces an audience perceptible indication that the immersive views are available for viewing. 27. The video file of claim 23, wherein the immersive views are available for viewing for only a portion of the standard video component.
2,400
7,388
7,388
15,463,387
2,486
A technique of motion estimation in video compression is described, the technique including: determining, in one or more reference frames of a video picture, the best full-pixel motion vector F for a block in a current frame of the video picture, wherein m and n are signed numbers and integer multiples of the distance between two adjacent full-pixels; selecting the best half-pixel motion vector candidates from a set of half-pixel motion vectors based on the best full-pixel motion vector; determining the best half-pixel motion vector H; selecting the best quarter-pixel motion vector candidates from a set of quarter-pixel motion vectors based on the best full-pixel motion vector and the best half-pixel motion vector; determining the best quarter-pixel motion vector Q; and determining the best motion vector for the block as BMV.
1. A method of efficiently reducing complexity of sub pixel motion estimation in video compression for limiting degradation, comprising: determining, in one or more reference frames of a video picture, a best full-pixel motion vector F for a block in a current frame of the video picture; determining a best half-pixel motion vector H from a set of half-pixel motion vectors based on the best full-pixel motion vector; determining a best quarter-pixel motion vector Q from a set of quarter-pixel motion vectors based on the best full-pixel motion vector and the best half-pixel motion vector; determining the best motion vector for the block as BMV=F+H+Q; and determining full-pixel motion estimation based on the best motion vector. 2. The method of claim 1, wherein determining the best half-pixel motion vector H comprises: selecting all of the set of half-pixel motion vectors as a set of best half-pixel motion vector candidates responsive to the best full-pixel motion vector F being a zero vector; selecting the set of best half-pixel motion vector candidates comprising half-pixel motion vectors in a same and opposite directions of the best full-pixel motion vector, responsive to the best full-pixel motion vector being a non-zero vector along either an x or y axis; selecting the set of best half-pixel motion vector candidates comprising half-pixel motion vectors in a same and opposite trend directions of the best full-pixel motion vector, responsive to the best full-pixel motion vector being a non-zero vector in a direction not along either an x or y axis; and selecting the best half-pixel motion vector from the set of best half-pixel motion vector candidates. 3. The method of claim 1, wherein determining the best half-pixel motion vector H comprises: determining the half-pixel motion vector whose corresponding block best matches the block in the current frame. 4. The method of claim 1, wherein determining the best quarter-pixel motion vector Q comprises: determining which of the block corresponding to the best full-pixel motion vector and the block corresponding to the best half-pixel motion vector better matches the block in the current frame. 5. The method of claim 4, wherein determining which of the block corresponding to the best full-pixel motion vector and the block corresponding to the best half-pixel motion vector better matches the block in the current frame comprises: selecting the quarter-pixel motion vector in the opposite direction of the best half-pixel motion vector responsive to the block corresponding to the best full-pixel motion vector better matching the block in the current frame and responsive to the best full-pixel motion vector being a zero vector, and wherein selecting the best quarter-pixel motion vector candidates comprises: selecting all of the set of quarter-pixel motion vectors as the best quarter-pixel motion vector candidates responsive to a determination that the block corresponding to the best full-pixel motion vector better matches the block in the current frame and the best full-pixel motion vector is a non-zero vector; and selecting the quarter-pixel motion vectors in the same trend direction of the best half-pixel motion vector, as the best quarter-pixel motion vector candidates, wherein each of the best quarter-pixel motion vector candidates belongs to the set of quarter-pixel motion vectors, responsive to a determination that the block corresponding to the best half-pixel motion vector better matches the block in the current frame. 6. The method of claim 1, wherein determining the best quarter-pixel motion vector comprises: determining which of the set of quarter-pixel motion vectors has a corresponding block that best matches the block in the current frame. 7. A system of efficiently reducing complexity of sub pixel motion estimation for limiting degradation, comprising: a first determination module adapted for determining, in one or more reference frames of the video picture, a best full-pixel motion vector F for a block in a current frame of a video picture; a second determination module adapted for determining a best half-pixel motion vector H from a set of half-pixel motion vectors based on the best full-pixel motion vector; a third determination module adapted for determining a best quarter-pixel motion vector Q from a set of quarter-pixel motion vectors based on the best full-pixel motion vector and the best half-pixel motion vector; a fourth determination module adapted for determining the best motion vector for the block as BMV=F+H+Q; and a usage module adapted for determining full-pixel motion estimation based on the best motion vector. 8. The system of claim 7, wherein determining the best half-pixel motion vector H comprises: selecting all of the set of half-pixel motion vectors as a set of best half-pixel motion vector candidates responsive to the best full-pixel motion vector F being a zero vector; selecting the set of best half-pixel motion vector candidates comprising half-pixel motion vectors in a same and opposite directions of the best full-pixel motion vector, responsive to the best full-pixel motion vector being a non-zero vector along either an x or y axis; selecting the set of best half-pixel motion vector candidates comprising half-pixel motion vectors in a same and opposite trend directions of the best full-pixel motion vector, responsive to the best full-pixel motion vector being a non-zero vector in a direction not along either an x or y axis; and selecting the best half-pixel motion vector from the set of best half-pixel motion vector candidates. 9. The system of claim 7, wherein determining the best half-pixel motion vector H comprises: determining the half-pixel motion vector whose corresponding block best matches the block in the current frame. 10. The system of claim 7, wherein determining the best quarter-pixel motion vector Q comprises: determining which of the block corresponding to the best full-pixel motion vector and the block corresponding to the best half-pixel motion vector better matches the block in the current frame. 11. The system of claim 10, wherein determining which of the block corresponding to the best full-pixel motion vector and the block corresponding to the best half-pixel motion vector better matches the block in the current frame comprises: selecting the quarter-pixel motion vector in the opposite direction of the best half-pixel motion vector responsive to the block corresponding to the best full-pixel motion vector better matching the block in the current frame and responsive to the best full-pixel motion vector being a zero vector, and wherein selecting the best quarter-pixel motion vector candidates comprises: selecting all of the set of quarter-pixel motion vectors as the best quarter-pixel motion vector candidates responsive to a determination that the block corresponding to the best full-pixel motion vector better matches the block in the current frame and the best full-pixel motion vector is a non-zero vector; and selecting the quarter-pixel motion vectors in the same trend direction of the best half-pixel motion vector, as the best quarter-pixel motion vector candidates, wherein each of the best quarter-pixel motion vector candidates belongs to the set of quarter-pixel motion vectors, responsive to a determination that the block corresponding to the best half-pixel motion vector better matches the block in the current frame. 12. The system of claim 7, wherein determining the best quarter-pixel motion vector comprises: determining which of the set of quarter-pixel motion vectors has a corresponding block that best matches the block in the current frame. 13. One or more non-transitory machine-readable media on which are stored instructions for efficiently reducing complexity of sub pixel motion estimation, comprising instructions that when executed cause a machine to: determine, in one or more reference frames of a video picture, a best full-pixel motion vector F for a block in a current frame of the video picture; determine a best half-pixel motion vector H from a set of half-pixel motion vectors based on the best full-pixel motion vector; determine a best quarter-pixel motion vector Q from a set of quarter-pixel motion vectors based on the best full-pixel motion vector and the best half-pixel motion vector; determine the best motion vector for the block as BMV=F+H+Q; and determine full-pixel motion estimation based on the best motion vector. 14. The one or more machine-readable media of claim 13, wherein the instructions that when executed cause the machine to determine the best half-pixel motion vector H comprise instructions that when executed cause the machine to: select all of the set of half-pixel motion vectors as a set of best half-pixel motion vector candidates responsive to the best full-pixel motion vector F being a zero vector; select the set of best half-pixel motion vector candidates comprising half-pixel motion vectors in a same and opposite directions of the best full-pixel motion vector, responsive to the best full-pixel motion vector being a non-zero vector along either an x or y axis; select a set of best half-pixel motion vector candidates comprising half-pixel motion vectors in a same and opposite trend directions of the best full-pixel motion vector, responsive to the best full-pixel motion vector being a non-zero vector in a direction not along either an x or y axis; and select the best half-pixel motion vector from the set of best half-pixel motion vector candidates. 15. The one or more machine-readable media of claim 13, wherein the instructions that when executed cause the machine to determine the best half-pixel motion vector H comprise instructions that when executed cause the machine to: determine the half-pixel motion vector whose corresponding block best matches the block in the current frame. 16. The one or more machine-readable media of claim 13, wherein the instructions that when executed cause the machine to determine the best quarter-pixel motion vector Q comprise instructions that when executed cause the machine to: determine which of the block corresponding to the best full-pixel motion vector and the block corresponding to the best half-pixel motion vector better matches the block in the current frame. 17. The one or more machine-readable media of claim 16, wherein the instructions that when executed cause the machine to determine which of the block corresponding to the best full-pixel motion vector and the block corresponding to the best half-pixel motion vector better matches the block in the current frame comprise instructions that when executed cause the machine to: select the quarter-pixel motion vector in the opposite direction of the best half-pixel motion vector responsive to the block corresponding to the best full-pixel motion vector better matching the block in the current frame and responsive to the best full-pixel motion vector being a zero vector, and wherein the instructions that when executed cause the machine to select the best quarter-pixel motion vector candidates comprise instructions that when executed cause the machine to: select all of the set of quarter-pixel motion vectors as the best quarter-pixel motion vector candidates responsive to a determination that the block corresponding to the best full-pixel motion vector better matches the block in the current frame and the best full-pixel motion vector is a non-zero vector; and select the quarter-pixel motion vectors in the same trend direction of the best half-pixel motion vector, as the best quarter-pixel motion vector candidates, wherein each of the best quarter-pixel motion vector candidates belongs to the set of quarter-pixel motion vectors, responsive to a determination that the block corresponding to the best half-pixel motion vector better matches the block in the current frame. 18. The one or more machine-readable media of claim 13, wherein the instructions that when executed cause the machine to determine the best quarter-pixel motion vector comprise instructions that when executed cause the machine to: determine which of the set of quarter-pixel motion vectors has a corresponding block that best matches the block in the current frame.
A technique of motion estimation in video compression is described, the technique including: determining, in one or more reference frames of a video picture, the best full-pixel motion vector F for a block in a current frame of the video picture, wherein m and n are signed numbers and integer multiples of the distance between two adjacent full-pixels; selecting the best half-pixel motion vector candidates from a set of half-pixel motion vectors based on the best full-pixel motion vector; determining the best half-pixel motion vector H; selecting the best quarter-pixel motion vector candidates from a set of quarter-pixel motion vectors based on the best full-pixel motion vector and the best half-pixel motion vector; determining the best quarter-pixel motion vector Q; and determining the best motion vector for the block as BMV.1. A method of efficiently reducing complexity of sub pixel motion estimation in video compression for limiting degradation, comprising: determining, in one or more reference frames of a video picture, a best full-pixel motion vector F for a block in a current frame of the video picture; determining a best half-pixel motion vector H from a set of half-pixel motion vectors based on the best full-pixel motion vector; determining a best quarter-pixel motion vector Q from a set of quarter-pixel motion vectors based on the best full-pixel motion vector and the best half-pixel motion vector; determining the best motion vector for the block as BMV=F+H+Q; and determining full-pixel motion estimation based on the best motion vector. 2. The method of claim 1, wherein determining the best half-pixel motion vector H comprises: selecting all of the set of half-pixel motion vectors as a set of best half-pixel motion vector candidates responsive to the best full-pixel motion vector F being a zero vector; selecting the set of best half-pixel motion vector candidates comprising half-pixel motion vectors in a same and opposite directions of the best full-pixel motion vector, responsive to the best full-pixel motion vector being a non-zero vector along either an x or y axis; selecting the set of best half-pixel motion vector candidates comprising half-pixel motion vectors in a same and opposite trend directions of the best full-pixel motion vector, responsive to the best full-pixel motion vector being a non-zero vector in a direction not along either an x or y axis; and selecting the best half-pixel motion vector from the set of best half-pixel motion vector candidates. 3. The method of claim 1, wherein determining the best half-pixel motion vector H comprises: determining the half-pixel motion vector whose corresponding block best matches the block in the current frame. 4. The method of claim 1, wherein determining the best quarter-pixel motion vector Q comprises: determining which of the block corresponding to the best full-pixel motion vector and the block corresponding to the best half-pixel motion vector better matches the block in the current frame. 5. The method of claim 4, wherein determining which of the block corresponding to the best full-pixel motion vector and the block corresponding to the best half-pixel motion vector better matches the block in the current frame comprises: selecting the quarter-pixel motion vector in the opposite direction of the best half-pixel motion vector responsive to the block corresponding to the best full-pixel motion vector better matching the block in the current frame and responsive to the best full-pixel motion vector being a zero vector, and wherein selecting the best quarter-pixel motion vector candidates comprises: selecting all of the set of quarter-pixel motion vectors as the best quarter-pixel motion vector candidates responsive to a determination that the block corresponding to the best full-pixel motion vector better matches the block in the current frame and the best full-pixel motion vector is a non-zero vector; and selecting the quarter-pixel motion vectors in the same trend direction of the best half-pixel motion vector, as the best quarter-pixel motion vector candidates, wherein each of the best quarter-pixel motion vector candidates belongs to the set of quarter-pixel motion vectors, responsive to a determination that the block corresponding to the best half-pixel motion vector better matches the block in the current frame. 6. The method of claim 1, wherein determining the best quarter-pixel motion vector comprises: determining which of the set of quarter-pixel motion vectors has a corresponding block that best matches the block in the current frame. 7. A system of efficiently reducing complexity of sub pixel motion estimation for limiting degradation, comprising: a first determination module adapted for determining, in one or more reference frames of the video picture, a best full-pixel motion vector F for a block in a current frame of a video picture; a second determination module adapted for determining a best half-pixel motion vector H from a set of half-pixel motion vectors based on the best full-pixel motion vector; a third determination module adapted for determining a best quarter-pixel motion vector Q from a set of quarter-pixel motion vectors based on the best full-pixel motion vector and the best half-pixel motion vector; a fourth determination module adapted for determining the best motion vector for the block as BMV=F+H+Q; and a usage module adapted for determining full-pixel motion estimation based on the best motion vector. 8. The system of claim 7, wherein determining the best half-pixel motion vector H comprises: selecting all of the set of half-pixel motion vectors as a set of best half-pixel motion vector candidates responsive to the best full-pixel motion vector F being a zero vector; selecting the set of best half-pixel motion vector candidates comprising half-pixel motion vectors in a same and opposite directions of the best full-pixel motion vector, responsive to the best full-pixel motion vector being a non-zero vector along either an x or y axis; selecting the set of best half-pixel motion vector candidates comprising half-pixel motion vectors in a same and opposite trend directions of the best full-pixel motion vector, responsive to the best full-pixel motion vector being a non-zero vector in a direction not along either an x or y axis; and selecting the best half-pixel motion vector from the set of best half-pixel motion vector candidates. 9. The system of claim 7, wherein determining the best half-pixel motion vector H comprises: determining the half-pixel motion vector whose corresponding block best matches the block in the current frame. 10. The system of claim 7, wherein determining the best quarter-pixel motion vector Q comprises: determining which of the block corresponding to the best full-pixel motion vector and the block corresponding to the best half-pixel motion vector better matches the block in the current frame. 11. The system of claim 10, wherein determining which of the block corresponding to the best full-pixel motion vector and the block corresponding to the best half-pixel motion vector better matches the block in the current frame comprises: selecting the quarter-pixel motion vector in the opposite direction of the best half-pixel motion vector responsive to the block corresponding to the best full-pixel motion vector better matching the block in the current frame and responsive to the best full-pixel motion vector being a zero vector, and wherein selecting the best quarter-pixel motion vector candidates comprises: selecting all of the set of quarter-pixel motion vectors as the best quarter-pixel motion vector candidates responsive to a determination that the block corresponding to the best full-pixel motion vector better matches the block in the current frame and the best full-pixel motion vector is a non-zero vector; and selecting the quarter-pixel motion vectors in the same trend direction of the best half-pixel motion vector, as the best quarter-pixel motion vector candidates, wherein each of the best quarter-pixel motion vector candidates belongs to the set of quarter-pixel motion vectors, responsive to a determination that the block corresponding to the best half-pixel motion vector better matches the block in the current frame. 12. The system of claim 7, wherein determining the best quarter-pixel motion vector comprises: determining which of the set of quarter-pixel motion vectors has a corresponding block that best matches the block in the current frame. 13. One or more non-transitory machine-readable media on which are stored instructions for efficiently reducing complexity of sub pixel motion estimation, comprising instructions that when executed cause a machine to: determine, in one or more reference frames of a video picture, a best full-pixel motion vector F for a block in a current frame of the video picture; determine a best half-pixel motion vector H from a set of half-pixel motion vectors based on the best full-pixel motion vector; determine a best quarter-pixel motion vector Q from a set of quarter-pixel motion vectors based on the best full-pixel motion vector and the best half-pixel motion vector; determine the best motion vector for the block as BMV=F+H+Q; and determine full-pixel motion estimation based on the best motion vector. 14. The one or more machine-readable media of claim 13, wherein the instructions that when executed cause the machine to determine the best half-pixel motion vector H comprise instructions that when executed cause the machine to: select all of the set of half-pixel motion vectors as a set of best half-pixel motion vector candidates responsive to the best full-pixel motion vector F being a zero vector; select the set of best half-pixel motion vector candidates comprising half-pixel motion vectors in a same and opposite directions of the best full-pixel motion vector, responsive to the best full-pixel motion vector being a non-zero vector along either an x or y axis; select a set of best half-pixel motion vector candidates comprising half-pixel motion vectors in a same and opposite trend directions of the best full-pixel motion vector, responsive to the best full-pixel motion vector being a non-zero vector in a direction not along either an x or y axis; and select the best half-pixel motion vector from the set of best half-pixel motion vector candidates. 15. The one or more machine-readable media of claim 13, wherein the instructions that when executed cause the machine to determine the best half-pixel motion vector H comprise instructions that when executed cause the machine to: determine the half-pixel motion vector whose corresponding block best matches the block in the current frame. 16. The one or more machine-readable media of claim 13, wherein the instructions that when executed cause the machine to determine the best quarter-pixel motion vector Q comprise instructions that when executed cause the machine to: determine which of the block corresponding to the best full-pixel motion vector and the block corresponding to the best half-pixel motion vector better matches the block in the current frame. 17. The one or more machine-readable media of claim 16, wherein the instructions that when executed cause the machine to determine which of the block corresponding to the best full-pixel motion vector and the block corresponding to the best half-pixel motion vector better matches the block in the current frame comprise instructions that when executed cause the machine to: select the quarter-pixel motion vector in the opposite direction of the best half-pixel motion vector responsive to the block corresponding to the best full-pixel motion vector better matching the block in the current frame and responsive to the best full-pixel motion vector being a zero vector, and wherein the instructions that when executed cause the machine to select the best quarter-pixel motion vector candidates comprise instructions that when executed cause the machine to: select all of the set of quarter-pixel motion vectors as the best quarter-pixel motion vector candidates responsive to a determination that the block corresponding to the best full-pixel motion vector better matches the block in the current frame and the best full-pixel motion vector is a non-zero vector; and select the quarter-pixel motion vectors in the same trend direction of the best half-pixel motion vector, as the best quarter-pixel motion vector candidates, wherein each of the best quarter-pixel motion vector candidates belongs to the set of quarter-pixel motion vectors, responsive to a determination that the block corresponding to the best half-pixel motion vector better matches the block in the current frame. 18. The one or more machine-readable media of claim 13, wherein the instructions that when executed cause the machine to determine the best quarter-pixel motion vector comprise instructions that when executed cause the machine to: determine which of the set of quarter-pixel motion vectors has a corresponding block that best matches the block in the current frame.
2,400
7,389
7,389
13,925,358
2,463
A data transfer system ( 100 ) includes a data transmission device ( 103 ). The data transmission device can include a data communication circuit ( 206 ), a memory ( 202 ), and a control circuit ( 201 ) operable with the communication circuit and the memory circuit. The control circuit can transfer data ( 306 ) to a remote device, establish a sliding window ( 307 ) spanning a predetermined amount of data, and store the predetermined amount of data. In response to receiving an error message ( 311 ) identifying particular data ( 312 ) encountering errors in transfer, the control circuit can retransfer the particular data so long as the particular data is within the sliding window.
1. A method of transferring data, comprising: initiating transfer of the data from a data communication circuit; establishing, with a control circuit, a sliding window spanning a predetermined subset amount of data; buffering data, in a memory circuit, the predetermined subset amount of data; deleting, from the memory circuit, data outside the sliding window; receiving, with the data communication circuit, at least one error message in response to the initiating, the at least one error message identifying particular data encountering errors in transmission; determining, with the control circuit, whether the particular data is within the sliding window; and where the particular data is within the sliding window, retransmitting, with the data communication circuit, the particular data. 2. The method of claim 1, further comprising repeating the retransmitting the particular data. 3. The method of claim 2, the repeating continuing as long as the particular data is within the sliding window. 4. The method of claim 3, further comprising terminating the continuing when the particular data falls outside the sliding window. 5. The method of claim 1, further comprising sliding the sliding window during the transfer of the data. 6. The method of claim 1, the predetermined subset amount of data comprising about ten minutes of data. 7. The method of claim 1, the establishing comprising receiving an initial delete data packet after an initial data packet. 8. A data transfer system, comprising: a device, comprising: a communication circuit; a memory circuit; and a control circuit operable with the communication circuit and the memory circuit to: transfer data to a remote device in communication with the communication circuit; establish a sliding window spanning a predetermined amount of data; store the predetermined amount of data; and in response to receiving an error message identifying particular data encountering errors in transfer, retransfer the particular data so long as the particular data is within the sliding window. 9. The data transfer system of claim 8, the control circuit to repeat the retransfer as long as the particular data is within the sliding window. 10. The data transfer system of claim 8, the control circuit to delete data outside the sliding window. 11. The data transfer system of claim 8, the control circuit to determine whether the particular data is within the sliding window. 12. The data transfer system of claim 8, the control circuit to ignore the error message where the particular data is outside the sliding window. 13. The data transfer system of claim 8, the data comprising a live data feed. 14. The data transfer system of claim 8, the device comprising a server. 15. The data transfer system of claim 8, the device comprising a data capture device. 16. A data transfer system, comprising: a data transmission device; and a data reception device; the data transmission device to: transfer data to the data reception device; establish a sliding window spanning a predetermined amount of data; store the predetermined amount of data in a buffer; and in response to receiving an error message identifying particular data encountering errors in transfer; retransfer the particular data so long as the particular data is within the sliding window. 17. The data transfer system of claim 16, the data reception device to transmit the error message when the particular data encounters the errors in transfer. 18. The data transfer system of claim 16, the data transmission device in communication with an encoder device to capture data in real time. 19. The data transfer system of claim 18, the encoder in communication with a data capture device. 20. The data transfer system of claim 18, the data transmission device to derive the sliding window from received data.
A data transfer system ( 100 ) includes a data transmission device ( 103 ). The data transmission device can include a data communication circuit ( 206 ), a memory ( 202 ), and a control circuit ( 201 ) operable with the communication circuit and the memory circuit. The control circuit can transfer data ( 306 ) to a remote device, establish a sliding window ( 307 ) spanning a predetermined amount of data, and store the predetermined amount of data. In response to receiving an error message ( 311 ) identifying particular data ( 312 ) encountering errors in transfer, the control circuit can retransfer the particular data so long as the particular data is within the sliding window.1. A method of transferring data, comprising: initiating transfer of the data from a data communication circuit; establishing, with a control circuit, a sliding window spanning a predetermined subset amount of data; buffering data, in a memory circuit, the predetermined subset amount of data; deleting, from the memory circuit, data outside the sliding window; receiving, with the data communication circuit, at least one error message in response to the initiating, the at least one error message identifying particular data encountering errors in transmission; determining, with the control circuit, whether the particular data is within the sliding window; and where the particular data is within the sliding window, retransmitting, with the data communication circuit, the particular data. 2. The method of claim 1, further comprising repeating the retransmitting the particular data. 3. The method of claim 2, the repeating continuing as long as the particular data is within the sliding window. 4. The method of claim 3, further comprising terminating the continuing when the particular data falls outside the sliding window. 5. The method of claim 1, further comprising sliding the sliding window during the transfer of the data. 6. The method of claim 1, the predetermined subset amount of data comprising about ten minutes of data. 7. The method of claim 1, the establishing comprising receiving an initial delete data packet after an initial data packet. 8. A data transfer system, comprising: a device, comprising: a communication circuit; a memory circuit; and a control circuit operable with the communication circuit and the memory circuit to: transfer data to a remote device in communication with the communication circuit; establish a sliding window spanning a predetermined amount of data; store the predetermined amount of data; and in response to receiving an error message identifying particular data encountering errors in transfer, retransfer the particular data so long as the particular data is within the sliding window. 9. The data transfer system of claim 8, the control circuit to repeat the retransfer as long as the particular data is within the sliding window. 10. The data transfer system of claim 8, the control circuit to delete data outside the sliding window. 11. The data transfer system of claim 8, the control circuit to determine whether the particular data is within the sliding window. 12. The data transfer system of claim 8, the control circuit to ignore the error message where the particular data is outside the sliding window. 13. The data transfer system of claim 8, the data comprising a live data feed. 14. The data transfer system of claim 8, the device comprising a server. 15. The data transfer system of claim 8, the device comprising a data capture device. 16. A data transfer system, comprising: a data transmission device; and a data reception device; the data transmission device to: transfer data to the data reception device; establish a sliding window spanning a predetermined amount of data; store the predetermined amount of data in a buffer; and in response to receiving an error message identifying particular data encountering errors in transfer; retransfer the particular data so long as the particular data is within the sliding window. 17. The data transfer system of claim 16, the data reception device to transmit the error message when the particular data encounters the errors in transfer. 18. The data transfer system of claim 16, the data transmission device in communication with an encoder device to capture data in real time. 19. The data transfer system of claim 18, the encoder in communication with a data capture device. 20. The data transfer system of claim 18, the data transmission device to derive the sliding window from received data.
2,400
7,390
7,390
14,450,855
2,442
Technologies are described herein for accelerating the boot process of client computers by consolidating client-specific boot data in a data storage system. Boot statistics are collected for a number of client computers booting from virtual storage volumes provided by the data storage system. The boot statistics are analyzed to identify client-specific boot data stored on each of the virtual storage volumes, and the client-specific boot data is consolidated and copied into contiguous regions of a single, consolidated boot volume in the data storage system. Requests for read operations from the client computers for the client-specific boot data are then redirected to the consolidated boot volume, increasing boot performance for the client computers.
1. (canceled) 2. A computer-implemented method for booting a client device using a consolidated boot volume comprising: receiving, by a storage process module, an I/O operation for one or more blocks of data of one or more virtual storage volumes; checking, by the storage process module, a table for the storage volumes, to determine if the one or more blocks of data have been copied to the consolidated boot volume, wherein the consolidated boot volume comprises client-specific boot data from the storage volumes; and determining, by the storage process module, whether to execute the I/O operation against the consolidated boot volume or one of the one or more storage volumes based at least in part on the determination of whether the one or more blocks have been copied to the consolidated boot volume. 3. The method of claim 2, wherein client-specific boot data for the consolidated boot volume is determined by collecting boot statistics for the client device regarding input/output operations over a network performed against the virtual storage volumes during a boot period, analyzing the boot statistics to identify client-specific boot data stored on the virtual storage volumes, and consolidating the client-specific boot data from the virtual storage volumes onto the consolidated boot volume. 4. The method of claim 2, wherein determining, by the storage process module, whether to execute the I/O operation against the consolidated boot volume or one of the one or more storage volumes comprises determining, by the storage process module, that the one or more blocks are not found by the storage process module in the table and executing the I/O operation against the storage volume. 5. The method of claim 2, wherein determining, by the storage process module, whether to execute the I/O operation against the consolidated boot volume or one of the one or more storage volumes comprises determining, by the storage process module, that the one or more blocks are found by the storage process module in the table and determining that the I/O operation is a write operation and executing the I/O operation against the storage volume. 6. The method of claim 2, wherein determining, by the storage process module, whether to execute the I/O operation against the consolidated boot volume or one of the one or more storage volumes comprises determining, by the storage process module, that the one or more blocks are found by the storage process module in the table and determining that the I/O operation is a read operation and determining, by the storage process module, whether to read the one or more blocks of data from either the consolidated boot volume or the storage volume. 7. The method of claim 6, wherein determining, by the storage process module, whether to read the one or more blocks of data from either the consolidated boot volume or the storage volume comprises, executing, by the storage process module, the write I/O operation against the storage volume, and invalidating corresponding blocks of data in the consolidated boot volume by setting bits in a dirty read bitmap that correspond to an index field from an entry in the table for a targeted block of data. 8. The method of claim 7, wherein determining, by the storage process module, whether to read the one or more blocks of data from either the consolidated boot volume or the storage volume comprises checking, by the storage process module, the bit in the dirty read bitmap corresponding to each block of data to be retrieved from the consolidated boot volume, determining whether the bit corresponding to the block of data targeted by the read I/O operation is set in the dirty read bitmap, reading directly from the storage volume if the bit for the block of data is set in the dirty read bitmap, and retrieving, by the storage process module, the block of data from the consolidated boot volume at a location indicated by the index field in the corresponding entry of the table if the bit for the block of data is not set in the dirty read bitmap. 9. A non-transitory computer-readable storage medium having computer-executable instructions stored thereon that, when executed by a storage system computer, cause the storage system computer to: receive, by a storage process module, an I/O operation for one or more blocks of data of one or more virtual storage volumes; check, by the storage process module, a table for the storage volumes, to determine if the one or more blocks of data have been copied to the consolidated boot volume, wherein the consolidated boot volume comprises client-specific boot data from the storage volumes; and determine, by the storage process module, whether to execute the I/O operation against the consolidated boot volume or one of the one or more storage volumes based at least in part on the determination of whether the one or more blocks have been copied to the consolidated boot volume. 10. The non-transitory computer-readable storage medium of claim 9, wherein client-specific boot data for the consolidated boot volume is determined by collecting boot statistics for the client device regarding input/output operations over a network performed against the virtual storage volumes during a boot period, analyzing the boot statistics to identify client-specific boot data stored on the virtual storage volumes, and consolidating the client-specific boot data from the virtual storage volumes onto the consolidated boot volume. 11. The non-transitory computer-readable storage medium of claim 9, wherein determining, by the storage process module, whether to execute the I/O operation against the consolidated boot volume or one of the one or more storage volumes comprises determining, by the storage process module, that the one or more blocks are not found by the storage process module in the table and executing the I/O operation against the storage volume. 12. The non-transitory computer-readable storage medium of claim 9, wherein determining, by the storage process module, whether to execute the I/O operation against the consolidated boot volume or one of the one or more storage volumes comprises determining, by the storage process module, that the one or more blocks are found by the storage process module in the table and determining that the I/O operation is a write operation and executing the I/O operation against the storage volume. 13. The non-transitory computer-readable storage medium of claim 9, wherein determining, by the storage process module, whether to execute the I/O operation against the consolidated boot volume or one of the one or more storage volumes comprises determining, by the storage process module, that the one or more blocks are found by the storage process module in the table and determining that the I/O operation is a read operation and determining, by the storage process module, whether to read the one or more blocks of data from either the consolidated boot volume or the storage volume. 14. The non-transitory computer-readable storage medium of claim 13, wherein determining, by the storage process module, whether to read the one or more blocks of data from either the consolidated boot volume or the storage volume comprises, executing, by the storage process module, the write I/O operation against the storage volume, and invalidating corresponding blocks of data in the consolidated boot volume by setting bits in a dirty read bitmap that correspond to an index field from an entry in the table for a targeted block of data. 15. The non-transitory computer-readable storage medium of claim 14, wherein determining, by the storage process module, whether to read the one or more blocks of data from either the consolidated boot volume or the storage volume comprises checking, by the storage process module, the bit in the dirty read bitmap corresponding to each block of data to be retrieved from the consolidated boot volume, determining whether the bit corresponding to the block of data targeted by the read I/O operation is set in the dirty read bitmap, reading directly from the storage volume if the bit for the block of data is set in the dirty read bitmap, and retrieving, by the storage process module, the block of data from the consolidated boot volume at a location indicated by the index field in the corresponding entry of the table if the bit for the block of data is not set in the dirty read bitmap. 16. A data storage system comprising: a storage system computer; a physical storage device operably connected to the storage system computer; a processing unit associated with the storage system computer; and a storage process module executing on the processing unit and configured to: receive an I/O operation for one or more blocks of data of one or more virtual storage volumes; check a table for the storage volumes, to determine if the one or more blocks of data have been copied to the consolidated boot volume, wherein the consolidated boot volume comprises client-specific boot data from the storage volumes; and determine whether to execute the I/O operation against the consolidated boot volume or one of the one or more storage volumes based at least in part on the determination of whether the one or more blocks have been copied to the consolidated boot volume. 17. The data storage system of claim 16, wherein client-specific boot data for the consolidated boot volume is determined by collecting boot statistics for the client device regarding input/output operations over a network performed against the virtual storage volumes during a boot period, analyzing the boot statistics to identify client-specific boot data stored on the virtual storage volumes, and consolidating the client-specific boot data from the virtual storage volumes onto the consolidated boot volume. 18. The data storage system of claim 16, wherein determining, by the storage process module, whether to execute the I/O operation against the consolidated boot volume or one of the one or more storage volumes comprises determining, by the storage process module, that the one or more blocks are not found by the storage process module in the table and executing the I/O operation against the storage volume. 19. The data storage system of claim 16, wherein determining, by the storage process module, whether to execute the I/O operation against the consolidated boot volume or one of the one or more storage volumes comprises determining, by the storage process module, that the one or more blocks are found by the storage process module in the table and determining that the I/O operation is a write operation and executing the I/O operation against the storage volume. 20. The data storage system of claim 16, wherein determining, by the storage process module, whether to execute the I/O operation against the consolidated boot volume or one of the one or more storage volumes comprises determining, by the storage process module, that the one or more blocks are found by the storage process module in the table and determining that the I/O operation is a read operation and determining, by the storage process module, whether to read the one or more blocks of data from either the consolidated boot volume or the storage volume. 21. The data storage system of claim 20, wherein determining, by the storage process module, whether to read the one or more blocks of data from either the consolidated boot volume or the storage volume comprises, executing, by the storage process module, the write I/O operation against the storage volume, and invalidating corresponding blocks of data in the consolidated boot volume by setting bits in a dirty read bitmap that correspond to an index field from an entry in the table for a targeted block of data. 22. The data storage system of claim 21, wherein determining, by the storage process module, whether to read the one or more blocks of data from either the consolidated boot volume or the storage volume comprises checking, by the storage process module, the bit in the dirty read bitmap corresponding to each block of data to be retrieved from the consolidated boot volume, determining whether the bit corresponding to the block of data targeted by the read I/O operation is set in the dirty read bitmap, reading directly from the storage volume if the bit for the block of data is set in the dirty read bitmap, and retrieving, by the storage process module, the block of data from the consolidated boot volume at a location indicated by the index field in the corresponding entry of the table if the bit for the block of data is not set in the dirty read bitmap.
Technologies are described herein for accelerating the boot process of client computers by consolidating client-specific boot data in a data storage system. Boot statistics are collected for a number of client computers booting from virtual storage volumes provided by the data storage system. The boot statistics are analyzed to identify client-specific boot data stored on each of the virtual storage volumes, and the client-specific boot data is consolidated and copied into contiguous regions of a single, consolidated boot volume in the data storage system. Requests for read operations from the client computers for the client-specific boot data are then redirected to the consolidated boot volume, increasing boot performance for the client computers.1. (canceled) 2. A computer-implemented method for booting a client device using a consolidated boot volume comprising: receiving, by a storage process module, an I/O operation for one or more blocks of data of one or more virtual storage volumes; checking, by the storage process module, a table for the storage volumes, to determine if the one or more blocks of data have been copied to the consolidated boot volume, wherein the consolidated boot volume comprises client-specific boot data from the storage volumes; and determining, by the storage process module, whether to execute the I/O operation against the consolidated boot volume or one of the one or more storage volumes based at least in part on the determination of whether the one or more blocks have been copied to the consolidated boot volume. 3. The method of claim 2, wherein client-specific boot data for the consolidated boot volume is determined by collecting boot statistics for the client device regarding input/output operations over a network performed against the virtual storage volumes during a boot period, analyzing the boot statistics to identify client-specific boot data stored on the virtual storage volumes, and consolidating the client-specific boot data from the virtual storage volumes onto the consolidated boot volume. 4. The method of claim 2, wherein determining, by the storage process module, whether to execute the I/O operation against the consolidated boot volume or one of the one or more storage volumes comprises determining, by the storage process module, that the one or more blocks are not found by the storage process module in the table and executing the I/O operation against the storage volume. 5. The method of claim 2, wherein determining, by the storage process module, whether to execute the I/O operation against the consolidated boot volume or one of the one or more storage volumes comprises determining, by the storage process module, that the one or more blocks are found by the storage process module in the table and determining that the I/O operation is a write operation and executing the I/O operation against the storage volume. 6. The method of claim 2, wherein determining, by the storage process module, whether to execute the I/O operation against the consolidated boot volume or one of the one or more storage volumes comprises determining, by the storage process module, that the one or more blocks are found by the storage process module in the table and determining that the I/O operation is a read operation and determining, by the storage process module, whether to read the one or more blocks of data from either the consolidated boot volume or the storage volume. 7. The method of claim 6, wherein determining, by the storage process module, whether to read the one or more blocks of data from either the consolidated boot volume or the storage volume comprises, executing, by the storage process module, the write I/O operation against the storage volume, and invalidating corresponding blocks of data in the consolidated boot volume by setting bits in a dirty read bitmap that correspond to an index field from an entry in the table for a targeted block of data. 8. The method of claim 7, wherein determining, by the storage process module, whether to read the one or more blocks of data from either the consolidated boot volume or the storage volume comprises checking, by the storage process module, the bit in the dirty read bitmap corresponding to each block of data to be retrieved from the consolidated boot volume, determining whether the bit corresponding to the block of data targeted by the read I/O operation is set in the dirty read bitmap, reading directly from the storage volume if the bit for the block of data is set in the dirty read bitmap, and retrieving, by the storage process module, the block of data from the consolidated boot volume at a location indicated by the index field in the corresponding entry of the table if the bit for the block of data is not set in the dirty read bitmap. 9. A non-transitory computer-readable storage medium having computer-executable instructions stored thereon that, when executed by a storage system computer, cause the storage system computer to: receive, by a storage process module, an I/O operation for one or more blocks of data of one or more virtual storage volumes; check, by the storage process module, a table for the storage volumes, to determine if the one or more blocks of data have been copied to the consolidated boot volume, wherein the consolidated boot volume comprises client-specific boot data from the storage volumes; and determine, by the storage process module, whether to execute the I/O operation against the consolidated boot volume or one of the one or more storage volumes based at least in part on the determination of whether the one or more blocks have been copied to the consolidated boot volume. 10. The non-transitory computer-readable storage medium of claim 9, wherein client-specific boot data for the consolidated boot volume is determined by collecting boot statistics for the client device regarding input/output operations over a network performed against the virtual storage volumes during a boot period, analyzing the boot statistics to identify client-specific boot data stored on the virtual storage volumes, and consolidating the client-specific boot data from the virtual storage volumes onto the consolidated boot volume. 11. The non-transitory computer-readable storage medium of claim 9, wherein determining, by the storage process module, whether to execute the I/O operation against the consolidated boot volume or one of the one or more storage volumes comprises determining, by the storage process module, that the one or more blocks are not found by the storage process module in the table and executing the I/O operation against the storage volume. 12. The non-transitory computer-readable storage medium of claim 9, wherein determining, by the storage process module, whether to execute the I/O operation against the consolidated boot volume or one of the one or more storage volumes comprises determining, by the storage process module, that the one or more blocks are found by the storage process module in the table and determining that the I/O operation is a write operation and executing the I/O operation against the storage volume. 13. The non-transitory computer-readable storage medium of claim 9, wherein determining, by the storage process module, whether to execute the I/O operation against the consolidated boot volume or one of the one or more storage volumes comprises determining, by the storage process module, that the one or more blocks are found by the storage process module in the table and determining that the I/O operation is a read operation and determining, by the storage process module, whether to read the one or more blocks of data from either the consolidated boot volume or the storage volume. 14. The non-transitory computer-readable storage medium of claim 13, wherein determining, by the storage process module, whether to read the one or more blocks of data from either the consolidated boot volume or the storage volume comprises, executing, by the storage process module, the write I/O operation against the storage volume, and invalidating corresponding blocks of data in the consolidated boot volume by setting bits in a dirty read bitmap that correspond to an index field from an entry in the table for a targeted block of data. 15. The non-transitory computer-readable storage medium of claim 14, wherein determining, by the storage process module, whether to read the one or more blocks of data from either the consolidated boot volume or the storage volume comprises checking, by the storage process module, the bit in the dirty read bitmap corresponding to each block of data to be retrieved from the consolidated boot volume, determining whether the bit corresponding to the block of data targeted by the read I/O operation is set in the dirty read bitmap, reading directly from the storage volume if the bit for the block of data is set in the dirty read bitmap, and retrieving, by the storage process module, the block of data from the consolidated boot volume at a location indicated by the index field in the corresponding entry of the table if the bit for the block of data is not set in the dirty read bitmap. 16. A data storage system comprising: a storage system computer; a physical storage device operably connected to the storage system computer; a processing unit associated with the storage system computer; and a storage process module executing on the processing unit and configured to: receive an I/O operation for one or more blocks of data of one or more virtual storage volumes; check a table for the storage volumes, to determine if the one or more blocks of data have been copied to the consolidated boot volume, wherein the consolidated boot volume comprises client-specific boot data from the storage volumes; and determine whether to execute the I/O operation against the consolidated boot volume or one of the one or more storage volumes based at least in part on the determination of whether the one or more blocks have been copied to the consolidated boot volume. 17. The data storage system of claim 16, wherein client-specific boot data for the consolidated boot volume is determined by collecting boot statistics for the client device regarding input/output operations over a network performed against the virtual storage volumes during a boot period, analyzing the boot statistics to identify client-specific boot data stored on the virtual storage volumes, and consolidating the client-specific boot data from the virtual storage volumes onto the consolidated boot volume. 18. The data storage system of claim 16, wherein determining, by the storage process module, whether to execute the I/O operation against the consolidated boot volume or one of the one or more storage volumes comprises determining, by the storage process module, that the one or more blocks are not found by the storage process module in the table and executing the I/O operation against the storage volume. 19. The data storage system of claim 16, wherein determining, by the storage process module, whether to execute the I/O operation against the consolidated boot volume or one of the one or more storage volumes comprises determining, by the storage process module, that the one or more blocks are found by the storage process module in the table and determining that the I/O operation is a write operation and executing the I/O operation against the storage volume. 20. The data storage system of claim 16, wherein determining, by the storage process module, whether to execute the I/O operation against the consolidated boot volume or one of the one or more storage volumes comprises determining, by the storage process module, that the one or more blocks are found by the storage process module in the table and determining that the I/O operation is a read operation and determining, by the storage process module, whether to read the one or more blocks of data from either the consolidated boot volume or the storage volume. 21. The data storage system of claim 20, wherein determining, by the storage process module, whether to read the one or more blocks of data from either the consolidated boot volume or the storage volume comprises, executing, by the storage process module, the write I/O operation against the storage volume, and invalidating corresponding blocks of data in the consolidated boot volume by setting bits in a dirty read bitmap that correspond to an index field from an entry in the table for a targeted block of data. 22. The data storage system of claim 21, wherein determining, by the storage process module, whether to read the one or more blocks of data from either the consolidated boot volume or the storage volume comprises checking, by the storage process module, the bit in the dirty read bitmap corresponding to each block of data to be retrieved from the consolidated boot volume, determining whether the bit corresponding to the block of data targeted by the read I/O operation is set in the dirty read bitmap, reading directly from the storage volume if the bit for the block of data is set in the dirty read bitmap, and retrieving, by the storage process module, the block of data from the consolidated boot volume at a location indicated by the index field in the corresponding entry of the table if the bit for the block of data is not set in the dirty read bitmap.
2,400
7,391
7,391
14,513,362
2,449
Contact centers often have a significant pool of troubleshooting information related to devices that a customer may own or have access to. Connecting the device to a resource of the contact center presents challenges as customers and device manufacturers are reluctant to provide direct connectivity from the device to a public network, such as the Internet. A customer communication device, such as a smart phone, with an application allows a user to broker a communication between a resource of a contact center and a device. As a benefit, the customer can see and control the types of communication occurring and approve or deny according to their comfort level. When the resource-device session is concluded, the link is terminated and cannot be resumed without again obtaining approval.
1. A mobile communication device, comprising: a first communication interface; a second communication interface; a third communication interface; a user interface; and a control module; and wherein the first communication interface is operable to connect the mobile communication device to a resource of a contact center; wherein the second communication interface is operable to connect the mobile communication device to a first accessible device; and wherein the third communication interface comprises at least a portion of the first and second communication interfaces and is operable to broker a communication between the resource to the first accessible device, and wherein the communication is gated by the control module. 2. The mobile communication device of claim 1, wherein the communication comprises a first number of communication types. 3. The mobile communication device of claim 2, wherein: the user interface is operable to display indicia of the first number of communication types and receive an input associated with an authorization decision for at least one of the first number of communication types; and the user interface is operable to causes the control module to gate the at least one communication type in accord with the input. 4. The mobile communication device of claim 3, wherein: the control module is further operable to gate the at least one communication type in accord with the input to interrupt the at least one communication type in progress. 5. The mobile communication device of claim 4, wherein: the control module is further operable to gate the at least one communication type in accord with the input to resume the at least one communication type that has been interrupted. 6. The mobile communication device of claim 2, further comprising a memory operable to store indicia of the first number of communication types for presentation on the user interface. 7. The mobile communication device of claim 1, wherein the first accessible device is located by a scan for accessible devices. 8. The mobile communication device of claim 1, wherein the scan for accessible devices is performed by the mobile communication device in response to a signal from the resource. 9. The mobile communication device of claim 1, wherein the first communication interface is a wired communication interface. 10. The mobile communication device of claim 1, further comprising: a fourth communication interface; wherein the fourth communication interface is operable to wirelessly connect the mobile communication device to a second accessible device; and wherein the third communication interface comprises at least a portion of the first and fourth communication interfaces and is operable to connect the resource to the second accessible device, and wherein the fourth communication interface is gated by the control module in response to inputs received on the user interface. 11. A non-transitory computer readable medium with instructions thereon that when read by a computer cause the computer to perform: establishing a first communication with a resource of a contact center; establishing a second communication with a first accessible device, wherein the second communication comprises a wireless communication; brokering a third communication, comprising a first number of communication types, between the resource and the first accessible device; and gating the first number of communication types. 12. The non-transitory compute readable medium of claim 11, further comprising instructions to perform the step of gating the first number of communication types in response to receiving a user input associated with at least one of the first number of communication types. 13. The non-transitory compute readable medium of claim 12, further comprising instructions to perform the step of receiving the input and gating the at least one communication type to interrupt the at least one communication type in progress. 14. The non-transitory compute readable medium of claim 13, further comprising instructions to perform the step of receiving the input and gating the at least one communication type to resume the at least one communication type having been previously interrupted. 15. The non-transitory compute readable medium of claim 11, further comprising instructions to perform scanning wireless signals for the accessible device and upon detecting at least one candidate device, presenting the candidate device to a display for selection from a user input, and upon receiving the selection from the user, setting the candidate device to be the accessible device. 16. The non-transitory compute readable medium of claim 11, further comprising instructions to perform establishing a fourth communication with a second accessible device, and the step of brokering further comprises brokering a second number of communication types, between the resource and the second accessible device. 17. An electronic communication system, comprising: a contact center comprising a resource and operable to place the resource and a customer in communication with each other over an electronic network and wherein the customer communicates with the resource using a customer communication device; the resource, being configured to communicate with an accessible device via the customer communication device; and wherein the communication between the resource and the accessible device is gated by a control module of the customer communication device. 18. The electronic communication system of claim 17, wherein the communication between the resource and the accessible device is gated by the customer selectively granting and denying permission for at least one communication type. 19. The electronic communication system of claim 18, wherein the at least one communication type comprises at least one of reading an event log of the accessible device, setting an operating parameter of the accessible device, and shutting down the accessible device. 20. The electronic communication system of claim 18, wherein a display of the customer communication device displays indicia of the at least one communication types.
Contact centers often have a significant pool of troubleshooting information related to devices that a customer may own or have access to. Connecting the device to a resource of the contact center presents challenges as customers and device manufacturers are reluctant to provide direct connectivity from the device to a public network, such as the Internet. A customer communication device, such as a smart phone, with an application allows a user to broker a communication between a resource of a contact center and a device. As a benefit, the customer can see and control the types of communication occurring and approve or deny according to their comfort level. When the resource-device session is concluded, the link is terminated and cannot be resumed without again obtaining approval.1. A mobile communication device, comprising: a first communication interface; a second communication interface; a third communication interface; a user interface; and a control module; and wherein the first communication interface is operable to connect the mobile communication device to a resource of a contact center; wherein the second communication interface is operable to connect the mobile communication device to a first accessible device; and wherein the third communication interface comprises at least a portion of the first and second communication interfaces and is operable to broker a communication between the resource to the first accessible device, and wherein the communication is gated by the control module. 2. The mobile communication device of claim 1, wherein the communication comprises a first number of communication types. 3. The mobile communication device of claim 2, wherein: the user interface is operable to display indicia of the first number of communication types and receive an input associated with an authorization decision for at least one of the first number of communication types; and the user interface is operable to causes the control module to gate the at least one communication type in accord with the input. 4. The mobile communication device of claim 3, wherein: the control module is further operable to gate the at least one communication type in accord with the input to interrupt the at least one communication type in progress. 5. The mobile communication device of claim 4, wherein: the control module is further operable to gate the at least one communication type in accord with the input to resume the at least one communication type that has been interrupted. 6. The mobile communication device of claim 2, further comprising a memory operable to store indicia of the first number of communication types for presentation on the user interface. 7. The mobile communication device of claim 1, wherein the first accessible device is located by a scan for accessible devices. 8. The mobile communication device of claim 1, wherein the scan for accessible devices is performed by the mobile communication device in response to a signal from the resource. 9. The mobile communication device of claim 1, wherein the first communication interface is a wired communication interface. 10. The mobile communication device of claim 1, further comprising: a fourth communication interface; wherein the fourth communication interface is operable to wirelessly connect the mobile communication device to a second accessible device; and wherein the third communication interface comprises at least a portion of the first and fourth communication interfaces and is operable to connect the resource to the second accessible device, and wherein the fourth communication interface is gated by the control module in response to inputs received on the user interface. 11. A non-transitory computer readable medium with instructions thereon that when read by a computer cause the computer to perform: establishing a first communication with a resource of a contact center; establishing a second communication with a first accessible device, wherein the second communication comprises a wireless communication; brokering a third communication, comprising a first number of communication types, between the resource and the first accessible device; and gating the first number of communication types. 12. The non-transitory compute readable medium of claim 11, further comprising instructions to perform the step of gating the first number of communication types in response to receiving a user input associated with at least one of the first number of communication types. 13. The non-transitory compute readable medium of claim 12, further comprising instructions to perform the step of receiving the input and gating the at least one communication type to interrupt the at least one communication type in progress. 14. The non-transitory compute readable medium of claim 13, further comprising instructions to perform the step of receiving the input and gating the at least one communication type to resume the at least one communication type having been previously interrupted. 15. The non-transitory compute readable medium of claim 11, further comprising instructions to perform scanning wireless signals for the accessible device and upon detecting at least one candidate device, presenting the candidate device to a display for selection from a user input, and upon receiving the selection from the user, setting the candidate device to be the accessible device. 16. The non-transitory compute readable medium of claim 11, further comprising instructions to perform establishing a fourth communication with a second accessible device, and the step of brokering further comprises brokering a second number of communication types, between the resource and the second accessible device. 17. An electronic communication system, comprising: a contact center comprising a resource and operable to place the resource and a customer in communication with each other over an electronic network and wherein the customer communicates with the resource using a customer communication device; the resource, being configured to communicate with an accessible device via the customer communication device; and wherein the communication between the resource and the accessible device is gated by a control module of the customer communication device. 18. The electronic communication system of claim 17, wherein the communication between the resource and the accessible device is gated by the customer selectively granting and denying permission for at least one communication type. 19. The electronic communication system of claim 18, wherein the at least one communication type comprises at least one of reading an event log of the accessible device, setting an operating parameter of the accessible device, and shutting down the accessible device. 20. The electronic communication system of claim 18, wherein a display of the customer communication device displays indicia of the at least one communication types.
2,400
7,392
7,392
13,366,039
2,454
Systems and methods are provided that enable a general framework for partitioning application-defined jobs in a scalable environment. The general framework decouples partitioning of a job from the other aspects of the job. As a result, the effort required to define the application-defined job is reduced or minimized, as the user is not required to provide a partitioning algorithm. The general framework also facilitates management of masters and servers performing computations within the distributed environment.
1. A method for performing computations in a distributed computing environment, comprising: receiving one or more application-defined partitioning system interfaces; creating a plurality of master role instances including the one or more application-defined partitioning system interfaces, the master role instances corresponding to a master storage object; assigning a lease for the master storage object, each master role instance competing for the lease, the master role instance that is assigned the lease being the dictator master role instance; assigning, by the dictator master role instance, a group of partitions to a plurality of partition servers; and performing one or more computations corresponding to an application using the plurality of partition servers. 2. The method of claim 1, further comprising sending, by the dictator master role instance, a heartbeat message to the plurality of partition servers. 3. The method of claim 2, wherein one or more metrics are received from the partition servers in responses to heartbeat messages. 4. The method of claim 3, wherein at least one of the one or more metrics is an application-defined metric. 5. The method of claim 2, further comprising: sending, by the dictator master role instance, a message assigning one or more partitions to a partition server from a plurality of partition servers while the dictator master role instance maintains the lease for the master storage object, the message from the dicatator master role instance including an epoch number; and maintaining, by the partition server from the plurality of partition servers, the partition assignment received from the dictator master role instance. 6. The method of claim 5, further comprising, associating, by the dictator master role instance, an assignment identifier with the assignment of the one or more partitions, the dictator master role instance sending the assignment identifier along with the message to the partition server; updating, by the partition server, the content of a corresponding storage object to store the assignment identifier, and sending, by the partition server, an acknowledgement message to the dictator master role instance. 7. The method of claim 5, further comprising: associating, by the dictator master role instance, an assignment identifier with the assignment of the one or more partitions, the dictator master role instance sending the assignment identifier along with the message to the partition server; receiving, by the partition server, the message from the dictator master role instance without sending an acknowledgement message to the dictator master; breaking, by the dictator master role instance, a lease of the partition server on a corresponding storage object; deleting, by the dictator master role instance, the storage object corresponding the partition server; and detecting, by the partition server, the breaking of the lease, the partition server terminating in response to the detection of breaking the lease. 8. The method of claim 5, further comprising: associating, by the dictator master role instance, an assignment identifier with the assignment of the one or more partitions, the dictator master role instance sending the assignment identifier along with the message to the partition server; receiving, by the partition server, the message from the dictator master role instance without updating a content of a corresponding storage object; breaking, by the dictator master role instance, a lease of the partition server on the corresponding storage object; deleting, by the dictator master role instance, the storage object corresponding the partition server; and detecting, by the partition server, the breaking of the lease, the partition server terminating in response to the detection of breaking the lease. 9. A method for performing computations in a distributed computing environment, comprising: executing a computation comprising at least two namespaces and at least two master role instances, each master role instance corresponding to a different namespace, each master role instance being the dictator and holding a dictator lease on a master storage object for the corresponding namespace; assigning at least one machine that provides failover service for a plurality of the dictator master role instances; detecting a failover event for one of the dictator master role instances; and creating, on the assigned machine, an additional instance of the master role corresponding to the detected failover event, the additional being assigned as the dictator for the namespace corresponding to the failover event. 10. The method of claim 9, wherein detecting a failover event comprises detecting a scheduled update for a dictator master role instance. 11. (canceled) 12. The method of claim 9, wherein at least one master role instance comprises one or more application-defined interfaces. 13. The method of claim 9, further comprising assigning, after detecting the failover event, an additional machine that provides failover service for the remaining dictator master role instances of the at least two master role instances and the additional dictator master role instance. 14. A system for performing computing tasks in a distributed computing environment, the system comprising: a plurality of processors executing computer-useable instructions that, when executed, provide a system comprising: a plurality of partition servers, the partition servers having at least one partitioning system interface for managing the storage objects associated with partition servers and one or more application-defined partitioning system interfaces, a partition server having an associated storage object for storing information regarding assigned partitions; a partition table containing partitions based on an application-defined namespace, the partitions corresponding to key ranges from the application-defined namespace that span the namespace, the partition table being accessible by a partitioning system; a first master role instance including fixed partitioning system interfaces for managing the assignment of partitions to partition server virtual machines and maintaining the partition table assignments of partitions to partition server virtual machines; and a client component with at least one fixed partitioning system interface for receiving client requests containing a key value from the namespace and returning addresses of a partition server corresponding to the key value. 15. The system of claim 14, wherein the system comprises a plurality of master role instances as part of the partitioning system, the first master role instance being an active master role instance. 16. The system of claim 15, further comprising a master selection component for selecting an active master role instance from a plurality of master role instances. 17. The system of claim 14, further comprising a fixed partitioning system interface for managing messages between the first master role instance and the plurality of partition server virtual machines. 18. The system of claim 14, wherein the master role instance and the partition servers comprise virtual machines in a distributed computing environment. 19. The system of claim 14, further comprising at least one application-defined interface for the master role instance. 20. The system of claim 14, further comprising a lease interface for assigning leases to the partition table and a master storage object to the active master role instance. 21. The method of claim 9, wherein detecting a failover event comprises a dictator master role instance losing the lease on the master storage object for the corresponding namespace.
Systems and methods are provided that enable a general framework for partitioning application-defined jobs in a scalable environment. The general framework decouples partitioning of a job from the other aspects of the job. As a result, the effort required to define the application-defined job is reduced or minimized, as the user is not required to provide a partitioning algorithm. The general framework also facilitates management of masters and servers performing computations within the distributed environment.1. A method for performing computations in a distributed computing environment, comprising: receiving one or more application-defined partitioning system interfaces; creating a plurality of master role instances including the one or more application-defined partitioning system interfaces, the master role instances corresponding to a master storage object; assigning a lease for the master storage object, each master role instance competing for the lease, the master role instance that is assigned the lease being the dictator master role instance; assigning, by the dictator master role instance, a group of partitions to a plurality of partition servers; and performing one or more computations corresponding to an application using the plurality of partition servers. 2. The method of claim 1, further comprising sending, by the dictator master role instance, a heartbeat message to the plurality of partition servers. 3. The method of claim 2, wherein one or more metrics are received from the partition servers in responses to heartbeat messages. 4. The method of claim 3, wherein at least one of the one or more metrics is an application-defined metric. 5. The method of claim 2, further comprising: sending, by the dictator master role instance, a message assigning one or more partitions to a partition server from a plurality of partition servers while the dictator master role instance maintains the lease for the master storage object, the message from the dicatator master role instance including an epoch number; and maintaining, by the partition server from the plurality of partition servers, the partition assignment received from the dictator master role instance. 6. The method of claim 5, further comprising, associating, by the dictator master role instance, an assignment identifier with the assignment of the one or more partitions, the dictator master role instance sending the assignment identifier along with the message to the partition server; updating, by the partition server, the content of a corresponding storage object to store the assignment identifier, and sending, by the partition server, an acknowledgement message to the dictator master role instance. 7. The method of claim 5, further comprising: associating, by the dictator master role instance, an assignment identifier with the assignment of the one or more partitions, the dictator master role instance sending the assignment identifier along with the message to the partition server; receiving, by the partition server, the message from the dictator master role instance without sending an acknowledgement message to the dictator master; breaking, by the dictator master role instance, a lease of the partition server on a corresponding storage object; deleting, by the dictator master role instance, the storage object corresponding the partition server; and detecting, by the partition server, the breaking of the lease, the partition server terminating in response to the detection of breaking the lease. 8. The method of claim 5, further comprising: associating, by the dictator master role instance, an assignment identifier with the assignment of the one or more partitions, the dictator master role instance sending the assignment identifier along with the message to the partition server; receiving, by the partition server, the message from the dictator master role instance without updating a content of a corresponding storage object; breaking, by the dictator master role instance, a lease of the partition server on the corresponding storage object; deleting, by the dictator master role instance, the storage object corresponding the partition server; and detecting, by the partition server, the breaking of the lease, the partition server terminating in response to the detection of breaking the lease. 9. A method for performing computations in a distributed computing environment, comprising: executing a computation comprising at least two namespaces and at least two master role instances, each master role instance corresponding to a different namespace, each master role instance being the dictator and holding a dictator lease on a master storage object for the corresponding namespace; assigning at least one machine that provides failover service for a plurality of the dictator master role instances; detecting a failover event for one of the dictator master role instances; and creating, on the assigned machine, an additional instance of the master role corresponding to the detected failover event, the additional being assigned as the dictator for the namespace corresponding to the failover event. 10. The method of claim 9, wherein detecting a failover event comprises detecting a scheduled update for a dictator master role instance. 11. (canceled) 12. The method of claim 9, wherein at least one master role instance comprises one or more application-defined interfaces. 13. The method of claim 9, further comprising assigning, after detecting the failover event, an additional machine that provides failover service for the remaining dictator master role instances of the at least two master role instances and the additional dictator master role instance. 14. A system for performing computing tasks in a distributed computing environment, the system comprising: a plurality of processors executing computer-useable instructions that, when executed, provide a system comprising: a plurality of partition servers, the partition servers having at least one partitioning system interface for managing the storage objects associated with partition servers and one or more application-defined partitioning system interfaces, a partition server having an associated storage object for storing information regarding assigned partitions; a partition table containing partitions based on an application-defined namespace, the partitions corresponding to key ranges from the application-defined namespace that span the namespace, the partition table being accessible by a partitioning system; a first master role instance including fixed partitioning system interfaces for managing the assignment of partitions to partition server virtual machines and maintaining the partition table assignments of partitions to partition server virtual machines; and a client component with at least one fixed partitioning system interface for receiving client requests containing a key value from the namespace and returning addresses of a partition server corresponding to the key value. 15. The system of claim 14, wherein the system comprises a plurality of master role instances as part of the partitioning system, the first master role instance being an active master role instance. 16. The system of claim 15, further comprising a master selection component for selecting an active master role instance from a plurality of master role instances. 17. The system of claim 14, further comprising a fixed partitioning system interface for managing messages between the first master role instance and the plurality of partition server virtual machines. 18. The system of claim 14, wherein the master role instance and the partition servers comprise virtual machines in a distributed computing environment. 19. The system of claim 14, further comprising at least one application-defined interface for the master role instance. 20. The system of claim 14, further comprising a lease interface for assigning leases to the partition table and a master storage object to the active master role instance. 21. The method of claim 9, wherein detecting a failover event comprises a dictator master role instance losing the lease on the master storage object for the corresponding namespace.
2,400
7,393
7,393
14,410,338
2,449
Embodiments relate to a concept for a communication network, the communication network comprising a plurality of network entities. It is provided, from an event subscribing network entity ( 100 ) to an event publishing network entity ( 150 ) of the communication network, an event subscription message ( 110 ) comprising information identifying the event subscribing network entity ( 100 ) and comprising configuration rules for configuring a configurable event of interest at the event publishing network entity ( 150 ), wherein the configurable event of interest ( 160 ) shall be reported from the event publishing network entity ( 150 ) to the event subscribing network entity ( 100 ). Further it is provided the configurable event of interest ( 160 ) from the event publishing network entity ( 150 ) to the event subscribing network entity ( 100 ).
1. A network entity of a communication network, the communication network comprising a plurality of network entities, the network entity comprising: an interface operable to provide, to an event publishing network entity of the communication network, an event subscription message comprising information identifying said network entity and comprising configuration rules for configuring a configurable event of interest at the event publishing network entity, wherein the configurable event of interest shall be reported from the event publishing network entity to said network entity; and an interface operable to provide the configurable event of interest from the event publishing network entity to said network entity. 2. The network entity according to claim 1, wherein the configuration rules comprise one or more configurable parameters for defining or re-defining the event of interest at the event publishing network entity and/or for defining or re-defining a related event report published to said network entity. 3. The network entity according to claim 2, wherein a configurable parameter is from the group of an event threshold, an event hysteresis, an event granularity, a trigger for event notification, a time to trigger, an event notification frequency, and/or a notification content. 4. The network entity according to claim 1, wherein the configurable event of interest is related to a published routing control plane, and wherein said network entity further comprises a control unit operable to dynamically control the network routing within the communication network based on the reported configurable event of interest. 5. The network entity according to claim 4, wherein the control unit comprises: a request processing entity adapted to receive a request coming from a further network entity and adapted to perform processing of said request; a path computation entity adapted to compute a network path upon request from the request processing entity, based on a network graph and applying constraints, said computed network path comprising a number of said plurality of network entities; said path computation entity being linked with a traffic engineering database which is updated based on the reported configurable event of interest and/or the computed network paths; and a flow control entity adapted for establishing a forwarding entry in a forwarding information base of a network entity of the computed network path, upon request from the request processing entity. 6. The network entity according to claim 5, wherein the request processing entity is further adapted to communicate with the traffic engineering database for requesting and retrieving a path from said database. 7. The network entity according to claim 1, wherein the configurable event of interest is related to a processing load situation at the event publishing network entity, wherein said network entity further comprises: a load control unit operable to distribute processing load among the plurality of network entities based on the reported event of interest. 8. The network entity according to claim 1, wherein the configurable event of interest is indicative of an available processing capability of the event publishing network entity, the available processing capability deceeding or exceeding a predefined processing capability threshold. 9. The network entity according to claim 1, wherein the network entity is operable, upon receiving the configurable event of interest from the event publishing network entity, to transfer at least a part of a baseband processing task from a first network entity to the event publishing network entity, if processing resources of the first network entity are not sufficient for a processing task and if the configurable and received event of interest indicates an available processing capability of the event publishing network entity above a predefined processing capability threshold. 10. The network entity according to claim 1, wherein the network entity further comprises: a neighbor provision unit operable to provide information on at least one second neighboring network entity neighboring a first network entity of the communication network, wherein the at least one second neighboring network entity fulfills a neighborhood criterion of the first network entity. 11. The network entity according to claim 10, wherein the neighbor provision unit is operable to provide the information on the at least one second neighboring network entity based on a signal propagation delay measurement between the first network entity and a plurality of further network entities of the communication network, such that a signal propagation delay between the first and the at least one second neighboring network entity falls below a predefined maximum signal propagation delay threshold. 12. The network entity according to claim 1, wherein the communication network is a wireless communication network, and wherein the at least one network entity is coupled to at least one remote radio head of the wireless communication system, and wherein the at least one network entity is operable to process radio bearer related baseband data of at least one associated user of the wireless communication system. 13. A network entity of a communication network, the communication network comprising a plurality of network entities, the network entity comprising: an interface operable to provide, from an event subscribing network entity of the communication network, an event subscription message comprising information identifying the event subscribing network entity and comprising configuration rules for configuring a configurable event of interest at the network entity, wherein the configurable event of interest shall be reported from the network entity to the event subscribing network entity, and an interface operable to provide the configurable event of interest from the network entity to the event subscribing network entity. 14. A method for a communication network, the communication network comprising a plurality of network entities, the method comprising: providing, from an event subscribing network entity to an event publishing network entity of the communication network, an event subscription message comprising information identifying the event subscribing network entity and comprising configuration rules for configuring a configurable event of interest at the event publishing network entity, wherein the configurable event of interest shall be reported from the event publishing network entity to the event subscribing network entity; and providing the configurable event of interest from the event publishing network entity to the event subscribing network entity. 15. A computer program having a program code for performing the method of claim 14, when the computer program is executed on a programmable hardware device.
Embodiments relate to a concept for a communication network, the communication network comprising a plurality of network entities. It is provided, from an event subscribing network entity ( 100 ) to an event publishing network entity ( 150 ) of the communication network, an event subscription message ( 110 ) comprising information identifying the event subscribing network entity ( 100 ) and comprising configuration rules for configuring a configurable event of interest at the event publishing network entity ( 150 ), wherein the configurable event of interest ( 160 ) shall be reported from the event publishing network entity ( 150 ) to the event subscribing network entity ( 100 ). Further it is provided the configurable event of interest ( 160 ) from the event publishing network entity ( 150 ) to the event subscribing network entity ( 100 ).1. A network entity of a communication network, the communication network comprising a plurality of network entities, the network entity comprising: an interface operable to provide, to an event publishing network entity of the communication network, an event subscription message comprising information identifying said network entity and comprising configuration rules for configuring a configurable event of interest at the event publishing network entity, wherein the configurable event of interest shall be reported from the event publishing network entity to said network entity; and an interface operable to provide the configurable event of interest from the event publishing network entity to said network entity. 2. The network entity according to claim 1, wherein the configuration rules comprise one or more configurable parameters for defining or re-defining the event of interest at the event publishing network entity and/or for defining or re-defining a related event report published to said network entity. 3. The network entity according to claim 2, wherein a configurable parameter is from the group of an event threshold, an event hysteresis, an event granularity, a trigger for event notification, a time to trigger, an event notification frequency, and/or a notification content. 4. The network entity according to claim 1, wherein the configurable event of interest is related to a published routing control plane, and wherein said network entity further comprises a control unit operable to dynamically control the network routing within the communication network based on the reported configurable event of interest. 5. The network entity according to claim 4, wherein the control unit comprises: a request processing entity adapted to receive a request coming from a further network entity and adapted to perform processing of said request; a path computation entity adapted to compute a network path upon request from the request processing entity, based on a network graph and applying constraints, said computed network path comprising a number of said plurality of network entities; said path computation entity being linked with a traffic engineering database which is updated based on the reported configurable event of interest and/or the computed network paths; and a flow control entity adapted for establishing a forwarding entry in a forwarding information base of a network entity of the computed network path, upon request from the request processing entity. 6. The network entity according to claim 5, wherein the request processing entity is further adapted to communicate with the traffic engineering database for requesting and retrieving a path from said database. 7. The network entity according to claim 1, wherein the configurable event of interest is related to a processing load situation at the event publishing network entity, wherein said network entity further comprises: a load control unit operable to distribute processing load among the plurality of network entities based on the reported event of interest. 8. The network entity according to claim 1, wherein the configurable event of interest is indicative of an available processing capability of the event publishing network entity, the available processing capability deceeding or exceeding a predefined processing capability threshold. 9. The network entity according to claim 1, wherein the network entity is operable, upon receiving the configurable event of interest from the event publishing network entity, to transfer at least a part of a baseband processing task from a first network entity to the event publishing network entity, if processing resources of the first network entity are not sufficient for a processing task and if the configurable and received event of interest indicates an available processing capability of the event publishing network entity above a predefined processing capability threshold. 10. The network entity according to claim 1, wherein the network entity further comprises: a neighbor provision unit operable to provide information on at least one second neighboring network entity neighboring a first network entity of the communication network, wherein the at least one second neighboring network entity fulfills a neighborhood criterion of the first network entity. 11. The network entity according to claim 10, wherein the neighbor provision unit is operable to provide the information on the at least one second neighboring network entity based on a signal propagation delay measurement between the first network entity and a plurality of further network entities of the communication network, such that a signal propagation delay between the first and the at least one second neighboring network entity falls below a predefined maximum signal propagation delay threshold. 12. The network entity according to claim 1, wherein the communication network is a wireless communication network, and wherein the at least one network entity is coupled to at least one remote radio head of the wireless communication system, and wherein the at least one network entity is operable to process radio bearer related baseband data of at least one associated user of the wireless communication system. 13. A network entity of a communication network, the communication network comprising a plurality of network entities, the network entity comprising: an interface operable to provide, from an event subscribing network entity of the communication network, an event subscription message comprising information identifying the event subscribing network entity and comprising configuration rules for configuring a configurable event of interest at the network entity, wherein the configurable event of interest shall be reported from the network entity to the event subscribing network entity, and an interface operable to provide the configurable event of interest from the network entity to the event subscribing network entity. 14. A method for a communication network, the communication network comprising a plurality of network entities, the method comprising: providing, from an event subscribing network entity to an event publishing network entity of the communication network, an event subscription message comprising information identifying the event subscribing network entity and comprising configuration rules for configuring a configurable event of interest at the event publishing network entity, wherein the configurable event of interest shall be reported from the event publishing network entity to the event subscribing network entity; and providing the configurable event of interest from the event publishing network entity to the event subscribing network entity. 15. A computer program having a program code for performing the method of claim 14, when the computer program is executed on a programmable hardware device.
2,400
7,394
7,394
13,715,590
2,448
A device supporting content delivery is configured to run at least one content delivery (CD) service of a plurality of CD services. The plurality of CD services include dynamically configurable log information.
1. A device, operable in a system comprising a plurality of computers, each computer comprising hardware including memory and at least one processor, each computer configured to run at least two content delivery (CD) services of a plurality of CD services, wherein said CD services include: adaptation services, collector services, and control services, and wherein at least a first some of said computers run collector services, and wherein at least a second some of said plurality of computers run control services, said device comprising hardware including memory and at least one processor and: (i) a device configuration; and (ii) an adaptation service configured to provision and configure CD services on said device in accordance with said device configuration; and wherein each particular CD service on the device is configured to: (a) to generate information relating to operation of said particular CD service; and (b) to provide at least some of said information to at least one other CD service; and (c) to obtain control information from the control services and state information from the collector services, and to base operation of said particular CD service on said control information and on said state information. 2. The device of claim 1 wherein said CD services further include reducer services, wherein at least a third some of said computers run reducer services, and said at least some of said computers running reducer services comprise a reducer system, said reducer system comprising a reducer services network; and wherein at least some of said reducer services in said reducer services network provide event output to at least some collector services, said event output being based on event output from said at least some of said CD services, and wherein said at least one other CD service to which information is provided in (b) further comprises at least one reducer service in said reducer services network. 3. The device of claim 2 wherein said first some of said plurality of computers are distinct from said third some of said plurality of computers. 4. The device of claim 2 wherein there is at least some overlap of: (i) said first some of said plurality of computers that run collector services, and (ii) said third some of said plurality of computers that run control services, and (iii) said third some of said plurality of computers that run reducer services. 5. The device of claim 1 wherein the kind of information to be generated by each particular CD service on the computer relating to operation of said particular CD service on the computer is configurable. 6. The device of claim 5 wherein the kind of information to be generated by each particular CD service on the device relating to operation of said particular CD service on the computer is configured during initialization of the particular CD service. 7. The device of claim 5 wherein the kind of information to be generated by each CD service on the device is based on the kind of CD service. 8. The device of claim 2 wherein each CD service on the device provides information to two or more reducers in said reducer system. 9. The device of claim 8 wherein at least one of the two or more reducers in the reducer system is a reducer service running on the device. 10. The device of claim 8 wherein each particular CD service on the device provides information to said reducer system using information obtained during configuration of said particular CD service on the device. 11. The device of claim 1 wherein the kind of information generated by each particular CD service on the device is reconfigurable, under control of the adaptation service, during operation of the particular CD service on the device. 12. The device of claim 2 wherein each particular CD service on the device provides information to the at least one other CD service as one or more event streams. 13. The device of claim 12 where each of the one or more event streams is provided to multiple reducers in said reducer system. 14. The device of claim 12 wherein at least one of the multiple reducers in the reducer system is a reducer service running on the device. 15. The device of claim 13 where each of the one or more event streams is provided to multiple reducers in said reducer system using information obtained during configuration of each said particular CD service on the device. 16. The device of claim 12 wherein at least one particular CD service on the device provides information to the at least one other CD service as two or more event streams, a first of said two or more event streams being provided to a first group of reducers in said reducer system, and a second of said two or more event streams being provided to a second group of reducers in said reducer system, said second group of reducers being distinct from said first group of reducers. 17. The device of claim 16 wherein at least one of the reducers in the first group of reducers is a reducer service running on the device. 18. The device of claim 16 wherein at least a second CD service on the device provides information as a second two or more event streams, with a first of said second two or more event streams being provided to a third group of reducers in said reducer system and a second of said second two or more event streams being provided to a fourth group of reducers in said reducer system, said third group of reducers being distinct from said fourth group of reducers. 19. The device of claim 18 wherein each of the first, second, third and fourth groups of reducers are distinct from each other. 20. The device of claim 1 wherein at least some of the control information obtained from the control system or state information from the collector services was derived based on information provided to said at least one other CD service by at least some of the plurality of CD services on the device. 21. The device of claim 20 wherein at least some of the control information obtained from the control system or state information from the collector services was derived based on information provided by at least some of the plurality of CD services running on other computers in the CD system. 22. The device of claim 2 wherein at least some of the control information obtained from the control system or state information from the collector services was derived based on information provided to said reducer system by at least some of the plurality of CD services on the device. 23. A computer-implemented method, operable in a system comprising a plurality of computers, each computer comprising hardware including memory and at least one processor, each computer configured to run at least two content delivery (CD) services of a plurality of CD services, wherein said CD services include: adaptation services, collector services, and control services, and wherein at least a first some of said computers run collector services, and wherein at least a second some of said plurality of computers run control services, the method comprising, on a particular computer in the CD system, said particular computer comprising hardware including memory and at least one processor: (a) providing configuration information and a first service configured to provision and configure CD services on said particular computer in accordance with said configuration information; (b) running a particular CD service on said particular computer; (c) said particular CD service generating information relating to operation of said particular CD service; and (d) providing at least some of said information to at least one other CD service, wherein said at least one other CD service comprises at least one collector service; and (e) obtaining control information from the control system and state information from at least some of the collector services, and (f) operating of said particular CD service based on said control information and on said state information. 24. The method of claim 22 wherein said CD services further include reducer services, wherein at least some of said computers run reducer services, said at least some of said computers running reducer services comprise a reducer services network; and wherein at least some of said reducer services in said reducer services network provide event output to at least some collector services, said event output being based on event output from said at least some of said CD services, and wherein said at least one other CD service to which information is provided in (d) further comprises at least one reducer service in said reducer services network. 25. The method of claim 22 wherein said first some of said plurality of computers are distinct from said second some of said plurality of computers. 26. The method of claim 24 wherein there is at least some overlap of: (i) said first some of said plurality of computers that run collector services, and (ii) said third some of said plurality of computers that run control services, and (iii) said third some of said plurality of computers that run reducer services. 27. The method of claim 22 wherein the kind of information to be generated by said particular CD service on the computer relating to operation of said particular CD service on the computer is configurable. 28. The method of claim 26 further comprising: configuring the kind of information to be generated by the particular CD service during initialization of the particular CD service. 29. The method of claim 26 wherein the kind of information to be generated by each CD service on the device is based on the kind of CD service. 30. The method of claim 24 wherein said providing in (d) comprises: said particular CD service providing information to two or more reducers in said reducer system. 31. The method of claim 30 wherein at least one of the two or more reducers in the reducer system is a reducer service running on the particular computer. 32. The method of claim 24 wherein said particular CD service provides information to said reducer system in (d) using information obtained during configuration of said particular CD service on the particular computer. 33. The method of claim 23 further comprising: (g) configuring the kind of information generated by said particular CD service during operation of the particular CD service on the particular computer. 34. The method of claim 33 wherein said configuring in (g) is under control of the first service. 35. The method of claim 24 wherein the particular CD service provides information to said at least one other CD service in (d) as one or more event streams. 36. The method of claim 35 where each of the one or more event streams is provided to multiple reducers in said reducer system. 37. The method of claim 36 wherein at least one of the multiple reducers in the reducer system is a reducer service running on the particular computer. 38. The method of claim 35 where each of the one or more event streams is provided to multiple reducers in said reducer system, wherein said particular CD service uses configuration information obtained during configuration of said particular CD service on the particular computer to determine to which reducers said particular CD service is to provide information. 39. The method of claim 35 wherein said particular CD service provides information in (d) as two or more event streams, wherein a first of said two or more event streams being provided to a first group of reducers in said reducer system, and wherein a second of said two or more event streams being provided to a second group of reducers in said reducer system, said second group of reducers being distinct from said first group of reducers. 40. The method of claim 39 wherein at least one of the reducers in the first group of reducers is a reducer service running on the particular computer. 41. The method of claim 24 wherein at least some of the control information obtained from the control system or state information from the collector services was derived based on information provided to said at least one other CD service system by at least some of the plurality of CD services on the particular computer. 42. The method of claim 41 wherein at least some of the control information obtained from the control system or state information from the collector services was derived based on information provided by at least some of the plurality of CD services running on other computers in the CD system. 43. A computer program product having computer readable instructions stored on non-transitory computer readable media, the computer readable instructions including instructions for implementing a computer-implemented method, said method operable in a system comprising a plurality of computers, each computer comprising hardware including memory and at least one processor, each computer configured to run at least two content delivery (CD) services of a plurality of CD services, wherein said CD services include: adaptation services, collector services, and control services, and wherein at least a first some of said computers run collector services, and wherein at least a second some of said plurality of computers run control services, said method operable on a particular computer in said system, and using memory and at least one processor of said particular computer and comprising: (a) providing configuration information and a first service configured to provision and configure CD services on said particular computer in accordance with said configuration information; (b) running a particular CD service on said particular computer; (c) said particular CD service generating information relating to operation of said particular CD service; and (d) providing at least some of said information to at least one other CD service, wherein said at least one other CD service comprises at least one collector service and (e) obtaining control information from the control system and state information from the collector services, and (f) operating of said particular CD service based on said control information and on said state information. 44. The computer program product of claim 43 wherein said CD services further include reducer services, wherein at least some of said computers run reducer services, said at least some of said computers running reducer services comprise a reducer services network; and wherein at least some of said reducer services in said reducer services network provide event output to at least some collector services, said event output being based on event output from said at least some of said CD services, and wherein said at least one other CD service to which information is provided in (d) further comprises at least one reducer service in said reducer services network.
A device supporting content delivery is configured to run at least one content delivery (CD) service of a plurality of CD services. The plurality of CD services include dynamically configurable log information.1. A device, operable in a system comprising a plurality of computers, each computer comprising hardware including memory and at least one processor, each computer configured to run at least two content delivery (CD) services of a plurality of CD services, wherein said CD services include: adaptation services, collector services, and control services, and wherein at least a first some of said computers run collector services, and wherein at least a second some of said plurality of computers run control services, said device comprising hardware including memory and at least one processor and: (i) a device configuration; and (ii) an adaptation service configured to provision and configure CD services on said device in accordance with said device configuration; and wherein each particular CD service on the device is configured to: (a) to generate information relating to operation of said particular CD service; and (b) to provide at least some of said information to at least one other CD service; and (c) to obtain control information from the control services and state information from the collector services, and to base operation of said particular CD service on said control information and on said state information. 2. The device of claim 1 wherein said CD services further include reducer services, wherein at least a third some of said computers run reducer services, and said at least some of said computers running reducer services comprise a reducer system, said reducer system comprising a reducer services network; and wherein at least some of said reducer services in said reducer services network provide event output to at least some collector services, said event output being based on event output from said at least some of said CD services, and wherein said at least one other CD service to which information is provided in (b) further comprises at least one reducer service in said reducer services network. 3. The device of claim 2 wherein said first some of said plurality of computers are distinct from said third some of said plurality of computers. 4. The device of claim 2 wherein there is at least some overlap of: (i) said first some of said plurality of computers that run collector services, and (ii) said third some of said plurality of computers that run control services, and (iii) said third some of said plurality of computers that run reducer services. 5. The device of claim 1 wherein the kind of information to be generated by each particular CD service on the computer relating to operation of said particular CD service on the computer is configurable. 6. The device of claim 5 wherein the kind of information to be generated by each particular CD service on the device relating to operation of said particular CD service on the computer is configured during initialization of the particular CD service. 7. The device of claim 5 wherein the kind of information to be generated by each CD service on the device is based on the kind of CD service. 8. The device of claim 2 wherein each CD service on the device provides information to two or more reducers in said reducer system. 9. The device of claim 8 wherein at least one of the two or more reducers in the reducer system is a reducer service running on the device. 10. The device of claim 8 wherein each particular CD service on the device provides information to said reducer system using information obtained during configuration of said particular CD service on the device. 11. The device of claim 1 wherein the kind of information generated by each particular CD service on the device is reconfigurable, under control of the adaptation service, during operation of the particular CD service on the device. 12. The device of claim 2 wherein each particular CD service on the device provides information to the at least one other CD service as one or more event streams. 13. The device of claim 12 where each of the one or more event streams is provided to multiple reducers in said reducer system. 14. The device of claim 12 wherein at least one of the multiple reducers in the reducer system is a reducer service running on the device. 15. The device of claim 13 where each of the one or more event streams is provided to multiple reducers in said reducer system using information obtained during configuration of each said particular CD service on the device. 16. The device of claim 12 wherein at least one particular CD service on the device provides information to the at least one other CD service as two or more event streams, a first of said two or more event streams being provided to a first group of reducers in said reducer system, and a second of said two or more event streams being provided to a second group of reducers in said reducer system, said second group of reducers being distinct from said first group of reducers. 17. The device of claim 16 wherein at least one of the reducers in the first group of reducers is a reducer service running on the device. 18. The device of claim 16 wherein at least a second CD service on the device provides information as a second two or more event streams, with a first of said second two or more event streams being provided to a third group of reducers in said reducer system and a second of said second two or more event streams being provided to a fourth group of reducers in said reducer system, said third group of reducers being distinct from said fourth group of reducers. 19. The device of claim 18 wherein each of the first, second, third and fourth groups of reducers are distinct from each other. 20. The device of claim 1 wherein at least some of the control information obtained from the control system or state information from the collector services was derived based on information provided to said at least one other CD service by at least some of the plurality of CD services on the device. 21. The device of claim 20 wherein at least some of the control information obtained from the control system or state information from the collector services was derived based on information provided by at least some of the plurality of CD services running on other computers in the CD system. 22. The device of claim 2 wherein at least some of the control information obtained from the control system or state information from the collector services was derived based on information provided to said reducer system by at least some of the plurality of CD services on the device. 23. A computer-implemented method, operable in a system comprising a plurality of computers, each computer comprising hardware including memory and at least one processor, each computer configured to run at least two content delivery (CD) services of a plurality of CD services, wherein said CD services include: adaptation services, collector services, and control services, and wherein at least a first some of said computers run collector services, and wherein at least a second some of said plurality of computers run control services, the method comprising, on a particular computer in the CD system, said particular computer comprising hardware including memory and at least one processor: (a) providing configuration information and a first service configured to provision and configure CD services on said particular computer in accordance with said configuration information; (b) running a particular CD service on said particular computer; (c) said particular CD service generating information relating to operation of said particular CD service; and (d) providing at least some of said information to at least one other CD service, wherein said at least one other CD service comprises at least one collector service; and (e) obtaining control information from the control system and state information from at least some of the collector services, and (f) operating of said particular CD service based on said control information and on said state information. 24. The method of claim 22 wherein said CD services further include reducer services, wherein at least some of said computers run reducer services, said at least some of said computers running reducer services comprise a reducer services network; and wherein at least some of said reducer services in said reducer services network provide event output to at least some collector services, said event output being based on event output from said at least some of said CD services, and wherein said at least one other CD service to which information is provided in (d) further comprises at least one reducer service in said reducer services network. 25. The method of claim 22 wherein said first some of said plurality of computers are distinct from said second some of said plurality of computers. 26. The method of claim 24 wherein there is at least some overlap of: (i) said first some of said plurality of computers that run collector services, and (ii) said third some of said plurality of computers that run control services, and (iii) said third some of said plurality of computers that run reducer services. 27. The method of claim 22 wherein the kind of information to be generated by said particular CD service on the computer relating to operation of said particular CD service on the computer is configurable. 28. The method of claim 26 further comprising: configuring the kind of information to be generated by the particular CD service during initialization of the particular CD service. 29. The method of claim 26 wherein the kind of information to be generated by each CD service on the device is based on the kind of CD service. 30. The method of claim 24 wherein said providing in (d) comprises: said particular CD service providing information to two or more reducers in said reducer system. 31. The method of claim 30 wherein at least one of the two or more reducers in the reducer system is a reducer service running on the particular computer. 32. The method of claim 24 wherein said particular CD service provides information to said reducer system in (d) using information obtained during configuration of said particular CD service on the particular computer. 33. The method of claim 23 further comprising: (g) configuring the kind of information generated by said particular CD service during operation of the particular CD service on the particular computer. 34. The method of claim 33 wherein said configuring in (g) is under control of the first service. 35. The method of claim 24 wherein the particular CD service provides information to said at least one other CD service in (d) as one or more event streams. 36. The method of claim 35 where each of the one or more event streams is provided to multiple reducers in said reducer system. 37. The method of claim 36 wherein at least one of the multiple reducers in the reducer system is a reducer service running on the particular computer. 38. The method of claim 35 where each of the one or more event streams is provided to multiple reducers in said reducer system, wherein said particular CD service uses configuration information obtained during configuration of said particular CD service on the particular computer to determine to which reducers said particular CD service is to provide information. 39. The method of claim 35 wherein said particular CD service provides information in (d) as two or more event streams, wherein a first of said two or more event streams being provided to a first group of reducers in said reducer system, and wherein a second of said two or more event streams being provided to a second group of reducers in said reducer system, said second group of reducers being distinct from said first group of reducers. 40. The method of claim 39 wherein at least one of the reducers in the first group of reducers is a reducer service running on the particular computer. 41. The method of claim 24 wherein at least some of the control information obtained from the control system or state information from the collector services was derived based on information provided to said at least one other CD service system by at least some of the plurality of CD services on the particular computer. 42. The method of claim 41 wherein at least some of the control information obtained from the control system or state information from the collector services was derived based on information provided by at least some of the plurality of CD services running on other computers in the CD system. 43. A computer program product having computer readable instructions stored on non-transitory computer readable media, the computer readable instructions including instructions for implementing a computer-implemented method, said method operable in a system comprising a plurality of computers, each computer comprising hardware including memory and at least one processor, each computer configured to run at least two content delivery (CD) services of a plurality of CD services, wherein said CD services include: adaptation services, collector services, and control services, and wherein at least a first some of said computers run collector services, and wherein at least a second some of said plurality of computers run control services, said method operable on a particular computer in said system, and using memory and at least one processor of said particular computer and comprising: (a) providing configuration information and a first service configured to provision and configure CD services on said particular computer in accordance with said configuration information; (b) running a particular CD service on said particular computer; (c) said particular CD service generating information relating to operation of said particular CD service; and (d) providing at least some of said information to at least one other CD service, wherein said at least one other CD service comprises at least one collector service and (e) obtaining control information from the control system and state information from the collector services, and (f) operating of said particular CD service based on said control information and on said state information. 44. The computer program product of claim 43 wherein said CD services further include reducer services, wherein at least some of said computers run reducer services, said at least some of said computers running reducer services comprise a reducer services network; and wherein at least some of said reducer services in said reducer services network provide event output to at least some collector services, said event output being based on event output from said at least some of said CD services, and wherein said at least one other CD service to which information is provided in (d) further comprises at least one reducer service in said reducer services network.
2,400
7,395
7,395
15,220,331
2,419
A secondary device may be used to provide access to resources to a primary device. Upon receiving an authorization indication at a device, a registration key based on the authorization indication, a user identifier, and a property of the device may be created. Upon determining whether access to at least one resource is permitted according to the registration key the device may be permitted to access the at least one resource.
1. A method, comprising: causing a resource to be encrypted to create an encrypted version of the resource, the encrypted version of the resource being configured to be inaccessible by a primary client device, the encrypted version of the resource being configured to be decrypted using an authorization credential to create an unencrypted version of the resource, and the unencrypted version of the resource being configured to be accessible by the primary client device; causing the encrypted version of the resource to be provided to the primary client device; determining that the primary client device is authorized to access the unencrypted version of the resource based at least in part on a first distribution rule, the first distribution rule being associated with the primary client device; determining that a secondary client device is authorized to provide the primary client device with the unencrypted version of the resource based at least in part on a second distribution rule, the second distribution rule being associated with the secondary client device; and, causing the authorization credential to be provided to the secondary client device. 2. The method of claim 1, further comprising: identifying a request by the primary client device to access the resource. 3. The method of claim 1, further comprising: identifying a request by the secondary client device for authorization to provide the primary client device with the unencrypted version of the resource. 4. The method of claim 1, wherein the authorization credential comprises a decryption key. 5. The method of claim 1, wherein the first distribution rule specifies that the primary client device must be physically located within a particular threshold distance of the secondary client device. 6. The method of claim 1, wherein the first distribution rule specifies that the primary client device must be communicatively coupled to the secondary client device through a particular network. 7. A non-transitory computer readable medium comprising executable instructions, which when executed by at least one processor, cause a computing device to at least: cause a resource to be encrypted to create an encrypted version of the resource, the encrypted version of the resource being configured to be inaccessible by a primary client device, the encrypted version of the resource being configured to be decrypted using an authorization credential to create an unencrypted version of the resource, and the unencrypted version of the resource being configured to be accessible by the primary client device; cause the encrypted version of the resource to be provided to the primary client device; determine that the primary client device is authorized to access the unencrypted version of the resource based at least in part on a first distribution rule, the first distribution rule being associated with the primary client device; determine that a secondary client device is authorized to provide the primary client device with the unencrypted version of the resource based at least in part on a second distribution rule, the second distribution rule being associated with the secondary client device; and, cause the authorization credential to be provided to the secondary client device. 8. The non-transitory computer readable medium of claim 7, further including executable instructions, which when executed by the at least one processor, cause the computing device to: identify a request by the primary client device to access the resource. 9. The non-transitory computer readable medium of claim 7, further including executable instructions, which when executed by the at least one processor, cause the computing device to: identify a request by the secondary client device for authorization to provide the primary client device with the unencrypted version of the resource. 10. The non-transitory computer readable medium of claim 7, wherein the first distribution rule specifies that the primary client device must comprise at least one of: a particular hardware component, a particular software component, or a particular device configuration. 11. The non-transitory computer readable medium of claim 10, further including executable instructions, which when executed by the at least one processor, cause the computing device to: identify information describing at least one aspect of the primary client device, the at least one aspect comprising at least one of: a hardware component of the primary client device, a software component of the primary client device, or a particular device configuration of the primary client device. 12. The non-transitory computer readable medium of claim 7, wherein the second distribution rule specifies that the secondary client device must comprise at least one of: a particular hardware component, a particular software component, or a particular device configuration. 13. The non-transitory computer readable medium of claim 12, further including executable instructions, which when executed by the at least one processor, cause the computing device to: identify information describing at least one aspect of the secondary client device, the at least one aspect comprising at least one of: a hardware component of the secondary client device, a software component of the secondary client device, or a particular device configuration of the secondary client device. 14. A computing device, including: at least one processor; and, at least one memory comprising executable instructions, which when executed by the at least one processor, cause the computing device to at least: cause a resource to be encrypted to create an encrypted version of the resource, the encrypted version of the resource being configured to be inaccessible by a primary client device, the encrypted version of the resource being configured to be decrypted using an authorization credential to create an unencrypted version of the resource, and the unencrypted version of the resource being configured to be accessible by the primary client device; cause the encrypted version of the resource to be provided to the primary client device; determine that the primary client device is authorized to access the unencrypted version of the resource based at least in part on a first distribution rule, the first distribution rule being associated with the primary client device; determine that a secondary client device is authorized to provide the primary client device with the unencrypted version of the resource based at least in part on a second distribution rule, the second distribution rule being associated with the secondary client device; and, cause the authorization credential to be provided to the secondary client device. 15. The computing device of claim 14, further including executable instructions, which when executed by the at least one processor, cause the computing device to: identify a request for the primary client device to access the resource. 16. The computing device of claim 14, further including executable instructions, which when executed by the at least one processor, cause the computing device to: identify a request by the secondary client device for authorization to provide the primary client device with the unencrypted version of the resource. 17. The computing device of claim 14, wherein the first distribution rule specifies that the primary client device must be operated by an authorized user based at least in part on a user credential provided by a user of the primary client device. 18. The computing device of claim 17, wherein the user credential comprises at least one of: a personal identification number (PIN), a password, a certificate, or a token. 19. The computing device of claim 14, wherein the second distribution rule specifies that the secondary client device must be operated by an authorized user based at least in part on a user credential provided to the secondary client device. 20. The computing device of claim 19, wherein the user credential comprises at least one of: a personal identification number (PIN), a password, a certificate, or a token.
A secondary device may be used to provide access to resources to a primary device. Upon receiving an authorization indication at a device, a registration key based on the authorization indication, a user identifier, and a property of the device may be created. Upon determining whether access to at least one resource is permitted according to the registration key the device may be permitted to access the at least one resource.1. A method, comprising: causing a resource to be encrypted to create an encrypted version of the resource, the encrypted version of the resource being configured to be inaccessible by a primary client device, the encrypted version of the resource being configured to be decrypted using an authorization credential to create an unencrypted version of the resource, and the unencrypted version of the resource being configured to be accessible by the primary client device; causing the encrypted version of the resource to be provided to the primary client device; determining that the primary client device is authorized to access the unencrypted version of the resource based at least in part on a first distribution rule, the first distribution rule being associated with the primary client device; determining that a secondary client device is authorized to provide the primary client device with the unencrypted version of the resource based at least in part on a second distribution rule, the second distribution rule being associated with the secondary client device; and, causing the authorization credential to be provided to the secondary client device. 2. The method of claim 1, further comprising: identifying a request by the primary client device to access the resource. 3. The method of claim 1, further comprising: identifying a request by the secondary client device for authorization to provide the primary client device with the unencrypted version of the resource. 4. The method of claim 1, wherein the authorization credential comprises a decryption key. 5. The method of claim 1, wherein the first distribution rule specifies that the primary client device must be physically located within a particular threshold distance of the secondary client device. 6. The method of claim 1, wherein the first distribution rule specifies that the primary client device must be communicatively coupled to the secondary client device through a particular network. 7. A non-transitory computer readable medium comprising executable instructions, which when executed by at least one processor, cause a computing device to at least: cause a resource to be encrypted to create an encrypted version of the resource, the encrypted version of the resource being configured to be inaccessible by a primary client device, the encrypted version of the resource being configured to be decrypted using an authorization credential to create an unencrypted version of the resource, and the unencrypted version of the resource being configured to be accessible by the primary client device; cause the encrypted version of the resource to be provided to the primary client device; determine that the primary client device is authorized to access the unencrypted version of the resource based at least in part on a first distribution rule, the first distribution rule being associated with the primary client device; determine that a secondary client device is authorized to provide the primary client device with the unencrypted version of the resource based at least in part on a second distribution rule, the second distribution rule being associated with the secondary client device; and, cause the authorization credential to be provided to the secondary client device. 8. The non-transitory computer readable medium of claim 7, further including executable instructions, which when executed by the at least one processor, cause the computing device to: identify a request by the primary client device to access the resource. 9. The non-transitory computer readable medium of claim 7, further including executable instructions, which when executed by the at least one processor, cause the computing device to: identify a request by the secondary client device for authorization to provide the primary client device with the unencrypted version of the resource. 10. The non-transitory computer readable medium of claim 7, wherein the first distribution rule specifies that the primary client device must comprise at least one of: a particular hardware component, a particular software component, or a particular device configuration. 11. The non-transitory computer readable medium of claim 10, further including executable instructions, which when executed by the at least one processor, cause the computing device to: identify information describing at least one aspect of the primary client device, the at least one aspect comprising at least one of: a hardware component of the primary client device, a software component of the primary client device, or a particular device configuration of the primary client device. 12. The non-transitory computer readable medium of claim 7, wherein the second distribution rule specifies that the secondary client device must comprise at least one of: a particular hardware component, a particular software component, or a particular device configuration. 13. The non-transitory computer readable medium of claim 12, further including executable instructions, which when executed by the at least one processor, cause the computing device to: identify information describing at least one aspect of the secondary client device, the at least one aspect comprising at least one of: a hardware component of the secondary client device, a software component of the secondary client device, or a particular device configuration of the secondary client device. 14. A computing device, including: at least one processor; and, at least one memory comprising executable instructions, which when executed by the at least one processor, cause the computing device to at least: cause a resource to be encrypted to create an encrypted version of the resource, the encrypted version of the resource being configured to be inaccessible by a primary client device, the encrypted version of the resource being configured to be decrypted using an authorization credential to create an unencrypted version of the resource, and the unencrypted version of the resource being configured to be accessible by the primary client device; cause the encrypted version of the resource to be provided to the primary client device; determine that the primary client device is authorized to access the unencrypted version of the resource based at least in part on a first distribution rule, the first distribution rule being associated with the primary client device; determine that a secondary client device is authorized to provide the primary client device with the unencrypted version of the resource based at least in part on a second distribution rule, the second distribution rule being associated with the secondary client device; and, cause the authorization credential to be provided to the secondary client device. 15. The computing device of claim 14, further including executable instructions, which when executed by the at least one processor, cause the computing device to: identify a request for the primary client device to access the resource. 16. The computing device of claim 14, further including executable instructions, which when executed by the at least one processor, cause the computing device to: identify a request by the secondary client device for authorization to provide the primary client device with the unencrypted version of the resource. 17. The computing device of claim 14, wherein the first distribution rule specifies that the primary client device must be operated by an authorized user based at least in part on a user credential provided by a user of the primary client device. 18. The computing device of claim 17, wherein the user credential comprises at least one of: a personal identification number (PIN), a password, a certificate, or a token. 19. The computing device of claim 14, wherein the second distribution rule specifies that the secondary client device must be operated by an authorized user based at least in part on a user credential provided to the secondary client device. 20. The computing device of claim 19, wherein the user credential comprises at least one of: a personal identification number (PIN), a password, a certificate, or a token.
2,400
7,396
7,396
14,948,268
2,435
A system includes least one processor in communication with a memory storing instructions, the at least one processor to receive an authentication request comprising authentication information from a user requesting access to a computing device connected to a communications network, determine a type of authentication request sent by the user, transmit the authentication request to an appropriate authentication server responsive to the type of authentication request, receive an authentication response from the appropriate authentication server, determine a permission level for the user requesting access to the computing device and attach the permission level to the authentication response, and transmit the authentication response to the user requesting access to the computing device.
1. A system, comprising: at least one processor in communication with a memory storing instructions, the at least one processor to: receive an authentication request comprising authentication information from a user requesting access to a computing device connected to a communications network; transmit the authentication request to an appropriate authentication server responsive to a type of authentication request; receive an authentication response from the appropriate authentication server; obtain a permission level for the user requesting access to the computing device and attach the permission level to the authentication response; and transmit the authentication response to the user requesting access to the computing device. 2. The system of claim 1, wherein the authentication information comprises multi-factor authentication information comprising at least an authoritative username, a personal identification number (PIN), and a one-time password. 3. The system of claim 2, the at least one processor further to: determine that the authoritative username is present in an alias database; and store the authoritative username, an internet protocol (IP) address of the user, and an IP address of the computing device as a request in a requests database. 4. The system of claim 2, the at least one processor further to: determine a location of the computing device associated with the IP address of the computing device, the location of the computing device derived from a subnets database storing subnet information comprising a plurality of subnets in the communications network and a location associated with each subnet; determine a region permission of the user based on a region associated with the IP address of the user, the region permission of the user derived from a permissions database storing region permissions for the user for a plurality of regions associated with the communications network; and determine the permission level responsive to the location of the computing device and the region permission of the user. 5. The system of claim 4, wherein the permission level is one of Read/Write, Read Only, and None. 6. The system of claim 4, wherein the region is one of inside the United States and outside the United States. 7. The system of claim 4, the at least one processor further to: delete the request from the requests database. 8. The system of claim 3, the at least one processor further to synchronize the alias database at a predetermined interval. 9. The system of claim 1, wherein the computing device is domestic critical infrastructure (DCI). 10. The system of claim 1, wherein the computing device transports communications that cannot be viewed by a non-United States citizen. 11. A method, comprising: receiving, by at least one processor, an authentication request comprising authentication information from a user requesting access to a computing device connected to a communications network; transmitting, by the at least one processor, the authentication request to an appropriate authentication server responsive to a type of authentication request; receiving, by the at least one processor, an authentication response from the appropriate authentication server; identifying, by the at least one processor, a permission level for the user requesting access to the computing device and attaching the permission level to the authentication response; and transmitting, by the at least one processor, the authentication response to the user requesting access to the computing device. 12. The method of claim 11, wherein the authentication information comprises multi-factor authentication information comprising at least an authoritative username, a personal identification number (PIN), and a one-time password. 13. The method of claim 12, further comprising: determining that the authoritative username is present in an alias database; and storing the authoritative username, an internet protocol (IP) address of the user, and an IP address of the computing device as a request in a requests database. 14. The method of claim 12, further comprising: determining a location of the computing device associated with the IP address of the computing device, the location of the computing device derived from a subnets database storing subnet information comprising a plurality of subnets in the communications network and a location associated with each subnet; determining a region permission of the user based on a region associated with the IP address of the user, the region permission of the user derived from a permissions database storing region permissions for the user for a plurality of regions associated with the communications network; and determining the permission level responsive to the location of the computing device and the region permission of the user. 15. The method of claim 14, wherein the permission level is one of Read/Write, Read Only, and None. 16. The method of claim 14, wherein the region is one of inside the United States and outside the United States. 17. The method of claim 14, further comprising: deleting the request from the requests database. 18. The method of claim 13, further comprising: synchronizing the alias database at a predetermined interval. 19. The method of claim 11, wherein the computing device is domestic critical infrastructure (DCI). 20. The method of claim 11, wherein the computing device transports communications that cannot be viewed by a non-United States citizen. 21. A non-transitory computer-readable medium having instructions stored thereon that, when executed by at least one processor, cause the at least one processor to perform operations comprising: receiving an authentication request comprising authentication information from a user requesting access to a computing device connected to a communications network; transmitting the authentication request to an appropriate authentication server responsive to a type of authentication request; receiving an authentication response from the appropriate authentication server; identifying a permission level for the user requesting access to the computing device and attaching the permission level to the authentication response; and transmitting the authentication response to the user requesting access to the computing device. 22. The non-transitory computer-readable medium of claim 21, wherein the authentication information comprises multi-factor authentication information comprising at least an authoritative username, a personal identification number (PIN), and a one-time password. 23. The non-transitory computer-readable medium of claim 22, the operations further comprising: determining that the authoritative username is present in an alias database; and storing the authoritative username, an internet protocol (IP) address of the user, and an IP address of the computing device as a request in a requests database. 24. The non-transitory computer-readable medium of claim 22, the operations further comprising: determining a location of the computing device associated with the IP address of the computing device, the location of the computing device derived from a subnets database storing subnet information comprising a plurality of subnets in the communications network and a location associated with each subnet; determining a region permission of the user based on a region associated with the IP address of the user, the region permission of the user derived from a permissions database storing region permissions for the user for a plurality of regions associated with the communications network; and determining the permission level responsive to the location of the computing device and the region permission of the user. 25. The non-transitory computer-readable medium of claim 24, wherein the permission level is one of Read/Write, Read Only, and None. 26. The non-transitory computer-readable medium of claim 24, wherein the region is one of inside the United States and outside the United States. 27. The non-transitory computer-readable medium of claim 24, the operations further comprising: deleting the request from the requests database. 28. The non-transitory computer-readable medium of claim 23, the operations further comprising: synchronizing the alias database at a predetermined interval. 29. The non-transitory computer-readable medium of claim 21, wherein the computing device is domestic critical infrastructure (DCI). 30. The non-transitory computer-readable medium of claim 21, wherein the computing device transports communications that cannot be viewed by a non-United States citizen.
A system includes least one processor in communication with a memory storing instructions, the at least one processor to receive an authentication request comprising authentication information from a user requesting access to a computing device connected to a communications network, determine a type of authentication request sent by the user, transmit the authentication request to an appropriate authentication server responsive to the type of authentication request, receive an authentication response from the appropriate authentication server, determine a permission level for the user requesting access to the computing device and attach the permission level to the authentication response, and transmit the authentication response to the user requesting access to the computing device.1. A system, comprising: at least one processor in communication with a memory storing instructions, the at least one processor to: receive an authentication request comprising authentication information from a user requesting access to a computing device connected to a communications network; transmit the authentication request to an appropriate authentication server responsive to a type of authentication request; receive an authentication response from the appropriate authentication server; obtain a permission level for the user requesting access to the computing device and attach the permission level to the authentication response; and transmit the authentication response to the user requesting access to the computing device. 2. The system of claim 1, wherein the authentication information comprises multi-factor authentication information comprising at least an authoritative username, a personal identification number (PIN), and a one-time password. 3. The system of claim 2, the at least one processor further to: determine that the authoritative username is present in an alias database; and store the authoritative username, an internet protocol (IP) address of the user, and an IP address of the computing device as a request in a requests database. 4. The system of claim 2, the at least one processor further to: determine a location of the computing device associated with the IP address of the computing device, the location of the computing device derived from a subnets database storing subnet information comprising a plurality of subnets in the communications network and a location associated with each subnet; determine a region permission of the user based on a region associated with the IP address of the user, the region permission of the user derived from a permissions database storing region permissions for the user for a plurality of regions associated with the communications network; and determine the permission level responsive to the location of the computing device and the region permission of the user. 5. The system of claim 4, wherein the permission level is one of Read/Write, Read Only, and None. 6. The system of claim 4, wherein the region is one of inside the United States and outside the United States. 7. The system of claim 4, the at least one processor further to: delete the request from the requests database. 8. The system of claim 3, the at least one processor further to synchronize the alias database at a predetermined interval. 9. The system of claim 1, wherein the computing device is domestic critical infrastructure (DCI). 10. The system of claim 1, wherein the computing device transports communications that cannot be viewed by a non-United States citizen. 11. A method, comprising: receiving, by at least one processor, an authentication request comprising authentication information from a user requesting access to a computing device connected to a communications network; transmitting, by the at least one processor, the authentication request to an appropriate authentication server responsive to a type of authentication request; receiving, by the at least one processor, an authentication response from the appropriate authentication server; identifying, by the at least one processor, a permission level for the user requesting access to the computing device and attaching the permission level to the authentication response; and transmitting, by the at least one processor, the authentication response to the user requesting access to the computing device. 12. The method of claim 11, wherein the authentication information comprises multi-factor authentication information comprising at least an authoritative username, a personal identification number (PIN), and a one-time password. 13. The method of claim 12, further comprising: determining that the authoritative username is present in an alias database; and storing the authoritative username, an internet protocol (IP) address of the user, and an IP address of the computing device as a request in a requests database. 14. The method of claim 12, further comprising: determining a location of the computing device associated with the IP address of the computing device, the location of the computing device derived from a subnets database storing subnet information comprising a plurality of subnets in the communications network and a location associated with each subnet; determining a region permission of the user based on a region associated with the IP address of the user, the region permission of the user derived from a permissions database storing region permissions for the user for a plurality of regions associated with the communications network; and determining the permission level responsive to the location of the computing device and the region permission of the user. 15. The method of claim 14, wherein the permission level is one of Read/Write, Read Only, and None. 16. The method of claim 14, wherein the region is one of inside the United States and outside the United States. 17. The method of claim 14, further comprising: deleting the request from the requests database. 18. The method of claim 13, further comprising: synchronizing the alias database at a predetermined interval. 19. The method of claim 11, wherein the computing device is domestic critical infrastructure (DCI). 20. The method of claim 11, wherein the computing device transports communications that cannot be viewed by a non-United States citizen. 21. A non-transitory computer-readable medium having instructions stored thereon that, when executed by at least one processor, cause the at least one processor to perform operations comprising: receiving an authentication request comprising authentication information from a user requesting access to a computing device connected to a communications network; transmitting the authentication request to an appropriate authentication server responsive to a type of authentication request; receiving an authentication response from the appropriate authentication server; identifying a permission level for the user requesting access to the computing device and attaching the permission level to the authentication response; and transmitting the authentication response to the user requesting access to the computing device. 22. The non-transitory computer-readable medium of claim 21, wherein the authentication information comprises multi-factor authentication information comprising at least an authoritative username, a personal identification number (PIN), and a one-time password. 23. The non-transitory computer-readable medium of claim 22, the operations further comprising: determining that the authoritative username is present in an alias database; and storing the authoritative username, an internet protocol (IP) address of the user, and an IP address of the computing device as a request in a requests database. 24. The non-transitory computer-readable medium of claim 22, the operations further comprising: determining a location of the computing device associated with the IP address of the computing device, the location of the computing device derived from a subnets database storing subnet information comprising a plurality of subnets in the communications network and a location associated with each subnet; determining a region permission of the user based on a region associated with the IP address of the user, the region permission of the user derived from a permissions database storing region permissions for the user for a plurality of regions associated with the communications network; and determining the permission level responsive to the location of the computing device and the region permission of the user. 25. The non-transitory computer-readable medium of claim 24, wherein the permission level is one of Read/Write, Read Only, and None. 26. The non-transitory computer-readable medium of claim 24, wherein the region is one of inside the United States and outside the United States. 27. The non-transitory computer-readable medium of claim 24, the operations further comprising: deleting the request from the requests database. 28. The non-transitory computer-readable medium of claim 23, the operations further comprising: synchronizing the alias database at a predetermined interval. 29. The non-transitory computer-readable medium of claim 21, wherein the computing device is domestic critical infrastructure (DCI). 30. The non-transitory computer-readable medium of claim 21, wherein the computing device transports communications that cannot be viewed by a non-United States citizen.
2,400
7,397
7,397
14,653,162
2,476
The present invention relates to a method for supporting data-communication between a first communications module and a second communications module over a communications link between the first communications module and the second communications module where this method comprises the steps of at a first communications module setting up a temporary network applying at least one network connection parameter in the setting up of the temporary network and presenting data-communication supporting information, where the data-communication supporting information comprises at least one network connection parameter and data-communication specific data. Subsequently, the second communications module retrieves the data-communication supporting information presented and the second communications module connects to the temporary network of the access point of the first communications module applying the at least one network connection parameter retrieved from the data-communication supporting information. The method also includes the step of starting a first application at the first communications module and a second application at the second communications module where the first and second application require a data-communication over the temporary network between the access point of the first communications module and the second communications module. The first and said second application being uniquely identified by the data-communication specific data.
1. Method for supporting data-communication between a first communications module and a second communications module over a communications link between said first communications module and said second communications module, wherein said method comprises: said first communications module setting up a temporary network applying at least one network connection parameter in the setting up of said temporary network; and presenting data-communication supporting information, said data-communication supporting information comprising said at least one network connection parameter and data-communication specific data; and said second communications module retrieving said data-communication supporting information presented; and said second communications module connecting to said temporary network of said access point of said first communications module applying said at least one network connection parameter retrieved from said data-communication supporting information; and starting a first application at said first communications module and a second application at said second communications module said first and said second application requiring a data-communication over said temporary network between said access point first communications module and said second communications module said first and said second application being uniquely identified by said data-communication specific data. 2. Method according to claim 1, wherein said method further comprises said second communications module applying security settings in order to only allow access to said first application requiring said data-communication over said connection between said access point first communications module and said second communications module if said application is uniquely identified by said data-communication specific data retrieved from said data-communication supporting information. 3. Method according to claim 1, wherein said method further comprises said first communications module randomly generating said data-communication supporting information including at least one randomly generated network connection parameter and data-communication specific data uniquely identifying said first application and said second application requiring a data-communication over said temporary network between said access point/first communications module and said second communications module. 4. Method according to claim 1, wherein said method further comprises said first communications module applying security settings in order to only allow access to said second application requiring said data-communication over said connection between said access point of said first communications module and said second communications module if said application is uniquely identified by said data-communication specific data retrieved from said data-communication supporting information. 5. Method according to claim 3, wherein said method further comprises releasing said temporary network and clearing said data-communication supporting information including said at least one randomly generated network connection parameter and data-communication specific data at termination of either said first or said second application. 6. Method according to claim 1, wherein said method further comprises disconnecting from said temporary network and clearing said retrieved data-communication supporting information including said at least one randomly generated network connection parameter and data-communication specific data at termination of either said first or said second application. 7. System for supporting data communication between a first communications module and a second communications module of said system, over communications link between said first communications module and said second communications module, wherein said system comprises: an access point in said first communications module adapted to set up a temporary network applying at least one network connection parameter in the setup of said connection; and information presenting means adapted to present data-communication supporting information, said data-communication supporting information comprising at least one network connection parameter and data-communication specific data; and information retrieving means, adapted to retrieve said data-communication supporting information presented from said presenting means; and connecting means, in said second communications module adapted to connect to said temporary network of said access point/first communications module applying said at least one network connection parameter retrieved from said data-communication supporting information; and application management means adapted to start a first application at said first communications module and a second application at said second communications module said first application and said second application requiring a data-communication over said temporary network between said access point first communications module and said second communications module said first and said second application being uniquely identified by said data-communication specific data. 8. A first communications module for use in a system for supporting data communication between said first communications module and a second communications module of said system, over a communications link between said first communications module and said second communications module, wherein said first communications module comprises: an access point adapted to set up a temporary network applying at least one network connection parameter in the setting up of said temporary network. 9. A first communications module according to claim 8 wherein said first communications module further comprises: an information presenting means adapted to present data-communication supporting information, said data-communication supporting information comprising at least one network connection parameter and data-communication specific data. 10. A first communications module according to claim 8 wherein said first communications module further comprises: means for randomly generating said data-communication supporting information including at least one randomly generated network connection parameter and data-communication specific data uniquely identifying said first application and said second application requiring a data-communication over said temporary network between said access point first communications module and said second communications module. 11. A first communications module according to claim 8, wherein said first communications module additionally comprises: security means adapted to apply security settings in order to only allow access to said first application requiring said data-communication over said connection between said access point first communications module and said second communications module if said application is uniquely identified by said data-communication specific data retrieved from said data-communication supporting information. 12. A second communications module for use in a system for supporting data communication between a first communications module and said second communications module of said system, effected over a communications link between said first communications module and said second communications module, wherein said second communications module comprises: an information retrieving means, adapted to retrieve data-communication supporting information presented, said data-communication supporting information comprising at least one network connection parameter and data-communication specific data; and connecting means adapted to connect to a temporary network of said first communications module applying said at least one network connection parameter retrieved from said data-communication supporting information; and application management means adapted to start a second application at said second communications module, said second application requiring a data-communication over said temporary network between said first communications module and said second communications module said second application being uniquely identified by said data-communication specific data. 13. A second communications module according to claim 12, wherein said second communications module further comprises security means adapted to apply security settings in order to only allow access to said first application requiring said data-communication over said connection between said first communications module and said second communications module if said application is uniquely identified by said data-communication specific data retrieved from said data-communication supporting information. 14. Communications device including a first communications module according to claim 8. 15. Communications device including a first communications module according to claim 12.
The present invention relates to a method for supporting data-communication between a first communications module and a second communications module over a communications link between the first communications module and the second communications module where this method comprises the steps of at a first communications module setting up a temporary network applying at least one network connection parameter in the setting up of the temporary network and presenting data-communication supporting information, where the data-communication supporting information comprises at least one network connection parameter and data-communication specific data. Subsequently, the second communications module retrieves the data-communication supporting information presented and the second communications module connects to the temporary network of the access point of the first communications module applying the at least one network connection parameter retrieved from the data-communication supporting information. The method also includes the step of starting a first application at the first communications module and a second application at the second communications module where the first and second application require a data-communication over the temporary network between the access point of the first communications module and the second communications module. The first and said second application being uniquely identified by the data-communication specific data.1. Method for supporting data-communication between a first communications module and a second communications module over a communications link between said first communications module and said second communications module, wherein said method comprises: said first communications module setting up a temporary network applying at least one network connection parameter in the setting up of said temporary network; and presenting data-communication supporting information, said data-communication supporting information comprising said at least one network connection parameter and data-communication specific data; and said second communications module retrieving said data-communication supporting information presented; and said second communications module connecting to said temporary network of said access point of said first communications module applying said at least one network connection parameter retrieved from said data-communication supporting information; and starting a first application at said first communications module and a second application at said second communications module said first and said second application requiring a data-communication over said temporary network between said access point first communications module and said second communications module said first and said second application being uniquely identified by said data-communication specific data. 2. Method according to claim 1, wherein said method further comprises said second communications module applying security settings in order to only allow access to said first application requiring said data-communication over said connection between said access point first communications module and said second communications module if said application is uniquely identified by said data-communication specific data retrieved from said data-communication supporting information. 3. Method according to claim 1, wherein said method further comprises said first communications module randomly generating said data-communication supporting information including at least one randomly generated network connection parameter and data-communication specific data uniquely identifying said first application and said second application requiring a data-communication over said temporary network between said access point/first communications module and said second communications module. 4. Method according to claim 1, wherein said method further comprises said first communications module applying security settings in order to only allow access to said second application requiring said data-communication over said connection between said access point of said first communications module and said second communications module if said application is uniquely identified by said data-communication specific data retrieved from said data-communication supporting information. 5. Method according to claim 3, wherein said method further comprises releasing said temporary network and clearing said data-communication supporting information including said at least one randomly generated network connection parameter and data-communication specific data at termination of either said first or said second application. 6. Method according to claim 1, wherein said method further comprises disconnecting from said temporary network and clearing said retrieved data-communication supporting information including said at least one randomly generated network connection parameter and data-communication specific data at termination of either said first or said second application. 7. System for supporting data communication between a first communications module and a second communications module of said system, over communications link between said first communications module and said second communications module, wherein said system comprises: an access point in said first communications module adapted to set up a temporary network applying at least one network connection parameter in the setup of said connection; and information presenting means adapted to present data-communication supporting information, said data-communication supporting information comprising at least one network connection parameter and data-communication specific data; and information retrieving means, adapted to retrieve said data-communication supporting information presented from said presenting means; and connecting means, in said second communications module adapted to connect to said temporary network of said access point/first communications module applying said at least one network connection parameter retrieved from said data-communication supporting information; and application management means adapted to start a first application at said first communications module and a second application at said second communications module said first application and said second application requiring a data-communication over said temporary network between said access point first communications module and said second communications module said first and said second application being uniquely identified by said data-communication specific data. 8. A first communications module for use in a system for supporting data communication between said first communications module and a second communications module of said system, over a communications link between said first communications module and said second communications module, wherein said first communications module comprises: an access point adapted to set up a temporary network applying at least one network connection parameter in the setting up of said temporary network. 9. A first communications module according to claim 8 wherein said first communications module further comprises: an information presenting means adapted to present data-communication supporting information, said data-communication supporting information comprising at least one network connection parameter and data-communication specific data. 10. A first communications module according to claim 8 wherein said first communications module further comprises: means for randomly generating said data-communication supporting information including at least one randomly generated network connection parameter and data-communication specific data uniquely identifying said first application and said second application requiring a data-communication over said temporary network between said access point first communications module and said second communications module. 11. A first communications module according to claim 8, wherein said first communications module additionally comprises: security means adapted to apply security settings in order to only allow access to said first application requiring said data-communication over said connection between said access point first communications module and said second communications module if said application is uniquely identified by said data-communication specific data retrieved from said data-communication supporting information. 12. A second communications module for use in a system for supporting data communication between a first communications module and said second communications module of said system, effected over a communications link between said first communications module and said second communications module, wherein said second communications module comprises: an information retrieving means, adapted to retrieve data-communication supporting information presented, said data-communication supporting information comprising at least one network connection parameter and data-communication specific data; and connecting means adapted to connect to a temporary network of said first communications module applying said at least one network connection parameter retrieved from said data-communication supporting information; and application management means adapted to start a second application at said second communications module, said second application requiring a data-communication over said temporary network between said first communications module and said second communications module said second application being uniquely identified by said data-communication specific data. 13. A second communications module according to claim 12, wherein said second communications module further comprises security means adapted to apply security settings in order to only allow access to said first application requiring said data-communication over said connection between said first communications module and said second communications module if said application is uniquely identified by said data-communication specific data retrieved from said data-communication supporting information. 14. Communications device including a first communications module according to claim 8. 15. Communications device including a first communications module according to claim 12.
2,400
7,398
7,398
14,717,190
2,425
Systems and methods provide presentation control of media content. An exemplary embodiment receives media content that is currently received in a broadcasted media, content stream; presents on a display a first presentation area, wherein the first presentation area presents a video portion of the media content; receives a user command that initiates a video presentation trick function; and presents in response to the user command a second presentation area, wherein the second presentation area presents the video portion of the media content in accordance with the video presentation trick function, and wherein the first presentation area and the second presentation area are concurrently presented on the display.
1. A method for presentation control of media content, the method comprising: receiving, at a media device, the media content that is currently received in a broadcasted media content stream; presenting, on a display, a first presentation area, wherein the first presentation area presents a video portion of the media content; receiving, at the media device, a user command that initiates a video presentation trick function; and presenting, on the display and in response to the user command, a second presentation area, wherein the second presentation area presents the video portion of the media content in accordance with the video presentation trick function, wherein the first presentation area and the second presentation area are concurrently presented on the display. 2. The method of claim 1, wherein the first presentation area continues to present the video portion of the media content at its normal presentation speed while the second presentation area presents the video portion of the media content in accordance with the video presentation trick function. 3. The method of claim 1, wherein the first presentation area pauses presentation of the video portion of the media content while the second presentation area presents the video portion of the media content in accordance with the video presentation trick function. 4. The method of claim 1, wherein the video presentation trick function is a first video presentation trick function initiated in response to receiving a first user command, the method further comprising: receiving a second user command that ends the first video presentation trick function; receiving a third user command that initiates a second video presentation trick function; and continuing presentation in the second presentation area the video portion of the media content in accordance with the second video presentation trick function. 5. The method of claim 1, wherein the user command is a first user command, the method further comprising: receiving a second user command that initiates a video image toggle function, wherein the video portion of the media content presented in accordance with the video presentation trick function is moved from the second presentation area to presentation in the first presentation area, and wherein the video portion of the media content is concurrently moved from the first presentation area to presentation in the second presentation area. 6. The method of claim 1, wherein the user command is a first user command, the method further comprising: receiving a second user command that ends an operation of the video presentation trick function, wherein the video portion of the media content being presented in the second presentation area is then presented at its normal speed after the operation of the video presentation trick function ends. 7. The method of claim 6, further comprising: receiving a third user command that initiates an audio toggle function, muting a first audio portion of the media content previously presented in synchronism with the video portion of the media content presented in the first presentation area in response to the third user command, and audibly presenting a second audio portion of the media content corresponding to the video content being presented in the second presentation area in response to the third user command. 8. The method of claim 1, wherein the user command is a first user command, the method further comprising: receiving a second user command that selects the second presentation area, moving presentation of the video portion of the media content presented in accordance with the video presentation trick function from the second presentation area to presentation in the first presentation area in response to the second user command, and ending presentation of the second presentation area in response to the second user command. 9. The method of claim 8, after receiving the second user command, the method further comprising: receiving a third user command that ends an operation of the video presentation trick function, presenting the video portion of the media content being presented in the first presentation area at its normal speed after the operation of the video presentation trick function ends. 10. The method of claim 1, wherein receiving the media content that is currently received in the broadcasted media content stream comprises: processing the received media content; and storing the processed media content in a program buffer, wherein presenting the video portion of the media content in the first presentation area comprises: accessing, using a first decoder, the video portion of the media content presented in the first presentation area from the program buffer, and wherein presenting the video portion of the media content in the first presentation area comprises: accessing, using a second decoder, the video portion of the media content presented in the second presentation area from the program buffer. 11. A media device, comprising: a tuner, wherein the tuner is operable to receive a stream of broadcasted media content; a program buffer, wherein the program buffer is operable to store the received media content, wherein the program buffer is further operable to stream out the received media content in a continuous uninterrupted stream to a media content presentation system, and wherein the media content presentation system is operable to present video content portions of the media content on a display and present audio portions of the media content from at least one sound reproducing device; and a processor system communicatively coupled to the tuner and the program buffer, wherein the processor system is operable to: generate a first presentation area, wherein the first presentation area presents a first video portion of the media content on the display; receive a user command that initiates a video presentation trick function; modify the video portion of the media content in accordance with the video presentation trick function in response to the user command; and generate a second presentation area, wherein the second presentation area presents the video portion of the media content in accordance with the video presentation trick function in response to the user command, wherein the first presentation area and the second presentation area are concurrently presented on the display. 12. The media device of claim 11, further comprising: a first decoder that is operable to continue presentation of the video portion of the media content at its normal presentation speed in the first presentation area; and a second decoder that is operable to present the media content in accordance with the video presentation trick function in the second presentation area. 13. The media device of claim 12, wherein the first decoder is operable to pause presentation of the video portion of the media content in the first presentation area while the second decoder presents the video portion of the media content in accordance with the video presentation trick function in the second presentation area. 14. The media device of claim 12, wherein the video presentation trick function is a first video presentation trick function initiated in response to receiving a first user command, wherein the processor system is further operable to receive a second user command that ends an operation of the first video presentation trick function; wherein the processor system is further operable to receive a third user command that initiates a second video presentation trick function, wherein the second decoder then presents the video portion of the media content in accordance with the second video presentation trick function in the second presentation area, and wherein the first decoder continues presentation of the video portion of the media content in the first presentation area. 15. The media device of claim 12, wherein the video presentation trick function is a first video presentation trick function initiated in response to receiving a first user command, wherein the processor system is further operable to receive a second user command that ends an operation of the first video presentation trick function; wherein the processor system is further operable to receive a third user command that initiates a second video presentation trick function, wherein the second decoder then presents the video portion of the media content in accordance with the second video presentation trick function in the first presentation area, and wherein the first decoder continues presentation of the video portion of the media content in the second presentation area. 16. The media device of claim 11, wherein the video presentation trick function is a first video presentation trick function initiated in response to receiving a first user command, wherein the processor system is further operable to receive a second user command that initiates a video image toggle function, wherein the video portion of the media content presented in accordance with the video presentation trick function is moved from the second presentation area to presentation in the first presentation area in response to the second user command, and wherein the video portion of the media content is concurrently moved from the first presentation area to presentation in the second presentation area in response to the second user command. 17. The media device of claim 11, wherein the video presentation trick function is a first video presentation trick function initiated in response to receiving a first user command, wherein the processor system is further operable to receive a second user command that initiates an audio toggle function, wherein a first audio portion of the media content previously presented in synchronism with the video portion of the media content presented in the first presentation area is muted in response to the second user command, and wherein a second audio portion of the media content corresponding to the video content being presented in the second presentation area is audibly presented in response to the second user command. 18.-20. (canceled)
Systems and methods provide presentation control of media content. An exemplary embodiment receives media content that is currently received in a broadcasted media, content stream; presents on a display a first presentation area, wherein the first presentation area presents a video portion of the media content; receives a user command that initiates a video presentation trick function; and presents in response to the user command a second presentation area, wherein the second presentation area presents the video portion of the media content in accordance with the video presentation trick function, and wherein the first presentation area and the second presentation area are concurrently presented on the display.1. A method for presentation control of media content, the method comprising: receiving, at a media device, the media content that is currently received in a broadcasted media content stream; presenting, on a display, a first presentation area, wherein the first presentation area presents a video portion of the media content; receiving, at the media device, a user command that initiates a video presentation trick function; and presenting, on the display and in response to the user command, a second presentation area, wherein the second presentation area presents the video portion of the media content in accordance with the video presentation trick function, wherein the first presentation area and the second presentation area are concurrently presented on the display. 2. The method of claim 1, wherein the first presentation area continues to present the video portion of the media content at its normal presentation speed while the second presentation area presents the video portion of the media content in accordance with the video presentation trick function. 3. The method of claim 1, wherein the first presentation area pauses presentation of the video portion of the media content while the second presentation area presents the video portion of the media content in accordance with the video presentation trick function. 4. The method of claim 1, wherein the video presentation trick function is a first video presentation trick function initiated in response to receiving a first user command, the method further comprising: receiving a second user command that ends the first video presentation trick function; receiving a third user command that initiates a second video presentation trick function; and continuing presentation in the second presentation area the video portion of the media content in accordance with the second video presentation trick function. 5. The method of claim 1, wherein the user command is a first user command, the method further comprising: receiving a second user command that initiates a video image toggle function, wherein the video portion of the media content presented in accordance with the video presentation trick function is moved from the second presentation area to presentation in the first presentation area, and wherein the video portion of the media content is concurrently moved from the first presentation area to presentation in the second presentation area. 6. The method of claim 1, wherein the user command is a first user command, the method further comprising: receiving a second user command that ends an operation of the video presentation trick function, wherein the video portion of the media content being presented in the second presentation area is then presented at its normal speed after the operation of the video presentation trick function ends. 7. The method of claim 6, further comprising: receiving a third user command that initiates an audio toggle function, muting a first audio portion of the media content previously presented in synchronism with the video portion of the media content presented in the first presentation area in response to the third user command, and audibly presenting a second audio portion of the media content corresponding to the video content being presented in the second presentation area in response to the third user command. 8. The method of claim 1, wherein the user command is a first user command, the method further comprising: receiving a second user command that selects the second presentation area, moving presentation of the video portion of the media content presented in accordance with the video presentation trick function from the second presentation area to presentation in the first presentation area in response to the second user command, and ending presentation of the second presentation area in response to the second user command. 9. The method of claim 8, after receiving the second user command, the method further comprising: receiving a third user command that ends an operation of the video presentation trick function, presenting the video portion of the media content being presented in the first presentation area at its normal speed after the operation of the video presentation trick function ends. 10. The method of claim 1, wherein receiving the media content that is currently received in the broadcasted media content stream comprises: processing the received media content; and storing the processed media content in a program buffer, wherein presenting the video portion of the media content in the first presentation area comprises: accessing, using a first decoder, the video portion of the media content presented in the first presentation area from the program buffer, and wherein presenting the video portion of the media content in the first presentation area comprises: accessing, using a second decoder, the video portion of the media content presented in the second presentation area from the program buffer. 11. A media device, comprising: a tuner, wherein the tuner is operable to receive a stream of broadcasted media content; a program buffer, wherein the program buffer is operable to store the received media content, wherein the program buffer is further operable to stream out the received media content in a continuous uninterrupted stream to a media content presentation system, and wherein the media content presentation system is operable to present video content portions of the media content on a display and present audio portions of the media content from at least one sound reproducing device; and a processor system communicatively coupled to the tuner and the program buffer, wherein the processor system is operable to: generate a first presentation area, wherein the first presentation area presents a first video portion of the media content on the display; receive a user command that initiates a video presentation trick function; modify the video portion of the media content in accordance with the video presentation trick function in response to the user command; and generate a second presentation area, wherein the second presentation area presents the video portion of the media content in accordance with the video presentation trick function in response to the user command, wherein the first presentation area and the second presentation area are concurrently presented on the display. 12. The media device of claim 11, further comprising: a first decoder that is operable to continue presentation of the video portion of the media content at its normal presentation speed in the first presentation area; and a second decoder that is operable to present the media content in accordance with the video presentation trick function in the second presentation area. 13. The media device of claim 12, wherein the first decoder is operable to pause presentation of the video portion of the media content in the first presentation area while the second decoder presents the video portion of the media content in accordance with the video presentation trick function in the second presentation area. 14. The media device of claim 12, wherein the video presentation trick function is a first video presentation trick function initiated in response to receiving a first user command, wherein the processor system is further operable to receive a second user command that ends an operation of the first video presentation trick function; wherein the processor system is further operable to receive a third user command that initiates a second video presentation trick function, wherein the second decoder then presents the video portion of the media content in accordance with the second video presentation trick function in the second presentation area, and wherein the first decoder continues presentation of the video portion of the media content in the first presentation area. 15. The media device of claim 12, wherein the video presentation trick function is a first video presentation trick function initiated in response to receiving a first user command, wherein the processor system is further operable to receive a second user command that ends an operation of the first video presentation trick function; wherein the processor system is further operable to receive a third user command that initiates a second video presentation trick function, wherein the second decoder then presents the video portion of the media content in accordance with the second video presentation trick function in the first presentation area, and wherein the first decoder continues presentation of the video portion of the media content in the second presentation area. 16. The media device of claim 11, wherein the video presentation trick function is a first video presentation trick function initiated in response to receiving a first user command, wherein the processor system is further operable to receive a second user command that initiates a video image toggle function, wherein the video portion of the media content presented in accordance with the video presentation trick function is moved from the second presentation area to presentation in the first presentation area in response to the second user command, and wherein the video portion of the media content is concurrently moved from the first presentation area to presentation in the second presentation area in response to the second user command. 17. The media device of claim 11, wherein the video presentation trick function is a first video presentation trick function initiated in response to receiving a first user command, wherein the processor system is further operable to receive a second user command that initiates an audio toggle function, wherein a first audio portion of the media content previously presented in synchronism with the video portion of the media content presented in the first presentation area is muted in response to the second user command, and wherein a second audio portion of the media content corresponding to the video content being presented in the second presentation area is audibly presented in response to the second user command. 18.-20. (canceled)
2,400
7,399
7,399
13,715,466
2,448
A device supporting content delivery is configured to run at least one content delivery (CD) service of a plurality of CD services. The plurality of CD services include adaptation services with feedback from health services.
1. A device, operable in a system comprising a plurality of computers, each computer comprising hardware including memory and at least one processor, each computer configured to run at least two content delivery (CD) services of a plurality of CD services, wherein said CD services include: adaptation services, collector services, and control services, and wherein at least some of said plurality of computers run control services, and at least some of said computers run collector services, said device comprising hardware including memory and at least one processor and: (a) a first CD service, said service being configured: (a)(1) to monitor aspects of the device; and (a)(2) to generate first information relating to monitored aspects of the device; and (a)(2) to provide at least some of said first information to at least one other CD service; and (b) a second CD service, said second CD service being configured to control CD services on said device in response to service configuration information obtained by said second service at said device from said control services, wherein said second service controls said CD services on said device based on service configuration information obtained by said second service, wherein said service configuration information is based on said first information provided by said service in (a)(2) relating to monitored aspects of the device. 2. The device of claim 1 wherein said CD services further include reducer services, wherein at least some of said computers run reducer services, said at least some of said computers running reducer services comprise a reducer services network; and wherein at least some of said reducer services in said reducer services network provide event output to at least some collector services, said event output being based on event output from said at least some of said CD services, and wherein said at least one other service to which event output is provided comprises at least one reducer service from said reducer services network. 3. The device of claim 1 wherein the second service is an adaptation service. 4. The device of claim 3 wherein said adaptation service is provisioned on said device in an out-of-band process. 5. The device of claim 1 wherein the service configuration information obtained from the control services is generated by said control services. 6. The device of claim 1 wherein said service configuration information is based on (i) said first information provided by said service in (a)(2); and (ii) at least some event output from at least one other CD service in said system other than said service. 7. The device of claim 6 wherein said at least one other CD service in said system that produced said at least some event output includes another CD service running on said device. 8. The device of claim 7 wherein said other CD service running on said device is selected from: rendezvous services, collector services, reducer services, control services, and delivery services. 9. The device of claim 6 wherein said at least one other CD service in said system that produced said at least some event output includes another CD service running on another device distinct from said device. 10. The device of claim 8 wherein said other CD service running on said another device is a second CD service that monitors operational health of the other device. 11. The device of claim 1 wherein each CD service may be in to various of a plurality of operating states, and wherein the second service on a particular device is configured to monitor an operating state of each CD service on said particular device. 12. The device of claim 11 wherein the second CD service monitors an operating state of the first CD service using information in the service configuration information. 13. The device of claim 11 wherein the second CD service on the device obtains operating state information about a CD service on said device using information obtained from the control services. 14. The device of claim 13 wherein the control services determine the operating state of the first CD service using said first information generated by the first CD service and provided to at least one of the collector services. 15. The device of claim 11 wherein the second service is configured to instruct a CD service on said device to be in a specific operating state. 16. The device of claim 15 wherein the second service instructs the first CD service on said device to be in a specific operating state based on said service configuration information obtained by said second service from the control services. 17. The device of claim 16 wherein, the second service causes the first CD service to terminate. 18. The device of claim 1 wherein said second service is further configured: (b)(1) to generate second information relating to operation of said second service; and (b)(2) to provide at least some of said second information to a second at least one collector service. 19. The device of claim 1 wherein the second CD service is selected from: rendezvous services, collector services, reducer services, control services, and delivery services. 20. A computer-implemented method, operable in a system comprising a plurality of computers, each computer comprising hardware including memory and at least one processor, each computer configured to run at least two content delivery (CD) services of a plurality of CD services, wherein said CD services include: adaptation services, collector services, and control services, and wherein at least some of said plurality of computers run control services, and wherein at least some of said computers run collector services, the method comprising, on a particular computer of said plurality of computers, and using hardware, including memory and at least one processor, of said particular computer: (a) by a first CD service on said particular computer: (a)(1) monitoring aspects of the particular computer; (a)(2) generating first information relating to monitored aspects of the particular computer; and (a)(3) providing at least some of said first information to at least one other CD service; and (b) by a second CD service on said particular computer: (b)(1) obtaining service configuration information from said control services; (b)(2) controlling CD services on said device based on said service configuration information, wherein said second service controls said service based on service configuration information obtained by said second service, wherein said service configuration information is based on said first information provided by said service in (a)(2) relating to monitored aspects of the particular computer. 21. The method of claim 20 wherein said CD services further include reducer services, wherein at least some of said computers run reducer services, said at least some of said computers running reducer services comprise a reducer services network; and wherein at least some of said reducer services in said reducer services network provide event output to at least some collector services, said event output being based on event output from said at least some of said CD services, and wherein said at least one other service to which event output is provided comprises at least one reducer service from said reducer services network. 22. The method of claim 20 wherein the second service is an adaptation service. 23. The method of claim 20 wherein said second service is provisioned on said particular computer in an out-of-band process. 24. The method of claim 20 wherein the service configuration information obtained from the control services is generated by said control services. 25. The method of claim 20 wherein said service configuration information is based on (i) said first information provided by said service in (a)(2); and (ii) at least some event output from at least one other CD service in said system other than said service. 26. The method of claim 25 wherein said at least one other CD service in said system that produced said at least some event output includes another CD service running on said particular computer. 27. The method of claim 26 wherein said other CD service running on said particular computer is a CD service selected from: rendezvous services, collector services, reducer services, control services, and delivery services. 28. The method of claim 25 wherein said at least one other CD service in said system that produced said at least some event output includes another CD service running on another computer distinct from said particular computer. 29. The method of claim 28 wherein said other CD service running on said another computer is a second CD service that monitors operational health of the other computer. 30. The method of claim 20 wherein each CD service may be in various of a plurality of operating states, and wherein the method further comprises, the second service on the particular computer: monitoring an operating state of each CD service on said particular computer. 31. The method of claim 30 wherein the second CD service monitors an operating state of the first CD service using information in the service configuration information. 32. The method of claim 30 wherein the second CD service on the particular computer obtains operating state information about a CD service on said particular computer using information obtained in (b)(1) from the control services. 33. The method of claim 32 wherein the control services determined the operating state of the first CD service using said first information generated by the first CD service and provided to at least one of the collector services. 34. The method of claim 30 further comprising, by the second service: instructing a CD service on said particular computer to be in a specific operating state. 35. The method of claim 34 wherein the second service instructs the first CD service on said particular computer to be in a specific operating state based on said service configuration information obtained by said second service from the control services. 36. The method of claim 35 wherein, the second service causes the first CD service to terminate. 37. The method of claim 20 further comprising, by the second service: (b)(3) generating second information relating to operation of said second service; and (b)(4) providing at least some of said second information to a second at least one collector service. 38. A computer program product having computer readable instructions stored on non-transitory computer readable media, the computer readable instructions including instructions for implementing a computer-implemented method, said method operable in a system comprising a plurality of computers, each computer comprising hardware including memory and at least one processor, each computer configured to run at least two content delivery (CD) services of a plurality of CD services, wherein said CD services include: adaptation services and control services, and wherein at least some of said plurality of computers run control services, and wherein at least some of said computers run collector services, the method comprising, on a particular computer of said plurality of computers, and using hardware, including memory and at least one processor, of said particular computer: (a) by a first CD service on said particular computer: (a)(1) monitoring aspects of the particular computer; (a)(2) generating first information relating to monitored aspects of the particular computer; and (a)(3) providing at least some of said first information to at least one other CD service; and (b) by a second CD service on said particular computer: (b)(1) obtaining service configuration information from said control services; (b)(2) controlling CD services on said device based on said service configuration information, wherein said second service controls said service based on service configuration information obtained by said second service, wherein said service configuration information is based on said first information provided by said service in (a)(2) relating to monitored aspects of the particular computer. 39. The computer program product of claim 38 wherein said CD services further include reducer services, wherein at least some of said computers run reducer services, said at least some of said computers running reducer services comprise a reducer services network; and wherein at least some of said reducer services in said reducer services network provide event output to at least some collector services, said event output being based on event output from said at least some of said CD services, and wherein said at least one other service to which event output is provided comprises at least one reducer service from said reducer services network.
A device supporting content delivery is configured to run at least one content delivery (CD) service of a plurality of CD services. The plurality of CD services include adaptation services with feedback from health services.1. A device, operable in a system comprising a plurality of computers, each computer comprising hardware including memory and at least one processor, each computer configured to run at least two content delivery (CD) services of a plurality of CD services, wherein said CD services include: adaptation services, collector services, and control services, and wherein at least some of said plurality of computers run control services, and at least some of said computers run collector services, said device comprising hardware including memory and at least one processor and: (a) a first CD service, said service being configured: (a)(1) to monitor aspects of the device; and (a)(2) to generate first information relating to monitored aspects of the device; and (a)(2) to provide at least some of said first information to at least one other CD service; and (b) a second CD service, said second CD service being configured to control CD services on said device in response to service configuration information obtained by said second service at said device from said control services, wherein said second service controls said CD services on said device based on service configuration information obtained by said second service, wherein said service configuration information is based on said first information provided by said service in (a)(2) relating to monitored aspects of the device. 2. The device of claim 1 wherein said CD services further include reducer services, wherein at least some of said computers run reducer services, said at least some of said computers running reducer services comprise a reducer services network; and wherein at least some of said reducer services in said reducer services network provide event output to at least some collector services, said event output being based on event output from said at least some of said CD services, and wherein said at least one other service to which event output is provided comprises at least one reducer service from said reducer services network. 3. The device of claim 1 wherein the second service is an adaptation service. 4. The device of claim 3 wherein said adaptation service is provisioned on said device in an out-of-band process. 5. The device of claim 1 wherein the service configuration information obtained from the control services is generated by said control services. 6. The device of claim 1 wherein said service configuration information is based on (i) said first information provided by said service in (a)(2); and (ii) at least some event output from at least one other CD service in said system other than said service. 7. The device of claim 6 wherein said at least one other CD service in said system that produced said at least some event output includes another CD service running on said device. 8. The device of claim 7 wherein said other CD service running on said device is selected from: rendezvous services, collector services, reducer services, control services, and delivery services. 9. The device of claim 6 wherein said at least one other CD service in said system that produced said at least some event output includes another CD service running on another device distinct from said device. 10. The device of claim 8 wherein said other CD service running on said another device is a second CD service that monitors operational health of the other device. 11. The device of claim 1 wherein each CD service may be in to various of a plurality of operating states, and wherein the second service on a particular device is configured to monitor an operating state of each CD service on said particular device. 12. The device of claim 11 wherein the second CD service monitors an operating state of the first CD service using information in the service configuration information. 13. The device of claim 11 wherein the second CD service on the device obtains operating state information about a CD service on said device using information obtained from the control services. 14. The device of claim 13 wherein the control services determine the operating state of the first CD service using said first information generated by the first CD service and provided to at least one of the collector services. 15. The device of claim 11 wherein the second service is configured to instruct a CD service on said device to be in a specific operating state. 16. The device of claim 15 wherein the second service instructs the first CD service on said device to be in a specific operating state based on said service configuration information obtained by said second service from the control services. 17. The device of claim 16 wherein, the second service causes the first CD service to terminate. 18. The device of claim 1 wherein said second service is further configured: (b)(1) to generate second information relating to operation of said second service; and (b)(2) to provide at least some of said second information to a second at least one collector service. 19. The device of claim 1 wherein the second CD service is selected from: rendezvous services, collector services, reducer services, control services, and delivery services. 20. A computer-implemented method, operable in a system comprising a plurality of computers, each computer comprising hardware including memory and at least one processor, each computer configured to run at least two content delivery (CD) services of a plurality of CD services, wherein said CD services include: adaptation services, collector services, and control services, and wherein at least some of said plurality of computers run control services, and wherein at least some of said computers run collector services, the method comprising, on a particular computer of said plurality of computers, and using hardware, including memory and at least one processor, of said particular computer: (a) by a first CD service on said particular computer: (a)(1) monitoring aspects of the particular computer; (a)(2) generating first information relating to monitored aspects of the particular computer; and (a)(3) providing at least some of said first information to at least one other CD service; and (b) by a second CD service on said particular computer: (b)(1) obtaining service configuration information from said control services; (b)(2) controlling CD services on said device based on said service configuration information, wherein said second service controls said service based on service configuration information obtained by said second service, wherein said service configuration information is based on said first information provided by said service in (a)(2) relating to monitored aspects of the particular computer. 21. The method of claim 20 wherein said CD services further include reducer services, wherein at least some of said computers run reducer services, said at least some of said computers running reducer services comprise a reducer services network; and wherein at least some of said reducer services in said reducer services network provide event output to at least some collector services, said event output being based on event output from said at least some of said CD services, and wherein said at least one other service to which event output is provided comprises at least one reducer service from said reducer services network. 22. The method of claim 20 wherein the second service is an adaptation service. 23. The method of claim 20 wherein said second service is provisioned on said particular computer in an out-of-band process. 24. The method of claim 20 wherein the service configuration information obtained from the control services is generated by said control services. 25. The method of claim 20 wherein said service configuration information is based on (i) said first information provided by said service in (a)(2); and (ii) at least some event output from at least one other CD service in said system other than said service. 26. The method of claim 25 wherein said at least one other CD service in said system that produced said at least some event output includes another CD service running on said particular computer. 27. The method of claim 26 wherein said other CD service running on said particular computer is a CD service selected from: rendezvous services, collector services, reducer services, control services, and delivery services. 28. The method of claim 25 wherein said at least one other CD service in said system that produced said at least some event output includes another CD service running on another computer distinct from said particular computer. 29. The method of claim 28 wherein said other CD service running on said another computer is a second CD service that monitors operational health of the other computer. 30. The method of claim 20 wherein each CD service may be in various of a plurality of operating states, and wherein the method further comprises, the second service on the particular computer: monitoring an operating state of each CD service on said particular computer. 31. The method of claim 30 wherein the second CD service monitors an operating state of the first CD service using information in the service configuration information. 32. The method of claim 30 wherein the second CD service on the particular computer obtains operating state information about a CD service on said particular computer using information obtained in (b)(1) from the control services. 33. The method of claim 32 wherein the control services determined the operating state of the first CD service using said first information generated by the first CD service and provided to at least one of the collector services. 34. The method of claim 30 further comprising, by the second service: instructing a CD service on said particular computer to be in a specific operating state. 35. The method of claim 34 wherein the second service instructs the first CD service on said particular computer to be in a specific operating state based on said service configuration information obtained by said second service from the control services. 36. The method of claim 35 wherein, the second service causes the first CD service to terminate. 37. The method of claim 20 further comprising, by the second service: (b)(3) generating second information relating to operation of said second service; and (b)(4) providing at least some of said second information to a second at least one collector service. 38. A computer program product having computer readable instructions stored on non-transitory computer readable media, the computer readable instructions including instructions for implementing a computer-implemented method, said method operable in a system comprising a plurality of computers, each computer comprising hardware including memory and at least one processor, each computer configured to run at least two content delivery (CD) services of a plurality of CD services, wherein said CD services include: adaptation services and control services, and wherein at least some of said plurality of computers run control services, and wherein at least some of said computers run collector services, the method comprising, on a particular computer of said plurality of computers, and using hardware, including memory and at least one processor, of said particular computer: (a) by a first CD service on said particular computer: (a)(1) monitoring aspects of the particular computer; (a)(2) generating first information relating to monitored aspects of the particular computer; and (a)(3) providing at least some of said first information to at least one other CD service; and (b) by a second CD service on said particular computer: (b)(1) obtaining service configuration information from said control services; (b)(2) controlling CD services on said device based on said service configuration information, wherein said second service controls said service based on service configuration information obtained by said second service, wherein said service configuration information is based on said first information provided by said service in (a)(2) relating to monitored aspects of the particular computer. 39. The computer program product of claim 38 wherein said CD services further include reducer services, wherein at least some of said computers run reducer services, said at least some of said computers running reducer services comprise a reducer services network; and wherein at least some of said reducer services in said reducer services network provide event output to at least some collector services, said event output being based on event output from said at least some of said CD services, and wherein said at least one other service to which event output is provided comprises at least one reducer service from said reducer services network.
2,400