Unnamed: 0 int64 0 350k | level_0 int64 0 351k | ApplicationNumber int64 9.75M 96.1M | ArtUnit int64 1.6k 3.99k | Abstract stringlengths 1 8.37k | Claims stringlengths 3 292k | abstract-claims stringlengths 68 293k | TechCenter int64 1.6k 3.9k |
|---|---|---|---|---|---|---|---|
7,700 | 7,700 | 15,786,121 | 2,421 | Described are methods, systems, and apparatus, including computer program products for packaging media. In some embodiments, the technology relates to a computer-implemented method of packaging media files. A list of one or more media asset IDs is received by a media packaging server. A packaging template is received by the media packaging server. One or more media files based on a media asset ID in the list of the one or more media asset IDs and the packaging template are retrieved, by the media packaging server. Metadata associated with the media asset ID based on the packaging template is retrieved by the media packaging server. The one or more media files and the metadata are packaged by the media packaging server into a delivery package in a packaging format indicated by the packaging template. | 1-25. (canceled) 26. A computer-implemented method of packaging media files comprising:
transmitting, by a client device, a request from a user to a media packaging server, the request including a packaging template and a media asset ID identifying a media file requested by the user of the client device, the packaging template identifying user-requested metadata associated with the media asset ID and a user-requested format for the media file and metadata requested by the user of the client device; receiving, by the client device, a delivery package from the media packaging server, the delivery package including a media file and metadata matching the media asset ID and metadata in the request in the format indicated in the packaging template; and extracting, by the client device, the media file and metadata from the delivery package based upon the format indicated in the packaging template. 27. The method of claim 26, further comprising:
transmitting, by the client device, a further request to the media packaging server, the further request including a further packaging template and a further media asset ID identifying a further media file requested by the user of the client device, the further packaging template identifying further user-requested metadata associated with the further media asset ID and a further user-requested format for the further media file and metadata requested by the user of the client device; further receiving, by the client device, a further delivery package from the media packaging server, the further delivery package including the further media file and metadata matching the further media asset ID and metadata in the request in the further format indicated in the packaging template; and extracting, by the client device, the further media file and metadata from the further delivery package based upon the further user-requested format indicated in the further packaging template. 28. The method of claim 26, wherein the media file is reformatted by the media packaging server from a first format to a second format, the second format being the format indicated in the packaging template. 29. The method of claim 26, wherein the media file is reformatted by transcoding the media file into the format indicated by the packaging template. 30. The method of claim 26, further comprising:
including, by the client device, a requested network for the reception of the delivery package, wherein the delivery package is received via the requested network. 31. The method of claim 26, wherein the packaging template is generating using one of XML, plain text, and binary. 32. The method of claim 26, wherein the media file is a video and the packaging template indicates a resolution, a dialogue track language, and a subtitle language. 33. The method of claim 26, wherein the metadata comprises at least one of format information, runtime information, subtitle information, and closed-caption information associated with the media file. 34. The method of claim 26, further comprising:
including, by the client device, a requested non-transient storage medium for storing the delivery package prior to receiving the delivery package. 35. The method of claim 26, further comprising:
including, by the client device, a user-requested compression format for compressing the delivery package. 36. The method of claim 26, further comprising:
including, by the client device, a user-requested encryption format for encrypting the delivery package. 37. A computer program product, tangibly embodied in a non-volatile computer-readable storage medium, for packaging media files, the computer program product including instructions being operable to cause a data processing apparatus to:
transmit a request from a client device of a user to a media packaging server, the request including a packaging template and a media asset ID identifying a media file requested by the user of the client device, the packaging template identifying user-requested metadata associated with the media asset ID and a user-requested format for the media file and metadata requested by the user of the client device; receive a delivery package from the media packaging server, the delivery package including a media file and metadata matching the media asset ID and metadata in the request in the format indicated in the packaging template; and extract the media file and metadata from the delivery package based upon the format indicated in the packaging template. 38. The computer program product of claim 37, further including instructions being operable to cause the data processing apparatus to:
transmit a further request to the media packaging server, the further request including a further packaging template and a further media asset ID identifying a further media file requested by the user of the client device, the further packaging template identifying further user-requested metadata associated with the further media asset ID and a further user-requested format for the further media file and metadata requested by the user of the client device; further receive a further delivery package from the media packaging server, the further delivery package including the further media file and metadata matching the further media asset ID and metadata in the request in the further format indicated in the packaging template; and extract the further media file and metadata from the further delivery package based upon the further format indicated in the further packaging template. 39. The computer program product of claim 37, wherein the media file is reformatted by the media packaging server from a first format to a second format, the second format being the format indicated in the packaging template. 40. The computer program product of claim 37, wherein the media file is reformatted by transcoding the media file into the format indicated by the packaging template. 41. The computer program product of claim 37, further including instructions being operable to cause the data processing apparatus to:
include a requested network for the reception of the delivery package, wherein the delivery package is received via the requested network. 42. The computer program product of claim 37, further including instructions being operable to cause the data processing apparatus to:
include a requested non-transient storage medium for storing the delivery package prior to receiving the delivery package. 43. The computer program product of claim 37, further including instructions being operable to cause the data processing apparatus to:
include a requested compression format for compressing the delivery package. 44. The computer program product of claim 37, further including instructions being operable to cause the data processing apparatus to:
include a requested encryption format for encrypting the delivery package. | Described are methods, systems, and apparatus, including computer program products for packaging media. In some embodiments, the technology relates to a computer-implemented method of packaging media files. A list of one or more media asset IDs is received by a media packaging server. A packaging template is received by the media packaging server. One or more media files based on a media asset ID in the list of the one or more media asset IDs and the packaging template are retrieved, by the media packaging server. Metadata associated with the media asset ID based on the packaging template is retrieved by the media packaging server. The one or more media files and the metadata are packaged by the media packaging server into a delivery package in a packaging format indicated by the packaging template.1-25. (canceled) 26. A computer-implemented method of packaging media files comprising:
transmitting, by a client device, a request from a user to a media packaging server, the request including a packaging template and a media asset ID identifying a media file requested by the user of the client device, the packaging template identifying user-requested metadata associated with the media asset ID and a user-requested format for the media file and metadata requested by the user of the client device; receiving, by the client device, a delivery package from the media packaging server, the delivery package including a media file and metadata matching the media asset ID and metadata in the request in the format indicated in the packaging template; and extracting, by the client device, the media file and metadata from the delivery package based upon the format indicated in the packaging template. 27. The method of claim 26, further comprising:
transmitting, by the client device, a further request to the media packaging server, the further request including a further packaging template and a further media asset ID identifying a further media file requested by the user of the client device, the further packaging template identifying further user-requested metadata associated with the further media asset ID and a further user-requested format for the further media file and metadata requested by the user of the client device; further receiving, by the client device, a further delivery package from the media packaging server, the further delivery package including the further media file and metadata matching the further media asset ID and metadata in the request in the further format indicated in the packaging template; and extracting, by the client device, the further media file and metadata from the further delivery package based upon the further user-requested format indicated in the further packaging template. 28. The method of claim 26, wherein the media file is reformatted by the media packaging server from a first format to a second format, the second format being the format indicated in the packaging template. 29. The method of claim 26, wherein the media file is reformatted by transcoding the media file into the format indicated by the packaging template. 30. The method of claim 26, further comprising:
including, by the client device, a requested network for the reception of the delivery package, wherein the delivery package is received via the requested network. 31. The method of claim 26, wherein the packaging template is generating using one of XML, plain text, and binary. 32. The method of claim 26, wherein the media file is a video and the packaging template indicates a resolution, a dialogue track language, and a subtitle language. 33. The method of claim 26, wherein the metadata comprises at least one of format information, runtime information, subtitle information, and closed-caption information associated with the media file. 34. The method of claim 26, further comprising:
including, by the client device, a requested non-transient storage medium for storing the delivery package prior to receiving the delivery package. 35. The method of claim 26, further comprising:
including, by the client device, a user-requested compression format for compressing the delivery package. 36. The method of claim 26, further comprising:
including, by the client device, a user-requested encryption format for encrypting the delivery package. 37. A computer program product, tangibly embodied in a non-volatile computer-readable storage medium, for packaging media files, the computer program product including instructions being operable to cause a data processing apparatus to:
transmit a request from a client device of a user to a media packaging server, the request including a packaging template and a media asset ID identifying a media file requested by the user of the client device, the packaging template identifying user-requested metadata associated with the media asset ID and a user-requested format for the media file and metadata requested by the user of the client device; receive a delivery package from the media packaging server, the delivery package including a media file and metadata matching the media asset ID and metadata in the request in the format indicated in the packaging template; and extract the media file and metadata from the delivery package based upon the format indicated in the packaging template. 38. The computer program product of claim 37, further including instructions being operable to cause the data processing apparatus to:
transmit a further request to the media packaging server, the further request including a further packaging template and a further media asset ID identifying a further media file requested by the user of the client device, the further packaging template identifying further user-requested metadata associated with the further media asset ID and a further user-requested format for the further media file and metadata requested by the user of the client device; further receive a further delivery package from the media packaging server, the further delivery package including the further media file and metadata matching the further media asset ID and metadata in the request in the further format indicated in the packaging template; and extract the further media file and metadata from the further delivery package based upon the further format indicated in the further packaging template. 39. The computer program product of claim 37, wherein the media file is reformatted by the media packaging server from a first format to a second format, the second format being the format indicated in the packaging template. 40. The computer program product of claim 37, wherein the media file is reformatted by transcoding the media file into the format indicated by the packaging template. 41. The computer program product of claim 37, further including instructions being operable to cause the data processing apparatus to:
include a requested network for the reception of the delivery package, wherein the delivery package is received via the requested network. 42. The computer program product of claim 37, further including instructions being operable to cause the data processing apparatus to:
include a requested non-transient storage medium for storing the delivery package prior to receiving the delivery package. 43. The computer program product of claim 37, further including instructions being operable to cause the data processing apparatus to:
include a requested compression format for compressing the delivery package. 44. The computer program product of claim 37, further including instructions being operable to cause the data processing apparatus to:
include a requested encryption format for encrypting the delivery package. | 2,400 |
7,701 | 7,701 | 14,618,598 | 2,439 | A method and a user device are disclosed for securing streaming content decryption. The method includes receiving at the user device a manifest for requested content, the manifest providing a Content Encryption Key (CEK) that is encrypted using a first public Key Encryption Key (KEK), a corresponding first private KEK being stored in secure storage on the user device; decrypting, inside a secure processing zone on the user device, the CEK using the first private KEK to create a decrypted content key; decrypting, inside the secure processing zone, requested content using the decrypted content key to form decrypted content; and providing the decrypted content to a decoder on the mobile user device. | 1. A method operating at a user device for securing streaming content decryption, the method comprising:
receiving at the user device a manifest for requested content, the manifest providing a Content Encryption Key (CEK) that is encrypted using a first public Key Encryption Key (KEK), a corresponding first private KEK being stored in secure storage on the user device; decrypting, inside a secure processing zone on the user device, the CEK using the first private KEK to create a decrypted content key; decrypting, inside the secure processing zone, requested content using the decrypted content key to form decrypted content; and providing the decrypted content to a decoder on the mobile user device. 2. The method as recited in claim 1 further comprising receiving a distribution message containing a first key identification and the first private KEK encrypted using a root key stored in the secure storage and storing the first key identification and the first KEK in the secure storage. 3. The method as recited in claim 2 further comprising storing the root key in one-time-only storage in the secure processing zone. 4. The method as recited in claim 3 wherein the distribution message comprises a plurality of private KEKs each having a corresponding key identification and storing the plurality of private KEKs and corresponding key identification in the secure storage. 5. The method as recited in claim 3 further comprising receiving a replacement message containing the first key identification and a second private KEK encrypted using the root key and replacing the first private KEK with the second private KEK. 6. The method as recited in claim 3 further comprising receiving a revocation message containing the first key identification and revoking the first private KEK. 7. The method as recited in claim 3 wherein the CEK, the first private KEK, and the root key are AES-128 keys. 8. The method as recited in claim 3 further comprising mutually authenticating the user device with a digital rights management server using a secure connection. 9. The method as recited in claim 3 further comprising receiving the requested content using one of HTTP Live Streaming (HLS) and Dynamic Adaptive Streaming over HTTP (DASH) protocol. 10. The method as recited in claim 3 further comprising receiving the manifest file from a content control server in a content distribution network. 11. The method as recited in claim 10 further comprising receiving the manifest file via a security client operating on the user device and outside the secure processing zone. 12. A user device comprising:
a processor; a non-secure processing zone that comprises a content request application; and a secure processing zone that comprises a secure memory, a streaming content player and a secure application program interface for receiving requests from the content request application, a decryptor being configured to receive a manifest for requested content, the manifest providing a Content Encryption Key (CEK) that is encrypted using a public Key Encryption Key (KEK), a corresponding private KEK being stored in the secure memory, and to decrypt the CEK to create a decrypted CEK, decrypt the requested content using the decrypted CEK to form decrypted content, and provide the decrypted content to a decoder in the secure processing zone. 13. The user device as recited in claim 12 wherein the secure processing zone further comprises a root key stored in a one-time-programmable memory, the root key for use in decrypting a stored private KEK. 14. The user device as recited in claim 13, wherein the content key, private KEK, and root key are AES-128 keys. 15. The user device as recited in claim 14, wherein the user device is configured to perform mutual authentication with a digital rights management server using a secure connection. 16. The user device as recited in claim 15, wherein the secure processing zone is ARM TrustZone. 17. The user device as recited in claim 15 further comprising a security client embedded in the content request application, the security client configured to receive the manifest file from a content control server in a content distribution network and provide the manifest file to the decryptor. 18. The user device as recited in claim 15 further comprising instructions in the content request application that communicate with a security client that resides on a network server. 19. The user device as recited in claim 15 wherein the decryptor receives the manifest file from a content control server that is part of a content distribution network. 20. A non-transitory computer-readable medium containing instructions stored thereon which, when executed by a client device operable to stream content, perform the acts:
receiving at the user device a manifest for requested content, the manifest providing a Content Encryption Key (CEK) that is encrypted using a first public Key Encryption Key (KEK), a corresponding private KEK being stored in secure storage on the user device; decrypting, inside a secure processing zone on the user device, the CEK using the first private KEK to create a decrypted content key; decrypting, inside the secure processing zone, requested content using the decrypted content key to form decrypted content; and providing the decrypted content to a decoder on the mobile user device. | A method and a user device are disclosed for securing streaming content decryption. The method includes receiving at the user device a manifest for requested content, the manifest providing a Content Encryption Key (CEK) that is encrypted using a first public Key Encryption Key (KEK), a corresponding first private KEK being stored in secure storage on the user device; decrypting, inside a secure processing zone on the user device, the CEK using the first private KEK to create a decrypted content key; decrypting, inside the secure processing zone, requested content using the decrypted content key to form decrypted content; and providing the decrypted content to a decoder on the mobile user device.1. A method operating at a user device for securing streaming content decryption, the method comprising:
receiving at the user device a manifest for requested content, the manifest providing a Content Encryption Key (CEK) that is encrypted using a first public Key Encryption Key (KEK), a corresponding first private KEK being stored in secure storage on the user device; decrypting, inside a secure processing zone on the user device, the CEK using the first private KEK to create a decrypted content key; decrypting, inside the secure processing zone, requested content using the decrypted content key to form decrypted content; and providing the decrypted content to a decoder on the mobile user device. 2. The method as recited in claim 1 further comprising receiving a distribution message containing a first key identification and the first private KEK encrypted using a root key stored in the secure storage and storing the first key identification and the first KEK in the secure storage. 3. The method as recited in claim 2 further comprising storing the root key in one-time-only storage in the secure processing zone. 4. The method as recited in claim 3 wherein the distribution message comprises a plurality of private KEKs each having a corresponding key identification and storing the plurality of private KEKs and corresponding key identification in the secure storage. 5. The method as recited in claim 3 further comprising receiving a replacement message containing the first key identification and a second private KEK encrypted using the root key and replacing the first private KEK with the second private KEK. 6. The method as recited in claim 3 further comprising receiving a revocation message containing the first key identification and revoking the first private KEK. 7. The method as recited in claim 3 wherein the CEK, the first private KEK, and the root key are AES-128 keys. 8. The method as recited in claim 3 further comprising mutually authenticating the user device with a digital rights management server using a secure connection. 9. The method as recited in claim 3 further comprising receiving the requested content using one of HTTP Live Streaming (HLS) and Dynamic Adaptive Streaming over HTTP (DASH) protocol. 10. The method as recited in claim 3 further comprising receiving the manifest file from a content control server in a content distribution network. 11. The method as recited in claim 10 further comprising receiving the manifest file via a security client operating on the user device and outside the secure processing zone. 12. A user device comprising:
a processor; a non-secure processing zone that comprises a content request application; and a secure processing zone that comprises a secure memory, a streaming content player and a secure application program interface for receiving requests from the content request application, a decryptor being configured to receive a manifest for requested content, the manifest providing a Content Encryption Key (CEK) that is encrypted using a public Key Encryption Key (KEK), a corresponding private KEK being stored in the secure memory, and to decrypt the CEK to create a decrypted CEK, decrypt the requested content using the decrypted CEK to form decrypted content, and provide the decrypted content to a decoder in the secure processing zone. 13. The user device as recited in claim 12 wherein the secure processing zone further comprises a root key stored in a one-time-programmable memory, the root key for use in decrypting a stored private KEK. 14. The user device as recited in claim 13, wherein the content key, private KEK, and root key are AES-128 keys. 15. The user device as recited in claim 14, wherein the user device is configured to perform mutual authentication with a digital rights management server using a secure connection. 16. The user device as recited in claim 15, wherein the secure processing zone is ARM TrustZone. 17. The user device as recited in claim 15 further comprising a security client embedded in the content request application, the security client configured to receive the manifest file from a content control server in a content distribution network and provide the manifest file to the decryptor. 18. The user device as recited in claim 15 further comprising instructions in the content request application that communicate with a security client that resides on a network server. 19. The user device as recited in claim 15 wherein the decryptor receives the manifest file from a content control server that is part of a content distribution network. 20. A non-transitory computer-readable medium containing instructions stored thereon which, when executed by a client device operable to stream content, perform the acts:
receiving at the user device a manifest for requested content, the manifest providing a Content Encryption Key (CEK) that is encrypted using a first public Key Encryption Key (KEK), a corresponding private KEK being stored in secure storage on the user device; decrypting, inside a secure processing zone on the user device, the CEK using the first private KEK to create a decrypted content key; decrypting, inside the secure processing zone, requested content using the decrypted content key to form decrypted content; and providing the decrypted content to a decoder on the mobile user device. | 2,400 |
7,702 | 7,702 | 13,943,821 | 2,463 | Systems and methods for enrolling nodes into an ad hoc network associated with a multi-roomed structure. Nodes within the ad hoc network comprise a communication module configured to communicate with the ad hoc network using at least one of room-limited communications and room-transparent communications. | 1. A method for enrolling nodes into an ad hoc network associated with a multi-roomed structure, each node comprising a communication module configured to communicate with the ad hoc network using at least one of room-limited communications and room-transparent communications, the method comprising:
providing, at a computing device associated with a user, an instruction for the user to cause the transmission of a room-limited communication from a first node; determine at a second node if the room-limited communication was received; and when the room-limited communication was received at the second node, segmenting the first and second nodes into a single room in a room list stored in memory. 2. The method of claim 1, wherein the first node is associated with a lighting product. 3. The method of claim 2, wherein the room-limited communication is an optical signal generated by the lighting product. 4. The method of claim 3, wherein the room-limited communication is imperceptible to a human eye. 5. The method of claim 1, wherein the room-limited communication is an acoustic signal. 6. The method of claim 5, wherein the room-limited communication is imperceptible to a human ear. 7. The method of claim 1, comprising:
based on node data received from the first node, determining a room function of the single room. 8. The method of claim 7, wherein the node data comprises at least one of a stock keeping unit (SKU) number, a network address, a bar code, and a presumed identity. 9. The method of claim 7, comprising:
receiving an input from the user of the computing device confirming the room function of the single room. 10. The method of claim 1, comprising:
causing a visual display of the multi-room structure on the computing device, the visual display comprising graphical indications of the first and second nodes. 11. The method of claim 10, wherein the visual display comprises an identification of a determined room function of a room in the visual display. 12. The method of claim 1, comprising:
controlling a function of a consumer product associated with the first node based on an input by a user of the computing device. 13. The method of claim 1, wherein the ad hoc network comprises a bridge node, the first node and the second node, wherein the bridge node is in communication with the computing device via a first communications network and the bridge node, the first node and the second node are in communication via a second communications network, wherein the first communications network is different from the second communications network. 14. The method of claim 13, wherein the second communications network utilizes the IPv6 over Low Power Wireless Personal Area Networks protocol. 15. The method of claim 1, wherein the transmission of a room-limited communication from a first node is caused by the activation of a light switch. 16. A method for enrolling nodes into an ad hoc network associated with a multi-roomed structure, the method comprising:
providing, at a computing device associated with a user, an instruction for the user to cause the transmission of a room-limited communication from a first node through activation of a light switch; upon activation of the light switch, determine at a second node if the room-limited communication was received; when the room-limited communication was received at the second node, segmenting the first and second nodes into a single room in a room list stored in memory; and determining a spatial distance between the first and second node based on a time of flight of a communication transmitted by the first node and received by the second node. 17. The method of claim 16, comprising:
causing a visual display of the multi-room structure on the computing device, the visual display comprising graphical indications of the first and second nodes, the first and second nodes separated on the visual display based on the determined spatial distance. 18. A method for enrolling nodes into an ad hoc network associated with a multi-roomed structure, the method comprising:
providing, at a computing device associated with a user, an instruction for the user to operate a plurality of nodes; based on the operation of the plurality of nodes, determine the plurality of nodes are a grouping; segment the grouping into a room of a room list stored in memory; and determining a room function of the room based on an identified received from at least one of the plurality of nodes. 19. The method of claim 18, comprising:
determining a spatial distance between each of the plurality of nodes. 20. The method of claim 19, comprising:
causing a visual display of the multi-room structure on the computing device, the visual display comprising graphical indications of the plurality of nodes, wherein the plurality of nodes are separated on the visual display based on the determined spatial distance. 21. The method of claim 18, wherein each of the plurality of nodes is associated with a respective lighting product, the method comprising:
simultaneously controlling each of the respective lighting products based on an input by a user of the computing device. | Systems and methods for enrolling nodes into an ad hoc network associated with a multi-roomed structure. Nodes within the ad hoc network comprise a communication module configured to communicate with the ad hoc network using at least one of room-limited communications and room-transparent communications.1. A method for enrolling nodes into an ad hoc network associated with a multi-roomed structure, each node comprising a communication module configured to communicate with the ad hoc network using at least one of room-limited communications and room-transparent communications, the method comprising:
providing, at a computing device associated with a user, an instruction for the user to cause the transmission of a room-limited communication from a first node; determine at a second node if the room-limited communication was received; and when the room-limited communication was received at the second node, segmenting the first and second nodes into a single room in a room list stored in memory. 2. The method of claim 1, wherein the first node is associated with a lighting product. 3. The method of claim 2, wherein the room-limited communication is an optical signal generated by the lighting product. 4. The method of claim 3, wherein the room-limited communication is imperceptible to a human eye. 5. The method of claim 1, wherein the room-limited communication is an acoustic signal. 6. The method of claim 5, wherein the room-limited communication is imperceptible to a human ear. 7. The method of claim 1, comprising:
based on node data received from the first node, determining a room function of the single room. 8. The method of claim 7, wherein the node data comprises at least one of a stock keeping unit (SKU) number, a network address, a bar code, and a presumed identity. 9. The method of claim 7, comprising:
receiving an input from the user of the computing device confirming the room function of the single room. 10. The method of claim 1, comprising:
causing a visual display of the multi-room structure on the computing device, the visual display comprising graphical indications of the first and second nodes. 11. The method of claim 10, wherein the visual display comprises an identification of a determined room function of a room in the visual display. 12. The method of claim 1, comprising:
controlling a function of a consumer product associated with the first node based on an input by a user of the computing device. 13. The method of claim 1, wherein the ad hoc network comprises a bridge node, the first node and the second node, wherein the bridge node is in communication with the computing device via a first communications network and the bridge node, the first node and the second node are in communication via a second communications network, wherein the first communications network is different from the second communications network. 14. The method of claim 13, wherein the second communications network utilizes the IPv6 over Low Power Wireless Personal Area Networks protocol. 15. The method of claim 1, wherein the transmission of a room-limited communication from a first node is caused by the activation of a light switch. 16. A method for enrolling nodes into an ad hoc network associated with a multi-roomed structure, the method comprising:
providing, at a computing device associated with a user, an instruction for the user to cause the transmission of a room-limited communication from a first node through activation of a light switch; upon activation of the light switch, determine at a second node if the room-limited communication was received; when the room-limited communication was received at the second node, segmenting the first and second nodes into a single room in a room list stored in memory; and determining a spatial distance between the first and second node based on a time of flight of a communication transmitted by the first node and received by the second node. 17. The method of claim 16, comprising:
causing a visual display of the multi-room structure on the computing device, the visual display comprising graphical indications of the first and second nodes, the first and second nodes separated on the visual display based on the determined spatial distance. 18. A method for enrolling nodes into an ad hoc network associated with a multi-roomed structure, the method comprising:
providing, at a computing device associated with a user, an instruction for the user to operate a plurality of nodes; based on the operation of the plurality of nodes, determine the plurality of nodes are a grouping; segment the grouping into a room of a room list stored in memory; and determining a room function of the room based on an identified received from at least one of the plurality of nodes. 19. The method of claim 18, comprising:
determining a spatial distance between each of the plurality of nodes. 20. The method of claim 19, comprising:
causing a visual display of the multi-room structure on the computing device, the visual display comprising graphical indications of the plurality of nodes, wherein the plurality of nodes are separated on the visual display based on the determined spatial distance. 21. The method of claim 18, wherein each of the plurality of nodes is associated with a respective lighting product, the method comprising:
simultaneously controlling each of the respective lighting products based on an input by a user of the computing device. | 2,400 |
7,703 | 7,703 | 15,031,431 | 2,439 | Example embodiments disclosed herein relate to analyze code of a web application associated with a framework. The code is loaded. Data objects of the framework that are used by the code are modeled using local parameters with explicit control flow. The code is analyzed to identify at least one vulnerability by analyzing one or more execution paths of the code using the explicit control flow. | 1. A non-transitory machine-readable storage medium storing instructions that, if executed by at least one processor of a device, cause the device to:
load code of a web application associated with a framework; wherein data objects of the framework used by the code are modeled using local parameters with explicit control flow; and analyze the code to identify at least one vulnerability by analyzing one or more execution paths of the code using the explicit control flow. 2. The non-transitory machine-readable storage medium of claim 1, wherein the model replaces corresponding portions of the code with the modeled local parameters during the analysis. 3. The non-transitory machine-readable storage medium of claim 1, wherein the model is based on a specification of the framework. 4. The non-transitory machine-readable storage medium of claim 3, wherein the specification does not define the data objects as parameters, wherein the model uses artificial parameters to represent the data object. 5. The non-transitory machine-readable storage medium of claim 4, wherein the code includes a read from a property or an attribute of one of the artificial parameters and wherein the read is replaced with a field access. 6. The non-transitory machine-readable storage medium of claim 4, wherein the code includes a write to a property or an attribute of one of the artificial parameters and wherein the write is replaced with an assignment statement to a field of the respective local parameter. 7. The non-transitory machine-readable storage medium of claim 3, wherein the specification is used to determine explicit method calls with modeled data objects in the code during the analysis. 8. The non-transitory machine-readable storage medium of claim 1, wherein the data objects include at least one request object and at least one response object. 9. A method comprising:
determining a model for a framework, wherein the model uses local parameters with explicit control flow based on a specification of the framework; loading code of a web application that uses the framework; determining data objects of the framework used by the code; replacing at least one of the data objects in the code with the local parameters of the model; and analyzing the code using the model to identify at least one security vulnerability by analyzing one or more execution paths of the code using the explicit control flow. 10. The method of claim 9, wherein the specification does not define the data objects as parameters, wherein the model uses one or more artificial parameters to represent the at least one data object. 11. The method of claim 9, wherein the code includes a read from a property or an attribute of one of the artificial parameters and wherein the read is replaced with a field access. 12. The method of claim 9, wherein the code includes a write to a property or an attribute of one of the artificial parameters and wherein the write is replaced with an assignment statement. 13. A computing system comprising:
an application load engine to load code of a web application that uses a framework, a framework identification and model setup engine to determine a plurality of data objects of the framework used by the code, a replacement engine to replace at least one of the data objects with one or more local parameters of a model, wherein the model uses the local parameters with explicit control flow based on a specification of the framework; and an analysis engine to identify at least one security vulnerability by analyzing one or more execution paths of the code using the explicit control flow. 14. The computing system of claim 13, wherein the model uses one or more artificial parameters to represent the at least one data object, and wherein, the code includes a read from a property or an attribute of one of the artificial parameters and wherein the read is replaced with a field access. 15. The computing system of claim 13, wherein the model uses one or more artificial parameters to represent the at least one data object, wherein the code includes a write to a property or an attribute of one of the artificial parameters and wherein the write is replaced with an assignment statement to a field of the respective artificial parameter. | Example embodiments disclosed herein relate to analyze code of a web application associated with a framework. The code is loaded. Data objects of the framework that are used by the code are modeled using local parameters with explicit control flow. The code is analyzed to identify at least one vulnerability by analyzing one or more execution paths of the code using the explicit control flow.1. A non-transitory machine-readable storage medium storing instructions that, if executed by at least one processor of a device, cause the device to:
load code of a web application associated with a framework; wherein data objects of the framework used by the code are modeled using local parameters with explicit control flow; and analyze the code to identify at least one vulnerability by analyzing one or more execution paths of the code using the explicit control flow. 2. The non-transitory machine-readable storage medium of claim 1, wherein the model replaces corresponding portions of the code with the modeled local parameters during the analysis. 3. The non-transitory machine-readable storage medium of claim 1, wherein the model is based on a specification of the framework. 4. The non-transitory machine-readable storage medium of claim 3, wherein the specification does not define the data objects as parameters, wherein the model uses artificial parameters to represent the data object. 5. The non-transitory machine-readable storage medium of claim 4, wherein the code includes a read from a property or an attribute of one of the artificial parameters and wherein the read is replaced with a field access. 6. The non-transitory machine-readable storage medium of claim 4, wherein the code includes a write to a property or an attribute of one of the artificial parameters and wherein the write is replaced with an assignment statement to a field of the respective local parameter. 7. The non-transitory machine-readable storage medium of claim 3, wherein the specification is used to determine explicit method calls with modeled data objects in the code during the analysis. 8. The non-transitory machine-readable storage medium of claim 1, wherein the data objects include at least one request object and at least one response object. 9. A method comprising:
determining a model for a framework, wherein the model uses local parameters with explicit control flow based on a specification of the framework; loading code of a web application that uses the framework; determining data objects of the framework used by the code; replacing at least one of the data objects in the code with the local parameters of the model; and analyzing the code using the model to identify at least one security vulnerability by analyzing one or more execution paths of the code using the explicit control flow. 10. The method of claim 9, wherein the specification does not define the data objects as parameters, wherein the model uses one or more artificial parameters to represent the at least one data object. 11. The method of claim 9, wherein the code includes a read from a property or an attribute of one of the artificial parameters and wherein the read is replaced with a field access. 12. The method of claim 9, wherein the code includes a write to a property or an attribute of one of the artificial parameters and wherein the write is replaced with an assignment statement. 13. A computing system comprising:
an application load engine to load code of a web application that uses a framework, a framework identification and model setup engine to determine a plurality of data objects of the framework used by the code, a replacement engine to replace at least one of the data objects with one or more local parameters of a model, wherein the model uses the local parameters with explicit control flow based on a specification of the framework; and an analysis engine to identify at least one security vulnerability by analyzing one or more execution paths of the code using the explicit control flow. 14. The computing system of claim 13, wherein the model uses one or more artificial parameters to represent the at least one data object, and wherein, the code includes a read from a property or an attribute of one of the artificial parameters and wherein the read is replaced with a field access. 15. The computing system of claim 13, wherein the model uses one or more artificial parameters to represent the at least one data object, wherein the code includes a write to a property or an attribute of one of the artificial parameters and wherein the write is replaced with an assignment statement to a field of the respective artificial parameter. | 2,400 |
7,704 | 7,704 | 15,063,952 | 2,486 | An electronic device includes one or more processors and a display that is flexible. A louvered filter, which can be optionally configured in an electronic device attachment, as a first louvered filter and a second louvered filter, or otherwise, is then disposed along the flexible display. When the flexible display is deformed by one or more bends, the one or more processors can present a first image through a first portion of the louvered filter and a second image through a second portion of the louvered filter to present stereoscopic content without the need of special glasses. | 1. An electronic device, comprising;
one or more processors; a flexible display, operable with the one or more processors; and a louvered filter disposed along the flexible display; the one or more processors to, when the flexible display is deformed by one or more bends, present, with the flexible display, a first image through a first portion of the louvered filter and a second image through a second portion of the louvered filter. 2. The electronic device of claim 1, further comprising one or more flex sensors, operable with the one or more processors, to detect the one or more bends along the flexible display. 3. The electronic device of claim 1, the first portion of the louvered filter disposed on a first side of a first bend of the one or more bends, the second portion of the louvered filter disposed on a second side of the first bend of the one or more bends. 4. The electronic device of claim 3, the louvered filter configured to pass the first image through the louvered filter along a first axis and to pass the second image through the louvered filter along a second axis. 5. The electronic device of claim 4, the louvered filter to preclude the first axis and the second axis from intersecting when the flexible display is deformed by a bend greater than a predefined angle. 6. The electronic device of claim 3, the first image comprising one of a right image or a left image of stereoscopic image content, the second image comprising another of the right image or the left image of the stereoscopic image content. 7. The electronic device of claim 1, the one or more bends comprising at least a first bend and a second bend, the one or more processors to:
present the first image and the second image on opposite sides of the first bend; and present a third image and a fourth image on opposite sides of the second bend. 8. The electronic device of claim 1, the louvered filter comprising a plurality of louvers, with each louver oriented substantially orthogonally with a flexible display surface portion disposed adjacent to the each louver. 9. The electronic device of claim 1, further comprising a mechanical actuator, operable with the one or more processors, to deform the flexible display by the one or more bends. 10. The electronic device of claim 1, the one or more processors further to apply a keystone correction to one or more of the first image or the second image. 11. The electronic device of claim 1, the louvered filter coupled to an electronic device attachment that is selectively detachable from the electronic device. 12. The electronic device of claim 11, the electronic device attachment comprising an optically transparent hinge. 13. The electronic device of claim 1, one or more of the first image or the second image comprising a calibration image. 14. The electronic device of claim 1, further comprising at least one imager, the one or more processors further to:
receive a captured image from the at least one imager; and perform at least one control operation in response to the captured image. 15. The electronic device of claim 14, the at least one control operation comprising presenting, on the flexible display, an indication to adjust a bend amount of the one or more bends. 16. A method in an electronic device having a louvered filter disposed along a flexible display, the method comprising:
detecting, with one or more processors, at least one bend along the flexible display; and presenting, with the one or more processors, a first image through a first portion of the louvered filter disposed to a first side of the at least one bend and a second image through a second portion of the louvered filter disposed to a second side of the at least one bend. 17. The method of claim 16, further comprising applying, with the one or more processors, a keystone correction to one or more of the first image or the second image. 18. The method of claim 17, further comprising:
capturing, with one or more imagers of the electronic device, one or more images of a user's eyes; and analyzing the one or more images to determine one or more spatial relationships between a user an the electronic device; wherein the keystone correction is a function of the one or more spatial relationships. 19. The method of claim 16, further comprising actuating, with the one or more processors, a mechanical actuator to deform the flexible display by the at least one bend. 20. The method of claim 16, one or both of the first image or the second image comprising a calibration image. | An electronic device includes one or more processors and a display that is flexible. A louvered filter, which can be optionally configured in an electronic device attachment, as a first louvered filter and a second louvered filter, or otherwise, is then disposed along the flexible display. When the flexible display is deformed by one or more bends, the one or more processors can present a first image through a first portion of the louvered filter and a second image through a second portion of the louvered filter to present stereoscopic content without the need of special glasses.1. An electronic device, comprising;
one or more processors; a flexible display, operable with the one or more processors; and a louvered filter disposed along the flexible display; the one or more processors to, when the flexible display is deformed by one or more bends, present, with the flexible display, a first image through a first portion of the louvered filter and a second image through a second portion of the louvered filter. 2. The electronic device of claim 1, further comprising one or more flex sensors, operable with the one or more processors, to detect the one or more bends along the flexible display. 3. The electronic device of claim 1, the first portion of the louvered filter disposed on a first side of a first bend of the one or more bends, the second portion of the louvered filter disposed on a second side of the first bend of the one or more bends. 4. The electronic device of claim 3, the louvered filter configured to pass the first image through the louvered filter along a first axis and to pass the second image through the louvered filter along a second axis. 5. The electronic device of claim 4, the louvered filter to preclude the first axis and the second axis from intersecting when the flexible display is deformed by a bend greater than a predefined angle. 6. The electronic device of claim 3, the first image comprising one of a right image or a left image of stereoscopic image content, the second image comprising another of the right image or the left image of the stereoscopic image content. 7. The electronic device of claim 1, the one or more bends comprising at least a first bend and a second bend, the one or more processors to:
present the first image and the second image on opposite sides of the first bend; and present a third image and a fourth image on opposite sides of the second bend. 8. The electronic device of claim 1, the louvered filter comprising a plurality of louvers, with each louver oriented substantially orthogonally with a flexible display surface portion disposed adjacent to the each louver. 9. The electronic device of claim 1, further comprising a mechanical actuator, operable with the one or more processors, to deform the flexible display by the one or more bends. 10. The electronic device of claim 1, the one or more processors further to apply a keystone correction to one or more of the first image or the second image. 11. The electronic device of claim 1, the louvered filter coupled to an electronic device attachment that is selectively detachable from the electronic device. 12. The electronic device of claim 11, the electronic device attachment comprising an optically transparent hinge. 13. The electronic device of claim 1, one or more of the first image or the second image comprising a calibration image. 14. The electronic device of claim 1, further comprising at least one imager, the one or more processors further to:
receive a captured image from the at least one imager; and perform at least one control operation in response to the captured image. 15. The electronic device of claim 14, the at least one control operation comprising presenting, on the flexible display, an indication to adjust a bend amount of the one or more bends. 16. A method in an electronic device having a louvered filter disposed along a flexible display, the method comprising:
detecting, with one or more processors, at least one bend along the flexible display; and presenting, with the one or more processors, a first image through a first portion of the louvered filter disposed to a first side of the at least one bend and a second image through a second portion of the louvered filter disposed to a second side of the at least one bend. 17. The method of claim 16, further comprising applying, with the one or more processors, a keystone correction to one or more of the first image or the second image. 18. The method of claim 17, further comprising:
capturing, with one or more imagers of the electronic device, one or more images of a user's eyes; and analyzing the one or more images to determine one or more spatial relationships between a user an the electronic device; wherein the keystone correction is a function of the one or more spatial relationships. 19. The method of claim 16, further comprising actuating, with the one or more processors, a mechanical actuator to deform the flexible display by the at least one bend. 20. The method of claim 16, one or both of the first image or the second image comprising a calibration image. | 2,400 |
7,705 | 7,705 | 14,898,493 | 2,425 | A vision system of a vehicle includes a camera having a lens and a two dimensional imaging array sensor. The camera is disposed at a side of a body of a vehicle and has a field of view exterior of the vehicle and at least rearward of the vehicle. The camera captures image data. The imaging array sensor has a center region. The lens is configured to focus light at the imaging array sensor, and the lens has a center axis. The lens is disposed at the imaging array sensor with the center axis of the lens laterally offset from the center region of the imaging array sensor. A video display is disposed in the vehicle and is viewable by a driver of the vehicle when the driver is normally operating the vehicle. The video display is operable to display video images derived from image data captured by the camera. | 1. A vision system of a vehicle, said vision system comprising:
a camera disposed at a side of a body of a vehicle equipped with said vision system and having a field of view exterior of the equipped vehicle and at least rearward of the equipped vehicle; wherein said camera captures image data; wherein said camera comprises a lens and a two dimensional imaging array sensor having a plurality of photosensing elements arranged in an array of rows and columns; wherein said array of said imaging array sensor has a center region; wherein said lens is configured to focus light at said imaging array sensor, and wherein said lens has a center axis; wherein said lens is disposed at said imaging array sensor with said center axis of said lens laterally offset from said center region of said array of said imaging array sensor; and a video display disposed in the equipped vehicle and viewable by a driver of the equipped vehicle when the driver is normally operating the equipped vehicle, wherein said video display is operable to display video images derived from image data captured by said camera. 2. The vision system of claim 1, wherein, with said camera disposed at the side of the equipped vehicle, said center axis of said lens is offset laterally towards a side of said array of said imaging array sensor. 3. The vision system of claim 2, wherein, with said camera disposed at the side of the equipped vehicle, said center axis of said lens is laterally offset towards an inboard side of said array of said imaging array sensor that is laterally closer to the side of the body of the equipped vehicle than said center region of said array of said imaging array sensor. 4. The vision system of claim 2, wherein said array of said imaging array sensor has a width dimension and a height dimension, and wherein said center axis of said lens is offset along said width dimension of said array of said imaging array sensor. 5. The vision system of claim 4, wherein said center axis of said lens is offset about ¼ of said width dimension of said array of said imaging array sensor. 6. The vision system of claim 1, comprising a filtering element that reduces stray light entering said lens from interfering with said imaging array sensor. 7. The vision system of claim 1, wherein said lens comprises a wide angle lens. 8. The vision system of claim 7, wherein said lens has a distortion at least at an f-theta distortion. 9. The vision system of claim 1, wherein said array of said imaging array sensor has a higher density of photosensing elements at a first portion of said array of said imaging array sensor and a lower density of photosensing elements at a second portion of said array of said imaging array sensor, and wherein said center axis of said lens is disposed at said first portion of said array of said imaging array sensor. 10. The vision system of claim 1, comprising an image processor that processes image data captured by said camera, wherein said image processor at least partially corrects distortion in captured image data via processing of captured image data. 11. The vision system of claim 1, wherein the displayed images are adjustable responsive to an actuation of a user input. 12. The vision system of claim 1, wherein a head tracking system is operable to determine a movement of the driver's head, and wherein, responsive to a determined movement of the driver's head, said vision system adjusts the displayed images to adjust the rearward field of view to the driver of the equipped vehicle as viewed at said video display. 13. The vision system of claim 12, wherein said video display is operable to display three dimensional image information for viewing by the driver of the equipped vehicle. 14. The vision system of claim 13, wherein the three dimensional image information is used to shift the display of nearer objects more than the display of farther objects to generate a pseudo three dimensional display for viewing by the driver of the equipped vehicle. 15. The vision system of claim 12, wherein, responsive to a determined movement of the driver's head stronger in one direction, said vision system adjusts the displayed images to provide a wider field of view display for viewing by the driver of the equipped vehicle. 16. The vision system of claim 1, wherein said camera comprises part of a multi-camera vision system of the equipped vehicle. 17. The vision system of claim 16, wherein said video display is operable to display images derived from image data captured by a plurality of cameras disposed at the equipped vehicle, each having a respective field of view exterior of the equipped vehicle. 18. The vision system of claim 17, wherein at least some of said cameras have a lens with a center axis of the lens being laterally offset from a center region of an array of rows and columns of photosensing elements of an imaging array sensor of said at least some of said cameras. 19. The vision system of claim 1, wherein the body of the equipped vehicle has a length dimension along the side of the body of the equipped vehicle and wherein said camera is disposed closer to the front of the equipped vehicle than to the rear of the equipped vehicle. 20. The vision system of claim 1, wherein said array of said imaging array sensor comprises at least about 480 rows of photosensing elements and at least about 640 columns of photosensing elements, and wherein said center axis of said lens is laterally offset at least about 100 columns of photosensing elements from said center region of said array of said imaging array sensor. 21. The vision system of claim 1, wherein said array of said imaging array sensor comprises at least about 800 rows of photosensing elements and at least about 1200 columns of photosensing elements, and wherein said center axis of said lens is laterally offset at least about 200 columns of photosensing elements from said center region of said array of said imaging array sensor. 22. The vision system of claim 1, comprising an image processor that processes image data captured by said camera, wherein said vision system, responsive to processing of captured image data by said image processor, is operable to determine a position and relative speed of another vehicle rearward or sideward of the equipped vehicle. 23. The vision system of claim 22, wherein, at least responsive to the driver of the equipped vehicle initiating a lane change to an adjacent lane of the road, said vision system is operable to generate an overlay at the displayed image to alert the driver of the equipped vehicle that the adjacent lane is occupied by the determined other vehicle. 24. The vision system of claim 23, wherein, at least responsive to the driver of the equipped vehicle maneuvering the equipped vehicle to enter a road, said vision system is operable to generate an overlay at the displayed image to indicate when said vision system determines the presence of another vehicle or a pedestrian in the road. | A vision system of a vehicle includes a camera having a lens and a two dimensional imaging array sensor. The camera is disposed at a side of a body of a vehicle and has a field of view exterior of the vehicle and at least rearward of the vehicle. The camera captures image data. The imaging array sensor has a center region. The lens is configured to focus light at the imaging array sensor, and the lens has a center axis. The lens is disposed at the imaging array sensor with the center axis of the lens laterally offset from the center region of the imaging array sensor. A video display is disposed in the vehicle and is viewable by a driver of the vehicle when the driver is normally operating the vehicle. The video display is operable to display video images derived from image data captured by the camera.1. A vision system of a vehicle, said vision system comprising:
a camera disposed at a side of a body of a vehicle equipped with said vision system and having a field of view exterior of the equipped vehicle and at least rearward of the equipped vehicle; wherein said camera captures image data; wherein said camera comprises a lens and a two dimensional imaging array sensor having a plurality of photosensing elements arranged in an array of rows and columns; wherein said array of said imaging array sensor has a center region; wherein said lens is configured to focus light at said imaging array sensor, and wherein said lens has a center axis; wherein said lens is disposed at said imaging array sensor with said center axis of said lens laterally offset from said center region of said array of said imaging array sensor; and a video display disposed in the equipped vehicle and viewable by a driver of the equipped vehicle when the driver is normally operating the equipped vehicle, wherein said video display is operable to display video images derived from image data captured by said camera. 2. The vision system of claim 1, wherein, with said camera disposed at the side of the equipped vehicle, said center axis of said lens is offset laterally towards a side of said array of said imaging array sensor. 3. The vision system of claim 2, wherein, with said camera disposed at the side of the equipped vehicle, said center axis of said lens is laterally offset towards an inboard side of said array of said imaging array sensor that is laterally closer to the side of the body of the equipped vehicle than said center region of said array of said imaging array sensor. 4. The vision system of claim 2, wherein said array of said imaging array sensor has a width dimension and a height dimension, and wherein said center axis of said lens is offset along said width dimension of said array of said imaging array sensor. 5. The vision system of claim 4, wherein said center axis of said lens is offset about ¼ of said width dimension of said array of said imaging array sensor. 6. The vision system of claim 1, comprising a filtering element that reduces stray light entering said lens from interfering with said imaging array sensor. 7. The vision system of claim 1, wherein said lens comprises a wide angle lens. 8. The vision system of claim 7, wherein said lens has a distortion at least at an f-theta distortion. 9. The vision system of claim 1, wherein said array of said imaging array sensor has a higher density of photosensing elements at a first portion of said array of said imaging array sensor and a lower density of photosensing elements at a second portion of said array of said imaging array sensor, and wherein said center axis of said lens is disposed at said first portion of said array of said imaging array sensor. 10. The vision system of claim 1, comprising an image processor that processes image data captured by said camera, wherein said image processor at least partially corrects distortion in captured image data via processing of captured image data. 11. The vision system of claim 1, wherein the displayed images are adjustable responsive to an actuation of a user input. 12. The vision system of claim 1, wherein a head tracking system is operable to determine a movement of the driver's head, and wherein, responsive to a determined movement of the driver's head, said vision system adjusts the displayed images to adjust the rearward field of view to the driver of the equipped vehicle as viewed at said video display. 13. The vision system of claim 12, wherein said video display is operable to display three dimensional image information for viewing by the driver of the equipped vehicle. 14. The vision system of claim 13, wherein the three dimensional image information is used to shift the display of nearer objects more than the display of farther objects to generate a pseudo three dimensional display for viewing by the driver of the equipped vehicle. 15. The vision system of claim 12, wherein, responsive to a determined movement of the driver's head stronger in one direction, said vision system adjusts the displayed images to provide a wider field of view display for viewing by the driver of the equipped vehicle. 16. The vision system of claim 1, wherein said camera comprises part of a multi-camera vision system of the equipped vehicle. 17. The vision system of claim 16, wherein said video display is operable to display images derived from image data captured by a plurality of cameras disposed at the equipped vehicle, each having a respective field of view exterior of the equipped vehicle. 18. The vision system of claim 17, wherein at least some of said cameras have a lens with a center axis of the lens being laterally offset from a center region of an array of rows and columns of photosensing elements of an imaging array sensor of said at least some of said cameras. 19. The vision system of claim 1, wherein the body of the equipped vehicle has a length dimension along the side of the body of the equipped vehicle and wherein said camera is disposed closer to the front of the equipped vehicle than to the rear of the equipped vehicle. 20. The vision system of claim 1, wherein said array of said imaging array sensor comprises at least about 480 rows of photosensing elements and at least about 640 columns of photosensing elements, and wherein said center axis of said lens is laterally offset at least about 100 columns of photosensing elements from said center region of said array of said imaging array sensor. 21. The vision system of claim 1, wherein said array of said imaging array sensor comprises at least about 800 rows of photosensing elements and at least about 1200 columns of photosensing elements, and wherein said center axis of said lens is laterally offset at least about 200 columns of photosensing elements from said center region of said array of said imaging array sensor. 22. The vision system of claim 1, comprising an image processor that processes image data captured by said camera, wherein said vision system, responsive to processing of captured image data by said image processor, is operable to determine a position and relative speed of another vehicle rearward or sideward of the equipped vehicle. 23. The vision system of claim 22, wherein, at least responsive to the driver of the equipped vehicle initiating a lane change to an adjacent lane of the road, said vision system is operable to generate an overlay at the displayed image to alert the driver of the equipped vehicle that the adjacent lane is occupied by the determined other vehicle. 24. The vision system of claim 23, wherein, at least responsive to the driver of the equipped vehicle maneuvering the equipped vehicle to enter a road, said vision system is operable to generate an overlay at the displayed image to indicate when said vision system determines the presence of another vehicle or a pedestrian in the road. | 2,400 |
7,706 | 7,706 | 12,970,930 | 2,477 | In one embodiment, a computer-implemented method of managing a virtual local area network (VLAN) domain associated with a network is provided. In this embodiment, the method comprises: defining a VLAN domain comprising a list of a plurality of connectively coupled ports of the network associated with the VLAN domain; and assigning at least one VLAN associated with the plurality of connectively coupled ports. In another embodiment, a system for managing virtual local area networks (VLANs) in a network is provided. In this embodiment, the system comprises a network provisioning module for defining a VLAN domain comprising a list of a plurality of connectively coupled ports of the network associated with the VLAN domain and assigning at least one VLAN associated with the plurality of connectively coupled ports. The system further comprises a a network monitoring system operable to gather actual network element configuration data from a plurality of network elements associated with one or more VLAN domains, wherein the actual network element configuration data identifies one or more VLANs that at least some of the plurality of network elements are actually allocated to; and a VLAN services module operable to correlate the actual network element configuration data with administrative VLAN data. The administrative VLAN data identifies one or more VLANs recognized by a business process. In one particular embodiment, the system is further operable to determine one or more VLANs that are not commonly identified in both the actual network element configuration data and the administrative VLAN data. | 1. A computer-implemented method of managing a virtual local area network (VLAN) domain associated with a network, the method comprising:
defining a VLAN domain comprising a list of a plurality of connectively coupled ports of the network associated with the VLAN domain; and assigning, to the VLAN domain, at least one VLAN associated with the plurality of connectively coupled ports. 2. The computer-implemented method of claim 1 further comprising gathering actual network element configuration data from a plurality of network elements in the network, wherein the actual network element configuration data identifies one or more VLANs to which at least some of the plurality of network elements are allocated. 3. The computer-implemented method of claim 2 further comprising correlating the actual network element configuration data with administrative VLAN data, wherein the administrative VLAN data identifies one or more VLANs recognized by a business process. 4. The computer-implemented method of claim 3 wherein, based on the correlating, determining one or more VLANs that are not commonly identified in both the actual network element configuration data and the administrative VLAN data within the defined VLAN domain. 5. The computer-implemented method of claim 4 further comprising reporting one or more VLANs available to be provisioned for the VLAN domain and the VLANs that at least some of the plurality of network elements are allocated to, wherein reporting comprises indicating the one or more VLANs that are not commonly identified in both the actual network element configuration data and the administrative VLAN data. 6. The computer-implemented method of claim 5 wherein the operation of reporting further comprises indicating one or more VLANs commonly identified in both the administrative VLAN data and the actual network element configuration data. 7. The computer-implemented method of claim 5 wherein the operation of reporting further comprises reporting one or more VLANs identified for each of a plurality of VLAN domains. 8. The computer-implemented method of claim 2 wherein gathering actual network element configuration data comprises polling the plurality of network elements for specified configuration data. 9. The computer-implemented method of claim 2, wherein gathering actual network element configuration data comprises gathering the actual network element configuration data from network elements at a plurality of logical sites. 10. A system for managing virtual local area networks (VLANs) in a network, the system comprising:
a network provisioning module for defining a VLAN domain comprising a list of a plurality of connectively coupled ports of the network associated with the VLAN domain and assigning, to the VLAN domain, at least one VLAN associated with the plurality of connectively coupled ports; a network monitoring system operable to gather actual network element configuration data from a plurality of network elements associated with one or more VLAN domains, wherein the actual network element configuration data identifies one or more VLANs that at least some of the plurality of network elements are allocated to; and a VLAN services module operable to correlate the actual network element configuration data with administrative VLAN data, wherein the administrative VLAN data identifies one or more VLANs recognized by a business process, and further operable to determine one or more VLANs that are not commonly identified in both the actual network element configuration data and the administrative VLAN data. 11. The system of claim 10 further comprising a VLAN management user interface operable to report VLAN status determined by the VLAN services module. 12. The system of claim 11 wherein the VLAN management user interface is further operable to issue a notification that a VLAN is reserved. 13. The system of claim 13 wherein the VLAN management user interface is further operable to receive a reservation request to reserve a specified VLAN. 14. The system of claim 13 wherein the VLAN services modules is further operable to reserve the specified VLAN by marking the VLAN as reserved, assign the specified VLAN to VLAN domain, and allocate one or more specified network elements to the specified VLAN of the VLAN domain. 15. The system of claim 13 wherein the VLAN management user interface is further configured to receive a release request to release a specified VLAN that is currently reserved, and wherein the VLAN management services module is further operable to responsively release the specified VLAN. 16. The system of claim 11 wherein the VLAN management user interface is further operable to simultaneously present VLAN status of VLANs for multiple VLAN domains. 17. The system of claim 16 wherein the VLAN management user interface is further operable to enable a user to specify the multiple VLAN domains. 18. The system of claim 10 further comprising:
a VLAN orders data store including data related to VLANs that have been ordered;
a VLAN provisioning data store including data related to VLANs that have been provisioned within the VLAN domain;
a configuration generation data store storing data related to network element configurations; and
wherein the VLAN network services module is operable to correlate data from the VLAN orders data store, the VLAN provisioning data store and the configuration generation data store. | In one embodiment, a computer-implemented method of managing a virtual local area network (VLAN) domain associated with a network is provided. In this embodiment, the method comprises: defining a VLAN domain comprising a list of a plurality of connectively coupled ports of the network associated with the VLAN domain; and assigning at least one VLAN associated with the plurality of connectively coupled ports. In another embodiment, a system for managing virtual local area networks (VLANs) in a network is provided. In this embodiment, the system comprises a network provisioning module for defining a VLAN domain comprising a list of a plurality of connectively coupled ports of the network associated with the VLAN domain and assigning at least one VLAN associated with the plurality of connectively coupled ports. The system further comprises a a network monitoring system operable to gather actual network element configuration data from a plurality of network elements associated with one or more VLAN domains, wherein the actual network element configuration data identifies one or more VLANs that at least some of the plurality of network elements are actually allocated to; and a VLAN services module operable to correlate the actual network element configuration data with administrative VLAN data. The administrative VLAN data identifies one or more VLANs recognized by a business process. In one particular embodiment, the system is further operable to determine one or more VLANs that are not commonly identified in both the actual network element configuration data and the administrative VLAN data.1. A computer-implemented method of managing a virtual local area network (VLAN) domain associated with a network, the method comprising:
defining a VLAN domain comprising a list of a plurality of connectively coupled ports of the network associated with the VLAN domain; and assigning, to the VLAN domain, at least one VLAN associated with the plurality of connectively coupled ports. 2. The computer-implemented method of claim 1 further comprising gathering actual network element configuration data from a plurality of network elements in the network, wherein the actual network element configuration data identifies one or more VLANs to which at least some of the plurality of network elements are allocated. 3. The computer-implemented method of claim 2 further comprising correlating the actual network element configuration data with administrative VLAN data, wherein the administrative VLAN data identifies one or more VLANs recognized by a business process. 4. The computer-implemented method of claim 3 wherein, based on the correlating, determining one or more VLANs that are not commonly identified in both the actual network element configuration data and the administrative VLAN data within the defined VLAN domain. 5. The computer-implemented method of claim 4 further comprising reporting one or more VLANs available to be provisioned for the VLAN domain and the VLANs that at least some of the plurality of network elements are allocated to, wherein reporting comprises indicating the one or more VLANs that are not commonly identified in both the actual network element configuration data and the administrative VLAN data. 6. The computer-implemented method of claim 5 wherein the operation of reporting further comprises indicating one or more VLANs commonly identified in both the administrative VLAN data and the actual network element configuration data. 7. The computer-implemented method of claim 5 wherein the operation of reporting further comprises reporting one or more VLANs identified for each of a plurality of VLAN domains. 8. The computer-implemented method of claim 2 wherein gathering actual network element configuration data comprises polling the plurality of network elements for specified configuration data. 9. The computer-implemented method of claim 2, wherein gathering actual network element configuration data comprises gathering the actual network element configuration data from network elements at a plurality of logical sites. 10. A system for managing virtual local area networks (VLANs) in a network, the system comprising:
a network provisioning module for defining a VLAN domain comprising a list of a plurality of connectively coupled ports of the network associated with the VLAN domain and assigning, to the VLAN domain, at least one VLAN associated with the plurality of connectively coupled ports; a network monitoring system operable to gather actual network element configuration data from a plurality of network elements associated with one or more VLAN domains, wherein the actual network element configuration data identifies one or more VLANs that at least some of the plurality of network elements are allocated to; and a VLAN services module operable to correlate the actual network element configuration data with administrative VLAN data, wherein the administrative VLAN data identifies one or more VLANs recognized by a business process, and further operable to determine one or more VLANs that are not commonly identified in both the actual network element configuration data and the administrative VLAN data. 11. The system of claim 10 further comprising a VLAN management user interface operable to report VLAN status determined by the VLAN services module. 12. The system of claim 11 wherein the VLAN management user interface is further operable to issue a notification that a VLAN is reserved. 13. The system of claim 13 wherein the VLAN management user interface is further operable to receive a reservation request to reserve a specified VLAN. 14. The system of claim 13 wherein the VLAN services modules is further operable to reserve the specified VLAN by marking the VLAN as reserved, assign the specified VLAN to VLAN domain, and allocate one or more specified network elements to the specified VLAN of the VLAN domain. 15. The system of claim 13 wherein the VLAN management user interface is further configured to receive a release request to release a specified VLAN that is currently reserved, and wherein the VLAN management services module is further operable to responsively release the specified VLAN. 16. The system of claim 11 wherein the VLAN management user interface is further operable to simultaneously present VLAN status of VLANs for multiple VLAN domains. 17. The system of claim 16 wherein the VLAN management user interface is further operable to enable a user to specify the multiple VLAN domains. 18. The system of claim 10 further comprising:
a VLAN orders data store including data related to VLANs that have been ordered;
a VLAN provisioning data store including data related to VLANs that have been provisioned within the VLAN domain;
a configuration generation data store storing data related to network element configurations; and
wherein the VLAN network services module is operable to correlate data from the VLAN orders data store, the VLAN provisioning data store and the configuration generation data store. | 2,400 |
7,707 | 7,707 | 14,377,281 | 2,466 | The invention concerns a method for scheduling of radio resources to user terminals (UE 11 -UE 24 ) of different network operators using a scheduling unit, wherein the scheduling unit determines weight parameters for the user terminals (UE 11 -UE 24 ) of the different network operators for scheduling of the radio resources based on a predefined distribution of radio resources among the different network operators (s i ) and at least one data throughput per user terminal in a time interval (T ij ), and the scheduling unit schedules the radio resources to the user terminals (UE 11 -UE 24 ) of the different network operators based on said weight parameters, and a base station therefor. | 1. A method for scheduling of radio resources to user terminals of different network operators using a scheduling unit, wherein
the scheduling unit determines weight parameters for the user terminals of the different network operators for scheduling of the radio resources based on a predefined distribution of radio resources among the different network operators and data throughputs per user terminal in a time interval, and the scheduling unit schedules the radio resources to the user terminals of the different network operators based on said weight parameters. 2. A method according to claim 1, wherein the scheduling unit determines said weight parameters based on used radio resources per user terminal in a time interval. 3. A method according to claim 1, wherein the scheduling unit determines said weight parameters based on agreed or achieved qualities of service per user terminal. 4. A method according to claim 1, wherein the scheduling unit determines said weight parameters based on radio link qualities per user terminal. 5. A method according to claim 1, wherein said predefined distribution of radio resources among the different network operators is set to values out of predefined intervals based on agreed qualities of service for the user terminals of the different network operators. 6. A method according to claim 1, wherein said scheduling of the radio resources to user terminals of different network operators is performed in a single scheduling. 7. A method according to claim 1, wherein in a first scheduling, the radio resources are scheduled to the different network operators based on said predefined distribution of radio resources among the different network operators, and in a second scheduling, the radio resources are scheduled per network operator to the user terminals based on said data throughputs per user terminal in the time interval. 8. A method according to claim 7, wherein for the first scheduling round robin scheduling is used, and for the second scheduling proportional fair scheduling is used. 9. A method according to claim 1, wherein said scheduling unit is a proportional fair scheduling unit. 10. A method according to claim 1, wherein said data throughputs are determined based on forgetting factors. 11. A method according to claim 1, wherein said data throughputs are weighted with at least one of a group of used radio resources per user terminal and achieved qualities of service per user terminal. 12. A method according to claim 1, wherein information about a performed scheduling of the radio resources on a time-scale of several scheduling intervals is used by the scheduling unit for determination of said weight parameters. 13. A method according to claim 1, wherein said information about a performed scheduling of the radio resources is transmitted to the different network operators and used for billing. 14. A method according to claim 1, wherein said scheduling is performed on at least one of a group of internet protocol layer, medium access control layer, and physical layer. 15. A base station comprising a scheduling unit for scheduling of radio resources to user terminals of different network operators, wherein
the scheduling unit is adapted to determine weight parameters for the user terminals of the different network operators for scheduling of the radio resources based on a predefined distribution of radio resources among the different network operators and data throughputs per user terminal in a time interval, and the scheduling unit is adapted to schedule the radio resources the user terminals of the different network operators based on said weight parameters. | The invention concerns a method for scheduling of radio resources to user terminals (UE 11 -UE 24 ) of different network operators using a scheduling unit, wherein the scheduling unit determines weight parameters for the user terminals (UE 11 -UE 24 ) of the different network operators for scheduling of the radio resources based on a predefined distribution of radio resources among the different network operators (s i ) and at least one data throughput per user terminal in a time interval (T ij ), and the scheduling unit schedules the radio resources to the user terminals (UE 11 -UE 24 ) of the different network operators based on said weight parameters, and a base station therefor.1. A method for scheduling of radio resources to user terminals of different network operators using a scheduling unit, wherein
the scheduling unit determines weight parameters for the user terminals of the different network operators for scheduling of the radio resources based on a predefined distribution of radio resources among the different network operators and data throughputs per user terminal in a time interval, and the scheduling unit schedules the radio resources to the user terminals of the different network operators based on said weight parameters. 2. A method according to claim 1, wherein the scheduling unit determines said weight parameters based on used radio resources per user terminal in a time interval. 3. A method according to claim 1, wherein the scheduling unit determines said weight parameters based on agreed or achieved qualities of service per user terminal. 4. A method according to claim 1, wherein the scheduling unit determines said weight parameters based on radio link qualities per user terminal. 5. A method according to claim 1, wherein said predefined distribution of radio resources among the different network operators is set to values out of predefined intervals based on agreed qualities of service for the user terminals of the different network operators. 6. A method according to claim 1, wherein said scheduling of the radio resources to user terminals of different network operators is performed in a single scheduling. 7. A method according to claim 1, wherein in a first scheduling, the radio resources are scheduled to the different network operators based on said predefined distribution of radio resources among the different network operators, and in a second scheduling, the radio resources are scheduled per network operator to the user terminals based on said data throughputs per user terminal in the time interval. 8. A method according to claim 7, wherein for the first scheduling round robin scheduling is used, and for the second scheduling proportional fair scheduling is used. 9. A method according to claim 1, wherein said scheduling unit is a proportional fair scheduling unit. 10. A method according to claim 1, wherein said data throughputs are determined based on forgetting factors. 11. A method according to claim 1, wherein said data throughputs are weighted with at least one of a group of used radio resources per user terminal and achieved qualities of service per user terminal. 12. A method according to claim 1, wherein information about a performed scheduling of the radio resources on a time-scale of several scheduling intervals is used by the scheduling unit for determination of said weight parameters. 13. A method according to claim 1, wherein said information about a performed scheduling of the radio resources is transmitted to the different network operators and used for billing. 14. A method according to claim 1, wherein said scheduling is performed on at least one of a group of internet protocol layer, medium access control layer, and physical layer. 15. A base station comprising a scheduling unit for scheduling of radio resources to user terminals of different network operators, wherein
the scheduling unit is adapted to determine weight parameters for the user terminals of the different network operators for scheduling of the radio resources based on a predefined distribution of radio resources among the different network operators and data throughputs per user terminal in a time interval, and the scheduling unit is adapted to schedule the radio resources the user terminals of the different network operators based on said weight parameters. | 2,400 |
7,708 | 7,708 | 13,893,836 | 2,458 | Processing electronic mail includes receiving an electronic mail having a read receipt request and determining, using a processor, that the electronic mail includes a read receipt distribution list. The read receipt distribution list specifies at least one sender-defined user including a subset of at least one recipient of the electronic mail. Using the processor, a read receipt is sent to the sender of the electronic mail and to each user specified on the read receipt distribution list responsive to detecting an opening of the electronic mail by at least one recipient of the electronic mail. | 1. A method comprising:
receiving an electronic mail comprising a read receipt request; determining, using a processor, that the electronic mail includes a read receipt distribution list, wherein the read receipt distribution list specifies at least one sender-defined user comprising a subset of at least one recipient of the electronic mail; and sending, using the processor, a read receipt to the sender of the electronic mail and to each user specified on the read receipt distribution list responsive to detecting an opening of the electronic mail by at least one recipient of the electronic mail. 2. The method of claim 1, wherein sending a read receipt to the sender of the electronic mail and to each user specified on the read receipt distribution list comprises sending a read receipt to a selected user that is not the sender or a recipient of the electronic mail. 3. The method of claim 2, wherein the read receipt distribution list specifies the selected user responsive to an input from the sender. 4. The method of claim 2, wherein sending a read receipt to a selected user that is not the sender or a recipient of the electronic mail is performed responsive to a read receipt subscription request from the selected user to receive read receipts for the sender. 5. The method of claim 2, wherein sending a read receipt to a selected user that is not the sender or a recipient of the electronic mail is performed responsive to an automated determination by the processor that the read receipt meets at least one predetermined condition, wherein the selected user is specified by the at least one predetermined condition. 6. The method of claim 5, wherein the at least one predetermined condition comprises determining that the electronic mail is tagged with a predefined tag. 7. The method of claim 1, further comprising:
responsive to detecting a forwarding of the electronic mail from a recipient to a user that is not a recipient or a sender of the electronic mail, providing a notification of the forwarding to the sender of the electronic mail. 8. A system comprising:
a processor programmed to initiate executable operations comprising: receiving an electronic mail comprising a read receipt request; determining that the electronic mail includes a read receipt distribution list, wherein the read receipt distribution list specifies at least one sender-defined user comprising a subset of at least one recipient of the electronic mail; and sending a read receipt to the sender of the electronic mail and to each user specified on the read receipt distribution list responsive to detecting an opening of the electronic mail by at least one recipient of the electronic mail. 9. The system of claim 8, wherein sending a read receipt to the sender of the electronic mail and to each user specified on the read receipt distribution list comprises sending a read receipt to a selected user that is not the sender or a recipient of the electronic mail. 10. The system of claim 9, wherein the read receipt distribution list specifies the selected user responsive to an input from the sender. 11. The system of claim 9, wherein sending a read receipt to a selected user that is not the sender or a recipient of the electronic mail is performed responsive to a read receipt subscription request from the selected user to receive read receipts for the sender. 12. The system of claim 9, wherein sending a read receipt to a selected user that is not the sender or a recipient of the electronic mail is performed responsive to an automated determination by the processor that the read receipt meets at least one predetermined condition, wherein the selected user is specified by the at least one predetermined condition. 13. The system of claim 12, wherein the at least one predetermined condition comprises determining that the electronic mail is tagged with a predefined tag. 14. The system of claim 8, wherein the processor is further programmed to initiate an executable operation comprising:
responsive to detecting a forwarding of the electronic mail from a recipient to a user that is not a recipient or a sender of the electronic mail, providing a notification of the forwarding to the sender of the electronic mail. 15. A computer program product for processing electronic mail, the computer program product comprising a computer readable storage medium having program code stored thereon, the program code executable by a processor to perform a method comprising:
receiving, using the processor, an electronic mail comprising a read receipt request; determining, using the processor, that the electronic mail includes a read receipt distribution list, wherein the read receipt distribution list specifies at least one sender-defined user comprising a subset of at least one recipient of the electronic mail; and sending, using the processor, a read receipt to the sender of the electronic mail and to each user specified on the read receipt distribution list responsive to detecting an opening of the electronic mail by at least one recipient of the electronic mail. 16. The computer program product of claim 15, wherein sending a read receipt to the sender of the electronic mail and to each user specified on the read receipt distribution list comprises sending a read receipt to a selected user that is not the sender or a recipient of the electronic mail. 17. The computer program product of claim 16, wherein the read receipt distribution list specifies the selected user responsive to an input from the sender. 18. The computer program product of claim 16, wherein sending a read receipt to a selected user that is not the sender or a recipient of the electronic mail is performed responsive to a read receipt subscription request from the selected user to receive read receipts for the sender. 19. The computer program product of claim 16, wherein sending a read receipt to a selected user that is not the sender or a recipient of the electronic mail is performed responsive to an automated determination by the processor that the read receipt meets at least one predetermined condition, wherein the selected user is specified by the at least one predetermined condition. 20. The computer program product of claim 19, wherein the at least one predetermined condition comprises determining that the electronic mail is tagged with a predefined tag. | Processing electronic mail includes receiving an electronic mail having a read receipt request and determining, using a processor, that the electronic mail includes a read receipt distribution list. The read receipt distribution list specifies at least one sender-defined user including a subset of at least one recipient of the electronic mail. Using the processor, a read receipt is sent to the sender of the electronic mail and to each user specified on the read receipt distribution list responsive to detecting an opening of the electronic mail by at least one recipient of the electronic mail.1. A method comprising:
receiving an electronic mail comprising a read receipt request; determining, using a processor, that the electronic mail includes a read receipt distribution list, wherein the read receipt distribution list specifies at least one sender-defined user comprising a subset of at least one recipient of the electronic mail; and sending, using the processor, a read receipt to the sender of the electronic mail and to each user specified on the read receipt distribution list responsive to detecting an opening of the electronic mail by at least one recipient of the electronic mail. 2. The method of claim 1, wherein sending a read receipt to the sender of the electronic mail and to each user specified on the read receipt distribution list comprises sending a read receipt to a selected user that is not the sender or a recipient of the electronic mail. 3. The method of claim 2, wherein the read receipt distribution list specifies the selected user responsive to an input from the sender. 4. The method of claim 2, wherein sending a read receipt to a selected user that is not the sender or a recipient of the electronic mail is performed responsive to a read receipt subscription request from the selected user to receive read receipts for the sender. 5. The method of claim 2, wherein sending a read receipt to a selected user that is not the sender or a recipient of the electronic mail is performed responsive to an automated determination by the processor that the read receipt meets at least one predetermined condition, wherein the selected user is specified by the at least one predetermined condition. 6. The method of claim 5, wherein the at least one predetermined condition comprises determining that the electronic mail is tagged with a predefined tag. 7. The method of claim 1, further comprising:
responsive to detecting a forwarding of the electronic mail from a recipient to a user that is not a recipient or a sender of the electronic mail, providing a notification of the forwarding to the sender of the electronic mail. 8. A system comprising:
a processor programmed to initiate executable operations comprising: receiving an electronic mail comprising a read receipt request; determining that the electronic mail includes a read receipt distribution list, wherein the read receipt distribution list specifies at least one sender-defined user comprising a subset of at least one recipient of the electronic mail; and sending a read receipt to the sender of the electronic mail and to each user specified on the read receipt distribution list responsive to detecting an opening of the electronic mail by at least one recipient of the electronic mail. 9. The system of claim 8, wherein sending a read receipt to the sender of the electronic mail and to each user specified on the read receipt distribution list comprises sending a read receipt to a selected user that is not the sender or a recipient of the electronic mail. 10. The system of claim 9, wherein the read receipt distribution list specifies the selected user responsive to an input from the sender. 11. The system of claim 9, wherein sending a read receipt to a selected user that is not the sender or a recipient of the electronic mail is performed responsive to a read receipt subscription request from the selected user to receive read receipts for the sender. 12. The system of claim 9, wherein sending a read receipt to a selected user that is not the sender or a recipient of the electronic mail is performed responsive to an automated determination by the processor that the read receipt meets at least one predetermined condition, wherein the selected user is specified by the at least one predetermined condition. 13. The system of claim 12, wherein the at least one predetermined condition comprises determining that the electronic mail is tagged with a predefined tag. 14. The system of claim 8, wherein the processor is further programmed to initiate an executable operation comprising:
responsive to detecting a forwarding of the electronic mail from a recipient to a user that is not a recipient or a sender of the electronic mail, providing a notification of the forwarding to the sender of the electronic mail. 15. A computer program product for processing electronic mail, the computer program product comprising a computer readable storage medium having program code stored thereon, the program code executable by a processor to perform a method comprising:
receiving, using the processor, an electronic mail comprising a read receipt request; determining, using the processor, that the electronic mail includes a read receipt distribution list, wherein the read receipt distribution list specifies at least one sender-defined user comprising a subset of at least one recipient of the electronic mail; and sending, using the processor, a read receipt to the sender of the electronic mail and to each user specified on the read receipt distribution list responsive to detecting an opening of the electronic mail by at least one recipient of the electronic mail. 16. The computer program product of claim 15, wherein sending a read receipt to the sender of the electronic mail and to each user specified on the read receipt distribution list comprises sending a read receipt to a selected user that is not the sender or a recipient of the electronic mail. 17. The computer program product of claim 16, wherein the read receipt distribution list specifies the selected user responsive to an input from the sender. 18. The computer program product of claim 16, wherein sending a read receipt to a selected user that is not the sender or a recipient of the electronic mail is performed responsive to a read receipt subscription request from the selected user to receive read receipts for the sender. 19. The computer program product of claim 16, wherein sending a read receipt to a selected user that is not the sender or a recipient of the electronic mail is performed responsive to an automated determination by the processor that the read receipt meets at least one predetermined condition, wherein the selected user is specified by the at least one predetermined condition. 20. The computer program product of claim 19, wherein the at least one predetermined condition comprises determining that the electronic mail is tagged with a predefined tag. | 2,400 |
7,709 | 7,709 | 13,826,068 | 2,449 | Methods, systems, computer readable media, and apparatuses that manage distributed computing tasks based on information received at lower levels of the Open Systems Interconnection (OSI) model are described herein. Some embodiments relate to using a Data Over Cable Service Interface Specification (DOCSIS) capable device to manage distributed computing tasks at Layer 2. For example, registered device may send ranging requests a termination system that include additional information related to the capacity and ability for a registered device to handle a resource associated with a distributed computing task. Based on the information included in the ranging request, the system may determine that the registered device is available for resource data and, thereafter, may distribute the resource to the registered device in connection with performing the distributed computing task. | 1. A method, comprising:
receiving, by a first computing device, a data link layer message from a second computing device; based on at least some information included in the data link layer message, determining that the second computing device is available for resource data associated with a distributed computing task; and transmitting at least a portion of the resource data to the second computing device. 2. The method of claim 1, wherein the first computing device includes a termination system, wherein the second computing device includes a gateway device or modem, and wherein the second computing device is registered with the termination system. 3. The method of claim 1, wherein the data link layer message is a ranging request conforming to a Data Over Cable Service Interface Specification (DOCSIS) standard. 4. The method of claim 3, further comprising:
performing the distributed computing task with a plurality of computing devices of a network, wherein the distributed computing task is a task to distribute portions of the resource data for storage at the plurality of computing devices or a task to transcode portions of the resource data at the plurality of computing devices. 5. The method of claim 1, wherein the data link layer message includes information describing available memory of the second computing device and information describing computational resources of the second computing device, and wherein determining that the second computing device is available for the resource data includes:
determining that the available memory of the second computing device is above a minimum required for the resource data, and determining that the computational resources of the second computing device is above a minimum required for performing the distributed computing task. 6. The method of claim 1, wherein determining that the second computing device is available for the resource data is further based on DOCSIS SYNC information or a DOCSIS station maintenance message. 7. The method of claim 1, wherein the distributed computing task includes a storage task and the method further comprises:
receiving a request for the resource data; transmitting a request for at least the portion of the resource data to the second computing device; receiving at least the portion of the resource data from the second computing device; determining that all portions have been received; responsive to determining that all portions have been received, recomposing the resource data from at least the portion of the resource data and one or more other portions of the resource data; and transmitting the resource data as a response to the request. 8. The method of claim 1, wherein the distributed computing task includes a transcoding task and the method further comprises:
receiving at least a transcoded portion of the resource data from the second computing device; determining that all transcoded portions have been received; and responsive to determining that all transcoded portions have been received, composing a transcoded resource data from at least the transcoded portion of the resource data and one or more other transcoded portions of the resource data. 9. The method of claim 9, wherein the resource data is a video, wherein the transcoding task is performed as part of a process for ingesting the video into a video-on-demand service, and wherein a user device that performed the transcoding task is able to access the video via the video-on-demand service. 10. A method, comprising:
registering, by a first computing device, a second computing device; transmitting a station management MAP message to the second computing device; determining that a ranging request has been received from the second computing device, wherein the ranging request includes capacity and ability information for at least the second computing device; based on at least the capacity and ability information, determining that the second computing device is available for resource data associated with a distributed computing task; and updating network topology information by indicating the second computing device as available for the resource data. 11. The method of claim 10, wherein the first computing device includes a termination system, wherein the second computing device includes a gateway device or modem, and wherein registering the second computing device includes registering the second computing device with the termination system. 12. The method of claim 10, wherein the ranging request conforms to a Data Over Cable Service Interface Specification (DOCSIS) standard. 13. The method of claim 10, wherein the capacity and ability information includes information describing available memory of the second computing device and information describing computational resources of the second computing device, and wherein determining that the second computing device is available for the resource data associated with the distributed computing task includes:
determining that the available memory of the second computing device is above a minimum required for the resource data, and determining that the computational resources of the second computing device is above a minimum required for performing the distributed computing task. 14. The method of claim 10, wherein the distributed computing task includes a transcoding task or a storage task. 15. The method of claim 10, wherein determining that the second computing device is available for resource data associated with the distributed computing task is further based on DOCSIS SYNC information or a DOCSIS station maintenance message. 16. A method, comprising:
determining, by a Layer 2 device, a resource and a distributed computing task to perform on the resource; selecting one or more computing devices that will receive data of the resource based on network topology information that includes an indication for each of the one or more computing devices that it is available for resource data, and includes an indication for each of the one or more computing devices that describes its capability; decompose the resource into at least one resource portion; providing, to the one or more computing devices, the at least one resource portion and an indication of the distributed computing task; and maintaining information enabling the at least one resource portion to be retrieved from the one or more computing devices. 17. The method of claim 16, wherein the Layer 2 device includes a termination system, wherein each of the one or more computing devices includes a gateway device or modem, and wherein each of the one or more computing devices is registered with the termination system. 18. The method of claim 16, wherein the indication for each of the one or more computing devices that it is available for resource data is based on information received by the Layer 2 device at Layer 2, and the indication for each of the one or more computing devices that describes its capability is based on information received by the Layer 2 device at Layer 2. 19. The method claim 16, further comprising determining that each of the one or more computing devices is available for resource data, wherein determining that the different device is available for the resource data includes:
determining that available memory of each of the one or more computing devices is above a minimum required for the resource data, and determining that computational resources of each of the one or more computing devices is above a minimum required for performing the distributed computing task. 20. The method of claim 16, wherein the distributed computing task includes a transcoding task or a storage task. | Methods, systems, computer readable media, and apparatuses that manage distributed computing tasks based on information received at lower levels of the Open Systems Interconnection (OSI) model are described herein. Some embodiments relate to using a Data Over Cable Service Interface Specification (DOCSIS) capable device to manage distributed computing tasks at Layer 2. For example, registered device may send ranging requests a termination system that include additional information related to the capacity and ability for a registered device to handle a resource associated with a distributed computing task. Based on the information included in the ranging request, the system may determine that the registered device is available for resource data and, thereafter, may distribute the resource to the registered device in connection with performing the distributed computing task.1. A method, comprising:
receiving, by a first computing device, a data link layer message from a second computing device; based on at least some information included in the data link layer message, determining that the second computing device is available for resource data associated with a distributed computing task; and transmitting at least a portion of the resource data to the second computing device. 2. The method of claim 1, wherein the first computing device includes a termination system, wherein the second computing device includes a gateway device or modem, and wherein the second computing device is registered with the termination system. 3. The method of claim 1, wherein the data link layer message is a ranging request conforming to a Data Over Cable Service Interface Specification (DOCSIS) standard. 4. The method of claim 3, further comprising:
performing the distributed computing task with a plurality of computing devices of a network, wherein the distributed computing task is a task to distribute portions of the resource data for storage at the plurality of computing devices or a task to transcode portions of the resource data at the plurality of computing devices. 5. The method of claim 1, wherein the data link layer message includes information describing available memory of the second computing device and information describing computational resources of the second computing device, and wherein determining that the second computing device is available for the resource data includes:
determining that the available memory of the second computing device is above a minimum required for the resource data, and determining that the computational resources of the second computing device is above a minimum required for performing the distributed computing task. 6. The method of claim 1, wherein determining that the second computing device is available for the resource data is further based on DOCSIS SYNC information or a DOCSIS station maintenance message. 7. The method of claim 1, wherein the distributed computing task includes a storage task and the method further comprises:
receiving a request for the resource data; transmitting a request for at least the portion of the resource data to the second computing device; receiving at least the portion of the resource data from the second computing device; determining that all portions have been received; responsive to determining that all portions have been received, recomposing the resource data from at least the portion of the resource data and one or more other portions of the resource data; and transmitting the resource data as a response to the request. 8. The method of claim 1, wherein the distributed computing task includes a transcoding task and the method further comprises:
receiving at least a transcoded portion of the resource data from the second computing device; determining that all transcoded portions have been received; and responsive to determining that all transcoded portions have been received, composing a transcoded resource data from at least the transcoded portion of the resource data and one or more other transcoded portions of the resource data. 9. The method of claim 9, wherein the resource data is a video, wherein the transcoding task is performed as part of a process for ingesting the video into a video-on-demand service, and wherein a user device that performed the transcoding task is able to access the video via the video-on-demand service. 10. A method, comprising:
registering, by a first computing device, a second computing device; transmitting a station management MAP message to the second computing device; determining that a ranging request has been received from the second computing device, wherein the ranging request includes capacity and ability information for at least the second computing device; based on at least the capacity and ability information, determining that the second computing device is available for resource data associated with a distributed computing task; and updating network topology information by indicating the second computing device as available for the resource data. 11. The method of claim 10, wherein the first computing device includes a termination system, wherein the second computing device includes a gateway device or modem, and wherein registering the second computing device includes registering the second computing device with the termination system. 12. The method of claim 10, wherein the ranging request conforms to a Data Over Cable Service Interface Specification (DOCSIS) standard. 13. The method of claim 10, wherein the capacity and ability information includes information describing available memory of the second computing device and information describing computational resources of the second computing device, and wherein determining that the second computing device is available for the resource data associated with the distributed computing task includes:
determining that the available memory of the second computing device is above a minimum required for the resource data, and determining that the computational resources of the second computing device is above a minimum required for performing the distributed computing task. 14. The method of claim 10, wherein the distributed computing task includes a transcoding task or a storage task. 15. The method of claim 10, wherein determining that the second computing device is available for resource data associated with the distributed computing task is further based on DOCSIS SYNC information or a DOCSIS station maintenance message. 16. A method, comprising:
determining, by a Layer 2 device, a resource and a distributed computing task to perform on the resource; selecting one or more computing devices that will receive data of the resource based on network topology information that includes an indication for each of the one or more computing devices that it is available for resource data, and includes an indication for each of the one or more computing devices that describes its capability; decompose the resource into at least one resource portion; providing, to the one or more computing devices, the at least one resource portion and an indication of the distributed computing task; and maintaining information enabling the at least one resource portion to be retrieved from the one or more computing devices. 17. The method of claim 16, wherein the Layer 2 device includes a termination system, wherein each of the one or more computing devices includes a gateway device or modem, and wherein each of the one or more computing devices is registered with the termination system. 18. The method of claim 16, wherein the indication for each of the one or more computing devices that it is available for resource data is based on information received by the Layer 2 device at Layer 2, and the indication for each of the one or more computing devices that describes its capability is based on information received by the Layer 2 device at Layer 2. 19. The method claim 16, further comprising determining that each of the one or more computing devices is available for resource data, wherein determining that the different device is available for the resource data includes:
determining that available memory of each of the one or more computing devices is above a minimum required for the resource data, and determining that computational resources of each of the one or more computing devices is above a minimum required for performing the distributed computing task. 20. The method of claim 16, wherein the distributed computing task includes a transcoding task or a storage task. | 2,400 |
7,710 | 7,710 | 15,171,896 | 2,424 | An embodiment for recording a channel that is communicating a program of interest identifies a selected program for recording as a program of interest based upon a characteristic of the selected program, the characteristic of the selected program corresponding to at least one characteristic associated with the program of interest; records an advance period corresponding to a period before a beginning of the program of interest, and records a following period corresponding to a period after a conclusion of the program of interest. | 1. A method for recording programs, comprising:
identifying a program selected for recording as a program of interest based upon the program selected for recording having at least one characteristic corresponding to at least one characteristic of a previous program for which at least one of an advance period associated with the previous program or a following period associated with the previous program was recorded; recording an advance period associated with the program of interest, the advance period corresponding to a period before a beginning of the program of interest; and recording a following period associated with the program of interest, the following period corresponding to a period after a conclusion of the program of interest; receiving an indication from a user to initiate a process of retrieving and presenting the program of interest; in response to the receiving the indication from the user to initiate a process of retrieving and presenting the program of interest, before any presentation of the program of interest, enabling the user to choose which of the recorded advance period, the program of interest, and the recorded following period are selected for presentation; if the user chooses only the recorded advance period, retrieving and presenting only the recorded advance period and neither the program of interest nor the recorded following period in response to the user choosing only the recorded advance period; and if the user choses only the program of interest, retrieving and presenting only the program of interest and neither the recorded advance period nor the recorded following period in response to the user choosing only the program of interest. 2. The method of claim 1, wherein recording the advance period comprises:
starting recording of the advance period associated with the program of interest at a first time that precedes a scheduled start time of the program of interest; and ending recording of the advance period associated with the program of interest at a second time that corresponds to the scheduled start time of the program of interest. 3. The method of claim 1 wherein recording the following period comprises:
starting recording of the following period associated with the program of interest at a first time that corresponds to the scheduled end time of the program of interest; and
ending recording of the following period associated with the program of interest at a second time that is after the scheduled end time of the program of interest. 4. The method of claim 1, comprising:
recording the program of interest starting at the scheduled start time and ending at a scheduled end time. 5. The method of claim 1, comprising:
storing the recorded advance period associated with the program of interest into a first portion of a memory; storing the program of interest into a second portion of the memory; and storing the recorded following period associated with the program of interest into a third portion of the memory. 6. The method of claim 1, comprising:
storing the recorded advance period associated with the program of interest into a first portion of a first memory; and storing the recorded following period associated with the program of interest into a second portion of the first memory, wherein the program of interest is stored into a second memory. 7. The method of claim 1, comprising:
adjusting the advance period associated with the program of interest based upon another characteristic of the program. 8. The method of claim 1, comprising:
adjusting the following period associated with the program of interest based upon another characteristic of the program. 9. The method of claim 1, wherein the enabling the user to choose which of the recorded advance period, the program of interest, and the recorded following period are selected for presentation includes:
in response to the receiving the indication from the user to initiate a process of retrieving and presenting the program of interest, before any presentation of the program of interest, communicating a notification message on a presentation device, the notification message including first selectable region which indicates to the user selectability of the recorded advance period associated with the program of interest, a second selectable region which indicates to the user selectability of the program of interest and a third selectable region which indicates to the user selectability of recorded following period associated with the program of interest; and receiving an indication from the user of the which of the recorded advance period, the program of interest and the recorded following period are selected for presentation according to a received indication of a corresponding selection by the user of one or more of the first selectable region, second selectable region and the third selectable region. 10. The method of claim 9, further comprising:
receiving a selection from the user of the first selectable region and not the second or third selectable region; and in response to receiving the selection from the user of the first selectable region, but not the second or third selectable region, retrieving and presenting on the presentation device the recorded advance period and not the program of interest or recorded following period. 11. The method of claim 9, further comprising:
receiving a selection from the user of the second selectable region and not the first or third selectable region; and in response to receiving the selection from the user of the second selectable region, but not the first or third selectable region, retrieving and presenting on the presentation device the program of interest, but not the recorded advance period or recorded following period. 12. The method of claim 1, further comprising:
receiving a selection from the user of an order in which the recorded advance period, program of interest, and recorded following period are to be played back; and in response to receiving the selection from the user of the order in which the recorded advance period, program of interest, and recorded following period are to be played back, playing back the recorded advance period, program of interest, and recorded following period according to the selection from the user of the order in which the recorded advance period, program of interest, and recorded following period are to be played back. 13. The method of claim 1, further comprising:
if the user chooses only the recorded following period in response to the enabling the user to choose which of the recorded advance period, the program of interest, and the recorded following period are selected for presentation, then retrieving and presenting, before any presentation of the program of interest, only the recorded following period and neither the program of interest nor the recorded advance period in response to the user choosing only the recorded following period. 14. The method of claim 1 wherein identifying the selected program for recording as a program of interest comprises:
receiving electronic descriptor information associated with the selected program;
comparing the received electronic descriptor information with characteristics associated with the previous program for which at least one of the advance period associated with the previous program or the following period associated with the previous program was recorded; and
identifying the selected program as the program of interest in response to a match of the electronic descriptor information with the at least one characteristic of the previous program. 15. The method of claim 1 wherein identifying the selected program for recording as a program of interest comprises:
receiving electronically, a user specification that the selected program is the program of interest. 16. A system which records a program, comprising:
a receiving device operable to receive a program selected for recording; and a processor operable to compare at least one characteristic of the program selected for recording with a plurality of program characteristics, and in response to the at least one characteristic of the program selected for recording matching one of the plurality of program characteristics, and in response to the program selected for recording having at least one characteristic corresponding to at least one characteristic of a previous program for which at least one of an advance period associated with the previous program or a following period associated with the previous program was recorded, is operable to:
identify the program selected for recording as a program of interest;
control recording of at least an advance period associated with the program of interest that precedes a scheduled start time of the program of interest; and
record a following period associated with the program of interest that follows a scheduled end time of the program of interest;
receive an indication from a user to initiate a process of retrieving and presenting the program of interest;
in response to the received indication from the user to initiate a process of retrieving and presenting the program of interest, before any presentation of the program of interest, enable the user to choose which of the recorded advance period, the program of interest, and the recorded following period are selected for presentation;
if the user chooses only the recorded advance period, retrieve and present only the recorded advance period and neither the program of interest nor the recorded following period in response to the user choosing only the recorded advance period;
if the user choses only the program of interest, retrieve and present only the program of interest and neither the recorded advance period nor the recorded following period in response to the user choosing only the program of interest; and 17. The system of claim 16 wherein the memory has a database populated with the database characteristics associated with the program of interest. 18. The system of claim 16, comprising:
a first tuner operable to tune to a first channel having the program of interest so that the advance period associated with the program of interest and the following period associated with the program of interest are recorded. 19. The system of claim 16, comprising:
a memory populated with an extended time recording (ETR) notification message, wherein the ETR notification message is displayed on a display device when the recorded program of interest is retrieved for play back, and wherein the ETR notification message indicates the advance period associated with the program of interest and the following period associated with the program of interest are available for play back. 20. The system of claim 16, comprising:
a memory operable to store the recorded advance period associated with the program of interest and the recorded following period associated with the program of interest. 21. The system of claim 16, comprising:
an external recording device coupled to the receiving device and operable to store the recorded advance period associated with the program of interest and the recorded following period associated with the program of interest. 22. The system of claim 16, comprising:
an external recording device coupled to the receiving device and operable to store the recorded advance period associated with the program of interest, the recorded program of interest and the recorded following period associated with the program of interest. 23. The system of claim 16, comprising:
a recording device residing in the receiving device and operable to store the recorded advance period associated with the program of interest and the recorded following period associated with the program of interest. 24. The system of claim 16, comprising:
a recording device residing in the receiving device and operable to store the recorded advance period associated with the program of interest, the recorded program of interest and the recorded following period associated with the program of interest. 25. A method for recording programs, comprising:
identifying a program selected for recording as a program of interest based upon the program selected for recording having at least one characteristic corresponding to at least one characteristic of a previous program for which at least one of an advance period associated with the previous program or a following period associated with the previous program was recorded; determining a first amount of memory capacity in a memory device for recording the program of interest; determining a second amount of memory capacity in the memory device for recording an advance period associated with the program of interest and corresponding to a period before a beginning of the program of interest; determining a third amount of memory capacity in the memory device for recording a following period associated with the program of interest corresponding to a period after a conclusion of the program of interest; determining an available memory capacity of the memory device in excess of the first amount of memory capacity for recording the program of interest; and recording the advance period associated with the program of interest and the following period associated with the program of interest when the available memory capacity is greater than the second amount of memory capacity and the third amount of memory capacity; receiving an indication from a user to initiate a process of retrieving and presenting the program of interest; in response to the receiving the indication from the user to initiate a process of retrieving and presenting the program of interest, before any presentation of the program of interest, enabling the user to choose which of the recorded advance period, the program of interest, and the recorded following period are selected for presentation; and if the user chooses only the recorded advance period, retrieving and presenting only the recorded advance period and neither the program of interest nor the recorded following period in response to the user choosing only the recorded advance period; if the user choses only the program of interest, retrieving and presenting only the program of interest and neither the recorded advance period nor the recorded following period in response to the user choosing only the program of interest; 26. The method of claim 25 comprising:
in response to the available memory capacity being less than the second amount of memory capacity and the third amount of memory capacity, recording the advance period associated with the program of interest and the following period associated with the program of interest until the available memory capacity is utilized. 27. The method of claim 25 comprising:
in response to the available memory capacity being less than the second amount of memory capacity and the third amount of memory capacity, adjusting at least one of the advance period associated with the program of interest and the following period associated with the program of interest so that the second memory capacity and the third memory capacity are at least less than the determined available memory capacity. 28. The method of claim 25 wherein determining an available memory capacity in excess of the first amount of memory capacity comprises:
identifying unrecorded memory capacity in the memory such that the available memory capacity includes the unrecorded memory capacity. 29. The method of claim 25 wherein determining an available memory capacity in excess of the first amount of memory capacity comprises:
identifying recorded memory capacity in the memory associated with programming recorded earlier than a time threshold, such that the available memory capacity includes the recorded memory capacity associated with programming recorded earlier than a time threshold. 30. The method of claim 25 wherein determining an available memory capacity in excess of the first amount of memory capacity comprises:
identifying unrecorded memory capacity in the memory;
identifying recorded memory capacity in the memory associated with programming recorded earlier than a time threshold; and
recording the advance period and the following period into the unrecorded memory capacity until the unrecorded memory capacity is utilized, and then recording the remainder of the advance period and the following period into the recorded memory capacity. | An embodiment for recording a channel that is communicating a program of interest identifies a selected program for recording as a program of interest based upon a characteristic of the selected program, the characteristic of the selected program corresponding to at least one characteristic associated with the program of interest; records an advance period corresponding to a period before a beginning of the program of interest, and records a following period corresponding to a period after a conclusion of the program of interest.1. A method for recording programs, comprising:
identifying a program selected for recording as a program of interest based upon the program selected for recording having at least one characteristic corresponding to at least one characteristic of a previous program for which at least one of an advance period associated with the previous program or a following period associated with the previous program was recorded; recording an advance period associated with the program of interest, the advance period corresponding to a period before a beginning of the program of interest; and recording a following period associated with the program of interest, the following period corresponding to a period after a conclusion of the program of interest; receiving an indication from a user to initiate a process of retrieving and presenting the program of interest; in response to the receiving the indication from the user to initiate a process of retrieving and presenting the program of interest, before any presentation of the program of interest, enabling the user to choose which of the recorded advance period, the program of interest, and the recorded following period are selected for presentation; if the user chooses only the recorded advance period, retrieving and presenting only the recorded advance period and neither the program of interest nor the recorded following period in response to the user choosing only the recorded advance period; and if the user choses only the program of interest, retrieving and presenting only the program of interest and neither the recorded advance period nor the recorded following period in response to the user choosing only the program of interest. 2. The method of claim 1, wherein recording the advance period comprises:
starting recording of the advance period associated with the program of interest at a first time that precedes a scheduled start time of the program of interest; and ending recording of the advance period associated with the program of interest at a second time that corresponds to the scheduled start time of the program of interest. 3. The method of claim 1 wherein recording the following period comprises:
starting recording of the following period associated with the program of interest at a first time that corresponds to the scheduled end time of the program of interest; and
ending recording of the following period associated with the program of interest at a second time that is after the scheduled end time of the program of interest. 4. The method of claim 1, comprising:
recording the program of interest starting at the scheduled start time and ending at a scheduled end time. 5. The method of claim 1, comprising:
storing the recorded advance period associated with the program of interest into a first portion of a memory; storing the program of interest into a second portion of the memory; and storing the recorded following period associated with the program of interest into a third portion of the memory. 6. The method of claim 1, comprising:
storing the recorded advance period associated with the program of interest into a first portion of a first memory; and storing the recorded following period associated with the program of interest into a second portion of the first memory, wherein the program of interest is stored into a second memory. 7. The method of claim 1, comprising:
adjusting the advance period associated with the program of interest based upon another characteristic of the program. 8. The method of claim 1, comprising:
adjusting the following period associated with the program of interest based upon another characteristic of the program. 9. The method of claim 1, wherein the enabling the user to choose which of the recorded advance period, the program of interest, and the recorded following period are selected for presentation includes:
in response to the receiving the indication from the user to initiate a process of retrieving and presenting the program of interest, before any presentation of the program of interest, communicating a notification message on a presentation device, the notification message including first selectable region which indicates to the user selectability of the recorded advance period associated with the program of interest, a second selectable region which indicates to the user selectability of the program of interest and a third selectable region which indicates to the user selectability of recorded following period associated with the program of interest; and receiving an indication from the user of the which of the recorded advance period, the program of interest and the recorded following period are selected for presentation according to a received indication of a corresponding selection by the user of one or more of the first selectable region, second selectable region and the third selectable region. 10. The method of claim 9, further comprising:
receiving a selection from the user of the first selectable region and not the second or third selectable region; and in response to receiving the selection from the user of the first selectable region, but not the second or third selectable region, retrieving and presenting on the presentation device the recorded advance period and not the program of interest or recorded following period. 11. The method of claim 9, further comprising:
receiving a selection from the user of the second selectable region and not the first or third selectable region; and in response to receiving the selection from the user of the second selectable region, but not the first or third selectable region, retrieving and presenting on the presentation device the program of interest, but not the recorded advance period or recorded following period. 12. The method of claim 1, further comprising:
receiving a selection from the user of an order in which the recorded advance period, program of interest, and recorded following period are to be played back; and in response to receiving the selection from the user of the order in which the recorded advance period, program of interest, and recorded following period are to be played back, playing back the recorded advance period, program of interest, and recorded following period according to the selection from the user of the order in which the recorded advance period, program of interest, and recorded following period are to be played back. 13. The method of claim 1, further comprising:
if the user chooses only the recorded following period in response to the enabling the user to choose which of the recorded advance period, the program of interest, and the recorded following period are selected for presentation, then retrieving and presenting, before any presentation of the program of interest, only the recorded following period and neither the program of interest nor the recorded advance period in response to the user choosing only the recorded following period. 14. The method of claim 1 wherein identifying the selected program for recording as a program of interest comprises:
receiving electronic descriptor information associated with the selected program;
comparing the received electronic descriptor information with characteristics associated with the previous program for which at least one of the advance period associated with the previous program or the following period associated with the previous program was recorded; and
identifying the selected program as the program of interest in response to a match of the electronic descriptor information with the at least one characteristic of the previous program. 15. The method of claim 1 wherein identifying the selected program for recording as a program of interest comprises:
receiving electronically, a user specification that the selected program is the program of interest. 16. A system which records a program, comprising:
a receiving device operable to receive a program selected for recording; and a processor operable to compare at least one characteristic of the program selected for recording with a plurality of program characteristics, and in response to the at least one characteristic of the program selected for recording matching one of the plurality of program characteristics, and in response to the program selected for recording having at least one characteristic corresponding to at least one characteristic of a previous program for which at least one of an advance period associated with the previous program or a following period associated with the previous program was recorded, is operable to:
identify the program selected for recording as a program of interest;
control recording of at least an advance period associated with the program of interest that precedes a scheduled start time of the program of interest; and
record a following period associated with the program of interest that follows a scheduled end time of the program of interest;
receive an indication from a user to initiate a process of retrieving and presenting the program of interest;
in response to the received indication from the user to initiate a process of retrieving and presenting the program of interest, before any presentation of the program of interest, enable the user to choose which of the recorded advance period, the program of interest, and the recorded following period are selected for presentation;
if the user chooses only the recorded advance period, retrieve and present only the recorded advance period and neither the program of interest nor the recorded following period in response to the user choosing only the recorded advance period;
if the user choses only the program of interest, retrieve and present only the program of interest and neither the recorded advance period nor the recorded following period in response to the user choosing only the program of interest; and 17. The system of claim 16 wherein the memory has a database populated with the database characteristics associated with the program of interest. 18. The system of claim 16, comprising:
a first tuner operable to tune to a first channel having the program of interest so that the advance period associated with the program of interest and the following period associated with the program of interest are recorded. 19. The system of claim 16, comprising:
a memory populated with an extended time recording (ETR) notification message, wherein the ETR notification message is displayed on a display device when the recorded program of interest is retrieved for play back, and wherein the ETR notification message indicates the advance period associated with the program of interest and the following period associated with the program of interest are available for play back. 20. The system of claim 16, comprising:
a memory operable to store the recorded advance period associated with the program of interest and the recorded following period associated with the program of interest. 21. The system of claim 16, comprising:
an external recording device coupled to the receiving device and operable to store the recorded advance period associated with the program of interest and the recorded following period associated with the program of interest. 22. The system of claim 16, comprising:
an external recording device coupled to the receiving device and operable to store the recorded advance period associated with the program of interest, the recorded program of interest and the recorded following period associated with the program of interest. 23. The system of claim 16, comprising:
a recording device residing in the receiving device and operable to store the recorded advance period associated with the program of interest and the recorded following period associated with the program of interest. 24. The system of claim 16, comprising:
a recording device residing in the receiving device and operable to store the recorded advance period associated with the program of interest, the recorded program of interest and the recorded following period associated with the program of interest. 25. A method for recording programs, comprising:
identifying a program selected for recording as a program of interest based upon the program selected for recording having at least one characteristic corresponding to at least one characteristic of a previous program for which at least one of an advance period associated with the previous program or a following period associated with the previous program was recorded; determining a first amount of memory capacity in a memory device for recording the program of interest; determining a second amount of memory capacity in the memory device for recording an advance period associated with the program of interest and corresponding to a period before a beginning of the program of interest; determining a third amount of memory capacity in the memory device for recording a following period associated with the program of interest corresponding to a period after a conclusion of the program of interest; determining an available memory capacity of the memory device in excess of the first amount of memory capacity for recording the program of interest; and recording the advance period associated with the program of interest and the following period associated with the program of interest when the available memory capacity is greater than the second amount of memory capacity and the third amount of memory capacity; receiving an indication from a user to initiate a process of retrieving and presenting the program of interest; in response to the receiving the indication from the user to initiate a process of retrieving and presenting the program of interest, before any presentation of the program of interest, enabling the user to choose which of the recorded advance period, the program of interest, and the recorded following period are selected for presentation; and if the user chooses only the recorded advance period, retrieving and presenting only the recorded advance period and neither the program of interest nor the recorded following period in response to the user choosing only the recorded advance period; if the user choses only the program of interest, retrieving and presenting only the program of interest and neither the recorded advance period nor the recorded following period in response to the user choosing only the program of interest; 26. The method of claim 25 comprising:
in response to the available memory capacity being less than the second amount of memory capacity and the third amount of memory capacity, recording the advance period associated with the program of interest and the following period associated with the program of interest until the available memory capacity is utilized. 27. The method of claim 25 comprising:
in response to the available memory capacity being less than the second amount of memory capacity and the third amount of memory capacity, adjusting at least one of the advance period associated with the program of interest and the following period associated with the program of interest so that the second memory capacity and the third memory capacity are at least less than the determined available memory capacity. 28. The method of claim 25 wherein determining an available memory capacity in excess of the first amount of memory capacity comprises:
identifying unrecorded memory capacity in the memory such that the available memory capacity includes the unrecorded memory capacity. 29. The method of claim 25 wherein determining an available memory capacity in excess of the first amount of memory capacity comprises:
identifying recorded memory capacity in the memory associated with programming recorded earlier than a time threshold, such that the available memory capacity includes the recorded memory capacity associated with programming recorded earlier than a time threshold. 30. The method of claim 25 wherein determining an available memory capacity in excess of the first amount of memory capacity comprises:
identifying unrecorded memory capacity in the memory;
identifying recorded memory capacity in the memory associated with programming recorded earlier than a time threshold; and
recording the advance period and the following period into the unrecorded memory capacity until the unrecorded memory capacity is utilized, and then recording the remainder of the advance period and the following period into the recorded memory capacity. | 2,400 |
7,711 | 7,711 | 13,957,620 | 2,461 | A user equipment detects that an aggregate of calculated uplink transmit power of the UE exceeds a threshold. In response to the detecting, a power of at least one of a plurality of frequency-division multiplexing (FDM)-based uplink transmissions of the UE over corresponding wireless connections with respective wireless access network nodes is adjusted. | 1. A method of a user equipment (UE), the method comprising:
detecting that an aggregate of calculated uplink transmit power of the UE exceeds a threshold; and in response to the detecting, adjusting a power of at least one of a plurality of frequency-division multiplexing (FDM)-based uplink transmissions of the UE over corresponding wireless connections with respective wireless access network nodes. 2. The method of claim 1 wherein at least two of the wireless access network nodes have respective separate schedulers. 3. The method of claim 1, wherein the adjusting comprises reducing the power of the at least one uplink transmission or dropping the at least one uplink transmission. 4. The method of claim 1, wherein the uplink transmissions are concurrent uplink transmissions that overlap fully or partially in time. 5. The method of claim 1, wherein a first of the wireless access network nodes provides carrier aggregation having component carriers, and the concurrent uplink transmissions include plural uplink transmissions over wireless connections with the component carriers of the first wireless access network node. 6. The method of claim 1, wherein the adjusting is according to at least one prioritization rule specifying priority of at least one of the uplink transmissions. 7. The method of claim 6, wherein the adjusting is according to the at least one prioritization rule specifying that a first uplink control channel transmission or traffic channel transmission containing acknowledgment information has a higher priority than a second uplink control channel transmission or traffic channel transmission without acknowledgment information. 8. The method of claim 6, wherein the adjusting is according to the at least one prioritization rule specifying that a first uplink traffic channel transmission containing uplink control information has a higher priority than a second uplink traffic channel transmission without uplink control information. 9. The method of claim 6, wherein the adjusting is according to the at least one prioritization rule specifying that an uplink traffic channel transmission containing channel state information but without acknowledgment information has a higher priority than an uplink control channel transmission containing channel state information but without acknowledgement information. 10. The method of claim 6, wherein the adjusting is according to the at least one prioritization rule specifying that a first resource element associated with acknowledgement information contained in an uplink traffic channel transmission has a higher priority than a second resource element with traffic data contained in the uplink traffic channel transmission. 11. The method of claim 6, wherein the uplink transmissions comprise a first uplink transmission and a sounding reference signal transmission, wherein the first uplink transmission includes one or both of an uplink traffic channel transmission and an uplink control channel transmission, and wherein the adjusting reduces a power of the sounding reference signal transmission or drops the sounding reference signal transmission. 12. The method of claim 6, wherein the uplink transmissions comprise a first uplink transmission and a sounding reference signal transmission, wherein the first uplink transmission comprises one or both of an uplink control transmission and uplink traffic channel transmission, and wherein the adjusting avoids performing the first uplink transmission at a portion of a carrier that coincides with the sounding reference signal transmission. 13. The method of claim 6, wherein the uplink transmissions comprise a plurality of sounding reference signal transmissions, and wherein the adjusting reduces a power of at least one of the sounding reference signal transmissions. 14. The method of claim 6, wherein the adjusting is according to the at least one prioritization rule specifying that a random access channel transmission has a higher priority than an uplink control channel transmission or an uplink traffic channel transmission. 15. The method of claim 6, wherein the adjusting is according to the at least one prioritization rule specifying that a random access channel transmission has a higher priority than a sounding reference signal transmission. 16. The method of claim 6, wherein the adjusting is according to the at least one prioritization rule specifying that transmissions to a first wireless access network node has a higher priority than a second wireless access network node. 17. The method of claim 1, wherein the uplink transmissions to the respective wireless access network nodes are time aligned. 18. The method of claim 1, wherein the uplink transmissions to the respective wireless access network nodes are time misaligned 19. The method of claim 1, wherein the adjusting is performed over a full transmission time interval. 20. The method of claim 1, wherein the adjusting is performed over a part of a full transmission time interval. 21. A wireless access network node comprising:
a communication component to communicate wirelessly with a user equipment (UE); and at least one processor configured to:
use information relating to uplink power sharing control at the UE to process an uplink transmission from the UE, wherein the uplink transmission is one of a plurality of frequency-division multiplexing (FDM)-based uplink transmissions over corresponding wireless connections with respective wireless access network nodes. 22. The method of claim 21, wherein the information relating to the uplink power sharing control includes a prioritization rule specifying priority of the at least one of the plurality of FDM-based uplink transmissions. 23. A user equipment (UE) comprising:
a communication component to communicate wirelessly with a wireless access network node; and at least one processor configured to:
detect that an aggregate of calculated uplink transmit power of the UE exceeds a threshold; and
in response to the detecting, adjust a power of at least one of a plurality of frequency-division multiplexing (FDM)-based uplink transmissions of the UE over corresponding wireless connections with respective wireless access network nodes. 24. The UE of claim 19, wherein the adjusting is according to at least one prioritization rule specifying priority of the at least one of a plurality of uplink transmissions. | A user equipment detects that an aggregate of calculated uplink transmit power of the UE exceeds a threshold. In response to the detecting, a power of at least one of a plurality of frequency-division multiplexing (FDM)-based uplink transmissions of the UE over corresponding wireless connections with respective wireless access network nodes is adjusted.1. A method of a user equipment (UE), the method comprising:
detecting that an aggregate of calculated uplink transmit power of the UE exceeds a threshold; and in response to the detecting, adjusting a power of at least one of a plurality of frequency-division multiplexing (FDM)-based uplink transmissions of the UE over corresponding wireless connections with respective wireless access network nodes. 2. The method of claim 1 wherein at least two of the wireless access network nodes have respective separate schedulers. 3. The method of claim 1, wherein the adjusting comprises reducing the power of the at least one uplink transmission or dropping the at least one uplink transmission. 4. The method of claim 1, wherein the uplink transmissions are concurrent uplink transmissions that overlap fully or partially in time. 5. The method of claim 1, wherein a first of the wireless access network nodes provides carrier aggregation having component carriers, and the concurrent uplink transmissions include plural uplink transmissions over wireless connections with the component carriers of the first wireless access network node. 6. The method of claim 1, wherein the adjusting is according to at least one prioritization rule specifying priority of at least one of the uplink transmissions. 7. The method of claim 6, wherein the adjusting is according to the at least one prioritization rule specifying that a first uplink control channel transmission or traffic channel transmission containing acknowledgment information has a higher priority than a second uplink control channel transmission or traffic channel transmission without acknowledgment information. 8. The method of claim 6, wherein the adjusting is according to the at least one prioritization rule specifying that a first uplink traffic channel transmission containing uplink control information has a higher priority than a second uplink traffic channel transmission without uplink control information. 9. The method of claim 6, wherein the adjusting is according to the at least one prioritization rule specifying that an uplink traffic channel transmission containing channel state information but without acknowledgment information has a higher priority than an uplink control channel transmission containing channel state information but without acknowledgement information. 10. The method of claim 6, wherein the adjusting is according to the at least one prioritization rule specifying that a first resource element associated with acknowledgement information contained in an uplink traffic channel transmission has a higher priority than a second resource element with traffic data contained in the uplink traffic channel transmission. 11. The method of claim 6, wherein the uplink transmissions comprise a first uplink transmission and a sounding reference signal transmission, wherein the first uplink transmission includes one or both of an uplink traffic channel transmission and an uplink control channel transmission, and wherein the adjusting reduces a power of the sounding reference signal transmission or drops the sounding reference signal transmission. 12. The method of claim 6, wherein the uplink transmissions comprise a first uplink transmission and a sounding reference signal transmission, wherein the first uplink transmission comprises one or both of an uplink control transmission and uplink traffic channel transmission, and wherein the adjusting avoids performing the first uplink transmission at a portion of a carrier that coincides with the sounding reference signal transmission. 13. The method of claim 6, wherein the uplink transmissions comprise a plurality of sounding reference signal transmissions, and wherein the adjusting reduces a power of at least one of the sounding reference signal transmissions. 14. The method of claim 6, wherein the adjusting is according to the at least one prioritization rule specifying that a random access channel transmission has a higher priority than an uplink control channel transmission or an uplink traffic channel transmission. 15. The method of claim 6, wherein the adjusting is according to the at least one prioritization rule specifying that a random access channel transmission has a higher priority than a sounding reference signal transmission. 16. The method of claim 6, wherein the adjusting is according to the at least one prioritization rule specifying that transmissions to a first wireless access network node has a higher priority than a second wireless access network node. 17. The method of claim 1, wherein the uplink transmissions to the respective wireless access network nodes are time aligned. 18. The method of claim 1, wherein the uplink transmissions to the respective wireless access network nodes are time misaligned 19. The method of claim 1, wherein the adjusting is performed over a full transmission time interval. 20. The method of claim 1, wherein the adjusting is performed over a part of a full transmission time interval. 21. A wireless access network node comprising:
a communication component to communicate wirelessly with a user equipment (UE); and at least one processor configured to:
use information relating to uplink power sharing control at the UE to process an uplink transmission from the UE, wherein the uplink transmission is one of a plurality of frequency-division multiplexing (FDM)-based uplink transmissions over corresponding wireless connections with respective wireless access network nodes. 22. The method of claim 21, wherein the information relating to the uplink power sharing control includes a prioritization rule specifying priority of the at least one of the plurality of FDM-based uplink transmissions. 23. A user equipment (UE) comprising:
a communication component to communicate wirelessly with a wireless access network node; and at least one processor configured to:
detect that an aggregate of calculated uplink transmit power of the UE exceeds a threshold; and
in response to the detecting, adjust a power of at least one of a plurality of frequency-division multiplexing (FDM)-based uplink transmissions of the UE over corresponding wireless connections with respective wireless access network nodes. 24. The UE of claim 19, wherein the adjusting is according to at least one prioritization rule specifying priority of the at least one of a plurality of uplink transmissions. | 2,400 |
7,712 | 7,712 | 14,879,485 | 2,457 | An infotainment system in a vehicle includes at least one processor configured to, in response to occurrence of a trigger condition defined by an invitation from a source remote from the vehicle and identifying media content and to acceptance of the invitation, select a medium carrying the media content to play the media content. The trigger condition may be a current location of the vehicle matching a specified location, a weather condition at a current location of the vehicle matching a specified weather condition, a current speed of the vehicle exceeding a specified speed, a current date matching a specified date, or a current time of day matching a specified time of day. Alternatively, the trigger condition may be a signal indicating presence of a passenger or presence of a connection with a mobile device. | 1. An infotainment system in a vehicle comprising:
at least one processor configured to, in response to occurrence of a trigger condition defined by an invitation from a source remote from the vehicle and identifying media content and to acceptance of the invitation, select a medium carrying the media content to play the media content. 2. The system of claim 1, wherein the trigger condition is a current location of the vehicle matching a specified location, a weather condition at a current location of the vehicle matching a specified weather condition, or a current speed of the vehicle exceeding a specified speed. 3. The system of claim 1, wherein the trigger condition is a current date matching a specified date or a current time of day matching a specified time of day. 4. The system of claim 1, wherein the trigger condition is a signal indicating presence of a passenger or presence of a connection with a mobile device. 5. The system of claim 1, wherein the medium is a terrestrial radio channel. 6. The system of claim 1, wherein the medium is a file in non-volatile memory. 7. The system of claim 1, wherein the media content is speech, music, or images. 8. An infotainment system in a vehicle comprising:
at least one processor configured to associate a driver specified trigger condition defining circumstances regarding when to play media content with an invitation from a source remote from the vehicle, and in response to occurrence of the trigger condition and acceptance of the invitation, select a medium carrying the media content to play the media content. 9. The system of claim 8, wherein the source remote from the vehicle is a remote vehicle infotainment system. 10. The system of claim 8, wherein the invitation from the source remote is received using Dedicated Short Range Communications (DSRC). 11. The system of claim 8 further comprising media storage medium configured to store data files of multimedia content, wherein the at least one processor is further configured to, in response to reception of a share invitation from a remote source identifying media content and input indicative of selection of the media content received from a control interface of the vehicle, select a data file from the media storage medium based on the share invitation to play the media content. 12. The system of claim 8, wherein the trigger condition is a current location of the vehicle matching a specified location, a weather condition at the current location of the vehicle matching a specified weather condition, or a current speed of the vehicle exceeding a specified speed. 13. The system of claim 8, wherein the trigger condition is a current date matching a specified date or a time of day matching a specified time of day. 14. The system of claim 8, wherein the trigger condition is a status of a signal associated with detection of a passenger or connection with a mobile device. 15. A method comprising:
by a computer,
receiving from a first vehicle an invitation identifying media content, an alias of another vehicle and a trigger condition;
identifying a target vehicle associated with the alias; and
in response to a match of the trigger condition with a current condition of the target vehicle, sending to the target vehicle the invitation. 16. The method of claim 15, wherein the trigger condition is a current location of the target vehicle, a weather condition at a current location of the vehicle, or a current speed of the vehicle. 17. The method of claim 15, wherein the trigger condition is a date or a time of day on the date. 18. The method of claim 15, wherein the trigger condition is a signal based on detection of a passenger or a connection with a mobile device. 19. The method of claim 15, wherein the alias is a call-sign or code-name. 20. The method of claim 15, wherein receiving is via a cellular network or Wi-Fi. | An infotainment system in a vehicle includes at least one processor configured to, in response to occurrence of a trigger condition defined by an invitation from a source remote from the vehicle and identifying media content and to acceptance of the invitation, select a medium carrying the media content to play the media content. The trigger condition may be a current location of the vehicle matching a specified location, a weather condition at a current location of the vehicle matching a specified weather condition, a current speed of the vehicle exceeding a specified speed, a current date matching a specified date, or a current time of day matching a specified time of day. Alternatively, the trigger condition may be a signal indicating presence of a passenger or presence of a connection with a mobile device.1. An infotainment system in a vehicle comprising:
at least one processor configured to, in response to occurrence of a trigger condition defined by an invitation from a source remote from the vehicle and identifying media content and to acceptance of the invitation, select a medium carrying the media content to play the media content. 2. The system of claim 1, wherein the trigger condition is a current location of the vehicle matching a specified location, a weather condition at a current location of the vehicle matching a specified weather condition, or a current speed of the vehicle exceeding a specified speed. 3. The system of claim 1, wherein the trigger condition is a current date matching a specified date or a current time of day matching a specified time of day. 4. The system of claim 1, wherein the trigger condition is a signal indicating presence of a passenger or presence of a connection with a mobile device. 5. The system of claim 1, wherein the medium is a terrestrial radio channel. 6. The system of claim 1, wherein the medium is a file in non-volatile memory. 7. The system of claim 1, wherein the media content is speech, music, or images. 8. An infotainment system in a vehicle comprising:
at least one processor configured to associate a driver specified trigger condition defining circumstances regarding when to play media content with an invitation from a source remote from the vehicle, and in response to occurrence of the trigger condition and acceptance of the invitation, select a medium carrying the media content to play the media content. 9. The system of claim 8, wherein the source remote from the vehicle is a remote vehicle infotainment system. 10. The system of claim 8, wherein the invitation from the source remote is received using Dedicated Short Range Communications (DSRC). 11. The system of claim 8 further comprising media storage medium configured to store data files of multimedia content, wherein the at least one processor is further configured to, in response to reception of a share invitation from a remote source identifying media content and input indicative of selection of the media content received from a control interface of the vehicle, select a data file from the media storage medium based on the share invitation to play the media content. 12. The system of claim 8, wherein the trigger condition is a current location of the vehicle matching a specified location, a weather condition at the current location of the vehicle matching a specified weather condition, or a current speed of the vehicle exceeding a specified speed. 13. The system of claim 8, wherein the trigger condition is a current date matching a specified date or a time of day matching a specified time of day. 14. The system of claim 8, wherein the trigger condition is a status of a signal associated with detection of a passenger or connection with a mobile device. 15. A method comprising:
by a computer,
receiving from a first vehicle an invitation identifying media content, an alias of another vehicle and a trigger condition;
identifying a target vehicle associated with the alias; and
in response to a match of the trigger condition with a current condition of the target vehicle, sending to the target vehicle the invitation. 16. The method of claim 15, wherein the trigger condition is a current location of the target vehicle, a weather condition at a current location of the vehicle, or a current speed of the vehicle. 17. The method of claim 15, wherein the trigger condition is a date or a time of day on the date. 18. The method of claim 15, wherein the trigger condition is a signal based on detection of a passenger or a connection with a mobile device. 19. The method of claim 15, wherein the alias is a call-sign or code-name. 20. The method of claim 15, wherein receiving is via a cellular network or Wi-Fi. | 2,400 |
7,713 | 7,713 | 14,807,609 | 2,434 | Systems, apparatuses, methods, and computer-readable mediums for preventing return oriented programming (ROP) attacks. A compiler may insert landing pads adjacent to valid return targets in an instruction sequence. When a return instruction is executed, the processor may treat the return as suspicious if the target of the return instruction does not have an adjacent landing pad. Additionally, each landing pad may be encoded with a color, and a colored launch pad may be inserted into the instruction stream next to each return instruction. When a return instruction is executed, the processor may determine if the target of the return has a landing pad with the same color as the launch pad of the return instruction. Return-target pairs with color mismatches may be treated as suspicious and the offending process may be killed. | 1. A method comprising:
analyzing instructions of an instruction stream; identifying a first instruction of said instructions as a valid return target; and inserting a landing pad corresponding to the first instruction in the instruction stream, wherein the landing pad indicates that the first instruction is a valid return target. 2. The method as recited in claim 1, further comprising:
detecting execution of a return instruction; and determining if a target of the return instruction has a corresponding landing pad. 3. The method as recited in claim 2, further comprising generating an exception responsive to determining the target of the return instruction does not have a corresponding landing pad. 4. The method as recited in claim 3, further comprising causing a corresponding process to terminate responsive to determining the target of the return instruction does not have a corresponding landing pad. 5. The method as recited in claim 2, wherein the landing pad is a nop instruction. 6. The method as recited in claim 5, wherein the nop instruction is inserted before the first instruction in the instruction stream. 7. The method as recited in claim 2, further comprising:
assigning a color to each landing pad inserted into the instruction stream; inserting a colored launch pad into the instruction stream corresponding to each return instruction, wherein a color of a colored launch pad matches a color of a corresponding landing pad; determining if a first color of a landing pad of a target of the return instruction matches a second color of a launch pad of the return instruction; and generating an exception responsive to detecting a color mismatch between the first color and the second color. 8. A computing system comprising:
a memory; and one or more processors configured to:
analyze instructions of an instruction stream;
identify a first instruction of said instructions as a valid return target; and
insert a landing pad corresponding to the first instruction in the instruction stream, wherein the landing pad indicates that the first instruction is a valid return target. 9. The computing system as recited in claim 8, wherein the one or more processors are further configured to:
detect a return instruction being executed; and determine if a target of the return instruction has a corresponding landing pad. 10. The computing system as recited in claim 9, wherein the one or more processors are configured to generate an exception responsive to determining the target of the return instruction does not have a corresponding landing pad. 11. The computing system as recited in claim 10, wherein the one or more processors are further configured to cause a corresponding process to terminate responsive to determining the target of the return instruction does not have a corresponding landing pad. 12. The computing system as recited in claim 9, wherein the landing pad is a nop instruction. 13. The computing system as recited in claim 12, wherein the nop instruction is inserted before the first instruction in the instruction stream. 14. The computing system as recited in claim 9, wherein the one or more processors are further configured to:
assign a color to each landing pad inserted into the instruction stream; insert a colored launch pad into the instruction stream adjacent to each return instruction, wherein a color of a colored launch pad matches a color of a corresponding landing pad; determine if a first color of a landing pad of a target of the return instruction matches a second color of a launch pad of the return instruction; and generate an exception responsive to detecting a color mismatch between the first color and the second color. 15. A non-transitory computer readable medium storing program instructions for execution by one or more processors, wherein the program instructions are executable by the one or more processors to:
analyze instructions of an instruction stream; identify a first instruction of said instructions as a valid return target; and modify the instructions stream by inserting a landing pad corresponding to the first instruction in the instruction stream, wherein the landing pad indicates that the first instruction is a valid return target. 16. The non-transitory computer readable medium as recited in claim 15, wherein the program instructions are executable to:
detect a return instruction being executed; and determine if a target of the return instruction has an adjacent landing pad. 17. The non-transitory computer readable medium as recited in claim 16, wherein the program instructions are executable to generate an exception responsive to determining the target of the return instruction does not have an adjacent landing pad. 18. The non-transitory computer readable medium as recited in claim 17, wherein the program instructions are executable to cause a corresponding process to terminate responsive to determining the target of the return instruction does not have an adjacent landing pad. 19. The non-transitory computer readable medium as recited in claim 16, wherein the landing pad is a nop instruction. 20. The non-transitory computer readable medium as recited in claim 16, wherein the program instructions are executable to:
assign a color to each landing pad inserted into the instruction stream; insert a colored launch pad into the instruction stream adjacent to each return instruction, wherein a color of a colored launch pad matches a color of a corresponding landing pad; determine if a first color of a landing pad of a target of the return instruction matches a second color of a launch pad of the return instruction; and generate an exception responsive to detecting a color mismatch between the first color and the second color. | Systems, apparatuses, methods, and computer-readable mediums for preventing return oriented programming (ROP) attacks. A compiler may insert landing pads adjacent to valid return targets in an instruction sequence. When a return instruction is executed, the processor may treat the return as suspicious if the target of the return instruction does not have an adjacent landing pad. Additionally, each landing pad may be encoded with a color, and a colored launch pad may be inserted into the instruction stream next to each return instruction. When a return instruction is executed, the processor may determine if the target of the return has a landing pad with the same color as the launch pad of the return instruction. Return-target pairs with color mismatches may be treated as suspicious and the offending process may be killed.1. A method comprising:
analyzing instructions of an instruction stream; identifying a first instruction of said instructions as a valid return target; and inserting a landing pad corresponding to the first instruction in the instruction stream, wherein the landing pad indicates that the first instruction is a valid return target. 2. The method as recited in claim 1, further comprising:
detecting execution of a return instruction; and determining if a target of the return instruction has a corresponding landing pad. 3. The method as recited in claim 2, further comprising generating an exception responsive to determining the target of the return instruction does not have a corresponding landing pad. 4. The method as recited in claim 3, further comprising causing a corresponding process to terminate responsive to determining the target of the return instruction does not have a corresponding landing pad. 5. The method as recited in claim 2, wherein the landing pad is a nop instruction. 6. The method as recited in claim 5, wherein the nop instruction is inserted before the first instruction in the instruction stream. 7. The method as recited in claim 2, further comprising:
assigning a color to each landing pad inserted into the instruction stream; inserting a colored launch pad into the instruction stream corresponding to each return instruction, wherein a color of a colored launch pad matches a color of a corresponding landing pad; determining if a first color of a landing pad of a target of the return instruction matches a second color of a launch pad of the return instruction; and generating an exception responsive to detecting a color mismatch between the first color and the second color. 8. A computing system comprising:
a memory; and one or more processors configured to:
analyze instructions of an instruction stream;
identify a first instruction of said instructions as a valid return target; and
insert a landing pad corresponding to the first instruction in the instruction stream, wherein the landing pad indicates that the first instruction is a valid return target. 9. The computing system as recited in claim 8, wherein the one or more processors are further configured to:
detect a return instruction being executed; and determine if a target of the return instruction has a corresponding landing pad. 10. The computing system as recited in claim 9, wherein the one or more processors are configured to generate an exception responsive to determining the target of the return instruction does not have a corresponding landing pad. 11. The computing system as recited in claim 10, wherein the one or more processors are further configured to cause a corresponding process to terminate responsive to determining the target of the return instruction does not have a corresponding landing pad. 12. The computing system as recited in claim 9, wherein the landing pad is a nop instruction. 13. The computing system as recited in claim 12, wherein the nop instruction is inserted before the first instruction in the instruction stream. 14. The computing system as recited in claim 9, wherein the one or more processors are further configured to:
assign a color to each landing pad inserted into the instruction stream; insert a colored launch pad into the instruction stream adjacent to each return instruction, wherein a color of a colored launch pad matches a color of a corresponding landing pad; determine if a first color of a landing pad of a target of the return instruction matches a second color of a launch pad of the return instruction; and generate an exception responsive to detecting a color mismatch between the first color and the second color. 15. A non-transitory computer readable medium storing program instructions for execution by one or more processors, wherein the program instructions are executable by the one or more processors to:
analyze instructions of an instruction stream; identify a first instruction of said instructions as a valid return target; and modify the instructions stream by inserting a landing pad corresponding to the first instruction in the instruction stream, wherein the landing pad indicates that the first instruction is a valid return target. 16. The non-transitory computer readable medium as recited in claim 15, wherein the program instructions are executable to:
detect a return instruction being executed; and determine if a target of the return instruction has an adjacent landing pad. 17. The non-transitory computer readable medium as recited in claim 16, wherein the program instructions are executable to generate an exception responsive to determining the target of the return instruction does not have an adjacent landing pad. 18. The non-transitory computer readable medium as recited in claim 17, wherein the program instructions are executable to cause a corresponding process to terminate responsive to determining the target of the return instruction does not have an adjacent landing pad. 19. The non-transitory computer readable medium as recited in claim 16, wherein the landing pad is a nop instruction. 20. The non-transitory computer readable medium as recited in claim 16, wherein the program instructions are executable to:
assign a color to each landing pad inserted into the instruction stream; insert a colored launch pad into the instruction stream adjacent to each return instruction, wherein a color of a colored launch pad matches a color of a corresponding landing pad; determine if a first color of a landing pad of a target of the return instruction matches a second color of a launch pad of the return instruction; and generate an exception responsive to detecting a color mismatch between the first color and the second color. | 2,400 |
7,714 | 7,714 | 15,018,098 | 2,414 | A method to provide authentication services to third party vendors by a service provider hosting an authentication, authorization and accounting (AAA) server or a similar device that can authenticate users for some other service. This method enables easy and substantially error-free end-user authentication, which forms the basis for enabling electronic transactions (e.g., web-based) that are less vulnerable to fraud. | 1. An apparatus, comprising:
a memory; and a processor for executing instructions received from said memory to perform thereby a method, the method comprising:
receiving, at a service provider, identification information associated with a user of a mobile device and an identifier associated with said mobile device, said identification information comprising a user name;
determining, at said service provider, that said identification information is associated with a mobile device and a corresponding registered user of said service provider, said registered user being associated with a randomized key string adapted to enable a vendor to authenticate said user after receiving said randomized key string from said mobile device;
generating and directing said randomized key string toward said mobile device; and
communicating said randomized key string to said vendor in response to receiving from said vendor said mobile device identifier and said identification information of said registered user of said service provider, said communicating of said randomized key string being adapted to enable authentication of said user transaction. 2. A method, comprising:
receiving, at a service provider, identification information associated with a user of a mobile device and an identifier associated with said mobile device, said identification information comprising a user name of a registered user; determining, at said service provider, that said identification information is associated with a mobile device and a corresponding registered user of said service provider, said registered user being associated with a randomized key string adapted to enable a vendor to authenticate said user after receiving said randomized key string from said mobile device; generating and directing said randomized key string toward said mobile device; and communicating said randomized key string to said vendor in response to receiving from said vendor said mobile device identifier and said identification information of said registered user of said service provider, said communicating of said randomized key string being adapted to enable authentication of said user transaction. | A method to provide authentication services to third party vendors by a service provider hosting an authentication, authorization and accounting (AAA) server or a similar device that can authenticate users for some other service. This method enables easy and substantially error-free end-user authentication, which forms the basis for enabling electronic transactions (e.g., web-based) that are less vulnerable to fraud.1. An apparatus, comprising:
a memory; and a processor for executing instructions received from said memory to perform thereby a method, the method comprising:
receiving, at a service provider, identification information associated with a user of a mobile device and an identifier associated with said mobile device, said identification information comprising a user name;
determining, at said service provider, that said identification information is associated with a mobile device and a corresponding registered user of said service provider, said registered user being associated with a randomized key string adapted to enable a vendor to authenticate said user after receiving said randomized key string from said mobile device;
generating and directing said randomized key string toward said mobile device; and
communicating said randomized key string to said vendor in response to receiving from said vendor said mobile device identifier and said identification information of said registered user of said service provider, said communicating of said randomized key string being adapted to enable authentication of said user transaction. 2. A method, comprising:
receiving, at a service provider, identification information associated with a user of a mobile device and an identifier associated with said mobile device, said identification information comprising a user name of a registered user; determining, at said service provider, that said identification information is associated with a mobile device and a corresponding registered user of said service provider, said registered user being associated with a randomized key string adapted to enable a vendor to authenticate said user after receiving said randomized key string from said mobile device; generating and directing said randomized key string toward said mobile device; and communicating said randomized key string to said vendor in response to receiving from said vendor said mobile device identifier and said identification information of said registered user of said service provider, said communicating of said randomized key string being adapted to enable authentication of said user transaction. | 2,400 |
7,715 | 7,715 | 13,812,926 | 2,486 | An active-illumination scanning imager ( 10 ) comprises a light source ( 14 ) for producing a light beam ( 16 ), an optical collimator ( 18 ) for collimating the light beam, a scanning mirror ( 20 ) for scanning the light beam through a scene ( 12 ) to be imaged, and a light detector ( 22 ) arranged with respect to the scanning mirror in such a way as to receive a fraction ( 24 ) of said light beam reflected from said scene, via the scanning mirror. The imager further includes an actuator ( 40 ) configured to position the light source and/or the optical collimator relative to each other and/or the light detector relative to the scanning mirror, and a controller ( 46 ) operatively connected to the actuator for controlling the positioning. | 1. Active-illumination scanning imager, comprising a light source for producing a light beam, an optical collimator for collimating said light beam in at least one direction transversal to a beam direction, a scanning mirror for scanning said light beam through a scene to be imaged and a light detector arranged with respect to said scanning mirror in such a way as to receive a fraction of said light beam reflected from said scene, via said scanning mirror;
wherein said imager further comprises an actuator configured to position at least one of said light source and/or said optical collimator relative to one another and/or to position said light detector relative to said scanning mirror, and a controller operatively connected to said actuator for controlling said positioning. 2. The imager as claimed in claim 1, wherein said controller comprises an interface for operatively connecting said scanner to a sensor, said controller being configured to attempt to achieve a predefined sensor response through controlling said positioning. 3. The imager as claimed in claim 1, wherein said light detector is operatively connected to said controller and wherein said controller is configured to control said positioning in response to a detection signal from said detector. 4. The imager as claimed in claim 3, wherein said controller is configured to optimize one or more parameters of said detection signal. 5. The imager as claimed in claim 4, wherein said one or more parameters comprise a signal-to-noise ratio. 6. The imager as claimed in claim 1, wherein said scanning mirror comprises a resonance-type micro-mechanical mirror. 7. The imager as claimed in claim 1, wherein said imager is a time-of-flight scanning imager. 8. The imager as claimed in claim 1, wherein said actuator is configured and arranged to change an optical path length between said light source and said optical collimator. 9. The imager as claimed in claim 1, wherein said actuator is configured and arranged to move at least one of said light source and/or said optical collimator transversally to the optical path. 10. The imager as claimed in claim 1, wherein said actuator is configured and arranged to tilt at least one of said light source and/or said optical collimator relative to one another. 11. The imager as claimed in claim 1, wherein said actuator is configured and arranged to displace and/or to tilt said light detector. 12. The as claimed in claim 11, wherein said light detector comprises a position-sensitive light detector. 13. The imager as claimed in claim 1, wherein said collimator is configured to collimate said light beam in only one direction transversal to said beam direction in such a way as to generate a fan-shaped light beam with linear cross section, and wherein said scanning mirror is configured and arranged to sweep said fan-shaped light beam through said scene transversally to said linear cross section and illuminate slices of said scene. 14. The imager as claimed in claim 13, wherein said light detector is part of an imager chip with a linear photosensor array disposed with respect to said scanning mirror in such a way that the illuminated slices of the scene are successively imaged on said linear photosensor array. 15. Active-illumination scanning imager, comprising
a light source configured to produce a light beam, an optical collimator configured to collimate said light beam in at least one direction transversal to a beam direction, a scanning mirror configured to scan said light beam through a scene to be imaged a light detector arranged with respect to said scanning mirror in such a way as to receive a fraction of said light beam reflected from said scene, via said scanning mirror; an actuator configured to position at least one of said light source and said optical collimator relative to one another; and a controller operatively connected to said actuator so as to control said positioning, said light detector being operatively connected to said controller and said controller being configured to control said positioning in response to a detection signal from said detector. 16. Active-illumination scanning imager, comprising
a light source configured to produce a light beam, an optical collimator configured to collimate said light beam in at least one direction transversal to a beam direction, a scanning mirror configured to scan said light beam through a scene to be imaged a light detector arranged with respect to said scanning mirror in such a way as to receive a fraction of said light beam reflected from said scene, via said scanning mirror; an actuator configured to position said light detector relative to said scanning mirror; and a controller operatively connected to said actuator so as to control said positioning, said light detector being operatively connected to said controller and said controller being configured to control said positioning in response to a detection signal from said detector. | An active-illumination scanning imager ( 10 ) comprises a light source ( 14 ) for producing a light beam ( 16 ), an optical collimator ( 18 ) for collimating the light beam, a scanning mirror ( 20 ) for scanning the light beam through a scene ( 12 ) to be imaged, and a light detector ( 22 ) arranged with respect to the scanning mirror in such a way as to receive a fraction ( 24 ) of said light beam reflected from said scene, via the scanning mirror. The imager further includes an actuator ( 40 ) configured to position the light source and/or the optical collimator relative to each other and/or the light detector relative to the scanning mirror, and a controller ( 46 ) operatively connected to the actuator for controlling the positioning.1. Active-illumination scanning imager, comprising a light source for producing a light beam, an optical collimator for collimating said light beam in at least one direction transversal to a beam direction, a scanning mirror for scanning said light beam through a scene to be imaged and a light detector arranged with respect to said scanning mirror in such a way as to receive a fraction of said light beam reflected from said scene, via said scanning mirror;
wherein said imager further comprises an actuator configured to position at least one of said light source and/or said optical collimator relative to one another and/or to position said light detector relative to said scanning mirror, and a controller operatively connected to said actuator for controlling said positioning. 2. The imager as claimed in claim 1, wherein said controller comprises an interface for operatively connecting said scanner to a sensor, said controller being configured to attempt to achieve a predefined sensor response through controlling said positioning. 3. The imager as claimed in claim 1, wherein said light detector is operatively connected to said controller and wherein said controller is configured to control said positioning in response to a detection signal from said detector. 4. The imager as claimed in claim 3, wherein said controller is configured to optimize one or more parameters of said detection signal. 5. The imager as claimed in claim 4, wherein said one or more parameters comprise a signal-to-noise ratio. 6. The imager as claimed in claim 1, wherein said scanning mirror comprises a resonance-type micro-mechanical mirror. 7. The imager as claimed in claim 1, wherein said imager is a time-of-flight scanning imager. 8. The imager as claimed in claim 1, wherein said actuator is configured and arranged to change an optical path length between said light source and said optical collimator. 9. The imager as claimed in claim 1, wherein said actuator is configured and arranged to move at least one of said light source and/or said optical collimator transversally to the optical path. 10. The imager as claimed in claim 1, wherein said actuator is configured and arranged to tilt at least one of said light source and/or said optical collimator relative to one another. 11. The imager as claimed in claim 1, wherein said actuator is configured and arranged to displace and/or to tilt said light detector. 12. The as claimed in claim 11, wherein said light detector comprises a position-sensitive light detector. 13. The imager as claimed in claim 1, wherein said collimator is configured to collimate said light beam in only one direction transversal to said beam direction in such a way as to generate a fan-shaped light beam with linear cross section, and wherein said scanning mirror is configured and arranged to sweep said fan-shaped light beam through said scene transversally to said linear cross section and illuminate slices of said scene. 14. The imager as claimed in claim 13, wherein said light detector is part of an imager chip with a linear photosensor array disposed with respect to said scanning mirror in such a way that the illuminated slices of the scene are successively imaged on said linear photosensor array. 15. Active-illumination scanning imager, comprising
a light source configured to produce a light beam, an optical collimator configured to collimate said light beam in at least one direction transversal to a beam direction, a scanning mirror configured to scan said light beam through a scene to be imaged a light detector arranged with respect to said scanning mirror in such a way as to receive a fraction of said light beam reflected from said scene, via said scanning mirror; an actuator configured to position at least one of said light source and said optical collimator relative to one another; and a controller operatively connected to said actuator so as to control said positioning, said light detector being operatively connected to said controller and said controller being configured to control said positioning in response to a detection signal from said detector. 16. Active-illumination scanning imager, comprising
a light source configured to produce a light beam, an optical collimator configured to collimate said light beam in at least one direction transversal to a beam direction, a scanning mirror configured to scan said light beam through a scene to be imaged a light detector arranged with respect to said scanning mirror in such a way as to receive a fraction of said light beam reflected from said scene, via said scanning mirror; an actuator configured to position said light detector relative to said scanning mirror; and a controller operatively connected to said actuator so as to control said positioning, said light detector being operatively connected to said controller and said controller being configured to control said positioning in response to a detection signal from said detector. | 2,400 |
7,716 | 7,716 | 15,299,224 | 2,469 | Aspects of the present disclosure involve systems, methods, computer program products, and the like, for determining an estimated capacity for providing data from a telecommunications network to a plurality of end users. In one implementation, the estimated capacity for delivering the data to the end users is per transmission path or per access network connected to the telecommunications network. This information may be aggregated into a traffic flow table that illustrates the traffic flow and available capacity to one or more end user networks. Through analysis of the traffic flow table, the system determines an estimated available capacity to provide the data to the end users. The traffic flow table thus provides a more accurate estimate of the capacity of the telecommunications network to provide the data to the end users over previous capacity estimates. | 1. A method for providing data from a telecommunications network, the method comprising:
obtaining traffic flow information for the telecommunications network, the traffic flow information comprising an estimated bytes of data transmitted from the telecommunications network through a plurality of egress ports to a plurality of end user networks in communication with the telecommunications network, wherein each egress port of the plurality of egress ports is associated with at least one of the plurality of end user networks; receiving an indication of available capacity for each of the plurality of egress ports; storing the traffic flow information and indication of available capacity for each of the plurality of egress ports in a database; calculating an estimated capacity for each of a set of the plurality of egress ports; and adjusting a network configuration based at least on the calculated estimated capacity for each of a set of the plurality of egress ports to provide a requested network service to a plurality of end users of the telecommunications network. 2. The method of claim 1 further comprising:
receiving a percentage of total traffic transmitted from the telecommunications to the at least one of the plurality of end user networks that is transmitted through at least one egress port associated with the at least one of the plurality of end user networks. 3. The method of claim 2 further comprising:
determining an estimated capacity for providing data to at least one of the plurality of end user networks based on a received indication of available capacity for the at least one egress port and the percentage of total traffic transmitted from the telecommunications to the at least one of the plurality of end user networks that is transmitted through the at least one egress port. 4. The method of claim 3 wherein the estimated capacity for providing data to the at least one of the plurality of end user networks is the amount of data transmitted from the telecommunications network to the at least one of the plurality of end user network before the available capacity for the at least one egress port is zero. 5. The method of claim 3 further comprising:
receiving a percentage of total traffic transmitted from the telecommunications to all of the plurality of end user networks that is transmitted to the at least one of the plurality of end user networks. 6. The method of claim 5 further comprising:
determining an estimated capacity for providing data to all of the plurality of end user networks based on estimated capacity for providing data to the at least one of the plurality of end user networks and the percentage of total traffic transmitted from the telecommunications to all of the plurality of end user networks that is transmitted to the at least one of the plurality of end user networks. 7. The method of claim 6 wherein the estimated capacity for providing data to all of the plurality of end user networks is the amount of data transmitted from the telecommunications network to all of the plurality of end user networks before the available capacity for the at least one of the plurality of end user networks is zero. 8. The method of claim 7 wherein adjusting the network configuration comprises removing one or more of the plurality of end user networks from a list of available end user networks. 9. The method of claim 8 wherein the one or more of the plurality of end user networks are removed from the list of available end user networks if the estimated capacity for providing data to one or more of the plurality of end user networks is zero. 10. The method of claim 1 wherein adjusting the network configuration comprises removing one or more of the plurality of end user networks from a list of available end user networks. 11. A system for operating a telecommunications network, the system comprising:
a server comprising:
a processor; and
a computer-readable medium associated with the processor and including instructions stored thereon and executable by the processor to:
obtain traffic flow information for the telecommunications network, the traffic flow information comprising an estimated bytes of data transmitted from the telecommunications network through a plurality of egress ports to a plurality of end user networks in communication with the telecommunications network, wherein each egress port of the plurality of egress ports is associated with at least one of the plurality of end user networks;
receive an indication of available capacity for each of the plurality of egress ports;
store the traffic flow information and indication of available capacity for each of the plurality of egress ports in a database;
calculate an estimated capacity for each of a set of the plurality of egress ports; and
adjust a network configuration based at least on the calculated estimated capacity for each of a set of the plurality of egress ports to provide a requested network service to a plurality of end users of the telecommunications network. 12. The system of claim 11 wherein the instructions further cause the processor to:
receive a percentage of total traffic transmitted from the telecommunications to the at least one of the plurality of end user networks that is transmitted through at least one egress port associated with the at least one of the plurality of end user networks. 13. The system of claim 12 wherein the instructions further cause the processor to:
determine an estimated capacity for providing data to at least one of the plurality of end user networks based on a received indication of available capacity for the at least one egress port and the percentage of total traffic transmitted from the telecommunications to the at least one of the plurality of end user networks that is transmitted through the at least one egress port. 14. The system of claim 13 wherein the estimated capacity for providing data to the at least one of the plurality of end user networks is the amount of data transmitted from the telecommunications network to the at least one of the plurality of end user network before the available capacity for the at least one egress port is zero. 15. The system of claim 13 wherein the instructions further cause the processor to:
receive a percentage of total traffic transmitted from the telecommunications to all of the plurality of end user networks that is transmitted to the at least one of the plurality of end user networks. 16. The system of claim 15 wherein the instructions further cause the processor to:
determine an estimated capacity for providing data to all of the plurality of end user networks based on estimated capacity for providing data to the at least one of the plurality of end user networks and the percentage of total traffic transmitted from the telecommunications to all of the plurality of end user networks that is transmitted to the at least one of the plurality of end user networks. 17. The system of claim 16 wherein the estimated capacity for providing data to all of the plurality of end user networks is the amount of data transmitted from the telecommunications network to all of the plurality of end user networks before the available capacity for the at least one of the plurality of end user networks is zero. 18. The system of claim 17 wherein adjusting the network configuration comprises removing one or more of the plurality of end user networks from a list of available end user networks. 19. The system of claim 18 wherein the one or more of the plurality of end user networks are removed from the list of available end user networks if the estimated capacity for providing data to one or more of the plurality of end user networks is zero. 20. The system of claim 11 wherein the instructions further cause the processor to:
receive the requested network service from a customer of the telecommunications network, the requested network service comprising transmitting data to the plurality of end users of the telecommunications network. | Aspects of the present disclosure involve systems, methods, computer program products, and the like, for determining an estimated capacity for providing data from a telecommunications network to a plurality of end users. In one implementation, the estimated capacity for delivering the data to the end users is per transmission path or per access network connected to the telecommunications network. This information may be aggregated into a traffic flow table that illustrates the traffic flow and available capacity to one or more end user networks. Through analysis of the traffic flow table, the system determines an estimated available capacity to provide the data to the end users. The traffic flow table thus provides a more accurate estimate of the capacity of the telecommunications network to provide the data to the end users over previous capacity estimates.1. A method for providing data from a telecommunications network, the method comprising:
obtaining traffic flow information for the telecommunications network, the traffic flow information comprising an estimated bytes of data transmitted from the telecommunications network through a plurality of egress ports to a plurality of end user networks in communication with the telecommunications network, wherein each egress port of the plurality of egress ports is associated with at least one of the plurality of end user networks; receiving an indication of available capacity for each of the plurality of egress ports; storing the traffic flow information and indication of available capacity for each of the plurality of egress ports in a database; calculating an estimated capacity for each of a set of the plurality of egress ports; and adjusting a network configuration based at least on the calculated estimated capacity for each of a set of the plurality of egress ports to provide a requested network service to a plurality of end users of the telecommunications network. 2. The method of claim 1 further comprising:
receiving a percentage of total traffic transmitted from the telecommunications to the at least one of the plurality of end user networks that is transmitted through at least one egress port associated with the at least one of the plurality of end user networks. 3. The method of claim 2 further comprising:
determining an estimated capacity for providing data to at least one of the plurality of end user networks based on a received indication of available capacity for the at least one egress port and the percentage of total traffic transmitted from the telecommunications to the at least one of the plurality of end user networks that is transmitted through the at least one egress port. 4. The method of claim 3 wherein the estimated capacity for providing data to the at least one of the plurality of end user networks is the amount of data transmitted from the telecommunications network to the at least one of the plurality of end user network before the available capacity for the at least one egress port is zero. 5. The method of claim 3 further comprising:
receiving a percentage of total traffic transmitted from the telecommunications to all of the plurality of end user networks that is transmitted to the at least one of the plurality of end user networks. 6. The method of claim 5 further comprising:
determining an estimated capacity for providing data to all of the plurality of end user networks based on estimated capacity for providing data to the at least one of the plurality of end user networks and the percentage of total traffic transmitted from the telecommunications to all of the plurality of end user networks that is transmitted to the at least one of the plurality of end user networks. 7. The method of claim 6 wherein the estimated capacity for providing data to all of the plurality of end user networks is the amount of data transmitted from the telecommunications network to all of the plurality of end user networks before the available capacity for the at least one of the plurality of end user networks is zero. 8. The method of claim 7 wherein adjusting the network configuration comprises removing one or more of the plurality of end user networks from a list of available end user networks. 9. The method of claim 8 wherein the one or more of the plurality of end user networks are removed from the list of available end user networks if the estimated capacity for providing data to one or more of the plurality of end user networks is zero. 10. The method of claim 1 wherein adjusting the network configuration comprises removing one or more of the plurality of end user networks from a list of available end user networks. 11. A system for operating a telecommunications network, the system comprising:
a server comprising:
a processor; and
a computer-readable medium associated with the processor and including instructions stored thereon and executable by the processor to:
obtain traffic flow information for the telecommunications network, the traffic flow information comprising an estimated bytes of data transmitted from the telecommunications network through a plurality of egress ports to a plurality of end user networks in communication with the telecommunications network, wherein each egress port of the plurality of egress ports is associated with at least one of the plurality of end user networks;
receive an indication of available capacity for each of the plurality of egress ports;
store the traffic flow information and indication of available capacity for each of the plurality of egress ports in a database;
calculate an estimated capacity for each of a set of the plurality of egress ports; and
adjust a network configuration based at least on the calculated estimated capacity for each of a set of the plurality of egress ports to provide a requested network service to a plurality of end users of the telecommunications network. 12. The system of claim 11 wherein the instructions further cause the processor to:
receive a percentage of total traffic transmitted from the telecommunications to the at least one of the plurality of end user networks that is transmitted through at least one egress port associated with the at least one of the plurality of end user networks. 13. The system of claim 12 wherein the instructions further cause the processor to:
determine an estimated capacity for providing data to at least one of the plurality of end user networks based on a received indication of available capacity for the at least one egress port and the percentage of total traffic transmitted from the telecommunications to the at least one of the plurality of end user networks that is transmitted through the at least one egress port. 14. The system of claim 13 wherein the estimated capacity for providing data to the at least one of the plurality of end user networks is the amount of data transmitted from the telecommunications network to the at least one of the plurality of end user network before the available capacity for the at least one egress port is zero. 15. The system of claim 13 wherein the instructions further cause the processor to:
receive a percentage of total traffic transmitted from the telecommunications to all of the plurality of end user networks that is transmitted to the at least one of the plurality of end user networks. 16. The system of claim 15 wherein the instructions further cause the processor to:
determine an estimated capacity for providing data to all of the plurality of end user networks based on estimated capacity for providing data to the at least one of the plurality of end user networks and the percentage of total traffic transmitted from the telecommunications to all of the plurality of end user networks that is transmitted to the at least one of the plurality of end user networks. 17. The system of claim 16 wherein the estimated capacity for providing data to all of the plurality of end user networks is the amount of data transmitted from the telecommunications network to all of the plurality of end user networks before the available capacity for the at least one of the plurality of end user networks is zero. 18. The system of claim 17 wherein adjusting the network configuration comprises removing one or more of the plurality of end user networks from a list of available end user networks. 19. The system of claim 18 wherein the one or more of the plurality of end user networks are removed from the list of available end user networks if the estimated capacity for providing data to one or more of the plurality of end user networks is zero. 20. The system of claim 11 wherein the instructions further cause the processor to:
receive the requested network service from a customer of the telecommunications network, the requested network service comprising transmitting data to the plurality of end users of the telecommunications network. | 2,400 |
7,717 | 7,717 | 15,050,477 | 2,439 | Example methods are provided for a destination host to implement a firewall in a virtualized computing environment that includes the destination host and a source host. The method may comprise receiving, via a physical network interface controller (PNIC) of the destination host, an ingress packet sent by the source host. The ingress packet may be destined for a destination virtualized computing instance that is supported by the destination host and associated with a destination virtual network interface controller (VNIC). The method may further comprise retrieving a PNIC-level firewall rule associated with the destination virtualized computing instance, the PNIC-level firewall rule being applicable at the PNIC and generated by based on a VNIC-level firewall rule applicable at the destination VNIC. In response to determination that the PNIC-level firewall rule blocks the ingress packet from passing through, the ingress packet may be dropped such that the ingress packet is not sent to the destination VNIC. | 1. A method for a destination host to implement a firewall in a virtualized computing environment that includes the destination host and a source host, the method comprising:
receiving, via a physical network interface controller (PNIC) of the destination host, an ingress packet sent by the source host, wherein the ingress packet is destined for a destination virtualized computing instance that is supported by the destination host and associated with a destination virtual network interface controller (VNIC); retrieving a PNIC-level firewall rule associated with the destination virtualized computing instance, wherein the PNIC-level firewall rule is applicable at the PNIC and generated based on a VNIC-level firewall rule applicable at the destination VNIC; and in response to determination that the PNIC-level firewall rule blocks the ingress packet from passing through, dropping the ingress packet such that the ingress packet is not sent to the destination VNIC. 2. The method of claim 1, wherein the method further comprises:
generating the PNIC-level firewall rule by aggregating multiple VNIC-level firewall rules that include the VNIC-level firewall rule applicable at the destination VNIC. 3. The method of claim 2, wherein the generating the PNIC-level firewall rule comprises:
analysing the VNIC-level firewall rule applicable at the destination VNIC and at least one other VNIC-level firewall rule to identify one or more combinable packet fields; and based on the one or more combinable packet fields, synthesizing the VNIC-level firewall rule applicable at the destination VNIC and the at least one other VNIC-level firewall rule to generate the PNIC-level firewall rule. 4. The method of claim 3, wherein the packet fields include one or more of: source Internet Protocol (IP) address, source port number, destination IP address, destination protocol number, protocol and action. 5. The method of claim 1, wherein the destination host implements a distributed firewall engine that is configurable by a firewall controller and the method further comprises:
in response to receiving a control message from the firewall controller, configuring the firewall engine to apply the PNIC-level firewall rule at the PNIC instead of applying the VNIC-level firewall rule at the destination VNIC. 6. The method of claim 5, wherein the PNIC-level firewall rule specified in the control message is generated by the firewall controller by aggregating the multiple VNIC-level firewall rules. 7. A non-transitory computer-readable storage medium that includes a set of instructions which, in response to execution by a processor of a destination host, cause the processor to perform a method to implement a firewall in a virtualized computing environment that includes the destination host and a source host, the method comprising:
receiving, via a physical network interface controller (PNIC) of the destination host, an ingress packet sent by the source host, wherein the ingress packet is destined for a destination virtualized computing instance that is supported by the destination host and associated with a destination virtual network interface controller (VNIC); retrieving a PNIC-level firewall rule associated with the destination virtualized computing instance, wherein the PNIC-level firewall rule is applicable at the PNIC and generated based on a VNIC-level firewall rule applicable at the destination VNIC; and in response to determination that the PNIC-level firewall rule blocks the ingress packet from passing through, dropping the ingress packet such that the ingress packet is not sent to the destination VNIC. 8. The non-transitory computer-readable storage medium of claim 7, wherein the method further comprises:
generating the PNIC-level firewall rule by aggregating the multiple VNIC-level firewall rules that include the VNIC-level firewall rule applicable at the destination VNIC. 9. The non-transitory computer-readable storage medium of claim 8, wherein the generating the PNIC-level firewall rule comprises:
analysing the VNIC-level firewall rule applicable at the destination VNIC and at least one other VNIC-level firewall rule to identify one or more combinable packet fields; and based on the one or more combinable packet fields, synthesizing the VNIC-level firewall rule applicable at the destination VNIC and the at least one other VNIC-level firewall rule to generate the PNIC-level firewall rule. 10. The non-transitory computer-readable storage medium of claim 9, wherein the packet fields include one or more of: source Internet Protocol (IP) address, source port number, destination IP address, destination protocol number, protocol and action. 11. The non-transitory computer-readable storage medium of claim 7, wherein the destination host implements a distributed firewall engine that is configurable by a firewall controller and the method further comprises:
in response to receiving a control message from the firewall controller, configuring the firewall engine to apply the PNIC-level firewall rule at the PNIC instead of applying the VNIC-level firewall rule at the destination VNIC. 12. The non-transitory computer-readable storage medium of claim 11, wherein the PNIC-level firewall rule specified in the control message is generated by the firewall controller by aggregating the multiple VNIC-level firewall rules. 13. A host, being a destination host, configured to implement a firewall in a virtualized computing environment that includes the destination host and a source host, comprising:
a processor; a physical network interface controller (PNIC); and a non-transitory computer-readable medium having stored thereon instructions that, when executed by the processor, cause the processor to:
receive, via the PNIC, an ingress packet sent by the source host, wherein the ingress packet is destined for a destination virtualized computing instance that is supported by the destination host and associated with a destination virtual network interface controller (VNIC);
retrieve a PNIC-level firewall rule associated with the destination virtualized computing instance, wherein the PNIC-level firewall rule is applicable at the PNIC and generated based on a VNIC-level firewall rule applicable at the destination VNIC; and
in response to determination that the PNIC-level firewall rule blocks the ingress packet from passing through, drop the ingress packet such that the ingress packet is not sent to the destination VNIC. 14. The host of claim 13, wherein the instructions further cause the processor to:
generate the PNIC-level firewall rule by aggregating the multiple VNIC-level firewall rules. 15. The host of claim 14, wherein the instructions for generating the PNIC-level firewall rule cause the processor to:
analyse the VNIC-level firewall rule applicable at the destination VNIC and at least one other VNIC-level firewall rule to identify one or more combinable packet fields; and based on the one or more combinable packet fields, synthesize the VNIC-level firewall rule applicable at the destination VNIC and the at least one other VNIC-level firewall rule to generate the PNIC-level firewall rule. 16. The host of claim 15, wherein the packet fields include one or more of: source Internet Protocol (IP) address, source port number, destination IP address, destination protocol number, protocol and action. 17. The host of claim 13, wherein the destination host implements a distributed firewall engine that is configurable by a firewall controller and the instructions further cause the processor to:
in response to receiving a control message from the firewall controller, configure the firewall engine to apply the PNIC-level firewall rule at the PNIC instead of applying the VNIC-level firewall rule at the destination VNIC. 18. The host of claim 17, wherein the PNIC-level firewall rule specified in the control message is generated by the firewall controller by aggregating the multiple VNIC-level firewall rules. | Example methods are provided for a destination host to implement a firewall in a virtualized computing environment that includes the destination host and a source host. The method may comprise receiving, via a physical network interface controller (PNIC) of the destination host, an ingress packet sent by the source host. The ingress packet may be destined for a destination virtualized computing instance that is supported by the destination host and associated with a destination virtual network interface controller (VNIC). The method may further comprise retrieving a PNIC-level firewall rule associated with the destination virtualized computing instance, the PNIC-level firewall rule being applicable at the PNIC and generated by based on a VNIC-level firewall rule applicable at the destination VNIC. In response to determination that the PNIC-level firewall rule blocks the ingress packet from passing through, the ingress packet may be dropped such that the ingress packet is not sent to the destination VNIC.1. A method for a destination host to implement a firewall in a virtualized computing environment that includes the destination host and a source host, the method comprising:
receiving, via a physical network interface controller (PNIC) of the destination host, an ingress packet sent by the source host, wherein the ingress packet is destined for a destination virtualized computing instance that is supported by the destination host and associated with a destination virtual network interface controller (VNIC); retrieving a PNIC-level firewall rule associated with the destination virtualized computing instance, wherein the PNIC-level firewall rule is applicable at the PNIC and generated based on a VNIC-level firewall rule applicable at the destination VNIC; and in response to determination that the PNIC-level firewall rule blocks the ingress packet from passing through, dropping the ingress packet such that the ingress packet is not sent to the destination VNIC. 2. The method of claim 1, wherein the method further comprises:
generating the PNIC-level firewall rule by aggregating multiple VNIC-level firewall rules that include the VNIC-level firewall rule applicable at the destination VNIC. 3. The method of claim 2, wherein the generating the PNIC-level firewall rule comprises:
analysing the VNIC-level firewall rule applicable at the destination VNIC and at least one other VNIC-level firewall rule to identify one or more combinable packet fields; and based on the one or more combinable packet fields, synthesizing the VNIC-level firewall rule applicable at the destination VNIC and the at least one other VNIC-level firewall rule to generate the PNIC-level firewall rule. 4. The method of claim 3, wherein the packet fields include one or more of: source Internet Protocol (IP) address, source port number, destination IP address, destination protocol number, protocol and action. 5. The method of claim 1, wherein the destination host implements a distributed firewall engine that is configurable by a firewall controller and the method further comprises:
in response to receiving a control message from the firewall controller, configuring the firewall engine to apply the PNIC-level firewall rule at the PNIC instead of applying the VNIC-level firewall rule at the destination VNIC. 6. The method of claim 5, wherein the PNIC-level firewall rule specified in the control message is generated by the firewall controller by aggregating the multiple VNIC-level firewall rules. 7. A non-transitory computer-readable storage medium that includes a set of instructions which, in response to execution by a processor of a destination host, cause the processor to perform a method to implement a firewall in a virtualized computing environment that includes the destination host and a source host, the method comprising:
receiving, via a physical network interface controller (PNIC) of the destination host, an ingress packet sent by the source host, wherein the ingress packet is destined for a destination virtualized computing instance that is supported by the destination host and associated with a destination virtual network interface controller (VNIC); retrieving a PNIC-level firewall rule associated with the destination virtualized computing instance, wherein the PNIC-level firewall rule is applicable at the PNIC and generated based on a VNIC-level firewall rule applicable at the destination VNIC; and in response to determination that the PNIC-level firewall rule blocks the ingress packet from passing through, dropping the ingress packet such that the ingress packet is not sent to the destination VNIC. 8. The non-transitory computer-readable storage medium of claim 7, wherein the method further comprises:
generating the PNIC-level firewall rule by aggregating the multiple VNIC-level firewall rules that include the VNIC-level firewall rule applicable at the destination VNIC. 9. The non-transitory computer-readable storage medium of claim 8, wherein the generating the PNIC-level firewall rule comprises:
analysing the VNIC-level firewall rule applicable at the destination VNIC and at least one other VNIC-level firewall rule to identify one or more combinable packet fields; and based on the one or more combinable packet fields, synthesizing the VNIC-level firewall rule applicable at the destination VNIC and the at least one other VNIC-level firewall rule to generate the PNIC-level firewall rule. 10. The non-transitory computer-readable storage medium of claim 9, wherein the packet fields include one or more of: source Internet Protocol (IP) address, source port number, destination IP address, destination protocol number, protocol and action. 11. The non-transitory computer-readable storage medium of claim 7, wherein the destination host implements a distributed firewall engine that is configurable by a firewall controller and the method further comprises:
in response to receiving a control message from the firewall controller, configuring the firewall engine to apply the PNIC-level firewall rule at the PNIC instead of applying the VNIC-level firewall rule at the destination VNIC. 12. The non-transitory computer-readable storage medium of claim 11, wherein the PNIC-level firewall rule specified in the control message is generated by the firewall controller by aggregating the multiple VNIC-level firewall rules. 13. A host, being a destination host, configured to implement a firewall in a virtualized computing environment that includes the destination host and a source host, comprising:
a processor; a physical network interface controller (PNIC); and a non-transitory computer-readable medium having stored thereon instructions that, when executed by the processor, cause the processor to:
receive, via the PNIC, an ingress packet sent by the source host, wherein the ingress packet is destined for a destination virtualized computing instance that is supported by the destination host and associated with a destination virtual network interface controller (VNIC);
retrieve a PNIC-level firewall rule associated with the destination virtualized computing instance, wherein the PNIC-level firewall rule is applicable at the PNIC and generated based on a VNIC-level firewall rule applicable at the destination VNIC; and
in response to determination that the PNIC-level firewall rule blocks the ingress packet from passing through, drop the ingress packet such that the ingress packet is not sent to the destination VNIC. 14. The host of claim 13, wherein the instructions further cause the processor to:
generate the PNIC-level firewall rule by aggregating the multiple VNIC-level firewall rules. 15. The host of claim 14, wherein the instructions for generating the PNIC-level firewall rule cause the processor to:
analyse the VNIC-level firewall rule applicable at the destination VNIC and at least one other VNIC-level firewall rule to identify one or more combinable packet fields; and based on the one or more combinable packet fields, synthesize the VNIC-level firewall rule applicable at the destination VNIC and the at least one other VNIC-level firewall rule to generate the PNIC-level firewall rule. 16. The host of claim 15, wherein the packet fields include one or more of: source Internet Protocol (IP) address, source port number, destination IP address, destination protocol number, protocol and action. 17. The host of claim 13, wherein the destination host implements a distributed firewall engine that is configurable by a firewall controller and the instructions further cause the processor to:
in response to receiving a control message from the firewall controller, configure the firewall engine to apply the PNIC-level firewall rule at the PNIC instead of applying the VNIC-level firewall rule at the destination VNIC. 18. The host of claim 17, wherein the PNIC-level firewall rule specified in the control message is generated by the firewall controller by aggregating the multiple VNIC-level firewall rules. | 2,400 |
7,718 | 7,718 | 14,941,207 | 2,438 | Systems and methods for system login and single sign-on are described. A first application of a first system receives a request to access a protected application of a second system. An assertion is generated in response to the request. The assertion asserts an identity in the first system of a user generating the request. The assertion is validated and first account information corresponding to the assertion is extracted. The first account information is information of a first account of the user in the first system. Second account information is determined that is information of a second account of the user in the second system. A mapping is generated between the first account and the second account using the first account information and the second account information. The mapping is used to provide access to the protected application by the requestor. | 1. A method comprising:
receiving at a first application of a first system a request to access a protected application of a second system; generating in response to the request an assertion that asserts an identity in the first system of a user generating the request; validating the assertion and extracting first account information corresponding to the assertion, wherein the first account information is information of a first account of the user in the first system; determining second account information that is information of a second account of the user in the second system; and generating a mapping between the first account and the second account using the first account information and the second account information. 2. The method of claim 1, comprising providing access to the protected application by the user via the mapping. 3. The method of claim 1, wherein the second system is remote to the first system. 4. The method of claim 1, wherein the generating of the assertion is performed at the first system. 5. The method of claim 1, wherein the generating of the assertion uses security assertion markup language. 6. The method of claim 1, comprising generating a query string parameter in response to the request, wherein the query string parameter includes the assertion. 7. The method of claim 6, comprising generating the query string parameter to include a uniform resource locator corresponding to an electronic location of the protected application. 8. The method of claim 7, comprising, following the mapping, redirecting the user to the protected application using the uniform resource locator. 9. The method of claim 6, comprising generating the query string parameter at the first system and propagating the query string parameter to the second system. 10. The method of claim 1, wherein the validating is performed at the second system using a key provided by the first system. 11. The method of claim 1, wherein the determining the second account information comprises, in response to the first account information, generating a prompt for the second account information. 12. The method of claim 1, wherein the generating the mapping comprises generating the mapping in response to receipt of the second account information. 13. The method of claim 1, comprising authenticating the second account information prior to the generating of the mapping. 14. The method of claim 13, comprising determining that the second account information is associated with a plurality of organizations and prompting the user to select an organization of the plurality of organizations. 15. The method of claim 14, comprising generating the mapping to include the organization selected. 16. The method of claim 1, wherein the mapping comprises generating a logical link between the first account information and the second account information. 17. The method of claim 1, comprising storing the mapping in the second system. 18. The method of claim 1, wherein the first account information comprises an account name of the first account in the first system. 19. The method of claim 1, wherein the second account information comprises an account name of the second account in the second system. 20. The method of claim 19, wherein the second account information comprises a password corresponding to the second account. | Systems and methods for system login and single sign-on are described. A first application of a first system receives a request to access a protected application of a second system. An assertion is generated in response to the request. The assertion asserts an identity in the first system of a user generating the request. The assertion is validated and first account information corresponding to the assertion is extracted. The first account information is information of a first account of the user in the first system. Second account information is determined that is information of a second account of the user in the second system. A mapping is generated between the first account and the second account using the first account information and the second account information. The mapping is used to provide access to the protected application by the requestor.1. A method comprising:
receiving at a first application of a first system a request to access a protected application of a second system; generating in response to the request an assertion that asserts an identity in the first system of a user generating the request; validating the assertion and extracting first account information corresponding to the assertion, wherein the first account information is information of a first account of the user in the first system; determining second account information that is information of a second account of the user in the second system; and generating a mapping between the first account and the second account using the first account information and the second account information. 2. The method of claim 1, comprising providing access to the protected application by the user via the mapping. 3. The method of claim 1, wherein the second system is remote to the first system. 4. The method of claim 1, wherein the generating of the assertion is performed at the first system. 5. The method of claim 1, wherein the generating of the assertion uses security assertion markup language. 6. The method of claim 1, comprising generating a query string parameter in response to the request, wherein the query string parameter includes the assertion. 7. The method of claim 6, comprising generating the query string parameter to include a uniform resource locator corresponding to an electronic location of the protected application. 8. The method of claim 7, comprising, following the mapping, redirecting the user to the protected application using the uniform resource locator. 9. The method of claim 6, comprising generating the query string parameter at the first system and propagating the query string parameter to the second system. 10. The method of claim 1, wherein the validating is performed at the second system using a key provided by the first system. 11. The method of claim 1, wherein the determining the second account information comprises, in response to the first account information, generating a prompt for the second account information. 12. The method of claim 1, wherein the generating the mapping comprises generating the mapping in response to receipt of the second account information. 13. The method of claim 1, comprising authenticating the second account information prior to the generating of the mapping. 14. The method of claim 13, comprising determining that the second account information is associated with a plurality of organizations and prompting the user to select an organization of the plurality of organizations. 15. The method of claim 14, comprising generating the mapping to include the organization selected. 16. The method of claim 1, wherein the mapping comprises generating a logical link between the first account information and the second account information. 17. The method of claim 1, comprising storing the mapping in the second system. 18. The method of claim 1, wherein the first account information comprises an account name of the first account in the first system. 19. The method of claim 1, wherein the second account information comprises an account name of the second account in the second system. 20. The method of claim 19, wherein the second account information comprises a password corresponding to the second account. | 2,400 |
7,719 | 7,719 | 15,104,141 | 2,445 | A client terminal and a server system having a plurality of processing units processing game applications are connected to each other via a network. In a game system as a cloud computing system, the server system performs streaming distribution of a result of processing of a game application to the client terminal, and stores save data in a second storage system. The client terminal can obtain the save data stored in the second storage system and store the save data in an auxiliary storage device, and can transmit the save data to a first storage system to perform backup storage of the save data. | 1. An information processing system comprising:
an information processing device; a storage system transmitting or receiving save data to or from the information processing device; and a server system having a plurality of processing units processing applications; the server system processing an application using the processing unit in response to a request to execute the application from the information processing device, and transmitting a result of the processing to the information processing device, the server system storing save data of the application processed by the processing unit in the storage system, the information processing device being capable of obtaining the save data stored in the storage system and storing the save data in a local storage device of the information processing device, and the storage system being capable of obtaining and storing save data stored in the local storage device of the information processing device. 2. The information processing system according to claim 1, wherein the server system can process the application using the save data obtained from the local storage device of the information processing device and stored in the storage system. 3. The information processing system according to claim 1, wherein the storage system can synchronize the save data between the storage system and the information processing device. 4. The information processing system according to claim 1, further comprising another storage system than the storage system, wherein the other storage system can obtain and store the save data stored in the local storage device of the information processing device. 5. The information processing system according to claim 4, wherein the information processing device displays a screen for selecting either the storage system or the other storage system as a save data storage destination. 6. An information processing device connected to a server system having a plurality of processing units processing applications,
the server system processing an application using the processing unit in response to a request to execute the application from the information processing device, and transmitting a result of the processing to the information processing device, the server system storing save data of the application processed by the processing unit in a storage system the information processing device uploading save data stored in a local storage device of the information processing device to the storage system | A client terminal and a server system having a plurality of processing units processing game applications are connected to each other via a network. In a game system as a cloud computing system, the server system performs streaming distribution of a result of processing of a game application to the client terminal, and stores save data in a second storage system. The client terminal can obtain the save data stored in the second storage system and store the save data in an auxiliary storage device, and can transmit the save data to a first storage system to perform backup storage of the save data.1. An information processing system comprising:
an information processing device; a storage system transmitting or receiving save data to or from the information processing device; and a server system having a plurality of processing units processing applications; the server system processing an application using the processing unit in response to a request to execute the application from the information processing device, and transmitting a result of the processing to the information processing device, the server system storing save data of the application processed by the processing unit in the storage system, the information processing device being capable of obtaining the save data stored in the storage system and storing the save data in a local storage device of the information processing device, and the storage system being capable of obtaining and storing save data stored in the local storage device of the information processing device. 2. The information processing system according to claim 1, wherein the server system can process the application using the save data obtained from the local storage device of the information processing device and stored in the storage system. 3. The information processing system according to claim 1, wherein the storage system can synchronize the save data between the storage system and the information processing device. 4. The information processing system according to claim 1, further comprising another storage system than the storage system, wherein the other storage system can obtain and store the save data stored in the local storage device of the information processing device. 5. The information processing system according to claim 4, wherein the information processing device displays a screen for selecting either the storage system or the other storage system as a save data storage destination. 6. An information processing device connected to a server system having a plurality of processing units processing applications,
the server system processing an application using the processing unit in response to a request to execute the application from the information processing device, and transmitting a result of the processing to the information processing device, the server system storing save data of the application processed by the processing unit in a storage system the information processing device uploading save data stored in a local storage device of the information processing device to the storage system | 2,400 |
7,720 | 7,720 | 15,232,280 | 2,498 | A method is disclosed for providing physical access credentials to a client device. The method may include receiving a request for a physical access credential, where the first request includes at least one user access credential and at least one physical access point identifier. The method may also include determining whether the request should be granted based at least in part on the at least one user access credential. The method may further include, in response to determining that the request should be granted, sending the physical access credential associated with the physical access point. | 1-20. (canceled) 21. A method, comprising:
receiving, by a physical access point, a request to cause a physical lock actuator associated with the physical access point to be in an unlocked state, the request being associated with a client device; determining, by the physical access point, that the request is authorized, the determination that the request is authorized being based at least in part on at least one authentication credential associated with the client device; and, causing, by the physical access point, the physical lock actuator associated with the physical access point to be in the unlocked state. 22. The method of claim 21, wherein determining that the request is authorized is further based at least in part on a determination that the client device complies with at least one compliance rule. 23. The method of claim 22, wherein the at least one compliance rule comprises at least one hardware restriction. 24. The method of claim 22, wherein the at least one compliance rule comprises at least one software restriction. 25. The method of claim 22, wherein the at least one compliance rule comprises at least one mobile device management restriction. 26. The method of claim 22, wherein the determination that the client device complies with the at least one compliance rule is provided by the client device. 27. The method of claim 22, wherein the determination that the client device complies with the at least one compliance rule is provided by the physical access point. 28. The method of claim 22, wherein the determination that the client device complies with the at least one compliance rule is provided by a compliance service. 29. The method of claim 28, further comprising:
identifying, by the physical access point, the at least one compliance rule; identifying, by the physical access point, a device profile associated with the client device; and, determining, by the physical access point, that the at least one compliance rule is satisfied based at least in part on the device profile associated with the client device. 30. A computing device, comprising:
one or more processors; and, a memory coupled to the one or more processors, the memory storing instructions that, when executed by the one or more processors, cause the computing system to:
receive, by a physical access point, a request to cause a physical lock actuator associated with the physical access point to be in an unlocked state, the request being associated with a client device;
determine, by the physical access point, that the request is authorized, the determination that the request is authorized being based at least in part on at least one authentication credential associated with the client device; and,
cause, by the physical access point, the physical lock actuator associated with the physical access point to be in the unlocked state. 31. The computing device of claim 30, wherein the request comprises at least one physical access credential, and wherein determining that the request is authorized is further based at least in part on at least one of the at least one physical access credential being verified. 32. The computing device of claim 31, the at least one of the at least one physical access credential being verified in an instance in which the at least one of the at least one physical access credential corresponds to a value stored in a data store accessible to the physical access point. 33. The computing device of claim 31, the at least one of the at least one physical access credential being verified in an instance in which the at least one of the at least one physical access credential has not been revoked. 34. The computing device of claim 31, the at least one of the at least one physical access credential being verified in an instance in which the at least one of the at least one physical access credential has not expired. 35. The computing device of claim 31, further comprising instructions that, when executed by the one or more processors, cause the computing system to determine that the at least one of the at least one physical access credential is verified by:
transmitting to an authorization service, by the physical access point, a request to verify the at least one physical access credential. 36. A non-transitory computer-readable medium storing instructions that, when executed by one or more processors, cause a computing device to:
receive, by a physical access point, a request to cause a physical lock actuator associated with the physical access point to be in an unlocked state, the request being associated with a client device; determine, by the physical access point, that the request is authorized, the determination that the request is authorized being based at least in part on at least one authentication credential associated with the client device; and, cause, by the physical access point, the physical lock actuator associated with the physical access point to be in the unlocked state. 37. The non-transitory computer-readable medium of claim 36, further storing instructions that, when executed by the one or more processors, further cause the computing device to:
transmit, by the physical access point, a request for at least one physical access credential. 38. The non-transitory computer-readable medium of claim 36, wherein the request for the at least one physical access credential is transmitted to the client device. 39. The non-transitory computer-readable medium of claim 36, wherein the request for the at least one physical access credential is transmitted to an authorization service. 40. The non-transitory computer-readable medium of claim 36, further storing instructions that, when executed by the one or more processors, further cause the computing device to:
cause, by the physical access point, at least one physical access credential to be revoked. | A method is disclosed for providing physical access credentials to a client device. The method may include receiving a request for a physical access credential, where the first request includes at least one user access credential and at least one physical access point identifier. The method may also include determining whether the request should be granted based at least in part on the at least one user access credential. The method may further include, in response to determining that the request should be granted, sending the physical access credential associated with the physical access point.1-20. (canceled) 21. A method, comprising:
receiving, by a physical access point, a request to cause a physical lock actuator associated with the physical access point to be in an unlocked state, the request being associated with a client device; determining, by the physical access point, that the request is authorized, the determination that the request is authorized being based at least in part on at least one authentication credential associated with the client device; and, causing, by the physical access point, the physical lock actuator associated with the physical access point to be in the unlocked state. 22. The method of claim 21, wherein determining that the request is authorized is further based at least in part on a determination that the client device complies with at least one compliance rule. 23. The method of claim 22, wherein the at least one compliance rule comprises at least one hardware restriction. 24. The method of claim 22, wherein the at least one compliance rule comprises at least one software restriction. 25. The method of claim 22, wherein the at least one compliance rule comprises at least one mobile device management restriction. 26. The method of claim 22, wherein the determination that the client device complies with the at least one compliance rule is provided by the client device. 27. The method of claim 22, wherein the determination that the client device complies with the at least one compliance rule is provided by the physical access point. 28. The method of claim 22, wherein the determination that the client device complies with the at least one compliance rule is provided by a compliance service. 29. The method of claim 28, further comprising:
identifying, by the physical access point, the at least one compliance rule; identifying, by the physical access point, a device profile associated with the client device; and, determining, by the physical access point, that the at least one compliance rule is satisfied based at least in part on the device profile associated with the client device. 30. A computing device, comprising:
one or more processors; and, a memory coupled to the one or more processors, the memory storing instructions that, when executed by the one or more processors, cause the computing system to:
receive, by a physical access point, a request to cause a physical lock actuator associated with the physical access point to be in an unlocked state, the request being associated with a client device;
determine, by the physical access point, that the request is authorized, the determination that the request is authorized being based at least in part on at least one authentication credential associated with the client device; and,
cause, by the physical access point, the physical lock actuator associated with the physical access point to be in the unlocked state. 31. The computing device of claim 30, wherein the request comprises at least one physical access credential, and wherein determining that the request is authorized is further based at least in part on at least one of the at least one physical access credential being verified. 32. The computing device of claim 31, the at least one of the at least one physical access credential being verified in an instance in which the at least one of the at least one physical access credential corresponds to a value stored in a data store accessible to the physical access point. 33. The computing device of claim 31, the at least one of the at least one physical access credential being verified in an instance in which the at least one of the at least one physical access credential has not been revoked. 34. The computing device of claim 31, the at least one of the at least one physical access credential being verified in an instance in which the at least one of the at least one physical access credential has not expired. 35. The computing device of claim 31, further comprising instructions that, when executed by the one or more processors, cause the computing system to determine that the at least one of the at least one physical access credential is verified by:
transmitting to an authorization service, by the physical access point, a request to verify the at least one physical access credential. 36. A non-transitory computer-readable medium storing instructions that, when executed by one or more processors, cause a computing device to:
receive, by a physical access point, a request to cause a physical lock actuator associated with the physical access point to be in an unlocked state, the request being associated with a client device; determine, by the physical access point, that the request is authorized, the determination that the request is authorized being based at least in part on at least one authentication credential associated with the client device; and, cause, by the physical access point, the physical lock actuator associated with the physical access point to be in the unlocked state. 37. The non-transitory computer-readable medium of claim 36, further storing instructions that, when executed by the one or more processors, further cause the computing device to:
transmit, by the physical access point, a request for at least one physical access credential. 38. The non-transitory computer-readable medium of claim 36, wherein the request for the at least one physical access credential is transmitted to the client device. 39. The non-transitory computer-readable medium of claim 36, wherein the request for the at least one physical access credential is transmitted to an authorization service. 40. The non-transitory computer-readable medium of claim 36, further storing instructions that, when executed by the one or more processors, further cause the computing device to:
cause, by the physical access point, at least one physical access credential to be revoked. | 2,400 |
7,721 | 7,721 | 13,635,170 | 2,482 | A particular implementation receives a stereo video and a disparity map corresponding to the stereo video, the disparity map including a sample that does not indicate an actual disparity value. The particular implementation determines disparity information corresponding to the sample and processes the stereo video based on the disparity information. Another implementation receives a stereo video and processes disparity information corresponding to the stereo video. A further implementation generates a disparity map, the disparity map including a sample that does not indicate an actual disparity value. | 1. A method, comprising:
receiving a stereo video and a disparity map corresponding to the stereo video, the disparity map including a sample that does not indicate an actual disparity value: determining disparity information according to the sample, the disparity information representative of information other than a disparity value; and processing the stereo video based on the disparity information. 2. The method of claim 1, wherein the disparity map is a dense disparity map, and wherein the determined disparity information relates to a pixel associated with the sample. 3. The method of claim 1, wherein the disparity information relates to a group of pixels associated with the sample. 4. The method of claim 1, wherein the sample is selected from one or more alternatives to provide the disparity information. 5. The method of claim 4, wherein the sample indicates whether an actual disparity value that should correspond to the sample is less than or greater than a value. 6. The method of claim 5, wherein the value is a pre-determined value or a calculated value. 7. The method of claim 6, wherein the calculated value is calculated based on one or more disparity values at other locations. 8. The method of claim 7, wherein the calculated value is calculated based on interpolation of two disparity values at other locations. 9. The method of claim 1, wherein the determining step includes correlating the sample with a respective one of a plurality of pre-determined disparity conditions to provide the disparity information. 10. The method of claim 1, wherein the processing includes one of placing overlay information, adjusting 3D effects, generating warnings, and synthesizing new views. 11. The method of claim 1, further comprising receiving a user preference from a user interface for strength of 3D effects and wherein the processing includes processing the stereo video in response to the user preference. 12. (canceled) 13. A method, comprising:
receiving a stereo video; processing disparity information corresponding to the stereo video; and generating a disparity map for the stereo video, the disparity map including a sample that does not indicate an actual disparity value, wherein the sample indicates whether the actual disparity value that should correspond to the sample is less or greater than a value. 14. The method of claim 13, wherein the disparity map is a dense disparity map. 15. The method of claim 13, wherein the sample is selected from one or more alternatives to provide the disparity information. 16. (canceled) 17. An apparatus, comprising:
an input receiving a stereo video and a disparity map corresponding to the stereo video, the disparity map including a sample that does not indicate an actual disparity value; and a processor determining disparity information according to the sample and processing the stereo video based on the disparity information, the disparity information representative of information other than a disparity value. 18-19. (canceled) 20. A processor readable medium having stored thereupon instructions for causing one or more processors to collectively perform:
receiving a stereo video and a disparity map corresponding to the stereo video, the disparity map including a sample that does not indicate an actual disparity value; and determining disparity information according to the sample and processing the stereo video based on the disparity information, the disparity information representative of information other than a disparity value. 21. An apparatus, comprising:
an input receiving a stereo video; a processor processing disparity information corresponding to the stereo video; and an output generating a disparity map for the stereo video, the disparity map including a sample that does not indicate an actual disparity value, wherein the sample indicates whether the actual disparity value that should correspond to the sample is less or greater than a value. | A particular implementation receives a stereo video and a disparity map corresponding to the stereo video, the disparity map including a sample that does not indicate an actual disparity value. The particular implementation determines disparity information corresponding to the sample and processes the stereo video based on the disparity information. Another implementation receives a stereo video and processes disparity information corresponding to the stereo video. A further implementation generates a disparity map, the disparity map including a sample that does not indicate an actual disparity value.1. A method, comprising:
receiving a stereo video and a disparity map corresponding to the stereo video, the disparity map including a sample that does not indicate an actual disparity value: determining disparity information according to the sample, the disparity information representative of information other than a disparity value; and processing the stereo video based on the disparity information. 2. The method of claim 1, wherein the disparity map is a dense disparity map, and wherein the determined disparity information relates to a pixel associated with the sample. 3. The method of claim 1, wherein the disparity information relates to a group of pixels associated with the sample. 4. The method of claim 1, wherein the sample is selected from one or more alternatives to provide the disparity information. 5. The method of claim 4, wherein the sample indicates whether an actual disparity value that should correspond to the sample is less than or greater than a value. 6. The method of claim 5, wherein the value is a pre-determined value or a calculated value. 7. The method of claim 6, wherein the calculated value is calculated based on one or more disparity values at other locations. 8. The method of claim 7, wherein the calculated value is calculated based on interpolation of two disparity values at other locations. 9. The method of claim 1, wherein the determining step includes correlating the sample with a respective one of a plurality of pre-determined disparity conditions to provide the disparity information. 10. The method of claim 1, wherein the processing includes one of placing overlay information, adjusting 3D effects, generating warnings, and synthesizing new views. 11. The method of claim 1, further comprising receiving a user preference from a user interface for strength of 3D effects and wherein the processing includes processing the stereo video in response to the user preference. 12. (canceled) 13. A method, comprising:
receiving a stereo video; processing disparity information corresponding to the stereo video; and generating a disparity map for the stereo video, the disparity map including a sample that does not indicate an actual disparity value, wherein the sample indicates whether the actual disparity value that should correspond to the sample is less or greater than a value. 14. The method of claim 13, wherein the disparity map is a dense disparity map. 15. The method of claim 13, wherein the sample is selected from one or more alternatives to provide the disparity information. 16. (canceled) 17. An apparatus, comprising:
an input receiving a stereo video and a disparity map corresponding to the stereo video, the disparity map including a sample that does not indicate an actual disparity value; and a processor determining disparity information according to the sample and processing the stereo video based on the disparity information, the disparity information representative of information other than a disparity value. 18-19. (canceled) 20. A processor readable medium having stored thereupon instructions for causing one or more processors to collectively perform:
receiving a stereo video and a disparity map corresponding to the stereo video, the disparity map including a sample that does not indicate an actual disparity value; and determining disparity information according to the sample and processing the stereo video based on the disparity information, the disparity information representative of information other than a disparity value. 21. An apparatus, comprising:
an input receiving a stereo video; a processor processing disparity information corresponding to the stereo video; and an output generating a disparity map for the stereo video, the disparity map including a sample that does not indicate an actual disparity value, wherein the sample indicates whether the actual disparity value that should correspond to the sample is less or greater than a value. | 2,400 |
7,722 | 7,722 | 14,926,804 | 2,477 | A system and method of executing a corrective action in response to detecting a particular pattern in a performance level of a wireless connection is disclosed. A prior performance level associated with a wireless connection and a current performance level associated with the wireless connection are determined. The current performance level is determined to be lower than the prior performance level. Responsive to determining that the current performance level is lower than the prior performance level, a corrective action is selected from a set of corrective actions, and the selected corrective action is executed. | 1. A non-transitory computer readable medium comprising instructions which, when executed by one or more hardware processors, causes performance of operations comprising:
determining a current performance level associated with a wireless connection; determining that the current performance level is lower than a prior performance level associated with the wireless connection; responsive to determining that the current performance level is lower than the prior performance level: selecting a corrective action from a plurality of corrective actions; executing the corrective action. 2. The medium of claim 1, wherein the determining operation is performed prior to detecting a failure state in association with the wireless connection. 3. The medium of claim 1, wherein the determining operation is performed prior to detecting an undesirable state of the wireless connection. 4. The medium of claim 3, wherein selecting and executing the corrective action is further responsive to:
identifying a likelihood of occurrence of the undesirable state of the wireless connection based at least on the current performance level; determining that the likelihood of occurrence of the undesirable state of the wireless connection is above a particular threshold value. 5. The medium of claim 4, wherein the likelihood of occurrence of the undesirable state of the wireless connection is determined based on a pattern comprising the current performance level and a prior performance level. 6. The medium of claim 1, wherein executing the corrective action improves the current performance level associated with the wireless connection. 7. The medium of claim 1, wherein executing the corrective action prevents reduction of the current performance level associated with the wireless connection. 8. The medium of claim 1, wherein executing the corrective action results in avoiding failure of the wireless connection. 9. The medium of claim 1, wherein the current performance level indicates an amount of time needed for a client device to switch from associating with a first access point to associating with a second access point. 10. The medium of claim 1, wherein the current performance level indicates a received signal strength or a Signal-To-Noise Ratio (SNR) of wireless signals exchanged between a client device and an access point. 11. A method comprising:
determining that a current performance level, associated with a wireless connection, is lower than a prior performance level associated with the wireless connection; responsive to determining that the current performance level is lower than the prior performance level:
selecting a corrective action from a plurality of corrective actions;
executing the corrective action. 12. The method of claim 11, wherein the determining operation is performed prior to detecting a failure state in association with the wireless connection. 13. The method of claim 11, wherein the determining operation is performed prior to detecting an undesirable state of the wireless connection. 14. The method of claim 13, wherein selecting and executing the corrective action is further responsive to:
identifying a likelihood of occurrence of the undesirable state of the wireless connection based at least on the current performance level; determining that the likelihood of occurrence of the undesirable state of the wireless connection is above a particular threshold value. 15. A non-transitory computer readable medium comprising instructions which, when executed by one or more hardware processors, causes performance of operations comprising:
successfully completing an 802.11 authentication process to authenticate a client device for establishing a wireless connection with an access point; determining that the client device (a) did not receive an Internet Protocol (IP) address assignment or (b) did not complete a network authentication process for connecting to a network associated with the access point; responsive to the determining operation: re-executing the 802.11 authentication process to authenticate the client device for establishing the wireless connection with the access point. 16. The medium of claim 15, wherein the determining operation comprises determining that the client device did not receive the IP address assignment. 17. The medium of claim 16, wherein determining that the client device did not receive the IP address assignment comprises determining that the client device did not receive the IP address assignment within a particular period of time. 18. The medium of claim 15, wherein the determining operation comprises determining that the client device did not complete the network authentication process for connecting to the network associated with the access point. 19. The medium of claim 18, wherein determining that the client device did not complete the network authentication process comprises determining that the client device did not complete the network authentication process within a particular period of time. 20. The medium of claim 15, wherein re-executing the 802.11 authentication process restarts a process for establishing the wireless connection between the client device and the access point. | A system and method of executing a corrective action in response to detecting a particular pattern in a performance level of a wireless connection is disclosed. A prior performance level associated with a wireless connection and a current performance level associated with the wireless connection are determined. The current performance level is determined to be lower than the prior performance level. Responsive to determining that the current performance level is lower than the prior performance level, a corrective action is selected from a set of corrective actions, and the selected corrective action is executed.1. A non-transitory computer readable medium comprising instructions which, when executed by one or more hardware processors, causes performance of operations comprising:
determining a current performance level associated with a wireless connection; determining that the current performance level is lower than a prior performance level associated with the wireless connection; responsive to determining that the current performance level is lower than the prior performance level: selecting a corrective action from a plurality of corrective actions; executing the corrective action. 2. The medium of claim 1, wherein the determining operation is performed prior to detecting a failure state in association with the wireless connection. 3. The medium of claim 1, wherein the determining operation is performed prior to detecting an undesirable state of the wireless connection. 4. The medium of claim 3, wherein selecting and executing the corrective action is further responsive to:
identifying a likelihood of occurrence of the undesirable state of the wireless connection based at least on the current performance level; determining that the likelihood of occurrence of the undesirable state of the wireless connection is above a particular threshold value. 5. The medium of claim 4, wherein the likelihood of occurrence of the undesirable state of the wireless connection is determined based on a pattern comprising the current performance level and a prior performance level. 6. The medium of claim 1, wherein executing the corrective action improves the current performance level associated with the wireless connection. 7. The medium of claim 1, wherein executing the corrective action prevents reduction of the current performance level associated with the wireless connection. 8. The medium of claim 1, wherein executing the corrective action results in avoiding failure of the wireless connection. 9. The medium of claim 1, wherein the current performance level indicates an amount of time needed for a client device to switch from associating with a first access point to associating with a second access point. 10. The medium of claim 1, wherein the current performance level indicates a received signal strength or a Signal-To-Noise Ratio (SNR) of wireless signals exchanged between a client device and an access point. 11. A method comprising:
determining that a current performance level, associated with a wireless connection, is lower than a prior performance level associated with the wireless connection; responsive to determining that the current performance level is lower than the prior performance level:
selecting a corrective action from a plurality of corrective actions;
executing the corrective action. 12. The method of claim 11, wherein the determining operation is performed prior to detecting a failure state in association with the wireless connection. 13. The method of claim 11, wherein the determining operation is performed prior to detecting an undesirable state of the wireless connection. 14. The method of claim 13, wherein selecting and executing the corrective action is further responsive to:
identifying a likelihood of occurrence of the undesirable state of the wireless connection based at least on the current performance level; determining that the likelihood of occurrence of the undesirable state of the wireless connection is above a particular threshold value. 15. A non-transitory computer readable medium comprising instructions which, when executed by one or more hardware processors, causes performance of operations comprising:
successfully completing an 802.11 authentication process to authenticate a client device for establishing a wireless connection with an access point; determining that the client device (a) did not receive an Internet Protocol (IP) address assignment or (b) did not complete a network authentication process for connecting to a network associated with the access point; responsive to the determining operation: re-executing the 802.11 authentication process to authenticate the client device for establishing the wireless connection with the access point. 16. The medium of claim 15, wherein the determining operation comprises determining that the client device did not receive the IP address assignment. 17. The medium of claim 16, wherein determining that the client device did not receive the IP address assignment comprises determining that the client device did not receive the IP address assignment within a particular period of time. 18. The medium of claim 15, wherein the determining operation comprises determining that the client device did not complete the network authentication process for connecting to the network associated with the access point. 19. The medium of claim 18, wherein determining that the client device did not complete the network authentication process comprises determining that the client device did not complete the network authentication process within a particular period of time. 20. The medium of claim 15, wherein re-executing the 802.11 authentication process restarts a process for establishing the wireless connection between the client device and the access point. | 2,400 |
7,723 | 7,723 | 13,829,628 | 2,451 | Methods and systems for managing data are disclosed. One method can comprise storing first data locally relative to a user device and storing second data remotely relative to the user device. The first data and the second data can relate to the same content. The method can also comprise generating a manifest comprising location information relating to the first data and the second data and receiving a request for transmission of one or more of the first data and the second data based upon the manifest. | 1. A method comprising:
storing first data locally relative to a user device; storing second data remotely relative to the user device, wherein the first data and the second data relate to the same content; generating a manifest comprising location information relating to the first data and the second data; and receiving a request for transmission of one or more of the first data and the second data based upon the manifest. 2. The method of claim 1, wherein one or more of the first data and the second data comprises content fragments. 3. The method of claim 1, wherein one or more of the first data and the second data comprises a bit rate, a resolution, an identifier, location information, a cost function, or a combination thereof. 4. The method of claim 1, wherein the first data comprises a bit rate that is different from a bit rate of the second data. 5. The method of claim 1, wherein storing data locally comprises storing data on storage medium disposed locally relative to the user device. 6. The method of claim 1, wherein storing second data remotely comprises storing the second data on a network device. 7. The method of claim 1, further comprising transmitting the manifest to the user device, wherein the request form transmission is received from the user device. 8. A method comprising:
transmitting first data based upon a first condition; transmitting second data based on a second condition; generating a manifest comprising location information relating to the first data and the second data; and receiving a request for transmission of one or more of the first data and the second data based upon the manifest. 9. The method of claim 8, wherein one or more of the first data and the second data comprises content fragments. 10. The method of claim 8, wherein one or more of the first data and the second data comprises a bit rate, a resolution, or a combination thereof. 11. The method of claim 8, wherein the first data comprises a bit rate that is different from a bit rate of the second data. 12. The method of claim 8, wherein one or more of the first condition and the second condition comprises available bandwidth, storage capacity, content priority, QoS, on-net or off-net state, recipient device characteristics, or a combination thereof. 13. The method of claim 8, further comprising transmitting the manifest to a device, wherein the request form transmission is received from the device. 14. A method comprising:
receiving a manifest at a user device, the manifest comprising location information relating to a first data stored locally relative to the user device and a second data stored remotely relative to the user device; determining a parameter relating to the user device; and requesting one or more of the first data and the second data based upon the manifest and the determined parameter. 15. The method of claim 14, wherein one or more of the first data and the second data comprises content fragments. 16. The method of claim 14, wherein one or more of the first data and the second data comprises a bit rate, a resolution, or a combination thereof. 17. The method of claim 14, wherein the first data comprises a bit rate that is different from a bit rate of the second data. 18. The method of claim 14, wherein the first storage medium is disposed locally relative to a source of the request for transmission. 19. The method of claim 14, wherein the second storage medium is disposed remotely relative to a source of the request for transmission. 20. The method of claim 14, wherein the parameter comprises available bandwidth, storage capacity, content priority, QoS, on-net or off-net state, recipient device characteristics, or a combination thereof. | Methods and systems for managing data are disclosed. One method can comprise storing first data locally relative to a user device and storing second data remotely relative to the user device. The first data and the second data can relate to the same content. The method can also comprise generating a manifest comprising location information relating to the first data and the second data and receiving a request for transmission of one or more of the first data and the second data based upon the manifest.1. A method comprising:
storing first data locally relative to a user device; storing second data remotely relative to the user device, wherein the first data and the second data relate to the same content; generating a manifest comprising location information relating to the first data and the second data; and receiving a request for transmission of one or more of the first data and the second data based upon the manifest. 2. The method of claim 1, wherein one or more of the first data and the second data comprises content fragments. 3. The method of claim 1, wherein one or more of the first data and the second data comprises a bit rate, a resolution, an identifier, location information, a cost function, or a combination thereof. 4. The method of claim 1, wherein the first data comprises a bit rate that is different from a bit rate of the second data. 5. The method of claim 1, wherein storing data locally comprises storing data on storage medium disposed locally relative to the user device. 6. The method of claim 1, wherein storing second data remotely comprises storing the second data on a network device. 7. The method of claim 1, further comprising transmitting the manifest to the user device, wherein the request form transmission is received from the user device. 8. A method comprising:
transmitting first data based upon a first condition; transmitting second data based on a second condition; generating a manifest comprising location information relating to the first data and the second data; and receiving a request for transmission of one or more of the first data and the second data based upon the manifest. 9. The method of claim 8, wherein one or more of the first data and the second data comprises content fragments. 10. The method of claim 8, wherein one or more of the first data and the second data comprises a bit rate, a resolution, or a combination thereof. 11. The method of claim 8, wherein the first data comprises a bit rate that is different from a bit rate of the second data. 12. The method of claim 8, wherein one or more of the first condition and the second condition comprises available bandwidth, storage capacity, content priority, QoS, on-net or off-net state, recipient device characteristics, or a combination thereof. 13. The method of claim 8, further comprising transmitting the manifest to a device, wherein the request form transmission is received from the device. 14. A method comprising:
receiving a manifest at a user device, the manifest comprising location information relating to a first data stored locally relative to the user device and a second data stored remotely relative to the user device; determining a parameter relating to the user device; and requesting one or more of the first data and the second data based upon the manifest and the determined parameter. 15. The method of claim 14, wherein one or more of the first data and the second data comprises content fragments. 16. The method of claim 14, wherein one or more of the first data and the second data comprises a bit rate, a resolution, or a combination thereof. 17. The method of claim 14, wherein the first data comprises a bit rate that is different from a bit rate of the second data. 18. The method of claim 14, wherein the first storage medium is disposed locally relative to a source of the request for transmission. 19. The method of claim 14, wherein the second storage medium is disposed remotely relative to a source of the request for transmission. 20. The method of claim 14, wherein the parameter comprises available bandwidth, storage capacity, content priority, QoS, on-net or off-net state, recipient device characteristics, or a combination thereof. | 2,400 |
7,724 | 7,724 | 14,294,711 | 2,486 | A video hardware engine with multi-threading functionality is disclosed. The video hardware engine includes a video hardware accelerator unit and a controller. The controller is coupled to the video hardware accelerator unit. The controller operates in an encode mode and a decode mode. In the encode mode, the controller receives a plurality of frames and encode attributes associated with each frame of the plurality of frames. The encode attributes associated with a frame of the plurality of frames is processed to generate encode parameters associated with the frame. The video hardware accelerator unit is configured to process the frame based on the encode parameters to generate an output. The output of the video hardware accelerator unit is processed to generate a compressed bit-stream and an encode status. In decode mode, the controller receives a compressed bit-stream and decode attributes and generates a plurality of frames and a decode status. | 1. A video hardware engine comprising:
a video hardware accelerator unit; and a controller coupled to the video hardware accelerator unit and configured to operate in an encode mode, the controller in the encode mode configured to:
receive a plurality of frames and encode attributes associated with each frame of the plurality of frames, each frame divided in a plurality of slices;
process the encode attributes associated with a frame of the plurality of frames to generate encode parameters associated with the frame;
configure the video hardware accelerator unit to process the frame based on the encode parameters to generate an output; and
process the output of the video hardware accelerator unit to generate a compressed bit-stream and an encode status. 2. The video hardware engine of claim 1, wherein the plurality of frames include a previous frame, a current frame and a next frame and the controller is configured to perform a set of predefined tasks in parallel, the set of predefined tasks comprises:
schedule each frame of the plurality of frames; process encode attributes associated with the next frame to generate encode parameters associated with the next frame; process a plurality of slices associated with the current frame; configure the video hardware accelerator unit to process the current frame based on encode parameters associated with the current frame; process an output of the video hardware accelerator unit to generate a compressed bit-stream corresponding to the previous frame and an encode status corresponding to the previous frame, wherein the output of the video hardware accelerator unit is generated in response to a processing of the previous frame by the video hardware accelerator unit; collate a compressed bit-stream and an encode status associated with a set of frames of the plurality of frames to generate a collated compressed bit-stream and a collated encode status; and communicate with a processing unit external to the video hardware engine and provide the collated compressed bit-stream and the collated encode status associated with the set of frames to the processing unit. 3. The video hardware engine of claim 1, wherein the controller further comprises a set of threads and a thread of the set of threads is associated with one or more predefined tasks of the set of predefined tasks. 4. The video hardware engine of claim 3, wherein each thread of the set of threads has a predefined priority and each thread is configured not to operate in wait mode, yield mode and suspend mode. 5. The video hardware engine of claim 3, wherein a first thread has a first priority and a second thread has a second priority, the first priority is higher than the second priority, the first thread configured to complete a predefined task before initiating a subsequent predefined task, and wherein the first thread and the second thread are threads in the set of threads. 6. The video hardware engine of claim 5, wherein the second thread switches from the second priority to the first priority. 7. The video hardware engine of claim 2, wherein each predefined task of the set of predefined tasks has an input queue and an output queue. 8. The video hardware engine of claim 7, wherein:
an input queue and an output queue is associated with a thread when one predefined task is associated with the thread; and multiple input queues and multiple output queues are associated with the thread when more than one predefined task is associated with the thread. 9. The video hardware engine of claim 3, wherein a thread activation semaphore is configured to activate a thread and an input queue activation semaphore is configured to activate an input queue. 10. The video hardware engine of claim 3, wherein each thread of the set of threads is an interrupt such that the set of threads form a nested interrupt eliminating a requirement of an operating system in the controller. 11. The video hardware engine of claim 3, wherein the first thread is associated with a first input queue and a first output queue, and a second thread is associated with a second input queue and a second output queue. 12. The video hardware engine of claim 11, wherein the first input queue associated with the first thread receives a data, a first thread activation semaphore, a first input queue activation semaphore, and wherein the first thread is configured to process the data to generate a processed data and configured to provide the processed data, a second thread activation semaphore, a second input queue activation semaphore to the first output queue. 13. The video hardware engine of claim 11, wherein the second input queue associated with the second thread receives a processed data, the second thread activation semaphore and the second input queue activation semaphore. 14. The video hardware engine of claim 3, wherein the set of threads comprises a communication thread, a kernel thread, a frame thread, a hardware thread and a slice thread. 15. The video hardware engine of claim 14, wherein:
the communication thread is configured to communicate with the processing unit external to the video hardware engine; the kernel thread is configured to schedule each frame of the plurality of frames; the frame thread is configured to process encode attributes associated with a frame of the plurality of frames and generate encode parameters associated with the frame; the hardware thread configures the video hardware accelerator unit to process the frame based on the encode parameters associated with the frame; and the slice thread is configured to process a plurality of slices associated with the frame. 16. The video hardware engine of claim 14, wherein:
the frame thread is configured to process the output of the video hardware accelerator unit to generate the compressed bit-stream and the encode status associated with the frame; the kernel thread is configured to collate the compressed bit-stream and the encode status associated with a set of frames of the plurality of frames to generate a collated compressed bit-stream and a collated encode status; and the communication thread is configured to provide the collated bit-stream and the collated encode status associated with the set of frames to the processing unit. 17. A video hardware engine comprising:
a video hardware accelerator unit; and a controller coupled to the video hardware accelerator unit and configured to operate in a decode mode, the controller in the decode mode configured to:
receive a compressed bit-stream and decode attributes associated with each frame of a plurality of frames, each frame divided in a plurality of slices;
process the decode attributes associated with a frame of the plurality of frames to generate decode parameters associated with the frame;
configure the video hardware accelerator unit to process the compressed bit-stream associated with the frame based on the decode parameters to generate an output; and
process an output of the video hardware accelerator unit to generate the frame and a decode status. 18. The video hardware engine of claim 17, wherein the controller is configured to receive a compressed bit-stream corresponding to each of a previous frame, a current frame and a next frame and the controller is configured to perform a set of predefined tasks in parallel, the set of predefined tasks comprises:
schedule compressed bit-stream corresponding to each frame of the plurality of frames; process decode attributes associated with the next frame to generate decode parameters associated with the next frame; process a plurality of slices associated with the current frame; configure the video hardware accelerator unit to process a compressed bit-stream associated with the current frame based on decode parameters associated with the current frame; process an output of the video hardware accelerator unit to generate a previous frame and a decode status associated with the previous frame, wherein the output of the video hardware accelerator unit is generated in response to a processing of a compressed bit-stream associated with the previous frame by the video hardware accelerator unit; collate a set of frames of the plurality of frames and the decode status associated with the set of frames to generate a collated set of frames and a collated decode status; and communicate with a processing unit external to the video hardware engine and provide the collated set of frames and the collated decode status associated with the set of frames to the processing unit. 19. The video hardware engine of claim 17, wherein the controller further comprises a set of threads and a thread of the set of threads is associated with one or more predefined tasks of the set of predefined tasks. 20. The video hardware engine of claim 19, wherein the set of threads comprises a communication thread, a kernel thread, a frame thread, a hardware thread and a slice thread. 21. The video hardware engine of claim 20, wherein:
the communication thread is configured to communicate with the processing unit external to the video hardware engine; the kernel thread is configured to schedule compressed bit-stream corresponding to each frame of a plurality of frames; the frame thread is configured to process decode attributes associated with a frame of the plurality of frames and generate decode parameters associated with the frame; the hardware thread configures the video hardware accelerator unit to process the compressed bit-stream associated with the frame based on the decode parameters associated with the frame; and the slice thread is configured to process a plurality of slices associated with the frame. 22. The video hardware engine of claim 20, wherein:
the frame thread is configured to process the output of the video hardware accelerator unit to generate the frame and the decode status associated with the frame; the kernel thread is configured to collate the set of frames of the plurality of frames and the decode status associated with the set of frames to generate the collated set of frames and the collated decode status; and the communication thread is configured to provide the collated set of frames and the collated decode status associated with the set of frames to the processing unit. 23. A method comprising:
receiving a plurality of frames and encode attributes associated with each frame of the plurality of frames; processing the encode attributes associated with a frame of the plurality of frames to generate encode parameters associated with the frame; configuring a video hardware accelerator unit to process the frame based on the encode parameters to generate an output; and processing the output of the video hardware accelerator unit to generate a compressed bit-stream and an encode status. 24. The method of claim 23, wherein receiving a plurality of frames further comprises:
receiving a previous frame, a current frame and a next frame; and performing a set of predefined tasks in parallel, and the set of predefined tasks comprising:
scheduling each frame of the plurality of frames;
processing encode attributes associated with the next frame to generate encode parameters associated with the next frame;
processing a plurality of slices associated with the current frame;
configuring the video hardware accelerator unit to process the current frame based on encode parameters associated with the current frame;
processing an output of the video hardware accelerator unit to generate a compressing bit-stream corresponding to the previous frame and an encode status corresponding to the previous frame, wherein the output of the video hardware accelerator unit is generated in response to a processing of the previous frame by the video hardware accelerator unit;
collating a compressed bit-stream and an encode status associated with a set of frames of the plurality of frames to generate a collated compressed bit-stream and a collated encode status; and
communicating with a processing unit external to a video hardware engine and provide the collated compressed bit-stream and the collated encode status associated with the set of frames to the processing unit. 25. A method comprising:
receiving a compressed bit-stream and decode attributes associated with each frame of a plurality of frames, each frame divided in a plurality of slices; processing the decode attributes associated with a frame of the plurality of frames to generate decode parameters associated with the frame; configuring a video hardware accelerator unit to process the compressed bit-stream associated with the frame based on the decode parameters to generate an output; and processing an output of the video hardware accelerator unit to generate the frame and a decode status. 26. The method of claim 25, wherein receiving a compressed bit-stream and decode attributes associated with each frame further comprises:
receiving a compressed bit-stream corresponding to each of a previous frame, a current frame and a next frame; and performing a set of predefined tasks in parallel, the set of predefined tasks comprising:
scheduling compressed bit-stream corresponding to each frame of the plurality of frames;
processing decode attributes associated with the next frame to generate decode parameters associated with the next frame;
processing a plurality of slices associated with the current frame;
configuring the video hardware accelerator unit to process a compressed bit-stream associated with the current frame based on decode parameters associated with the current frame;
processing an output of the video hardware accelerator unit to generate a previous frame and a decode status associated with the previous frame, wherein the output of the video hardware accelerator unit is generated in response to a processing of a compressed bit-stream associated with the previous frame by the video hardware accelerator unit;
collating a set of frames of the plurality of frames and the decode status associated with the set of frames to generate a collated set of frames and a collated decode status; and
communicating with a processing unit external to a video hardware engine and provide the collated set of frames and the collated decode status associated with the set of frames to the processing unit. | A video hardware engine with multi-threading functionality is disclosed. The video hardware engine includes a video hardware accelerator unit and a controller. The controller is coupled to the video hardware accelerator unit. The controller operates in an encode mode and a decode mode. In the encode mode, the controller receives a plurality of frames and encode attributes associated with each frame of the plurality of frames. The encode attributes associated with a frame of the plurality of frames is processed to generate encode parameters associated with the frame. The video hardware accelerator unit is configured to process the frame based on the encode parameters to generate an output. The output of the video hardware accelerator unit is processed to generate a compressed bit-stream and an encode status. In decode mode, the controller receives a compressed bit-stream and decode attributes and generates a plurality of frames and a decode status.1. A video hardware engine comprising:
a video hardware accelerator unit; and a controller coupled to the video hardware accelerator unit and configured to operate in an encode mode, the controller in the encode mode configured to:
receive a plurality of frames and encode attributes associated with each frame of the plurality of frames, each frame divided in a plurality of slices;
process the encode attributes associated with a frame of the plurality of frames to generate encode parameters associated with the frame;
configure the video hardware accelerator unit to process the frame based on the encode parameters to generate an output; and
process the output of the video hardware accelerator unit to generate a compressed bit-stream and an encode status. 2. The video hardware engine of claim 1, wherein the plurality of frames include a previous frame, a current frame and a next frame and the controller is configured to perform a set of predefined tasks in parallel, the set of predefined tasks comprises:
schedule each frame of the plurality of frames; process encode attributes associated with the next frame to generate encode parameters associated with the next frame; process a plurality of slices associated with the current frame; configure the video hardware accelerator unit to process the current frame based on encode parameters associated with the current frame; process an output of the video hardware accelerator unit to generate a compressed bit-stream corresponding to the previous frame and an encode status corresponding to the previous frame, wherein the output of the video hardware accelerator unit is generated in response to a processing of the previous frame by the video hardware accelerator unit; collate a compressed bit-stream and an encode status associated with a set of frames of the plurality of frames to generate a collated compressed bit-stream and a collated encode status; and communicate with a processing unit external to the video hardware engine and provide the collated compressed bit-stream and the collated encode status associated with the set of frames to the processing unit. 3. The video hardware engine of claim 1, wherein the controller further comprises a set of threads and a thread of the set of threads is associated with one or more predefined tasks of the set of predefined tasks. 4. The video hardware engine of claim 3, wherein each thread of the set of threads has a predefined priority and each thread is configured not to operate in wait mode, yield mode and suspend mode. 5. The video hardware engine of claim 3, wherein a first thread has a first priority and a second thread has a second priority, the first priority is higher than the second priority, the first thread configured to complete a predefined task before initiating a subsequent predefined task, and wherein the first thread and the second thread are threads in the set of threads. 6. The video hardware engine of claim 5, wherein the second thread switches from the second priority to the first priority. 7. The video hardware engine of claim 2, wherein each predefined task of the set of predefined tasks has an input queue and an output queue. 8. The video hardware engine of claim 7, wherein:
an input queue and an output queue is associated with a thread when one predefined task is associated with the thread; and multiple input queues and multiple output queues are associated with the thread when more than one predefined task is associated with the thread. 9. The video hardware engine of claim 3, wherein a thread activation semaphore is configured to activate a thread and an input queue activation semaphore is configured to activate an input queue. 10. The video hardware engine of claim 3, wherein each thread of the set of threads is an interrupt such that the set of threads form a nested interrupt eliminating a requirement of an operating system in the controller. 11. The video hardware engine of claim 3, wherein the first thread is associated with a first input queue and a first output queue, and a second thread is associated with a second input queue and a second output queue. 12. The video hardware engine of claim 11, wherein the first input queue associated with the first thread receives a data, a first thread activation semaphore, a first input queue activation semaphore, and wherein the first thread is configured to process the data to generate a processed data and configured to provide the processed data, a second thread activation semaphore, a second input queue activation semaphore to the first output queue. 13. The video hardware engine of claim 11, wherein the second input queue associated with the second thread receives a processed data, the second thread activation semaphore and the second input queue activation semaphore. 14. The video hardware engine of claim 3, wherein the set of threads comprises a communication thread, a kernel thread, a frame thread, a hardware thread and a slice thread. 15. The video hardware engine of claim 14, wherein:
the communication thread is configured to communicate with the processing unit external to the video hardware engine; the kernel thread is configured to schedule each frame of the plurality of frames; the frame thread is configured to process encode attributes associated with a frame of the plurality of frames and generate encode parameters associated with the frame; the hardware thread configures the video hardware accelerator unit to process the frame based on the encode parameters associated with the frame; and the slice thread is configured to process a plurality of slices associated with the frame. 16. The video hardware engine of claim 14, wherein:
the frame thread is configured to process the output of the video hardware accelerator unit to generate the compressed bit-stream and the encode status associated with the frame; the kernel thread is configured to collate the compressed bit-stream and the encode status associated with a set of frames of the plurality of frames to generate a collated compressed bit-stream and a collated encode status; and the communication thread is configured to provide the collated bit-stream and the collated encode status associated with the set of frames to the processing unit. 17. A video hardware engine comprising:
a video hardware accelerator unit; and a controller coupled to the video hardware accelerator unit and configured to operate in a decode mode, the controller in the decode mode configured to:
receive a compressed bit-stream and decode attributes associated with each frame of a plurality of frames, each frame divided in a plurality of slices;
process the decode attributes associated with a frame of the plurality of frames to generate decode parameters associated with the frame;
configure the video hardware accelerator unit to process the compressed bit-stream associated with the frame based on the decode parameters to generate an output; and
process an output of the video hardware accelerator unit to generate the frame and a decode status. 18. The video hardware engine of claim 17, wherein the controller is configured to receive a compressed bit-stream corresponding to each of a previous frame, a current frame and a next frame and the controller is configured to perform a set of predefined tasks in parallel, the set of predefined tasks comprises:
schedule compressed bit-stream corresponding to each frame of the plurality of frames; process decode attributes associated with the next frame to generate decode parameters associated with the next frame; process a plurality of slices associated with the current frame; configure the video hardware accelerator unit to process a compressed bit-stream associated with the current frame based on decode parameters associated with the current frame; process an output of the video hardware accelerator unit to generate a previous frame and a decode status associated with the previous frame, wherein the output of the video hardware accelerator unit is generated in response to a processing of a compressed bit-stream associated with the previous frame by the video hardware accelerator unit; collate a set of frames of the plurality of frames and the decode status associated with the set of frames to generate a collated set of frames and a collated decode status; and communicate with a processing unit external to the video hardware engine and provide the collated set of frames and the collated decode status associated with the set of frames to the processing unit. 19. The video hardware engine of claim 17, wherein the controller further comprises a set of threads and a thread of the set of threads is associated with one or more predefined tasks of the set of predefined tasks. 20. The video hardware engine of claim 19, wherein the set of threads comprises a communication thread, a kernel thread, a frame thread, a hardware thread and a slice thread. 21. The video hardware engine of claim 20, wherein:
the communication thread is configured to communicate with the processing unit external to the video hardware engine; the kernel thread is configured to schedule compressed bit-stream corresponding to each frame of a plurality of frames; the frame thread is configured to process decode attributes associated with a frame of the plurality of frames and generate decode parameters associated with the frame; the hardware thread configures the video hardware accelerator unit to process the compressed bit-stream associated with the frame based on the decode parameters associated with the frame; and the slice thread is configured to process a plurality of slices associated with the frame. 22. The video hardware engine of claim 20, wherein:
the frame thread is configured to process the output of the video hardware accelerator unit to generate the frame and the decode status associated with the frame; the kernel thread is configured to collate the set of frames of the plurality of frames and the decode status associated with the set of frames to generate the collated set of frames and the collated decode status; and the communication thread is configured to provide the collated set of frames and the collated decode status associated with the set of frames to the processing unit. 23. A method comprising:
receiving a plurality of frames and encode attributes associated with each frame of the plurality of frames; processing the encode attributes associated with a frame of the plurality of frames to generate encode parameters associated with the frame; configuring a video hardware accelerator unit to process the frame based on the encode parameters to generate an output; and processing the output of the video hardware accelerator unit to generate a compressed bit-stream and an encode status. 24. The method of claim 23, wherein receiving a plurality of frames further comprises:
receiving a previous frame, a current frame and a next frame; and performing a set of predefined tasks in parallel, and the set of predefined tasks comprising:
scheduling each frame of the plurality of frames;
processing encode attributes associated with the next frame to generate encode parameters associated with the next frame;
processing a plurality of slices associated with the current frame;
configuring the video hardware accelerator unit to process the current frame based on encode parameters associated with the current frame;
processing an output of the video hardware accelerator unit to generate a compressing bit-stream corresponding to the previous frame and an encode status corresponding to the previous frame, wherein the output of the video hardware accelerator unit is generated in response to a processing of the previous frame by the video hardware accelerator unit;
collating a compressed bit-stream and an encode status associated with a set of frames of the plurality of frames to generate a collated compressed bit-stream and a collated encode status; and
communicating with a processing unit external to a video hardware engine and provide the collated compressed bit-stream and the collated encode status associated with the set of frames to the processing unit. 25. A method comprising:
receiving a compressed bit-stream and decode attributes associated with each frame of a plurality of frames, each frame divided in a plurality of slices; processing the decode attributes associated with a frame of the plurality of frames to generate decode parameters associated with the frame; configuring a video hardware accelerator unit to process the compressed bit-stream associated with the frame based on the decode parameters to generate an output; and processing an output of the video hardware accelerator unit to generate the frame and a decode status. 26. The method of claim 25, wherein receiving a compressed bit-stream and decode attributes associated with each frame further comprises:
receiving a compressed bit-stream corresponding to each of a previous frame, a current frame and a next frame; and performing a set of predefined tasks in parallel, the set of predefined tasks comprising:
scheduling compressed bit-stream corresponding to each frame of the plurality of frames;
processing decode attributes associated with the next frame to generate decode parameters associated with the next frame;
processing a plurality of slices associated with the current frame;
configuring the video hardware accelerator unit to process a compressed bit-stream associated with the current frame based on decode parameters associated with the current frame;
processing an output of the video hardware accelerator unit to generate a previous frame and a decode status associated with the previous frame, wherein the output of the video hardware accelerator unit is generated in response to a processing of a compressed bit-stream associated with the previous frame by the video hardware accelerator unit;
collating a set of frames of the plurality of frames and the decode status associated with the set of frames to generate a collated set of frames and a collated decode status; and
communicating with a processing unit external to a video hardware engine and provide the collated set of frames and the collated decode status associated with the set of frames to the processing unit. | 2,400 |
7,725 | 7,725 | 14,239,087 | 2,467 | The present invention discloses a method of notifying a user terminal of MBMS service information of at least one neighboring cell of a cell of a base station where the user terminal camps, and a method of receiving from the base station where the user terminal camps the MBMS service information of at least one neighboring cell of the cell of the base station, and a corresponding user terminal and a base station. In the present invention, in a system information block SIB, the multimedia broadcast multicast service MBMS service information of the at least one neighboring cell is transmitted to the user terminal. According to the present invention, regardless of whether a current cell has MBMS service transmission or not, the MBMS service information (if any) of at least one neighboring cell of the current cell is transmitted to the UE camping on the current cell so that the UE can know in advance which neighboring cell the MBMS service of its interest is located in so as to better achieve continuity of the MBMS service. | 1. A method of notifying a user terminal of multimedia broadcast multicast service MBMS service information of at least one neighboring cell of a cell of a base station where the user terminal camps, comprising:
in a system information block SIB, transmitting to the user terminal the multimedia broadcast multicast service MBMS service information of the at least one neighboring cell. 2. The method according to claim 1, wherein the system information block is a system information block newly defined in order to notify the user terminal of the multimedia broadcast multicast service MBMS service information of the at least one neighboring cell. 3. The method according to claim 1, wherein the multimedia broadcast multicast service MBMS service information of the at least one neighboring cell comprises:
a cell identifier; and a list of an identifier of an MBMS service supported by the cell identified by the cell identifier or the multimedia broadcast multicast service MBMS service information of the at least one neighboring cell comprises: a carrier frequency; and a list of an identifier of an MBMS service supported at the carrier frequency. 4. (canceled) 5. The method according to claim 1, further comprising:
indicating to the user terminal a change of the multimedia broadcast multicast service MBMS service information of the at least one neighboring cell included in the system information block by setting bits in a downlink control information DCI format 1C to be all zero, and transmitting to the user terminal an updated edition of the system information block to notify the user terminal of the change of the multimedia broadcast multicast service MBMS service information of the at least one neighboring cell. 6. (canceled) 7. The method according to claim 1, further comprising:
through a system information block 13, transmitting to the user terminal notification configuration information which is used to notify the user terminal of occasion and period for notifying a change of the multimedia broadcast multicast service MBMS service information of the at least one neighboring cell included in the system information block. 8. The method according to claim 1, wherein the system information block further comprises:
notification configuration information which is used to notify the user terminal of occasion and period for notifying a change of the multimedia broadcast multicast service MBMS service information of the at least one neighboring cell included in the system information block. 9. A base station for notifying a user terminal camping on the base station of multimedia broadcast multicast service MBMS service information of at least one neighboring cell of a cell of the base station, comprising a module for performing the method of claim 1. 10.-16. (canceled) 17. A user terminal for receiving from a base station where the user terminal camps multimedia broadcast multicast service MBMS service information of at least one neighboring cell of a cell of the base station, comprising a module for performing the method of claim 25. 18.-24. (canceled) 25. A method of receiving from a base station where a user terminal camps multimedia broadcast multicast service MBMS service information of at least one neighboring cell of a cell of the base station, comprising:
in a system information block SIB, receiving from the base station the multimedia broadcast multicast service MBMS service information of the at least one neighboring cell. 26. The method according to claim 25, wherein the system information block is a system information block newly defined in order to notify the user terminal of the multimedia broadcast multicast service MBMS service information of the at least one neighboring cell. 27. The method according to claim 25, wherein the multimedia broadcast multicast service MBMS service information of the at least one neighboring cell comprises:
a cell identifier; and a list of an identifier of an MBMS service supported by the cell identified by the cell identifier or the multimedia broadcast multicast service MBMS service information of the at least one neighboring cell comprises: a carrier frequency; and a list of an identifier of an MBMS service supported at the carrier frequency. 28. (canceled) 29. The method according to claim 25, further comprising:
determining whether the multimedia broadcast multicast service MBMS service information of the at least one neighboring cell included in the system information block changes by determining whether bits in a downlink control information DCI format 1C are set to be all zero, and receiving from the base station an updated edition of the system information block to notify the user terminal of the change of the multimedia broadcast multicast service MBMS service information of the at least one neighboring cell. 30. (canceled) 31. The method according to claim 25, further comprising:
through a system information block 13, receiving from the base station notification configuration information which is used to notify the user terminal of occasion and period for notifying a change of the multimedia broadcast multicast service MBMS service information of the at least one neighboring cell included in the system information block. 32. The method according to claim 25, wherein the system information block further comprises:
notification configuration information which is used to notify the user terminal of occasion and period for notifying a change of the multimedia broadcast multicast service MBMS service information of the at least one neighboring cell included in the system information block. | The present invention discloses a method of notifying a user terminal of MBMS service information of at least one neighboring cell of a cell of a base station where the user terminal camps, and a method of receiving from the base station where the user terminal camps the MBMS service information of at least one neighboring cell of the cell of the base station, and a corresponding user terminal and a base station. In the present invention, in a system information block SIB, the multimedia broadcast multicast service MBMS service information of the at least one neighboring cell is transmitted to the user terminal. According to the present invention, regardless of whether a current cell has MBMS service transmission or not, the MBMS service information (if any) of at least one neighboring cell of the current cell is transmitted to the UE camping on the current cell so that the UE can know in advance which neighboring cell the MBMS service of its interest is located in so as to better achieve continuity of the MBMS service.1. A method of notifying a user terminal of multimedia broadcast multicast service MBMS service information of at least one neighboring cell of a cell of a base station where the user terminal camps, comprising:
in a system information block SIB, transmitting to the user terminal the multimedia broadcast multicast service MBMS service information of the at least one neighboring cell. 2. The method according to claim 1, wherein the system information block is a system information block newly defined in order to notify the user terminal of the multimedia broadcast multicast service MBMS service information of the at least one neighboring cell. 3. The method according to claim 1, wherein the multimedia broadcast multicast service MBMS service information of the at least one neighboring cell comprises:
a cell identifier; and a list of an identifier of an MBMS service supported by the cell identified by the cell identifier or the multimedia broadcast multicast service MBMS service information of the at least one neighboring cell comprises: a carrier frequency; and a list of an identifier of an MBMS service supported at the carrier frequency. 4. (canceled) 5. The method according to claim 1, further comprising:
indicating to the user terminal a change of the multimedia broadcast multicast service MBMS service information of the at least one neighboring cell included in the system information block by setting bits in a downlink control information DCI format 1C to be all zero, and transmitting to the user terminal an updated edition of the system information block to notify the user terminal of the change of the multimedia broadcast multicast service MBMS service information of the at least one neighboring cell. 6. (canceled) 7. The method according to claim 1, further comprising:
through a system information block 13, transmitting to the user terminal notification configuration information which is used to notify the user terminal of occasion and period for notifying a change of the multimedia broadcast multicast service MBMS service information of the at least one neighboring cell included in the system information block. 8. The method according to claim 1, wherein the system information block further comprises:
notification configuration information which is used to notify the user terminal of occasion and period for notifying a change of the multimedia broadcast multicast service MBMS service information of the at least one neighboring cell included in the system information block. 9. A base station for notifying a user terminal camping on the base station of multimedia broadcast multicast service MBMS service information of at least one neighboring cell of a cell of the base station, comprising a module for performing the method of claim 1. 10.-16. (canceled) 17. A user terminal for receiving from a base station where the user terminal camps multimedia broadcast multicast service MBMS service information of at least one neighboring cell of a cell of the base station, comprising a module for performing the method of claim 25. 18.-24. (canceled) 25. A method of receiving from a base station where a user terminal camps multimedia broadcast multicast service MBMS service information of at least one neighboring cell of a cell of the base station, comprising:
in a system information block SIB, receiving from the base station the multimedia broadcast multicast service MBMS service information of the at least one neighboring cell. 26. The method according to claim 25, wherein the system information block is a system information block newly defined in order to notify the user terminal of the multimedia broadcast multicast service MBMS service information of the at least one neighboring cell. 27. The method according to claim 25, wherein the multimedia broadcast multicast service MBMS service information of the at least one neighboring cell comprises:
a cell identifier; and a list of an identifier of an MBMS service supported by the cell identified by the cell identifier or the multimedia broadcast multicast service MBMS service information of the at least one neighboring cell comprises: a carrier frequency; and a list of an identifier of an MBMS service supported at the carrier frequency. 28. (canceled) 29. The method according to claim 25, further comprising:
determining whether the multimedia broadcast multicast service MBMS service information of the at least one neighboring cell included in the system information block changes by determining whether bits in a downlink control information DCI format 1C are set to be all zero, and receiving from the base station an updated edition of the system information block to notify the user terminal of the change of the multimedia broadcast multicast service MBMS service information of the at least one neighboring cell. 30. (canceled) 31. The method according to claim 25, further comprising:
through a system information block 13, receiving from the base station notification configuration information which is used to notify the user terminal of occasion and period for notifying a change of the multimedia broadcast multicast service MBMS service information of the at least one neighboring cell included in the system information block. 32. The method according to claim 25, wherein the system information block further comprises:
notification configuration information which is used to notify the user terminal of occasion and period for notifying a change of the multimedia broadcast multicast service MBMS service information of the at least one neighboring cell included in the system information block. | 2,400 |
7,726 | 7,726 | 15,374,722 | 2,459 | Throughput is preserved in a distributed system while maintaining concurrency by pushing a commit wait period to client commit paths and to future readers. As opposed to servers performing commit waits, the servers assign timestamps, which are used to ensure that causality is preserved. When a server executes a transaction that writes data to a distributed database, the server acquires a user-level lock, and assigns the transaction a timestamp equal to a current time plus an interval corresponding to bounds of uncertainty of clocks in the distributed system. After assigning the timestamp, the server releases the user-level lock. Any client devices, before performing a read of the written data, must wait until the assigned timestamp is in the past. | 1. A system, comprising:
a server, the server adapted to communicate with other servers and clients in a distributed computing environment, the server comprising a processor, wherein the processor is configured to:
receive a request to write data;
write the data to a memory in the distributed computing environment;
while the written data is being committed to the memory, release a lock on the server and impose a commit wait time on at least one of a client library, the other servers, or the clients. 2. The system of claim 1, wherein the commit wait is imposed on both the client library and the other servers. 3. The system of claim 2, wherein the commit wait is performed by the client library before the client library notifies one of the clients that the written data was committed. 4. The system of claim 2, wherein the other servers perform the commit wait when executing a transactional read. 5. The system of claim 1, wherein the commit wait is imposed on the clients, and wherein the processor is further configured to:
assign a timestamp to the written data, the timestamp equal to a first time plus an interval; release the lock after assigning the timestamp. 6. The system of claim 5, wherein any of the clients, before reading the data, must wait until the assigned timestamp is in the past. 7. The system of claim 6, wherein the assigned timestamp is in the past when a local clock at the client reading the data reflects a current time that is later than the assigned timestamp. 8. The system of claim 5, wherein the first time is a current time reflected by a local clock at the server when the server assigns the timestamp to the written data. 9. The system of claim 8, wherein the interval corresponds to a difference in time between a latest time reported by all clocks in the distributed system and an earliest time reported by all clocks in the distributed system. 10. The system of claim 9, wherein the interval is maintained by the local clock at the server. 11. The system of claim 1, wherein the processor is further configured to:
receive a second request to write second data; write the data to the memory in the distributed computing environment, without waiting for the commit wait time to expire. 12. A method, comprising:
receiving, at a first computing device, a request from one or more clients to write data to a distributed computing environment; obtaining, at the first computing device, a write lock; writing, by the first computing device, the data to a memory in the distributed computing environment; and releasing, by the first computing device, the write lock without waiting for a commit wait time to expire, such that the commit wait time is imposed on at least one of a client library, other servers, or the clients. 13. The method of claim 12, wherein the commit wait is imposed on both the client library and the other servers. 14. The method of claim 13, wherein the commit wait is performed by the client library before the client library notifies one of the clients that the written data was committed. 15. The method of claim 13, wherein the other servers perform the commit wait when executing a transactional read. 16. The method of claim 12, wherein the commit wait is imposed on the clients, and wherein the processor is further configured to:
assign a timestamp to the written data, the timestamp equal to a first time plus an interval; release the lock after assigning the timestamp. 17. The method of claim 16, wherein any of the clients, before reading the data, must wait until the assigned timestamp is in the past. 18. The method of claim 17, wherein the assigned timestamp is in the past when a local clock at the client reading the data reflects a current time that is later than the assigned timestamp. 19. The method of claim 16, wherein the first time is a current time reflected by a local clock at the server when the server assigns the timestamp to the written data, and wherein the interval corresponds to a difference in time between a latest time reported by all clocks in the distributed system and an earliest time reported by all clocks in the distributed system. 20. The method of claim 12, wherein the processor is further configured to:
receive a second request to write second data; write the data to the memory in the distributed computing environment, without waiting for the commit wait time to expire. | Throughput is preserved in a distributed system while maintaining concurrency by pushing a commit wait period to client commit paths and to future readers. As opposed to servers performing commit waits, the servers assign timestamps, which are used to ensure that causality is preserved. When a server executes a transaction that writes data to a distributed database, the server acquires a user-level lock, and assigns the transaction a timestamp equal to a current time plus an interval corresponding to bounds of uncertainty of clocks in the distributed system. After assigning the timestamp, the server releases the user-level lock. Any client devices, before performing a read of the written data, must wait until the assigned timestamp is in the past.1. A system, comprising:
a server, the server adapted to communicate with other servers and clients in a distributed computing environment, the server comprising a processor, wherein the processor is configured to:
receive a request to write data;
write the data to a memory in the distributed computing environment;
while the written data is being committed to the memory, release a lock on the server and impose a commit wait time on at least one of a client library, the other servers, or the clients. 2. The system of claim 1, wherein the commit wait is imposed on both the client library and the other servers. 3. The system of claim 2, wherein the commit wait is performed by the client library before the client library notifies one of the clients that the written data was committed. 4. The system of claim 2, wherein the other servers perform the commit wait when executing a transactional read. 5. The system of claim 1, wherein the commit wait is imposed on the clients, and wherein the processor is further configured to:
assign a timestamp to the written data, the timestamp equal to a first time plus an interval; release the lock after assigning the timestamp. 6. The system of claim 5, wherein any of the clients, before reading the data, must wait until the assigned timestamp is in the past. 7. The system of claim 6, wherein the assigned timestamp is in the past when a local clock at the client reading the data reflects a current time that is later than the assigned timestamp. 8. The system of claim 5, wherein the first time is a current time reflected by a local clock at the server when the server assigns the timestamp to the written data. 9. The system of claim 8, wherein the interval corresponds to a difference in time between a latest time reported by all clocks in the distributed system and an earliest time reported by all clocks in the distributed system. 10. The system of claim 9, wherein the interval is maintained by the local clock at the server. 11. The system of claim 1, wherein the processor is further configured to:
receive a second request to write second data; write the data to the memory in the distributed computing environment, without waiting for the commit wait time to expire. 12. A method, comprising:
receiving, at a first computing device, a request from one or more clients to write data to a distributed computing environment; obtaining, at the first computing device, a write lock; writing, by the first computing device, the data to a memory in the distributed computing environment; and releasing, by the first computing device, the write lock without waiting for a commit wait time to expire, such that the commit wait time is imposed on at least one of a client library, other servers, or the clients. 13. The method of claim 12, wherein the commit wait is imposed on both the client library and the other servers. 14. The method of claim 13, wherein the commit wait is performed by the client library before the client library notifies one of the clients that the written data was committed. 15. The method of claim 13, wherein the other servers perform the commit wait when executing a transactional read. 16. The method of claim 12, wherein the commit wait is imposed on the clients, and wherein the processor is further configured to:
assign a timestamp to the written data, the timestamp equal to a first time plus an interval; release the lock after assigning the timestamp. 17. The method of claim 16, wherein any of the clients, before reading the data, must wait until the assigned timestamp is in the past. 18. The method of claim 17, wherein the assigned timestamp is in the past when a local clock at the client reading the data reflects a current time that is later than the assigned timestamp. 19. The method of claim 16, wherein the first time is a current time reflected by a local clock at the server when the server assigns the timestamp to the written data, and wherein the interval corresponds to a difference in time between a latest time reported by all clocks in the distributed system and an earliest time reported by all clocks in the distributed system. 20. The method of claim 12, wherein the processor is further configured to:
receive a second request to write second data; write the data to the memory in the distributed computing environment, without waiting for the commit wait time to expire. | 2,400 |
7,727 | 7,727 | 13,270,422 | 2,447 | A method of handling a message comprises receiving a message comprising content such as keywords, receiving a selection of one or more recipients for the message, identifying that at least one recipient is unfamiliar with a portion of the message, and notifying the composer of the message of the portion. | 1. A method of handling a message comprising:
receiving a message, receiving a selection of at least one recipient for the message, identifying, using a processor, that the at least one recipient is unfamiliar with a portion of the message, and notifying the composer of the message of the portion of the message. 2. The method according to claim 1, wherein the step of identifying that the at least one recipient is unfamiliar with a portion of the message comprises identifying an explicit recipient action in respect of the portion. 3. The method according to claim 2, wherein the explicit recipient action in respect of the portion is a cursor hovering over the portion. 4. The method according to claim 2, wherein the step of identifying the explicit recipient action in respect of the portion comprises identifying that the at least one recipient performs a search for the portion. 5. The method according to claim 1, wherein the step of identifying that the at least one recipient is unfamiliar with a portion of the message comprises identifying that the at least one recipient has not previously received the portion. 6. The method according to claim 5, wherein the step of identifying that the at least one recipient has not previously received the portion comprises accessing a record comprising at least one of keywords or phrases for the at least one recipient. 7. The method according to claim 1, further comprising:
when notifying the composer of the message of the portion of the message, additionally notifying the composer of the message of each recipient who is unfamiliar with the portion. 8. A system for handling a message comprising:
a user interface arranged to receive a message and to receive a selection of at least one recipient for the message, and a processor configured to identify that the at least one recipient is unfamiliar with a portion of the message, and to notify the composer of the message of the portion of the message. 9. The system according to claim 8, wherein the processor is configured, when identifying that at least one recipient is unfamiliar with a portion of the message, to identify an explicit recipient action in respect of the portion. 10. The system according to claim 9, wherein the explicit recipient action in respect of the portion is a cursor hovering over the portion. 11. The system according to claim 9, wherein the processor is configured, when identifying the explicit recipient action in respect of the portion, to identify that the at least one recipient performs a search for the portion. 12. The system according to claim 8, wherein the processor is configured, when identifying that at least one recipient is unfamiliar with a portion of the message, to identify that the at least one recipient has not previously received the portion. 13. The system according to claim 12, wherein the processor is configured, when identifying that at least one the recipient has not previously received the portion, to access a record comprising at least one of keywords or phrases for the at least one recipient. 14. The system according to claim 8, wherein the processor is configured, when notifying the composer of the message of the portion of the message, additionally to notify the composer of the message of each recipient who is unfamiliar with the portion. 15. A computer program product comprising:
a computer readable storage medium having program instructions readable by a computer embodied therewith for handling a message, the program instructions comprising: program instructions configured to receive a message, program instructions configured to receive a selection of at least one recipient for the message, program instructions configured to identify that the at least one recipient is unfamiliar with a portion of the message, and program instructions configured to notify the composer of the message of the portion of the message. 16. The computer program product according to claim 15, wherein the program instructions configured to identify that at least one recipient is unfamiliar with a portion of the message comprise program instructions configured to identify an explicit recipient action in respect of the portion. 17. The computer program product according to claim 15, wherein the explicit recipient action in respect of the portion is a cursor hovering over the portion. 18. The computer program product according to claim 16, wherein the program instructions configured to identify the explicit recipient action in respect of the portion comprise program instructions configured to identify that the at least one recipient performs a search for the portion. 19. The computer program product according to claim 15, wherein the program instructions configured to identify that at least one recipient is unfamiliar with a portion of the message comprise program instructions configured to identify that the at least one recipient has not previously received the portion. 20. The computer program product according to claim 19, wherein the program instructions configured to identify that the at least one recipient has not previously received the portion comprise program instructions configured to access a record comprising at least one of keywords or phrases for the recipient. 21. The computer program product according to claim 15, further comprising:
when notifying the composer of the message of the portion of the message, program instructions configured to additionally notify the composer of the message of each identified recipient who is unfamiliar with the portion. | A method of handling a message comprises receiving a message comprising content such as keywords, receiving a selection of one or more recipients for the message, identifying that at least one recipient is unfamiliar with a portion of the message, and notifying the composer of the message of the portion.1. A method of handling a message comprising:
receiving a message, receiving a selection of at least one recipient for the message, identifying, using a processor, that the at least one recipient is unfamiliar with a portion of the message, and notifying the composer of the message of the portion of the message. 2. The method according to claim 1, wherein the step of identifying that the at least one recipient is unfamiliar with a portion of the message comprises identifying an explicit recipient action in respect of the portion. 3. The method according to claim 2, wherein the explicit recipient action in respect of the portion is a cursor hovering over the portion. 4. The method according to claim 2, wherein the step of identifying the explicit recipient action in respect of the portion comprises identifying that the at least one recipient performs a search for the portion. 5. The method according to claim 1, wherein the step of identifying that the at least one recipient is unfamiliar with a portion of the message comprises identifying that the at least one recipient has not previously received the portion. 6. The method according to claim 5, wherein the step of identifying that the at least one recipient has not previously received the portion comprises accessing a record comprising at least one of keywords or phrases for the at least one recipient. 7. The method according to claim 1, further comprising:
when notifying the composer of the message of the portion of the message, additionally notifying the composer of the message of each recipient who is unfamiliar with the portion. 8. A system for handling a message comprising:
a user interface arranged to receive a message and to receive a selection of at least one recipient for the message, and a processor configured to identify that the at least one recipient is unfamiliar with a portion of the message, and to notify the composer of the message of the portion of the message. 9. The system according to claim 8, wherein the processor is configured, when identifying that at least one recipient is unfamiliar with a portion of the message, to identify an explicit recipient action in respect of the portion. 10. The system according to claim 9, wherein the explicit recipient action in respect of the portion is a cursor hovering over the portion. 11. The system according to claim 9, wherein the processor is configured, when identifying the explicit recipient action in respect of the portion, to identify that the at least one recipient performs a search for the portion. 12. The system according to claim 8, wherein the processor is configured, when identifying that at least one recipient is unfamiliar with a portion of the message, to identify that the at least one recipient has not previously received the portion. 13. The system according to claim 12, wherein the processor is configured, when identifying that at least one the recipient has not previously received the portion, to access a record comprising at least one of keywords or phrases for the at least one recipient. 14. The system according to claim 8, wherein the processor is configured, when notifying the composer of the message of the portion of the message, additionally to notify the composer of the message of each recipient who is unfamiliar with the portion. 15. A computer program product comprising:
a computer readable storage medium having program instructions readable by a computer embodied therewith for handling a message, the program instructions comprising: program instructions configured to receive a message, program instructions configured to receive a selection of at least one recipient for the message, program instructions configured to identify that the at least one recipient is unfamiliar with a portion of the message, and program instructions configured to notify the composer of the message of the portion of the message. 16. The computer program product according to claim 15, wherein the program instructions configured to identify that at least one recipient is unfamiliar with a portion of the message comprise program instructions configured to identify an explicit recipient action in respect of the portion. 17. The computer program product according to claim 15, wherein the explicit recipient action in respect of the portion is a cursor hovering over the portion. 18. The computer program product according to claim 16, wherein the program instructions configured to identify the explicit recipient action in respect of the portion comprise program instructions configured to identify that the at least one recipient performs a search for the portion. 19. The computer program product according to claim 15, wherein the program instructions configured to identify that at least one recipient is unfamiliar with a portion of the message comprise program instructions configured to identify that the at least one recipient has not previously received the portion. 20. The computer program product according to claim 19, wherein the program instructions configured to identify that the at least one recipient has not previously received the portion comprise program instructions configured to access a record comprising at least one of keywords or phrases for the recipient. 21. The computer program product according to claim 15, further comprising:
when notifying the composer of the message of the portion of the message, program instructions configured to additionally notify the composer of the message of each identified recipient who is unfamiliar with the portion. | 2,400 |
7,728 | 7,728 | 13,777,787 | 2,437 | Binary data relating to a movable barrier operator is converted to ternary data. The ternary data is converted into corresponding binary information in a way not mirroring the first conversion method. In one approach, this second conversion converts each ternary trit into a corresponding binary pair. Initial binary bits correspond to, for example, fixed and/or non-fixed information. | 1. A method comprising:
converting first binary data comprising information relating to a movable barrier operator into ternary data using a first conversion method; converting the ternary data to a binary format to provide binary information representative of the information relating to the movable barrier operator, the converting done in a way not mirroring the first conversion method; transmitting the binary information between the movable barrier operator and a peripheral device. 2. The method of claim 1 wherein the converting the ternary data to the binary format comprises mapping each trit of the ternary data to a corresponding pair of binary bits. 3. The method of claim 2 wherein transmitting the binary information further comprises transmitting pairs of binary bits, wherein each of the pairs of binary bits potentially represents one of:
a particular ternary value;
an illegal value. 4. The method of claim 3 wherein the illegal value serves a synchronization function. 5. The method of claim 4 wherein:
a first particular ternary value for the particular ternary value corresponds to bearer content having a first size;
a second particular ternary value for the particular ternary value corresponds to bearer content having a second size, which second size is different than the first size;
a third particular ternary value for the particular ternary value corresponds to updating a rolling code as is employed by the movable barrier operator. 6. The method of claim 1 wherein the first binary data comprises fixed information corresponding to the movable barrier operator. 7. The method of claim 6 wherein the fixed information comprises identifying information. 8. The method of claim 7 wherein the first binary data further comprises non-fixed information corresponding to the movable barrier operator. 9. The method of claim 1 further comprising providing the first binary data, including combining at least some of first binary bits with rolling code bits. 10. The method of claim 9 wherein combining at least some of the first binary bits with rolling code bits further comprises:
exclusive ORing the first binary bits with the rolling code bits to provide encrypted bits;
concatenating the encrypted bits with the rolling code bits to provide resultant bits;
reverse ordering the resultant bits to provide reverse ordered bits; and
wherein converting the first binary data into the ternary data further comprises:
converting the reverse ordered bits into the ternary data. 11. The method of claim 10 and further comprising:
interleaving the ternary data with other ternary data;
and wherein converting the ternary data to a binary format further comprises converting the interleaved ternary data to the binary format to provide the binary information. 12. The method of claim 11 wherein interleaving the ternary data with other ternary data further comprises:
providing additional binary bits comprising information corresponding to the movable barrier operator;
converting the additional binary bits comprising information corresponding to the movable barrier operator into intermediate ternary data;
modifying the intermediate ternary data using rolling code information to provide the other ternary data. 13. The method of claim 12 wherein modifying the intermediate ternary data using rolling code information further comprises: modifying the intermediate ternary data using the ternary data. 14. The method of claim 1 the transmitting the binary information comprises transmitting the binary information to at least one of: a movable barrier operator, an alarm system, or a sensor. 15. An apparatus comprising at least one of a movable barrier operator and a device that communicates with a movable barrier operator, the apparatus comprising:
a memory device configured to store first binary data comprising information relating to a movable barrier operator; a processing device in operable communication with the memory device and configured to convert the first binary data into ternary data using a first conversion method and to convert the ternary data to a binary-formatted version in a way not mirroring the first conversion method; a transmitter operably coupled to the processing device and the memory device and configured to externally transmit the binary-formatted version of the ternary data to one of the movable barrier operator and the device that communicates with the movable barrier operator. 16. The apparatus of claim 15 wherein the processing device is further configured to convert the ternary data to the binary-formatted version by mapping each trit of the ternary data to a corresponding pair of binary bits. 17. The apparatus of claim 15 wherein the first binary data comprises fixed identifying information corresponding to the movable barrier operator, non-fixed information corresponding to the movable barrier operator, or both. 18. The apparatus of claim 15 wherein the processing device is further configured to create the first binary data in part by combining at least some of first binary bits with rolling code bits. 19. The apparatus of claim 18 wherein the processing device is further configured to combine at least some of the first binary bits with rolling code bits by:
exclusive ORing the first binary bits with the rolling code bits to provide encrypted bits;
concatenating the encrypted bits with the rolling code bits to provide resultant bits;
reverse ordering the resultant bits to provide reverse ordered bits; and
wherein the processing device is further configured to convert the first binary data into the ternary data by converting the reverse ordered bits into the ternary data. 20. The apparatus of claim 19 the processing device is further configured to interleave the ternary data with other ternary data;
and wherein the processing device is further configured to convert the ternary data to the binary format by converting the interleaved ternary data to the binary-formatted version. | Binary data relating to a movable barrier operator is converted to ternary data. The ternary data is converted into corresponding binary information in a way not mirroring the first conversion method. In one approach, this second conversion converts each ternary trit into a corresponding binary pair. Initial binary bits correspond to, for example, fixed and/or non-fixed information.1. A method comprising:
converting first binary data comprising information relating to a movable barrier operator into ternary data using a first conversion method; converting the ternary data to a binary format to provide binary information representative of the information relating to the movable barrier operator, the converting done in a way not mirroring the first conversion method; transmitting the binary information between the movable barrier operator and a peripheral device. 2. The method of claim 1 wherein the converting the ternary data to the binary format comprises mapping each trit of the ternary data to a corresponding pair of binary bits. 3. The method of claim 2 wherein transmitting the binary information further comprises transmitting pairs of binary bits, wherein each of the pairs of binary bits potentially represents one of:
a particular ternary value;
an illegal value. 4. The method of claim 3 wherein the illegal value serves a synchronization function. 5. The method of claim 4 wherein:
a first particular ternary value for the particular ternary value corresponds to bearer content having a first size;
a second particular ternary value for the particular ternary value corresponds to bearer content having a second size, which second size is different than the first size;
a third particular ternary value for the particular ternary value corresponds to updating a rolling code as is employed by the movable barrier operator. 6. The method of claim 1 wherein the first binary data comprises fixed information corresponding to the movable barrier operator. 7. The method of claim 6 wherein the fixed information comprises identifying information. 8. The method of claim 7 wherein the first binary data further comprises non-fixed information corresponding to the movable barrier operator. 9. The method of claim 1 further comprising providing the first binary data, including combining at least some of first binary bits with rolling code bits. 10. The method of claim 9 wherein combining at least some of the first binary bits with rolling code bits further comprises:
exclusive ORing the first binary bits with the rolling code bits to provide encrypted bits;
concatenating the encrypted bits with the rolling code bits to provide resultant bits;
reverse ordering the resultant bits to provide reverse ordered bits; and
wherein converting the first binary data into the ternary data further comprises:
converting the reverse ordered bits into the ternary data. 11. The method of claim 10 and further comprising:
interleaving the ternary data with other ternary data;
and wherein converting the ternary data to a binary format further comprises converting the interleaved ternary data to the binary format to provide the binary information. 12. The method of claim 11 wherein interleaving the ternary data with other ternary data further comprises:
providing additional binary bits comprising information corresponding to the movable barrier operator;
converting the additional binary bits comprising information corresponding to the movable barrier operator into intermediate ternary data;
modifying the intermediate ternary data using rolling code information to provide the other ternary data. 13. The method of claim 12 wherein modifying the intermediate ternary data using rolling code information further comprises: modifying the intermediate ternary data using the ternary data. 14. The method of claim 1 the transmitting the binary information comprises transmitting the binary information to at least one of: a movable barrier operator, an alarm system, or a sensor. 15. An apparatus comprising at least one of a movable barrier operator and a device that communicates with a movable barrier operator, the apparatus comprising:
a memory device configured to store first binary data comprising information relating to a movable barrier operator; a processing device in operable communication with the memory device and configured to convert the first binary data into ternary data using a first conversion method and to convert the ternary data to a binary-formatted version in a way not mirroring the first conversion method; a transmitter operably coupled to the processing device and the memory device and configured to externally transmit the binary-formatted version of the ternary data to one of the movable barrier operator and the device that communicates with the movable barrier operator. 16. The apparatus of claim 15 wherein the processing device is further configured to convert the ternary data to the binary-formatted version by mapping each trit of the ternary data to a corresponding pair of binary bits. 17. The apparatus of claim 15 wherein the first binary data comprises fixed identifying information corresponding to the movable barrier operator, non-fixed information corresponding to the movable barrier operator, or both. 18. The apparatus of claim 15 wherein the processing device is further configured to create the first binary data in part by combining at least some of first binary bits with rolling code bits. 19. The apparatus of claim 18 wherein the processing device is further configured to combine at least some of the first binary bits with rolling code bits by:
exclusive ORing the first binary bits with the rolling code bits to provide encrypted bits;
concatenating the encrypted bits with the rolling code bits to provide resultant bits;
reverse ordering the resultant bits to provide reverse ordered bits; and
wherein the processing device is further configured to convert the first binary data into the ternary data by converting the reverse ordered bits into the ternary data. 20. The apparatus of claim 19 the processing device is further configured to interleave the ternary data with other ternary data;
and wherein the processing device is further configured to convert the ternary data to the binary format by converting the interleaved ternary data to the binary-formatted version. | 2,400 |
7,729 | 7,729 | 13,511,557 | 2,485 | The spray dryer comprises a spray drying chamber having a substantially cylindrical top section, a conical wall and a narrowed lower section. In the top section, atomizing means is provided. One or more cameras are associated with the drying chamber in order to monitor the process. At least one of the cameras is an infrared camera adapted for measuring the temperature within a predefined area. | 1-19. (canceled) 20. A method of monitoring parts of a spray dryer subjected to the formation of deposits, comprising the steps of:
providing a spray drying chamber, and associating one or more cameras with the spray drying chamber, said one or more camera having a field of view inside the spray drying chamber, whereby at least one of said one or more cameras is an infrared camera, and whereby the temperature is measured within a predefined area. 21. The method according to claim 20, whereby at least two infrared cameras are associated with said spray drying chamber. 22. The method according to claim 20, comprising the further step of providing at least one spray nozzle as atomizing means, whereby the predefined area monitored by the at least one infrared camera comprises a part of the spray nozzle or spray nozzles, or the spray nozzle or spray nozzles. 23. The method according to claim 20, whereby the predefined area monitored by the at least one infrared 20 camera comprises a part of a wall of the spray drying chamber. 24. The method according to claim 20, whereby the predefined area monitored by the at least one infrared camera comprises a part of a fluid bed gas distributor plate in the lower part of the spray drying chamber. 25. The method according to claim 20, comprising the further steps of providing a control system, and providing a set value for the temperature in said predefined area, wherein the control system is associated to an alarm triggered when the temperature exceeds said set value. 26. The method according to claim 25, whereby the monitoring is carried out with respect to deposits of solid material, and the set value for the temperature is the temperature of the deposits. 27. The method according to claim 26, whereby the operation of the spray dryer is stopped when the alarm is triggered. 28. The method according to claim 27, whereby the deposits are removed when the spray dryer has been stopped. 29. The method according to claim 20, whereby a cooling gas is supplied to cool the at least one infrared camera. 30. The method according to claim 20, whereby each infrared camera has a field of view of at least 90 degrees. 31. The method according to claim 20, whereby the infrared camera or infrared cameras is/are positioned in the spray drying chamber via a movable and/or removable camera lance. 32. The method according to claim 30, whereby an ordinary visual camera and an infrared camera have been combined in one camera lance. 33. A spray dryer comprising a spray drying chamber, atomizing means, and one or more cameras positioned in connection with the spray drying chamber, at least one of said one or more cameras being an infrared camera, characterized in that said at least one infrared camera Is adapted to monitor a predefined area subjected to deposits, said parts being selected from the group comprising at least one spray nozzle of the atomizing means, a wall of the spray drying chamber, and a fluid bed gas distributor plate, and that the spray dryer comprises a control system adapted to be associated to an alarm. 34. A spray dryer according to claim 33, wherein at least two infrared cameras are positioned in said spray drying chamber. 35. A spray dryer according to claim 33, wherein the infrared camera or infrared cameras is/are positioned in the spray drying chamber via a movable and removable camera lance. 36. A spray dryer according to claim 35, wherein an ordinary camera and an infrared camera have been combined in one camera lance. 37. A spray dryer according to claim 33, wherein the at least one infrared camera is covered by means of an inspection glass and a protective grid. 38. A spray dryer according to claim 33, wherein each infrared camera has a view of at least 90 degrees. | The spray dryer comprises a spray drying chamber having a substantially cylindrical top section, a conical wall and a narrowed lower section. In the top section, atomizing means is provided. One or more cameras are associated with the drying chamber in order to monitor the process. At least one of the cameras is an infrared camera adapted for measuring the temperature within a predefined area.1-19. (canceled) 20. A method of monitoring parts of a spray dryer subjected to the formation of deposits, comprising the steps of:
providing a spray drying chamber, and associating one or more cameras with the spray drying chamber, said one or more camera having a field of view inside the spray drying chamber, whereby at least one of said one or more cameras is an infrared camera, and whereby the temperature is measured within a predefined area. 21. The method according to claim 20, whereby at least two infrared cameras are associated with said spray drying chamber. 22. The method according to claim 20, comprising the further step of providing at least one spray nozzle as atomizing means, whereby the predefined area monitored by the at least one infrared camera comprises a part of the spray nozzle or spray nozzles, or the spray nozzle or spray nozzles. 23. The method according to claim 20, whereby the predefined area monitored by the at least one infrared 20 camera comprises a part of a wall of the spray drying chamber. 24. The method according to claim 20, whereby the predefined area monitored by the at least one infrared camera comprises a part of a fluid bed gas distributor plate in the lower part of the spray drying chamber. 25. The method according to claim 20, comprising the further steps of providing a control system, and providing a set value for the temperature in said predefined area, wherein the control system is associated to an alarm triggered when the temperature exceeds said set value. 26. The method according to claim 25, whereby the monitoring is carried out with respect to deposits of solid material, and the set value for the temperature is the temperature of the deposits. 27. The method according to claim 26, whereby the operation of the spray dryer is stopped when the alarm is triggered. 28. The method according to claim 27, whereby the deposits are removed when the spray dryer has been stopped. 29. The method according to claim 20, whereby a cooling gas is supplied to cool the at least one infrared camera. 30. The method according to claim 20, whereby each infrared camera has a field of view of at least 90 degrees. 31. The method according to claim 20, whereby the infrared camera or infrared cameras is/are positioned in the spray drying chamber via a movable and/or removable camera lance. 32. The method according to claim 30, whereby an ordinary visual camera and an infrared camera have been combined in one camera lance. 33. A spray dryer comprising a spray drying chamber, atomizing means, and one or more cameras positioned in connection with the spray drying chamber, at least one of said one or more cameras being an infrared camera, characterized in that said at least one infrared camera Is adapted to monitor a predefined area subjected to deposits, said parts being selected from the group comprising at least one spray nozzle of the atomizing means, a wall of the spray drying chamber, and a fluid bed gas distributor plate, and that the spray dryer comprises a control system adapted to be associated to an alarm. 34. A spray dryer according to claim 33, wherein at least two infrared cameras are positioned in said spray drying chamber. 35. A spray dryer according to claim 33, wherein the infrared camera or infrared cameras is/are positioned in the spray drying chamber via a movable and removable camera lance. 36. A spray dryer according to claim 35, wherein an ordinary camera and an infrared camera have been combined in one camera lance. 37. A spray dryer according to claim 33, wherein the at least one infrared camera is covered by means of an inspection glass and a protective grid. 38. A spray dryer according to claim 33, wherein each infrared camera has a view of at least 90 degrees. | 2,400 |
7,730 | 7,730 | 13,526,223 | 2,483 | Methods and systems for displaying images of cells in a sample include obtaining a plurality of images of cells in the sample, where each image corresponds to one of the cells in the sample, determining values of at least one property for each of the cells based on the plurality of images, arranging the plurality of images to form a first image array, where the images are ordered in the first image array based on the values of the at least one property, displaying the first image array, sorting the plurality of images to form a second image array in which an ordering of the images is different from the first image array, and displaying the second image array, where the sample includes blood and the cells include red blood cells. | 1. A method of displaying images of cells in a sample, the method comprising:
obtaining a plurality of images of cells in the sample, wherein each image corresponds to one of the cells in the sample; determining values of at least one property for each of the cells based on the plurality of images; arranging the plurality of images to form a first image array, wherein the images are ordered in the first image array based on the values of the at least one property; displaying the first image array; sorting the plurality of images to form a second image array in which an ordering of the images is different from the first image array; and displaying the second image array, wherein the sample comprises blood and the cells comprise red blood cells. 2. The method of claim 1, wherein each image in the first image array is displayed as a user-selectable control. 3. The method of claim 2, wherein each user-selectable control is configured so that, when activated, information about the corresponding cell in the sample is displayed. 4. The method of claim 1, wherein the values of the at least one property comprise a cell hemoglobin content of each of the cells. 5. The method of claim 1, wherein the values of the at least one property comprise a cell volume of each of the cells. 6. The method of claim 1, wherein the values of the at least one property comprise a cell size of each of the cells. 7. The method of claim 1, wherein the values of the at least one property comprise an optical density of each of the cells. 8. The method of claim 1, wherein the values of the at least one property comprise a shape of each of the cells. 9. The method of claim 1, further comprising:
determining values of a second property for each of the cells based on the plurality of images; and sorting the plurality of images to form the second image array based on the values of the second property. 10. The method of claim 9, wherein the values of the second property comprise a cell hemoglobin content of each of the cells. 11. The method of claim 9, wherein the values of the second property comprise a cell volume of each of the cells. 12. The method of claim 9, wherein the values of the second property comprise a cell size of each of the cells. 13. The method of claim 9, wherein the values of the second property comprise an optical density of each of the cells. 14. The method of claim 9, wherein the values of the second property comprise a shape of each of the cells. 15. The method of claim 1, further comprising detecting a disease condition in a patient based on at least one of the first image array and the second image array. 16. The method of claim 9, further comprising analyzing the plurality of images to identify inclusions in the cells, wherein the second property is a property related to the inclusions. 17. The method of claim 16, wherein the property related to the inclusions comprises at least one of a size of the inclusions, a shape of the inclusions, and a number of the inclusions. 18. The method of claim 16, further comprising activating a control on a display device on which the second image array is displayed to provide an assessment of the sample based on the second image array. 19. The method of claim 1, further comprising:
for each of the plurality of images, identifying a set of pixels associated with the cell corresponding to the image; determining a reference location for each of the cells based on the set of pixels; and arranging the plurality of images in the first image array so that the reference location for each cell in the first image array is equally spaced from the reference locations for adjacent cells in the first image array. 20. The method of claim 1, further comprising:
for each of the plurality of images, identifying a background set of pixels in the image that does not correspond to the cell associated with the image, wherein displaying the first image array comprises, for each of the plurality of images, assigning a color to each member of the background set of pixels; and wherein the color is assigned based on the value of the at least one property for the cell associated with the image. 21. The method of claim 9, further comprising:
displaying the first image array and a plurality of user-selectable controls on a display device, wherein each of the user-selectable controls corresponds to a different property of the cells; and sorting the plurality of images to form the second image array when one of the plurality of user-selectable controls is activated, wherein the second property is the property that corresponds to the activated control. 22. A system for visual inspection of red blood cells, the system comprising:
a light source configured to illuminate red blood cells in a sample; a detector configured to obtain a plurality of images of the red blood cells, wherein each image corresponds to a different one of the red blood cells in the sample; a display device configured to display images of the red blood cells; and an electronic processor configured to:
determine values of at least one property for each of the cells based on the plurality of images;
arrange the plurality of images to form a first image array, wherein the images are ordered in the first image array based on the values of the at least one property;
display the first image array on the display device;
sort the plurality of images to form a second image array in which an ordering of the images is different from the first image array; and
display the second image array on the display device. 23. The system of claim 22, wherein the display device is configured to display each image in the first image array as a user-selectable control. 24. The system of claim 23, wherein the electronic processor is configured so that when one of the user-selectable controls is activated, the electronic processor displays information about the cell corresponding to the activated control on the display device. 25. The system of claim 22, wherein the values of the at least one property comprise a cell hemoglobin content of each of the cells. 26. The system of claim 22, wherein the values of the at least one property comprise a cell volume of each of the cells. 27. The system of claim 22, wherein the values of the at least one property comprise at least one member from the group consisting of a cell size of each of the cells, an optical density of each of the cells, and a shape of each of the cells. 28. The system of claim 22, wherein the electronic processor is further configured to:
determine values of a second property for each of the cells based on the plurality of images; and sort the plurality of images to form the second image array based on the values of the second property. 29. The system of claim 28, wherein the electronic processor is further configured to:
display a plurality of user-selectable controls on the display device, wherein each of the user-selectable controls corresponds to a different property of the cells; and sort the plurality of images to form the second image array when one of the plurality of user-selectable controls is activated, wherein the second property is the property that corresponds to the activated control. 30. The system of claim 28, wherein the electronic processor is further configured to analyze the plurality of images to identify inclusions in the cells, wherein the second property is a property related to the inclusions and comprises at least one of a size of the inclusions, a shape of the inclusions, and a number of the inclusions. 31. The system of claim 22, wherein the electronic processor is further configured to:
for each of the plurality of images, identify a set of pixels associated with the cell corresponding to the image; determine a reference location for each of the cells based on the set of pixels; and display the plurality of images in the first image array on the display device so that the reference location for each cell in the first image array is equally spaced from the reference locations for adjacent cells in the first image array. 32. The system of claim 22, wherein for each of the plurality of images, the electronic processor is further configured to:
identify a background set of pixels in the image that does not correspond to the cell associated with the image; and display the image in the first image array by assigning a color to each member of the background set of pixels, wherein the color is assigned based on the value of the at least one property for the cell associated with the image. 33. A computer readable storage device, having encoded thereon computer readable instructions that, when executed by a processor, cause the processor to:
obtain a plurality of images of cells in a sample, wherein each image corresponds to a different one of the cells in the sample; determine values of at least one property for each of the cells based on the plurality of images; arrange the plurality of images to form a first image array, wherein the images are ordered in the first image array based on the values of the at least one property; and display the first image array, wherein the sample comprises blood and the cells comprise red blood cells. 34. A method of displaying images of cells in a sample, the method comprising:
obtaining a plurality of images of cells in the sample, wherein each image corresponds to one of the cells in the sample; determining values of at least one property for each of the cells based on the plurality of images; arranging the plurality of images at random to form a first image array; displaying the first image array; arranging the plurality of images to form a second image array, wherein the images are ordered in the second image array based on the values of the at least one property; and displaying the second image array. 35. The method of claim 34, wherein the sample comprises blood and the cells comprise red blood cells. 36. The method of claim 34, wherein the sample comprises blood and the cells comprise platelets. 37. The method of claim 34, wherein each image in the second image array is displayed as a user-selectable control. 38. The method of claim 37, wherein each user-selectable control is configured so that, when activated, information about the corresponding cell in the sample is displayed. 39. The method of claim 34, wherein the values of the at least one property comprise a cell hemoglobin content of each of the cells. 40. The method of claim 34, wherein the values of the at least one property comprise a cell volume of each of the cells. 41. The method of claim 34, wherein the values of the at least one property comprise a cell size of each of the cells. 42. The method of claim 34, wherein the values of the at least one property comprise an optical density of each of the cells. 43. The method of claim 34, wherein the values of the at least one property comprise a shape of each of the cells. 44. The method of claim 34, further comprising:
for each of the plurality of images, identifying a background set of pixels in the image that does not correspond to the cell associated with the image, wherein displaying the second image array comprises, for each of the plurality of images, assigning a color to each member of the background set of pixels; and wherein the color is assigned based on the value of the at least one property for the cell associated with the image. 45. A system for visual inspection of cells, the system comprising:
a light source configured to illuminate cells in a sample; a detector configured to obtain a plurality of images of the cells, wherein each image corresponds to one of the cells in the sample; a display device configured to display images of the cells; and an electronic processor configured to:
determine values of at least one property for each of the cells based on the plurality of images;
arrange the plurality of images at random to form a first image array;
display the first image array;
arrange the plurality of images to form a second image array, wherein the images are ordered in the second image array based on the values of the at least one property; and
display the second image array on the display device. 46. The system of claim 45, wherein the display device is configured to display each image in the second image array as a user-selectable control. 47. The system of claim 46, wherein the electronic processor is configured so that when one of the user-selectable controls is activated, the electronic processor displays information about the cell corresponding to the activated control on the display device. 48. The system of claim 45, wherein the values of the at least one property comprise a cell hemoglobin content of each of the cells. 49. The system of claim 45, wherein the values of the at least one property comprise a cell volume of each of the cells. 50. The system of claim 45, wherein the values of the at least one property comprise at least one member from the group consisting of a cell size of each of the cells, an optical density of each of the cells, and a shape of each of the cells. 51. The system of claim 45, wherein the electronic processor is further configured to analyze the plurality of images to identify inclusions in the cells, wherein the at least one property is a property related to the inclusions and comprises at least one of a size of the inclusions, a shape of the inclusions, and a number of the inclusions. 52. The system of claim 45, wherein for each of the plurality of images, the electronic processor is further configured to:
identify a background set of pixels in the image that does not correspond to the cell associated with the image; and display the image in the second image array by assigning a color to each member of the background set of pixels, wherein the color is assigned based on the value of the at least one property for the cell associated with the image. | Methods and systems for displaying images of cells in a sample include obtaining a plurality of images of cells in the sample, where each image corresponds to one of the cells in the sample, determining values of at least one property for each of the cells based on the plurality of images, arranging the plurality of images to form a first image array, where the images are ordered in the first image array based on the values of the at least one property, displaying the first image array, sorting the plurality of images to form a second image array in which an ordering of the images is different from the first image array, and displaying the second image array, where the sample includes blood and the cells include red blood cells.1. A method of displaying images of cells in a sample, the method comprising:
obtaining a plurality of images of cells in the sample, wherein each image corresponds to one of the cells in the sample; determining values of at least one property for each of the cells based on the plurality of images; arranging the plurality of images to form a first image array, wherein the images are ordered in the first image array based on the values of the at least one property; displaying the first image array; sorting the plurality of images to form a second image array in which an ordering of the images is different from the first image array; and displaying the second image array, wherein the sample comprises blood and the cells comprise red blood cells. 2. The method of claim 1, wherein each image in the first image array is displayed as a user-selectable control. 3. The method of claim 2, wherein each user-selectable control is configured so that, when activated, information about the corresponding cell in the sample is displayed. 4. The method of claim 1, wherein the values of the at least one property comprise a cell hemoglobin content of each of the cells. 5. The method of claim 1, wherein the values of the at least one property comprise a cell volume of each of the cells. 6. The method of claim 1, wherein the values of the at least one property comprise a cell size of each of the cells. 7. The method of claim 1, wherein the values of the at least one property comprise an optical density of each of the cells. 8. The method of claim 1, wherein the values of the at least one property comprise a shape of each of the cells. 9. The method of claim 1, further comprising:
determining values of a second property for each of the cells based on the plurality of images; and sorting the plurality of images to form the second image array based on the values of the second property. 10. The method of claim 9, wherein the values of the second property comprise a cell hemoglobin content of each of the cells. 11. The method of claim 9, wherein the values of the second property comprise a cell volume of each of the cells. 12. The method of claim 9, wherein the values of the second property comprise a cell size of each of the cells. 13. The method of claim 9, wherein the values of the second property comprise an optical density of each of the cells. 14. The method of claim 9, wherein the values of the second property comprise a shape of each of the cells. 15. The method of claim 1, further comprising detecting a disease condition in a patient based on at least one of the first image array and the second image array. 16. The method of claim 9, further comprising analyzing the plurality of images to identify inclusions in the cells, wherein the second property is a property related to the inclusions. 17. The method of claim 16, wherein the property related to the inclusions comprises at least one of a size of the inclusions, a shape of the inclusions, and a number of the inclusions. 18. The method of claim 16, further comprising activating a control on a display device on which the second image array is displayed to provide an assessment of the sample based on the second image array. 19. The method of claim 1, further comprising:
for each of the plurality of images, identifying a set of pixels associated with the cell corresponding to the image; determining a reference location for each of the cells based on the set of pixels; and arranging the plurality of images in the first image array so that the reference location for each cell in the first image array is equally spaced from the reference locations for adjacent cells in the first image array. 20. The method of claim 1, further comprising:
for each of the plurality of images, identifying a background set of pixels in the image that does not correspond to the cell associated with the image, wherein displaying the first image array comprises, for each of the plurality of images, assigning a color to each member of the background set of pixels; and wherein the color is assigned based on the value of the at least one property for the cell associated with the image. 21. The method of claim 9, further comprising:
displaying the first image array and a plurality of user-selectable controls on a display device, wherein each of the user-selectable controls corresponds to a different property of the cells; and sorting the plurality of images to form the second image array when one of the plurality of user-selectable controls is activated, wherein the second property is the property that corresponds to the activated control. 22. A system for visual inspection of red blood cells, the system comprising:
a light source configured to illuminate red blood cells in a sample; a detector configured to obtain a plurality of images of the red blood cells, wherein each image corresponds to a different one of the red blood cells in the sample; a display device configured to display images of the red blood cells; and an electronic processor configured to:
determine values of at least one property for each of the cells based on the plurality of images;
arrange the plurality of images to form a first image array, wherein the images are ordered in the first image array based on the values of the at least one property;
display the first image array on the display device;
sort the plurality of images to form a second image array in which an ordering of the images is different from the first image array; and
display the second image array on the display device. 23. The system of claim 22, wherein the display device is configured to display each image in the first image array as a user-selectable control. 24. The system of claim 23, wherein the electronic processor is configured so that when one of the user-selectable controls is activated, the electronic processor displays information about the cell corresponding to the activated control on the display device. 25. The system of claim 22, wherein the values of the at least one property comprise a cell hemoglobin content of each of the cells. 26. The system of claim 22, wherein the values of the at least one property comprise a cell volume of each of the cells. 27. The system of claim 22, wherein the values of the at least one property comprise at least one member from the group consisting of a cell size of each of the cells, an optical density of each of the cells, and a shape of each of the cells. 28. The system of claim 22, wherein the electronic processor is further configured to:
determine values of a second property for each of the cells based on the plurality of images; and sort the plurality of images to form the second image array based on the values of the second property. 29. The system of claim 28, wherein the electronic processor is further configured to:
display a plurality of user-selectable controls on the display device, wherein each of the user-selectable controls corresponds to a different property of the cells; and sort the plurality of images to form the second image array when one of the plurality of user-selectable controls is activated, wherein the second property is the property that corresponds to the activated control. 30. The system of claim 28, wherein the electronic processor is further configured to analyze the plurality of images to identify inclusions in the cells, wherein the second property is a property related to the inclusions and comprises at least one of a size of the inclusions, a shape of the inclusions, and a number of the inclusions. 31. The system of claim 22, wherein the electronic processor is further configured to:
for each of the plurality of images, identify a set of pixels associated with the cell corresponding to the image; determine a reference location for each of the cells based on the set of pixels; and display the plurality of images in the first image array on the display device so that the reference location for each cell in the first image array is equally spaced from the reference locations for adjacent cells in the first image array. 32. The system of claim 22, wherein for each of the plurality of images, the electronic processor is further configured to:
identify a background set of pixels in the image that does not correspond to the cell associated with the image; and display the image in the first image array by assigning a color to each member of the background set of pixels, wherein the color is assigned based on the value of the at least one property for the cell associated with the image. 33. A computer readable storage device, having encoded thereon computer readable instructions that, when executed by a processor, cause the processor to:
obtain a plurality of images of cells in a sample, wherein each image corresponds to a different one of the cells in the sample; determine values of at least one property for each of the cells based on the plurality of images; arrange the plurality of images to form a first image array, wherein the images are ordered in the first image array based on the values of the at least one property; and display the first image array, wherein the sample comprises blood and the cells comprise red blood cells. 34. A method of displaying images of cells in a sample, the method comprising:
obtaining a plurality of images of cells in the sample, wherein each image corresponds to one of the cells in the sample; determining values of at least one property for each of the cells based on the plurality of images; arranging the plurality of images at random to form a first image array; displaying the first image array; arranging the plurality of images to form a second image array, wherein the images are ordered in the second image array based on the values of the at least one property; and displaying the second image array. 35. The method of claim 34, wherein the sample comprises blood and the cells comprise red blood cells. 36. The method of claim 34, wherein the sample comprises blood and the cells comprise platelets. 37. The method of claim 34, wherein each image in the second image array is displayed as a user-selectable control. 38. The method of claim 37, wherein each user-selectable control is configured so that, when activated, information about the corresponding cell in the sample is displayed. 39. The method of claim 34, wherein the values of the at least one property comprise a cell hemoglobin content of each of the cells. 40. The method of claim 34, wherein the values of the at least one property comprise a cell volume of each of the cells. 41. The method of claim 34, wherein the values of the at least one property comprise a cell size of each of the cells. 42. The method of claim 34, wherein the values of the at least one property comprise an optical density of each of the cells. 43. The method of claim 34, wherein the values of the at least one property comprise a shape of each of the cells. 44. The method of claim 34, further comprising:
for each of the plurality of images, identifying a background set of pixels in the image that does not correspond to the cell associated with the image, wherein displaying the second image array comprises, for each of the plurality of images, assigning a color to each member of the background set of pixels; and wherein the color is assigned based on the value of the at least one property for the cell associated with the image. 45. A system for visual inspection of cells, the system comprising:
a light source configured to illuminate cells in a sample; a detector configured to obtain a plurality of images of the cells, wherein each image corresponds to one of the cells in the sample; a display device configured to display images of the cells; and an electronic processor configured to:
determine values of at least one property for each of the cells based on the plurality of images;
arrange the plurality of images at random to form a first image array;
display the first image array;
arrange the plurality of images to form a second image array, wherein the images are ordered in the second image array based on the values of the at least one property; and
display the second image array on the display device. 46. The system of claim 45, wherein the display device is configured to display each image in the second image array as a user-selectable control. 47. The system of claim 46, wherein the electronic processor is configured so that when one of the user-selectable controls is activated, the electronic processor displays information about the cell corresponding to the activated control on the display device. 48. The system of claim 45, wherein the values of the at least one property comprise a cell hemoglobin content of each of the cells. 49. The system of claim 45, wherein the values of the at least one property comprise a cell volume of each of the cells. 50. The system of claim 45, wherein the values of the at least one property comprise at least one member from the group consisting of a cell size of each of the cells, an optical density of each of the cells, and a shape of each of the cells. 51. The system of claim 45, wherein the electronic processor is further configured to analyze the plurality of images to identify inclusions in the cells, wherein the at least one property is a property related to the inclusions and comprises at least one of a size of the inclusions, a shape of the inclusions, and a number of the inclusions. 52. The system of claim 45, wherein for each of the plurality of images, the electronic processor is further configured to:
identify a background set of pixels in the image that does not correspond to the cell associated with the image; and display the image in the second image array by assigning a color to each member of the background set of pixels, wherein the color is assigned based on the value of the at least one property for the cell associated with the image. | 2,400 |
7,731 | 7,731 | 16,399,700 | 2,437 | A packet gateway may protect TCP/IP networks by enforcing security policies on in-transit packets that are crossing network boundaries. The policies may include packet filtering rules derived from cyber threat intelligence (CTI). The rapid growth in the volume of CTI and in the size of associated CTI-derived policies, coupled with ever-increasing network link speeds and network traffic volume, may cause the costs of sufficient computational resources to be prohibitive. To efficiently process packets, a packet gateway may be provided with at least one probabilistic data structure, such as a Bloom filter, for testing packets to determine if packet data may match a packet filtering rule. Packet filtering rules may be grouped into subsets of rules, and a data structure may be provided for determining a matching subset of rules associated with a particular packet. | 1. A method comprising:
receiving, by a packet gateway located at a boundary between a protected network and an unprotected network, a plurality of packets; determining, for each packet of the plurality of packets, at least one packet matching criterion associated with the packet; testing, for each packet of the plurality of packets, at least one policy probabilistic data structure for the at least one packet matching criterion; based on a determination that a first packet of the plurality of packets does not match at least one packet matching criterion of the at least one policy probabilistic data structure, forwarding the first packet towards its intended destination; based on a determination that a second packet of the plurality of packets matches at least one packet matching criterion associated with the at least one policy probabilistic data structure, determining at least one of a plurality of policy subset probabilistic data structures associated with at least one packet matching criterion of the second packet; testing a determined at least one of the plurality of policy subset probabilistic data structures associated with at least one packet matching criterion of the second packet; and based on a determination that the second packet of the plurality of packets matches at least one packet matching criterion associated with the determined at least one of the plurality of policy subset probabilistic data structures, performing a rule action associated with the determined at least one of the plurality of policy subset probabilistic data structures. 2. The method of claim 1, wherein the at least one policy probabilistic data structure and each of the policy subset probabilistic data structures are Bloom filters or Cuckoo filters. 3. The method of claim 1, wherein the at least one policy probabilistic data structure has a higher false positive rate than any of the policy subset probabilistic data structures. 4. The method of claim 1, wherein a policy subset probabilistic data structure associated with an action to prevent packet transmission has a lower false positive rate than a policy subset probabilistic data structure associated with an action to allow packet transmission to proceed. 5. The method of claim 1, further comprising:
receiving, by the packet gateway, a plurality of packet filtering rules, wherein each of the packet filtering rules comprises at least one packet matching criterion; generating at least one policy probabilistic data structure representing the plurality of packet filtering rules; partitioning the plurality of packet filtering rules into a plurality of rule subsets, wherein each of the plurality of rule subsets is associated with a common rule action; and generating a plurality of policy subset probabilistic data structures, wherein each of the plurality of policy subset probabilistic data structures is associated with one of the plurality of rule subsets, wherein each of the policy subset probabilistic data structures is associated with the common rule action associated with associated rule subset. 6. The method of claim 5, wherein generating a plurality of policy subset probabilistic data structures comprises:
partitioning the plurality of packet filtering rules based on an associated common packet matching criterion type to determine common packet matching criterion type rule groups; partitioning each of the common packet matching criterion type rule groups based on an associated common rule action to determine the rule subsets; and generating a policy subset probabilistic data structure corresponding to each rule subset with the associated common rule action and the associated common packet matching criterion type. 7. The method of claim 1, wherein testing a determined at least one of the plurality of policy subset probabilistic data structures associated with at least one packet matching criterion of the second packet comprises:
determining a plurality of packet matching criterion types associated with the second packet; determining at least one subset probabilistic data structure corresponding to the determined plurality of packet matching criterion types associated with the second packet; and testing each subset probabilistic data structure corresponding to the determined plurality of packet matching criterion types until a match is determined. 8. The method of claim 1, further comprising:
receiving, by the packet gateway, at least one new rule, wherein the at least one new rule comprises at least one new packet matching criterion; updating the at least one policy probabilistic data structure to represent the at least one new rule; determining, by the packet gateway, a rule subset to be updated based on the at least one new packet matching criterion; and updating a policy subset probabilistic data structure corresponding to the rule subset to be updated based on the at least one new packet matching criterion of the at least one new rule. 9. The method of claim 1, wherein generating the plurality of policy subset probabilistic data structures comprises applying an indicator encoding algorithm to each of a plurality of packet matching criteria associated with each rule subset to populate a subset probabilistic data structure corresponding to the rule subset. 10. A method comprising:
receiving, by a packet gateway located at a boundary between a protected network and an unprotected network, a plurality of packets; testing, by the packet gateway and for each packet of the plurality of packets, at least one policy probabilistic data structure representing a security policy to determine whether each packet of the plurality of packets is associated with at least one rule of the security policy, wherein the security policy comprises a plurality of packet filtering rules; based on a determination that a first packet of the plurality of packets matches at least one packet matching criterion associated with the at least one policy probabilistic data structure, determining at least one of a plurality of policy subset probabilistic data structures; testing, for the first packet, the at least one of the plurality of policy subset probabilistic data structures; and based on the testing the at least one of the plurality of policy subset probabilistic data structures, filtering the first packet. 11. The method of claim 10, further comprising:
based on a determination that a second packet of the plurality of packets does not match the at least one packet matching criterion associated with the at least one policy probabilistic data structure, forwarding the second packet to its intended destination. 12. The method of claim 10, wherein filtering the first packet comprises:
performing a rule action on the first packet. 13. The method of claim 10, wherein filtering the first packet comprises:
searching a rule set associated with the determined at least one of the plurality of policy subset probabilistic data structures; and performing, based on the rule set, a rule action. 14. The method of claim 10, further comprising:
based on a determination that a second packet of the plurality of packets does not match at least one second packet matching criterion associated with at least one of the plurality of policy subset probabilistic data structures, forwarding the second packet to its intended destination. 15. The method of claim 10, wherein filtering the first packet comprises one of blocking or monitoring the first packet. 16. The method of claim 10, further comprising:
receiving, by the packet gateway, at least one new rule, wherein the at least one new rule comprises at least one corresponding packet matching criterion; and updating the at least one policy probabilistic data structure to represent the at least one new rule. 17. The method of claim 10, wherein testing the at least one policy probabilistic data structure comprises using an encryption key to test an encoded policy probabilistic data structure. 18. A method comprising:
receiving, by a packet gateway, a plurality of packets; determining, based on packet header information, whether each of the plurality of packets comprises a Domain Name System (DNS) query request; based on a determination that a first packet of the plurality of packets comprises a first DNS query request, testing a DNS probabilistic data structure to determine if the first DNS query request is associated with a legitimate DNS query request; and based on a determination that the first packet of the plurality of packets does not comprise a legitimate DNS query request, dropping the first DNS query request. 19. The method of claim 18, further comprising:
based on a determination that a second packet of the plurality of packets comprises a second DNS query request, testing the DNS probabilistic data structure to determine if the second DNS query request is associated with a legitimate DNS query request; and based on a determination that the second packet of the plurality of packets comprises a legitimate DNS query request, transmitting the second packet towards a DNS server. 20. The method of claim 18, wherein dropping the first DNS query request comprises transmitting a message to a source of the first DNS query request. 21. The method of claim 18, wherein the DNS probabilistic data structure comprises one or more of: a Bloom filter or a Cuckoo filter. | A packet gateway may protect TCP/IP networks by enforcing security policies on in-transit packets that are crossing network boundaries. The policies may include packet filtering rules derived from cyber threat intelligence (CTI). The rapid growth in the volume of CTI and in the size of associated CTI-derived policies, coupled with ever-increasing network link speeds and network traffic volume, may cause the costs of sufficient computational resources to be prohibitive. To efficiently process packets, a packet gateway may be provided with at least one probabilistic data structure, such as a Bloom filter, for testing packets to determine if packet data may match a packet filtering rule. Packet filtering rules may be grouped into subsets of rules, and a data structure may be provided for determining a matching subset of rules associated with a particular packet.1. A method comprising:
receiving, by a packet gateway located at a boundary between a protected network and an unprotected network, a plurality of packets; determining, for each packet of the plurality of packets, at least one packet matching criterion associated with the packet; testing, for each packet of the plurality of packets, at least one policy probabilistic data structure for the at least one packet matching criterion; based on a determination that a first packet of the plurality of packets does not match at least one packet matching criterion of the at least one policy probabilistic data structure, forwarding the first packet towards its intended destination; based on a determination that a second packet of the plurality of packets matches at least one packet matching criterion associated with the at least one policy probabilistic data structure, determining at least one of a plurality of policy subset probabilistic data structures associated with at least one packet matching criterion of the second packet; testing a determined at least one of the plurality of policy subset probabilistic data structures associated with at least one packet matching criterion of the second packet; and based on a determination that the second packet of the plurality of packets matches at least one packet matching criterion associated with the determined at least one of the plurality of policy subset probabilistic data structures, performing a rule action associated with the determined at least one of the plurality of policy subset probabilistic data structures. 2. The method of claim 1, wherein the at least one policy probabilistic data structure and each of the policy subset probabilistic data structures are Bloom filters or Cuckoo filters. 3. The method of claim 1, wherein the at least one policy probabilistic data structure has a higher false positive rate than any of the policy subset probabilistic data structures. 4. The method of claim 1, wherein a policy subset probabilistic data structure associated with an action to prevent packet transmission has a lower false positive rate than a policy subset probabilistic data structure associated with an action to allow packet transmission to proceed. 5. The method of claim 1, further comprising:
receiving, by the packet gateway, a plurality of packet filtering rules, wherein each of the packet filtering rules comprises at least one packet matching criterion; generating at least one policy probabilistic data structure representing the plurality of packet filtering rules; partitioning the plurality of packet filtering rules into a plurality of rule subsets, wherein each of the plurality of rule subsets is associated with a common rule action; and generating a plurality of policy subset probabilistic data structures, wherein each of the plurality of policy subset probabilistic data structures is associated with one of the plurality of rule subsets, wherein each of the policy subset probabilistic data structures is associated with the common rule action associated with associated rule subset. 6. The method of claim 5, wherein generating a plurality of policy subset probabilistic data structures comprises:
partitioning the plurality of packet filtering rules based on an associated common packet matching criterion type to determine common packet matching criterion type rule groups; partitioning each of the common packet matching criterion type rule groups based on an associated common rule action to determine the rule subsets; and generating a policy subset probabilistic data structure corresponding to each rule subset with the associated common rule action and the associated common packet matching criterion type. 7. The method of claim 1, wherein testing a determined at least one of the plurality of policy subset probabilistic data structures associated with at least one packet matching criterion of the second packet comprises:
determining a plurality of packet matching criterion types associated with the second packet; determining at least one subset probabilistic data structure corresponding to the determined plurality of packet matching criterion types associated with the second packet; and testing each subset probabilistic data structure corresponding to the determined plurality of packet matching criterion types until a match is determined. 8. The method of claim 1, further comprising:
receiving, by the packet gateway, at least one new rule, wherein the at least one new rule comprises at least one new packet matching criterion; updating the at least one policy probabilistic data structure to represent the at least one new rule; determining, by the packet gateway, a rule subset to be updated based on the at least one new packet matching criterion; and updating a policy subset probabilistic data structure corresponding to the rule subset to be updated based on the at least one new packet matching criterion of the at least one new rule. 9. The method of claim 1, wherein generating the plurality of policy subset probabilistic data structures comprises applying an indicator encoding algorithm to each of a plurality of packet matching criteria associated with each rule subset to populate a subset probabilistic data structure corresponding to the rule subset. 10. A method comprising:
receiving, by a packet gateway located at a boundary between a protected network and an unprotected network, a plurality of packets; testing, by the packet gateway and for each packet of the plurality of packets, at least one policy probabilistic data structure representing a security policy to determine whether each packet of the plurality of packets is associated with at least one rule of the security policy, wherein the security policy comprises a plurality of packet filtering rules; based on a determination that a first packet of the plurality of packets matches at least one packet matching criterion associated with the at least one policy probabilistic data structure, determining at least one of a plurality of policy subset probabilistic data structures; testing, for the first packet, the at least one of the plurality of policy subset probabilistic data structures; and based on the testing the at least one of the plurality of policy subset probabilistic data structures, filtering the first packet. 11. The method of claim 10, further comprising:
based on a determination that a second packet of the plurality of packets does not match the at least one packet matching criterion associated with the at least one policy probabilistic data structure, forwarding the second packet to its intended destination. 12. The method of claim 10, wherein filtering the first packet comprises:
performing a rule action on the first packet. 13. The method of claim 10, wherein filtering the first packet comprises:
searching a rule set associated with the determined at least one of the plurality of policy subset probabilistic data structures; and performing, based on the rule set, a rule action. 14. The method of claim 10, further comprising:
based on a determination that a second packet of the plurality of packets does not match at least one second packet matching criterion associated with at least one of the plurality of policy subset probabilistic data structures, forwarding the second packet to its intended destination. 15. The method of claim 10, wherein filtering the first packet comprises one of blocking or monitoring the first packet. 16. The method of claim 10, further comprising:
receiving, by the packet gateway, at least one new rule, wherein the at least one new rule comprises at least one corresponding packet matching criterion; and updating the at least one policy probabilistic data structure to represent the at least one new rule. 17. The method of claim 10, wherein testing the at least one policy probabilistic data structure comprises using an encryption key to test an encoded policy probabilistic data structure. 18. A method comprising:
receiving, by a packet gateway, a plurality of packets; determining, based on packet header information, whether each of the plurality of packets comprises a Domain Name System (DNS) query request; based on a determination that a first packet of the plurality of packets comprises a first DNS query request, testing a DNS probabilistic data structure to determine if the first DNS query request is associated with a legitimate DNS query request; and based on a determination that the first packet of the plurality of packets does not comprise a legitimate DNS query request, dropping the first DNS query request. 19. The method of claim 18, further comprising:
based on a determination that a second packet of the plurality of packets comprises a second DNS query request, testing the DNS probabilistic data structure to determine if the second DNS query request is associated with a legitimate DNS query request; and based on a determination that the second packet of the plurality of packets comprises a legitimate DNS query request, transmitting the second packet towards a DNS server. 20. The method of claim 18, wherein dropping the first DNS query request comprises transmitting a message to a source of the first DNS query request. 21. The method of claim 18, wherein the DNS probabilistic data structure comprises one or more of: a Bloom filter or a Cuckoo filter. | 2,400 |
7,732 | 7,732 | 14,008,366 | 2,483 | A method for decoding of transform coefficients. The method comprises decoding consecutive bits of an input compressed bitstream; computing a first symbol value using a number of decoded bits; returning the first symbol value if a total number of decoded bits is less than a specified bit count; computing a second symbol value if the total number of decoded bits equals the specified bit count; and returning the second symbol value. | 1. A method for decoding transform coefficients, comprising:
decoding consecutive bits of an input compressed bitstream; computing a first symbol value using a number of the decoded bits; returning the first symbol value, if a total number of the decoded bits is less than a specified bit count; computing a second symbol value, if the total number of the decoded bits equals the specified bit count; and returning the second symbol value. 2. The method of claim 1, wherein computing the first symbol value further comprising:
adding one to the total number of the decoded bits. 3. The method of claim 1, wherein computing the second symbol value further comprises:
decoding the input compressed bitstream using an Exponential-Golomb code; and adding the first symbol value to a result generated by the Exponential-Golomb code decoding. 4. The method of claim 1, wherein the input compressed bitstream is a decoded context-adaptive binary data arithmetic coding (CABAC) bitstream. 5. The method of claim 4, wherein decoding the consecutive bits, further comprising:
decoding multiple bits having a same value using a same CABAC context. 6. The method of claim 5, further comprising:
receiving a context value, the input compressed bitstream, and a CABAC decoder object, wherein the CABAC decoder object includes a range value and an offset value; computing a sub-range value; computing a new range value by subtracting the sub-range value from the range value; checking if the offset value is less than the new range value; returning a decompressed output bit having a value equal to a most probable symbol (MPS) value, if the offset is less than the new range value; and returning a decompressed output bit having a value equal to a least probable symbol (LPS), if the offset is bigger or equal to the new range value. 7. The method of claim 6, further comprising:
performing a renormalization process; checking if a zero bit is encountered; returning a total number of the decoded bits, if a zero bit is encountered; incrementing a counter counting the total number of the decoded bits, if a zero bit is not encountered; and returning the total number of the decoded bits, if a specified maximum number of bits were decoded. 8. The method of claim 7, wherein performing the renormalization process comprises:
consecutively reading new bits from the input compressed bitstream until a range value is bigger than or equal to a predefined range value (PRV). 9. The method of claim 1, wherein decoding the consecutive bits comprises:
computing a minimum number of consecutive most probable symbol bits in the input compressed bitstream; and advancing a state machine of a CABAC decoder for each bit in the consecutive most probable symbol bits without checking the value of each bit. 10. The method of claim 9, further comprising:
receiving a context value, the input compressed bitstream, and a CABAC decoder object, wherein the CABAC decoder object includes a range value and an offset value; computing a sub-range value using the range value and the offset value; computing a minimum number of consecutive most probable symbol bits (mpbits) in the input compressed bitstream; returning a decompressed output bit having a value equals to a most probable symbol value, if the minimum number of consecutive most probable symbol bits is greater than zero; and returning a decompressed output bit having a value equals to a least probable symbol value, if the minimum number of consecutive most probable symbol bits is equal to zero. 11. The method of claim 10, wherein returning the decompressed output bit having a value equal to the most probable symbol value, further comprising:
computing a new range value by subtracting the range value from the sub-range value; performing a normalization process; upon completion of the normalization process, checking if a zero bit is encountered in the consecutive most probable symbol bits; iteratively advancing the state machine of the CABAC decoder for each bit in most probable symbol consecutive bits, if a zero bit is not encountered; and returning a total number of decoded bits when the zero bit is encountered or a specified bit count is achieved. 12. A computer readable medium having stored thereon instructions which, when executed by a computer, perform a method for decoding transform coefficients, comprising:
decoding consecutive bits of an input compressed bitstream; computing a first symbol value using a number of the decoded bits; returning the first symbol value, if a total number of the decoded bits is less than a specified bit count; computing a second symbol value, if the total number of the decoded bits equals the specified bit count; and returning the second symbol value. 13. A decoder for decoding transform coefficients, comprising:
a context-adaptive binary data arithmetic coding (CABAC) decoder for decoding consecutive bits of an input compressed bitstream; a first adder for computing a first symbol value by adding one to a number of the decoded bits; a comparator for determining if a total number of the decoded bits equal to a specified maximum number; an Exponential-Golomb code decoder for decoding the input compressed bitstream if the total number of the decoded bits equal to the specified bit count; and a second adder for generating a second symbol value by adding the first symbol valve to a result generated by the Exponential-Golomb code decoder. 14. The decoder of claim 4, wherein decoding the consecutive bits, further comprising:
decoding multiple bits having a same value using a same CABAC context. 15. The decoder of claim 14, further comprising:
receiving a context value, the input compressed bitstream, and a CABAC decoder object, wherein the CABAC decoder object includes a range value and an offset value; computing a sub-range value; computing a new range value by subtracting the range value from the sub-range value; checking if the offset value is teas than the new range value; returning a decompressed output bit having a value equal to a most probable symbol (MPS) value, if the offset is less than the new range value; and returning a decompressed output bit having a value equal to a least probable symbol (LPS), if the offset is bigger or equal to the new range value. 16. The decoder of claim 15, further comprising:
performing a renormalization process; checking if a zero bit is encountered; returning a total number of the decoded bits, if a zero bit is encountered; incrementing a counter counting the total number of the decoded bits, if a zero bit is not encountered; and returning the total number of decoded bits, if a specified maximum number of bits were decoded. 17. The decoder of claim 16, wherein performing the renormalization process comprises:
consecutively reading new bits from the input compressed bitstream until a range value is bigger than or equal to a predefined range value (PRV). 18. The decoder of claim 13, wherein decoding the consecutive bits comprises:
computing a minimum number of consecutive most probable symbol bits in the input compressed bitstream; and advancing a state machine of a CABAC decoder for each bit in the consecutive most probable symbol bits without checking the value of each bit. 19. The decoder of claim 18, further comprising:
receiving a context value, the Input compressed bitstream, and a CABAC decoder object, wherein the CABAC decoder object includes a range value and an offset value; computing a sub-range value using the range value and the offset value; computing a minimum number of consecutive most probable symbol bits (mpbits) in the input compressed bitstream; returning a decompressed output bit having a value equals to a most probable symbol value, if the minimum number of consecutive most probable symbol bits is greater than zero; and returning a decompressed output bit having a value equals to a least probable symbol value, if the minimum number of consecutive most probable symbol bits is equal to zero. 20. The decoder of claim 19, wherein returning the decompressed output bit having a value equals to the most probable symbol value, further comprising:
computing a new range value by subtracting the range value from the sub-range value; performing a normalization process; upon completion of the normalization process, checking if a zero bit is encountered in the consecutive most probable symbol bits; iteratively advancing the state machine of the CABAC decoder for each bit in most probable symbol consecutive bits, if a zero bit is not encountered; and returning a total number of decoded bits when the zero bit is encountered or a specified bit count is achieved. | A method for decoding of transform coefficients. The method comprises decoding consecutive bits of an input compressed bitstream; computing a first symbol value using a number of decoded bits; returning the first symbol value if a total number of decoded bits is less than a specified bit count; computing a second symbol value if the total number of decoded bits equals the specified bit count; and returning the second symbol value.1. A method for decoding transform coefficients, comprising:
decoding consecutive bits of an input compressed bitstream; computing a first symbol value using a number of the decoded bits; returning the first symbol value, if a total number of the decoded bits is less than a specified bit count; computing a second symbol value, if the total number of the decoded bits equals the specified bit count; and returning the second symbol value. 2. The method of claim 1, wherein computing the first symbol value further comprising:
adding one to the total number of the decoded bits. 3. The method of claim 1, wherein computing the second symbol value further comprises:
decoding the input compressed bitstream using an Exponential-Golomb code; and adding the first symbol value to a result generated by the Exponential-Golomb code decoding. 4. The method of claim 1, wherein the input compressed bitstream is a decoded context-adaptive binary data arithmetic coding (CABAC) bitstream. 5. The method of claim 4, wherein decoding the consecutive bits, further comprising:
decoding multiple bits having a same value using a same CABAC context. 6. The method of claim 5, further comprising:
receiving a context value, the input compressed bitstream, and a CABAC decoder object, wherein the CABAC decoder object includes a range value and an offset value; computing a sub-range value; computing a new range value by subtracting the sub-range value from the range value; checking if the offset value is less than the new range value; returning a decompressed output bit having a value equal to a most probable symbol (MPS) value, if the offset is less than the new range value; and returning a decompressed output bit having a value equal to a least probable symbol (LPS), if the offset is bigger or equal to the new range value. 7. The method of claim 6, further comprising:
performing a renormalization process; checking if a zero bit is encountered; returning a total number of the decoded bits, if a zero bit is encountered; incrementing a counter counting the total number of the decoded bits, if a zero bit is not encountered; and returning the total number of the decoded bits, if a specified maximum number of bits were decoded. 8. The method of claim 7, wherein performing the renormalization process comprises:
consecutively reading new bits from the input compressed bitstream until a range value is bigger than or equal to a predefined range value (PRV). 9. The method of claim 1, wherein decoding the consecutive bits comprises:
computing a minimum number of consecutive most probable symbol bits in the input compressed bitstream; and advancing a state machine of a CABAC decoder for each bit in the consecutive most probable symbol bits without checking the value of each bit. 10. The method of claim 9, further comprising:
receiving a context value, the input compressed bitstream, and a CABAC decoder object, wherein the CABAC decoder object includes a range value and an offset value; computing a sub-range value using the range value and the offset value; computing a minimum number of consecutive most probable symbol bits (mpbits) in the input compressed bitstream; returning a decompressed output bit having a value equals to a most probable symbol value, if the minimum number of consecutive most probable symbol bits is greater than zero; and returning a decompressed output bit having a value equals to a least probable symbol value, if the minimum number of consecutive most probable symbol bits is equal to zero. 11. The method of claim 10, wherein returning the decompressed output bit having a value equal to the most probable symbol value, further comprising:
computing a new range value by subtracting the range value from the sub-range value; performing a normalization process; upon completion of the normalization process, checking if a zero bit is encountered in the consecutive most probable symbol bits; iteratively advancing the state machine of the CABAC decoder for each bit in most probable symbol consecutive bits, if a zero bit is not encountered; and returning a total number of decoded bits when the zero bit is encountered or a specified bit count is achieved. 12. A computer readable medium having stored thereon instructions which, when executed by a computer, perform a method for decoding transform coefficients, comprising:
decoding consecutive bits of an input compressed bitstream; computing a first symbol value using a number of the decoded bits; returning the first symbol value, if a total number of the decoded bits is less than a specified bit count; computing a second symbol value, if the total number of the decoded bits equals the specified bit count; and returning the second symbol value. 13. A decoder for decoding transform coefficients, comprising:
a context-adaptive binary data arithmetic coding (CABAC) decoder for decoding consecutive bits of an input compressed bitstream; a first adder for computing a first symbol value by adding one to a number of the decoded bits; a comparator for determining if a total number of the decoded bits equal to a specified maximum number; an Exponential-Golomb code decoder for decoding the input compressed bitstream if the total number of the decoded bits equal to the specified bit count; and a second adder for generating a second symbol value by adding the first symbol valve to a result generated by the Exponential-Golomb code decoder. 14. The decoder of claim 4, wherein decoding the consecutive bits, further comprising:
decoding multiple bits having a same value using a same CABAC context. 15. The decoder of claim 14, further comprising:
receiving a context value, the input compressed bitstream, and a CABAC decoder object, wherein the CABAC decoder object includes a range value and an offset value; computing a sub-range value; computing a new range value by subtracting the range value from the sub-range value; checking if the offset value is teas than the new range value; returning a decompressed output bit having a value equal to a most probable symbol (MPS) value, if the offset is less than the new range value; and returning a decompressed output bit having a value equal to a least probable symbol (LPS), if the offset is bigger or equal to the new range value. 16. The decoder of claim 15, further comprising:
performing a renormalization process; checking if a zero bit is encountered; returning a total number of the decoded bits, if a zero bit is encountered; incrementing a counter counting the total number of the decoded bits, if a zero bit is not encountered; and returning the total number of decoded bits, if a specified maximum number of bits were decoded. 17. The decoder of claim 16, wherein performing the renormalization process comprises:
consecutively reading new bits from the input compressed bitstream until a range value is bigger than or equal to a predefined range value (PRV). 18. The decoder of claim 13, wherein decoding the consecutive bits comprises:
computing a minimum number of consecutive most probable symbol bits in the input compressed bitstream; and advancing a state machine of a CABAC decoder for each bit in the consecutive most probable symbol bits without checking the value of each bit. 19. The decoder of claim 18, further comprising:
receiving a context value, the Input compressed bitstream, and a CABAC decoder object, wherein the CABAC decoder object includes a range value and an offset value; computing a sub-range value using the range value and the offset value; computing a minimum number of consecutive most probable symbol bits (mpbits) in the input compressed bitstream; returning a decompressed output bit having a value equals to a most probable symbol value, if the minimum number of consecutive most probable symbol bits is greater than zero; and returning a decompressed output bit having a value equals to a least probable symbol value, if the minimum number of consecutive most probable symbol bits is equal to zero. 20. The decoder of claim 19, wherein returning the decompressed output bit having a value equals to the most probable symbol value, further comprising:
computing a new range value by subtracting the range value from the sub-range value; performing a normalization process; upon completion of the normalization process, checking if a zero bit is encountered in the consecutive most probable symbol bits; iteratively advancing the state machine of the CABAC decoder for each bit in most probable symbol consecutive bits, if a zero bit is not encountered; and returning a total number of decoded bits when the zero bit is encountered or a specified bit count is achieved. | 2,400 |
7,733 | 7,733 | 14,998,060 | 2,431 | Systems, apparatuses and methods may provide for locating operating system (OS) kernel information and user mode code in physical memory, wherein the kernel information includes kernel code and kernel read only data, and specifying permissions for the kernel information and the user code in an extended page table (EPT). Additionally, systems, apparatuses and methods may provide for switching, in accordance with the permissions, between view instances of the EPT in response to one or more hardware virtualization exceptions. | 1. A system comprising:
a system processor; and a hypervisor including an extension monitor engine to:
locate operating system (OS) kernel information and user mode code in physical memory based on state information stored in a processor data structure, wherein the kernel information is to include kernel code, kernel page table mappings, and kernel read only data;
specify permissions for the kernel information and the user mode code in an extended page table; and
switch, in accordance with the permissions, between view instances of the extended page table in response to one or more hardware virtualization exceptions,
wherein the extension monitor engine does not require modification to the operating system. 2. The system of claim 1, wherein the extension monitor engine de-privileges the operating system and causes the operating system to operate at a lower privilege. 3. The system of claim 1, wherein a system policy may be dynamically configured at runtime. 4. The system of claim 1, wherein the boot process may be adjusted to start the extension monitor engine before the operating system to allow the extension monitor engine to take control of the system hardware. 5. The system of claim 1, wherein the extension monitor engine operates in a virtual machine extension root operation. 6. The system of claim 5, wherein the virtual machine extension root operation protects the operating system. 7. The system of claim 1, wherein the virtual machine extension monitor adjusts and sets the system policy. 8. The system of claim 1, wherein the permissions may be determined via multiple views that outline permission maps. 9. At least one computer readable storage medium comprising a set of instructions, which when executed by a computing device, cause the computing device to:
locate operating system (OS) kernel information and user mode code in physical memory based on state information stored in a processor data structure, wherein the kernel information is to include kernel code, kernel page table mappings, and kernel read only data; specify permissions for the kernel information and the user mode code in an extended page table; and switch, in accordance with the permissions, between view instances of the extended page table in response to one or more hardware virtualization exceptions. 10. The at least one computer readable storage medium of claim 9, wherein the instructions, when executed, cause the computing device to:
de-privilege the operating system; and cause the operating system to operate at a lower privilege. 11. The at least one computer readable storage medium of claim 9, wherein the instructions, when executed, cause the computing device to dynamically configure a system policy at runtime. 12. The at least one computer readable storage medium of claim 9, wherein the instructions, when executed, cause the computing device to adjust the boot process to start the extension monitor engine before the operating system to allow the extension monitor engine to take control of the system hardware. 13. The at least one computer readable storage medium of claim 9, wherein the instructions, when executed, cause the computing device to operate the extension monitor engine in a virtual machine extension root operation. 14. The at least one computer readable storage medium of claim 13, wherein the virtual machine extension root operation protects the operating system. 15. The at least one computer readable storage medium of claim 9, wherein the instructions, when executed, cause the computing device to adjust and set the system policy. 16. The at least one computer readable storage medium of claim 9, wherein the instructions, when executed, cause the computing device to determine the permissions via multiple views that outline permission maps. 17. A method comprising:
locating operating system (OS) kernel information and user mode code in physical memory based on state information stored in a processor data structure, wherein the kernel information is to include kernel code, kernel page table mappings, and kernel read only data; specifying permissions for the kernel information and the user mode code in an extended page table; and switching, in accordance with the permissions, between view instances of the extended page table in response to one or more hardware virtualization exceptions. 18. The method of claim 17, further including:
de-privileging the operating system; and causing the operating system to operate at a lower privilege. 19. The method of claim 17, further including dynamically configuring a system policy at runtime. 20. The method of claim 17, further including adjusting the boot process to start the extension monitor engine before the operating system to allow the extension monitor engine to take control of the system hardware. 21. The method of claim 17, further including operating the extension monitor engine in a virtual machine extension root operation. 22. The method of claim 21, wherein the virtual machine extension root operation protects the operating system. 23. The method of claim 17, further including adjusting and setting the system policy. 24. An apparatus comprising:
a hypervisor including an extension monitor engine to:
locate operating system (OS) kernel information and user mode code in physical memory based on state information stored in a processor data structure, wherein the kernel information is to include kernel code, kernel page table mappings, and kernel read only data;
specify permissions for the kernel information and the user mode code in an extended page table; and
switch, in accordance with the permissions, between view instances of the extended page table in response to one or more hardware virtualization exceptions, herein the extension monitor engine does not require modification to the operating system. 25. The apparatus of claim 24, wherein the extension monitor engine de-privileges the operating system and causes the operating system to operate at a lower privilege. | Systems, apparatuses and methods may provide for locating operating system (OS) kernel information and user mode code in physical memory, wherein the kernel information includes kernel code and kernel read only data, and specifying permissions for the kernel information and the user code in an extended page table (EPT). Additionally, systems, apparatuses and methods may provide for switching, in accordance with the permissions, between view instances of the EPT in response to one or more hardware virtualization exceptions.1. A system comprising:
a system processor; and a hypervisor including an extension monitor engine to:
locate operating system (OS) kernel information and user mode code in physical memory based on state information stored in a processor data structure, wherein the kernel information is to include kernel code, kernel page table mappings, and kernel read only data;
specify permissions for the kernel information and the user mode code in an extended page table; and
switch, in accordance with the permissions, between view instances of the extended page table in response to one or more hardware virtualization exceptions,
wherein the extension monitor engine does not require modification to the operating system. 2. The system of claim 1, wherein the extension monitor engine de-privileges the operating system and causes the operating system to operate at a lower privilege. 3. The system of claim 1, wherein a system policy may be dynamically configured at runtime. 4. The system of claim 1, wherein the boot process may be adjusted to start the extension monitor engine before the operating system to allow the extension monitor engine to take control of the system hardware. 5. The system of claim 1, wherein the extension monitor engine operates in a virtual machine extension root operation. 6. The system of claim 5, wherein the virtual machine extension root operation protects the operating system. 7. The system of claim 1, wherein the virtual machine extension monitor adjusts and sets the system policy. 8. The system of claim 1, wherein the permissions may be determined via multiple views that outline permission maps. 9. At least one computer readable storage medium comprising a set of instructions, which when executed by a computing device, cause the computing device to:
locate operating system (OS) kernel information and user mode code in physical memory based on state information stored in a processor data structure, wherein the kernel information is to include kernel code, kernel page table mappings, and kernel read only data; specify permissions for the kernel information and the user mode code in an extended page table; and switch, in accordance with the permissions, between view instances of the extended page table in response to one or more hardware virtualization exceptions. 10. The at least one computer readable storage medium of claim 9, wherein the instructions, when executed, cause the computing device to:
de-privilege the operating system; and cause the operating system to operate at a lower privilege. 11. The at least one computer readable storage medium of claim 9, wherein the instructions, when executed, cause the computing device to dynamically configure a system policy at runtime. 12. The at least one computer readable storage medium of claim 9, wherein the instructions, when executed, cause the computing device to adjust the boot process to start the extension monitor engine before the operating system to allow the extension monitor engine to take control of the system hardware. 13. The at least one computer readable storage medium of claim 9, wherein the instructions, when executed, cause the computing device to operate the extension monitor engine in a virtual machine extension root operation. 14. The at least one computer readable storage medium of claim 13, wherein the virtual machine extension root operation protects the operating system. 15. The at least one computer readable storage medium of claim 9, wherein the instructions, when executed, cause the computing device to adjust and set the system policy. 16. The at least one computer readable storage medium of claim 9, wherein the instructions, when executed, cause the computing device to determine the permissions via multiple views that outline permission maps. 17. A method comprising:
locating operating system (OS) kernel information and user mode code in physical memory based on state information stored in a processor data structure, wherein the kernel information is to include kernel code, kernel page table mappings, and kernel read only data; specifying permissions for the kernel information and the user mode code in an extended page table; and switching, in accordance with the permissions, between view instances of the extended page table in response to one or more hardware virtualization exceptions. 18. The method of claim 17, further including:
de-privileging the operating system; and causing the operating system to operate at a lower privilege. 19. The method of claim 17, further including dynamically configuring a system policy at runtime. 20. The method of claim 17, further including adjusting the boot process to start the extension monitor engine before the operating system to allow the extension monitor engine to take control of the system hardware. 21. The method of claim 17, further including operating the extension monitor engine in a virtual machine extension root operation. 22. The method of claim 21, wherein the virtual machine extension root operation protects the operating system. 23. The method of claim 17, further including adjusting and setting the system policy. 24. An apparatus comprising:
a hypervisor including an extension monitor engine to:
locate operating system (OS) kernel information and user mode code in physical memory based on state information stored in a processor data structure, wherein the kernel information is to include kernel code, kernel page table mappings, and kernel read only data;
specify permissions for the kernel information and the user mode code in an extended page table; and
switch, in accordance with the permissions, between view instances of the extended page table in response to one or more hardware virtualization exceptions, herein the extension monitor engine does not require modification to the operating system. 25. The apparatus of claim 24, wherein the extension monitor engine de-privileges the operating system and causes the operating system to operate at a lower privilege. | 2,400 |
7,734 | 7,734 | 15,528,005 | 2,464 | Methods, wireless device ( 120; 400 ) and wireless communication network ( 100 ), such as a network node ( 110; 600 ) thereof, for managing downlink signal information. The downlink signal information being information about signal quality and/or signal strength received by the wireless device ( 120 ) in a downlink. The wireless device ( 120 ) sends ( 203; 302 ), to the wireless communication network ( 100 ), a message indicating said obtained downlink signal information and which message is associated with the wireless device ( 120 ) requesting access to the wireless communication network ( 100 ). The downlink information being indicated in the message by a range that indicates how much the obtained downlink signal information exceeds a certain threshold. The range is determined based on a certain factor that the wireless communication network ( 100 ) has informed the wireless device ( 120 ) about. | 1-35. (canceled) 36. A method, performed by a wireless device operative in a wireless communication network, for managing downlink signal information, the downlink signal information being information about signal quality and/or signal strength received by the wireless device in a downlink, wherein the method comprises:
obtaining the downlink signal information; sending, to the wireless communication network, a message indicating said obtained downlink signal information and which message is associated with the wireless device requesting access to the wireless communication network, the obtained downlink information being indicated in the message by a range that indicates how much the obtained downlink signal information exceeds a certain threshold, wherein the range is determined based on a certain factor, the wireless device having received information about said certain factor from the wireless communication network. 37. The method of claim 36, wherein the wireless device has received information about said certain threshold from the wireless communication network. 38. The method of claim 36, wherein said certain threshold is associated with a certain radio coverage level associated with the wireless device. 39. The method of claim 38, wherein said message also indicates said certain radio coverage level. 40. The method of claim 39, wherein the indication about the downlink signal information and said certain radio coverage level are encoded in one and the same code word comprised in said message. 41. The method of claim 38, wherein the wireless communication network is a Global System for Mobile communications (GSM) network that supports Extended Coverage GSM for Internet of Things (EC-GSM-IoT), wherein the radio coverage level is a Coverage Class (CC) and said certain radio coverage level is a CC indicating that the wireless device is in a normal coverage. 42. The method of claim 36, wherein said downlink signal information is represented by a value indicating said received signal quality and/or signal strength, and the range is indicating how much this value exceeds said certain threshold. 43. A non-transitory computer-readable medium comprising, stored thereupon, a computer program comprising instructions that, when executed by a wireless device, cause the wireless device to perform the method of claim 36. 44. A method, performed by a wireless communication network, for managing downlink signal information, the downlink signal information being information about signal quality and/or signal strength received in a downlink by a wireless device operative in the wireless communication network, wherein the method comprises:
receiving, from the wireless device, a message indicating said downlink signal information and which message is associated with the wireless device requesting access to the wireless communication network, the downlink signal information being indicated in the message by a range that indicates how much the downlink signal information exceeds a certain threshold, wherein the range is determined based on a certain factor, the wireless communication network having sent information about said certain factor to the wireless device. 45. The method of claim 44, wherein the method further comprises:
using the downlink signal information indicated in the received message for one or more of the following purposes: optimizing an initial downlink and/or uplink modulation for the wireless device, and/or selecting modulation and/or coding scheme for the wireless device, and/or assigning resources to the wireless device, and/or selecting and/or assigning downlink and/or uplink power levels for the wireless device. 46. The method of claim 44, wherein the wireless communication network has sent information about said certain threshold to the wireless device. 47. The method of claim 44, wherein said certain threshold is associated with a certain radio coverage level associated with the wireless device. 48. The method of claim 47, wherein said message also indicates said certain radio coverage level. 49. The method of claim 48, wherein the indication about the downlink signal information and said certain radio coverage level are encoded in one and the same code word comprised in said message. 50. The method of claim 47, wherein the wireless communication network is a Global System for Mobile communications (GSM) network that supports Extended Coverage GSM for Internet of Things (EC-GSM-IoT), wherein the radio coverage level is a Coverage Class (CC) and said certain radio coverage level is a CC indicating that the wireless device is in a normal coverage. 51. The method of claim 44, wherein the method is performed by a network node comprised in the wireless communication network. 52. The method of claim 44, wherein said downlink signal information is represented by a value indicating said received signal quality and/or signal strength, and the range is indicating how much this value exceeds said certain threshold. 53. A non-transitory computer-readable medium comprising, stored thereupon, a computer program comprising instructions that, when executed by a network node comprised in the wireless communication network, cause the wireless communication network to perform the method of claim 44. 54. A wireless device, configured to be operative in a wireless communication network, for managing downlink signal information, the downlink signal information being information about signal quality and/or signal strength received by the wireless device in a downlink, wherein the wireless device comprises a processing circuit and a memory operatively coupled to the processing circuit and comprising program instructions for execution by the processing circuit, whereby the processing circuit is configured to:
obtain the downlink signal information; and send, to the wireless communication network, a message indicating said obtained downlink signal information and which message is associated with the wireless device requesting access to the wireless communication network, the obtained downlink information being indicated in the message by a range that indicates how much the obtained downlink signal information exceeds a certain threshold, wherein the range is determined based on a certain factor, the wireless device having received information about said certain factor from the wireless communication network. 55. The wireless device of claim 54, wherein the processing circuit is configured to receive information about said certain threshold from the wireless communication network. 56. The wireless device of claim 54, wherein said certain threshold is associated with a certain radio coverage level associated with the wireless device. 57. The wireless device of claim 56, wherein said message also indicates said certain radio coverage level. 58. The wireless device of claim 56, wherein the indication about the downlink signal information and said certain radio coverage level are encoded in one and the same code word comprised in said message. 59. The wireless device of claim 56, wherein the wireless communication network is a Global System for Mobile communications (GSM) network that supports Extended Coverage GSM for Internet of Things (EC-GSM-IoT), wherein the radio coverage level is a Coverage Class (CC) and said certain radio coverage level is a CC indicating that the wireless device is in a normal coverage. 60. The wireless device of claim 54, wherein said downlink signal information is represented by a value indicating said received signal quality and/or signal strength, and the range is indicating how much this value exceeds said certain threshold. 61. A network node for managing downlink signal information in a wireless communication network, the downlink signal information being information about signal quality and/or signal strength received in a downlink by a wireless device operative in the wireless communication network, wherein the network node comprises a processing circuit and a memory operatively coupled to the processing circuit and comprising program instructions for execution by the processing circuit, whereby the processing circuit is configured to:
receive, from the wireless device, a message indicating said downlink signal information and which message is associated with the wireless device requesting access to the wireless communication network, the downlink signal information being indicated in the message by a range that indicates how much the downlink signal information exceeds a certain threshold, wherein the range is determined based on a certain factor, the wireless communication network having sent information about said certain factor to the wireless device. 62. The network node of claim 61, wherein the processing circuit is further configured to:
use the downlink signal information indicated in the received message for one or more of the following purposes:
optimizing an initial downlink and/or uplink modulation for the wireless device, and/or
selecting modulation and/or coding scheme for the wireless device, and/or
assigning resources to the wireless device, and/or
selecting and/or assigning downlink and/or uplink power levels for 10 the wireless device. 63. The network node of claim 61, wherein the processing circuit is further configured to send information about said certain threshold to the wireless device. 64. The network node of claim 63, wherein said certain threshold is associated with a certain radio coverage level associated with the wireless device. 65. The network node of claim 64, wherein said message also indicates said certain radio coverage level. 66. The network node of claim 65, wherein the indication about the downlink signal information and said certain radio coverage level are encoded in one and the same code word comprised in said message. 67. The network node of claim 66, wherein the wireless communication network is a Global System for Mobile communications (GSM) network that supports Extended Coverage GSM for Internet of Things (EC-GSM-IoT), wherein the radio coverage level is a Coverage Class (CC) and said certain radio coverage level is a CC indicating that the wireless device is in a normal coverage. 68. The network node of claim 61, wherein said downlink signal information is represented by a value indicating said received signal quality and/or signal strength, and the range is indicating how much this value exceeds said certain threshold. | Methods, wireless device ( 120; 400 ) and wireless communication network ( 100 ), such as a network node ( 110; 600 ) thereof, for managing downlink signal information. The downlink signal information being information about signal quality and/or signal strength received by the wireless device ( 120 ) in a downlink. The wireless device ( 120 ) sends ( 203; 302 ), to the wireless communication network ( 100 ), a message indicating said obtained downlink signal information and which message is associated with the wireless device ( 120 ) requesting access to the wireless communication network ( 100 ). The downlink information being indicated in the message by a range that indicates how much the obtained downlink signal information exceeds a certain threshold. The range is determined based on a certain factor that the wireless communication network ( 100 ) has informed the wireless device ( 120 ) about.1-35. (canceled) 36. A method, performed by a wireless device operative in a wireless communication network, for managing downlink signal information, the downlink signal information being information about signal quality and/or signal strength received by the wireless device in a downlink, wherein the method comprises:
obtaining the downlink signal information; sending, to the wireless communication network, a message indicating said obtained downlink signal information and which message is associated with the wireless device requesting access to the wireless communication network, the obtained downlink information being indicated in the message by a range that indicates how much the obtained downlink signal information exceeds a certain threshold, wherein the range is determined based on a certain factor, the wireless device having received information about said certain factor from the wireless communication network. 37. The method of claim 36, wherein the wireless device has received information about said certain threshold from the wireless communication network. 38. The method of claim 36, wherein said certain threshold is associated with a certain radio coverage level associated with the wireless device. 39. The method of claim 38, wherein said message also indicates said certain radio coverage level. 40. The method of claim 39, wherein the indication about the downlink signal information and said certain radio coverage level are encoded in one and the same code word comprised in said message. 41. The method of claim 38, wherein the wireless communication network is a Global System for Mobile communications (GSM) network that supports Extended Coverage GSM for Internet of Things (EC-GSM-IoT), wherein the radio coverage level is a Coverage Class (CC) and said certain radio coverage level is a CC indicating that the wireless device is in a normal coverage. 42. The method of claim 36, wherein said downlink signal information is represented by a value indicating said received signal quality and/or signal strength, and the range is indicating how much this value exceeds said certain threshold. 43. A non-transitory computer-readable medium comprising, stored thereupon, a computer program comprising instructions that, when executed by a wireless device, cause the wireless device to perform the method of claim 36. 44. A method, performed by a wireless communication network, for managing downlink signal information, the downlink signal information being information about signal quality and/or signal strength received in a downlink by a wireless device operative in the wireless communication network, wherein the method comprises:
receiving, from the wireless device, a message indicating said downlink signal information and which message is associated with the wireless device requesting access to the wireless communication network, the downlink signal information being indicated in the message by a range that indicates how much the downlink signal information exceeds a certain threshold, wherein the range is determined based on a certain factor, the wireless communication network having sent information about said certain factor to the wireless device. 45. The method of claim 44, wherein the method further comprises:
using the downlink signal information indicated in the received message for one or more of the following purposes: optimizing an initial downlink and/or uplink modulation for the wireless device, and/or selecting modulation and/or coding scheme for the wireless device, and/or assigning resources to the wireless device, and/or selecting and/or assigning downlink and/or uplink power levels for the wireless device. 46. The method of claim 44, wherein the wireless communication network has sent information about said certain threshold to the wireless device. 47. The method of claim 44, wherein said certain threshold is associated with a certain radio coverage level associated with the wireless device. 48. The method of claim 47, wherein said message also indicates said certain radio coverage level. 49. The method of claim 48, wherein the indication about the downlink signal information and said certain radio coverage level are encoded in one and the same code word comprised in said message. 50. The method of claim 47, wherein the wireless communication network is a Global System for Mobile communications (GSM) network that supports Extended Coverage GSM for Internet of Things (EC-GSM-IoT), wherein the radio coverage level is a Coverage Class (CC) and said certain radio coverage level is a CC indicating that the wireless device is in a normal coverage. 51. The method of claim 44, wherein the method is performed by a network node comprised in the wireless communication network. 52. The method of claim 44, wherein said downlink signal information is represented by a value indicating said received signal quality and/or signal strength, and the range is indicating how much this value exceeds said certain threshold. 53. A non-transitory computer-readable medium comprising, stored thereupon, a computer program comprising instructions that, when executed by a network node comprised in the wireless communication network, cause the wireless communication network to perform the method of claim 44. 54. A wireless device, configured to be operative in a wireless communication network, for managing downlink signal information, the downlink signal information being information about signal quality and/or signal strength received by the wireless device in a downlink, wherein the wireless device comprises a processing circuit and a memory operatively coupled to the processing circuit and comprising program instructions for execution by the processing circuit, whereby the processing circuit is configured to:
obtain the downlink signal information; and send, to the wireless communication network, a message indicating said obtained downlink signal information and which message is associated with the wireless device requesting access to the wireless communication network, the obtained downlink information being indicated in the message by a range that indicates how much the obtained downlink signal information exceeds a certain threshold, wherein the range is determined based on a certain factor, the wireless device having received information about said certain factor from the wireless communication network. 55. The wireless device of claim 54, wherein the processing circuit is configured to receive information about said certain threshold from the wireless communication network. 56. The wireless device of claim 54, wherein said certain threshold is associated with a certain radio coverage level associated with the wireless device. 57. The wireless device of claim 56, wherein said message also indicates said certain radio coverage level. 58. The wireless device of claim 56, wherein the indication about the downlink signal information and said certain radio coverage level are encoded in one and the same code word comprised in said message. 59. The wireless device of claim 56, wherein the wireless communication network is a Global System for Mobile communications (GSM) network that supports Extended Coverage GSM for Internet of Things (EC-GSM-IoT), wherein the radio coverage level is a Coverage Class (CC) and said certain radio coverage level is a CC indicating that the wireless device is in a normal coverage. 60. The wireless device of claim 54, wherein said downlink signal information is represented by a value indicating said received signal quality and/or signal strength, and the range is indicating how much this value exceeds said certain threshold. 61. A network node for managing downlink signal information in a wireless communication network, the downlink signal information being information about signal quality and/or signal strength received in a downlink by a wireless device operative in the wireless communication network, wherein the network node comprises a processing circuit and a memory operatively coupled to the processing circuit and comprising program instructions for execution by the processing circuit, whereby the processing circuit is configured to:
receive, from the wireless device, a message indicating said downlink signal information and which message is associated with the wireless device requesting access to the wireless communication network, the downlink signal information being indicated in the message by a range that indicates how much the downlink signal information exceeds a certain threshold, wherein the range is determined based on a certain factor, the wireless communication network having sent information about said certain factor to the wireless device. 62. The network node of claim 61, wherein the processing circuit is further configured to:
use the downlink signal information indicated in the received message for one or more of the following purposes:
optimizing an initial downlink and/or uplink modulation for the wireless device, and/or
selecting modulation and/or coding scheme for the wireless device, and/or
assigning resources to the wireless device, and/or
selecting and/or assigning downlink and/or uplink power levels for 10 the wireless device. 63. The network node of claim 61, wherein the processing circuit is further configured to send information about said certain threshold to the wireless device. 64. The network node of claim 63, wherein said certain threshold is associated with a certain radio coverage level associated with the wireless device. 65. The network node of claim 64, wherein said message also indicates said certain radio coverage level. 66. The network node of claim 65, wherein the indication about the downlink signal information and said certain radio coverage level are encoded in one and the same code word comprised in said message. 67. The network node of claim 66, wherein the wireless communication network is a Global System for Mobile communications (GSM) network that supports Extended Coverage GSM for Internet of Things (EC-GSM-IoT), wherein the radio coverage level is a Coverage Class (CC) and said certain radio coverage level is a CC indicating that the wireless device is in a normal coverage. 68. The network node of claim 61, wherein said downlink signal information is represented by a value indicating said received signal quality and/or signal strength, and the range is indicating how much this value exceeds said certain threshold. | 2,400 |
7,735 | 7,735 | 13,709,911 | 2,484 | A hyperspectral imager includes a sensor array and a filter array. The sensor array is an array of individually addressable sensor elements, each element responsive to radiant energy received thereon. The filter array is arranged to filter the radiant energy en route to the sensor array. It includes an inhomogeneous tiling of first and second filter elements, with the first filter element transmitting radiant energy of an invisible wavelength band and rejecting radiant energy of a visible wavelength band. The second filter element transmits radiant energy of the visible wavelength band and rejects radiant energy of the invisible wavelength band. | 1. A depth-sensing camera comprising:
a sensor array of individually addressable sensor elements, each element responsive to radiant energy received from a subject; and a filter array arranged to filter the radiant energy en route to the sensor array, the filter array including an inhomogeneous tiling of first, second, third, and fourth filter elements, each filter element transmitting radiant energy of a different wavelength band and rejecting radiant energy outside that band, the band of the first filter element being invisible and that of the second, third and fourth filter elements being visible; and a radiant-energy source emitting radiant energy toward the subject in the first wavelength band. 2. The camera of claim 1 wherein the radiant-energy source includes a directing optic to direct structured radiant energy onto the subject. 3. The camera of claim 1 wherein the first filter element includes a band-pass filter element. 4. The camera of claim 1 wherein the band of transmission of the first filter element is an ultraviolet wavelength band. 5. The camera of claim 1 wherein the band of transmission of the first filter element is an infrared wavelength band. 6. A hyperspectral imager comprising:
a sensor array of individually addressable sensor elements, each element responsive to radiant energy received thereon; and a filter array arranged to filter the radiant energy en route to the sensor array, the filter array including an inhomogeneous tiling of first and second filter elements, the first filter element transmitting radiant energy of an invisible wavelength band and rejecting radiant energy of a visible wavelength band, the second filter element transmitting radiant energy of the visible wavelength band and rejecting radiant energy of the invisible wavelength band. 7. The imager of claim 6 wherein each filter element of the filter array is arranged in registry with a corresponding sensor element of the sensor array. 8. The imager of claim 6 wherein the tiling further includes third and fourth filter elements, and wherein each of the first, second, third, and fourth filter elements transmits radiant energy of a different wavelength band and rejects energy outside that band. 9. The imager of claim 8 wherein the second filter element transmits red light, the third filter element transmits green light, and the fourth filter element transmits blue light. 10. The imager of claim 9 wherein the tiling further includes a fifth filter element, wherein the first filter element transmits in an ultraviolet wavelength band, and wherein the fifth filter element transmits in an infrared wavelength band. 11. The imager of claim 8 wherein one each of the first, second, third, and fourth filter elements are grouped together in a repeating unit cell of the filter array. 12. The imager of claim 6 wherein the sensor array is a complementary metal-oxide-semiconductor (CMOS) or charge-coupled-device (CCD) array. 13. A camera comprising:
a sensor array of individually addressable sensor elements, each element responsive to radiant energy received from a subject; a filter array arranged on the sensor array to filter the radiant energy en route to the sensor array, the filter array including an inhomogeneous tiling of first and second filter elements, the first filter element transmitting radiant energy of an invisible wavelength band and rejecting radiant energy of a visible wavelength band, the second filter element transmitting radiant energy of the visible wavelength band and rejecting radiant energy of the invisible wavelength band; and a logic machine to read data from the sensor array, the data representing radiant energy received concurrently in each of the visible and invisible wavelength bands. 14. The camera of claim 13 further comprising an interface to transmit the data to a computer. 15. The camera of claim 14 wherein the data is configured to enable conversion into a hyperspectral image. 16. The camera of claim 14 wherein the data is configured to enable conversion into a brightness- or color-coded depth map. 17. The camera of claim 13 wherein the sensor array is a first of two sensor arrays, and wherein the filter array is a first of two, corresponding filter arrays. 18. The camera of claim 17 further comprising a radiant-energy source configured to emit a narrow pulse of radiant energy, wherein the first and second sensor arrays each include an electronic shutter whose opening is synchronized to the narrow pulse, and wherein the electronic shutter of the first filter array is held open longer than the electronic shutter of the second sensor array. 19. The camera of claim 17 wherein the first and second sensor arrays are displaced relative to each other to acquire stereoscopically related first and second images of the subject. 20. The camera of claim 13 wherein the tiling further includes third and fourth filter elements, wherein each of the first, second, third, and fourth filter elements transmits radiant energy of a different wavelength band and rejects energy outside that band, and wherein the invisible wavelength band is an infrared wavelength band. | A hyperspectral imager includes a sensor array and a filter array. The sensor array is an array of individually addressable sensor elements, each element responsive to radiant energy received thereon. The filter array is arranged to filter the radiant energy en route to the sensor array. It includes an inhomogeneous tiling of first and second filter elements, with the first filter element transmitting radiant energy of an invisible wavelength band and rejecting radiant energy of a visible wavelength band. The second filter element transmits radiant energy of the visible wavelength band and rejects radiant energy of the invisible wavelength band.1. A depth-sensing camera comprising:
a sensor array of individually addressable sensor elements, each element responsive to radiant energy received from a subject; and a filter array arranged to filter the radiant energy en route to the sensor array, the filter array including an inhomogeneous tiling of first, second, third, and fourth filter elements, each filter element transmitting radiant energy of a different wavelength band and rejecting radiant energy outside that band, the band of the first filter element being invisible and that of the second, third and fourth filter elements being visible; and a radiant-energy source emitting radiant energy toward the subject in the first wavelength band. 2. The camera of claim 1 wherein the radiant-energy source includes a directing optic to direct structured radiant energy onto the subject. 3. The camera of claim 1 wherein the first filter element includes a band-pass filter element. 4. The camera of claim 1 wherein the band of transmission of the first filter element is an ultraviolet wavelength band. 5. The camera of claim 1 wherein the band of transmission of the first filter element is an infrared wavelength band. 6. A hyperspectral imager comprising:
a sensor array of individually addressable sensor elements, each element responsive to radiant energy received thereon; and a filter array arranged to filter the radiant energy en route to the sensor array, the filter array including an inhomogeneous tiling of first and second filter elements, the first filter element transmitting radiant energy of an invisible wavelength band and rejecting radiant energy of a visible wavelength band, the second filter element transmitting radiant energy of the visible wavelength band and rejecting radiant energy of the invisible wavelength band. 7. The imager of claim 6 wherein each filter element of the filter array is arranged in registry with a corresponding sensor element of the sensor array. 8. The imager of claim 6 wherein the tiling further includes third and fourth filter elements, and wherein each of the first, second, third, and fourth filter elements transmits radiant energy of a different wavelength band and rejects energy outside that band. 9. The imager of claim 8 wherein the second filter element transmits red light, the third filter element transmits green light, and the fourth filter element transmits blue light. 10. The imager of claim 9 wherein the tiling further includes a fifth filter element, wherein the first filter element transmits in an ultraviolet wavelength band, and wherein the fifth filter element transmits in an infrared wavelength band. 11. The imager of claim 8 wherein one each of the first, second, third, and fourth filter elements are grouped together in a repeating unit cell of the filter array. 12. The imager of claim 6 wherein the sensor array is a complementary metal-oxide-semiconductor (CMOS) or charge-coupled-device (CCD) array. 13. A camera comprising:
a sensor array of individually addressable sensor elements, each element responsive to radiant energy received from a subject; a filter array arranged on the sensor array to filter the radiant energy en route to the sensor array, the filter array including an inhomogeneous tiling of first and second filter elements, the first filter element transmitting radiant energy of an invisible wavelength band and rejecting radiant energy of a visible wavelength band, the second filter element transmitting radiant energy of the visible wavelength band and rejecting radiant energy of the invisible wavelength band; and a logic machine to read data from the sensor array, the data representing radiant energy received concurrently in each of the visible and invisible wavelength bands. 14. The camera of claim 13 further comprising an interface to transmit the data to a computer. 15. The camera of claim 14 wherein the data is configured to enable conversion into a hyperspectral image. 16. The camera of claim 14 wherein the data is configured to enable conversion into a brightness- or color-coded depth map. 17. The camera of claim 13 wherein the sensor array is a first of two sensor arrays, and wherein the filter array is a first of two, corresponding filter arrays. 18. The camera of claim 17 further comprising a radiant-energy source configured to emit a narrow pulse of radiant energy, wherein the first and second sensor arrays each include an electronic shutter whose opening is synchronized to the narrow pulse, and wherein the electronic shutter of the first filter array is held open longer than the electronic shutter of the second sensor array. 19. The camera of claim 17 wherein the first and second sensor arrays are displaced relative to each other to acquire stereoscopically related first and second images of the subject. 20. The camera of claim 13 wherein the tiling further includes third and fourth filter elements, wherein each of the first, second, third, and fourth filter elements transmits radiant energy of a different wavelength band and rejects energy outside that band, and wherein the invisible wavelength band is an infrared wavelength band. | 2,400 |
7,736 | 7,736 | 15,843,918 | 2,454 | Systems and methods for instantiating collaboration interfaces via object recognition are disclosed. An object recognition engine communicatively coupled to a database and an electronic device receives sensor data related to an object and identifies an object characteristic. A component is selected having criteria satisfied by the object characteristic and a collaboration interface is instantiated on the electronic device. This can allow a user to edit content related to an object. A substantially identical collaboration interface can be instantiated on a second electronic device to allow collaboration among user with respect to content related to the object. | 1-22. (canceled) 23. A collaboration system, comprising:
a collaboration database storing a plurality of collaboration interface components; and at least one processor configured to control an object recognition engine communicatively coupled with the collaboration database, and the object recognition engine being configured to: receive sensor data related to a game object via an input interface; identify a set of object characteristics from the sensor data; select the set of collaboration interface components having the selection criteria satisfied by the object characteristics; instantiate a collaboration interface comprising a game instantiated based on the game object from the set of components on at least a first electronic device; and configure the first electronic device to generate a first collaboration command via the instantiated collaboration interface. 24. The system of claim 23, wherein the object recognition engine is coupled to a construction engine, and wherein the construction engine is configured to construct a plurality of collaboration interfaces to be instantiated. 25. The system of claim 35, wherein the instantiated collaboration interface is selected from the plurality of constructed collaboration interfaces. 26. The system of claim 23, wherein the object recognition engine is disposed within the electronic device. 27. The system of claim 23, wherein the plurality of collaboration interface components comprises at least one of a video editor component, an image editor component, a text editor component, and an audio editor component. 28. The system of claim 23, wherein the object recognition engine is further configured to initiate an action targeting the first electronic device prior to instantiating the collaboration interface. 29. The system of claim 23, wherein the first collaboration command comprises at least one of: a comment, a modification, an addition, or a deletion. 30. The system of claim 23, wherein the object recognition engine is further configured to instantiate the collaboration interface on the second electronic device associated with a second user. 31. The system of claim 30, wherein the first device is located at least 1 mile away from the second device. 32. The system of claim 30, wherein the second electronic device is configured to generate a second collaboration command under direction of the second user via the instantiated collaboration interface. 33. The system of claim 32, further comprising a reconciliation engine coupled with the electronic device, and wherein the reconciliation engine is configured to provide an indication of a conflict between the first collaboration command and the second collaboration command. 34. The system of claim 33, wherein the reconciliation engine is further configured to reconcile the first user command with the second user command. 35. The system of claim 23, wherein the object recognition engine is further coupled with a database storing a plurality of rules that govern operation of the instantiated collaboration interface. 36. The system of claim 23, wherein the instantiated collaboration interface is configured to enforce a rule associated with the game object. 37. The system of claim 36, wherein the rule comprises intellectual property rules. 38. The system of claim 36, wherein the rule comprises censorship rules. 39. The system of claim 36, wherein the rule comprises version control rules. 40. The system of claim 23, wherein the object recognition engine is further configured to instantiate a second collaboration interface on the first electronic device. 41. The system of claim 40, wherein the object recognition engine is further configured to instantiate the second collaboration interface based on the first user command. 42. The system of claim 23, wherein the object recognition engine is further configured to receive sensor data related to a second object. 43. The system of claim 42, wherein the object recognition engine is further configured to identify a second set of object characteristics from the sensor data related to the second object. 44. The system of claim 43, wherein the set of components further has selection criteria satisfied by the second set of object characteristics. 45. A collaboration system, comprising:
a collaboration database storing a plurality of collaboration interface components; and at least one processor configured to control an object recognition engine communicatively coupled with the collaboration database, and the object recognition engine being configured to: receive sensor data related to a game object via an input interface; identify a set of object characteristics from the sensor data; select the set of collaboration interface components having the selection criteria satisfied by the object characteristics; instantiate a collaboration interface comprising an augmented reality game instantiated based on the game object from the set of components on at least a first electronic device; and configure the first electronic device to generate a first collaboration command via the instantiated collaboration interface. 46. A collaboration system, comprising:
a collaboration database storing a plurality of collaboration interface components; and at least one processor configured to control an object recognition engine communicatively coupled with the collaboration database, and the object recognition engine being configured to: receive sensor data related to an object via an input interface; identify a set of object characteristics from the sensor data; select the set of collaboration interface components having the selection criteria satisfied by the object characteristics; instantiate a collaboration interface comprising a game instantiated based on the object from the set of components on at least a first electronic device; and configure the first electronic device to generate a first collaboration command via the instantiated collaboration interface. 47. A collaboration system, comprising:
a collaboration database storing a plurality of collaboration interface components, the plurality of collaboration interface components comprising a game editor component; and at least one processor configured to control an object recognition engine communicatively coupled with the collaboration database, and the object recognition engine being configured to: receive sensor data related to a game object via an input interface; identify a set of object characteristics from the sensor data; select the set of collaboration interface components having the selection criteria satisfied by the object characteristics; instantiate a collaboration interface comprising a game instantiated based on the game object from the set of components on at least a first electronic device; and configure the first electronic device to generate a first collaboration command via the instantiated collaboration interface. | Systems and methods for instantiating collaboration interfaces via object recognition are disclosed. An object recognition engine communicatively coupled to a database and an electronic device receives sensor data related to an object and identifies an object characteristic. A component is selected having criteria satisfied by the object characteristic and a collaboration interface is instantiated on the electronic device. This can allow a user to edit content related to an object. A substantially identical collaboration interface can be instantiated on a second electronic device to allow collaboration among user with respect to content related to the object.1-22. (canceled) 23. A collaboration system, comprising:
a collaboration database storing a plurality of collaboration interface components; and at least one processor configured to control an object recognition engine communicatively coupled with the collaboration database, and the object recognition engine being configured to: receive sensor data related to a game object via an input interface; identify a set of object characteristics from the sensor data; select the set of collaboration interface components having the selection criteria satisfied by the object characteristics; instantiate a collaboration interface comprising a game instantiated based on the game object from the set of components on at least a first electronic device; and configure the first electronic device to generate a first collaboration command via the instantiated collaboration interface. 24. The system of claim 23, wherein the object recognition engine is coupled to a construction engine, and wherein the construction engine is configured to construct a plurality of collaboration interfaces to be instantiated. 25. The system of claim 35, wherein the instantiated collaboration interface is selected from the plurality of constructed collaboration interfaces. 26. The system of claim 23, wherein the object recognition engine is disposed within the electronic device. 27. The system of claim 23, wherein the plurality of collaboration interface components comprises at least one of a video editor component, an image editor component, a text editor component, and an audio editor component. 28. The system of claim 23, wherein the object recognition engine is further configured to initiate an action targeting the first electronic device prior to instantiating the collaboration interface. 29. The system of claim 23, wherein the first collaboration command comprises at least one of: a comment, a modification, an addition, or a deletion. 30. The system of claim 23, wherein the object recognition engine is further configured to instantiate the collaboration interface on the second electronic device associated with a second user. 31. The system of claim 30, wherein the first device is located at least 1 mile away from the second device. 32. The system of claim 30, wherein the second electronic device is configured to generate a second collaboration command under direction of the second user via the instantiated collaboration interface. 33. The system of claim 32, further comprising a reconciliation engine coupled with the electronic device, and wherein the reconciliation engine is configured to provide an indication of a conflict between the first collaboration command and the second collaboration command. 34. The system of claim 33, wherein the reconciliation engine is further configured to reconcile the first user command with the second user command. 35. The system of claim 23, wherein the object recognition engine is further coupled with a database storing a plurality of rules that govern operation of the instantiated collaboration interface. 36. The system of claim 23, wherein the instantiated collaboration interface is configured to enforce a rule associated with the game object. 37. The system of claim 36, wherein the rule comprises intellectual property rules. 38. The system of claim 36, wherein the rule comprises censorship rules. 39. The system of claim 36, wherein the rule comprises version control rules. 40. The system of claim 23, wherein the object recognition engine is further configured to instantiate a second collaboration interface on the first electronic device. 41. The system of claim 40, wherein the object recognition engine is further configured to instantiate the second collaboration interface based on the first user command. 42. The system of claim 23, wherein the object recognition engine is further configured to receive sensor data related to a second object. 43. The system of claim 42, wherein the object recognition engine is further configured to identify a second set of object characteristics from the sensor data related to the second object. 44. The system of claim 43, wherein the set of components further has selection criteria satisfied by the second set of object characteristics. 45. A collaboration system, comprising:
a collaboration database storing a plurality of collaboration interface components; and at least one processor configured to control an object recognition engine communicatively coupled with the collaboration database, and the object recognition engine being configured to: receive sensor data related to a game object via an input interface; identify a set of object characteristics from the sensor data; select the set of collaboration interface components having the selection criteria satisfied by the object characteristics; instantiate a collaboration interface comprising an augmented reality game instantiated based on the game object from the set of components on at least a first electronic device; and configure the first electronic device to generate a first collaboration command via the instantiated collaboration interface. 46. A collaboration system, comprising:
a collaboration database storing a plurality of collaboration interface components; and at least one processor configured to control an object recognition engine communicatively coupled with the collaboration database, and the object recognition engine being configured to: receive sensor data related to an object via an input interface; identify a set of object characteristics from the sensor data; select the set of collaboration interface components having the selection criteria satisfied by the object characteristics; instantiate a collaboration interface comprising a game instantiated based on the object from the set of components on at least a first electronic device; and configure the first electronic device to generate a first collaboration command via the instantiated collaboration interface. 47. A collaboration system, comprising:
a collaboration database storing a plurality of collaboration interface components, the plurality of collaboration interface components comprising a game editor component; and at least one processor configured to control an object recognition engine communicatively coupled with the collaboration database, and the object recognition engine being configured to: receive sensor data related to a game object via an input interface; identify a set of object characteristics from the sensor data; select the set of collaboration interface components having the selection criteria satisfied by the object characteristics; instantiate a collaboration interface comprising a game instantiated based on the game object from the set of components on at least a first electronic device; and configure the first electronic device to generate a first collaboration command via the instantiated collaboration interface. | 2,400 |
7,737 | 7,737 | 14,166,906 | 2,472 | A data distribution system, that includes a source router; destination routers; and a gateway; wherein the source router is arranged to receive multiple data streams and wirelessly transmit the multiple data streams over multiple source router output wireless communication links towards the destination routers; wherein the destination routers are arranged to wirelessly receive the multiple data streams over destination routers input wireless links and to transmit the multiple data streams to the gateway; and wherein the gateway is arranged to reconstruct the multiple data streams and output the multiple data streams over one or more gateway output links. | 1. A data distribution system, comprising:
a source router; destination routers; and a gateway; wherein the source router is arranged to receive multiple data streams and wirelessly transmit the multiple data streams over multiple source router output wireless communication links towards the destination routers; wherein the destination routers are arranged to wirelessly receive the multiple data streams over destination routers input wireless links and to transmit the multiple data streams to the gateway; and wherein the gateway is arranged to reconstruct the multiple data streams and output the multiple data streams over one or more gateway output links. 2. The data distribution system according to claim 1 wherein the source router is arranged to wirelessly transmit different data streams over different source router output wireless communication links. 3. The data distribution system according to claim 1 wherein the source router is arranged to wirelessly transmit different fragments of a data stream of the multiple data streams over different source router output wireless communication links; and wherein the gateway is arranged to reconstruct the data stream from the fragments of the data stream. 4. The data distribution system according to claim 3 wherein the gateway is arranged to detect missing fragments of the data stream and to request a re-transmission of at least the missing fragments data stream. 5. The data distribution system according to claim 3 wherein the fragments of the data stream are fragments of frames of the data streams. 6. The data distribution system according to claim 5 further comprising a group of intermediate routers, wherein the group is arranged to receive the fragments of frames of the data stream and to wirelessly transmit the fragments of the frames of the data streams to the destination routers without reconstructing the frames of the data stream. 7. The data distribution system according to claim 1 wherein the source router output wireless communication links are wireless local area network (WLAN) links. 8. The data distribution system according to claim 1 wherein the source router output wireless communication links are point to point wireless links. 9. The data distribution system according to claim 1 wherein the destination routers are arranged to transmit the multiple data streams to the gateway over wired destination routers links. 10. The data distribution system according to claim 1 wherein the destination routers and the gateway are coupled to each other to form a communication ring. 11. The data distribution system according to claim 1 further comprising a group of intermediate routers, wherein the group is arranged to receive the multiple data streams from the multiple source router output wireless communication links and to wirelessly transmit the multiple data streams over the destination routers input wireless links. 12. The data distribution system according to claim 11 wherein the group of intermediate routers comprises a first layer of intermediate routers that is arranged to receive the multiple data streams from the multiple source router output wireless communication links and a last layer of intermediate routers that is arranged to wirelessly transmit the multiple data streams over the destination routers input wireless links; wherein the first and layers of intermediate routers are wirelessly coupled to each other. 13. The data distribution system according to claim 12 wherein the group of intermediate routers further comprises an intermediate layer of intermediate routers wirelessly coupled between the first and last layers of intermediate routers. 14. The data distribution system according to claim 1 wherein the gateway is arranged to evaluate wireless path parameters of various wireless paths formed between the source router and the destination routers. 15. The data distribution system according to claim 1 wherein the source router is arranged to add metadata relating to wireless path parameters of various wireless paths formed between the source router and the destination routers. 16. The data distribution system according to claim 1 wherein the multiple data streams comprise multiple Ethernet frames. 17. A method for data distribution, the method comprises:
receiving, by a source router, multiple data streams; wirelessly transmitting the multiple data streams over multiple source router output wireless communication links towards destination routers; wirelessly receiving, by the destination routers, the multiple data streams over destination routers input wireless links; transmitting, by the destination routers, the multiple data streams to the gateway; and reconstructing, by the gateway, the multiple data streams; and outputting, by the gateway, the multiple data streams over one or more gateway output links. 18. The method according to claim 17 wirelessly transmitting by the source router different data streams over different source router output wireless communication links. 19. The method according to claim 17 wirelessly transmitting by the source router different fragments of a data stream of the multiple data streams over different source router output wireless communication links; and reconstructing by a gateway the data stream from the fragments of the data stream. 20. The method according to claim 19 comprising detecting by the gateway missing fragments of the data stream requesting a re-transmission of at least the missing fragments of the data stream. 21. The method according to claim 19 wherein the fragments of the data stream are fragments of frames of the data streams. 22. The method according to claim 21 further comprising receiving the fragments of frames of the data stream by a group of intermediate routers and wirelessly transmitting the fragments of the frames of the data streams to the destination routers without reconstructing the frames of the data stream by the group of intermediate routers. 23. The method according to claim 17 wherein the source router output wireless communication links are wireless local area network (WLAN) links. 24. The method according to claim 17 wherein the source router output wireless communication links are point to point wireless links. 25. The method according to claim 17 wherein the transmitting of the multiple data streams to the gateway is executed over wired destination routers links coupled between the destination routers and the gateway. 26. The method according to claim 17 wherein the destination routers and the gateway are coupled to each other to form a communication ring. 27. The method according to claim 17 further comprising receiving, by a group of intermediate routers, the multiple data streams from the multiple source router output wireless communication links; and wirelessly transmitting, by the group of intermediate routers, the multiple data streams over the destination routers input wireless links. 28. The method according to claim 27 wherein the group of intermediate routers comprises a first layer of intermediate routers and a last layer of intermediate routers, wherein the method comprises wirelessly receiving by the first layer of intermediate routers the multiple data streams from the multiple source router output wireless communication links and wirelessly transmitting, by the last layer of intermediate routers, the multiple data streams over the destination routers input wireless links; wherein the first and layers of intermediate routers are wirelessly coupled to each other. 29. The method according to claim 28 further comprising wirelessly receiving from the first layer of intermediate routers and by an intermediate layer of intermediate routers, the multiple data streams and wirelessly transmitting the multiple data streams from the intermediate layer of intermediate routers and to the destination routers the multiple data streams. 30. The method according to claim 17 comprising evaluating by the gateway wireless path parameters of various wireless paths formed between the source router and the destination routers. 31. The method according to claim 17 comprising adding by the source router metadata relating to wireless path parameters of various wireless paths formed between the source router and the destination routers. 32. The method according to claim 17 wherein the multiple data streams comprise multiple Ethernet frames. | A data distribution system, that includes a source router; destination routers; and a gateway; wherein the source router is arranged to receive multiple data streams and wirelessly transmit the multiple data streams over multiple source router output wireless communication links towards the destination routers; wherein the destination routers are arranged to wirelessly receive the multiple data streams over destination routers input wireless links and to transmit the multiple data streams to the gateway; and wherein the gateway is arranged to reconstruct the multiple data streams and output the multiple data streams over one or more gateway output links.1. A data distribution system, comprising:
a source router; destination routers; and a gateway; wherein the source router is arranged to receive multiple data streams and wirelessly transmit the multiple data streams over multiple source router output wireless communication links towards the destination routers; wherein the destination routers are arranged to wirelessly receive the multiple data streams over destination routers input wireless links and to transmit the multiple data streams to the gateway; and wherein the gateway is arranged to reconstruct the multiple data streams and output the multiple data streams over one or more gateway output links. 2. The data distribution system according to claim 1 wherein the source router is arranged to wirelessly transmit different data streams over different source router output wireless communication links. 3. The data distribution system according to claim 1 wherein the source router is arranged to wirelessly transmit different fragments of a data stream of the multiple data streams over different source router output wireless communication links; and wherein the gateway is arranged to reconstruct the data stream from the fragments of the data stream. 4. The data distribution system according to claim 3 wherein the gateway is arranged to detect missing fragments of the data stream and to request a re-transmission of at least the missing fragments data stream. 5. The data distribution system according to claim 3 wherein the fragments of the data stream are fragments of frames of the data streams. 6. The data distribution system according to claim 5 further comprising a group of intermediate routers, wherein the group is arranged to receive the fragments of frames of the data stream and to wirelessly transmit the fragments of the frames of the data streams to the destination routers without reconstructing the frames of the data stream. 7. The data distribution system according to claim 1 wherein the source router output wireless communication links are wireless local area network (WLAN) links. 8. The data distribution system according to claim 1 wherein the source router output wireless communication links are point to point wireless links. 9. The data distribution system according to claim 1 wherein the destination routers are arranged to transmit the multiple data streams to the gateway over wired destination routers links. 10. The data distribution system according to claim 1 wherein the destination routers and the gateway are coupled to each other to form a communication ring. 11. The data distribution system according to claim 1 further comprising a group of intermediate routers, wherein the group is arranged to receive the multiple data streams from the multiple source router output wireless communication links and to wirelessly transmit the multiple data streams over the destination routers input wireless links. 12. The data distribution system according to claim 11 wherein the group of intermediate routers comprises a first layer of intermediate routers that is arranged to receive the multiple data streams from the multiple source router output wireless communication links and a last layer of intermediate routers that is arranged to wirelessly transmit the multiple data streams over the destination routers input wireless links; wherein the first and layers of intermediate routers are wirelessly coupled to each other. 13. The data distribution system according to claim 12 wherein the group of intermediate routers further comprises an intermediate layer of intermediate routers wirelessly coupled between the first and last layers of intermediate routers. 14. The data distribution system according to claim 1 wherein the gateway is arranged to evaluate wireless path parameters of various wireless paths formed between the source router and the destination routers. 15. The data distribution system according to claim 1 wherein the source router is arranged to add metadata relating to wireless path parameters of various wireless paths formed between the source router and the destination routers. 16. The data distribution system according to claim 1 wherein the multiple data streams comprise multiple Ethernet frames. 17. A method for data distribution, the method comprises:
receiving, by a source router, multiple data streams; wirelessly transmitting the multiple data streams over multiple source router output wireless communication links towards destination routers; wirelessly receiving, by the destination routers, the multiple data streams over destination routers input wireless links; transmitting, by the destination routers, the multiple data streams to the gateway; and reconstructing, by the gateway, the multiple data streams; and outputting, by the gateway, the multiple data streams over one or more gateway output links. 18. The method according to claim 17 wirelessly transmitting by the source router different data streams over different source router output wireless communication links. 19. The method according to claim 17 wirelessly transmitting by the source router different fragments of a data stream of the multiple data streams over different source router output wireless communication links; and reconstructing by a gateway the data stream from the fragments of the data stream. 20. The method according to claim 19 comprising detecting by the gateway missing fragments of the data stream requesting a re-transmission of at least the missing fragments of the data stream. 21. The method according to claim 19 wherein the fragments of the data stream are fragments of frames of the data streams. 22. The method according to claim 21 further comprising receiving the fragments of frames of the data stream by a group of intermediate routers and wirelessly transmitting the fragments of the frames of the data streams to the destination routers without reconstructing the frames of the data stream by the group of intermediate routers. 23. The method according to claim 17 wherein the source router output wireless communication links are wireless local area network (WLAN) links. 24. The method according to claim 17 wherein the source router output wireless communication links are point to point wireless links. 25. The method according to claim 17 wherein the transmitting of the multiple data streams to the gateway is executed over wired destination routers links coupled between the destination routers and the gateway. 26. The method according to claim 17 wherein the destination routers and the gateway are coupled to each other to form a communication ring. 27. The method according to claim 17 further comprising receiving, by a group of intermediate routers, the multiple data streams from the multiple source router output wireless communication links; and wirelessly transmitting, by the group of intermediate routers, the multiple data streams over the destination routers input wireless links. 28. The method according to claim 27 wherein the group of intermediate routers comprises a first layer of intermediate routers and a last layer of intermediate routers, wherein the method comprises wirelessly receiving by the first layer of intermediate routers the multiple data streams from the multiple source router output wireless communication links and wirelessly transmitting, by the last layer of intermediate routers, the multiple data streams over the destination routers input wireless links; wherein the first and layers of intermediate routers are wirelessly coupled to each other. 29. The method according to claim 28 further comprising wirelessly receiving from the first layer of intermediate routers and by an intermediate layer of intermediate routers, the multiple data streams and wirelessly transmitting the multiple data streams from the intermediate layer of intermediate routers and to the destination routers the multiple data streams. 30. The method according to claim 17 comprising evaluating by the gateway wireless path parameters of various wireless paths formed between the source router and the destination routers. 31. The method according to claim 17 comprising adding by the source router metadata relating to wireless path parameters of various wireless paths formed between the source router and the destination routers. 32. The method according to claim 17 wherein the multiple data streams comprise multiple Ethernet frames. | 2,400 |
7,738 | 7,738 | 14,503,355 | 2,455 | A device provides user interfaces for capturing and sending media, such as audio, video, or images, from within a message application. The device detects a movement of the device and in response, plays or records an audio message. The device sends the recorded audio message in response to detecting a movement of the device. The device removes messages from a conversation based on expiration criteria. The device shares a location with one or more message participants in a conversation. | 1. A non-transitory computer-readable storage medium storing one or more programs, the one or more programs comprising instructions, which when executed by an electronic device with a display, cause the device to:
display, on the display, a message region for displaying messages sent between a first participant and a second participant in a message conversation; display a share-location affordance for sharing the location of the first participant with the second participant as the location changes over at least a predetermined time period; detect a selection of the share-location affordance; and in response to detecting the selection of the share-location affordance:
provide the second participant with information enabling the second participant to determine a current location of the first participant during at least the predetermined time period. 2. The non-transitory computer-readable storage medium according to claim 1, further comprising instructions to cause the device to:
receive, from the second participant, location information dynamically indicating a location of a first external device; and display, on the display, a location of the electronic device and the location of the first external device on a map. 3. The non-transitory computer-readable storage medium according to claim 2, further comprising instructions to cause the device to:
add a third participant to the message conversation; receive, from the third participant, location information indicating a location of a second external device; and display, on the display, the location of the second external device on the map. 4. The non-transitory computer-readable storage medium according to claim 1, further comprising instructions to cause the device to:
in response to detecting the contact at the location corresponding to the share-location affordance:
display at least two affordances corresponding to at least two predetermined time periods;
detect a contact at a location on a touch-sensitive surface corresponding to a location of one of the at least two affordances on the display; and
in response to detecting the contact at the location on the touch-sensitive surface corresponding to the location of one of the at least two affordances on the display, provide the second participant with information enabling the second participant to determine the current location of the first participant during the predetermined time period corresponding to the one of the at least two affordances. 5. The non-transitory computer-readable storage medium according to claim 4, further comprising instructions to cause the device to:
display, on the display, an indication of a remaining amount of time for which the location will be shared. 6. The non-transitory computer-readable storage medium according to claim 1, further comprising instructions to cause the device to:
display, on the display, an affordance for ceasing to provide the second participant with the information. 7. The non-transitory computer-readable storage medium according to claim 1, further comprising instructions to cause the device to:
display on the display, together with the message conversation, a details affordance; detect a contact at a location on a touch-sensitive surface that corresponds to a location of the details affordance on the display; and in response to detecting the contact at the location on the touch-sensitive surface that corresponds to the location of the details affordance on the display, display the map showing the location of two or more participants in the message conversation that have shared their location. 8. The non-transitory computer-readable storage medium according to claim 7, further comprising instructions to cause the device to:
display, on the display, information identifying the two or more participants in the message conversation that have shared their location. 9. The non-transitory computer-readable storage medium according to claim 8, further comprising instructions to cause the device to:
provide, to the two or more participants, an option for removing a participant of the two or more participants from the message conversation. 10. The non-transitory computer-readable storage medium according to claim 7, further comprising instructions to cause the device to:
provide, to the two or more participants, an option for adding a new participant to the message conversation. 11. The non-transitory computer-readable storage medium according to claim 7, wherein the message conversation has a name, and further comprising instructions to cause the device to:
provide, to the two or more participants, an option for changing the name of the message conversation. 12. The non-transitory computer-readable storage medium according to claim 1, wherein the map is not associated with a particular message in the message conversation. 13. The non-transitory computer-readable storage medium according to claim 1, further comprising instructions to cause the device to:
detect a contact at a location on a touch-sensitive surface corresponding to a displayed location of the map; and in response to detecting the contact at the location on the touch-sensitive surface corresponding to the displayed location of the map, launch a map application, wherein the map application provides an option for obtaining directions to a location displayed on the map. 14. The non-transitory computer-readable storage medium according to claim 1, wherein the instructions to cause the device to provide the information to the second participant comprise instructions to cause the device to:
provide a request to a remote electronic device used by the second participant to prompt the second participant to share their location. 15. The non-transitory computer-readable storage medium according to claim 1, further comprising instructions to cause the device to:
display a send-location affordance, on the display, for sending static location information of the first participant to the second participant, wherein the static location information is not updated in accordance with the location of the device; detect a selection of the send-location affordance; and in response to detecting the selection of the send-location affordance, send the static location information to the second participant. 16. The non-transitory computer-readable storage medium according to claim 15, wherein the instructions to cause the device to send the static location information comprise instructions to cause the device to:
insert a static map including the static location information into the message conversation. 17. The non-transitory computer-readable storage medium according to claim 16, wherein the static map is not associated with a particular message in the message conversation. 18. The non-transitory computer-readable storage medium according to claim 16, further comprising instructions to cause the device to:
detect a contact at a location on a touch-sensitive surface corresponding to the static map; in response to detecting the contact at the location on the touch-sensitive surface corresponding to the static map:
launch a map application, wherein the map application provides an option for obtaining directions to the location information displayed on the static map. 19. A method, comprising:
at an electronic device with a display:
displaying, on the display, a message region for displaying messages sent between a first participant and a second participant in a message conversation;
displaying a share-location affordance for sharing the location of the first participant with the second participant as the location changes over at least a predetermined time period;
detecting a selection of the share-location affordance; and
in response to detecting the selection of the share-location affordance:
providing the second participant with information enabling the second participant to determine a current location of the first participant during at least the predetermined time period. 20. An electronic device, comprising:
a display; a memory; and a processor coupled to the display and the memory, the processor configured to:
display, on the display, a message region for displaying messages sent between a first participant and a second participant in a message conversation;
display a share-location affordance for sharing the location of the first participant with the second participant as the location changes over at least a predetermined time period;
detect a selection of the share-location affordance; and
in response to detecting the selection of the share-location affordance:
provide the second participant with information enabling the second participant to determine a current location of the first participant during at least the predetermined time period. | A device provides user interfaces for capturing and sending media, such as audio, video, or images, from within a message application. The device detects a movement of the device and in response, plays or records an audio message. The device sends the recorded audio message in response to detecting a movement of the device. The device removes messages from a conversation based on expiration criteria. The device shares a location with one or more message participants in a conversation.1. A non-transitory computer-readable storage medium storing one or more programs, the one or more programs comprising instructions, which when executed by an electronic device with a display, cause the device to:
display, on the display, a message region for displaying messages sent between a first participant and a second participant in a message conversation; display a share-location affordance for sharing the location of the first participant with the second participant as the location changes over at least a predetermined time period; detect a selection of the share-location affordance; and in response to detecting the selection of the share-location affordance:
provide the second participant with information enabling the second participant to determine a current location of the first participant during at least the predetermined time period. 2. The non-transitory computer-readable storage medium according to claim 1, further comprising instructions to cause the device to:
receive, from the second participant, location information dynamically indicating a location of a first external device; and display, on the display, a location of the electronic device and the location of the first external device on a map. 3. The non-transitory computer-readable storage medium according to claim 2, further comprising instructions to cause the device to:
add a third participant to the message conversation; receive, from the third participant, location information indicating a location of a second external device; and display, on the display, the location of the second external device on the map. 4. The non-transitory computer-readable storage medium according to claim 1, further comprising instructions to cause the device to:
in response to detecting the contact at the location corresponding to the share-location affordance:
display at least two affordances corresponding to at least two predetermined time periods;
detect a contact at a location on a touch-sensitive surface corresponding to a location of one of the at least two affordances on the display; and
in response to detecting the contact at the location on the touch-sensitive surface corresponding to the location of one of the at least two affordances on the display, provide the second participant with information enabling the second participant to determine the current location of the first participant during the predetermined time period corresponding to the one of the at least two affordances. 5. The non-transitory computer-readable storage medium according to claim 4, further comprising instructions to cause the device to:
display, on the display, an indication of a remaining amount of time for which the location will be shared. 6. The non-transitory computer-readable storage medium according to claim 1, further comprising instructions to cause the device to:
display, on the display, an affordance for ceasing to provide the second participant with the information. 7. The non-transitory computer-readable storage medium according to claim 1, further comprising instructions to cause the device to:
display on the display, together with the message conversation, a details affordance; detect a contact at a location on a touch-sensitive surface that corresponds to a location of the details affordance on the display; and in response to detecting the contact at the location on the touch-sensitive surface that corresponds to the location of the details affordance on the display, display the map showing the location of two or more participants in the message conversation that have shared their location. 8. The non-transitory computer-readable storage medium according to claim 7, further comprising instructions to cause the device to:
display, on the display, information identifying the two or more participants in the message conversation that have shared their location. 9. The non-transitory computer-readable storage medium according to claim 8, further comprising instructions to cause the device to:
provide, to the two or more participants, an option for removing a participant of the two or more participants from the message conversation. 10. The non-transitory computer-readable storage medium according to claim 7, further comprising instructions to cause the device to:
provide, to the two or more participants, an option for adding a new participant to the message conversation. 11. The non-transitory computer-readable storage medium according to claim 7, wherein the message conversation has a name, and further comprising instructions to cause the device to:
provide, to the two or more participants, an option for changing the name of the message conversation. 12. The non-transitory computer-readable storage medium according to claim 1, wherein the map is not associated with a particular message in the message conversation. 13. The non-transitory computer-readable storage medium according to claim 1, further comprising instructions to cause the device to:
detect a contact at a location on a touch-sensitive surface corresponding to a displayed location of the map; and in response to detecting the contact at the location on the touch-sensitive surface corresponding to the displayed location of the map, launch a map application, wherein the map application provides an option for obtaining directions to a location displayed on the map. 14. The non-transitory computer-readable storage medium according to claim 1, wherein the instructions to cause the device to provide the information to the second participant comprise instructions to cause the device to:
provide a request to a remote electronic device used by the second participant to prompt the second participant to share their location. 15. The non-transitory computer-readable storage medium according to claim 1, further comprising instructions to cause the device to:
display a send-location affordance, on the display, for sending static location information of the first participant to the second participant, wherein the static location information is not updated in accordance with the location of the device; detect a selection of the send-location affordance; and in response to detecting the selection of the send-location affordance, send the static location information to the second participant. 16. The non-transitory computer-readable storage medium according to claim 15, wherein the instructions to cause the device to send the static location information comprise instructions to cause the device to:
insert a static map including the static location information into the message conversation. 17. The non-transitory computer-readable storage medium according to claim 16, wherein the static map is not associated with a particular message in the message conversation. 18. The non-transitory computer-readable storage medium according to claim 16, further comprising instructions to cause the device to:
detect a contact at a location on a touch-sensitive surface corresponding to the static map; in response to detecting the contact at the location on the touch-sensitive surface corresponding to the static map:
launch a map application, wherein the map application provides an option for obtaining directions to the location information displayed on the static map. 19. A method, comprising:
at an electronic device with a display:
displaying, on the display, a message region for displaying messages sent between a first participant and a second participant in a message conversation;
displaying a share-location affordance for sharing the location of the first participant with the second participant as the location changes over at least a predetermined time period;
detecting a selection of the share-location affordance; and
in response to detecting the selection of the share-location affordance:
providing the second participant with information enabling the second participant to determine a current location of the first participant during at least the predetermined time period. 20. An electronic device, comprising:
a display; a memory; and a processor coupled to the display and the memory, the processor configured to:
display, on the display, a message region for displaying messages sent between a first participant and a second participant in a message conversation;
display a share-location affordance for sharing the location of the first participant with the second participant as the location changes over at least a predetermined time period;
detect a selection of the share-location affordance; and
in response to detecting the selection of the share-location affordance:
provide the second participant with information enabling the second participant to determine a current location of the first participant during at least the predetermined time period. | 2,400 |
7,739 | 7,739 | 15,378,331 | 2,439 | A method and system for secured access for a computing platform are provided. The method includes generating an on-the-fly access lease to the computing platform, wherein the on-the-fly access lease defines provisions for accessing at least one firewall port of the computing platform, wherein the provisions include at least a lease duration for accessing the at least one firewall port; and controlling access to resources of the computing platform through an opening of the at least one firewall port of the computing platform, wherein the access to resources of the computing platform is determined based on the generated on-the-fly access lease and the security settings. | 1. A method for secured access for a computing platform comprising:
generating an on-the-fly access lease to the computing platform, wherein the on-the-fly access lease defines provisions for accessing at least one firewall port of the computing platform, wherein the provisions include at least a lease duration for accessing the at least one firewall port; and controlling access to resources of the computing platform through an opening of the at least one firewall port of the computing platform, wherein the access to resources of the computing platform is determined based on the generated on-the-fly access lease and the security settings. 2. The method of claim 1, wherein the access to resources of the computing platform is triggered by passing an instruction to the computing platform during a secure tunnel communication requested by the computing platform. 3. The method of claim 2, further comprising:
monitoring the port access to the resources of the computing platform by a port-tending agent (PorTender) connected to the secure tunnel. 4. The method of claim 2, further comprising:
regulating the port access to the resources of the computing platform by a port-tending agent (PorTender) connected to the secure tunnel. 5. The method of claim 2, further comprising:
establishing a secure tunnel communication with the computing platform responsive to an intermittent connection request from the computing platform. 6. The method of claim 5, further comprising:
managing security settings of the computing platform; and forwarding the security settings along the secure tunnel. 7. The method of claim 1, further comprising:
terminating the on-the-fly access lease according to a schedule. 8. The method of claim 1, further comprising:
transmitting administrator settings for port access of the one or more firewalls ports to a port-tending agent (PorTender) connected to the secure tunnel. 9. The method of claim 8, wherein the transmitting administrator settings occurs periodically according to a predetermined schedule. 10. The method of claim 8, wherein the transmitting administrator settings for port access occurs after a one-time request from the PorTender. 11. A system for secured access for a computing platform comprising:
at least one computing platform comprising at least one resource and at least one firewall port; a policy server configured to control port access security and connectivity settings for the at least one computing platform; and a communication link communicatively connecting between the at least one computing platform and the policy server, the communication link is configured to serve a secure tunnel communication there through, wherein the secure tunnel communication is intermittently established over the communication link; wherein an on-the-fly access lease to the at least one port of the at least one computing platform defining provisions for access the at least one firewall port of the computing platform is acquired, wherein the provisions include at least a lease duration for accessing the at least one firewall port; and wherein the policy server is configured to send instructions to open the at least one firewall port of the at least one computing platform during a communication using the secure tunnel communication respective of the acquired on-the-fly access lease and the security settings. 12. The system of claim 11, wherein the on-the-fly access lease is performed by a dynamic access lease manager of the system. 13. The system of claim 12, wherein the dynamic access lease manager is configured to terminate the on-the-fly access lease. 14. The system of claim 13, wherein the dynamic access lease manager is further configured to terminate the on-the-fly access lease according to a schedule. 15. The system of claim 11, wherein access to the at least one resource is monitored and regulated by a port-tending agent (PorTender). 16. The system of claim 15, wherein the PorTender intermittently triggers the secure tunnel communication. 17, The system of claim 15, wherein the policy server is configured to transmit administrator settings for port access to said PorTender. 18. The system of claim 17, wherein receiving administrator settings for access to the at least one port occurs periodically according to a predetermined schedule. 19. The system of claim 17, wherein receiving administrator settings to access the at least one firewall port occurs after a one-time request from the PorTender. 20. The system of claim 15, wherein the PorTender is installed into an operating system of the computing platform. 21. A non-transitory computer readable medium having stored thereon instructions for causing one or more processors to execute a process comprising:
generating an on-the-fly access lease to the computing platform, wherein the on-the-fly access lease defines provisions for accessing at least one firewall port of the computing platform, wherein the provisions include at least a lease duration for accessing the at least one firewall port; and controlling access to resources of the computing platform through an opening of the at least one firewall port of the computing platform, wherein the access to resources of the computing platform is determined based on the generated on-the-fly access lease and the security settings. | A method and system for secured access for a computing platform are provided. The method includes generating an on-the-fly access lease to the computing platform, wherein the on-the-fly access lease defines provisions for accessing at least one firewall port of the computing platform, wherein the provisions include at least a lease duration for accessing the at least one firewall port; and controlling access to resources of the computing platform through an opening of the at least one firewall port of the computing platform, wherein the access to resources of the computing platform is determined based on the generated on-the-fly access lease and the security settings.1. A method for secured access for a computing platform comprising:
generating an on-the-fly access lease to the computing platform, wherein the on-the-fly access lease defines provisions for accessing at least one firewall port of the computing platform, wherein the provisions include at least a lease duration for accessing the at least one firewall port; and controlling access to resources of the computing platform through an opening of the at least one firewall port of the computing platform, wherein the access to resources of the computing platform is determined based on the generated on-the-fly access lease and the security settings. 2. The method of claim 1, wherein the access to resources of the computing platform is triggered by passing an instruction to the computing platform during a secure tunnel communication requested by the computing platform. 3. The method of claim 2, further comprising:
monitoring the port access to the resources of the computing platform by a port-tending agent (PorTender) connected to the secure tunnel. 4. The method of claim 2, further comprising:
regulating the port access to the resources of the computing platform by a port-tending agent (PorTender) connected to the secure tunnel. 5. The method of claim 2, further comprising:
establishing a secure tunnel communication with the computing platform responsive to an intermittent connection request from the computing platform. 6. The method of claim 5, further comprising:
managing security settings of the computing platform; and forwarding the security settings along the secure tunnel. 7. The method of claim 1, further comprising:
terminating the on-the-fly access lease according to a schedule. 8. The method of claim 1, further comprising:
transmitting administrator settings for port access of the one or more firewalls ports to a port-tending agent (PorTender) connected to the secure tunnel. 9. The method of claim 8, wherein the transmitting administrator settings occurs periodically according to a predetermined schedule. 10. The method of claim 8, wherein the transmitting administrator settings for port access occurs after a one-time request from the PorTender. 11. A system for secured access for a computing platform comprising:
at least one computing platform comprising at least one resource and at least one firewall port; a policy server configured to control port access security and connectivity settings for the at least one computing platform; and a communication link communicatively connecting between the at least one computing platform and the policy server, the communication link is configured to serve a secure tunnel communication there through, wherein the secure tunnel communication is intermittently established over the communication link; wherein an on-the-fly access lease to the at least one port of the at least one computing platform defining provisions for access the at least one firewall port of the computing platform is acquired, wherein the provisions include at least a lease duration for accessing the at least one firewall port; and wherein the policy server is configured to send instructions to open the at least one firewall port of the at least one computing platform during a communication using the secure tunnel communication respective of the acquired on-the-fly access lease and the security settings. 12. The system of claim 11, wherein the on-the-fly access lease is performed by a dynamic access lease manager of the system. 13. The system of claim 12, wherein the dynamic access lease manager is configured to terminate the on-the-fly access lease. 14. The system of claim 13, wherein the dynamic access lease manager is further configured to terminate the on-the-fly access lease according to a schedule. 15. The system of claim 11, wherein access to the at least one resource is monitored and regulated by a port-tending agent (PorTender). 16. The system of claim 15, wherein the PorTender intermittently triggers the secure tunnel communication. 17, The system of claim 15, wherein the policy server is configured to transmit administrator settings for port access to said PorTender. 18. The system of claim 17, wherein receiving administrator settings for access to the at least one port occurs periodically according to a predetermined schedule. 19. The system of claim 17, wherein receiving administrator settings to access the at least one firewall port occurs after a one-time request from the PorTender. 20. The system of claim 15, wherein the PorTender is installed into an operating system of the computing platform. 21. A non-transitory computer readable medium having stored thereon instructions for causing one or more processors to execute a process comprising:
generating an on-the-fly access lease to the computing platform, wherein the on-the-fly access lease defines provisions for accessing at least one firewall port of the computing platform, wherein the provisions include at least a lease duration for accessing the at least one firewall port; and controlling access to resources of the computing platform through an opening of the at least one firewall port of the computing platform, wherein the access to resources of the computing platform is determined based on the generated on-the-fly access lease and the security settings. | 2,400 |
7,740 | 7,740 | 15,036,481 | 2,485 | An image delivery device is, for example, implemented which is capable of better preventing delays even when real-timeness is required. The image delivery device includes operation information acquisition means, image information acquisition means, allocation information generation means, compression means, and transmission means. The operation information acquisition means acquires operation information. The image information acquisition means acquires image information generated on the basis of the operation information. The allocation information generation means generates allocation information representing allocation of numbers of bits during compression of the image information on the basis of the operation information. The compression means compresses the image information on the basis of the allocation information. The transmission means transmits the compressed image information. | 1. An image delivery device comprising:
an operation information acquisition section operable to acquire operation information; an image information acquisition section operable to acquire image information generated on a basis of the operation information; an allocation information generation section operable to generate allocation information representing allocation of numbers of bits during compression of the image information on the basis of the operation information; a compression section operable to compress the image information on a basis of the allocation information; and a transmission section operable to transmit the compressed image information. 2. The image delivery device of claim 1,
wherein the allocation information generation section includes a base information generation portion adapted to generate, on a basis of act information representing behavior of a target to be operated in accordance with the operation information, base information with which image quality information is associated, the image quality information representing image quality level of each of a plurality of blocks into which the image information is divided, the image quality level being proportional to a number of bits allocated to each of the blocks, and the allocation information generation section generates the allocation information on a basis of the last allocation information and the base information. 3. The image delivery device of claim 2,
wherein the allocation information generation section includes: a weighting block adapted to assign a given weight to the last allocation information; and an addition block adapted to add the last allocation information with the assigned weight to the base information. 4. The image delivery device of claim 2, further comprising:
a base-related information storage section operable to store base-related information that associates the act information and the base information, wherein the base information generation portion generates the base information on a basis of the act information and the base-related information. 5. The image delivery device of claim 4, still further comprising
an act-related information storage section operable to store act-related information that associates the last act information, the operation information, and the act information, wherein the base information generation portion includes: an act information acquisition block adapted to acquire the last act information; an act information determination block adapted to determine the act information on a basis of the acquired last act information, the operation information, and the act-related information; and a base information acquisition block adapted to acquire the base information on a basis of the determined act information. 6. The image delivery device of claim 2, wherein the allocation information includes: a first area to which a first number of bits is allocated; a second area to which a number of bits, smaller than the number assigned to the first area in accordance with the image quality information, is allocated; and a third area to which a minimum number of bits is allocated. 7. An image delivery system comprising:
an image delivery device including operation information acquisition section operable to acquire operation information, an image information acquisition section operable to acquire image information generated on a basis of the operation information, an allocation information generation section operable to generate allocation information representing allocation of numbers of bits during compression of the image information on the basis of the operation information, a compression section operable to compress the image information on a basis of the allocation information, and a transmission section operable to transmit the compressed image information; and a terminal operable to decompress the compressed image information. 8. An image delivery program for a computer, comprising:
by an operation information acquisition section, acquiring operation information; by an image information acquisition section, acquiring image information generated on a basis of the operation information; by an allocation information generation section, generating allocation information representing allocation of numbers of bits during compression of the image information on the basis of the operation information; by a compression section, compressing the image information on a basis of the allocation information; and by a transmission section, transmitting the compressed image information. 9. An image delivery method comprising:
acquiring operation information; acquiring image information generated on a basis of the operation information; generating allocation information representing allocation of numbers of bits during compression of the image information on the basis of the operation information; compressing the image information on a basis of the allocation information; and transmitting the compressed image information. 10. The image delivery device of claim 1,
wherein the allocation information generation section generates the allocation information in parallel with generation of the image information. | An image delivery device is, for example, implemented which is capable of better preventing delays even when real-timeness is required. The image delivery device includes operation information acquisition means, image information acquisition means, allocation information generation means, compression means, and transmission means. The operation information acquisition means acquires operation information. The image information acquisition means acquires image information generated on the basis of the operation information. The allocation information generation means generates allocation information representing allocation of numbers of bits during compression of the image information on the basis of the operation information. The compression means compresses the image information on the basis of the allocation information. The transmission means transmits the compressed image information.1. An image delivery device comprising:
an operation information acquisition section operable to acquire operation information; an image information acquisition section operable to acquire image information generated on a basis of the operation information; an allocation information generation section operable to generate allocation information representing allocation of numbers of bits during compression of the image information on the basis of the operation information; a compression section operable to compress the image information on a basis of the allocation information; and a transmission section operable to transmit the compressed image information. 2. The image delivery device of claim 1,
wherein the allocation information generation section includes a base information generation portion adapted to generate, on a basis of act information representing behavior of a target to be operated in accordance with the operation information, base information with which image quality information is associated, the image quality information representing image quality level of each of a plurality of blocks into which the image information is divided, the image quality level being proportional to a number of bits allocated to each of the blocks, and the allocation information generation section generates the allocation information on a basis of the last allocation information and the base information. 3. The image delivery device of claim 2,
wherein the allocation information generation section includes: a weighting block adapted to assign a given weight to the last allocation information; and an addition block adapted to add the last allocation information with the assigned weight to the base information. 4. The image delivery device of claim 2, further comprising:
a base-related information storage section operable to store base-related information that associates the act information and the base information, wherein the base information generation portion generates the base information on a basis of the act information and the base-related information. 5. The image delivery device of claim 4, still further comprising
an act-related information storage section operable to store act-related information that associates the last act information, the operation information, and the act information, wherein the base information generation portion includes: an act information acquisition block adapted to acquire the last act information; an act information determination block adapted to determine the act information on a basis of the acquired last act information, the operation information, and the act-related information; and a base information acquisition block adapted to acquire the base information on a basis of the determined act information. 6. The image delivery device of claim 2, wherein the allocation information includes: a first area to which a first number of bits is allocated; a second area to which a number of bits, smaller than the number assigned to the first area in accordance with the image quality information, is allocated; and a third area to which a minimum number of bits is allocated. 7. An image delivery system comprising:
an image delivery device including operation information acquisition section operable to acquire operation information, an image information acquisition section operable to acquire image information generated on a basis of the operation information, an allocation information generation section operable to generate allocation information representing allocation of numbers of bits during compression of the image information on the basis of the operation information, a compression section operable to compress the image information on a basis of the allocation information, and a transmission section operable to transmit the compressed image information; and a terminal operable to decompress the compressed image information. 8. An image delivery program for a computer, comprising:
by an operation information acquisition section, acquiring operation information; by an image information acquisition section, acquiring image information generated on a basis of the operation information; by an allocation information generation section, generating allocation information representing allocation of numbers of bits during compression of the image information on the basis of the operation information; by a compression section, compressing the image information on a basis of the allocation information; and by a transmission section, transmitting the compressed image information. 9. An image delivery method comprising:
acquiring operation information; acquiring image information generated on a basis of the operation information; generating allocation information representing allocation of numbers of bits during compression of the image information on the basis of the operation information; compressing the image information on a basis of the allocation information; and transmitting the compressed image information. 10. The image delivery device of claim 1,
wherein the allocation information generation section generates the allocation information in parallel with generation of the image information. | 2,400 |
7,741 | 7,741 | 13,787,124 | 2,454 | An infrastructure metrics measuring process provides relevant infrastructure metrics for components of a monitored system. The process retrieves and stores application user data for a plurality of applications running on a network system and operating system statistics for at least one operating system running at least one of the plurality of application running on a network system. The data is aggregated into at least one of a transactional data stream and a non-transactional data stream and correlated onto a common time scale. The correlated aggregated data stream is then graphically displayed to a user to further analysis by a user. | 1. A non-transient, computer readable media having stored thereon instructions for providing infrastructure metrics for components of a monitored system the instructions performing steps comprising:
obtaining and storing in a data repository application user data for a plurality of applications running on a network system; obtaining and storing in a data repository operating system statistics for at least one operating system running at least one of the plurality of application running on a network system; aggregating the application user data into at least one of a transactional data stream and a non-transactional data stream; correlating the aggregated data streams onto a common time scale; and displaying the correlated aggregated data stream on a display in a graphical format. 2. A computer-readable media as recited in claim 1, wherein at least one of storing the user data and the operating statistics further comprises storing the data temporarily for redundancy. 3. A computer-readable media as recited in claim 1, further comprising an early warning system comprising at least one process to evaluate the aggregated data streams and determine at least one of a current or future anomaly. 4. A computer-readable media as recited in claim 3, wherein the early warning system further comprises an alert process to provide an alert to a user regarding the detected anomaly. 5. A computer-readable media as recited in claim 4, wherein the alert process comprises at least one of an email alert, an audio alert, a visual alert, a pager alert, or a messaging alert. 6. A computer-readable media as recited in claim 1, wherein the graphical format displayed comprises a summary regarding each of the components of the monitored system. 7. A computer-readable media as recited in claim 6, wherein the summary is color-coded to reflect the current operating condition of the monitored component. 8. A computer-readable media as recited in claim 6, wherein selection of the summary by a user causes the displaying of additional graphical information on a common time scale regarding the selected component to be displayed, 9. A computer-readable media as recited in claim 8, wherein the additional graphical information is filterable. 10. A computer-readable media as recited in claim 1, wherein at least one of the user data or the operating system statistics comprises data related to application performance, performance of a virtual machine, performance of multiple virtual machines on the same physical machine, or physical machine performance. 11. A computer-readable media as recited in claim 1, wherein at least one of the stored user data or the operating system statistics is stored for a period of time and is retrievable for analyzing historical data. 12. A system for providing infrastructure metrics for components of a monitored system the instructions performing steps comprising:
a data repository for storing application user data for a plurality of applications running on a network system and for storing operating system statistics for at least one operating system running at least one of the plurality of application running on a network system; a processor for aggregating the application user data into at least one of a transactional data stream and a non-transactional data stream and for correlating the aggregated data streams onto a common time scale; and a display for displaying the correlated aggregated data stream on a display in a graphical format. 13. A system as recited in claim 12, wherein at least one of the user data and the operating statistics are stored temporarily in at least one of the data repository or a second data repository for redundancy. 14. A system as recited in claim 12, further comprising an early warning system comprising at least one processor to evaluate the aggregated data streams and determine at least one of a current or future anomaly. 15. A system as recited in claim 14, wherein the early warning system further comprises an alert system to provide an alert to a user regarding the detected anomaly. 16. A system as recited in claim 15, wherein the alert system comprises at least one of an email alert, an audio alert, a visual alert, a pager alert, or a messaging alert. 17. A system as recited in claim 12, wherein the graphical format displayed comprises a summary regarding each of the components of the monitored system. 18. A system as recited in claim 17, wherein selection of the summary by a user causes the displaying of additional graphical information on a common time scale regarding the selected component to be displayed, 19. A system as recited in claim 18, wherein the additional graphical information is filterable. 20. A system as recited in claim 12, wherein at least one of the user data or the operating system statistics comprises data related to application performance, performance of a virtual machine, performance of multiple virtual machines on the same physical machine, or physical machine performance. | An infrastructure metrics measuring process provides relevant infrastructure metrics for components of a monitored system. The process retrieves and stores application user data for a plurality of applications running on a network system and operating system statistics for at least one operating system running at least one of the plurality of application running on a network system. The data is aggregated into at least one of a transactional data stream and a non-transactional data stream and correlated onto a common time scale. The correlated aggregated data stream is then graphically displayed to a user to further analysis by a user.1. A non-transient, computer readable media having stored thereon instructions for providing infrastructure metrics for components of a monitored system the instructions performing steps comprising:
obtaining and storing in a data repository application user data for a plurality of applications running on a network system; obtaining and storing in a data repository operating system statistics for at least one operating system running at least one of the plurality of application running on a network system; aggregating the application user data into at least one of a transactional data stream and a non-transactional data stream; correlating the aggregated data streams onto a common time scale; and displaying the correlated aggregated data stream on a display in a graphical format. 2. A computer-readable media as recited in claim 1, wherein at least one of storing the user data and the operating statistics further comprises storing the data temporarily for redundancy. 3. A computer-readable media as recited in claim 1, further comprising an early warning system comprising at least one process to evaluate the aggregated data streams and determine at least one of a current or future anomaly. 4. A computer-readable media as recited in claim 3, wherein the early warning system further comprises an alert process to provide an alert to a user regarding the detected anomaly. 5. A computer-readable media as recited in claim 4, wherein the alert process comprises at least one of an email alert, an audio alert, a visual alert, a pager alert, or a messaging alert. 6. A computer-readable media as recited in claim 1, wherein the graphical format displayed comprises a summary regarding each of the components of the monitored system. 7. A computer-readable media as recited in claim 6, wherein the summary is color-coded to reflect the current operating condition of the monitored component. 8. A computer-readable media as recited in claim 6, wherein selection of the summary by a user causes the displaying of additional graphical information on a common time scale regarding the selected component to be displayed, 9. A computer-readable media as recited in claim 8, wherein the additional graphical information is filterable. 10. A computer-readable media as recited in claim 1, wherein at least one of the user data or the operating system statistics comprises data related to application performance, performance of a virtual machine, performance of multiple virtual machines on the same physical machine, or physical machine performance. 11. A computer-readable media as recited in claim 1, wherein at least one of the stored user data or the operating system statistics is stored for a period of time and is retrievable for analyzing historical data. 12. A system for providing infrastructure metrics for components of a monitored system the instructions performing steps comprising:
a data repository for storing application user data for a plurality of applications running on a network system and for storing operating system statistics for at least one operating system running at least one of the plurality of application running on a network system; a processor for aggregating the application user data into at least one of a transactional data stream and a non-transactional data stream and for correlating the aggregated data streams onto a common time scale; and a display for displaying the correlated aggregated data stream on a display in a graphical format. 13. A system as recited in claim 12, wherein at least one of the user data and the operating statistics are stored temporarily in at least one of the data repository or a second data repository for redundancy. 14. A system as recited in claim 12, further comprising an early warning system comprising at least one processor to evaluate the aggregated data streams and determine at least one of a current or future anomaly. 15. A system as recited in claim 14, wherein the early warning system further comprises an alert system to provide an alert to a user regarding the detected anomaly. 16. A system as recited in claim 15, wherein the alert system comprises at least one of an email alert, an audio alert, a visual alert, a pager alert, or a messaging alert. 17. A system as recited in claim 12, wherein the graphical format displayed comprises a summary regarding each of the components of the monitored system. 18. A system as recited in claim 17, wherein selection of the summary by a user causes the displaying of additional graphical information on a common time scale regarding the selected component to be displayed, 19. A system as recited in claim 18, wherein the additional graphical information is filterable. 20. A system as recited in claim 12, wherein at least one of the user data or the operating system statistics comprises data related to application performance, performance of a virtual machine, performance of multiple virtual machines on the same physical machine, or physical machine performance. | 2,400 |
7,742 | 7,742 | 14,151,265 | 2,442 | A schedule organizer application-based content sharing method and apparatus are provided for sharing content generated in an environment fulfilling conditions of a schedule registered with the schedule organizer application among a group of sharers. The method includes configuring sharers for sharing a schedule and information on the schedule, detecting content generated in an environment fulfilling conditions of the schedule, and transmitting the content to the sharers. | 1. A method for sharing content based on a schedule organization application, the method comprising:
configuring sharers for sharing a schedule and information on the schedule; detecting content generated in an environment fulfilling conditions of the schedule; and transmitting the content to the sharers. 2. The method of claim 1, wherein the configuring of the sharers comprises setting at least one of time and location of the schedule. 3. The method of claim 2, further comprising:
determining whether a current time matches the time of schedule; and determining, when the current time matches the time of the schedule, whether current location of a terminal matches the location of schedule. 4. The method of claim 3, wherein the current location of the terminal is obtained based on coordinates acquired through Global Positioning System (GPS) or triangulation or from a mobile operator or provider server. 5. The method of claim 1, wherein the configuring of the sharers comprises at least one of:
selecting at least one of an email address, a phone number, website information, a Uniform Resource Locator (URL), an Internet homepage address, a cloud server address, and an instant message service address; and receiving address information of each sharer that is input by a user. 6. The method of claim 5, wherein the configuring of the sharers comprises assigning priorities to the address information of each sharer. 7. The method of claim 6, wherein the transmitting of the content to the sharers comprises sending the content to the sharers in an order of the priorities of address information. 8. The method of claim 1, further comprising configuring at least one of a cloud, an Internet café, an instant messenger service, and a Multimedia Messaging Service (MMS) as sharing means for sharing the content with the sharers. 9. The method of claim 8, wherein the configuring of sharing means comprises at least one of:
configuring a cloud address of at least one sharer; configuring a blog address of at least one sharer; configuring an Internet café address of at least one sharer; configuring an address acquired through the instant messenger service; and configuring a phone number of a sharer for transmitting MMS message. 10. The method of claim 1, further comprising configuring types of content to be stored in association with the schedule among the content generated in the environment fulfilling conditions of the schedule. 11. The method of claim 1, further comprising:
configuring an interoperation application which is executed in the environment fulfilling a time and location of the schedule; and storing the content generated by the interoperation application automatically. 12. The method of claim 1, further comprising configuring a timing for transmitting the content to the sharers. 13. An apparatus for sharing content based on a schedule organization application, the apparatus comprising:
an input unit configured to generate an input signal for configuring sharers of a schedule and information on the schedule; a control unit configured to detect content generated in an environment fulfilling conditions of the schedule; a storage unit configured to store the schedule, sharers, and content; and a radio communication unit configured to transmit the content to the sharers. 14. The apparatus of claim 13, wherein the control unit determines whether a current time matches the time of schedule and, when the current time matches the time of schedule, whether a current location of a terminal matches the location of schedule. 15. The apparatus of claim 14, wherein the control unit obtains the current location of the terminal based on coordinates acquired through Global Positioning System (GPS) or triangulation or from a mobile operator or provider server. 16. The apparatus of claim 13, wherein the control unit selects at least one of an email address, a phone number, website information, an Internet homepage address, a cloud server address, and an instant message service address, and receives address information of each sharer that is input by a user. 17. The apparatus of claim 16, wherein the radio communication unit transmits the content to the sharer in an order of the priorities of address information. 18. The apparatus of claim 13, wherein the control unit configures an interoperation application which is executed in the environment fulfilling a time and location of the schedule and stores the content generated by the interoperation application automatically. 19. A scheduler application-based content sharing method, the method comprising:
activating a content sharing function according to a schedule; detecting content generated in an environment fulfilling conditions of the schedule; and transmitting the content to sharers preconfigured in association with the schedule. 20. The method of claim 19, further comprising configuring the schedule with a time and location input by a user and address information of the sharers to which information on the schedule is transmitted. 21. The method of claim 20, wherein the activating of the content sharing function according to the schedule comprises executing a content generation application previously set by the user when a current time and a current location match the configured time and the configured location. | A schedule organizer application-based content sharing method and apparatus are provided for sharing content generated in an environment fulfilling conditions of a schedule registered with the schedule organizer application among a group of sharers. The method includes configuring sharers for sharing a schedule and information on the schedule, detecting content generated in an environment fulfilling conditions of the schedule, and transmitting the content to the sharers.1. A method for sharing content based on a schedule organization application, the method comprising:
configuring sharers for sharing a schedule and information on the schedule; detecting content generated in an environment fulfilling conditions of the schedule; and transmitting the content to the sharers. 2. The method of claim 1, wherein the configuring of the sharers comprises setting at least one of time and location of the schedule. 3. The method of claim 2, further comprising:
determining whether a current time matches the time of schedule; and determining, when the current time matches the time of the schedule, whether current location of a terminal matches the location of schedule. 4. The method of claim 3, wherein the current location of the terminal is obtained based on coordinates acquired through Global Positioning System (GPS) or triangulation or from a mobile operator or provider server. 5. The method of claim 1, wherein the configuring of the sharers comprises at least one of:
selecting at least one of an email address, a phone number, website information, a Uniform Resource Locator (URL), an Internet homepage address, a cloud server address, and an instant message service address; and receiving address information of each sharer that is input by a user. 6. The method of claim 5, wherein the configuring of the sharers comprises assigning priorities to the address information of each sharer. 7. The method of claim 6, wherein the transmitting of the content to the sharers comprises sending the content to the sharers in an order of the priorities of address information. 8. The method of claim 1, further comprising configuring at least one of a cloud, an Internet café, an instant messenger service, and a Multimedia Messaging Service (MMS) as sharing means for sharing the content with the sharers. 9. The method of claim 8, wherein the configuring of sharing means comprises at least one of:
configuring a cloud address of at least one sharer; configuring a blog address of at least one sharer; configuring an Internet café address of at least one sharer; configuring an address acquired through the instant messenger service; and configuring a phone number of a sharer for transmitting MMS message. 10. The method of claim 1, further comprising configuring types of content to be stored in association with the schedule among the content generated in the environment fulfilling conditions of the schedule. 11. The method of claim 1, further comprising:
configuring an interoperation application which is executed in the environment fulfilling a time and location of the schedule; and storing the content generated by the interoperation application automatically. 12. The method of claim 1, further comprising configuring a timing for transmitting the content to the sharers. 13. An apparatus for sharing content based on a schedule organization application, the apparatus comprising:
an input unit configured to generate an input signal for configuring sharers of a schedule and information on the schedule; a control unit configured to detect content generated in an environment fulfilling conditions of the schedule; a storage unit configured to store the schedule, sharers, and content; and a radio communication unit configured to transmit the content to the sharers. 14. The apparatus of claim 13, wherein the control unit determines whether a current time matches the time of schedule and, when the current time matches the time of schedule, whether a current location of a terminal matches the location of schedule. 15. The apparatus of claim 14, wherein the control unit obtains the current location of the terminal based on coordinates acquired through Global Positioning System (GPS) or triangulation or from a mobile operator or provider server. 16. The apparatus of claim 13, wherein the control unit selects at least one of an email address, a phone number, website information, an Internet homepage address, a cloud server address, and an instant message service address, and receives address information of each sharer that is input by a user. 17. The apparatus of claim 16, wherein the radio communication unit transmits the content to the sharer in an order of the priorities of address information. 18. The apparatus of claim 13, wherein the control unit configures an interoperation application which is executed in the environment fulfilling a time and location of the schedule and stores the content generated by the interoperation application automatically. 19. A scheduler application-based content sharing method, the method comprising:
activating a content sharing function according to a schedule; detecting content generated in an environment fulfilling conditions of the schedule; and transmitting the content to sharers preconfigured in association with the schedule. 20. The method of claim 19, further comprising configuring the schedule with a time and location input by a user and address information of the sharers to which information on the schedule is transmitted. 21. The method of claim 20, wherein the activating of the content sharing function according to the schedule comprises executing a content generation application previously set by the user when a current time and a current location match the configured time and the configured location. | 2,400 |
7,743 | 7,743 | 15,305,064 | 2,477 | A communication system includes a means for dialling a complex call number that is a concatenation of a service code that identifies a specific service and a called number selected by a calling party. The system further includes processing means for carrying out at least one service identified by the service code over at least a part of a communication path between a calling party and a called party, and means for decoding the service code inserted in the complex call number during the ongoing call and to apply the selected service using the processing means. The service code is indicated or invoked by entering the number of the called party between at least two “*” characters and/or at least two “#” characters. | 1-13. (canceled) 14. A communication system with service selection by dialling, in which at least a calling terminal is connected by a specified link to communication resources of a communication access provider, the communication resources capable of transmitting communication data to at least one called party designated by a calling party by means of a telephone number, the communication system comprising:
means for dialling a complex call number, the complex call number being a concatenation of a service code that identifies a specific service and a called number selected by a calling party; processing means for carrying out at least one service identified by said service code over at least a part of a communication path between the calling party and the called party; and means for decoding the service code inserted in the complex call number during the ongoing call and to apply the selected service using said processing means, wherein the service code is indicated or invoked by entering the number of the called party between at least two “*” characters and/or at least two “#” characters. 15. The system according to claim 14, further comprising:
means for allocating said service code (CS) for inclusion in the complex call number depending on a selection by the calling party of a single, specific communication service from services pertaining to delivery of a specific service quality for at least one communication parameter selected from data rate, data packet size, and data encryption over a given communication path. 16. The system according to claim 14, wherein the processing means comprises one or more of:
means for determining communication paths; encryption means; and means for creating at least one tunnel of the VPN type on at least part of the communication path. 17. The system according to claim 16, wherein the processing means further comprises:
at least one router connected to the calling party and possibly to a called terminal via a local network; and a modem capable of connecting to the router. 18. The system according to claim 17, wherein the router has at least one access to a satellite network. 19. The system according to claim 17, wherein:
one or both of the calling terminal and the called terminal comprise a mobile phone; and the router comprises a GAN (Generic Access Network) system. 20. The system of claim 14, further comprising:
means for allocating a service code for insertion in the called number depending on a subscriber's choice of service quality specified from a list of communication service options, wherein said means for allocating comprises:
one or more of a software application loader and a pre-loaded SIM card, and
means for subscribing to the dialling service. 21. The system according to claim 20, further comprising:
means for decoding the service code inserted in the called number; means, responsive to the decoded service code, for selecting routing rules; and means, responsive to the decoded service code, for implementing encryption rules. 22. The system according to claim 21, further comprising:
means for generating a complex number consisting of the number of the called party framed by two “*” characters or two “#” characters; and means for decoding the complex number and receiving (45) the communication from the calling party and determining that a communication data encryption service is in use for the ongoing call. 23. The system according to claim 14, further comprising:
means for testing call progression and selectively generating an alert message. 24. The system according of claim 14, further comprising means, inserted in the communication path, for applying the specific service identified by the service code. 25. The system according to claim 14, further comprising:
means for issuing a destination notification for at least one communication addressee party, to thereby notify the addressee party that the current call is a call subject to a service quality management service. 26. The system according to claim 14, wherein the system is configured to be used:
by at least one human user using a telephone terminal as a mobile phone; by a telephony network, at least some of which may comprise a satellite link; by a robot or machine such as a drone, aircraft, land, sea or space vehicle; by subscription to a communications service for selecting the service quality; in a cabin of an aircraft or other land, sea or space vehicle. | A communication system includes a means for dialling a complex call number that is a concatenation of a service code that identifies a specific service and a called number selected by a calling party. The system further includes processing means for carrying out at least one service identified by the service code over at least a part of a communication path between a calling party and a called party, and means for decoding the service code inserted in the complex call number during the ongoing call and to apply the selected service using the processing means. The service code is indicated or invoked by entering the number of the called party between at least two “*” characters and/or at least two “#” characters.1-13. (canceled) 14. A communication system with service selection by dialling, in which at least a calling terminal is connected by a specified link to communication resources of a communication access provider, the communication resources capable of transmitting communication data to at least one called party designated by a calling party by means of a telephone number, the communication system comprising:
means for dialling a complex call number, the complex call number being a concatenation of a service code that identifies a specific service and a called number selected by a calling party; processing means for carrying out at least one service identified by said service code over at least a part of a communication path between the calling party and the called party; and means for decoding the service code inserted in the complex call number during the ongoing call and to apply the selected service using said processing means, wherein the service code is indicated or invoked by entering the number of the called party between at least two “*” characters and/or at least two “#” characters. 15. The system according to claim 14, further comprising:
means for allocating said service code (CS) for inclusion in the complex call number depending on a selection by the calling party of a single, specific communication service from services pertaining to delivery of a specific service quality for at least one communication parameter selected from data rate, data packet size, and data encryption over a given communication path. 16. The system according to claim 14, wherein the processing means comprises one or more of:
means for determining communication paths; encryption means; and means for creating at least one tunnel of the VPN type on at least part of the communication path. 17. The system according to claim 16, wherein the processing means further comprises:
at least one router connected to the calling party and possibly to a called terminal via a local network; and a modem capable of connecting to the router. 18. The system according to claim 17, wherein the router has at least one access to a satellite network. 19. The system according to claim 17, wherein:
one or both of the calling terminal and the called terminal comprise a mobile phone; and the router comprises a GAN (Generic Access Network) system. 20. The system of claim 14, further comprising:
means for allocating a service code for insertion in the called number depending on a subscriber's choice of service quality specified from a list of communication service options, wherein said means for allocating comprises:
one or more of a software application loader and a pre-loaded SIM card, and
means for subscribing to the dialling service. 21. The system according to claim 20, further comprising:
means for decoding the service code inserted in the called number; means, responsive to the decoded service code, for selecting routing rules; and means, responsive to the decoded service code, for implementing encryption rules. 22. The system according to claim 21, further comprising:
means for generating a complex number consisting of the number of the called party framed by two “*” characters or two “#” characters; and means for decoding the complex number and receiving (45) the communication from the calling party and determining that a communication data encryption service is in use for the ongoing call. 23. The system according to claim 14, further comprising:
means for testing call progression and selectively generating an alert message. 24. The system according of claim 14, further comprising means, inserted in the communication path, for applying the specific service identified by the service code. 25. The system according to claim 14, further comprising:
means for issuing a destination notification for at least one communication addressee party, to thereby notify the addressee party that the current call is a call subject to a service quality management service. 26. The system according to claim 14, wherein the system is configured to be used:
by at least one human user using a telephone terminal as a mobile phone; by a telephony network, at least some of which may comprise a satellite link; by a robot or machine such as a drone, aircraft, land, sea or space vehicle; by subscription to a communications service for selecting the service quality; in a cabin of an aircraft or other land, sea or space vehicle. | 2,400 |
7,744 | 7,744 | 14,713,525 | 2,495 | Various embodiments relate to a method, network node, and non-transitory machine-readable storage medium including the following: providing access to an enterprise file system to end user devices via a virtual private network (VPN); encrypting at least a portion of an enterprise file system to produce an encrypted file system, wherein an encrypted file from the encrypted file system is capable of being decrypted using a decryption key; transmitting the encrypted file system to a content distribution network (CDN) server for storage and access, wherein the CDN server is located outside the VPN; and transmitting the decryption key to an end user device via the VPN. | 1. A non-transitory machine-readable storage medium encoded with instructions for execution by an enterprise server, the non-transitory machine-readable storage medium comprising:
instructions for providing access to an enterprise file system to end user devices via a virtual private network (VPN); instructions for encrypting at least a portion of an enterprise file system to produce an encrypted file system, wherein an encrypted file from the encrypted file system is capable of being decrypted using a decryption key; instructions for transmitting the encrypted file system to a content distribution network (CDN) server for storage and access, wherein the CDN server is located outside the VPN; and instructions for transmitting the decryption key to an end user device via the VPN. 2. The non-transitory machine-readable storage medium of claim 1, further comprising:
instructions for periodically executing the instructions for encrypting and the instructions for transmitting the encrypted file system, whereby the decryption key changes periodically. 3. The non-transitory machine-readable storage medium of claim 1, further comprising:
instructions for applying a filename transformation to at least one of the enterprise file system and the encrypted file system, wherein at least one file in the encrypted file system has a file name that is different from a file name of a corresponding file in the enterprise file system. 4. The non-transitory machine-readable storage medium of claim 3, further comprising instructions for transmitting an identification of the filename transformation to the end user device via the VPN. 5. The non-transitory machine-readable storage medium of claim 1, further comprising:
instructions for segmenting at least one of a file of the enterprise file system and an encrypted file of the encrypted file system into a plurality of data blocks. 6. The non-transitory machine-readable storage medium of claim 1, wherein the instructions for transmitting the encrypted file system comprise instructions for transmitting a plurality of encrypted data blocks to the CDN server, the non-transitory machine-readable storage medium further comprising:
instructions for generating at least one file map for a file of the encrypted file system, wherein the file map identifies a sequence of blocks from the plurality of encrypted data blocks; and instructions for transmitting the at least one file map to the end user device via the VPN. 7. The non-transitory machine-readable storage medium of claim 6, wherein the file map identifies a sequence of blocks by specifying a list of block identifiers; and the instructions for encrypting at least a portion of an enterprise file system comprise:
instructions for generating the plurality of encrypted blocks, comprising: instructions for segmenting at least one file of the enterprise file system into multiple data blocks; and instructions for generating multiple block identifiers by applying a hash function to the multiple data blocks respectively, whereby the multiple block identifiers are used by a file map to identify the multiple blocks as being associated with the at least one file. 8. An enterprise server comprising:
a network interface capable of communication over an open network and over a virtual private network (VPN); a memory; and a processor in communication with the network interface and the memory, the processor configured to:
encrypt at least a portion of an enterprise file system accessible to the enterprise server to produce an encrypted file system, wherein an encrypted file from the encrypted file system is capable of being decrypted using a decryption key;
transmit the encrypted file system to a content distribution network (CDN) server for storage and access, wherein the CDN server is located outside the VPN; and
transmit the decryption key to an end user device via the VPN. 9. The enterprise server of claim 8, wherein the processor is further configured to: periodically perform the steps of encrypting and transmitting the encrypted file system, whereby the decryption key changes periodically. 10. The enterprise server of claim 8, wherein the processor is further configured to:
apply a filename transformation to at least one of the enterprise file system and the encrypted file system, wherein at least one file in the encrypted file system has a file name that is different from a file name of a corresponding file in the enterprise file system. 11. The enterprise server of claim 10, wherein the processor is further configured to transmit an identification of the filename transformation to the end user device via the VPN. 12. The non-enterprise server of claim 8, wherein the processor is further configured to:
segment at least one of a file of the enterprise file system and an encrypted file of the encrypted file system into a plurality of data blocks. 13. The enterprise server of claim 8, wherein, in transmitting the encrypted file system comprise instructions for transmitting a plurality of encrypted data blocks to the CDN server, the processor is configured to:
generate at least one file map for a file of the encrypted file system, wherein the file map identifies a sequence of blocks from the plurality of encrypted data blocks; and transmit the at least one file map to the end user device via the VPN. 14. The enterprise server of claim 13, wherein the file map identifies a sequence of blocks by specifying a list of block identifiers; and in encrypting at least a portion of an enterprise file system the processor is configured to:
generate the plurality of encrypted blocks, comprising:
segmenting at least one file of the enterprise file system into multiple data blocks; and
generating multiple block identifiers by applying a hash function to the multiple data blocks respectively, whereby the multiple block identifiers are used by a file map to identify the multiple blocks as being associated with the at least one file. 15. A method performed by an enterprise server, the method comprising:
providing access to an enterprise file system to end user devices via a virtual private network (VPN); encrypting at least a portion of an enterprise file system to produce an encrypted file system, wherein an encrypted file from the encrypted file system is capable of being decrypted using a decryption key; transmitting the encrypted file system to a content distribution network (CDN) server for storage and access, wherein the CDN server is located outside the VPN; and transmitting the decryption key to an end user device via the VPN. 16. The method of claim 15, further comprising:
periodically executing the instructions for encrypting and the instructions for transmitting the encrypted file system, whereby the decryption key changes periodically. 17. The method of claim 15, further comprising:
instructions for applying a filename transformation to at least one of the enterprise file system and the encrypted file system, wherein at least one file in the encrypted file system has a file name that is different from a file name of a corresponding file in the enterprise file system. 18. The method of claim 15, further comprising:
segmenting at least one of a file of the enterprise file system and an encrypted file of the encrypted file system into a plurality of data blocks. 19. The method of claim 15, wherein the step of transmitting the encrypted file system comprises transmitting a plurality of encrypted data blocks to the CDN server, the method further comprising:
generating at least one file map for a file of the encrypted file system, wherein the file map identifies a sequence of blocks from the plurality of encrypted data blocks; and transmitting the at least one file map to the end user device via the VPN. 20. The method of claim 19, wherein the file map identifies a sequence of blocks by specifying a list of block identifiers; and the step encrypting at least a portion of an enterprise file system comprise:
generating the plurality of encrypted blocks, comprising:
segmenting at least one file of the enterprise file system into multiple data blocks; and
generating multiple block identifiers by applying a hash function to the multiple data blocks respectively, whereby the multiple block identifiers are used by a file map to identify the multiple blocks as being associated with the at least one file. | Various embodiments relate to a method, network node, and non-transitory machine-readable storage medium including the following: providing access to an enterprise file system to end user devices via a virtual private network (VPN); encrypting at least a portion of an enterprise file system to produce an encrypted file system, wherein an encrypted file from the encrypted file system is capable of being decrypted using a decryption key; transmitting the encrypted file system to a content distribution network (CDN) server for storage and access, wherein the CDN server is located outside the VPN; and transmitting the decryption key to an end user device via the VPN.1. A non-transitory machine-readable storage medium encoded with instructions for execution by an enterprise server, the non-transitory machine-readable storage medium comprising:
instructions for providing access to an enterprise file system to end user devices via a virtual private network (VPN); instructions for encrypting at least a portion of an enterprise file system to produce an encrypted file system, wherein an encrypted file from the encrypted file system is capable of being decrypted using a decryption key; instructions for transmitting the encrypted file system to a content distribution network (CDN) server for storage and access, wherein the CDN server is located outside the VPN; and instructions for transmitting the decryption key to an end user device via the VPN. 2. The non-transitory machine-readable storage medium of claim 1, further comprising:
instructions for periodically executing the instructions for encrypting and the instructions for transmitting the encrypted file system, whereby the decryption key changes periodically. 3. The non-transitory machine-readable storage medium of claim 1, further comprising:
instructions for applying a filename transformation to at least one of the enterprise file system and the encrypted file system, wherein at least one file in the encrypted file system has a file name that is different from a file name of a corresponding file in the enterprise file system. 4. The non-transitory machine-readable storage medium of claim 3, further comprising instructions for transmitting an identification of the filename transformation to the end user device via the VPN. 5. The non-transitory machine-readable storage medium of claim 1, further comprising:
instructions for segmenting at least one of a file of the enterprise file system and an encrypted file of the encrypted file system into a plurality of data blocks. 6. The non-transitory machine-readable storage medium of claim 1, wherein the instructions for transmitting the encrypted file system comprise instructions for transmitting a plurality of encrypted data blocks to the CDN server, the non-transitory machine-readable storage medium further comprising:
instructions for generating at least one file map for a file of the encrypted file system, wherein the file map identifies a sequence of blocks from the plurality of encrypted data blocks; and instructions for transmitting the at least one file map to the end user device via the VPN. 7. The non-transitory machine-readable storage medium of claim 6, wherein the file map identifies a sequence of blocks by specifying a list of block identifiers; and the instructions for encrypting at least a portion of an enterprise file system comprise:
instructions for generating the plurality of encrypted blocks, comprising: instructions for segmenting at least one file of the enterprise file system into multiple data blocks; and instructions for generating multiple block identifiers by applying a hash function to the multiple data blocks respectively, whereby the multiple block identifiers are used by a file map to identify the multiple blocks as being associated with the at least one file. 8. An enterprise server comprising:
a network interface capable of communication over an open network and over a virtual private network (VPN); a memory; and a processor in communication with the network interface and the memory, the processor configured to:
encrypt at least a portion of an enterprise file system accessible to the enterprise server to produce an encrypted file system, wherein an encrypted file from the encrypted file system is capable of being decrypted using a decryption key;
transmit the encrypted file system to a content distribution network (CDN) server for storage and access, wherein the CDN server is located outside the VPN; and
transmit the decryption key to an end user device via the VPN. 9. The enterprise server of claim 8, wherein the processor is further configured to: periodically perform the steps of encrypting and transmitting the encrypted file system, whereby the decryption key changes periodically. 10. The enterprise server of claim 8, wherein the processor is further configured to:
apply a filename transformation to at least one of the enterprise file system and the encrypted file system, wherein at least one file in the encrypted file system has a file name that is different from a file name of a corresponding file in the enterprise file system. 11. The enterprise server of claim 10, wherein the processor is further configured to transmit an identification of the filename transformation to the end user device via the VPN. 12. The non-enterprise server of claim 8, wherein the processor is further configured to:
segment at least one of a file of the enterprise file system and an encrypted file of the encrypted file system into a plurality of data blocks. 13. The enterprise server of claim 8, wherein, in transmitting the encrypted file system comprise instructions for transmitting a plurality of encrypted data blocks to the CDN server, the processor is configured to:
generate at least one file map for a file of the encrypted file system, wherein the file map identifies a sequence of blocks from the plurality of encrypted data blocks; and transmit the at least one file map to the end user device via the VPN. 14. The enterprise server of claim 13, wherein the file map identifies a sequence of blocks by specifying a list of block identifiers; and in encrypting at least a portion of an enterprise file system the processor is configured to:
generate the plurality of encrypted blocks, comprising:
segmenting at least one file of the enterprise file system into multiple data blocks; and
generating multiple block identifiers by applying a hash function to the multiple data blocks respectively, whereby the multiple block identifiers are used by a file map to identify the multiple blocks as being associated with the at least one file. 15. A method performed by an enterprise server, the method comprising:
providing access to an enterprise file system to end user devices via a virtual private network (VPN); encrypting at least a portion of an enterprise file system to produce an encrypted file system, wherein an encrypted file from the encrypted file system is capable of being decrypted using a decryption key; transmitting the encrypted file system to a content distribution network (CDN) server for storage and access, wherein the CDN server is located outside the VPN; and transmitting the decryption key to an end user device via the VPN. 16. The method of claim 15, further comprising:
periodically executing the instructions for encrypting and the instructions for transmitting the encrypted file system, whereby the decryption key changes periodically. 17. The method of claim 15, further comprising:
instructions for applying a filename transformation to at least one of the enterprise file system and the encrypted file system, wherein at least one file in the encrypted file system has a file name that is different from a file name of a corresponding file in the enterprise file system. 18. The method of claim 15, further comprising:
segmenting at least one of a file of the enterprise file system and an encrypted file of the encrypted file system into a plurality of data blocks. 19. The method of claim 15, wherein the step of transmitting the encrypted file system comprises transmitting a plurality of encrypted data blocks to the CDN server, the method further comprising:
generating at least one file map for a file of the encrypted file system, wherein the file map identifies a sequence of blocks from the plurality of encrypted data blocks; and transmitting the at least one file map to the end user device via the VPN. 20. The method of claim 19, wherein the file map identifies a sequence of blocks by specifying a list of block identifiers; and the step encrypting at least a portion of an enterprise file system comprise:
generating the plurality of encrypted blocks, comprising:
segmenting at least one file of the enterprise file system into multiple data blocks; and
generating multiple block identifiers by applying a hash function to the multiple data blocks respectively, whereby the multiple block identifiers are used by a file map to identify the multiple blocks as being associated with the at least one file. | 2,400 |
7,745 | 7,745 | 14,541,923 | 2,487 | A UAV data processing and management system is provided including an encoder broadcaster and data manager which provides end users with a single interface for searching and sharing any video or imagery source, from any device with no client software required. Data inputs to the resource can include UAV video, photos, traffic cameras, fixed surveillance systems, iOS and Android device pictures, and other data (e.g., texts, emails) and inputs from all forms of social media, such as Twitter, Instagram, Facebook, etc. The cloud based manager is built with collaboration and sharing in mind while at the same time maintaining data privacy, security protection, chain-of-custody control and audit trail maintenance. Analytic tools are integrated accordingly as “plug-ins” or as a store of available app resources which are easily removed, added and customized based on user needs and system requirements and cost constraints. | 1. An unmanned aerial vehicle data management system, comprising:
an unmanned aerial vehicle; an unmanned aerial vehicle system ground station; a signal encoder broadcaster; a local cache which receives data from the encoder broadcaster for local storage; a data manager located on the Internet cloud which receives live video from the signal encoder broadcaster and archival data from the local cache; and a remote content delivery network for signal transmission to a computer browser and a least one mobile device wherein dynamic data streams originating from the UAV are managed and fused with imagery and data from other remote sensors for delivery to end users through the browser. 2. The unmanned aerial vehicle data management system of claim 1, wherein the encoder broadcaster includes a local data cache that stores live encoded data with affiliated selected analytics. 3. The unmanned aerial vehicle data management system of claim 1, further comprising a user authenticator enabling the encoder broadcaster to transmit live UAV video to and receive communications from authenticated users via the Internet. 4. The unmanned aerial vehicle data management system of claim 1, where users of the at least one mobile device can interact with UAV video directly from the Internet or from a mobile network connection. 5. The unmanned aerial vehicle data management system of claim 1, wherein the system provides active and live video from the signal encoder broadcaster to the system manager. 6. A data management system, comprising:
an integrated server located on the Internet cloud; an archive memory connected to the integrated server for storing transport stream signals that are MISP compliant and are embedded with KLV metadata; a local cache memory; a local WiFi connection; and an encoder broadcaster with multiple sensor inputs that transmits live encoded video to the local cache via the WiFi connection, transmits live videos to the integrated server, and streams high quality uploads to the archive memory. 7. The data management system of claim 6, further comprising a cellular link between the integrated server and the encoder broadcaster for transmitting and receiving encrypted data between the server and the encoder broadcaster. 8. The data management system of claim 6, wherein the integrated server serves as a platform for a sensor data manager in order to provide analytic functions, single-click uploads for users through a web based interface. 9. The data management system of claim 6, further comprising a local content delivery network which communicates with the integrated server through landlines or Internet networks. 10. The data management system of claim 9, wherein the local content delivery network further comprises workstations, servers and mobile units which can communicate with the integrated server. 11. A multi sensor data management system, comprising:
multiple sensor sources connected to a signal transport device; a transmission connection from transport device to an internet based server; a manager unit that allows different users to gain access to the multiple sensor data through the Internet cloud; and an interface that provides data search and share for users to the multiple sensor data from any Internet or mobile network connected device. 12. The multi sensor data management system of claim 11, wherein the multiple sensor sources include UAV video, photos, traffic cameras, fixed surveillance cameras, iOS and Android photos, texts, emails and Twitter, Instagram and Facebook data. 13. The multi sensor data management system of claim 11, further comprising analytic tools which are provided as plug in modules or store-based apps to the manager unit. 14. The multi sensor data management system of claim 11, wherein the manager unit include a dynamic monitoring tool for applying territorially specific laws and rules to geo-spatially mapped sensor data in order to render certain data legally compliant when analyzed by the applied laws and rules. 15. The multi sensor data management system of claim 14, where said rules include local and national police evidence requirements. 16. The multi sensor data management system of claim 14, where said rules include privacy rules and regulations including HIPAA. 17. The multi sensor data management system of claim 11, further comprising an events manager that includes multiple collaboration areas, alert messaging, and mission specific indices. 18. The multi sensor data management system of claim 11, further comprising
a mapping unit that geo-spatially represents and coordinates data from the multiple sensor sources onto an online map in real time; and a timeline unit that integrates data from the mapped sensor sources onto a timeline display having coordinates tied to sensor type, sensor distance and sensor data time. 19. The multi sensor data management system of claim 18, further comprising an evidence locker unit which test and stores the timeline integrated data based upon a successful application of user specified rules to the data. 20. The multi sensor data management system of claim 19, further comprising an evidence mapping unit which redraws a map with a line connecting said geo-mapped data elements that are stored in the evidence locker in order to reconstruct a trail tied to multiple said sensor data. | A UAV data processing and management system is provided including an encoder broadcaster and data manager which provides end users with a single interface for searching and sharing any video or imagery source, from any device with no client software required. Data inputs to the resource can include UAV video, photos, traffic cameras, fixed surveillance systems, iOS and Android device pictures, and other data (e.g., texts, emails) and inputs from all forms of social media, such as Twitter, Instagram, Facebook, etc. The cloud based manager is built with collaboration and sharing in mind while at the same time maintaining data privacy, security protection, chain-of-custody control and audit trail maintenance. Analytic tools are integrated accordingly as “plug-ins” or as a store of available app resources which are easily removed, added and customized based on user needs and system requirements and cost constraints.1. An unmanned aerial vehicle data management system, comprising:
an unmanned aerial vehicle; an unmanned aerial vehicle system ground station; a signal encoder broadcaster; a local cache which receives data from the encoder broadcaster for local storage; a data manager located on the Internet cloud which receives live video from the signal encoder broadcaster and archival data from the local cache; and a remote content delivery network for signal transmission to a computer browser and a least one mobile device wherein dynamic data streams originating from the UAV are managed and fused with imagery and data from other remote sensors for delivery to end users through the browser. 2. The unmanned aerial vehicle data management system of claim 1, wherein the encoder broadcaster includes a local data cache that stores live encoded data with affiliated selected analytics. 3. The unmanned aerial vehicle data management system of claim 1, further comprising a user authenticator enabling the encoder broadcaster to transmit live UAV video to and receive communications from authenticated users via the Internet. 4. The unmanned aerial vehicle data management system of claim 1, where users of the at least one mobile device can interact with UAV video directly from the Internet or from a mobile network connection. 5. The unmanned aerial vehicle data management system of claim 1, wherein the system provides active and live video from the signal encoder broadcaster to the system manager. 6. A data management system, comprising:
an integrated server located on the Internet cloud; an archive memory connected to the integrated server for storing transport stream signals that are MISP compliant and are embedded with KLV metadata; a local cache memory; a local WiFi connection; and an encoder broadcaster with multiple sensor inputs that transmits live encoded video to the local cache via the WiFi connection, transmits live videos to the integrated server, and streams high quality uploads to the archive memory. 7. The data management system of claim 6, further comprising a cellular link between the integrated server and the encoder broadcaster for transmitting and receiving encrypted data between the server and the encoder broadcaster. 8. The data management system of claim 6, wherein the integrated server serves as a platform for a sensor data manager in order to provide analytic functions, single-click uploads for users through a web based interface. 9. The data management system of claim 6, further comprising a local content delivery network which communicates with the integrated server through landlines or Internet networks. 10. The data management system of claim 9, wherein the local content delivery network further comprises workstations, servers and mobile units which can communicate with the integrated server. 11. A multi sensor data management system, comprising:
multiple sensor sources connected to a signal transport device; a transmission connection from transport device to an internet based server; a manager unit that allows different users to gain access to the multiple sensor data through the Internet cloud; and an interface that provides data search and share for users to the multiple sensor data from any Internet or mobile network connected device. 12. The multi sensor data management system of claim 11, wherein the multiple sensor sources include UAV video, photos, traffic cameras, fixed surveillance cameras, iOS and Android photos, texts, emails and Twitter, Instagram and Facebook data. 13. The multi sensor data management system of claim 11, further comprising analytic tools which are provided as plug in modules or store-based apps to the manager unit. 14. The multi sensor data management system of claim 11, wherein the manager unit include a dynamic monitoring tool for applying territorially specific laws and rules to geo-spatially mapped sensor data in order to render certain data legally compliant when analyzed by the applied laws and rules. 15. The multi sensor data management system of claim 14, where said rules include local and national police evidence requirements. 16. The multi sensor data management system of claim 14, where said rules include privacy rules and regulations including HIPAA. 17. The multi sensor data management system of claim 11, further comprising an events manager that includes multiple collaboration areas, alert messaging, and mission specific indices. 18. The multi sensor data management system of claim 11, further comprising
a mapping unit that geo-spatially represents and coordinates data from the multiple sensor sources onto an online map in real time; and a timeline unit that integrates data from the mapped sensor sources onto a timeline display having coordinates tied to sensor type, sensor distance and sensor data time. 19. The multi sensor data management system of claim 18, further comprising an evidence locker unit which test and stores the timeline integrated data based upon a successful application of user specified rules to the data. 20. The multi sensor data management system of claim 19, further comprising an evidence mapping unit which redraws a map with a line connecting said geo-mapped data elements that are stored in the evidence locker in order to reconstruct a trail tied to multiple said sensor data. | 2,400 |
7,746 | 7,746 | 15,282,702 | 2,476 | Aspects of the present disclosure involve a system and method for identifying wireless service opportunities. The system identifies available wireless service opportunities for use as a backup network. The identified wireless services can be presented via an output report using a graphical user interface (GUI). Wireless opportunities can be identified by communicating with servers that provide information regarding services available in a region of interest. The information gathered can include various metrics including network types, signal strength, and throughput. | 1. A system comprising:
a processor; and a non-transitory computer-readable medium storing instructions that, when executed by the processor, cause the processor to perform operations comprising: receiving a representation of a physical location; transmitting the representation of the physical location to a server; receiving from the server, a list of networks that provide service at the physical location based on the representation of the physical location; receiving a selection of a particular network from the list of networks based on a metric; and establishing a failover to the particular network at the physical location. 2. The system of claim 1, the operations further comprising receiving a geographic region associated with the physical location and receiving from the server the list of networks that provide service within the geographic region associated with the physical location. 3. The system of claim 1, the operations further comprising determining a received signal strength indication (RSSI) for each network in the list of networks and selecting the particular network based on the RSSI. 4. The system of claim 1, the operations further comprising receiving one of an address and latitude/longitude as the representation of the physical location. 5. The system of claim 1, the operations further comprising displaying a graphical user interface (GUI) that shows statistical information for each network in the list of networks. 6. The system of claim 1, the operations further comprising ordering the list of networks in a particular order based on the metric. 7. The system of claim 1, the failover further comprising determining a network outage and transitioning network traffic from a primary network with the network outage to the particular network. 8. A method comprising:
receiving, by a processor, a first representation of a physical location; transmitting, by the processor, the first representation of the physical location; receiving, by the processor, a second representation of the physical location that corresponds with the first representation of the physical location; transmitting, by the processor, the second representation of the physical location to a server; receiving, by the processor, from the server, a list of cellular networks that provide service at the physical location based on the second representation of the physical location; receiving, by the processor, a selection of a particular network from the list of cellular networks; and establishing, by the processor, a failover from a primary network with a network outage to the particular network at the physical location. 9. The method of claim 8, further comprising receiving a geographic region associated with the physical location and receiving from the server the list of cellular networks that provide service within the geographic region associated with the physical location. 10. The method of claim 8, further comprising determining a received signal strength indication (RSSI) for each network in the list of cellular networks and selecting the particular network based on the RSSI. 11. The method of claim 8, further comprising receiving an address as the first representation of the physical location and receiving latitude and longitude as the second representation of the physical location. 12. The method of claim 8, further comprising displaying a graphical user interface (GUI) that shows statistical information for each network in the list of networks. 13. The method of claim 8, further comprising ordering the list of cellular networks in a particular order based on a selected metric. 14. The method of claim 8, further comprising ordering the list of cellular networks in a particular order based on metrics comprising RSSI, cost, throughput, reliability, download speed, upload speed, and ping time 15. A non-transitory computer-readable medium storing instructions that, when executed by a processor, cause the processor to perform operations comprising:
receiving a first representation of a physical location; transmitting the first representation of the physical location; receiving a second representation of the physical location that corresponds with the first representation of the physical location; transmitting the second representation of the physical location to a server; receiving from the server, a list of cellular networks that provide service at the physical location based on the second representation of the physical location; receiving a selection of a particular network from the list of cellular networks; and establishing a failover from a primary network with a network outage to the particular network at the physical location. 16. The non-transitory computer-readable medium of claim 15, the operations further comprising receiving a geographic region associated with the physical location and receiving from the server the list of networks that provide service within the geographic region associated with the physical location. 17. The non-transitory computer-readable medium of claim 15, the operations further comprising determining a received signal strength indication (RSSI) for each network in the list of networks and selecting the particular network based on the RSSI. 18. The non-transitory computer-readable medium of claim 15, the operations further comprising receiving an address as the first representation of the physical location and receiving latitude and longitude as the second representation of the physical location. 19. The non-transitory computer-readable medium of claim 15, the operations further comprising displaying a graphical user interface (GUI) that shows statistical information for each network in the list of networks. 20. The non-transitory computer-readable medium of claim 15, the operations further comprising ordering the list of networks in a particular order based on a selected metric. | Aspects of the present disclosure involve a system and method for identifying wireless service opportunities. The system identifies available wireless service opportunities for use as a backup network. The identified wireless services can be presented via an output report using a graphical user interface (GUI). Wireless opportunities can be identified by communicating with servers that provide information regarding services available in a region of interest. The information gathered can include various metrics including network types, signal strength, and throughput.1. A system comprising:
a processor; and a non-transitory computer-readable medium storing instructions that, when executed by the processor, cause the processor to perform operations comprising: receiving a representation of a physical location; transmitting the representation of the physical location to a server; receiving from the server, a list of networks that provide service at the physical location based on the representation of the physical location; receiving a selection of a particular network from the list of networks based on a metric; and establishing a failover to the particular network at the physical location. 2. The system of claim 1, the operations further comprising receiving a geographic region associated with the physical location and receiving from the server the list of networks that provide service within the geographic region associated with the physical location. 3. The system of claim 1, the operations further comprising determining a received signal strength indication (RSSI) for each network in the list of networks and selecting the particular network based on the RSSI. 4. The system of claim 1, the operations further comprising receiving one of an address and latitude/longitude as the representation of the physical location. 5. The system of claim 1, the operations further comprising displaying a graphical user interface (GUI) that shows statistical information for each network in the list of networks. 6. The system of claim 1, the operations further comprising ordering the list of networks in a particular order based on the metric. 7. The system of claim 1, the failover further comprising determining a network outage and transitioning network traffic from a primary network with the network outage to the particular network. 8. A method comprising:
receiving, by a processor, a first representation of a physical location; transmitting, by the processor, the first representation of the physical location; receiving, by the processor, a second representation of the physical location that corresponds with the first representation of the physical location; transmitting, by the processor, the second representation of the physical location to a server; receiving, by the processor, from the server, a list of cellular networks that provide service at the physical location based on the second representation of the physical location; receiving, by the processor, a selection of a particular network from the list of cellular networks; and establishing, by the processor, a failover from a primary network with a network outage to the particular network at the physical location. 9. The method of claim 8, further comprising receiving a geographic region associated with the physical location and receiving from the server the list of cellular networks that provide service within the geographic region associated with the physical location. 10. The method of claim 8, further comprising determining a received signal strength indication (RSSI) for each network in the list of cellular networks and selecting the particular network based on the RSSI. 11. The method of claim 8, further comprising receiving an address as the first representation of the physical location and receiving latitude and longitude as the second representation of the physical location. 12. The method of claim 8, further comprising displaying a graphical user interface (GUI) that shows statistical information for each network in the list of networks. 13. The method of claim 8, further comprising ordering the list of cellular networks in a particular order based on a selected metric. 14. The method of claim 8, further comprising ordering the list of cellular networks in a particular order based on metrics comprising RSSI, cost, throughput, reliability, download speed, upload speed, and ping time 15. A non-transitory computer-readable medium storing instructions that, when executed by a processor, cause the processor to perform operations comprising:
receiving a first representation of a physical location; transmitting the first representation of the physical location; receiving a second representation of the physical location that corresponds with the first representation of the physical location; transmitting the second representation of the physical location to a server; receiving from the server, a list of cellular networks that provide service at the physical location based on the second representation of the physical location; receiving a selection of a particular network from the list of cellular networks; and establishing a failover from a primary network with a network outage to the particular network at the physical location. 16. The non-transitory computer-readable medium of claim 15, the operations further comprising receiving a geographic region associated with the physical location and receiving from the server the list of networks that provide service within the geographic region associated with the physical location. 17. The non-transitory computer-readable medium of claim 15, the operations further comprising determining a received signal strength indication (RSSI) for each network in the list of networks and selecting the particular network based on the RSSI. 18. The non-transitory computer-readable medium of claim 15, the operations further comprising receiving an address as the first representation of the physical location and receiving latitude and longitude as the second representation of the physical location. 19. The non-transitory computer-readable medium of claim 15, the operations further comprising displaying a graphical user interface (GUI) that shows statistical information for each network in the list of networks. 20. The non-transitory computer-readable medium of claim 15, the operations further comprising ordering the list of networks in a particular order based on a selected metric. | 2,400 |
7,747 | 7,747 | 14,920,465 | 2,414 | Embodiments are provided for managing routes of data traffic within a network. The management may be performed via a graphical user interface that interacts with a Web server to update a configuration file. The configuration file can be converted to router management commands by a network management device (e.g., a BGP speaker). The commands can then be sent to a border routers for controlling network traffic. Embodiments are also provided for capturing and logging routing updates made in a network. | 1. A method of managing routes of data traffic within a network, the method comprising performing, by a computer system:
providing a user interface for a user to input a destination address and a routing action; receiving a first destination address and a first routing action via the user interface; updating a configuration file to specify the first routing action to be performed for the destination address; converting the configuration file into router management commands; and sending the router management commands to a plurality of border routers of the network. 2. The method of claim 1, wherein updating the configuration file includes adding the first destination address to the configuration file. 3. The method of claim 1, wherein updating the configuration file includes changing a previous routing action for the first destination address to be the first routing action. 4. The method of claim 1, wherein the computer system is a server. 5. The method of claim 4, wherein the router management commands are Border Gateway Protocol (BGP) commands, and wherein the server acts as BGP speaker. 6. The method of claim 1, wherein the user interface is provided by the server setting the user interface to a client device. 7. The method of claim 1, wherein the computer system includes a server in a transmitting device, wherein the transmitting device converts the configuration file and sends the router management command. 8. The method of claim 1, wherein the user interface provides a plurality of routing actions from which to select. 9. The method of claim 8, wherein the plurality routing actions includes a null routing action. 10. The method of claim 8, wherein the plurality routing actions includes a diversion routing action that specifies a computing device within the network that is not a destination address. 11. The method of claim 8, wherein the plurality routing actions includes the discard routing action, where the discarding occurs at the plurality of border routers. 12. The method of claim 10, wherein a computing device filters network traffic based on rules. 13. The method of claim 12, wherein the filtering mitigates denial of service attacks on a destination address. 14. The method of claim 1, further comprising:
forwarding one or more router management commands from the plurality of border routers to one or more other routers based on the first routing action. 15. The method of claim 1, wherein the first destination address specifies a range of addresses. 16. The method of claim 1, wherein the user interface displays a list of destination addresses and an associated routing action. 17. The method of claim 16, wherein the user interface provides selection objects for editing or deleting the destination address of list. 18. The method of claim 16, wherein the user interface provides selection object to add a border router to which the router management commands are sent. 19. The method of claim 16, wherein the user interface displays a time associated with each destination address on the list. 20. The method of claim 19, with the time corresponds to how long the current routing action has been performed for each destination address on the list. 21. The method of claim 1, further comprising:
receiving a first source address corresponding to the first destination address, the first source address designated as a good address; and adding the first source address to the configuration file, wherein the router management commands specify that network traffic from the first source address is to be sent to the first destination address for any routing action. 22. The method of claim 1, further comprising:
receiving, via the user interface, a future time for which the first routing action is to be used; and waiting until the future time to update the configuration file. 23. The method of claim 1, further comprising:
receiving, via the user interface, a future time for which the first routing action is to end and a previous routing action is to be used; identifying with future time is reached; subsequent to the identification, updating the configuration file to specify the previous routing action is be performed for the destination address; converting the configuration file into new router management commands; sending the new router management commands. 24. A computer product comprising a computer readable medium storing a plurality of instructions for controlling a computer system to perform an operation of any of the methods above. 25. A system comprising:
the computer product of claim 24; and one or more processors for executing instructions stored on the computer readable medium. 26. A system comprising one or more processors configured to perform any of the above methods. | Embodiments are provided for managing routes of data traffic within a network. The management may be performed via a graphical user interface that interacts with a Web server to update a configuration file. The configuration file can be converted to router management commands by a network management device (e.g., a BGP speaker). The commands can then be sent to a border routers for controlling network traffic. Embodiments are also provided for capturing and logging routing updates made in a network.1. A method of managing routes of data traffic within a network, the method comprising performing, by a computer system:
providing a user interface for a user to input a destination address and a routing action; receiving a first destination address and a first routing action via the user interface; updating a configuration file to specify the first routing action to be performed for the destination address; converting the configuration file into router management commands; and sending the router management commands to a plurality of border routers of the network. 2. The method of claim 1, wherein updating the configuration file includes adding the first destination address to the configuration file. 3. The method of claim 1, wherein updating the configuration file includes changing a previous routing action for the first destination address to be the first routing action. 4. The method of claim 1, wherein the computer system is a server. 5. The method of claim 4, wherein the router management commands are Border Gateway Protocol (BGP) commands, and wherein the server acts as BGP speaker. 6. The method of claim 1, wherein the user interface is provided by the server setting the user interface to a client device. 7. The method of claim 1, wherein the computer system includes a server in a transmitting device, wherein the transmitting device converts the configuration file and sends the router management command. 8. The method of claim 1, wherein the user interface provides a plurality of routing actions from which to select. 9. The method of claim 8, wherein the plurality routing actions includes a null routing action. 10. The method of claim 8, wherein the plurality routing actions includes a diversion routing action that specifies a computing device within the network that is not a destination address. 11. The method of claim 8, wherein the plurality routing actions includes the discard routing action, where the discarding occurs at the plurality of border routers. 12. The method of claim 10, wherein a computing device filters network traffic based on rules. 13. The method of claim 12, wherein the filtering mitigates denial of service attacks on a destination address. 14. The method of claim 1, further comprising:
forwarding one or more router management commands from the plurality of border routers to one or more other routers based on the first routing action. 15. The method of claim 1, wherein the first destination address specifies a range of addresses. 16. The method of claim 1, wherein the user interface displays a list of destination addresses and an associated routing action. 17. The method of claim 16, wherein the user interface provides selection objects for editing or deleting the destination address of list. 18. The method of claim 16, wherein the user interface provides selection object to add a border router to which the router management commands are sent. 19. The method of claim 16, wherein the user interface displays a time associated with each destination address on the list. 20. The method of claim 19, with the time corresponds to how long the current routing action has been performed for each destination address on the list. 21. The method of claim 1, further comprising:
receiving a first source address corresponding to the first destination address, the first source address designated as a good address; and adding the first source address to the configuration file, wherein the router management commands specify that network traffic from the first source address is to be sent to the first destination address for any routing action. 22. The method of claim 1, further comprising:
receiving, via the user interface, a future time for which the first routing action is to be used; and waiting until the future time to update the configuration file. 23. The method of claim 1, further comprising:
receiving, via the user interface, a future time for which the first routing action is to end and a previous routing action is to be used; identifying with future time is reached; subsequent to the identification, updating the configuration file to specify the previous routing action is be performed for the destination address; converting the configuration file into new router management commands; sending the new router management commands. 24. A computer product comprising a computer readable medium storing a plurality of instructions for controlling a computer system to perform an operation of any of the methods above. 25. A system comprising:
the computer product of claim 24; and one or more processors for executing instructions stored on the computer readable medium. 26. A system comprising one or more processors configured to perform any of the above methods. | 2,400 |
7,748 | 7,748 | 13,827,460 | 2,425 | Traditional approaches to automated monitoring using a pan-tilt-zoom (PTZ) video security system involve the use of programmed patterns/preset tours. Systems and methods described herein provide for configuring a camera tour based on operation of a surveillance system during a period of active operation by a user. The configuration accounts for frequency of given views and other measures to provide an automated tour. The automated tour is displayed when the system is not under active control, and can be updated during further periods of active control. | 1. A method of operating a video surveillance system, comprising:
detecting a period of active control of a video surveillance system by an operator; monitoring a plurality of operations performed by the operator during the period of active control; configuring a tour based on at least a subset of the plurality of operations; and conducting the tour outside the period of active control. 2. The method of claim 1, wherein detecting the period of active control includes detecting a minimum threshold of activity by the operator. 3. The method of claim 1, wherein configuring the tour includes configuring at least one of a sequence of camera views, coordinates of a camera view, and a display time for each camera view. 4. The method of claim 3, wherein the coordinates of a camera view indicate at least one of a pan, tilt, and zoom of a camera. 5. The method of claim 3, wherein the coordinates of a camera view correspond to a camera view monitored during the period of active control. 6. The method of claim 3, wherein the display time for each camera view corresponds to a relative priority of each camera view based on the plurality of operations. 7. The method of claim 3, further comprising controlling a camera to obtain a camera view of the sequence of camera views. 8. The method of claim 7, wherein controlling the camera includes controlling at least one of a pan, tilt, and zoom of the camera. 9. The method of claim 1, wherein monitoring the plurality of operations includes selecting only the subset of the plurality of operations and configuring the tour based on the subset. 10. The method of claim 9, wherein selecting at least the subset is based on a display time of a camera view. 11. The method of claim 9, wherein selecting at least the subset is based on a zoom level of a camera view. 12. The method of claim 9, further comprising excluding operations from at least the subset based on thresholds of at least one of a minimum display time, minimum camera zoom, and maximum camera zoom. 13. The method of claim 1, wherein the plurality of operations include at least one of coordinates of a camera view and display time of a camera view. 14. The method of claim 13, wherein the coordinates of a camera view indicate at least one of a pan, tilt, and zoom of a camera controlled by the operator. 15. The method of claim 1, wherein the tour is repeated continuously outside the period of active control. 16. The method of claim 1, further comprising terminating the tour in response to detecting activity by the operator. 17. A computer-readable medium comprising instructions that, when read by a computer controlling a video surveillance system, cause the computer to:
detect a period of active control of a video surveillance system by an operator; monitor a plurality of operations performed by the operator during the period of active control; configure a tour based on at least a subset of the plurality of operations; and initiate the tour outside the period of active control. 18. A surveillance system comprising:
a plurality of video cameras; and a workstation configured to control the plurality of video cameras and receive respective views from the plurality of video cameras, the workstation comprising:
a user input device configured to enable user control of the plurality of video cameras,
a display configured to display the respective views from the plurality of video cameras, and
a processor configured to configure a tour based on operation of the user input device and cause at least one camera among the plurality of video cameras to conduct the tour outside a period of active user control. 19. The system of claim 18, wherein the processor is further configured to detect the period of active user control based on operation of the user input device. 20. The system of claim 18, wherein the processor is further configured to monitor the operation of the user input device. | Traditional approaches to automated monitoring using a pan-tilt-zoom (PTZ) video security system involve the use of programmed patterns/preset tours. Systems and methods described herein provide for configuring a camera tour based on operation of a surveillance system during a period of active operation by a user. The configuration accounts for frequency of given views and other measures to provide an automated tour. The automated tour is displayed when the system is not under active control, and can be updated during further periods of active control.1. A method of operating a video surveillance system, comprising:
detecting a period of active control of a video surveillance system by an operator; monitoring a plurality of operations performed by the operator during the period of active control; configuring a tour based on at least a subset of the plurality of operations; and conducting the tour outside the period of active control. 2. The method of claim 1, wherein detecting the period of active control includes detecting a minimum threshold of activity by the operator. 3. The method of claim 1, wherein configuring the tour includes configuring at least one of a sequence of camera views, coordinates of a camera view, and a display time for each camera view. 4. The method of claim 3, wherein the coordinates of a camera view indicate at least one of a pan, tilt, and zoom of a camera. 5. The method of claim 3, wherein the coordinates of a camera view correspond to a camera view monitored during the period of active control. 6. The method of claim 3, wherein the display time for each camera view corresponds to a relative priority of each camera view based on the plurality of operations. 7. The method of claim 3, further comprising controlling a camera to obtain a camera view of the sequence of camera views. 8. The method of claim 7, wherein controlling the camera includes controlling at least one of a pan, tilt, and zoom of the camera. 9. The method of claim 1, wherein monitoring the plurality of operations includes selecting only the subset of the plurality of operations and configuring the tour based on the subset. 10. The method of claim 9, wherein selecting at least the subset is based on a display time of a camera view. 11. The method of claim 9, wherein selecting at least the subset is based on a zoom level of a camera view. 12. The method of claim 9, further comprising excluding operations from at least the subset based on thresholds of at least one of a minimum display time, minimum camera zoom, and maximum camera zoom. 13. The method of claim 1, wherein the plurality of operations include at least one of coordinates of a camera view and display time of a camera view. 14. The method of claim 13, wherein the coordinates of a camera view indicate at least one of a pan, tilt, and zoom of a camera controlled by the operator. 15. The method of claim 1, wherein the tour is repeated continuously outside the period of active control. 16. The method of claim 1, further comprising terminating the tour in response to detecting activity by the operator. 17. A computer-readable medium comprising instructions that, when read by a computer controlling a video surveillance system, cause the computer to:
detect a period of active control of a video surveillance system by an operator; monitor a plurality of operations performed by the operator during the period of active control; configure a tour based on at least a subset of the plurality of operations; and initiate the tour outside the period of active control. 18. A surveillance system comprising:
a plurality of video cameras; and a workstation configured to control the plurality of video cameras and receive respective views from the plurality of video cameras, the workstation comprising:
a user input device configured to enable user control of the plurality of video cameras,
a display configured to display the respective views from the plurality of video cameras, and
a processor configured to configure a tour based on operation of the user input device and cause at least one camera among the plurality of video cameras to conduct the tour outside a period of active user control. 19. The system of claim 18, wherein the processor is further configured to detect the period of active user control based on operation of the user input device. 20. The system of claim 18, wherein the processor is further configured to monitor the operation of the user input device. | 2,400 |
7,749 | 7,749 | 14,162,664 | 2,473 | A method of wireless communication includes receiving a signal from an base station. The method also includes determining a timing advance loop from a set of timing advance loops, and/or a power control loop from a set of power control loops. The determination is based on the received signal. | 1. A method of wireless communication, comprising:
receiving a signal from a base station; and determining a timing advance (TA) loop from a plurality of TA loops, a power control (PC) loop from a plurality of PC loops, or a combination thereof, based at least in part on the received signal. 2. The method of claim 1, in which the TA loop is further determined based at least in part on a timing advance loop index (TLI) field included in downlink control information (DCI) of the received signal. 3. The method of claim 1, further comprising associating a TA command with the TA loop based at least in part on a TA loop index of a media access control (MAC) payload. 4. The method of claim 1, in which the TA loop is further determined based at least in part on an enhanced physical downlink control channel (ePDCCH) set associated with the received signal; and
the method further comprises associating a TA command with the TA loop based at least in part on the ePDCCH set. 5. The method of claim 1, in which the TA loop is further determined based at least in part on a downlink control information (DCI) type, control channel decoding candidates, virtual cell IDs, subframe indices, subframe types, DCI formats, a control channel type, or a combination thereof. 6. The method of claim 1, in which the PC loop is further determined based at least in part on a power control loop index (PLI) field included in downlink control information (DCI) of the received signal. 7. The method of claim 1, in which the PC loop is further determined based at least in part on a transmission power control (TPC) command included in downlink control information (DCI) of the received signal. 8. The method of claim 1, in which the PC loop is further determined based at least in part on a physical downlink shared channel rate matching and quasi-co-location indicator (PQI) field or scrambling ID (nSCID) included in downlink control information (DCI) of the received signal. 9. The method of claim 1, in which the PC loop is determined based at least in part on an enhanced physical downlink control channel (ePDCCH) set associated with the received signal. 10. The method of claim 1, in which the PC loop is further determined based at least in part on a downlink control information (DCI) type, control channel decoding candidates, virtual cell IDs, subframe indices, subframe types, DCI formats, a control channel type, or a combination thereof. 11. An apparatus for wireless communications, comprising:
means for receiving a signal from a base station; and means for determining a timing advance (TA) loop from a plurality of TA loops, a power control (PC) loop from a plurality of PC loops, or a combination thereof, based at least in part on the received signal. 12. The apparatus of claim 11, in which the means for determining the TA loop determines the TA loop based at least in part on a timing advance loop index (TLI) field included in downlink control information (DCI) of the received signal. 13. The apparatus of claim 11, in which the means for determining the TA loop determines the TA loop based at least in part on a downlink control information (DCI) type, control channel decoding candidates, virtual cell IDs, subframe indices, subframe types, DCI formats, a control channel type, or a combination thereof. 14. The apparatus of claim 11, in which the means for determining the PC loop determines the PC loop based at least in part on a power control loop index (PLI) field included in downlink control information (DCI) of the received signal. 15. The apparatus of claim 11, in which the means for determining the PC loop determines the PC loop based at least in part on a downlink control information (DCI) type, control channel decoding candidates, virtual cell IDs, subframe indices, subframe types, DCI formats, a control channel type, or a combination thereof. 16. A computer program product for wireless communications, the computer program product comprising:
a non-transitory computer-readable medium having program code recorded thereon, the program code comprising:
program code to receive a signal from a base station; and
program code to determine a timing advance (TA) loop from a plurality of TA loops, a power control (PC) loop from a plurality of PC loops, or a combination thereof, based at least in part on the received signal. 17. The computer program product of claim 16, in which the program code to determine the TA loop further comprises program code to determine the TA loop based at least in part on a timing advance loop index (TLI) field included in downlink control information (DCI) of the received signal. 18. The computer program product of claim 16, in which the program code to determine the TA loop further comprises program code to determine the TA loop based at least in part on a downlink control information (DCI) type, control channel decoding candidates, virtual cell IDs, subframe indices, subframe types, DCI formats, a control channel type, or a combination thereof. 19. The computer program product of claim 16, in which the program code to determine the PC loop further comprises program code to determine the PC loop based at least in part on a power control loop index (PLI) field included in downlink control information (DCI) of the received signal. 20. The computer program product of claim 16, in which the program code to determine the PC loop further comprises program code to determine the PC loop based at least in part on a downlink control information (DCI) type, control channel decoding candidates, virtual cell IDs, subframe indices, subframe types, DCI formats, a control channel type, or a combination thereof. 21. An apparatus for wireless communications, comprising:
a memory; and at least one processor coupled to the memory, the at least one processor being configured:
to receive a signal from base station; and
to determine a timing advance (TA) loop from a plurality of TA loops, a power control (PC) loop from a plurality of PC loops, or a combination thereof, based at least in part on the received signal. 22. The apparatus of claim 21, in which the at least one processor is further configured to determine the TA loop based at least in part on a timing advance loop index (TLI) field included in downlink control information (DCI) of the received signal. 23. The apparatus of claim 21, in which the at least one processor is further configured to associated a TA command with the TA loop based at least in part on a TA loop index of a media access control (MAC) payload. 24. The apparatus of claim 21, in which the at least one processor is further configured:
to determine the TA loop based at least in part on an enhanced physical downlink control channel (ePDCCH) set associated with the received signal; and to associate a TA command with the TA loop based at least in part on the ePDCCH set. 25. The apparatus of claim 21, in which the at least one processor is further configured to determine the TA loop based at least in part on a downlink control information (DCI) type, control channel decoding candidates, virtual cell IDs, subframe indices, subframe types, DCI formats, a control channel type, or a combination thereof. 26. The apparatus of claim 21, in which the at least one processor is further configured to determine the PC loop based at least in part on a power control loop index (PLI) field included in downlink control information (DCI) of the received signal. 27. The apparatus of claim 21, in which the at least one processor is further configured to determine the PC loop based at least in part on a transmission power control (TPC) command included in downlink control information (DCI) of the received signal. 28. The apparatus of claim 21, in which the at least one processor is further configured to determine the PC loop based at least in part on a physical downlink shared channel rate matching and quasi-co-location indicator (PQI) field or scrambling ID (nSCID) included in downlink control information (DCI) of the received signal. 29. The apparatus of claim 21, in which the at least one processor is further configured to determine the PC loop based at least in part on an enhanced physical downlink control channel (ePDCCH) set associated with the received signal. 30. The apparatus of claim 21, in which the at least one processor is further configured to determine the PC loop based at least in part on a downlink control information (DCI) type, control channel decoding candidates, virtual cell IDs, subframe indices, subframe types, DCI formats, a control channel type, or a combination thereof. | A method of wireless communication includes receiving a signal from an base station. The method also includes determining a timing advance loop from a set of timing advance loops, and/or a power control loop from a set of power control loops. The determination is based on the received signal.1. A method of wireless communication, comprising:
receiving a signal from a base station; and determining a timing advance (TA) loop from a plurality of TA loops, a power control (PC) loop from a plurality of PC loops, or a combination thereof, based at least in part on the received signal. 2. The method of claim 1, in which the TA loop is further determined based at least in part on a timing advance loop index (TLI) field included in downlink control information (DCI) of the received signal. 3. The method of claim 1, further comprising associating a TA command with the TA loop based at least in part on a TA loop index of a media access control (MAC) payload. 4. The method of claim 1, in which the TA loop is further determined based at least in part on an enhanced physical downlink control channel (ePDCCH) set associated with the received signal; and
the method further comprises associating a TA command with the TA loop based at least in part on the ePDCCH set. 5. The method of claim 1, in which the TA loop is further determined based at least in part on a downlink control information (DCI) type, control channel decoding candidates, virtual cell IDs, subframe indices, subframe types, DCI formats, a control channel type, or a combination thereof. 6. The method of claim 1, in which the PC loop is further determined based at least in part on a power control loop index (PLI) field included in downlink control information (DCI) of the received signal. 7. The method of claim 1, in which the PC loop is further determined based at least in part on a transmission power control (TPC) command included in downlink control information (DCI) of the received signal. 8. The method of claim 1, in which the PC loop is further determined based at least in part on a physical downlink shared channel rate matching and quasi-co-location indicator (PQI) field or scrambling ID (nSCID) included in downlink control information (DCI) of the received signal. 9. The method of claim 1, in which the PC loop is determined based at least in part on an enhanced physical downlink control channel (ePDCCH) set associated with the received signal. 10. The method of claim 1, in which the PC loop is further determined based at least in part on a downlink control information (DCI) type, control channel decoding candidates, virtual cell IDs, subframe indices, subframe types, DCI formats, a control channel type, or a combination thereof. 11. An apparatus for wireless communications, comprising:
means for receiving a signal from a base station; and means for determining a timing advance (TA) loop from a plurality of TA loops, a power control (PC) loop from a plurality of PC loops, or a combination thereof, based at least in part on the received signal. 12. The apparatus of claim 11, in which the means for determining the TA loop determines the TA loop based at least in part on a timing advance loop index (TLI) field included in downlink control information (DCI) of the received signal. 13. The apparatus of claim 11, in which the means for determining the TA loop determines the TA loop based at least in part on a downlink control information (DCI) type, control channel decoding candidates, virtual cell IDs, subframe indices, subframe types, DCI formats, a control channel type, or a combination thereof. 14. The apparatus of claim 11, in which the means for determining the PC loop determines the PC loop based at least in part on a power control loop index (PLI) field included in downlink control information (DCI) of the received signal. 15. The apparatus of claim 11, in which the means for determining the PC loop determines the PC loop based at least in part on a downlink control information (DCI) type, control channel decoding candidates, virtual cell IDs, subframe indices, subframe types, DCI formats, a control channel type, or a combination thereof. 16. A computer program product for wireless communications, the computer program product comprising:
a non-transitory computer-readable medium having program code recorded thereon, the program code comprising:
program code to receive a signal from a base station; and
program code to determine a timing advance (TA) loop from a plurality of TA loops, a power control (PC) loop from a plurality of PC loops, or a combination thereof, based at least in part on the received signal. 17. The computer program product of claim 16, in which the program code to determine the TA loop further comprises program code to determine the TA loop based at least in part on a timing advance loop index (TLI) field included in downlink control information (DCI) of the received signal. 18. The computer program product of claim 16, in which the program code to determine the TA loop further comprises program code to determine the TA loop based at least in part on a downlink control information (DCI) type, control channel decoding candidates, virtual cell IDs, subframe indices, subframe types, DCI formats, a control channel type, or a combination thereof. 19. The computer program product of claim 16, in which the program code to determine the PC loop further comprises program code to determine the PC loop based at least in part on a power control loop index (PLI) field included in downlink control information (DCI) of the received signal. 20. The computer program product of claim 16, in which the program code to determine the PC loop further comprises program code to determine the PC loop based at least in part on a downlink control information (DCI) type, control channel decoding candidates, virtual cell IDs, subframe indices, subframe types, DCI formats, a control channel type, or a combination thereof. 21. An apparatus for wireless communications, comprising:
a memory; and at least one processor coupled to the memory, the at least one processor being configured:
to receive a signal from base station; and
to determine a timing advance (TA) loop from a plurality of TA loops, a power control (PC) loop from a plurality of PC loops, or a combination thereof, based at least in part on the received signal. 22. The apparatus of claim 21, in which the at least one processor is further configured to determine the TA loop based at least in part on a timing advance loop index (TLI) field included in downlink control information (DCI) of the received signal. 23. The apparatus of claim 21, in which the at least one processor is further configured to associated a TA command with the TA loop based at least in part on a TA loop index of a media access control (MAC) payload. 24. The apparatus of claim 21, in which the at least one processor is further configured:
to determine the TA loop based at least in part on an enhanced physical downlink control channel (ePDCCH) set associated with the received signal; and to associate a TA command with the TA loop based at least in part on the ePDCCH set. 25. The apparatus of claim 21, in which the at least one processor is further configured to determine the TA loop based at least in part on a downlink control information (DCI) type, control channel decoding candidates, virtual cell IDs, subframe indices, subframe types, DCI formats, a control channel type, or a combination thereof. 26. The apparatus of claim 21, in which the at least one processor is further configured to determine the PC loop based at least in part on a power control loop index (PLI) field included in downlink control information (DCI) of the received signal. 27. The apparatus of claim 21, in which the at least one processor is further configured to determine the PC loop based at least in part on a transmission power control (TPC) command included in downlink control information (DCI) of the received signal. 28. The apparatus of claim 21, in which the at least one processor is further configured to determine the PC loop based at least in part on a physical downlink shared channel rate matching and quasi-co-location indicator (PQI) field or scrambling ID (nSCID) included in downlink control information (DCI) of the received signal. 29. The apparatus of claim 21, in which the at least one processor is further configured to determine the PC loop based at least in part on an enhanced physical downlink control channel (ePDCCH) set associated with the received signal. 30. The apparatus of claim 21, in which the at least one processor is further configured to determine the PC loop based at least in part on a downlink control information (DCI) type, control channel decoding candidates, virtual cell IDs, subframe indices, subframe types, DCI formats, a control channel type, or a combination thereof. | 2,400 |
7,750 | 7,750 | 14,508,214 | 2,488 | A method including encoding a video program into a plurality of video streams, each of the plurality of video streams being encoded at a corresponding one of a plurality of bitrates; providing, to a plurality of viewing clients, an option to select one of the plurality of video streams; determining a streaming capacity of each of the viewing clients; and determining an improved plurality of bitrates based on streaming capacities of the plurality of viewing clients. | 1. A method, comprising:
encoding a video program into a plurality of video streams, each of the plurality of video streams being encoded at a corresponding one of a plurality of bitrates; providing, to a plurality of viewing clients, an option to select one of the plurality of video streams; determining a streaming capacity of each of the viewing clients; and determining an improved plurality of bitrates based on streaming capacities of the plurality of viewing clients. 2. The method of claim 1, further comprising:
encoding the video program into a further plurality of video streams, each of the further plurality of video streams being encoded at a corresponding one of the optimized plurality of bitrates. 3. The method of claim 2, further comprising:
providing, to a plurality of further viewing clients, an option to select one of the further plurality of video streams; determining a streaming capacity of each of the further viewing clients; and determining a further improved plurality of bitrates based on the streaming capacities of the plurality of further viewing clients. 4. The method of claim 1, further comprising:
generating a further stream at a fictitious bitrate, wherein the further stream is generated based on one of the video streams, and wherein the fictitious bitrate is a bitrate that is not one of the plurality of bitrates at which the plurality of video streams are encoded, wherein the providing, to the plurality of viewing clients, an option to select one of the plurality of video streams comprises providing, to the plurality of viewing clients, an option to select the further stream. 5. The method of claim 4, wherein the further stream is generated by padding a selected one of the plurality of video streams with one of null data and additional data, the further stream having a fictitious bitrate that is higher than the bitrate of the selected one of the plurality of video streams. 6. The method of claim 1, wherein the determining the improved plurality of bitrates comprises:
dividing the plurality of viewing clients into a plurality of groupings; selecting an optimal bitrate for each of the groupings; and using the optimal bitrates for each of the groupings as the plurality of bitrates. 7. The method of claim 6, wherein each of the plurality of groupings includes a substantially equal portion of the viewing clients. 8. The method of claim 6, wherein the optimal bitrate for each of the groupings is one of a slowest streaming capacity of the plurality of viewing clients in the grouping and an average of the streaming capacities of the plurality of viewing clients in the grouping. 9. The method of claim 1, wherein determining the streaming capacity of each of the viewing clients comprises one of A) receiving a selection of one of the video streams from each of the viewing clients, wherein the bitrate of the selected one of the video streams is used as the streaming capacity of each of the viewing clients, and B) receiving an indication of the streaming capacity from client-side equipment of each of the viewing clients. 10. The method of claim 9, wherein receiving the selection of one of the video streams from each of the viewing clients comprises receiving one of a user selection and a software-based selection from each of the viewing clients. 11. A system, comprising:
a video encoder encoding a source video into a plurality of video streams, each of the plurality of video streams being encoded at a corresponding one of a plurality of bitrates; and an optimization logic determining a streaming capacity of each of a plurality of viewing clients of the plurality of video streams and determining an improved plurality of bitrates based on the streaming capacities of the plurality of viewing clients, wherein the video encoder and the optimization logic are configured to be processed by one or more processors, and wherein the one or more processors are coupled to a memory. 12. The system of claim 11, wherein the optimization logic instructs the video encoder to encode the video program into a further plurality of video streams, each of the further plurality of video streams being encoded at a corresponding one of the improved plurality of bitrates. 13. The system of claim 12, wherein the optimization logic determines a streaming capacity of each of a further plurality of viewing clients of the further plurality of video streams and determines a further improved plurality of bitrates based on the streaming capacities of the plurality of further viewing clients. 14. The system of claim 11, wherein the video encoder generates a further stream at a fictitious bitrate, wherein the further stream is generated based on one of the video streams, and wherein the fictitious bitrate is a bitrate that is not one of the plurality of bitrates at which the video encoder encodes the plurality of video streams. 15. The system of claim 14, wherein the video encoder generates the further stream by padding a selected one of the plurality of video streams with one of null data and additional data, the further stream having a fictitious bitrate that is higher than the bitrate of the selected one of the plurality of video streams. 16. The system of claim 11, wherein the optimization logic determines the improved plurality of bitrates by:
dividing the plurality of viewing clients into a plurality of groupings; selecting an optimal bitrate for each of the groupings; and using the optimal bitrates for each of the groupings as the plurality of bitrates. 17. The system of claim 16, wherein each of the plurality of groupings includes a substantially equal portion of the viewing clients. 18. The system of claim 16, wherein the optimal bitrate for each of the groupings is one of a slowest streaming capacity of the plurality of viewing clients in the grouping and an average of the streaming capacities of the plurality of viewing clients in the grouping. 19. The system of claim 11, wherein the optimization logic determines the streaming capacity of each of the viewing clients by one of A) receiving a selection of one of the video streams from each of the viewing clients, wherein the bitrate of the selected one of the video streams is used as the streaming capacity of each of the viewing clients, and B) receiving an indication of the streaming capacity from client-side equipment of each of the viewing clients. 20. The system of claim 19, wherein receiving the selection of one of the video streams from each of the viewing clients comprises receiving one of a user selection and a software-based selection from each of the viewing clients. 21. The system of claim 11, wherein the optimization logic comprises one of hardware, software, firmware, a codec, and a field-programmable gate array. 22. A non-transitory computer-readable storage medium storing a set of instructions that are executable by a processor, the set of instructions, when executed by the processor, causing the processor to perform operations comprising:
encoding a video program into a plurality of video streams, each of the plurality of video streams being encoded at a corresponding one of a plurality of bitrates; providing, to a plurality of viewing clients, an option to select one of the plurality of video streams; determining a streaming capacity of each of the viewing clients; and determining an improved plurality of bitrates based on streaming capacities of the plurality of viewing clients. 23. The non-transitory computer-readable storage medium of claim 22, wherein the operations further comprise:
encoding the video program into a further plurality of video streams, each of the further plurality of video streams being encoded at a corresponding one of the improved plurality of bitrates. | A method including encoding a video program into a plurality of video streams, each of the plurality of video streams being encoded at a corresponding one of a plurality of bitrates; providing, to a plurality of viewing clients, an option to select one of the plurality of video streams; determining a streaming capacity of each of the viewing clients; and determining an improved plurality of bitrates based on streaming capacities of the plurality of viewing clients.1. A method, comprising:
encoding a video program into a plurality of video streams, each of the plurality of video streams being encoded at a corresponding one of a plurality of bitrates; providing, to a plurality of viewing clients, an option to select one of the plurality of video streams; determining a streaming capacity of each of the viewing clients; and determining an improved plurality of bitrates based on streaming capacities of the plurality of viewing clients. 2. The method of claim 1, further comprising:
encoding the video program into a further plurality of video streams, each of the further plurality of video streams being encoded at a corresponding one of the optimized plurality of bitrates. 3. The method of claim 2, further comprising:
providing, to a plurality of further viewing clients, an option to select one of the further plurality of video streams; determining a streaming capacity of each of the further viewing clients; and determining a further improved plurality of bitrates based on the streaming capacities of the plurality of further viewing clients. 4. The method of claim 1, further comprising:
generating a further stream at a fictitious bitrate, wherein the further stream is generated based on one of the video streams, and wherein the fictitious bitrate is a bitrate that is not one of the plurality of bitrates at which the plurality of video streams are encoded, wherein the providing, to the plurality of viewing clients, an option to select one of the plurality of video streams comprises providing, to the plurality of viewing clients, an option to select the further stream. 5. The method of claim 4, wherein the further stream is generated by padding a selected one of the plurality of video streams with one of null data and additional data, the further stream having a fictitious bitrate that is higher than the bitrate of the selected one of the plurality of video streams. 6. The method of claim 1, wherein the determining the improved plurality of bitrates comprises:
dividing the plurality of viewing clients into a plurality of groupings; selecting an optimal bitrate for each of the groupings; and using the optimal bitrates for each of the groupings as the plurality of bitrates. 7. The method of claim 6, wherein each of the plurality of groupings includes a substantially equal portion of the viewing clients. 8. The method of claim 6, wherein the optimal bitrate for each of the groupings is one of a slowest streaming capacity of the plurality of viewing clients in the grouping and an average of the streaming capacities of the plurality of viewing clients in the grouping. 9. The method of claim 1, wherein determining the streaming capacity of each of the viewing clients comprises one of A) receiving a selection of one of the video streams from each of the viewing clients, wherein the bitrate of the selected one of the video streams is used as the streaming capacity of each of the viewing clients, and B) receiving an indication of the streaming capacity from client-side equipment of each of the viewing clients. 10. The method of claim 9, wherein receiving the selection of one of the video streams from each of the viewing clients comprises receiving one of a user selection and a software-based selection from each of the viewing clients. 11. A system, comprising:
a video encoder encoding a source video into a plurality of video streams, each of the plurality of video streams being encoded at a corresponding one of a plurality of bitrates; and an optimization logic determining a streaming capacity of each of a plurality of viewing clients of the plurality of video streams and determining an improved plurality of bitrates based on the streaming capacities of the plurality of viewing clients, wherein the video encoder and the optimization logic are configured to be processed by one or more processors, and wherein the one or more processors are coupled to a memory. 12. The system of claim 11, wherein the optimization logic instructs the video encoder to encode the video program into a further plurality of video streams, each of the further plurality of video streams being encoded at a corresponding one of the improved plurality of bitrates. 13. The system of claim 12, wherein the optimization logic determines a streaming capacity of each of a further plurality of viewing clients of the further plurality of video streams and determines a further improved plurality of bitrates based on the streaming capacities of the plurality of further viewing clients. 14. The system of claim 11, wherein the video encoder generates a further stream at a fictitious bitrate, wherein the further stream is generated based on one of the video streams, and wherein the fictitious bitrate is a bitrate that is not one of the plurality of bitrates at which the video encoder encodes the plurality of video streams. 15. The system of claim 14, wherein the video encoder generates the further stream by padding a selected one of the plurality of video streams with one of null data and additional data, the further stream having a fictitious bitrate that is higher than the bitrate of the selected one of the plurality of video streams. 16. The system of claim 11, wherein the optimization logic determines the improved plurality of bitrates by:
dividing the plurality of viewing clients into a plurality of groupings; selecting an optimal bitrate for each of the groupings; and using the optimal bitrates for each of the groupings as the plurality of bitrates. 17. The system of claim 16, wherein each of the plurality of groupings includes a substantially equal portion of the viewing clients. 18. The system of claim 16, wherein the optimal bitrate for each of the groupings is one of a slowest streaming capacity of the plurality of viewing clients in the grouping and an average of the streaming capacities of the plurality of viewing clients in the grouping. 19. The system of claim 11, wherein the optimization logic determines the streaming capacity of each of the viewing clients by one of A) receiving a selection of one of the video streams from each of the viewing clients, wherein the bitrate of the selected one of the video streams is used as the streaming capacity of each of the viewing clients, and B) receiving an indication of the streaming capacity from client-side equipment of each of the viewing clients. 20. The system of claim 19, wherein receiving the selection of one of the video streams from each of the viewing clients comprises receiving one of a user selection and a software-based selection from each of the viewing clients. 21. The system of claim 11, wherein the optimization logic comprises one of hardware, software, firmware, a codec, and a field-programmable gate array. 22. A non-transitory computer-readable storage medium storing a set of instructions that are executable by a processor, the set of instructions, when executed by the processor, causing the processor to perform operations comprising:
encoding a video program into a plurality of video streams, each of the plurality of video streams being encoded at a corresponding one of a plurality of bitrates; providing, to a plurality of viewing clients, an option to select one of the plurality of video streams; determining a streaming capacity of each of the viewing clients; and determining an improved plurality of bitrates based on streaming capacities of the plurality of viewing clients. 23. The non-transitory computer-readable storage medium of claim 22, wherein the operations further comprise:
encoding the video program into a further plurality of video streams, each of the further plurality of video streams being encoded at a corresponding one of the improved plurality of bitrates. | 2,400 |
7,751 | 7,751 | 14,910,891 | 2,468 | A method in a terminal for inter RAT access selection is provided. The terminal is capable to operate in one or more RATs. The terminal receives ( 201 ) ( 202 ), from a network node, one or more dedicated parameters relating to inter RAT access selection, and one or more broadcasted parameters relating to inter RAT access selection. The one or more broadcasted parameters correspond to the respective one or more dedicated parameters. The one or more broadcasted parameters relates to inter RAT access selection. The terminal then acts ( 203 ) for inter RAT access selection according to any one out of: —one or more updated dedicated parameters, updated based on changes to corresponding one or more broadcast parameters, and—any one out of the one or more received dedicated parameters, updated dedicated parameters, or corresponding broadcasted parameters, based on whether one or more conditions are fulfilled or not. | 1-20. (canceled) 21. A method in a terminal for inter RAT access selection, the terminal being capable to operate in one or more Radio Access Technologies (RATs), the method comprising:
receiving from a network node, one or more dedicated parameters relating to inter-RAT access selection; receiving, from the network node, one or more broadcasted parameters relating to inter-RAT access selection, which one or more broadcasted parameters at least partly correspond to the respective one or more dedicated parameters, and which one or more broadcasted parameters relates to inter-RAT access selection; acting for inter-RAT access selection according to any one out of:
one or more updated dedicated parameters, updated based on changes to corresponding one or more broadcast parameters; and
any one out of the one or more received dedicated parameters, updated dedicated parameters, or corresponding broadcasted parameters, based on whether one or more conditions are fulfilled or not. 22. The method of claim 21, wherein acting for inter-RAT access selection according to the one or more received dedicated parameters, updated dedicated parameters, or corresponding broadcasted parameters, based on whether one or more conditions are fulfilled or not, comprises one or more out of:
when one or more conditions are fulfilled, continuing to act according to the one or more received dedicated parameters; when the one or more conditions are fulfilled, acting according to one or more updated dedicated parameters, updated based on changes to corresponding one or more broadcast parameters; when the one or more conditions are not fulfilled or are no longer fulfilled, considering the one or more dedicated parameters obsolete; when the one or more conditions are not fulfilled or are no longer fulfilled, acting according to one or more updated dedicated parameters, updated based on changes to corresponding one or more broadcast parameters; and when the one or more conditions are not fulfilled or are no longer fulfilled, acting according to the corresponding broadcasted parameters. 23. The method of claim 21, wherein the terminal has changed cell from a first cell to a second cell, wherein the terminal has received an indication from a network node, which indication relates to a set of cells, and wherein the one or more conditions for acting for inter-RAT access selection comprise whether or not the second cell is one of the cells in the set of cells. 24. The method of claim 21, wherein the conditions are any one or more out of:
conditions relating to parameters of a second cell, after the terminal has changed cell from a first cell to the second cell; conditions relating to the broadcast parameters being changed; and conditions relating to the terminal having performed less than a number of cell changes since the dedicated threshold was received. 25. The method of claim 22, further comprising considering the one or more dedicated parameters obsolete, and acting according to the received broadcasted parameters. 26. The method of claim 22 further comprising considering the one or more dedicated parameters obsolete, and acquiring one or more new dedicated parameters by a Radio Access network (RAN). 27. The method of claim 21, wherein acting for inter-RAT access selection is performed when the terminal is not able to receive or is configured not to receive dedicated parameters any more. 28. The method of claim 21, wherein acting for inter-RAT access selection is performed by updating the one or more dedicated parameters by considering a change of the corresponding one or more broadcasted parameters. 29. The method of claim 28, wherein the one or more dedicated parameters are updated by multiplying a change of the broadcasted parameters with a scaling factor. 30. The method of claim 21, wherein the one or more conditions comprises that the broadcasted one or more parameters in the second cell corresponding to the one or more dedicated parameters is equal to, or is close to by a threshold to the one or more broadcasted parameters of the first cell in which the dedicated parameters were received. 31. A terminal for inter-RAT access selection, the terminal being capable to operate in one or more Radio Access Technologies (RATs), wherein the terminal comprises a transceiver configured to transmit and receive radio signals, and
a processing circuit configured to:
receive from a network node, one or more dedicated parameters relating to inter-RAT access selection,
receive from the network node, one or more broadcasted parameters relating to inter-RAT access selection, which one or more broadcasted parameters at least partly correspond to the respective one or more dedicated parameters, and which one or more broadcasted parameters relates to inter-RAT access selection, and
act for inter-RAT access selection according to any one out of:
one or more updated dedicated parameters, updated based on changes to corresponding one or more broadcast parameters; and
any one out of the one or more received dedicated parameters, updated dedicated parameters, or corresponding broadcasted parameters, based on whether one or more conditions are fulfilled or not. 32. The terminal of claim 31, wherein processing circuit further is configured to act for inter-RAT access selection according to the one or more received dedicated parameters, updated dedicated parameters, or corresponding broadcasted parameters, based on whether one or more conditions are fulfilled or not, comprises one or more out of:
when one or more conditions are fulfilled, continuing to act according to the one or more received dedicated parameters; when the one or more conditions are fulfilled, act according to one or more updated dedicated parameters, updated based on changes to corresponding one or more broadcast parameters; when the one or more conditions are not fulfilled or are no longer fulfilled, consider the one or more dedicated parameters obsolete; and when the one or more conditions are not fulfilled or are no longer fulfilled, act according to one or more updated dedicated parameters, updated based on changes to corresponding one or more broadcast parameters; and when the one or more conditions are not fulfilled or are no longer fulfilled, act according to the corresponding broadcasted parameters. 33. The terminal of claim 31, wherein the terminal has changed cell from a first cell to a second cell, wherein the terminal has received an indication from a network node, which indication relates to a set of cells, and wherein the one or more conditions for acting for inter-RAT access selection comprise whether or not the second cell is one of the cells in the set of cells. 34. The terminal of claim 30, wherein the conditions are any one or more out of:
conditions relating to parameters of a second cell, after the terminal has changed cell from a first cell to the second cell; conditions relating to the broadcast parameters being changed; and conditions relating to the terminal having performed less than a number of cell changes since the dedicated threshold was received. 35. The terminal of claim 32, wherein the one or more dedicated parameters are considered obsolete, the terminal further being configured to act according to the received broadcasted parameters. 36. The terminal of claim 32, wherein the processing circuit is configured to considering the one or more dedicated parameters obsolete, the processing circuit further being configured to acquire one or more new dedicated parameters by a Radio Access network (RAN). 37. The terminal according to of claim 31, wherein the processing circuit further is configured to act for inter-RAT access selection when the terminal is not able to receive or is configured not to receive dedicated parameters any more. 38. The terminal of claim 31, wherein the processing circuit further is configured to act for inter-RAT access selection comprising to update the one or more dedicated parameters by considering a change of the corresponding one or more broadcasted parameters. 39. The terminal of claim 38, wherein the one or more dedicated parameters are updated by multiplying a change of the broadcasted threshold with a scaling factor. 40. The terminal of claim 31, wherein the one or more conditions comprises that the broadcasted one or more parameters in the second cell corresponding to the one or more dedicated parameters is equal to, or is close to by a threshold, to the one or more broadcasted parameters of the first cell in which the dedicated thresholds were received. | A method in a terminal for inter RAT access selection is provided. The terminal is capable to operate in one or more RATs. The terminal receives ( 201 ) ( 202 ), from a network node, one or more dedicated parameters relating to inter RAT access selection, and one or more broadcasted parameters relating to inter RAT access selection. The one or more broadcasted parameters correspond to the respective one or more dedicated parameters. The one or more broadcasted parameters relates to inter RAT access selection. The terminal then acts ( 203 ) for inter RAT access selection according to any one out of: —one or more updated dedicated parameters, updated based on changes to corresponding one or more broadcast parameters, and—any one out of the one or more received dedicated parameters, updated dedicated parameters, or corresponding broadcasted parameters, based on whether one or more conditions are fulfilled or not.1-20. (canceled) 21. A method in a terminal for inter RAT access selection, the terminal being capable to operate in one or more Radio Access Technologies (RATs), the method comprising:
receiving from a network node, one or more dedicated parameters relating to inter-RAT access selection; receiving, from the network node, one or more broadcasted parameters relating to inter-RAT access selection, which one or more broadcasted parameters at least partly correspond to the respective one or more dedicated parameters, and which one or more broadcasted parameters relates to inter-RAT access selection; acting for inter-RAT access selection according to any one out of:
one or more updated dedicated parameters, updated based on changes to corresponding one or more broadcast parameters; and
any one out of the one or more received dedicated parameters, updated dedicated parameters, or corresponding broadcasted parameters, based on whether one or more conditions are fulfilled or not. 22. The method of claim 21, wherein acting for inter-RAT access selection according to the one or more received dedicated parameters, updated dedicated parameters, or corresponding broadcasted parameters, based on whether one or more conditions are fulfilled or not, comprises one or more out of:
when one or more conditions are fulfilled, continuing to act according to the one or more received dedicated parameters; when the one or more conditions are fulfilled, acting according to one or more updated dedicated parameters, updated based on changes to corresponding one or more broadcast parameters; when the one or more conditions are not fulfilled or are no longer fulfilled, considering the one or more dedicated parameters obsolete; when the one or more conditions are not fulfilled or are no longer fulfilled, acting according to one or more updated dedicated parameters, updated based on changes to corresponding one or more broadcast parameters; and when the one or more conditions are not fulfilled or are no longer fulfilled, acting according to the corresponding broadcasted parameters. 23. The method of claim 21, wherein the terminal has changed cell from a first cell to a second cell, wherein the terminal has received an indication from a network node, which indication relates to a set of cells, and wherein the one or more conditions for acting for inter-RAT access selection comprise whether or not the second cell is one of the cells in the set of cells. 24. The method of claim 21, wherein the conditions are any one or more out of:
conditions relating to parameters of a second cell, after the terminal has changed cell from a first cell to the second cell; conditions relating to the broadcast parameters being changed; and conditions relating to the terminal having performed less than a number of cell changes since the dedicated threshold was received. 25. The method of claim 22, further comprising considering the one or more dedicated parameters obsolete, and acting according to the received broadcasted parameters. 26. The method of claim 22 further comprising considering the one or more dedicated parameters obsolete, and acquiring one or more new dedicated parameters by a Radio Access network (RAN). 27. The method of claim 21, wherein acting for inter-RAT access selection is performed when the terminal is not able to receive or is configured not to receive dedicated parameters any more. 28. The method of claim 21, wherein acting for inter-RAT access selection is performed by updating the one or more dedicated parameters by considering a change of the corresponding one or more broadcasted parameters. 29. The method of claim 28, wherein the one or more dedicated parameters are updated by multiplying a change of the broadcasted parameters with a scaling factor. 30. The method of claim 21, wherein the one or more conditions comprises that the broadcasted one or more parameters in the second cell corresponding to the one or more dedicated parameters is equal to, or is close to by a threshold to the one or more broadcasted parameters of the first cell in which the dedicated parameters were received. 31. A terminal for inter-RAT access selection, the terminal being capable to operate in one or more Radio Access Technologies (RATs), wherein the terminal comprises a transceiver configured to transmit and receive radio signals, and
a processing circuit configured to:
receive from a network node, one or more dedicated parameters relating to inter-RAT access selection,
receive from the network node, one or more broadcasted parameters relating to inter-RAT access selection, which one or more broadcasted parameters at least partly correspond to the respective one or more dedicated parameters, and which one or more broadcasted parameters relates to inter-RAT access selection, and
act for inter-RAT access selection according to any one out of:
one or more updated dedicated parameters, updated based on changes to corresponding one or more broadcast parameters; and
any one out of the one or more received dedicated parameters, updated dedicated parameters, or corresponding broadcasted parameters, based on whether one or more conditions are fulfilled or not. 32. The terminal of claim 31, wherein processing circuit further is configured to act for inter-RAT access selection according to the one or more received dedicated parameters, updated dedicated parameters, or corresponding broadcasted parameters, based on whether one or more conditions are fulfilled or not, comprises one or more out of:
when one or more conditions are fulfilled, continuing to act according to the one or more received dedicated parameters; when the one or more conditions are fulfilled, act according to one or more updated dedicated parameters, updated based on changes to corresponding one or more broadcast parameters; when the one or more conditions are not fulfilled or are no longer fulfilled, consider the one or more dedicated parameters obsolete; and when the one or more conditions are not fulfilled or are no longer fulfilled, act according to one or more updated dedicated parameters, updated based on changes to corresponding one or more broadcast parameters; and when the one or more conditions are not fulfilled or are no longer fulfilled, act according to the corresponding broadcasted parameters. 33. The terminal of claim 31, wherein the terminal has changed cell from a first cell to a second cell, wherein the terminal has received an indication from a network node, which indication relates to a set of cells, and wherein the one or more conditions for acting for inter-RAT access selection comprise whether or not the second cell is one of the cells in the set of cells. 34. The terminal of claim 30, wherein the conditions are any one or more out of:
conditions relating to parameters of a second cell, after the terminal has changed cell from a first cell to the second cell; conditions relating to the broadcast parameters being changed; and conditions relating to the terminal having performed less than a number of cell changes since the dedicated threshold was received. 35. The terminal of claim 32, wherein the one or more dedicated parameters are considered obsolete, the terminal further being configured to act according to the received broadcasted parameters. 36. The terminal of claim 32, wherein the processing circuit is configured to considering the one or more dedicated parameters obsolete, the processing circuit further being configured to acquire one or more new dedicated parameters by a Radio Access network (RAN). 37. The terminal according to of claim 31, wherein the processing circuit further is configured to act for inter-RAT access selection when the terminal is not able to receive or is configured not to receive dedicated parameters any more. 38. The terminal of claim 31, wherein the processing circuit further is configured to act for inter-RAT access selection comprising to update the one or more dedicated parameters by considering a change of the corresponding one or more broadcasted parameters. 39. The terminal of claim 38, wherein the one or more dedicated parameters are updated by multiplying a change of the broadcasted threshold with a scaling factor. 40. The terminal of claim 31, wherein the one or more conditions comprises that the broadcasted one or more parameters in the second cell corresponding to the one or more dedicated parameters is equal to, or is close to by a threshold, to the one or more broadcasted parameters of the first cell in which the dedicated thresholds were received. | 2,400 |
7,752 | 7,752 | 14,220,962 | 2,487 | Provided are technologies that may perform intra coding of a super macro block that is an enlarged macro block. In this case, the super macro block is handled as a single entity or may be divided into a plurality of macro blocks. The present invention may perform intra coding both when the super macro block is handled as the single entity and when the super macro block is divided into the plurality of macro blocks. | 1. A method of performing video decoding in block units, the method comprising:
receiving a bit stream comprising a flag indicating whether a first block is split into four second blocks; and reconstructing the first block or the four second blocks by performing entropy decoding, dequantization, inverse transformation, and intra prediction on the bit stream based on the flag. 2. The method of claim 1, wherein at least one of the four second blocks is recursively split into four third blocks based on a quad-tree structure according to a flag indicating whether the second block is split into four third blocks. 3. The method of claim 1, wherein the bit stream further comprises a header comprising information on a size of the first block; and
the reconstructing comprises reconstructing the first block or the four second blocks by performing the entropy decoding, the dequantization, the inverse transformation, and the intra prediction on the bit stream based on the flag and the information on the size of the first block. 4. The method of claim 1, wherein a size of the first block is 16×16, 32×32, or 64×64. 5. The method of claim 1, further comprising recognizing that the first block is encoded based on the four second blocks in response to the flag indicating that the first block is split into the four second blocks. 6. The method of claim 1, further comprising recognizing that the first block is encoded based on the first block in response to the flag indicating that the first block is not split into the four second blocks. 7. The method of claim 1, wherein in response to a size of a picture comprising the first block not being an integer multiple of a size of the first block, the bit stream further comprises information indicating whether a block having a smaller size than the size of the first block is a last block in a slice. 8. A non-transitory computer-readable storage medium storing a program for controlling a computer to perform a method of video decoding in block units, the method comprising:
receiving a bit stream comprising a flag indicating whether a first block is split into four second blocks; and reconstructing the first block or the four second blocks by performing entropy decoding, dequantization, inverse transformation, and intra prediction on the bit stream based on the flag. 9. The storage medium of claim 8, wherein at least one of the four second blocks is recursively split into four third blocks based on a quad-tree structure according to a flag indicating whether the second block is split into four third blocks. 10. The storage medium of claim 8, wherein the bit stream further comprises a header comprising information on a size of the first block; and
the reconstructing comprise reconstructing the first block or the four second blocks by performing the entropy decoding, the dequantization, the inverse transformation, and the intra prediction on the bit stream based on the flag and the information on the size of the first block. 11. The storage medium of claim 8, wherein a size of the first block is 16×16, 32×32, or 64×64. 12. The storage medium of claim 8, further comprising recognizing that the first block is encoded based on the four second blocks in response to the flag indicating that the first block is split into the four second blocks. 13. The storage medium of claim 8, further comprising recognizing that the first block is encoded based on the first block in response to the flag indicating that the first block is not split into the four second blocks. 14. The storage medium of claim 8, wherein in response to a size of a picture comprising the first block not being an integer multiple of a size of the first block, the bit stream further comprises information indicating whether a block having a smaller size than the size of the first block is a last block in a slice. | Provided are technologies that may perform intra coding of a super macro block that is an enlarged macro block. In this case, the super macro block is handled as a single entity or may be divided into a plurality of macro blocks. The present invention may perform intra coding both when the super macro block is handled as the single entity and when the super macro block is divided into the plurality of macro blocks.1. A method of performing video decoding in block units, the method comprising:
receiving a bit stream comprising a flag indicating whether a first block is split into four second blocks; and reconstructing the first block or the four second blocks by performing entropy decoding, dequantization, inverse transformation, and intra prediction on the bit stream based on the flag. 2. The method of claim 1, wherein at least one of the four second blocks is recursively split into four third blocks based on a quad-tree structure according to a flag indicating whether the second block is split into four third blocks. 3. The method of claim 1, wherein the bit stream further comprises a header comprising information on a size of the first block; and
the reconstructing comprises reconstructing the first block or the four second blocks by performing the entropy decoding, the dequantization, the inverse transformation, and the intra prediction on the bit stream based on the flag and the information on the size of the first block. 4. The method of claim 1, wherein a size of the first block is 16×16, 32×32, or 64×64. 5. The method of claim 1, further comprising recognizing that the first block is encoded based on the four second blocks in response to the flag indicating that the first block is split into the four second blocks. 6. The method of claim 1, further comprising recognizing that the first block is encoded based on the first block in response to the flag indicating that the first block is not split into the four second blocks. 7. The method of claim 1, wherein in response to a size of a picture comprising the first block not being an integer multiple of a size of the first block, the bit stream further comprises information indicating whether a block having a smaller size than the size of the first block is a last block in a slice. 8. A non-transitory computer-readable storage medium storing a program for controlling a computer to perform a method of video decoding in block units, the method comprising:
receiving a bit stream comprising a flag indicating whether a first block is split into four second blocks; and reconstructing the first block or the four second blocks by performing entropy decoding, dequantization, inverse transformation, and intra prediction on the bit stream based on the flag. 9. The storage medium of claim 8, wherein at least one of the four second blocks is recursively split into four third blocks based on a quad-tree structure according to a flag indicating whether the second block is split into four third blocks. 10. The storage medium of claim 8, wherein the bit stream further comprises a header comprising information on a size of the first block; and
the reconstructing comprise reconstructing the first block or the four second blocks by performing the entropy decoding, the dequantization, the inverse transformation, and the intra prediction on the bit stream based on the flag and the information on the size of the first block. 11. The storage medium of claim 8, wherein a size of the first block is 16×16, 32×32, or 64×64. 12. The storage medium of claim 8, further comprising recognizing that the first block is encoded based on the four second blocks in response to the flag indicating that the first block is split into the four second blocks. 13. The storage medium of claim 8, further comprising recognizing that the first block is encoded based on the first block in response to the flag indicating that the first block is not split into the four second blocks. 14. The storage medium of claim 8, wherein in response to a size of a picture comprising the first block not being an integer multiple of a size of the first block, the bit stream further comprises information indicating whether a block having a smaller size than the size of the first block is a last block in a slice. | 2,400 |
7,753 | 7,753 | 14,411,877 | 2,486 | An endoscope that integrates the functions of an optical tower into a portable device, while eliminating the use of cords or cables that carry light, video signals or images, and power to the endoscope that may interfere with the movement of a surgeon and the members of the surgical team, or other operators in non-medical related applications is provided. The endoscope incorporates a camera, an image processor, a light source, a transmitter, a communication interface, a control interface, and one or more of a power source in a single portable unit or enclosure. The camera is in electrical communication with the image processor and supplies images and video to the image processor obtained via an elongated endoscope tube. The light source illuminates a viewing field of the endoscope via the elongated tube. | 1. An endoscope integrating functionality of an optical tower comprising:
an enclosure integrating the functionality of the optical tower, said enclosure containing said light source; an elongated endoscope tube; a camera; an image processor, said camera in electrical communication with said image processor and supplies images and video to said image processor obtained via said elongated endoscope tube; a light source, illuminating a viewing field of said endoscope via said elongated tube; a transmitter module; a communication interface; a control interface; and one or more of a power source, said one or more of said power source supplies powering said camera, said image processor, said light source, and said transmitter module. 2. The endoscope of claim 1 wherein said controls interface provides a user with the ability to control at least one of lighting intensity with said lighting module, said camera, parameters of imaging, communication parameters of said transmitter module and said communication interface. 3. The endoscope of claim 1 wherein the images are captured via a bundle of glass fibers that collect at a distal end of said elongated tube and provide the images to said camera and image processor at the proximal end of said elongated tube. 4. The endoscope of claim 1 wherein said transmitter module broadcasts the images and video obtained from said camera and image processor via predefined frequencies and protocols including at least one of WiFi (802.11 a,b,g,n), WiMax, or cellular. 5. The endoscope of claim 4 wherein said broadcasts are encrypted. 6. The endoscope of claim 1 wherein said communication interface routes the broadcast signals to an antenna. 7. The endoscope of claim 1 wherein said communication interface takes the image and videos and routes the image and videos to a cable interface for a wired connection. 8. The endoscope of claim 7 wherein the wired connection comprises at least one of composite video, s-video, universal serial bus (USB), high definition media interface (HDMI), digital video interface (DVI), or coax cable. 9. The endoscope of claim 1 wherein said transmitter module is configured for user selectable transmission frequencies and video channels for the endoscope to account for interfering signals. 10. The endoscope of claim 1 wherein said transmitter module is configured for the user to switch between two or more video channels to access additional informational content or operating room views. 11. The endoscope of claim 1 wherein said transmitter module is configured to overlay images onto a video feed from said camera is from another source or piece of medical equipment or monitoring device. 12. The endoscope of claim 11 wherein the overlay images represent at least one of patient vital sign information, augmented reality images, scans from computed tomography (CT), x-ray, or magnetic resonance imaging (MRI). 13. The endoscope of claim 1 wherein said power supply is directly connected to an AC electrical outlet. 14. The endoscope of claim 1 wherein said power supply is a battery. 15. The endoscope of claim 14 wherein said battery is rechargeable, said rechargeable battery is charged while connected to an outlet, or via a communication cable. 16. The endoscope of claim 1 wherein said endoscope is in wired or wireless contact with one or more personal viewers configured with a heads up display (HUD). 17. The endoscope of claim 1 wherein said endoscope is in wired or wireless contact with one or more presentation devices of a tablet, computer monitor, or a television. 18. The endoscope of claim 1 further comprising a conduit. 19. The endoscope of claim 1 wherein said one or more of said power source supplies act as a power source to peripheral devices, including, but not limited to, a vacuum device or other medical assist devices, via a USB connector or DC power receptacle built in to said enclosure. 20. The endoscope of claim 1 wherein said transmitter module is configured for a user to switch between two or more video channels to access shared views between two or more additional users operating additional endoscopes. | An endoscope that integrates the functions of an optical tower into a portable device, while eliminating the use of cords or cables that carry light, video signals or images, and power to the endoscope that may interfere with the movement of a surgeon and the members of the surgical team, or other operators in non-medical related applications is provided. The endoscope incorporates a camera, an image processor, a light source, a transmitter, a communication interface, a control interface, and one or more of a power source in a single portable unit or enclosure. The camera is in electrical communication with the image processor and supplies images and video to the image processor obtained via an elongated endoscope tube. The light source illuminates a viewing field of the endoscope via the elongated tube.1. An endoscope integrating functionality of an optical tower comprising:
an enclosure integrating the functionality of the optical tower, said enclosure containing said light source; an elongated endoscope tube; a camera; an image processor, said camera in electrical communication with said image processor and supplies images and video to said image processor obtained via said elongated endoscope tube; a light source, illuminating a viewing field of said endoscope via said elongated tube; a transmitter module; a communication interface; a control interface; and one or more of a power source, said one or more of said power source supplies powering said camera, said image processor, said light source, and said transmitter module. 2. The endoscope of claim 1 wherein said controls interface provides a user with the ability to control at least one of lighting intensity with said lighting module, said camera, parameters of imaging, communication parameters of said transmitter module and said communication interface. 3. The endoscope of claim 1 wherein the images are captured via a bundle of glass fibers that collect at a distal end of said elongated tube and provide the images to said camera and image processor at the proximal end of said elongated tube. 4. The endoscope of claim 1 wherein said transmitter module broadcasts the images and video obtained from said camera and image processor via predefined frequencies and protocols including at least one of WiFi (802.11 a,b,g,n), WiMax, or cellular. 5. The endoscope of claim 4 wherein said broadcasts are encrypted. 6. The endoscope of claim 1 wherein said communication interface routes the broadcast signals to an antenna. 7. The endoscope of claim 1 wherein said communication interface takes the image and videos and routes the image and videos to a cable interface for a wired connection. 8. The endoscope of claim 7 wherein the wired connection comprises at least one of composite video, s-video, universal serial bus (USB), high definition media interface (HDMI), digital video interface (DVI), or coax cable. 9. The endoscope of claim 1 wherein said transmitter module is configured for user selectable transmission frequencies and video channels for the endoscope to account for interfering signals. 10. The endoscope of claim 1 wherein said transmitter module is configured for the user to switch between two or more video channels to access additional informational content or operating room views. 11. The endoscope of claim 1 wherein said transmitter module is configured to overlay images onto a video feed from said camera is from another source or piece of medical equipment or monitoring device. 12. The endoscope of claim 11 wherein the overlay images represent at least one of patient vital sign information, augmented reality images, scans from computed tomography (CT), x-ray, or magnetic resonance imaging (MRI). 13. The endoscope of claim 1 wherein said power supply is directly connected to an AC electrical outlet. 14. The endoscope of claim 1 wherein said power supply is a battery. 15. The endoscope of claim 14 wherein said battery is rechargeable, said rechargeable battery is charged while connected to an outlet, or via a communication cable. 16. The endoscope of claim 1 wherein said endoscope is in wired or wireless contact with one or more personal viewers configured with a heads up display (HUD). 17. The endoscope of claim 1 wherein said endoscope is in wired or wireless contact with one or more presentation devices of a tablet, computer monitor, or a television. 18. The endoscope of claim 1 further comprising a conduit. 19. The endoscope of claim 1 wherein said one or more of said power source supplies act as a power source to peripheral devices, including, but not limited to, a vacuum device or other medical assist devices, via a USB connector or DC power receptacle built in to said enclosure. 20. The endoscope of claim 1 wherein said transmitter module is configured for a user to switch between two or more video channels to access shared views between two or more additional users operating additional endoscopes. | 2,400 |
7,754 | 7,754 | 14,890,340 | 2,468 | Methods for enabling and disabling of muting patterns in Radio Access Network, RAN, nodes for the purpose of allowing better detection and use of reference symbols used for synchronization. An example method for facilitating over-the-air synchronization with a neighboring base station is implemented in a base station operating in a wireless communications network. The method comprises determining ( 1110 ) that a first neighbor cell of a plurality of neighbor cells is interfering with or is likely to interfere with a signal, from the second neighbor cell, that is used for synchronization. The method further comprises sending ( 1120 ), towards the first neighbor cell and in response to said determining, a request for activation of a reference signal muting pattern by the first neighbor cell. | 1-65. (canceled) 66. A method, in a base station operating in a wireless communications network, for facilitating over-the-air synchronization with a neighboring base station, the method comprising:
determining that a first neighbor cell of a plurality of neighbor cells is interfering with or is likely to interfere with a signal, from the second neighbor cell, that is used for synchronization; and sending towards the first neighbor cell, in response to said determining, a request for activation of a reference signal muting pattern by the first neighbor cell. 67. The method of claim 66, further comprising subsequently determining that the signal from the second neighbor cell is not needed or is unavailable for synchronization and, in response, sending a message, towards the first neighbor cell, indicating that the reference signal muting pattern may be deactivated. 68. The method of claim 66, wherein the request for activation is sent to a controlling node in the wireless communications network, wherein the controlling node controls a base station corresponding to the second cell. 69. The method of claim 66, wherein the request for activation is sent to a base station corresponding to the second cell. 70. The method of claim 66, further comprising determining that the second neighbor cell is a desired synchronization source, prior to determining that the first neighbor cell is interfering with or is likely to interfere with the second neighbor cell, by receiving synchronization information from at least the second neighbor cell, the synchronization information indicating at least one of a stratum level and synchronization status, and evaluating the received synchronization information. 71. The method of claim 66, further comprising determining that the second neighbor cell is a desired synchronization source, prior to determining that the first neighbor cell is interfering with or is likely to interfere with the second neighbor cell, based at least in part on a signal strength of a signal received from the second neighbor cell. 72. The method of claim 66, further comprising receiving an indication of whether a reference signal muting pattern is available for the first neighbor cell, wherein said sending of the request is responsive to receiving said indication. 73. The method of claim 72, wherein the indication comprises or is associated with an identification of one or more muting patterns available for the first neighbor cell. 74. The method of claim 66, wherein the request for activation of the reference signal muting pattern includes a list of cells for which a muting pattern should be applied. 75. The method of claim 66, wherein the request for activation of the reference signal muting pattern includes an identification of one or more resources that should be muted. 76. The method of claim 75, wherein the identification of one or more resources that should be muted comprises a subframe pattern, or a pattern periodicity, or both. 77. The method of claim 66, further comprising performing synchronization based on the signal from the second neighbor cell. 78. The method of claim 66, further comprising receiving information identifying which resources are being muted or are to be muted by the first neighbor cell. 79. A method, in a base station operating in a wireless communications network, for facilitating over-the-air synchronization by a neighboring base station, the method comprising:
receiving a request for activation of a reference signal muting pattern for a cell supported by the base station; and activating the reference signal muting pattern in response to the request. 80. The method of claim 79, further comprising subsequently receiving a request to deactivate the reference signal muting pattern and, in response, deactivating the reference signal muting pattern. 81. The method of claim 79, further comprising first receiving a request for synchronization information and responding with synchronization information that includes at least an indication that one or more reference signal muting patterns is/are available. 82. The method of claim 81, wherein the synchronization information comprises an identification of one or more resources that are muted in at least a first reference signal muting pattern. 83. The method of claim 82, wherein the identification of one or more resources that are muted comprises a subframe pattern, or a pattern periodicity, or both. 84. The method of claim 79, wherein the request for activation is received from another base station via a base station-to-base station interface. 85. The method of claim 79, wherein the request for activation is received from a controlling node in the wireless communications network. 86. A method, in a control node operating in a wireless communications network, for facilitating over-the-air synchronization by a first base station with a first neighbor cell of a plurality of neighbor cells, the method comprising:
receiving a first message from the first base station, the first message indicating that reference signal muting by at least a second neighbor cell of the plurality of neighbor cells is needed; and sending a second message to at least a second base station, corresponding to the second neighbor cell, the second message requesting activation of a reference signal muting pattern for the second neighbor cell. 87. The method of claim 86, further comprising sending the second message or a corresponding message to at least a third base station corresponding to a third neighbor cell, such that the second message or corresponding message requests activation of a reference signal muting pattern for the third neighbor cell. 88. A base station apparatus comprising:
a communications interface circuit configured to communicate with one or more other base stations or with one or more control nodes, or one or more of each; and a processing circuit configured to control the communications interface circuit and further configured to
determine that a first neighbor cell of a plurality of neighbor cells is interfering with or is likely to interfere with a signal, from the second neighbor cell, that is used for synchronization, and
send towards the first neighbor cell, via the communications interface circuit and in response to said determining, a request for activation of a reference signal muting pattern by the first neighbor cell. 89. The base station apparatus of claim 88, wherein the processing circuit is further configured to subsequently determine that the signal from the second neighbor cell is not needed or is unavailable for synchronization and, in response, send a message towards the first neighbor cell, via the communications interface circuit, the message indicating that the reference signal muting pattern may be deactivated. 90. The base station apparatus of claim 88, wherein the processing circuit is further configured to determine that the second neighbor cell is a desired synchronization source, prior to determining that the first neighbor cell is interfering with or is likely to interfere with the second neighbor cell, by receiving synchronization information from at least the second neighbor cell, via the communications interface circuit, the synchronization information indicating at least one of a stratum level and synchronization status, and evaluating the received synchronization information. 91. The base station apparatus of claim 88, wherein the processing circuit is further configured to determine that the second neighbor cell is a desired synchronization source, prior to determining that the first neighbor cell is interfering with or is likely to interfere with the second neighbor cell, based at least in part on a signal strength of a signal received from the second neighbor cell. 92. The base station apparatus of claim 88, wherein the processing circuit is further configured to receive, via the communications interface circuit, an indication of whether a reference signal muting pattern is available for the first neighbor cell, wherein said sending of the request is responsive to receiving said indication. 93. The base station apparatus of claim 92, wherein the indication comprises or is associated with an identification of one or more muting patterns available for the first neighbor cell. 94. The base station apparatus of claim 88, wherein the request for activation of the reference signal muting pattern includes a list of cells for which a muting pattern should be applied. 95. The base station apparatus of claim 88, wherein the request for activation of the reference signal muting pattern includes an identification of one or more resources that should be muted. 96. The base station apparatus of claim 95, wherein the identification of one or more resources that should be muted comprises a subframe pattern, or a pattern periodicity, or both. 97. The base station apparatus of claim 88, wherein the processing circuit is further configured to perform synchronization based on the signal from the second neighbor cell. 98. The base station apparatus of claim 88, wherein the processing circuit is further configured to receive, via the communications interface circuit, information identifying which resources are being muted or are to be muted by the first neighbor cell. 99. A base station apparatus comprising:
a communications interface circuit configured to communicate with one or more other base stations or with one or more control nodes, or one or more of each; and a processing circuit configured to control the communications interface circuit and further configured to
receive, via the communications interface circuit, a request for activation of a reference signal muting pattern for a cell supported by the base station; and
activate the reference signal muting pattern in response to the request. 100. The base station apparatus of claim 99, wherein the processing circuit is further configured to subsequently receive a request to deactivate the reference signal muting pattern and, in response, deactivate the reference signal muting pattern. 101. The base station apparatus of claim 99, wherein the processing circuit is further configured to first receive a request for synchronization information and to respond with synchronization information that includes at least an indication that one or more reference signal muting patterns is/are available. 102. The base station apparatus of claim 101, wherein the synchronization information comprises an identification of one or more resources that are muted in at least a first reference signal muting pattern. 103. The base station apparatus of claim 102, wherein the identification of one or more resources that are muted comprises a subframe pattern, or a pattern periodicity, or both. 104. A control node apparatus comprising:
a communications interface circuit configured to communicate with a plurality of base stations; and a processing circuit configured to control the communications interface circuit and further configured to:
receive a first message from a first base station, via the communications interface circuit, the first message indicating that reference signal muting by at least a second neighbor cell of the plurality of neighbor cells is needed; and
send, via the communications interface circuit, a second message to at least a second base station corresponding to the second neighbor cell, the second message requesting activation of a reference signal muting pattern for the second neighbor cell. 105. The control node apparatus of claim 104, wherein the control apparatus is further configured to send the second message or a corresponding message to at least a third base station corresponding to a third neighbor cell, such that the second message or corresponding message requests activation of a reference signal muting pattern for the third neighbor cell. | Methods for enabling and disabling of muting patterns in Radio Access Network, RAN, nodes for the purpose of allowing better detection and use of reference symbols used for synchronization. An example method for facilitating over-the-air synchronization with a neighboring base station is implemented in a base station operating in a wireless communications network. The method comprises determining ( 1110 ) that a first neighbor cell of a plurality of neighbor cells is interfering with or is likely to interfere with a signal, from the second neighbor cell, that is used for synchronization. The method further comprises sending ( 1120 ), towards the first neighbor cell and in response to said determining, a request for activation of a reference signal muting pattern by the first neighbor cell.1-65. (canceled) 66. A method, in a base station operating in a wireless communications network, for facilitating over-the-air synchronization with a neighboring base station, the method comprising:
determining that a first neighbor cell of a plurality of neighbor cells is interfering with or is likely to interfere with a signal, from the second neighbor cell, that is used for synchronization; and sending towards the first neighbor cell, in response to said determining, a request for activation of a reference signal muting pattern by the first neighbor cell. 67. The method of claim 66, further comprising subsequently determining that the signal from the second neighbor cell is not needed or is unavailable for synchronization and, in response, sending a message, towards the first neighbor cell, indicating that the reference signal muting pattern may be deactivated. 68. The method of claim 66, wherein the request for activation is sent to a controlling node in the wireless communications network, wherein the controlling node controls a base station corresponding to the second cell. 69. The method of claim 66, wherein the request for activation is sent to a base station corresponding to the second cell. 70. The method of claim 66, further comprising determining that the second neighbor cell is a desired synchronization source, prior to determining that the first neighbor cell is interfering with or is likely to interfere with the second neighbor cell, by receiving synchronization information from at least the second neighbor cell, the synchronization information indicating at least one of a stratum level and synchronization status, and evaluating the received synchronization information. 71. The method of claim 66, further comprising determining that the second neighbor cell is a desired synchronization source, prior to determining that the first neighbor cell is interfering with or is likely to interfere with the second neighbor cell, based at least in part on a signal strength of a signal received from the second neighbor cell. 72. The method of claim 66, further comprising receiving an indication of whether a reference signal muting pattern is available for the first neighbor cell, wherein said sending of the request is responsive to receiving said indication. 73. The method of claim 72, wherein the indication comprises or is associated with an identification of one or more muting patterns available for the first neighbor cell. 74. The method of claim 66, wherein the request for activation of the reference signal muting pattern includes a list of cells for which a muting pattern should be applied. 75. The method of claim 66, wherein the request for activation of the reference signal muting pattern includes an identification of one or more resources that should be muted. 76. The method of claim 75, wherein the identification of one or more resources that should be muted comprises a subframe pattern, or a pattern periodicity, or both. 77. The method of claim 66, further comprising performing synchronization based on the signal from the second neighbor cell. 78. The method of claim 66, further comprising receiving information identifying which resources are being muted or are to be muted by the first neighbor cell. 79. A method, in a base station operating in a wireless communications network, for facilitating over-the-air synchronization by a neighboring base station, the method comprising:
receiving a request for activation of a reference signal muting pattern for a cell supported by the base station; and activating the reference signal muting pattern in response to the request. 80. The method of claim 79, further comprising subsequently receiving a request to deactivate the reference signal muting pattern and, in response, deactivating the reference signal muting pattern. 81. The method of claim 79, further comprising first receiving a request for synchronization information and responding with synchronization information that includes at least an indication that one or more reference signal muting patterns is/are available. 82. The method of claim 81, wherein the synchronization information comprises an identification of one or more resources that are muted in at least a first reference signal muting pattern. 83. The method of claim 82, wherein the identification of one or more resources that are muted comprises a subframe pattern, or a pattern periodicity, or both. 84. The method of claim 79, wherein the request for activation is received from another base station via a base station-to-base station interface. 85. The method of claim 79, wherein the request for activation is received from a controlling node in the wireless communications network. 86. A method, in a control node operating in a wireless communications network, for facilitating over-the-air synchronization by a first base station with a first neighbor cell of a plurality of neighbor cells, the method comprising:
receiving a first message from the first base station, the first message indicating that reference signal muting by at least a second neighbor cell of the plurality of neighbor cells is needed; and sending a second message to at least a second base station, corresponding to the second neighbor cell, the second message requesting activation of a reference signal muting pattern for the second neighbor cell. 87. The method of claim 86, further comprising sending the second message or a corresponding message to at least a third base station corresponding to a third neighbor cell, such that the second message or corresponding message requests activation of a reference signal muting pattern for the third neighbor cell. 88. A base station apparatus comprising:
a communications interface circuit configured to communicate with one or more other base stations or with one or more control nodes, or one or more of each; and a processing circuit configured to control the communications interface circuit and further configured to
determine that a first neighbor cell of a plurality of neighbor cells is interfering with or is likely to interfere with a signal, from the second neighbor cell, that is used for synchronization, and
send towards the first neighbor cell, via the communications interface circuit and in response to said determining, a request for activation of a reference signal muting pattern by the first neighbor cell. 89. The base station apparatus of claim 88, wherein the processing circuit is further configured to subsequently determine that the signal from the second neighbor cell is not needed or is unavailable for synchronization and, in response, send a message towards the first neighbor cell, via the communications interface circuit, the message indicating that the reference signal muting pattern may be deactivated. 90. The base station apparatus of claim 88, wherein the processing circuit is further configured to determine that the second neighbor cell is a desired synchronization source, prior to determining that the first neighbor cell is interfering with or is likely to interfere with the second neighbor cell, by receiving synchronization information from at least the second neighbor cell, via the communications interface circuit, the synchronization information indicating at least one of a stratum level and synchronization status, and evaluating the received synchronization information. 91. The base station apparatus of claim 88, wherein the processing circuit is further configured to determine that the second neighbor cell is a desired synchronization source, prior to determining that the first neighbor cell is interfering with or is likely to interfere with the second neighbor cell, based at least in part on a signal strength of a signal received from the second neighbor cell. 92. The base station apparatus of claim 88, wherein the processing circuit is further configured to receive, via the communications interface circuit, an indication of whether a reference signal muting pattern is available for the first neighbor cell, wherein said sending of the request is responsive to receiving said indication. 93. The base station apparatus of claim 92, wherein the indication comprises or is associated with an identification of one or more muting patterns available for the first neighbor cell. 94. The base station apparatus of claim 88, wherein the request for activation of the reference signal muting pattern includes a list of cells for which a muting pattern should be applied. 95. The base station apparatus of claim 88, wherein the request for activation of the reference signal muting pattern includes an identification of one or more resources that should be muted. 96. The base station apparatus of claim 95, wherein the identification of one or more resources that should be muted comprises a subframe pattern, or a pattern periodicity, or both. 97. The base station apparatus of claim 88, wherein the processing circuit is further configured to perform synchronization based on the signal from the second neighbor cell. 98. The base station apparatus of claim 88, wherein the processing circuit is further configured to receive, via the communications interface circuit, information identifying which resources are being muted or are to be muted by the first neighbor cell. 99. A base station apparatus comprising:
a communications interface circuit configured to communicate with one or more other base stations or with one or more control nodes, or one or more of each; and a processing circuit configured to control the communications interface circuit and further configured to
receive, via the communications interface circuit, a request for activation of a reference signal muting pattern for a cell supported by the base station; and
activate the reference signal muting pattern in response to the request. 100. The base station apparatus of claim 99, wherein the processing circuit is further configured to subsequently receive a request to deactivate the reference signal muting pattern and, in response, deactivate the reference signal muting pattern. 101. The base station apparatus of claim 99, wherein the processing circuit is further configured to first receive a request for synchronization information and to respond with synchronization information that includes at least an indication that one or more reference signal muting patterns is/are available. 102. The base station apparatus of claim 101, wherein the synchronization information comprises an identification of one or more resources that are muted in at least a first reference signal muting pattern. 103. The base station apparatus of claim 102, wherein the identification of one or more resources that are muted comprises a subframe pattern, or a pattern periodicity, or both. 104. A control node apparatus comprising:
a communications interface circuit configured to communicate with a plurality of base stations; and a processing circuit configured to control the communications interface circuit and further configured to:
receive a first message from a first base station, via the communications interface circuit, the first message indicating that reference signal muting by at least a second neighbor cell of the plurality of neighbor cells is needed; and
send, via the communications interface circuit, a second message to at least a second base station corresponding to the second neighbor cell, the second message requesting activation of a reference signal muting pattern for the second neighbor cell. 105. The control node apparatus of claim 104, wherein the control apparatus is further configured to send the second message or a corresponding message to at least a third base station corresponding to a third neighbor cell, such that the second message or corresponding message requests activation of a reference signal muting pattern for the third neighbor cell. | 2,400 |
7,755 | 7,755 | 14,804,286 | 2,498 | The present disclosure describes methods of encrypting and decrypting blocks of data stored in computer readable memory for a device using a block cipher with a nonce. In particular, methods of encrypting and decrypting blocks of data where the value of the nonce is based on previous execution instructions of a program executed by the device for a previously executed block are described. Embodiments disclosed include a method of encrypting blocks of data bits stored in computer readable memory for a device using a block cipher with a nonce and a key, the method comprising for each block of data: generating a value of the nonce based on previous execution instructions of a program executed by the device for a previously executed block of data; and encrypting the block of data with the nonce and key using the block cipher. | 1. A method of encrypting blocks of data bits stored in computer readable memory for a device using a block cipher with a nonce and a key, the method comprising for each block of data:
generating a value of the nonce based on previous execution instructions of a program executed by the device for a previously executed block of data; and encrypting the block of data with the nonce and key using the block cipher. 2. The method according to claim 1, wherein the value of the nonce is unique for each block of data. 3. The method according to claim 1, wherein the step of generating a value of the nonce includes the steps of:
obtaining execution instructions of the block of data; obtaining or determining the previous execution instructions; reading information describing the execution instructions and the previous execution instructions; and embedding the execution instructions and previous execution instructions as information into the value of the nonce. 4. The method according to claim 3, wherein the information comprises an address of the block of data to be encrypted and an address of the previously executed block of data. 5. The method according to claim 3, wherein the information comprises one or more of:
a type of data being encrypted; access rights relating to the data; a status of the device at the time of encryption; a register value indicating a time-iso state of the device; a security status of a data bit received from a security block stored in the computer readable memory at the time of encryption; an address of a previous instruction executed by the device; a value of an instruction count, indicative of the number and/or type of previous instructions executed by the device; an operation code of a previous instruction executed by the device; a stage of an instruction executed by the device; and a magic number, providing a specific value of the nonce. 6. The method according to claim 1, wherein the value of the nonce is dependent upon an operating state of the device. 7. The method according to claim 6, wherein the operating state of the device is a boot, test, user or system mode. 8. The method according to claim 1, wherein the step of encrypting the block of data comprises the steps of:
combining the value of the nonce with the key to provide a cipher; and encrypting the block of data using the cipher. 9. A method of decrypting ciphertext blocks of data stored in computer readable memory for a device using a block cipher with a nonce and a key, the method comprising for each block of data:
generating a value of the nonce based on previous execution instructions of a program executed by the device for a previously executed ciphertext block; and decrypting the block of data with the nonce and key using the block cipher. 10. The method according to claim 9, wherein the value of the nonce is unique for each ciphertext block. 11. The method according to claim 9, wherein the step of generating the value of the nonce comprises the steps of:
obtaining or determining the previous execution instructions of the previously decrypted ciphertext block; obtaining execution instructions of the block of data; and constructing the value of the nonce determined by the previous instructions and the execution instructions. 12. The method according to claim 11, wherein the step of determining the value of the nonce comprises the steps of:
obtaining a hint provided by the previous instruction in the execution instructions, wherein the hint provides instructions of how to construct the value of the nonce based on a change in the flow of execution instructions compared to the previous execution instructions. 13. The method according to claim 9, wherein the value of the nonce is composed from one or more values indicative of:
a type of data being decrypted; access rights relating to the data; a status of the microprocessor; a value of a register indicating a time-iso state of the microprocessor a security status of a data bit received from a security block stored in the computer readable memory; an address of a previous instruction executed by the microprocessor; a value of an instruction count, indicative of the number and/or type of previous instructions executed by the microprocessor; an operation code of a previous instruction executed by the microprocessor; a stage of an instruction executed by the microprocessor; and a magic number, providing a specific value of the nonce. 14. The method according to claim 9, wherein an interruption in the flow of the execution instructions results in an unsuccessful decryption of the blocks of data. 15. An integrated circuit with a microcontroller, said microcontroller comprising:
memory for storing data and code; and a microprocessor for executing code stored in the memory, wherein the microcontroller is configured to undertake the method as described in claim 1. 16. An integrated circuit with a microcontroller, said microcontroller comprising:
memory for storing data and code; and a microprocessor for executing code stored in the memory, wherein the microcontroller is configured to undertake the method as described in claim 9. | The present disclosure describes methods of encrypting and decrypting blocks of data stored in computer readable memory for a device using a block cipher with a nonce. In particular, methods of encrypting and decrypting blocks of data where the value of the nonce is based on previous execution instructions of a program executed by the device for a previously executed block are described. Embodiments disclosed include a method of encrypting blocks of data bits stored in computer readable memory for a device using a block cipher with a nonce and a key, the method comprising for each block of data: generating a value of the nonce based on previous execution instructions of a program executed by the device for a previously executed block of data; and encrypting the block of data with the nonce and key using the block cipher.1. A method of encrypting blocks of data bits stored in computer readable memory for a device using a block cipher with a nonce and a key, the method comprising for each block of data:
generating a value of the nonce based on previous execution instructions of a program executed by the device for a previously executed block of data; and encrypting the block of data with the nonce and key using the block cipher. 2. The method according to claim 1, wherein the value of the nonce is unique for each block of data. 3. The method according to claim 1, wherein the step of generating a value of the nonce includes the steps of:
obtaining execution instructions of the block of data; obtaining or determining the previous execution instructions; reading information describing the execution instructions and the previous execution instructions; and embedding the execution instructions and previous execution instructions as information into the value of the nonce. 4. The method according to claim 3, wherein the information comprises an address of the block of data to be encrypted and an address of the previously executed block of data. 5. The method according to claim 3, wherein the information comprises one or more of:
a type of data being encrypted; access rights relating to the data; a status of the device at the time of encryption; a register value indicating a time-iso state of the device; a security status of a data bit received from a security block stored in the computer readable memory at the time of encryption; an address of a previous instruction executed by the device; a value of an instruction count, indicative of the number and/or type of previous instructions executed by the device; an operation code of a previous instruction executed by the device; a stage of an instruction executed by the device; and a magic number, providing a specific value of the nonce. 6. The method according to claim 1, wherein the value of the nonce is dependent upon an operating state of the device. 7. The method according to claim 6, wherein the operating state of the device is a boot, test, user or system mode. 8. The method according to claim 1, wherein the step of encrypting the block of data comprises the steps of:
combining the value of the nonce with the key to provide a cipher; and encrypting the block of data using the cipher. 9. A method of decrypting ciphertext blocks of data stored in computer readable memory for a device using a block cipher with a nonce and a key, the method comprising for each block of data:
generating a value of the nonce based on previous execution instructions of a program executed by the device for a previously executed ciphertext block; and decrypting the block of data with the nonce and key using the block cipher. 10. The method according to claim 9, wherein the value of the nonce is unique for each ciphertext block. 11. The method according to claim 9, wherein the step of generating the value of the nonce comprises the steps of:
obtaining or determining the previous execution instructions of the previously decrypted ciphertext block; obtaining execution instructions of the block of data; and constructing the value of the nonce determined by the previous instructions and the execution instructions. 12. The method according to claim 11, wherein the step of determining the value of the nonce comprises the steps of:
obtaining a hint provided by the previous instruction in the execution instructions, wherein the hint provides instructions of how to construct the value of the nonce based on a change in the flow of execution instructions compared to the previous execution instructions. 13. The method according to claim 9, wherein the value of the nonce is composed from one or more values indicative of:
a type of data being decrypted; access rights relating to the data; a status of the microprocessor; a value of a register indicating a time-iso state of the microprocessor a security status of a data bit received from a security block stored in the computer readable memory; an address of a previous instruction executed by the microprocessor; a value of an instruction count, indicative of the number and/or type of previous instructions executed by the microprocessor; an operation code of a previous instruction executed by the microprocessor; a stage of an instruction executed by the microprocessor; and a magic number, providing a specific value of the nonce. 14. The method according to claim 9, wherein an interruption in the flow of the execution instructions results in an unsuccessful decryption of the blocks of data. 15. An integrated circuit with a microcontroller, said microcontroller comprising:
memory for storing data and code; and a microprocessor for executing code stored in the memory, wherein the microcontroller is configured to undertake the method as described in claim 1. 16. An integrated circuit with a microcontroller, said microcontroller comprising:
memory for storing data and code; and a microprocessor for executing code stored in the memory, wherein the microcontroller is configured to undertake the method as described in claim 9. | 2,400 |
7,756 | 7,756 | 14,070,430 | 2,488 | Systems and methods for building a three-dimensional composite scene are disclosed. Certain embodiments of the systems and methods may include the use of a three-dimensional capture device that captures a plurality of three-dimensional images of an environment. Some embodiments may further include elements concerning aligning and/or mapping the captured images. Various embodiments may further include elements concerning reconstructing the environment from which the images were captured. The methods disclosed herein may be performed by a program embodied on a non-transitory computer-readable storage medium when executed the program is executed a processor. | 1. A system for building a three-dimensional composite scene, the system comprising:
a three-dimensional capture device for capturing a plurality of three-dimensional images of an environment; a processor for executing instructions stored in memory, wherein execution of the instructions by the processor aligns the plurality of three-dimensional images in a common space to obtain mapping data regarding the environment; and a rendering device for displaying a three-dimensional construction of the environment based on the mapping data. | Systems and methods for building a three-dimensional composite scene are disclosed. Certain embodiments of the systems and methods may include the use of a three-dimensional capture device that captures a plurality of three-dimensional images of an environment. Some embodiments may further include elements concerning aligning and/or mapping the captured images. Various embodiments may further include elements concerning reconstructing the environment from which the images were captured. The methods disclosed herein may be performed by a program embodied on a non-transitory computer-readable storage medium when executed the program is executed a processor.1. A system for building a three-dimensional composite scene, the system comprising:
a three-dimensional capture device for capturing a plurality of three-dimensional images of an environment; a processor for executing instructions stored in memory, wherein execution of the instructions by the processor aligns the plurality of three-dimensional images in a common space to obtain mapping data regarding the environment; and a rendering device for displaying a three-dimensional construction of the environment based on the mapping data. | 2,400 |
7,757 | 7,757 | 13,966,846 | 2,467 | A method and apparatus for call handling control comprises receiving, from a first device, call handling information directed towards a second device, wherein a call is currently established between the first device and the second device and transmitting the call handling information to the second device, wherein the call handling information comprises feature activation instructions for the second device. | 1. A method for call handling control comprising:
receiving, from a first device, call handling information directed towards a second device, wherein a call is currently established between the first device and the second device; and transmitting the call handling information to the second device, wherein the call handling information comprises feature activation instructions for the second device. 2. The method of claim 1 further comprising:
embedding a user specified uniform resource locator (URL) into the call handling information. 3. The method of claim 2 wherein the URL links to a script comprising a set of programmatic statements for execution on the second device. 4. The method of claim 3, further comprising:
embedding a media URL into the script for playing on the second device. 5. The method of claim 4, wherein the media comprises at least one of a text file, an audio file, a video file, or an image. 6. The method of claim 1 wherein the call handling information comprises conditional logic, the conditional logic comprising at least:
determining whether the second device is in a particular state, and if the second device is in the particular state, performing an action according to a script. 7. The method of claim 1 further comprising:
instructing the second device to enable one or more cameras on the second device. 8. The method of claim 7 further comprising:
instructing the second device to toggle a primary camera from the one or more cameras. 9. The method of claim 6, wherein the action comprises at least one of adjusting a volume of the second device, displaying a file or playing a media file. 10. The method of claim 1 wherein the call handling information is embedded into a content portion of a signaling protocol message. 11. The method of claim 10, wherein the call handling information may comprise a uniform resource locator to media content, the media content comprising at least one of a text file, an audio file, a video file, or an image. 12. The method of claim 1 further comprising:
composing actions contained in the call handling information based on input received by a user of the first device through a user interface displayed on the first device. 13. The method of claim 12 further comprising:
receiving, from the second device, a message indicating available functionality and device type of the second device; and
generating the user interface based on the available functionality and the device type of the second device. 14. A method for call handling control comprising:
receiving call handling information from a first device at a second device; and performing actions on the second device according to the call handling information, wherein the call handling information is received while a call is ongoing between the first device and the second device. 15. The method of claim 14, wherein the actions comprise at least one of displaying a file, playing a media file, and executing an application. 16. The method of claim 14 further comprising at least one of adjusting volume of the second device based on the call handling information and enabling one or more cameras on the second device based on the call handling information. 17. The method of claim 14 further comprising:
receiving the call handling information via a session initiation protocol (SIP) message. 18. The method of claim 17 wherein the SIP message is a SIP NOTIFY message. 19. An apparatus for outgoing call handling control comprising:
a parameter module, executed by a processor, that receives call handling information directed towards a second device, wherein the a call is currently established between a first device and the second device; and a voice over internet protocol (VoIP) application, executed by the processor, that transmits the call handling information to the second device, wherein the call handling information comprises feature activation instructions for the second device. 20. A method for call handling comprising:
receiving, from a first device, an incoming call request directed to a second device, wherein the call request contains call handling information; and transmitting an outgoing call request to the second device, wherein the outgoing call request is based at least in part upon the call handling information. | A method and apparatus for call handling control comprises receiving, from a first device, call handling information directed towards a second device, wherein a call is currently established between the first device and the second device and transmitting the call handling information to the second device, wherein the call handling information comprises feature activation instructions for the second device.1. A method for call handling control comprising:
receiving, from a first device, call handling information directed towards a second device, wherein a call is currently established between the first device and the second device; and transmitting the call handling information to the second device, wherein the call handling information comprises feature activation instructions for the second device. 2. The method of claim 1 further comprising:
embedding a user specified uniform resource locator (URL) into the call handling information. 3. The method of claim 2 wherein the URL links to a script comprising a set of programmatic statements for execution on the second device. 4. The method of claim 3, further comprising:
embedding a media URL into the script for playing on the second device. 5. The method of claim 4, wherein the media comprises at least one of a text file, an audio file, a video file, or an image. 6. The method of claim 1 wherein the call handling information comprises conditional logic, the conditional logic comprising at least:
determining whether the second device is in a particular state, and if the second device is in the particular state, performing an action according to a script. 7. The method of claim 1 further comprising:
instructing the second device to enable one or more cameras on the second device. 8. The method of claim 7 further comprising:
instructing the second device to toggle a primary camera from the one or more cameras. 9. The method of claim 6, wherein the action comprises at least one of adjusting a volume of the second device, displaying a file or playing a media file. 10. The method of claim 1 wherein the call handling information is embedded into a content portion of a signaling protocol message. 11. The method of claim 10, wherein the call handling information may comprise a uniform resource locator to media content, the media content comprising at least one of a text file, an audio file, a video file, or an image. 12. The method of claim 1 further comprising:
composing actions contained in the call handling information based on input received by a user of the first device through a user interface displayed on the first device. 13. The method of claim 12 further comprising:
receiving, from the second device, a message indicating available functionality and device type of the second device; and
generating the user interface based on the available functionality and the device type of the second device. 14. A method for call handling control comprising:
receiving call handling information from a first device at a second device; and performing actions on the second device according to the call handling information, wherein the call handling information is received while a call is ongoing between the first device and the second device. 15. The method of claim 14, wherein the actions comprise at least one of displaying a file, playing a media file, and executing an application. 16. The method of claim 14 further comprising at least one of adjusting volume of the second device based on the call handling information and enabling one or more cameras on the second device based on the call handling information. 17. The method of claim 14 further comprising:
receiving the call handling information via a session initiation protocol (SIP) message. 18. The method of claim 17 wherein the SIP message is a SIP NOTIFY message. 19. An apparatus for outgoing call handling control comprising:
a parameter module, executed by a processor, that receives call handling information directed towards a second device, wherein the a call is currently established between a first device and the second device; and a voice over internet protocol (VoIP) application, executed by the processor, that transmits the call handling information to the second device, wherein the call handling information comprises feature activation instructions for the second device. 20. A method for call handling comprising:
receiving, from a first device, an incoming call request directed to a second device, wherein the call request contains call handling information; and transmitting an outgoing call request to the second device, wherein the outgoing call request is based at least in part upon the call handling information. | 2,400 |
7,758 | 7,758 | 14,837,320 | 2,482 | One or more system, apparatus, method, and computer readable media is described for reducing the GOP length during a direct pass-through of an encoded video stream format that is supported by the decoder at the sink. In some embodiments, the encoded video stream is decoded on the source device and employed to generate and insert supplemental intra-predicted frames (I-frames) at shorter intervals allowing for faster recovery in the event of lost packets/frames when transmitted to a sink display. In some embodiments, Residual Artifact Suppressed (RAS) inter-predicted frames are further created and inserted in place of any frames that reference a frame converted to a supplemental I-frame. The encoded video stream passed through will consist of all the original frames except for the supplemental I-frames reducing the GOP, and RAS inter-predicted frames modified to prevent propagation of residual induced artifacts. | 1. An image frame display source apparatus, comprising:
an audio/video (AV) pipeline to access an encoded video stream from a storage device, the encoded video stream comprising a group of pictures (GOP) including a plurality of inter-predicted frames referencing a first intra-predicted frame; one or more processors to modify the encoded video stream with a selective transcoding of only a subset of the inter-predicted frames in the GOP, the selective transcoding including a transcoding of a first subset of the inter-predicted frames into second intra-predicted frames; and a physical layer device to communicate the modified encoded video stream through a transmission protocol. 2. The apparatus of claim 1, wherein to transcode a first inter-predicted frame in the first subset, the processors are further to:
decode the GOP; and encode a reconstructed first image frame decoded from the first inter-predicted frame into one of the second intra-predicted frames. 3. The apparatus of claim 1, wherein the processors are further to:
select a second subset of the inter-predicted frames, each frame in the second subset referencing one or more of the inter-predicted frames included in the first subset; transcode the second subset of inter-predicted frames into second inter-predicted frames; and modify the encoded video stream by inserting the second inter-predicted frames in place of the second subset of inter-predicted frames, each second inter-predicted frame replacing a corresponding frame in the second subset. 4. The apparatus of claim 3, wherein a second inter-predicted frame included in the second subset references the first inter-predicted frame included in the first subset; and
the processors are to transcode the second inter-predicted frame into a modified inter-predicted frame based on residuals between the second intra-predicted frame and the first inter-predicted frame. 5. The apparatus of claim 4, wherein to transcode the second inter-predicted frame, the processors are further to:
decode the second intra-predicted frame into a reconstructed first image; decode the second inter-predicted frame into a reconstructed second image; generate residuals between the reconstructed first and second images; and encode the residuals into the modified second inter-predicted frame. 6. The apparatus of claim 1, wherein:
to transcode the first subset of the inter-predicted frames, the processors are to:
select a plurality of first inter-predicted frames based on a length of the GOP and a predetermined GOP length threshold; and
transcode each of the plurality of first inter-predicted frames into a plurality of second intra-predicted frames; and
to modify the encoded video stream, the processors are to divide the GOP into a plurality of smaller picture groups having lengths less than the threshold by inserting each of the second intra-predicted frames into the encoded video stream in place of a corresponding one of the first inter-predicted frames. 7. The apparatus of claim 6, wherein the processors are further to transcode each frame in a second subset of the inter-predicted frames, each frame in the second subset referencing at least one of the first inter-predicted frames into a modified inter-predicted frame based on residuals between one of the second intra-predicted frames and a corresponding one of the second inter-predicted frames. 8. The apparatus of claim 1, wherein the physical layer device further comprises a wireless radio to wirelessly transmit the modified encoded video stream to a sink device. 9. A wireless display system, comprising:
the source apparatus of claim 1; and a sink apparatus to:
decode the modified video stream into reconstructed image frames;
render the reconstructed image frames; and
present the rendered frames on a display screen. 10. A method for direct pass-through of an encoded video stream, the method comprising:
accessing the encoded video stream from a storage device, the encoded video stream comprising a group of pictures (GOP) including a plurality of inter-predicted frames referencing a first intra-predicted frame; modifying the encoded video stream by selectively transcoding only a subset of the inter-predicted frames in the GOP, the selective transcoding including transcoding a first subset of the inter-predicted frames into second intra-predicted frames; and transmitting the modified encoded video stream over a physical layer device. 11. The method of claim 10, wherein transcoding a first inter-predicted frame in the first subset further comprises:
decoding the GOP; and encoding a reconstructed first image frame decoded from the first inter-predicted frame into one of the second intra-predicted frames. 12. The method of claim 10, wherein transcoding the first inter-predicted frame further comprises:
selecting one of the inter-predicted frames in the GOP, the selected inter-predicted frame immediately following a second of the inter-predicted frames in the GOP; transcoding the selected inter-predicted frame into the second intra-predicted frame; and modifying the encoded video stream by inserting the second intra-predicted frame immediately following the second of the inter-predicted frames, in place of the selected inter-predicted frame. 13. The method of claim 10, further comprising:
selecting a second subset of the inter-predicted frames, each frame in the second subset referencing one or more of the inter-predicted frames included in the first subset; transcoding the second subset of inter-predicted frames into second inter-predicted frames; and modifying the encoded video stream by inserting the second inter-predicted frames in place of the second subset of inter-predicted frames, each second inter-predicted frame replacing a corresponding frame within the second subset. 14. The method of claim 13, wherein transcoding the second inter-predicted frame further comprises:
decoding the second intra-predicted frame into a reconstructed first image; decoding the second inter-predicted frame into a reconstructed second image; generating residuals between the reconstructed first and second images; and encoding the residuals into the second inter-predicted frame. 15. The method of claim 10, wherein:
selectively transcoding further comprises:
selecting a plurality of first inter-predicted frames based on a length of the GOP and a predetermined GOP length threshold; and
transcoding each of the plurality of first inter-predicted frames into a plurality of second intra-predicted frames; and
modifying the encoded video stream further comprises dividing the GOP into a plurality of smaller picture groups having lengths less than the threshold by inserting each of the second intra-predicted frames into the encoded video stream in place of a corresponding one of the first inter-predicted frames. 16. The method of claim 15, further comprising:
transcoding each frame in a second subset of the inter-predicted frames, each frame referencing at least one of the first inter-predicted frames into a modified inter-predicted frame based on residuals between one of the second intra-predicted frames and a corresponding one of the second inter-predicted frames. 17. The method of claim 10, wherein transmitting the modified encoded video stream further comprises wirelessly transmitting the modified encoded video stream to a sink device. 18. One or more computer readable media including instruction stored thereon, which when executed by a processing system, cause the system to perform a method comprising:
accessing the encoded video stream from a storage device, the encoded video stream comprising a group of pictures (GOP) including a plurality of inter-predicted frames referencing a first intra-predicted frame; modifying the encoded video stream by selectively transcoding only a subset of the inter-predicted frames in the GOP, the selective transcoding including transcoding a first subset of the inter-predicted frames into second intra-predicted frames; and transmitting the modified encoded video stream over a physical layer device. 19. The media of claim 18, wherein the instructions further cause the system to perform a method comprising:
selecting a second subset of the inter-predicted frames, each frame in the second subset referencing one or more of the inter-predicted frames included in the first subset; transcoding the second subset of inter-predicted frames into second inter-predicted frames; and modifying the encoded video stream by inserting the second inter-predicted frames in place of the second subset of inter-predicted frames, each second inter-predicted frame replacing a corresponding frame within the second subset. 20. The media of claim 18, further comprising instructions that further cause the system to perform a method further comprising:
decoding the GOP; and encoding a reconstructed first image frame decoded from the first inter-predicted frame into one of the second intra-predicted frames. | One or more system, apparatus, method, and computer readable media is described for reducing the GOP length during a direct pass-through of an encoded video stream format that is supported by the decoder at the sink. In some embodiments, the encoded video stream is decoded on the source device and employed to generate and insert supplemental intra-predicted frames (I-frames) at shorter intervals allowing for faster recovery in the event of lost packets/frames when transmitted to a sink display. In some embodiments, Residual Artifact Suppressed (RAS) inter-predicted frames are further created and inserted in place of any frames that reference a frame converted to a supplemental I-frame. The encoded video stream passed through will consist of all the original frames except for the supplemental I-frames reducing the GOP, and RAS inter-predicted frames modified to prevent propagation of residual induced artifacts.1. An image frame display source apparatus, comprising:
an audio/video (AV) pipeline to access an encoded video stream from a storage device, the encoded video stream comprising a group of pictures (GOP) including a plurality of inter-predicted frames referencing a first intra-predicted frame; one or more processors to modify the encoded video stream with a selective transcoding of only a subset of the inter-predicted frames in the GOP, the selective transcoding including a transcoding of a first subset of the inter-predicted frames into second intra-predicted frames; and a physical layer device to communicate the modified encoded video stream through a transmission protocol. 2. The apparatus of claim 1, wherein to transcode a first inter-predicted frame in the first subset, the processors are further to:
decode the GOP; and encode a reconstructed first image frame decoded from the first inter-predicted frame into one of the second intra-predicted frames. 3. The apparatus of claim 1, wherein the processors are further to:
select a second subset of the inter-predicted frames, each frame in the second subset referencing one or more of the inter-predicted frames included in the first subset; transcode the second subset of inter-predicted frames into second inter-predicted frames; and modify the encoded video stream by inserting the second inter-predicted frames in place of the second subset of inter-predicted frames, each second inter-predicted frame replacing a corresponding frame in the second subset. 4. The apparatus of claim 3, wherein a second inter-predicted frame included in the second subset references the first inter-predicted frame included in the first subset; and
the processors are to transcode the second inter-predicted frame into a modified inter-predicted frame based on residuals between the second intra-predicted frame and the first inter-predicted frame. 5. The apparatus of claim 4, wherein to transcode the second inter-predicted frame, the processors are further to:
decode the second intra-predicted frame into a reconstructed first image; decode the second inter-predicted frame into a reconstructed second image; generate residuals between the reconstructed first and second images; and encode the residuals into the modified second inter-predicted frame. 6. The apparatus of claim 1, wherein:
to transcode the first subset of the inter-predicted frames, the processors are to:
select a plurality of first inter-predicted frames based on a length of the GOP and a predetermined GOP length threshold; and
transcode each of the plurality of first inter-predicted frames into a plurality of second intra-predicted frames; and
to modify the encoded video stream, the processors are to divide the GOP into a plurality of smaller picture groups having lengths less than the threshold by inserting each of the second intra-predicted frames into the encoded video stream in place of a corresponding one of the first inter-predicted frames. 7. The apparatus of claim 6, wherein the processors are further to transcode each frame in a second subset of the inter-predicted frames, each frame in the second subset referencing at least one of the first inter-predicted frames into a modified inter-predicted frame based on residuals between one of the second intra-predicted frames and a corresponding one of the second inter-predicted frames. 8. The apparatus of claim 1, wherein the physical layer device further comprises a wireless radio to wirelessly transmit the modified encoded video stream to a sink device. 9. A wireless display system, comprising:
the source apparatus of claim 1; and a sink apparatus to:
decode the modified video stream into reconstructed image frames;
render the reconstructed image frames; and
present the rendered frames on a display screen. 10. A method for direct pass-through of an encoded video stream, the method comprising:
accessing the encoded video stream from a storage device, the encoded video stream comprising a group of pictures (GOP) including a plurality of inter-predicted frames referencing a first intra-predicted frame; modifying the encoded video stream by selectively transcoding only a subset of the inter-predicted frames in the GOP, the selective transcoding including transcoding a first subset of the inter-predicted frames into second intra-predicted frames; and transmitting the modified encoded video stream over a physical layer device. 11. The method of claim 10, wherein transcoding a first inter-predicted frame in the first subset further comprises:
decoding the GOP; and encoding a reconstructed first image frame decoded from the first inter-predicted frame into one of the second intra-predicted frames. 12. The method of claim 10, wherein transcoding the first inter-predicted frame further comprises:
selecting one of the inter-predicted frames in the GOP, the selected inter-predicted frame immediately following a second of the inter-predicted frames in the GOP; transcoding the selected inter-predicted frame into the second intra-predicted frame; and modifying the encoded video stream by inserting the second intra-predicted frame immediately following the second of the inter-predicted frames, in place of the selected inter-predicted frame. 13. The method of claim 10, further comprising:
selecting a second subset of the inter-predicted frames, each frame in the second subset referencing one or more of the inter-predicted frames included in the first subset; transcoding the second subset of inter-predicted frames into second inter-predicted frames; and modifying the encoded video stream by inserting the second inter-predicted frames in place of the second subset of inter-predicted frames, each second inter-predicted frame replacing a corresponding frame within the second subset. 14. The method of claim 13, wherein transcoding the second inter-predicted frame further comprises:
decoding the second intra-predicted frame into a reconstructed first image; decoding the second inter-predicted frame into a reconstructed second image; generating residuals between the reconstructed first and second images; and encoding the residuals into the second inter-predicted frame. 15. The method of claim 10, wherein:
selectively transcoding further comprises:
selecting a plurality of first inter-predicted frames based on a length of the GOP and a predetermined GOP length threshold; and
transcoding each of the plurality of first inter-predicted frames into a plurality of second intra-predicted frames; and
modifying the encoded video stream further comprises dividing the GOP into a plurality of smaller picture groups having lengths less than the threshold by inserting each of the second intra-predicted frames into the encoded video stream in place of a corresponding one of the first inter-predicted frames. 16. The method of claim 15, further comprising:
transcoding each frame in a second subset of the inter-predicted frames, each frame referencing at least one of the first inter-predicted frames into a modified inter-predicted frame based on residuals between one of the second intra-predicted frames and a corresponding one of the second inter-predicted frames. 17. The method of claim 10, wherein transmitting the modified encoded video stream further comprises wirelessly transmitting the modified encoded video stream to a sink device. 18. One or more computer readable media including instruction stored thereon, which when executed by a processing system, cause the system to perform a method comprising:
accessing the encoded video stream from a storage device, the encoded video stream comprising a group of pictures (GOP) including a plurality of inter-predicted frames referencing a first intra-predicted frame; modifying the encoded video stream by selectively transcoding only a subset of the inter-predicted frames in the GOP, the selective transcoding including transcoding a first subset of the inter-predicted frames into second intra-predicted frames; and transmitting the modified encoded video stream over a physical layer device. 19. The media of claim 18, wherein the instructions further cause the system to perform a method comprising:
selecting a second subset of the inter-predicted frames, each frame in the second subset referencing one or more of the inter-predicted frames included in the first subset; transcoding the second subset of inter-predicted frames into second inter-predicted frames; and modifying the encoded video stream by inserting the second inter-predicted frames in place of the second subset of inter-predicted frames, each second inter-predicted frame replacing a corresponding frame within the second subset. 20. The media of claim 18, further comprising instructions that further cause the system to perform a method further comprising:
decoding the GOP; and encoding a reconstructed first image frame decoded from the first inter-predicted frame into one of the second intra-predicted frames. | 2,400 |
7,759 | 7,759 | 14,162,731 | 2,458 | Badges may be assigned to a user, and activities may be associated with the badges. The user may have the option to activate or deactivate specific activities associated with a badge, or to add additional activities in exchange for providing information about the user. A system may use the badges to initiate activities for the user. The specific choice of activities to be initiated may depend on context, where the context may include the device that is being used, where the user is located, whether the user is traveling, etc. | 1. A device-readable medium that stores executable instructions to initiate activities, the executable instructions, when executed by a device, causing the device to perform acts comprising:
detecting a context of a user of said device; accessing a set of activities associated with a badge assigned to said user; choosing an activity from said set of activities, said choosing being based on said context; and initiating said activity on said device. 2. The device-readable medium of claim 1, said acts further comprising:
receiving information concerning said user's interests; and assigning said badge to said user based on said user's interests. 3. The device-readable medium of claim 1, said acts further comprising:
receiving information concerning said user's behavior; and assigning said badge to said user based on a finding that said user's behavior is recurring. 4. The device-readable medium of claim 1, said acts further comprising:
assigning said badge to said user; associating said set of activities with said badge; and presenting, to said user, an interface that allows said user to activate and deactivate any of said activities. 5. The device-readable medium of claim 1, said acts further comprising:
offering said user a chance to add additional activities to said badge in exchange for answering questions about said user. 6. The device-readable medium of claim 1, said context comprising a type of said device, the activities that are initiated for said badge being different depending on which type of device is being used. 7. The device-readable medium of claim 1, said context comprising where said device is located and whether said device is moving at a time when said activity is initiated. 8. A method of initiating activities, the method comprising:
using a processor to perform acts comprising:
assigning a badge to a user;
associating a plurality of activities with said badge;
detecting that a trigger has occurred;
choosing an activity from said plurality of activities based on a context associated with said trigger; and
initiating said activity on a device that comprises said processor. 9. The method of claim 8, said acts further comprising:
receiving information concerning said user's interests, said badge being assigned to said user based on said user's interests. 10. The method of claim 8, said acts further comprising:
receiving information concerning said user's behavior, said badge being assigned to said user based on a finding that said user's behavior is recurring. 11. The method of claim 8, said acts further comprising:
presenting, to said user, an interface that allows said user to activate and deactivate any of said activities. 12. The method of claim 8, said acts further comprising:
offering said user a chance to add additional activities to said badge in exchange for answering questions about said user. 13. The method of claim 8, said context comprising a type of said device, the activities that are initiated for said badge being different depending on which type of device is being used. 14. The method of claim 8, said context comprising where said device is located and whether said device is moving at a time when said activity is initiated. 15. A device comprising:
a memory; a processor; and an component that is stored in said memory, that executes on said processor, that detects a context of a user of said device, that accesses a set of activities associated with a badge assigned to said user, that chooses an activity from said set of activities, said choosing being based on said context, and that initiates said activity on said device. 16. The device of claim 15, said component receiving information concerning said user's interests, said component assigning said badge to said user based on said user's interests. 17. The device of claiml5, said component receiving information concerning said user's behavior, said component assigning said badge to said user based on a finding that said user's behavior is recurring. 18. The device of claim 15, said component assigning said badge to said user, said component associating said set of activities with said badge, said component presenting, to said user, an interface that allows said user to activate and deactivate any of said activities. 19. The device of claim 15, said component offering said user a chance to add additional activities to said badge in exchange for answering questions about said user. 20. The device of claim 15, said context comprising a type of said device, the activities that are initiated for said badge being different depending on which type of device is being used. | Badges may be assigned to a user, and activities may be associated with the badges. The user may have the option to activate or deactivate specific activities associated with a badge, or to add additional activities in exchange for providing information about the user. A system may use the badges to initiate activities for the user. The specific choice of activities to be initiated may depend on context, where the context may include the device that is being used, where the user is located, whether the user is traveling, etc.1. A device-readable medium that stores executable instructions to initiate activities, the executable instructions, when executed by a device, causing the device to perform acts comprising:
detecting a context of a user of said device; accessing a set of activities associated with a badge assigned to said user; choosing an activity from said set of activities, said choosing being based on said context; and initiating said activity on said device. 2. The device-readable medium of claim 1, said acts further comprising:
receiving information concerning said user's interests; and assigning said badge to said user based on said user's interests. 3. The device-readable medium of claim 1, said acts further comprising:
receiving information concerning said user's behavior; and assigning said badge to said user based on a finding that said user's behavior is recurring. 4. The device-readable medium of claim 1, said acts further comprising:
assigning said badge to said user; associating said set of activities with said badge; and presenting, to said user, an interface that allows said user to activate and deactivate any of said activities. 5. The device-readable medium of claim 1, said acts further comprising:
offering said user a chance to add additional activities to said badge in exchange for answering questions about said user. 6. The device-readable medium of claim 1, said context comprising a type of said device, the activities that are initiated for said badge being different depending on which type of device is being used. 7. The device-readable medium of claim 1, said context comprising where said device is located and whether said device is moving at a time when said activity is initiated. 8. A method of initiating activities, the method comprising:
using a processor to perform acts comprising:
assigning a badge to a user;
associating a plurality of activities with said badge;
detecting that a trigger has occurred;
choosing an activity from said plurality of activities based on a context associated with said trigger; and
initiating said activity on a device that comprises said processor. 9. The method of claim 8, said acts further comprising:
receiving information concerning said user's interests, said badge being assigned to said user based on said user's interests. 10. The method of claim 8, said acts further comprising:
receiving information concerning said user's behavior, said badge being assigned to said user based on a finding that said user's behavior is recurring. 11. The method of claim 8, said acts further comprising:
presenting, to said user, an interface that allows said user to activate and deactivate any of said activities. 12. The method of claim 8, said acts further comprising:
offering said user a chance to add additional activities to said badge in exchange for answering questions about said user. 13. The method of claim 8, said context comprising a type of said device, the activities that are initiated for said badge being different depending on which type of device is being used. 14. The method of claim 8, said context comprising where said device is located and whether said device is moving at a time when said activity is initiated. 15. A device comprising:
a memory; a processor; and an component that is stored in said memory, that executes on said processor, that detects a context of a user of said device, that accesses a set of activities associated with a badge assigned to said user, that chooses an activity from said set of activities, said choosing being based on said context, and that initiates said activity on said device. 16. The device of claim 15, said component receiving information concerning said user's interests, said component assigning said badge to said user based on said user's interests. 17. The device of claiml5, said component receiving information concerning said user's behavior, said component assigning said badge to said user based on a finding that said user's behavior is recurring. 18. The device of claim 15, said component assigning said badge to said user, said component associating said set of activities with said badge, said component presenting, to said user, an interface that allows said user to activate and deactivate any of said activities. 19. The device of claim 15, said component offering said user a chance to add additional activities to said badge in exchange for answering questions about said user. 20. The device of claim 15, said context comprising a type of said device, the activities that are initiated for said badge being different depending on which type of device is being used. | 2,400 |
7,760 | 7,760 | 14,544,614 | 2,416 | The present invention relates, generally, to an encryption and decryption system, and, more particularly, to an encryption system utilizing a one-time pad key.
The task of the invention is to create a practically feasible 100% secure encryption process that is convenient to use.
A random numbers generator or random bit generator of outstanding quality is used. Such ideal chances will then be recorded on a data storage device for later encryption purposes. It is important in the context that said storage device would be kept in a safe place or, in the case of encrypted data transmission, would be physically delivered to the recipient via a trustworthy transmission route.
Since a secure encryption is only assured if the key or keys is/are used only a single time, it will be expedient, for information to be recorded on the basis of the keys used. Only in this case the one-time pad key can be found again for decryption.
For decryption the formerly recorded key is used. Due to the kind of encryption used the recorded key may first be decrypted itself before using the symmetrical encryption/decryption method. | 1. A system for the encryption and decryption of data comprising a random numbers generator of high quality, at least one data storage medium for the key or modified key and a symmetrical encrypting method, characterised in
that the key or keys being generated by the random numbers generator and recorded on the data storage medium, and by the information about the key employed for an unencrypted file being recorded to facilitate later re-identification for decryption purposes. 2. A method according to claim 1, characterised in
that information about the random numbers already used being recorded to prevent multiple use of a key. 3. The method according to one or more of the preceding claims
characterised in that the recorded key being modified prior to it being written into the storage medium. 4. The method according to one or more of the preceding claims
characterised in that the symmetrical encryption process only being accomplished by a modified key, whereby said modified key is generated by the key read from the storage medium. 5. The method according to one or more of the preceding claims
characterised in that the modification of the key being effected by a known encryption method with the help of a password. 6. The method according to one or more of the preceding claims 1 to 5,
characterised in
that the information about the key used for an unencrypted file and/or the key usage being recorded
on the data carrier where the key or modified key is also held and/or
on the data carrier where the encrypted data are filed and/or
on another data carrier. 7. The method according to one or more of the preceding claims
characterised in that the key or modified key being recorded on a portable data carrier, e.g. so that the recording can take place at a location and/or a time completely divorced from the actual encryption or decryption processes. 8. The method according to one or more of the preceding claims
characterised in that a USB stick or a portable hard disk with a small form factor being used as a data storage medium. 9. The method according to one or more of the preceding claims
characterised in that the data used for the encryption coming directly from a random numbers generator and only these being recorded, in modified or unmodified form, for later decryption. 10. A device for realising the method according to one or more of the preceding claims
characterised in that the use of a computer, a random numbers generator and at least one storage medium. | The present invention relates, generally, to an encryption and decryption system, and, more particularly, to an encryption system utilizing a one-time pad key.
The task of the invention is to create a practically feasible 100% secure encryption process that is convenient to use.
A random numbers generator or random bit generator of outstanding quality is used. Such ideal chances will then be recorded on a data storage device for later encryption purposes. It is important in the context that said storage device would be kept in a safe place or, in the case of encrypted data transmission, would be physically delivered to the recipient via a trustworthy transmission route.
Since a secure encryption is only assured if the key or keys is/are used only a single time, it will be expedient, for information to be recorded on the basis of the keys used. Only in this case the one-time pad key can be found again for decryption.
For decryption the formerly recorded key is used. Due to the kind of encryption used the recorded key may first be decrypted itself before using the symmetrical encryption/decryption method.1. A system for the encryption and decryption of data comprising a random numbers generator of high quality, at least one data storage medium for the key or modified key and a symmetrical encrypting method, characterised in
that the key or keys being generated by the random numbers generator and recorded on the data storage medium, and by the information about the key employed for an unencrypted file being recorded to facilitate later re-identification for decryption purposes. 2. A method according to claim 1, characterised in
that information about the random numbers already used being recorded to prevent multiple use of a key. 3. The method according to one or more of the preceding claims
characterised in that the recorded key being modified prior to it being written into the storage medium. 4. The method according to one or more of the preceding claims
characterised in that the symmetrical encryption process only being accomplished by a modified key, whereby said modified key is generated by the key read from the storage medium. 5. The method according to one or more of the preceding claims
characterised in that the modification of the key being effected by a known encryption method with the help of a password. 6. The method according to one or more of the preceding claims 1 to 5,
characterised in
that the information about the key used for an unencrypted file and/or the key usage being recorded
on the data carrier where the key or modified key is also held and/or
on the data carrier where the encrypted data are filed and/or
on another data carrier. 7. The method according to one or more of the preceding claims
characterised in that the key or modified key being recorded on a portable data carrier, e.g. so that the recording can take place at a location and/or a time completely divorced from the actual encryption or decryption processes. 8. The method according to one or more of the preceding claims
characterised in that a USB stick or a portable hard disk with a small form factor being used as a data storage medium. 9. The method according to one or more of the preceding claims
characterised in that the data used for the encryption coming directly from a random numbers generator and only these being recorded, in modified or unmodified form, for later decryption. 10. A device for realising the method according to one or more of the preceding claims
characterised in that the use of a computer, a random numbers generator and at least one storage medium. | 2,400 |
7,761 | 7,761 | 13,542,171 | 2,481 | A method and apparatus for reduction of reference data transfer and coding efficiency improvement. The method includes performing pre-analysis on a decimated version of an image, and utilizing the predictions of the pre-analysis to transfer smaller reference area. | 1. A method of a digital processor for at least one of reduction of reference data transfer and coding efficiency improvement, comprising:
performing, via the digital processor, pre-analysis on a decimated version of an image; and utilizing the predictions of the pre-analysis to transfer smaller reference area. 2. An apparatus for video processing, comprising:
means for performing pre-analysis on a decimated version of an image; and means for utilizing the predictions of the pre-analysis to transfer smaller reference area. 3. A non-transitory computer readable medium including computer instruction, when executed for a method reference area transfer, the method comprising:
performing pre-analysis on a decimated version of an image; and utilizing the predictions of the pre-analysis to transfer smaller reference area. | A method and apparatus for reduction of reference data transfer and coding efficiency improvement. The method includes performing pre-analysis on a decimated version of an image, and utilizing the predictions of the pre-analysis to transfer smaller reference area.1. A method of a digital processor for at least one of reduction of reference data transfer and coding efficiency improvement, comprising:
performing, via the digital processor, pre-analysis on a decimated version of an image; and utilizing the predictions of the pre-analysis to transfer smaller reference area. 2. An apparatus for video processing, comprising:
means for performing pre-analysis on a decimated version of an image; and means for utilizing the predictions of the pre-analysis to transfer smaller reference area. 3. A non-transitory computer readable medium including computer instruction, when executed for a method reference area transfer, the method comprising:
performing pre-analysis on a decimated version of an image; and utilizing the predictions of the pre-analysis to transfer smaller reference area. | 2,400 |
7,762 | 7,762 | 14,263,772 | 2,454 | A system and method that allows for information relating to data and communication resource usage to be gathered and analyzed such that particular data transactions and usage can be classified based on purpose and/or type. Further, the system and method provide reporting based on amount of usage and/or purpose or type of usage so that associated costs and usage can be calculated applied and allocated to particular accounts, divisions, groups or individuals within and outside of a company or entity. Further, the system may restrict data usage of devices to data usage that can be allocated to particular accounts based on purpose, source, destination or other. | 1. A system for monitoring data usage of a device and generating a report relating to the data usage of the device, the system comprising:
a server connected to a network; a storage accessible by said server; software executing on said server for receiving a data stream relating to data usage by the device; said software extracting a data packet from the data stream; said software analyzing the data packet to extract a source address or a destination address or a Universal Resource Locator (URL) to generate formatted usage data; said software matching the formatted usage data to known data to generate a data transaction; said software allocating a cost for the data transaction; and said software generating a cost report based on the cost for the data transaction. 2. The system of claim 1 wherein said software extracts multiple data packets from the data stream and each data packet is analyzed to extract a source address or a destination address or a Universal Resource Locator (URL) to generate formatted usage data for each data packet, and wherein a data transaction is generated for each data packet, said software generating a cost table for the data transactions. 3. The system of claim 1 wherein the formatted data further includes a size of the data packet. 4. The system of claim 1 wherein the formatted data further includes a date of the data packet. 5. The system of claim 1 wherein the data packet includes a header and the source address or the destination address is extracted from the header. 6. The system of claim 1 wherein the known data includes Internet Protocol (IP) addresses. 7. The system of claim 1 wherein the known data includes key words to categorize subject or data types and categories. 8. The system of claim 1 wherein the known data includes domain controller data to detect data usage in an office environment. 9. The system of claim 1 wherein the known data includes Wi-Fi service set identifier (SSID) data to detect data usage in a public environment. 10. The system of claim 1 further comprising software executing on the device to monitor usage characteristics of a Central Processing Unit (CPU) of the device and correlating the monitored usage characteristics with active applications running on the device. 11. The system of claim 1 further comprising software executing on the device to monitor memory usage of the device and correlating the monitored memory usage with active applications running on the device. 12. The system of claim 1 further comprising software executing on the device to monitor active applications on the device, and the data stream includes Transmission Control Protocol/Internet Protocol (TCP/IP) data or User Datagram Protocol (UDP) data. 13. The system of claim 1 wherein the data stream is sent from the device. 14. The system of claim 1 wherein the data stream is sent from a network device selected from the group consisting of: a proxy server, a router, a switch and combinations thereof. 15. The system of claim 1 further comprising an authentication tool to capture a session establishment or a login to a system and wherein the data steam includes usage data relating to the session establishment or the login to a system. 16. The system of claim 1 wherein the report comprises a security report for the data transaction. 17. The system of claim 1 wherein the report comprises a usage metrics report for the data transaction. 18. The system of claim 1 wherein the data transaction is saved on said storage. 19. The system of claim 1 wherein the device is selected from the group consisting of: a smart phone, a tablet, a lap top computer, a desk top computer, a server, a device that utilizes machine-to-machine (M2M) communication and combinations thereof. 20. A method for monitoring data usage of a device over a network and generating a report relating to the data usage of the device, the method comprising the steps of:
connecting a server having a storage to a network; receiving a data stream at the server, the data stream relating to data usage by the device; extracting a data packet from the data stream with software executing on the server; analyzing the data packet with software executing on the server to extract data packet information including a source address or a destination address or a Universal Resource Locator (URL), and generating formatted usage data based on the extracted data packet information; matching the formatted usage data to known data; generating a data transaction based on the matched formatted usage data; allocating a cost for the data transaction; and generating a cost report based on the cost for the data transaction. 21. The method of claim 20 wherein the formatted data includes a size of the data packet or a date of the data packet. 22. The method of claim 20 wherein the data packet includes a header and the source address or the destination address is extracted from the header. 23. The method of claim 20 wherein the known data is selected from the group consisting of: Internet Protocol (IP) addresses, key words to categorize subject or data types and categories, domain controller data, Wi-Fi service set identifier (SSID) data and combinations thereof. 24. The method of claim 20 further comprising the steps of:
providing software on the device, the software on the device monitoring usage characteristics of a Central Processing Unit (CPU) of the device, or the software on the device monitoring memory usage of the device, and
the software on the device correlating the monitored CPU or memory usage with active applications running on the device. 25. The method of claim 20 further comprising the steps of:
providing software on the device, the software on the device monitoring active applications on the device, and
wherein the data stream includes Transmission Control Protocol/Internet Protocol (TCP/IP) data or User Datagram Protocol (UDP) data. 26. The method of claim 20 further comprising the step of:
providing an authentication tool to capture a session establishment or a login to a system, and
wherein the data steam includes usage data relating to the session establishment or the login to a system. 27. The method of claim 20 further comprising the step of generating a security report for the data transaction. 28. The method of claim 20 further comprising the step of generating a usage metrics report for the data transaction. 29. A system for controlling access to data usage by a device accessing data via a network connection, the system comprising:
a computer coupled to the network; a storage accessible by said computer, said storage having cost data indicative of a cost associated with accessing data, and account data indicative of a total amount of cost that can be charged to an account for accessing data; software executing on said computer receiving a data request indicative of the device requesting access to data via the network, the request associated with the account and including at least one value from which a cost associated with the data request can be determined; software executing on said computer determining a cost associated with the data request; software executing on said computer comparing the cost associated with the data request with account data associated with the account to determine if the cost associated with the data request can be allocated to the account; and software executing on said computer allowing the device to receive the data associated with the data request when the cost associated with the data request is allocated to the account. 30. The system of claim 29 wherein the account is associated with a second device and the data transaction is indicative of an exchange of data between the device and the second device. 31. The system of claim 29 wherein the data transaction is indicative of one or more of: online shopping data usage, payment processing data usage, media streaming data usage, voice over internet protocol data usage, video conferencing data usage, instant messaging data usage and social media data usage. 32. The system of claim 29 wherein each data transaction is associated with an identifier indicative of one of a source address, a destination address or a Universal Resource Locator, and the storage contains allocation rules indicative of data usage that can be allocated to the account, the system further comprising:
software executing on said computer for comparing data transactions having a common identifier to the allocation rules determine which of the data transactions having the common identifier can be allocated to the account. 33. The system of claim 32 wherein the data transactions having a common identifier are further associated with a purchase. 34. The system of claim 33 wherein the allocation rule is further indicative of the total amount of data usage that can be allocated to the account based on a monetary value associated with the purchase. 35. The system of claim 29 wherein the cost data is associated with a per usage rate where the per data usage rate associates a cost with the data transaction based on the value associated with the data transaction. 36. The system of claim 29 wherein the per usage rate is further associated with a type of data usage, the system further comprising: software executing on said computer for determining a type of data usage associated with the data transaction and further comparing the type of data usage to the cost data to determine the cost of the data usage based on the type and value of the data usage. | A system and method that allows for information relating to data and communication resource usage to be gathered and analyzed such that particular data transactions and usage can be classified based on purpose and/or type. Further, the system and method provide reporting based on amount of usage and/or purpose or type of usage so that associated costs and usage can be calculated applied and allocated to particular accounts, divisions, groups or individuals within and outside of a company or entity. Further, the system may restrict data usage of devices to data usage that can be allocated to particular accounts based on purpose, source, destination or other.1. A system for monitoring data usage of a device and generating a report relating to the data usage of the device, the system comprising:
a server connected to a network; a storage accessible by said server; software executing on said server for receiving a data stream relating to data usage by the device; said software extracting a data packet from the data stream; said software analyzing the data packet to extract a source address or a destination address or a Universal Resource Locator (URL) to generate formatted usage data; said software matching the formatted usage data to known data to generate a data transaction; said software allocating a cost for the data transaction; and said software generating a cost report based on the cost for the data transaction. 2. The system of claim 1 wherein said software extracts multiple data packets from the data stream and each data packet is analyzed to extract a source address or a destination address or a Universal Resource Locator (URL) to generate formatted usage data for each data packet, and wherein a data transaction is generated for each data packet, said software generating a cost table for the data transactions. 3. The system of claim 1 wherein the formatted data further includes a size of the data packet. 4. The system of claim 1 wherein the formatted data further includes a date of the data packet. 5. The system of claim 1 wherein the data packet includes a header and the source address or the destination address is extracted from the header. 6. The system of claim 1 wherein the known data includes Internet Protocol (IP) addresses. 7. The system of claim 1 wherein the known data includes key words to categorize subject or data types and categories. 8. The system of claim 1 wherein the known data includes domain controller data to detect data usage in an office environment. 9. The system of claim 1 wherein the known data includes Wi-Fi service set identifier (SSID) data to detect data usage in a public environment. 10. The system of claim 1 further comprising software executing on the device to monitor usage characteristics of a Central Processing Unit (CPU) of the device and correlating the monitored usage characteristics with active applications running on the device. 11. The system of claim 1 further comprising software executing on the device to monitor memory usage of the device and correlating the monitored memory usage with active applications running on the device. 12. The system of claim 1 further comprising software executing on the device to monitor active applications on the device, and the data stream includes Transmission Control Protocol/Internet Protocol (TCP/IP) data or User Datagram Protocol (UDP) data. 13. The system of claim 1 wherein the data stream is sent from the device. 14. The system of claim 1 wherein the data stream is sent from a network device selected from the group consisting of: a proxy server, a router, a switch and combinations thereof. 15. The system of claim 1 further comprising an authentication tool to capture a session establishment or a login to a system and wherein the data steam includes usage data relating to the session establishment or the login to a system. 16. The system of claim 1 wherein the report comprises a security report for the data transaction. 17. The system of claim 1 wherein the report comprises a usage metrics report for the data transaction. 18. The system of claim 1 wherein the data transaction is saved on said storage. 19. The system of claim 1 wherein the device is selected from the group consisting of: a smart phone, a tablet, a lap top computer, a desk top computer, a server, a device that utilizes machine-to-machine (M2M) communication and combinations thereof. 20. A method for monitoring data usage of a device over a network and generating a report relating to the data usage of the device, the method comprising the steps of:
connecting a server having a storage to a network; receiving a data stream at the server, the data stream relating to data usage by the device; extracting a data packet from the data stream with software executing on the server; analyzing the data packet with software executing on the server to extract data packet information including a source address or a destination address or a Universal Resource Locator (URL), and generating formatted usage data based on the extracted data packet information; matching the formatted usage data to known data; generating a data transaction based on the matched formatted usage data; allocating a cost for the data transaction; and generating a cost report based on the cost for the data transaction. 21. The method of claim 20 wherein the formatted data includes a size of the data packet or a date of the data packet. 22. The method of claim 20 wherein the data packet includes a header and the source address or the destination address is extracted from the header. 23. The method of claim 20 wherein the known data is selected from the group consisting of: Internet Protocol (IP) addresses, key words to categorize subject or data types and categories, domain controller data, Wi-Fi service set identifier (SSID) data and combinations thereof. 24. The method of claim 20 further comprising the steps of:
providing software on the device, the software on the device monitoring usage characteristics of a Central Processing Unit (CPU) of the device, or the software on the device monitoring memory usage of the device, and
the software on the device correlating the monitored CPU or memory usage with active applications running on the device. 25. The method of claim 20 further comprising the steps of:
providing software on the device, the software on the device monitoring active applications on the device, and
wherein the data stream includes Transmission Control Protocol/Internet Protocol (TCP/IP) data or User Datagram Protocol (UDP) data. 26. The method of claim 20 further comprising the step of:
providing an authentication tool to capture a session establishment or a login to a system, and
wherein the data steam includes usage data relating to the session establishment or the login to a system. 27. The method of claim 20 further comprising the step of generating a security report for the data transaction. 28. The method of claim 20 further comprising the step of generating a usage metrics report for the data transaction. 29. A system for controlling access to data usage by a device accessing data via a network connection, the system comprising:
a computer coupled to the network; a storage accessible by said computer, said storage having cost data indicative of a cost associated with accessing data, and account data indicative of a total amount of cost that can be charged to an account for accessing data; software executing on said computer receiving a data request indicative of the device requesting access to data via the network, the request associated with the account and including at least one value from which a cost associated with the data request can be determined; software executing on said computer determining a cost associated with the data request; software executing on said computer comparing the cost associated with the data request with account data associated with the account to determine if the cost associated with the data request can be allocated to the account; and software executing on said computer allowing the device to receive the data associated with the data request when the cost associated with the data request is allocated to the account. 30. The system of claim 29 wherein the account is associated with a second device and the data transaction is indicative of an exchange of data between the device and the second device. 31. The system of claim 29 wherein the data transaction is indicative of one or more of: online shopping data usage, payment processing data usage, media streaming data usage, voice over internet protocol data usage, video conferencing data usage, instant messaging data usage and social media data usage. 32. The system of claim 29 wherein each data transaction is associated with an identifier indicative of one of a source address, a destination address or a Universal Resource Locator, and the storage contains allocation rules indicative of data usage that can be allocated to the account, the system further comprising:
software executing on said computer for comparing data transactions having a common identifier to the allocation rules determine which of the data transactions having the common identifier can be allocated to the account. 33. The system of claim 32 wherein the data transactions having a common identifier are further associated with a purchase. 34. The system of claim 33 wherein the allocation rule is further indicative of the total amount of data usage that can be allocated to the account based on a monetary value associated with the purchase. 35. The system of claim 29 wherein the cost data is associated with a per usage rate where the per data usage rate associates a cost with the data transaction based on the value associated with the data transaction. 36. The system of claim 29 wherein the per usage rate is further associated with a type of data usage, the system further comprising: software executing on said computer for determining a type of data usage associated with the data transaction and further comparing the type of data usage to the cost data to determine the cost of the data usage based on the type and value of the data usage. | 2,400 |
7,763 | 7,763 | 14,130,820 | 2,473 | The invention relates to a method ( 20 ) in a base station ( 2, 3 ) of a communication system ( 1 ) for making a handover decision, the communication system 1 comprising a user equipment ( 4, 5 ). The method ( 20 ) comprises the steps of: performing ( 21 ) a first type of mobility mechanism for the user equipment ( 4, 5 ), and upon the first type of mobility mechanism fulfilling a criterion: configuring ( 22 ) a second type of mobility mechanism for the user equipment 4, 5, and making ( 23 ) a handover decision for the user equipment ( 4, 5 ) based on the second type of mobility mechanism. The invention also relates to a base station, computer programs and computer program products. | 1-16. (canceled) 17. A method in a base station of a communication system for making a handover decision for a user equipment in the communication system, the method comprising:
performing a first type of mobility mechanism for the user equipment; and upon the first type of mobility mechanism fulfilling a criterion:
configuring a second type of mobility mechanism for the user equipment and
making a handover decision for the user equipment based on the second type of mobility mechanism. 18. The method as claimed in claim 17, wherein performing the first type of mobility mechanism comprises:
transmitting a first type of pilot signal to the user equipment; and receiving from the user equipment a measurement report for the first type of pilot signal. 19. The method as claimed in claim 18, further comprising determining whether the first type of mobility mechanism fulfills the criterion by comparing the measurement report with threshold values. 20. The method as claimed in claim 18, wherein configuring the second type of mobility mechanism comprises activating, based on the measurement report, a second type of pilot signal. 21. The method as claimed in claim 20, wherein activating the second type of pilot signal comprises requesting the user equipment to transmit the second type of pilot signal. 22. The method as claimed in claim 20, wherein activating a second type of pilot signal comprises requesting a target base station to signal the second type of pilot signal to the user equipment. 23. The method as claimed in claim 20, wherein the second type of pilot signal comprises an uplink pilot signal. 24. The method as claimed in claim 20, wherein the second type of pilot signal comprises a downlink pilot signal. 25. The method as claimed in claim 18, wherein the first type of pilot signal comprises a downlink pilot signal and the measurement report comprises a downlink pilot signal strength measurement or a downlink pilot signal quality measurement. 26. The method as claimed in claim 18, wherein configuring the second mobility mechanism comprises at least one of:
activating or deactivating a downlink pilot signal transmitted by the base station to the user equipment; changing beam-forming configuration of a downlink pilot signal transmitted by the base station to the user equipment; and activating, deactivating or reconfiguring an uplink pilot signal measurement received from the user equipment. 27. The method as claimed in claim 17, wherein the performing the first type of mobility mechanism comprises determining positioning information for the user equipment. 28. The method as claimed in claim 27, further comprising determining that the first type of mobility mechanism fulfills the criterion, based on determining that the geographical location of the user equipment is within a predetermined distance from a cell border of the base station. 29. The method as claimed in any claim 17, wherein the method is performed for user equipment having at least one of:
an amount of uplink data above a first threshold; an amount of downlink data above a second threshold; a predetermined quality of service; and a speed of movement below a predetermined speed. 30. A base station configured for operation in a communication system, the base station comprising a controller arranged to:
perform a first type of mobility mechanism for a user equipment in the communication system; and upon the first type of mobility mechanism fulfilling a criterion: configure a second type of mobility mechanism for the user equipment; and make a handover decision for the user equipment based on the second type of mobility mechanism. 31. A computer readable medium storing a computer program, the computer program comprising computer program code that, when executed by a controller of a base station in a communication network, causes the base station to:
perform a first type of mobility mechanism for a user equipment in the communication network; and upon the first type of mobility mechanism fulfilling a criterion:
configure a second type of mobility mechanism for the user equipment; and
make a handover decision for the user equipment based on the second type of mobility mechanism. 32. A method in a first base station configured for operation in a communication network, said method comprising:
determining whether a user equipment connected to the first base station is a candidate for handover to a second base station, based on evaluating a measurement report sent by the user equipment for a first type of pilot signal transmitted from each of the first and second base stations, or based on determining that the geographical location of the user equipment is within a predetermined distance from a cell border between the first and second base stations; and in response to determining that the user equipment is a candidate for handover: activating a second type of pilot signal that is different than the first type of pilot signal and is transmitted by the second base station or the user equipment; and making the handover decision based on evaluating a measurements report for the second type of pilot signal. | The invention relates to a method ( 20 ) in a base station ( 2, 3 ) of a communication system ( 1 ) for making a handover decision, the communication system 1 comprising a user equipment ( 4, 5 ). The method ( 20 ) comprises the steps of: performing ( 21 ) a first type of mobility mechanism for the user equipment ( 4, 5 ), and upon the first type of mobility mechanism fulfilling a criterion: configuring ( 22 ) a second type of mobility mechanism for the user equipment 4, 5, and making ( 23 ) a handover decision for the user equipment ( 4, 5 ) based on the second type of mobility mechanism. The invention also relates to a base station, computer programs and computer program products.1-16. (canceled) 17. A method in a base station of a communication system for making a handover decision for a user equipment in the communication system, the method comprising:
performing a first type of mobility mechanism for the user equipment; and upon the first type of mobility mechanism fulfilling a criterion:
configuring a second type of mobility mechanism for the user equipment and
making a handover decision for the user equipment based on the second type of mobility mechanism. 18. The method as claimed in claim 17, wherein performing the first type of mobility mechanism comprises:
transmitting a first type of pilot signal to the user equipment; and receiving from the user equipment a measurement report for the first type of pilot signal. 19. The method as claimed in claim 18, further comprising determining whether the first type of mobility mechanism fulfills the criterion by comparing the measurement report with threshold values. 20. The method as claimed in claim 18, wherein configuring the second type of mobility mechanism comprises activating, based on the measurement report, a second type of pilot signal. 21. The method as claimed in claim 20, wherein activating the second type of pilot signal comprises requesting the user equipment to transmit the second type of pilot signal. 22. The method as claimed in claim 20, wherein activating a second type of pilot signal comprises requesting a target base station to signal the second type of pilot signal to the user equipment. 23. The method as claimed in claim 20, wherein the second type of pilot signal comprises an uplink pilot signal. 24. The method as claimed in claim 20, wherein the second type of pilot signal comprises a downlink pilot signal. 25. The method as claimed in claim 18, wherein the first type of pilot signal comprises a downlink pilot signal and the measurement report comprises a downlink pilot signal strength measurement or a downlink pilot signal quality measurement. 26. The method as claimed in claim 18, wherein configuring the second mobility mechanism comprises at least one of:
activating or deactivating a downlink pilot signal transmitted by the base station to the user equipment; changing beam-forming configuration of a downlink pilot signal transmitted by the base station to the user equipment; and activating, deactivating or reconfiguring an uplink pilot signal measurement received from the user equipment. 27. The method as claimed in claim 17, wherein the performing the first type of mobility mechanism comprises determining positioning information for the user equipment. 28. The method as claimed in claim 27, further comprising determining that the first type of mobility mechanism fulfills the criterion, based on determining that the geographical location of the user equipment is within a predetermined distance from a cell border of the base station. 29. The method as claimed in any claim 17, wherein the method is performed for user equipment having at least one of:
an amount of uplink data above a first threshold; an amount of downlink data above a second threshold; a predetermined quality of service; and a speed of movement below a predetermined speed. 30. A base station configured for operation in a communication system, the base station comprising a controller arranged to:
perform a first type of mobility mechanism for a user equipment in the communication system; and upon the first type of mobility mechanism fulfilling a criterion: configure a second type of mobility mechanism for the user equipment; and make a handover decision for the user equipment based on the second type of mobility mechanism. 31. A computer readable medium storing a computer program, the computer program comprising computer program code that, when executed by a controller of a base station in a communication network, causes the base station to:
perform a first type of mobility mechanism for a user equipment in the communication network; and upon the first type of mobility mechanism fulfilling a criterion:
configure a second type of mobility mechanism for the user equipment; and
make a handover decision for the user equipment based on the second type of mobility mechanism. 32. A method in a first base station configured for operation in a communication network, said method comprising:
determining whether a user equipment connected to the first base station is a candidate for handover to a second base station, based on evaluating a measurement report sent by the user equipment for a first type of pilot signal transmitted from each of the first and second base stations, or based on determining that the geographical location of the user equipment is within a predetermined distance from a cell border between the first and second base stations; and in response to determining that the user equipment is a candidate for handover: activating a second type of pilot signal that is different than the first type of pilot signal and is transmitted by the second base station or the user equipment; and making the handover decision based on evaluating a measurements report for the second type of pilot signal. | 2,400 |
7,764 | 7,764 | 15,024,705 | 2,488 | A video data encoding apparatus operable to encode an array of input video data values includes: a differential pulse code modulation (DPCM) coder configured to apply a differential pulse code modulation operation to the array of input video data values to generate an array of DPCM data values; a quantizer operable to quantize data derived from the DPCM data values; and controller circuitry controlling selection of a rounding operation by the quantizer from two or more candidate rounding operations. | 1-29. (canceled) 30. A video data encoding apparatus configured to encode an array of input video data values, the apparatus comprising:
a differential pulse code modulation (DPCM) coder configured to apply a differential pulse code modulation operation to the array of input video data values to generate an array of DPCM data values; a quantizer configured to quantize data derived from the DPCM data values; and controller circuitry configured to control selection of a rounding operation by the quantizer from two or more candidate rounding operations. 31. An apparatus according to claim 30, wherein the controller circuitry is a rate-distortion-optimized quantization controller. 32. An apparatus according to claim 31, further comprising data reordering circuitry configured to apply a reordering operation to an array of data input to or output from the DPCM coder. 33. An apparatus according to claim 32, wherein the reordering operation is a rotation operation in which data values in the array of data are rotated in position about a point in the array. 34. An apparatus according to claim 30, further comprising:
an entropy encoder configured to entropy-encode the DPCM data values in a processing order, with respect to the array of DPCM data values, such that, for any DPCM data value in the processing order, the DPCM data value does not have a dependency on a DPCM data value later in the processing order. 35. An apparatus according to claim 34, wherein:
the array of input video data values comprises an array of residual values generated as differences between respective video samples of a current image and predicted versions of those video samples, the predicted versions being derived from one or more images other than the current image; and for any array of input video data values, the processing order is always such that, for any DPCM data value in the processing order, the DPCM data value does not have a dependency on a DPCM data value later in the processing order. 36. An apparatus according to claim 34, wherein:
the array of input video data values comprises an array of residual values generated as differences between respective video samples of a current image and predicted versions of those video samples, the predicted versions being derived from the current image; and for any array of input video data values, the processing order is always such that, for any DPCM data value in the processing order, the DPCM data value does not have a dependency on a DPCM data value later in the processing order. 37. An apparatus according to claim 34, further comprising a frequency transformer, the apparatus being configured in a first mode in which DPCM coding is used, and in a second mode in which the frequency transformer is configured to apply a frequency transformation instead of the DPCM coder applying a DPCM operation. 38. An apparatus according to claim 37, wherein:
the frequency transformer is configured in the second mode to generate an array of frequency transformed data; and the entropy encoder is configured in the second mode to apply a processing order starting from an array position corresponding to that of a highest frequency component and ending at an array position corresponding to that of a lowest frequency component. 39. An apparatus according to claim 38, further comprising data reordering circuitry configured to apply a reordering operation to an array of data. 40. An apparatus according to claim 39, wherein the data reordering operation is a rotation operation in which data values within a block are rotated by 180° about a center of the block. 41. An apparatus according to claim 39, wherein:
the first mode is a transform-skip mode in which a frequency transformation is not used; and the data reordering circuitry is configured to always operate on the DPCM coded data in the transform-skip mode. 42. An apparatus according to claim 39, configured to associate two or more flags with the encoded data, the two or more flags defining whether or not the data reordering operation should be applied in respect of two or more respective permutations of encoding parameters. 43. An apparatus according to claim 39, configured to associate a flag with the encoded data indicating whether the data reordering operation is applied to data which has been subject to DPCM encoding or to data to be DPCM encoded. 44. An apparatus according to claim 34, further comprising, in a decoding path, a residual differential pulse code modulation (RDPCM) decoder configured to apply a differential pulse code modulation operation to the entropy decoded video data values to generate an array of RDPCM data values. 45. An apparatus according to claim 44, wherein the DPCM decoder is configured to clip the DPCM decoded data to an acceptable numerical range for the data. 46. An apparatus according to claim 44, wherein the DPCM decoder is configured to abort the decoding of the entropy decoded video data values if one or more of the DPCM decoded data values exceeds an acceptable numerical range for the data. 47. A video data capture, storage, transmission, and/or recording apparatus comprising the apparatus according to claim 30. 48. A video data encoding method for encoding an array of input video data values, the method comprising:
applying a differential pulse code modulation (DPCM) operation to the array of input video data values to generate an array of DPCM data values; quantizing data derived from the DPCM data values; and controlling selection of a rounding operation by the quantizer from two or more candidate rounding operations. 49. A non-transitory computer readable medium including computer program instructions, which when executed by a computer causes the computer to perform the method of claim 48. | A video data encoding apparatus operable to encode an array of input video data values includes: a differential pulse code modulation (DPCM) coder configured to apply a differential pulse code modulation operation to the array of input video data values to generate an array of DPCM data values; a quantizer operable to quantize data derived from the DPCM data values; and controller circuitry controlling selection of a rounding operation by the quantizer from two or more candidate rounding operations.1-29. (canceled) 30. A video data encoding apparatus configured to encode an array of input video data values, the apparatus comprising:
a differential pulse code modulation (DPCM) coder configured to apply a differential pulse code modulation operation to the array of input video data values to generate an array of DPCM data values; a quantizer configured to quantize data derived from the DPCM data values; and controller circuitry configured to control selection of a rounding operation by the quantizer from two or more candidate rounding operations. 31. An apparatus according to claim 30, wherein the controller circuitry is a rate-distortion-optimized quantization controller. 32. An apparatus according to claim 31, further comprising data reordering circuitry configured to apply a reordering operation to an array of data input to or output from the DPCM coder. 33. An apparatus according to claim 32, wherein the reordering operation is a rotation operation in which data values in the array of data are rotated in position about a point in the array. 34. An apparatus according to claim 30, further comprising:
an entropy encoder configured to entropy-encode the DPCM data values in a processing order, with respect to the array of DPCM data values, such that, for any DPCM data value in the processing order, the DPCM data value does not have a dependency on a DPCM data value later in the processing order. 35. An apparatus according to claim 34, wherein:
the array of input video data values comprises an array of residual values generated as differences between respective video samples of a current image and predicted versions of those video samples, the predicted versions being derived from one or more images other than the current image; and for any array of input video data values, the processing order is always such that, for any DPCM data value in the processing order, the DPCM data value does not have a dependency on a DPCM data value later in the processing order. 36. An apparatus according to claim 34, wherein:
the array of input video data values comprises an array of residual values generated as differences between respective video samples of a current image and predicted versions of those video samples, the predicted versions being derived from the current image; and for any array of input video data values, the processing order is always such that, for any DPCM data value in the processing order, the DPCM data value does not have a dependency on a DPCM data value later in the processing order. 37. An apparatus according to claim 34, further comprising a frequency transformer, the apparatus being configured in a first mode in which DPCM coding is used, and in a second mode in which the frequency transformer is configured to apply a frequency transformation instead of the DPCM coder applying a DPCM operation. 38. An apparatus according to claim 37, wherein:
the frequency transformer is configured in the second mode to generate an array of frequency transformed data; and the entropy encoder is configured in the second mode to apply a processing order starting from an array position corresponding to that of a highest frequency component and ending at an array position corresponding to that of a lowest frequency component. 39. An apparatus according to claim 38, further comprising data reordering circuitry configured to apply a reordering operation to an array of data. 40. An apparatus according to claim 39, wherein the data reordering operation is a rotation operation in which data values within a block are rotated by 180° about a center of the block. 41. An apparatus according to claim 39, wherein:
the first mode is a transform-skip mode in which a frequency transformation is not used; and the data reordering circuitry is configured to always operate on the DPCM coded data in the transform-skip mode. 42. An apparatus according to claim 39, configured to associate two or more flags with the encoded data, the two or more flags defining whether or not the data reordering operation should be applied in respect of two or more respective permutations of encoding parameters. 43. An apparatus according to claim 39, configured to associate a flag with the encoded data indicating whether the data reordering operation is applied to data which has been subject to DPCM encoding or to data to be DPCM encoded. 44. An apparatus according to claim 34, further comprising, in a decoding path, a residual differential pulse code modulation (RDPCM) decoder configured to apply a differential pulse code modulation operation to the entropy decoded video data values to generate an array of RDPCM data values. 45. An apparatus according to claim 44, wherein the DPCM decoder is configured to clip the DPCM decoded data to an acceptable numerical range for the data. 46. An apparatus according to claim 44, wherein the DPCM decoder is configured to abort the decoding of the entropy decoded video data values if one or more of the DPCM decoded data values exceeds an acceptable numerical range for the data. 47. A video data capture, storage, transmission, and/or recording apparatus comprising the apparatus according to claim 30. 48. A video data encoding method for encoding an array of input video data values, the method comprising:
applying a differential pulse code modulation (DPCM) operation to the array of input video data values to generate an array of DPCM data values; quantizing data derived from the DPCM data values; and controlling selection of a rounding operation by the quantizer from two or more candidate rounding operations. 49. A non-transitory computer readable medium including computer program instructions, which when executed by a computer causes the computer to perform the method of claim 48. | 2,400 |
7,765 | 7,765 | 15,372,843 | 2,495 | Disclosed are various embodiments for a transmission service to suspend temporarily transmission of electronic communications to a recipient. In one embodiment, the transmission service receives a request to suspend receiving electronic communications temporarily for a suspension period. In response, the transmission service suspends transmitting electronic communications to the recipient during the duration of the suspension period. Then, the transmission service resumes transmitting electronic communications to the recipient upon the expiration of the suspension period. | 1. A non-transitory computer-readable medium embodying a program executable in a computing device, comprising:
code configured to receive a first request to suspend transmission of electronic communications to a recipient during a suspension period, wherein the first request is associated with a recipient identifier (ID) and is received in response to a determination to suspend transmission based at least in part on a magnitude of sales associated with a previous transmission of electronic communications to the recipient; code configured to associate the recipient ID with a suspension state in response to receiving the first request to suspend transmission of the electronic communications; code configured to receive a second request to transmit an electronic communication to the recipient; and code configured to prevent transmitting the electronic communication to the recipient during the suspension period based on the association of the recipient ID with the suspension state. 2. The non-transitory computer-readable medium of claim 1, further comprising:
code configured to receive a distribution list comprising correspondence information of a plurality of recipients; code configured to determine whether each one of the recipients included in the distribution list has previously requested to suspend receiving electronic communications; and responsive to the determination that one of the recipients has not previously requested suspension, code configured to transmit the electronic communications to the respective one of the recipients. 3. (canceled) 4. A system, comprising:
at least one computing device; and a transmission service executable in the at least one computing device, the transmission service comprising:
logic configured to receive a request to suspend transmission of a plurality of electronic communications to a recipient for a suspension period, wherein the request is received in response to a determination to suspend transmission based at least in part on a magnitude of sales associated with a previous transmission of electronic communications to the recipient;
logic configured to suspend transmitting the electronic communications to the recipient during the suspension period by associating a suspension state to a recipient identifier (ID) representing the recipient; and
logic configured to resume transmitting the electronic communications to the recipient after the suspension period expires. 5. The system of claim 4, wherein the electronic communications comprise content transmitted via at least one of an email communication, a short message service (SMS) message, and a message received through a social network. 6. The system of claim 4, wherein the logic configured to receive the request to suspend transmission of the plurality of electronic communications to the recipient for the suspension period comprises logic for receiving the suspension period from the recipient. 7. The system of claim 4, wherein the suspension period is a default period of time. 8. The system of claim 6, wherein the logic configured to receive the request to suspend transmission of the plurality of electronic communications to the recipient for the suspension period comprises logic for providing a selectable list of available periods of time for the suspension period and for receiving a selection of a period of time as the suspension period from the recipient. 9. The system of claim 4, wherein the logic configured to receive the request to suspend transmission of the plurality of electronic communications to the recipient for the suspension period comprises logic for receiving the request from a selectable hyperlink. 10. The system of claim 4, wherein the transmission service further comprises logic configured to receive a change request to change the suspension period during the suspension period. 11. The system of claim 4, wherein the electronic communications comprise at least one of a plurality of marketing materials and a plurality of advertising materials. 12. The system of claim 4, wherein the transmission service further comprises:
logic configured to determine whether the recipient ID is associated with the suspension state; and responsive to a determination that the recipient ID is associated with a suspension state, logic configured to store the electronic transmissions scheduled to be delivered to the recipient in a data store while the recipient ID is associated with the suspension state. 13. The system of claim 4, wherein the transmission service further comprises logic configured to transmit the electronic communications that were scheduled to be delivered during the suspension period to the recipient after the suspension period expires. 14. A method, comprising:
receiving, by a computing device executing code stored on a tangible medium, a request to suspend transmission of electronic communications to a recipient for a suspension period, the request comprising a recipient identifier (ID) for the recipient and received in response to a determination to suspend transmission based at least in part on a magnitude of sales associated with a previous transmission of electronic communications to the recipient; associating, by the computing device, the recipient ID with a suspension state; suspending, by the computing device, transmission of the electronic communications to the recipient during the suspension period by preventing the electronic communications from being transmitted to the recipient based on the suspension state being associated with the recipient ID; and responsive to determining an expiration of the suspension period, de-associating, by the computing device, the recipient ID with the suspension state, and transmitting at least one of the electronic communications to the recipient. 15. The method of claim 14, further comprising storing, by the computing device, the suspended electronic communications in a data store. 16. The method of claim 14, wherein the electronic communications comprise at least one of a plurality of marketing materials and a plurality of advertising materials. 17. The method of claim 14, wherein the electronic communications comprise content transmitted by at least one of an email communication, a SMS message, and a message on a social network. 18. The method of claim 14, further comprising:
responsive to receiving, by the computing device, a resume request to resume transmission of the electronic communications prior to the expiration of the suspension period, resuming transmission of the electronic communications. 19. The method of claim 14, further comprising:
receiving a plurality of suspension preferences to regulate the suspension. 20. The method of claim 19, wherein the suspension preferences comprise at least one of sender information, recipient information, a plurality of subject line keywords, and a plurality of subject matter keywords. | Disclosed are various embodiments for a transmission service to suspend temporarily transmission of electronic communications to a recipient. In one embodiment, the transmission service receives a request to suspend receiving electronic communications temporarily for a suspension period. In response, the transmission service suspends transmitting electronic communications to the recipient during the duration of the suspension period. Then, the transmission service resumes transmitting electronic communications to the recipient upon the expiration of the suspension period.1. A non-transitory computer-readable medium embodying a program executable in a computing device, comprising:
code configured to receive a first request to suspend transmission of electronic communications to a recipient during a suspension period, wherein the first request is associated with a recipient identifier (ID) and is received in response to a determination to suspend transmission based at least in part on a magnitude of sales associated with a previous transmission of electronic communications to the recipient; code configured to associate the recipient ID with a suspension state in response to receiving the first request to suspend transmission of the electronic communications; code configured to receive a second request to transmit an electronic communication to the recipient; and code configured to prevent transmitting the electronic communication to the recipient during the suspension period based on the association of the recipient ID with the suspension state. 2. The non-transitory computer-readable medium of claim 1, further comprising:
code configured to receive a distribution list comprising correspondence information of a plurality of recipients; code configured to determine whether each one of the recipients included in the distribution list has previously requested to suspend receiving electronic communications; and responsive to the determination that one of the recipients has not previously requested suspension, code configured to transmit the electronic communications to the respective one of the recipients. 3. (canceled) 4. A system, comprising:
at least one computing device; and a transmission service executable in the at least one computing device, the transmission service comprising:
logic configured to receive a request to suspend transmission of a plurality of electronic communications to a recipient for a suspension period, wherein the request is received in response to a determination to suspend transmission based at least in part on a magnitude of sales associated with a previous transmission of electronic communications to the recipient;
logic configured to suspend transmitting the electronic communications to the recipient during the suspension period by associating a suspension state to a recipient identifier (ID) representing the recipient; and
logic configured to resume transmitting the electronic communications to the recipient after the suspension period expires. 5. The system of claim 4, wherein the electronic communications comprise content transmitted via at least one of an email communication, a short message service (SMS) message, and a message received through a social network. 6. The system of claim 4, wherein the logic configured to receive the request to suspend transmission of the plurality of electronic communications to the recipient for the suspension period comprises logic for receiving the suspension period from the recipient. 7. The system of claim 4, wherein the suspension period is a default period of time. 8. The system of claim 6, wherein the logic configured to receive the request to suspend transmission of the plurality of electronic communications to the recipient for the suspension period comprises logic for providing a selectable list of available periods of time for the suspension period and for receiving a selection of a period of time as the suspension period from the recipient. 9. The system of claim 4, wherein the logic configured to receive the request to suspend transmission of the plurality of electronic communications to the recipient for the suspension period comprises logic for receiving the request from a selectable hyperlink. 10. The system of claim 4, wherein the transmission service further comprises logic configured to receive a change request to change the suspension period during the suspension period. 11. The system of claim 4, wherein the electronic communications comprise at least one of a plurality of marketing materials and a plurality of advertising materials. 12. The system of claim 4, wherein the transmission service further comprises:
logic configured to determine whether the recipient ID is associated with the suspension state; and responsive to a determination that the recipient ID is associated with a suspension state, logic configured to store the electronic transmissions scheduled to be delivered to the recipient in a data store while the recipient ID is associated with the suspension state. 13. The system of claim 4, wherein the transmission service further comprises logic configured to transmit the electronic communications that were scheduled to be delivered during the suspension period to the recipient after the suspension period expires. 14. A method, comprising:
receiving, by a computing device executing code stored on a tangible medium, a request to suspend transmission of electronic communications to a recipient for a suspension period, the request comprising a recipient identifier (ID) for the recipient and received in response to a determination to suspend transmission based at least in part on a magnitude of sales associated with a previous transmission of electronic communications to the recipient; associating, by the computing device, the recipient ID with a suspension state; suspending, by the computing device, transmission of the electronic communications to the recipient during the suspension period by preventing the electronic communications from being transmitted to the recipient based on the suspension state being associated with the recipient ID; and responsive to determining an expiration of the suspension period, de-associating, by the computing device, the recipient ID with the suspension state, and transmitting at least one of the electronic communications to the recipient. 15. The method of claim 14, further comprising storing, by the computing device, the suspended electronic communications in a data store. 16. The method of claim 14, wherein the electronic communications comprise at least one of a plurality of marketing materials and a plurality of advertising materials. 17. The method of claim 14, wherein the electronic communications comprise content transmitted by at least one of an email communication, a SMS message, and a message on a social network. 18. The method of claim 14, further comprising:
responsive to receiving, by the computing device, a resume request to resume transmission of the electronic communications prior to the expiration of the suspension period, resuming transmission of the electronic communications. 19. The method of claim 14, further comprising:
receiving a plurality of suspension preferences to regulate the suspension. 20. The method of claim 19, wherein the suspension preferences comprise at least one of sender information, recipient information, a plurality of subject line keywords, and a plurality of subject matter keywords. | 2,400 |
7,766 | 7,766 | 14,129,156 | 2,485 | A method of indicating bit stream subsets in a compressed video bit stream is provided. The method comprises receiving the bit stream, dividing the bit stream into packets, wherein each packet comprises either one of video data or supplemental information, marking each packet ( 310 - 312, 320 - 322 ) with a first subset identifier (s0, s1) which is associated with a corresponding bit stream subset, and providing a first sequence parameter set (SPS) ( 310 ), marked with the same first subset identifier as its associated bit stream subset. The first SPS further comprises a second subset identifier (b1) indicating a decoding dependency ( 304 ) of the bit stream subset associated with the first subset identifier on a bit stream subset associated with the second subset identifier. Further, a method of extracting video packets from a video bit stream is provided. The method comprises receiving packets from the bit stream, extracting a first SPS ( 310 ), which is marked with the first subset identifier (s0) and further comprising the second subset identifier (b1), using the first and the second subset identifier as relevant subset identifiers, and, for each received packet ( 310 - 312, 320 - 322 ), inspecting the first subset identifier (s0, s1) of the packet, and extracting, under the condition that the extracted first subset identifier matches one of the relevant subset identifiers, the packet from the bit stream. | 1-26. (canceled) 27. A method of indicating bit stream subsets in a compressed video bit stream comprising a plurality of bit stream subsets, the method comprising:
receiving the compressed video bit stream; dividing the compressed video bit stream into video packets, wherein each video packet comprises one of either video data or supplemental information; marking each video packet with a first subset identifier of a plurality of subset identifiers, wherein each subset identifier of the plurality of subset identifiers is associated with a corresponding bit stream subset of the plurality of bit stream subsets; providing, for at least some of the bitstream subsets of the plurality of bit stream subsets, a first sequence parameter set (SPS) marked with the same first subset identifier as its associated bit stream subset, the first SPS further comprising a second subset identifier of the plurality of subset identifiers, the second subset identifier indicating a decoding dependency of the bit stream subset associated with the first subset identifier on a bit stream subset associated with the second subset identifier; wherein the second subset identifier is associated with a second SPS, and wherein the first SPS selectively updates codec information comprised in the second SPS. 28. The method of claim 27, wherein, for each first SPS, the bit stream subset associated with the first subset identifier, the bit stream subset associated with the second subset identifier, and bit stream subsets on which the bit stream subset associated with the first subset identifier is indirectly dependent, together form an independently decodable video representation. 29. The method of claim 27, wherein the first SPS further comprises information describing a video representation it represents. 30. The method of claim 27, wherein the first SPS further comprises a third subset identifier of the plurality of subset identifiers, the third subset identifier having the same value as a corresponding subset identifier of another SPS. 31. The method of claim 27, wherein the codec information to be updated is determined by the second subset identifier comprised in the first SPS and a type of dependency indicated by the second subset identifier. 32. A non-transitory computer-readable medium comprising, stored thereupon, a computer program comprising computer program code, the computer program code being adapted to, when executed on a processor, cause the processor to:
receive a compressed video bit stream comprising a plurality of bit stream subsets; divide the compressed video bit stream into video packets, wherein each video packet comprises one of either video data or supplemental information; mark each video packet with a first subset identifier of a plurality of subset identifiers, wherein each subset identifier of the plurality of subset identifiers is associated with a corresponding bit stream subset of the plurality of bit stream subsets; provide, for at least some of the bitstream subsets of the plurality of bit stream subsets, a first sequence parameter set (SPS) marked with the same first subset identifier as its associated bit stream subset, the first SPS further comprising a second subset identifier of the plurality of subset identifiers, the second subset identifier indicating a decoding dependency of the bit stream subset associated with the first subset identifier on a bit stream subset associated with the second subset identifier; wherein the second subset identifier is associated with a second SPS, and wherein the first SPS selectively updates codec information comprised in the second SPS. 33. A method of extracting video packets from a compressed video bit stream divided into video packets, the compressed video bit stream comprising a plurality of bit stream subsets, wherein each video packet comprises one of either video data or supplemental information and further comprises a first subset identifier of a plurality of subset identifiers, wherein each subset identifier is associated with a corresponding bit stream subset of the plurality of bit stream subsets, the method comprising:
receiving video packets from the compressed video bit stream; extracting a first sequence parameter set (SPS) from the received video packets, the first SPS being marked with the first subset identifier and further comprising a second subset identifier of the plurality of subset identifiers, the second subset identifier indicating a decoding dependency of the bit stream subset associated with the first subset identifier on a bit stream subset associated with the second subset identifier; using the first subset identifier as a relevant subset identifier; using the second subset identifier as a further relevant subset identifier; and, for each received video packet: inspecting the first subset identifier of the video packet; and extracting, under the condition that the extracted first subset identifier matches one of the relevant subset identifiers, the video packet from the compressed video bit stream; wherein the second subset identifier is associated with a second SPS, and wherein the first SPS selectively updates codec information comprised in the second SPS. 34. The method of claim 33, wherein, the bit stream subset associated with the first subset identifier, the bit stream subset associated with the second subset identifier, and bit stream subsets on which the bit stream subset associated with the first subset identifier is indirectly dependent, together form an independently decodable video representation. 35. The method of claim 33, wherein the first SPS further comprises information describing a video representation it represents. 36. The method of claim 33, wherein the first SPS further comprises a third subset identifier of the plurality of subset identifiers, the third subset identifier having the same value as a corresponding subset identifier of another SPS. 37. The method of claim 33, wherein the codec information to be updated is determined by the second subset identifier comprised in the first SPS and a type of dependency indicated by the second subset identifier. 38. The method of claim 33, further comprising, for each received video packet:
forwarding or decoding the extracted video packet, and discarding, under the condition that the extracted subset identifier does not match any of the relevant subset identifiers, the received video packet. 39. A non-transitory computer-readable medium comprising, stored thereupon, a computer program comprising computer program code, the computer program code being adapted to, when executed on a processor, cause the processor to:
receive video packets from a compressed video bit stream divided into video packets and comprising a plurality of bit stream subsets, wherein each video packet comprises one of either video data or supplemental information and further comprises a first subset identifier of a plurality of subset identifiers, wherein each subset identifier is associated with a corresponding bit stream subset of the plurality of bit stream subsets; extract a first sequence parameter set (SPS) from the received video packets, the first SPS being marked with the first subset identifier and further comprising a second subset identifier of the plurality of subset identifiers, the second subset identifier indicating a decoding dependency of the bit stream subset associated with the first subset identifier on a bit stream subset associated with the second subset identifier; use the first subset identifier as a relevant subset identifier; use the second subset identifier as a further relevant subset identifier; and, for each received video packet: inspect the first subset identifier of the video packet, and extract, under the condition that the extracted first subset identifier matches one of the relevant subset identifiers, the video packet from the compressed video bit stream; wherein the second subset identifier is associated with a second SPS, and wherein the first SPS selectively updates codec information comprised in the second SPS. 40. A bit stream marker for indicating bit stream subsets in a compressed video bit stream comprising a plurality of bit stream subsets, the bit stream marker comprising:
a receiving circuit being arranged to receive the compressed video bit stream; a packetizing circuit being arranged to divide the compressed video bit stream into video packets, wherein each video packet comprises either one of video data or supplemental information; a marking circuit being arranged to mark each video packet with a first subset identifier of a plurality of subset identifiers, wherein each subset identifier of the plurality of subset identifiers is associated with a corresponding bit stream subset of the plurality of bit stream subsets; and a subset definition circuit being arranged to provide, for at least some of the bitstream subsets of the plurality of bit stream subsets, a first sequence parameter set (SPS) marked with the same first subset identifier as its associated bit stream subset, the first SPS further comprising a second subset identifier of the plurality of subset identifiers, the second subset identifier indicating a decoding dependency of the bit stream subset associated with the first subset identifier on the bit stream subset associated with the second subset identifier; wherein the second subset identifier is associated with a second SPS, and wherein the first SPS selectively updates codec information comprised in the second SPS. 41. The bit stream marker of claim 40, wherein, for each first SPS, the bit stream subset associated with the first subset identifier, the bit stream subset associated with the second subset identifier, and bit stream subsets on which the bit stream subset associated with the first subset identifier is indirectly dependent, together form an independently decodable video representation. 42. The bit stream marker of claim 40, wherein the first SPS further comprises information describing a video representation it represents. 43. The bit stream marker of claim 40, wherein the first SPS further comprises a third subset identifier of the plurality of subset identifiers, the third subset identifier having the same value as a corresponding subset identifier of another SPS. 44. The bit stream marker of claim 40, wherein the codec information to be updated is determined by the second subset identifier comprised in the first SPS and a type of dependency indicated by the second subset identifier. 45. A bit stream extractor for extracting video packets from a compressed video bit stream divided into video packets, the compressed video bit stream comprising a plurality of bit stream subsets, wherein each video packet comprises either one of video data or supplemental information and a first subset identifier of a plurality of subset identifiers, wherein each subset identifier is associated with a corresponding bit stream subset of the plurality of bit stream subsets, the bit stream extractor comprising:
a receiving circuit being arranged to receive video packets from the compressed video bit stream, a subset selecting circuit being arranged to: extract a first sequence parameter set (SPS) from the received video packets, the first SPS being marked with the first subset identifier and further comprising a second subset identifier of the plurality of subset identifiers, the second subset identifier indicating a decoding dependency of the bit stream subset associated with the first subset identifier on a bit stream subset associated with the second subset identifier, use the first subset identifier as a relevant subset identifier, and use the second subset identifier as a further relevant subset identifier, and an extracting circuit being arranged to, for each received video packet: inspect the first subset identifier of the video packet, and extract, under the condition that the extracted first subset identifier matches one of the relevant subset identifiers, the video packet from the compressed video bit stream, wherein the second subset identifier is associated with a second SPS, and wherein the first SPS selectively updates codec information comprised in the second SPS. 46. The bit stream extractor of claim 45, wherein the bit stream subset associated with the first subset identifier, the bit stream subset associated with the second subset identifier, and bit stream subsets on which the bit stream subset associated with the first subset identifier is indirectly dependent, together form an independently decodable video representation. 47. The bit stream extractor of claim 45, wherein the first SPS further comprises information describing a video representation it represents. 48. The bit stream extractor of claim 45, wherein the first SPS further comprises a third subset identifier of the plurality of subset identifiers, the third subset identifier having the same value as a corresponding subset identifier of another SPS. 49. The bit stream extractor of claim 45, wherein the codec information to be updated is determined by the second subset identifier comprised in the first SPS and a type of dependency indicated by the second subset identifier. 50. The bit stream extractor of claim 45, wherein the extracting circuit is further arranged to, for each received video packet:
forward or decode the extracted video packet, and discard, under the condition that the extracted subset identifier does not match any of the relevant subset identifiers, the received video packet. | A method of indicating bit stream subsets in a compressed video bit stream is provided. The method comprises receiving the bit stream, dividing the bit stream into packets, wherein each packet comprises either one of video data or supplemental information, marking each packet ( 310 - 312, 320 - 322 ) with a first subset identifier (s0, s1) which is associated with a corresponding bit stream subset, and providing a first sequence parameter set (SPS) ( 310 ), marked with the same first subset identifier as its associated bit stream subset. The first SPS further comprises a second subset identifier (b1) indicating a decoding dependency ( 304 ) of the bit stream subset associated with the first subset identifier on a bit stream subset associated with the second subset identifier. Further, a method of extracting video packets from a video bit stream is provided. The method comprises receiving packets from the bit stream, extracting a first SPS ( 310 ), which is marked with the first subset identifier (s0) and further comprising the second subset identifier (b1), using the first and the second subset identifier as relevant subset identifiers, and, for each received packet ( 310 - 312, 320 - 322 ), inspecting the first subset identifier (s0, s1) of the packet, and extracting, under the condition that the extracted first subset identifier matches one of the relevant subset identifiers, the packet from the bit stream.1-26. (canceled) 27. A method of indicating bit stream subsets in a compressed video bit stream comprising a plurality of bit stream subsets, the method comprising:
receiving the compressed video bit stream; dividing the compressed video bit stream into video packets, wherein each video packet comprises one of either video data or supplemental information; marking each video packet with a first subset identifier of a plurality of subset identifiers, wherein each subset identifier of the plurality of subset identifiers is associated with a corresponding bit stream subset of the plurality of bit stream subsets; providing, for at least some of the bitstream subsets of the plurality of bit stream subsets, a first sequence parameter set (SPS) marked with the same first subset identifier as its associated bit stream subset, the first SPS further comprising a second subset identifier of the plurality of subset identifiers, the second subset identifier indicating a decoding dependency of the bit stream subset associated with the first subset identifier on a bit stream subset associated with the second subset identifier; wherein the second subset identifier is associated with a second SPS, and wherein the first SPS selectively updates codec information comprised in the second SPS. 28. The method of claim 27, wherein, for each first SPS, the bit stream subset associated with the first subset identifier, the bit stream subset associated with the second subset identifier, and bit stream subsets on which the bit stream subset associated with the first subset identifier is indirectly dependent, together form an independently decodable video representation. 29. The method of claim 27, wherein the first SPS further comprises information describing a video representation it represents. 30. The method of claim 27, wherein the first SPS further comprises a third subset identifier of the plurality of subset identifiers, the third subset identifier having the same value as a corresponding subset identifier of another SPS. 31. The method of claim 27, wherein the codec information to be updated is determined by the second subset identifier comprised in the first SPS and a type of dependency indicated by the second subset identifier. 32. A non-transitory computer-readable medium comprising, stored thereupon, a computer program comprising computer program code, the computer program code being adapted to, when executed on a processor, cause the processor to:
receive a compressed video bit stream comprising a plurality of bit stream subsets; divide the compressed video bit stream into video packets, wherein each video packet comprises one of either video data or supplemental information; mark each video packet with a first subset identifier of a plurality of subset identifiers, wherein each subset identifier of the plurality of subset identifiers is associated with a corresponding bit stream subset of the plurality of bit stream subsets; provide, for at least some of the bitstream subsets of the plurality of bit stream subsets, a first sequence parameter set (SPS) marked with the same first subset identifier as its associated bit stream subset, the first SPS further comprising a second subset identifier of the plurality of subset identifiers, the second subset identifier indicating a decoding dependency of the bit stream subset associated with the first subset identifier on a bit stream subset associated with the second subset identifier; wherein the second subset identifier is associated with a second SPS, and wherein the first SPS selectively updates codec information comprised in the second SPS. 33. A method of extracting video packets from a compressed video bit stream divided into video packets, the compressed video bit stream comprising a plurality of bit stream subsets, wherein each video packet comprises one of either video data or supplemental information and further comprises a first subset identifier of a plurality of subset identifiers, wherein each subset identifier is associated with a corresponding bit stream subset of the plurality of bit stream subsets, the method comprising:
receiving video packets from the compressed video bit stream; extracting a first sequence parameter set (SPS) from the received video packets, the first SPS being marked with the first subset identifier and further comprising a second subset identifier of the plurality of subset identifiers, the second subset identifier indicating a decoding dependency of the bit stream subset associated with the first subset identifier on a bit stream subset associated with the second subset identifier; using the first subset identifier as a relevant subset identifier; using the second subset identifier as a further relevant subset identifier; and, for each received video packet: inspecting the first subset identifier of the video packet; and extracting, under the condition that the extracted first subset identifier matches one of the relevant subset identifiers, the video packet from the compressed video bit stream; wherein the second subset identifier is associated with a second SPS, and wherein the first SPS selectively updates codec information comprised in the second SPS. 34. The method of claim 33, wherein, the bit stream subset associated with the first subset identifier, the bit stream subset associated with the second subset identifier, and bit stream subsets on which the bit stream subset associated with the first subset identifier is indirectly dependent, together form an independently decodable video representation. 35. The method of claim 33, wherein the first SPS further comprises information describing a video representation it represents. 36. The method of claim 33, wherein the first SPS further comprises a third subset identifier of the plurality of subset identifiers, the third subset identifier having the same value as a corresponding subset identifier of another SPS. 37. The method of claim 33, wherein the codec information to be updated is determined by the second subset identifier comprised in the first SPS and a type of dependency indicated by the second subset identifier. 38. The method of claim 33, further comprising, for each received video packet:
forwarding or decoding the extracted video packet, and discarding, under the condition that the extracted subset identifier does not match any of the relevant subset identifiers, the received video packet. 39. A non-transitory computer-readable medium comprising, stored thereupon, a computer program comprising computer program code, the computer program code being adapted to, when executed on a processor, cause the processor to:
receive video packets from a compressed video bit stream divided into video packets and comprising a plurality of bit stream subsets, wherein each video packet comprises one of either video data or supplemental information and further comprises a first subset identifier of a plurality of subset identifiers, wherein each subset identifier is associated with a corresponding bit stream subset of the plurality of bit stream subsets; extract a first sequence parameter set (SPS) from the received video packets, the first SPS being marked with the first subset identifier and further comprising a second subset identifier of the plurality of subset identifiers, the second subset identifier indicating a decoding dependency of the bit stream subset associated with the first subset identifier on a bit stream subset associated with the second subset identifier; use the first subset identifier as a relevant subset identifier; use the second subset identifier as a further relevant subset identifier; and, for each received video packet: inspect the first subset identifier of the video packet, and extract, under the condition that the extracted first subset identifier matches one of the relevant subset identifiers, the video packet from the compressed video bit stream; wherein the second subset identifier is associated with a second SPS, and wherein the first SPS selectively updates codec information comprised in the second SPS. 40. A bit stream marker for indicating bit stream subsets in a compressed video bit stream comprising a plurality of bit stream subsets, the bit stream marker comprising:
a receiving circuit being arranged to receive the compressed video bit stream; a packetizing circuit being arranged to divide the compressed video bit stream into video packets, wherein each video packet comprises either one of video data or supplemental information; a marking circuit being arranged to mark each video packet with a first subset identifier of a plurality of subset identifiers, wherein each subset identifier of the plurality of subset identifiers is associated with a corresponding bit stream subset of the plurality of bit stream subsets; and a subset definition circuit being arranged to provide, for at least some of the bitstream subsets of the plurality of bit stream subsets, a first sequence parameter set (SPS) marked with the same first subset identifier as its associated bit stream subset, the first SPS further comprising a second subset identifier of the plurality of subset identifiers, the second subset identifier indicating a decoding dependency of the bit stream subset associated with the first subset identifier on the bit stream subset associated with the second subset identifier; wherein the second subset identifier is associated with a second SPS, and wherein the first SPS selectively updates codec information comprised in the second SPS. 41. The bit stream marker of claim 40, wherein, for each first SPS, the bit stream subset associated with the first subset identifier, the bit stream subset associated with the second subset identifier, and bit stream subsets on which the bit stream subset associated with the first subset identifier is indirectly dependent, together form an independently decodable video representation. 42. The bit stream marker of claim 40, wherein the first SPS further comprises information describing a video representation it represents. 43. The bit stream marker of claim 40, wherein the first SPS further comprises a third subset identifier of the plurality of subset identifiers, the third subset identifier having the same value as a corresponding subset identifier of another SPS. 44. The bit stream marker of claim 40, wherein the codec information to be updated is determined by the second subset identifier comprised in the first SPS and a type of dependency indicated by the second subset identifier. 45. A bit stream extractor for extracting video packets from a compressed video bit stream divided into video packets, the compressed video bit stream comprising a plurality of bit stream subsets, wherein each video packet comprises either one of video data or supplemental information and a first subset identifier of a plurality of subset identifiers, wherein each subset identifier is associated with a corresponding bit stream subset of the plurality of bit stream subsets, the bit stream extractor comprising:
a receiving circuit being arranged to receive video packets from the compressed video bit stream, a subset selecting circuit being arranged to: extract a first sequence parameter set (SPS) from the received video packets, the first SPS being marked with the first subset identifier and further comprising a second subset identifier of the plurality of subset identifiers, the second subset identifier indicating a decoding dependency of the bit stream subset associated with the first subset identifier on a bit stream subset associated with the second subset identifier, use the first subset identifier as a relevant subset identifier, and use the second subset identifier as a further relevant subset identifier, and an extracting circuit being arranged to, for each received video packet: inspect the first subset identifier of the video packet, and extract, under the condition that the extracted first subset identifier matches one of the relevant subset identifiers, the video packet from the compressed video bit stream, wherein the second subset identifier is associated with a second SPS, and wherein the first SPS selectively updates codec information comprised in the second SPS. 46. The bit stream extractor of claim 45, wherein the bit stream subset associated with the first subset identifier, the bit stream subset associated with the second subset identifier, and bit stream subsets on which the bit stream subset associated with the first subset identifier is indirectly dependent, together form an independently decodable video representation. 47. The bit stream extractor of claim 45, wherein the first SPS further comprises information describing a video representation it represents. 48. The bit stream extractor of claim 45, wherein the first SPS further comprises a third subset identifier of the plurality of subset identifiers, the third subset identifier having the same value as a corresponding subset identifier of another SPS. 49. The bit stream extractor of claim 45, wherein the codec information to be updated is determined by the second subset identifier comprised in the first SPS and a type of dependency indicated by the second subset identifier. 50. The bit stream extractor of claim 45, wherein the extracting circuit is further arranged to, for each received video packet:
forward or decode the extracted video packet, and discard, under the condition that the extracted subset identifier does not match any of the relevant subset identifiers, the received video packet. | 2,400 |
7,767 | 7,767 | 13,354,364 | 2,423 | A method for performing texture decoding in a multi-threaded processor includes substantially simultaneously decoding, in multiple hardware threads, at least two macro-blocks of a VP8 frame. Each hardware thread decodes one macro-block at a time. The method may also include assigning a macro-block from the at least two macro-blocks of the VP8 frame to a hardware thread of the multi-threaded processor. | 1. A method for texture decoding in a multi-threaded processor, comprising:
substantially simultaneously decoding at least two macro-blocks of a VP8 frame, by a plurality of hardware threads, each hardware thread processing a macro-block. 2. The method of claim 1, in which the at least two macro-blocks are from different rows. 3. The method of claim 1, further comprising storing unfiltered pixels in at least one of a row buffer and a column buffer. 4. The method of claim 1, further comprising:
storing reconstructed pixels of the at least two macro-blocks within at least one of a row buffer and a column buffer. 5. The method of claim 1, in which decoding further comprising:
reconstructing one macro-block in each hardware thread; and then filtering the reconstructed macro-block. 6. The method of claim 1, in which a number of macro-blocks being decoded by a single hardware thread is based on a cache line size. 7. The method of claim 1, in which decoding comprises simultaneously reconstructing and filtering each of the at least two macro-blocks. 8. The method of claim 1, in which decoding comprises simultaneously texture decoding each of the at least two macro-blocks of the VP8 frame. 9. The method of claim 1, further comprising integrating the multi-threaded processor into at least one of a mobile phone, a set top box, a music player, a video player, an entertainment unit, a navigation device, a computer, a hand-held personal communication systems (PCS) unit, a portable data unit, and a fixed location data unit. 10. An apparatus for multi-threaded texture decoding comprising:
a memory; and at least one multi-threaded processor coupled to the memory, the at least one multi-thread processor being configured to substantially simultaneously decode at least two macro-blocks of a VP8 frame by a plurality of hardware threads, each hardware thread processing a macro-block. 11. The apparatus of claim 10, in which the at least two macro-blocks are from different rows. 12. The apparatus of claim 10, in which the at least one multi-threaded processor is further configured:
to store unfiltered pixels in at least one of a row buffer and a column buffer; and to store reconstructed pixels of the at least two macro-blocks within at least one of the row buffer and the column buffer. 13. The apparatus of claim 10, in which the multi-threaded processor is further configured to decode by:
reconstructing one macro-block in a hardware thread; and then filtering the reconstructed macro-block. 14. The apparatus of claim 10, further comprising a controller configured to assign a macro-block of at least two macro-blocks of the VP8 frame to a hardware thread of the multi-threaded processor. 15. The apparatus of claim 10, in which the multi-thread processor comprises one of a digital signal processor and a multi-core processor. 16. The apparatus of claim 10, in which a number of macro-blocks being decoded by a single hardware thread is based on a cache line size. 17. The apparatus of claim 10, integrated into at least one of a mobile phone, a set top box, a music player, a video player, an entertainment unit, a navigation device, a computer, a hand-held personal communication systems (PCS) unit, a portable data unit, and a fixed location data unit. 18. A apparatus for multi-threaded texture decoding, comprising:
means for assigning a macro-block of at least two macro-blocks of a VP8 frame to a hardware thread; and means for substantially simultaneously decoding, in a plurality of hardware threads, the at least two macro-blocks of the VP8 frame. 19. The apparatus of claim 18, integrated into at least one of a mobile phone, a set top box, a music player, a video player, an entertainment unit, a navigation device, a computer, a hand-held personal communication systems (PCS) unit, a portable data unit, and a fixed location data unit. 20. A computer program product configured for multi-threaded texture decoding, the computer program product comprising:
a non-transitory computer-readable medium having non-transitory program code recorded thereon, the program code comprising: program code to substantially simultaneously decode at least two macro-blocks of a VP8 frame by a plurality of hardware threads, each hardware thread processing a macro-block. 21. The program product of claim 20, integrated into at least one of a mobile phone, a set top box, a music player, a video player, an entertainment unit, a navigation device, a computer, a hand-held personal communication systems (PCS) unit, a portable data unit, and a fixed location data unit. | A method for performing texture decoding in a multi-threaded processor includes substantially simultaneously decoding, in multiple hardware threads, at least two macro-blocks of a VP8 frame. Each hardware thread decodes one macro-block at a time. The method may also include assigning a macro-block from the at least two macro-blocks of the VP8 frame to a hardware thread of the multi-threaded processor.1. A method for texture decoding in a multi-threaded processor, comprising:
substantially simultaneously decoding at least two macro-blocks of a VP8 frame, by a plurality of hardware threads, each hardware thread processing a macro-block. 2. The method of claim 1, in which the at least two macro-blocks are from different rows. 3. The method of claim 1, further comprising storing unfiltered pixels in at least one of a row buffer and a column buffer. 4. The method of claim 1, further comprising:
storing reconstructed pixels of the at least two macro-blocks within at least one of a row buffer and a column buffer. 5. The method of claim 1, in which decoding further comprising:
reconstructing one macro-block in each hardware thread; and then filtering the reconstructed macro-block. 6. The method of claim 1, in which a number of macro-blocks being decoded by a single hardware thread is based on a cache line size. 7. The method of claim 1, in which decoding comprises simultaneously reconstructing and filtering each of the at least two macro-blocks. 8. The method of claim 1, in which decoding comprises simultaneously texture decoding each of the at least two macro-blocks of the VP8 frame. 9. The method of claim 1, further comprising integrating the multi-threaded processor into at least one of a mobile phone, a set top box, a music player, a video player, an entertainment unit, a navigation device, a computer, a hand-held personal communication systems (PCS) unit, a portable data unit, and a fixed location data unit. 10. An apparatus for multi-threaded texture decoding comprising:
a memory; and at least one multi-threaded processor coupled to the memory, the at least one multi-thread processor being configured to substantially simultaneously decode at least two macro-blocks of a VP8 frame by a plurality of hardware threads, each hardware thread processing a macro-block. 11. The apparatus of claim 10, in which the at least two macro-blocks are from different rows. 12. The apparatus of claim 10, in which the at least one multi-threaded processor is further configured:
to store unfiltered pixels in at least one of a row buffer and a column buffer; and to store reconstructed pixels of the at least two macro-blocks within at least one of the row buffer and the column buffer. 13. The apparatus of claim 10, in which the multi-threaded processor is further configured to decode by:
reconstructing one macro-block in a hardware thread; and then filtering the reconstructed macro-block. 14. The apparatus of claim 10, further comprising a controller configured to assign a macro-block of at least two macro-blocks of the VP8 frame to a hardware thread of the multi-threaded processor. 15. The apparatus of claim 10, in which the multi-thread processor comprises one of a digital signal processor and a multi-core processor. 16. The apparatus of claim 10, in which a number of macro-blocks being decoded by a single hardware thread is based on a cache line size. 17. The apparatus of claim 10, integrated into at least one of a mobile phone, a set top box, a music player, a video player, an entertainment unit, a navigation device, a computer, a hand-held personal communication systems (PCS) unit, a portable data unit, and a fixed location data unit. 18. A apparatus for multi-threaded texture decoding, comprising:
means for assigning a macro-block of at least two macro-blocks of a VP8 frame to a hardware thread; and means for substantially simultaneously decoding, in a plurality of hardware threads, the at least two macro-blocks of the VP8 frame. 19. The apparatus of claim 18, integrated into at least one of a mobile phone, a set top box, a music player, a video player, an entertainment unit, a navigation device, a computer, a hand-held personal communication systems (PCS) unit, a portable data unit, and a fixed location data unit. 20. A computer program product configured for multi-threaded texture decoding, the computer program product comprising:
a non-transitory computer-readable medium having non-transitory program code recorded thereon, the program code comprising: program code to substantially simultaneously decode at least two macro-blocks of a VP8 frame by a plurality of hardware threads, each hardware thread processing a macro-block. 21. The program product of claim 20, integrated into at least one of a mobile phone, a set top box, a music player, a video player, an entertainment unit, a navigation device, a computer, a hand-held personal communication systems (PCS) unit, a portable data unit, and a fixed location data unit. | 2,400 |
7,768 | 7,768 | 14,834,702 | 2,488 | Methods and systems for smooth switching of video sources. One method includes the steps of: Inferring that first and second network paths share a common link that has insufficient bandwidth to carry both the respective first and second incoming high-definition uncompressed videos (HD-UVs) generated by first and second real-time video encoders (RT-VEs). And synchronizing a smooth switching between the first and second incoming HD-UVs by: indicating the first and second RT-VEs to increase their first and second compression ratios to ratios that enable the common link to carry both the first and second compressed videos; indicating a video switcher to perform the smooth switching between the first and second corresponding outgoing HD-UVs; indicating the first RT-VE to stop sending the first compressed video after the smooth switching; and indicating the second RT-VE to decrease the second compression ratio. | 1. A network configured to support smooth switching of video sources, comprising:
a first real-time video encoder (RT-VE) configured to receive a first incoming high-definition uncompressed video (HD-UV), compress the first incoming HD-UV into a first compressed video using a first compression ratio of up to 5:1, and send the first compressed video over a first network path to a first real-time video decoder (RT-VD) configured to extract a first outgoing HD-UV from the first compressed video; a second RT-VE configured to receive a second incoming HD-UV, compress the second incoming HD-UV into a second compressed video using a second compression ratio of up to 5:1, and send the second compressed video over a second network path to a second RT-VD configured to extract a second outgoing HD-UV from the second compressed video; wherein the first and second network paths share a common link having insufficient bandwidth to carry both the first and second compressed videos; and a video switching controller configured to synchronize a smooth switching between the first and second incoming HD-UVs by: indicating the first RT-VE and the second RT-VE to increase the first and second compression ratios to ratios that enable the common link to carry both the first and second compressed videos, indicating a video switcher to perform a smooth switching between the first and second outgoing HD-UVs, indicating the first RT-VE to stop sending the first compressed video after the smooth switching, and indicating the second RT-VE to decrease the second compression ratio; wherein the increase in the first and second compression ratios is performed in a visually lossless manner that results in first and second outgoing HD-UVs that are visually lossless compared to the first and second incoming HD-UVs before, during, and after the switching. 2. The network of claim 1, wherein the video switcher configured to receive the first and second outgoing HD-UVs, perform the smooth switching, and output uncompressed video. 3. The network of claim 2, wherein the smooth switching between the first and second outgoing HD-UVs is a smooth switching without interruption during the switching between the first and second outgoing HD-UVs. 4. The network of claim 1, wherein the video switcher is configured to: receive the first and second compressed videos, perform the smooth switching, and output uncompressed video. 5. The network of claim 4, wherein the video switching controller is implemented at the video switcher. 6. The network of claim 1, wherein the first and second incoming HD-UV are synchronized, and the video switcher does not perform video scaling. 7. The network of claim 1, wherein the first and second incoming HD-UV are unsynchronized, and the video switcher is further configured to perform video scaling. 8. The network of claim 1, wherein the video switching controller is implemented as part of at least one of the following devices: the first RT-VE, the second RT-VE, the video switcher, the first RT-VD, the second RT-VD, and a stand-alone device. 9. The network of claim 1, wherein the first RT-VE comprises at least two different real-time video encoders for different compression ratios. 10. The network of claim 1, wherein the first RT-VE comprises a low compression real-time video encoder to compress the first compressed video before the increase in the first compression ratio, and a higher compression real-time video encoder to compress the first compressed video after the increase in the first compression ratio. 11. The network of claim 1, wherein the first compression ratio was between 1:1 and 3:1 before the increase. 12. The network of claim 1, wherein the increase in the first compression ratio maintains the same fixed delay between corresponding pixels of the first incoming HD-UV and the first outgoing HD-UV. 13. The network of claim 1, wherein the increase in the first compression ratio maintains a total delay between corresponding frames of the first incoming HD-UV and the first outgoing HD-UV that is below duration of two video frames. 14. The network of claim 1, wherein smooth switching indicates that a comparison between the last few corresponding frames of the first compressed video and the first outgoing HD-UV until the smooth switching, and a comparison between the first few corresponding frames of the second compressed video and the second outgoing HD-UV immediately after the smooth switching, demonstrate that video synchronization signals and video timing signals are uninterrupted as a result of the smooth switching. 15. The network of claim 1, wherein smooth switching indicates that a comparison between the last few corresponding frames of the first compressed video and the first outgoing HD-UV until the smooth switching, and a comparison between the first few corresponding frames of the second compressed video and the second outgoing HD-UV immediately after the smooth switching, demonstrate that the smooth switching does not result in a missing video frame. 16. The network of claim 1, wherein smooth switching indicates that a comparison between the last few corresponding frames of the first compressed video and the first outgoing HD-UV until the smooth switching, and a comparison between the first few corresponding frames of the second compressed video and the second outgoing HD-UV immediately after the smooth switching, demonstrate that the smooth switching does not result in a missing video blanking signal. 17. The network of claim 1, wherein smooth switching indicates that no pixels are lost, excluding color depth, as a result of the smooth switching. 18. A method for smooth switching of video sources, comprising:
receiving, by a first real-time video encoder (RT-VE), a first incoming high-definition uncompressed video (HD-UV), compressing the first incoming HD-UV into a first compressed video using a first compression ratio of up to 5:1, and sending the first compressed video over a first network path to a first real-time video decoder (RT-VD); extracting, by the first RT-VD, a first outgoing HD-UV from the first compressed video; receiving, by a second RT-VE, a second incoming HD-UV, compressing the second incoming HD-UV into a second compressed video using a second compression ratio of up to 5:1, and sending the second compressed video over a second network path to a second RT-VD; extracting, by the second RT-VD, a second outgoing HD-UV from the second compressed video; inferring that the first and second network paths share a common link having insufficient bandwidth to carry both the first and second compressed videos; and synchronizing a smooth switching between the first and second incoming HD-UVs by: indicating the first RT-VE and the second RT-VE to increase the first and second compression ratios to ratios that enable the common link to carry both the first and second compressed videos, indicating a video switcher to perform the smooth switching between the first and second outgoing HD-UVs, indicating the first RT-VE to stop sending the first compressed video after the smooth switching, and indicating the second RT-VE to decrease the second compression ratio. 19. The method of claim 18, wherein the smooth switching between the first and second outgoing HD-UVs is a smooth switching without interruption during the switching between the first and second outgoing HD-UVs. 20. The method of claim 18, wherein the first and second incoming HD-UV are unsynchronized, and further comprising performing video scaling by the video switcher. 21. The method of claim 18, further comprising operating, by the first RT-VE, a low compression real-time video encoder for compressing the first compressed video before increasing the first compression ratio, and operating a higher compression real-time video encoder to compress the first compressed video after increasing the first compression ratio. 22. The method of claim 18, wherein the first compression ratio was between 1:1 and 3:1 before increasing it. 23. The method of claim 18, wherein the increasing of the first compression ratio maintains the same fixed delay between corresponding pixels of the first incoming HD-UV and the first outgoing HD-UV. 24. The method of claim 18, wherein the increasing of the first compression ratio maintains a total delay between corresponding frames of the first incoming HD-UV and the first outgoing HD-UV that is below duration of two video frames. | Methods and systems for smooth switching of video sources. One method includes the steps of: Inferring that first and second network paths share a common link that has insufficient bandwidth to carry both the respective first and second incoming high-definition uncompressed videos (HD-UVs) generated by first and second real-time video encoders (RT-VEs). And synchronizing a smooth switching between the first and second incoming HD-UVs by: indicating the first and second RT-VEs to increase their first and second compression ratios to ratios that enable the common link to carry both the first and second compressed videos; indicating a video switcher to perform the smooth switching between the first and second corresponding outgoing HD-UVs; indicating the first RT-VE to stop sending the first compressed video after the smooth switching; and indicating the second RT-VE to decrease the second compression ratio.1. A network configured to support smooth switching of video sources, comprising:
a first real-time video encoder (RT-VE) configured to receive a first incoming high-definition uncompressed video (HD-UV), compress the first incoming HD-UV into a first compressed video using a first compression ratio of up to 5:1, and send the first compressed video over a first network path to a first real-time video decoder (RT-VD) configured to extract a first outgoing HD-UV from the first compressed video; a second RT-VE configured to receive a second incoming HD-UV, compress the second incoming HD-UV into a second compressed video using a second compression ratio of up to 5:1, and send the second compressed video over a second network path to a second RT-VD configured to extract a second outgoing HD-UV from the second compressed video; wherein the first and second network paths share a common link having insufficient bandwidth to carry both the first and second compressed videos; and a video switching controller configured to synchronize a smooth switching between the first and second incoming HD-UVs by: indicating the first RT-VE and the second RT-VE to increase the first and second compression ratios to ratios that enable the common link to carry both the first and second compressed videos, indicating a video switcher to perform a smooth switching between the first and second outgoing HD-UVs, indicating the first RT-VE to stop sending the first compressed video after the smooth switching, and indicating the second RT-VE to decrease the second compression ratio; wherein the increase in the first and second compression ratios is performed in a visually lossless manner that results in first and second outgoing HD-UVs that are visually lossless compared to the first and second incoming HD-UVs before, during, and after the switching. 2. The network of claim 1, wherein the video switcher configured to receive the first and second outgoing HD-UVs, perform the smooth switching, and output uncompressed video. 3. The network of claim 2, wherein the smooth switching between the first and second outgoing HD-UVs is a smooth switching without interruption during the switching between the first and second outgoing HD-UVs. 4. The network of claim 1, wherein the video switcher is configured to: receive the first and second compressed videos, perform the smooth switching, and output uncompressed video. 5. The network of claim 4, wherein the video switching controller is implemented at the video switcher. 6. The network of claim 1, wherein the first and second incoming HD-UV are synchronized, and the video switcher does not perform video scaling. 7. The network of claim 1, wherein the first and second incoming HD-UV are unsynchronized, and the video switcher is further configured to perform video scaling. 8. The network of claim 1, wherein the video switching controller is implemented as part of at least one of the following devices: the first RT-VE, the second RT-VE, the video switcher, the first RT-VD, the second RT-VD, and a stand-alone device. 9. The network of claim 1, wherein the first RT-VE comprises at least two different real-time video encoders for different compression ratios. 10. The network of claim 1, wherein the first RT-VE comprises a low compression real-time video encoder to compress the first compressed video before the increase in the first compression ratio, and a higher compression real-time video encoder to compress the first compressed video after the increase in the first compression ratio. 11. The network of claim 1, wherein the first compression ratio was between 1:1 and 3:1 before the increase. 12. The network of claim 1, wherein the increase in the first compression ratio maintains the same fixed delay between corresponding pixels of the first incoming HD-UV and the first outgoing HD-UV. 13. The network of claim 1, wherein the increase in the first compression ratio maintains a total delay between corresponding frames of the first incoming HD-UV and the first outgoing HD-UV that is below duration of two video frames. 14. The network of claim 1, wherein smooth switching indicates that a comparison between the last few corresponding frames of the first compressed video and the first outgoing HD-UV until the smooth switching, and a comparison between the first few corresponding frames of the second compressed video and the second outgoing HD-UV immediately after the smooth switching, demonstrate that video synchronization signals and video timing signals are uninterrupted as a result of the smooth switching. 15. The network of claim 1, wherein smooth switching indicates that a comparison between the last few corresponding frames of the first compressed video and the first outgoing HD-UV until the smooth switching, and a comparison between the first few corresponding frames of the second compressed video and the second outgoing HD-UV immediately after the smooth switching, demonstrate that the smooth switching does not result in a missing video frame. 16. The network of claim 1, wherein smooth switching indicates that a comparison between the last few corresponding frames of the first compressed video and the first outgoing HD-UV until the smooth switching, and a comparison between the first few corresponding frames of the second compressed video and the second outgoing HD-UV immediately after the smooth switching, demonstrate that the smooth switching does not result in a missing video blanking signal. 17. The network of claim 1, wherein smooth switching indicates that no pixels are lost, excluding color depth, as a result of the smooth switching. 18. A method for smooth switching of video sources, comprising:
receiving, by a first real-time video encoder (RT-VE), a first incoming high-definition uncompressed video (HD-UV), compressing the first incoming HD-UV into a first compressed video using a first compression ratio of up to 5:1, and sending the first compressed video over a first network path to a first real-time video decoder (RT-VD); extracting, by the first RT-VD, a first outgoing HD-UV from the first compressed video; receiving, by a second RT-VE, a second incoming HD-UV, compressing the second incoming HD-UV into a second compressed video using a second compression ratio of up to 5:1, and sending the second compressed video over a second network path to a second RT-VD; extracting, by the second RT-VD, a second outgoing HD-UV from the second compressed video; inferring that the first and second network paths share a common link having insufficient bandwidth to carry both the first and second compressed videos; and synchronizing a smooth switching between the first and second incoming HD-UVs by: indicating the first RT-VE and the second RT-VE to increase the first and second compression ratios to ratios that enable the common link to carry both the first and second compressed videos, indicating a video switcher to perform the smooth switching between the first and second outgoing HD-UVs, indicating the first RT-VE to stop sending the first compressed video after the smooth switching, and indicating the second RT-VE to decrease the second compression ratio. 19. The method of claim 18, wherein the smooth switching between the first and second outgoing HD-UVs is a smooth switching without interruption during the switching between the first and second outgoing HD-UVs. 20. The method of claim 18, wherein the first and second incoming HD-UV are unsynchronized, and further comprising performing video scaling by the video switcher. 21. The method of claim 18, further comprising operating, by the first RT-VE, a low compression real-time video encoder for compressing the first compressed video before increasing the first compression ratio, and operating a higher compression real-time video encoder to compress the first compressed video after increasing the first compression ratio. 22. The method of claim 18, wherein the first compression ratio was between 1:1 and 3:1 before increasing it. 23. The method of claim 18, wherein the increasing of the first compression ratio maintains the same fixed delay between corresponding pixels of the first incoming HD-UV and the first outgoing HD-UV. 24. The method of claim 18, wherein the increasing of the first compression ratio maintains a total delay between corresponding frames of the first incoming HD-UV and the first outgoing HD-UV that is below duration of two video frames. | 2,400 |
7,769 | 7,769 | 15,377,274 | 2,424 | Apparatus, system and method for promoting media apps to an end user of a smart device. The smart device gathers information of apps that have been installed into the smart device and provides this information to a remote server. The remote server compares the information sent by the smart device to an identification of promoted apps received from a remote source to identify apps that are not installed in the smart device that are included in the identification of promoted apps. The remote server then notifies the smart device of which apps in the identification of promoted apps are not installed into the smart device, so that a user of the smart device may choose to have the missing app installed. | 1-16. (canceled) 17. A smart device adapted to promote new apps to an end user of the smart device, comprising:
an electronic storage medium having processor-readable code embodied therein and storing an identification of promoted apps as received from a remote server; a communication interface; and a processor, coupled to the electronic storage medium and the communication interface for executing the processor-readable code that causes the smart device to: send, via the communication interface, a command to one or more other smart devices on a common local-area network as the smart device, the command instructing each of the one or more smart devices to provide installed app information to the smart device over the local-area network; receive, via the communication interface, the installed app information of one or more of the other smart devices; compare the received installed app information of each of the one or more other smart devices that provided installed app information to the smart device with the identification of promoted apps; determine one or more missing apps from the comparison of the identification of apps presently installed on the one or more other smart devices with the identification of promoted apps, the missing apps comprising one or more apps listed in the identification of promoted apps that are not present in one or more of the other smart devices; and provide a notification to one or more of the other smart devices indicating that one or more of the missing apps are available for installation on one or more of the other smart devices. 18. The smart device as recited in claim 17, wherein the command instructing each of the one or more smart devices to provide installed app information to the smart device over the local-area network is caused to be automatically transmitted by the smart device in connection with a device discovery process performed by the smart device. 19. A method for promoting new apps to an end user of the smart device, comprising:
receiving by a smart device from a remote server an identification of promoted apps; sending by the smart device a command to one or more other smart devices on a common local-area network as the smart device, the command instructing each of the one or more smart devices to provide installed app information to the smart device over the local-area network; receiving by the smart device the installed app information of one or more of the other smart devices; comparing by the smart device the received installed app information of each of the one or more other smart devices that provided installed app information to the smart device with the identification of promoted apps; determining by the smart device one or more missing apps from the comparison of the identification of apps presently installed on the one or more other smart devices with the identification of promoted apps, the missing apps comprising one or more apps listed in the identification of promoted apps that are not present in one or more of the other smart devices; and causing by the smart device a notification to be provided to one or more of the other smart devices indicating that one or more of the missing apps are available for installation on one or more of the other smart devices. 20. The method as recited in claim 19, wherein the command instructing each of the one or more smart devices to provide installed app information to the smart device over the local-area network is caused to be automatically transmitted by the smart device in connection with a device discovery process performed by the smart device 21. A method for promoting new apps to an end user of the smart device, comprising:
receiving by a smart device from a remote server an identification of promoted apps; sending by the smart device a command to one or more other smart devices on a common local-area network as the smart device, the command instructing each of the one or more smart devices to provide installed app information to the smart device over the local-area network; receiving by the smart device the installed app information of one or more of the other smart devices; comparing by the smart device the received installed app information of each of the one or more other smart devices that provided installed app information to the smart device with the identification of promoted apps; determining by the smart device one or more missing apps from the comparison of the identification of apps presently installed on the one or more other smart devices with the identification of promoted apps, the missing apps comprising one or more apps listed in the identification of promoted apps that are not present in one or more of the other smart devices; and causing by the smart device one or more of the missing apps to be automatically installed on one or more of the other smart devices. 22. The method as recited in claim 21, wherein the command instructing each of the one or more smart devices to provide installed app information to the smart device over the local-area network is caused to be automatically transmitted by the smart device in connection with a device discovery process performed by the smart device | Apparatus, system and method for promoting media apps to an end user of a smart device. The smart device gathers information of apps that have been installed into the smart device and provides this information to a remote server. The remote server compares the information sent by the smart device to an identification of promoted apps received from a remote source to identify apps that are not installed in the smart device that are included in the identification of promoted apps. The remote server then notifies the smart device of which apps in the identification of promoted apps are not installed into the smart device, so that a user of the smart device may choose to have the missing app installed.1-16. (canceled) 17. A smart device adapted to promote new apps to an end user of the smart device, comprising:
an electronic storage medium having processor-readable code embodied therein and storing an identification of promoted apps as received from a remote server; a communication interface; and a processor, coupled to the electronic storage medium and the communication interface for executing the processor-readable code that causes the smart device to: send, via the communication interface, a command to one or more other smart devices on a common local-area network as the smart device, the command instructing each of the one or more smart devices to provide installed app information to the smart device over the local-area network; receive, via the communication interface, the installed app information of one or more of the other smart devices; compare the received installed app information of each of the one or more other smart devices that provided installed app information to the smart device with the identification of promoted apps; determine one or more missing apps from the comparison of the identification of apps presently installed on the one or more other smart devices with the identification of promoted apps, the missing apps comprising one or more apps listed in the identification of promoted apps that are not present in one or more of the other smart devices; and provide a notification to one or more of the other smart devices indicating that one or more of the missing apps are available for installation on one or more of the other smart devices. 18. The smart device as recited in claim 17, wherein the command instructing each of the one or more smart devices to provide installed app information to the smart device over the local-area network is caused to be automatically transmitted by the smart device in connection with a device discovery process performed by the smart device. 19. A method for promoting new apps to an end user of the smart device, comprising:
receiving by a smart device from a remote server an identification of promoted apps; sending by the smart device a command to one or more other smart devices on a common local-area network as the smart device, the command instructing each of the one or more smart devices to provide installed app information to the smart device over the local-area network; receiving by the smart device the installed app information of one or more of the other smart devices; comparing by the smart device the received installed app information of each of the one or more other smart devices that provided installed app information to the smart device with the identification of promoted apps; determining by the smart device one or more missing apps from the comparison of the identification of apps presently installed on the one or more other smart devices with the identification of promoted apps, the missing apps comprising one or more apps listed in the identification of promoted apps that are not present in one or more of the other smart devices; and causing by the smart device a notification to be provided to one or more of the other smart devices indicating that one or more of the missing apps are available for installation on one or more of the other smart devices. 20. The method as recited in claim 19, wherein the command instructing each of the one or more smart devices to provide installed app information to the smart device over the local-area network is caused to be automatically transmitted by the smart device in connection with a device discovery process performed by the smart device 21. A method for promoting new apps to an end user of the smart device, comprising:
receiving by a smart device from a remote server an identification of promoted apps; sending by the smart device a command to one or more other smart devices on a common local-area network as the smart device, the command instructing each of the one or more smart devices to provide installed app information to the smart device over the local-area network; receiving by the smart device the installed app information of one or more of the other smart devices; comparing by the smart device the received installed app information of each of the one or more other smart devices that provided installed app information to the smart device with the identification of promoted apps; determining by the smart device one or more missing apps from the comparison of the identification of apps presently installed on the one or more other smart devices with the identification of promoted apps, the missing apps comprising one or more apps listed in the identification of promoted apps that are not present in one or more of the other smart devices; and causing by the smart device one or more of the missing apps to be automatically installed on one or more of the other smart devices. 22. The method as recited in claim 21, wherein the command instructing each of the one or more smart devices to provide installed app information to the smart device over the local-area network is caused to be automatically transmitted by the smart device in connection with a device discovery process performed by the smart device | 2,400 |
7,770 | 7,770 | 14,782,353 | 2,468 | A method of transmitting an indication of user equipment uplink buffer status in a wireless communications network in which user equipment is configured to communicate with one or more base stations using dual connectivity techniques, a computer program product and user equipment operable to perform that method. The method comprises: receiving an indication of a dual connectivity configuration to be used by the user equipment for uplink transmission; structuring an uplink buffer status report to group uplink buffer status by one or more scheduler to be used by the user equipment according to the received indication of a dual connectivity configuration; and transmitting the structured uplink buffer status report to the one or more base stations. Aspects and embodiments provide a method for providing buffer status reports in a network offering dual connectivity functionality according to which user equipment is served by multiple independent schedulers which may be connected via a non-ideal backhaul link. | 1. A method of transmitting an indication of user equipment uplink buffer status in a wireless communications network in which said user equipment is configured to communicate with more than one base stations using dual connectivity techniques, said method comprising:
receiving an indication of a dual connectivity configuration to be used by said user equipment for uplink transmission; structuring an uplink buffer status report to group uplink buffer status by one or more scheduler to be used by said user equipment according to said received indication of a dual connectivity configuration; and transmitting said structured uplink buffer status report to one or more of said base stations. 2. A method according to claim 1, wherein structuring said uplink buffer status report comprises constructing an independent uplink buffer status report for each scheduler to be used by said user equipment. 3. A method according to claim 1, wherein structuring said uplink buffer status report comprises constructing a single uplink buffer status report including grouped buffer status information for each scheduler to be used by said user equipment. 4. A method according to claim 3, wherein said grouped buffer status information includes an indication of a scheduler to which the information is of relevance. 5. A method according to claim 3, wherein said grouped buffer status information s encoded such that it can only be decoded by a scheduler to which the information is of relevance. 6. A method according to claim 1, wherein transmitting said structured uplink buffer status report comprises transmitting one of said independent uplink buffer status reports to each scheduler. 7. A method according to claim 1, wherein transmitting said structured uplink buffer status report comprises using resource granted by said more than one base stations. 8. A method according to claim 7, comprising choosing granted resource for transmission of said structured uplink buffer status report in dependence upon a scheduler to which the information is of relevance. 9. A computer program product operable, when executed on a computer, to perform the method of claim 1. 10. User equipment operable to transmit an indication of user equipment uplink buffer status in a wireless communications network in which said user equipment is configured to communicate with more than one base stations using dual connectivity techniques, said user equipment comprising:
reception logic operable to receive an indication of a dual connectivity configuration to be used by said user equipment for uplink transmission; buffer status logic operable to structure an uplink buffer status report to group uplink buffer status by one or more scheduler to be used by said user equipment according to said received indication of a dual connectivity configuration; and communication logic operable to transmit said structured uplink buffer status report to one or more of said base stations. 11. A method of receiving an indication of user equipment uplink buffer status at a base station in a wireless communications network in which said user equipment is configured to communicate with more than one base stations using dual connectivity techniques, said method comprising:
determining a dual connectivity configuration being used by said user equipment for uplink transmission; receiving a structured uplink buffer status report from said user equipment; and extracting information from said structured uplink buffer status report relevant to a scheduler at said base station. 12. A method according to claim 11, comprising: determining that said structured uplink buffer status report includes information relevant to a scheduler at another of said more than one base stations; and
forwarding said information relevant to a scheduler at another of said one or more base stations to said another of said more than one base stations. 13. A computer program product operable, when executed on a computer, to perform the method of claim 11. 14. A base station operable to receive an indication of user equipment uplink buffer status in a wireless communications network in which said user equipment is configured to communicate with more than one base stations using dual connectivity techniques, said base station comprising:
configuration logic operable to determine a dual connectivity configuration being used by said user equipment for uplink transmission; reception logic operable to receive a structured uplink buffer status report from said user equipment; and extraction logic operable to extract information from said structured uplink buffer status report relevant to a scheduler at said base station. 15. A method according to claim 1, wherein within said wireless communications network communication between base stations is subject to backhaul latency and an independent scheduler is provided at each of said more than one base stations. | A method of transmitting an indication of user equipment uplink buffer status in a wireless communications network in which user equipment is configured to communicate with one or more base stations using dual connectivity techniques, a computer program product and user equipment operable to perform that method. The method comprises: receiving an indication of a dual connectivity configuration to be used by the user equipment for uplink transmission; structuring an uplink buffer status report to group uplink buffer status by one or more scheduler to be used by the user equipment according to the received indication of a dual connectivity configuration; and transmitting the structured uplink buffer status report to the one or more base stations. Aspects and embodiments provide a method for providing buffer status reports in a network offering dual connectivity functionality according to which user equipment is served by multiple independent schedulers which may be connected via a non-ideal backhaul link.1. A method of transmitting an indication of user equipment uplink buffer status in a wireless communications network in which said user equipment is configured to communicate with more than one base stations using dual connectivity techniques, said method comprising:
receiving an indication of a dual connectivity configuration to be used by said user equipment for uplink transmission; structuring an uplink buffer status report to group uplink buffer status by one or more scheduler to be used by said user equipment according to said received indication of a dual connectivity configuration; and transmitting said structured uplink buffer status report to one or more of said base stations. 2. A method according to claim 1, wherein structuring said uplink buffer status report comprises constructing an independent uplink buffer status report for each scheduler to be used by said user equipment. 3. A method according to claim 1, wherein structuring said uplink buffer status report comprises constructing a single uplink buffer status report including grouped buffer status information for each scheduler to be used by said user equipment. 4. A method according to claim 3, wherein said grouped buffer status information includes an indication of a scheduler to which the information is of relevance. 5. A method according to claim 3, wherein said grouped buffer status information s encoded such that it can only be decoded by a scheduler to which the information is of relevance. 6. A method according to claim 1, wherein transmitting said structured uplink buffer status report comprises transmitting one of said independent uplink buffer status reports to each scheduler. 7. A method according to claim 1, wherein transmitting said structured uplink buffer status report comprises using resource granted by said more than one base stations. 8. A method according to claim 7, comprising choosing granted resource for transmission of said structured uplink buffer status report in dependence upon a scheduler to which the information is of relevance. 9. A computer program product operable, when executed on a computer, to perform the method of claim 1. 10. User equipment operable to transmit an indication of user equipment uplink buffer status in a wireless communications network in which said user equipment is configured to communicate with more than one base stations using dual connectivity techniques, said user equipment comprising:
reception logic operable to receive an indication of a dual connectivity configuration to be used by said user equipment for uplink transmission; buffer status logic operable to structure an uplink buffer status report to group uplink buffer status by one or more scheduler to be used by said user equipment according to said received indication of a dual connectivity configuration; and communication logic operable to transmit said structured uplink buffer status report to one or more of said base stations. 11. A method of receiving an indication of user equipment uplink buffer status at a base station in a wireless communications network in which said user equipment is configured to communicate with more than one base stations using dual connectivity techniques, said method comprising:
determining a dual connectivity configuration being used by said user equipment for uplink transmission; receiving a structured uplink buffer status report from said user equipment; and extracting information from said structured uplink buffer status report relevant to a scheduler at said base station. 12. A method according to claim 11, comprising: determining that said structured uplink buffer status report includes information relevant to a scheduler at another of said more than one base stations; and
forwarding said information relevant to a scheduler at another of said one or more base stations to said another of said more than one base stations. 13. A computer program product operable, when executed on a computer, to perform the method of claim 11. 14. A base station operable to receive an indication of user equipment uplink buffer status in a wireless communications network in which said user equipment is configured to communicate with more than one base stations using dual connectivity techniques, said base station comprising:
configuration logic operable to determine a dual connectivity configuration being used by said user equipment for uplink transmission; reception logic operable to receive a structured uplink buffer status report from said user equipment; and extraction logic operable to extract information from said structured uplink buffer status report relevant to a scheduler at said base station. 15. A method according to claim 1, wherein within said wireless communications network communication between base stations is subject to backhaul latency and an independent scheduler is provided at each of said more than one base stations. | 2,400 |
7,771 | 7,771 | 14,275,344 | 2,457 | In one embodiment, voting optimization requests that identify a validation data set are sent to a plurality of network nodes. Voting optimization data is received from the plurality of network nodes that was generated by executing classifiers using the validation data set. A set of one or more voting classifiers is then selected from among the classifiers based on the voting optimization data. One or more network nodes that host a voting classifier in the set of one or more selected voting classifiers is then notified of the selection. | 1. A method, comprising:
sending, by a device, voting optimization requests to a plurality of network nodes that identify a validation data set; receiving, at the device, voting optimization data from the plurality of network nodes, wherein the network nodes generate the voting optimization data by executing classifiers using the validation data set; selecting a set of one or more voting classifiers from among the classifiers based on the voting optimization data; and notifying, by the device, one or more network nodes of the selection, wherein each of the notified network nodes hosts a voting classifier in the set of one or more selected voting classifiers. 2. The method as in claim 1, wherein the voting optimization requests are sent to the plurality of network nodes via a network management server. 3. The method as in claim 1, wherein the voting optimization requests are sent to a multicast group that includes the plurality of network nodes. 4. The method as in claim 1, wherein the voting optimization data includes a classifier identifier for a particular classifier and an output of the particular classifier based on the validation data set. 5. The method as in claim 4, wherein the voting optimization data includes at least one of: a confidence measurement for the output of the particular classifier or a confidence measurement for the particular classifier. 6. The method as in claim 1, further comprising:
determining a vote count threshold for the voting classifiers. 7. The method as in claim 6, further comprising:
optimizing an objective function that includes a number of correct votes and a number of correct voters to select the set of voting classifiers and to determine the vote count threshold. 8. The method as in claim 1, further comprising:
receiving a notification that a classifier executed by a particular network node has been updated. 9. The method as in claim 1, further comprising:
receiving the voting classifiers at a local device; and performing a vote using the voting classifiers at the local device. 10. The method as in claim 1, further comprising:
initiating a distributed vote using the voting classifiers on the plurality of network nodes. 11. An apparatus, comprising:
one or more network interfaces to communicate with a low power and lossy network (LLN); a processor coupled to the network interfaces and adapted to execute one or more processes; and a memory configured to store a process executable by the processor, the process when executed operable to:
send voting optimization requests that identify a validation data set to a plurality of network nodes;
receive voting optimization data from the plurality of network nodes, wherein the network nodes generate the voting optimization data by executing classifiers using the validation data set;
select a set of one or more voting classifiers from among the classifiers based on the voting optimization data; and
notify one or more network nodes of the selection, wherein each of the notified network nodes hosts a voting classifier in the set of one or more selected voting classifiers. 12. The apparatus as in claim 11, wherein the voting optimization requests are sent to the plurality of network nodes via a network management server. 13. The apparatus as in claim 11, wherein the voting optimization requests are sent to a multicast group that includes the plurality of network nodes. 14. The apparatus as in claim 11, wherein the voting optimization data includes a classifier identifier for a classifier executed by a particular network node and an output of the identified classifier. 15. The apparatus as in claim 14, wherein the voting optimization data includes at least one of: a confidence measurement for the output of the identified classifier, or a confidence measurement for the identified classifier. 16. The apparatus as in claim 11, wherein the process when executed is further operable to:
determine a vote count threshold for the voting classifiers. 17. The apparatus as in claim 16, wherein the process when executed is further operable to:
optimize an objective function that includes a number of correct votes and a number of correct voters to select the set of voting classifiers and to determine the vote count threshold. 18. The apparatus as in claim 11, wherein the process when executed is further operable to:
receive a notification that a classifier executed by a particular network node has been updated. 19. The apparatus as in claim 11, wherein the process when executed is further operable to:
receive the voting classifiers at a local device; and perform a vote using the voting classifiers at the local device. 20. The apparatus as in claim 11, wherein the process when executed is further operable to:
initiate a distributed vote using the voting classifiers on the plurality of network nodes. 21. A tangible, non-transitory, computer-readable media having software encoded thereon, the software when executed by a processor operable to:
send voting optimization requests that identify a validation data set to a plurality of network nodes; receive voting optimization data from the plurality of network nodes, wherein the network nodes generate the voting optimization data by executing classifiers using the validation data set; select a set of one or more voting classifiers from among the classifiers based on the voting optimization data; and notify one or more network nodes of the selection, wherein each of the notified network nodes hosts a voting classifier in the set of one or more selected voting classifiers. 22. The computer-readable media as in claim 21, wherein the software when executed is further operable to:
receive the voting classifiers at a local device; and perform a vote using the voting classifiers at the local device. 23. The computer-readable media as in claim 21, wherein the software when executed is further operable to:
perform a distributed vote using the voting classifiers on the plurality of network nodes. | In one embodiment, voting optimization requests that identify a validation data set are sent to a plurality of network nodes. Voting optimization data is received from the plurality of network nodes that was generated by executing classifiers using the validation data set. A set of one or more voting classifiers is then selected from among the classifiers based on the voting optimization data. One or more network nodes that host a voting classifier in the set of one or more selected voting classifiers is then notified of the selection.1. A method, comprising:
sending, by a device, voting optimization requests to a plurality of network nodes that identify a validation data set; receiving, at the device, voting optimization data from the plurality of network nodes, wherein the network nodes generate the voting optimization data by executing classifiers using the validation data set; selecting a set of one or more voting classifiers from among the classifiers based on the voting optimization data; and notifying, by the device, one or more network nodes of the selection, wherein each of the notified network nodes hosts a voting classifier in the set of one or more selected voting classifiers. 2. The method as in claim 1, wherein the voting optimization requests are sent to the plurality of network nodes via a network management server. 3. The method as in claim 1, wherein the voting optimization requests are sent to a multicast group that includes the plurality of network nodes. 4. The method as in claim 1, wherein the voting optimization data includes a classifier identifier for a particular classifier and an output of the particular classifier based on the validation data set. 5. The method as in claim 4, wherein the voting optimization data includes at least one of: a confidence measurement for the output of the particular classifier or a confidence measurement for the particular classifier. 6. The method as in claim 1, further comprising:
determining a vote count threshold for the voting classifiers. 7. The method as in claim 6, further comprising:
optimizing an objective function that includes a number of correct votes and a number of correct voters to select the set of voting classifiers and to determine the vote count threshold. 8. The method as in claim 1, further comprising:
receiving a notification that a classifier executed by a particular network node has been updated. 9. The method as in claim 1, further comprising:
receiving the voting classifiers at a local device; and performing a vote using the voting classifiers at the local device. 10. The method as in claim 1, further comprising:
initiating a distributed vote using the voting classifiers on the plurality of network nodes. 11. An apparatus, comprising:
one or more network interfaces to communicate with a low power and lossy network (LLN); a processor coupled to the network interfaces and adapted to execute one or more processes; and a memory configured to store a process executable by the processor, the process when executed operable to:
send voting optimization requests that identify a validation data set to a plurality of network nodes;
receive voting optimization data from the plurality of network nodes, wherein the network nodes generate the voting optimization data by executing classifiers using the validation data set;
select a set of one or more voting classifiers from among the classifiers based on the voting optimization data; and
notify one or more network nodes of the selection, wherein each of the notified network nodes hosts a voting classifier in the set of one or more selected voting classifiers. 12. The apparatus as in claim 11, wherein the voting optimization requests are sent to the plurality of network nodes via a network management server. 13. The apparatus as in claim 11, wherein the voting optimization requests are sent to a multicast group that includes the plurality of network nodes. 14. The apparatus as in claim 11, wherein the voting optimization data includes a classifier identifier for a classifier executed by a particular network node and an output of the identified classifier. 15. The apparatus as in claim 14, wherein the voting optimization data includes at least one of: a confidence measurement for the output of the identified classifier, or a confidence measurement for the identified classifier. 16. The apparatus as in claim 11, wherein the process when executed is further operable to:
determine a vote count threshold for the voting classifiers. 17. The apparatus as in claim 16, wherein the process when executed is further operable to:
optimize an objective function that includes a number of correct votes and a number of correct voters to select the set of voting classifiers and to determine the vote count threshold. 18. The apparatus as in claim 11, wherein the process when executed is further operable to:
receive a notification that a classifier executed by a particular network node has been updated. 19. The apparatus as in claim 11, wherein the process when executed is further operable to:
receive the voting classifiers at a local device; and perform a vote using the voting classifiers at the local device. 20. The apparatus as in claim 11, wherein the process when executed is further operable to:
initiate a distributed vote using the voting classifiers on the plurality of network nodes. 21. A tangible, non-transitory, computer-readable media having software encoded thereon, the software when executed by a processor operable to:
send voting optimization requests that identify a validation data set to a plurality of network nodes; receive voting optimization data from the plurality of network nodes, wherein the network nodes generate the voting optimization data by executing classifiers using the validation data set; select a set of one or more voting classifiers from among the classifiers based on the voting optimization data; and notify one or more network nodes of the selection, wherein each of the notified network nodes hosts a voting classifier in the set of one or more selected voting classifiers. 22. The computer-readable media as in claim 21, wherein the software when executed is further operable to:
receive the voting classifiers at a local device; and perform a vote using the voting classifiers at the local device. 23. The computer-readable media as in claim 21, wherein the software when executed is further operable to:
perform a distributed vote using the voting classifiers on the plurality of network nodes. | 2,400 |
7,772 | 7,772 | 14,656,526 | 2,481 | In general, this disclosure describes techniques for coding video blocks using a color-space conversion process. A video coder, such as a video encoder or a video decoder, may determine a bit-depth of a luma component of the video data and a bit-depth of a chroma component of the video data. In response to the bit-depth of the luma component being different than the bit depth of the chroma component, the video coder may modify one or both of the bit depth of the luma component and the bit depth of the chroma component such that the bit depths are equal. The video coder may further apply the color-space transform process in encoding the video data. | 1. A method of encoding video data, the method comprising:
determining a bit-depth of a luma component of the video data and a bit-depth of a chroma component of the video data; in response to the bit-depth of the luma component being different than the bit depth of the chroma component, modifying one or both of the bit depth of the luma component and the bit depth of the chroma component such that the bit depths are equal; and applying a color-space transform process to the modified video data. 2. The method of claim 1, further comprising determining to use color-space conversion for encoding the video data, wherein determining to use color-space conversion for encoding the video data comprises:
setting a value of a syntax element that indicates that the video data was encoded using color-space conversion. 3. The method of claim 2, wherein the syntax element comprises a one-bit flag. 4. The method of claim 2, wherein the coding unit is coded in a mode other than intra-pulse code modulation (IPCM) mode, and wherein the syntax element indicates that the coding unit was encoded using color-space conversion when the coding unit is coded using a mode other than intra-pulse code modulation (IPCM) mode. 5. The method of claim 2, wherein the syntax element indicates that the coding unit was encoded using color-space conversion when there are non-zero coefficients in a transform unit of the coding unit. 6. The method of claim 2, wherein the syntax element is not signaled when the coding unit is intra coded and when a luma prediction mode and a chroma prediction mode of a prediction unit within the coding unit are different. 7. The method of claim 2, wherein the syntax element is not signaled when the coding unit is coded with a palette mode. 8. The method of claim 2, wherein a value of 1 for the syntax element indicates that color-space conversion is used for encoding the coding unit. 9. The method of claim 1, wherein the video data is a first set of video data, the method further comprising:
for a second set of video data:
determining a bit-depth of a luma component of the second set of video data and a bit-depth of a chroma component of the second set of video data; and
in response to the bit-depth of the luma component of the second set of video data being different than the bit-depth of the chroma component of the second set of video data, disabling color_transform for the second set of video data. 10. The method of claim 9, further comprising:
setting a second syntax element of a picture parameter set of the second set of video data which indicates the color-space transform process is disabled for the second set of video data. 11. The method of claim 1, wherein modifying one or both of the bit depth of the luma component and the bit depth of the chroma component comprises performing a bitwise shift operation on the video data of one or both of the luma component and the chroma component before applying the color-space transform process. 12. A video encoding device comprising:
a memory configured to store video data; and one or more processors configured to:
determine a bit-depth of a luma component of the video data and a bit-depth of a chroma component of the video data;
in response to the bit-depth of the luma component being different than the bit depth of the chroma component, modify one or both of the bit depth of the luma component and the bit depth of the chroma component such that the bit depths are equal; and
apply a color-space transform process to the modified video data. 13. The video encoding device of claim 12, wherein the one or more processors are further configured to determine to use color-space conversion for encoding the video data, wherein the one or more processors being configured to determine to use color-space conversion for encoding the video data comprises the one or more processors being configured to:
set a value of a syntax element that indicates that the video data was encoded using color-space conversion. 14. The video encoding device of claim 13, wherein the syntax element comprises a one-bit flag. 15. The video encoding device of claim 13, wherein the syntax element is signaled when the coding unit is coded using a mode other than intra-pulse code modulation (IPCM) mode. 16. The video encoding device of claim 13, wherein the syntax element is signaled only when there are non-zero coefficients in a transform unit of the coding unit. 17. The video encoding device of claim 13, wherein the syntax element is not signaled when the coding unit is intra coded and when a luma prediction mode and a chroma prediction mode of a prediction unit within the coding unit are different. 18. The video encoding device of claim 13, wherein the syntax element is not signaled when the coding unit is coded with a palette mode. 19. The video encoding device of claim 13, wherein a value of 1 for the syntax element indicates that the coding unit was encoded using color-space conversion. 20. The video encoding device of claim 12, wherein the video data is a first set of video data, wherein the one or more processors are further configured to:
for a second set of video data:
determine a bit-depth of a luma component of the second set of video data and a bit-depth of a chroma component of the second set of video data; and
in response to the bit-depth of the luma component of the second set of video data being different than the bit-depth of the chroma component of the second set of video data, disable color transform for the second set of video data. 21. The video encoding device of claim 20, wherein the one or more processors are further configured to:
set a second syntax element of a picture parameter set of the second set of video data which indicates the color-space transform process is disabled for the second set of video data. 22. The video encoding device of claim 12, wherein the one or more processors being configured to modify one or both of the bit depth of the luma component and the bit depth of the chroma component comprises the one or more processors being configured to perform a bitwise shift operation on the video data of one or both of the luma component and the chroma component before applying the color-space transform process. 23. A video encoding apparatus comprising:
means for determining a bit-depth of a luma component of the video data and a bit-depth of a chroma component of the video data; means for modifying one or both of the bit depth of the luma component and the bit depth of the chroma component such that the bit depths are equal in response to the bit-depth of the luma component being different than the bit depth of the chroma component; and means for applying a color-space transform process to the modified video data. 24. The video encoding apparatus of claim 23, wherein the video data is a first set of video data, the video coding apparatus further comprising:
for a second set of video data:
means for determining a bit-depth of a luma component of the second set of video data and a bit-depth of a chroma component of the second set of video data; and
means for disabling color transform for the second set of video data in response to the bit-depth of the luma component of the second set of video data being different than the bit-depth of the chroma component of the second set of video data. 25. The video encoding apparatus of claim 24, further comprising:
means for setting a second syntax element of a picture parameter set of the second set of video data which indicates the color-space transform process is disabled for the second set of video data. 26. The video encoding apparatus of claim 23, wherein the means for modifying one or both of the bit depth of the luma component and the bit depth of the chroma component comprise means for performing a bitwise shift operation on the video data of one or both of the luma component and the chroma component before applying the color-space transform process. 27. A computer-readable storage medium comprising instructions that, when executed, cause one or more processors of a video encoding device to:
determine a bit-depth of a luma component of the video data and a bit-depth of a chroma component of the video data; in response to the bit-depth of the luma component being different than the bit depth of the chroma component, modify one or both of the bit depth of the luma component and the bit depth of the chroma component such that the bit depths are equal; and apply a color-space transform process to the modified video data. 28. The computer-readable storage medium of claim 27, wherein the video data is a first set of video data, wherein the instructions further cause the one or more processors to:
for a second set of video data:
determine a bit-depth of a luma component of the second set of video data and a bit-depth of a chroma component of the second set of video data; and
in response to the bit-depth of the luma component of the second set of video data being different than the bit-depth of the chroma component of the second set of video data, disable color transform for the second set of video data. 29. The computer-readable storage medium of claim 28, wherein the instructions further cause the one or more processors to:
set a second syntax element of a picture parameter set of the second set of video data which indicates the color-space transform process is disabled for the second set of video data. 30. The computer-readable storage medium of claim 27, wherein the instructions that cause the one or more processors to modify one or both of the bit depth of the luma component and the bit depth of the chroma component comprise instructions that cause the one or more processors to perform a bitwise shift operation on the video data of one or both of the luma component and the chroma component before applying the color-space transform process. 31. A method of decoding video data, the method comprising:
determining a bit-depth of a luma component of the video data and a bit-depth of a chroma component of the video data; in response to the bit-depth of the luma component being different than the bit depth of the chroma component, modifying one or both of the bit depth of the luma component and the bit depth of the chroma component such that the bit depths are equal; and applying a color-space transform process to the modified video data. 32. The method of claim 31, further comprising:
decoding a syntax element of a coding unit of video data, wherein the syntax element indicates whether the coding unit was encoded using color-space conversion; determining whether a value of the syntax element indicates that the coding unit was encoded using color-space conversion; and in response to determining that the syntax element indicates that the coding unit was coded using color-space conversion, applying the color-space inverse transform process. 33. The method of claim 32, wherein the syntax element comprises a one-bit flag. 34. The method of claim 32, wherein the coding unit is coded in a mode other than intra-pulse code modulation (IPCM) mode, and wherein the syntax element is signaled only for coding units using a mode other than the IPCM mode. 35. The method of claim 32, wherein the syntax element indicates that the coding unit was encoded using color-space conversion when there are non-zero coefficients in a transform unit of the coding unit. 36. The method of claim 32, wherein the syntax element indicates that the coding unit was not encoded using color-space conversion when the coding unit is intra coded and when a luma prediction mode and a chroma prediction mode of a prediction unit within the coding unit are different, wherein the syntax element is not present in a received bitstream that comprises the video data, and wherein decoding the syntax element comprises inferring the value of the syntax element. 37. The method of claim 32, wherein the syntax element indicates that the coding unit was not encoded using color-space conversion when the coding unit is coded with a palette mode, wherein the syntax element is not present in a received bitstream that comprises the video data, and wherein decoding the syntax element comprises inferring the value of the syntax element. 38. The method of claim 32, wherein a value of 1 for the syntax element indicates that color-space conversion is used for encoding the coding unit. 39. The method of claim 31, wherein the video data is a first set of video data, the method further comprising:
for a second set of video data:
determining a bit-depth of a luma component of the second set of video data and a bit-depth of a chroma component of the second set of video data; and
in response to the bit-depth of the luma component of the second set of video data being different than the bit-depth of the chroma component of the second set of video data, disabling color_transform for the second set of video data. 40. The method of claim 39, further comprising:
decoding a second syntax element of a picture parameter set of the second set of video data which indicates the color-space transform process is disabled for the second set of video data. 41. The method of claim 31, wherein modifying one or both of the bit depth of the luma component and the bit depth of the chroma component comprises performing a bitwise shift operation on the video data of one or both of the luma component and the chroma component before applying the color-space inverse transform process. 42. A video decoding device comprising:
a memory configured to store video data; and one or more processors configured to:
determine a bit-depth of a luma component of the video data and a bit-depth of a chroma component of the video data;
in response to the bit-depth of the luma component being different than the bit depth of the chroma component, modify one or both of the bit depth of the luma component and the bit depth of the chroma component such that the bit depths are equal; and
apply a color-space inverse transform process to the modified video data. 43. The video decoding device of claim 42, wherein the one or more processors are further configured to:
decode a syntax element of a coding unit of video data, wherein the syntax element indicates whether the coding unit was encoded using color-space conversion; determine whether a value of the syntax element indicates that the coding unit was encoded using color-space conversion; and in response to determining that the syntax element indicates that the coding unit was coded using color-space conversion, apply the color-space inverse transform process. 44. The video decoding device of claim 43, wherein the syntax element comprises a one-bit flag. 45. The video decoding device of claim 43, wherein the coding unit is coded in a mode other than intra-pulse code modulation (IPCM) mode, and wherein the syntax element is signaled only for coding units using a mode other than the IPCM mode. 46. The video decoding device of claim 43, wherein the syntax element is signaled only when there are non-zero coefficients in a transform unit of the coding unit. 47. The video decoding device of claim 43, wherein the syntax element indicates that the coding unit was not encoded using color-space conversion when the coding unit is intra coded and when a luma prediction mode and a chroma prediction mode of a prediction unit within the coding unit are different, wherein the syntax element is not present in a received bitstream that comprises the video data, and wherein decoding the syntax element comprises inferring the value of the syntax element. 48. The video decoding device of claim 43, wherein the syntax element indicates that the coding unit was not encoded using color-space conversion when the coding unit is coded with a palette mode, wherein the syntax element is not present in a received bitstream that comprises the video data, and wherein decoding the syntax element comprises inferring the value of the syntax element. 49. The video decoding device of claim 43, wherein a value of 1 for the syntax element indicates that the coding unit was encoded using color-space conversion. 50. The video decoding device of claim 42, wherein the video data is a first set of video data, wherein the one or more processors are further configured to:
for a second set of video data:
determine a bit-depth of a luma component of the second set of video data and a bit-depth of a chroma component of the second set of video data; and
in response to the bit-depth of the luma component of the second set of video data being different than the bit-depth of the chroma component of the second set of video data, disable color transform for the second set of video data. 51. The video decoding device of claim 50, wherein the one or more processors are further configured to:
set a second syntax element of a picture parameter set of the second set of video data which indicates the color-space inverse transform process is disabled for the second set of video data. 52. The video decoding device of claim 42, wherein the one or more processors being configured to modify one or both of the bit depth of the luma component and the bit depth of the chroma component comprises the one or more processors being configured to perform a bitwise shift operation on the video data of one or both of the luma component and the chroma component before applying the color-space inverse transform process. | In general, this disclosure describes techniques for coding video blocks using a color-space conversion process. A video coder, such as a video encoder or a video decoder, may determine a bit-depth of a luma component of the video data and a bit-depth of a chroma component of the video data. In response to the bit-depth of the luma component being different than the bit depth of the chroma component, the video coder may modify one or both of the bit depth of the luma component and the bit depth of the chroma component such that the bit depths are equal. The video coder may further apply the color-space transform process in encoding the video data.1. A method of encoding video data, the method comprising:
determining a bit-depth of a luma component of the video data and a bit-depth of a chroma component of the video data; in response to the bit-depth of the luma component being different than the bit depth of the chroma component, modifying one or both of the bit depth of the luma component and the bit depth of the chroma component such that the bit depths are equal; and applying a color-space transform process to the modified video data. 2. The method of claim 1, further comprising determining to use color-space conversion for encoding the video data, wherein determining to use color-space conversion for encoding the video data comprises:
setting a value of a syntax element that indicates that the video data was encoded using color-space conversion. 3. The method of claim 2, wherein the syntax element comprises a one-bit flag. 4. The method of claim 2, wherein the coding unit is coded in a mode other than intra-pulse code modulation (IPCM) mode, and wherein the syntax element indicates that the coding unit was encoded using color-space conversion when the coding unit is coded using a mode other than intra-pulse code modulation (IPCM) mode. 5. The method of claim 2, wherein the syntax element indicates that the coding unit was encoded using color-space conversion when there are non-zero coefficients in a transform unit of the coding unit. 6. The method of claim 2, wherein the syntax element is not signaled when the coding unit is intra coded and when a luma prediction mode and a chroma prediction mode of a prediction unit within the coding unit are different. 7. The method of claim 2, wherein the syntax element is not signaled when the coding unit is coded with a palette mode. 8. The method of claim 2, wherein a value of 1 for the syntax element indicates that color-space conversion is used for encoding the coding unit. 9. The method of claim 1, wherein the video data is a first set of video data, the method further comprising:
for a second set of video data:
determining a bit-depth of a luma component of the second set of video data and a bit-depth of a chroma component of the second set of video data; and
in response to the bit-depth of the luma component of the second set of video data being different than the bit-depth of the chroma component of the second set of video data, disabling color_transform for the second set of video data. 10. The method of claim 9, further comprising:
setting a second syntax element of a picture parameter set of the second set of video data which indicates the color-space transform process is disabled for the second set of video data. 11. The method of claim 1, wherein modifying one or both of the bit depth of the luma component and the bit depth of the chroma component comprises performing a bitwise shift operation on the video data of one or both of the luma component and the chroma component before applying the color-space transform process. 12. A video encoding device comprising:
a memory configured to store video data; and one or more processors configured to:
determine a bit-depth of a luma component of the video data and a bit-depth of a chroma component of the video data;
in response to the bit-depth of the luma component being different than the bit depth of the chroma component, modify one or both of the bit depth of the luma component and the bit depth of the chroma component such that the bit depths are equal; and
apply a color-space transform process to the modified video data. 13. The video encoding device of claim 12, wherein the one or more processors are further configured to determine to use color-space conversion for encoding the video data, wherein the one or more processors being configured to determine to use color-space conversion for encoding the video data comprises the one or more processors being configured to:
set a value of a syntax element that indicates that the video data was encoded using color-space conversion. 14. The video encoding device of claim 13, wherein the syntax element comprises a one-bit flag. 15. The video encoding device of claim 13, wherein the syntax element is signaled when the coding unit is coded using a mode other than intra-pulse code modulation (IPCM) mode. 16. The video encoding device of claim 13, wherein the syntax element is signaled only when there are non-zero coefficients in a transform unit of the coding unit. 17. The video encoding device of claim 13, wherein the syntax element is not signaled when the coding unit is intra coded and when a luma prediction mode and a chroma prediction mode of a prediction unit within the coding unit are different. 18. The video encoding device of claim 13, wherein the syntax element is not signaled when the coding unit is coded with a palette mode. 19. The video encoding device of claim 13, wherein a value of 1 for the syntax element indicates that the coding unit was encoded using color-space conversion. 20. The video encoding device of claim 12, wherein the video data is a first set of video data, wherein the one or more processors are further configured to:
for a second set of video data:
determine a bit-depth of a luma component of the second set of video data and a bit-depth of a chroma component of the second set of video data; and
in response to the bit-depth of the luma component of the second set of video data being different than the bit-depth of the chroma component of the second set of video data, disable color transform for the second set of video data. 21. The video encoding device of claim 20, wherein the one or more processors are further configured to:
set a second syntax element of a picture parameter set of the second set of video data which indicates the color-space transform process is disabled for the second set of video data. 22. The video encoding device of claim 12, wherein the one or more processors being configured to modify one or both of the bit depth of the luma component and the bit depth of the chroma component comprises the one or more processors being configured to perform a bitwise shift operation on the video data of one or both of the luma component and the chroma component before applying the color-space transform process. 23. A video encoding apparatus comprising:
means for determining a bit-depth of a luma component of the video data and a bit-depth of a chroma component of the video data; means for modifying one or both of the bit depth of the luma component and the bit depth of the chroma component such that the bit depths are equal in response to the bit-depth of the luma component being different than the bit depth of the chroma component; and means for applying a color-space transform process to the modified video data. 24. The video encoding apparatus of claim 23, wherein the video data is a first set of video data, the video coding apparatus further comprising:
for a second set of video data:
means for determining a bit-depth of a luma component of the second set of video data and a bit-depth of a chroma component of the second set of video data; and
means for disabling color transform for the second set of video data in response to the bit-depth of the luma component of the second set of video data being different than the bit-depth of the chroma component of the second set of video data. 25. The video encoding apparatus of claim 24, further comprising:
means for setting a second syntax element of a picture parameter set of the second set of video data which indicates the color-space transform process is disabled for the second set of video data. 26. The video encoding apparatus of claim 23, wherein the means for modifying one or both of the bit depth of the luma component and the bit depth of the chroma component comprise means for performing a bitwise shift operation on the video data of one or both of the luma component and the chroma component before applying the color-space transform process. 27. A computer-readable storage medium comprising instructions that, when executed, cause one or more processors of a video encoding device to:
determine a bit-depth of a luma component of the video data and a bit-depth of a chroma component of the video data; in response to the bit-depth of the luma component being different than the bit depth of the chroma component, modify one or both of the bit depth of the luma component and the bit depth of the chroma component such that the bit depths are equal; and apply a color-space transform process to the modified video data. 28. The computer-readable storage medium of claim 27, wherein the video data is a first set of video data, wherein the instructions further cause the one or more processors to:
for a second set of video data:
determine a bit-depth of a luma component of the second set of video data and a bit-depth of a chroma component of the second set of video data; and
in response to the bit-depth of the luma component of the second set of video data being different than the bit-depth of the chroma component of the second set of video data, disable color transform for the second set of video data. 29. The computer-readable storage medium of claim 28, wherein the instructions further cause the one or more processors to:
set a second syntax element of a picture parameter set of the second set of video data which indicates the color-space transform process is disabled for the second set of video data. 30. The computer-readable storage medium of claim 27, wherein the instructions that cause the one or more processors to modify one or both of the bit depth of the luma component and the bit depth of the chroma component comprise instructions that cause the one or more processors to perform a bitwise shift operation on the video data of one or both of the luma component and the chroma component before applying the color-space transform process. 31. A method of decoding video data, the method comprising:
determining a bit-depth of a luma component of the video data and a bit-depth of a chroma component of the video data; in response to the bit-depth of the luma component being different than the bit depth of the chroma component, modifying one or both of the bit depth of the luma component and the bit depth of the chroma component such that the bit depths are equal; and applying a color-space transform process to the modified video data. 32. The method of claim 31, further comprising:
decoding a syntax element of a coding unit of video data, wherein the syntax element indicates whether the coding unit was encoded using color-space conversion; determining whether a value of the syntax element indicates that the coding unit was encoded using color-space conversion; and in response to determining that the syntax element indicates that the coding unit was coded using color-space conversion, applying the color-space inverse transform process. 33. The method of claim 32, wherein the syntax element comprises a one-bit flag. 34. The method of claim 32, wherein the coding unit is coded in a mode other than intra-pulse code modulation (IPCM) mode, and wherein the syntax element is signaled only for coding units using a mode other than the IPCM mode. 35. The method of claim 32, wherein the syntax element indicates that the coding unit was encoded using color-space conversion when there are non-zero coefficients in a transform unit of the coding unit. 36. The method of claim 32, wherein the syntax element indicates that the coding unit was not encoded using color-space conversion when the coding unit is intra coded and when a luma prediction mode and a chroma prediction mode of a prediction unit within the coding unit are different, wherein the syntax element is not present in a received bitstream that comprises the video data, and wherein decoding the syntax element comprises inferring the value of the syntax element. 37. The method of claim 32, wherein the syntax element indicates that the coding unit was not encoded using color-space conversion when the coding unit is coded with a palette mode, wherein the syntax element is not present in a received bitstream that comprises the video data, and wherein decoding the syntax element comprises inferring the value of the syntax element. 38. The method of claim 32, wherein a value of 1 for the syntax element indicates that color-space conversion is used for encoding the coding unit. 39. The method of claim 31, wherein the video data is a first set of video data, the method further comprising:
for a second set of video data:
determining a bit-depth of a luma component of the second set of video data and a bit-depth of a chroma component of the second set of video data; and
in response to the bit-depth of the luma component of the second set of video data being different than the bit-depth of the chroma component of the second set of video data, disabling color_transform for the second set of video data. 40. The method of claim 39, further comprising:
decoding a second syntax element of a picture parameter set of the second set of video data which indicates the color-space transform process is disabled for the second set of video data. 41. The method of claim 31, wherein modifying one or both of the bit depth of the luma component and the bit depth of the chroma component comprises performing a bitwise shift operation on the video data of one or both of the luma component and the chroma component before applying the color-space inverse transform process. 42. A video decoding device comprising:
a memory configured to store video data; and one or more processors configured to:
determine a bit-depth of a luma component of the video data and a bit-depth of a chroma component of the video data;
in response to the bit-depth of the luma component being different than the bit depth of the chroma component, modify one or both of the bit depth of the luma component and the bit depth of the chroma component such that the bit depths are equal; and
apply a color-space inverse transform process to the modified video data. 43. The video decoding device of claim 42, wherein the one or more processors are further configured to:
decode a syntax element of a coding unit of video data, wherein the syntax element indicates whether the coding unit was encoded using color-space conversion; determine whether a value of the syntax element indicates that the coding unit was encoded using color-space conversion; and in response to determining that the syntax element indicates that the coding unit was coded using color-space conversion, apply the color-space inverse transform process. 44. The video decoding device of claim 43, wherein the syntax element comprises a one-bit flag. 45. The video decoding device of claim 43, wherein the coding unit is coded in a mode other than intra-pulse code modulation (IPCM) mode, and wherein the syntax element is signaled only for coding units using a mode other than the IPCM mode. 46. The video decoding device of claim 43, wherein the syntax element is signaled only when there are non-zero coefficients in a transform unit of the coding unit. 47. The video decoding device of claim 43, wherein the syntax element indicates that the coding unit was not encoded using color-space conversion when the coding unit is intra coded and when a luma prediction mode and a chroma prediction mode of a prediction unit within the coding unit are different, wherein the syntax element is not present in a received bitstream that comprises the video data, and wherein decoding the syntax element comprises inferring the value of the syntax element. 48. The video decoding device of claim 43, wherein the syntax element indicates that the coding unit was not encoded using color-space conversion when the coding unit is coded with a palette mode, wherein the syntax element is not present in a received bitstream that comprises the video data, and wherein decoding the syntax element comprises inferring the value of the syntax element. 49. The video decoding device of claim 43, wherein a value of 1 for the syntax element indicates that the coding unit was encoded using color-space conversion. 50. The video decoding device of claim 42, wherein the video data is a first set of video data, wherein the one or more processors are further configured to:
for a second set of video data:
determine a bit-depth of a luma component of the second set of video data and a bit-depth of a chroma component of the second set of video data; and
in response to the bit-depth of the luma component of the second set of video data being different than the bit-depth of the chroma component of the second set of video data, disable color transform for the second set of video data. 51. The video decoding device of claim 50, wherein the one or more processors are further configured to:
set a second syntax element of a picture parameter set of the second set of video data which indicates the color-space inverse transform process is disabled for the second set of video data. 52. The video decoding device of claim 42, wherein the one or more processors being configured to modify one or both of the bit depth of the luma component and the bit depth of the chroma component comprises the one or more processors being configured to perform a bitwise shift operation on the video data of one or both of the luma component and the chroma component before applying the color-space inverse transform process. | 2,400 |
7,773 | 7,773 | 14,750,974 | 2,459 | Various techniques for distributed storage of images of software application in a computing fabric are disclosed herein. In one embodiment, a method includes receiving a request to upload and store a software application in a computing fabric having a plurality of nodes individually configured to execute the software application. A first copy of the uploaded software application is then received and stored at a first node of the computing fabric. The method also includes replicating the first copy as additional copies at one or more additional nodes of the computing fabric via the communications network. As such, multiple copies of the software application can be stored in the computing fabric without utilizing an external repository. | 1. A computing device having a processor, the computing device comprising:
a component configured to receive and store a copy of a software application; a component configured to select one or more additional computing devices to store additional copies of the received software application, the one or more additional computing devices being interconnected to the computing device via a communications network; a component configured to transmit a copy of the received software application to each of the selected one or more additional computing devices to be stored at the selected one or more additional computing devices; and a component configured to record a location of the selected one or more additional computing devices at which one of the additional copies is stored, and wherein the computing device and each of the selected one or more additional computing devices individually include a component configured to execute the software application. 2. The computing device of claim 1, further comprising:
a computer readable storage medium operatively coupled to the processor; and a component configured to store the received copy of the software application in the computer readable storage medium. 3. The computing device of claim 1, further comprising:
a computer readable storage medium operatively coupled to the processor; wherein the component configured to record the location includes a component configured to generate metadata associated with the received copy of the software application, the metadata identifying the selected one or more additional computing devices at which a copy of the software application is stored; and wherein the computing device further includes a component configured to store the generated metadata in the computer readable storage medium. 4. The computing device of claim 1 wherein:
the component configured to record the location includes a component configured to generate metadata associated with the received copy of the software application, the metadata identifying the selected one or more additional computing devices at which a copy of the software application is stored; and
the computing device further includes a component configured to transmit the generated metadata to the selected one or more additional computing devices. 5. The computing device of claim 1 wherein:
the component configured to record the location includes a component configured to generate metadata associated with the received copy of the software application, the metadata identifying the selected one or more additional computing devices at which a copy of the software application is stored; and
the computing device further includes:
a component configured to transmit the generated metadata to the selected one or more additional computing devices;
a component configured to receive one or more requests for file transfer from the selected one or more additional computing devices; and
wherein the component configured to transmit the copy is configured to transmit a copy of the received software application to each of the selected one or more additional computing devices in response to the received one or more requests. 6. The computing device of claim 1, further comprising:
a component configured to receive a confirmation from the individual selected one or more additional computing devices, the confirmation indicating that a copy of the software application is stored on the individual selected one or more additional computing devices; and a component configured to generate a response indicating completion of storing the software application in response to a percentage or number of confirmations received exceeding a corresponding threshold. 7. The computing device of claim 1 wherein the computing device and the one or more additional computing devices are organized as a computing fabric, and wherein the computing device further includes:
a component configured to receive a confirmation from the individual selected one or more additional computing devices, the confirmation indicating that a copy of the software application is stored on the individual selected one or more additional computing devices; and
a component configured to generate a response indicating completion of storing the software application in response to a number of received confirmations exceeds 50% of a total number of the computing devices in the computing fabric. 8. The computing device of claim 1, further comprising:
a computer readable storage medium operatively coupled to the processor; a component configured to store the received copy of the software application in the computer readable storage medium; and wherein the copy of the software application stored in the computer readable storage medium is identical to each of the copies stored on the selected one or more additional computing devices. 9. The computing device of claim 1, further comprising:
a component configured to divide the received copy of the software application into a first portion and a second portion; and the component configured to transmit the copy is configured to transmit a copy of at least one of the first portion or the second portion of the received software application to each of the selected one or more additional computing devices to be stored at the selected one or more additional computing devices. 10. A computing device interconnected to a plurality of other computing devices by a communications network to form a computing fabric, the computing device having a processor and comprising:
a component configured to receive a request from a requestor for a copy of a software application stored in the computing fabric, the computing fabric having one or more copies of the requested software application stored at one or more of the computing devices individually configured to execute the software application; a component configured to determine the one or more computing devices in the computing fabric individually storing a copy of the requested software application based on recorded information regarding which one or more of the computing devices in the computing fabric store a copy of the requested software application; and a component configured to inform the requestor of the determined one or more computing devices from which a copy of the requested user software stored is available for retrieval. 11. The computing device of claim 10 wherein the component configured to determine the one or more computing devices is configured to determine the one or more computing devices based on a physical or logical proximity of the one or more computing devices to the requestor. 12. The computing device of claim 10 wherein the component configured to determine the one or more computing devices is configured to determine the one or more computing devices based on a current traffic condition in the communications network of the computing fabric. 13. The computing device of claim 10, further comprising:
a computer readable storage medium operatively coupled to the processor, the computer readable storage medium storing a copy of the software application; wherein the component configured to determine the computing device is configured to determine that a copy of the software application is available from the computer readable storage medium; and the computing device further includes a component configured to transmit a copy of the stored software application to the requestor. 14. The computing device of claim 10 wherein:
the component configured to determine the one or more computing devices is configured to determine that a copy of a first portion of the software application is available from a first computing device and a second portion of the software application is available from a second computing device of the computing fabric; and
the component configured to inform is configured to inform the requestor of the determined first and second computing devices from which a copy of the first and second portions of the requested software application are available for retrieval, respectively. 15. The computing device of claim 10, further comprising:
a component configured to retrieve metadata associated with the requested copy of the software application, the metadata identifying one or more additional computing devices at which a copy of the software application is stored; and the component configured to determine the one or more computing devices is configured to determine the one or more computing devices of the computing fabric that has a copy of the requested software application available for retrieval based on the retrieved metadata. 16. A method for distributed storage of digital data file in a computing fabric, the method comprising:
receiving a request to upload and store a software application at a computing fabric having a plurality of nodes interconnected by a communications network, the individual nodes of the computing fabric being configured to execute the software application; receiving and storing a copy of the software application at one of the nodes of the computing fabric; replicating, via the communications network, the copy of the software application received at the one of the nodes of the computing fabric as additional copies to be stored at one or more additional nodes of the computing fabric; and generating and storing tracking information regarding which one or more of the nodes of the computing fabric individually contain a copy of the software application. 17. The method of claim 16, further comprising:
receiving, from a requestor, another request for a copy of the software application stored in the computing fabric; in response to receiving the another request, determining which one or more of the nodes of the computing fabric contain a copy of the software application based on the stored tracking information; and communicating the determined one or more nodes of the computing fabric containing a copy of the software application to the requestor. 18. The method of claim 16, further comprising:
receiving, from a requestor, another request for a copy of the software application stored in the computing fabric; in response to receiving the another request, determining which one or more of the nodes of the computing fabric contain a copy of the software application based on the stored tracking information; and transmitting a copy of the software application to the requestor from one of the determined one or more nodes of the computing fabric containing a copy of the software application. 19. The method of claim 16, further comprising:
receiving, from a requestor, another request for a copy of the software application stored in the computing fabric; in response to receiving the another request, determining which one or more of the nodes of the computing fabric contain a copy of the software application based on the stored tracking information; selecting a node from the determined one or more nodes of the computing fabric contain a copy of the software application based on at least one of a physical or logical proximity between the one or more nodes and the requestor; and transmitting a copy of the software application to the requestor from the selected node. 20. The method of claim 16, further comprising:
receiving a request to delete the software application stored in the computing fabric; in response to receiving the request to delete the software application, determining which one or more of the nodes of the computing fabric contain a copy of the software application based on the stored tracking information; and transmitting a deletion instruction to each of the one or more nodes of the computing fabric containing a copy of the software application. | Various techniques for distributed storage of images of software application in a computing fabric are disclosed herein. In one embodiment, a method includes receiving a request to upload and store a software application in a computing fabric having a plurality of nodes individually configured to execute the software application. A first copy of the uploaded software application is then received and stored at a first node of the computing fabric. The method also includes replicating the first copy as additional copies at one or more additional nodes of the computing fabric via the communications network. As such, multiple copies of the software application can be stored in the computing fabric without utilizing an external repository.1. A computing device having a processor, the computing device comprising:
a component configured to receive and store a copy of a software application; a component configured to select one or more additional computing devices to store additional copies of the received software application, the one or more additional computing devices being interconnected to the computing device via a communications network; a component configured to transmit a copy of the received software application to each of the selected one or more additional computing devices to be stored at the selected one or more additional computing devices; and a component configured to record a location of the selected one or more additional computing devices at which one of the additional copies is stored, and wherein the computing device and each of the selected one or more additional computing devices individually include a component configured to execute the software application. 2. The computing device of claim 1, further comprising:
a computer readable storage medium operatively coupled to the processor; and a component configured to store the received copy of the software application in the computer readable storage medium. 3. The computing device of claim 1, further comprising:
a computer readable storage medium operatively coupled to the processor; wherein the component configured to record the location includes a component configured to generate metadata associated with the received copy of the software application, the metadata identifying the selected one or more additional computing devices at which a copy of the software application is stored; and wherein the computing device further includes a component configured to store the generated metadata in the computer readable storage medium. 4. The computing device of claim 1 wherein:
the component configured to record the location includes a component configured to generate metadata associated with the received copy of the software application, the metadata identifying the selected one or more additional computing devices at which a copy of the software application is stored; and
the computing device further includes a component configured to transmit the generated metadata to the selected one or more additional computing devices. 5. The computing device of claim 1 wherein:
the component configured to record the location includes a component configured to generate metadata associated with the received copy of the software application, the metadata identifying the selected one or more additional computing devices at which a copy of the software application is stored; and
the computing device further includes:
a component configured to transmit the generated metadata to the selected one or more additional computing devices;
a component configured to receive one or more requests for file transfer from the selected one or more additional computing devices; and
wherein the component configured to transmit the copy is configured to transmit a copy of the received software application to each of the selected one or more additional computing devices in response to the received one or more requests. 6. The computing device of claim 1, further comprising:
a component configured to receive a confirmation from the individual selected one or more additional computing devices, the confirmation indicating that a copy of the software application is stored on the individual selected one or more additional computing devices; and a component configured to generate a response indicating completion of storing the software application in response to a percentage or number of confirmations received exceeding a corresponding threshold. 7. The computing device of claim 1 wherein the computing device and the one or more additional computing devices are organized as a computing fabric, and wherein the computing device further includes:
a component configured to receive a confirmation from the individual selected one or more additional computing devices, the confirmation indicating that a copy of the software application is stored on the individual selected one or more additional computing devices; and
a component configured to generate a response indicating completion of storing the software application in response to a number of received confirmations exceeds 50% of a total number of the computing devices in the computing fabric. 8. The computing device of claim 1, further comprising:
a computer readable storage medium operatively coupled to the processor; a component configured to store the received copy of the software application in the computer readable storage medium; and wherein the copy of the software application stored in the computer readable storage medium is identical to each of the copies stored on the selected one or more additional computing devices. 9. The computing device of claim 1, further comprising:
a component configured to divide the received copy of the software application into a first portion and a second portion; and the component configured to transmit the copy is configured to transmit a copy of at least one of the first portion or the second portion of the received software application to each of the selected one or more additional computing devices to be stored at the selected one or more additional computing devices. 10. A computing device interconnected to a plurality of other computing devices by a communications network to form a computing fabric, the computing device having a processor and comprising:
a component configured to receive a request from a requestor for a copy of a software application stored in the computing fabric, the computing fabric having one or more copies of the requested software application stored at one or more of the computing devices individually configured to execute the software application; a component configured to determine the one or more computing devices in the computing fabric individually storing a copy of the requested software application based on recorded information regarding which one or more of the computing devices in the computing fabric store a copy of the requested software application; and a component configured to inform the requestor of the determined one or more computing devices from which a copy of the requested user software stored is available for retrieval. 11. The computing device of claim 10 wherein the component configured to determine the one or more computing devices is configured to determine the one or more computing devices based on a physical or logical proximity of the one or more computing devices to the requestor. 12. The computing device of claim 10 wherein the component configured to determine the one or more computing devices is configured to determine the one or more computing devices based on a current traffic condition in the communications network of the computing fabric. 13. The computing device of claim 10, further comprising:
a computer readable storage medium operatively coupled to the processor, the computer readable storage medium storing a copy of the software application; wherein the component configured to determine the computing device is configured to determine that a copy of the software application is available from the computer readable storage medium; and the computing device further includes a component configured to transmit a copy of the stored software application to the requestor. 14. The computing device of claim 10 wherein:
the component configured to determine the one or more computing devices is configured to determine that a copy of a first portion of the software application is available from a first computing device and a second portion of the software application is available from a second computing device of the computing fabric; and
the component configured to inform is configured to inform the requestor of the determined first and second computing devices from which a copy of the first and second portions of the requested software application are available for retrieval, respectively. 15. The computing device of claim 10, further comprising:
a component configured to retrieve metadata associated with the requested copy of the software application, the metadata identifying one or more additional computing devices at which a copy of the software application is stored; and the component configured to determine the one or more computing devices is configured to determine the one or more computing devices of the computing fabric that has a copy of the requested software application available for retrieval based on the retrieved metadata. 16. A method for distributed storage of digital data file in a computing fabric, the method comprising:
receiving a request to upload and store a software application at a computing fabric having a plurality of nodes interconnected by a communications network, the individual nodes of the computing fabric being configured to execute the software application; receiving and storing a copy of the software application at one of the nodes of the computing fabric; replicating, via the communications network, the copy of the software application received at the one of the nodes of the computing fabric as additional copies to be stored at one or more additional nodes of the computing fabric; and generating and storing tracking information regarding which one or more of the nodes of the computing fabric individually contain a copy of the software application. 17. The method of claim 16, further comprising:
receiving, from a requestor, another request for a copy of the software application stored in the computing fabric; in response to receiving the another request, determining which one or more of the nodes of the computing fabric contain a copy of the software application based on the stored tracking information; and communicating the determined one or more nodes of the computing fabric containing a copy of the software application to the requestor. 18. The method of claim 16, further comprising:
receiving, from a requestor, another request for a copy of the software application stored in the computing fabric; in response to receiving the another request, determining which one or more of the nodes of the computing fabric contain a copy of the software application based on the stored tracking information; and transmitting a copy of the software application to the requestor from one of the determined one or more nodes of the computing fabric containing a copy of the software application. 19. The method of claim 16, further comprising:
receiving, from a requestor, another request for a copy of the software application stored in the computing fabric; in response to receiving the another request, determining which one or more of the nodes of the computing fabric contain a copy of the software application based on the stored tracking information; selecting a node from the determined one or more nodes of the computing fabric contain a copy of the software application based on at least one of a physical or logical proximity between the one or more nodes and the requestor; and transmitting a copy of the software application to the requestor from the selected node. 20. The method of claim 16, further comprising:
receiving a request to delete the software application stored in the computing fabric; in response to receiving the request to delete the software application, determining which one or more of the nodes of the computing fabric contain a copy of the software application based on the stored tracking information; and transmitting a deletion instruction to each of the one or more nodes of the computing fabric containing a copy of the software application. | 2,400 |
7,774 | 7,774 | 14,709,587 | 2,443 | A request to monitor a data packet to be transmitted from a first location to a second location over a first network is received. A projected time for the transmission of the data packet from the first location to the second location is determined. Responsive to determining the projected time, whether the data packet arrived at the second location after the projected time plus a variance is determined. | 1. A method for monitoring a data packet in a distributed computing environment, the method comprising the steps of:
receiving, by one or more computer processors, a request to monitor a data packet to be transmitted from a first location to a second location over a first network; determining, by one or more computer processors, a projected time for the transmission of the data packet from the first location to the second location; and responsive to determining the projected time, determining, by one or more computer processors, whether the data packet arrived at the second location after the projected time plus a variance. 2. The method of claim 1, further comprising:
responsive to determining the data packet arrived at the second location after the projected time plus a variance, issuing, by one or more computer processors, a notification. 3. The method of claim 1, wherein the step of responsive to determining the projected time, determining, by one or more computer processors, whether the data packet arrived at the second location after the projected time plus a variance comprises:
receiving, by one or more computer processors, from the first location over a second network, a time the data packet left the first location; receiving, by one or more computer processors, from the second location over the second network, a time the data packet arrived at the second location; and
determining, by one or more computer processors, whether the data packet arrived at the second location after the projected time plus a variance. 4. The method of claim 3, wherein the second network is one or more of the following: a geospatial monitor link, wireless out-of-band links, physical out-of-band links, global positioning satellites, or geospatial satellites. 5. The method of claim 3, wherein the second network is separate from the first network. 6. The method of claim 1, further comprising:
tagging, by one or more computer processors, the data packet, wherein the tag includes an indication to include at least one of the following with the data packet: timing information about when the data packet leaves a location, timing information about when the data packet enters a location, or information about the location. 7. The method of claim 1, wherein the data packet is a layer 2 data packet or a layer 3 data packet. 8. A computer program product for monitoring a data packet in a distributed computing environment, the computer program product comprising:
one or more computer readable storage media; and program instructions stored on the one or more computer readable storage media, the program instructions comprising: program instructions to receive a request to monitor a data packet to be transmitted from a first location to a second location over a first network, program instructions to determine a projected time for the transmission of the data packet from the first location to the second location; and program instruction to, responsive to determining the projected time, determine whether the data packet arrived at the second location after the projected time plus a variance. 9. The computer program product of claim 8, further comprising program instructions, stored on the one or more computer readable storage media, to:
responsive to determining the data packet arrived at the second location after the projected time plus a variance, issue a notification. 10. The computer program product of claim 8, wherein the program instructions to, responsive to determining the projected time, determine whether the data packet arrived at the second location after the projected time plus a variance comprise:
program instructions to receive from the first location over a second network, a time the data packet left the first location; program instructions to receive from the second location over a second network, a time the data packet arrived at the second location; and program instructions to determine whether the data packet arrived at the second location after the projected time plus a variance. 11. The computer program product of claim 10, wherein the second network is one or more of the following: a geospatial monitor link, wireless out-of-band links, physical out-of-band links, global positioning satellites, or geospatial satellites. 12. The computer program product of claim 10, wherein the second network is separate from the first network. 13. The computer program product of claim 8, further comprising program instructions, stored on the one or more computer readable storage media, to:
tag the data packet, wherein the tag includes an indication to include at least one of the following with the data packet: timing information about when the data packet leaves a location, timing information about when the data packet enters a location, or information about the location. 14. The computer program product of claim 8, wherein the data packet is a layer 2 data packet or a layer 3 data packet. 15. A computer system for monitoring a data packet in a distributed computing environment, the computer system comprising:
one or more computer processors; one or more computer readable storage media; and program instructions stored on the one or more computer readable storage media for execution by at least one of the one or more computer processors, the program instructions comprising: program instructions to receive a request to monitor a data packet to be transmitted from a first location to a second location over a first network, program instructions to determine a projected time for the transmission of the data packet from the first location to the second location; and program instruction to, responsive to determining the projected time, determine whether the data packet arrived at the second location after the projected time plus a variance. 16. The computer system of claim 15, further comprising program instructions, stored on the one or more computer readable storage media for execution by at least one of the one or more computer processors, to:
responsive to determining the data packet arrived at the second location after the projected time plus a variance, issue a notification. 17. The computer system of claim 15, wherein the program instructions to, responsive to determining the projected time, determine whether the data packet arrived at the second location after the projected time plus a variance comprise:
program instructions to receive from the first location over a second network, a time the data packet left the first location; program instructions to receive from the second location over a second network, a time the data packet arrived at the second location; and program instructions to determine whether the data packet arrived at the second location after the projected time plus a variance. 18. The computer system of claim 17, wherein the second network is one or more of the following: a geospatial monitor link, wireless out-of-band links, physical out-of-band links, global positioning satellites, or geospatial satellites. 19. The computer system of claim 17, wherein the second network is separate from the first network. 20. The computer system of claim 15, further comprising program instructions, stored on the one or more computer readable storage media for execution by at least one of the one or more computer processors, to:
tag the data packet, wherein the tag includes an indication to include at least one of the following with the data packet: timing information about when the data packet leaves a location, timing information about when the data packet enters a location, or information about the location. | A request to monitor a data packet to be transmitted from a first location to a second location over a first network is received. A projected time for the transmission of the data packet from the first location to the second location is determined. Responsive to determining the projected time, whether the data packet arrived at the second location after the projected time plus a variance is determined.1. A method for monitoring a data packet in a distributed computing environment, the method comprising the steps of:
receiving, by one or more computer processors, a request to monitor a data packet to be transmitted from a first location to a second location over a first network; determining, by one or more computer processors, a projected time for the transmission of the data packet from the first location to the second location; and responsive to determining the projected time, determining, by one or more computer processors, whether the data packet arrived at the second location after the projected time plus a variance. 2. The method of claim 1, further comprising:
responsive to determining the data packet arrived at the second location after the projected time plus a variance, issuing, by one or more computer processors, a notification. 3. The method of claim 1, wherein the step of responsive to determining the projected time, determining, by one or more computer processors, whether the data packet arrived at the second location after the projected time plus a variance comprises:
receiving, by one or more computer processors, from the first location over a second network, a time the data packet left the first location; receiving, by one or more computer processors, from the second location over the second network, a time the data packet arrived at the second location; and
determining, by one or more computer processors, whether the data packet arrived at the second location after the projected time plus a variance. 4. The method of claim 3, wherein the second network is one or more of the following: a geospatial monitor link, wireless out-of-band links, physical out-of-band links, global positioning satellites, or geospatial satellites. 5. The method of claim 3, wherein the second network is separate from the first network. 6. The method of claim 1, further comprising:
tagging, by one or more computer processors, the data packet, wherein the tag includes an indication to include at least one of the following with the data packet: timing information about when the data packet leaves a location, timing information about when the data packet enters a location, or information about the location. 7. The method of claim 1, wherein the data packet is a layer 2 data packet or a layer 3 data packet. 8. A computer program product for monitoring a data packet in a distributed computing environment, the computer program product comprising:
one or more computer readable storage media; and program instructions stored on the one or more computer readable storage media, the program instructions comprising: program instructions to receive a request to monitor a data packet to be transmitted from a first location to a second location over a first network, program instructions to determine a projected time for the transmission of the data packet from the first location to the second location; and program instruction to, responsive to determining the projected time, determine whether the data packet arrived at the second location after the projected time plus a variance. 9. The computer program product of claim 8, further comprising program instructions, stored on the one or more computer readable storage media, to:
responsive to determining the data packet arrived at the second location after the projected time plus a variance, issue a notification. 10. The computer program product of claim 8, wherein the program instructions to, responsive to determining the projected time, determine whether the data packet arrived at the second location after the projected time plus a variance comprise:
program instructions to receive from the first location over a second network, a time the data packet left the first location; program instructions to receive from the second location over a second network, a time the data packet arrived at the second location; and program instructions to determine whether the data packet arrived at the second location after the projected time plus a variance. 11. The computer program product of claim 10, wherein the second network is one or more of the following: a geospatial monitor link, wireless out-of-band links, physical out-of-band links, global positioning satellites, or geospatial satellites. 12. The computer program product of claim 10, wherein the second network is separate from the first network. 13. The computer program product of claim 8, further comprising program instructions, stored on the one or more computer readable storage media, to:
tag the data packet, wherein the tag includes an indication to include at least one of the following with the data packet: timing information about when the data packet leaves a location, timing information about when the data packet enters a location, or information about the location. 14. The computer program product of claim 8, wherein the data packet is a layer 2 data packet or a layer 3 data packet. 15. A computer system for monitoring a data packet in a distributed computing environment, the computer system comprising:
one or more computer processors; one or more computer readable storage media; and program instructions stored on the one or more computer readable storage media for execution by at least one of the one or more computer processors, the program instructions comprising: program instructions to receive a request to monitor a data packet to be transmitted from a first location to a second location over a first network, program instructions to determine a projected time for the transmission of the data packet from the first location to the second location; and program instruction to, responsive to determining the projected time, determine whether the data packet arrived at the second location after the projected time plus a variance. 16. The computer system of claim 15, further comprising program instructions, stored on the one or more computer readable storage media for execution by at least one of the one or more computer processors, to:
responsive to determining the data packet arrived at the second location after the projected time plus a variance, issue a notification. 17. The computer system of claim 15, wherein the program instructions to, responsive to determining the projected time, determine whether the data packet arrived at the second location after the projected time plus a variance comprise:
program instructions to receive from the first location over a second network, a time the data packet left the first location; program instructions to receive from the second location over a second network, a time the data packet arrived at the second location; and program instructions to determine whether the data packet arrived at the second location after the projected time plus a variance. 18. The computer system of claim 17, wherein the second network is one or more of the following: a geospatial monitor link, wireless out-of-band links, physical out-of-band links, global positioning satellites, or geospatial satellites. 19. The computer system of claim 17, wherein the second network is separate from the first network. 20. The computer system of claim 15, further comprising program instructions, stored on the one or more computer readable storage media for execution by at least one of the one or more computer processors, to:
tag the data packet, wherein the tag includes an indication to include at least one of the following with the data packet: timing information about when the data packet leaves a location, timing information about when the data packet enters a location, or information about the location. | 2,400 |
7,775 | 7,775 | 15,632,858 | 2,468 | Embodiments of the invention provide a system and method for chip to chip communications in electronic circuits. In one embodiment, a networking device includes an input port circuit having a transmitter circuit coupled one or more transmitter antennas, wherein the input port circuit transmits a data packet to a first output port circuit using millimeter wave signals. The networking device includes output port circuits including at least the first output port circuit, each of the output port circuits having a receiver circuit coupled to one or more receiver antennas. The networking device includes a beamforming circuit coupled to the one or more transmitter antennas of the input port circuit, wherein the beamforming circuit causes the one or more transmitter antennas to transmit an antenna beam directed at the one or more receiver antennas of the first output port circuit. | 1. A networking device, comprising:
an input port circuit having a transmitter circuit coupled one or more transmitter antennas, wherein the input port circuit transmits a data packet to a first output port circuit using millimeter wave signals; output port circuits including at least the first output port circuit, each of the output port circuits having a receiver circuit coupled to one or more receiver antennas; and a beamforming circuit coupled to the one or more transmitter antennas of the input port circuit, wherein the beamforming circuit causes the one or more transmitter antennas to transmit an antenna beam directed at the one or more receiver antennas of the first output port circuit. 2. The networking device of claim 1, wherein the beamforming circuit includes a respective adjustment circuit for each of the one or more transmitter antennas, each adjustment circuit receiving an amplitude value and a phase value to control the direction of the transmitted antenna beam. 3. The networking device of claim 2, wherein the transmitter circuit comprises a respective power amplifier for each of the one or more transmitter antennas, each respective power amplifier amplifying an output of a respective one of the adjustment circuits prior to transmitting the antenna beam. 4. The networking device of claim 2, comprising a modulation circuit that receives a baseband signal and a carrier signal, wherein the baseband signal contains information to be transmitted in the data packet and the modulation circuit modulates the baseband signal by the carrier signal to produce an output signal. 5. The networking device of claim 4, wherein the beamforming circuit receives the output signal from the modulation circuit. 6. The networking device of claim 2, wherein the input port circuit includes an antenna array coefficient storage that stores antenna array coefficient values including antenna array coefficient values for the first output port circuit. 7. The networking device of claim 6, wherein the input port circuit comprises a digital to analog converter circuit that converts antenna array coefficient values corresponding to the first output port circuit to the amplitude and phase values received by the adjustment circuits. 8. The networking device of claim 1, wherein the antenna is swept by a variable angle. 9. The networking device of claim 1, wherein the output port circuits include a second output port circuit, and wherein the antenna beam is not received by the one or more receiver antennas of the second output port circuit. 10. The networking device of claim 9, wherein the second output port circuit is located at a different spatial location than the first output port circuit. 11. The networking device of claim 10, wherein the first output port circuit and the second output port circuit are located on separate line cards of the networking device. 12. The networking device of claim 1, comprising a synchronization circuit coupled to the input port circuit and the output port circuits, the synchronization circuit providing timing signals to the input port circuit and the output port circuits. 13. The networking device of claim 1, wherein the data packet is transmitted using frequency division multiplexing. 14. The networking device of claim 1, wherein the one or more transmitter antennas comprise an array of antennas including dipole antennas having a length corresponding to half a wavelength of a transmitted signal. 15. The networking device of claim 1, wherein the networking device comprises a router, a switch, a hub, a gateway, a bridge, or a combination thereof. 16. A method for transmitting a data packet, comprising:
identifying, by an input port circuit, a destination output port circuit corresponding to a destination address in the data packet; retrieving, from stored sets of antenna array coefficients at the input port circuit, a set of antenna array coefficients corresponding to the destination output port circuit; and transmitting, using an antenna array of the input port circuit, the data packet as a radio frequency (RF) signal over a wireless interface by using the set of antenna array coefficients to create a transmission beam targeting the destination output port circuit. 17. The method of claim 16, further comprising:
extracting header information from the data packet at the input port circuit; transmitting the header information to a router circuit; and receiving, at the input port circuit, a destination output port circuit identification from the router circuit. 18. The method of claim 16, further comprising:
transmitting a training signal from the input port circuit; varying antenna array coefficients to sweep the transmitted training signal; monitoring a received training signal at an output port circuit; determining a maximum signal-to-noise ratio (SNR) for the received training signal at the output port circuit; and storing, at the input port circuit, a set of antenna array coefficients corresponding to the maximum SNR for the output port circuit as one of the stored sets of antenna array coefficients. 19. The method of claim 16, wherein the input port circuit and the destination output port circuit are located on a same line card. 20. The method of claim 16, wherein the input port circuit and the destination output port circuit are located on different line cards. | Embodiments of the invention provide a system and method for chip to chip communications in electronic circuits. In one embodiment, a networking device includes an input port circuit having a transmitter circuit coupled one or more transmitter antennas, wherein the input port circuit transmits a data packet to a first output port circuit using millimeter wave signals. The networking device includes output port circuits including at least the first output port circuit, each of the output port circuits having a receiver circuit coupled to one or more receiver antennas. The networking device includes a beamforming circuit coupled to the one or more transmitter antennas of the input port circuit, wherein the beamforming circuit causes the one or more transmitter antennas to transmit an antenna beam directed at the one or more receiver antennas of the first output port circuit.1. A networking device, comprising:
an input port circuit having a transmitter circuit coupled one or more transmitter antennas, wherein the input port circuit transmits a data packet to a first output port circuit using millimeter wave signals; output port circuits including at least the first output port circuit, each of the output port circuits having a receiver circuit coupled to one or more receiver antennas; and a beamforming circuit coupled to the one or more transmitter antennas of the input port circuit, wherein the beamforming circuit causes the one or more transmitter antennas to transmit an antenna beam directed at the one or more receiver antennas of the first output port circuit. 2. The networking device of claim 1, wherein the beamforming circuit includes a respective adjustment circuit for each of the one or more transmitter antennas, each adjustment circuit receiving an amplitude value and a phase value to control the direction of the transmitted antenna beam. 3. The networking device of claim 2, wherein the transmitter circuit comprises a respective power amplifier for each of the one or more transmitter antennas, each respective power amplifier amplifying an output of a respective one of the adjustment circuits prior to transmitting the antenna beam. 4. The networking device of claim 2, comprising a modulation circuit that receives a baseband signal and a carrier signal, wherein the baseband signal contains information to be transmitted in the data packet and the modulation circuit modulates the baseband signal by the carrier signal to produce an output signal. 5. The networking device of claim 4, wherein the beamforming circuit receives the output signal from the modulation circuit. 6. The networking device of claim 2, wherein the input port circuit includes an antenna array coefficient storage that stores antenna array coefficient values including antenna array coefficient values for the first output port circuit. 7. The networking device of claim 6, wherein the input port circuit comprises a digital to analog converter circuit that converts antenna array coefficient values corresponding to the first output port circuit to the amplitude and phase values received by the adjustment circuits. 8. The networking device of claim 1, wherein the antenna is swept by a variable angle. 9. The networking device of claim 1, wherein the output port circuits include a second output port circuit, and wherein the antenna beam is not received by the one or more receiver antennas of the second output port circuit. 10. The networking device of claim 9, wherein the second output port circuit is located at a different spatial location than the first output port circuit. 11. The networking device of claim 10, wherein the first output port circuit and the second output port circuit are located on separate line cards of the networking device. 12. The networking device of claim 1, comprising a synchronization circuit coupled to the input port circuit and the output port circuits, the synchronization circuit providing timing signals to the input port circuit and the output port circuits. 13. The networking device of claim 1, wherein the data packet is transmitted using frequency division multiplexing. 14. The networking device of claim 1, wherein the one or more transmitter antennas comprise an array of antennas including dipole antennas having a length corresponding to half a wavelength of a transmitted signal. 15. The networking device of claim 1, wherein the networking device comprises a router, a switch, a hub, a gateway, a bridge, or a combination thereof. 16. A method for transmitting a data packet, comprising:
identifying, by an input port circuit, a destination output port circuit corresponding to a destination address in the data packet; retrieving, from stored sets of antenna array coefficients at the input port circuit, a set of antenna array coefficients corresponding to the destination output port circuit; and transmitting, using an antenna array of the input port circuit, the data packet as a radio frequency (RF) signal over a wireless interface by using the set of antenna array coefficients to create a transmission beam targeting the destination output port circuit. 17. The method of claim 16, further comprising:
extracting header information from the data packet at the input port circuit; transmitting the header information to a router circuit; and receiving, at the input port circuit, a destination output port circuit identification from the router circuit. 18. The method of claim 16, further comprising:
transmitting a training signal from the input port circuit; varying antenna array coefficients to sweep the transmitted training signal; monitoring a received training signal at an output port circuit; determining a maximum signal-to-noise ratio (SNR) for the received training signal at the output port circuit; and storing, at the input port circuit, a set of antenna array coefficients corresponding to the maximum SNR for the output port circuit as one of the stored sets of antenna array coefficients. 19. The method of claim 16, wherein the input port circuit and the destination output port circuit are located on a same line card. 20. The method of claim 16, wherein the input port circuit and the destination output port circuit are located on different line cards. | 2,400 |
7,776 | 7,776 | 15,436,489 | 2,492 | Methods, systems, and apparatuses for defending against cryptographic attacks using clock period randomization. The methods, systems, and apparatuses are designed to make side channel attacks and fault injection attacks more difficult by using a clock with a variable period during a cryptographic operation. In an example embodiment, a clock period randomizer includes a fixed delay generator and a variable delay generator, wherein a variable delay generated by the variable delay generator is based on a random or pseudorandom value that is changed occasionally or periodically. The methods, systems, and apparatuses are useful in hardware security applications where fault injection and/or side channel attacks are of concern. | 1. An apparatus randomly varying a device clock during cryptographic operation, the apparatus comprising:
an input clock; and a clock period randomizer, the clock period randomizer generating a variable clock period that varies randomly to produce an output variable clock driving the device at a random clock rate at least during cryptographic operation. 2. The apparatus of claim 1, wherein the clock period randomizer includes:
a circuit including a variable capacitor; and a switch configured to switch the variable capacitor into or out of the circuit, the switch controlled by a trim code, wherein the circuit is configured to change a clock signal from low to high or from high to low based on an operation of the switch. 3. The apparatus of claim 2, further comprising a trim code generator to generate the trim code, the trim code generator including a random number generator to generate a random number or a pseudorandom number. 4. The apparatus of claim 3, wherein the trim code generator includes a bank of registers, each register holding a trim code. 5. The apparatus of claim 4, wherein the trim code generator includes a linear feedback shift register. 6. The apparatus of claim 2, wherein the circuit further includes:
a fixed delay generator including an inverter, a resistor, and a capacitor; a variable delay generator including an inverter, a resistor, and the variable capacitor; a logic gate connected to the fixed delay generator and to the variable delay generator, the logic gate to output the clock signal having the variable clock period. 7. The apparatus of claim 1, the clock period randomizer including:
a fixed delay generator that generates a fixed delay; a variable delay generator that generates a variable delay; and a trim code generator configured to control the variable delay generator, wherein a clock signal has a variable period set by the fixed delay and the variable delay. 8. The apparatus of claim 7,
wherein the variable delay generator includes a first delay unit and a second delay unit, wherein the first delay unit includes first circuitry configured to generate a delay and a first mux configured to switch the first circuitry into and out of a circuit, wherein the first mux is controlled by a trim code generated by the trim code generator, wherein the second delay unit includes second circuitry configured to generate a delay and a second mux configured to switch the second circuitry into and out of a circuit, wherein the second mux is controlled by a trim code generated by the trim code generator, and wherein the trim code generator includes a random number generator that generates a random number or a pseudorandom number. 9. (canceled) 10. (canceled) 11. (canceled) 12. The apparatus of claim 1, the clock period randomizer including:
a fixed delay generator that generates a fixed delay; and a variable delay generator that generates a variable delay, the variable delay generator including a varactor having a bottom plate, wherein the variable delay is generated by varying a voltage to the bottom plate of the varactor, and wherein a clock signal has a variable period set by the fixed delay and the variable delay. 13. The apparatus of claim 1, the clock period randomizer including:
a fixed delay generator that generates a fixed delay; and a variable delay generator that generates a variable delay, the variable delay generator including a phase interpolator that generates the variable delay, wherein a clock signal has a variable period set by the fixed delay and the variable delay. 14. (canceled) 15. (canceled) 16. The apparatus of claim 1, the clock period randomizer including:
a digital to analog converter (DAC); a voltage regulator that receives an input reference that varies on a cycle by cycle basis; and 2n+1 inverters in series, the inverters driven by a signal output by the voltage regulator, wherein n is an integer greater than zero. 17. (canceled) 18. (canceled) 19. The apparatus of claim 1, further comprising a circuit including a plurality of substantially identical variable capacitors, and wherein trim codes based on a unary coding are applied to the substantially identical variable capacitors. 20. The apparatus of claim 1, further comprising a circuit including a plurality of variable capacitors and binary-weighted trim codes applied to the variable capacitors. 21. (canceled) 22. A method of generating a variable clock period for a clock signal of a device at least during a cryptographic operation to defend against a cryptographic attack, the method comprising:
generating, by a fixed delay generator, a fixed delay; generating, by a variable delay generator, a variable delay; generating, by a random number generator, a random number or a pseudorandom number; controlling an amount of the variable delay based on the random number or the pseudorandom number; controlling a variable period of a clock signal based on the fixed delay and the variable delay; and driving the device at the variable clock period at least during cryptographic operation. 23. The method of claim 22, wherein a sum of the fixed delay and a minimum amount of the variable delay is greater than or equal to a minimum clock period of an associated device. 24. The method of claim 23, wherein a sum of the fixed delay and a maximum amount of the variable delay is less than or equal to a predetermined performance threshold of the associated device. 25. A method of randomizing a clock period for a clock of an associated device at least during a cryptographic operation to defend against a cryptographic attack, the method comprising:
determining a set of trim codes, the set including at least a first trim code and a second trim code; generating, by physical electronic hardware, a random number or a pseudorandom number; selecting, based on the random number or the pseudorandom number, the first trim code from the set of trim codes; selecting, based on the random number or the pseudorandom number, the second trim code from the set of trim codes; providing the first trim code to a variable delay generator, the variable delay generator including elements that operate based on any trim code from the set of trim codes; and providing the second trim code to the variable delay generator, wherein when the first trim code is provided to the variable delay generator, a clock period of the associated device is a first amount of time, wherein when the second trim code is provided to the variable delay generator, a clock period of the associated device is a second amount of time, and wherein the first amount of time is greater than the second amount of time. 26. The method of claim 25,
wherein the variable delay generator has a minimum delay, wherein a fixed delay generator has a fixed delay, wherein the fixed delay contributes to a length of the clock period of the associated device, and wherein a sum of the fixed delay and the minimum delay of the variable delay generator is greater than or equal to a minimum clock period of the associated device. 27. The method of claim 26, wherein the sum of the fixed delay and the minimum delay of the variable delay generator is less than or equal to a predetermined performance threshold of the associated device. 28. The method of claim 25, wherein the first amount of time is at least 1% greater than the second amount of time. | Methods, systems, and apparatuses for defending against cryptographic attacks using clock period randomization. The methods, systems, and apparatuses are designed to make side channel attacks and fault injection attacks more difficult by using a clock with a variable period during a cryptographic operation. In an example embodiment, a clock period randomizer includes a fixed delay generator and a variable delay generator, wherein a variable delay generated by the variable delay generator is based on a random or pseudorandom value that is changed occasionally or periodically. The methods, systems, and apparatuses are useful in hardware security applications where fault injection and/or side channel attacks are of concern.1. An apparatus randomly varying a device clock during cryptographic operation, the apparatus comprising:
an input clock; and a clock period randomizer, the clock period randomizer generating a variable clock period that varies randomly to produce an output variable clock driving the device at a random clock rate at least during cryptographic operation. 2. The apparatus of claim 1, wherein the clock period randomizer includes:
a circuit including a variable capacitor; and a switch configured to switch the variable capacitor into or out of the circuit, the switch controlled by a trim code, wherein the circuit is configured to change a clock signal from low to high or from high to low based on an operation of the switch. 3. The apparatus of claim 2, further comprising a trim code generator to generate the trim code, the trim code generator including a random number generator to generate a random number or a pseudorandom number. 4. The apparatus of claim 3, wherein the trim code generator includes a bank of registers, each register holding a trim code. 5. The apparatus of claim 4, wherein the trim code generator includes a linear feedback shift register. 6. The apparatus of claim 2, wherein the circuit further includes:
a fixed delay generator including an inverter, a resistor, and a capacitor; a variable delay generator including an inverter, a resistor, and the variable capacitor; a logic gate connected to the fixed delay generator and to the variable delay generator, the logic gate to output the clock signal having the variable clock period. 7. The apparatus of claim 1, the clock period randomizer including:
a fixed delay generator that generates a fixed delay; a variable delay generator that generates a variable delay; and a trim code generator configured to control the variable delay generator, wherein a clock signal has a variable period set by the fixed delay and the variable delay. 8. The apparatus of claim 7,
wherein the variable delay generator includes a first delay unit and a second delay unit, wherein the first delay unit includes first circuitry configured to generate a delay and a first mux configured to switch the first circuitry into and out of a circuit, wherein the first mux is controlled by a trim code generated by the trim code generator, wherein the second delay unit includes second circuitry configured to generate a delay and a second mux configured to switch the second circuitry into and out of a circuit, wherein the second mux is controlled by a trim code generated by the trim code generator, and wherein the trim code generator includes a random number generator that generates a random number or a pseudorandom number. 9. (canceled) 10. (canceled) 11. (canceled) 12. The apparatus of claim 1, the clock period randomizer including:
a fixed delay generator that generates a fixed delay; and a variable delay generator that generates a variable delay, the variable delay generator including a varactor having a bottom plate, wherein the variable delay is generated by varying a voltage to the bottom plate of the varactor, and wherein a clock signal has a variable period set by the fixed delay and the variable delay. 13. The apparatus of claim 1, the clock period randomizer including:
a fixed delay generator that generates a fixed delay; and a variable delay generator that generates a variable delay, the variable delay generator including a phase interpolator that generates the variable delay, wherein a clock signal has a variable period set by the fixed delay and the variable delay. 14. (canceled) 15. (canceled) 16. The apparatus of claim 1, the clock period randomizer including:
a digital to analog converter (DAC); a voltage regulator that receives an input reference that varies on a cycle by cycle basis; and 2n+1 inverters in series, the inverters driven by a signal output by the voltage regulator, wherein n is an integer greater than zero. 17. (canceled) 18. (canceled) 19. The apparatus of claim 1, further comprising a circuit including a plurality of substantially identical variable capacitors, and wherein trim codes based on a unary coding are applied to the substantially identical variable capacitors. 20. The apparatus of claim 1, further comprising a circuit including a plurality of variable capacitors and binary-weighted trim codes applied to the variable capacitors. 21. (canceled) 22. A method of generating a variable clock period for a clock signal of a device at least during a cryptographic operation to defend against a cryptographic attack, the method comprising:
generating, by a fixed delay generator, a fixed delay; generating, by a variable delay generator, a variable delay; generating, by a random number generator, a random number or a pseudorandom number; controlling an amount of the variable delay based on the random number or the pseudorandom number; controlling a variable period of a clock signal based on the fixed delay and the variable delay; and driving the device at the variable clock period at least during cryptographic operation. 23. The method of claim 22, wherein a sum of the fixed delay and a minimum amount of the variable delay is greater than or equal to a minimum clock period of an associated device. 24. The method of claim 23, wherein a sum of the fixed delay and a maximum amount of the variable delay is less than or equal to a predetermined performance threshold of the associated device. 25. A method of randomizing a clock period for a clock of an associated device at least during a cryptographic operation to defend against a cryptographic attack, the method comprising:
determining a set of trim codes, the set including at least a first trim code and a second trim code; generating, by physical electronic hardware, a random number or a pseudorandom number; selecting, based on the random number or the pseudorandom number, the first trim code from the set of trim codes; selecting, based on the random number or the pseudorandom number, the second trim code from the set of trim codes; providing the first trim code to a variable delay generator, the variable delay generator including elements that operate based on any trim code from the set of trim codes; and providing the second trim code to the variable delay generator, wherein when the first trim code is provided to the variable delay generator, a clock period of the associated device is a first amount of time, wherein when the second trim code is provided to the variable delay generator, a clock period of the associated device is a second amount of time, and wherein the first amount of time is greater than the second amount of time. 26. The method of claim 25,
wherein the variable delay generator has a minimum delay, wherein a fixed delay generator has a fixed delay, wherein the fixed delay contributes to a length of the clock period of the associated device, and wherein a sum of the fixed delay and the minimum delay of the variable delay generator is greater than or equal to a minimum clock period of the associated device. 27. The method of claim 26, wherein the sum of the fixed delay and the minimum delay of the variable delay generator is less than or equal to a predetermined performance threshold of the associated device. 28. The method of claim 25, wherein the first amount of time is at least 1% greater than the second amount of time. | 2,400 |
7,777 | 7,777 | 14,795,739 | 2,477 | A beacon system and method are provided. The system provides schemes and methods whereby range configurable beacons can smartly choose to either broadcast information in their vicinity or allow another device to interact with it at the user's discretion. In some incarnations, a Mobile or Smart Phone devices could deduce information meaningful in context of the applications running on the Mobile or Smart Phone devices, from such beacon based devices with configurable range allowing options for either beacon device operation or user initiated interaction with the beacon device. | 1. An apparatus, comprising:
a plurality of beacons situated in an area, wherein each beacon is situated in a region within the area; a beacon manager, coupled to each of the plurality of beacons, that determines a configuration for the plurality of beacons based on the region in which the plurality of beacons are situated, wherein the configuration for each beacon includes a range of the beacon selected from a first range and a second range; and each beacon receives the configuration from the beacon manager for the beacon so that each beacon has a range configured for the region within the area in which the beacon is situated. 2. The apparatus of claim 1, wherein the configuration for each beacon includes a time period during which the beacon transmits its beacon message. 3. The apparatus of claim 2, wherein the beacon manager generates a configuration for a plurality of beacons, wherein the configuration for each beacon has a different time period during which the beacon transmits its beacon message so that the beacon messages of the plurality of beacons are time sequenced. 4. The apparatus of claim 1 further comprising at least one computing device that is capable of communicating with the plurality of beacons, wherein each beacon generates a broadcast message that is receivable by at least one computing device that is in range of a particular beacon. 5. The apparatus of claim 1, wherein the area is one of a building, outdoors or on a mobile platform. 6. The apparatus of claim 1, wherein an SSID of a beacon is segmented and is used to provide location identification of the beacon. 7. The apparatus of claim 1, wherein at least one of the plurality of beacons is a BLE beacon programmed with an short range that is used instead of an NFC beacon. 8. A method for configuring beacons, comprising:
receiving a layout of an area including a location of each beacon in the area and a region in the area for each beacon, the area having a plurality of beacons; generating, for each beacon, a configuration of the beacon based on the location of the beacon in the area indicated by the layout of the area, the configuration of the beacon including a range of the beacon, wherein the plurality of beacons have different configured ranges; and communicating, to each beacon, the configuration of the beacon so that the plurality of beacons in the area have overlapping ranges. 9. The method of claim 8, wherein the configuration for each beacon includes a time period during which the beacon transmits its beacon message. 10. The method of claim 9, wherein generating the configuration for each beacon further comprises generating a configuration for a plurality of beacons, wherein the configuration for each beacon has a different time period during which the beacon transmits its beacon message so that the beacon messages of the plurality of beacons are time sequenced. 11. The method of claim 8, wherein the area is one of a building, outdoors or on a mobile platform. 12. The method of claim 8, wherein generating the configuration further comprises segmenting an SSID of the beacon to provide location identification of the beacon. 13. A method for configuring beacons, comprising:
receiving a plurality beacons; generating, for each beacon, a configuration of the beacon based on a preconfigured use profile of the beacon, the configuration of the beacon including a range of the beacon, wherein the plurality of beacons have different configured ranges; configuring each of the plurality of beacons based on the preconfigured use profile of each beacon; and installing the plurality of beacons in an area having a plurality of regions within the area, wherein each beacon is installed in a particular region of the area based on the preconfigured use profile of the beacon. 14. The method of claim 13, wherein the configuration for each beacon includes a time period during which the beacon transmits its beacon message. 15. The method of claim 14, wherein generating the configuration for each beacon further comprises generating a configuration for a plurality of beacons, wherein the configuration for each beacon has a different time period during which the beacon transmits its beacon message so that the beacon messages of the plurality of beacons are time sequenced. 16. The method of claim 13, wherein the area is one of a building, outdoors or on a mobile platform. 17. The method of claim 13, wherein the preconfigured use profile is one of a callout profile, an informational profile and a location marking profile. 18. The method of claim 13, wherein configuring the beacon further comprises segmenting an SSID of the beacon to provide location identification of the beacon. | A beacon system and method are provided. The system provides schemes and methods whereby range configurable beacons can smartly choose to either broadcast information in their vicinity or allow another device to interact with it at the user's discretion. In some incarnations, a Mobile or Smart Phone devices could deduce information meaningful in context of the applications running on the Mobile or Smart Phone devices, from such beacon based devices with configurable range allowing options for either beacon device operation or user initiated interaction with the beacon device.1. An apparatus, comprising:
a plurality of beacons situated in an area, wherein each beacon is situated in a region within the area; a beacon manager, coupled to each of the plurality of beacons, that determines a configuration for the plurality of beacons based on the region in which the plurality of beacons are situated, wherein the configuration for each beacon includes a range of the beacon selected from a first range and a second range; and each beacon receives the configuration from the beacon manager for the beacon so that each beacon has a range configured for the region within the area in which the beacon is situated. 2. The apparatus of claim 1, wherein the configuration for each beacon includes a time period during which the beacon transmits its beacon message. 3. The apparatus of claim 2, wherein the beacon manager generates a configuration for a plurality of beacons, wherein the configuration for each beacon has a different time period during which the beacon transmits its beacon message so that the beacon messages of the plurality of beacons are time sequenced. 4. The apparatus of claim 1 further comprising at least one computing device that is capable of communicating with the plurality of beacons, wherein each beacon generates a broadcast message that is receivable by at least one computing device that is in range of a particular beacon. 5. The apparatus of claim 1, wherein the area is one of a building, outdoors or on a mobile platform. 6. The apparatus of claim 1, wherein an SSID of a beacon is segmented and is used to provide location identification of the beacon. 7. The apparatus of claim 1, wherein at least one of the plurality of beacons is a BLE beacon programmed with an short range that is used instead of an NFC beacon. 8. A method for configuring beacons, comprising:
receiving a layout of an area including a location of each beacon in the area and a region in the area for each beacon, the area having a plurality of beacons; generating, for each beacon, a configuration of the beacon based on the location of the beacon in the area indicated by the layout of the area, the configuration of the beacon including a range of the beacon, wherein the plurality of beacons have different configured ranges; and communicating, to each beacon, the configuration of the beacon so that the plurality of beacons in the area have overlapping ranges. 9. The method of claim 8, wherein the configuration for each beacon includes a time period during which the beacon transmits its beacon message. 10. The method of claim 9, wherein generating the configuration for each beacon further comprises generating a configuration for a plurality of beacons, wherein the configuration for each beacon has a different time period during which the beacon transmits its beacon message so that the beacon messages of the plurality of beacons are time sequenced. 11. The method of claim 8, wherein the area is one of a building, outdoors or on a mobile platform. 12. The method of claim 8, wherein generating the configuration further comprises segmenting an SSID of the beacon to provide location identification of the beacon. 13. A method for configuring beacons, comprising:
receiving a plurality beacons; generating, for each beacon, a configuration of the beacon based on a preconfigured use profile of the beacon, the configuration of the beacon including a range of the beacon, wherein the plurality of beacons have different configured ranges; configuring each of the plurality of beacons based on the preconfigured use profile of each beacon; and installing the plurality of beacons in an area having a plurality of regions within the area, wherein each beacon is installed in a particular region of the area based on the preconfigured use profile of the beacon. 14. The method of claim 13, wherein the configuration for each beacon includes a time period during which the beacon transmits its beacon message. 15. The method of claim 14, wherein generating the configuration for each beacon further comprises generating a configuration for a plurality of beacons, wherein the configuration for each beacon has a different time period during which the beacon transmits its beacon message so that the beacon messages of the plurality of beacons are time sequenced. 16. The method of claim 13, wherein the area is one of a building, outdoors or on a mobile platform. 17. The method of claim 13, wherein the preconfigured use profile is one of a callout profile, an informational profile and a location marking profile. 18. The method of claim 13, wherein configuring the beacon further comprises segmenting an SSID of the beacon to provide location identification of the beacon. | 2,400 |
7,778 | 7,778 | 15,457,606 | 2,434 | Methods and systems are provided for enhancing security of encrypted messages. One or more bits may be selected in an encrypted message, with the one or more bits being selected such that there is no sequence of consecutive bits in the message, having a length that is greater than or equal to a defined threshold value, that is free of bit errors. An adjustment may be applied to the encrypted message prior to transmitting the message to introduce bit errors in the message, with the adjustment being configured to affect the one or more selected bits. The adjustment may include inverting the one or more selected bits. The one or more bits may be selected and/or adjustment may be configured to reduce detectability of an encryption key used in encrypting messages. | 1-20. (canceled) 21. A method comprising:
selecting one or more bits in an encrypted message; and applying an adjustment to the encrypted message prior to transmitting the message to introduce bit errors in the message; wherein:
the adjustment is configured to affect the one or more selected bits; and
the one or more bits are selected and the adjustment is configured such that there is no sequence of consecutive bits in the encrypted message that has a length that is greater than or equal to a defined threshold value and that is free of bit errors. 22. The method of claim 21, wherein the adjustment comprises inverting the one or more selected bits. 23. The method of claim 21, wherein the message is a physical layer data frame encoding a data link layer control frame, and comprising determining the one or more selected bits based on particular bit positions in the physical layer data frame 24. The method of claim 21, comprising determining the one or more selected bits at a physical layer. 25. The method of claim 24, comprising determining the one or more selected bits so that the message contains at least one bit error within any sequence of consecutive bits having a particular length. 26. The method of claim 25, comprising adjusting the particular length based on a desired lowered quality of transmission. 27. The method of claim 21, wherein the one or more selected bits are corrected at a receiver-side device by use of forward error correction. 28. The method of claim 21, comprising determining the one or more selected bits and/or configuring the adjustment to reduce detectability of an encryption key used in encrypting the message. 29. The method of claim 28, wherein said encryption key is used in a GSM network to encrypt messages at a base station that uses an A5/1 cipher protocol. 30. A system comprising:
one or more circuits for use in a communication device, the one or more circuits being operable to:
select one or more bits in an encrypted message; and
apply an adjustment to the encrypted message prior to transmitting the message to introduce bit errors in the message, the adjustment being configured to affect the one or more selected bits;
wherein:
the adjustment is configured to affect the one or more selected bits; and
the one or more bits are selected and the adjustment is configured such that there is no sequence of consecutive bits in the encrypted message that has a length that is greater than or equal to a defined threshold value and that is free of bit errors. 31. The system of claim 30, wherein the adjustment comprises inverting the one or more selected bits 32. The system of claim 30, wherein:
the message comprises a physical layer data frame encoding a data link layer control frame; and the one or more circuits are operable to determine the one or more selected bits at particular positions in the physical layer data frame. 33. The system of claim 30, wherein the one or more circuits are operable to determine the one or more selected bits at a physical layer. 34. The system of claim 33, wherein the one or more circuits are operable to determine the one or more selected bits so that the message contains at least one bit error within any sequence of consecutive bits having a particular length. 35. The system of claim 34, wherein the one or more circuits are operable to adjust the particular length based on a desired lowered quality of transmission. 36. The system of claim 30, wherein the one or more selected bits are corrected at a receiver-side device by use of forward error correction. 37. The system of claim 30, wherein the one or more circuits are operable to configure the adjustment to reduce detectability of an encryption key used in encrypting the message. 38. The system of claim 30, wherein:
the communication device comprises a base station that is configurable to use an A5/1 cipher protocol; and the one or more circuits are operable to determine the one or more selected bits and/or configure the adjustment to reduce detectability of an encryption key used in a GSM network when encrypting messages using the A5/1 cipher protocol. | Methods and systems are provided for enhancing security of encrypted messages. One or more bits may be selected in an encrypted message, with the one or more bits being selected such that there is no sequence of consecutive bits in the message, having a length that is greater than or equal to a defined threshold value, that is free of bit errors. An adjustment may be applied to the encrypted message prior to transmitting the message to introduce bit errors in the message, with the adjustment being configured to affect the one or more selected bits. The adjustment may include inverting the one or more selected bits. The one or more bits may be selected and/or adjustment may be configured to reduce detectability of an encryption key used in encrypting messages.1-20. (canceled) 21. A method comprising:
selecting one or more bits in an encrypted message; and applying an adjustment to the encrypted message prior to transmitting the message to introduce bit errors in the message; wherein:
the adjustment is configured to affect the one or more selected bits; and
the one or more bits are selected and the adjustment is configured such that there is no sequence of consecutive bits in the encrypted message that has a length that is greater than or equal to a defined threshold value and that is free of bit errors. 22. The method of claim 21, wherein the adjustment comprises inverting the one or more selected bits. 23. The method of claim 21, wherein the message is a physical layer data frame encoding a data link layer control frame, and comprising determining the one or more selected bits based on particular bit positions in the physical layer data frame 24. The method of claim 21, comprising determining the one or more selected bits at a physical layer. 25. The method of claim 24, comprising determining the one or more selected bits so that the message contains at least one bit error within any sequence of consecutive bits having a particular length. 26. The method of claim 25, comprising adjusting the particular length based on a desired lowered quality of transmission. 27. The method of claim 21, wherein the one or more selected bits are corrected at a receiver-side device by use of forward error correction. 28. The method of claim 21, comprising determining the one or more selected bits and/or configuring the adjustment to reduce detectability of an encryption key used in encrypting the message. 29. The method of claim 28, wherein said encryption key is used in a GSM network to encrypt messages at a base station that uses an A5/1 cipher protocol. 30. A system comprising:
one or more circuits for use in a communication device, the one or more circuits being operable to:
select one or more bits in an encrypted message; and
apply an adjustment to the encrypted message prior to transmitting the message to introduce bit errors in the message, the adjustment being configured to affect the one or more selected bits;
wherein:
the adjustment is configured to affect the one or more selected bits; and
the one or more bits are selected and the adjustment is configured such that there is no sequence of consecutive bits in the encrypted message that has a length that is greater than or equal to a defined threshold value and that is free of bit errors. 31. The system of claim 30, wherein the adjustment comprises inverting the one or more selected bits 32. The system of claim 30, wherein:
the message comprises a physical layer data frame encoding a data link layer control frame; and the one or more circuits are operable to determine the one or more selected bits at particular positions in the physical layer data frame. 33. The system of claim 30, wherein the one or more circuits are operable to determine the one or more selected bits at a physical layer. 34. The system of claim 33, wherein the one or more circuits are operable to determine the one or more selected bits so that the message contains at least one bit error within any sequence of consecutive bits having a particular length. 35. The system of claim 34, wherein the one or more circuits are operable to adjust the particular length based on a desired lowered quality of transmission. 36. The system of claim 30, wherein the one or more selected bits are corrected at a receiver-side device by use of forward error correction. 37. The system of claim 30, wherein the one or more circuits are operable to configure the adjustment to reduce detectability of an encryption key used in encrypting the message. 38. The system of claim 30, wherein:
the communication device comprises a base station that is configurable to use an A5/1 cipher protocol; and the one or more circuits are operable to determine the one or more selected bits and/or configure the adjustment to reduce detectability of an encryption key used in a GSM network when encrypting messages using the A5/1 cipher protocol. | 2,400 |
7,779 | 7,779 | 14,742,007 | 2,462 | Various embodiments improve the operation of computers by providing methods of transmitting data with low latency and high bandwidth. Data may be transmitted in a packet composed of data flits, the data flits having at least two different formats configured to implement different communication protocols. In some embodiments, a given flit may be transmitted using two different modulation methods, with a first part of the flit transmitted using a first modulation method, such as a binary method, and a second part of the flit using a higher-order modulation method. | 1. A method of transmitting data as a packet in a burst mode, from a transmitter in a high-performance computer to a receiver over a communications channel on a single fabric within the high-performance computer, the method comprising:
generating a packet comprising a plurality of flits having different formats, the formats configured to implement different communication protocols, including at least one low-latency flit configured for low latency transmission over the communications channel, and a plurality of bandwidth flits, each bandwidth flit configured for high bandwidth throughput over the same communications channel; transmitting the plurality of flits over the communications channel from the transmitter to the receiver in a contiguous stream, the contiguous stream running two communication protocols simultaneously over one physical fabric, the first protocol being a link-level protocol configured for low-latency messaging, and a the second protocol being an end-to-end protocol configured for high bandwidth; and at the receiver, reassembling the data from the flits. 2. The method of transmitting data as a packet in a burst mode of claim 1, wherein
at least one low-latency flit is a header flit identifying the beginning of the contiguous burst of flits, and the plurality of bandwidth flits are configured to carry a sub-set of the data, and the packet further comprises: a tail flit configured to identify the end of the contiguous burst. 3. The method of transmitting data as a packet in a burst mode of claim 2, wherein the header flit includes:
a header sideband field storing meta data identifying the flit as a header flit, and a sideband CRC field having a CRC value corresponding to the sideband meta data. 4. The method of transmitting data as a packet in a burst mode of claim 2, wherein the bandwidth flit format includes a payload field storing the sub-set of the data, and a freight sideband field identifying the flit as a bandwidth flit. 5. The method of transmitting data as a packet in a burst mode of claim 2, wherein the tail flit includes a payload field having an end-to-end CRC value for the packet. 6. The method of transmitting data as a packet in a burst mode of claim 1, further comprising checking flit integrity of at least one flit, at an intermediate point in the communications channel between the transmitter and the receiver, and requesting that the transmitter resend the flit if the flit integrity is not verified. 7. The method of transmitting data as a packet in a burst mode of claim 1, further comprising:
receiving all of the flits at the receiver prior to checking the integrity of the packet; and thereafter checking the integrity of the packet at the receiver. 8. The method of transmitting data as a packet in a burst mode of claim 7, further comprising requesting a replay of the entire message from the transmitter, if the integrity of the packet is not confirmed. 9. The method of transmitting data as a packet in a burst mode of claim 1, wherein the transmitted packet has a packet efficiency of greater than ninety percent. 10. The method of transmitting data as a packet in a burst mode of claim 1, wherein the transmitted packet has a packet efficiency of greater than ninety five percent. 11. The method of transmitting data as a packet in a burst mode of claim 1, wherein transmitting the plurality of flits from the transmitter to the receiver in a contiguous stream comprises transmitting the plurality of flits over a single virtual channel. 12. A method of transmitting data in an interleaving mode, from a transmitter in a high-performance computer to a receiver within the high-performance computer over a communications channel within the high-performance computer, the method comprising:
generating a packet comprising a plurality of packet flits having different formats, the formats configured to implement different communication protocols, including at least one low-latency flit configured for low latency transmission over the communications channel, and a plurality of bandwidth flits, each bandwidth flit configured for high bandwidth throughput; transmitting the plurality of flits from the transmitter to the receiver in a non-contiguous stream, such that the plurality of packet flits are interleaved with additional flits, which additional flits are not part of the packet, the transmission of the packet running two protocols simultaneously over one physical fabric, the first protocol being a link-level protocol configured for low-latency messaging, and a the second protocol being an end-to-end protocol configured for high bandwidth; and at the receiver, reassembling the data from the packet flits. 13. The method of transmitting data in an interleaving mode of claim 12, wherein the step of generating a packet comprises:
generating a header flit having:
a header sideband field storing meta data about the data block;
a header sideband CRC field having a CRC value corresponding to the data in the sideband field;
a payload field;
a header payload CRC field having a CRC value corresponding to the data in the payload field;
generating a plurality of freight flits, each freight flit having:
a payload field storing one of the sub-blocks;
a freight sideband field identifying the flits as a freight flit;
a freight sideband CRC field having a CRC value corresponding to the data in the freight sideband field; and
generating a tail flit having a tail payload field and an end-to-end CRC field, the end-to-end CRC field storing a CRC value for the packet. 14. The method of transmitting data in an interleaving mode of claim 13, wherein transmitting the plurality of flits from the transmitter to the receiver comprises transmitting the plurality of flits over a single virtual channel. 15. The method of transmitting data in an interleaving mode of claim 12, wherein the transmitted packet has a packet efficiency of greater than ninety percent. 16. The method of transmitting data in an interleaving mode of claim 12, wherein the transmitted packet has a packet efficiency of greater than ninety five percent. 17. The method of transmitting data as a packet in a burst mode of claim 1, wherein transmitting a bandwidth flit includes transmitting bits of a first part of the flit using a binary modulation format, and transmitting the remaining bits of the flit using a higher-order modulation format. 18. A system for transmitting data over a virtual channel in a manner having both low latency and high efficiency, the system comprising:
a transmitter configured to generate a packet comprising a plurality of flits having different formats, the formats configured to implement different communication protocols, including at least one low-latency flit configured for low latency transmission over the communications channel, and a plurality of bandwidth flits, each bandwidth flit configured for high bandwidth throughput, the transmitter configured to transmit the plurality of flits via a communications channel by running two protocols simultaneously over one physical fabric, the first protocol being a link-level protocol configured for low-latency messaging, and a the second protocol being an end-to-end protocol configured for high bandwidth; and a destination receiver configured to receive the plurality of flits and validate the integrity of the packet as received at the receiver. 19. The system for transmitting data over a virtual channel of claim 18, wherein the communication channel comprises an intermediate point, the intermediate point having an intermediate receiver configured to validate the integrity of some, but not all, of the flits of the packet. 20. The system for transmitting data over a virtual channel of claim 18, wherein the transmitter is configured to transmit all of the flits of the packet in a contiguous burst. 21. The system for transmitting data over a virtual channel of claim 18 wherein the transmitter is configured to transmit all of the flits of the packet interleaved with other flits that are not part of the packet. 22. The system for transmitting data over a virtual channel of claim 18 wherein the transmitter is configured to transmit a first part of a bandwidth flit using NRZ modulation, and transmits the remainder of the bandwidth flit using higher order modulation using PAM modulation. | Various embodiments improve the operation of computers by providing methods of transmitting data with low latency and high bandwidth. Data may be transmitted in a packet composed of data flits, the data flits having at least two different formats configured to implement different communication protocols. In some embodiments, a given flit may be transmitted using two different modulation methods, with a first part of the flit transmitted using a first modulation method, such as a binary method, and a second part of the flit using a higher-order modulation method.1. A method of transmitting data as a packet in a burst mode, from a transmitter in a high-performance computer to a receiver over a communications channel on a single fabric within the high-performance computer, the method comprising:
generating a packet comprising a plurality of flits having different formats, the formats configured to implement different communication protocols, including at least one low-latency flit configured for low latency transmission over the communications channel, and a plurality of bandwidth flits, each bandwidth flit configured for high bandwidth throughput over the same communications channel; transmitting the plurality of flits over the communications channel from the transmitter to the receiver in a contiguous stream, the contiguous stream running two communication protocols simultaneously over one physical fabric, the first protocol being a link-level protocol configured for low-latency messaging, and a the second protocol being an end-to-end protocol configured for high bandwidth; and at the receiver, reassembling the data from the flits. 2. The method of transmitting data as a packet in a burst mode of claim 1, wherein
at least one low-latency flit is a header flit identifying the beginning of the contiguous burst of flits, and the plurality of bandwidth flits are configured to carry a sub-set of the data, and the packet further comprises: a tail flit configured to identify the end of the contiguous burst. 3. The method of transmitting data as a packet in a burst mode of claim 2, wherein the header flit includes:
a header sideband field storing meta data identifying the flit as a header flit, and a sideband CRC field having a CRC value corresponding to the sideband meta data. 4. The method of transmitting data as a packet in a burst mode of claim 2, wherein the bandwidth flit format includes a payload field storing the sub-set of the data, and a freight sideband field identifying the flit as a bandwidth flit. 5. The method of transmitting data as a packet in a burst mode of claim 2, wherein the tail flit includes a payload field having an end-to-end CRC value for the packet. 6. The method of transmitting data as a packet in a burst mode of claim 1, further comprising checking flit integrity of at least one flit, at an intermediate point in the communications channel between the transmitter and the receiver, and requesting that the transmitter resend the flit if the flit integrity is not verified. 7. The method of transmitting data as a packet in a burst mode of claim 1, further comprising:
receiving all of the flits at the receiver prior to checking the integrity of the packet; and thereafter checking the integrity of the packet at the receiver. 8. The method of transmitting data as a packet in a burst mode of claim 7, further comprising requesting a replay of the entire message from the transmitter, if the integrity of the packet is not confirmed. 9. The method of transmitting data as a packet in a burst mode of claim 1, wherein the transmitted packet has a packet efficiency of greater than ninety percent. 10. The method of transmitting data as a packet in a burst mode of claim 1, wherein the transmitted packet has a packet efficiency of greater than ninety five percent. 11. The method of transmitting data as a packet in a burst mode of claim 1, wherein transmitting the plurality of flits from the transmitter to the receiver in a contiguous stream comprises transmitting the plurality of flits over a single virtual channel. 12. A method of transmitting data in an interleaving mode, from a transmitter in a high-performance computer to a receiver within the high-performance computer over a communications channel within the high-performance computer, the method comprising:
generating a packet comprising a plurality of packet flits having different formats, the formats configured to implement different communication protocols, including at least one low-latency flit configured for low latency transmission over the communications channel, and a plurality of bandwidth flits, each bandwidth flit configured for high bandwidth throughput; transmitting the plurality of flits from the transmitter to the receiver in a non-contiguous stream, such that the plurality of packet flits are interleaved with additional flits, which additional flits are not part of the packet, the transmission of the packet running two protocols simultaneously over one physical fabric, the first protocol being a link-level protocol configured for low-latency messaging, and a the second protocol being an end-to-end protocol configured for high bandwidth; and at the receiver, reassembling the data from the packet flits. 13. The method of transmitting data in an interleaving mode of claim 12, wherein the step of generating a packet comprises:
generating a header flit having:
a header sideband field storing meta data about the data block;
a header sideband CRC field having a CRC value corresponding to the data in the sideband field;
a payload field;
a header payload CRC field having a CRC value corresponding to the data in the payload field;
generating a plurality of freight flits, each freight flit having:
a payload field storing one of the sub-blocks;
a freight sideband field identifying the flits as a freight flit;
a freight sideband CRC field having a CRC value corresponding to the data in the freight sideband field; and
generating a tail flit having a tail payload field and an end-to-end CRC field, the end-to-end CRC field storing a CRC value for the packet. 14. The method of transmitting data in an interleaving mode of claim 13, wherein transmitting the plurality of flits from the transmitter to the receiver comprises transmitting the plurality of flits over a single virtual channel. 15. The method of transmitting data in an interleaving mode of claim 12, wherein the transmitted packet has a packet efficiency of greater than ninety percent. 16. The method of transmitting data in an interleaving mode of claim 12, wherein the transmitted packet has a packet efficiency of greater than ninety five percent. 17. The method of transmitting data as a packet in a burst mode of claim 1, wherein transmitting a bandwidth flit includes transmitting bits of a first part of the flit using a binary modulation format, and transmitting the remaining bits of the flit using a higher-order modulation format. 18. A system for transmitting data over a virtual channel in a manner having both low latency and high efficiency, the system comprising:
a transmitter configured to generate a packet comprising a plurality of flits having different formats, the formats configured to implement different communication protocols, including at least one low-latency flit configured for low latency transmission over the communications channel, and a plurality of bandwidth flits, each bandwidth flit configured for high bandwidth throughput, the transmitter configured to transmit the plurality of flits via a communications channel by running two protocols simultaneously over one physical fabric, the first protocol being a link-level protocol configured for low-latency messaging, and a the second protocol being an end-to-end protocol configured for high bandwidth; and a destination receiver configured to receive the plurality of flits and validate the integrity of the packet as received at the receiver. 19. The system for transmitting data over a virtual channel of claim 18, wherein the communication channel comprises an intermediate point, the intermediate point having an intermediate receiver configured to validate the integrity of some, but not all, of the flits of the packet. 20. The system for transmitting data over a virtual channel of claim 18, wherein the transmitter is configured to transmit all of the flits of the packet in a contiguous burst. 21. The system for transmitting data over a virtual channel of claim 18 wherein the transmitter is configured to transmit all of the flits of the packet interleaved with other flits that are not part of the packet. 22. The system for transmitting data over a virtual channel of claim 18 wherein the transmitter is configured to transmit a first part of a bandwidth flit using NRZ modulation, and transmits the remainder of the bandwidth flit using higher order modulation using PAM modulation. | 2,400 |
7,780 | 7,780 | 14,834,661 | 2,488 | Methods and systems for compression that maintains parameters related to uncompressed video (PRTUV) while changing video compression ratios on-the-fly. One embodiment of a system includes: A video transmitter that receives incoming high-definition uncompressed video (HD-UV) characterized by certain PRTUV. The video transmitter compresses the incoming HD-UV into a first compressed video of ratio between 1:1 and 5:1, and sends it over a communication link to a receiver that decompresses the video to an outgoing HD-UV. When the video transmitter receives a command to smoothly change on-the-fly the compression to a second compressed video of ratio between 2:1 and 10:1, it makes the change without interrupting the continuous flow of the incoming HD-UV. Wherein the outgoing HD-UV maintains the PRTUV before, during, and after the change from the first compressed video to the second compressed video. | 1. A compression system configured to maintain parameters related to uncompressed video (PRTUV) while changing video compression ratios on-the-fly, comprising:
a video transmitter configured to receive incoming high-definition uncompressed video (HD-UV) characterized by the following PRTUV: uncompressed timing requirements, uncompressed number of video lines, and uncompressed number of video pixels per video line; the video transmitter is further configured to compress the incoming HD-UV into a first compressed video having a first compression ratio of between 1:1 and 5:1, and to send the first compressed video over a communication link to a video receiver; the video transmitter is further configured to receive a command to smoothly change on-the-fly the compression of the incoming HD-UV to a second compressed video having a second compression ratio of between 2:1 and 10:1, and to send the second compressed video over the communication link to the video receiver, without interrupting continuous flow of the incoming HD-UV; wherein the difference between the ratios of the first and second compressed videos is at least 25%; and the video receiver is configured to decompress the first or second compressed videos to an outgoing HD-UV; wherein the outgoing HD-UV maintains the PRTUV before, during, and after the change from the first compressed video to the second compressed video. 2. The compression system of claim 1, wherein the second compressed video is sent to the video receiver for a duration shorter than the duration required to transmit 30 HD-UV frames, after which the video transmitter smoothly changes on-the-fly the compression of the incoming HD-UV to use the first compression ratio, and sends the first compressed video to the video receiver, without interrupting the continuous flow of the incoming HD-UV. 3. The compression system of claim 1, wherein the second compressed video is sent to the video receiver for a duration shorter than the duration required to transmit 3 HD-UV frames, after which the video transmitter smoothly changes on-the-fly the compression of the incoming HD-UV to use the first compression ratio, and sends the first compressed video to the video receiver, without interrupting the continuous flow of the incoming HD-UV. 4. The compression system of claim 1, wherein the first compressed video has compression ratio between 1:1 and 2:1, the second compressed video has compression ratio between 4:1 and 10:1, and further comprising a third compressed video having a third compression ratio between 2:1 and 4:1; wherein on-the-fly smooth change between the first and third compressed videos maintains the PRTUV before, during, and after the smooth change. 5. The compression system of claim 1, wherein the outgoing HD-UV further maintains the primary colors of pixels of the incoming HD-UV before, during, and after the change from the first compressed video to the second compressed video. 6. The compression system of claim 5, wherein the primary colors are Red, Yellow and Blue (RYB), or Red, Green and Blue (RGB), and maintaining the primary colors requires that the difference between corresponding pixels of the incoming and outgoing HD-UVs does not exceed a single shift on a 12 hue color wheel. 7. The compression system of claim 5, wherein the primary colors are Red, Yellow and Blue (RYB), or Red, Green and Blue (RGB), and in order to maintain the primary colors the compression does not cause artifacts that replace one primary color with another primary color. 8. The compression system of claim 1, wherein the outgoing HD-UV maintains a fixed delay relative to the incoming HD-UV before, during, and after the change from the first compressed video to the second compressed video. 9. The compression system of claim 1, further comprising a controller configured to issue the command to smoothly change on-the-fly the compression of the incoming HD-UV, wherein the controller is implemented as part of at least one of the following elements: the video transmitter, the video receiver, and a network controller. 10. The compression system of claim 1, further comprising a controller configured to issue the command to smoothly change on-the-fly the compression of the incoming HD-UV from the first compressed video to the second compressed video; wherein the command is issued in order to free up bandwidth for a new additional video stream. 11. The compression system of claim 1, further comprising a controller configured to issue the command to smoothly change on-the-fly the compression of the incoming HD-UV from the first compressed video to the second compressed video; wherein the command is issued in order to enable a visually lossless smooth change between the incoming HD-UV and a second incoming HD-UV. 12. A method for maintaining parameters related to uncompressed video (PRTUV) while changing video compression ratios on-the-fly, comprising:
receiving, by a video transmitter, incoming high-definition uncompressed video (HD-UV) characterized by the following PRTUV: uncompressed timing requirements, uncompressed number of video lines, and uncompressed number of video pixels per video line; compressing the incoming HD-UV into a first compressed video having a first compression ratio of between 1:1 and 5:1; sending the first compressed video over a communication link to a video receiver; receiving, by the video transmitter, a command to smoothly change on-the-fly the compression of the incoming HD-UV to a second compressed video having a second compression ratio of between 2:1 and 10:1; sending the second compressed video over the communication link to the video receiver, without interrupting continuous flow of the incoming HD-UV; wherein the difference between the ratios of the first and second compressed videos is at least 25%; and decompressing, by the video receiver, the first or second compressed videos to an outgoing HD-UV; wherein the outgoing HD-UV maintains the PRTUV before, during, and after the change from the first compressed video to the second compressed video. 13. The method of claim 12, further comprising sending the second compressed video to the video receiver during a duration shorter than the duration required to transmit 30 HD-UV frames, then smoothly changing on-the-fly the compression of the incoming HD-UV to use the first compression ratio, and sending the first compressed video to the video receiver without interrupting the continuous flow of the incoming HD-UV. 14. The method of claim 12, further comprising sending the second compressed video to the video receiver during a duration shorter than the duration required to transmit 3 HD-UV frames, then smoothly changing on-the-fly the compression of the incoming HD-UV to use the first compression ratio, and sending the first compressed video to the video receiver without interrupting the continuous flow of the incoming HD-UV. 15. The method of claim 12, wherein the first compressed video has compression ratio between 1:1 and 2:1, the second compressed video has compression ratio between 4:1 and 10:1, and further comprising a third compressed video having a third compression ratio between 2:1 and 4:1; and further comprising performing a smooth on-the-fly change between the first and third compressed videos while maintaining the PRTUV before, during, and after the smooth change. 16. The method of claim 12, wherein the outgoing HD-UV further maintains the primary colors of pixels of the incoming HD-UV before, during, and after the change from the first compressed video to the second compressed video. 17. The method of claim 16, wherein the primary colors are Red, Yellow and Blue (RYB), or Red, Green and Blue (RGB), and performing the change from the first compressed video to the second compressed video such that the difference between corresponding pixels of the incoming and outgoing HD-UVs does not exceed a single shift on a 12 hue color wheel. 18. The method of claim 12, further comprising maintaining a fixed delay between the outgoing HD-UV and the incoming HD-UV before, during, and after the change from the first compressed video to the second compressed video. 19. The method of claim 12, further comprising performing the smooth change on-the-fly in order to free up bandwidth for a new additional video stream. 20. The method of claim 12, further comprising performing the smooth change on-the-fly in order to enable a visually lossless switching between the incoming HD-UV and a second incoming HD-UV. | Methods and systems for compression that maintains parameters related to uncompressed video (PRTUV) while changing video compression ratios on-the-fly. One embodiment of a system includes: A video transmitter that receives incoming high-definition uncompressed video (HD-UV) characterized by certain PRTUV. The video transmitter compresses the incoming HD-UV into a first compressed video of ratio between 1:1 and 5:1, and sends it over a communication link to a receiver that decompresses the video to an outgoing HD-UV. When the video transmitter receives a command to smoothly change on-the-fly the compression to a second compressed video of ratio between 2:1 and 10:1, it makes the change without interrupting the continuous flow of the incoming HD-UV. Wherein the outgoing HD-UV maintains the PRTUV before, during, and after the change from the first compressed video to the second compressed video.1. A compression system configured to maintain parameters related to uncompressed video (PRTUV) while changing video compression ratios on-the-fly, comprising:
a video transmitter configured to receive incoming high-definition uncompressed video (HD-UV) characterized by the following PRTUV: uncompressed timing requirements, uncompressed number of video lines, and uncompressed number of video pixels per video line; the video transmitter is further configured to compress the incoming HD-UV into a first compressed video having a first compression ratio of between 1:1 and 5:1, and to send the first compressed video over a communication link to a video receiver; the video transmitter is further configured to receive a command to smoothly change on-the-fly the compression of the incoming HD-UV to a second compressed video having a second compression ratio of between 2:1 and 10:1, and to send the second compressed video over the communication link to the video receiver, without interrupting continuous flow of the incoming HD-UV; wherein the difference between the ratios of the first and second compressed videos is at least 25%; and the video receiver is configured to decompress the first or second compressed videos to an outgoing HD-UV; wherein the outgoing HD-UV maintains the PRTUV before, during, and after the change from the first compressed video to the second compressed video. 2. The compression system of claim 1, wherein the second compressed video is sent to the video receiver for a duration shorter than the duration required to transmit 30 HD-UV frames, after which the video transmitter smoothly changes on-the-fly the compression of the incoming HD-UV to use the first compression ratio, and sends the first compressed video to the video receiver, without interrupting the continuous flow of the incoming HD-UV. 3. The compression system of claim 1, wherein the second compressed video is sent to the video receiver for a duration shorter than the duration required to transmit 3 HD-UV frames, after which the video transmitter smoothly changes on-the-fly the compression of the incoming HD-UV to use the first compression ratio, and sends the first compressed video to the video receiver, without interrupting the continuous flow of the incoming HD-UV. 4. The compression system of claim 1, wherein the first compressed video has compression ratio between 1:1 and 2:1, the second compressed video has compression ratio between 4:1 and 10:1, and further comprising a third compressed video having a third compression ratio between 2:1 and 4:1; wherein on-the-fly smooth change between the first and third compressed videos maintains the PRTUV before, during, and after the smooth change. 5. The compression system of claim 1, wherein the outgoing HD-UV further maintains the primary colors of pixels of the incoming HD-UV before, during, and after the change from the first compressed video to the second compressed video. 6. The compression system of claim 5, wherein the primary colors are Red, Yellow and Blue (RYB), or Red, Green and Blue (RGB), and maintaining the primary colors requires that the difference between corresponding pixels of the incoming and outgoing HD-UVs does not exceed a single shift on a 12 hue color wheel. 7. The compression system of claim 5, wherein the primary colors are Red, Yellow and Blue (RYB), or Red, Green and Blue (RGB), and in order to maintain the primary colors the compression does not cause artifacts that replace one primary color with another primary color. 8. The compression system of claim 1, wherein the outgoing HD-UV maintains a fixed delay relative to the incoming HD-UV before, during, and after the change from the first compressed video to the second compressed video. 9. The compression system of claim 1, further comprising a controller configured to issue the command to smoothly change on-the-fly the compression of the incoming HD-UV, wherein the controller is implemented as part of at least one of the following elements: the video transmitter, the video receiver, and a network controller. 10. The compression system of claim 1, further comprising a controller configured to issue the command to smoothly change on-the-fly the compression of the incoming HD-UV from the first compressed video to the second compressed video; wherein the command is issued in order to free up bandwidth for a new additional video stream. 11. The compression system of claim 1, further comprising a controller configured to issue the command to smoothly change on-the-fly the compression of the incoming HD-UV from the first compressed video to the second compressed video; wherein the command is issued in order to enable a visually lossless smooth change between the incoming HD-UV and a second incoming HD-UV. 12. A method for maintaining parameters related to uncompressed video (PRTUV) while changing video compression ratios on-the-fly, comprising:
receiving, by a video transmitter, incoming high-definition uncompressed video (HD-UV) characterized by the following PRTUV: uncompressed timing requirements, uncompressed number of video lines, and uncompressed number of video pixels per video line; compressing the incoming HD-UV into a first compressed video having a first compression ratio of between 1:1 and 5:1; sending the first compressed video over a communication link to a video receiver; receiving, by the video transmitter, a command to smoothly change on-the-fly the compression of the incoming HD-UV to a second compressed video having a second compression ratio of between 2:1 and 10:1; sending the second compressed video over the communication link to the video receiver, without interrupting continuous flow of the incoming HD-UV; wherein the difference between the ratios of the first and second compressed videos is at least 25%; and decompressing, by the video receiver, the first or second compressed videos to an outgoing HD-UV; wherein the outgoing HD-UV maintains the PRTUV before, during, and after the change from the first compressed video to the second compressed video. 13. The method of claim 12, further comprising sending the second compressed video to the video receiver during a duration shorter than the duration required to transmit 30 HD-UV frames, then smoothly changing on-the-fly the compression of the incoming HD-UV to use the first compression ratio, and sending the first compressed video to the video receiver without interrupting the continuous flow of the incoming HD-UV. 14. The method of claim 12, further comprising sending the second compressed video to the video receiver during a duration shorter than the duration required to transmit 3 HD-UV frames, then smoothly changing on-the-fly the compression of the incoming HD-UV to use the first compression ratio, and sending the first compressed video to the video receiver without interrupting the continuous flow of the incoming HD-UV. 15. The method of claim 12, wherein the first compressed video has compression ratio between 1:1 and 2:1, the second compressed video has compression ratio between 4:1 and 10:1, and further comprising a third compressed video having a third compression ratio between 2:1 and 4:1; and further comprising performing a smooth on-the-fly change between the first and third compressed videos while maintaining the PRTUV before, during, and after the smooth change. 16. The method of claim 12, wherein the outgoing HD-UV further maintains the primary colors of pixels of the incoming HD-UV before, during, and after the change from the first compressed video to the second compressed video. 17. The method of claim 16, wherein the primary colors are Red, Yellow and Blue (RYB), or Red, Green and Blue (RGB), and performing the change from the first compressed video to the second compressed video such that the difference between corresponding pixels of the incoming and outgoing HD-UVs does not exceed a single shift on a 12 hue color wheel. 18. The method of claim 12, further comprising maintaining a fixed delay between the outgoing HD-UV and the incoming HD-UV before, during, and after the change from the first compressed video to the second compressed video. 19. The method of claim 12, further comprising performing the smooth change on-the-fly in order to free up bandwidth for a new additional video stream. 20. The method of claim 12, further comprising performing the smooth change on-the-fly in order to enable a visually lossless switching between the incoming HD-UV and a second incoming HD-UV. | 2,400 |
7,781 | 7,781 | 13,803,605 | 2,485 | A subject area detection apparatus which is capable of improving the rate of detection for a subject area in an image and detecting the subject area with ease. A first subject area which is a specific area is detected from a subject image in an image having at least one subject image. An area including at least a part of the first subject area is detected as a second subject area from the subject image in the image. An estimated area is obtained by estimating, in the second subject area, an area corresponding to the first subject area. The first subject area and the estimated area are compared with each other to obtain a correlation determination result. A subject area detection result is output according to the correlation determination result. | 1. A subject area detection apparatus that, in an image having at least one subject image, detects a specific area in the subject image as a subject area detection result, comprising:
a first detection unit configured to detect a first subject area which is the specific area from the subject image in the image; a second detection unit configured to detect an area including at least a part of the first subject area as a second subject area from the subject image in the image; an area estimation unit configured to obtain an estimated area by estimating, in the second subject area, an area corresponding to the first subject area; a determination unit configured to compare the first subject area and the estimated area with each other to obtain a correlation determination result; and a selection unit configured to output the subject area detection result according to the correlation determination result. 2. A subject area detection apparatus according to claim 1, wherein when the correlation determination result shows that the first subject area and the estimated area are areas related to the same subject image, said selection unit outputs the first subject area as the subject area detection result. 3. A subject area detection apparatus according to claim 1, wherein when only one of the first subject area and the second subject area is obtained, said selection unit outputs the one as the subject area detection result irrespective of the correlation determination result. 4. A subject area detection apparatus according to claim 1, wherein in detecting the first subject area and the second subject area, said first detection unit and said second detection unit obtain degrees of reliability indicative of certainties of the detection; and
when both the first subject area and the second subject area are obtained, said selection unit outputs one of the first subject area and the estimated area as the subject area detection result based on the degrees of reliabilities when the correlation determination result shows that the first subject area and the estimated area are areas related to the same subject image. 5. A subject area e detection apparatus according to claim 1, wherein said determination unit obtains the correlation determination result based on shapes of the first subject area and the estimated area and positions of the first subject area and the estimated area in the image. 6. A subject area detection apparatus according to claim 1, wherein for the first subject area and the estimated area, said determination unit obtains a degree of similarity between the first subject area and the estimated area based on positions and sizes of subject areas in the image, and obtains the correlation determination result according to the degree of similarity and a predetermined threshold value. 7. A subject area detection apparatus according to claim 6, wherein when the degree of similarity is equal to or greater than the threshold value, said determination result outputs the correlation determination result showing that the first subject area and the estimated area are areas related to the same subject image. 8. A subject area detection apparatus according to claim 1, wherein:
said first detection unit detects a face area as the first subject area when the subject image is a human image; and said second detection unit detects a human body area in the human image as the second subject area. 9. A subject area detection apparatus according to claim 8, wherein:
in detecting the face area, said first detection unit obtains head pose information on a pose of the face area relative to front, the subject area detection apparatus further comprises a correction unit configured to correct the face area based on the head pose information, and said determination unit obtains the correlation determination result using the face area corrected by said correction unit. 10. A subject area detection apparatus according to claim 1, wherein said determination unit obtains the correlation determination result by determining whether the first subject area and the estimated area are areas related to the same subject image. 11. A subject area detection apparatus according to claim 1, wherein said selection unit outputs one of the first subject area and the estimated area as the subject area detection result. 12. An image pickup apparatus comprising:
an image pickup unit configured to obtain an image having a subject image by taking an image of a subject; a subject area detection apparatus according to claim 1; and a control unit configured to, according to the subject area detection result detected by said subject area detection apparatus, control image pickup conditions for use when said image pickup unit takes an image. 13. A display apparatus comprising:
a display unit configured to display an image having a subject image; a subject area detection apparatus according to claim 1; and a control unit configured to, according to the subject area detection result detected by said subject area detection apparatus, display conditions for use when said display unit displays the image. 14. A control method for a subject are detection apparatus that, in an image having at least one subject image, detects a specific area of the subject image as a subject area detection result, comprising:
a first detection step of detecting a first subject area which is the specific area from the subject image in the image; a second detection step of detecting an area including at least a part of the first subject area as a second subject area from the subject image in the image; an area estimation step of obtaining an estimated area by estimating, in the second subject area, an area corresponding to the first subject area; a determination step of comparing the first subject area and the estimated area with each other to obtain a correlation determination result; and a selection step of outputting a subject area detection result according to the correlation determination result. 15. A control method according to claim 14, wherein in said determination step, the correlation determination result is obtained by determining whether the first subject area and the estimated area are areas related to the same subject image. 16. A control method according to claim 14, wherein in said selection step, one of the first subject area and the estimated area is output as the subject area detection result. 17. A non-transitory computer-readable storage medium storing a control program used by a subject area detection apparatus that, in an image having at least one subject image, detects a specific area of the subject image as a subject area detection result, the control method comprising:
a first detection step of detecting a first subject area which is the specific area from the subject image in the image; a second detection step of detecting an area including at least a part of the first subject area as a second subject area from the subject image in the image; an area estimation step of obtaining an estimated area by estimating, in the second subject area, an area corresponding to the first subject area; a determination step of comparing the first subject area and the estimated area with each other to obtain a correlation determination result; and a selection step of outputting a subject area detection result according to the correlation determination result. 18. A storage medium according to claim 17, wherein in the determination step, the correlation determination result is obtained by determining whether the first subject area and the estimated area are areas related to the same subject image. 19. A storage medium according to claim 17, wherein in said selection unit, one of the first subject area and the estimated area is output as the subject area detection result. | A subject area detection apparatus which is capable of improving the rate of detection for a subject area in an image and detecting the subject area with ease. A first subject area which is a specific area is detected from a subject image in an image having at least one subject image. An area including at least a part of the first subject area is detected as a second subject area from the subject image in the image. An estimated area is obtained by estimating, in the second subject area, an area corresponding to the first subject area. The first subject area and the estimated area are compared with each other to obtain a correlation determination result. A subject area detection result is output according to the correlation determination result.1. A subject area detection apparatus that, in an image having at least one subject image, detects a specific area in the subject image as a subject area detection result, comprising:
a first detection unit configured to detect a first subject area which is the specific area from the subject image in the image; a second detection unit configured to detect an area including at least a part of the first subject area as a second subject area from the subject image in the image; an area estimation unit configured to obtain an estimated area by estimating, in the second subject area, an area corresponding to the first subject area; a determination unit configured to compare the first subject area and the estimated area with each other to obtain a correlation determination result; and a selection unit configured to output the subject area detection result according to the correlation determination result. 2. A subject area detection apparatus according to claim 1, wherein when the correlation determination result shows that the first subject area and the estimated area are areas related to the same subject image, said selection unit outputs the first subject area as the subject area detection result. 3. A subject area detection apparatus according to claim 1, wherein when only one of the first subject area and the second subject area is obtained, said selection unit outputs the one as the subject area detection result irrespective of the correlation determination result. 4. A subject area detection apparatus according to claim 1, wherein in detecting the first subject area and the second subject area, said first detection unit and said second detection unit obtain degrees of reliability indicative of certainties of the detection; and
when both the first subject area and the second subject area are obtained, said selection unit outputs one of the first subject area and the estimated area as the subject area detection result based on the degrees of reliabilities when the correlation determination result shows that the first subject area and the estimated area are areas related to the same subject image. 5. A subject area e detection apparatus according to claim 1, wherein said determination unit obtains the correlation determination result based on shapes of the first subject area and the estimated area and positions of the first subject area and the estimated area in the image. 6. A subject area detection apparatus according to claim 1, wherein for the first subject area and the estimated area, said determination unit obtains a degree of similarity between the first subject area and the estimated area based on positions and sizes of subject areas in the image, and obtains the correlation determination result according to the degree of similarity and a predetermined threshold value. 7. A subject area detection apparatus according to claim 6, wherein when the degree of similarity is equal to or greater than the threshold value, said determination result outputs the correlation determination result showing that the first subject area and the estimated area are areas related to the same subject image. 8. A subject area detection apparatus according to claim 1, wherein:
said first detection unit detects a face area as the first subject area when the subject image is a human image; and said second detection unit detects a human body area in the human image as the second subject area. 9. A subject area detection apparatus according to claim 8, wherein:
in detecting the face area, said first detection unit obtains head pose information on a pose of the face area relative to front, the subject area detection apparatus further comprises a correction unit configured to correct the face area based on the head pose information, and said determination unit obtains the correlation determination result using the face area corrected by said correction unit. 10. A subject area detection apparatus according to claim 1, wherein said determination unit obtains the correlation determination result by determining whether the first subject area and the estimated area are areas related to the same subject image. 11. A subject area detection apparatus according to claim 1, wherein said selection unit outputs one of the first subject area and the estimated area as the subject area detection result. 12. An image pickup apparatus comprising:
an image pickup unit configured to obtain an image having a subject image by taking an image of a subject; a subject area detection apparatus according to claim 1; and a control unit configured to, according to the subject area detection result detected by said subject area detection apparatus, control image pickup conditions for use when said image pickup unit takes an image. 13. A display apparatus comprising:
a display unit configured to display an image having a subject image; a subject area detection apparatus according to claim 1; and a control unit configured to, according to the subject area detection result detected by said subject area detection apparatus, display conditions for use when said display unit displays the image. 14. A control method for a subject are detection apparatus that, in an image having at least one subject image, detects a specific area of the subject image as a subject area detection result, comprising:
a first detection step of detecting a first subject area which is the specific area from the subject image in the image; a second detection step of detecting an area including at least a part of the first subject area as a second subject area from the subject image in the image; an area estimation step of obtaining an estimated area by estimating, in the second subject area, an area corresponding to the first subject area; a determination step of comparing the first subject area and the estimated area with each other to obtain a correlation determination result; and a selection step of outputting a subject area detection result according to the correlation determination result. 15. A control method according to claim 14, wherein in said determination step, the correlation determination result is obtained by determining whether the first subject area and the estimated area are areas related to the same subject image. 16. A control method according to claim 14, wherein in said selection step, one of the first subject area and the estimated area is output as the subject area detection result. 17. A non-transitory computer-readable storage medium storing a control program used by a subject area detection apparatus that, in an image having at least one subject image, detects a specific area of the subject image as a subject area detection result, the control method comprising:
a first detection step of detecting a first subject area which is the specific area from the subject image in the image; a second detection step of detecting an area including at least a part of the first subject area as a second subject area from the subject image in the image; an area estimation step of obtaining an estimated area by estimating, in the second subject area, an area corresponding to the first subject area; a determination step of comparing the first subject area and the estimated area with each other to obtain a correlation determination result; and a selection step of outputting a subject area detection result according to the correlation determination result. 18. A storage medium according to claim 17, wherein in the determination step, the correlation determination result is obtained by determining whether the first subject area and the estimated area are areas related to the same subject image. 19. A storage medium according to claim 17, wherein in said selection unit, one of the first subject area and the estimated area is output as the subject area detection result. | 2,400 |
7,782 | 7,782 | 15,102,555 | 2,426 | A method and system for synchronizing two or more media streams, generated by different sources ( 210, 220 ). An identifier generator 200 generates identifiers 600 with unique sequence numbers and a unique media identifier in relation to a second media stream generated by second media server 220 . The generated identifiers are supplied to an encoder 230 and an identifier storage 205 . In the identifier storage 205 a broadcaster stores an associated URL (first media server address & content) with a particular identifier. The identifiers and the second media stream 620 A are encoded by the encoder 230 into a carrier ( 620 M) which is recorded or broadcasted. Play-out of the recorded or broadcasted is accomplished by feeding the encoded carrier to a decoder 300 , which decodes the identifiers and the second media stream 620 B. The decoded identifier is received by a first device 310 that retrieves 560 the stored associated URL for the particular identifier and subsequently request 570 first media server 210 for the first media stream indicated by the associated URL. The first media stream 610 is provided 580 to the first device 310 , which is also provided 552 with the decoded second media stream 620 B. | 1-23. (canceled) 24. A method for synchronized provision of at least two different media streams comprising a first media stream and a second media stream, to a first device, the method comprising:
generating an identifier; storing the identifier with a corresponding action indicator; encoding a carrier with the identifier and the second media stream; decoding the identifier and the second media stream from the received carrier; submitting the decoded identifier to the first device and providing the decoded second media stream to the first device; retrieving the stored action indicator corresponding to the decoded identifier by the first device; requesting for the first media stream, the first media stream represented by the retrieved stored action indicator by the first device, and providing the requested first media stream to the first device, such that the provisions of the first media stream and the second media stream to the first device are synchronized to each other. 25. The method of claim 24, where at the providing of the decoded second media stream, the decoded second media stream is additionally or alternatively provided to a second device. 26. A method for synchronized provision of at least two different media streams to a first device, the method comprising:
generating an identifier, the identifier comprising a media indicator indicating a second media stream and a sequence number; storing the identifier with a corresponding action indicator indicating a first media stream in an identifier storage, and encoding a carrier with the identifier and the second media stream. 27. The method of claim 26, wherein the storing of the identifier of the corresponding action indicator is performed in a database having records where each record has the sequence number associated with zero or more corresponding action indicators. 28. The method of claim 26 wherein the encoding comprises the encoding of the carrier with additional identifiers on equidistant time points from each other. 29. The method of claim 26 wherein the action indicator is indicating the first media stream being a Universal Resource Locator (URL). 30. The method of claim 26 wherein the identifier storage comprises stored records for the identifier, the stored record comprising a type field, which is any of an address or a command type, to be executed by a first device. 31. A method in a first device for synchronized reception of at least two different media streams, wherein the first device receives a decoded second media stream, decoded from a carrier, the method comprising:
receiving a decoded identifier decoded from the carrier, by the first device; retrieving a stored action indicator corresponding to the decoded identifier, by the first device; requesting for a first media stream, the first media stream represented by the retrieved stored action indicator by the first device, and receiving the requested first media stream by the first device, such that the receptions of the first media stream and the second media stream to the first device are synchronized to each other. 32. The method of claim 31, where the retrieving further comprises retrieval of a stored type of action corresponding to the stored action indicator, the subsequent execution of the action indicator depending on interpretation of the retrieved type of action by the first device. 33. The method according to claim 32 where the type of action is any of the execution of:
an address change for the identifier storage different from the address in use by the first device;
a setting to be downloaded and executed in the first device, for setting a particular mode of the first device;
a cache action for retrieving a download to local storage of the first media stream;
a present action for presenting the cached first media stream; and
a control action to be performed by the first device, controlling the decoder, the second device, or a further device. 34. The method of claim 31, where the first device instructs the decoder to provide the decoded second media stream, additionally or alternatively to a second device. 35. A system for synchronized provision of at least two different media streams to a first device, the system comprising:
an identifier generator configured to generate an identifier; a storage configured to store the generated identifier with a corresponding action indicator; a first media server configured to provide a first media stream; a second media server configured to provide a second media stream; an encoder configured to encode a carrier with the generated identifier and the second media stream; a decoder configured to:
decode the carrier into the identifier and the second media stream;
submit the decoded identifier; and
provide the decoded second media stream;
a first device configured to:
receive the decoded identifier;
retrieve a stored action indicator corresponding to the decoded identifier;
request for a first media stream represented by the retrieved action indicator; and
receive the requested first media stream. 36. The system of claim 35, further comprising a second device the second device configured to receive the decoded second media stream, and wherein the decoder is configured to provide the second media stream additionally or alternatively to the second device. 37. An Identifier generator for synchronized provision of at least two different media streams to a first device, the Identifier generator comprising:
an interface configured to communicatively connect to other entities; a media identity storage configured to store an indicator indicating a media stream a sequence number generator configured to generate sequence numbers; a processor; and a memory, the memory containing instructions executable by the processor whereby the Identifier generator is configured to control the media identity storage, the sequence number generator and the interface, in that the stored second media indicator and the generated sequence number are compiled into an identifier which is transmitted via the interface. 38. The Identifier generator according to claim 37, where the Identifier generator further comprises a timer configured to time the generation of sequence numbers on equidistant time points. 39. A media device for synchronized provision of at least two different media streams to a first device, comprising:
an interface configured to communicatively connect to other entities; a decoder configured to decode an identifier and a second media stream from a received carrier; a processor; and a memory, the memory containing instructions executable by the processor whereby the media device is configured to control the decoder, and the interface, in that the identifier and the second media stream are transmitted via the interface, and in that a first media stream is received and transmitted via the interface. 40. The media device according to claim 39, further comprising a first media stream storage configured to cache the first media stream, under control of the processor. 41. The media device according to claim 39, wherein the memory contains instructions executable by the processor whereby the media device is further configured to provide commands, by proxy requested by the first device, to control the second device. 42. A first device for synchronized provision of at least two different media streams to the first device, the first device comprising:
an interface configured to communicatively connect to other entities; an identifier handler configured to receive an identifier and to apply the identifier to retrieve a corresponding action indicator; an indicator interpreter configured to interpret the retrieved action indicator; a processor; and a memory, the memory containing instructions executable by the processor whereby the media device is configured to control the identifier handler, the action indicator retriever, and the interface, in that the action indicator is received in response to the transmission of the identifier via the interface. 43. The first device according to claim 42, wherein the action indicator interpreter is further configured to interpret a request for retrieving a first media stream, and in response to the interpretation request the first media stream. 44. The first device according to claim 43, wherein the action indicator interpreter is further configured to interpret a command to present the cached first media stream on a screen of the first media device. | A method and system for synchronizing two or more media streams, generated by different sources ( 210, 220 ). An identifier generator 200 generates identifiers 600 with unique sequence numbers and a unique media identifier in relation to a second media stream generated by second media server 220 . The generated identifiers are supplied to an encoder 230 and an identifier storage 205 . In the identifier storage 205 a broadcaster stores an associated URL (first media server address & content) with a particular identifier. The identifiers and the second media stream 620 A are encoded by the encoder 230 into a carrier ( 620 M) which is recorded or broadcasted. Play-out of the recorded or broadcasted is accomplished by feeding the encoded carrier to a decoder 300 , which decodes the identifiers and the second media stream 620 B. The decoded identifier is received by a first device 310 that retrieves 560 the stored associated URL for the particular identifier and subsequently request 570 first media server 210 for the first media stream indicated by the associated URL. The first media stream 610 is provided 580 to the first device 310 , which is also provided 552 with the decoded second media stream 620 B.1-23. (canceled) 24. A method for synchronized provision of at least two different media streams comprising a first media stream and a second media stream, to a first device, the method comprising:
generating an identifier; storing the identifier with a corresponding action indicator; encoding a carrier with the identifier and the second media stream; decoding the identifier and the second media stream from the received carrier; submitting the decoded identifier to the first device and providing the decoded second media stream to the first device; retrieving the stored action indicator corresponding to the decoded identifier by the first device; requesting for the first media stream, the first media stream represented by the retrieved stored action indicator by the first device, and providing the requested first media stream to the first device, such that the provisions of the first media stream and the second media stream to the first device are synchronized to each other. 25. The method of claim 24, where at the providing of the decoded second media stream, the decoded second media stream is additionally or alternatively provided to a second device. 26. A method for synchronized provision of at least two different media streams to a first device, the method comprising:
generating an identifier, the identifier comprising a media indicator indicating a second media stream and a sequence number; storing the identifier with a corresponding action indicator indicating a first media stream in an identifier storage, and encoding a carrier with the identifier and the second media stream. 27. The method of claim 26, wherein the storing of the identifier of the corresponding action indicator is performed in a database having records where each record has the sequence number associated with zero or more corresponding action indicators. 28. The method of claim 26 wherein the encoding comprises the encoding of the carrier with additional identifiers on equidistant time points from each other. 29. The method of claim 26 wherein the action indicator is indicating the first media stream being a Universal Resource Locator (URL). 30. The method of claim 26 wherein the identifier storage comprises stored records for the identifier, the stored record comprising a type field, which is any of an address or a command type, to be executed by a first device. 31. A method in a first device for synchronized reception of at least two different media streams, wherein the first device receives a decoded second media stream, decoded from a carrier, the method comprising:
receiving a decoded identifier decoded from the carrier, by the first device; retrieving a stored action indicator corresponding to the decoded identifier, by the first device; requesting for a first media stream, the first media stream represented by the retrieved stored action indicator by the first device, and receiving the requested first media stream by the first device, such that the receptions of the first media stream and the second media stream to the first device are synchronized to each other. 32. The method of claim 31, where the retrieving further comprises retrieval of a stored type of action corresponding to the stored action indicator, the subsequent execution of the action indicator depending on interpretation of the retrieved type of action by the first device. 33. The method according to claim 32 where the type of action is any of the execution of:
an address change for the identifier storage different from the address in use by the first device;
a setting to be downloaded and executed in the first device, for setting a particular mode of the first device;
a cache action for retrieving a download to local storage of the first media stream;
a present action for presenting the cached first media stream; and
a control action to be performed by the first device, controlling the decoder, the second device, or a further device. 34. The method of claim 31, where the first device instructs the decoder to provide the decoded second media stream, additionally or alternatively to a second device. 35. A system for synchronized provision of at least two different media streams to a first device, the system comprising:
an identifier generator configured to generate an identifier; a storage configured to store the generated identifier with a corresponding action indicator; a first media server configured to provide a first media stream; a second media server configured to provide a second media stream; an encoder configured to encode a carrier with the generated identifier and the second media stream; a decoder configured to:
decode the carrier into the identifier and the second media stream;
submit the decoded identifier; and
provide the decoded second media stream;
a first device configured to:
receive the decoded identifier;
retrieve a stored action indicator corresponding to the decoded identifier;
request for a first media stream represented by the retrieved action indicator; and
receive the requested first media stream. 36. The system of claim 35, further comprising a second device the second device configured to receive the decoded second media stream, and wherein the decoder is configured to provide the second media stream additionally or alternatively to the second device. 37. An Identifier generator for synchronized provision of at least two different media streams to a first device, the Identifier generator comprising:
an interface configured to communicatively connect to other entities; a media identity storage configured to store an indicator indicating a media stream a sequence number generator configured to generate sequence numbers; a processor; and a memory, the memory containing instructions executable by the processor whereby the Identifier generator is configured to control the media identity storage, the sequence number generator and the interface, in that the stored second media indicator and the generated sequence number are compiled into an identifier which is transmitted via the interface. 38. The Identifier generator according to claim 37, where the Identifier generator further comprises a timer configured to time the generation of sequence numbers on equidistant time points. 39. A media device for synchronized provision of at least two different media streams to a first device, comprising:
an interface configured to communicatively connect to other entities; a decoder configured to decode an identifier and a second media stream from a received carrier; a processor; and a memory, the memory containing instructions executable by the processor whereby the media device is configured to control the decoder, and the interface, in that the identifier and the second media stream are transmitted via the interface, and in that a first media stream is received and transmitted via the interface. 40. The media device according to claim 39, further comprising a first media stream storage configured to cache the first media stream, under control of the processor. 41. The media device according to claim 39, wherein the memory contains instructions executable by the processor whereby the media device is further configured to provide commands, by proxy requested by the first device, to control the second device. 42. A first device for synchronized provision of at least two different media streams to the first device, the first device comprising:
an interface configured to communicatively connect to other entities; an identifier handler configured to receive an identifier and to apply the identifier to retrieve a corresponding action indicator; an indicator interpreter configured to interpret the retrieved action indicator; a processor; and a memory, the memory containing instructions executable by the processor whereby the media device is configured to control the identifier handler, the action indicator retriever, and the interface, in that the action indicator is received in response to the transmission of the identifier via the interface. 43. The first device according to claim 42, wherein the action indicator interpreter is further configured to interpret a request for retrieving a first media stream, and in response to the interpretation request the first media stream. 44. The first device according to claim 43, wherein the action indicator interpreter is further configured to interpret a command to present the cached first media stream on a screen of the first media device. | 2,400 |
7,783 | 7,783 | 15,005,806 | 2,444 | The current document is directed to an integrated application-aware load-balancing component of a distributed computer system. The integrated application-aware load-balancing component is, in a described embodiment, incorporated within a distributed application that serves as a control component of multiple physical computers within a distributed computer system. The integrated application-aware load-balancing component includes a layer-4 load-balancing subcomponent that distributes communications connections initiated by remote client computers among computational nodes within the distributed computer system in order to balance the computational load applied to the distributed application and distributed computer system by the remote client computers. The integrated application-aware load-balancing component additionally includes a layer-7 load-balancing subcomponent that redistributes client requests among cluster nodes within the distributed computer system in order to enhance balancing of the computational load applied to the distributed application and distributed computer system by the remote client computers. Operation of the layer-4 and layer-7 load balancers are controlled and/or adjusted by rules and policies informed by performance and operational characteristics of the distributed application and distributed computer system. | 1. An integrated, application-aware load-balancing component of a distributed computer system controlled by a distributed application, the integrated, application-aware load-balancing component comprising:
the distributed computer system having multiple computational nodes, each controlled by a local instance of the distributed application that includes a local instance of the integrated, application-aware load-balancing component; a layer-4 load-balancing subcomponent that distributes communications connections initiated by remote processor-controlled client devices to the distributed application among the multiple computational nodes in order to balance the computational load applied to the distributed computer system by the remote processor-controlled client devices; and a layer-7 load-balancing subcomponent that redistributes messages transmitted to the distributed computer system by the remote processor-controlled client devices, directed to the distributed application, and received by one or more of the multiple computational nodes among one or more of the multiple computational nodes in order to balance the computational load applied to the distributed computer system by the remote processor-controlled client devices. 2. The integrated, application-aware load-balancing component of claim 1 wherein the distributed computer system further includes a set of virtual IP addresses allocated to the distributed application, a connection table, layer-4 load-balancing policies, layer-7 load-balancing policies, representations of the layout and configuration of the distributed application within the distributed computer system, performance-metric values and representations of operational characteristics of the distributed application. 3. The integrated, application-aware load-balancing component of claim 2 wherein the set of virtual IP addresses allocated to the distributed application, a connection table, layer-4 load-balancing policies, layer-7 load-balancing policies, representations of the layout and configuration of the distributed application within the distributed computer system, performance-metric values and representations of operational characteristics of the distributed application are stored in one or more memories and/or mass-storage devices within the distributed computer system and accessed by the local instances of the distributed application that control the multiple computational nodes. 4. The integrated, application-aware load-balancing component of claim 3 wherein local copies of the set of virtual IP addresses allocated to the distributed application, a connection table, layer-4 load-balancing policies, layer-7 load-balancing policies, representations of the layout and configuration of the distributed application within the distributed computer system, performance-metric values and representations of operational characteristics of the distributed application are stored by the multiple computational nodes. 5. The integrated, application-aware load-balancing component of claim 2 wherein the integrated, application-aware load-balancing component partitions the multiple computational nodes into one or more computational partitions, selects one or more of the computational nodes in each computational partition as layer-4-load-balancing leaders for the partition, and assigns one or more virtual IP addresses from the set of virtual IP addresses to each layer-4-load-balancing leader. 6. The integrated, application-aware load-balancing component of claim 5 wherein the integrated, application-aware load-balancing component modifies one or more of the assignment of computational nodes to partitions, the selections of computational nodes as layer-4-load-balancing leaders, and the assignment of virtual IP addresses to layer-4-load-balancing leaders during operation of the distributed application in order to recover from computational-node failures, adjust the computational load applied to the computational nodes by the remote processor-controlled client devices, minimize time intervals over which a particular computational node is selected as a layer-4-load-balancing leader, anticipate computational-node failures and operational deterioration, readjust connection and message distribution as a result of changes to distributed-computer-system configuration, as a result of changes to load-balancing policies, and/or to adjust connection and message distribution as a result of internal-monitoring or client feedback. 7. The integrated, application-aware load-balancing component of claim 5 wherein, when a new connection request is received by a layer-4-load-balancing leader, the layer-4-load-balancing leader accesses the layer-4 load-balancing policies, representations of the layout and configuration of the distributed application within the distributed computer system, and performance-metric values and representations of operational characteristics of the distributed application and uses information obtained by accessing the layer-4 load-balancing policies, representations of the layout and configuration of the distributed application within the distributed computer system, and performance-metric values and representations of operational characteristics of the distributed application to select a computational node to which to forward the connection request so that the computational load applied to the distributed computer system by the remote processor-controlled client devices is balanced among the multiple computational nodes. 8. The integrated, application-aware load-balancing component of claim 7 wherein, after selecting the computational node to which to forward the connection request, the layer-4-load-balancing leader generates an internal connection-request message that the layer-4-load-balancing leader forwards to the selected computational node through one or more local networks and updates the connection table to reflect establishment of a connection between the selected computational node and a remote client device that transmitted the connection request to the layer-4-load-balancing leader. 9. The integrated, application-aware load-balancing component of claim 8 wherein the selected computational node returns a connection-request response message to the remote client device that transmitted the connection request to the layer-4-load-balancing leader. 10. The integrated, application-aware load-balancing component of claim 5 wherein, when a message is received by a layer-4-load-balancing leader from a remote client device within the context of an existing communication connection, the layer-4-load-balancing leader accesses the connection table to determine that the message is within the context of the existing communication connection, uses information in the connection table to identify the computational node to which the existing communication connection is established, and generates an internal message that includes the received message and that the layer-4-load-balancing leader forwards to the identified computational node. 11. The integrated, application-aware load-balancing component of claim 10 wherein, after receiving the generated internal message, the identified computational node returns a response message to the remote client device. 12. The integrated, application-aware load-balancing component of claim 5 wherein the layer-7 load-balancing subcomponent of each computational node, upon receiving a generated internal message that includes a request message that requests performance of a service by the distributed application on behalf of a remote client device, accesses the layer-7 load-balancing policies, representations of the layout and configuration of the distributed application within the distributed computer system, and performance-metric values and representations of operational characteristics of the distributed application and uses information obtained by accessing the layer-7 load-balancing policies, representations of the layout and configuration of the distributed application within the distributed computer system, and performance-metric values and representations of operational characteristics of the distributed application to select a computational node to which to forward the request message for processing. 13. The integrated, application-aware load-balancing component of claim 12 wherein, after selecting the computational node to which to forward the request message for processing, the layer-7 load-balancing subcomponent determines, based on the type of request message, whether to forward the request message for processing synchronously or asynchronously to the selected computational node. 14. The integrated, application-aware load-balancing component of claim 12 wherein, when the layer-7 load-balancing subcomponent determines to synchronously forward the request message for processing, the layer-7 load-balancing subcomponent queues the request message for immediate transmission through one or more local area networks to the selected computational node. 15. The integrated, application-aware load-balancing component of claim 12 wherein, when the layer-7 load-balancing subcomponent determines to asynchronously forward the request message for processing, the layer-7 load-balancing subcomponent queues the request message to an output queue associated with the selected computational node. 16. The integrated, application-aware load-balancing component of claim 12 wherein the layer-7 load-balancing subcomponent dequeues multiple queued messages from the output queue and forwards them as a single batch of messages to the selected computational node. 17. A method for balancing a computational load applied by remote processor-controlled client devices to computational nodes within a distributed computer system controlled by a distributed application, the method comprising:
including an integrated, application-aware load-balancing component in the distributed application, the integrated, application-aware load-balancing component comprising
a layer-4 load-balancing subcomponent that distributes communications connections from remote processor-controlled client devices to the distributed application among the multiple computational nodes in order to balance the computational load applied to the distributed computer system by the remote processor-controlled client devices, and
a layer-7 load-balancing subcomponent that redistributes messages transmitted to the distributed computer system by the remote processor-controlled client devices, directed to the distributed application, and received by one or more of the multiple computational nodes among one or more of the multiple computational nodes in order to balance the computational load applied to the distributed computer system by the remote processor-controlled client devices. 18. The method of claim 18 further including:
storing, within the distributed computer system, a set of virtual IP addresses allocated to the distributed application, a connection table, layer-4 load-balancing policies, layer-7 load-balancing policies, representations of the layout and configuration of the distributed application within the distributed computer system, performance-metric values and representations of operational characteristics of the distributed application. 19. A physical data-storage device that stores computer instructions that, when executed by one or more processors of multiple computational nodes within a distributed computer system, generate, on each computational node, a load-balancing component of a distributed application comprising:
a layer-4 load-balancing subcomponent that distributes communications connections from remote processor-controlled client devices to the distributed application among the multiple computational nodes in order to balance the computational load applied to the distributed computer system by the remote processor-controlled client devices, and a layer-7 load-balancing subcomponent that redistributes messages transmitted to the distributed computer system by the remote processor-controlled client devices, directed to the distributed application, and received by one or more of the multiple computational nodes among one or more of the multiple computational nodes in order to balance the computational load applied to the distributed computer system by the remote processor-controlled client devices. 20. The physical data-storage device of claim 19 wherein computer instructions, when executed by one or more processors of multiple computational nodes within a distributed computer system, store, within the distributed computer system, a set of virtual IP addresses allocated to the distributed application, a connection table, layer-4 load-balancing policies, layer-7 load-balancing policies, representations of the layout and configuration of the distributed application within the distributed computer system, performance-metric values and representations of operational characteristics of the distributed application | The current document is directed to an integrated application-aware load-balancing component of a distributed computer system. The integrated application-aware load-balancing component is, in a described embodiment, incorporated within a distributed application that serves as a control component of multiple physical computers within a distributed computer system. The integrated application-aware load-balancing component includes a layer-4 load-balancing subcomponent that distributes communications connections initiated by remote client computers among computational nodes within the distributed computer system in order to balance the computational load applied to the distributed application and distributed computer system by the remote client computers. The integrated application-aware load-balancing component additionally includes a layer-7 load-balancing subcomponent that redistributes client requests among cluster nodes within the distributed computer system in order to enhance balancing of the computational load applied to the distributed application and distributed computer system by the remote client computers. Operation of the layer-4 and layer-7 load balancers are controlled and/or adjusted by rules and policies informed by performance and operational characteristics of the distributed application and distributed computer system.1. An integrated, application-aware load-balancing component of a distributed computer system controlled by a distributed application, the integrated, application-aware load-balancing component comprising:
the distributed computer system having multiple computational nodes, each controlled by a local instance of the distributed application that includes a local instance of the integrated, application-aware load-balancing component; a layer-4 load-balancing subcomponent that distributes communications connections initiated by remote processor-controlled client devices to the distributed application among the multiple computational nodes in order to balance the computational load applied to the distributed computer system by the remote processor-controlled client devices; and a layer-7 load-balancing subcomponent that redistributes messages transmitted to the distributed computer system by the remote processor-controlled client devices, directed to the distributed application, and received by one or more of the multiple computational nodes among one or more of the multiple computational nodes in order to balance the computational load applied to the distributed computer system by the remote processor-controlled client devices. 2. The integrated, application-aware load-balancing component of claim 1 wherein the distributed computer system further includes a set of virtual IP addresses allocated to the distributed application, a connection table, layer-4 load-balancing policies, layer-7 load-balancing policies, representations of the layout and configuration of the distributed application within the distributed computer system, performance-metric values and representations of operational characteristics of the distributed application. 3. The integrated, application-aware load-balancing component of claim 2 wherein the set of virtual IP addresses allocated to the distributed application, a connection table, layer-4 load-balancing policies, layer-7 load-balancing policies, representations of the layout and configuration of the distributed application within the distributed computer system, performance-metric values and representations of operational characteristics of the distributed application are stored in one or more memories and/or mass-storage devices within the distributed computer system and accessed by the local instances of the distributed application that control the multiple computational nodes. 4. The integrated, application-aware load-balancing component of claim 3 wherein local copies of the set of virtual IP addresses allocated to the distributed application, a connection table, layer-4 load-balancing policies, layer-7 load-balancing policies, representations of the layout and configuration of the distributed application within the distributed computer system, performance-metric values and representations of operational characteristics of the distributed application are stored by the multiple computational nodes. 5. The integrated, application-aware load-balancing component of claim 2 wherein the integrated, application-aware load-balancing component partitions the multiple computational nodes into one or more computational partitions, selects one or more of the computational nodes in each computational partition as layer-4-load-balancing leaders for the partition, and assigns one or more virtual IP addresses from the set of virtual IP addresses to each layer-4-load-balancing leader. 6. The integrated, application-aware load-balancing component of claim 5 wherein the integrated, application-aware load-balancing component modifies one or more of the assignment of computational nodes to partitions, the selections of computational nodes as layer-4-load-balancing leaders, and the assignment of virtual IP addresses to layer-4-load-balancing leaders during operation of the distributed application in order to recover from computational-node failures, adjust the computational load applied to the computational nodes by the remote processor-controlled client devices, minimize time intervals over which a particular computational node is selected as a layer-4-load-balancing leader, anticipate computational-node failures and operational deterioration, readjust connection and message distribution as a result of changes to distributed-computer-system configuration, as a result of changes to load-balancing policies, and/or to adjust connection and message distribution as a result of internal-monitoring or client feedback. 7. The integrated, application-aware load-balancing component of claim 5 wherein, when a new connection request is received by a layer-4-load-balancing leader, the layer-4-load-balancing leader accesses the layer-4 load-balancing policies, representations of the layout and configuration of the distributed application within the distributed computer system, and performance-metric values and representations of operational characteristics of the distributed application and uses information obtained by accessing the layer-4 load-balancing policies, representations of the layout and configuration of the distributed application within the distributed computer system, and performance-metric values and representations of operational characteristics of the distributed application to select a computational node to which to forward the connection request so that the computational load applied to the distributed computer system by the remote processor-controlled client devices is balanced among the multiple computational nodes. 8. The integrated, application-aware load-balancing component of claim 7 wherein, after selecting the computational node to which to forward the connection request, the layer-4-load-balancing leader generates an internal connection-request message that the layer-4-load-balancing leader forwards to the selected computational node through one or more local networks and updates the connection table to reflect establishment of a connection between the selected computational node and a remote client device that transmitted the connection request to the layer-4-load-balancing leader. 9. The integrated, application-aware load-balancing component of claim 8 wherein the selected computational node returns a connection-request response message to the remote client device that transmitted the connection request to the layer-4-load-balancing leader. 10. The integrated, application-aware load-balancing component of claim 5 wherein, when a message is received by a layer-4-load-balancing leader from a remote client device within the context of an existing communication connection, the layer-4-load-balancing leader accesses the connection table to determine that the message is within the context of the existing communication connection, uses information in the connection table to identify the computational node to which the existing communication connection is established, and generates an internal message that includes the received message and that the layer-4-load-balancing leader forwards to the identified computational node. 11. The integrated, application-aware load-balancing component of claim 10 wherein, after receiving the generated internal message, the identified computational node returns a response message to the remote client device. 12. The integrated, application-aware load-balancing component of claim 5 wherein the layer-7 load-balancing subcomponent of each computational node, upon receiving a generated internal message that includes a request message that requests performance of a service by the distributed application on behalf of a remote client device, accesses the layer-7 load-balancing policies, representations of the layout and configuration of the distributed application within the distributed computer system, and performance-metric values and representations of operational characteristics of the distributed application and uses information obtained by accessing the layer-7 load-balancing policies, representations of the layout and configuration of the distributed application within the distributed computer system, and performance-metric values and representations of operational characteristics of the distributed application to select a computational node to which to forward the request message for processing. 13. The integrated, application-aware load-balancing component of claim 12 wherein, after selecting the computational node to which to forward the request message for processing, the layer-7 load-balancing subcomponent determines, based on the type of request message, whether to forward the request message for processing synchronously or asynchronously to the selected computational node. 14. The integrated, application-aware load-balancing component of claim 12 wherein, when the layer-7 load-balancing subcomponent determines to synchronously forward the request message for processing, the layer-7 load-balancing subcomponent queues the request message for immediate transmission through one or more local area networks to the selected computational node. 15. The integrated, application-aware load-balancing component of claim 12 wherein, when the layer-7 load-balancing subcomponent determines to asynchronously forward the request message for processing, the layer-7 load-balancing subcomponent queues the request message to an output queue associated with the selected computational node. 16. The integrated, application-aware load-balancing component of claim 12 wherein the layer-7 load-balancing subcomponent dequeues multiple queued messages from the output queue and forwards them as a single batch of messages to the selected computational node. 17. A method for balancing a computational load applied by remote processor-controlled client devices to computational nodes within a distributed computer system controlled by a distributed application, the method comprising:
including an integrated, application-aware load-balancing component in the distributed application, the integrated, application-aware load-balancing component comprising
a layer-4 load-balancing subcomponent that distributes communications connections from remote processor-controlled client devices to the distributed application among the multiple computational nodes in order to balance the computational load applied to the distributed computer system by the remote processor-controlled client devices, and
a layer-7 load-balancing subcomponent that redistributes messages transmitted to the distributed computer system by the remote processor-controlled client devices, directed to the distributed application, and received by one or more of the multiple computational nodes among one or more of the multiple computational nodes in order to balance the computational load applied to the distributed computer system by the remote processor-controlled client devices. 18. The method of claim 18 further including:
storing, within the distributed computer system, a set of virtual IP addresses allocated to the distributed application, a connection table, layer-4 load-balancing policies, layer-7 load-balancing policies, representations of the layout and configuration of the distributed application within the distributed computer system, performance-metric values and representations of operational characteristics of the distributed application. 19. A physical data-storage device that stores computer instructions that, when executed by one or more processors of multiple computational nodes within a distributed computer system, generate, on each computational node, a load-balancing component of a distributed application comprising:
a layer-4 load-balancing subcomponent that distributes communications connections from remote processor-controlled client devices to the distributed application among the multiple computational nodes in order to balance the computational load applied to the distributed computer system by the remote processor-controlled client devices, and a layer-7 load-balancing subcomponent that redistributes messages transmitted to the distributed computer system by the remote processor-controlled client devices, directed to the distributed application, and received by one or more of the multiple computational nodes among one or more of the multiple computational nodes in order to balance the computational load applied to the distributed computer system by the remote processor-controlled client devices. 20. The physical data-storage device of claim 19 wherein computer instructions, when executed by one or more processors of multiple computational nodes within a distributed computer system, store, within the distributed computer system, a set of virtual IP addresses allocated to the distributed application, a connection table, layer-4 load-balancing policies, layer-7 load-balancing policies, representations of the layout and configuration of the distributed application within the distributed computer system, performance-metric values and representations of operational characteristics of the distributed application | 2,400 |
7,784 | 7,784 | 14,324,104 | 2,483 | A method and apparatus for decoding a video comprising a plurality of frames. Each frame was encoded in a plurality of blocks of pixels, using a predictive algorithm with deblocking inside the prediction loop. A first deblocking filter was applied by the encoder at boundaries between adjacent blocks, and the output of the deblocking filter was used to provide a reference frame for the predictive algorithm. The decoding comprises: reconstructing a frame of the video, to produce a reconstructed frame; applying a second deblocking filter at some block-boundaries in the reconstructed frame; and skipping deblocking-filtering at other block-boundaries in the reconstructed frame, even though deblocking was applied at those block-boundaries by the encoder. | 1. A method of decoding a video comprising a plurality of frames, each of which was encoded in a plurality of blocks of pixels, which encoding used a predictive algorithm with deblocking inside the prediction loop, wherein a first deblocking filter was applied by the encoder at boundaries between adjacent blocks, and the output of the deblocking filter was used to provide a reference frame for the predictive algorithm,
the decoding method comprising: reconstructing a frame of the video, to produce a reconstructed frame; applying a second deblocking filter at some block-boundaries in the reconstructed frame; and skipping deblocking-filtering at other block-boundaries in the reconstructed frame, even though deblocking was applied at those block-boundaries by the encoder. 2. The method of claim 1, wherein the reconstructed frame is a reference frame, and the decoding method further comprises using the reconstructed reference frame in the predictive algorithm to reconstruct another frame. 3. The method of claim 1, wherein the second deblocking filter is applied at a boundary between two macroblocks and deblocking-filtering is skipped for block-boundaries within at least one of the macroblocks. 4. The method of claim 1, comprising applying deblocking to a greater proportion of the block-boundaries when reconstructing the luminance component of a frame, compared with reconstructing the chrominance component of the frame. 5. The method of claim 1, comprising:
counting the number of successive reference frames for which deblocking has been skipped at some or all of the block-boundaries; detecting when this number exceeds a threshold; and in response, increasing the proportion of block-boundaries to which deblocking is applied when reconstructing a subsequent frame. 6. The method of claim 1, comprising applying deblocking to a greater proportion of the block-boundaries when reconstructing an intra-coded macroblock, compared with reconstructing an inter-coded macroblock. 7. The method of claim 1, wherein the video is encoded in conformance with the H.264 standard. 8. The method of claim 1, wherein the first deblocking filter and the second deblocking filter are identical. 9. A method of decoding a video encoded in conformance with the H.264 standard, comprising:
applying a deblocking filter at some block-boundaries in a reconstructed frame; and skipping deblocking for some other block-boundaries in the reconstructed frame, even though deblocking was applied at those block-boundaries by the encoder. 10. The method of claim 9, comprising applying deblocking to a greater proportion of the block-boundaries when reconstructing the luminance component of a frame, compared with reconstructing the chrominance component of the frame. 11. The method of claim 9, comprising:
counting the number of successive reference frames for which deblocking has been skipped at some or all of the block-boundaries; detecting when this number exceeds a threshold; and in response, increasing the proportion of block-boundaries to which deblocking is applied when reconstructing a subsequent frame. 12. The method of claim 9, comprising applying deblocking to a greater proportion of the block boundaries when reconstructing an intra-coded macroblock, compared with reconstructing an inter-coded macroblock. 13. A computer program comprising computer program code means adapted to perform all the steps of claim 1 when said program is run on a physical computing device. 14. A computer program as claimed in claim 13 embodied on a non-transitory computer readable medium. 15. Video decoding apparatus adapted to decode a video comprising a plurality of frames, each of which was encoded in a plurality of blocks of pixels, which encoding used a predictive algorithm with deblocking inside the prediction loop, wherein a first deblocking filter was applied by the encoder at boundaries between adjacent blocks, and the output of the deblocking filter was used to provide a reference frame for the predictive algorithm,
the video decoding apparatus comprising: a frame reconstruction unit, adapted to reconstruct a frame of the video, to produce a reconstructed frame; and a deblocking-filter unit, adapted to:
apply a second deblocking filter at some block-boundaries in the reconstructed frame; and
skip deblocking-filtering at other block-boundaries in the reconstructed frame, even though deblocking was applied at those block-boundaries by the encoder. | A method and apparatus for decoding a video comprising a plurality of frames. Each frame was encoded in a plurality of blocks of pixels, using a predictive algorithm with deblocking inside the prediction loop. A first deblocking filter was applied by the encoder at boundaries between adjacent blocks, and the output of the deblocking filter was used to provide a reference frame for the predictive algorithm. The decoding comprises: reconstructing a frame of the video, to produce a reconstructed frame; applying a second deblocking filter at some block-boundaries in the reconstructed frame; and skipping deblocking-filtering at other block-boundaries in the reconstructed frame, even though deblocking was applied at those block-boundaries by the encoder.1. A method of decoding a video comprising a plurality of frames, each of which was encoded in a plurality of blocks of pixels, which encoding used a predictive algorithm with deblocking inside the prediction loop, wherein a first deblocking filter was applied by the encoder at boundaries between adjacent blocks, and the output of the deblocking filter was used to provide a reference frame for the predictive algorithm,
the decoding method comprising: reconstructing a frame of the video, to produce a reconstructed frame; applying a second deblocking filter at some block-boundaries in the reconstructed frame; and skipping deblocking-filtering at other block-boundaries in the reconstructed frame, even though deblocking was applied at those block-boundaries by the encoder. 2. The method of claim 1, wherein the reconstructed frame is a reference frame, and the decoding method further comprises using the reconstructed reference frame in the predictive algorithm to reconstruct another frame. 3. The method of claim 1, wherein the second deblocking filter is applied at a boundary between two macroblocks and deblocking-filtering is skipped for block-boundaries within at least one of the macroblocks. 4. The method of claim 1, comprising applying deblocking to a greater proportion of the block-boundaries when reconstructing the luminance component of a frame, compared with reconstructing the chrominance component of the frame. 5. The method of claim 1, comprising:
counting the number of successive reference frames for which deblocking has been skipped at some or all of the block-boundaries; detecting when this number exceeds a threshold; and in response, increasing the proportion of block-boundaries to which deblocking is applied when reconstructing a subsequent frame. 6. The method of claim 1, comprising applying deblocking to a greater proportion of the block-boundaries when reconstructing an intra-coded macroblock, compared with reconstructing an inter-coded macroblock. 7. The method of claim 1, wherein the video is encoded in conformance with the H.264 standard. 8. The method of claim 1, wherein the first deblocking filter and the second deblocking filter are identical. 9. A method of decoding a video encoded in conformance with the H.264 standard, comprising:
applying a deblocking filter at some block-boundaries in a reconstructed frame; and skipping deblocking for some other block-boundaries in the reconstructed frame, even though deblocking was applied at those block-boundaries by the encoder. 10. The method of claim 9, comprising applying deblocking to a greater proportion of the block-boundaries when reconstructing the luminance component of a frame, compared with reconstructing the chrominance component of the frame. 11. The method of claim 9, comprising:
counting the number of successive reference frames for which deblocking has been skipped at some or all of the block-boundaries; detecting when this number exceeds a threshold; and in response, increasing the proportion of block-boundaries to which deblocking is applied when reconstructing a subsequent frame. 12. The method of claim 9, comprising applying deblocking to a greater proportion of the block boundaries when reconstructing an intra-coded macroblock, compared with reconstructing an inter-coded macroblock. 13. A computer program comprising computer program code means adapted to perform all the steps of claim 1 when said program is run on a physical computing device. 14. A computer program as claimed in claim 13 embodied on a non-transitory computer readable medium. 15. Video decoding apparatus adapted to decode a video comprising a plurality of frames, each of which was encoded in a plurality of blocks of pixels, which encoding used a predictive algorithm with deblocking inside the prediction loop, wherein a first deblocking filter was applied by the encoder at boundaries between adjacent blocks, and the output of the deblocking filter was used to provide a reference frame for the predictive algorithm,
the video decoding apparatus comprising: a frame reconstruction unit, adapted to reconstruct a frame of the video, to produce a reconstructed frame; and a deblocking-filter unit, adapted to:
apply a second deblocking filter at some block-boundaries in the reconstructed frame; and
skip deblocking-filtering at other block-boundaries in the reconstructed frame, even though deblocking was applied at those block-boundaries by the encoder. | 2,400 |
7,785 | 7,785 | 14,596,165 | 2,434 | There is disclosed a data processing device for executing an application, the data processing device comprising a processing unit for controlling access to at least one user interface comprised in the data processing device, and a secure element for facilitating secure execution of the application, wherein executing the application comprises receiving input data from and/or sending output data to the user interface, and wherein the secure element is arranged to cause the processing unit to restrict the access to the user interface during execution of the application. Furthermore, a corresponding method for executing an application and a corresponding computer program product are disclosed. | 1. A data processing device for executing an application, the data processing device comprising:
a processing unit for controlling access to at least one user interface comprised in the data processing device; a secure element for facilitating secure execution of the application; wherein executing the application comprises receiving input data from and/or sending output data to the user interface; and wherein the secure element is arranged to cause the processing unit to restrict the access to the user interface during execution of the application. 2. A data processing device as claimed in claim 1, wherein restricting the access to the user interface comprises restricting the access to the user interface to instructions comprised in said application. 3. A data processing device as claimed in claim 2, wherein the access to the user interface is restricted to the instructions comprised in said application by setting at least one control register in the processing unit to a value indicative of a secure access mode. 4. A data processing device as claimed in claim 3, wherein the control register is comprised in an application controller of the processing unit. 5. A data processing unit as claimed in claim 1, wherein the secure element comprises an integrated circuit in which the application has been installed. 6. A data processing unit as claimed in claim 1, wherein the secure element is further arranged to cause the processing unit to revoke the restriction of the access after the application has been executed. 7. A data processing device as claimed in claim 1, wherein the processing unit provides user interface access control by means of at least one of hardware and a control program installed in the processing unit, and wherein the secure element is further arranged to verify the integrity of the user interface access control. 8. A data processing device as claimed in claim 1, wherein the secure element is further arranged to load a user interface access control program into the processing unit. 9. A data processing device as claimed in claim 1, wherein the secure element is integrated into the processing unit. 10. A method for executing an application in a data processing device, the data processing device comprising:
a processing unit for controlling access to at least one user interface comprised in the data processing device; and a secure element for facilitating secure execution of the application; the method comprising the secure element causing the processing unit to restrict the access to the user interface during execution of the application, and receiving input data from and/or sending output data to the user interface. 11. A method as claimed in claim 10, wherein restricting the access to the user interface comprises restricting the access to the user interface to instructions comprised in said application. 12. A method as claimed in claim 11, wherein the access to the user interface is restricted to the instructions comprised in said application by setting at least one control register in the processing unit to a value indicative of a secure access mode. 13. A method as claimed in claim 10, wherein the secure element further causes the processing unit to revoke the restriction of the access after the application has been executed. 14. A method as claimed in claim 10, wherein the processing unit provides user interface access control by means of at least one of hardware and a control program installed in the processing unit, and wherein the secure element further verifies the integrity of the user interface access control. 15. A computer program product comprising program elements executable by a processing unit or a secure element, wherein each program element comprises program instructions which, when being executed by the processing unit or the secure element, cause said processing unit and secure element to carry out or control respective steps of a method as claimed in claim 10. | There is disclosed a data processing device for executing an application, the data processing device comprising a processing unit for controlling access to at least one user interface comprised in the data processing device, and a secure element for facilitating secure execution of the application, wherein executing the application comprises receiving input data from and/or sending output data to the user interface, and wherein the secure element is arranged to cause the processing unit to restrict the access to the user interface during execution of the application. Furthermore, a corresponding method for executing an application and a corresponding computer program product are disclosed.1. A data processing device for executing an application, the data processing device comprising:
a processing unit for controlling access to at least one user interface comprised in the data processing device; a secure element for facilitating secure execution of the application; wherein executing the application comprises receiving input data from and/or sending output data to the user interface; and wherein the secure element is arranged to cause the processing unit to restrict the access to the user interface during execution of the application. 2. A data processing device as claimed in claim 1, wherein restricting the access to the user interface comprises restricting the access to the user interface to instructions comprised in said application. 3. A data processing device as claimed in claim 2, wherein the access to the user interface is restricted to the instructions comprised in said application by setting at least one control register in the processing unit to a value indicative of a secure access mode. 4. A data processing device as claimed in claim 3, wherein the control register is comprised in an application controller of the processing unit. 5. A data processing unit as claimed in claim 1, wherein the secure element comprises an integrated circuit in which the application has been installed. 6. A data processing unit as claimed in claim 1, wherein the secure element is further arranged to cause the processing unit to revoke the restriction of the access after the application has been executed. 7. A data processing device as claimed in claim 1, wherein the processing unit provides user interface access control by means of at least one of hardware and a control program installed in the processing unit, and wherein the secure element is further arranged to verify the integrity of the user interface access control. 8. A data processing device as claimed in claim 1, wherein the secure element is further arranged to load a user interface access control program into the processing unit. 9. A data processing device as claimed in claim 1, wherein the secure element is integrated into the processing unit. 10. A method for executing an application in a data processing device, the data processing device comprising:
a processing unit for controlling access to at least one user interface comprised in the data processing device; and a secure element for facilitating secure execution of the application; the method comprising the secure element causing the processing unit to restrict the access to the user interface during execution of the application, and receiving input data from and/or sending output data to the user interface. 11. A method as claimed in claim 10, wherein restricting the access to the user interface comprises restricting the access to the user interface to instructions comprised in said application. 12. A method as claimed in claim 11, wherein the access to the user interface is restricted to the instructions comprised in said application by setting at least one control register in the processing unit to a value indicative of a secure access mode. 13. A method as claimed in claim 10, wherein the secure element further causes the processing unit to revoke the restriction of the access after the application has been executed. 14. A method as claimed in claim 10, wherein the processing unit provides user interface access control by means of at least one of hardware and a control program installed in the processing unit, and wherein the secure element further verifies the integrity of the user interface access control. 15. A computer program product comprising program elements executable by a processing unit or a secure element, wherein each program element comprises program instructions which, when being executed by the processing unit or the secure element, cause said processing unit and secure element to carry out or control respective steps of a method as claimed in claim 10. | 2,400 |
7,786 | 7,786 | 14,953,919 | 2,487 | In an image processing method ( 18 ), for images ( 9 ) in a image sequence ( 8 ), in each case a position indication ( 23 ) of a center ( 24 ) of the image content ( 10 ) of individual images ( 9 ) is calculated in a completely computer-implemented and/or hardware-implemented, statistical evaluation method ( 20 ). The center ( 24 ) is defined by a circle section ( 62 ) which is described or characterized by a separation line ( 12 ) between the image content ( 10 ) and a periphery ( 11 ) which is supplementary to the image content ( 10 ) in the image ( 9 ) or complementary therewith. | 1. An image processing method (18), comprising: processing an image sequence (8) of images (9) which in each case have an image content (10) and a periphery (11) that is complementary to the image content (10), separating the image content (10) from the periphery (11) by a separation line (12) that describes in at least a section (61) a circle section (62), and for each of the images (9) in the image sequence (8) a position indication (23) of a center (24) of the image content (10) that is defined by the circle section (62) is ascertained in at least one of a computer-implemented or hardware-implemented statistical evaluation method (20). 2. The image processing method (18) as claimed in claim 1, further comprising in each case calculating a value for a component (37, 41) of the position indication for a selection of rows (34) or columns (38) from positions of intersection points (35, 36, 39, 40) of the row (34) or the column (38) with the separation line (12) in the statistical evaluation method (20). 3. The image processing method (18) as claimed in claim 2, further comprising selecting only the rows (34) or the columns (38) that are intersected by the circle section at two intersection points (35, 36, 39, 40). 4. The image processing method (18) as claimed in claim 2, further comprising calculating a frequency distribution of the values that are calculated for the selection of the rows (34) or the columns (38) in the statistical evaluation method (20). 5. The image processing method (18) as claimed in claim 4, further comprising for ascertaining the position indication (23), using the in each case most frequent calculated value for the selection of the rows (34) or the columns (38). 6. The image processing method (18) as claimed in claim 1, further comprising calculating at least one of an intensity or color value histogram (29) in at least one of computer-implemented or hardware-implemented fashion for the respective image (9) before the statistical evaluation method (20). 7. The image processing method (18) as claimed in claim 6, further comprising coloring all image pixels of the image (9), at least one of an intensity or color value of which lies under a threshold value (30), black. 8. The image processing method (18) as claimed in claim 7, wherein the threshold value (30) for an image segment (27) in which the respective image pixel is located, is individually prespecified or ascertained. 9. The image processing method (18) as claimed in claim 8, wherein the image segment (27) is defined by two lines (28) that cross in the image (9) or wherein the threshold value (30) is calculated from at least one of the intensity or color value histogram (29), or both. 10. The image processing method (18) as claimed in claim 1, further comprising applying an edge detection method (32) before the statistical evaluation method (20) for the respective image (9). 11. The image processing method (18) as claimed in claim 1, further comprising calculating a second position indication (43) for the center (24) as an average of a maximum extent (45, 47) and a minimum extent (44, 46) of the image content (10) in a row direction and in a column direction for each image (9), and the position indication (23) is discarded or the position indication (23) relating to a preceding image (9) in the image sequence (8) is kept if it deviates too strongly from the second position indication (43). 12. The image processing method (18) as claimed in claim 1, further comprising calculating a radius (51) of the circle section (62) for each of the images (9), with the radius (51) being calculated from a maximum extent (45, 47) and a minimum extent (44, 46) of the image content (10) in the row direction or in the column direction, or both. 13. The image processing method (18) as claimed in claim 12, further comprising calculating a deviation (56) of the separation line (12) from a circle (53) which is defined by the position indication (23) and the radius (51) along the section (61). 14. The image processing method (18) as claimed in claim 13, further comprising calculating a second deviation (56) of the separation line (12) from a circle (57) which is defined by the position indication (58) and the radius (59), which were calculated for a preceding image (9) in the image sequence (8), along the section (61), wherein the position indication (23) is discarded or the position indication (23) for a preceding image (9) in the image sequence (8) is kept if the deviation (54) is greater than the second deviation (56). 15. The image processing method (18) as claimed in claim 1, further comprising carrying out at least one image editing step (60) for each of the images (9), said image editing step processes at least the position indication (23) as a parameter, 16. The image processing method (18) as claimed in claim 15, wherein the image editing step (60) is a matching of an enlargement such that the respective image content (10) fills an available image format or is a centering of the respective image content (10), or both. 17. An image processing apparatus (6), comprising an input (7), via which an image sequence (8) of images (9) having in each case an image content (10) and a periphery (11) that is complementary to the image content (10), wherein the image content (10) is separated from the periphery (11) by a separation line (12) which in at least a section (61) describes a circle section (62), is input, and an output (16) via which a position indication (23) of a center (24) of the image content (10) that is defined by the circle section (62) can be output for each image (9), wherein a processing device (14) is configured and adapted for carrying out an image processing method (18) as claimed in claim 1. 18. The image processing apparatus (6) as claimed in claim 17, wherein the processing device (14) are realized in an FPGA (15) and/or wherein an output unit (17) is adapted to output processed images. 19. An endoscope arrangement (1) having an endoscope (2), an image capturing device (3) and an image processing apparatus (6) as claimed in claim 17. | In an image processing method ( 18 ), for images ( 9 ) in a image sequence ( 8 ), in each case a position indication ( 23 ) of a center ( 24 ) of the image content ( 10 ) of individual images ( 9 ) is calculated in a completely computer-implemented and/or hardware-implemented, statistical evaluation method ( 20 ). The center ( 24 ) is defined by a circle section ( 62 ) which is described or characterized by a separation line ( 12 ) between the image content ( 10 ) and a periphery ( 11 ) which is supplementary to the image content ( 10 ) in the image ( 9 ) or complementary therewith.1. An image processing method (18), comprising: processing an image sequence (8) of images (9) which in each case have an image content (10) and a periphery (11) that is complementary to the image content (10), separating the image content (10) from the periphery (11) by a separation line (12) that describes in at least a section (61) a circle section (62), and for each of the images (9) in the image sequence (8) a position indication (23) of a center (24) of the image content (10) that is defined by the circle section (62) is ascertained in at least one of a computer-implemented or hardware-implemented statistical evaluation method (20). 2. The image processing method (18) as claimed in claim 1, further comprising in each case calculating a value for a component (37, 41) of the position indication for a selection of rows (34) or columns (38) from positions of intersection points (35, 36, 39, 40) of the row (34) or the column (38) with the separation line (12) in the statistical evaluation method (20). 3. The image processing method (18) as claimed in claim 2, further comprising selecting only the rows (34) or the columns (38) that are intersected by the circle section at two intersection points (35, 36, 39, 40). 4. The image processing method (18) as claimed in claim 2, further comprising calculating a frequency distribution of the values that are calculated for the selection of the rows (34) or the columns (38) in the statistical evaluation method (20). 5. The image processing method (18) as claimed in claim 4, further comprising for ascertaining the position indication (23), using the in each case most frequent calculated value for the selection of the rows (34) or the columns (38). 6. The image processing method (18) as claimed in claim 1, further comprising calculating at least one of an intensity or color value histogram (29) in at least one of computer-implemented or hardware-implemented fashion for the respective image (9) before the statistical evaluation method (20). 7. The image processing method (18) as claimed in claim 6, further comprising coloring all image pixels of the image (9), at least one of an intensity or color value of which lies under a threshold value (30), black. 8. The image processing method (18) as claimed in claim 7, wherein the threshold value (30) for an image segment (27) in which the respective image pixel is located, is individually prespecified or ascertained. 9. The image processing method (18) as claimed in claim 8, wherein the image segment (27) is defined by two lines (28) that cross in the image (9) or wherein the threshold value (30) is calculated from at least one of the intensity or color value histogram (29), or both. 10. The image processing method (18) as claimed in claim 1, further comprising applying an edge detection method (32) before the statistical evaluation method (20) for the respective image (9). 11. The image processing method (18) as claimed in claim 1, further comprising calculating a second position indication (43) for the center (24) as an average of a maximum extent (45, 47) and a minimum extent (44, 46) of the image content (10) in a row direction and in a column direction for each image (9), and the position indication (23) is discarded or the position indication (23) relating to a preceding image (9) in the image sequence (8) is kept if it deviates too strongly from the second position indication (43). 12. The image processing method (18) as claimed in claim 1, further comprising calculating a radius (51) of the circle section (62) for each of the images (9), with the radius (51) being calculated from a maximum extent (45, 47) and a minimum extent (44, 46) of the image content (10) in the row direction or in the column direction, or both. 13. The image processing method (18) as claimed in claim 12, further comprising calculating a deviation (56) of the separation line (12) from a circle (53) which is defined by the position indication (23) and the radius (51) along the section (61). 14. The image processing method (18) as claimed in claim 13, further comprising calculating a second deviation (56) of the separation line (12) from a circle (57) which is defined by the position indication (58) and the radius (59), which were calculated for a preceding image (9) in the image sequence (8), along the section (61), wherein the position indication (23) is discarded or the position indication (23) for a preceding image (9) in the image sequence (8) is kept if the deviation (54) is greater than the second deviation (56). 15. The image processing method (18) as claimed in claim 1, further comprising carrying out at least one image editing step (60) for each of the images (9), said image editing step processes at least the position indication (23) as a parameter, 16. The image processing method (18) as claimed in claim 15, wherein the image editing step (60) is a matching of an enlargement such that the respective image content (10) fills an available image format or is a centering of the respective image content (10), or both. 17. An image processing apparatus (6), comprising an input (7), via which an image sequence (8) of images (9) having in each case an image content (10) and a periphery (11) that is complementary to the image content (10), wherein the image content (10) is separated from the periphery (11) by a separation line (12) which in at least a section (61) describes a circle section (62), is input, and an output (16) via which a position indication (23) of a center (24) of the image content (10) that is defined by the circle section (62) can be output for each image (9), wherein a processing device (14) is configured and adapted for carrying out an image processing method (18) as claimed in claim 1. 18. The image processing apparatus (6) as claimed in claim 17, wherein the processing device (14) are realized in an FPGA (15) and/or wherein an output unit (17) is adapted to output processed images. 19. An endoscope arrangement (1) having an endoscope (2), an image capturing device (3) and an image processing apparatus (6) as claimed in claim 17. | 2,400 |
7,787 | 7,787 | 14,323,607 | 2,449 | Method of clock synchronization in cloud computing. A plurality of physical computer assets are provided. The plurality of physical computer assets are linked together to form a virtualized computing cloud, the virtualized computing cloud having a centralized clock for coordinating the operation of the virtualized computing cloud; the virtualized computing cloud is logically partitioned into a plurality of virtualized logical server clouds, each of the virtualized logical server clouds having a local clock synchronized to the same centralized clock; a clock type from a clock palette is selected for at least one of the virtualized logical server clouds; the clock type is implemented in the at least one of the virtualized logical server clouds such that the clock type is synchronized to the at least one of the virtualized logical server clouds; and the centralized clock is disabled. The method may be performed on one or more computing devices. | 1. A method of clock synchronization in cloud computing comprising:
providing a plurality of physical computer assets including at least one physical server having a central processing unit; linking the plurality of physical computer assets together to form a virtualized computing cloud, the virtualized computing cloud having a centralized clock for coordinating the operation of the virtualized computing cloud; logically partitioning the virtualized computing cloud into a plurality of virtualized logical server clouds, each of the virtualized logical server clouds having a local clock synchronized to the centralized clock of the virtualized computing cloud; selecting a clock type from a clock palette associated with the virtualized computing cloud for at least one of the virtualized logical server clouds; implementing the clock type in the at least one of the virtualized logical server clouds such that the clock type is synchronized to the at least one of the virtualized logical server clouds; and disabling the centralized clock in the at least one of the virtualized logical server clouds; wherein the method is performed on one or more computing devices. 2. The method of claim 1 wherein the step of selecting a clock type is for a plurality of virtualized logical server clouds, the step of implementing the clock type is for a plurality of virtualized logical server clouds and the step of disabling is for a plurality of virtualized logical server clouds. 3. The method of claim 2 wherein at least two of the plurality of virtualized logical server clouds have different clock types. 4. The method of claim 1 wherein at least one of the virtualized logical server clouds serves more than one virtualized computing cloud and before the step of selecting a clock type, further comprising selecting the virtualized computing cloud served by the at least one of the virtualized logical server clouds. 5. The method of claim 1 further comprising deprovisioning the at least one of the virtualized logical server clouds and releasing the clock type back to the clock palette. 6. The method of claim 1 wherein the clock type is selected from the group consisting of Network Time Protocol (NTP), Simple Network Time Protocol (SNTP), Precision Time Protocol (PTP), IRIG B-122 Protocol and Time Triggered Protocol (TTP). 7. A computer program product for clock synchronization in cloud computing having a plurality of physical computer assets including at least one physical server having a central processing unit, the computer program product comprising:
a computer readable storage medium having computer readable program code embodied therewith, the computer readable program code comprising: computer readable program code configured to link the plurality of physical computer assets together to form a virtualized computing cloud, the virtualized computing cloud having a centralized clock for coordinating the operation of the virtualized computing cloud; computer readable program code configured to logically partition the virtualized computing cloud into a plurality of virtualized logical server clouds, each of the virtualized logical server clouds having a local clock synchronized to the centralized clock of the virtualized computing cloud; computer readable program code configured to select a clock type from a clock palette associated with the virtualized computing cloud for at least one of the virtualized logical server clouds; computer readable program code configured to implement the clock type in the at least one of the virtualized logical server clouds such that the clock type is synchronized to the at least one of the virtualized logical server clouds; and computer readable program code configured to disable the centralized clock in the at least one of the virtualized logical server clouds. 8. The computer program product of claim 7 wherein the computer readable program code configured to select a clock type is for a plurality of virtualized logical server clouds, the computer readable program code configured to implement the clock type is for a plurality of virtualized logical server clouds and the computer readable program code configured to disable is for a plurality of virtualized logical server clouds. 9. The computer program product of claim 8 wherein at least two of the plurality of virtualized logical server clouds have different clock types. 10. The computer program product of claim 7 wherein at least one of the virtualized logical server clouds serves more than one virtualized computing cloud and before the computer readable program code configured to select a clock type, further comprising computer readable program code configured to select the virtualized computing cloud served by the at least one of the virtualized logical server clouds. 11. The computer program product of claim 7 further comprising computer readable program code configured to deprovision the at least one of the virtualized logical server clouds and release the clock type back to the clock palette. 12. The computer program product of claim 7 wherein the clock type is selected from the group consisting of Network Time Protocol (NTP), Simple Network Time Protocol (SNTP), Precision Time Protocol (PTP), IRIG B-122 Protocol and Time Triggered Protocol (TTP). 13. A system for clock synchronization in cloud computing comprising:
a plurality of physical computer assets including at least one physical server having a central processing unit; and a computer readable storage medium having computer readable program code embodied therewith, the computer readable program code comprising: computer readable program code configured to link the plurality of physical computer assets together to form a virtualized computing cloud, the virtualized computing cloud having a centralized clock for coordinating the operation of the virtualized computing cloud; computer readable program code configured to logically partition the virtualized computing cloud into a plurality of virtualized logical server clouds, each of the virtualized logical server clouds having a local clock synchronized to the centralized clock of the virtualized computing cloud; computer readable program code configured to select a clock type from a clock palette associated with the virtualized computing cloud for at least one of the virtualized logical server clouds; computer readable program code configured to implement the clock type in the at least one of the virtualized logical server clouds such that the clock type is synchronized to the at least one of the virtualized logical server clouds; and computer readable program code configured to disable the centralized clock in the at least one of the virtualized logical server clouds. 14. The system of claim 13 wherein the computer readable program code configured to select a clock type is for a plurality of virtualized logical server clouds, the computer readable program code configured to implement the clock type is for a plurality of virtualized logical server clouds and the computer readable program code configured to disable is for a plurality of virtualized logical server clouds. 15. The system of claim 14 wherein at least two of the plurality of virtualized logical server clouds have different clock types. 16. The system of claim 13 wherein at least one of the virtualized logical server clouds serves more than one virtualized computing cloud and before the computer readable program code configured to select a clock type, further comprising computer readable program code configured to select the virtualized computing cloud served by the at least one of the virtualized logical server clouds. 17. The system of claim 13 further comprising computer readable program code configured to deprovision the at least one of the virtualized logical server clouds and release the clock type back to the clock palette. 18. The system of claim 13 wherein the clock type is selected from the group consisting of Network Time Protocol (NTP), Simple Network Time Protocol (SNTP), Precision Time Protocol (PTP), IRIG B-122 Protocol and Time Triggered Protocol (TTP). | Method of clock synchronization in cloud computing. A plurality of physical computer assets are provided. The plurality of physical computer assets are linked together to form a virtualized computing cloud, the virtualized computing cloud having a centralized clock for coordinating the operation of the virtualized computing cloud; the virtualized computing cloud is logically partitioned into a plurality of virtualized logical server clouds, each of the virtualized logical server clouds having a local clock synchronized to the same centralized clock; a clock type from a clock palette is selected for at least one of the virtualized logical server clouds; the clock type is implemented in the at least one of the virtualized logical server clouds such that the clock type is synchronized to the at least one of the virtualized logical server clouds; and the centralized clock is disabled. The method may be performed on one or more computing devices.1. A method of clock synchronization in cloud computing comprising:
providing a plurality of physical computer assets including at least one physical server having a central processing unit; linking the plurality of physical computer assets together to form a virtualized computing cloud, the virtualized computing cloud having a centralized clock for coordinating the operation of the virtualized computing cloud; logically partitioning the virtualized computing cloud into a plurality of virtualized logical server clouds, each of the virtualized logical server clouds having a local clock synchronized to the centralized clock of the virtualized computing cloud; selecting a clock type from a clock palette associated with the virtualized computing cloud for at least one of the virtualized logical server clouds; implementing the clock type in the at least one of the virtualized logical server clouds such that the clock type is synchronized to the at least one of the virtualized logical server clouds; and disabling the centralized clock in the at least one of the virtualized logical server clouds; wherein the method is performed on one or more computing devices. 2. The method of claim 1 wherein the step of selecting a clock type is for a plurality of virtualized logical server clouds, the step of implementing the clock type is for a plurality of virtualized logical server clouds and the step of disabling is for a plurality of virtualized logical server clouds. 3. The method of claim 2 wherein at least two of the plurality of virtualized logical server clouds have different clock types. 4. The method of claim 1 wherein at least one of the virtualized logical server clouds serves more than one virtualized computing cloud and before the step of selecting a clock type, further comprising selecting the virtualized computing cloud served by the at least one of the virtualized logical server clouds. 5. The method of claim 1 further comprising deprovisioning the at least one of the virtualized logical server clouds and releasing the clock type back to the clock palette. 6. The method of claim 1 wherein the clock type is selected from the group consisting of Network Time Protocol (NTP), Simple Network Time Protocol (SNTP), Precision Time Protocol (PTP), IRIG B-122 Protocol and Time Triggered Protocol (TTP). 7. A computer program product for clock synchronization in cloud computing having a plurality of physical computer assets including at least one physical server having a central processing unit, the computer program product comprising:
a computer readable storage medium having computer readable program code embodied therewith, the computer readable program code comprising: computer readable program code configured to link the plurality of physical computer assets together to form a virtualized computing cloud, the virtualized computing cloud having a centralized clock for coordinating the operation of the virtualized computing cloud; computer readable program code configured to logically partition the virtualized computing cloud into a plurality of virtualized logical server clouds, each of the virtualized logical server clouds having a local clock synchronized to the centralized clock of the virtualized computing cloud; computer readable program code configured to select a clock type from a clock palette associated with the virtualized computing cloud for at least one of the virtualized logical server clouds; computer readable program code configured to implement the clock type in the at least one of the virtualized logical server clouds such that the clock type is synchronized to the at least one of the virtualized logical server clouds; and computer readable program code configured to disable the centralized clock in the at least one of the virtualized logical server clouds. 8. The computer program product of claim 7 wherein the computer readable program code configured to select a clock type is for a plurality of virtualized logical server clouds, the computer readable program code configured to implement the clock type is for a plurality of virtualized logical server clouds and the computer readable program code configured to disable is for a plurality of virtualized logical server clouds. 9. The computer program product of claim 8 wherein at least two of the plurality of virtualized logical server clouds have different clock types. 10. The computer program product of claim 7 wherein at least one of the virtualized logical server clouds serves more than one virtualized computing cloud and before the computer readable program code configured to select a clock type, further comprising computer readable program code configured to select the virtualized computing cloud served by the at least one of the virtualized logical server clouds. 11. The computer program product of claim 7 further comprising computer readable program code configured to deprovision the at least one of the virtualized logical server clouds and release the clock type back to the clock palette. 12. The computer program product of claim 7 wherein the clock type is selected from the group consisting of Network Time Protocol (NTP), Simple Network Time Protocol (SNTP), Precision Time Protocol (PTP), IRIG B-122 Protocol and Time Triggered Protocol (TTP). 13. A system for clock synchronization in cloud computing comprising:
a plurality of physical computer assets including at least one physical server having a central processing unit; and a computer readable storage medium having computer readable program code embodied therewith, the computer readable program code comprising: computer readable program code configured to link the plurality of physical computer assets together to form a virtualized computing cloud, the virtualized computing cloud having a centralized clock for coordinating the operation of the virtualized computing cloud; computer readable program code configured to logically partition the virtualized computing cloud into a plurality of virtualized logical server clouds, each of the virtualized logical server clouds having a local clock synchronized to the centralized clock of the virtualized computing cloud; computer readable program code configured to select a clock type from a clock palette associated with the virtualized computing cloud for at least one of the virtualized logical server clouds; computer readable program code configured to implement the clock type in the at least one of the virtualized logical server clouds such that the clock type is synchronized to the at least one of the virtualized logical server clouds; and computer readable program code configured to disable the centralized clock in the at least one of the virtualized logical server clouds. 14. The system of claim 13 wherein the computer readable program code configured to select a clock type is for a plurality of virtualized logical server clouds, the computer readable program code configured to implement the clock type is for a plurality of virtualized logical server clouds and the computer readable program code configured to disable is for a plurality of virtualized logical server clouds. 15. The system of claim 14 wherein at least two of the plurality of virtualized logical server clouds have different clock types. 16. The system of claim 13 wherein at least one of the virtualized logical server clouds serves more than one virtualized computing cloud and before the computer readable program code configured to select a clock type, further comprising computer readable program code configured to select the virtualized computing cloud served by the at least one of the virtualized logical server clouds. 17. The system of claim 13 further comprising computer readable program code configured to deprovision the at least one of the virtualized logical server clouds and release the clock type back to the clock palette. 18. The system of claim 13 wherein the clock type is selected from the group consisting of Network Time Protocol (NTP), Simple Network Time Protocol (SNTP), Precision Time Protocol (PTP), IRIG B-122 Protocol and Time Triggered Protocol (TTP). | 2,400 |
7,788 | 7,788 | 15,711,810 | 2,477 | Certain aspects of the present disclosure relate to methods and apparatus for applying rules to determine when to retune radio components of a user equipment (UE). Certain aspects of the present disclosure provide a method for wireless communications by a UE. The method includes determining first resources assigned to the UE in a first subframe and second resources assigned to the UE for uplink transmissions in a second subframe. The method further includes determining whether to retune radio frequency (RF) circuitry prior to transmitting in the second subframe based on at least one rule involving an overlap between the first resources and second resources. | 1. A method for wireless communications by a user equipment (UE), comprising:
determining first resources assigned to the UE in a first subframe and second resources assigned to the UE for uplink transmissions in a second subframe; and determining whether to retune radio frequency (RF) circuitry prior to transmitting in the second subframe based on at least one rule involving an overlap between the first resources and second resources. 2. The method of claim 1, wherein:
the first resources are assigned to the UE for downlink or uplink transmissions in a first bandwidth in the first subframe; the second resources are assigned to the UE for uplink transmissions in a second bandwidth in the second subframe; and the rule indicates the UE is to retune prior to transmitting in the second subframe if the first and second bandwidths are different. 3. The method of claim 1, wherein:
the first resources are assigned to the UE for downlink or uplink transmissions in a first bandwidth in the first subframe; the second resources are assigned to the UE for uplink transmissions in a second bandwidth in the second subframe; and the rule indicates the UE is not to retune if the first and second bandwidth have a same center frequency. 4. The method of claim 1, wherein:
the first resources are within a first wideband region that includes a set of narrowband regions; and the rule indicates the UE is to retune prior to transmitting in the second subframe if the second resources are not contained within the first wideband region. 5. The method of claim 1, wherein:
one or more physical resource blocks (PRBs) of the first resources occupy at least a part of a first wideband region and at least a part of a second wideband region; and the rule indicates the UE is to retune prior to transmitting in the second subframe if the second resources are not contained within a third wideband region with a same center frequency as the first resources. 6. The method of claim 5, wherein the third wideband region has a 5 MHz bandwidth. 7. The method of claim 4, wherein the rule indicates that the UE is to retune if at least one physical resource block (PRB) of the first resources falls within a different wideband region than at least one PRB of the second resources. 8. The method of claim 1, wherein:
the rule indicates the UE is to retune prior to transmitting in the second subframe if the second resources are not entirely contained within the first resources. 9. The method of claim 8, wherein:
the first resources occupy a first set of one or more narrowbands; the second resources occupy a second set of one or more narrowbands; and the rule indicates that the UE is to retune if the second set of narrowbands is not contained within the first set of narrowbands. 10. The method of claim 8, wherein:
the first resources occupy a first set of one or more wideband regions, each spanning a set of narrowbands; the second resources occupy a second set of one or more wideband regions, each spanning a set of narrowbands; and the rule indicates that the UE is to retune if the second set of wideband regions is not contained within the first set of wideband regions. 11. The method of claim 1, wherein:
the first resources occupy a first set of one or more wideband regions, each spanning a set of narrowbands; the second resources occupy a second set of one or more wideband regions, each spanning a set of narrowbands; and the rule indicates that the UE is to retune if the first set of wideband regions is different than the second set of wideband regions. 12. The method of claim 1, wherein:
the first resources are entirely contained within at least two different wideband regions in the first subframe, wherein each wideband region spans a set of narrowbands and one of the wideband regions is selected as an operating wideband for the first subframe; the second resources are entirely contained within at least two different wideband regions in the second subframe, wherein each wideband region spans a set of narrowbands and one of the wideband regions is selected as an operating wideband for the first subframe; and the rule indicates that the UE is to retune if the operating wideband of the second subframe is different than the operating wideband of the first subframe. 13. The method of claim 12, wherein a wideband region having a lower index is selected as the operating wideband for each subframe. 14. The method of claim 1, further comprising:
selecting a bandwidth operating mode of the UE based, at least in part on the rule. 15. The method of claim 14, wherein the bandwidth operating mode is selected in an effort to reduce an amount of retuning. 16. The method of claim 1, wherein:
the rule indicates that, if resources needed for a sounding reference signal (SRS) in the second subframe would result in retuning, the SRS is not transmitted. 17. The method of claim 1, wherein:
upon determining to retune the RF circuitry, one or two symbol durations are used by the UE for retuning, during which no signals are transmitted. 18. An apparatus for wireless communications, comprising:
a transmit processor configured to determine first resources assigned to the UE in a first subframe, to determine second resources assigned to the UE for the uplink transmissions in a second subframe, to apply at least one rule involving an overlap between the first resources and second resources, the at least one rule being used by the transmit processor to determine whether to retune radio frequency (RF) circuitry after uplink transmissions in the first subframe and prior to uplink transmissions in the second subframe; and a circuit in the RF circuitry that is configured to be retuned by the transmit processor prior to uplink transmissions in the second subframe if the transmit processor determines to retune the RF circuitry. 19. The apparatus of claim 18, wherein:
the first resources are assigned to the UE for downlink or uplink transmissions in a first bandwidth in the first subframe; the second resources are assigned to the UE for uplink transmissions in a second bandwidth in the second subframe; and the rule indicates the UE is to retune prior to transmitting in the second subframe if the first and second bandwidths are different. 20. The apparatus of claim 18, wherein:
the first resources are assigned to the UE for downlink or uplink transmissions in a first bandwidth in the first subframe; the second resources are assigned to the UE for uplink transmissions in a second bandwidth in the second subframe; and the rule indicates the UE is not to retune if the first and second bandwidth have a same center frequency. 21. The apparatus of claim 18, wherein:
the first resources are within a first wideband region that includes a set of narrowband regions; and the rule indicates the UE is to retune prior to transmitting in the second subframe if the second resources are not contained within the first wideband region. 22. The apparatus of claim 18, wherein:
one or more physical resource blocks (PRBs) of the first resources occupy at least a part of a first wideband region and at least a part of a second wideband region; and the rule indicates the UE is to retune prior to transmitting in the second subframe if the second resources are not contained within a third wideband region with a same center frequency as the first resources. 23. The apparatus of claim 22, wherein the third wideband region has a 5 MHz bandwidth. 24. The apparatus of claim 21, wherein the rule indicates that the UE is to retune if at least one physical resource block (PRB) of the first resources falls within a different wideband region than at least one PRB of the second resources. 25. The apparatus of claim 18, wherein:
the rule indicates the UE is to retune prior to transmitting in the second subframe if the second resources are not entirely contained within the first resources. 26. The apparatus of claim 25, wherein:
the first resources occupy a first set of one or more narrowbands; the second resources occupy a second set of one or more narrowbands; and the rule indicates that the UE is to retune if the second set of narrowbands is not contained within the first set of narrowbands. 27. The apparatus of claim 25, wherein:
the first resources occupy a first set of one or more wideband regions, each spanning a set of narrowbands; the second resources occupy a second set of one or more wideband regions, each spanning a set of narrowbands; and the rule indicates that the UE is to retune if the second set of wideband regions is not contained within the first set of wideband regions. 28. The apparatus of claim 18, wherein:
the first resources occupy a first set of one or more wideband regions, each spanning a set of narrowbands; the second resources occupy a second set of one or more wideband regions, each spanning a set of narrowbands; and the rule indicates that the UE is to retune if the first set of wideband regions is different than the second set of wideband regions. 29. The apparatus of claim 18, wherein:
the first resources are entirely contained within at least two different wideband regions in the first subframe, wherein each wideband region spans a set of narrowbands and one of the wideband regions is selected as an operating wideband for the first subframe; the second resources are entirely contained within at least two different wideband regions in the second subframe, wherein each wideband region spans a set of narrowbands and one of the wideband regions is selected as an operating wideband for the first subframe; and the rule indicates that the UE is to retune if the operating wideband of the second subframe is different than the operating wideband of the first subframe. 30. The apparatus of claim 29, wherein a wideband region having a lower index is selected as the operating wideband for each subframe. 31. The apparatus of claim 18, further comprising:
selecting a bandwidth operating mode of the UE based, at least in part on the rule. 32. The apparatus of claim 31, wherein the bandwidth operating mode is selected in an effort to reduce an amount of retuning. 33. The apparatus of claim 18, wherein:
the rule indicates that, if resources needed for a sounding reference signal (SRS) in the second subframe would result in retuning, the SRS is not transmitted. 34. The apparatus of claim 18, wherein:
upon determining to retune the RF circuitry, one or two symbol durations are used by the UE for retuning, during which no signals are transmitted. 35. An apparatus for wireless communications, comprising:
a means for determining first resources assigned to the UE in a first subframe and second resources assigned to the UE for uplink transmissions in a second subframe; and a means for determining whether to retune radio frequency (RF) circuitry prior to transmitting in the second subframe based on at least one rule involving an overlap between the first resources and second resources. 36. The apparatus of claim 35, wherein:
the first resources are within a first wideband region that includes a set of narrowband regions; and the rule indicates the UE is to retune prior to transmitting in the second subframe if the second resources are not contained within the first wideband region. 37. The apparatus of claim 35, wherein:
one or more physical resource blocks (PRBs) of the first resources occupy at least a part of a first wideband region and at least a part of a second wideband region; and the rule indicates the UE is to retune prior to transmitting in the second subframe if the second resources are not contained within a third wideband region with a same center frequency as the first resources. | Certain aspects of the present disclosure relate to methods and apparatus for applying rules to determine when to retune radio components of a user equipment (UE). Certain aspects of the present disclosure provide a method for wireless communications by a UE. The method includes determining first resources assigned to the UE in a first subframe and second resources assigned to the UE for uplink transmissions in a second subframe. The method further includes determining whether to retune radio frequency (RF) circuitry prior to transmitting in the second subframe based on at least one rule involving an overlap between the first resources and second resources.1. A method for wireless communications by a user equipment (UE), comprising:
determining first resources assigned to the UE in a first subframe and second resources assigned to the UE for uplink transmissions in a second subframe; and determining whether to retune radio frequency (RF) circuitry prior to transmitting in the second subframe based on at least one rule involving an overlap between the first resources and second resources. 2. The method of claim 1, wherein:
the first resources are assigned to the UE for downlink or uplink transmissions in a first bandwidth in the first subframe; the second resources are assigned to the UE for uplink transmissions in a second bandwidth in the second subframe; and the rule indicates the UE is to retune prior to transmitting in the second subframe if the first and second bandwidths are different. 3. The method of claim 1, wherein:
the first resources are assigned to the UE for downlink or uplink transmissions in a first bandwidth in the first subframe; the second resources are assigned to the UE for uplink transmissions in a second bandwidth in the second subframe; and the rule indicates the UE is not to retune if the first and second bandwidth have a same center frequency. 4. The method of claim 1, wherein:
the first resources are within a first wideband region that includes a set of narrowband regions; and the rule indicates the UE is to retune prior to transmitting in the second subframe if the second resources are not contained within the first wideband region. 5. The method of claim 1, wherein:
one or more physical resource blocks (PRBs) of the first resources occupy at least a part of a first wideband region and at least a part of a second wideband region; and the rule indicates the UE is to retune prior to transmitting in the second subframe if the second resources are not contained within a third wideband region with a same center frequency as the first resources. 6. The method of claim 5, wherein the third wideband region has a 5 MHz bandwidth. 7. The method of claim 4, wherein the rule indicates that the UE is to retune if at least one physical resource block (PRB) of the first resources falls within a different wideband region than at least one PRB of the second resources. 8. The method of claim 1, wherein:
the rule indicates the UE is to retune prior to transmitting in the second subframe if the second resources are not entirely contained within the first resources. 9. The method of claim 8, wherein:
the first resources occupy a first set of one or more narrowbands; the second resources occupy a second set of one or more narrowbands; and the rule indicates that the UE is to retune if the second set of narrowbands is not contained within the first set of narrowbands. 10. The method of claim 8, wherein:
the first resources occupy a first set of one or more wideband regions, each spanning a set of narrowbands; the second resources occupy a second set of one or more wideband regions, each spanning a set of narrowbands; and the rule indicates that the UE is to retune if the second set of wideband regions is not contained within the first set of wideband regions. 11. The method of claim 1, wherein:
the first resources occupy a first set of one or more wideband regions, each spanning a set of narrowbands; the second resources occupy a second set of one or more wideband regions, each spanning a set of narrowbands; and the rule indicates that the UE is to retune if the first set of wideband regions is different than the second set of wideband regions. 12. The method of claim 1, wherein:
the first resources are entirely contained within at least two different wideband regions in the first subframe, wherein each wideband region spans a set of narrowbands and one of the wideband regions is selected as an operating wideband for the first subframe; the second resources are entirely contained within at least two different wideband regions in the second subframe, wherein each wideband region spans a set of narrowbands and one of the wideband regions is selected as an operating wideband for the first subframe; and the rule indicates that the UE is to retune if the operating wideband of the second subframe is different than the operating wideband of the first subframe. 13. The method of claim 12, wherein a wideband region having a lower index is selected as the operating wideband for each subframe. 14. The method of claim 1, further comprising:
selecting a bandwidth operating mode of the UE based, at least in part on the rule. 15. The method of claim 14, wherein the bandwidth operating mode is selected in an effort to reduce an amount of retuning. 16. The method of claim 1, wherein:
the rule indicates that, if resources needed for a sounding reference signal (SRS) in the second subframe would result in retuning, the SRS is not transmitted. 17. The method of claim 1, wherein:
upon determining to retune the RF circuitry, one or two symbol durations are used by the UE for retuning, during which no signals are transmitted. 18. An apparatus for wireless communications, comprising:
a transmit processor configured to determine first resources assigned to the UE in a first subframe, to determine second resources assigned to the UE for the uplink transmissions in a second subframe, to apply at least one rule involving an overlap between the first resources and second resources, the at least one rule being used by the transmit processor to determine whether to retune radio frequency (RF) circuitry after uplink transmissions in the first subframe and prior to uplink transmissions in the second subframe; and a circuit in the RF circuitry that is configured to be retuned by the transmit processor prior to uplink transmissions in the second subframe if the transmit processor determines to retune the RF circuitry. 19. The apparatus of claim 18, wherein:
the first resources are assigned to the UE for downlink or uplink transmissions in a first bandwidth in the first subframe; the second resources are assigned to the UE for uplink transmissions in a second bandwidth in the second subframe; and the rule indicates the UE is to retune prior to transmitting in the second subframe if the first and second bandwidths are different. 20. The apparatus of claim 18, wherein:
the first resources are assigned to the UE for downlink or uplink transmissions in a first bandwidth in the first subframe; the second resources are assigned to the UE for uplink transmissions in a second bandwidth in the second subframe; and the rule indicates the UE is not to retune if the first and second bandwidth have a same center frequency. 21. The apparatus of claim 18, wherein:
the first resources are within a first wideband region that includes a set of narrowband regions; and the rule indicates the UE is to retune prior to transmitting in the second subframe if the second resources are not contained within the first wideband region. 22. The apparatus of claim 18, wherein:
one or more physical resource blocks (PRBs) of the first resources occupy at least a part of a first wideband region and at least a part of a second wideband region; and the rule indicates the UE is to retune prior to transmitting in the second subframe if the second resources are not contained within a third wideband region with a same center frequency as the first resources. 23. The apparatus of claim 22, wherein the third wideband region has a 5 MHz bandwidth. 24. The apparatus of claim 21, wherein the rule indicates that the UE is to retune if at least one physical resource block (PRB) of the first resources falls within a different wideband region than at least one PRB of the second resources. 25. The apparatus of claim 18, wherein:
the rule indicates the UE is to retune prior to transmitting in the second subframe if the second resources are not entirely contained within the first resources. 26. The apparatus of claim 25, wherein:
the first resources occupy a first set of one or more narrowbands; the second resources occupy a second set of one or more narrowbands; and the rule indicates that the UE is to retune if the second set of narrowbands is not contained within the first set of narrowbands. 27. The apparatus of claim 25, wherein:
the first resources occupy a first set of one or more wideband regions, each spanning a set of narrowbands; the second resources occupy a second set of one or more wideband regions, each spanning a set of narrowbands; and the rule indicates that the UE is to retune if the second set of wideband regions is not contained within the first set of wideband regions. 28. The apparatus of claim 18, wherein:
the first resources occupy a first set of one or more wideband regions, each spanning a set of narrowbands; the second resources occupy a second set of one or more wideband regions, each spanning a set of narrowbands; and the rule indicates that the UE is to retune if the first set of wideband regions is different than the second set of wideband regions. 29. The apparatus of claim 18, wherein:
the first resources are entirely contained within at least two different wideband regions in the first subframe, wherein each wideband region spans a set of narrowbands and one of the wideband regions is selected as an operating wideband for the first subframe; the second resources are entirely contained within at least two different wideband regions in the second subframe, wherein each wideband region spans a set of narrowbands and one of the wideband regions is selected as an operating wideband for the first subframe; and the rule indicates that the UE is to retune if the operating wideband of the second subframe is different than the operating wideband of the first subframe. 30. The apparatus of claim 29, wherein a wideband region having a lower index is selected as the operating wideband for each subframe. 31. The apparatus of claim 18, further comprising:
selecting a bandwidth operating mode of the UE based, at least in part on the rule. 32. The apparatus of claim 31, wherein the bandwidth operating mode is selected in an effort to reduce an amount of retuning. 33. The apparatus of claim 18, wherein:
the rule indicates that, if resources needed for a sounding reference signal (SRS) in the second subframe would result in retuning, the SRS is not transmitted. 34. The apparatus of claim 18, wherein:
upon determining to retune the RF circuitry, one or two symbol durations are used by the UE for retuning, during which no signals are transmitted. 35. An apparatus for wireless communications, comprising:
a means for determining first resources assigned to the UE in a first subframe and second resources assigned to the UE for uplink transmissions in a second subframe; and a means for determining whether to retune radio frequency (RF) circuitry prior to transmitting in the second subframe based on at least one rule involving an overlap between the first resources and second resources. 36. The apparatus of claim 35, wherein:
the first resources are within a first wideband region that includes a set of narrowband regions; and the rule indicates the UE is to retune prior to transmitting in the second subframe if the second resources are not contained within the first wideband region. 37. The apparatus of claim 35, wherein:
one or more physical resource blocks (PRBs) of the first resources occupy at least a part of a first wideband region and at least a part of a second wideband region; and the rule indicates the UE is to retune prior to transmitting in the second subframe if the second resources are not contained within a third wideband region with a same center frequency as the first resources. | 2,400 |
7,789 | 7,789 | 14,872,748 | 2,426 | Systems and methods are described for enabling a user to bias the type of media content made available to a user account through a localized content dashboard. In one implementation, a method for adjusting media content availability associated with a user account configured to receive media content from a server system over a network, includes displaying on a content playback system a localized content dashboard, including: a summary of attributes of media content accessed by the user account, where the summary of the attributes is based on metadata associated with the accessed media content; and controls for biasing the attributes of media content delivered to the user account. The content playback system receives data corresponding to user input actuating one of the controls; and in response to receiving the data, transmits over the network to the server system data associated with the media content attribute biased by the user input. | 1. A graphical user interface method for adjusting media content availability associated with a user account configured to receive media content from a server system over a network, comprising:
displaying on a display of a content playback system a localized content dashboard comprising:
a summary of attributes of media content accessed by the user account, wherein the summary of the attributes of the media content is based on metadata associated with the accessed media content; and
a plurality of controls for biasing a plurality of attributes of media content delivered to the user account;
receiving data corresponding to user input at the content playback system actuating one of the plurality of controls for biasing attributes of the media content delivered to the user account by the server system; and in response to receiving the data, the content playback system transmitting over the network to the server system data associated with the media content attribute biased by the user input actuating one of the plurality of controls. 2. The method of claim 1, wherein the user account is associated with a minor, and wherein the method further comprises: prior to displaying the localized content dashboard determining if the current user using the content playback system is authorized to access the localized content dashboard. 3. The method of claim 1, wherein the a plurality of attributes of media content delivered to the user account comprise at least two of: a content genre, a lead character type of the content, a brand or franchise associated with the content, an action type associated with the content, and an educational subject associated with the content. 4. The method of claim 1, further comprising:
receiving user account personalization data from the server system in response to transmitting to the server system data associated with the media content attribute biased by the user input; and displaying on the display a personalized content user interface view for the user account based on the received personalization data. 5. The method of claim 1, wherein the plurality of controls comprise a plurality of sliders for biasing the media content attributes. 6. The method of claim 1, wherein the server system is a content delivery network. 7. The method of claim 6, wherein the content playback system comprise a smart television, a gaming console, a mobile device with a display, or a set top box. 8. The method of claim 3, wherein the localized content dashboard displays current and desired user viewing habits associated with the user account. 9. The method of claim 3, wherein the localized content dashboard displays content viewing trends over time by the user account. 10. A content playback system for adjusting media content availability associated with a user account configured to receive media content from a server system over a network, comprising:
a display; one or more processors; and one or more non-transitory computer-readable mediums operatively coupled to at least one of the one or more processors and having instructions stored thereon that, when executed by at least one of the one or more processors, cause the content playback system to:
display on the display a localized content dashboard comprising:
a summary of attributes of media content accessed by the user account, wherein the summary of the attributes of the media content is based on metadata associated with the accessed media content; and
a plurality of controls for biasing a plurality of attributes of media content delivered to the user account;
receive data corresponding to user input at the content playback system actuating one of the plurality of controls for biasing attributes of the media content delivered to the user account by the server system; and
in response to receiving the data, transmitting over the network to the server system data associated with the media content attribute biased by the user input actuating one of the plurality of controls. 11. The content playback system of claim 10, wherein the user account is associated with a minor, and wherein the instructions when executed by at least one of the one or more processors, further cause the content playback system to: determine if the current user using the content playback system is authorized to access the localized content dashboard prior to displaying the localized content dashboard. 12. The content playback system of claim 10, wherein the a plurality of attributes of media content delivered to the user account comprise at least two of: a content genre, a lead character type of the content, a brand or franchise associated with the content, an action type associated with the content, and an educational subject associated with the content. 13. The content playback system of claim 10, wherein the instructions when executed by at least one of the one or more processors, further cause the content playback system to:
receive user account personalization data from the server system in response to transmitting to the server system data associated with the media content attribute biased by the user input; and display on the display a personalized content user interface view for the user account based on the received personalization data. 14. The content playback system of claim 10, wherein the plurality of controls comprise a plurality of sliders for biasing the media content attributes. 15. The content playback system of claim 10, wherein the server system is a content delivery network. 16. The content playback system of claim 15, wherein the content playback system comprise a smart television, a gaming console, a mobile device with a display, or a set top box. 17. The content playback system of claim 12, wherein the localized content dashboard displays current and desired user viewing habits associated with the user account. 18. The content playback system of claim 12, wherein the localized content dashboard displays content viewing trends over time by the user account. 19. A method for adjusting media content availability associated with a user account configured to receive media content from a server system over a network, comprising the server system:
receiving over the network from a content playback device:
account information identifying the user account; and
data associated with a media content attribute biased by user input at the content playback device actuating one of a plurality of controls for biasing a plurality of attributes of the media content delivered to the user account by the server system;
storing the received data at the server system; and based on the received data, applying personalized machine learning of the user account's media content preferences, wherein the personalized machine learning is used to generated a personalized media content graphical user interface for the user account at the content playback device. 20. The method of claim 19, wherein the step of receiving data associated with a media content attribute biased by user input comprises receiving data associated with a plurality of media content attributes biased by user input at the content playback device, and wherein the plurality of biased media content attributes comprise at least two of: a content genre, a lead character type of the content, a brand or franchise associated with the content, an action type associated with the content, and an educational subject associated with the content. | Systems and methods are described for enabling a user to bias the type of media content made available to a user account through a localized content dashboard. In one implementation, a method for adjusting media content availability associated with a user account configured to receive media content from a server system over a network, includes displaying on a content playback system a localized content dashboard, including: a summary of attributes of media content accessed by the user account, where the summary of the attributes is based on metadata associated with the accessed media content; and controls for biasing the attributes of media content delivered to the user account. The content playback system receives data corresponding to user input actuating one of the controls; and in response to receiving the data, transmits over the network to the server system data associated with the media content attribute biased by the user input.1. A graphical user interface method for adjusting media content availability associated with a user account configured to receive media content from a server system over a network, comprising:
displaying on a display of a content playback system a localized content dashboard comprising:
a summary of attributes of media content accessed by the user account, wherein the summary of the attributes of the media content is based on metadata associated with the accessed media content; and
a plurality of controls for biasing a plurality of attributes of media content delivered to the user account;
receiving data corresponding to user input at the content playback system actuating one of the plurality of controls for biasing attributes of the media content delivered to the user account by the server system; and in response to receiving the data, the content playback system transmitting over the network to the server system data associated with the media content attribute biased by the user input actuating one of the plurality of controls. 2. The method of claim 1, wherein the user account is associated with a minor, and wherein the method further comprises: prior to displaying the localized content dashboard determining if the current user using the content playback system is authorized to access the localized content dashboard. 3. The method of claim 1, wherein the a plurality of attributes of media content delivered to the user account comprise at least two of: a content genre, a lead character type of the content, a brand or franchise associated with the content, an action type associated with the content, and an educational subject associated with the content. 4. The method of claim 1, further comprising:
receiving user account personalization data from the server system in response to transmitting to the server system data associated with the media content attribute biased by the user input; and displaying on the display a personalized content user interface view for the user account based on the received personalization data. 5. The method of claim 1, wherein the plurality of controls comprise a plurality of sliders for biasing the media content attributes. 6. The method of claim 1, wherein the server system is a content delivery network. 7. The method of claim 6, wherein the content playback system comprise a smart television, a gaming console, a mobile device with a display, or a set top box. 8. The method of claim 3, wherein the localized content dashboard displays current and desired user viewing habits associated with the user account. 9. The method of claim 3, wherein the localized content dashboard displays content viewing trends over time by the user account. 10. A content playback system for adjusting media content availability associated with a user account configured to receive media content from a server system over a network, comprising:
a display; one or more processors; and one or more non-transitory computer-readable mediums operatively coupled to at least one of the one or more processors and having instructions stored thereon that, when executed by at least one of the one or more processors, cause the content playback system to:
display on the display a localized content dashboard comprising:
a summary of attributes of media content accessed by the user account, wherein the summary of the attributes of the media content is based on metadata associated with the accessed media content; and
a plurality of controls for biasing a plurality of attributes of media content delivered to the user account;
receive data corresponding to user input at the content playback system actuating one of the plurality of controls for biasing attributes of the media content delivered to the user account by the server system; and
in response to receiving the data, transmitting over the network to the server system data associated with the media content attribute biased by the user input actuating one of the plurality of controls. 11. The content playback system of claim 10, wherein the user account is associated with a minor, and wherein the instructions when executed by at least one of the one or more processors, further cause the content playback system to: determine if the current user using the content playback system is authorized to access the localized content dashboard prior to displaying the localized content dashboard. 12. The content playback system of claim 10, wherein the a plurality of attributes of media content delivered to the user account comprise at least two of: a content genre, a lead character type of the content, a brand or franchise associated with the content, an action type associated with the content, and an educational subject associated with the content. 13. The content playback system of claim 10, wherein the instructions when executed by at least one of the one or more processors, further cause the content playback system to:
receive user account personalization data from the server system in response to transmitting to the server system data associated with the media content attribute biased by the user input; and display on the display a personalized content user interface view for the user account based on the received personalization data. 14. The content playback system of claim 10, wherein the plurality of controls comprise a plurality of sliders for biasing the media content attributes. 15. The content playback system of claim 10, wherein the server system is a content delivery network. 16. The content playback system of claim 15, wherein the content playback system comprise a smart television, a gaming console, a mobile device with a display, or a set top box. 17. The content playback system of claim 12, wherein the localized content dashboard displays current and desired user viewing habits associated with the user account. 18. The content playback system of claim 12, wherein the localized content dashboard displays content viewing trends over time by the user account. 19. A method for adjusting media content availability associated with a user account configured to receive media content from a server system over a network, comprising the server system:
receiving over the network from a content playback device:
account information identifying the user account; and
data associated with a media content attribute biased by user input at the content playback device actuating one of a plurality of controls for biasing a plurality of attributes of the media content delivered to the user account by the server system;
storing the received data at the server system; and based on the received data, applying personalized machine learning of the user account's media content preferences, wherein the personalized machine learning is used to generated a personalized media content graphical user interface for the user account at the content playback device. 20. The method of claim 19, wherein the step of receiving data associated with a media content attribute biased by user input comprises receiving data associated with a plurality of media content attributes biased by user input at the content playback device, and wherein the plurality of biased media content attributes comprise at least two of: a content genre, a lead character type of the content, a brand or franchise associated with the content, an action type associated with the content, and an educational subject associated with the content. | 2,400 |
7,790 | 7,790 | 15,085,869 | 2,495 | The present disclosure pertains to systems and methods for establishing trust relationships between a software defined network (SDN) controller and a SDN communication device. In one embodiment, a SDN controller may comprise a communications interface configured to communicate with a plurality of SDN network devices. A commissioning subsystem configured to detect a new device associated with the SDN. In response to a new device, a user interface subsystem may be configured to receive a user approval to commission the new device. A trust subsystem configured to establish a first SDN controller trusted credential and to transmit a first device trusted credential based on the first SDN controller credential to the new device. Programming instructions to the new device authenticated using the first SDN controller trusted credential by a SDN programming subsystem. | 1. A software defined network (SDN) controller, the SDN controller comprising:
a communications interface configured to communicate with a plurality of SDN network devices; a commissioning subsystem configured to detect a new device associated with the SDN; a user interface subsystem configured to receive a user approval to commission the new device; a trust subsystem configured to:
establish a first SDN controller trusted credential;
transmit a first device trusted credential based on the first SDN controller credential to the new device;
a SDN programming subsystem configured to issue programming instructions to the new device authenticated using the first SDN controller trusted credential. 2. The SDN controller of claim 1, wherein the first SDN controller trusted credential comprises a Public Key Infrastructure (PKI) certificate. 3. The SDN controller of claim 2, wherein the first device trusted credential comprises a public key of the PKI certificate. 4. The SDN controller of claim 1, wherein the trust subsystem is further configured to create a communication certificate configured to encrypt communications transmitted by the new device. 5. The SDN controller of claim 1, wherein the trust subsystem is further configured to:
establish a second SDN controller trusted credential; and transmit a second device trusted credential based on the second SDN controller credential to the new device. 6. The SDN controller of claim 5, wherein the trust subsystem is further configured to:
determine that the first SDN controller trusted credential is compromised; revoke the first device trusted credential; and establish a second device trusted credential based on the second SDN controller credential. 7. The SDN controller of claim 1, wherein the commissioning subsystem is configured to detect the new device based on receipt of an initial certificate from the new device. 8. The SDN controller of claim 7, wherein the commissioning subsystem is further configured to remove the initial certificate from the new device. 9. The SDN controller of claim 8, wherein the initial certificate is configured to indicate that the new device is in a factory configured state. 10. The SDN controller of claim 1, wherein the commissioning subsystem is configured to prevent commissioning of the new device until the user approval is received. 11. A method for implementing a trusted relationship in a software defined network (SDN), comprising:
establishing a first SDN controller trusted credential; detecting a new device associated with the SDN; receiving user approval to commission the new device; transmitting a first device trusted credential based on the first SDN controller credential to the new device; and issuing programming instructions to the new device, the programming instructions comprising authentication information based on the first SDN controller trusted credential. 12. The method of claim 11, wherein the first trusted credential comprises a Public Key Infrastructure (PKI) certificate. 13. The method of claim 12, wherein the trusted credential comprises a public key of the PKI certificate. 14. The method of claim 11, further comprising:
creating a communication certificate for use by the new device; encrypting communications transmitted by the new device using the communication certificate. 15. The method of claim 11, further comprising:
establishing a second SDN controller trusted credential; and transmitting a second device trusted credential based on the second SDN controller credential to the new device. 16. The method of claim 15, further comprising:
determining that the first SDN controller trusted credential is compromised; revoking the first device programming credential; and establishing a second device programming credential based on the second trusted credential. 17. The method of claim 16, further comprising:
continuing communication among a plurality of devices in the SDN following revoking the first device programming credential. 18. The method of claim 11, wherein detecting the new device associated with the SDN comprises receiving an initial certificate from the new device. 19. The method of claim 17, further comprising removing the initial certificate from the new device. 20. The method of claim 11, wherein the initial certificate is configured to indicate that the new device is in a factory configured state. | The present disclosure pertains to systems and methods for establishing trust relationships between a software defined network (SDN) controller and a SDN communication device. In one embodiment, a SDN controller may comprise a communications interface configured to communicate with a plurality of SDN network devices. A commissioning subsystem configured to detect a new device associated with the SDN. In response to a new device, a user interface subsystem may be configured to receive a user approval to commission the new device. A trust subsystem configured to establish a first SDN controller trusted credential and to transmit a first device trusted credential based on the first SDN controller credential to the new device. Programming instructions to the new device authenticated using the first SDN controller trusted credential by a SDN programming subsystem.1. A software defined network (SDN) controller, the SDN controller comprising:
a communications interface configured to communicate with a plurality of SDN network devices; a commissioning subsystem configured to detect a new device associated with the SDN; a user interface subsystem configured to receive a user approval to commission the new device; a trust subsystem configured to:
establish a first SDN controller trusted credential;
transmit a first device trusted credential based on the first SDN controller credential to the new device;
a SDN programming subsystem configured to issue programming instructions to the new device authenticated using the first SDN controller trusted credential. 2. The SDN controller of claim 1, wherein the first SDN controller trusted credential comprises a Public Key Infrastructure (PKI) certificate. 3. The SDN controller of claim 2, wherein the first device trusted credential comprises a public key of the PKI certificate. 4. The SDN controller of claim 1, wherein the trust subsystem is further configured to create a communication certificate configured to encrypt communications transmitted by the new device. 5. The SDN controller of claim 1, wherein the trust subsystem is further configured to:
establish a second SDN controller trusted credential; and transmit a second device trusted credential based on the second SDN controller credential to the new device. 6. The SDN controller of claim 5, wherein the trust subsystem is further configured to:
determine that the first SDN controller trusted credential is compromised; revoke the first device trusted credential; and establish a second device trusted credential based on the second SDN controller credential. 7. The SDN controller of claim 1, wherein the commissioning subsystem is configured to detect the new device based on receipt of an initial certificate from the new device. 8. The SDN controller of claim 7, wherein the commissioning subsystem is further configured to remove the initial certificate from the new device. 9. The SDN controller of claim 8, wherein the initial certificate is configured to indicate that the new device is in a factory configured state. 10. The SDN controller of claim 1, wherein the commissioning subsystem is configured to prevent commissioning of the new device until the user approval is received. 11. A method for implementing a trusted relationship in a software defined network (SDN), comprising:
establishing a first SDN controller trusted credential; detecting a new device associated with the SDN; receiving user approval to commission the new device; transmitting a first device trusted credential based on the first SDN controller credential to the new device; and issuing programming instructions to the new device, the programming instructions comprising authentication information based on the first SDN controller trusted credential. 12. The method of claim 11, wherein the first trusted credential comprises a Public Key Infrastructure (PKI) certificate. 13. The method of claim 12, wherein the trusted credential comprises a public key of the PKI certificate. 14. The method of claim 11, further comprising:
creating a communication certificate for use by the new device; encrypting communications transmitted by the new device using the communication certificate. 15. The method of claim 11, further comprising:
establishing a second SDN controller trusted credential; and transmitting a second device trusted credential based on the second SDN controller credential to the new device. 16. The method of claim 15, further comprising:
determining that the first SDN controller trusted credential is compromised; revoking the first device programming credential; and establishing a second device programming credential based on the second trusted credential. 17. The method of claim 16, further comprising:
continuing communication among a plurality of devices in the SDN following revoking the first device programming credential. 18. The method of claim 11, wherein detecting the new device associated with the SDN comprises receiving an initial certificate from the new device. 19. The method of claim 17, further comprising removing the initial certificate from the new device. 20. The method of claim 11, wherein the initial certificate is configured to indicate that the new device is in a factory configured state. | 2,400 |
7,791 | 7,791 | 13,855,502 | 2,487 | Systems and methods for associating images with location and/or other information. In some cases, the systems include an image sensor, a location sensor, and a microprocessor. The microprocessor is communicably coupled to a computer readable medium that includes instructions executable by the microprocessor to: receive a location from the location sensor; receive an image from the image sensor; and associate the location with the image. Some of the methods provide for capturing an object image of an object using an image sensor; capturing a location of the image sensor; and associating the location with the object image. Other methods and systems are also disclosed. | 1. A wireless communication device, comprising:
a wireless radio; a location sensor; a direction sensor; an image sensor; a distance sensor; a display device; a microprocessor communicably coupled with the wireless radio, the location sensor, the direction sensor, the image sensor, the distance sensor, and the display device; and a computer readable medium, wherein the computer readable medium includes instructions executable by the microprocessor to:
receive a first location from the location sensor, the first location being a location of the location sensor;
receive video from the image sensor, the video comprising a plurality of captured images; and
receive a direction from the direction sensor;
receive a distance from the distance sensor;
calculate a second location based at least in part on the first location, the direction, and the distance, the second location being a location of an object in the captured images;
transmit, with the wireless radio, the location of the object to a query database;
receive, with the wireless radio, descriptive information about the object from the query database; and
cause the display device to display at least some of the descriptive information along with a live display of the video; and
update the descriptive information in real time when the image sensor captures images of different objects. 2. A system for providing descriptive information about an objects, the system comprising:
a location sensor; a direction sensor; an image sensor; a display device; a microprocessor; and a computer readable medium, wherein the computer readable medium includes instructions executable by the microprocessor to:
receive a first location from the location sensor, the first location being a location of the location sensor;
receive video from the image sensor, the video comprising a plurality of images;
receive a direction from the direction sensor;
calculate a second location based at least in part on the first location and the direction, the second location being a location of an object in the captured images;
provide the location of the object to a query database;
receive, from the query database, descriptive information about the object; and
cause the display device to display at least some of the descriptive information along with a live display of the video. 3. The system of claim 2, wherein the instructions are further executable by the processor to store one of the captured images along with the descriptive information about the object. 4. The system of claim 2, further comprising a distance sensor, and wherein calculating a second location comprises calculating a second location based at least in part on the first location, the direction, and a distance received from the distance sensor. 5. The system of claim 2, wherein the system is incorporated within a wireless phone. 6. The system of claim 2, wherein the object is a landmark, and wherein the descriptive information about the object is selected from a group consisting of: historic information, access rates, driving directions, parking information, and walking directions. 7. The system of claim 2, wherein the object is a restaurant, and wherein the descriptive information about the object includes a menu for the restaurant. 8. The system of claim 2, wherein the display is operable to display further information selected from the following: the location of the image sensor, the direction of the image sensor, the distance, and the location of the object. 9. The system of claim 2, wherein the instructions are further executable by the microprocessor to update the descriptive information in real time when the image sensor captures images of different objects. 10. The system of claim 2, wherein the instructions are further executable by the microprocessor to associate the location from the location sensor with successive frames of the image from the image sensor. 11. A method for obtaining location information in relation to an object 2 image, the method comprising:
capturing video with an imaging device, the imaging device comprising an image sensor, a direction sensor, a location sensor, a display device, and a microprocessor; detecting, with the location sensor, a first location, the first location being a location of the location sensor; capturing video with the image sensor, the video comprising a plurality of images; determining, with the direction sensor, a direction of the image sensor; calculating, with the microprocessor, a second location based at least in part on the first location and the direction, the second location being a location of an object in the captured images; providing, with the imaging device, the location of the object to a query database; receiving, from the query database, descriptive information about the object; and displaying, with display device, at least some of the descriptive information along with a live display of the video. 12. The method of claim 11, further comprising:
storing one of the captured images along with the descriptive information about the object. 13. The method of claim 11, wherein the imaging device further comprises a distance sensor, and wherein calculating a second location comprises calculating a second location based at least in part on the first location, the direction, and a distance captured by the distance sensor. 14. The method of claim 11, wherein the imaging device is incorporated within a wireless phone. 15. The method of claim 11, wherein the object is a landmark, and wherein the descriptive information about the object is selected from a group consisting of: historic information, access rates, driving directions, parking information, and walking directions. 16. The method of claim 11, wherein the object is a restaurant, and wherein the descriptive information about the object includes a menu for the restaurant. 17. The method of claim 11, further comprising:
displaying, with the display device, further information selected from the following: the location of the image sensor, the direction of the image sensor, the distance, and the location of the object. 18. The method of claim 11, further comprising:
updating the descriptive information in real time when the image sensor captures images of different objects. 19. The method of claim 11, further comprising:
associating the location from the location sensor with successive frames of the image from the image sensor. 20. The method of claim 11, wherein the imaging device further comprises a wireless radio, and wherein providing the location of the object to a query database comprises transmitting the location of the object with the wireless radio. | Systems and methods for associating images with location and/or other information. In some cases, the systems include an image sensor, a location sensor, and a microprocessor. The microprocessor is communicably coupled to a computer readable medium that includes instructions executable by the microprocessor to: receive a location from the location sensor; receive an image from the image sensor; and associate the location with the image. Some of the methods provide for capturing an object image of an object using an image sensor; capturing a location of the image sensor; and associating the location with the object image. Other methods and systems are also disclosed.1. A wireless communication device, comprising:
a wireless radio; a location sensor; a direction sensor; an image sensor; a distance sensor; a display device; a microprocessor communicably coupled with the wireless radio, the location sensor, the direction sensor, the image sensor, the distance sensor, and the display device; and a computer readable medium, wherein the computer readable medium includes instructions executable by the microprocessor to:
receive a first location from the location sensor, the first location being a location of the location sensor;
receive video from the image sensor, the video comprising a plurality of captured images; and
receive a direction from the direction sensor;
receive a distance from the distance sensor;
calculate a second location based at least in part on the first location, the direction, and the distance, the second location being a location of an object in the captured images;
transmit, with the wireless radio, the location of the object to a query database;
receive, with the wireless radio, descriptive information about the object from the query database; and
cause the display device to display at least some of the descriptive information along with a live display of the video; and
update the descriptive information in real time when the image sensor captures images of different objects. 2. A system for providing descriptive information about an objects, the system comprising:
a location sensor; a direction sensor; an image sensor; a display device; a microprocessor; and a computer readable medium, wherein the computer readable medium includes instructions executable by the microprocessor to:
receive a first location from the location sensor, the first location being a location of the location sensor;
receive video from the image sensor, the video comprising a plurality of images;
receive a direction from the direction sensor;
calculate a second location based at least in part on the first location and the direction, the second location being a location of an object in the captured images;
provide the location of the object to a query database;
receive, from the query database, descriptive information about the object; and
cause the display device to display at least some of the descriptive information along with a live display of the video. 3. The system of claim 2, wherein the instructions are further executable by the processor to store one of the captured images along with the descriptive information about the object. 4. The system of claim 2, further comprising a distance sensor, and wherein calculating a second location comprises calculating a second location based at least in part on the first location, the direction, and a distance received from the distance sensor. 5. The system of claim 2, wherein the system is incorporated within a wireless phone. 6. The system of claim 2, wherein the object is a landmark, and wherein the descriptive information about the object is selected from a group consisting of: historic information, access rates, driving directions, parking information, and walking directions. 7. The system of claim 2, wherein the object is a restaurant, and wherein the descriptive information about the object includes a menu for the restaurant. 8. The system of claim 2, wherein the display is operable to display further information selected from the following: the location of the image sensor, the direction of the image sensor, the distance, and the location of the object. 9. The system of claim 2, wherein the instructions are further executable by the microprocessor to update the descriptive information in real time when the image sensor captures images of different objects. 10. The system of claim 2, wherein the instructions are further executable by the microprocessor to associate the location from the location sensor with successive frames of the image from the image sensor. 11. A method for obtaining location information in relation to an object 2 image, the method comprising:
capturing video with an imaging device, the imaging device comprising an image sensor, a direction sensor, a location sensor, a display device, and a microprocessor; detecting, with the location sensor, a first location, the first location being a location of the location sensor; capturing video with the image sensor, the video comprising a plurality of images; determining, with the direction sensor, a direction of the image sensor; calculating, with the microprocessor, a second location based at least in part on the first location and the direction, the second location being a location of an object in the captured images; providing, with the imaging device, the location of the object to a query database; receiving, from the query database, descriptive information about the object; and displaying, with display device, at least some of the descriptive information along with a live display of the video. 12. The method of claim 11, further comprising:
storing one of the captured images along with the descriptive information about the object. 13. The method of claim 11, wherein the imaging device further comprises a distance sensor, and wherein calculating a second location comprises calculating a second location based at least in part on the first location, the direction, and a distance captured by the distance sensor. 14. The method of claim 11, wherein the imaging device is incorporated within a wireless phone. 15. The method of claim 11, wherein the object is a landmark, and wherein the descriptive information about the object is selected from a group consisting of: historic information, access rates, driving directions, parking information, and walking directions. 16. The method of claim 11, wherein the object is a restaurant, and wherein the descriptive information about the object includes a menu for the restaurant. 17. The method of claim 11, further comprising:
displaying, with the display device, further information selected from the following: the location of the image sensor, the direction of the image sensor, the distance, and the location of the object. 18. The method of claim 11, further comprising:
updating the descriptive information in real time when the image sensor captures images of different objects. 19. The method of claim 11, further comprising:
associating the location from the location sensor with successive frames of the image from the image sensor. 20. The method of claim 11, wherein the imaging device further comprises a wireless radio, and wherein providing the location of the object to a query database comprises transmitting the location of the object with the wireless radio. | 2,400 |
7,792 | 7,792 | 15,047,999 | 2,425 | Systems and methods for the remote verification and monitoring of conditions surrounding an alarm signal are disclosed. In an aspect, a security system can comprise a security gateway located at a premises, wherein the security gateway is operable to detect an alarm condition and to receive video of at least a portion of the premises relating to the alarm condition, a first network coupled to the security gateway, and a second network coupled to the security gateway. The security gateway can be configured to cause transfer of alarm information comprising at least a portion of the received video and a first notification of the alarm condition in substantially real time through only the first network. The security gateway can be further configured to cause transfer of a second notification of the alarm condition through the second network substantially simultaneously with causing transfer of the alarm information through the first network. | 1. A method comprising:
receiving, by a computing device in communication with a first network, a first notification of an alarm condition; receiving a video of at least a portion of a premises relating to the alarm condition via the first network, wherein one or more of the first notification and the video is received by the computing device in substantially real time via the first network; and receiving a second notification of the alarm condition via a second network, wherein a transmission of the second notification is substantially simultaneous with the transmission of the first notification. 2. The method of claim 1, wherein the first network is an IP network, an Ethernet-based network, the Internet, a frame relay network, a hybrid-fiber coaxial network, a fiber-optic network, a DSL network, an ATM network, a high-speed fixed wireless network, or a high-speed mobile network, or a combination thereof. 3. The method of claim 1, wherein the second network comprises a public switched telephone network, a fixed wireless network, or a mobile communications network, or a combination thereof. 4. The method of claim 1, wherein the computing device is associated with a security monitoring system. 5. The method of claim 1, wherein the computing device comprises a mobile device. 6. The method of claim 1, wherein the video of at least the portion of the premises relating to the alarm condition is received via the first network without causing transfer of the video through the second network. 7. A method comprising:
receiving, by software executing on a first device in communication with a first network, a first notification of an alarm condition; receiving, by the software executing on the first device, a video of at least a portion of a premises relating to the alarm condition, wherein one or more of the first notification and the video is received in substantially real time via the first network; and receiving, by software executing on a second device in communication with a second network, a second notification of the alarm condition, wherein a transmission of the second notification is substantially simultaneous with the transmission of the second notification. 8. The method of claim 7, wherein the first network is an IP network, an Ethernet-based network, the Internet, a frame relay network, a hybrid-fiber coaxial network, a fiber-optic network, a DSL network, an ATM network, a high-speed fixed wireless network, or a high-speed mobile network, or a combination thereof. 9. The method of claim 7, wherein the second network comprises a public switched telephone network, a fixed wireless network, or a mobile communications network, or a combination thereof. 10. The method of claim 7, wherein the first device is associated with a security monitoring system. 11. The method of claim 7, wherein the second device comprises a mobile device. 12. The method of claim 7, wherein the receiving, by the software executing on the first device, the video of at least the portion of the premises relating to the alarm condition is via only the first network. 13. A method comprising:
receiving, by a computing device in communication with a first network, a first notification of an alarm condition; receiving, by the computing device, a video of at least a portion of a premises relating to the alarm condition, wherein one or more of the first notification and the video is received by the computing device in substantially real time via the first network; and upon authentication of a user associated with the premises, allowing remote access by a remote device to the video of at least the portion of the premises relating to the alarm condition, wherein the remote device is in receipt, via a second network, of a second notification of the alarm condition. 14. The method of claim 13, wherein the first network is an IP network, an Ethernet-based network, the Internet, a frame relay network, a hybrid-fiber coaxial network, a fiber-optic network, a DSL network, an ATM network, a high-speed fixed wireless network, or a high-speed mobile network, or a combination thereof. 15. The method of claim 13, wherein the second network comprises a public switched telephone network, a fixed wireless network, or a mobile communications network, or a combination thereof. 16. The method of claim 13, wherein the computing device is associated with a security monitoring system. 17. The method of claim 13, wherein the computing device comprises a mobile device. 18. The method of claim 13, wherein the remote device comprises a mobile device. 19. The method of claim 13, wherein the receiving, by the computing device, the video of at least the portion of the premises relating to the alarm condition is via only the first network. 20. The method of claim 13, further comprising causing transmission of the video of at least the portion of the premises to the remote device. 21. A device comprising:
a first interface configured to receive a first notification of an alarm condition and a video of at least a portion of a premises relating to the alarm condition via a first network, wherein one or more of the first notification and the video is received by the first interface in substantially real time; and a second interface configured to receive a second notification of the alarm condition via a second network, wherein a transmission of the second notification is substantially simultaneous with the transmission of the first notification. 22. The device of claim 21, wherein the first network is an IP network, an Ethernet-based network, the Internet, a frame relay network, a hybrid-fiber coaxial network, a fiber-optic network, a DSL network, an ATM network, a high-speed fixed wireless network, or a high-speed mobile network, or a combination thereof. 23. The device of claim 21, wherein the second network comprises a public switched telephone network, a fixed wireless network, or a mobile communications network, or a combination thereof. 24. The device of claim 21, wherein the device comprises a computing device associated with a security monitoring system. 25. The device of claim 21, wherein the device comprises a mobile device. 26. The device of claim 21, wherein the first interface receives the video of at least the portion of the premises relating to the alarm condition via only the first network. 27. A system comprising:
first software executing on a first device in communication with a first network, the first software configured to receive a first notification of an alarm condition and a video of at least a portion of a premises relating to the alarm condition, wherein one or more of the first notification and the video is received in substantially real time via the first network; and second software executing on a second device in communication with a second network, wherein a transmission of the second notification is substantially simultaneous with the transmission of the second notification. 28. The system of claim 27, wherein the first network is an IP network, an Ethernet-based network, the Internet, a frame relay network, a hybrid-fiber coaxial network, a fiber-optic network, a DSL network, an ATM network, a high-speed fixed wireless network, or a high-speed mobile network, or a combination thereof. 29. The system of claim 27, wherein the second network comprises a public switched telephone network, a fixed wireless network, or a mobile communications network, or a combination thereof. 30. The system of claim 27, wherein the first device is associated with a security monitoring system. 31. The system of claim 27, wherein the second device comprises a mobile device. 32. The system of claim 27, wherein first software is configured to receive the video of at least the portion of the premises relating to the alarm condition via only the first network. 33. A system comprising:
a processor; and a memory in communication with the processor, the memory storing processor-executable instructions configured to:
receive, via a first network, a first notification of an alarm condition and a video of at least a portion of a premises relating to the alarm condition, wherein one or more of the first notification and the video is received by the first interface in substantially real time; and
upon authentication of a user associated with the premises, allow remote access to the video of at least the portion of the premises relating to the alarm condition by a remote device, wherein the remote device is in receipt, via a second network, of a second notification of the alarm condition received. 34. The system of claim 33, wherein the first network is an IP network, an Ethernet-based network, the Internet, a frame relay network, a hybrid-fiber coaxial network, a fiber-optic network, a DSL network, an ATM network, a high-speed fixed wireless network, or a high-speed mobile network, or a combination thereof. 35. The system of claim 33, wherein the second network comprises a public switched telephone network, a fixed wireless network, or a mobile communications network, or a combination thereof. 36. The system of claim 33, wherein the processor is associated with a security monitoring system. 37. The system of claim 33, wherein the remote device comprises a mobile device. 38. The system of claim 33, wherein the memory stores processor-executable instructions configured to receive the video of at least the portion of the premises relating to the alarm condition via only the first network. 39. The system of claim 33, wherein the memory stores processor-executable instructions configured to cause transmission of the video of at least the portion of the premises to the remote device. | Systems and methods for the remote verification and monitoring of conditions surrounding an alarm signal are disclosed. In an aspect, a security system can comprise a security gateway located at a premises, wherein the security gateway is operable to detect an alarm condition and to receive video of at least a portion of the premises relating to the alarm condition, a first network coupled to the security gateway, and a second network coupled to the security gateway. The security gateway can be configured to cause transfer of alarm information comprising at least a portion of the received video and a first notification of the alarm condition in substantially real time through only the first network. The security gateway can be further configured to cause transfer of a second notification of the alarm condition through the second network substantially simultaneously with causing transfer of the alarm information through the first network.1. A method comprising:
receiving, by a computing device in communication with a first network, a first notification of an alarm condition; receiving a video of at least a portion of a premises relating to the alarm condition via the first network, wherein one or more of the first notification and the video is received by the computing device in substantially real time via the first network; and receiving a second notification of the alarm condition via a second network, wherein a transmission of the second notification is substantially simultaneous with the transmission of the first notification. 2. The method of claim 1, wherein the first network is an IP network, an Ethernet-based network, the Internet, a frame relay network, a hybrid-fiber coaxial network, a fiber-optic network, a DSL network, an ATM network, a high-speed fixed wireless network, or a high-speed mobile network, or a combination thereof. 3. The method of claim 1, wherein the second network comprises a public switched telephone network, a fixed wireless network, or a mobile communications network, or a combination thereof. 4. The method of claim 1, wherein the computing device is associated with a security monitoring system. 5. The method of claim 1, wherein the computing device comprises a mobile device. 6. The method of claim 1, wherein the video of at least the portion of the premises relating to the alarm condition is received via the first network without causing transfer of the video through the second network. 7. A method comprising:
receiving, by software executing on a first device in communication with a first network, a first notification of an alarm condition; receiving, by the software executing on the first device, a video of at least a portion of a premises relating to the alarm condition, wherein one or more of the first notification and the video is received in substantially real time via the first network; and receiving, by software executing on a second device in communication with a second network, a second notification of the alarm condition, wherein a transmission of the second notification is substantially simultaneous with the transmission of the second notification. 8. The method of claim 7, wherein the first network is an IP network, an Ethernet-based network, the Internet, a frame relay network, a hybrid-fiber coaxial network, a fiber-optic network, a DSL network, an ATM network, a high-speed fixed wireless network, or a high-speed mobile network, or a combination thereof. 9. The method of claim 7, wherein the second network comprises a public switched telephone network, a fixed wireless network, or a mobile communications network, or a combination thereof. 10. The method of claim 7, wherein the first device is associated with a security monitoring system. 11. The method of claim 7, wherein the second device comprises a mobile device. 12. The method of claim 7, wherein the receiving, by the software executing on the first device, the video of at least the portion of the premises relating to the alarm condition is via only the first network. 13. A method comprising:
receiving, by a computing device in communication with a first network, a first notification of an alarm condition; receiving, by the computing device, a video of at least a portion of a premises relating to the alarm condition, wherein one or more of the first notification and the video is received by the computing device in substantially real time via the first network; and upon authentication of a user associated with the premises, allowing remote access by a remote device to the video of at least the portion of the premises relating to the alarm condition, wherein the remote device is in receipt, via a second network, of a second notification of the alarm condition. 14. The method of claim 13, wherein the first network is an IP network, an Ethernet-based network, the Internet, a frame relay network, a hybrid-fiber coaxial network, a fiber-optic network, a DSL network, an ATM network, a high-speed fixed wireless network, or a high-speed mobile network, or a combination thereof. 15. The method of claim 13, wherein the second network comprises a public switched telephone network, a fixed wireless network, or a mobile communications network, or a combination thereof. 16. The method of claim 13, wherein the computing device is associated with a security monitoring system. 17. The method of claim 13, wherein the computing device comprises a mobile device. 18. The method of claim 13, wherein the remote device comprises a mobile device. 19. The method of claim 13, wherein the receiving, by the computing device, the video of at least the portion of the premises relating to the alarm condition is via only the first network. 20. The method of claim 13, further comprising causing transmission of the video of at least the portion of the premises to the remote device. 21. A device comprising:
a first interface configured to receive a first notification of an alarm condition and a video of at least a portion of a premises relating to the alarm condition via a first network, wherein one or more of the first notification and the video is received by the first interface in substantially real time; and a second interface configured to receive a second notification of the alarm condition via a second network, wherein a transmission of the second notification is substantially simultaneous with the transmission of the first notification. 22. The device of claim 21, wherein the first network is an IP network, an Ethernet-based network, the Internet, a frame relay network, a hybrid-fiber coaxial network, a fiber-optic network, a DSL network, an ATM network, a high-speed fixed wireless network, or a high-speed mobile network, or a combination thereof. 23. The device of claim 21, wherein the second network comprises a public switched telephone network, a fixed wireless network, or a mobile communications network, or a combination thereof. 24. The device of claim 21, wherein the device comprises a computing device associated with a security monitoring system. 25. The device of claim 21, wherein the device comprises a mobile device. 26. The device of claim 21, wherein the first interface receives the video of at least the portion of the premises relating to the alarm condition via only the first network. 27. A system comprising:
first software executing on a first device in communication with a first network, the first software configured to receive a first notification of an alarm condition and a video of at least a portion of a premises relating to the alarm condition, wherein one or more of the first notification and the video is received in substantially real time via the first network; and second software executing on a second device in communication with a second network, wherein a transmission of the second notification is substantially simultaneous with the transmission of the second notification. 28. The system of claim 27, wherein the first network is an IP network, an Ethernet-based network, the Internet, a frame relay network, a hybrid-fiber coaxial network, a fiber-optic network, a DSL network, an ATM network, a high-speed fixed wireless network, or a high-speed mobile network, or a combination thereof. 29. The system of claim 27, wherein the second network comprises a public switched telephone network, a fixed wireless network, or a mobile communications network, or a combination thereof. 30. The system of claim 27, wherein the first device is associated with a security monitoring system. 31. The system of claim 27, wherein the second device comprises a mobile device. 32. The system of claim 27, wherein first software is configured to receive the video of at least the portion of the premises relating to the alarm condition via only the first network. 33. A system comprising:
a processor; and a memory in communication with the processor, the memory storing processor-executable instructions configured to:
receive, via a first network, a first notification of an alarm condition and a video of at least a portion of a premises relating to the alarm condition, wherein one or more of the first notification and the video is received by the first interface in substantially real time; and
upon authentication of a user associated with the premises, allow remote access to the video of at least the portion of the premises relating to the alarm condition by a remote device, wherein the remote device is in receipt, via a second network, of a second notification of the alarm condition received. 34. The system of claim 33, wherein the first network is an IP network, an Ethernet-based network, the Internet, a frame relay network, a hybrid-fiber coaxial network, a fiber-optic network, a DSL network, an ATM network, a high-speed fixed wireless network, or a high-speed mobile network, or a combination thereof. 35. The system of claim 33, wherein the second network comprises a public switched telephone network, a fixed wireless network, or a mobile communications network, or a combination thereof. 36. The system of claim 33, wherein the processor is associated with a security monitoring system. 37. The system of claim 33, wherein the remote device comprises a mobile device. 38. The system of claim 33, wherein the memory stores processor-executable instructions configured to receive the video of at least the portion of the premises relating to the alarm condition via only the first network. 39. The system of claim 33, wherein the memory stores processor-executable instructions configured to cause transmission of the video of at least the portion of the premises to the remote device. | 2,400 |
7,793 | 7,793 | 14,949,297 | 2,482 | A system includes a processor configured to display one or more vehicle camera images viewed by one or more vehicle cameras, on a vehicle display in response to a configuration request. The processor is also configured to capture one or more images upon user selection and store the images and corresponding user selected vehicle state data designating when the captured images should be used for an alert comparison. The same or a similar system can also utilize vehicle sensors in the same or similar manners. | 1. A system comprising:
a processor configured to: issue an alert to a user mobile device upon a determination that image data, captured in response to a vehicle-related state condition associated with the alert, correlates to stored image data designated to represent an alert condition. 2. The system of claim 1, wherein the stored image data includes data designating a spot in which a user should not park. 3. The system of claim 2, wherein the stored image data includes a fire hydrant. 4. The system of claim 2, wherein the stored image data includes handicapped parking indicia. 5. The system of claim 1, wherein the state condition includes a parked state. 6. The system of claim 1, wherein the state condition includes a location. 7. The system of claim 1, wherein the state condition includes a time of day. 8. The system of claim 1, wherein the state condition includes a user proximity-to-the-vehicle state. 9. The system of claim 1, wherein the stored image data includes object parameters to be compared to an object in the captured image data. 10. The system of claim 9, wherein the object parameters are usable by the processor to determine a distance to the object based on a known object size. 11. The system of claim 9, wherein the object parameters include parameters representing humans in various states of posture, and the determination includes comparing the object in the captured image data to the parameters representing humans to determine if a human is proximate to the vehicle. 12. A system comprising:
a processor configured to: issue an alert to a user mobile device upon a determination that sensor data parameters, captured in response to a vehicle-related state condition associated with the alert, correlate to stored sensor data parameters designated to represent an alert condition. 13. The system of claim 12, wherein the state condition includes a parked condition. 14. The system of claim 12, wherein the stored sensor data parameters include a distance-to-object parameter. 15. The system of claim 12, wherein the stored sensor data parameters include a distance needed to open a vehicle door, and the determination includes comparing captured distance to objects proximate to the vehicle door to the distance needed to open the door. 16. The system of claim 12, wherein the state condition includes a vehicle location. 17. The system of claim 12, wherein the state condition includes a user proximity-to-the-vehicle state. 18. The system of claim 12, wherein the sensor data parameters include parameters defining motion within a predefined distance of a vehicle exterior. 19. The system of claim 12, wherein the state condition includes a time of day. 20. A system comprising:
a processor configured to: display one or more vehicle camera images viewed by one or more vehicle cameras, on a vehicle display in response to a configuration request; capture one or more images upon user selection; and store the images and corresponding user selected vehicle state data designating when the captured images should be used for an alert comparison. | A system includes a processor configured to display one or more vehicle camera images viewed by one or more vehicle cameras, on a vehicle display in response to a configuration request. The processor is also configured to capture one or more images upon user selection and store the images and corresponding user selected vehicle state data designating when the captured images should be used for an alert comparison. The same or a similar system can also utilize vehicle sensors in the same or similar manners.1. A system comprising:
a processor configured to: issue an alert to a user mobile device upon a determination that image data, captured in response to a vehicle-related state condition associated with the alert, correlates to stored image data designated to represent an alert condition. 2. The system of claim 1, wherein the stored image data includes data designating a spot in which a user should not park. 3. The system of claim 2, wherein the stored image data includes a fire hydrant. 4. The system of claim 2, wherein the stored image data includes handicapped parking indicia. 5. The system of claim 1, wherein the state condition includes a parked state. 6. The system of claim 1, wherein the state condition includes a location. 7. The system of claim 1, wherein the state condition includes a time of day. 8. The system of claim 1, wherein the state condition includes a user proximity-to-the-vehicle state. 9. The system of claim 1, wherein the stored image data includes object parameters to be compared to an object in the captured image data. 10. The system of claim 9, wherein the object parameters are usable by the processor to determine a distance to the object based on a known object size. 11. The system of claim 9, wherein the object parameters include parameters representing humans in various states of posture, and the determination includes comparing the object in the captured image data to the parameters representing humans to determine if a human is proximate to the vehicle. 12. A system comprising:
a processor configured to: issue an alert to a user mobile device upon a determination that sensor data parameters, captured in response to a vehicle-related state condition associated with the alert, correlate to stored sensor data parameters designated to represent an alert condition. 13. The system of claim 12, wherein the state condition includes a parked condition. 14. The system of claim 12, wherein the stored sensor data parameters include a distance-to-object parameter. 15. The system of claim 12, wherein the stored sensor data parameters include a distance needed to open a vehicle door, and the determination includes comparing captured distance to objects proximate to the vehicle door to the distance needed to open the door. 16. The system of claim 12, wherein the state condition includes a vehicle location. 17. The system of claim 12, wherein the state condition includes a user proximity-to-the-vehicle state. 18. The system of claim 12, wherein the sensor data parameters include parameters defining motion within a predefined distance of a vehicle exterior. 19. The system of claim 12, wherein the state condition includes a time of day. 20. A system comprising:
a processor configured to: display one or more vehicle camera images viewed by one or more vehicle cameras, on a vehicle display in response to a configuration request; capture one or more images upon user selection; and store the images and corresponding user selected vehicle state data designating when the captured images should be used for an alert comparison. | 2,400 |
7,794 | 7,794 | 15,434,478 | 2,426 | In one aspect, an example method for outputting an alert indicating a functional state of a back-up media-broadcast system involves: a computing device determining first bitrate-data associated with a first compressed media-stream; the computing device determining second bitrate-data associated with a second compressed media-stream; the computing device making a determination that the determined first bitrate-data and the determined second bitrate-data lack a threshold extent of similarity; and responsive to the determination that the determined first bitrate-data and the determined second bitrate-data lack the threshold extent of similarity, the computing device outputting an alert. | 1. A method for outputting an alert indicating a functional state of a back-up media-broadcast system, the method comprising:
a computing device determining first bitrate-data associated with a first compressed media-stream; the computing device determining second bitrate-data associated with a second compressed media-stream; the computing device making a determination that the determined first bitrate-data and the determined second bitrate-data lack a threshold extent of similarity; and responsive to the determination that the determined first bitrate-data and the determined second bitrate-data lack the threshold extent of similarity, the computing device outputting an alert. 2. The method of claim 1, wherein the determined first bitrate-data associated with the first compressed media-stream indicates a first average bitrate-change over a first temporal-portion of the first compressed media-stream, and wherein the first temporal-portion of the first compressed media-stream corresponds to a time period. 3. The method of claim 2, wherein making the determination that the determined first bitrate-data and the determined second bitrate-data lack the threshold extent of similarity comprises determining that the determined second bitrate-data associated with the second compressed media-stream does not indicate (i) a second average bitrate-change over a second temporal-portion of the second compressed media-stream, (ii) where the second temporal-portion of the second compressed media-stream corresponds to the time period, and (iii) where the second average bitrate-change is within a tolerance range of the first average bitrate-change. 4. The method of claim 1, wherein the determined first bitrate-data associated with the first compressed media-stream indicates an occurrence of a first bitrate-change within the first compressed media-stream, and wherein making the determination that the first bitrate-data and the determined second bitrate-data lack a threshold extent of similarity comprises determining that the determined second bitrate-data does not indicate an occurrence of a second bitrate-change that is within the second compressed media-stream and that is within a tolerance range of the first bitrate-change. 5. The method of claim 4, wherein the determined first bitrate-data associated with the first compressed media-stream indicates a first time associated with the first bitrate-change, and wherein making the determination that the determined first bitrate-data and the determined second bitrate-data lack a threshold extent of similarity further comprises determining that the determined second bitrate-data does not indicate a second time associated with the second bitrate-change, where the second time is within a tolerance range of the first time. 6. The method of claim 1, wherein outputting an alert comprises displaying a message. 7. The method of claim 1, wherein outputting an alert comprises transmitting an instruction. 8. The method of claim 1, wherein the first compressed media-stream is generated by a primary media-broadcast system, and wherein the second compressed media-stream is generated by the back-up media-broadcast system. 9. A non-transitory computer-readable medium having stored thereon program instructions that when executed cause a computing device to perform a set of acts for outputting an alert indicating a functional state of a back-up media-broadcast system, the set of acts comprising:
determining first bitrate-data associated with a first compressed media-stream; determining second bitrate-data associated with a second compressed media-stream; making a determination that the determined first bitrate-data and the determined second bitrate-data lack a threshold extent of similarity; and responsive to the determination that the determined first bitrate-data and the determined second bitrate-data lack the threshold extent of similarity, outputting an alert. 10. The non-transitory computer-readable medium of claim 9, wherein the determined first bitrate-data associated with the first compressed media-stream indicates a first average bitrate-change over a first temporal-portion of the first compressed media-stream, and wherein the first temporal-portion of the first compressed media-stream corresponds to a time period. 11. The non-transitory computer-readable medium of claim 10, wherein making the determination that the determined first bitrate-data and the determined second bitrate-data lack the threshold extent of similarity comprises determining that the determined second bitrate-data associated with the second compressed media-stream does not indicate (i) a second average bitrate-change over a second temporal-portion of the second compressed media-stream, (ii) where the second temporal-portion of the second compressed media-stream corresponds to the time period, and (iii) where the second average bitrate-change is within a tolerance range of the first average bitrate-change. 12. The non-transitory computer-readable medium of claim 9, wherein the determined first bitrate-data associated with the first compressed media-stream indicates an occurrence of a first bitrate-change within the first compressed media-stream, and wherein making the determination that the first bitrate-data and the determined second bitrate-data lack a threshold extent of similarity comprises determining that the determined second bitrate-data does not indicate an occurrence of a second bitrate-change that is within the second compressed media-stream and that is within a tolerance range of the first bitrate-change. 13. The non-transitory computer-readable medium of claim 12, wherein the determined first bitrate-data associated with the first compressed media-stream indicates a first time associated with the first bitrate-change, and wherein making the determination that the determined first bitrate-data and the determined second bitrate-data lack a threshold extent of similarity further comprises determining that the determined second bitrate-data does not indicate a second time associated with the second bitrate-change, where the second time is within a tolerance range of the first time. 14. The non-transitory computer-readable medium of claim 9, wherein outputting an alert comprises displaying a message. 15. The non-transitory computer-readable medium of claim 9, wherein outputting an alert comprises transmitting an instruction. 16. The non-transitory computer-readable medium of claim 9, wherein the first compressed media-stream is generated by a primary media-broadcast system, and wherein the second compressed media-stream is generated by the back-up media-broadcast system. 17. A computing device comprising:
a processor; and a non-transitory computer-readable medium having stored thereon program instructions that when executed by the processor cause the computing device to perform a set of acts for outputting an alert indicating a functional state of a back-up media-broadcast system, the set of acts comprising:
determining first bitrate-data associated with a first compressed media-stream;
determining second bitrate-data associated with a second compressed media-stream;
making a determination that the determined first bitrate-data and the determined second bitrate-data lack a threshold extent of similarity; and
responsive to the determination that the determined first bitrate-data and the determined second bitrate-data lack the threshold extent of similarity, outputting an alert. 18. The computing device of claim 17, wherein the determined first bitrate-data associated with the first compressed media-stream indicates a first average bitrate-change over a first temporal-portion of the first compressed media-stream, and wherein the first temporal-portion of the first compressed media-stream corresponds to a time period. 19. The computing device of claim 18, wherein making the determination that the determined first bitrate-data and the determined second bitrate-data lack the threshold extent of similarity comprises determining that the determined second bitrate-data associated with the second compressed media-stream does not indicate (i) a second average bitrate-change over a second temporal-portion of the second compressed media-stream, (ii) where the second temporal-portion of the second compressed media-stream corresponds to the time period, and (iii) where the second average bitrate-change is within a tolerance range of the first average bitrate-change. 20. The computing device of claim 19, wherein the determined first bitrate-data associated with the first compressed media-stream indicates an occurrence of a first bitrate-change within the first compressed media-stream, and wherein making the determination that the first bitrate-data and the determined second bitrate-data lack a threshold extent of similarity comprises determining that the determined second bitrate-data does not indicate an occurrence of a second bitrate-change that is within the second compressed media-stream and that is within a tolerance range of the first bitrate-change. 21. The computing device of claim 17, wherein outputting an alert comprises displaying a message. 22. The computing device of claim 17, wherein outputting an alert comprises transmitting an instruction. 23. The computing device of claim 17, wherein the first compressed media-stream is generated by a primary media-broadcast system, and wherein the second compressed media-stream is generated by the back-up media-broadcast system. | In one aspect, an example method for outputting an alert indicating a functional state of a back-up media-broadcast system involves: a computing device determining first bitrate-data associated with a first compressed media-stream; the computing device determining second bitrate-data associated with a second compressed media-stream; the computing device making a determination that the determined first bitrate-data and the determined second bitrate-data lack a threshold extent of similarity; and responsive to the determination that the determined first bitrate-data and the determined second bitrate-data lack the threshold extent of similarity, the computing device outputting an alert.1. A method for outputting an alert indicating a functional state of a back-up media-broadcast system, the method comprising:
a computing device determining first bitrate-data associated with a first compressed media-stream; the computing device determining second bitrate-data associated with a second compressed media-stream; the computing device making a determination that the determined first bitrate-data and the determined second bitrate-data lack a threshold extent of similarity; and responsive to the determination that the determined first bitrate-data and the determined second bitrate-data lack the threshold extent of similarity, the computing device outputting an alert. 2. The method of claim 1, wherein the determined first bitrate-data associated with the first compressed media-stream indicates a first average bitrate-change over a first temporal-portion of the first compressed media-stream, and wherein the first temporal-portion of the first compressed media-stream corresponds to a time period. 3. The method of claim 2, wherein making the determination that the determined first bitrate-data and the determined second bitrate-data lack the threshold extent of similarity comprises determining that the determined second bitrate-data associated with the second compressed media-stream does not indicate (i) a second average bitrate-change over a second temporal-portion of the second compressed media-stream, (ii) where the second temporal-portion of the second compressed media-stream corresponds to the time period, and (iii) where the second average bitrate-change is within a tolerance range of the first average bitrate-change. 4. The method of claim 1, wherein the determined first bitrate-data associated with the first compressed media-stream indicates an occurrence of a first bitrate-change within the first compressed media-stream, and wherein making the determination that the first bitrate-data and the determined second bitrate-data lack a threshold extent of similarity comprises determining that the determined second bitrate-data does not indicate an occurrence of a second bitrate-change that is within the second compressed media-stream and that is within a tolerance range of the first bitrate-change. 5. The method of claim 4, wherein the determined first bitrate-data associated with the first compressed media-stream indicates a first time associated with the first bitrate-change, and wherein making the determination that the determined first bitrate-data and the determined second bitrate-data lack a threshold extent of similarity further comprises determining that the determined second bitrate-data does not indicate a second time associated with the second bitrate-change, where the second time is within a tolerance range of the first time. 6. The method of claim 1, wherein outputting an alert comprises displaying a message. 7. The method of claim 1, wherein outputting an alert comprises transmitting an instruction. 8. The method of claim 1, wherein the first compressed media-stream is generated by a primary media-broadcast system, and wherein the second compressed media-stream is generated by the back-up media-broadcast system. 9. A non-transitory computer-readable medium having stored thereon program instructions that when executed cause a computing device to perform a set of acts for outputting an alert indicating a functional state of a back-up media-broadcast system, the set of acts comprising:
determining first bitrate-data associated with a first compressed media-stream; determining second bitrate-data associated with a second compressed media-stream; making a determination that the determined first bitrate-data and the determined second bitrate-data lack a threshold extent of similarity; and responsive to the determination that the determined first bitrate-data and the determined second bitrate-data lack the threshold extent of similarity, outputting an alert. 10. The non-transitory computer-readable medium of claim 9, wherein the determined first bitrate-data associated with the first compressed media-stream indicates a first average bitrate-change over a first temporal-portion of the first compressed media-stream, and wherein the first temporal-portion of the first compressed media-stream corresponds to a time period. 11. The non-transitory computer-readable medium of claim 10, wherein making the determination that the determined first bitrate-data and the determined second bitrate-data lack the threshold extent of similarity comprises determining that the determined second bitrate-data associated with the second compressed media-stream does not indicate (i) a second average bitrate-change over a second temporal-portion of the second compressed media-stream, (ii) where the second temporal-portion of the second compressed media-stream corresponds to the time period, and (iii) where the second average bitrate-change is within a tolerance range of the first average bitrate-change. 12. The non-transitory computer-readable medium of claim 9, wherein the determined first bitrate-data associated with the first compressed media-stream indicates an occurrence of a first bitrate-change within the first compressed media-stream, and wherein making the determination that the first bitrate-data and the determined second bitrate-data lack a threshold extent of similarity comprises determining that the determined second bitrate-data does not indicate an occurrence of a second bitrate-change that is within the second compressed media-stream and that is within a tolerance range of the first bitrate-change. 13. The non-transitory computer-readable medium of claim 12, wherein the determined first bitrate-data associated with the first compressed media-stream indicates a first time associated with the first bitrate-change, and wherein making the determination that the determined first bitrate-data and the determined second bitrate-data lack a threshold extent of similarity further comprises determining that the determined second bitrate-data does not indicate a second time associated with the second bitrate-change, where the second time is within a tolerance range of the first time. 14. The non-transitory computer-readable medium of claim 9, wherein outputting an alert comprises displaying a message. 15. The non-transitory computer-readable medium of claim 9, wherein outputting an alert comprises transmitting an instruction. 16. The non-transitory computer-readable medium of claim 9, wherein the first compressed media-stream is generated by a primary media-broadcast system, and wherein the second compressed media-stream is generated by the back-up media-broadcast system. 17. A computing device comprising:
a processor; and a non-transitory computer-readable medium having stored thereon program instructions that when executed by the processor cause the computing device to perform a set of acts for outputting an alert indicating a functional state of a back-up media-broadcast system, the set of acts comprising:
determining first bitrate-data associated with a first compressed media-stream;
determining second bitrate-data associated with a second compressed media-stream;
making a determination that the determined first bitrate-data and the determined second bitrate-data lack a threshold extent of similarity; and
responsive to the determination that the determined first bitrate-data and the determined second bitrate-data lack the threshold extent of similarity, outputting an alert. 18. The computing device of claim 17, wherein the determined first bitrate-data associated with the first compressed media-stream indicates a first average bitrate-change over a first temporal-portion of the first compressed media-stream, and wherein the first temporal-portion of the first compressed media-stream corresponds to a time period. 19. The computing device of claim 18, wherein making the determination that the determined first bitrate-data and the determined second bitrate-data lack the threshold extent of similarity comprises determining that the determined second bitrate-data associated with the second compressed media-stream does not indicate (i) a second average bitrate-change over a second temporal-portion of the second compressed media-stream, (ii) where the second temporal-portion of the second compressed media-stream corresponds to the time period, and (iii) where the second average bitrate-change is within a tolerance range of the first average bitrate-change. 20. The computing device of claim 19, wherein the determined first bitrate-data associated with the first compressed media-stream indicates an occurrence of a first bitrate-change within the first compressed media-stream, and wherein making the determination that the first bitrate-data and the determined second bitrate-data lack a threshold extent of similarity comprises determining that the determined second bitrate-data does not indicate an occurrence of a second bitrate-change that is within the second compressed media-stream and that is within a tolerance range of the first bitrate-change. 21. The computing device of claim 17, wherein outputting an alert comprises displaying a message. 22. The computing device of claim 17, wherein outputting an alert comprises transmitting an instruction. 23. The computing device of claim 17, wherein the first compressed media-stream is generated by a primary media-broadcast system, and wherein the second compressed media-stream is generated by the back-up media-broadcast system. | 2,400 |
7,795 | 7,795 | 15,291,235 | 2,426 | A show system or in-room entertainment or show system configured to provide engaging and immersive multimedia shows or presentations in nearly any space (or “room”) that is defined by one or more walls. The in-room show system generally includes a controller for selectively operating a display device (e.g., a television or the like), a video projector, an audio system (e.g., one or more speakers), and other show components (e.g., one or more lights, a fan, a mechanical device, and so on). Media content is predefined for the room, and the controller operates (such as in response to a triggering switch or remote control device that may take the form of a show prop activated by someone in the room) to serve the media content to tell a story and/or magically transform the space into a multidimensional and immersive entertainment space. | 1. A system for providing entertainment with multimedia content matched to a particular space or room, comprising:
a display device positioned in a room; a projector positioned in the room for projecting on one or more surfaces in the room; an audio system for providing audio output into the room; and a show controller operating, based on a show file defining display content, projector content, and audio content for a show, the display device to display the display content, the projector to project the projector content onto the one or more surfaces in the room, and the audio system to output the audio content for the show into the room, wherein the projector content is mapped, prior to the show controller operating, to the one or more surfaces in the room using projection mapping. 2. The system of claim 1, wherein the display content, the projector content, and the audio content are time synchronized to each other based on a timeline for the show. 3. (canceled) 4. The system of claim 1, wherein the display device comprises a television mounted on a wall of the room, and wherein the projector content comprises video content matching the display content displayed on the television, and wherein the display device and the projector are concurrently operated for at least a portion of the show. 5. The system of claim 4, wherein the projection mapping includes the television and the video content includes a blacked out area coinciding with an area of the wall where the television is mounted, whereby light output from the projector is projected on surfaces of the wall excluding the television. 6. The system of claim 5, wherein the audio system includes speakers spaced around the room to provide surround sound, wherein the audio content includes a soundtrack matching both the display content and the projector content, and wherein the soundtrack includes first content associated with the display content and second content differing from the first content associated with the projector content. 7. The system of claim 1, further comprising a lighting system with lighting elements that are independently operable to turn on and off, to have a range of brightness, and to have two or more colors, wherein the show file defines lighting for the show, and wherein the show controller operates each of the lighting elements to provide the lighting defined by the show file by turning one or more of the lighting elements on or off, by adjusting a brightness of one or more of the lighting elements, or by selecting a color of one or more of the lighting elements. 8. The system of claim 1, further comprising a remote control device operable by a person in the room to transmit a show trigger signal to the show controller, wherein the show controller responds to receipt of the show trigger signal to initiate operation of the display device, the projector, and the audio system based on the show file. 9. A system for providing entertainment, comprising:
a room defined by one or more walls; a plurality of show components including a set of speakers and a video projector; a show controller running a show program generating a set of control signals to operate each of the show components including playing a soundtrack on the speakers and operating the video projector to project video mapped to a surface of at least one of the walls by projection mapping; and a remote control device transmitting a show signal to the controller, wherein the show controller responds to the show signal to determine an identifier for the remote control device and to initiate or modify operations of the show components in the room based on the identifier. 10. The system of claim 9, further including a display device mounted proximate to the surface of the at least one of the walls, wherein the controller operates the display device to display content matched to the projected video. 11. The system of claim 10, wherein the display device is operated to provide the display content sequentially and concurrently with the projected video from the video projector. 12. The system of claim 9, wherein the show components further includes a plurality of lighting elements and wherein the controller operates the lighting elements to provide lighting effects including varying brightness and color based on content of the video projected by the video projector. 13. (canceled) 14. The system of claim 9, wherein the show controller processes the show signal to identify a show file, from a plurality of show files, corresponding to the identifier for the remote control device and wherein the show file defines operation of each of the show components over a timeline defined for a particular show for the room. 15. A method of providing in-room entertainment, comprising:
with a display device in a room, displaying a first set of content; with a projector, projecting a second set of content on one or more surfaces of the room; with a surround sound system, playing a soundtrack associated with the first and second content; and with a lighting system, lighting the room in response to at least one of the first and second contents, wherein the lighting of the room includes varying brightness or color during at least one of the displaying and projecting steps, and wherein the second set of content is mapped to the one or more surfaces of the room. 16. The method of claim 15, wherein the first and second content are time synchronized and are defined by a show file. 17. The method of claim 16, wherein during the displaying and the projecting the first and second content share a subset of content whereby the subset of content moves between the display device and the one or more surfaces of the room. 18. (canceled) 19. The method of claim 15, wherein the display device includes a television on a wall, and the second set of content includes a blacked out area associated with the television to limit projection of light onto the television. 20. The method of claim 15, wherein the method includes receiving a show selection or initiation signal and, in response, accessing or retrieving a show file defining the first and second sets of content, the soundtrack, and the lighting, and performing the displaying, the projecting, the playing, and the lighting steps synchronized to a show timeline defined by the show file. 21. The system of claim 1, wherein during a first time period the display content includes an object and wherein during a second time period the projector content includes the object, whereby the object moves from the display device onto the one or more surfaces between the first and second time periods. 22. The system of claim 21, wherein the show controller operates at least one of the audio system and a lighting element based on a location of the object on the one or more surfaces during the second time period. | A show system or in-room entertainment or show system configured to provide engaging and immersive multimedia shows or presentations in nearly any space (or “room”) that is defined by one or more walls. The in-room show system generally includes a controller for selectively operating a display device (e.g., a television or the like), a video projector, an audio system (e.g., one or more speakers), and other show components (e.g., one or more lights, a fan, a mechanical device, and so on). Media content is predefined for the room, and the controller operates (such as in response to a triggering switch or remote control device that may take the form of a show prop activated by someone in the room) to serve the media content to tell a story and/or magically transform the space into a multidimensional and immersive entertainment space.1. A system for providing entertainment with multimedia content matched to a particular space or room, comprising:
a display device positioned in a room; a projector positioned in the room for projecting on one or more surfaces in the room; an audio system for providing audio output into the room; and a show controller operating, based on a show file defining display content, projector content, and audio content for a show, the display device to display the display content, the projector to project the projector content onto the one or more surfaces in the room, and the audio system to output the audio content for the show into the room, wherein the projector content is mapped, prior to the show controller operating, to the one or more surfaces in the room using projection mapping. 2. The system of claim 1, wherein the display content, the projector content, and the audio content are time synchronized to each other based on a timeline for the show. 3. (canceled) 4. The system of claim 1, wherein the display device comprises a television mounted on a wall of the room, and wherein the projector content comprises video content matching the display content displayed on the television, and wherein the display device and the projector are concurrently operated for at least a portion of the show. 5. The system of claim 4, wherein the projection mapping includes the television and the video content includes a blacked out area coinciding with an area of the wall where the television is mounted, whereby light output from the projector is projected on surfaces of the wall excluding the television. 6. The system of claim 5, wherein the audio system includes speakers spaced around the room to provide surround sound, wherein the audio content includes a soundtrack matching both the display content and the projector content, and wherein the soundtrack includes first content associated with the display content and second content differing from the first content associated with the projector content. 7. The system of claim 1, further comprising a lighting system with lighting elements that are independently operable to turn on and off, to have a range of brightness, and to have two or more colors, wherein the show file defines lighting for the show, and wherein the show controller operates each of the lighting elements to provide the lighting defined by the show file by turning one or more of the lighting elements on or off, by adjusting a brightness of one or more of the lighting elements, or by selecting a color of one or more of the lighting elements. 8. The system of claim 1, further comprising a remote control device operable by a person in the room to transmit a show trigger signal to the show controller, wherein the show controller responds to receipt of the show trigger signal to initiate operation of the display device, the projector, and the audio system based on the show file. 9. A system for providing entertainment, comprising:
a room defined by one or more walls; a plurality of show components including a set of speakers and a video projector; a show controller running a show program generating a set of control signals to operate each of the show components including playing a soundtrack on the speakers and operating the video projector to project video mapped to a surface of at least one of the walls by projection mapping; and a remote control device transmitting a show signal to the controller, wherein the show controller responds to the show signal to determine an identifier for the remote control device and to initiate or modify operations of the show components in the room based on the identifier. 10. The system of claim 9, further including a display device mounted proximate to the surface of the at least one of the walls, wherein the controller operates the display device to display content matched to the projected video. 11. The system of claim 10, wherein the display device is operated to provide the display content sequentially and concurrently with the projected video from the video projector. 12. The system of claim 9, wherein the show components further includes a plurality of lighting elements and wherein the controller operates the lighting elements to provide lighting effects including varying brightness and color based on content of the video projected by the video projector. 13. (canceled) 14. The system of claim 9, wherein the show controller processes the show signal to identify a show file, from a plurality of show files, corresponding to the identifier for the remote control device and wherein the show file defines operation of each of the show components over a timeline defined for a particular show for the room. 15. A method of providing in-room entertainment, comprising:
with a display device in a room, displaying a first set of content; with a projector, projecting a second set of content on one or more surfaces of the room; with a surround sound system, playing a soundtrack associated with the first and second content; and with a lighting system, lighting the room in response to at least one of the first and second contents, wherein the lighting of the room includes varying brightness or color during at least one of the displaying and projecting steps, and wherein the second set of content is mapped to the one or more surfaces of the room. 16. The method of claim 15, wherein the first and second content are time synchronized and are defined by a show file. 17. The method of claim 16, wherein during the displaying and the projecting the first and second content share a subset of content whereby the subset of content moves between the display device and the one or more surfaces of the room. 18. (canceled) 19. The method of claim 15, wherein the display device includes a television on a wall, and the second set of content includes a blacked out area associated with the television to limit projection of light onto the television. 20. The method of claim 15, wherein the method includes receiving a show selection or initiation signal and, in response, accessing or retrieving a show file defining the first and second sets of content, the soundtrack, and the lighting, and performing the displaying, the projecting, the playing, and the lighting steps synchronized to a show timeline defined by the show file. 21. The system of claim 1, wherein during a first time period the display content includes an object and wherein during a second time period the projector content includes the object, whereby the object moves from the display device onto the one or more surfaces between the first and second time periods. 22. The system of claim 21, wherein the show controller operates at least one of the audio system and a lighting element based on a location of the object on the one or more surfaces during the second time period. | 2,400 |
7,796 | 7,796 | 14,937,479 | 2,491 | The present invention relates to a drive system that includes a module that operates as a server, where in at least some embodiments the module is at least one of directly integrated with another module that operates as a drive and fully integrated to include the drive. The server allows for communications with one or more terminals via an internet-type communications medium, while the drive is for controlling, monitoring and/or otherwise interacting with at least one motor, electromechanical machine, or other appropriate type of machine/process. In at least some embodiments, the server is capable of providing web pages, executable programs and/or other information including, for example, information in accordance with an FTP protocol onto the internet for receipt by the terminals. The terminals communicate commands and other information via the internet back to the server, which in turn can influence the drive and the controlled machine/process. | 1. A motor drive system, comprising:
a housing; a motor drive disposed within the housing; a drive module integrated in the motor drive within the housing and comprising a plurality of power electronic switches that are switched in operation in response to control signals to control application of power to an electric motor; drive control circuitry in the housing that generates the control signals in operation; and an adapter disposed in the housing and communicatively coupled to the drive control circuitry, the adapter comprising a network server configured to communicate data for a web page relating to operation of the electric motor. 2. The system of claim 1, wherein the drive control circuitry further comprises at least one interface configured to communicate with a separate programmable controller, but the motor drive is configured for stand-alone operation for control of the electric motor. 3. The system of claim 1, wherein the integration of the server module and the drive module enables components of both the server module and the drive module to be configured together in a single operation and/or upgraded together in a single coordinated operation. 4. The system of claim 1, wherein the adapter is one of multiple add-on adapters coupled in the motor drive system. 5. The system of claim 1, wherein the data comprises an electronic file. 6. The system of claim 1, wherein the data comprises a code defining a web page. 7. The system of claim 6, wherein the code references at least one Java class. 8. The system of claim 6, wherein the web page comprises a drop down list of selectable programs or operations that a user can select form within the motor drive system. 9. The system of claim 8, wherein the selectable programs comprise a startup application for aiding commissioning of the motor drive system. 10. The system of claim 1, wherein the data comprises an interactive dialog screen. 11. The system of claim 10, wherein the dialog screen allows selection of at least one of alarms, diagnostics, setup, utility and help pages. 12. The system of claim 1, wherein the data comprises a home page for the motor drive system. 13. The system of claim 12, wherein the home page comprises link to documents internal to the motor drive system. 14. The system of claim 1, wherein the server comprises a plurality of sub-servers. 15. The system of claim 14, wherein the sub-servers comprise at least one of an HTTP server, an FTP server, and an Ethernet/IP server. 16. The system of claim 1, comprising a communications module in communication with the server and configured to output email messages when a fault occurs in the motor drive system. 17. The system of claim 1, wherein the server serves different data depending upon a user access level. 18. The system of claim 1, wherein the server comprises a file transfer server. 19. The system of claim 1, wherein the server permits exchange of data between the motor drive system and an external terminal for control of operation of the motor. 20. The system of claim 1, wherein the server permits downloading to the motor drive system of new motor drive code. 21. The system of claim 1, wherein the server permits initial configuration of the motor drive system during manufacture of the motor drive system. 22. The system of claim 1, wherein the server comprises an Ethernet port. 23. A motor drive system, comprising:
a housing; a motor drive disposed within the housing; a drive module integrated in the motor drive within the housing and comprising a plurality of power electronic switches that are switched in operation in response to control signals to control application of power to an electric motor; drive control circuitry in the housing that generates the control signals in operation; and a plurality of add-on adapters disposed in the housing and communicatively coupled to the drive control circuitry, one of the adapter comprising a network server configured to communicate web page data relating to operation of the electric motor. 24. The system of claim 23, wherein the web page comprises a drop down list of selectable programs or operations that a user can select form within the motor drive system. 25. The system of claim 24, wherein the selectable programs comprise a startup application for aiding commissioning of the motor drive system. 26. The system of claim 23, wherein the data comprises an interactive dialog screen. 27. The system of claim 26, wherein the dialog screen allows selection of at least one of alarms, diagnostics, setup, utility and help pages. 28. The system of claim 23, wherein the data comprises a home page for the motor drive system. 29. The system of claim 28, wherein the home page comprises link to documents internal to the motor drive system. 30. The system of claim 23, comprising a communications module in communication with the server and configured to output email messages when a fault occurs in the motor drive system. 31. A motor drive system, comprising:
a housing; a motor drive disposed within the housing; a drive module integrated in the motor drive within the housing and comprising a plurality of power electronic switches that are switched in operation in response to control signals to control application of power to an electric motor; drive control circuitry in the housing that generates the control signals in operation; an add-on adapter disposed in the housing and communicatively coupled to the drive control circuitry, the adapter comprising a network server configured to communicate web page data relating to operation of the electric motor; and a communications module in communication with the server and configured to output email messages when a fault occurs in the motor drive system. 32. The system of claim 31, wherein the web page comprises a drop down list of selectable programs or operations that a user can select form within the motor drive system. 33. The system of claim 32, wherein the selectable programs comprise a startup application for aiding commissioning of the motor drive system. 34. The system of claim 31, wherein the data comprises an interactive dialog screen. 35. The system of claim 34, wherein the dialog screen allows selection of at least one of alarms, diagnostics, setup, utility and help pages. | The present invention relates to a drive system that includes a module that operates as a server, where in at least some embodiments the module is at least one of directly integrated with another module that operates as a drive and fully integrated to include the drive. The server allows for communications with one or more terminals via an internet-type communications medium, while the drive is for controlling, monitoring and/or otherwise interacting with at least one motor, electromechanical machine, or other appropriate type of machine/process. In at least some embodiments, the server is capable of providing web pages, executable programs and/or other information including, for example, information in accordance with an FTP protocol onto the internet for receipt by the terminals. The terminals communicate commands and other information via the internet back to the server, which in turn can influence the drive and the controlled machine/process.1. A motor drive system, comprising:
a housing; a motor drive disposed within the housing; a drive module integrated in the motor drive within the housing and comprising a plurality of power electronic switches that are switched in operation in response to control signals to control application of power to an electric motor; drive control circuitry in the housing that generates the control signals in operation; and an adapter disposed in the housing and communicatively coupled to the drive control circuitry, the adapter comprising a network server configured to communicate data for a web page relating to operation of the electric motor. 2. The system of claim 1, wherein the drive control circuitry further comprises at least one interface configured to communicate with a separate programmable controller, but the motor drive is configured for stand-alone operation for control of the electric motor. 3. The system of claim 1, wherein the integration of the server module and the drive module enables components of both the server module and the drive module to be configured together in a single operation and/or upgraded together in a single coordinated operation. 4. The system of claim 1, wherein the adapter is one of multiple add-on adapters coupled in the motor drive system. 5. The system of claim 1, wherein the data comprises an electronic file. 6. The system of claim 1, wherein the data comprises a code defining a web page. 7. The system of claim 6, wherein the code references at least one Java class. 8. The system of claim 6, wherein the web page comprises a drop down list of selectable programs or operations that a user can select form within the motor drive system. 9. The system of claim 8, wherein the selectable programs comprise a startup application for aiding commissioning of the motor drive system. 10. The system of claim 1, wherein the data comprises an interactive dialog screen. 11. The system of claim 10, wherein the dialog screen allows selection of at least one of alarms, diagnostics, setup, utility and help pages. 12. The system of claim 1, wherein the data comprises a home page for the motor drive system. 13. The system of claim 12, wherein the home page comprises link to documents internal to the motor drive system. 14. The system of claim 1, wherein the server comprises a plurality of sub-servers. 15. The system of claim 14, wherein the sub-servers comprise at least one of an HTTP server, an FTP server, and an Ethernet/IP server. 16. The system of claim 1, comprising a communications module in communication with the server and configured to output email messages when a fault occurs in the motor drive system. 17. The system of claim 1, wherein the server serves different data depending upon a user access level. 18. The system of claim 1, wherein the server comprises a file transfer server. 19. The system of claim 1, wherein the server permits exchange of data between the motor drive system and an external terminal for control of operation of the motor. 20. The system of claim 1, wherein the server permits downloading to the motor drive system of new motor drive code. 21. The system of claim 1, wherein the server permits initial configuration of the motor drive system during manufacture of the motor drive system. 22. The system of claim 1, wherein the server comprises an Ethernet port. 23. A motor drive system, comprising:
a housing; a motor drive disposed within the housing; a drive module integrated in the motor drive within the housing and comprising a plurality of power electronic switches that are switched in operation in response to control signals to control application of power to an electric motor; drive control circuitry in the housing that generates the control signals in operation; and a plurality of add-on adapters disposed in the housing and communicatively coupled to the drive control circuitry, one of the adapter comprising a network server configured to communicate web page data relating to operation of the electric motor. 24. The system of claim 23, wherein the web page comprises a drop down list of selectable programs or operations that a user can select form within the motor drive system. 25. The system of claim 24, wherein the selectable programs comprise a startup application for aiding commissioning of the motor drive system. 26. The system of claim 23, wherein the data comprises an interactive dialog screen. 27. The system of claim 26, wherein the dialog screen allows selection of at least one of alarms, diagnostics, setup, utility and help pages. 28. The system of claim 23, wherein the data comprises a home page for the motor drive system. 29. The system of claim 28, wherein the home page comprises link to documents internal to the motor drive system. 30. The system of claim 23, comprising a communications module in communication with the server and configured to output email messages when a fault occurs in the motor drive system. 31. A motor drive system, comprising:
a housing; a motor drive disposed within the housing; a drive module integrated in the motor drive within the housing and comprising a plurality of power electronic switches that are switched in operation in response to control signals to control application of power to an electric motor; drive control circuitry in the housing that generates the control signals in operation; an add-on adapter disposed in the housing and communicatively coupled to the drive control circuitry, the adapter comprising a network server configured to communicate web page data relating to operation of the electric motor; and a communications module in communication with the server and configured to output email messages when a fault occurs in the motor drive system. 32. The system of claim 31, wherein the web page comprises a drop down list of selectable programs or operations that a user can select form within the motor drive system. 33. The system of claim 32, wherein the selectable programs comprise a startup application for aiding commissioning of the motor drive system. 34. The system of claim 31, wherein the data comprises an interactive dialog screen. 35. The system of claim 34, wherein the dialog screen allows selection of at least one of alarms, diagnostics, setup, utility and help pages. | 2,400 |
7,797 | 7,797 | 14,695,980 | 2,432 | Approaches described herein allow an appliance to receive a message from a client device when the client device is attempting to connect to a service other than the appliance. For instance, a client device might connect to a service on a private network, however if the client device is not on the private network, it may encounter an appliance such as a gateway. The appliance is configured to return a message to a client device indicating that it is an appliance, and the client device returns a certificate to the appliance that allows the client to indicate a first purpose of a connection and a second purpose of the connection. In approaches described herein, the second purpose is used by the appliance to perform an action related to providing the service with a certificate that allows for the first purpose, which can include information to create a secure connection between the service and the client device. | 1. An appliance comprising:
a memory storing a set of instructions; and one or more processors configured to execute the set of instructions to cause the appliance to:
acquire a first handshake message from a client device, wherein the first handshake message is intended for a service;
provide a second handshake message for the client device, wherein the second handshake message includes a first certificate referring to the appliance;
acquire, from the client device, a second certificate having a first purpose and second purpose based on the appliance being authorized to assist with providing a secure connection between the client device and the service; and
determine, based on the second purpose, an action associated with providing the service with the second certificate having the first purpose. 2. The appliance of claim 1, wherein the second purpose is included in an extension of the second certificate. 3. The appliance of claim 1, wherein the action includes determining a location of the service to send the second certificate. 4. The appliance of claim 1, wherein the first purpose of the second certificate is used to authenticate the client device at the service. 5. The appliance of claim 1, wherein the second purpose indicates a type of data included in a payload. 6. The appliance of claim 5, wherein the action includes determining a destination of the payload, and wherein the destination of the payload is determined at least in part by the type of data included in the payload. 7. The appliance of claim 6, wherein the action includes denying the providing of the second certificate to the service. 8. A method for transmitting data, the method being performed by one or more processors and comprising:
acquiring a first handshake message from a client device, wherein the first handshake message is intended for a service; providing a second handshake message for the client device, wherein the second handshake message includes a first certificate referring to an appliance; acquiring, from the client device, a certificate having a first purpose and second purpose based on the appliance being authorized to assist with providing a secure connection between the client device and the service; and determining, based on the second purpose, an action associated with providing the service with the second certificate having the first purpose. 9. The method of claim 8, wherein the second purpose is included in an extension of the second certificate. 10. The method of claim 8, wherein the action includes determining a location of the service to send the second certificate. 11. The method of claim 8, wherein the first purpose of the second certificate is used to authenticate the client device at the service. 12. The method of claim 8, wherein the second purpose indicates a type of data included in a payload. 13. The method of claim 12, wherein the action includes determining a destination of the payload, and wherein the destination of the payload is determined at least in part by the type of data included in the payload. 14. The method of claim 13, wherein the type of data is selected from the group consisting of:
data associated with medical records, data associated with legal documents, data associated with source code, financial information, banking information, data associated with human resources, and data associated with privacy information. 15. A nontransitory computer readable storage medium storing a set of instructions that are executable by at least one processor of an appliance, to cause the appliance to perform a method for transmitting data, the method comprising:
acquiring a first handshake message from a client device, wherein the first handshake message is intended for a service; providing a second handshake message for the client device, wherein the second handshake message includes a first certificate referring to the appliance; acquiring, from the client device, a second certificate having a first purpose and second purpose based on the appliance being authorized to assist with providing a secure connection between the client device and the service; and determining, based on the second purpose, an action associated with providing the service with the second certificate having the first purpose. 16. The nontransitory computer readable storage medium of claim 15, wherein the second purpose is included in an extension of the second certificate. 17. The nontransitory computer readable storage medium of claim 15, wherein the action includes determining a location of the service to send the second certificate. 18. The nontransitory computer readable storage medium of claim 15, wherein the first purpose of the second certificate is used to authenticate the client device at the service. 19. The nontransitory computer readable storage medium of claim 15, wherein the second purpose indicates a type of data included in a payload. 20. The nontransitory computer readable storage medium of claim 15, wherein the action includes determining a destination of the payload, and wherein the destination of the payload is determined at least in part by the type of data included in the payload. 21. A client device comprising:
a memory storing a set of instructions; and one or more processors configured to execute the set of instructions to cause the client device to:
provide a handshake message intended for a service;
acquire a first certificate;
determine whether the first certificate was provided by an appliance other than the service;
if the first certificate was provided by the service, provide a second certificate having a first purpose to the service; and
if the first certificate was provided by the appliance, provide a third certificate having a first purpose and second purpose to the appliance, wherein the second purpose is configured to cause the appliance to perform an action associated with providing the third certificate having the first purpose to the service. | Approaches described herein allow an appliance to receive a message from a client device when the client device is attempting to connect to a service other than the appliance. For instance, a client device might connect to a service on a private network, however if the client device is not on the private network, it may encounter an appliance such as a gateway. The appliance is configured to return a message to a client device indicating that it is an appliance, and the client device returns a certificate to the appliance that allows the client to indicate a first purpose of a connection and a second purpose of the connection. In approaches described herein, the second purpose is used by the appliance to perform an action related to providing the service with a certificate that allows for the first purpose, which can include information to create a secure connection between the service and the client device.1. An appliance comprising:
a memory storing a set of instructions; and one or more processors configured to execute the set of instructions to cause the appliance to:
acquire a first handshake message from a client device, wherein the first handshake message is intended for a service;
provide a second handshake message for the client device, wherein the second handshake message includes a first certificate referring to the appliance;
acquire, from the client device, a second certificate having a first purpose and second purpose based on the appliance being authorized to assist with providing a secure connection between the client device and the service; and
determine, based on the second purpose, an action associated with providing the service with the second certificate having the first purpose. 2. The appliance of claim 1, wherein the second purpose is included in an extension of the second certificate. 3. The appliance of claim 1, wherein the action includes determining a location of the service to send the second certificate. 4. The appliance of claim 1, wherein the first purpose of the second certificate is used to authenticate the client device at the service. 5. The appliance of claim 1, wherein the second purpose indicates a type of data included in a payload. 6. The appliance of claim 5, wherein the action includes determining a destination of the payload, and wherein the destination of the payload is determined at least in part by the type of data included in the payload. 7. The appliance of claim 6, wherein the action includes denying the providing of the second certificate to the service. 8. A method for transmitting data, the method being performed by one or more processors and comprising:
acquiring a first handshake message from a client device, wherein the first handshake message is intended for a service; providing a second handshake message for the client device, wherein the second handshake message includes a first certificate referring to an appliance; acquiring, from the client device, a certificate having a first purpose and second purpose based on the appliance being authorized to assist with providing a secure connection between the client device and the service; and determining, based on the second purpose, an action associated with providing the service with the second certificate having the first purpose. 9. The method of claim 8, wherein the second purpose is included in an extension of the second certificate. 10. The method of claim 8, wherein the action includes determining a location of the service to send the second certificate. 11. The method of claim 8, wherein the first purpose of the second certificate is used to authenticate the client device at the service. 12. The method of claim 8, wherein the second purpose indicates a type of data included in a payload. 13. The method of claim 12, wherein the action includes determining a destination of the payload, and wherein the destination of the payload is determined at least in part by the type of data included in the payload. 14. The method of claim 13, wherein the type of data is selected from the group consisting of:
data associated with medical records, data associated with legal documents, data associated with source code, financial information, banking information, data associated with human resources, and data associated with privacy information. 15. A nontransitory computer readable storage medium storing a set of instructions that are executable by at least one processor of an appliance, to cause the appliance to perform a method for transmitting data, the method comprising:
acquiring a first handshake message from a client device, wherein the first handshake message is intended for a service; providing a second handshake message for the client device, wherein the second handshake message includes a first certificate referring to the appliance; acquiring, from the client device, a second certificate having a first purpose and second purpose based on the appliance being authorized to assist with providing a secure connection between the client device and the service; and determining, based on the second purpose, an action associated with providing the service with the second certificate having the first purpose. 16. The nontransitory computer readable storage medium of claim 15, wherein the second purpose is included in an extension of the second certificate. 17. The nontransitory computer readable storage medium of claim 15, wherein the action includes determining a location of the service to send the second certificate. 18. The nontransitory computer readable storage medium of claim 15, wherein the first purpose of the second certificate is used to authenticate the client device at the service. 19. The nontransitory computer readable storage medium of claim 15, wherein the second purpose indicates a type of data included in a payload. 20. The nontransitory computer readable storage medium of claim 15, wherein the action includes determining a destination of the payload, and wherein the destination of the payload is determined at least in part by the type of data included in the payload. 21. A client device comprising:
a memory storing a set of instructions; and one or more processors configured to execute the set of instructions to cause the client device to:
provide a handshake message intended for a service;
acquire a first certificate;
determine whether the first certificate was provided by an appliance other than the service;
if the first certificate was provided by the service, provide a second certificate having a first purpose to the service; and
if the first certificate was provided by the appliance, provide a third certificate having a first purpose and second purpose to the appliance, wherein the second purpose is configured to cause the appliance to perform an action associated with providing the third certificate having the first purpose to the service. | 2,400 |
7,798 | 7,798 | 13,991,606 | 2,483 | In a scalable video codec, an adaptive Wiener filter with offset aims to minimize the differences between two input pictures or picture regions, and the filter coefficients need to be transmitted to decoder site. | 1. A method comprising:
using an adaptive Wiener filter with offset for video decoding. 2. The method of claim 1 including applying the adaptive Wiener filter with offset on processed lower layer reconstructed pictures to generate reference pictures for inter-layer predictions. 3. The method of claim 1 including only applying the adaptive Wiener filter on processed lower layer reconstructed pictures. 4. The method of claim 1 including only applying the offset on processed lower layer reconstructed pictures. 5. The method of claim 1 including receiving the filter coefficients and offsets from an encoder. 6. The method of claim 1 including using the same filter for all pixels in a picture. 7. The method of claim 1 including adaptively applying the adaptive Wiener filter with offset to each of a plurality of picture regions. 8. The method of claim 7 including deciding for each region whether to filter the region. 9. The method of claim 1 including applying predictive coding to enhancement layer filter coefficients. 10. The method of claim 1 including applying multiple predictive coding for filter coefficients. 11. The method of claim 7 including partitioning the picture into different regions according to pixel position. 12. The method of claim 11 including categorizing pixels into classes based on pixel features. 13. At least one machine readable medium comprising a plurality of instructions and, in response to being executed on a computing device, causing the computing device to carry out a method according to any one of claims 1-12. 14. An apparatus comprising:
an encoder; and a decoder, coupled to said encoder, with an adaptive Wiener filter with offset. 15. The apparatus of claim 14 including an operating system. 16. The apparatus of claim 14 including a battery. 17. The apparatus of claim 14 including firmware and a module to update said firmware. 18. The apparatus of claim 14 said adaptive Wiener filter to generate reference pictures for interlayer predictions. 19. The apparatus of claim 14 to only apply the adaptive Wiener filter on processed lower layer reconstructed pictures. 20. The apparatus of claim 14 said encoder to pass filter coefficients and offsets to said decoder. | In a scalable video codec, an adaptive Wiener filter with offset aims to minimize the differences between two input pictures or picture regions, and the filter coefficients need to be transmitted to decoder site.1. A method comprising:
using an adaptive Wiener filter with offset for video decoding. 2. The method of claim 1 including applying the adaptive Wiener filter with offset on processed lower layer reconstructed pictures to generate reference pictures for inter-layer predictions. 3. The method of claim 1 including only applying the adaptive Wiener filter on processed lower layer reconstructed pictures. 4. The method of claim 1 including only applying the offset on processed lower layer reconstructed pictures. 5. The method of claim 1 including receiving the filter coefficients and offsets from an encoder. 6. The method of claim 1 including using the same filter for all pixels in a picture. 7. The method of claim 1 including adaptively applying the adaptive Wiener filter with offset to each of a plurality of picture regions. 8. The method of claim 7 including deciding for each region whether to filter the region. 9. The method of claim 1 including applying predictive coding to enhancement layer filter coefficients. 10. The method of claim 1 including applying multiple predictive coding for filter coefficients. 11. The method of claim 7 including partitioning the picture into different regions according to pixel position. 12. The method of claim 11 including categorizing pixels into classes based on pixel features. 13. At least one machine readable medium comprising a plurality of instructions and, in response to being executed on a computing device, causing the computing device to carry out a method according to any one of claims 1-12. 14. An apparatus comprising:
an encoder; and a decoder, coupled to said encoder, with an adaptive Wiener filter with offset. 15. The apparatus of claim 14 including an operating system. 16. The apparatus of claim 14 including a battery. 17. The apparatus of claim 14 including firmware and a module to update said firmware. 18. The apparatus of claim 14 said adaptive Wiener filter to generate reference pictures for interlayer predictions. 19. The apparatus of claim 14 to only apply the adaptive Wiener filter on processed lower layer reconstructed pictures. 20. The apparatus of claim 14 said encoder to pass filter coefficients and offsets to said decoder. | 2,400 |
7,799 | 7,799 | 14,437,038 | 2,462 | A method, performed in a controlling node of a cellular communication network is disclosed. The method comprises configuring ( 1300 ) gaps during which a device-to-device (D2D) enabled device is not expected to receive any cellular signal, but can use a receiver chain to detect D2D signals or D2D related control information. A corresponding method for the D2D-enabled device is also disclosed. | 1-32. (canceled) 33. A method, performed in a controlling node of a cellular communication network, comprising:
configuring gaps during which a device-to-device (D2D)-enabled device is not expected to receive any cellular signal, but can use a receiver chain to detect D2D signals or D2D-related control information. 34. The method of claim 33, wherein the D2D-enabled device is not expected to transmit any cellular signals during the gaps. 35. The method of claim 33, further comprising transmitting configuration of gaps to D2D-enabled devices of the communication network, thereby signaling a set of gaps for D2D operation. 36. The method of claim 33, wherein a D2D-enabled device is able to deduce the timing of the gaps from timing of D2D subframes configured to carry D2D channels or D2D signals, whereby explicit signaling of the position of the gaps can be avoided. 37. The method of claim 33, wherein a gap corresponds to a subframe configured to carry D2D channels. 38. The method of claim 33, wherein a gap is extended before and/or after a subframe configured to carry D2D channels. 39. The method of claim 38, wherein the gap is extended by a subframe before and/or after the subframe configured to carry D2D channels. 40. The method of claim 33, further comprising indicating, to a D2D-enabled device, a carrier to be monitored during a gap. 41. The method of claim 33, comprising configuring the gaps in such a way that collision with resources potentially used by devices in radio resource control idle (RRC_IDLE) mode in the cell of the controlling node is avoided. 42. A method performed in a D2D-enabled device for operating in a cellular communication system, comprising:
obtaining configuration of gaps during which the D2D-enabled device is not expected to receive any cellular signal but can use a receiver chain to detect D2D signals or D2D-related control information, either by:
receiving the configuration of gaps from a controlling node of the cellular communication network; or
deducing the timing of the gaps from timing of D2D subframes configured to carry D2D channels, whereby explicit signaling from the controlling node of the position of the gaps can be avoided; and
detecting, during gaps, D2D signals or D2D-related control information. 43. The method of claim 42, wherein the D2D-enabled device is not expected to transmit any cellular signals during the gaps. 44. The method of claim 42, wherein a gap corresponds to a subframe configured to carry D2D channels. 45. The method of claim 42, wherein a gap is extended before and/or after a subframe configured to carry D2D channels. 46. The method of claim 45, wherein the gap is extended by a subframe before and/or after the subframe configured to carry D2D channels. 47. The method of claim 42, further comprising receiving an indication of a carrier to be monitored during a gap. 48. The method of claim 42, wherein the gaps have been configured in such a way that collision with resources potentially used by devices in radio resource control idle (RRC_IDLE) mode in the cell of the controlling node is avoided. 49. A controlling node for a cellular communication network, comprising a processing circuit configured to:
configure gaps during which a device-to-device (D2D)-enabled device is not expected to receive any cellular signal but can use a receiver chain to detect D2D signals or D2D-related control information. 50. The controlling node of claim 49, wherein the D2D-enabled device is not expected to transmit any cellular signals during the gaps. 51. The controlling node of claim 49, wherein the processing circuit is further configured to transmit configuration of gaps to D2D-enabled devices of the communication network, thereby signaling a set of gaps for D2D operation. 52. The controlling node of claim 49, wherein a D2D-enabled device is able to deduce the timing of the gaps from timing of D2D subframes configured to carry D2D channels, whereby explicit signaling of the position of the gaps can be avoided. 53. The controlling node of claim 49, wherein a gap corresponds to a subframe configured to carry D2D channels. 54. The controlling node of claim 49, wherein a gap is extended before and/or after a subframe configured to carry D2D channels. 55. The controlling node of claim 54, wherein the gap is extended by a subframe before and/or after the subframe configured to carry D2D channels. 56. The controlling node of claim 49, wherein the processing circuit is further configured to indicate, to a D2D-enabled device, a carrier to be monitored during a gap. 57. The controlling node of claim 49, wherein the processing circuit is configured to configure the gaps in such a way that collision with resources potentially used by devices in radio resource control idle (RRC_IDLE) mode in the cell of the controlling node is avoided. 58. A D2D-enabled device for operating in a cellular communication system, comprising a processing circuit configured to:
obtain configuration of gaps during which the D2D-enabled device is not expected to receive any cellular signal but can use a receiver chain to detect D2D signals or D2D-related control information, either by:
receiving the configuration of gaps from a controlling node of the cellular communication network; or
deducing the timing of the gaps from timing of D2D subframes configured to carry D2D channels, whereby explicit signaling from the controlling node of the position of the gaps can be avoided; and
detect, during gaps, D2D signals or D2D-related control information. 59. The D2D-enabled device of claim 58, wherein the D2D-enabled device is not expected to transmit any cellular signals during the gaps. 60. The D2D-enabled device of claim 58, wherein a gap corresponds to a subframe configured to carry D2D channels. 61. The D2D-enabled device of claim 58, wherein a gap is extended before and/or after a subframe configured to carry D2D channels. 62. The D2D-enabled device of claim 61, wherein the gap is extended by a subframe before and/or after the subframe configured to carry D2D channels. 63. The D2D-enabled device of claim 58, wherein the processing circuit is further configured to receive an indication of a carrier to be monitored during a gap. 64. The D2D-enabled device of claim 58, wherein the gaps have been configured in such a way that collision with resources potentially used by devices in radio resource control idle (RRC_IDLE) mode in the cell of the controlling node is avoided. | A method, performed in a controlling node of a cellular communication network is disclosed. The method comprises configuring ( 1300 ) gaps during which a device-to-device (D2D) enabled device is not expected to receive any cellular signal, but can use a receiver chain to detect D2D signals or D2D related control information. A corresponding method for the D2D-enabled device is also disclosed.1-32. (canceled) 33. A method, performed in a controlling node of a cellular communication network, comprising:
configuring gaps during which a device-to-device (D2D)-enabled device is not expected to receive any cellular signal, but can use a receiver chain to detect D2D signals or D2D-related control information. 34. The method of claim 33, wherein the D2D-enabled device is not expected to transmit any cellular signals during the gaps. 35. The method of claim 33, further comprising transmitting configuration of gaps to D2D-enabled devices of the communication network, thereby signaling a set of gaps for D2D operation. 36. The method of claim 33, wherein a D2D-enabled device is able to deduce the timing of the gaps from timing of D2D subframes configured to carry D2D channels or D2D signals, whereby explicit signaling of the position of the gaps can be avoided. 37. The method of claim 33, wherein a gap corresponds to a subframe configured to carry D2D channels. 38. The method of claim 33, wherein a gap is extended before and/or after a subframe configured to carry D2D channels. 39. The method of claim 38, wherein the gap is extended by a subframe before and/or after the subframe configured to carry D2D channels. 40. The method of claim 33, further comprising indicating, to a D2D-enabled device, a carrier to be monitored during a gap. 41. The method of claim 33, comprising configuring the gaps in such a way that collision with resources potentially used by devices in radio resource control idle (RRC_IDLE) mode in the cell of the controlling node is avoided. 42. A method performed in a D2D-enabled device for operating in a cellular communication system, comprising:
obtaining configuration of gaps during which the D2D-enabled device is not expected to receive any cellular signal but can use a receiver chain to detect D2D signals or D2D-related control information, either by:
receiving the configuration of gaps from a controlling node of the cellular communication network; or
deducing the timing of the gaps from timing of D2D subframes configured to carry D2D channels, whereby explicit signaling from the controlling node of the position of the gaps can be avoided; and
detecting, during gaps, D2D signals or D2D-related control information. 43. The method of claim 42, wherein the D2D-enabled device is not expected to transmit any cellular signals during the gaps. 44. The method of claim 42, wherein a gap corresponds to a subframe configured to carry D2D channels. 45. The method of claim 42, wherein a gap is extended before and/or after a subframe configured to carry D2D channels. 46. The method of claim 45, wherein the gap is extended by a subframe before and/or after the subframe configured to carry D2D channels. 47. The method of claim 42, further comprising receiving an indication of a carrier to be monitored during a gap. 48. The method of claim 42, wherein the gaps have been configured in such a way that collision with resources potentially used by devices in radio resource control idle (RRC_IDLE) mode in the cell of the controlling node is avoided. 49. A controlling node for a cellular communication network, comprising a processing circuit configured to:
configure gaps during which a device-to-device (D2D)-enabled device is not expected to receive any cellular signal but can use a receiver chain to detect D2D signals or D2D-related control information. 50. The controlling node of claim 49, wherein the D2D-enabled device is not expected to transmit any cellular signals during the gaps. 51. The controlling node of claim 49, wherein the processing circuit is further configured to transmit configuration of gaps to D2D-enabled devices of the communication network, thereby signaling a set of gaps for D2D operation. 52. The controlling node of claim 49, wherein a D2D-enabled device is able to deduce the timing of the gaps from timing of D2D subframes configured to carry D2D channels, whereby explicit signaling of the position of the gaps can be avoided. 53. The controlling node of claim 49, wherein a gap corresponds to a subframe configured to carry D2D channels. 54. The controlling node of claim 49, wherein a gap is extended before and/or after a subframe configured to carry D2D channels. 55. The controlling node of claim 54, wherein the gap is extended by a subframe before and/or after the subframe configured to carry D2D channels. 56. The controlling node of claim 49, wherein the processing circuit is further configured to indicate, to a D2D-enabled device, a carrier to be monitored during a gap. 57. The controlling node of claim 49, wherein the processing circuit is configured to configure the gaps in such a way that collision with resources potentially used by devices in radio resource control idle (RRC_IDLE) mode in the cell of the controlling node is avoided. 58. A D2D-enabled device for operating in a cellular communication system, comprising a processing circuit configured to:
obtain configuration of gaps during which the D2D-enabled device is not expected to receive any cellular signal but can use a receiver chain to detect D2D signals or D2D-related control information, either by:
receiving the configuration of gaps from a controlling node of the cellular communication network; or
deducing the timing of the gaps from timing of D2D subframes configured to carry D2D channels, whereby explicit signaling from the controlling node of the position of the gaps can be avoided; and
detect, during gaps, D2D signals or D2D-related control information. 59. The D2D-enabled device of claim 58, wherein the D2D-enabled device is not expected to transmit any cellular signals during the gaps. 60. The D2D-enabled device of claim 58, wherein a gap corresponds to a subframe configured to carry D2D channels. 61. The D2D-enabled device of claim 58, wherein a gap is extended before and/or after a subframe configured to carry D2D channels. 62. The D2D-enabled device of claim 61, wherein the gap is extended by a subframe before and/or after the subframe configured to carry D2D channels. 63. The D2D-enabled device of claim 58, wherein the processing circuit is further configured to receive an indication of a carrier to be monitored during a gap. 64. The D2D-enabled device of claim 58, wherein the gaps have been configured in such a way that collision with resources potentially used by devices in radio resource control idle (RRC_IDLE) mode in the cell of the controlling node is avoided. | 2,400 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.