Unnamed: 0
int64
0
350k
level_0
int64
0
351k
ApplicationNumber
int64
9.75M
96.1M
ArtUnit
int64
1.6k
3.99k
Abstract
stringlengths
1
8.37k
Claims
stringlengths
3
292k
abstract-claims
stringlengths
68
293k
TechCenter
int64
1.6k
3.9k
7,800
7,800
14,153,571
2,454
Provided are methods and systems for dynamic connection management. The method can comprise establishing a persistent connection with a web service, receiving a notification of a request for a communication session with a computing device via the web service, registering with a communication processing system to receive the request for the communication session, and establishing the communication session with the computing device via the communication processing system. When the communication session ends, the user device can be deregistered and free up the resources on the computing device.
1. A method comprising: establishing a persistent connection with a service; receiving a notification of a request for a communication session with a computing device via the service; registering with a communication processing system to receive the request for the communication session; and establishing the communication session with the computing device via the communication processing system. 2. The method of claim 1, wherein the service comprises a web service. 3. The method of claim 1, wherein the communication processing system comprises one or more communication protocol servers. 4. The method of claim 1, wherein the communication processing system comprises a telephone communication processing system. 5. The method of claim 1, wherein establishing a persistent connection with a service comprises providing login credentials to the service. 6. The method of claim 1, wherein the service is subscribed to a presence system. 7. The method of claim 6, wherein the service receives the notification via the presence system. 8. The method of claim 1, wherein registering with a communication processing system to receive the request for the communication session comprises registering with the communication processing system by session initiation protocol (SIP). 9. The method of claim 1, wherein the communication session comprises one or more of: internet telephone calls, multimedia distribution, multimedia conferences, and presentations. 10. A method comprising: establishing a persistent connection with a user device; engaging a presence system on behalf of the user device; receiving a request for a communication session from a computing device via the presence system; and notifying the user device of the request for the communication session; 11. The method of claim 10, wherein engaging a presence system on behalf of the user device comprises subscribing to the presence system on behalf of the user device. 12. The method of claim 10, wherein the communication processing system comprises a telephone communication processing system. 13. The method of claim 10, wherein establishing a persistent connection with the user device comprises receiving login credentials from the user device. 14. The method of claim 10, wherein the communication processing system comprises one or more communication protocol servers. 15. The method of claim 10, wherein the communication session comprises one or more of: internet telephone calls, multimedia distribution, multimedia conferences, and presentations. 16. A method comprising: receiving a request for a communication session from a first user device; notifying a second user device of the request for a communication by notifying a service in communication with the second user device; registering the second user device through a communication processing system; and establishing the communication session between the first user device and the second user device upon registration of the second user device. 17. The method of claim 16, wherein the communication processing system comprises a telephone communication processing system. 18. The method of claim 16, wherein the communication processing system comprises one or more communication protocol servers. 19. The method of claim 16, wherein registration of the second user device is by SIP. 20. The method of claim 16, wherein the service is subscribed to a presence system. 21. The method of claim 20, wherein notifying a service comprises notifying the presence system the service is subscribed to. 22. The method of claim 16, wherein the service has a persistent connection with the second user device.
Provided are methods and systems for dynamic connection management. The method can comprise establishing a persistent connection with a web service, receiving a notification of a request for a communication session with a computing device via the web service, registering with a communication processing system to receive the request for the communication session, and establishing the communication session with the computing device via the communication processing system. When the communication session ends, the user device can be deregistered and free up the resources on the computing device.1. A method comprising: establishing a persistent connection with a service; receiving a notification of a request for a communication session with a computing device via the service; registering with a communication processing system to receive the request for the communication session; and establishing the communication session with the computing device via the communication processing system. 2. The method of claim 1, wherein the service comprises a web service. 3. The method of claim 1, wherein the communication processing system comprises one or more communication protocol servers. 4. The method of claim 1, wherein the communication processing system comprises a telephone communication processing system. 5. The method of claim 1, wherein establishing a persistent connection with a service comprises providing login credentials to the service. 6. The method of claim 1, wherein the service is subscribed to a presence system. 7. The method of claim 6, wherein the service receives the notification via the presence system. 8. The method of claim 1, wherein registering with a communication processing system to receive the request for the communication session comprises registering with the communication processing system by session initiation protocol (SIP). 9. The method of claim 1, wherein the communication session comprises one or more of: internet telephone calls, multimedia distribution, multimedia conferences, and presentations. 10. A method comprising: establishing a persistent connection with a user device; engaging a presence system on behalf of the user device; receiving a request for a communication session from a computing device via the presence system; and notifying the user device of the request for the communication session; 11. The method of claim 10, wherein engaging a presence system on behalf of the user device comprises subscribing to the presence system on behalf of the user device. 12. The method of claim 10, wherein the communication processing system comprises a telephone communication processing system. 13. The method of claim 10, wherein establishing a persistent connection with the user device comprises receiving login credentials from the user device. 14. The method of claim 10, wherein the communication processing system comprises one or more communication protocol servers. 15. The method of claim 10, wherein the communication session comprises one or more of: internet telephone calls, multimedia distribution, multimedia conferences, and presentations. 16. A method comprising: receiving a request for a communication session from a first user device; notifying a second user device of the request for a communication by notifying a service in communication with the second user device; registering the second user device through a communication processing system; and establishing the communication session between the first user device and the second user device upon registration of the second user device. 17. The method of claim 16, wherein the communication processing system comprises a telephone communication processing system. 18. The method of claim 16, wherein the communication processing system comprises one or more communication protocol servers. 19. The method of claim 16, wherein registration of the second user device is by SIP. 20. The method of claim 16, wherein the service is subscribed to a presence system. 21. The method of claim 20, wherein notifying a service comprises notifying the presence system the service is subscribed to. 22. The method of claim 16, wherein the service has a persistent connection with the second user device.
2,400
7,801
7,801
14,746,970
2,485
A digital camera optically couples a monocentric lens to image sensor arrays, without optical fibers, yet shields the image sensor arrays from stray light. In some digital cameras, baffles are disposed between an outer surface of a monocentric lens and each image sensor array to shield the image sensor arrays from stray light. In other such digital cameras, an opaque mask defines a set of apertures, one aperture per image sensor array, to limit the amount of stray light. Some digital cameras include both masks and baffles.
1. A digital camera, comprising: a monocentric lens having a focal length, an outer surface and a center; a plurality of pixelated optical sensor arrays, each pixelated optical sensor array being oriented toward the center of the monocentric lens and spaced apart from the outer surface of the monocentric lens, such that the pixelated optical sensor array is disposed about the focal length of the monocentric lens from the center of the monocentric lens; and for each pixelated optical sensor array of the plurality of pixelated optical sensor arrays, at least one baffle disposed between the outer surface of the monocentric lens and the pixelated optical sensor array, the baffle corresponding to the pixelated optical sensor array and having a longitudinal axis normal to the baffle's corresponding pixelated optical sensor array and extending through the center of the monocentric lens. 2. A digital camera according to claim 1, wherein a portion, less than all, of the outer surface of the monocentric lens comprises a mask that defines a plurality of transparent apertures therethrough and is otherwise opaque at a predetermined wavelength, such that each aperture of the plurality of apertures is aligned with the respective baffle of the at least one baffle and limits an amount of light that can pass from the monocentric lens to the corresponding pixelated optical sensor array. 3. A digital camera according to claim 1, wherein the monocentric lens has no central aperture. 4. A digital camera according to claim 1, wherein at least one of the at least one baffle comprises a tube. 5. A digital camera according to claim 1, wherein at least one of the at least one baffle is frustoconical. 6. A digital camera according to claim 1, wherein a wall of at least one baffle is opaque at a predetermined wavelength. 7. A digital camera according to claim 1, wherein a wall of at least one baffle has a total hemispherical reflectivity of less than about 25% at predetermined wavelength. 8. A digital camera according to claim 1, wherein at least one baffle is spaced apart from the outer surface of the monocentric lens by at least about 1 mm. 9. A digital camera according to claim 1, wherein one end of at least one baffle is in contact with the outer surface of the monocentric lens. 10. A digital camera according to claim 1, wherein at least one baffle is spaced apart from the baffle's corresponding pixelated optical sensor array by at least about 1 mm. 11. A digital camera according to claim 1, wherein one end of at least one baffle is in contact with the baffle's corresponding pixelated optical sensor array. 12. A digital camera according to claim 1, wherein at least one pixelated optical sensor array of the plurality of pixelated optical sensor arrays is planar. 13. A digital camera according to claim 1, wherein at least one pixelated optical sensor array of the plurality of pixelated optical sensor arrays is curved. 14. A digital camera according to claim 1, wherein at least one pixelated optical sensor array of the plurality of pixelated optical sensor arrays is substantially parallel to the outer surface of the monocentric lens. 15. A digital camera according to claim 1, further comprising: an object catalog storing information about objects expected to be viewed by the digital camera; and a navigation controller communicatively coupled to the object catalog and to the plurality of pixelated optical sensor arrays, wherein the navigation controller uses at least some of the information stored in the object catalog and image data from at least one pixelated optical sensor array of the plurality of pixelated optical sensor arrays to automatically determine at least one of: a location of the digital camera and an orientation of the digital camera. 16. A digital camera according to claim 1, further comprising: an object catalog storing information about objects expected to be viewed by the digital camera; and a navigation controller communicatively coupled to the object catalog and to the plurality of pixelated optical sensor arrays, wherein the navigation controller uses at least some of the information stored in the object catalog and image data from at least one pixelated optical sensor array of the plurality of pixelated optical sensor arrays to automatically generate course correction information. 17. A digital camera, comprising: a monocentric lens having a focal length, an outer surface and a center; a plurality of pixelated optical sensor arrays, each pixelated optical sensor array being oriented toward the center of the monocentric lens and spaced apart from the outer surface of the monocentric lens, such that the pixelated optical sensor array is disposed about the focal length of the monocentric lens from the center of the monocentric lens; and a mask disposed between the monocentric lens and the plurality of pixelated optical sensor arrays, the mask defining a separate aperture corresponding to each pixelated optical sensor array of the plurality of pixelated optical sensor arrays and being otherwise opaque at a predetermined wavelength, each aperture being centered on a respective line normal to the aperture's corresponding pixelated optical sensor array and extending through the center of the monocentric lens, each aperture limiting an amount of light that can pass from the monocentric lens to the aperture's corresponding pixelated optical sensor array. 18. A digital camera according to claim 17, wherein the mask is disposed on the outer surface of the lens. 19. A digital camera according to claim 17, further comprising, for each pixelated optical sensor array of the plurality of pixelated optical sensor arrays, a baffle disposed between the outer surface of the monocentric lens and the pixelated optical sensor array, the baffle corresponding to the pixelated optical sensor array and having a longitudinal axis normal to the baffle's corresponding pixelated optical sensor array and extending through the center of the monocentric lens. 20. A digital camera according to claim 17, further comprising: an object catalog storing information about objects expected to be viewed by the digital camera; and a navigation controller communicatively coupled to the object catalog and to the plurality of pixelated optical sensor arrays, wherein the navigation controller uses at least some of the information stored in the object catalog and image data from at least one pixelated optical sensor array of the plurality of pixelated optical sensor arrays to automatically determine at least one of: a location of the digital camera and an orientation of the digital camera. 21. A digital camera according to claim 17, further comprising: an object catalog storing information about objects expected to be viewed by the digital camera; and a navigation controller communicatively coupled to the object catalog and to the plurality of pixelated optical sensor arrays, wherein the navigation controller uses at least some of the information stored in the object catalog and image data from at least one pixelated optical sensor array of the plurality of pixelated optical sensor arrays to automatically generate course correction information.
A digital camera optically couples a monocentric lens to image sensor arrays, without optical fibers, yet shields the image sensor arrays from stray light. In some digital cameras, baffles are disposed between an outer surface of a monocentric lens and each image sensor array to shield the image sensor arrays from stray light. In other such digital cameras, an opaque mask defines a set of apertures, one aperture per image sensor array, to limit the amount of stray light. Some digital cameras include both masks and baffles.1. A digital camera, comprising: a monocentric lens having a focal length, an outer surface and a center; a plurality of pixelated optical sensor arrays, each pixelated optical sensor array being oriented toward the center of the monocentric lens and spaced apart from the outer surface of the monocentric lens, such that the pixelated optical sensor array is disposed about the focal length of the monocentric lens from the center of the monocentric lens; and for each pixelated optical sensor array of the plurality of pixelated optical sensor arrays, at least one baffle disposed between the outer surface of the monocentric lens and the pixelated optical sensor array, the baffle corresponding to the pixelated optical sensor array and having a longitudinal axis normal to the baffle's corresponding pixelated optical sensor array and extending through the center of the monocentric lens. 2. A digital camera according to claim 1, wherein a portion, less than all, of the outer surface of the monocentric lens comprises a mask that defines a plurality of transparent apertures therethrough and is otherwise opaque at a predetermined wavelength, such that each aperture of the plurality of apertures is aligned with the respective baffle of the at least one baffle and limits an amount of light that can pass from the monocentric lens to the corresponding pixelated optical sensor array. 3. A digital camera according to claim 1, wherein the monocentric lens has no central aperture. 4. A digital camera according to claim 1, wherein at least one of the at least one baffle comprises a tube. 5. A digital camera according to claim 1, wherein at least one of the at least one baffle is frustoconical. 6. A digital camera according to claim 1, wherein a wall of at least one baffle is opaque at a predetermined wavelength. 7. A digital camera according to claim 1, wherein a wall of at least one baffle has a total hemispherical reflectivity of less than about 25% at predetermined wavelength. 8. A digital camera according to claim 1, wherein at least one baffle is spaced apart from the outer surface of the monocentric lens by at least about 1 mm. 9. A digital camera according to claim 1, wherein one end of at least one baffle is in contact with the outer surface of the monocentric lens. 10. A digital camera according to claim 1, wherein at least one baffle is spaced apart from the baffle's corresponding pixelated optical sensor array by at least about 1 mm. 11. A digital camera according to claim 1, wherein one end of at least one baffle is in contact with the baffle's corresponding pixelated optical sensor array. 12. A digital camera according to claim 1, wherein at least one pixelated optical sensor array of the plurality of pixelated optical sensor arrays is planar. 13. A digital camera according to claim 1, wherein at least one pixelated optical sensor array of the plurality of pixelated optical sensor arrays is curved. 14. A digital camera according to claim 1, wherein at least one pixelated optical sensor array of the plurality of pixelated optical sensor arrays is substantially parallel to the outer surface of the monocentric lens. 15. A digital camera according to claim 1, further comprising: an object catalog storing information about objects expected to be viewed by the digital camera; and a navigation controller communicatively coupled to the object catalog and to the plurality of pixelated optical sensor arrays, wherein the navigation controller uses at least some of the information stored in the object catalog and image data from at least one pixelated optical sensor array of the plurality of pixelated optical sensor arrays to automatically determine at least one of: a location of the digital camera and an orientation of the digital camera. 16. A digital camera according to claim 1, further comprising: an object catalog storing information about objects expected to be viewed by the digital camera; and a navigation controller communicatively coupled to the object catalog and to the plurality of pixelated optical sensor arrays, wherein the navigation controller uses at least some of the information stored in the object catalog and image data from at least one pixelated optical sensor array of the plurality of pixelated optical sensor arrays to automatically generate course correction information. 17. A digital camera, comprising: a monocentric lens having a focal length, an outer surface and a center; a plurality of pixelated optical sensor arrays, each pixelated optical sensor array being oriented toward the center of the monocentric lens and spaced apart from the outer surface of the monocentric lens, such that the pixelated optical sensor array is disposed about the focal length of the monocentric lens from the center of the monocentric lens; and a mask disposed between the monocentric lens and the plurality of pixelated optical sensor arrays, the mask defining a separate aperture corresponding to each pixelated optical sensor array of the plurality of pixelated optical sensor arrays and being otherwise opaque at a predetermined wavelength, each aperture being centered on a respective line normal to the aperture's corresponding pixelated optical sensor array and extending through the center of the monocentric lens, each aperture limiting an amount of light that can pass from the monocentric lens to the aperture's corresponding pixelated optical sensor array. 18. A digital camera according to claim 17, wherein the mask is disposed on the outer surface of the lens. 19. A digital camera according to claim 17, further comprising, for each pixelated optical sensor array of the plurality of pixelated optical sensor arrays, a baffle disposed between the outer surface of the monocentric lens and the pixelated optical sensor array, the baffle corresponding to the pixelated optical sensor array and having a longitudinal axis normal to the baffle's corresponding pixelated optical sensor array and extending through the center of the monocentric lens. 20. A digital camera according to claim 17, further comprising: an object catalog storing information about objects expected to be viewed by the digital camera; and a navigation controller communicatively coupled to the object catalog and to the plurality of pixelated optical sensor arrays, wherein the navigation controller uses at least some of the information stored in the object catalog and image data from at least one pixelated optical sensor array of the plurality of pixelated optical sensor arrays to automatically determine at least one of: a location of the digital camera and an orientation of the digital camera. 21. A digital camera according to claim 17, further comprising: an object catalog storing information about objects expected to be viewed by the digital camera; and a navigation controller communicatively coupled to the object catalog and to the plurality of pixelated optical sensor arrays, wherein the navigation controller uses at least some of the information stored in the object catalog and image data from at least one pixelated optical sensor array of the plurality of pixelated optical sensor arrays to automatically generate course correction information.
2,400
7,802
7,802
14,961,022
2,438
A computing device obtains a request from a user device to access a network beacon. The computing device obtains a device profile for the user device. The computing device determines whether the user device satisfies an authorization rule based on the state of the user device as indicated by the device profile. The computing device authorizes the user device to access the network beacon responsive to determining that the user device satisfies the authorization rule.
1. A system, comprising: a computing device; a storage device storing a plurality of computer instructions executable by the computing device, wherein the plurality of computer instructions cause the computing device to at least: obtain a request from a user device to access a network beacon; obtain a device profile for the user device, wherein the device profile indicates a state of the user device; determine whether the user device satisfies an authorization rule based on the state of the user device as indicated by the device profile; and authorize the user device to access the network beacon responsive to determining that the user device satisfies the authorization rule. 2. The system of claim 1, wherein the plurality of computer instructions further cause the computing device to at least: determine whether the user device satisfies the authorization rule subsequent to authorizing the user device to access the network beacon; and terminate access to the network beacon for the user device responsive to determining that the user device fails to satisfy the authorization rule. 3. The system of claim 1, wherein the plurality of computer instructions further cause the computing device to at least transmit a key to the user device in response to determining that the user device satisfies the authorization rule, wherein the key facilitates access to a network associated with the network beacon. 4. The system of claim 3, wherein the plurality of computer instructions further cause the computing device to at least: determine whether the user device satisfies the authorization rule subsequent to authorizing the user device to access the network beacon; and cause the key to be removed from the user device responsive to determining that the user device fails to satisfy the authorization rule. 5. The system of claim 1, wherein the plurality of computer instructions further cause the computing device to at least determine a stringency of the authorization rule based on the state of the user device as indicated by the device profile. 6. The system of claim 1, wherein the device profile specifies a location of the user device. 7. The system of claim 1, wherein the request comprises the device profile. 8. A method, comprising: obtaining a request from a user device to access a network beacon; obtaining a device profile for the user device, wherein the device profile indicates a state of the user device; determining whether the user device satisfies an authorization rule based on the state of the user device as indicated by the device profile; and authorizing the user device to access the network beacon responsive to determining that the user device satisfies the authorization rule. 9. The method of claim 8, further comprising determining whether the user device satisfies the authorization rule subsequent to authorizing the user device to access the network beacon; and terminating access to the network beacon for the user device responsive to determining that the user device fails to satisfy the authorization rule. 10. The method of claim 8, further comprising transmitting a key to the user device in response to determining that the user device satisfies the authorization rule, wherein the key facilitates access to a network associated with the network beacon. 11. The method of claim 10, further comprising determining whether the user device satisfies the authorization rule subsequent to authorizing the user device to access the network beacon; and causing the key to be removed from the user device responsive to determining that the user device fails to satisfy the authorization rule. 12. The method of claim 8, further comprising determining a stringency of the authorization rule based on the state of the user device as indicated by the device profile. 13. The method of claim 8, wherein the device profile specifies a location of the user device. 14. The method of claim 8, wherein the request comprises the device profile. 15. A non-transitory computer readable medium storing a plurality of computer instructions executable by a computing device, wherein the plurality of computer instructions, when executed, cause the computing device to at least: obtain a request from a user device to access a network beacon; obtain a device profile for the user device, wherein the device profile indicates a state of the user device; determine whether the user device satisfies an authorization rule based on the state of the user device as indicated by the device profile; and authorize the user device to access the network beacon responsive to determining that the user device satisfies the authorization rule. 16. The non-transitory computer readable medium of claim 15, wherein the plurality of computer instructions further cause the computing device to at least: determine whether the user device satisfies the authorization rule subsequent to authorizing the user device to access the network beacon; and terminate access to the network beacon for the user device responsive to determining that the user device fails to satisfy the authorization rule. 17. The non-transitory computer readable medium of claim 15, wherein the plurality of computer instructions further cause the computing device to at least transmit a key to the user device in response to determining that the user device satisfies the authorization rule, wherein the key facilitates access to a network associated with the network beacon. 18. The non-transitory computer readable medium of claim 17, wherein the plurality of computer instructions further cause the computing device to at least: determine whether the user device satisfies the authorization rule subsequent to authorizing the user device to access the network beacon; and cause the key to be removed from the user device responsive to determining that the user device fails to satisfy the authorization rule. 19. The non-transitory computer readable medium of claim 15, wherein the plurality of computer instructions further cause the computing device to at least determine a stringency of the authorization rule based on the state of the user device as indicated by the device profile. 20. The non-transitory computer readable medium of claim 15, wherein the device profile specifies a location of the user device.
A computing device obtains a request from a user device to access a network beacon. The computing device obtains a device profile for the user device. The computing device determines whether the user device satisfies an authorization rule based on the state of the user device as indicated by the device profile. The computing device authorizes the user device to access the network beacon responsive to determining that the user device satisfies the authorization rule.1. A system, comprising: a computing device; a storage device storing a plurality of computer instructions executable by the computing device, wherein the plurality of computer instructions cause the computing device to at least: obtain a request from a user device to access a network beacon; obtain a device profile for the user device, wherein the device profile indicates a state of the user device; determine whether the user device satisfies an authorization rule based on the state of the user device as indicated by the device profile; and authorize the user device to access the network beacon responsive to determining that the user device satisfies the authorization rule. 2. The system of claim 1, wherein the plurality of computer instructions further cause the computing device to at least: determine whether the user device satisfies the authorization rule subsequent to authorizing the user device to access the network beacon; and terminate access to the network beacon for the user device responsive to determining that the user device fails to satisfy the authorization rule. 3. The system of claim 1, wherein the plurality of computer instructions further cause the computing device to at least transmit a key to the user device in response to determining that the user device satisfies the authorization rule, wherein the key facilitates access to a network associated with the network beacon. 4. The system of claim 3, wherein the plurality of computer instructions further cause the computing device to at least: determine whether the user device satisfies the authorization rule subsequent to authorizing the user device to access the network beacon; and cause the key to be removed from the user device responsive to determining that the user device fails to satisfy the authorization rule. 5. The system of claim 1, wherein the plurality of computer instructions further cause the computing device to at least determine a stringency of the authorization rule based on the state of the user device as indicated by the device profile. 6. The system of claim 1, wherein the device profile specifies a location of the user device. 7. The system of claim 1, wherein the request comprises the device profile. 8. A method, comprising: obtaining a request from a user device to access a network beacon; obtaining a device profile for the user device, wherein the device profile indicates a state of the user device; determining whether the user device satisfies an authorization rule based on the state of the user device as indicated by the device profile; and authorizing the user device to access the network beacon responsive to determining that the user device satisfies the authorization rule. 9. The method of claim 8, further comprising determining whether the user device satisfies the authorization rule subsequent to authorizing the user device to access the network beacon; and terminating access to the network beacon for the user device responsive to determining that the user device fails to satisfy the authorization rule. 10. The method of claim 8, further comprising transmitting a key to the user device in response to determining that the user device satisfies the authorization rule, wherein the key facilitates access to a network associated with the network beacon. 11. The method of claim 10, further comprising determining whether the user device satisfies the authorization rule subsequent to authorizing the user device to access the network beacon; and causing the key to be removed from the user device responsive to determining that the user device fails to satisfy the authorization rule. 12. The method of claim 8, further comprising determining a stringency of the authorization rule based on the state of the user device as indicated by the device profile. 13. The method of claim 8, wherein the device profile specifies a location of the user device. 14. The method of claim 8, wherein the request comprises the device profile. 15. A non-transitory computer readable medium storing a plurality of computer instructions executable by a computing device, wherein the plurality of computer instructions, when executed, cause the computing device to at least: obtain a request from a user device to access a network beacon; obtain a device profile for the user device, wherein the device profile indicates a state of the user device; determine whether the user device satisfies an authorization rule based on the state of the user device as indicated by the device profile; and authorize the user device to access the network beacon responsive to determining that the user device satisfies the authorization rule. 16. The non-transitory computer readable medium of claim 15, wherein the plurality of computer instructions further cause the computing device to at least: determine whether the user device satisfies the authorization rule subsequent to authorizing the user device to access the network beacon; and terminate access to the network beacon for the user device responsive to determining that the user device fails to satisfy the authorization rule. 17. The non-transitory computer readable medium of claim 15, wherein the plurality of computer instructions further cause the computing device to at least transmit a key to the user device in response to determining that the user device satisfies the authorization rule, wherein the key facilitates access to a network associated with the network beacon. 18. The non-transitory computer readable medium of claim 17, wherein the plurality of computer instructions further cause the computing device to at least: determine whether the user device satisfies the authorization rule subsequent to authorizing the user device to access the network beacon; and cause the key to be removed from the user device responsive to determining that the user device fails to satisfy the authorization rule. 19. The non-transitory computer readable medium of claim 15, wherein the plurality of computer instructions further cause the computing device to at least determine a stringency of the authorization rule based on the state of the user device as indicated by the device profile. 20. The non-transitory computer readable medium of claim 15, wherein the device profile specifies a location of the user device.
2,400
7,803
7,803
14,751,227
2,476
Systems and methods for providing high-throughput and reliable operation in WiFi and cellular environments stem in antenna volume-constrained devices employs a switched or multiplexed cellular band antenna to support WiFi MIMO for mobile handheld operation. The device housing may a single, unitary metallic piece having the device antennas formed as part of the housing. Alternatively, one or more antennas may be internal to the device.
1. A portable electronic communication device comprising: a housing; a WiFi transceiver; an LTE (long term evolution) transceiver; and a plurality of antennas, including a first antenna operating for WiFi at 2400 MHz, and a second antenna supporting at least cellular bands between 2300 MHz and 2690 MHz, the second antenna also being linkable to the WiFi transceiver to provide MIMO (multiple input, multiple output) operation. 2. The portable electronic communication device in accordance with claim 1, wherein the device housing is metallic and the first and second antennas are formed as parts of the device housing. 3. The portable electronic communication device in accordance with claim 1, wherein at least one of the first and second antennas is internal to the device housing. 4. The portable electronic communication device in accordance with claim 1, wherein the second antenna is the sole device antenna operating at 2.4 and at 5.0 GHz. 5. The portable electronic communication device in accordance with claim 1, wherein the first antenna provides WiFi connectivity and the second antenna is switchable to provide WiFi connectivity via an RF (radio frequency) switch. 6. The portable electronic communication device in accordance with claim 1, wherein a first WiFi antenna provides WiFi connectivity and the secondary antenna is switchable to provide WiFi connectivity via a multiplexer. 7. The portable electronic communication device in accordance with claim 1, wherein the second antenna is a primary cellular antenna. 8. The portable electronic communication device in accordance with claim 1, wherein the second antenna is a cellular diversity antenna. 9. A method of antenna usage in a portable electronic communication device having a housing, a WiFi transceiver, an LTE (long term evolution) transceiver, and a plurality of antennas, the method comprising: operating a first one of the plurality of antennas as a primary WiFi antenna at 2400 MHz; operating a second one of the plurality of antennas as a secondary WiFi antenna that also supports at least cellular bands between 2300 MHz and 2690 MHz; and selectively linking the secondary WiFi antenna to the WiFi transceiver for MIMO (multiple input, multiple output) operation. 10. The method in accordance with claim 9, wherein the device housing is metallic and the primary WiFi antenna and secondary WiFi antenna are formed as parts of the device housing. 11. The method in accordance with claim 9, wherein at least one of the primary and secondary antennas is internal to the device housing. 12. The method in accordance with claim 9, wherein the secondary WiFi antenna is the sole device antenna operating at 2.4 and at 5.0 GHz. 13. The method in accordance with claim 9, wherein selectively linking the secondary WiFi antenna to the WiFi transceiver comprises using one of an RF (radio frequency) switch and a multiplexer. 14. The method in accordance with claim 9, wherein the secondary WiFi antenna is a primary cellular antenna. 15. The method in accordance with claim 9, wherein the secondary WiFi antenna is a cellular diversity antenna. 16. A portable electronic device comprising: a WiFi transceiver; an LTE (long term evolution) transceiver; a plurality of antennas including a primary WiFi antenna, a secondary WiFi antenna and an alternative WiFi antenna, wherein the secondary WiFi antenna also supports at least cellular bands between 2300 MHz and 2690 MHz; and a processor configured to selectively switch the WiFi transceiver to one of the secondary WiFi antenna and the alternative WiFi antenna for MIMO (multiple input, multiple output) operation based on detection of an impingement at the other of the secondary WiFi antenna and the alternative WiFi antenna. 17. The portable electronic device in accordance with claim 16, wherein detection of an impingement at the other of the secondary WiFi antenna and the alternative WiFi antenna employs an RSSI comparison to evaluate the performance of the secondary WiFi antenna or alternative WiFi antenna. 18. The portable electronic device in accordance with claim 16, wherein detection of an impingement at the other of the secondary WiFi antenna and the alternative WiFi antenna employs a capacitive sensor adjacent at least one of the secondary WiFi antenna and the alternative WiFi antenna. 19. The portable electronic device in accordance with claim 16, wherein the secondary WiFi antenna is a primary cellular antenna. 20. The portable electronic device in accordance with claim 16, wherein the secondary WiFi antenna is a cellular diversity antenna.
Systems and methods for providing high-throughput and reliable operation in WiFi and cellular environments stem in antenna volume-constrained devices employs a switched or multiplexed cellular band antenna to support WiFi MIMO for mobile handheld operation. The device housing may a single, unitary metallic piece having the device antennas formed as part of the housing. Alternatively, one or more antennas may be internal to the device.1. A portable electronic communication device comprising: a housing; a WiFi transceiver; an LTE (long term evolution) transceiver; and a plurality of antennas, including a first antenna operating for WiFi at 2400 MHz, and a second antenna supporting at least cellular bands between 2300 MHz and 2690 MHz, the second antenna also being linkable to the WiFi transceiver to provide MIMO (multiple input, multiple output) operation. 2. The portable electronic communication device in accordance with claim 1, wherein the device housing is metallic and the first and second antennas are formed as parts of the device housing. 3. The portable electronic communication device in accordance with claim 1, wherein at least one of the first and second antennas is internal to the device housing. 4. The portable electronic communication device in accordance with claim 1, wherein the second antenna is the sole device antenna operating at 2.4 and at 5.0 GHz. 5. The portable electronic communication device in accordance with claim 1, wherein the first antenna provides WiFi connectivity and the second antenna is switchable to provide WiFi connectivity via an RF (radio frequency) switch. 6. The portable electronic communication device in accordance with claim 1, wherein a first WiFi antenna provides WiFi connectivity and the secondary antenna is switchable to provide WiFi connectivity via a multiplexer. 7. The portable electronic communication device in accordance with claim 1, wherein the second antenna is a primary cellular antenna. 8. The portable electronic communication device in accordance with claim 1, wherein the second antenna is a cellular diversity antenna. 9. A method of antenna usage in a portable electronic communication device having a housing, a WiFi transceiver, an LTE (long term evolution) transceiver, and a plurality of antennas, the method comprising: operating a first one of the plurality of antennas as a primary WiFi antenna at 2400 MHz; operating a second one of the plurality of antennas as a secondary WiFi antenna that also supports at least cellular bands between 2300 MHz and 2690 MHz; and selectively linking the secondary WiFi antenna to the WiFi transceiver for MIMO (multiple input, multiple output) operation. 10. The method in accordance with claim 9, wherein the device housing is metallic and the primary WiFi antenna and secondary WiFi antenna are formed as parts of the device housing. 11. The method in accordance with claim 9, wherein at least one of the primary and secondary antennas is internal to the device housing. 12. The method in accordance with claim 9, wherein the secondary WiFi antenna is the sole device antenna operating at 2.4 and at 5.0 GHz. 13. The method in accordance with claim 9, wherein selectively linking the secondary WiFi antenna to the WiFi transceiver comprises using one of an RF (radio frequency) switch and a multiplexer. 14. The method in accordance with claim 9, wherein the secondary WiFi antenna is a primary cellular antenna. 15. The method in accordance with claim 9, wherein the secondary WiFi antenna is a cellular diversity antenna. 16. A portable electronic device comprising: a WiFi transceiver; an LTE (long term evolution) transceiver; a plurality of antennas including a primary WiFi antenna, a secondary WiFi antenna and an alternative WiFi antenna, wherein the secondary WiFi antenna also supports at least cellular bands between 2300 MHz and 2690 MHz; and a processor configured to selectively switch the WiFi transceiver to one of the secondary WiFi antenna and the alternative WiFi antenna for MIMO (multiple input, multiple output) operation based on detection of an impingement at the other of the secondary WiFi antenna and the alternative WiFi antenna. 17. The portable electronic device in accordance with claim 16, wherein detection of an impingement at the other of the secondary WiFi antenna and the alternative WiFi antenna employs an RSSI comparison to evaluate the performance of the secondary WiFi antenna or alternative WiFi antenna. 18. The portable electronic device in accordance with claim 16, wherein detection of an impingement at the other of the secondary WiFi antenna and the alternative WiFi antenna employs a capacitive sensor adjacent at least one of the secondary WiFi antenna and the alternative WiFi antenna. 19. The portable electronic device in accordance with claim 16, wherein the secondary WiFi antenna is a primary cellular antenna. 20. The portable electronic device in accordance with claim 16, wherein the secondary WiFi antenna is a cellular diversity antenna.
2,400
7,804
7,804
14,971,524
2,498
An approach is disclosed that presents, to a user of a device, content items accessible from the device with the content items being identified as familiar to an actual user of the device. In addition, one or more comparable items are also presented with the comparable items being identified as unfamiliar to the actual user of the device. A response is received from the user at the device that differentiates the content items the comparable items with the user being authenticated, or not, based on the response.
1. An method comprising: presenting, to a user of a device, one or more content items identified as being familiar to an actual user of the device and one or more comparable items that are identified as being unfamiliar to the actual user of the device; receiving a response at the device from the user after the presenting; and authenticating the user based on the response. 2. The method of claim 1 wherein the authenticating is performed before allowing the user access to data stored on the device. 3. The method of claim 1 further comprising: presenting a plurality of sets of the content items and the comparable items; receiving a plurality of responses from the user after presenting the plurality of sets; and identifying a number of correct responses from the plurality of responses, wherein the authenticating is based on the number of correct responses. 4. The method of claim 3 further comprising: selecting a plurality of content categories, wherein each set of content items and comparable items corresponds to a same one of the plurality of categories. 5. The method of claim 1 wherein at least one of the content categories is selected from a group consisting of images, music, documents, portions of documents, movies, media, a full list of installed applications on the device, a partial list of installed applications on the device, a listing of frequently accessed applications, and a listing of partial contact information. 6. The method of claim 1 further comprising: retrieving the content items from a nonvolatile memory accessible from the device; and retrieving the comparable items from a computer network accessible from the device. 7. The method of claim 1 further comprising: performing the presenting, receiving, and authenticating in response to the user being locked out of the device due to one or more failed login attempts using a primary authentication challenge. 8. An information handling system comprising: one or more processors; a memory coupled to at least one of the processors; a set of instructions stored in the memory and executed by at least one of the processors to: present, to a user of a device, one or more content items identified as being familiar to an actual user of the device and one or more comparable items that are identified as being unfamiliar to the actual user of the device; receive a response at the device from the user after the presenting; and authenticate the user based on the response. 9. The information handling system of claim 8 wherein the actions further comprise: allow the user access to data stored on the device in response to a successful authentication of the user. 10. The information handling system of claim 8 wherein the actions further comprise: present a plurality of sets of the content items and the comparable items; receive a plurality of responses from the user after presenting the plurality of sets; and identify a number of correct responses from the plurality of responses, wherein the authenticating is based on the number of correct responses. 11. The information handling system of claim 10 wherein the actions further comprise: select a plurality of content categories, wherein each set of content items and comparable items corresponds to a same one of the plurality of categories. 12. The information handling system of claim 8 wherein at least one of the content categories is selected from a group consisting of images, music, documents, portions of documents, movies, media, a full list of installed applications on the device, a partial list of installed applications on the device, a listing of frequently accessed applications, and a listing of partial contact information. 13. The information handling system of claim 8 wherein the actions further comprise: retrieve the content items from a nonvolatile memory accessible from the device; and retrieve the comparable items from a computer network accessible from the device. 14. The information handling system of claim 8 wherein the actions further comprise: perform the actions to present, receive, and authenticate in response to the user being locked out of the device due to one or more failed login attempts using a primary authentication challenge. 15. A computer program product comprising: a computer readable storage medium comprising a set of computer instructions, the computer instructions effective to: present, to a user of a device, one or more content items identified as being familiar to an actual user of the device and one or more comparable items that are identified as being unfamiliar to the actual user of the device; receive a response at the device from the user after the presenting; and authenticate the user based on the response. 16. The computer program product of claim 15 wherein the set of instructions comprise additional instructions effective to: allow the user access to data stored on the device in response to a successful authentication of the user. 17. The computer program product of claim 15 wherein the set of instructions comprise additional instructions effective to: present a plurality of sets of the content items and the comparable items; receive a plurality of responses from the user after presenting the plurality of sets; and identify a number of correct responses from the plurality of responses, wherein the authenticating is based on the number of correct responses. 18. The computer program product of claim 17 wherein the set of instructions comprise additional instructions effective to: select a plurality of content categories, wherein each set of content items and comparable items corresponds to a same one of the plurality of categories. 19. The computer program product of claim 15 wherein at least one of the content categories is selected from a group consisting of images, music, documents, portions of documents, movies, media, a full list of installed applications on the device, a partial list of installed applications on the device, a listing of frequently accessed applications, and a listing of partial contact information. 20. The computer program product of claim 15 wherein the set of instructions comprise additional instructions effective to: retrieve the content items from a nonvolatile memory accessible from the device; and retrieve the comparable items from a computer network accessible from the device.
An approach is disclosed that presents, to a user of a device, content items accessible from the device with the content items being identified as familiar to an actual user of the device. In addition, one or more comparable items are also presented with the comparable items being identified as unfamiliar to the actual user of the device. A response is received from the user at the device that differentiates the content items the comparable items with the user being authenticated, or not, based on the response.1. An method comprising: presenting, to a user of a device, one or more content items identified as being familiar to an actual user of the device and one or more comparable items that are identified as being unfamiliar to the actual user of the device; receiving a response at the device from the user after the presenting; and authenticating the user based on the response. 2. The method of claim 1 wherein the authenticating is performed before allowing the user access to data stored on the device. 3. The method of claim 1 further comprising: presenting a plurality of sets of the content items and the comparable items; receiving a plurality of responses from the user after presenting the plurality of sets; and identifying a number of correct responses from the plurality of responses, wherein the authenticating is based on the number of correct responses. 4. The method of claim 3 further comprising: selecting a plurality of content categories, wherein each set of content items and comparable items corresponds to a same one of the plurality of categories. 5. The method of claim 1 wherein at least one of the content categories is selected from a group consisting of images, music, documents, portions of documents, movies, media, a full list of installed applications on the device, a partial list of installed applications on the device, a listing of frequently accessed applications, and a listing of partial contact information. 6. The method of claim 1 further comprising: retrieving the content items from a nonvolatile memory accessible from the device; and retrieving the comparable items from a computer network accessible from the device. 7. The method of claim 1 further comprising: performing the presenting, receiving, and authenticating in response to the user being locked out of the device due to one or more failed login attempts using a primary authentication challenge. 8. An information handling system comprising: one or more processors; a memory coupled to at least one of the processors; a set of instructions stored in the memory and executed by at least one of the processors to: present, to a user of a device, one or more content items identified as being familiar to an actual user of the device and one or more comparable items that are identified as being unfamiliar to the actual user of the device; receive a response at the device from the user after the presenting; and authenticate the user based on the response. 9. The information handling system of claim 8 wherein the actions further comprise: allow the user access to data stored on the device in response to a successful authentication of the user. 10. The information handling system of claim 8 wherein the actions further comprise: present a plurality of sets of the content items and the comparable items; receive a plurality of responses from the user after presenting the plurality of sets; and identify a number of correct responses from the plurality of responses, wherein the authenticating is based on the number of correct responses. 11. The information handling system of claim 10 wherein the actions further comprise: select a plurality of content categories, wherein each set of content items and comparable items corresponds to a same one of the plurality of categories. 12. The information handling system of claim 8 wherein at least one of the content categories is selected from a group consisting of images, music, documents, portions of documents, movies, media, a full list of installed applications on the device, a partial list of installed applications on the device, a listing of frequently accessed applications, and a listing of partial contact information. 13. The information handling system of claim 8 wherein the actions further comprise: retrieve the content items from a nonvolatile memory accessible from the device; and retrieve the comparable items from a computer network accessible from the device. 14. The information handling system of claim 8 wherein the actions further comprise: perform the actions to present, receive, and authenticate in response to the user being locked out of the device due to one or more failed login attempts using a primary authentication challenge. 15. A computer program product comprising: a computer readable storage medium comprising a set of computer instructions, the computer instructions effective to: present, to a user of a device, one or more content items identified as being familiar to an actual user of the device and one or more comparable items that are identified as being unfamiliar to the actual user of the device; receive a response at the device from the user after the presenting; and authenticate the user based on the response. 16. The computer program product of claim 15 wherein the set of instructions comprise additional instructions effective to: allow the user access to data stored on the device in response to a successful authentication of the user. 17. The computer program product of claim 15 wherein the set of instructions comprise additional instructions effective to: present a plurality of sets of the content items and the comparable items; receive a plurality of responses from the user after presenting the plurality of sets; and identify a number of correct responses from the plurality of responses, wherein the authenticating is based on the number of correct responses. 18. The computer program product of claim 17 wherein the set of instructions comprise additional instructions effective to: select a plurality of content categories, wherein each set of content items and comparable items corresponds to a same one of the plurality of categories. 19. The computer program product of claim 15 wherein at least one of the content categories is selected from a group consisting of images, music, documents, portions of documents, movies, media, a full list of installed applications on the device, a partial list of installed applications on the device, a listing of frequently accessed applications, and a listing of partial contact information. 20. The computer program product of claim 15 wherein the set of instructions comprise additional instructions effective to: retrieve the content items from a nonvolatile memory accessible from the device; and retrieve the comparable items from a computer network accessible from the device.
2,400
7,805
7,805
14,662,868
2,441
Technologies described herein relate to receiving data from a social networking application, wherein the data is generated by a first individual, and executing an entity extraction algorithm to extract at least one entity from the received data. A hyperlink is displayed on a computing device utilized by a second individual, wherein the hyperlink is based at least in part upon the at least one entity, and the hyperlink is configured to direct the first individual to a search engine and is further configured to cause the search engine to execute a search that pertains to the at least one entity.
1. A method comprising the following computer-executable acts: extracting an entity from social networking data of a user, the entity comprising a keyword and a disambiguated canonical meaning of the keyword; selecting an activity from amongst a plurality of possible activities based upon the entity extracted from the social networking data of the user, the activity performable with respect to the entity; transmitting information that is indicative of the activity to a computing device of the user, the information transmitted for presentment to the user by way of an output interface of the computing device; and performing at least one computing operation in response to receipt of an indication that the user wishes to pursue the activity with respect to the entity. 2. The method of claim 1, the activity related to acquisition of information about the entity, the at least one computing operation being execution of a search to acquire the information, the method further comprising causing the information to be presented to the user by way of the output interface of the computing device. 3. The method of claim 1, wherein performing the at least one computing operation comprises: causing a search engine to execute a search for the entity; and transmitting information based upon the search to the computing device of the user. 4. The method of claim 1, the output interface being a display of the computing device, wherein transmitting the indication that is indicative of the activity to the computing device of the user comprises transmitting a hyperlink for presentment on the display, and wherein performing the at least one computing operation comprises performing the at least one computing operation in response to receipt of an indication that the user has selected the hyperlink. 5. The method of claim 1, further comprising: generating the plurality of possible activities based upon queries previously submitted to a search engine, the queries comprise the keyword. 6. The method of claim 1, wherein transmitting the information that is indicative of the activity of the computing device of the user comprises causing a hyperlink to be displayed on a display of the computing device together with the social networking data when the user logs into a social networking application to view the social networking data on the computing device. 7. The method of claim 1, further comprising: accessing the social networking data from a social networking application, the social networking data is a status message update posted to the social networking application by a second user, wherein the second user is a contact of the user in the social networking application. 8. The method of claim 1, wherein extracting the entity from the social networking data of the user comprises: extracting the keyword from the social networking data; and determining the canonical meaning of the keyword based upon a context in which the keyword appears in the social networking data. 9. The method of claim 1, the entity is a geographic location, and wherein performing the at least one computing operation comprises transmitting data to the computing device of the user that causes a map pertaining to the geographic location to be presented on a display of the computing device. 10. The method of claim 1, wherein selecting the activity from amongst the plurality of possible activities based upon the entity extracted from the social networking data of the user comprises: selecting the activity from amongst the plurality of possible activities based upon known or inferred interests of the user. 11. A computing system comprising: at least one processor; and memory that comprises instructions that are executed by the at least one processor, the instructions, when executed by the at least one processor, cause the at least one processor to perform acts comprising: selecting an activity from amongst a plurality of predefined activities based upon an entity extracted from social networking data of a user, the entity comprising a keyword in the social networking data of the user and a canonical meaning of the keyword; and causing information that is indicative of the activity to be transmitted to a computing device of the user for presentment to the user by way of an output interface of the computing device; and in response to receipt of an indication that the user wishes to pursue the activity, performing at least one computing operation that pertains to the activity. 12. The computing system of claim 11, wherein performing the at least one computing operation comprises executing a search based upon the entity extracted from the social networking data of the user. 13. The computing system of claim 11, wherein selecting the activity from amongst the plurality of predefined activities comprises: ranking the plurality of predefined activities based upon the entity extracted from the social networking data of the user; and selecting the activity based upon the ranking of the plurality of predefined activities, the activity being the most highly ranked amongst the plurality of predefined activities. 14. The computing system of claim 11, wherein selecting the activity from amongst the plurality of predefined activities comprises: comparing a category assigned to the entity extracted from the social networking data of the user with a category assigned to the activity; and selecting the activity based upon the category assigned to the entity matching the category assigned to the activity. 15. The computing system of claim 11, wherein causing the information that is indicative of the activity to be transmitted to the computing device of the user comprises causing a hyperlink to be presented on a display of the computing device, the hyperlink representative of the activity, the acts further comprising: performing the at least one computing operation that pertains to the activity in response to receiving an indication that the user has selected the hyperlink on the display of the computing device. 16. The computing system of claim 15, wherein the social networking data is a message generated by a second user by way of a social networking application, the user and the second user are contacts in the social networking application, and the message accessible to the user by way of the social networking application. 17. The computing system of claim 16, wherein causing the information that is indicative of the activity to be transmitted to the computing device of the user comprises causing the hyperlink to be presented with the message when the message is accessed by the user by way of the social networking application. 18. The computing system of claim 11, the information that is indicative of the activity being a template phrase that is populated with the entity. 19. The computing system of claim 11, the acts further comprising: extracting the entity from the social networking data of the user, wherein extracting the entity comprises: extracting the keyword from the social networking data of the user; and identifying the canonical meaning of the keyword based upon at least one of a known interest of the user or context in which the keyword appears in the social networking data. 20. A computer-readable medium comprising computer-executable instructions that, when executed by processor, cause the processor to perform acts comprising: based upon an entity extracted from a social networking message posted by a contact of a user, identifying an activity from amongst a plurality of pre-defined activities, the activity relates to acquisition of information about the entity, the entity being a keyword in the social networking message and a canonical meaning of the keyword; in response to receipt of an indication from a computing device of the user that the user wishes to pursue the activity, executing a search for the entity to acquire the information; and causing the information to be transmitted to the computing device of the user for presentment to the user by way of an output interface of the computing device.
Technologies described herein relate to receiving data from a social networking application, wherein the data is generated by a first individual, and executing an entity extraction algorithm to extract at least one entity from the received data. A hyperlink is displayed on a computing device utilized by a second individual, wherein the hyperlink is based at least in part upon the at least one entity, and the hyperlink is configured to direct the first individual to a search engine and is further configured to cause the search engine to execute a search that pertains to the at least one entity.1. A method comprising the following computer-executable acts: extracting an entity from social networking data of a user, the entity comprising a keyword and a disambiguated canonical meaning of the keyword; selecting an activity from amongst a plurality of possible activities based upon the entity extracted from the social networking data of the user, the activity performable with respect to the entity; transmitting information that is indicative of the activity to a computing device of the user, the information transmitted for presentment to the user by way of an output interface of the computing device; and performing at least one computing operation in response to receipt of an indication that the user wishes to pursue the activity with respect to the entity. 2. The method of claim 1, the activity related to acquisition of information about the entity, the at least one computing operation being execution of a search to acquire the information, the method further comprising causing the information to be presented to the user by way of the output interface of the computing device. 3. The method of claim 1, wherein performing the at least one computing operation comprises: causing a search engine to execute a search for the entity; and transmitting information based upon the search to the computing device of the user. 4. The method of claim 1, the output interface being a display of the computing device, wherein transmitting the indication that is indicative of the activity to the computing device of the user comprises transmitting a hyperlink for presentment on the display, and wherein performing the at least one computing operation comprises performing the at least one computing operation in response to receipt of an indication that the user has selected the hyperlink. 5. The method of claim 1, further comprising: generating the plurality of possible activities based upon queries previously submitted to a search engine, the queries comprise the keyword. 6. The method of claim 1, wherein transmitting the information that is indicative of the activity of the computing device of the user comprises causing a hyperlink to be displayed on a display of the computing device together with the social networking data when the user logs into a social networking application to view the social networking data on the computing device. 7. The method of claim 1, further comprising: accessing the social networking data from a social networking application, the social networking data is a status message update posted to the social networking application by a second user, wherein the second user is a contact of the user in the social networking application. 8. The method of claim 1, wherein extracting the entity from the social networking data of the user comprises: extracting the keyword from the social networking data; and determining the canonical meaning of the keyword based upon a context in which the keyword appears in the social networking data. 9. The method of claim 1, the entity is a geographic location, and wherein performing the at least one computing operation comprises transmitting data to the computing device of the user that causes a map pertaining to the geographic location to be presented on a display of the computing device. 10. The method of claim 1, wherein selecting the activity from amongst the plurality of possible activities based upon the entity extracted from the social networking data of the user comprises: selecting the activity from amongst the plurality of possible activities based upon known or inferred interests of the user. 11. A computing system comprising: at least one processor; and memory that comprises instructions that are executed by the at least one processor, the instructions, when executed by the at least one processor, cause the at least one processor to perform acts comprising: selecting an activity from amongst a plurality of predefined activities based upon an entity extracted from social networking data of a user, the entity comprising a keyword in the social networking data of the user and a canonical meaning of the keyword; and causing information that is indicative of the activity to be transmitted to a computing device of the user for presentment to the user by way of an output interface of the computing device; and in response to receipt of an indication that the user wishes to pursue the activity, performing at least one computing operation that pertains to the activity. 12. The computing system of claim 11, wherein performing the at least one computing operation comprises executing a search based upon the entity extracted from the social networking data of the user. 13. The computing system of claim 11, wherein selecting the activity from amongst the plurality of predefined activities comprises: ranking the plurality of predefined activities based upon the entity extracted from the social networking data of the user; and selecting the activity based upon the ranking of the plurality of predefined activities, the activity being the most highly ranked amongst the plurality of predefined activities. 14. The computing system of claim 11, wherein selecting the activity from amongst the plurality of predefined activities comprises: comparing a category assigned to the entity extracted from the social networking data of the user with a category assigned to the activity; and selecting the activity based upon the category assigned to the entity matching the category assigned to the activity. 15. The computing system of claim 11, wherein causing the information that is indicative of the activity to be transmitted to the computing device of the user comprises causing a hyperlink to be presented on a display of the computing device, the hyperlink representative of the activity, the acts further comprising: performing the at least one computing operation that pertains to the activity in response to receiving an indication that the user has selected the hyperlink on the display of the computing device. 16. The computing system of claim 15, wherein the social networking data is a message generated by a second user by way of a social networking application, the user and the second user are contacts in the social networking application, and the message accessible to the user by way of the social networking application. 17. The computing system of claim 16, wherein causing the information that is indicative of the activity to be transmitted to the computing device of the user comprises causing the hyperlink to be presented with the message when the message is accessed by the user by way of the social networking application. 18. The computing system of claim 11, the information that is indicative of the activity being a template phrase that is populated with the entity. 19. The computing system of claim 11, the acts further comprising: extracting the entity from the social networking data of the user, wherein extracting the entity comprises: extracting the keyword from the social networking data of the user; and identifying the canonical meaning of the keyword based upon at least one of a known interest of the user or context in which the keyword appears in the social networking data. 20. A computer-readable medium comprising computer-executable instructions that, when executed by processor, cause the processor to perform acts comprising: based upon an entity extracted from a social networking message posted by a contact of a user, identifying an activity from amongst a plurality of pre-defined activities, the activity relates to acquisition of information about the entity, the entity being a keyword in the social networking message and a canonical meaning of the keyword; in response to receipt of an indication from a computing device of the user that the user wishes to pursue the activity, executing a search for the entity to acquire the information; and causing the information to be transmitted to the computing device of the user for presentment to the user by way of an output interface of the computing device.
2,400
7,806
7,806
15,218,836
2,442
Disclosed are a method, apparatus and system for instant message routing. The method includes: receiving a communication request from a source client to a destination client; acquiring the context associated with the source client and the destination client; and selecting a sub-user of the destination client for communication using a policy according to the context. When a source client requests communication with a virtual user, the method can route the communication request using a policy according to the context, to a sub-user of the virtual user which once communicated with the source client.
1-16. (canceled) 17. A computer-implemented method within a server, comprising: receiving, from a source client, a request to initiate an instant messaging (IM) communication with a destination client, acquiring, based upon a request, a context associated with the source client and the destination client; making a determination as to whether destination client is a virtual user including a group of sub-users or a common user; selecting, based upon a policy associated with the virtual user and applied to the context, one of the sub-users; and transferring the request to the selected one of the sub-users. 18. The method of claim 17, wherein the context includes information regarding a previous communication between the source client and the destination client. 19. The method of claim 18, wherein based upon a determination that the information regarding the previous communication is not valid, a different policy is used for the selecting. 20. The method of claim 17, wherein the context is updated based upon a result of the selecting. 21. The method of claim 17, wherein the server establishes a communication between the source client and the selected one of the sub-users. 22. The method of claim 17, wherein based upon the context, a combination of different policies are used for the selecting. 23. A server, comprising: a hardware processor configured to initiate the following operations: receiving, from a source client, a request to initiate an instant messaging (IM) communication with a destination client, acquiring, based upon a request, a context associated with the source client and the destination client; making a determination as to whether destination client is a virtual user including a group of sub-users or a common user; selecting, based upon a policy associated with the virtual user and applied to the context, one of the sub-users; and transferring the request to the selected one of the sub-users. 24. The server of claim 23, wherein the context includes information regarding a previous communication between the source client and the destination client. 25. The server of claim 24, wherein based upon a determination that the information regarding the previous communication is not valid, a different policy is used for the selecting 26. The server of claim 23, wherein the context is updated based upon a result of the selecting. 27. The server of claim 23, wherein the server establishes a communication between the source client and the selected one of the sub-users. 28. The server of claim 23, wherein based upon the context, a combination of different policies are used for the selecting. 29. A computer program product, comprising: a computer hardware storage device having stored therein program code, the program code, which when executed by a server, cause the server to perform: receiving, from a source client, a request to initiate an instant messaging (IM) communication with a destination client, acquiring, based upon a request, a context associated with the source client and the destination client; making a determination as to whether destination client is a virtual user including a group of sub-users or a common user; selecting, based upon a policy associated with the virtual user and applied to the context, one of the sub-users; and transferring the request to the selected one of the sub-users. 30. The computer program product of claim 29, wherein the context includes information regarding a previous communication between the source client and the destination client. 31. The computer program product of claim 30, wherein based upon a determination that the information regarding the previous communication is not valid, a different policy is used for the selecting 32. The computer program product of claim 29, wherein the context is updated based upon a result of the selecting. 33. The computer program product of claim 29, wherein the server establishes a communication between the source client and the selected one of the sub-users. 34. The computer program product of claim 29, wherein based upon the context, a combination of different policies are used for the selecting.
Disclosed are a method, apparatus and system for instant message routing. The method includes: receiving a communication request from a source client to a destination client; acquiring the context associated with the source client and the destination client; and selecting a sub-user of the destination client for communication using a policy according to the context. When a source client requests communication with a virtual user, the method can route the communication request using a policy according to the context, to a sub-user of the virtual user which once communicated with the source client.1-16. (canceled) 17. A computer-implemented method within a server, comprising: receiving, from a source client, a request to initiate an instant messaging (IM) communication with a destination client, acquiring, based upon a request, a context associated with the source client and the destination client; making a determination as to whether destination client is a virtual user including a group of sub-users or a common user; selecting, based upon a policy associated with the virtual user and applied to the context, one of the sub-users; and transferring the request to the selected one of the sub-users. 18. The method of claim 17, wherein the context includes information regarding a previous communication between the source client and the destination client. 19. The method of claim 18, wherein based upon a determination that the information regarding the previous communication is not valid, a different policy is used for the selecting. 20. The method of claim 17, wherein the context is updated based upon a result of the selecting. 21. The method of claim 17, wherein the server establishes a communication between the source client and the selected one of the sub-users. 22. The method of claim 17, wherein based upon the context, a combination of different policies are used for the selecting. 23. A server, comprising: a hardware processor configured to initiate the following operations: receiving, from a source client, a request to initiate an instant messaging (IM) communication with a destination client, acquiring, based upon a request, a context associated with the source client and the destination client; making a determination as to whether destination client is a virtual user including a group of sub-users or a common user; selecting, based upon a policy associated with the virtual user and applied to the context, one of the sub-users; and transferring the request to the selected one of the sub-users. 24. The server of claim 23, wherein the context includes information regarding a previous communication between the source client and the destination client. 25. The server of claim 24, wherein based upon a determination that the information regarding the previous communication is not valid, a different policy is used for the selecting 26. The server of claim 23, wherein the context is updated based upon a result of the selecting. 27. The server of claim 23, wherein the server establishes a communication between the source client and the selected one of the sub-users. 28. The server of claim 23, wherein based upon the context, a combination of different policies are used for the selecting. 29. A computer program product, comprising: a computer hardware storage device having stored therein program code, the program code, which when executed by a server, cause the server to perform: receiving, from a source client, a request to initiate an instant messaging (IM) communication with a destination client, acquiring, based upon a request, a context associated with the source client and the destination client; making a determination as to whether destination client is a virtual user including a group of sub-users or a common user; selecting, based upon a policy associated with the virtual user and applied to the context, one of the sub-users; and transferring the request to the selected one of the sub-users. 30. The computer program product of claim 29, wherein the context includes information regarding a previous communication between the source client and the destination client. 31. The computer program product of claim 30, wherein based upon a determination that the information regarding the previous communication is not valid, a different policy is used for the selecting 32. The computer program product of claim 29, wherein the context is updated based upon a result of the selecting. 33. The computer program product of claim 29, wherein the server establishes a communication between the source client and the selected one of the sub-users. 34. The computer program product of claim 29, wherein based upon the context, a combination of different policies are used for the selecting.
2,400
7,807
7,807
16,067,402
2,414
This disclosure provides a base station for a cellular network, and a method of operating the base station in the cellular network, the cellular network also including a second base station, wherein the first and second base stations include first and second oscillators providing a first and second periodic timing pulse respectively, the method including determining a relative timing offset between a first instance of the first periodic timing pulse for transmission of a frame from the first base station and a first instance of the second periodic timing pulse for transmission of a frame from the second base station; determining that the relative timing offset is changeable; and adjusting the first periodic timing pulse to maintain the relative timing offset by varying a first period between instances of the first periodic timing pulse such that the rate of change of the relative timing offset over time is reduced.
1. A method of operating a first base station in a cellular network, the cellular network also including a second base station, wherein the first and second base stations include first and second oscillators providing a first and second periodic timing pulse respectively, the method comprising: determining a relative timing offset between a first instance of the first periodic timing pulse for transmission of a frame from the first base station and a first instance of the second periodic timing pulse for transmission of a frame from the second base station; determining that the relative timing offset is changeable; and, in response, adjusting the first periodic timing pulse to maintain the relative timing offset by varying a first period between instances of the first periodic timing pulse such that a rate of change of the relative timing offset over time is reduced. 2. The method as claimed in claim 1, further comprising: determining if there is a Physical Cell Identifier (PCI) related interference issue with the second base station. 3. The method as claimed in claim 2, wherein the PCI related interference issue is due to the first and second base stations having the same PCI value. 4. The method as claimed in claim 2, wherein the PCI related interference issue is due to the first and second base stations having PCI values which are different but result in overlapping reference signals in their respective transmissions. 5. The method as claimed in claim 1, further comprising, initially: identifying a physical cell identifier conflict with the second base station; and determining if the physical cell identifier conflict is resolvable. 6. The method as claimed in claim 1, further comprising: adjusting the first periodic timing pulse by varying a timing of an instance of the periodic timing pulse such that the relative timing offset is varied. 7. A non-transitory computer-readable storage medium storing a computer program containing computer-executable code which, when executed on a computer, causes the computer to perform the method of claim 1. 8. A first base station operating in a cellular network, the cellular network also including a second base station, the first base station comprising: an oscillator providing a reference frequency; a processor adapted to derive a first periodic timing pulse from the reference frequency; a transceiver adapted for transmission of a frame at instances of the first periodic timing pulse, and further adapted to measure a second periodic timing pulse of the second base station, wherein the processor is further adapted to: determine a relative timing offset between a first instance of the first periodic timing pulse and a first instance of the second periodic timing pulse, determine that the relative timing offset is changeable, and to adjust the first periodic timing pulse to maintain the relative timing offset by varying a first period between instances of the first periodic timing pulses such that a rate of change of the relative timing offset over time is reduced. 9. The first base station as claimed in claim 8, wherein the processor is further adapted to: determine if there is a Physical Cell Identifier (PCI) related interference issue with the second base station. 10. The first base station as claimed in claim 9, wherein the PCI related interference issue is due to the first and second base stations having the same PCI value. 11. The first base station as claimed in claim 9, wherein the PCI related interference issue is due to the first and second base stations having PCI values which are different but result in overlapping reference signals in their respective transmissions. 12. The first base station as claimed in claim 8, wherein the processor is further adapted to: identify a physical cell identifier conflict with the second base station; and determine if the physical cell identifier conflict is resolvable. 13. The first base station as claimed in claim 8, wherein the processor is further adapted to: adjust the first periodic timing pulse by varying a timing of an instance of the periodic timing pulse such that the relative timing offset is varied.
This disclosure provides a base station for a cellular network, and a method of operating the base station in the cellular network, the cellular network also including a second base station, wherein the first and second base stations include first and second oscillators providing a first and second periodic timing pulse respectively, the method including determining a relative timing offset between a first instance of the first periodic timing pulse for transmission of a frame from the first base station and a first instance of the second periodic timing pulse for transmission of a frame from the second base station; determining that the relative timing offset is changeable; and adjusting the first periodic timing pulse to maintain the relative timing offset by varying a first period between instances of the first periodic timing pulse such that the rate of change of the relative timing offset over time is reduced.1. A method of operating a first base station in a cellular network, the cellular network also including a second base station, wherein the first and second base stations include first and second oscillators providing a first and second periodic timing pulse respectively, the method comprising: determining a relative timing offset between a first instance of the first periodic timing pulse for transmission of a frame from the first base station and a first instance of the second periodic timing pulse for transmission of a frame from the second base station; determining that the relative timing offset is changeable; and, in response, adjusting the first periodic timing pulse to maintain the relative timing offset by varying a first period between instances of the first periodic timing pulse such that a rate of change of the relative timing offset over time is reduced. 2. The method as claimed in claim 1, further comprising: determining if there is a Physical Cell Identifier (PCI) related interference issue with the second base station. 3. The method as claimed in claim 2, wherein the PCI related interference issue is due to the first and second base stations having the same PCI value. 4. The method as claimed in claim 2, wherein the PCI related interference issue is due to the first and second base stations having PCI values which are different but result in overlapping reference signals in their respective transmissions. 5. The method as claimed in claim 1, further comprising, initially: identifying a physical cell identifier conflict with the second base station; and determining if the physical cell identifier conflict is resolvable. 6. The method as claimed in claim 1, further comprising: adjusting the first periodic timing pulse by varying a timing of an instance of the periodic timing pulse such that the relative timing offset is varied. 7. A non-transitory computer-readable storage medium storing a computer program containing computer-executable code which, when executed on a computer, causes the computer to perform the method of claim 1. 8. A first base station operating in a cellular network, the cellular network also including a second base station, the first base station comprising: an oscillator providing a reference frequency; a processor adapted to derive a first periodic timing pulse from the reference frequency; a transceiver adapted for transmission of a frame at instances of the first periodic timing pulse, and further adapted to measure a second periodic timing pulse of the second base station, wherein the processor is further adapted to: determine a relative timing offset between a first instance of the first periodic timing pulse and a first instance of the second periodic timing pulse, determine that the relative timing offset is changeable, and to adjust the first periodic timing pulse to maintain the relative timing offset by varying a first period between instances of the first periodic timing pulses such that a rate of change of the relative timing offset over time is reduced. 9. The first base station as claimed in claim 8, wherein the processor is further adapted to: determine if there is a Physical Cell Identifier (PCI) related interference issue with the second base station. 10. The first base station as claimed in claim 9, wherein the PCI related interference issue is due to the first and second base stations having the same PCI value. 11. The first base station as claimed in claim 9, wherein the PCI related interference issue is due to the first and second base stations having PCI values which are different but result in overlapping reference signals in their respective transmissions. 12. The first base station as claimed in claim 8, wherein the processor is further adapted to: identify a physical cell identifier conflict with the second base station; and determine if the physical cell identifier conflict is resolvable. 13. The first base station as claimed in claim 8, wherein the processor is further adapted to: adjust the first periodic timing pulse by varying a timing of an instance of the periodic timing pulse such that the relative timing offset is varied.
2,400
7,808
7,808
14,005,314
2,482
The invention relates to a spectacle device ( 1 ) for capturing at least one parameter of at least one eye ( 10 l , 10 r ) of a test person ( 31 ) wearing the spectacle device ( 1 ), the spectacle device ( 1 ) comprising a frame ( 4 ) configured to fix the spectacle device ( 1 ) to the head of the test person ( 31 ), at least one first capturing unit ( 3 l , 3 r ) configured to optically capture the at least one parameter of the at least one eye ( 10 l , 10 r ), and a second capturing unit ( 2 ) the optical capture range of which at least partly corresponds to an optical capture range of the at least one eye ( 10 l , 10 r ) and which is configured to output data concerning a field of view (FOV 1 , FOV 2 ) which is correlated with the optical capture range of the second capturing unit ( 2 ), wherein the field of view (FOV 1 , FOV 2 ) is adjustable.
1. A spectacle device for capturing at least one parameter of at least one eye of a test person wearing the spectacle device (1), the spectacle device comprising a frame configured to fix the spectacle device to the head of the test person, at least one first capturing unit configured to optically capture the at least one parameter of the at least one eye, and a second capturing unit the optical capture range of which at least partly corresponds to an optical capture range of the at least one eye and which is configured to output data concerning a field of view which is correlated with the optical capture range of the second capturing unit, characterized in that the field of view is adjustable. 2. The spectacle device according to claim 1, characterized in that the field of view is automatically adjustable in dependency on the at least one captured parameter of the at least one eye. 3. The spectacle device according to claim 1, characterized in that the field of view is manually adjustable, in particular by the test person or an operator. 4. The spectacle device according to claim 1, characterized in that the second capturing unit is arranged tiltable and/or rotatable within the frame, in particular rotatable about its optical axis, and in that the field of view is adjustable by a tilting or rotating of the second capturing unit. 5. The spectacle device according to claim 1, characterized by an optical element, in particular a prism and/or a lens, rotatably arranged on the optical axis of the second capturing unit, wherein by a rotation of the optical element the field of view is adjustable. 6. The spectacle device according to claim 1, characterized in that the second capturing unit comprises at least two sub-units of the capturing unit which differ with regard to their respective field of view and in that the field of view of the second capturing unit is adjustable due to the data captured by the sub-units of the capturing unit being separately analyzable and/or due to the sub-units of the capturing unit being separately controllable. 7. The spectacle device according to claim 1, characterized in that the second capturing unit comprises at least one two-field lens and/or at least one progressive multi-focal lens and/or at least one prism and/or at least one free-form lens, in particular a conical mirror. 8. The spectacle device according to claim 1, characterized in that the second capturing unit comprises a detector with a pixel array and the adjusting of the field of view is effected by selection of the pixels the data of which are captured. 9. The spectacle device according to claim 1, characterized in that the at least one captured parameter concerns an orientation and/or a position and/or an eyelid closure and/or a pupil diameter and/or limbus characteristic and/or a sclera characteristic and/or an iris characteristic and/or a characteristic of a blood vessel and/or a cornea characteristic of the at least one eye. 10. The spectacle device according to claim 1, characterized in that the second capturing unit is integrally connected to the frame and/or structurally integrated in the frame. 11. The spectacle device according to claim 1, characterized in that the frame comprises at least a first and a second frame element, wherein the second capturing unit is attached to the second frame element, and wherein the second frame element is pivotably hinged to the first frame element, and wherein the first frame element is formed in particular as an arm. 12. A method for capturing at least one parameter of at least one eye of a test person by means of a spectacle device, the method comprising: optically capturing the at least one parameter of the at least one eye by means of at least one first capturing unit; capturing an optical capturing range by means of a second capturing unit, wherein this optical capturing range corresponds at least partly to an optical capturing range of the at least one eye; outputting data concerning a field of view by the second capturing unit, wherein the field of view is correlated with the optical capturing range of the second capturing unit, characterized by the following: adjusting the field of view by means of an adjustment means of the spectacle device. 13. The method according to claim 12, characterized in that the field of view is automatically adjusted in dependency on the at least one captured parameter of the at least one eye. 14. The method according to claim 12, characterized in that the field of view is automatically adjusted in dependency on data concerning the kind of an object captured by the second capturing unit and/or a characteristic of the object and/or a distance of the object from the second capturing unit and/or an orientation of the object relative to the second capturing unit. 15. The method according to claim 12, characterized in that the field of view is adjusted in such a way that by the set of the adjustable field of views a resulting field of view is covered that essentially corresponds to the physiological field of view of a human being.
The invention relates to a spectacle device ( 1 ) for capturing at least one parameter of at least one eye ( 10 l , 10 r ) of a test person ( 31 ) wearing the spectacle device ( 1 ), the spectacle device ( 1 ) comprising a frame ( 4 ) configured to fix the spectacle device ( 1 ) to the head of the test person ( 31 ), at least one first capturing unit ( 3 l , 3 r ) configured to optically capture the at least one parameter of the at least one eye ( 10 l , 10 r ), and a second capturing unit ( 2 ) the optical capture range of which at least partly corresponds to an optical capture range of the at least one eye ( 10 l , 10 r ) and which is configured to output data concerning a field of view (FOV 1 , FOV 2 ) which is correlated with the optical capture range of the second capturing unit ( 2 ), wherein the field of view (FOV 1 , FOV 2 ) is adjustable.1. A spectacle device for capturing at least one parameter of at least one eye of a test person wearing the spectacle device (1), the spectacle device comprising a frame configured to fix the spectacle device to the head of the test person, at least one first capturing unit configured to optically capture the at least one parameter of the at least one eye, and a second capturing unit the optical capture range of which at least partly corresponds to an optical capture range of the at least one eye and which is configured to output data concerning a field of view which is correlated with the optical capture range of the second capturing unit, characterized in that the field of view is adjustable. 2. The spectacle device according to claim 1, characterized in that the field of view is automatically adjustable in dependency on the at least one captured parameter of the at least one eye. 3. The spectacle device according to claim 1, characterized in that the field of view is manually adjustable, in particular by the test person or an operator. 4. The spectacle device according to claim 1, characterized in that the second capturing unit is arranged tiltable and/or rotatable within the frame, in particular rotatable about its optical axis, and in that the field of view is adjustable by a tilting or rotating of the second capturing unit. 5. The spectacle device according to claim 1, characterized by an optical element, in particular a prism and/or a lens, rotatably arranged on the optical axis of the second capturing unit, wherein by a rotation of the optical element the field of view is adjustable. 6. The spectacle device according to claim 1, characterized in that the second capturing unit comprises at least two sub-units of the capturing unit which differ with regard to their respective field of view and in that the field of view of the second capturing unit is adjustable due to the data captured by the sub-units of the capturing unit being separately analyzable and/or due to the sub-units of the capturing unit being separately controllable. 7. The spectacle device according to claim 1, characterized in that the second capturing unit comprises at least one two-field lens and/or at least one progressive multi-focal lens and/or at least one prism and/or at least one free-form lens, in particular a conical mirror. 8. The spectacle device according to claim 1, characterized in that the second capturing unit comprises a detector with a pixel array and the adjusting of the field of view is effected by selection of the pixels the data of which are captured. 9. The spectacle device according to claim 1, characterized in that the at least one captured parameter concerns an orientation and/or a position and/or an eyelid closure and/or a pupil diameter and/or limbus characteristic and/or a sclera characteristic and/or an iris characteristic and/or a characteristic of a blood vessel and/or a cornea characteristic of the at least one eye. 10. The spectacle device according to claim 1, characterized in that the second capturing unit is integrally connected to the frame and/or structurally integrated in the frame. 11. The spectacle device according to claim 1, characterized in that the frame comprises at least a first and a second frame element, wherein the second capturing unit is attached to the second frame element, and wherein the second frame element is pivotably hinged to the first frame element, and wherein the first frame element is formed in particular as an arm. 12. A method for capturing at least one parameter of at least one eye of a test person by means of a spectacle device, the method comprising: optically capturing the at least one parameter of the at least one eye by means of at least one first capturing unit; capturing an optical capturing range by means of a second capturing unit, wherein this optical capturing range corresponds at least partly to an optical capturing range of the at least one eye; outputting data concerning a field of view by the second capturing unit, wherein the field of view is correlated with the optical capturing range of the second capturing unit, characterized by the following: adjusting the field of view by means of an adjustment means of the spectacle device. 13. The method according to claim 12, characterized in that the field of view is automatically adjusted in dependency on the at least one captured parameter of the at least one eye. 14. The method according to claim 12, characterized in that the field of view is automatically adjusted in dependency on data concerning the kind of an object captured by the second capturing unit and/or a characteristic of the object and/or a distance of the object from the second capturing unit and/or an orientation of the object relative to the second capturing unit. 15. The method according to claim 12, characterized in that the field of view is adjusted in such a way that by the set of the adjustable field of views a resulting field of view is covered that essentially corresponds to the physiological field of view of a human being.
2,400
7,809
7,809
14,578,579
2,449
A method includes monitoring a media stream that is streamed over a network at a given media bit-rate in a sequence of traffic bursts. Respective data volumes of one or more traffic bursts of the sequence are estimated, and the given media bit-rate is derived from the estimated data volumes.
1. A method, comprising: monitoring a media stream that is streamed over a network at a given media bit-rate in a sequence of traffic bursts; estimating respective data volumes of one or more traffic bursts of the sequence; and deriving the given media bit-rate from the estimated data volumes. 2. The method according to claim 1, wherein estimating the data volumes and deriving the given media bit-rate are performed without decoding content of the media stream. 3. The method according to claim 1, wherein the media stream is encrypted, and wherein estimating the data volumes and deriving the given media bit-rate are performed without decryption of the media stream. 4. The method according to claim 1, wherein estimating the data volumes comprises identifying respective start times of the traffic bursts, and distinguishing between the traffic bursts using the identified start times. 5. The method according to claim 4, wherein identifying the start times comprises interpreting upstream packets as requests that are each followed by a respective traffic burst. 6. The method according to claim 1, wherein estimating the data volumes comprises distinguishing between a buffering phase and a steady-state phase of the media stream, and assessing the data volumes during the steady-state phase. 7. The method according to claim 1, wherein estimating the data volumes comprises distinguishing between a buffering phase and a steady-state phase of the media stream, and assessing the data volumes during the buffering phase. 8. The method according to claim 1, and comprising calculating a performance metric of the media stream from the estimated data volumes of the traffic bursts. 9. The method according to claim 8, wherein calculating the performance metric comprises calculating at least one of a start delay, an occurrence of one or more stalls and a length of the stalls in the media stream. 10. The method according to claim 1, wherein the traffic bursts convey respective content segments having a predefined playback duration, and wherein deriving the given media bit-rate comprises, when the media stream is subject to congestion in the network, estimating the given media bit-rate based on the playback duration. 11. The method according to claim 1, and comprising estimating the data volumes and deriving the given media bit-rate only in response to verifying that the media stream matches an Adaptive Bit-Rate (ABR) traffic pattern. 12. The method according to claim 1, wherein deriving the given media bit-rate comprises verifying that the data volumes of the two or more traffic bursts differ from one another by no more than a predefined difference. 13. The method according to claim 1, wherein deriving the given media bit-rate comprises selecting a media bit-rate that best matches the estimated data volumes from among a predefined set of media bit-rates. 14. An apparatus, comprising: an interface, which is configured to receive a media stream that is streamed over a network at a given media bit-rate in a sequence of traffic bursts; and a processor, which is configured to estimate respective data volumes of one or more traffic bursts of the sequence, and to derive the given media bit-rate from the estimated data volumes. 15. The apparatus according to claim 14, wherein the processor is configured to estimate the data volumes and derive the given media bit-rate without decoding content of the media stream. 16. The apparatus according to claim 14, wherein the media stream is encrypted, and wherein the processor is configured to estimate the data volumes and derive the given media bit-rate without decryption of the media stream. 17. The apparatus according to claim 14, wherein the processor is configured to identify respective start times of the traffic bursts, and to distinguish between the traffic bursts using the identified start times. 18. The apparatus according to claim 17 wherein the processor is configured to identify the start times by interpreting upstream packets as requests that are each followed by a respective traffic burst. 19. The apparatus according to claim 14, wherein the processor is configured to distinguish between a buffering phase and a steady-state phase of the media stream, and to assess the data volumes during the steady-state phase. 20. The apparatus according to claim 14, wherein the processor is configured to distinguish between a buffering phase and a steady-state phase of the media stream, and to assess the data volumes during the buffering phase. 21. The apparatus according to claim 14, wherein the processor is configured to calculate a performance metric of the media stream from the estimated data volumes of the traffic bursts. 22. The apparatus according to claim 21, wherein the performance metric comprises at least one of a start delay, an occurrence of one or more stalls and a length of the stalls in the media stream. 23. The apparatus according to claim 14, wherein the traffic bursts convey respective content segments having a predefined playback duration, and wherein the processor is configured to calculate the given media bit-rate, when the media stream is subject to congestion in the network, based on the playback duration. 24. The apparatus according to claim 14, wherein the processor is configured to estimate the data volumes and derive the given media bit-rate only in response to verifying that the media stream matches an Adaptive Bit-Rate (ABR) traffic pattern. 25. The apparatus according to claim 14, wherein the processor is configured to verify that the data volumes of the two or more traffic bursts differ from one another by no more than a predefined difference. 26. The apparatus according to claim 14, wherein the processor is configured to derive the given media bit-rate by selecting a media bit-rate that best matches the estimated data volumes from among a predefined set of media bit-rates.
A method includes monitoring a media stream that is streamed over a network at a given media bit-rate in a sequence of traffic bursts. Respective data volumes of one or more traffic bursts of the sequence are estimated, and the given media bit-rate is derived from the estimated data volumes.1. A method, comprising: monitoring a media stream that is streamed over a network at a given media bit-rate in a sequence of traffic bursts; estimating respective data volumes of one or more traffic bursts of the sequence; and deriving the given media bit-rate from the estimated data volumes. 2. The method according to claim 1, wherein estimating the data volumes and deriving the given media bit-rate are performed without decoding content of the media stream. 3. The method according to claim 1, wherein the media stream is encrypted, and wherein estimating the data volumes and deriving the given media bit-rate are performed without decryption of the media stream. 4. The method according to claim 1, wherein estimating the data volumes comprises identifying respective start times of the traffic bursts, and distinguishing between the traffic bursts using the identified start times. 5. The method according to claim 4, wherein identifying the start times comprises interpreting upstream packets as requests that are each followed by a respective traffic burst. 6. The method according to claim 1, wherein estimating the data volumes comprises distinguishing between a buffering phase and a steady-state phase of the media stream, and assessing the data volumes during the steady-state phase. 7. The method according to claim 1, wherein estimating the data volumes comprises distinguishing between a buffering phase and a steady-state phase of the media stream, and assessing the data volumes during the buffering phase. 8. The method according to claim 1, and comprising calculating a performance metric of the media stream from the estimated data volumes of the traffic bursts. 9. The method according to claim 8, wherein calculating the performance metric comprises calculating at least one of a start delay, an occurrence of one or more stalls and a length of the stalls in the media stream. 10. The method according to claim 1, wherein the traffic bursts convey respective content segments having a predefined playback duration, and wherein deriving the given media bit-rate comprises, when the media stream is subject to congestion in the network, estimating the given media bit-rate based on the playback duration. 11. The method according to claim 1, and comprising estimating the data volumes and deriving the given media bit-rate only in response to verifying that the media stream matches an Adaptive Bit-Rate (ABR) traffic pattern. 12. The method according to claim 1, wherein deriving the given media bit-rate comprises verifying that the data volumes of the two or more traffic bursts differ from one another by no more than a predefined difference. 13. The method according to claim 1, wherein deriving the given media bit-rate comprises selecting a media bit-rate that best matches the estimated data volumes from among a predefined set of media bit-rates. 14. An apparatus, comprising: an interface, which is configured to receive a media stream that is streamed over a network at a given media bit-rate in a sequence of traffic bursts; and a processor, which is configured to estimate respective data volumes of one or more traffic bursts of the sequence, and to derive the given media bit-rate from the estimated data volumes. 15. The apparatus according to claim 14, wherein the processor is configured to estimate the data volumes and derive the given media bit-rate without decoding content of the media stream. 16. The apparatus according to claim 14, wherein the media stream is encrypted, and wherein the processor is configured to estimate the data volumes and derive the given media bit-rate without decryption of the media stream. 17. The apparatus according to claim 14, wherein the processor is configured to identify respective start times of the traffic bursts, and to distinguish between the traffic bursts using the identified start times. 18. The apparatus according to claim 17 wherein the processor is configured to identify the start times by interpreting upstream packets as requests that are each followed by a respective traffic burst. 19. The apparatus according to claim 14, wherein the processor is configured to distinguish between a buffering phase and a steady-state phase of the media stream, and to assess the data volumes during the steady-state phase. 20. The apparatus according to claim 14, wherein the processor is configured to distinguish between a buffering phase and a steady-state phase of the media stream, and to assess the data volumes during the buffering phase. 21. The apparatus according to claim 14, wherein the processor is configured to calculate a performance metric of the media stream from the estimated data volumes of the traffic bursts. 22. The apparatus according to claim 21, wherein the performance metric comprises at least one of a start delay, an occurrence of one or more stalls and a length of the stalls in the media stream. 23. The apparatus according to claim 14, wherein the traffic bursts convey respective content segments having a predefined playback duration, and wherein the processor is configured to calculate the given media bit-rate, when the media stream is subject to congestion in the network, based on the playback duration. 24. The apparatus according to claim 14, wherein the processor is configured to estimate the data volumes and derive the given media bit-rate only in response to verifying that the media stream matches an Adaptive Bit-Rate (ABR) traffic pattern. 25. The apparatus according to claim 14, wherein the processor is configured to verify that the data volumes of the two or more traffic bursts differ from one another by no more than a predefined difference. 26. The apparatus according to claim 14, wherein the processor is configured to derive the given media bit-rate by selecting a media bit-rate that best matches the estimated data volumes from among a predefined set of media bit-rates.
2,400
7,810
7,810
14,929,187
2,435
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security platform is “big data” driven and employs machine learning to perform security analytics. The security platform performs user/entity behavioral analytics (UEBA) to detect the security related anomalies and threats, regardless of whether such anomalies/threats were previously known. The security platform can include both real-time and batch paths/modes for detecting anomalies and threats. By visually presenting analytical results scored with risk ratings and supporting evidence, the security platform enables network security administrators to respond to a detected anomaly or threat, and to take action promptly.
1. A method comprising: receiving, by a computer system, event data representing a plurality of events on a computer network, the event data being indicative of a plurality of entities and at least one anomaly involved in the events; acquiring, for each event, an event-specific relationship graph indicative of entities involved in the event and one or more relationships between the entities involved in the event, each event-specific relationship graph including a plurality of nodes and a plurality of edges interconnecting the nodes, the nodes representing the entities involved in the event, each edge representing an interaction between a pair of entities involved in the event; acquiring anomaly data indicative of a plurality of security-related anomalies detected from the event data; combining the event-specific relationship graphs for the plurality of events with the anomaly data into a composite relationship graph, the composite relationship graph including nodes that represent the entities involved in the plurality of events and nodes that represent the anomalies detected based on the event data, wherein the entities involved in the plurality of events include at least two types of entities, the composite relationship graph further including edges that represent the relationships between the entities involved in the plurality of events and the anomalies; and detecting, by the computer system, a security threat by processing at least a portion of the composite relationship graph with a decision engine. 2. The method of claim 1, wherein the event data are machine data. 3. The method of claim 1, wherein the event data are timestamped machine data. 4. The method of claim 1, wherein at least one of said receiving event data, creating a data structure, combining the relationship graphs and identifying a security threat is performed by processing logic of a machine learning model. 5. The method of claim 1, wherein at least one of said receiving event data, said creating a data structure, combining the relationship graphs and identifying a security threat is performed in real time as the event data are received. 6. The method of claim 1, wherein at least one of said receiving event data, creating a data structure, combining the relationship graphs and identifying a security threat is performed in a batch mode based on the event data retrieved from persistent storage. 7. The method of claim 1, wherein the entities include at least one of a device in the computer network, a user of the device in the computer network, a website, and a data file stored in the device in the computer network. 8. The method of claim 1, wherein the decision engine is a machine learning model. 9. The method of claim 1, wherein said step of combining the relationship graphs comprises: transferring the relationship graphs from the memory of the computer system to non-volatile storage at a predetermined periodicity. 10. The method of claim 1, wherein said step of combining the relationship graphs comprises: for each event, identifying one or more computer network activities of a particular type associated with an entity that occur during a time period, based on the data structure representing the relationship graph for the event; combining the computer network activities of the particular type associated with the entity involved in the plurality of events into a combined computer network activity and counting the computer network activities that occur during a predefined time period; and storing the combined computer network activity and the count into a data file designated for the particular type and the time period. 11. The method of claim 1, wherein said step of combining the relationship graphs comprises: for each event, identifying one or more computer network activities of a particular type associated with an entity that occur during a time period, based on the data structure representing the relationship graph for the event; combining the computer network activities of the particular type associated with the entity involved in the plurality of events into a combined computer network activity and counting the computer network activities that occur during the time period; storing the combined computer network activity and count; and in response to detecting that combined computer network activities associated with the projection have timestamps that are older than a threshold time value, storing the combined network activities in a designated data container. 12. The method of claim 1, wherein said step of combining the relationship graphs comprises: for each event, identifying one or more computer network activities of a particular type associated with an entity that occur during a time period, based on the data structure representing the relationship graph for the event; and combining the computer network activities of the particular type associated with the entity involved in the plurality of events into a combined computer network activity and recording the combined computer network activity, the combined computer network activity including an activity type, an originating entity, a target entity, the number of times the computer network activities occur in the time period, a start time, an end time, an average gap period between the computer network activities that occur in the time period, or a standard deviation of gap periods between the computer network activities that occur in the time period. 13. The method of claim 1, wherein said step of combining the relationship graphs comprises: for each event, identifying one or more computer network activities of a particular type associated with an entity that occur during a time period based on the data structure representing the relationship graph for the event; combining the computer network activities of the particular type associated with the entity involved in the plurality of event into a combined computer network activity and recording the number of computer network activities that occur during the time period; and determining, by the computer system, an association between the combined computer network activity of the particular type and a particular projection of the composite relationship graph, the composite relationship graph including a plurality of projections that correspond to a plurality of categories of computer network activities; and storing the combined computer network activity into a designated data container. 14. The method of claim 1, wherein the composite relationship graph includes a plurality of projections, one of the projections being a subset of the composite relationship graph that includes edges representing a plurality of anomaly activities conducted by users. 15. The method of claim 1, wherein the composite relationship graph includes a plurality of projections, each of the projections being a subset of the composite relationship graph that includes edges representing a plurality of computer network activities of a particular category, the particular category of network activities corresponding to at least one of users logging into devices in the computer network, users visiting websites, users accessing files stored devices in the computer network, and users conducting anomaly activities. 16. The method of claim 1, further comprising: in response to recognizing that an anomaly has been detected from the event data, storing event data associated with the anomaly in non-volatile storage; and generating a visualization of the event data associated with the anomaly in response to an instruction to visualize details of the anomaly. 17. The method of claim 1, wherein the composite relationship graph includes a plurality of projections, each of the projection being a subset of the composite relationship graph that includes edges representing a plurality of computer network activities of a particular category, the projection being stored in a cluster of storage devices based on timestamps of combined computer network activities stored in data containers. 18. The method of claim 1, further comprising: identifying computer network activities represented in a projection of the composite relationship graph, the computer network activities having timestamps that satisfy a specified closeness criterion, wherein the composite relationship graph includes multiple projections, each of the projections being a subset of the composite relationship graph that includes edges representing a plurality of computer network activities of a particular category; and storing the identified computer network activities in proximity to each other in non-volatile storage. 19. The method of claim 1, further comprising: receiving, at a predetermined periodicity, from one or more machine learning models that identify security threats, requests for data from a projection of the composite relationship graph and corresponding to a time range, wherein the composite relationship graph includes multiple projections that correspond to multiple categories of computer network activities. 20. The method of claim 1, further comprising: receiving, at a predetermined periodicity from one or more machine learning models that identify security threats, requests for combined computer network activities from a projection of the composite relationship graph and corresponding to a time range, wherein the composite relationship graph includes multiple projections that correspond to multiple categories of computer network activities, and the combined computer network activities include information about computer network activities from multiple events. 21. The method of claim 1, further comprising: receiving, at a predetermined periodicity from multiple machine learning models that identify security threats, requests for data from a common range of projections of the composite relationship graph and corresponding to a time range, wherein the composite relationship graph includes multiple projections that correspond to multiple categories of computer network activities; and combining the data within the common range of projections and the common range of timestamps into a single input data structure as an input for the multiple machine learning models. 22. The method of claim 1, wherein one or more machine learning models receive at least portions of the composite relationship graph as inputs and identify security threats and anomalies based thereon, and wherein the one or more machine learning models are executed in a batch mode. 23. The method of claim 1, wherein one or more machine learning models receive at least portions of the composite relationship graph as inputs and identify security threats and anomalies based thereon, and wherein the one or more machine learning models are executed in a batch mode; and the method further comprising: storing the anomalies identified by the one or more machine learning models with an anomaly projection of the composite relationship graph; and storing the event data associated the identified anomalies in non-volatile storage. 24. The method of claim 1, wherein said identifying a security threat comprises: converting at least a portion of the composite relationship graph into an anomaly relationship graph, the anomaly relationship graph including anomaly nodes that represent anomalies and entity nodes that represent entities in the computer network; inputting the anomaly relationship graph into the decision engine, the decision engine having a machine learning model; identifying, by the machine learning model, a set of anomaly nodes interconnecting entities nodes that form a neighborhood cluster in the anomaly data structure; and identifying, by the machine learning model, a set of anomalies represented by the identified anomaly nodes as the security threat. 25. The method of claim 1, wherein said identifying a security threat comprises: converting at least a portion of the composite relationship graph into an anomaly relationship graph, the anomaly relationship graph including anomaly nodes that represent anomalies and entity nodes that represent entities in the computer network; inputting the anomaly relationship graph into the decision engine, the decision engine being a machine learning model; identifying, by the machine learning model, a subset of the anomaly relationship graph including anomaly nodes and entity nodes that have no relationships with other nodes outside of the subset in the anomaly relationship graph; and identifying, by the machine learning model, a set of anomalies represented by anomaly nodes within the subset as the security threat. 26. The method of claim 1, wherein said identifying a security threat comprises: converting at least a portion of the composite relationship graph into an anomaly relationship graph, the anomaly relationship graph including anomaly nodes that represent anomalies and entity nodes that represent entities in the computer network; inputting the anomaly relationship graph into the decision engine, the decision engine being a machine learning model; identifying, by the machine learning model, a set of anomaly nodes directly connecting a particular entity node in the anomaly relationship graph; and identifying, by the machine learning model, a set of anomalies represented by the identified anomaly nodes as the security threat. 27. The method of claim 1, wherein said identifying a security threat comprises: converting at least a portion of the composite relationship graph into an anomaly relationship graph, the anomaly relationship graph including anomaly nodes that represent anomalies and entity nodes that represent entities in the computer network; inputting the anomaly relationship graph into the decision engine, the decision engine being a machine learning model; identifying, by the machine learning model, a set of anomaly nodes directly connecting a particular entity node in the anomaly relationship graph; further identify a group of anomaly nodes from the identified plurality of anomaly nodes, the group of anomaly nodes having timestamps that satisfy a specific closeness criterion; and identifying, by the machine learning model, a set of anomalies represented by the identified group of anomaly nodes as the security threat. 28. The method of claim 1, wherein said identifying a security threat comprises: identifying, by the decision engine, a set of anomalies as the security threat based on the composite relationship graph; assigning the anomalies into categories of internal anomaly, malware anomaly, incoming anomaly and exfiltration anomaly; and confirming that the anomaly network activities form a security threat by applying a security rule to the anomalies based on the assigned categories of the anomalies. 29. A computing device comprising: a processor; and a memory storing instructions that, when executed by the processor, cause the computing device to perform a process including: receiving event data representing each of a plurality of events on a computer network, the event data being indicative of a plurality of entities and at least one anomaly involved in the events; acquiring, for each event, an event-specific relationship graph indicative of entities involved in the event and at least one relationship between the entities involved in the event, each event-specific relationship graph including a plurality of nodes and a plurality of edges interconnecting the nodes, the nodes representing the entities involved in the event, each edge representing an interaction between a pair of entities involved in the event; acquiring anomaly data indicative of a plurality of security-related anomalies detected from the event data; combining the event-specific relationship graphs for the plurality of events with the anomaly data into a composite relationship graph, the composite relationship graph including nodes that represent the entities involved in the plurality of events and nodes that represent the anomalies detected based on the event data, wherein the entities involved in the plurality of events include at least two types of entities, the composite relationship graph further including edges that represent the relationships between the entities involved in the plurality of events and the anomalies; and detecting a security threat by processing at least a portion of the composite relationship graph with a decision engine. 30. A non-transitory machine readable storage medium storing instructions, execution of which in a machine causes the machine to perform a process including: receiving event data representing each of a plurality of events on a computer network, the event data being indicative of a plurality of entities and at least one anomaly involved in the events; acquiring, for each event, an event-specific relationship graph indicative of entities involved in the event and at least one relationship between the entities involved in the event, each event-specific relationship graph including a plurality of nodes and a plurality of edges interconnecting the nodes, the nodes representing the entities involved in the event, each edge representing an interaction between a pair of entities involved in the event; acquiring anomaly data indicative of a plurality of security-related anomalies detected from the event data; combining the event-specific relationship graphs for the plurality of events with the anomaly data into a composite relationship graph, the composite relationship graph including nodes that represent the entities involved in the plurality of events and nodes that represent the anomalies detected based on the event data, wherein the entities involved in the plurality of events include at least two types of entities, the composite relationship graph further including edges that represent the relationships between the entities involved in the plurality of events and the anomalies; and detecting a security threat by processing at least a portion of the composite relationship graph with a decision engine.
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security platform is “big data” driven and employs machine learning to perform security analytics. The security platform performs user/entity behavioral analytics (UEBA) to detect the security related anomalies and threats, regardless of whether such anomalies/threats were previously known. The security platform can include both real-time and batch paths/modes for detecting anomalies and threats. By visually presenting analytical results scored with risk ratings and supporting evidence, the security platform enables network security administrators to respond to a detected anomaly or threat, and to take action promptly.1. A method comprising: receiving, by a computer system, event data representing a plurality of events on a computer network, the event data being indicative of a plurality of entities and at least one anomaly involved in the events; acquiring, for each event, an event-specific relationship graph indicative of entities involved in the event and one or more relationships between the entities involved in the event, each event-specific relationship graph including a plurality of nodes and a plurality of edges interconnecting the nodes, the nodes representing the entities involved in the event, each edge representing an interaction between a pair of entities involved in the event; acquiring anomaly data indicative of a plurality of security-related anomalies detected from the event data; combining the event-specific relationship graphs for the plurality of events with the anomaly data into a composite relationship graph, the composite relationship graph including nodes that represent the entities involved in the plurality of events and nodes that represent the anomalies detected based on the event data, wherein the entities involved in the plurality of events include at least two types of entities, the composite relationship graph further including edges that represent the relationships between the entities involved in the plurality of events and the anomalies; and detecting, by the computer system, a security threat by processing at least a portion of the composite relationship graph with a decision engine. 2. The method of claim 1, wherein the event data are machine data. 3. The method of claim 1, wherein the event data are timestamped machine data. 4. The method of claim 1, wherein at least one of said receiving event data, creating a data structure, combining the relationship graphs and identifying a security threat is performed by processing logic of a machine learning model. 5. The method of claim 1, wherein at least one of said receiving event data, said creating a data structure, combining the relationship graphs and identifying a security threat is performed in real time as the event data are received. 6. The method of claim 1, wherein at least one of said receiving event data, creating a data structure, combining the relationship graphs and identifying a security threat is performed in a batch mode based on the event data retrieved from persistent storage. 7. The method of claim 1, wherein the entities include at least one of a device in the computer network, a user of the device in the computer network, a website, and a data file stored in the device in the computer network. 8. The method of claim 1, wherein the decision engine is a machine learning model. 9. The method of claim 1, wherein said step of combining the relationship graphs comprises: transferring the relationship graphs from the memory of the computer system to non-volatile storage at a predetermined periodicity. 10. The method of claim 1, wherein said step of combining the relationship graphs comprises: for each event, identifying one or more computer network activities of a particular type associated with an entity that occur during a time period, based on the data structure representing the relationship graph for the event; combining the computer network activities of the particular type associated with the entity involved in the plurality of events into a combined computer network activity and counting the computer network activities that occur during a predefined time period; and storing the combined computer network activity and the count into a data file designated for the particular type and the time period. 11. The method of claim 1, wherein said step of combining the relationship graphs comprises: for each event, identifying one or more computer network activities of a particular type associated with an entity that occur during a time period, based on the data structure representing the relationship graph for the event; combining the computer network activities of the particular type associated with the entity involved in the plurality of events into a combined computer network activity and counting the computer network activities that occur during the time period; storing the combined computer network activity and count; and in response to detecting that combined computer network activities associated with the projection have timestamps that are older than a threshold time value, storing the combined network activities in a designated data container. 12. The method of claim 1, wherein said step of combining the relationship graphs comprises: for each event, identifying one or more computer network activities of a particular type associated with an entity that occur during a time period, based on the data structure representing the relationship graph for the event; and combining the computer network activities of the particular type associated with the entity involved in the plurality of events into a combined computer network activity and recording the combined computer network activity, the combined computer network activity including an activity type, an originating entity, a target entity, the number of times the computer network activities occur in the time period, a start time, an end time, an average gap period between the computer network activities that occur in the time period, or a standard deviation of gap periods between the computer network activities that occur in the time period. 13. The method of claim 1, wherein said step of combining the relationship graphs comprises: for each event, identifying one or more computer network activities of a particular type associated with an entity that occur during a time period based on the data structure representing the relationship graph for the event; combining the computer network activities of the particular type associated with the entity involved in the plurality of event into a combined computer network activity and recording the number of computer network activities that occur during the time period; and determining, by the computer system, an association between the combined computer network activity of the particular type and a particular projection of the composite relationship graph, the composite relationship graph including a plurality of projections that correspond to a plurality of categories of computer network activities; and storing the combined computer network activity into a designated data container. 14. The method of claim 1, wherein the composite relationship graph includes a plurality of projections, one of the projections being a subset of the composite relationship graph that includes edges representing a plurality of anomaly activities conducted by users. 15. The method of claim 1, wherein the composite relationship graph includes a plurality of projections, each of the projections being a subset of the composite relationship graph that includes edges representing a plurality of computer network activities of a particular category, the particular category of network activities corresponding to at least one of users logging into devices in the computer network, users visiting websites, users accessing files stored devices in the computer network, and users conducting anomaly activities. 16. The method of claim 1, further comprising: in response to recognizing that an anomaly has been detected from the event data, storing event data associated with the anomaly in non-volatile storage; and generating a visualization of the event data associated with the anomaly in response to an instruction to visualize details of the anomaly. 17. The method of claim 1, wherein the composite relationship graph includes a plurality of projections, each of the projection being a subset of the composite relationship graph that includes edges representing a plurality of computer network activities of a particular category, the projection being stored in a cluster of storage devices based on timestamps of combined computer network activities stored in data containers. 18. The method of claim 1, further comprising: identifying computer network activities represented in a projection of the composite relationship graph, the computer network activities having timestamps that satisfy a specified closeness criterion, wherein the composite relationship graph includes multiple projections, each of the projections being a subset of the composite relationship graph that includes edges representing a plurality of computer network activities of a particular category; and storing the identified computer network activities in proximity to each other in non-volatile storage. 19. The method of claim 1, further comprising: receiving, at a predetermined periodicity, from one or more machine learning models that identify security threats, requests for data from a projection of the composite relationship graph and corresponding to a time range, wherein the composite relationship graph includes multiple projections that correspond to multiple categories of computer network activities. 20. The method of claim 1, further comprising: receiving, at a predetermined periodicity from one or more machine learning models that identify security threats, requests for combined computer network activities from a projection of the composite relationship graph and corresponding to a time range, wherein the composite relationship graph includes multiple projections that correspond to multiple categories of computer network activities, and the combined computer network activities include information about computer network activities from multiple events. 21. The method of claim 1, further comprising: receiving, at a predetermined periodicity from multiple machine learning models that identify security threats, requests for data from a common range of projections of the composite relationship graph and corresponding to a time range, wherein the composite relationship graph includes multiple projections that correspond to multiple categories of computer network activities; and combining the data within the common range of projections and the common range of timestamps into a single input data structure as an input for the multiple machine learning models. 22. The method of claim 1, wherein one or more machine learning models receive at least portions of the composite relationship graph as inputs and identify security threats and anomalies based thereon, and wherein the one or more machine learning models are executed in a batch mode. 23. The method of claim 1, wherein one or more machine learning models receive at least portions of the composite relationship graph as inputs and identify security threats and anomalies based thereon, and wherein the one or more machine learning models are executed in a batch mode; and the method further comprising: storing the anomalies identified by the one or more machine learning models with an anomaly projection of the composite relationship graph; and storing the event data associated the identified anomalies in non-volatile storage. 24. The method of claim 1, wherein said identifying a security threat comprises: converting at least a portion of the composite relationship graph into an anomaly relationship graph, the anomaly relationship graph including anomaly nodes that represent anomalies and entity nodes that represent entities in the computer network; inputting the anomaly relationship graph into the decision engine, the decision engine having a machine learning model; identifying, by the machine learning model, a set of anomaly nodes interconnecting entities nodes that form a neighborhood cluster in the anomaly data structure; and identifying, by the machine learning model, a set of anomalies represented by the identified anomaly nodes as the security threat. 25. The method of claim 1, wherein said identifying a security threat comprises: converting at least a portion of the composite relationship graph into an anomaly relationship graph, the anomaly relationship graph including anomaly nodes that represent anomalies and entity nodes that represent entities in the computer network; inputting the anomaly relationship graph into the decision engine, the decision engine being a machine learning model; identifying, by the machine learning model, a subset of the anomaly relationship graph including anomaly nodes and entity nodes that have no relationships with other nodes outside of the subset in the anomaly relationship graph; and identifying, by the machine learning model, a set of anomalies represented by anomaly nodes within the subset as the security threat. 26. The method of claim 1, wherein said identifying a security threat comprises: converting at least a portion of the composite relationship graph into an anomaly relationship graph, the anomaly relationship graph including anomaly nodes that represent anomalies and entity nodes that represent entities in the computer network; inputting the anomaly relationship graph into the decision engine, the decision engine being a machine learning model; identifying, by the machine learning model, a set of anomaly nodes directly connecting a particular entity node in the anomaly relationship graph; and identifying, by the machine learning model, a set of anomalies represented by the identified anomaly nodes as the security threat. 27. The method of claim 1, wherein said identifying a security threat comprises: converting at least a portion of the composite relationship graph into an anomaly relationship graph, the anomaly relationship graph including anomaly nodes that represent anomalies and entity nodes that represent entities in the computer network; inputting the anomaly relationship graph into the decision engine, the decision engine being a machine learning model; identifying, by the machine learning model, a set of anomaly nodes directly connecting a particular entity node in the anomaly relationship graph; further identify a group of anomaly nodes from the identified plurality of anomaly nodes, the group of anomaly nodes having timestamps that satisfy a specific closeness criterion; and identifying, by the machine learning model, a set of anomalies represented by the identified group of anomaly nodes as the security threat. 28. The method of claim 1, wherein said identifying a security threat comprises: identifying, by the decision engine, a set of anomalies as the security threat based on the composite relationship graph; assigning the anomalies into categories of internal anomaly, malware anomaly, incoming anomaly and exfiltration anomaly; and confirming that the anomaly network activities form a security threat by applying a security rule to the anomalies based on the assigned categories of the anomalies. 29. A computing device comprising: a processor; and a memory storing instructions that, when executed by the processor, cause the computing device to perform a process including: receiving event data representing each of a plurality of events on a computer network, the event data being indicative of a plurality of entities and at least one anomaly involved in the events; acquiring, for each event, an event-specific relationship graph indicative of entities involved in the event and at least one relationship between the entities involved in the event, each event-specific relationship graph including a plurality of nodes and a plurality of edges interconnecting the nodes, the nodes representing the entities involved in the event, each edge representing an interaction between a pair of entities involved in the event; acquiring anomaly data indicative of a plurality of security-related anomalies detected from the event data; combining the event-specific relationship graphs for the plurality of events with the anomaly data into a composite relationship graph, the composite relationship graph including nodes that represent the entities involved in the plurality of events and nodes that represent the anomalies detected based on the event data, wherein the entities involved in the plurality of events include at least two types of entities, the composite relationship graph further including edges that represent the relationships between the entities involved in the plurality of events and the anomalies; and detecting a security threat by processing at least a portion of the composite relationship graph with a decision engine. 30. A non-transitory machine readable storage medium storing instructions, execution of which in a machine causes the machine to perform a process including: receiving event data representing each of a plurality of events on a computer network, the event data being indicative of a plurality of entities and at least one anomaly involved in the events; acquiring, for each event, an event-specific relationship graph indicative of entities involved in the event and at least one relationship between the entities involved in the event, each event-specific relationship graph including a plurality of nodes and a plurality of edges interconnecting the nodes, the nodes representing the entities involved in the event, each edge representing an interaction between a pair of entities involved in the event; acquiring anomaly data indicative of a plurality of security-related anomalies detected from the event data; combining the event-specific relationship graphs for the plurality of events with the anomaly data into a composite relationship graph, the composite relationship graph including nodes that represent the entities involved in the plurality of events and nodes that represent the anomalies detected based on the event data, wherein the entities involved in the plurality of events include at least two types of entities, the composite relationship graph further including edges that represent the relationships between the entities involved in the plurality of events and the anomalies; and detecting a security threat by processing at least a portion of the composite relationship graph with a decision engine.
2,400
7,811
7,811
14,698,929
2,441
Systems and methods for managing network resources are disclosed. One method can comprise receiving first information relating to network traffic parameters and receiving second information relating to one or more contextual events having an effect on the network traffic parameters. The first information and the second information and be correlated. And one or more network resources can be allocated based on the correlation of the first information and the second information.
1. A method comprising: receiving, by one or more computing devices, first information relating to network traffic parameters; receiving, by the one or more computing devices, second information relating to one or more contextual events having an effect on the network traffic parameters; correlating, by the one or more computing devices, the first information and the second information; and allocating one or more network resources based on the correlation of the first information and the second information. 2. The method of claim 1, wherein the network traffic parameters comprise one or more of congestion, call volume, retransmissions, and packet loss. 3. The method of claim 1, wherein the second information comprises one or more of a call detail record, weather information, E911 information, website information, emergency broadcast information, video feed, news feed, and geological information source. 4. The method of claim 1, wherein the second information comprises one or more of a location, source identifier, readership level, and content type. 5. The method of claim 1, wherein the correlating the first information with the second information comprises comparing one or more network signatures of the network traffic parameters to portions of the second information. 6. The method of claim 1, wherein the correlating the first information with the second information comprises identifying a traffic pattern based at least on the first information and the second information. 7. The method of claim 1, further comprising applying a weight factor to at least a portion of the second information, wherein the correlating the first information with the second information is based at least in part on the applied weight factor. 8. The method of claim 1, wherein the allocating the one or more network resources comprises allocating bandwidth to one or more services affected by the one or more contextual events. 9. The method of claim 1, wherein the allocating the one or more network resources comprises launching virtual instances to manage network traffic associated with the network traffic parameters. 10. A method comprising: receiving, by one or more computing devices, contextual information relating to events having a current or predicted effect on network traffic; classifying, by the one or more computing devices, the contextual information based one or more classification factors; generating, by the one or more computing devices, a traffic predictor based on the classified contextual information; and allocating one or more network resources based at least one the traffic predictor. 11. The method of claim 10, wherein the contextual information comprises one or more of a call detail record, weather information, E911 information, website information, emergency broadcast information, video feed, news feed, and geological information source. 12. The method of claim 10, wherein the classification factors comprise one or more of a location, source identifier, readership level, and content type. 13. The method of claim 10, wherein the allocating the one or more network resources comprises allocating bandwidth to one or more services affected by the one or more contextual events. 14. The method of claim 10, wherein the allocating the one or more network resources comprises launching virtual instances to manage network traffic associated with the network traffic parameters. 15. A method comprising: receiving, by one or more computing devices, first information from a first source relating to one or more contextual events; receiving, by the one or more computing devices, second information from a second source relating to one or more contextual events; identifying, by the one or more computing devices, one or more of the first information and the second information as having a predictive effect on network traffic; and allocating one or more network resources based on at least the identified one or more of the first information and the second information. 16. The method of claim 15, wherein one or more of the first information and the second information comprises one or more of a call detail record, weather information, E911 information, website information, emergency broadcast information, video feed, news feed, and geological information source. 17. The method of claim 15, wherein one or more of the first information and the second information comprises one or more of a location, source identifier, readership level, and content type. 18. The method of claim 15, wherein identifying one or more of the first information and the second information as having a predictive effect on network traffic comprises comparing one or more network signatures of the network traffic parameters to portions of the one or more of the first information and the second information. 19. The method of claim 15, wherein identifying one or more of the first information and the second information as having a predictive effect on network traffic comprises identifying a traffic pattern based at least on the one or more of the first information and the second information. 20. The method of claim 15, wherein identifying one or more of the first information and the second information as having a predictive effect on network traffic comprises comparing historic network traffic pattern based at least on the one or more of the first information and the second information. 21. The method of claim 15, wherein the allocating the one or more network resources comprises allocating bandwidth to one or more services affected by the one or more contextual events. 22. The method of claim 15, wherein the allocating the one or more network resources comprises launching virtual instances to manage network traffic associated with the network traffic parameters.
Systems and methods for managing network resources are disclosed. One method can comprise receiving first information relating to network traffic parameters and receiving second information relating to one or more contextual events having an effect on the network traffic parameters. The first information and the second information and be correlated. And one or more network resources can be allocated based on the correlation of the first information and the second information.1. A method comprising: receiving, by one or more computing devices, first information relating to network traffic parameters; receiving, by the one or more computing devices, second information relating to one or more contextual events having an effect on the network traffic parameters; correlating, by the one or more computing devices, the first information and the second information; and allocating one or more network resources based on the correlation of the first information and the second information. 2. The method of claim 1, wherein the network traffic parameters comprise one or more of congestion, call volume, retransmissions, and packet loss. 3. The method of claim 1, wherein the second information comprises one or more of a call detail record, weather information, E911 information, website information, emergency broadcast information, video feed, news feed, and geological information source. 4. The method of claim 1, wherein the second information comprises one or more of a location, source identifier, readership level, and content type. 5. The method of claim 1, wherein the correlating the first information with the second information comprises comparing one or more network signatures of the network traffic parameters to portions of the second information. 6. The method of claim 1, wherein the correlating the first information with the second information comprises identifying a traffic pattern based at least on the first information and the second information. 7. The method of claim 1, further comprising applying a weight factor to at least a portion of the second information, wherein the correlating the first information with the second information is based at least in part on the applied weight factor. 8. The method of claim 1, wherein the allocating the one or more network resources comprises allocating bandwidth to one or more services affected by the one or more contextual events. 9. The method of claim 1, wherein the allocating the one or more network resources comprises launching virtual instances to manage network traffic associated with the network traffic parameters. 10. A method comprising: receiving, by one or more computing devices, contextual information relating to events having a current or predicted effect on network traffic; classifying, by the one or more computing devices, the contextual information based one or more classification factors; generating, by the one or more computing devices, a traffic predictor based on the classified contextual information; and allocating one or more network resources based at least one the traffic predictor. 11. The method of claim 10, wherein the contextual information comprises one or more of a call detail record, weather information, E911 information, website information, emergency broadcast information, video feed, news feed, and geological information source. 12. The method of claim 10, wherein the classification factors comprise one or more of a location, source identifier, readership level, and content type. 13. The method of claim 10, wherein the allocating the one or more network resources comprises allocating bandwidth to one or more services affected by the one or more contextual events. 14. The method of claim 10, wherein the allocating the one or more network resources comprises launching virtual instances to manage network traffic associated with the network traffic parameters. 15. A method comprising: receiving, by one or more computing devices, first information from a first source relating to one or more contextual events; receiving, by the one or more computing devices, second information from a second source relating to one or more contextual events; identifying, by the one or more computing devices, one or more of the first information and the second information as having a predictive effect on network traffic; and allocating one or more network resources based on at least the identified one or more of the first information and the second information. 16. The method of claim 15, wherein one or more of the first information and the second information comprises one or more of a call detail record, weather information, E911 information, website information, emergency broadcast information, video feed, news feed, and geological information source. 17. The method of claim 15, wherein one or more of the first information and the second information comprises one or more of a location, source identifier, readership level, and content type. 18. The method of claim 15, wherein identifying one or more of the first information and the second information as having a predictive effect on network traffic comprises comparing one or more network signatures of the network traffic parameters to portions of the one or more of the first information and the second information. 19. The method of claim 15, wherein identifying one or more of the first information and the second information as having a predictive effect on network traffic comprises identifying a traffic pattern based at least on the one or more of the first information and the second information. 20. The method of claim 15, wherein identifying one or more of the first information and the second information as having a predictive effect on network traffic comprises comparing historic network traffic pattern based at least on the one or more of the first information and the second information. 21. The method of claim 15, wherein the allocating the one or more network resources comprises allocating bandwidth to one or more services affected by the one or more contextual events. 22. The method of claim 15, wherein the allocating the one or more network resources comprises launching virtual instances to manage network traffic associated with the network traffic parameters.
2,400
7,812
7,812
14,485,087
2,447
Systems, methods, apparatuses, and software that select network addresses of a network content server are provided herein. In one example, a method of operating a control node to perform network address selection that selects between different communication service providers according to network characteristics is presented. The control node receives a domain name lookup request from an end user device to reach a network content server. The control node processes network characteristics and the domain name lookup request to select a network address that corresponds to one of the communication service providers. The end user device can use the selected network address to reach the network content server over the selected communication service provider.
1. A control node for selecting a network address for an end user device to reach a network content server, the control node comprising: a communication interface configured to receive a domain name lookup request transferred by an end user device; a processing system configured to identify network characteristics for at least one of the end user device and a plurality of communication service providers associated with the network content server, and process the network characteristics and the domain name lookup request to identify a selected network address for the network content server that corresponds to at least a domain name indicated by the domain name lookup request; and the communication interface configured to transfer the selected network address for delivery to the end user device. 2. The control node of claim 1, comprising: the communication interface configured to receive performance data of network communications between the network content server and a second end user device routed through at least one of the plurality of communication service providers. 3. The control node of claim 2, comprising: the communication interface configured to receive the performance data transferred by at least one of the network content server and the second end user device. 4. The control node of claim 3, wherein the performance data comprises at least one of latency information and transfer throughput information. 5. The control node of claim 1, comprising: the processing system configured to identify at least one of an Internet Service Provider of the end user device and a network address range comprising a network address of the end user device to identify the network characteristics for the end user device. 6. A method of operating a control node to select a network address for an end user device to reach a network content server, the method comprising: receiving a domain name lookup request transferred by an end user device; identifying network characteristics for at least one of the end user device and a plurality of communication service providers associated with the network content server; processing the network characteristics and the domain name lookup request to identify a selected network address for the network content server that corresponds to at least a domain name indicated by the domain name lookup request; and transferring the selected network address for delivery to the end user device. 7. The method of claim 6, wherein identifying the network characteristics comprises receiving performance data of network communications between the network content server and a second end user device routed through at least one of the plurality of communication service providers. 8. The method of claim 7, wherein receiving the performance data comprises receiving the performance data transferred by at least one of the network content server and the second end user device. 9. The method of claim 8, wherein the performance data comprises at least one of latency information and transfer throughput information. 10. The method of claim 6, wherein identifying the network characteristics comprises identifying at least one of an Internet Service Provider of the end user device and a network address range comprising a network address of the end user device to identify the network characteristics for the end user device.
Systems, methods, apparatuses, and software that select network addresses of a network content server are provided herein. In one example, a method of operating a control node to perform network address selection that selects between different communication service providers according to network characteristics is presented. The control node receives a domain name lookup request from an end user device to reach a network content server. The control node processes network characteristics and the domain name lookup request to select a network address that corresponds to one of the communication service providers. The end user device can use the selected network address to reach the network content server over the selected communication service provider.1. A control node for selecting a network address for an end user device to reach a network content server, the control node comprising: a communication interface configured to receive a domain name lookup request transferred by an end user device; a processing system configured to identify network characteristics for at least one of the end user device and a plurality of communication service providers associated with the network content server, and process the network characteristics and the domain name lookup request to identify a selected network address for the network content server that corresponds to at least a domain name indicated by the domain name lookup request; and the communication interface configured to transfer the selected network address for delivery to the end user device. 2. The control node of claim 1, comprising: the communication interface configured to receive performance data of network communications between the network content server and a second end user device routed through at least one of the plurality of communication service providers. 3. The control node of claim 2, comprising: the communication interface configured to receive the performance data transferred by at least one of the network content server and the second end user device. 4. The control node of claim 3, wherein the performance data comprises at least one of latency information and transfer throughput information. 5. The control node of claim 1, comprising: the processing system configured to identify at least one of an Internet Service Provider of the end user device and a network address range comprising a network address of the end user device to identify the network characteristics for the end user device. 6. A method of operating a control node to select a network address for an end user device to reach a network content server, the method comprising: receiving a domain name lookup request transferred by an end user device; identifying network characteristics for at least one of the end user device and a plurality of communication service providers associated with the network content server; processing the network characteristics and the domain name lookup request to identify a selected network address for the network content server that corresponds to at least a domain name indicated by the domain name lookup request; and transferring the selected network address for delivery to the end user device. 7. The method of claim 6, wherein identifying the network characteristics comprises receiving performance data of network communications between the network content server and a second end user device routed through at least one of the plurality of communication service providers. 8. The method of claim 7, wherein receiving the performance data comprises receiving the performance data transferred by at least one of the network content server and the second end user device. 9. The method of claim 8, wherein the performance data comprises at least one of latency information and transfer throughput information. 10. The method of claim 6, wherein identifying the network characteristics comprises identifying at least one of an Internet Service Provider of the end user device and a network address range comprising a network address of the end user device to identify the network characteristics for the end user device.
2,400
7,813
7,813
14,905,496
2,439
Example embodiments disclosed herein relate to generate signal tokens indicative of malware. A code analysis is performed on known malware application code and known clean application code to generate tokens. Signal tokens indicative of malware are generated based on groupings of the tokens.
1. A computing device comprising: a memory and at least one processor to execute a plurality of modules including: a static code analysis module to determine a first and second set of tokens based on a static code analysis respectively performed on a first set of known malware application code and a second set of known clean application code; and a signal generation module to generate a set of signal tokens indicative of malware based on groupings of the tokens. 2. The computing device of claim 1, wherein the known malware application code is in the form of a known malware binary and the known clean application code is in the form of a known clean binary. 3. The computing device of claim 2, wherein the tokens are generated according to rules that include obfuscation tolerant rules. 4. The computing device of claim 3, wherein the respective first set of tokens and the respective second set of tokens are generated if one of the rules is a hit to the corresponding respective binaries. 5. The computing device of claim 1, wherein the set of signal tokens is based on machine learning. 6. The computing device of claim 1, wherein the groupings are based on at least two of a null dereference, resource leak, dead code, path manipulation, query string injection, command injection, resource injection, and denial of service. 7. The computing device of claim 1, further comprising: an output module to output the signal tokens to a signal token malware likeliness database. 8. A method comprising: performing code analysis based on rules on a first set of known malware application code and a second set of known clean application code to generate tokens; determining a set of the tokens indicative of malware; and generating a set of signal tokens based on groupings of the tokens indicative of malware. 9. The method of claim 8, wherein the set of the signals tokens is based on machine learning. 10. The method of claim 8, wherein the rules include obfuscation tolerant rules. 11. The method of claim 8, wherein the groupings include at least two of: toll fraud, rooting, abuse of permissions, application installed as a service, sensitive data retrieval, use of reflection, use of dynamic loading, and privacy violation. 12. The method of claim 11, wherein the toll fraud includes the use of a send text message function, wherein the rooting includes gaining privileged access to a device, wherein abuse of permissions includes requesting permissions above a particular threshold, and sensitive data retrieval includes a call to an Application Programming Interface to retrieve device specific information. 13. The method of claim 11, wherein the use of reflection includes the use of a function to download instructions. 14. A non-transitory machine-readable storage medium storing instructions that, if executed by at least one processor of a computing device, cause the computing device to: perform a static code analysis based on obfuscation tolerant rules on a first set of known malware binaries and a second set of known clean binaries to generate tokens; and generate a set of signal tokens indicative of malware based on groupings of the tokens based on machine learning. 15. The non-transitory machine-readable storage medium of claim 14, wherein the static code analysis further includes at least two of dataflow sources, structural rules, manifest Extensible Markup Language, semantic analysis, and control flow.
Example embodiments disclosed herein relate to generate signal tokens indicative of malware. A code analysis is performed on known malware application code and known clean application code to generate tokens. Signal tokens indicative of malware are generated based on groupings of the tokens.1. A computing device comprising: a memory and at least one processor to execute a plurality of modules including: a static code analysis module to determine a first and second set of tokens based on a static code analysis respectively performed on a first set of known malware application code and a second set of known clean application code; and a signal generation module to generate a set of signal tokens indicative of malware based on groupings of the tokens. 2. The computing device of claim 1, wherein the known malware application code is in the form of a known malware binary and the known clean application code is in the form of a known clean binary. 3. The computing device of claim 2, wherein the tokens are generated according to rules that include obfuscation tolerant rules. 4. The computing device of claim 3, wherein the respective first set of tokens and the respective second set of tokens are generated if one of the rules is a hit to the corresponding respective binaries. 5. The computing device of claim 1, wherein the set of signal tokens is based on machine learning. 6. The computing device of claim 1, wherein the groupings are based on at least two of a null dereference, resource leak, dead code, path manipulation, query string injection, command injection, resource injection, and denial of service. 7. The computing device of claim 1, further comprising: an output module to output the signal tokens to a signal token malware likeliness database. 8. A method comprising: performing code analysis based on rules on a first set of known malware application code and a second set of known clean application code to generate tokens; determining a set of the tokens indicative of malware; and generating a set of signal tokens based on groupings of the tokens indicative of malware. 9. The method of claim 8, wherein the set of the signals tokens is based on machine learning. 10. The method of claim 8, wherein the rules include obfuscation tolerant rules. 11. The method of claim 8, wherein the groupings include at least two of: toll fraud, rooting, abuse of permissions, application installed as a service, sensitive data retrieval, use of reflection, use of dynamic loading, and privacy violation. 12. The method of claim 11, wherein the toll fraud includes the use of a send text message function, wherein the rooting includes gaining privileged access to a device, wherein abuse of permissions includes requesting permissions above a particular threshold, and sensitive data retrieval includes a call to an Application Programming Interface to retrieve device specific information. 13. The method of claim 11, wherein the use of reflection includes the use of a function to download instructions. 14. A non-transitory machine-readable storage medium storing instructions that, if executed by at least one processor of a computing device, cause the computing device to: perform a static code analysis based on obfuscation tolerant rules on a first set of known malware binaries and a second set of known clean binaries to generate tokens; and generate a set of signal tokens indicative of malware based on groupings of the tokens based on machine learning. 15. The non-transitory machine-readable storage medium of claim 14, wherein the static code analysis further includes at least two of dataflow sources, structural rules, manifest Extensible Markup Language, semantic analysis, and control flow.
2,400
7,814
7,814
15,123,802
2,419
A method, user equipment (UE) and basestation are provided, wherein the UE is configured to send battery status data to the basestation and, in response, the basestation is adapted to improve the Quality of Service for the UE.
1. A method for controlling a User Equipment, UE, in a mobile telecommunications network, the network including a basestation, the method comprising the steps of: a basestation receiving battery status data from a UE; and, in response, the basestation improving the Quality of Service, QoS, for the UE. 2. A method as claimed in claim 1, wherein the battery status data indicates a remaining battery life of the UE. 3. A method as claimed in either claim 1 or claim 2, wherein the battery status data indicates a charging status of the UE. 4. A method as claimed in any one of the preceding claims, wherein the battery status data indicates a user preference for the UE's battery consumption. 5. A method as claimed in claim 4, wherein the user preference is for the UE's battery consumption for a particular service. 6. A method as claimed in any one of the preceding claims, wherein the basestation improves the QoS by adjusting connectivity parameters for the UE. 7. A basestation for a mobile telecommunications network including a User Equipment, UE, the basestation comprising a transceiver adapted to communicate with a UE; and a processor adapted to control communications between the transceiver and the UE, wherein the transceiver is further adapted to receive battery status data from the UE and the processor is further adapted to improve the Quality of Service, QoS, for the UE in response to the received battery status data. 8. A basestation as claimed in claim 7, wherein the battery status data indicates a remaining battery life of the UE. 9. A basestation as claimed in either claim 7 or claim 8, wherein the battery status data indicates a charging status of the UE. 10. A basestation as claimed in any one of claims 7 to 9, wherein the battery status data indicates a user preference for the UE's battery consumption. 11. A basestation as claimed in claim 10, wherein the user preference is for the UE's battery consumption for a particular service. 12. A basestation as claimed in any one of claims 7 to 11, wherein the processor improves the QoS by adjusting connectivity parameters for the UE. 13. A basestation as claimed in any one of claims 7 to 12, being an eNodeB. 14. A basestation as claimed in any one of claims 7 to 12, being a small cell. 15. A User Equipment, UE, for a mobile telecommunications network, the network including a basestation, the UE comprising a battery; a battery monitor adapted to store status data of the battery; and a transceiver adapted to transmit the battery status data to a basestation for improved Quality of Service, QoS, for the UE. 16. A UE as claimed in claim 15, wherein the battery status data indicates a remaining battery life of the UE. 17. A UE as claimed in either claim 15 or claim 16, wherein the battery status indicates a charging status of the UE. 18. A UE as claimed in any one of claims 15 to 17, wherein the battery status data indicates a user preference for the UE's battery consumption. 19. A UE as claimed in claim 18, wherein the user preference is for the UE's battery consumption for a particular service.
A method, user equipment (UE) and basestation are provided, wherein the UE is configured to send battery status data to the basestation and, in response, the basestation is adapted to improve the Quality of Service for the UE.1. A method for controlling a User Equipment, UE, in a mobile telecommunications network, the network including a basestation, the method comprising the steps of: a basestation receiving battery status data from a UE; and, in response, the basestation improving the Quality of Service, QoS, for the UE. 2. A method as claimed in claim 1, wherein the battery status data indicates a remaining battery life of the UE. 3. A method as claimed in either claim 1 or claim 2, wherein the battery status data indicates a charging status of the UE. 4. A method as claimed in any one of the preceding claims, wherein the battery status data indicates a user preference for the UE's battery consumption. 5. A method as claimed in claim 4, wherein the user preference is for the UE's battery consumption for a particular service. 6. A method as claimed in any one of the preceding claims, wherein the basestation improves the QoS by adjusting connectivity parameters for the UE. 7. A basestation for a mobile telecommunications network including a User Equipment, UE, the basestation comprising a transceiver adapted to communicate with a UE; and a processor adapted to control communications between the transceiver and the UE, wherein the transceiver is further adapted to receive battery status data from the UE and the processor is further adapted to improve the Quality of Service, QoS, for the UE in response to the received battery status data. 8. A basestation as claimed in claim 7, wherein the battery status data indicates a remaining battery life of the UE. 9. A basestation as claimed in either claim 7 or claim 8, wherein the battery status data indicates a charging status of the UE. 10. A basestation as claimed in any one of claims 7 to 9, wherein the battery status data indicates a user preference for the UE's battery consumption. 11. A basestation as claimed in claim 10, wherein the user preference is for the UE's battery consumption for a particular service. 12. A basestation as claimed in any one of claims 7 to 11, wherein the processor improves the QoS by adjusting connectivity parameters for the UE. 13. A basestation as claimed in any one of claims 7 to 12, being an eNodeB. 14. A basestation as claimed in any one of claims 7 to 12, being a small cell. 15. A User Equipment, UE, for a mobile telecommunications network, the network including a basestation, the UE comprising a battery; a battery monitor adapted to store status data of the battery; and a transceiver adapted to transmit the battery status data to a basestation for improved Quality of Service, QoS, for the UE. 16. A UE as claimed in claim 15, wherein the battery status data indicates a remaining battery life of the UE. 17. A UE as claimed in either claim 15 or claim 16, wherein the battery status indicates a charging status of the UE. 18. A UE as claimed in any one of claims 15 to 17, wherein the battery status data indicates a user preference for the UE's battery consumption. 19. A UE as claimed in claim 18, wherein the user preference is for the UE's battery consumption for a particular service.
2,400
7,815
7,815
14,155,957
2,456
Techniques are described herein for storing event stream information pertaining to communication sessions between clients maintained by a cloud networking platform, where the event stream information for each client includes information in relation to communication services participated in by clients, and the communication services include hosting of real-time communications between two or more clients. A graph is generated that identifies participants, at respective clients, involved in a real-time communication session, where each participant in a real-time communication session is represented as a node in the graph. In response to at least two participants requesting to join the real-time communication session, the real-time communication session between the at least two participants is hosted via the clients of the at least two participants.
1. A method comprising: storing event stream information pertaining to communication sessions between clients maintained by a cloud networking platform, wherein the event stream information for each client includes information in relation to communication services participated in by clients, the communication services including hosting of real-time communications between two or more clients; generating a graph that identifies participants, at respective clients, involved in a real-time communication session, wherein each participant in a real-time communication session is represented as a node in the graph; and in response to at least two participants requesting to join the real-time communication session, hosting the real-time communication session between the at least two participants via the clients of the at least two participants. 2. The method of claim 1, wherein the generating the graph comprises: receiving, via the cloud networking platform, a request by a first participant to create the real-time communication session; generating the graph based upon information associated with the request by the first participant; and updating information for the graph to indicate the first participant and at least one other participant selected by the first participant to be included in the real-time communication session; and the method further comprises: sending a notification to the client of the first participant and the client of the at least one other participant as to the creation of the real-time communication session. 3. The method of claim 1, further comprising: receiving a request from a participant currently identified in the graph to add a further participant to the real-time communication session; sending a notification to a client of the further participant, the notification including information about joining the real-time communication session; and in response to the further participant requesting to join the real-time communication session, adding the further participant to the graph for the real-time communication session, wherein adding includes updating the information for the graph to include information about the further participant. 4. The method of claim 1, wherein generating comprises providing information in the graph about active participants currently engaged in the real-time communication session and inactive participants not currently engaged in the real-time communication session, and further comprising: updating the information for the graph in response to one of the addition of a new participant to the real-time communication session, a change of an active participant to an inactive participant in the real-time communication session, or a change of an inactive participant to an active participant in the real-time communication session. 5. The method of claim 4, further comprising: updating the event stream information as updates are made to the graph. 6. The method of claim 5, further comprising: forwarding event streams to clients of participants, the event streams including updated event stream information based upon updates made to the graph. 7. The method of claim 1, further comprising: providing a conversation identification and rendezvous point information associated with the real-time communication within event stream information to clients of participants identified by the graph; and facilitating a real-time communication session connection between clients of the at least two participants in response to each of the at least two participants selecting to engage in the real-time communication utilizing a selected client and based upon the conversation identification and rendezvous point information provided within the event stream information. 8. The method of claim 7, further comprising: in response to a first client of a participant disengaging from the real-time communication session, facilitating a re-connection by the participant to the real-time communication via conversation identification and rendezvous point information associated with the real-time communication provided within event stream information to clients of the participant, wherein the clients include the first client and at least another client of the participant. 9. The method of claim 7, wherein facilitating the real-time communication session further comprises: facilitating a connection to the real-time communication session by at least two clients associated with a single participant. 10. The method of claim 9, the connection is facilitated such that at least one client associated with the single participant is configured to send and receive audio content associated with the real-time communication session and at least one other client associated with the single participant is configured to send and receive video content associated with the real-time communication session. 11. An apparatus comprising: a network interface unit configured to enable communications over a network; a memory; and a processor configured to: store event stream information within memory, the event stream information pertaining to communication sessions between clients, wherein the event stream information for each client includes information in relation to communication services participated in by clients, the communication services including hosting of real-time communications between two or more clients; generate a graph that identifies participants, at respective clients, involved in a real-time communication session, wherein each participant in a real-time communication session is represented as a node in the graph; and in response to at least two participants requesting to join the real-time communication session, facilitate hosting the real-time communication session between the at least two participants via the clients of the at least two participants. 12. The apparatus of claim 11, wherein the processor is configured to generate the graph by: in response to a request by a first participant to create the real-time communication session, generate the graph based upon information associated with the request by the first participant; and update information for the graph to indicate the first participant and at least one other participant selected by the first participant to be included in the real-time communication session; and the processor is further configured to send a notification to the client of the first participant and the client of the at least one other participant as to the creation of the real-time communication session. 13. The apparatus of claim 11, wherein the processor is further configured to: facilitate receipt of a request from a participant currently identified in the graph to add a further participant to the real-time communication session; send a notification to a client of the further participant, the notification including information about joining the real-time communication session; and in response to the further participant requesting to join the real-time communication session, add the further participant to the graph for the real-time communication session, wherein adding includes updating the information for the graph to include information about the further participant. 14. The apparatus of claim 11, wherein the generating the graph performed by the processor comprises providing information in the graph about active participants currently engaged in the real-time communication session and inactive participants not currently engaged in the real-time communication session, and the processor is further configured to: update the information for the graph in response to one of the addition of a new participant to the real-time communication session, a change of an active participant to an inactive participant in the real-time communication session, or a change of an inactive participant to an active participant in the real-time communication session. 15. The apparatus of claim 14, wherein the processor is further configured to: update the event stream information as updates are made to the graph. 16. The apparatus of claim 15, wherein the processor is further configured to: forward event streams to clients of participants, the event streams including updated event stream information based upon updates made to the graph. 17. The apparatus of claim 11, wherein the processor is further configured to: provide a conversation identification and rendezvous point information associated with the real-time communication within event stream information to clients of participants identified by the graph; and facilitate a real-time communication session connection between clients of the at least two participants in response to each of the at least two participants selecting to engage in the real-time communication utilizing a selected client and based upon the conversation identification and rendezvous point information provided within the event stream information. 18. The apparatus of claim 17, wherein the processor is further configured to: in response to a first client of a participant disengaging from the real-time communication session, facilitate a re-connection by the participant to the real-time communication via conversation identification and rendezvous point information associated with the real-time communication provided within event stream information to clients of the participant, wherein the clients include the first client and at least another client of the participant. 19. One or more computer readable storage media encoded with software comprising computer executable instructions and when the software is executed operable to: store event stream information pertaining to communication sessions between clients maintained by a cloud networking platform, wherein the event stream information for each client includes information in relation to communication services participated in by clients, the communication services including hosting of real-time communications between two or more clients; generate a graph that identifies participants, at respective clients, involved in a real-time communication session, wherein each participant in a real-time communication session is represented as a node in the graph; and in response to at least two participants requesting to join the real-time communication session, hosting the real-time communication session between the at least two participants via the clients of the at least two participants. 20. The computer readable storage media of claim 19, wherein the instructions are further operable to generate the graph by: receiving, via the cloud networking platform, a request by a first participant to create the real-time communication session; generating the graph based upon information associated with the request by the first participant; and updating information for the graph to indicate the first participant and at least one other participant selected by the first participant to be included in the real-time communication session; and the instructions are further operable to send a notification to the client of the first participant and the client of the at least one other participant as to the creation of the real-time communication session. 21. The computer readable storage media of claim 19, wherein the instructions are further operable to: in response to a request from a participant currently identified in the graph to add a further participant to the real-time communication session, send a notification to a client of the further participant, the notification including information about joining the real-time communication session; and in response to the further participant requesting to join the real-time communication session, add the further participant to the graph for the real-time communication session, wherein adding includes updating the information for the graph to include information about the further participant. 22. The computer readable storage media of claim 19, wherein the instructions are further operable to: provide information in the graph about active participants currently engaged in the real-time communication session and inactive participants not currently engaged in the real-time communication session; and update the information for the graph in response to one of the addition of a new participant to the real-time communication session, a change of an active participant to an inactive participant in the real-time communication session, or a change of an inactive participant to an active participant in the real-time communication session. 23. The computer readable storage media of claim 22, wherein the instructions are further operable to: update the event stream information as updates are made to the graph. 24. The computer readable storage media of claim 23, wherein the instructions are further operable to: forward event streams to clients of participants, the event streams including updated event stream information based upon updates made to the graph. 25. The computer readable storage media of claim 19, wherein the instructions are further operable to: provide a conversation identification and rendezvous point information associated with the real-time communication within event stream information to clients of participants identified by the graph; and facilitate a real-time communication session connection between clients of the at least two participants in response to each of the at least two participants selecting to engage in the real-time communication utilizing a selected client and based upon the conversation identification and rendezvous point information provided within the event stream information. 26. The computer readable storage media of claim 19, wherein the instructions are further operable to: in response to a first client of a participant disengaging from the real-time communication session, facilitate a re-connection by the participant to the real-time communication via conversation identification and rendezvous point information associated with the real-time communication provided within event stream information to clients of the participant, wherein the clients include the first client and at least another client of the participant.
Techniques are described herein for storing event stream information pertaining to communication sessions between clients maintained by a cloud networking platform, where the event stream information for each client includes information in relation to communication services participated in by clients, and the communication services include hosting of real-time communications between two or more clients. A graph is generated that identifies participants, at respective clients, involved in a real-time communication session, where each participant in a real-time communication session is represented as a node in the graph. In response to at least two participants requesting to join the real-time communication session, the real-time communication session between the at least two participants is hosted via the clients of the at least two participants.1. A method comprising: storing event stream information pertaining to communication sessions between clients maintained by a cloud networking platform, wherein the event stream information for each client includes information in relation to communication services participated in by clients, the communication services including hosting of real-time communications between two or more clients; generating a graph that identifies participants, at respective clients, involved in a real-time communication session, wherein each participant in a real-time communication session is represented as a node in the graph; and in response to at least two participants requesting to join the real-time communication session, hosting the real-time communication session between the at least two participants via the clients of the at least two participants. 2. The method of claim 1, wherein the generating the graph comprises: receiving, via the cloud networking platform, a request by a first participant to create the real-time communication session; generating the graph based upon information associated with the request by the first participant; and updating information for the graph to indicate the first participant and at least one other participant selected by the first participant to be included in the real-time communication session; and the method further comprises: sending a notification to the client of the first participant and the client of the at least one other participant as to the creation of the real-time communication session. 3. The method of claim 1, further comprising: receiving a request from a participant currently identified in the graph to add a further participant to the real-time communication session; sending a notification to a client of the further participant, the notification including information about joining the real-time communication session; and in response to the further participant requesting to join the real-time communication session, adding the further participant to the graph for the real-time communication session, wherein adding includes updating the information for the graph to include information about the further participant. 4. The method of claim 1, wherein generating comprises providing information in the graph about active participants currently engaged in the real-time communication session and inactive participants not currently engaged in the real-time communication session, and further comprising: updating the information for the graph in response to one of the addition of a new participant to the real-time communication session, a change of an active participant to an inactive participant in the real-time communication session, or a change of an inactive participant to an active participant in the real-time communication session. 5. The method of claim 4, further comprising: updating the event stream information as updates are made to the graph. 6. The method of claim 5, further comprising: forwarding event streams to clients of participants, the event streams including updated event stream information based upon updates made to the graph. 7. The method of claim 1, further comprising: providing a conversation identification and rendezvous point information associated with the real-time communication within event stream information to clients of participants identified by the graph; and facilitating a real-time communication session connection between clients of the at least two participants in response to each of the at least two participants selecting to engage in the real-time communication utilizing a selected client and based upon the conversation identification and rendezvous point information provided within the event stream information. 8. The method of claim 7, further comprising: in response to a first client of a participant disengaging from the real-time communication session, facilitating a re-connection by the participant to the real-time communication via conversation identification and rendezvous point information associated with the real-time communication provided within event stream information to clients of the participant, wherein the clients include the first client and at least another client of the participant. 9. The method of claim 7, wherein facilitating the real-time communication session further comprises: facilitating a connection to the real-time communication session by at least two clients associated with a single participant. 10. The method of claim 9, the connection is facilitated such that at least one client associated with the single participant is configured to send and receive audio content associated with the real-time communication session and at least one other client associated with the single participant is configured to send and receive video content associated with the real-time communication session. 11. An apparatus comprising: a network interface unit configured to enable communications over a network; a memory; and a processor configured to: store event stream information within memory, the event stream information pertaining to communication sessions between clients, wherein the event stream information for each client includes information in relation to communication services participated in by clients, the communication services including hosting of real-time communications between two or more clients; generate a graph that identifies participants, at respective clients, involved in a real-time communication session, wherein each participant in a real-time communication session is represented as a node in the graph; and in response to at least two participants requesting to join the real-time communication session, facilitate hosting the real-time communication session between the at least two participants via the clients of the at least two participants. 12. The apparatus of claim 11, wherein the processor is configured to generate the graph by: in response to a request by a first participant to create the real-time communication session, generate the graph based upon information associated with the request by the first participant; and update information for the graph to indicate the first participant and at least one other participant selected by the first participant to be included in the real-time communication session; and the processor is further configured to send a notification to the client of the first participant and the client of the at least one other participant as to the creation of the real-time communication session. 13. The apparatus of claim 11, wherein the processor is further configured to: facilitate receipt of a request from a participant currently identified in the graph to add a further participant to the real-time communication session; send a notification to a client of the further participant, the notification including information about joining the real-time communication session; and in response to the further participant requesting to join the real-time communication session, add the further participant to the graph for the real-time communication session, wherein adding includes updating the information for the graph to include information about the further participant. 14. The apparatus of claim 11, wherein the generating the graph performed by the processor comprises providing information in the graph about active participants currently engaged in the real-time communication session and inactive participants not currently engaged in the real-time communication session, and the processor is further configured to: update the information for the graph in response to one of the addition of a new participant to the real-time communication session, a change of an active participant to an inactive participant in the real-time communication session, or a change of an inactive participant to an active participant in the real-time communication session. 15. The apparatus of claim 14, wherein the processor is further configured to: update the event stream information as updates are made to the graph. 16. The apparatus of claim 15, wherein the processor is further configured to: forward event streams to clients of participants, the event streams including updated event stream information based upon updates made to the graph. 17. The apparatus of claim 11, wherein the processor is further configured to: provide a conversation identification and rendezvous point information associated with the real-time communication within event stream information to clients of participants identified by the graph; and facilitate a real-time communication session connection between clients of the at least two participants in response to each of the at least two participants selecting to engage in the real-time communication utilizing a selected client and based upon the conversation identification and rendezvous point information provided within the event stream information. 18. The apparatus of claim 17, wherein the processor is further configured to: in response to a first client of a participant disengaging from the real-time communication session, facilitate a re-connection by the participant to the real-time communication via conversation identification and rendezvous point information associated with the real-time communication provided within event stream information to clients of the participant, wherein the clients include the first client and at least another client of the participant. 19. One or more computer readable storage media encoded with software comprising computer executable instructions and when the software is executed operable to: store event stream information pertaining to communication sessions between clients maintained by a cloud networking platform, wherein the event stream information for each client includes information in relation to communication services participated in by clients, the communication services including hosting of real-time communications between two or more clients; generate a graph that identifies participants, at respective clients, involved in a real-time communication session, wherein each participant in a real-time communication session is represented as a node in the graph; and in response to at least two participants requesting to join the real-time communication session, hosting the real-time communication session between the at least two participants via the clients of the at least two participants. 20. The computer readable storage media of claim 19, wherein the instructions are further operable to generate the graph by: receiving, via the cloud networking platform, a request by a first participant to create the real-time communication session; generating the graph based upon information associated with the request by the first participant; and updating information for the graph to indicate the first participant and at least one other participant selected by the first participant to be included in the real-time communication session; and the instructions are further operable to send a notification to the client of the first participant and the client of the at least one other participant as to the creation of the real-time communication session. 21. The computer readable storage media of claim 19, wherein the instructions are further operable to: in response to a request from a participant currently identified in the graph to add a further participant to the real-time communication session, send a notification to a client of the further participant, the notification including information about joining the real-time communication session; and in response to the further participant requesting to join the real-time communication session, add the further participant to the graph for the real-time communication session, wherein adding includes updating the information for the graph to include information about the further participant. 22. The computer readable storage media of claim 19, wherein the instructions are further operable to: provide information in the graph about active participants currently engaged in the real-time communication session and inactive participants not currently engaged in the real-time communication session; and update the information for the graph in response to one of the addition of a new participant to the real-time communication session, a change of an active participant to an inactive participant in the real-time communication session, or a change of an inactive participant to an active participant in the real-time communication session. 23. The computer readable storage media of claim 22, wherein the instructions are further operable to: update the event stream information as updates are made to the graph. 24. The computer readable storage media of claim 23, wherein the instructions are further operable to: forward event streams to clients of participants, the event streams including updated event stream information based upon updates made to the graph. 25. The computer readable storage media of claim 19, wherein the instructions are further operable to: provide a conversation identification and rendezvous point information associated with the real-time communication within event stream information to clients of participants identified by the graph; and facilitate a real-time communication session connection between clients of the at least two participants in response to each of the at least two participants selecting to engage in the real-time communication utilizing a selected client and based upon the conversation identification and rendezvous point information provided within the event stream information. 26. The computer readable storage media of claim 19, wherein the instructions are further operable to: in response to a first client of a participant disengaging from the real-time communication session, facilitate a re-connection by the participant to the real-time communication via conversation identification and rendezvous point information associated with the real-time communication provided within event stream information to clients of the participant, wherein the clients include the first client and at least another client of the participant.
2,400
7,816
7,816
14,724,971
2,442
A controller system allows direct access to a client device accessing remote data storage devices communicatively connected to the controller. A virtual block metadata (VBM) is generated by the controller system, the VBM including a plurality of maps. Each map includes a plurality of virtual addresses, each virtual address mapped to a physical address, each physical address on a remote storage device of the plurality of storage devices. The client device is sent a portion of the VBM, the portion including the map of the virtual addresses sent to the client. The controller receives, over a first network interface, read/write instructions from the client device for the a physical address corresponding to the virtual address allocated to the client device.
1. A computerized method for providing a client device, which is communicatively connected to a controller, access to a plurality of remote storage devices communicatively connected to the controller and to the client device, the method comprising: receiving from the client device, by the controller, a request for storage block mapping; and sending a map to the client device, the map comprising a plurality of virtual addresses, each virtual address corresponding to a physical address of a data block on a storage device of the plurality of remote storage devices. 2. The computerized method of claim 1, further comprising receiving storage instructions from the client device over a remote direct memory access (RDMA) interface. 3. The computerized method of claim 1, wherein the map further comprises a version number. 4. The computerized method of claim 3, further comprising: receiving from the client device, by the controller, a second request for storage block mapping, the second request comprising a version number of the map; comparing the received version number of the map to a version number of a controller map; and sending an updated map to the client device, the updated map comprising a plurality of new virtual addresses, each new virtual address corresponding to a physical address of a data block on a storage device of the plurality of remote storage devices. 5. The computerized method of claim 4, further comprising: comparing the received version number of the map to a version number of a controller map; and initializing, in response to the received version number of the map and the version number of the controller map not matching, a process to make the received version number and the version number of the controller map match. 6. The computerized method of claim 1, wherein at least an address of the plurality of virtual addresses corresponds to a second plurality of virtual addresses. 7. The computerized method of claim 1, wherein at least a first physical address is on a first storage device of the plurality of remote storage devices, and at least a second physical address is on a second storage device of the plurality of remote storage devices. 8. The computerized method of claim 1, wherein the client device is configured to directly access the data block by mapping the virtual address to the physical address of the data block. 9. A controller communicatively coupled to a plurality of remote storage devices and providing a client device access to the remote storage devices, the controller comprising: a processing unit; a first network interface configured to communicate with the client device; a second interface configured to communicate with the plurality of remote storage devices; and a memory containing first instructions and communicatively coupled to the processing unit, wherein in response to the processing unit executing the first instructions, the controller is configured to: receive a request for storage block mapping from the client device; and send a map to the client device, wherein the map comprises a plurality of virtual addresses, each virtual address corresponding to a physical address of a data block on a storage device of the plurality of remote storage devices. 10. The controller of claim 9, wherein the memory further includes second instructions, and in response to the second instructions being executed by the processing unit, the controller is further configured to: receive read/write instructions from the client device over a remote direct memory access (RDMA) interface. 11. The controller of claim 9, wherein the map further comprises a version number. 12. The controller of claim 11, wherein the memory further includes third instructions, and in response to the third instructions being executed by the processing unit, the controller is further configured to: receive a second request for storage block mapping from the client, the second request comprising a version number of the map; compare the received version number of the map to a version number of a controller map; and send an updated map to the client device, the updated map comprising a plurality of new virtual addresses, each new virtual address corresponding to a physical address of a data block on a storage device of the plurality of remote storage devices. 13. The controller of claim 9, wherein at least an address of the plurality of virtual addresses corresponds to a second plurality of virtual addresses. 14. The controller of claim 9, wherein at least a first physical address is on a first storage device of the plurality of remote storage devices, and at least a second physical address is on a second storage device of the plurality of remote storage devices. 15. The controller of claim 9, wherein the client device is configured to directly access the data block by mapping the virtual address to the physical address of the data block. 16. A computerized method for providing a client device, which is communicatively connected to a controller, access to a plurality of remote storage devices communicatively connected to the controller and to the client device, the method comprising: sending from the client device, to the controller, a request for storage block mapping; receiving a map from the controller, the map comprising a plurality of virtual addresses, each virtual address corresponding to a physical address of a data block on a storage device of the plurality of remote storage devices; and directly accessing, using the client device, the data block by mapping the virtual address to the physical address of the data block. 17. The computerized method of claim 16, further comprising sending read/write instructions from the client device over a remote direct memory access (RDMA) interface. 18. The computerized method of claim 16, wherein the map further comprises a version number. 19. The computerized method of claim 18, further comprising: sending from the client device, to the controller, a second request for storage block mapping, the second request comprising a version number of the map; receiving an updated map from the controller, the updated map comprising a plurality of new virtual addresses, each new virtual address corresponding to a physical address of a data block on a storage device of the plurality of remote storage devices. 20. The computerized method of claim 16, wherein at least an address of the plurality of virtual addresses corresponds to a second plurality of virtual addresses. 21. The computerized method of claim 16, wherein at least a first physical address is on a first storage device of the plurality of remote storage devices, and at least a second physical address is on a second storage device of the plurality of remote storage devices. 22. A client device configured to access a plurality of remote storage devices through a controller, the plurality of remote storage devices communicatively coupled to the controller, the client device comprising: a processing unit; a first network interface for communicating with the controller; a second interface for communicating with a plurality of remote storage devices; and a memory communicatively coupled to the processing unit and containing first instructions, in response to the first instructions being executed by the processing unit, the client device is configured to: send a request for storage block mapping to the controller; and receive a map from the controller, the map comprising a plurality of virtual addresses, each virtual address corresponding to a physical address of a data block on a storage device of the plurality of remote storage devices, and wherein the client device is configured to directly access the data block by mapping the virtual address to the physical address of the data block. 23. The client device of claim 22, wherein the memory further contains second instructions, in response to the second instructions being executed by the processing unit, the client device is further configured to send read/write instructions to the controller over a remote direct memory access (RDMA) interface. 24. The client device of claim 22, wherein the map further comprises a version number. 25. The client device of claim 24, wherein the memory further contains third instructions, in response to the third instructions being executed by the processing unit, the client device is further configured to: send a second request for storage block mapping to the controller, the second request comprising a version number of the map; and receive an updated map from the controller, the updated map comprising a plurality of new virtual addresses, each new virtual address corresponding to a physical address of a data block on a storage device of the plurality of remote storage devices. 26. The controller of claim 22, wherein at least an address of the plurality of virtual addresses corresponds to a second plurality of virtual addresses. 27. The controller of claim 22, wherein at least a first physical address is on a first storage device of the plurality of remote storage devices, and at least a second physical address is on a second storage device of the plurality of remote storage devices.
A controller system allows direct access to a client device accessing remote data storage devices communicatively connected to the controller. A virtual block metadata (VBM) is generated by the controller system, the VBM including a plurality of maps. Each map includes a plurality of virtual addresses, each virtual address mapped to a physical address, each physical address on a remote storage device of the plurality of storage devices. The client device is sent a portion of the VBM, the portion including the map of the virtual addresses sent to the client. The controller receives, over a first network interface, read/write instructions from the client device for the a physical address corresponding to the virtual address allocated to the client device.1. A computerized method for providing a client device, which is communicatively connected to a controller, access to a plurality of remote storage devices communicatively connected to the controller and to the client device, the method comprising: receiving from the client device, by the controller, a request for storage block mapping; and sending a map to the client device, the map comprising a plurality of virtual addresses, each virtual address corresponding to a physical address of a data block on a storage device of the plurality of remote storage devices. 2. The computerized method of claim 1, further comprising receiving storage instructions from the client device over a remote direct memory access (RDMA) interface. 3. The computerized method of claim 1, wherein the map further comprises a version number. 4. The computerized method of claim 3, further comprising: receiving from the client device, by the controller, a second request for storage block mapping, the second request comprising a version number of the map; comparing the received version number of the map to a version number of a controller map; and sending an updated map to the client device, the updated map comprising a plurality of new virtual addresses, each new virtual address corresponding to a physical address of a data block on a storage device of the plurality of remote storage devices. 5. The computerized method of claim 4, further comprising: comparing the received version number of the map to a version number of a controller map; and initializing, in response to the received version number of the map and the version number of the controller map not matching, a process to make the received version number and the version number of the controller map match. 6. The computerized method of claim 1, wherein at least an address of the plurality of virtual addresses corresponds to a second plurality of virtual addresses. 7. The computerized method of claim 1, wherein at least a first physical address is on a first storage device of the plurality of remote storage devices, and at least a second physical address is on a second storage device of the plurality of remote storage devices. 8. The computerized method of claim 1, wherein the client device is configured to directly access the data block by mapping the virtual address to the physical address of the data block. 9. A controller communicatively coupled to a plurality of remote storage devices and providing a client device access to the remote storage devices, the controller comprising: a processing unit; a first network interface configured to communicate with the client device; a second interface configured to communicate with the plurality of remote storage devices; and a memory containing first instructions and communicatively coupled to the processing unit, wherein in response to the processing unit executing the first instructions, the controller is configured to: receive a request for storage block mapping from the client device; and send a map to the client device, wherein the map comprises a plurality of virtual addresses, each virtual address corresponding to a physical address of a data block on a storage device of the plurality of remote storage devices. 10. The controller of claim 9, wherein the memory further includes second instructions, and in response to the second instructions being executed by the processing unit, the controller is further configured to: receive read/write instructions from the client device over a remote direct memory access (RDMA) interface. 11. The controller of claim 9, wherein the map further comprises a version number. 12. The controller of claim 11, wherein the memory further includes third instructions, and in response to the third instructions being executed by the processing unit, the controller is further configured to: receive a second request for storage block mapping from the client, the second request comprising a version number of the map; compare the received version number of the map to a version number of a controller map; and send an updated map to the client device, the updated map comprising a plurality of new virtual addresses, each new virtual address corresponding to a physical address of a data block on a storage device of the plurality of remote storage devices. 13. The controller of claim 9, wherein at least an address of the plurality of virtual addresses corresponds to a second plurality of virtual addresses. 14. The controller of claim 9, wherein at least a first physical address is on a first storage device of the plurality of remote storage devices, and at least a second physical address is on a second storage device of the plurality of remote storage devices. 15. The controller of claim 9, wherein the client device is configured to directly access the data block by mapping the virtual address to the physical address of the data block. 16. A computerized method for providing a client device, which is communicatively connected to a controller, access to a plurality of remote storage devices communicatively connected to the controller and to the client device, the method comprising: sending from the client device, to the controller, a request for storage block mapping; receiving a map from the controller, the map comprising a plurality of virtual addresses, each virtual address corresponding to a physical address of a data block on a storage device of the plurality of remote storage devices; and directly accessing, using the client device, the data block by mapping the virtual address to the physical address of the data block. 17. The computerized method of claim 16, further comprising sending read/write instructions from the client device over a remote direct memory access (RDMA) interface. 18. The computerized method of claim 16, wherein the map further comprises a version number. 19. The computerized method of claim 18, further comprising: sending from the client device, to the controller, a second request for storage block mapping, the second request comprising a version number of the map; receiving an updated map from the controller, the updated map comprising a plurality of new virtual addresses, each new virtual address corresponding to a physical address of a data block on a storage device of the plurality of remote storage devices. 20. The computerized method of claim 16, wherein at least an address of the plurality of virtual addresses corresponds to a second plurality of virtual addresses. 21. The computerized method of claim 16, wherein at least a first physical address is on a first storage device of the plurality of remote storage devices, and at least a second physical address is on a second storage device of the plurality of remote storage devices. 22. A client device configured to access a plurality of remote storage devices through a controller, the plurality of remote storage devices communicatively coupled to the controller, the client device comprising: a processing unit; a first network interface for communicating with the controller; a second interface for communicating with a plurality of remote storage devices; and a memory communicatively coupled to the processing unit and containing first instructions, in response to the first instructions being executed by the processing unit, the client device is configured to: send a request for storage block mapping to the controller; and receive a map from the controller, the map comprising a plurality of virtual addresses, each virtual address corresponding to a physical address of a data block on a storage device of the plurality of remote storage devices, and wherein the client device is configured to directly access the data block by mapping the virtual address to the physical address of the data block. 23. The client device of claim 22, wherein the memory further contains second instructions, in response to the second instructions being executed by the processing unit, the client device is further configured to send read/write instructions to the controller over a remote direct memory access (RDMA) interface. 24. The client device of claim 22, wherein the map further comprises a version number. 25. The client device of claim 24, wherein the memory further contains third instructions, in response to the third instructions being executed by the processing unit, the client device is further configured to: send a second request for storage block mapping to the controller, the second request comprising a version number of the map; and receive an updated map from the controller, the updated map comprising a plurality of new virtual addresses, each new virtual address corresponding to a physical address of a data block on a storage device of the plurality of remote storage devices. 26. The controller of claim 22, wherein at least an address of the plurality of virtual addresses corresponds to a second plurality of virtual addresses. 27. The controller of claim 22, wherein at least a first physical address is on a first storage device of the plurality of remote storage devices, and at least a second physical address is on a second storage device of the plurality of remote storage devices.
2,400
7,817
7,817
14,911,079
2,495
A method for providing a licence includes: a step a) wherein a server receives a request including an identifier of a multimedia content and an identifier of a terminal or of a user. The server computes the licence including at least one access data needed by the terminal to access the multimedia content. Before step a), there is a step e) for obtaining a first recommendation list for the user and from the list, obtaining one multimedia content identifier. For each automatically selected identifier, the method includes pre-computing at least one access data, and in a step b), searching for the identifier of the multimedia content received in step a) from among the identifiers automatically selected in the step e). In the event of success, the method includes selecting the pre-computed access data corresponding to the identifier, and, in the event of failure, generating the access data.
1-7. (canceled) 8. A method for providing, by way of an electronic licence server, in a system for providing multimedia contents, a licence allowing a terminal of a user of the system to access a multimedia content, the licence being dependent both on an identifier of the multimedia content and on an identifier of the terminal or of the user, the method comprising: a) the server receiving a request including the identifier of the multimedia content and the identifier of the terminal or of the user, b) the server computing a licence including at least one access data needed by the terminal to access the multimedia content, the access data being dependent on the identifier of the multimedia content and on the identifier of the terminal or of the user, c) the server transmitting, in response to the request, the licence computed in the step b), d) the terminal receiving the licence computed in the step b), and using it to access the multimedia content, wherein: before the step a) the method includes a step e) comprising: the obtaining of a first recommendation list for the user, the first list containing a limited number of identifiers of multimedia contents from among a larger set of multimedia contents available in the system, the multimedia contents identified by the first list having a higher probability of being accessed by the terminal of the user than the other multimedia contents of the larger set, the first list being constructed according to the identifier of the user and a database of pre-stored data on the basis of which it is possible to compute a probability that any multimedia content available in the system will be accessed by the terminal of the user, the automatic selection, from the first list, of at least one multimedia content identifier, and for each automatically selected identifier, the pre-computing of at least one access data using this multimedia content identifier and the identifier of the terminal or of the user, and in the step b), the server searches for the identifier of the multimedia content received in the step a) from among the identifiers automatically selected in the step e), then, in the event of success, selects the pre-computed access data corresponding to this identifier, and, in the event of failure, generates the access data. 9. The method according to claim 8, in which the step a) is preceded: by the transmission, to the terminal or to another terminal of the user, of the first or of a second recommendation list constructed for the user and containing at least one of the identifiers automatically selected in the step e), by the display, by the or said other terminal of the user, of the first or second recommendation list, in such a way as to favour the selection by the user of one of the multimedia content identifiers automatically selected in the step e) for its transmission to the licence server in the step a). 10. The method for computing, by way of an electronic licence server, for the implementation of the method according to claim 8, of a licence allowing a terminal of a user of the system to access a multimedia content, the licence being dependent both on an identifier of the multimedia content and on an identifier of the terminal or of the user, the method in which the server: a) receives a request including the identifier of the multimedia content and the identifier of the terminal or of the user, b) computes a licence including at least one access data needed by the terminal to access the multimedia content, the access data being dependent on the identifier of the multimedia content and on the identifier of the terminal or of the user, c) transmits, in response to the request, the licence computed in the step b), wherein: before the step a) the method includes a step e) comprising: the obtaining of a first recommendation list for the user, the first list containing a limited number of identifiers of multimedia contents from among a larger set of multimedia contents available in the system, the multimedia contents identified by the first list having a higher probability of being accessed by the terminal of the user than the other multimedia contents of the larger set, the first list being constructed according to the identifier of the user and a database of pre-stored data on the basis of which it is possible to compute a probability that any multimedia content available in the system will be accessed by the terminal of the user, the automatic selection, from the first list, of at least one multimedia content identifier, and for each automatically selected identifier, the pre-computing of at least one access data using this multimedia content identifier and the identifier of the terminal or of the user, in the step b), the server searches for the identifier of the multimedia content received in the step a) from among the identifiers automatically selected in the step e), then, in the event of success, selects the pre-computed access data corresponding to the identifier, and, in the event of failure, generates the access data. 11. The method according to claim 10, which includes: computing the workload of the server as a function of the number of requests to be processed by the server over a time interval, and of the duration of the time interval, and the inhibiting or triggering of the step e), depending on the computed workload. 12. The method according to claim 10, in which the step e) is triggered in response to receiving: a list of identifiers of new users of the system, the list including the identifier of the user, a list of identifiers of new terminals of the user, a list of identifiers of content newly accessed by the user, a list of identifiers of users unsubscribed from the system, or a list of identifiers of terminals unsubscribed from the system. 13. An information storage medium, including instructions for executing the step e) of a method in accordance with claim 10, when these instructions are executed by an electronic computer. 14. A licence server, comprising: an electronic computer programmed to trigger and execute the step e) of a method for computing a licence in accordance with claim 10.
A method for providing a licence includes: a step a) wherein a server receives a request including an identifier of a multimedia content and an identifier of a terminal or of a user. The server computes the licence including at least one access data needed by the terminal to access the multimedia content. Before step a), there is a step e) for obtaining a first recommendation list for the user and from the list, obtaining one multimedia content identifier. For each automatically selected identifier, the method includes pre-computing at least one access data, and in a step b), searching for the identifier of the multimedia content received in step a) from among the identifiers automatically selected in the step e). In the event of success, the method includes selecting the pre-computed access data corresponding to the identifier, and, in the event of failure, generating the access data.1-7. (canceled) 8. A method for providing, by way of an electronic licence server, in a system for providing multimedia contents, a licence allowing a terminal of a user of the system to access a multimedia content, the licence being dependent both on an identifier of the multimedia content and on an identifier of the terminal or of the user, the method comprising: a) the server receiving a request including the identifier of the multimedia content and the identifier of the terminal or of the user, b) the server computing a licence including at least one access data needed by the terminal to access the multimedia content, the access data being dependent on the identifier of the multimedia content and on the identifier of the terminal or of the user, c) the server transmitting, in response to the request, the licence computed in the step b), d) the terminal receiving the licence computed in the step b), and using it to access the multimedia content, wherein: before the step a) the method includes a step e) comprising: the obtaining of a first recommendation list for the user, the first list containing a limited number of identifiers of multimedia contents from among a larger set of multimedia contents available in the system, the multimedia contents identified by the first list having a higher probability of being accessed by the terminal of the user than the other multimedia contents of the larger set, the first list being constructed according to the identifier of the user and a database of pre-stored data on the basis of which it is possible to compute a probability that any multimedia content available in the system will be accessed by the terminal of the user, the automatic selection, from the first list, of at least one multimedia content identifier, and for each automatically selected identifier, the pre-computing of at least one access data using this multimedia content identifier and the identifier of the terminal or of the user, and in the step b), the server searches for the identifier of the multimedia content received in the step a) from among the identifiers automatically selected in the step e), then, in the event of success, selects the pre-computed access data corresponding to this identifier, and, in the event of failure, generates the access data. 9. The method according to claim 8, in which the step a) is preceded: by the transmission, to the terminal or to another terminal of the user, of the first or of a second recommendation list constructed for the user and containing at least one of the identifiers automatically selected in the step e), by the display, by the or said other terminal of the user, of the first or second recommendation list, in such a way as to favour the selection by the user of one of the multimedia content identifiers automatically selected in the step e) for its transmission to the licence server in the step a). 10. The method for computing, by way of an electronic licence server, for the implementation of the method according to claim 8, of a licence allowing a terminal of a user of the system to access a multimedia content, the licence being dependent both on an identifier of the multimedia content and on an identifier of the terminal or of the user, the method in which the server: a) receives a request including the identifier of the multimedia content and the identifier of the terminal or of the user, b) computes a licence including at least one access data needed by the terminal to access the multimedia content, the access data being dependent on the identifier of the multimedia content and on the identifier of the terminal or of the user, c) transmits, in response to the request, the licence computed in the step b), wherein: before the step a) the method includes a step e) comprising: the obtaining of a first recommendation list for the user, the first list containing a limited number of identifiers of multimedia contents from among a larger set of multimedia contents available in the system, the multimedia contents identified by the first list having a higher probability of being accessed by the terminal of the user than the other multimedia contents of the larger set, the first list being constructed according to the identifier of the user and a database of pre-stored data on the basis of which it is possible to compute a probability that any multimedia content available in the system will be accessed by the terminal of the user, the automatic selection, from the first list, of at least one multimedia content identifier, and for each automatically selected identifier, the pre-computing of at least one access data using this multimedia content identifier and the identifier of the terminal or of the user, in the step b), the server searches for the identifier of the multimedia content received in the step a) from among the identifiers automatically selected in the step e), then, in the event of success, selects the pre-computed access data corresponding to the identifier, and, in the event of failure, generates the access data. 11. The method according to claim 10, which includes: computing the workload of the server as a function of the number of requests to be processed by the server over a time interval, and of the duration of the time interval, and the inhibiting or triggering of the step e), depending on the computed workload. 12. The method according to claim 10, in which the step e) is triggered in response to receiving: a list of identifiers of new users of the system, the list including the identifier of the user, a list of identifiers of new terminals of the user, a list of identifiers of content newly accessed by the user, a list of identifiers of users unsubscribed from the system, or a list of identifiers of terminals unsubscribed from the system. 13. An information storage medium, including instructions for executing the step e) of a method in accordance with claim 10, when these instructions are executed by an electronic computer. 14. A licence server, comprising: an electronic computer programmed to trigger and execute the step e) of a method for computing a licence in accordance with claim 10.
2,400
7,818
7,818
15,603,275
2,449
In one embodiment, a method includes receiving, from beacons of a third-party (e.g., a business), session information for a user of an online social network. A mobile device of the user may have been in at least one wireless communication session with at least one beacon, and during the session the mobile device was proximate to the at least one beacon. The session information may include an identifier for the user, which may be used to access social-networking information for the user. Session information and the social-networking information of the user may be sent back to the third-party. User-specified permissions may delimit which information may be sent.
1. A method comprising, by one or more computing devices of an online social network: receiving session information associated with a first user of the online social network, wherein: the session information comprises information indicating that a current wireless communication session has been established between a first client system of the first user and a beacon associated with a particular third-party, wherein: the beacon is proximate to the first client system at the time of the current wireless communication session; and the wireless communication session allows the online social network to send social-networking information of the first user to the third-party; and the session information further comprises information about one or more prior wireless communication sessions between the first client system and the beacon; accessing social-networking information associated with the first user; determining one or more sets of permissions specified by the first user regarding the social-networking information associated with the first user; and sending the session information associated with the first user and the social-networking information associated with the first user to a third-party system of the third-party for display, wherein the sending is based on the one or more sets of permissions. 2. The method of claim 1, wherein the online social network comprises a social graph comprising a plurality of nodes and a plurality of edges connecting the nodes, each of the edges between two of the nodes representing a single degree of separation between them, the nodes comprising: a first node corresponding to the first user; and a plurality of second nodes corresponding to a plurality of entities associated with the online social network, respectively. 3. The method of claim 2, wherein a particular second node corresponds to the third-party, and wherein, for the first user, the social-networking information comprises a social-networking action of the first user taken with respect to the first node and the particular second node. 4. The method of claim 3, wherein the social-networking action represents an expression of affinity for the third-party. 5. The method of claim 2, wherein the session information for the first user is stored in association with the first node in the social graph. 6. The method of claim 1, wherein the session information for the first user comprises a history of wireless communication sessions established between at least one beacon of the third-party and the first client system. 7. The method of claim 1, wherein the session information for the first user comprises an average duration of prior wireless communication sessions established between at least one beacon of the third-party and the first client system. 8. The method of claim 1, wherein the social-networking information comprises one or more of: an image of the first user; demographic information of the first user; biographic information of the first user; one or more preferences of the first user with respect to the online social network; payment credentials of the first user; a purchase history of the first user; or social-graph information of the first user. 9. The method of claim 1, wherein the session information comprises an indication of a time elapsed since a last wireless communication session was established between at least one beacon of the third-party and the first client system. 10. The method of claim 1, further comprising sending at least a subset of the social-networking information and the session information to one or more second users of the online social network. 11. The method of claim 10, wherein the one or more second users comprises the first user. 12. The method of claim 1, further comprising: determining a third-party content to be provided by the third-party to the first user, wherein the third-party content is customized based on the session information and the social-networking information; and sending the customized third-party content to the first client system. 13. The method of claim 1, wherein the session information and the social-networking information are displayed on a graphical user interface of the third-party system. 14. The method of claim 13, wherein the graphical user interface comprises one or more notification elements displaying a subset of the session information and the social-networking information. 15. The method of claim 1, wherein the session information further comprises an indication of a geographic location of the beacon relative to the one or more other beacons associated with the third-party. 16. The method of claim 1, wherein session information and social-networking information for a plurality of first users is aggregated prior to sending the session information and social-networking information associated with the plurality of first users to the third-party system. 17. The method of claim 1, wherein the third-party system is the beacon. 18. The method of claim 1, wherein the third-party system is another beacon associated with the third-party. 19. One or more computer-readable non-transitory storage media embodying software that is operable when executed to: receive session information associated with a first user of an online social network, wherein: the session information comprises information indicating that a current wireless communication session has been established between a first client system of the first user and a beacon associated with a particular third-party, wherein: the beacon is proximate to the first client system at the time of the current wireless communication session; and the wireless communication session allows the online social network to send social-networking information of the first user to the third-party; and the session information further comprises information about one or more prior wireless communication sessions between the first client system and the beacon; access social-networking information associated with the first user; determine one or more sets of permissions specified by the first user regarding the social-networking information associated with the first user; and send the session information associated with the first user and the social-networking information associated with the first user to a third-party system of the third-party for display, wherein the sending is based on the one or more sets of permissions. 20. A system comprising: one or more processors; and a memory coupled to the processors comprising instructions executable by the processors, the processors operable when executing the instructions to: receive session information associated with a first user of an online social network, wherein: the session information comprises information indicating that a current wireless communication session has been established between a first client system of the first user and a beacon associated with a particular third-party, wherein: the beacon is proximate to the first client system at the time of the current wireless communication session; and the wireless communication session allows the online social network to send social-networking information of the first user to the third-party; and the session information further comprises information about one or more prior wireless communication sessions between the first client system and the beacon; access social-networking information associated with the first user; determine one or more sets of permissions specified by the first user regarding the social-networking information associated with the first user; and send the session information associated with the first user and the social-networking information associated with the first user to a third-party system of the third-party for display, wherein the sending is based on the one or more sets of permissions.
In one embodiment, a method includes receiving, from beacons of a third-party (e.g., a business), session information for a user of an online social network. A mobile device of the user may have been in at least one wireless communication session with at least one beacon, and during the session the mobile device was proximate to the at least one beacon. The session information may include an identifier for the user, which may be used to access social-networking information for the user. Session information and the social-networking information of the user may be sent back to the third-party. User-specified permissions may delimit which information may be sent.1. A method comprising, by one or more computing devices of an online social network: receiving session information associated with a first user of the online social network, wherein: the session information comprises information indicating that a current wireless communication session has been established between a first client system of the first user and a beacon associated with a particular third-party, wherein: the beacon is proximate to the first client system at the time of the current wireless communication session; and the wireless communication session allows the online social network to send social-networking information of the first user to the third-party; and the session information further comprises information about one or more prior wireless communication sessions between the first client system and the beacon; accessing social-networking information associated with the first user; determining one or more sets of permissions specified by the first user regarding the social-networking information associated with the first user; and sending the session information associated with the first user and the social-networking information associated with the first user to a third-party system of the third-party for display, wherein the sending is based on the one or more sets of permissions. 2. The method of claim 1, wherein the online social network comprises a social graph comprising a plurality of nodes and a plurality of edges connecting the nodes, each of the edges between two of the nodes representing a single degree of separation between them, the nodes comprising: a first node corresponding to the first user; and a plurality of second nodes corresponding to a plurality of entities associated with the online social network, respectively. 3. The method of claim 2, wherein a particular second node corresponds to the third-party, and wherein, for the first user, the social-networking information comprises a social-networking action of the first user taken with respect to the first node and the particular second node. 4. The method of claim 3, wherein the social-networking action represents an expression of affinity for the third-party. 5. The method of claim 2, wherein the session information for the first user is stored in association with the first node in the social graph. 6. The method of claim 1, wherein the session information for the first user comprises a history of wireless communication sessions established between at least one beacon of the third-party and the first client system. 7. The method of claim 1, wherein the session information for the first user comprises an average duration of prior wireless communication sessions established between at least one beacon of the third-party and the first client system. 8. The method of claim 1, wherein the social-networking information comprises one or more of: an image of the first user; demographic information of the first user; biographic information of the first user; one or more preferences of the first user with respect to the online social network; payment credentials of the first user; a purchase history of the first user; or social-graph information of the first user. 9. The method of claim 1, wherein the session information comprises an indication of a time elapsed since a last wireless communication session was established between at least one beacon of the third-party and the first client system. 10. The method of claim 1, further comprising sending at least a subset of the social-networking information and the session information to one or more second users of the online social network. 11. The method of claim 10, wherein the one or more second users comprises the first user. 12. The method of claim 1, further comprising: determining a third-party content to be provided by the third-party to the first user, wherein the third-party content is customized based on the session information and the social-networking information; and sending the customized third-party content to the first client system. 13. The method of claim 1, wherein the session information and the social-networking information are displayed on a graphical user interface of the third-party system. 14. The method of claim 13, wherein the graphical user interface comprises one or more notification elements displaying a subset of the session information and the social-networking information. 15. The method of claim 1, wherein the session information further comprises an indication of a geographic location of the beacon relative to the one or more other beacons associated with the third-party. 16. The method of claim 1, wherein session information and social-networking information for a plurality of first users is aggregated prior to sending the session information and social-networking information associated with the plurality of first users to the third-party system. 17. The method of claim 1, wherein the third-party system is the beacon. 18. The method of claim 1, wherein the third-party system is another beacon associated with the third-party. 19. One or more computer-readable non-transitory storage media embodying software that is operable when executed to: receive session information associated with a first user of an online social network, wherein: the session information comprises information indicating that a current wireless communication session has been established between a first client system of the first user and a beacon associated with a particular third-party, wherein: the beacon is proximate to the first client system at the time of the current wireless communication session; and the wireless communication session allows the online social network to send social-networking information of the first user to the third-party; and the session information further comprises information about one or more prior wireless communication sessions between the first client system and the beacon; access social-networking information associated with the first user; determine one or more sets of permissions specified by the first user regarding the social-networking information associated with the first user; and send the session information associated with the first user and the social-networking information associated with the first user to a third-party system of the third-party for display, wherein the sending is based on the one or more sets of permissions. 20. A system comprising: one or more processors; and a memory coupled to the processors comprising instructions executable by the processors, the processors operable when executing the instructions to: receive session information associated with a first user of an online social network, wherein: the session information comprises information indicating that a current wireless communication session has been established between a first client system of the first user and a beacon associated with a particular third-party, wherein: the beacon is proximate to the first client system at the time of the current wireless communication session; and the wireless communication session allows the online social network to send social-networking information of the first user to the third-party; and the session information further comprises information about one or more prior wireless communication sessions between the first client system and the beacon; access social-networking information associated with the first user; determine one or more sets of permissions specified by the first user regarding the social-networking information associated with the first user; and send the session information associated with the first user and the social-networking information associated with the first user to a third-party system of the third-party for display, wherein the sending is based on the one or more sets of permissions.
2,400
7,819
7,819
14,762,476
2,462
According to an embodiment, a mobile extender ( 82 ) is provided which may be configured to provide a base unit ( 81 ) with an additional uplink via a mobile network like LTE.
1. A mobile extender apparatus configured to couple to a base unit having a first protocol and an uplink to a communications network, the apparatus comprising: a first transceiver that receives an mobile signal, a translator that translates the mobile signal into another protocol, a second transceiver that modulates and transmits the translated mobile signal to the base unit, wherein the mobile extender apparatus is physically separate from the base unit, and wherein the mobile extender apparatus is configured to form a dual uplink to the network together with the base unit. 2. The apparatus of claim 1, wherein the mobile extender apparatus is a long term evolution (LTE) extender. 3. The apparatus of claim 1, further comprising an autodetection to detect a signal emitted from the extender apparatus. 4. The apparatus of claim 1, further comprising an identification mechanism of the extender apparatus. 5. The apparatus of claim 1, wherein the extender apparatus is provided in a stand alone housing. 6. The apparatus of claim 1, further comprising a signal strength or quality indicator associated with the extender apparatus. 7. The apparatus of claim 1, further comprising a packet transmission mechanism associated with the extender apparatus. 8. The apparatus of claim 1, further comprising an encapsulator that encapsulates the signal emitted from the LTE extender. 9. The apparatus of claim 1, further comprising a proprietary protocol used to communicate between the base unit and the extender apparatus. 10. The apparatus of claim 1, wherein the second transceiver is a WLAN transceiver. 11. The apparatus of claim 10, wherein the WLAN transceiver has a 5 GHz bandwidth. 12. The apparatus of claim 1, further comprising multiple long term evolution (LTE) extenders that operate in parallel to communicate with the base unit. 13. The apparatus of claim 12, wherein the multiple LTE extenders are configured for the same user. 14. The apparatus of claim 1, wherein the mobile extender apparatus forms a point to point link with the base unit. 15. The apparatus of claim 1, further comprising a software program on either the base unit or the mobile extender apparatuses, wherein the software program is uploadable by a user of the mobile extender apparatus. 16. (canceled) 17. (canceled) 18. The apparatus of claim 1, wherein the base unit provides a DSL uplink, wherein an uplink via the mobile extender apparatus is used when the DSL uplink is at or near its maximum capacity. 19. (canceled) 20. The apparatus of claim 18, wherein use of the DSL uplink and uplink via the extender apparatus is governed by a policy. 21. A method to provide a dual link to a communication network, wherein a base unit has a first protocol and an uplink to a communications network, the method comprising: receiving a mobile signal at a mobile extender, translating the mobile signal into another protocol, transmitting the translated mobile signal to the base unit, wherein the mobile extender is physically separate from the base unit. 22. The method of claim 21, wherein the mobile extender comprises: a first transceiver that receives an mobile signal, a translator that translates the mobile signal into another protocol, a second transceiver that modulates and transmits the translated mobile signal to the base unit, wherein the mobile extender apparatus is physically separate from the base unit, and wherein the mobile extender apparatus is configured to form a dual uplink to the network together with the base unit. 23. (canceled) 24. A base unit, the base unit providing a DSL uplink and comprising an interface to be coupled to a mobile extender apparatus to provide further uplink.
According to an embodiment, a mobile extender ( 82 ) is provided which may be configured to provide a base unit ( 81 ) with an additional uplink via a mobile network like LTE.1. A mobile extender apparatus configured to couple to a base unit having a first protocol and an uplink to a communications network, the apparatus comprising: a first transceiver that receives an mobile signal, a translator that translates the mobile signal into another protocol, a second transceiver that modulates and transmits the translated mobile signal to the base unit, wherein the mobile extender apparatus is physically separate from the base unit, and wherein the mobile extender apparatus is configured to form a dual uplink to the network together with the base unit. 2. The apparatus of claim 1, wherein the mobile extender apparatus is a long term evolution (LTE) extender. 3. The apparatus of claim 1, further comprising an autodetection to detect a signal emitted from the extender apparatus. 4. The apparatus of claim 1, further comprising an identification mechanism of the extender apparatus. 5. The apparatus of claim 1, wherein the extender apparatus is provided in a stand alone housing. 6. The apparatus of claim 1, further comprising a signal strength or quality indicator associated with the extender apparatus. 7. The apparatus of claim 1, further comprising a packet transmission mechanism associated with the extender apparatus. 8. The apparatus of claim 1, further comprising an encapsulator that encapsulates the signal emitted from the LTE extender. 9. The apparatus of claim 1, further comprising a proprietary protocol used to communicate between the base unit and the extender apparatus. 10. The apparatus of claim 1, wherein the second transceiver is a WLAN transceiver. 11. The apparatus of claim 10, wherein the WLAN transceiver has a 5 GHz bandwidth. 12. The apparatus of claim 1, further comprising multiple long term evolution (LTE) extenders that operate in parallel to communicate with the base unit. 13. The apparatus of claim 12, wherein the multiple LTE extenders are configured for the same user. 14. The apparatus of claim 1, wherein the mobile extender apparatus forms a point to point link with the base unit. 15. The apparatus of claim 1, further comprising a software program on either the base unit or the mobile extender apparatuses, wherein the software program is uploadable by a user of the mobile extender apparatus. 16. (canceled) 17. (canceled) 18. The apparatus of claim 1, wherein the base unit provides a DSL uplink, wherein an uplink via the mobile extender apparatus is used when the DSL uplink is at or near its maximum capacity. 19. (canceled) 20. The apparatus of claim 18, wherein use of the DSL uplink and uplink via the extender apparatus is governed by a policy. 21. A method to provide a dual link to a communication network, wherein a base unit has a first protocol and an uplink to a communications network, the method comprising: receiving a mobile signal at a mobile extender, translating the mobile signal into another protocol, transmitting the translated mobile signal to the base unit, wherein the mobile extender is physically separate from the base unit. 22. The method of claim 21, wherein the mobile extender comprises: a first transceiver that receives an mobile signal, a translator that translates the mobile signal into another protocol, a second transceiver that modulates and transmits the translated mobile signal to the base unit, wherein the mobile extender apparatus is physically separate from the base unit, and wherein the mobile extender apparatus is configured to form a dual uplink to the network together with the base unit. 23. (canceled) 24. A base unit, the base unit providing a DSL uplink and comprising an interface to be coupled to a mobile extender apparatus to provide further uplink.
2,400
7,820
7,820
14,883,192
2,458
An apparatus is provided that includes a processor and a memory storing executable instructions that in response to execution by the processor cause the apparatus to at least perform a number of operations. The apparatus is caused to receive time information over a packet-switched computer network, with the time information including a current standard time, time-zone offset and timestamps that define a predetermined timeframe. The apparatus is caused to calculate a current local time from the current standard time and time-zone offset, and including an adjustment of the current local time in instances in which the timestamps indicate that the current standard time is within the predetermined timeframe. And the apparatus is caused to cause a clock to be set to the current local time.
1. An apparatus comprising a processor and a memory storing executable instructions that in response to execution by the processor cause the apparatus to at least: receive time information over a packet-switched computer network, the time information including a current standard time, time-zone offset and timestamps that define a predetermined timeframe; calculate a current local time from the current standard time and time-zone offset, and including an adjustment of the current local time in instances in which the timestamps indicate that the current standard time is within the predetermined timeframe; and cause a clock to be set to the current local time. 2. The apparatus of claim 1 integral with or directly coupled to an appliance that includes the clock, the apparatus further comprising a real-time clock configured to be set to and keep the current standard time. 3. The apparatus of claim 1, wherein the predetermined timeframe is daylight saving time. 4. The apparatus of claim 1, wherein the apparatus being caused to calculate the current local time includes being caused to calculate the current local time without any information other than the current standard time, time-zone offset and timestamps, and without any external trigger to calculate the current local time. 5. The apparatus of claim 1, wherein the apparatus being caused to calculate the current local time includes being caused to periodically check the timestamps and identify therefrom, the instance in which the timestamps indicate that the current standard time is within the predetermined timeframe. 6. The apparatus of claim 1, wherein the instance is a first instance, and the apparatus being caused to calculate the current local time further includes a readjustment of the of the current local time subsequent to the first instance, in a second instance in which the timestamps indicate that the current standard time is outside the predetermined timeframe. 7. A method comprising: receiving time information over a packet-switched computer network, the time information including a current standard time, time-zone offset and timestamps that define a predetermined timeframe; calculating a current local time from the current standard time and time-zone offset, and including an adjustment of the current local time in instances in which the timestamps indicate that the current standard time is within the predetermined timeframe; and causing a clock to be set to the current local time. 8. The method of claim 7, wherein receiving the time information, calculating the current local time and causing the clock to be set are performed at an apparatus integral with or directly coupled to an appliance that includes the clock, the apparatus includes a real-time clock configured to be set to and keep the current standard time. 9. The method of claim 7, wherein the predetermined timeframe is daylight saving time. 10. The method of claim 7, wherein calculating the current local time includes calculating the current local time without any information other than the current standard time, time-zone offset and timestamps, and without any external trigger to calculate the current local time. 11. The method of claim 7, wherein calculating the current local time includes periodically checking the timestamps and identify therefrom, the instance in which the timestamps indicate that the current standard time is within the predetermined timeframe. 12. The method of claim 7, wherein the instance is a first instance, and calculating the current local time further includes a readjustment of the of the current local time subsequent to the first instance, in a second instance in which the timestamps indicate that the current standard time is outside the predetermined timeframe. 13. A computer-readable storage medium that is non-transitory and has computer-readable program code portions stored therein that in response to execution by a processor, cause an apparatus to at least: receive time information over a packet-switched computer network, the time information including a current standard time, time-zone offset and timestamps that define a predetermined timeframe; calculate a current local time from the current standard time and time-zone offset, and including an adjustment of the current local time in instances in which the timestamps indicate that the current standard time is within the predetermined timeframe; and cause a clock to be set to the current local time. 14. The computer-readable storage medium of claim 13, wherein the apparatus includes the computer-readable storage medium and processor, the apparatus being integral with or directly coupled to an appliance that includes the clock, the apparatus further including a real-time clock configured to be set to and keep the current standard time. 15. The computer-readable storage medium of claim 13, wherein the predetermined timeframe is daylight saving time. 16. The computer-readable storage medium of claim 13, wherein the apparatus being caused to calculate the current local time includes being caused to calculate the current local time without any information other than the current standard time, time-zone offset and timestamps, and without any external trigger to calculate the current local time. 17. The computer-readable storage medium of claim 13, wherein the apparatus being caused to calculate the current local time includes being caused to periodically check the timestamps and identify therefrom, the instance in which the timestamps indicate that the current standard time is within the predetermined timeframe. 18. The computer-readable storage medium of claim 13, wherein the instance is a first instance, and the apparatus being caused to calculate the current local time further includes a readjustment of the of the current local time subsequent to the first instance, in a second instance in which the timestamps indicate that the current standard time is outside the predetermined timeframe.
An apparatus is provided that includes a processor and a memory storing executable instructions that in response to execution by the processor cause the apparatus to at least perform a number of operations. The apparatus is caused to receive time information over a packet-switched computer network, with the time information including a current standard time, time-zone offset and timestamps that define a predetermined timeframe. The apparatus is caused to calculate a current local time from the current standard time and time-zone offset, and including an adjustment of the current local time in instances in which the timestamps indicate that the current standard time is within the predetermined timeframe. And the apparatus is caused to cause a clock to be set to the current local time.1. An apparatus comprising a processor and a memory storing executable instructions that in response to execution by the processor cause the apparatus to at least: receive time information over a packet-switched computer network, the time information including a current standard time, time-zone offset and timestamps that define a predetermined timeframe; calculate a current local time from the current standard time and time-zone offset, and including an adjustment of the current local time in instances in which the timestamps indicate that the current standard time is within the predetermined timeframe; and cause a clock to be set to the current local time. 2. The apparatus of claim 1 integral with or directly coupled to an appliance that includes the clock, the apparatus further comprising a real-time clock configured to be set to and keep the current standard time. 3. The apparatus of claim 1, wherein the predetermined timeframe is daylight saving time. 4. The apparatus of claim 1, wherein the apparatus being caused to calculate the current local time includes being caused to calculate the current local time without any information other than the current standard time, time-zone offset and timestamps, and without any external trigger to calculate the current local time. 5. The apparatus of claim 1, wherein the apparatus being caused to calculate the current local time includes being caused to periodically check the timestamps and identify therefrom, the instance in which the timestamps indicate that the current standard time is within the predetermined timeframe. 6. The apparatus of claim 1, wherein the instance is a first instance, and the apparatus being caused to calculate the current local time further includes a readjustment of the of the current local time subsequent to the first instance, in a second instance in which the timestamps indicate that the current standard time is outside the predetermined timeframe. 7. A method comprising: receiving time information over a packet-switched computer network, the time information including a current standard time, time-zone offset and timestamps that define a predetermined timeframe; calculating a current local time from the current standard time and time-zone offset, and including an adjustment of the current local time in instances in which the timestamps indicate that the current standard time is within the predetermined timeframe; and causing a clock to be set to the current local time. 8. The method of claim 7, wherein receiving the time information, calculating the current local time and causing the clock to be set are performed at an apparatus integral with or directly coupled to an appliance that includes the clock, the apparatus includes a real-time clock configured to be set to and keep the current standard time. 9. The method of claim 7, wherein the predetermined timeframe is daylight saving time. 10. The method of claim 7, wherein calculating the current local time includes calculating the current local time without any information other than the current standard time, time-zone offset and timestamps, and without any external trigger to calculate the current local time. 11. The method of claim 7, wherein calculating the current local time includes periodically checking the timestamps and identify therefrom, the instance in which the timestamps indicate that the current standard time is within the predetermined timeframe. 12. The method of claim 7, wherein the instance is a first instance, and calculating the current local time further includes a readjustment of the of the current local time subsequent to the first instance, in a second instance in which the timestamps indicate that the current standard time is outside the predetermined timeframe. 13. A computer-readable storage medium that is non-transitory and has computer-readable program code portions stored therein that in response to execution by a processor, cause an apparatus to at least: receive time information over a packet-switched computer network, the time information including a current standard time, time-zone offset and timestamps that define a predetermined timeframe; calculate a current local time from the current standard time and time-zone offset, and including an adjustment of the current local time in instances in which the timestamps indicate that the current standard time is within the predetermined timeframe; and cause a clock to be set to the current local time. 14. The computer-readable storage medium of claim 13, wherein the apparatus includes the computer-readable storage medium and processor, the apparatus being integral with or directly coupled to an appliance that includes the clock, the apparatus further including a real-time clock configured to be set to and keep the current standard time. 15. The computer-readable storage medium of claim 13, wherein the predetermined timeframe is daylight saving time. 16. The computer-readable storage medium of claim 13, wherein the apparatus being caused to calculate the current local time includes being caused to calculate the current local time without any information other than the current standard time, time-zone offset and timestamps, and without any external trigger to calculate the current local time. 17. The computer-readable storage medium of claim 13, wherein the apparatus being caused to calculate the current local time includes being caused to periodically check the timestamps and identify therefrom, the instance in which the timestamps indicate that the current standard time is within the predetermined timeframe. 18. The computer-readable storage medium of claim 13, wherein the instance is a first instance, and the apparatus being caused to calculate the current local time further includes a readjustment of the of the current local time subsequent to the first instance, in a second instance in which the timestamps indicate that the current standard time is outside the predetermined timeframe.
2,400
7,821
7,821
15,177,817
2,439
A system discloses providing secure remote desktop session host experience to a user for a selected application while controlling the user's access to non-core functionalities of the selected application. An implementation of the system disclosed herein identifies a non-core functionality of an application running on a server, flags the executable files, shared object library files, and the registration keys necessary for the non-core functionality of the application, and disables the application's access to the identified executable files, the identified shared object library files, and the identified registration keys.
1. A physical article of manufacture including one or more tangible computer-readable storage media, encoding computer-executable instructions for executing on a computer system a computer process, the computer process comprising: flagging one or more of executable files, shared object library files, and registration keys necessary for a non-core functionality of an application; and disabling the application's access to the flagged executable files, the flagged shared object library files, and the flagged registration keys. 2. The physical article of manufacture of claim 1, wherein the computer process further comprising determining the non-core functionality of the application by determining functionalities that access a server configuration file as a non-core functionality. 3. The physical article of manufacture of claim 2, wherein determining the non-core functionality of the application further comprises determining functionalities that access a server operating system as a non-core functionality. 4. The physical article of manufacture of claim 2, wherein determining the non-core functionality of the application further comprises determining functionalities that access an application configuration file as a non-core functionality. 5. The physical article of manufacture of claim 1, wherein the non-core functionality of the application is a common dialog based functionality. 6. The physical article of manufacture of claim 5, wherein disabling the application's access to the common dialog based functionality further comprises disabling the application's access to the registration keys necessary to execute the common dialog based functionality. 7. The physical article of manufacture of claim 1, wherein disabling the application's access to the flagged shared object library files further comprises disabling the application's access to the flagged shared object library files using an application execution controller. 8. The physical article of manufacture of claim 1, wherein the computer process further comprising generating a scheduled task with group policy preferences specifying the application's access permissions to the flagged executable files, the flagged shared object library files, and the flagged registration keys. 9. The physical article of manufacture of claim 8, wherein the computer process further comprising running the scheduled task on the server on a periodic basis to enforce the group policy preferences. 10. A method of providing a secure remote desktop session, the method comprising: determining a non-core functionality of an application running on a server; identifying a plurality of non-core functionality resources necessary for executing the non-core functionality; and disabling the application's access to the plurality of non-core functionality resources necessary for executing the non-core functionality. 11. The method of claim 10, wherein the plurality of non-core functionality resources comprises one or more executable files accessed by the non-core functionality and disabling the application's access to the plurality of non-core functionality resources further comprises restricting the application's access of the one or more executable files. 12. The method of claim 11, wherein the plurality of non-core functionality resources comprises one or more shared object library files accessed by the one or more executable files and disabling the application's access to the plurality of non-core functionality resources further comprises restricting the one or more executable files' access of the one or more shared object library files. 13. The method of claim 12, wherein the plurality of non-core functionality resources comprises one or more identification keys accessed by the one or more shared object library files and disabling the application's access to the plurality of non-core functionality resources further comprises restricting the one or more shared object library files' access of the one or more identification keys. 14. The method of claim 10, wherein disabling the application's access to the plurality of non-core functionality resources further comprising generating a task to be run on a periodic basis on the server, the task configured to set group policy preferences to disable the application's access to the plurality of non-core functionality resources necessary for executing the non-core functionality. 15. The method of claim 10, wherein determining the non-core functionality of the application running on the server further comprises determining functionalities that access at least one an application configuration file, a server configuration file, and server operating system. 16. A system comprising: memory; one or more processor units; a non-core functionality identification module stored in the memory and executable by the one or more processor units, the non-core functionality identification module configured to determine a non-core functionality of an application running on a server; and a non-core functionality resource identification module stored in the memory and executable by the one or more processor units, the non-core functionality resource identification module configured to identifying a plurality of non-core functionality resources necessary for executing the non-core functionality; and a non-core functionality resource access prevention module stored in the memory and executable by the one or more processor units, the non-core functionality resource access prevention module configured to disable the application's access to the plurality of non-core functionality resources. 17. The system of claim 16, wherein the non-core functionality resource identification module is further configured to identify at least one of an executable file, a shared object library file, and an identification key as one or more of the plurality of non-core functionality resources necessary for executing the non-core functionality. 18. The system of claim 17, wherein the non-core functionality resource access prevention module is further configured to generate a scheduled task with group policy preferences specifying the application's access permissions to the non-core functionality resources necessary for executing the non-core functionality. 19. The system of claim 18, wherein the non-core functionality resource access prevention module is further configured to run the scheduled task on the server on a periodic basis to enforce the group policy preferences. 20. The system of claim 16, wherein the non-core functionality of the application is a common dialog based functionality.
A system discloses providing secure remote desktop session host experience to a user for a selected application while controlling the user's access to non-core functionalities of the selected application. An implementation of the system disclosed herein identifies a non-core functionality of an application running on a server, flags the executable files, shared object library files, and the registration keys necessary for the non-core functionality of the application, and disables the application's access to the identified executable files, the identified shared object library files, and the identified registration keys.1. A physical article of manufacture including one or more tangible computer-readable storage media, encoding computer-executable instructions for executing on a computer system a computer process, the computer process comprising: flagging one or more of executable files, shared object library files, and registration keys necessary for a non-core functionality of an application; and disabling the application's access to the flagged executable files, the flagged shared object library files, and the flagged registration keys. 2. The physical article of manufacture of claim 1, wherein the computer process further comprising determining the non-core functionality of the application by determining functionalities that access a server configuration file as a non-core functionality. 3. The physical article of manufacture of claim 2, wherein determining the non-core functionality of the application further comprises determining functionalities that access a server operating system as a non-core functionality. 4. The physical article of manufacture of claim 2, wherein determining the non-core functionality of the application further comprises determining functionalities that access an application configuration file as a non-core functionality. 5. The physical article of manufacture of claim 1, wherein the non-core functionality of the application is a common dialog based functionality. 6. The physical article of manufacture of claim 5, wherein disabling the application's access to the common dialog based functionality further comprises disabling the application's access to the registration keys necessary to execute the common dialog based functionality. 7. The physical article of manufacture of claim 1, wherein disabling the application's access to the flagged shared object library files further comprises disabling the application's access to the flagged shared object library files using an application execution controller. 8. The physical article of manufacture of claim 1, wherein the computer process further comprising generating a scheduled task with group policy preferences specifying the application's access permissions to the flagged executable files, the flagged shared object library files, and the flagged registration keys. 9. The physical article of manufacture of claim 8, wherein the computer process further comprising running the scheduled task on the server on a periodic basis to enforce the group policy preferences. 10. A method of providing a secure remote desktop session, the method comprising: determining a non-core functionality of an application running on a server; identifying a plurality of non-core functionality resources necessary for executing the non-core functionality; and disabling the application's access to the plurality of non-core functionality resources necessary for executing the non-core functionality. 11. The method of claim 10, wherein the plurality of non-core functionality resources comprises one or more executable files accessed by the non-core functionality and disabling the application's access to the plurality of non-core functionality resources further comprises restricting the application's access of the one or more executable files. 12. The method of claim 11, wherein the plurality of non-core functionality resources comprises one or more shared object library files accessed by the one or more executable files and disabling the application's access to the plurality of non-core functionality resources further comprises restricting the one or more executable files' access of the one or more shared object library files. 13. The method of claim 12, wherein the plurality of non-core functionality resources comprises one or more identification keys accessed by the one or more shared object library files and disabling the application's access to the plurality of non-core functionality resources further comprises restricting the one or more shared object library files' access of the one or more identification keys. 14. The method of claim 10, wherein disabling the application's access to the plurality of non-core functionality resources further comprising generating a task to be run on a periodic basis on the server, the task configured to set group policy preferences to disable the application's access to the plurality of non-core functionality resources necessary for executing the non-core functionality. 15. The method of claim 10, wherein determining the non-core functionality of the application running on the server further comprises determining functionalities that access at least one an application configuration file, a server configuration file, and server operating system. 16. A system comprising: memory; one or more processor units; a non-core functionality identification module stored in the memory and executable by the one or more processor units, the non-core functionality identification module configured to determine a non-core functionality of an application running on a server; and a non-core functionality resource identification module stored in the memory and executable by the one or more processor units, the non-core functionality resource identification module configured to identifying a plurality of non-core functionality resources necessary for executing the non-core functionality; and a non-core functionality resource access prevention module stored in the memory and executable by the one or more processor units, the non-core functionality resource access prevention module configured to disable the application's access to the plurality of non-core functionality resources. 17. The system of claim 16, wherein the non-core functionality resource identification module is further configured to identify at least one of an executable file, a shared object library file, and an identification key as one or more of the plurality of non-core functionality resources necessary for executing the non-core functionality. 18. The system of claim 17, wherein the non-core functionality resource access prevention module is further configured to generate a scheduled task with group policy preferences specifying the application's access permissions to the non-core functionality resources necessary for executing the non-core functionality. 19. The system of claim 18, wherein the non-core functionality resource access prevention module is further configured to run the scheduled task on the server on a periodic basis to enforce the group policy preferences. 20. The system of claim 16, wherein the non-core functionality of the application is a common dialog based functionality.
2,400
7,822
7,822
15,806,893
2,487
Methods and apparatus are provided for signaling intra prediction for large blocks for video encoders and decoders. An apparatus includes a video encoder ( 400 ) for encoding picture data for at least one large block in a picture by signaling intra prediction for the at least one large block. The intra prediction is signaled by selecting a basic coding unit size and assigning a single spatial intra partition type for the basic coding unit size. The single spatial intra partition type is selectable from among a plurality of spatial intra partition types. The at least one large block has a large block size greater than a block size of the basic coding unit. The intra prediction is hierarchical layer intra prediction and is performed for the at least one large block by at least one of splitting from the large block size to the basic coding unit size and merging from the basic coding unit size to the large block size.
1. A decoding method comprising: decoding picture data for at least a large block in a picture by determining that intra prediction is to be performed for the at least a large block, wherein the at least a large block has a large block size greater than a basic coding unit size, the large block size being one of 32×32 and 64×64 and the basic coding unit size being 16×16, wherein the intra prediction is signaled for the at least a large block by: decoding a binary split signaling syntax element specifying whether the large block is further split into four equally sized sub-blocks; decoding an intra prediction mode for said large block in the case where said binary split signaling syntax element specifies the large block is not further split; otherwise in the case where said binary split signaling syntax element specifies the large block is further split: decoding for each sub-block, in the case where said sub-block is 32×32, a binary split signaling syntax element specifying whether the 32×32 sub-block is further split into four equally basic coding unit sized blocks and decoding an intra prediction mode for said 32×32 sub-block in the case where said binary split signaling syntax element specifies said 32×32 sub-block is not further split; and decoding for each sub-block, in the case where said sub-block is 16×16, a single spatial intra partition type, the single spatial intra partition type being determinable from among a plurality of spatial intra partition types. 2. The method of claim 1, further comprising decoding at least one binary merge signaling syntax element specifying whether basic coding unit sized blocks are merged into a large sized block. 3. The method of claim 1, wherein at least one of a spatial intra partition type table and an intra prediction mode table is pre-stored and used to decode the at least one large block. 4. The method of claim 1, wherein at least one of a spatial intra partition type table and an intra prediction mode table is received using one or more high level syntax elements and is used to decode the at least one large block. 5. An encoding method comprising: encoding picture data for at least a large block in a picture by determining that intra prediction is to be performed for the at least a large block, wherein the at least a large block has a large block size greater than a basic coding unit size, the large block size being one of 32×32 and 64×64 and the basic coding unit size being 16×16, wherein the intra prediction is signaled for the at least a large block by: encoding a binary split signaling syntax element specifying whether the large block is further split into four equally sized sub-blocks; encoding an intra prediction mode for said large block in the case where said binary split signaling syntax element specifies the large block is not further split; otherwise in the case where said binary split signaling syntax element specifies the large block is further split: encoding for each sub-block, in the case where said sub-block is 32×32, a binary split signaling syntax element specifying whether said 32×32 sub-block is further split into four equally basic coding unit sized blocks and encoding an intra prediction mode for said 32×32 sub-block in the case where said binary split signaling syntax element specifies said 32×32 sub-block is not further split; and encoding for each sub-block, in the case where said sub-block is 16×16, a single spatial intra partition type, the single spatial intra partition type being determinable from among a plurality of spatial intra partition types. 6. The method of claim 5, further comprising encoding at least one binary merge signaling syntax element specifying whether basic coding unit sized blocks are merged into a large sized block. 7. The method of claim 5, wherein at least one of a spatial intra partition type table and an intra prediction mode table is pre-stored and used to encode the at least one large block. 8. The method of claim 5, wherein at least one of a spatial intra partition type table and an intra prediction mode table is encoded using one or more high level syntax elements and is used to encode the at least one large block. 9. A video decoder, comprising at least a memory and one or more processors, wherein the one or more processors are configured to: decode picture data for at least a large block in a picture by determining that intra prediction is to be performed for the at least a large block, wherein the at least a large block has a large block size greater than a basic coding unit size, the large block size being one of 32×32 and 64×64 and the basic coding unit size being 16×16, wherein the intra prediction is signaled for the at least a large block and the one or more processors are configured to: decode a binary split signaling syntax element specifying whether the large block is further split into four equally sized sub-blocks; decode an intra prediction mode for said large block in the case where said binary split signaling syntax element specifies the large block is not further split; otherwise in the case where said binary split signaling syntax element specifies the large block is further split: decode for each sub-block, in the case where said sub-block is 32×32, a binary split signaling syntax element specifying whether said 32×32 sub-block is further split into four equally basic coding unit sized blocks and decode an intra prediction mode for said 32×32 sub-block in the case where said binary split signaling syntax element specifies said 32×32 sub-block is not further split; and decode for each sub-block, in the case where said sub-block is 16×16, a single spatial intra partition type, the single spatial intra partition type being determinable from among a plurality of spatial intra partition types. 10. The video decoder of claim 9, wherein the one or more processors are further configured to decode at least one binary merge signaling syntax element specifying whether basic coding unit sized blocks are merged into a large sized block. 11. The video decoder of claim 9, wherein at least one of a spatial intra partition type table and an intra prediction mode table is pre-stored and used to decode the at least one large block. 12. The video decoder of claim 9, wherein at least one of a spatial intra partition type table and an intra prediction mode table is received using one or more high level syntax elements and is used to decode the at least one large block (810). 13. A video encoder, comprising at least a memory and one or more processors, wherein the one or more processors are configured to: encode picture data for at least a large block in a picture by determining that intra prediction is to be performed for the at least a large block (820, 830), wherein the at least a large block has a large block size greater than a basic coding unit size, the large block size being one of 32×32 and 64×64 and the basic coding unit size being 16×16, wherein the intra prediction is signaled for the at least a large block and the one or more processors are configured to: encode a binary split signaling syntax element specifying whether the large block is further split into four equally sized sub-blocks; encode an intra prediction mode for said large block in the case where said binary split signaling syntax element specifies the large block is not further split; otherwise in the case where said binary split signaling syntax element specifies the large block is further split: encode for each sub-block, in the case where said sub-block is 32×32, a binary split signaling syntax element specifying whether said 32×32 sub-block is further split into four equally basic coding unit sized blocks and encode an intra prediction mode for said 32×32 sub-block in the case where said binary split signaling syntax element specifies said 32×32 sub-block is not further split; and encode for each sub-block, in the case where said sub-block is 16×16, a single spatial intra partition type, the single spatial intra partition type being determinable from among a plurality of spatial intra partition types. 14. The video encoder of claim 13, wherein the one or more processors are further configured to encode at least one binary merge signaling syntax element specifying whether basic coding unit sized blocks are merged into a large sized block. 15. The video encoder of claim 13, wherein at least one of a spatial intra partition type table and an intra prediction mode table is pre-stored and used to encode the at least one large block. 16. The video encoder of claim 13, wherein at least one of a spatial intra partition type table and an intra prediction mode table is encoded using one or more high level syntax elements and is used to encode the at least one large block (810). 17. A non-transitory computer readable medium having a video signal structure comprising: coded picture data representative of at least a large block in a picture obtained by determining that intra prediction is to be performed for the at least a large block (820, 830), wherein the at least a large block has a large block size greater than a basic coding unit size, the large block size being one of 32×32 and 64×64 and the basic coding unit size being 16×16, a binary split signaling syntax element specifying whether the large block is further split into four equally sized sub-blocks; an intra prediction mode for said large block in the case where said binary split signaling syntax element specifies the large block is not further split; otherwise in the case where said binary split signaling syntax element specifies the large block is further split: for each sub-block, in the case where said sub-block is 32×32, a binary split signaling syntax element specifying whether said 32×32 sub-block is further split into four equally basic coding unit sized blocks and an intra prediction mode for said 32×32 sub-block in the case where said binary split signaling syntax element specifies said 32×32 sub-block is not further split; and for each sub-block, in the case where said sub-block is 16×16, a single spatial intra partition type, the single spatial intra partition type being determinable from among a plurality of spatial intra partition types. 18. The medium of claim 17, wherein said video signal structure further comprises at least one binary merge signaling syntax element specifying whether basic coding unit sized blocks are merged into a large sized block. 19. The medium of claim 17, wherein said video signal structure further comprises data representative of at least one of a spatial intra partition type table and of an intra prediction mode table encoded in one or more high level syntax elements, said at least one of a spatial intra partition type table and an intra prediction mode table being used to encode said at least a large block.
Methods and apparatus are provided for signaling intra prediction for large blocks for video encoders and decoders. An apparatus includes a video encoder ( 400 ) for encoding picture data for at least one large block in a picture by signaling intra prediction for the at least one large block. The intra prediction is signaled by selecting a basic coding unit size and assigning a single spatial intra partition type for the basic coding unit size. The single spatial intra partition type is selectable from among a plurality of spatial intra partition types. The at least one large block has a large block size greater than a block size of the basic coding unit. The intra prediction is hierarchical layer intra prediction and is performed for the at least one large block by at least one of splitting from the large block size to the basic coding unit size and merging from the basic coding unit size to the large block size.1. A decoding method comprising: decoding picture data for at least a large block in a picture by determining that intra prediction is to be performed for the at least a large block, wherein the at least a large block has a large block size greater than a basic coding unit size, the large block size being one of 32×32 and 64×64 and the basic coding unit size being 16×16, wherein the intra prediction is signaled for the at least a large block by: decoding a binary split signaling syntax element specifying whether the large block is further split into four equally sized sub-blocks; decoding an intra prediction mode for said large block in the case where said binary split signaling syntax element specifies the large block is not further split; otherwise in the case where said binary split signaling syntax element specifies the large block is further split: decoding for each sub-block, in the case where said sub-block is 32×32, a binary split signaling syntax element specifying whether the 32×32 sub-block is further split into four equally basic coding unit sized blocks and decoding an intra prediction mode for said 32×32 sub-block in the case where said binary split signaling syntax element specifies said 32×32 sub-block is not further split; and decoding for each sub-block, in the case where said sub-block is 16×16, a single spatial intra partition type, the single spatial intra partition type being determinable from among a plurality of spatial intra partition types. 2. The method of claim 1, further comprising decoding at least one binary merge signaling syntax element specifying whether basic coding unit sized blocks are merged into a large sized block. 3. The method of claim 1, wherein at least one of a spatial intra partition type table and an intra prediction mode table is pre-stored and used to decode the at least one large block. 4. The method of claim 1, wherein at least one of a spatial intra partition type table and an intra prediction mode table is received using one or more high level syntax elements and is used to decode the at least one large block. 5. An encoding method comprising: encoding picture data for at least a large block in a picture by determining that intra prediction is to be performed for the at least a large block, wherein the at least a large block has a large block size greater than a basic coding unit size, the large block size being one of 32×32 and 64×64 and the basic coding unit size being 16×16, wherein the intra prediction is signaled for the at least a large block by: encoding a binary split signaling syntax element specifying whether the large block is further split into four equally sized sub-blocks; encoding an intra prediction mode for said large block in the case where said binary split signaling syntax element specifies the large block is not further split; otherwise in the case where said binary split signaling syntax element specifies the large block is further split: encoding for each sub-block, in the case where said sub-block is 32×32, a binary split signaling syntax element specifying whether said 32×32 sub-block is further split into four equally basic coding unit sized blocks and encoding an intra prediction mode for said 32×32 sub-block in the case where said binary split signaling syntax element specifies said 32×32 sub-block is not further split; and encoding for each sub-block, in the case where said sub-block is 16×16, a single spatial intra partition type, the single spatial intra partition type being determinable from among a plurality of spatial intra partition types. 6. The method of claim 5, further comprising encoding at least one binary merge signaling syntax element specifying whether basic coding unit sized blocks are merged into a large sized block. 7. The method of claim 5, wherein at least one of a spatial intra partition type table and an intra prediction mode table is pre-stored and used to encode the at least one large block. 8. The method of claim 5, wherein at least one of a spatial intra partition type table and an intra prediction mode table is encoded using one or more high level syntax elements and is used to encode the at least one large block. 9. A video decoder, comprising at least a memory and one or more processors, wherein the one or more processors are configured to: decode picture data for at least a large block in a picture by determining that intra prediction is to be performed for the at least a large block, wherein the at least a large block has a large block size greater than a basic coding unit size, the large block size being one of 32×32 and 64×64 and the basic coding unit size being 16×16, wherein the intra prediction is signaled for the at least a large block and the one or more processors are configured to: decode a binary split signaling syntax element specifying whether the large block is further split into four equally sized sub-blocks; decode an intra prediction mode for said large block in the case where said binary split signaling syntax element specifies the large block is not further split; otherwise in the case where said binary split signaling syntax element specifies the large block is further split: decode for each sub-block, in the case where said sub-block is 32×32, a binary split signaling syntax element specifying whether said 32×32 sub-block is further split into four equally basic coding unit sized blocks and decode an intra prediction mode for said 32×32 sub-block in the case where said binary split signaling syntax element specifies said 32×32 sub-block is not further split; and decode for each sub-block, in the case where said sub-block is 16×16, a single spatial intra partition type, the single spatial intra partition type being determinable from among a plurality of spatial intra partition types. 10. The video decoder of claim 9, wherein the one or more processors are further configured to decode at least one binary merge signaling syntax element specifying whether basic coding unit sized blocks are merged into a large sized block. 11. The video decoder of claim 9, wherein at least one of a spatial intra partition type table and an intra prediction mode table is pre-stored and used to decode the at least one large block. 12. The video decoder of claim 9, wherein at least one of a spatial intra partition type table and an intra prediction mode table is received using one or more high level syntax elements and is used to decode the at least one large block (810). 13. A video encoder, comprising at least a memory and one or more processors, wherein the one or more processors are configured to: encode picture data for at least a large block in a picture by determining that intra prediction is to be performed for the at least a large block (820, 830), wherein the at least a large block has a large block size greater than a basic coding unit size, the large block size being one of 32×32 and 64×64 and the basic coding unit size being 16×16, wherein the intra prediction is signaled for the at least a large block and the one or more processors are configured to: encode a binary split signaling syntax element specifying whether the large block is further split into four equally sized sub-blocks; encode an intra prediction mode for said large block in the case where said binary split signaling syntax element specifies the large block is not further split; otherwise in the case where said binary split signaling syntax element specifies the large block is further split: encode for each sub-block, in the case where said sub-block is 32×32, a binary split signaling syntax element specifying whether said 32×32 sub-block is further split into four equally basic coding unit sized blocks and encode an intra prediction mode for said 32×32 sub-block in the case where said binary split signaling syntax element specifies said 32×32 sub-block is not further split; and encode for each sub-block, in the case where said sub-block is 16×16, a single spatial intra partition type, the single spatial intra partition type being determinable from among a plurality of spatial intra partition types. 14. The video encoder of claim 13, wherein the one or more processors are further configured to encode at least one binary merge signaling syntax element specifying whether basic coding unit sized blocks are merged into a large sized block. 15. The video encoder of claim 13, wherein at least one of a spatial intra partition type table and an intra prediction mode table is pre-stored and used to encode the at least one large block. 16. The video encoder of claim 13, wherein at least one of a spatial intra partition type table and an intra prediction mode table is encoded using one or more high level syntax elements and is used to encode the at least one large block (810). 17. A non-transitory computer readable medium having a video signal structure comprising: coded picture data representative of at least a large block in a picture obtained by determining that intra prediction is to be performed for the at least a large block (820, 830), wherein the at least a large block has a large block size greater than a basic coding unit size, the large block size being one of 32×32 and 64×64 and the basic coding unit size being 16×16, a binary split signaling syntax element specifying whether the large block is further split into four equally sized sub-blocks; an intra prediction mode for said large block in the case where said binary split signaling syntax element specifies the large block is not further split; otherwise in the case where said binary split signaling syntax element specifies the large block is further split: for each sub-block, in the case where said sub-block is 32×32, a binary split signaling syntax element specifying whether said 32×32 sub-block is further split into four equally basic coding unit sized blocks and an intra prediction mode for said 32×32 sub-block in the case where said binary split signaling syntax element specifies said 32×32 sub-block is not further split; and for each sub-block, in the case where said sub-block is 16×16, a single spatial intra partition type, the single spatial intra partition type being determinable from among a plurality of spatial intra partition types. 18. The medium of claim 17, wherein said video signal structure further comprises at least one binary merge signaling syntax element specifying whether basic coding unit sized blocks are merged into a large sized block. 19. The medium of claim 17, wherein said video signal structure further comprises data representative of at least one of a spatial intra partition type table and of an intra prediction mode table encoded in one or more high level syntax elements, said at least one of a spatial intra partition type table and an intra prediction mode table being used to encode said at least a large block.
2,400
7,823
7,823
15,635,183
2,437
Embodiments of the disclosure provide application management capabilities to enterprises. A computing device of a user, associated with the enterprise, receives an enrollment token signed with a certificate. The enrollment token includes an enterprise identifier associated with the enterprise. The computing device receives a package containing one or more applications. The package also includes an enterprise identifier. Installation and execution of one or more applications from the received package is accepted or rejected based on a comparison of the enterprise identifier from the enrollment token with the enterprise identifier from the received package or application. A web service provides validation services by monitoring the installation and execution of applications on the computing devices associated with the enterprise.
1. A system for managing execution of applications associated with an enterprise, said system comprising: a mobile computing device comprising: a memory; and one or more processors programmed to: enroll the mobile computing device with the enterprise, the enrolling authorizing the enterprise to send applications to the mobile computing device; upon enrolling the mobile computing device with the enterprise, receive an enrollment token from the enterprise; store the enrollment token in the memory; receive an application; based at least on a determination that the application is associated with the enrollment token, determine the application is associated with the enterprise that has authorization to send applications to the mobile computing device; and upon determining the application is associated with the enterprise, install the application. 2. The system of claim 1, wherein the one or more processors are further programmed to: receive a request to install the application; upon receiving a request to install the application, determine that the application is provided by the enterprise; and upon determining the application is provided by the enterprise, determine that the enrollment token is associated with the application. 3. The system of claim 1, wherein the enrollment token is associated with a certificate that represents certification by a third party that the enterprise is a valid entity. 4. The system of claim 1, wherein the enrollment token further includes an enterprise policy, a location identifier, a device identifier, and a user identifier. 5. The system of claim 1, wherein a web service provides the application to the enterprise. 6. The system of claim 1, wherein the processor is further programmed to upon determining that the application is not associated with the enrollment token, reject installation of the application. 7. The system of claim 1, wherein the processor is further programmed to: provide the enterprise with credentials for the mobile computing device; authenticate the mobile computing device with the enterprise based on the credentials; upon authenticating the mobile computing device, enroll the mobile computing device with the enterprise; and upon enrolling the mobile computing device with the enterprise, receive the enrollment token from the enterprise. 8. A method for managing execution of applications associated with an enterprise, the method comprising: enrolling a mobile computing device with the enterprise, the enrolling authorizing the enterprise to send applications to the mobile computing device; upon enrolling the mobile computing device with the enterprise, receiving an enrollment token from the enterprise; receiving an application; based at least on a determination that the application is associated with the enrollment token, determining the application is associated with the enterprise that has authorization to send applications to the mobile computing device; and upon determining the application is associated with the enterprise, installing the application. 9. The method of claim 8, further comprising: receiving a request to install the application; upon receiving a request to install the application, determining that the application is provided by the enterprise; and upon determining the application is provided by the enterprise, determining that the enrollment token is associated with the application. 10. The method of claim 8, wherein the enrollment token is associated with a certificate that represents certification by a third party that the enterprise is a valid entity. 11. The method of claim 8, wherein the enrollment token further includes an enterprise policy, a location identifier, a device identifier, and a user identifier. 12. The method of claim 8, wherein a web service provides the application to the enterprise. 13. The method of claim 8, further comprising upon determining that the application is not associated with the enrollment token, rejecting installation of the application. 14. The method of claim 8, further comprising: providing the enterprise with credentials for the mobile computing device; authenticating the mobile computing device with the enterprise based on the credentials; upon authenticating the mobile computing device, enrolling the mobile computing device with the enterprise; and upon enrolling the mobile computing device with the enterprise, receiving the enrollment token from the enterprise. 15. One or more computer storage media having computer executable instructions that cause at least one processor to perform operations comprising: enrolling a mobile computing device with an enterprise, the enrolling authorizing the enterprise to send applications to the mobile computing device; upon enrolling the mobile computing device with the enterprise, receiving an enrollment token from the enterprise; receiving an application; based at least on a determination that the application is associated with the enrollment token, determining the application is associated with the enterprise that has authorization to send applications to the mobile computing device; and upon determining the application is associated with the enterprise, installing the application. 16. The one or more computer storage media of claim 15, wherein the computer executable instructions further cause the at least one processor to perform operations comprising: receiving a request to install the application; upon receiving a request to install the application, determining that the application is provided by the enterprise; and upon determining the application is provided by the enterprise, determining that the enrollment token is associated with the application. 17. The one or more computer storage media of claim 15, wherein the enrollment token is associated with a certificate that represents certification by a third party that the enterprise is a valid entity. 18. The one or more computer storage media of claim 15, wherein the enrollment token further includes an enterprise policy, a location identifier, a device identifier, and a user identifier. 19. The one or more computer storage media of claim 15, wherein a web service provides the application to the enterprise. 20. The one or more computer storage media of claim 15, wherein the computer executable instructions further cause the at least one processor to perform operations comprising upon determining that the application is not associated with the enrollment token, rejecting installation of the application.
Embodiments of the disclosure provide application management capabilities to enterprises. A computing device of a user, associated with the enterprise, receives an enrollment token signed with a certificate. The enrollment token includes an enterprise identifier associated with the enterprise. The computing device receives a package containing one or more applications. The package also includes an enterprise identifier. Installation and execution of one or more applications from the received package is accepted or rejected based on a comparison of the enterprise identifier from the enrollment token with the enterprise identifier from the received package or application. A web service provides validation services by monitoring the installation and execution of applications on the computing devices associated with the enterprise.1. A system for managing execution of applications associated with an enterprise, said system comprising: a mobile computing device comprising: a memory; and one or more processors programmed to: enroll the mobile computing device with the enterprise, the enrolling authorizing the enterprise to send applications to the mobile computing device; upon enrolling the mobile computing device with the enterprise, receive an enrollment token from the enterprise; store the enrollment token in the memory; receive an application; based at least on a determination that the application is associated with the enrollment token, determine the application is associated with the enterprise that has authorization to send applications to the mobile computing device; and upon determining the application is associated with the enterprise, install the application. 2. The system of claim 1, wherein the one or more processors are further programmed to: receive a request to install the application; upon receiving a request to install the application, determine that the application is provided by the enterprise; and upon determining the application is provided by the enterprise, determine that the enrollment token is associated with the application. 3. The system of claim 1, wherein the enrollment token is associated with a certificate that represents certification by a third party that the enterprise is a valid entity. 4. The system of claim 1, wherein the enrollment token further includes an enterprise policy, a location identifier, a device identifier, and a user identifier. 5. The system of claim 1, wherein a web service provides the application to the enterprise. 6. The system of claim 1, wherein the processor is further programmed to upon determining that the application is not associated with the enrollment token, reject installation of the application. 7. The system of claim 1, wherein the processor is further programmed to: provide the enterprise with credentials for the mobile computing device; authenticate the mobile computing device with the enterprise based on the credentials; upon authenticating the mobile computing device, enroll the mobile computing device with the enterprise; and upon enrolling the mobile computing device with the enterprise, receive the enrollment token from the enterprise. 8. A method for managing execution of applications associated with an enterprise, the method comprising: enrolling a mobile computing device with the enterprise, the enrolling authorizing the enterprise to send applications to the mobile computing device; upon enrolling the mobile computing device with the enterprise, receiving an enrollment token from the enterprise; receiving an application; based at least on a determination that the application is associated with the enrollment token, determining the application is associated with the enterprise that has authorization to send applications to the mobile computing device; and upon determining the application is associated with the enterprise, installing the application. 9. The method of claim 8, further comprising: receiving a request to install the application; upon receiving a request to install the application, determining that the application is provided by the enterprise; and upon determining the application is provided by the enterprise, determining that the enrollment token is associated with the application. 10. The method of claim 8, wherein the enrollment token is associated with a certificate that represents certification by a third party that the enterprise is a valid entity. 11. The method of claim 8, wherein the enrollment token further includes an enterprise policy, a location identifier, a device identifier, and a user identifier. 12. The method of claim 8, wherein a web service provides the application to the enterprise. 13. The method of claim 8, further comprising upon determining that the application is not associated with the enrollment token, rejecting installation of the application. 14. The method of claim 8, further comprising: providing the enterprise with credentials for the mobile computing device; authenticating the mobile computing device with the enterprise based on the credentials; upon authenticating the mobile computing device, enrolling the mobile computing device with the enterprise; and upon enrolling the mobile computing device with the enterprise, receiving the enrollment token from the enterprise. 15. One or more computer storage media having computer executable instructions that cause at least one processor to perform operations comprising: enrolling a mobile computing device with an enterprise, the enrolling authorizing the enterprise to send applications to the mobile computing device; upon enrolling the mobile computing device with the enterprise, receiving an enrollment token from the enterprise; receiving an application; based at least on a determination that the application is associated with the enrollment token, determining the application is associated with the enterprise that has authorization to send applications to the mobile computing device; and upon determining the application is associated with the enterprise, installing the application. 16. The one or more computer storage media of claim 15, wherein the computer executable instructions further cause the at least one processor to perform operations comprising: receiving a request to install the application; upon receiving a request to install the application, determining that the application is provided by the enterprise; and upon determining the application is provided by the enterprise, determining that the enrollment token is associated with the application. 17. The one or more computer storage media of claim 15, wherein the enrollment token is associated with a certificate that represents certification by a third party that the enterprise is a valid entity. 18. The one or more computer storage media of claim 15, wherein the enrollment token further includes an enterprise policy, a location identifier, a device identifier, and a user identifier. 19. The one or more computer storage media of claim 15, wherein a web service provides the application to the enterprise. 20. The one or more computer storage media of claim 15, wherein the computer executable instructions further cause the at least one processor to perform operations comprising upon determining that the application is not associated with the enrollment token, rejecting installation of the application.
2,400
7,824
7,824
14,780,785
2,495
A secure storage for an X.509v3 digital certificate is provided ( 301, 302 ). Ports of a first and second apparatus ( 101, 102 ) are mutually authenticated ( 303 ) by using 802.1X based authentication and 802.1AR certificates. Traffic types are divided ( 304, 305 ) by an operator-configurable selector function into user plane, control plane, synchronization plane, and management plane traffic types. For Ethernet transport a virtual port is created for each traffic type, and a different MACsec secure connectivity association is created for each virtual port. For Ethernet transport an operator-programmable security policy is maintained for each traffic type. For IP transport an IPsec security association is created for each traffic type, and an operator-programmable security policy is maintained for each security association. For IP transport, TLS support may be enabled for compatibility with network management traffic. A port is repeatedly re-authenticated by an operator-definable timer value.
1.-31. (canceled) 32. A method of providing network security in a communications system, said method comprising: providing, in a first apparatus and in a second apparatus, a secure storage for an X.509v3 digital certificate; mutually authenticating ports of the first apparatus and the second apparatus by using IEEE 802.1X port based authentication and IEEE 802.1AR secure device identity certificates, wherein the amount of MAC addresses is limited to a configurable number per port in the first apparatus and the second apparatus; dividing traffic types using an operator-configurable selector function into at least one of user plane, control plane, synchronization plane, and management plane traffic types, or one or more further traffic types; wherein for Ethernet transport the method comprises creating a virtual port for each selected traffic type; creating a different MACsec secure connectivity association CA for each virtual port; maintaining an operator-programmable security policy for each of the selected traffic types; repeatedly re-authenticating a port by means of an operator-definable timer value. 33. A method of providing network security in a communications system, said method comprising: providing, in a first apparatus and in a second apparatus, a secure storage for an X.509v3 digital certificate; mutually authenticating ports of the first apparatus and the second apparatus by using IEEE 802.1X port based authentication and IEEE 802.1AR secure device identity certificates, wherein the amount of MAC addresses is limited to a configurable number per port in the first apparatus and the second apparatus; dividing traffic types using an operator-configurable selector function into at least one of user plane, control plane, synchronization plane and management plane traffic types, or one or more further traffic types; wherein for IP transport the method comprises authenticating the first and second apparatus by using an IPsec IKE protocol and a X.509v3 digital certificate; creating an IPsec security association for each selected traffic type; maintaining an operator-programmable security policy for each of the security associations; repeatedly re-authenticating a port using an operator-definable timer value; wherein, if MACsec protocol is used, the encryption layer is a MAC layer, and, if IPsec protocol is used, the encryption layer is an IP layer. 34. A method as claimed in claim 32, wherein when intermediate devices are used, trunk links between a baseband apparatus and an intermediate device as well as trunk links between the intermediate devices are mutually authenticated. 35. A method as claimed in claim 32, wherein when one or more intermediate devices are used, access point port authentication is performed by the one or more intermediate devices. 36. A method as claimed in claim 32, wherein the operator-programmable security policy includes null encryption intended for user plane. 37. A method as claimed in claim 32, further comprising, for Ethernet transport, providing if needed a secure storage for the X.509v3 digital certificate in one or more intermediate devices. 38. A method as claimed in claim 32, wherein for Ethernet transport control plane traffic is directed to the MACsec secure connectivity association CA. 39. A method as claimed in claim 33, wherein for IP transport control plane traffic is directed to the IPsec security association. 40. A method as claimed in claim 32, wherein the operator-programmable security policy includes topology information and neighborhood information of each baseband unit, intermediate device and access point involved. 41. A first apparatus, comprising: at least one processor; and at least one memory including a computer program code, wherein the at least one memory and the computer program code are configured to, with the at least one processor, cause the first apparatus to provide a secure storage for an X.509v3 digital certificate; mutually authenticate ports of the first apparatus and a second apparatus by using IEEE 802.1X port based authentication and IEEE 802.1AR secure device identity certificates, wherein the amount of MAC addresses is limited to a configurable number per port in the first apparatus and in the second apparatus; divide traffic types using an operator-configurable selector function into at least one of user plane, control plane, synchronization plane, and management plane traffic types, or one or more further traffic types; wherein, for Ethernet transport, the at least one memory and the computer program code are configured to, with the at least one processor, cause the first apparatus to create a virtual port for each selected traffic type; create a different MACsec secure connectivity association CA for each virtual port; maintain an operator-programmable security policy for each of the selected traffic types; repeatedly re-authenticate a port by means of an operator-definable timer value. 42. A first apparatus as claimed in claim 41, wherein the at least one memory and the computer program code are configured to, with the at least one processor, cause the first apparatus to, when intermediate devices are used, mutually authenticate trunk links between a baseband apparatus and an intermediate device as well as trunk links between the intermediate devices. 43. A first apparatus as claimed in claim 41, wherein the at least one memory and the computer program code are configured to, with the at least one processor, cause the first apparatus to perform, when one or more intermediate devices are used, access point port authentication by the one or more intermediate devices. 44. A first apparatus as claimed in claim 41, wherein the operator-programmable security policy includes null encryption intended for user plane. 45. A first apparatus as claimed in claim 41, wherein the at least one memory and the computer program code are configured to, with the at least one processor, cause the first apparatus to direct control plane traffic to the MACsec secure connectivity association CA. 46. A second apparatus, comprising: at least one processor; and at least one memory including a computer program code, wherein the at least one memory and the computer program code are configured to, with the at least one processor, cause the second apparatus to provide, in a first apparatus and in the second apparatus, a secure storage for an X.509v3 digital certificate; mutually authenticate ports of the first apparatus and the second apparatus by using IEEE 802.1X port based authentication and IEEE 802.1AR secure device identity certificates, wherein the amount of MAC addresses is limited to a configurable number per port in the first apparatus and the second apparatus; divide traffic types using an operator-configurable selector function into at least one of user plane, control plane, synchronization plane, and management plane traffic types, or one or more further traffic types; wherein for IP transport the at least one memory and the computer program code are configured to, with the at least one processor, cause the second apparatus (102, 101) to authenticate the first and second apparatus by using an IPsec IKE protocol and a X.509v3 digital certificate; create an IPsec security association for each selected traffic type; maintain an operator-programmable security policy for each of the security associations; repeatedly re-authenticate a port by means of an operator-definable timer value; wherein, if MACsec protocol is used, the encryption layer is a MAC layer, and, if IPsec protocol is used, the encryption layer is an IP layer. 47. A second apparatus as claimed in claim 46, wherein the at least one memory and the computer program code are configured to, with the at least one processor, cause the second apparatus to mutually authenticate, when intermediate devices are used, trunk links between a baseband apparatus and an intermediate device as well as trunk links between the intermediate devices. 48. A second apparatus as claimed in claim 46, wherein the at least one memory and the computer program code are configured to, with the at least one processor, cause the second apparatus to direct control plane traffic to the IPsec security association. 49. A second apparatus as claimed in claim 46, wherein the at least one memory and the computer program code are configured to, with the at least one processor, cause the second apparatus to enable TLS support for compatibility with one or more of user traffic, control traffic, synchronization traffic, and network management traffic, including authentication of a TLS peer by using the X.509v3 digital certificate. 50. An apparatus as claimed in claim 46, wherein the at least one memory and the computer program code are configured to, with the at least one processor, cause the apparatus to use Ethernet framing without CPRI/OBSAI, by mapping user, control, synchronization, and/or management plane traffic directly into Ethernet frames. 51. An apparatus as claimed in claim 46, wherein the at least one memory and the computer program code are configured to, with the at least one processor, cause the apparatus to use IPsec without CPRI/OBSAI, by mapping user, control, synchronization, and/or management plane traffic directly into IP packets.
A secure storage for an X.509v3 digital certificate is provided ( 301, 302 ). Ports of a first and second apparatus ( 101, 102 ) are mutually authenticated ( 303 ) by using 802.1X based authentication and 802.1AR certificates. Traffic types are divided ( 304, 305 ) by an operator-configurable selector function into user plane, control plane, synchronization plane, and management plane traffic types. For Ethernet transport a virtual port is created for each traffic type, and a different MACsec secure connectivity association is created for each virtual port. For Ethernet transport an operator-programmable security policy is maintained for each traffic type. For IP transport an IPsec security association is created for each traffic type, and an operator-programmable security policy is maintained for each security association. For IP transport, TLS support may be enabled for compatibility with network management traffic. A port is repeatedly re-authenticated by an operator-definable timer value.1.-31. (canceled) 32. A method of providing network security in a communications system, said method comprising: providing, in a first apparatus and in a second apparatus, a secure storage for an X.509v3 digital certificate; mutually authenticating ports of the first apparatus and the second apparatus by using IEEE 802.1X port based authentication and IEEE 802.1AR secure device identity certificates, wherein the amount of MAC addresses is limited to a configurable number per port in the first apparatus and the second apparatus; dividing traffic types using an operator-configurable selector function into at least one of user plane, control plane, synchronization plane, and management plane traffic types, or one or more further traffic types; wherein for Ethernet transport the method comprises creating a virtual port for each selected traffic type; creating a different MACsec secure connectivity association CA for each virtual port; maintaining an operator-programmable security policy for each of the selected traffic types; repeatedly re-authenticating a port by means of an operator-definable timer value. 33. A method of providing network security in a communications system, said method comprising: providing, in a first apparatus and in a second apparatus, a secure storage for an X.509v3 digital certificate; mutually authenticating ports of the first apparatus and the second apparatus by using IEEE 802.1X port based authentication and IEEE 802.1AR secure device identity certificates, wherein the amount of MAC addresses is limited to a configurable number per port in the first apparatus and the second apparatus; dividing traffic types using an operator-configurable selector function into at least one of user plane, control plane, synchronization plane and management plane traffic types, or one or more further traffic types; wherein for IP transport the method comprises authenticating the first and second apparatus by using an IPsec IKE protocol and a X.509v3 digital certificate; creating an IPsec security association for each selected traffic type; maintaining an operator-programmable security policy for each of the security associations; repeatedly re-authenticating a port using an operator-definable timer value; wherein, if MACsec protocol is used, the encryption layer is a MAC layer, and, if IPsec protocol is used, the encryption layer is an IP layer. 34. A method as claimed in claim 32, wherein when intermediate devices are used, trunk links between a baseband apparatus and an intermediate device as well as trunk links between the intermediate devices are mutually authenticated. 35. A method as claimed in claim 32, wherein when one or more intermediate devices are used, access point port authentication is performed by the one or more intermediate devices. 36. A method as claimed in claim 32, wherein the operator-programmable security policy includes null encryption intended for user plane. 37. A method as claimed in claim 32, further comprising, for Ethernet transport, providing if needed a secure storage for the X.509v3 digital certificate in one or more intermediate devices. 38. A method as claimed in claim 32, wherein for Ethernet transport control plane traffic is directed to the MACsec secure connectivity association CA. 39. A method as claimed in claim 33, wherein for IP transport control plane traffic is directed to the IPsec security association. 40. A method as claimed in claim 32, wherein the operator-programmable security policy includes topology information and neighborhood information of each baseband unit, intermediate device and access point involved. 41. A first apparatus, comprising: at least one processor; and at least one memory including a computer program code, wherein the at least one memory and the computer program code are configured to, with the at least one processor, cause the first apparatus to provide a secure storage for an X.509v3 digital certificate; mutually authenticate ports of the first apparatus and a second apparatus by using IEEE 802.1X port based authentication and IEEE 802.1AR secure device identity certificates, wherein the amount of MAC addresses is limited to a configurable number per port in the first apparatus and in the second apparatus; divide traffic types using an operator-configurable selector function into at least one of user plane, control plane, synchronization plane, and management plane traffic types, or one or more further traffic types; wherein, for Ethernet transport, the at least one memory and the computer program code are configured to, with the at least one processor, cause the first apparatus to create a virtual port for each selected traffic type; create a different MACsec secure connectivity association CA for each virtual port; maintain an operator-programmable security policy for each of the selected traffic types; repeatedly re-authenticate a port by means of an operator-definable timer value. 42. A first apparatus as claimed in claim 41, wherein the at least one memory and the computer program code are configured to, with the at least one processor, cause the first apparatus to, when intermediate devices are used, mutually authenticate trunk links between a baseband apparatus and an intermediate device as well as trunk links between the intermediate devices. 43. A first apparatus as claimed in claim 41, wherein the at least one memory and the computer program code are configured to, with the at least one processor, cause the first apparatus to perform, when one or more intermediate devices are used, access point port authentication by the one or more intermediate devices. 44. A first apparatus as claimed in claim 41, wherein the operator-programmable security policy includes null encryption intended for user plane. 45. A first apparatus as claimed in claim 41, wherein the at least one memory and the computer program code are configured to, with the at least one processor, cause the first apparatus to direct control plane traffic to the MACsec secure connectivity association CA. 46. A second apparatus, comprising: at least one processor; and at least one memory including a computer program code, wherein the at least one memory and the computer program code are configured to, with the at least one processor, cause the second apparatus to provide, in a first apparatus and in the second apparatus, a secure storage for an X.509v3 digital certificate; mutually authenticate ports of the first apparatus and the second apparatus by using IEEE 802.1X port based authentication and IEEE 802.1AR secure device identity certificates, wherein the amount of MAC addresses is limited to a configurable number per port in the first apparatus and the second apparatus; divide traffic types using an operator-configurable selector function into at least one of user plane, control plane, synchronization plane, and management plane traffic types, or one or more further traffic types; wherein for IP transport the at least one memory and the computer program code are configured to, with the at least one processor, cause the second apparatus (102, 101) to authenticate the first and second apparatus by using an IPsec IKE protocol and a X.509v3 digital certificate; create an IPsec security association for each selected traffic type; maintain an operator-programmable security policy for each of the security associations; repeatedly re-authenticate a port by means of an operator-definable timer value; wherein, if MACsec protocol is used, the encryption layer is a MAC layer, and, if IPsec protocol is used, the encryption layer is an IP layer. 47. A second apparatus as claimed in claim 46, wherein the at least one memory and the computer program code are configured to, with the at least one processor, cause the second apparatus to mutually authenticate, when intermediate devices are used, trunk links between a baseband apparatus and an intermediate device as well as trunk links between the intermediate devices. 48. A second apparatus as claimed in claim 46, wherein the at least one memory and the computer program code are configured to, with the at least one processor, cause the second apparatus to direct control plane traffic to the IPsec security association. 49. A second apparatus as claimed in claim 46, wherein the at least one memory and the computer program code are configured to, with the at least one processor, cause the second apparatus to enable TLS support for compatibility with one or more of user traffic, control traffic, synchronization traffic, and network management traffic, including authentication of a TLS peer by using the X.509v3 digital certificate. 50. An apparatus as claimed in claim 46, wherein the at least one memory and the computer program code are configured to, with the at least one processor, cause the apparatus to use Ethernet framing without CPRI/OBSAI, by mapping user, control, synchronization, and/or management plane traffic directly into Ethernet frames. 51. An apparatus as claimed in claim 46, wherein the at least one memory and the computer program code are configured to, with the at least one processor, cause the apparatus to use IPsec without CPRI/OBSAI, by mapping user, control, synchronization, and/or management plane traffic directly into IP packets.
2,400
7,825
7,825
14,550,881
2,434
In a computer system operable at more than one privilege level, an interrupt security module handles interrupts without exposing a secret value of a register to virtual interrupt handling code that executes at a lower privilege level than the interrupt security module. The interrupt security module is configured to intercept interrupts generated while executing code at lower privilege levels. Upon receiving such an interrupt, the interrupt security module overwrites the secret value of the register with an unrelated constant. Subsequently, the interrupt security module generates a virtual interrupt corresponding to the interrupt and forwards the virtual interrupt to the virtual interrupt handling code. Advantageously, although the virtual interrupt handling code is able to determine the value of the register and consequently the unrelated constant, the virtual interrupt handling code is unable to determine the secret value.
1. A method of securing values of registers in a computer system operable in a plurality of privilege levels, wherein the method executes at a first privilege level and comprising: intercepting a first interrupt or exception that is triggered during execution of an operating system at a second privilege level that is less secure than the first privilege level; in response thereto, overwriting the value of a register with an erasure constant; and forwarding the first interrupt or exception to the operation system. 2. The method of claim 1, wherein the register is included in a subset of the registers in the computer system and further comprising setting the values of the remaining registers included in the subset to the erasure constant while retaining the values of the registers that are not included in the subset. 3. The method of claim 1, wherein the first interrupt or exception is triggered while the operating system is executing an application at a third privilege level that is not greater than the second privilege level. 4. The method of claim 3, wherein the application interprets the erasure constant as a trigger to re-execute one or more instructions included in the application. 5. The method of claim 4, wherein the one or more instructions compare the value of the register to the erasure constant. 6. The method of claim 1, further comprising: intercepting a second interrupt; determining that the second interrupt is disabled; identifying an instruction that is affected by the second interrupt; and causing the instruction that is affected by the second interrupt to execute at the first privilege level without forwarding the second interrupt. 7. A computer system operable in a plurality of privilege levels, comprising a processor that is programmed with an operating system that executes at a first privilege level, and a security module that operates at a second privilege level that is more secure than the first privilege level and executes a method of securing values of registers in the computer system that includes the steps of: intercepting a first interrupt or exception that is triggered during execution of an operating system at a second privilege level that is less secure than the first privilege level; in response thereto, overwriting the value of a register with an erasure constant; and forwarding the first interrupt or exception to the operating system. 8. The computer system of claim 7, wherein the register is included in a subset of the registers in the computer system and further comprising setting the values of the remaining registers included in the subset to the erasure constant while retaining the values of the registers that are not included in the subset. 9. The computer system of claim 7, wherein the first interrupt or exception is triggered while the operating system is executing an application at a third privilege level that is not greater than the second privilege level. 10. The computer system of claim 9, wherein the application interprets the erasure constant as a trigger to re-execute one or more instructions included in the application. 11. The computer system of claim 10, wherein the one or more instructions compare the value of the register to the erasure constant. 12. The computer system of claim 7, wherein the method further includes the steps of: intercepting a second interrupt; determining that the second interrupt is disabled; identifying an instruction that is affected by the second interrupt; and causing the instruction that is affected by the second interrupt to execute at the first privilege level without forwarding the second interrupt. 13. A non-transitory computer-readable storage medium comprising instructions, which when executed at a first privilege level in a computer system operable in a plurality of privilege levels, causes the computer system to carry out the steps of: intercepting a first interrupt or exception that is triggered during execution of an operating system at a second privilege level that is less secure than the first privilege level; in response thereto, overwriting the value of a register with an erasure constant; and forwarding the first interrupt or exception to the operating system. 14. The non-transitory computer-readable storage medium of claim 13, wherein the register is included in a subset of the registers in the computer system and further comprising setting the values of the remaining registers included in the subset to the erasure constant while retaining the values of the registers that are not included in the subset. 15. The non-transitory computer-readable storage medium of claim 13, wherein the first interrupt or exception is triggered while the operating system is executing an application at a third privilege level that is not greater than the second privilege level. 16. The non-transitory computer-readable storage medium of claim 15, wherein the application interprets the erasure constant as a trigger to re-execute one or more instructions included in the application. 17. The non-transitory computer-readable storage medium of claim 16, wherein the one or more instructions compare the value of the register to the erasure constant. 18. The non-transitory computer-readable storage medium of claim 13, wherein the steps further comprise: intercepting a second interrupt; determining that the second interrupt is disabled; identifying an instruction that is affected by the second interrupt; and causing the instruction that is affected by the second interrupt to execute at the first privilege level without forwarding the second interrupt.
In a computer system operable at more than one privilege level, an interrupt security module handles interrupts without exposing a secret value of a register to virtual interrupt handling code that executes at a lower privilege level than the interrupt security module. The interrupt security module is configured to intercept interrupts generated while executing code at lower privilege levels. Upon receiving such an interrupt, the interrupt security module overwrites the secret value of the register with an unrelated constant. Subsequently, the interrupt security module generates a virtual interrupt corresponding to the interrupt and forwards the virtual interrupt to the virtual interrupt handling code. Advantageously, although the virtual interrupt handling code is able to determine the value of the register and consequently the unrelated constant, the virtual interrupt handling code is unable to determine the secret value.1. A method of securing values of registers in a computer system operable in a plurality of privilege levels, wherein the method executes at a first privilege level and comprising: intercepting a first interrupt or exception that is triggered during execution of an operating system at a second privilege level that is less secure than the first privilege level; in response thereto, overwriting the value of a register with an erasure constant; and forwarding the first interrupt or exception to the operation system. 2. The method of claim 1, wherein the register is included in a subset of the registers in the computer system and further comprising setting the values of the remaining registers included in the subset to the erasure constant while retaining the values of the registers that are not included in the subset. 3. The method of claim 1, wherein the first interrupt or exception is triggered while the operating system is executing an application at a third privilege level that is not greater than the second privilege level. 4. The method of claim 3, wherein the application interprets the erasure constant as a trigger to re-execute one or more instructions included in the application. 5. The method of claim 4, wherein the one or more instructions compare the value of the register to the erasure constant. 6. The method of claim 1, further comprising: intercepting a second interrupt; determining that the second interrupt is disabled; identifying an instruction that is affected by the second interrupt; and causing the instruction that is affected by the second interrupt to execute at the first privilege level without forwarding the second interrupt. 7. A computer system operable in a plurality of privilege levels, comprising a processor that is programmed with an operating system that executes at a first privilege level, and a security module that operates at a second privilege level that is more secure than the first privilege level and executes a method of securing values of registers in the computer system that includes the steps of: intercepting a first interrupt or exception that is triggered during execution of an operating system at a second privilege level that is less secure than the first privilege level; in response thereto, overwriting the value of a register with an erasure constant; and forwarding the first interrupt or exception to the operating system. 8. The computer system of claim 7, wherein the register is included in a subset of the registers in the computer system and further comprising setting the values of the remaining registers included in the subset to the erasure constant while retaining the values of the registers that are not included in the subset. 9. The computer system of claim 7, wherein the first interrupt or exception is triggered while the operating system is executing an application at a third privilege level that is not greater than the second privilege level. 10. The computer system of claim 9, wherein the application interprets the erasure constant as a trigger to re-execute one or more instructions included in the application. 11. The computer system of claim 10, wherein the one or more instructions compare the value of the register to the erasure constant. 12. The computer system of claim 7, wherein the method further includes the steps of: intercepting a second interrupt; determining that the second interrupt is disabled; identifying an instruction that is affected by the second interrupt; and causing the instruction that is affected by the second interrupt to execute at the first privilege level without forwarding the second interrupt. 13. A non-transitory computer-readable storage medium comprising instructions, which when executed at a first privilege level in a computer system operable in a plurality of privilege levels, causes the computer system to carry out the steps of: intercepting a first interrupt or exception that is triggered during execution of an operating system at a second privilege level that is less secure than the first privilege level; in response thereto, overwriting the value of a register with an erasure constant; and forwarding the first interrupt or exception to the operating system. 14. The non-transitory computer-readable storage medium of claim 13, wherein the register is included in a subset of the registers in the computer system and further comprising setting the values of the remaining registers included in the subset to the erasure constant while retaining the values of the registers that are not included in the subset. 15. The non-transitory computer-readable storage medium of claim 13, wherein the first interrupt or exception is triggered while the operating system is executing an application at a third privilege level that is not greater than the second privilege level. 16. The non-transitory computer-readable storage medium of claim 15, wherein the application interprets the erasure constant as a trigger to re-execute one or more instructions included in the application. 17. The non-transitory computer-readable storage medium of claim 16, wherein the one or more instructions compare the value of the register to the erasure constant. 18. The non-transitory computer-readable storage medium of claim 13, wherein the steps further comprise: intercepting a second interrupt; determining that the second interrupt is disabled; identifying an instruction that is affected by the second interrupt; and causing the instruction that is affected by the second interrupt to execute at the first privilege level without forwarding the second interrupt.
2,400
7,826
7,826
14,458,139
2,465
Methods and apparatus for efficiently servicing isochronous streams (such as media data streams) associated with a network. In one embodiment, an Isochronous Cycle Manager (ICM), receives multiple independent streams of packets that include isochronous packets arriving according to different time bases (e.g., where each stream has a different time base). The packets are sorted by the ICM into a buffering mechanism according to their required presentation time. Additionally the ICM calculates a launch time for each packet. The NIC transmits the packets from the queue according to an access scheme, such as a time division multiplexed (TDM) scheme where each of a plurality of cycles is subdivided into time slots. During appropriate time slots, the NIC transmits the packets in chronological order, as read out of the buffering mechanism.
1. A method of managing a plurality of isochronous processes, the method comprising: receiving, at a network element, isochronous data streams representing different sets of content, each data stream comprising a plurality of data packets and containing data representing presentation times of portions of the content; multiplexing the packets of the multiple data streams to produce a composite data stream, including sorting the data packets according to their presentation times; calculating launch times for the packets of the composite data stream based on a difference between a time reference generated by the network element and the respective presentation times associated with the packets; and transmitting the data packets of the composite data stream according to their respective launch times. 2. The method of claim 1, additionally comprising: receiving asynchronous data packets; and transmitting the asynchronous data packets. 3. The method of claim 2, additionally comprising sorting the asynchronous data packets with the isochronous data packets. 4. The method of claim 2, wherein a first portion of transmission bandwidth is reserved for isochronous data packets, and a second portion of transmission bandwidth is reserved for asynchronous data packets. 5. The method of claim 1, wherein the act of sorting comprises storing the isochronous data packets in a ring buffer according to the presentation time. 6. The method of claim 1, wherein at least one of the multiple isochronous data streams comprises video data. 7. The method of claim 6, wherein at least one of the multiple isochronous data streams comprises audio data. 8. The method of claim 1, wherein at least one of the multiple isochronous data streams has a time base that differs from a master time base. 9. The method of claim 8, wherein the act of calculating comprises adjusting the launch time of the isochronous data packets according to the master time base. 10. The method of claim 1, further comprising: determining whether asynchronous data packets may be transmitted between isochronous data packets of the composite data stream while maintaining transmissions at the calculated launch times. 11. The method of claim 1, wherein the launch times are based on the respective time bases of the isochronous data streams. 12. The method of claim 1, wherein only a subset of the packets have a presentation time associated therewith. 13. The method of claim 1, wherein at least one of the isochronous data streams comprises both video and audio data. 14. The method of claim 1, wherein the at least one packet comprises one or more subpackets of data. 15. A network interface apparatus, comprising: a data interface configured to receive a plurality of isochronous data streams representing different sets of content, each data stream comprising a plurality of data packets and containing data representing presentation times of portions of the content; a network interface clock, the network interface clock configured to generate a designated time reference; and at least one controller configured to: extract one or more data packets from the plurality of isochronous data streams; multiplex the packets of the data streams to produce a composite data stream, and sort the data packets based on their presentation times; calculate launch times for the data packets of the composite data stream, wherein the launch times are based on a difference between the time reference generated by the network interface apparatus and the respective presentation times associated with the packets; and transmit data packets of the composite data stream according to their respective launch times. 16. The network interface apparatus of claim 15, additionally comprising assigning the sorted one or more data packets to a slot of data. 17. The network interface apparatus of claim 15, wherein the at least one packet comprises an isochronous data packet. 18. The network interface apparatus of claim 15, wherein: the data interface is further configured to receiving asynchronous data packets; and the controller is configured to calculate a launch time for the asynchronous data packets. 19. The network interface apparatus of claim 15, wherein only a subset of the packets have a presentation time associated therewith. 20. The network interface apparatus of claim 15, wherein at least one of the isochronous data streams comprises both video and audio data. 21. The network interface apparatus of claim 15, wherein the at least one packet comprises video data. 22. The network interface apparatus of claim 15, wherein the at least one packet comprises audio data. 23. The network interface apparatus of claim 15, wherein the at least one packet comprises one or more subpackets of data. 24. The network interface apparatus of claim 15, wherein: the data interface is further configured to receive asynchronous data packets; and the controller is further configured to transmit the asynchronous data packets. 25. The network interface apparatus of claim 24, wherein the controller is further configured sort the asynchronous data packets with the isochronous data packets. 26. The network interface apparatus of claim 24, wherein a first portion of transmission bandwidth is reserved for isochronous data packets, and a second portion of transmission bandwidth is reserved for asynchronous data packets. 27. The network interface apparatus of claim 15, further comprising a ring buffer and wherein the processor sorting the one or more data packets comprises storing the isochronous data packets in the ring buffer according to the presentation time.
Methods and apparatus for efficiently servicing isochronous streams (such as media data streams) associated with a network. In one embodiment, an Isochronous Cycle Manager (ICM), receives multiple independent streams of packets that include isochronous packets arriving according to different time bases (e.g., where each stream has a different time base). The packets are sorted by the ICM into a buffering mechanism according to their required presentation time. Additionally the ICM calculates a launch time for each packet. The NIC transmits the packets from the queue according to an access scheme, such as a time division multiplexed (TDM) scheme where each of a plurality of cycles is subdivided into time slots. During appropriate time slots, the NIC transmits the packets in chronological order, as read out of the buffering mechanism.1. A method of managing a plurality of isochronous processes, the method comprising: receiving, at a network element, isochronous data streams representing different sets of content, each data stream comprising a plurality of data packets and containing data representing presentation times of portions of the content; multiplexing the packets of the multiple data streams to produce a composite data stream, including sorting the data packets according to their presentation times; calculating launch times for the packets of the composite data stream based on a difference between a time reference generated by the network element and the respective presentation times associated with the packets; and transmitting the data packets of the composite data stream according to their respective launch times. 2. The method of claim 1, additionally comprising: receiving asynchronous data packets; and transmitting the asynchronous data packets. 3. The method of claim 2, additionally comprising sorting the asynchronous data packets with the isochronous data packets. 4. The method of claim 2, wherein a first portion of transmission bandwidth is reserved for isochronous data packets, and a second portion of transmission bandwidth is reserved for asynchronous data packets. 5. The method of claim 1, wherein the act of sorting comprises storing the isochronous data packets in a ring buffer according to the presentation time. 6. The method of claim 1, wherein at least one of the multiple isochronous data streams comprises video data. 7. The method of claim 6, wherein at least one of the multiple isochronous data streams comprises audio data. 8. The method of claim 1, wherein at least one of the multiple isochronous data streams has a time base that differs from a master time base. 9. The method of claim 8, wherein the act of calculating comprises adjusting the launch time of the isochronous data packets according to the master time base. 10. The method of claim 1, further comprising: determining whether asynchronous data packets may be transmitted between isochronous data packets of the composite data stream while maintaining transmissions at the calculated launch times. 11. The method of claim 1, wherein the launch times are based on the respective time bases of the isochronous data streams. 12. The method of claim 1, wherein only a subset of the packets have a presentation time associated therewith. 13. The method of claim 1, wherein at least one of the isochronous data streams comprises both video and audio data. 14. The method of claim 1, wherein the at least one packet comprises one or more subpackets of data. 15. A network interface apparatus, comprising: a data interface configured to receive a plurality of isochronous data streams representing different sets of content, each data stream comprising a plurality of data packets and containing data representing presentation times of portions of the content; a network interface clock, the network interface clock configured to generate a designated time reference; and at least one controller configured to: extract one or more data packets from the plurality of isochronous data streams; multiplex the packets of the data streams to produce a composite data stream, and sort the data packets based on their presentation times; calculate launch times for the data packets of the composite data stream, wherein the launch times are based on a difference between the time reference generated by the network interface apparatus and the respective presentation times associated with the packets; and transmit data packets of the composite data stream according to their respective launch times. 16. The network interface apparatus of claim 15, additionally comprising assigning the sorted one or more data packets to a slot of data. 17. The network interface apparatus of claim 15, wherein the at least one packet comprises an isochronous data packet. 18. The network interface apparatus of claim 15, wherein: the data interface is further configured to receiving asynchronous data packets; and the controller is configured to calculate a launch time for the asynchronous data packets. 19. The network interface apparatus of claim 15, wherein only a subset of the packets have a presentation time associated therewith. 20. The network interface apparatus of claim 15, wherein at least one of the isochronous data streams comprises both video and audio data. 21. The network interface apparatus of claim 15, wherein the at least one packet comprises video data. 22. The network interface apparatus of claim 15, wherein the at least one packet comprises audio data. 23. The network interface apparatus of claim 15, wherein the at least one packet comprises one or more subpackets of data. 24. The network interface apparatus of claim 15, wherein: the data interface is further configured to receive asynchronous data packets; and the controller is further configured to transmit the asynchronous data packets. 25. The network interface apparatus of claim 24, wherein the controller is further configured sort the asynchronous data packets with the isochronous data packets. 26. The network interface apparatus of claim 24, wherein a first portion of transmission bandwidth is reserved for isochronous data packets, and a second portion of transmission bandwidth is reserved for asynchronous data packets. 27. The network interface apparatus of claim 15, further comprising a ring buffer and wherein the processor sorting the one or more data packets comprises storing the isochronous data packets in the ring buffer according to the presentation time.
2,400
7,827
7,827
15,254,797
2,463
A base station provides, a first number of probe packets to an access point for transmission to a user equipment over an access network path. The base station receives information indicating a bandwidth of the access network path estimated by the user equipment. The base station determines which of the base station or the access point to use for communication with the user equipment based on the bandwidth. The user equipment receives a second number of packets over an air interface and determines inter-arrival packet delays for the second number of probe packets. The user equipment estimates the bandwidth of the air interface based on the inter-arrival packet delays, the first number, and a time interval for transmission of the first number of probe packets. The user equipment transmits information indicating the bandwidth.
1. A method comprising: providing, from a base station, probe packets to an access point for transmission from the access point to a user equipment over an access network path; receiving, at the base station, information indicating a bandwidth over the access network path estimated by the user equipment based on delays between packets received by the user equipment from the access point over the access network path, wherein the packets are generated by the access point using the probe packets; and determining which of the base station or the access point to use for communication with the user equipment based on the bandwidth. 2. The method of claim 1, further comprising: providing, from the base station, information indicating at least one of a sequence number associated with the probe packets, a number of probe packets, a probe interval during which the probe packets are transmitted, and sequence numbers associated with each of the probe packets. 3. The method of claim 1, wherein determining which of the base station or the access point to use for communication comprises determining which of the base station or the access point to use for communication based on a comparison of the bandwidth to a threshold value. 4. The method of claim 3, wherein determining which of the base station or the access point to use for communication comprises: selecting the access point for communication with the user equipment via the access network path in response to the bandwidth being greater than or equal to the threshold value; and selecting the base station for communication with the user equipment in response to the bandwidth being less than the threshold value. 5. A method comprising: receiving, at a user equipment, a first number of packets over an air interface; determining, at the user equipment, inter-arrival packet delays for the first number of packets; estimating, at the user equipment, a bandwidth of the air interface based on the inter-arrival packet delays, a second number of probe packets used to generate the first number of packets, and a time interval for transmission of the second number of probe packets; and transmitting, from the user equipment, information indicating the bandwidth. 6. The method of claim 5, wherein receiving the first number of packets comprises receiving the first number of packets from an access point that generates the first number of packets based on the second number of probe packets generated by a base station. 7. The method of claim 6, further comprising: switching from the access point to the base station for communication with the user equipment in response to the bandwidth being less than a threshold value. 8. The method of claim 5, wherein estimating the bandwidth comprises identifying a first subset of the first number of packets as aggregate packets including more than one probe packet and a second subset of the first number of packets as packets that include only one probe packet. 9. The method of claim 8, wherein estimating the bandwidth comprises determining a fraction of time in which the second subset is received by the user equipment and determining an average of the inter-arrival packet delays between the aggregate packets in the first subset. 10. The method of claim 9, wherein estimating the bandwidth comprises estimating the bandwidth based on the fractional time interval, the average delay interval, and a modulation and coding scheme for downlink transmission over the air interface. 11. A base station comprising: a transceiver to provide a first number of probe packets to an access point for transmission from the access point to a user equipment over an air interface and receive information indicating a bandwidth over the air interface estimated by the user equipment based on a second number of packets generated by the access point using the first number of probe packets; and a processor to determine which of the base station or the access point to use for communication with the user equipment based on the bandwidth. 12. The base station of claim 11, wherein the transceiver is to provide information indicating at least one of a sequence number associated with the first number of probe packets, the first number, a probe interval during which the first number of probe packets are transmitted, and sequence numbers associated with each probe packet in the first number of the probe packets. 13. The base station of claim 11, wherein the processor is to determine whether to use the base station or the access point by comparing the bandwidth to a threshold value. 14. The base station of claim 13, wherein the processor is to select the access point for communication with the user equipment over the air interface in response to the bandwidth being greater than or equal to the threshold value, and wherein the processor is to select the base station for communication with the user equipment in response to the bandwidth being less than the threshold value. 15. A user equipment comprising: a transceiver to receive a first number of packets over an air interface; and a processor to determine inter-arrival packet delays for the first number of probe packets and estimate a bandwidth over the air interface based on the inter-arrival packet delays, a second number of probe packets used to generate the first number of packets, and a time interval for transmission of the second number of probe packets, and wherein the transceiver is to transmit information indicating the bandwidth. 16. The user equipment of claim 15, wherein the transceiver is to receive the first number of packets from an access point that generates the first number of packets based on the second number of probe packets generated by a base station. 17. The user equipment of claim 16, wherein the transceiver is to switch from the access point to the base station for communication with the user equipment in the unlicensed frequency band in response to the bandwidth being less than a threshold value. 18. The user equipment of claim 15, wherein the processor is to identify a first subset of the first number of packets as aggregate packets including more than one probe packet and a second subset of the first number of packets as packets that include only one probe packet. 19. The user equipment of claim 18, wherein the processor is to determine a fractional time interval in which the second subset is received by the user equipment, and wherein the processor is to determine an average delay interval between the aggregate packets in the first subset. 20. The user equipment of claim 19, wherein the processor is to estimate the bandwidth based on the fractional time interval, the average delay interval, and a modulation and coding scheme for downlink transmission in the unlicensed frequency band.
A base station provides, a first number of probe packets to an access point for transmission to a user equipment over an access network path. The base station receives information indicating a bandwidth of the access network path estimated by the user equipment. The base station determines which of the base station or the access point to use for communication with the user equipment based on the bandwidth. The user equipment receives a second number of packets over an air interface and determines inter-arrival packet delays for the second number of probe packets. The user equipment estimates the bandwidth of the air interface based on the inter-arrival packet delays, the first number, and a time interval for transmission of the first number of probe packets. The user equipment transmits information indicating the bandwidth.1. A method comprising: providing, from a base station, probe packets to an access point for transmission from the access point to a user equipment over an access network path; receiving, at the base station, information indicating a bandwidth over the access network path estimated by the user equipment based on delays between packets received by the user equipment from the access point over the access network path, wherein the packets are generated by the access point using the probe packets; and determining which of the base station or the access point to use for communication with the user equipment based on the bandwidth. 2. The method of claim 1, further comprising: providing, from the base station, information indicating at least one of a sequence number associated with the probe packets, a number of probe packets, a probe interval during which the probe packets are transmitted, and sequence numbers associated with each of the probe packets. 3. The method of claim 1, wherein determining which of the base station or the access point to use for communication comprises determining which of the base station or the access point to use for communication based on a comparison of the bandwidth to a threshold value. 4. The method of claim 3, wherein determining which of the base station or the access point to use for communication comprises: selecting the access point for communication with the user equipment via the access network path in response to the bandwidth being greater than or equal to the threshold value; and selecting the base station for communication with the user equipment in response to the bandwidth being less than the threshold value. 5. A method comprising: receiving, at a user equipment, a first number of packets over an air interface; determining, at the user equipment, inter-arrival packet delays for the first number of packets; estimating, at the user equipment, a bandwidth of the air interface based on the inter-arrival packet delays, a second number of probe packets used to generate the first number of packets, and a time interval for transmission of the second number of probe packets; and transmitting, from the user equipment, information indicating the bandwidth. 6. The method of claim 5, wherein receiving the first number of packets comprises receiving the first number of packets from an access point that generates the first number of packets based on the second number of probe packets generated by a base station. 7. The method of claim 6, further comprising: switching from the access point to the base station for communication with the user equipment in response to the bandwidth being less than a threshold value. 8. The method of claim 5, wherein estimating the bandwidth comprises identifying a first subset of the first number of packets as aggregate packets including more than one probe packet and a second subset of the first number of packets as packets that include only one probe packet. 9. The method of claim 8, wherein estimating the bandwidth comprises determining a fraction of time in which the second subset is received by the user equipment and determining an average of the inter-arrival packet delays between the aggregate packets in the first subset. 10. The method of claim 9, wherein estimating the bandwidth comprises estimating the bandwidth based on the fractional time interval, the average delay interval, and a modulation and coding scheme for downlink transmission over the air interface. 11. A base station comprising: a transceiver to provide a first number of probe packets to an access point for transmission from the access point to a user equipment over an air interface and receive information indicating a bandwidth over the air interface estimated by the user equipment based on a second number of packets generated by the access point using the first number of probe packets; and a processor to determine which of the base station or the access point to use for communication with the user equipment based on the bandwidth. 12. The base station of claim 11, wherein the transceiver is to provide information indicating at least one of a sequence number associated with the first number of probe packets, the first number, a probe interval during which the first number of probe packets are transmitted, and sequence numbers associated with each probe packet in the first number of the probe packets. 13. The base station of claim 11, wherein the processor is to determine whether to use the base station or the access point by comparing the bandwidth to a threshold value. 14. The base station of claim 13, wherein the processor is to select the access point for communication with the user equipment over the air interface in response to the bandwidth being greater than or equal to the threshold value, and wherein the processor is to select the base station for communication with the user equipment in response to the bandwidth being less than the threshold value. 15. A user equipment comprising: a transceiver to receive a first number of packets over an air interface; and a processor to determine inter-arrival packet delays for the first number of probe packets and estimate a bandwidth over the air interface based on the inter-arrival packet delays, a second number of probe packets used to generate the first number of packets, and a time interval for transmission of the second number of probe packets, and wherein the transceiver is to transmit information indicating the bandwidth. 16. The user equipment of claim 15, wherein the transceiver is to receive the first number of packets from an access point that generates the first number of packets based on the second number of probe packets generated by a base station. 17. The user equipment of claim 16, wherein the transceiver is to switch from the access point to the base station for communication with the user equipment in the unlicensed frequency band in response to the bandwidth being less than a threshold value. 18. The user equipment of claim 15, wherein the processor is to identify a first subset of the first number of packets as aggregate packets including more than one probe packet and a second subset of the first number of packets as packets that include only one probe packet. 19. The user equipment of claim 18, wherein the processor is to determine a fractional time interval in which the second subset is received by the user equipment, and wherein the processor is to determine an average delay interval between the aggregate packets in the first subset. 20. The user equipment of claim 19, wherein the processor is to estimate the bandwidth based on the fractional time interval, the average delay interval, and a modulation and coding scheme for downlink transmission in the unlicensed frequency band.
2,400
7,828
7,828
14,882,819
2,434
A method and apparatus for facilitating communication between a client and a proxy server. A message is received from a client at a gateway. The message includes a uniform resource identifier that references an interface associated with a resource. The gateway transforms the uniform resource identifier into a context resource identifier that also references the interface. The gateway performs an initial authorization check for the client and a user of the client with respect to the interface. The gateway inserts the context resource identifier into the message to form a modified message in response to a successful initial authorization check. The gateway sends the modified message to the proxy server.
1. A method for facilitating communication between a client and a proxy server, the method comprising: receiving, at a gateway, a message from a client, wherein the message includes a uniform resource identifier that references an interface associated with a resource; transforming, by the gateway, the uniform resource identifier into a context resource identifier that also references the interface; performing, by the gateway, an initial authorization check for the client and a user of the client with respect to the interface; inserting, by the gateway, the context resource identifier into the message to form a modified message in response to a successful initial authorization check; and sending, by the gateway, the modified message to the proxy server. 2. The method of claim 1, wherein performing, by the gateway, the initial authorization check comprises: determining whether the client is authorized to access the interface referenced by the context resource identifier; and determining whether the user is authorized to access the interface referenced by the context resource identifier. 3. The method of claim 2, wherein performing, by the gateway, the initial authorization check further comprises: sending an access token to the client in response to a determination that the client is authorized to access the interface and a determination that the user is authorized to access to the interface. 4. The method of claim 3, wherein performing, by the gateway, the initial authorization check further comprises: receiving the access token from the client; and authenticating the client and the user of the client using the access token. 5. The method of claim 1, wherein performing, by the gateway, the initial authorization check comprises: validating a subscription corresponding to the client with respect to the context resource identifier. 6. The method of claim 1, wherein transforming, by the gateway, the uniform resource identifier into the context resource identifier comprises: matching the uniform resource identifier to the context resource identifier using an identifier data structure that stores a plurality of context resource identifiers, wherein the plurality of context resource identifiers remains static over time. 7. The method of claim 1 further comprising: checking a plurality of headers in the message based on a preapproved list of headers; and filtering out any header in the plurality of headers in the message that is not on the preapproved list of headers prior to sending the message to the proxy server. 8. The method of claim 1 further comprising: receiving a response message containing information provided by the resource from the proxy server. 9. The method of claim 8 further comprising: sending the response message to the client. 10. The method of claim 8 further comprising: checking a plurality of headers in the response message based on a preapproved list of headers; and filtering out any header in the plurality of headers in the response message that is not on the preapproved list of headers. 11. An apparatus comprising: a gateway that receives, from a client, a message that includes a uniform resource identifier referencing an interface associated with a resource and that transforms the uniform resource identifier into a context resource identifier also referencing the interface, wherein the gateway performs an initial authorization check for the client and a user of the client with respect to the interface; and wherein the gateway inserts the context resource identifier into the message to form a modified message in response to a successful initial authorization check and sends the modified message to a proxy server. 12. The apparatus of claim 11, wherein the gateway determines whether the client and the user of the client are authorized to access the interface referenced by the context resource identifier. 13. The apparatus of claim 12, wherein the gateway sends an access token to the client in response to a determination that the client and the user are authorized to access to the interface. 14. The apparatus of claim 13, wherein the gateway receives the access token from the client and authenticates the user and the client using the access token. 15. The apparatus of claim 11 further comprising: an identifier data structure storing a plurality of context resource identifiers that include the context resource identifier, wherein the plurality of context resource identifiers remain static over time. 16. The apparatus of claim 11 further comprising: a header data structure storing a preapproved list of headers, wherein the gateway filters out any header in a plurality of headers in the message that is not on the preapproved list of headers prior to sending the message to the proxy server. 17. The apparatus of claim 11, wherein the gateway comprises: a message manager that receives the message from the client and sends a response message back to the client. 18. The apparatus of claim 11, wherein the gateway comprises: a context identifier that transforms the uniform resource identifier into the context resource identifier. 19. The apparatus of claim 11, wherein the gateway comprises: an authenticator that performs the initial authorization check. 20. The apparatus of claim 11, wherein the gateway and the proxy server belong to a same entity. 21. A gateway comprising: a context identifier that transforms a uniform resource identifier in a message received from a client into a context resource identifier, wherein both the uniform resource identifier and the context resource identifier reference an interface associated with a resource; an authenticator that performs an initial authorization check for the client and a user of the client with respect to the interface referenced by the context resource identifier; and a message manager that receives the message from the client, inserts the context resource identifier into the message to form a modified message in response to a successful initial authorization check, and sends the modified message to a proxy server.
A method and apparatus for facilitating communication between a client and a proxy server. A message is received from a client at a gateway. The message includes a uniform resource identifier that references an interface associated with a resource. The gateway transforms the uniform resource identifier into a context resource identifier that also references the interface. The gateway performs an initial authorization check for the client and a user of the client with respect to the interface. The gateway inserts the context resource identifier into the message to form a modified message in response to a successful initial authorization check. The gateway sends the modified message to the proxy server.1. A method for facilitating communication between a client and a proxy server, the method comprising: receiving, at a gateway, a message from a client, wherein the message includes a uniform resource identifier that references an interface associated with a resource; transforming, by the gateway, the uniform resource identifier into a context resource identifier that also references the interface; performing, by the gateway, an initial authorization check for the client and a user of the client with respect to the interface; inserting, by the gateway, the context resource identifier into the message to form a modified message in response to a successful initial authorization check; and sending, by the gateway, the modified message to the proxy server. 2. The method of claim 1, wherein performing, by the gateway, the initial authorization check comprises: determining whether the client is authorized to access the interface referenced by the context resource identifier; and determining whether the user is authorized to access the interface referenced by the context resource identifier. 3. The method of claim 2, wherein performing, by the gateway, the initial authorization check further comprises: sending an access token to the client in response to a determination that the client is authorized to access the interface and a determination that the user is authorized to access to the interface. 4. The method of claim 3, wherein performing, by the gateway, the initial authorization check further comprises: receiving the access token from the client; and authenticating the client and the user of the client using the access token. 5. The method of claim 1, wherein performing, by the gateway, the initial authorization check comprises: validating a subscription corresponding to the client with respect to the context resource identifier. 6. The method of claim 1, wherein transforming, by the gateway, the uniform resource identifier into the context resource identifier comprises: matching the uniform resource identifier to the context resource identifier using an identifier data structure that stores a plurality of context resource identifiers, wherein the plurality of context resource identifiers remains static over time. 7. The method of claim 1 further comprising: checking a plurality of headers in the message based on a preapproved list of headers; and filtering out any header in the plurality of headers in the message that is not on the preapproved list of headers prior to sending the message to the proxy server. 8. The method of claim 1 further comprising: receiving a response message containing information provided by the resource from the proxy server. 9. The method of claim 8 further comprising: sending the response message to the client. 10. The method of claim 8 further comprising: checking a plurality of headers in the response message based on a preapproved list of headers; and filtering out any header in the plurality of headers in the response message that is not on the preapproved list of headers. 11. An apparatus comprising: a gateway that receives, from a client, a message that includes a uniform resource identifier referencing an interface associated with a resource and that transforms the uniform resource identifier into a context resource identifier also referencing the interface, wherein the gateway performs an initial authorization check for the client and a user of the client with respect to the interface; and wherein the gateway inserts the context resource identifier into the message to form a modified message in response to a successful initial authorization check and sends the modified message to a proxy server. 12. The apparatus of claim 11, wherein the gateway determines whether the client and the user of the client are authorized to access the interface referenced by the context resource identifier. 13. The apparatus of claim 12, wherein the gateway sends an access token to the client in response to a determination that the client and the user are authorized to access to the interface. 14. The apparatus of claim 13, wherein the gateway receives the access token from the client and authenticates the user and the client using the access token. 15. The apparatus of claim 11 further comprising: an identifier data structure storing a plurality of context resource identifiers that include the context resource identifier, wherein the plurality of context resource identifiers remain static over time. 16. The apparatus of claim 11 further comprising: a header data structure storing a preapproved list of headers, wherein the gateway filters out any header in a plurality of headers in the message that is not on the preapproved list of headers prior to sending the message to the proxy server. 17. The apparatus of claim 11, wherein the gateway comprises: a message manager that receives the message from the client and sends a response message back to the client. 18. The apparatus of claim 11, wherein the gateway comprises: a context identifier that transforms the uniform resource identifier into the context resource identifier. 19. The apparatus of claim 11, wherein the gateway comprises: an authenticator that performs the initial authorization check. 20. The apparatus of claim 11, wherein the gateway and the proxy server belong to a same entity. 21. A gateway comprising: a context identifier that transforms a uniform resource identifier in a message received from a client into a context resource identifier, wherein both the uniform resource identifier and the context resource identifier reference an interface associated with a resource; an authenticator that performs an initial authorization check for the client and a user of the client with respect to the interface referenced by the context resource identifier; and a message manager that receives the message from the client, inserts the context resource identifier into the message to form a modified message in response to a successful initial authorization check, and sends the modified message to a proxy server.
2,400
7,829
7,829
14,703,366
2,485
In a video coding system, a common video sequence is coded multiple times to yield respective instances of coded video data. Each instance may be coded according to a set coding parameters derived from a target bit rate of a respective tier of service. Each tier may be coded according to a constraint that limits a maximum coding rate of the tier to be less than a target bit rate of another predetermined tier of service. Having been coded according to the constraint facilitates dynamic switching among tiers by a requesting client device processing resources or communication bandwidth changes. Improved coding systems to switch among different coding streams may increase quality of video streamed while minimizing transmission and storage size of such content.
1. A method, comprising: coding a common video sequence multiple times to yield respective instances of coded video data, each instance having video data coded according to a set of coding parameters derived from a target bit rate of a respective tier of service, wherein for a given tier, coding is constrained to limit a maximum coding rate of the tier to be less than a target bit rate of another predetermined tier of service. 2. The method of claim 1, wherein the instances of coded video each include a plurality of chunks of coded video data. 3. The method of claim 1, wherein the instances of coded video each include a plurality of chunks of coded video data having chunk boundaries that are temporally aligned with boundaries of chunks from other instances. 4. The method of claim 3, wherein a first frame of at least one chunk is a frame that is decodable without reference to any preceding frame in coding order and all other coded frames of the respective chunk that follow the first frame in coding order have prediction references that go no earlier than the first frame. 5. The method of claim 1, further comprising storing the instances of coded video at a distribution server in association with a manifest file containing data describing the tiers. 6. The method of claim 1, further comprising, for at least one coding instance: identifying portion(s) of the respective instance having a coding rate that exceeds the target bit rate of the instance, coding portions of the video sequence corresponding to the identified portion(s) into a plurality of sub-tiers, each sub-tier having coding parameters that induce a respective coding rate for the identified portion(s), and storing the coded instance and the coded sub-tiers in storage at a distribution server. 7. The method of claim 1, wherein each coded tier has a different resolution but a substantially similar aspect ratio as each other. 8. The method of claim 1, wherein at least one coded tier has a pixel aspect ratio derived from a display aspect ratio and a storage aspect ratio. 9. The method of claim 1, wherein the coding comprises: for a first tier, estimating characteristics of the video sequence, selecting coding parameters based on the estimated characteristics and the target bit rate of the first tier and coding the video sequence according to the selected coding parameters of the first tier, and for at least one other tier, selecting coding parameters based on the estimated characteristics and the target bit rate of the other tier, and coding the video sequence according to the selected coding parameters of the other tier. 10. The method of claim 1, wherein the coding comprises, for at least one tier: estimating characteristics of the video sequence, selecting coding parameters based on the estimated characteristics and a target bit rate of the respective tier, coding the video sequence according to the selected coding parameters, estimating a coding quality obtained from the coding, and if the estimated coding quality is below a predetermined threshold, revising the coding parameters and repeating the coding using the revised coding parameters. 11. A distribution server, comprising: a computer readable storage device having stored thereon a file representing a media item, the file including: multiple coding instances of the media item, each instance having coded video data representing the media item having been coded according to a set of coding parameters derived from a target bit rate of a respective tier of service, wherein for a given tier, coding is constrained to limit a maximum coding rate of the tier to be less than a target bit rate of another predetermined tier of service, and a manifest file containing data describing the tiers. 12. The server of claim 11, further comprising a communication system to provide data of a respective tier upon request. 13. The server of claim 11, wherein the coding instances each include a plurality of chunks of coded video data. 14. The server of claim 11, wherein the coding instances each include a plurality of chunks of coded video data having chunk boundaries that are temporally aligned with boundaries of chunks from other instances. 15. The server of claim 11, wherein a first frame of at least one chunk is a frame that is decodable without reference to any preceding frame in coding order. 16. The server of claim 11, wherein the file further comprises, for at least one instance: a plurality of coded sub-tiers of the instance, corresponding to a portion of the respective instance having a coding rate that exceeds the target bit rate of the instance, each sub-tier coded according to coding parameters that induce a respective coding rate for the identified portion. 17. The server of claim 11, wherein each coded tier has a different resolution but a substantially similar aspect ratio as each other. 18. A coding server, comprising: a video coder to code a common video sequence multiple times to yield respective instances of coded video data, each instance having video data coded according to a set of coding parameters derived from a target bit rate of a respective tier of service, wherein for a given tier, coding is constrained to limit a maximum coding rate of the tier to be less than a target bit rate of another predetermined tier of service, and a storage device to store the instances of coded video data. 19. The server of claim 17, wherein the instances of coded video data each include a plurality of chunks of coded video data. 20. The server of claim 17, wherein the instances of coded video data each include a plurality of chunks of coded video data having chunk boundaries that are temporally aligned with boundaries of chunks from other instances. 21. The server of claim 17, wherein a first frame of at least one chunk is a frame that is decodable without reference to any preceding frame in coding order. 22. The server of claim 17, wherein the video coder further: identifies a portion of the respective instance having a coding rate that exceeds the target bit rate of the instance, and codes portions of the video sequence corresponding to the identified portion(s) into a plurality of sub-tiers, each sub-tier having coding parameters that induce a respective coding rate for the identified portion. 23. The server of claim 17, wherein each coded tier has a different resolution but a substantially similar aspect ratio as each other. 24. A computer readable storage device having stored thereon program instructions that, when executed, cause a programming device to perform a method comprising: coding a common video sequence multiple times to yield respective instances of coded video data, each instance having video data coded according to a set of coding parameters derived from a target bit rate of a respective tier of service, wherein for a given tier, coding is constrained to limit a maximum coding rate of the tier to be less than a target bit rate of another predetermined tier of service. 25. The device of claim 24, wherein the program instructions further cause the executing device to: identify a portion of a coding instance having a coding rate that exceeds the target bit rate of the instance, and code portions of the video sequence corresponding to the identified portion(s) into a plurality of sub-tiers, each sub-tier having coding parameters that induce a respective coding rate for the identified portion. 26. The device of claim 24, wherein the program instructions further cause the executing device to store the instances of coded video at a distribution server in association with a manifest file containing data describing the tiers. 27. A method, comprising: estimating characteristics of a video sequence to be coded, coding a common video sequence multiple times to yield respective instances of coded video data, each associated with a respective tier of service, comprising for each instance: selecting coding parameters for the respective instance based on the estimated characteristics and a target bit rate of the respective tier, wherein a maximum coding rate of at least one tier is less than a target bit rate of another predetermined tier of service and a maximum coding rate at a startup portion of a coded instance is less than a maximum coding rate of an intermediate portion of the coded instance; coding the video sequence according to the selected coding parameters, and storing the instances of coded data at a media delivery server. 28. The method of claim 27, wherein a target bit rate of a coded instance is determined based on an estimated buffering condition of a player that is to decode the coded instance. 29. The method of claim 27, wherein select frames of the video sequence are coded as sync frames in all the coded instances. 30. The method of claim 27, wherein the coded instances are stored in individually accessible segments, each of which begins with a coded sync frame.
In a video coding system, a common video sequence is coded multiple times to yield respective instances of coded video data. Each instance may be coded according to a set coding parameters derived from a target bit rate of a respective tier of service. Each tier may be coded according to a constraint that limits a maximum coding rate of the tier to be less than a target bit rate of another predetermined tier of service. Having been coded according to the constraint facilitates dynamic switching among tiers by a requesting client device processing resources or communication bandwidth changes. Improved coding systems to switch among different coding streams may increase quality of video streamed while minimizing transmission and storage size of such content.1. A method, comprising: coding a common video sequence multiple times to yield respective instances of coded video data, each instance having video data coded according to a set of coding parameters derived from a target bit rate of a respective tier of service, wherein for a given tier, coding is constrained to limit a maximum coding rate of the tier to be less than a target bit rate of another predetermined tier of service. 2. The method of claim 1, wherein the instances of coded video each include a plurality of chunks of coded video data. 3. The method of claim 1, wherein the instances of coded video each include a plurality of chunks of coded video data having chunk boundaries that are temporally aligned with boundaries of chunks from other instances. 4. The method of claim 3, wherein a first frame of at least one chunk is a frame that is decodable without reference to any preceding frame in coding order and all other coded frames of the respective chunk that follow the first frame in coding order have prediction references that go no earlier than the first frame. 5. The method of claim 1, further comprising storing the instances of coded video at a distribution server in association with a manifest file containing data describing the tiers. 6. The method of claim 1, further comprising, for at least one coding instance: identifying portion(s) of the respective instance having a coding rate that exceeds the target bit rate of the instance, coding portions of the video sequence corresponding to the identified portion(s) into a plurality of sub-tiers, each sub-tier having coding parameters that induce a respective coding rate for the identified portion(s), and storing the coded instance and the coded sub-tiers in storage at a distribution server. 7. The method of claim 1, wherein each coded tier has a different resolution but a substantially similar aspect ratio as each other. 8. The method of claim 1, wherein at least one coded tier has a pixel aspect ratio derived from a display aspect ratio and a storage aspect ratio. 9. The method of claim 1, wherein the coding comprises: for a first tier, estimating characteristics of the video sequence, selecting coding parameters based on the estimated characteristics and the target bit rate of the first tier and coding the video sequence according to the selected coding parameters of the first tier, and for at least one other tier, selecting coding parameters based on the estimated characteristics and the target bit rate of the other tier, and coding the video sequence according to the selected coding parameters of the other tier. 10. The method of claim 1, wherein the coding comprises, for at least one tier: estimating characteristics of the video sequence, selecting coding parameters based on the estimated characteristics and a target bit rate of the respective tier, coding the video sequence according to the selected coding parameters, estimating a coding quality obtained from the coding, and if the estimated coding quality is below a predetermined threshold, revising the coding parameters and repeating the coding using the revised coding parameters. 11. A distribution server, comprising: a computer readable storage device having stored thereon a file representing a media item, the file including: multiple coding instances of the media item, each instance having coded video data representing the media item having been coded according to a set of coding parameters derived from a target bit rate of a respective tier of service, wherein for a given tier, coding is constrained to limit a maximum coding rate of the tier to be less than a target bit rate of another predetermined tier of service, and a manifest file containing data describing the tiers. 12. The server of claim 11, further comprising a communication system to provide data of a respective tier upon request. 13. The server of claim 11, wherein the coding instances each include a plurality of chunks of coded video data. 14. The server of claim 11, wherein the coding instances each include a plurality of chunks of coded video data having chunk boundaries that are temporally aligned with boundaries of chunks from other instances. 15. The server of claim 11, wherein a first frame of at least one chunk is a frame that is decodable without reference to any preceding frame in coding order. 16. The server of claim 11, wherein the file further comprises, for at least one instance: a plurality of coded sub-tiers of the instance, corresponding to a portion of the respective instance having a coding rate that exceeds the target bit rate of the instance, each sub-tier coded according to coding parameters that induce a respective coding rate for the identified portion. 17. The server of claim 11, wherein each coded tier has a different resolution but a substantially similar aspect ratio as each other. 18. A coding server, comprising: a video coder to code a common video sequence multiple times to yield respective instances of coded video data, each instance having video data coded according to a set of coding parameters derived from a target bit rate of a respective tier of service, wherein for a given tier, coding is constrained to limit a maximum coding rate of the tier to be less than a target bit rate of another predetermined tier of service, and a storage device to store the instances of coded video data. 19. The server of claim 17, wherein the instances of coded video data each include a plurality of chunks of coded video data. 20. The server of claim 17, wherein the instances of coded video data each include a plurality of chunks of coded video data having chunk boundaries that are temporally aligned with boundaries of chunks from other instances. 21. The server of claim 17, wherein a first frame of at least one chunk is a frame that is decodable without reference to any preceding frame in coding order. 22. The server of claim 17, wherein the video coder further: identifies a portion of the respective instance having a coding rate that exceeds the target bit rate of the instance, and codes portions of the video sequence corresponding to the identified portion(s) into a plurality of sub-tiers, each sub-tier having coding parameters that induce a respective coding rate for the identified portion. 23. The server of claim 17, wherein each coded tier has a different resolution but a substantially similar aspect ratio as each other. 24. A computer readable storage device having stored thereon program instructions that, when executed, cause a programming device to perform a method comprising: coding a common video sequence multiple times to yield respective instances of coded video data, each instance having video data coded according to a set of coding parameters derived from a target bit rate of a respective tier of service, wherein for a given tier, coding is constrained to limit a maximum coding rate of the tier to be less than a target bit rate of another predetermined tier of service. 25. The device of claim 24, wherein the program instructions further cause the executing device to: identify a portion of a coding instance having a coding rate that exceeds the target bit rate of the instance, and code portions of the video sequence corresponding to the identified portion(s) into a plurality of sub-tiers, each sub-tier having coding parameters that induce a respective coding rate for the identified portion. 26. The device of claim 24, wherein the program instructions further cause the executing device to store the instances of coded video at a distribution server in association with a manifest file containing data describing the tiers. 27. A method, comprising: estimating characteristics of a video sequence to be coded, coding a common video sequence multiple times to yield respective instances of coded video data, each associated with a respective tier of service, comprising for each instance: selecting coding parameters for the respective instance based on the estimated characteristics and a target bit rate of the respective tier, wherein a maximum coding rate of at least one tier is less than a target bit rate of another predetermined tier of service and a maximum coding rate at a startup portion of a coded instance is less than a maximum coding rate of an intermediate portion of the coded instance; coding the video sequence according to the selected coding parameters, and storing the instances of coded data at a media delivery server. 28. The method of claim 27, wherein a target bit rate of a coded instance is determined based on an estimated buffering condition of a player that is to decode the coded instance. 29. The method of claim 27, wherein select frames of the video sequence are coded as sync frames in all the coded instances. 30. The method of claim 27, wherein the coded instances are stored in individually accessible segments, each of which begins with a coded sync frame.
2,400
7,830
7,830
14,778,983
2,413
Embodiments of protocol converters (PCs), and related techniques, are disclosed herein. In some embodiments, a PC may include reception logic to receive Extensible Markup Language (XML) data transmitted by an Application Function (AF), conversion logic to convert the XML data into a Diameter Protocol (DP) message, and provision logic to provide the DP message for transmission to a Policy and Charging Rules Function (PCRF). Other embodiments may be disclosed and/or claimed.
1. A protocol converter (PC), comprising: reception logic to receive Extensible Markup Language (XML) data transmitted by an Application Function (AF); conversion logic to convert the XML data into a Diameter Protocol (DP) message; and provision logic to provide the DP message for transmission to a Policy and Charging Rules Function (PCRF); wherein the XML data includes an Attribute Value Pair (AVP) element, and the AVP element includes an AVP-Parameters element including a first XML element representative of an AVP code, a second XML element representative of an AVP flag, and a third XML element representative of an AVP length. 2. The PC of claim 1, wherein the PC is configured to operate within a Diameter realm including the PCRF. 3. The PC of claim 2, wherein: the PC is different from a second PC configured to operate within a second Diameter realm; and the Diameter realm and the second Diameter realm are within a common Third Generation Partnership Project (3GPP) Public Land Mobile Network (PLMN). 4. The PC of claim 1, wherein the PC is configured to operate within a domain of the AF. 5. The PC of claim 1, wherein the PC is located outside of a domain of the AF and outside of a Third Generation Partnership Project (3GPP) Public Land Mobile Network (PLMN) including a Diameter realm including the PCRF. 6. The PC of claim 1, wherein the XML data includes a plurality of AVP elements, and each AVP element of the plurality of AVP elements includes an AVP-Parameters element including an XML element representative of an AVP code, an XML element representative of an AVP flag, and an XML element representative of an AVP length. 7. The PC of claim 1, wherein the AVP-Parameters element is a required element of the AVP element, according to an XML schema. 8. The PC of claim 7, wherein the AVP-Parameters element is included in the AVP element by a reference attribute in the XML schema. 9. One or more computer readable media comprising instructions which, when executed by one or more processing devices of a computing device, cause the computing device to: receive Extensible Markup Language (XML) data transmitted by an Application Function (AF); and generate a Diameter Protocol (DP) message for transmission to a Policy and Charging Rules Function (PCRF) based at least in part on the XML data; wherein the XML data includes an Attribute Value Pair (AVP) element, and the AVP element includes an AVP-Parameters element including a first XML element representative of an AVP code, a second XML element representative of an AVP flag, and a third XML element representative of an AVP length. 10. The one or more computer readable media of claim 9, wherein the AVP element is a Session ID element having a string data type. 11. The one or more computer readable media of claim 9, wherein the AVP element is an Origin Host element, an Origin Realm element, a Destination Realm element, a Destination Host element or a Route Record element, and wherein the AVP element has a string data type. 12. The one or more computer readable media of claim 9, wherein the XML data includes a plurality of AVP elements, and each AVP element of the plurality of AVP elements includes an AVP-Parameters element including an XML element representative of an AVP code, an XML element representative of an AVP flag, and an XML element representative of an AVP length. 13. A method for protocol conversion, comprising: receiving, by a server computing device, a Diameter Protocol (DP) message from a Policy and Charging Rules Function (PCRF); converting, by the server computing device, the DP message into Extensible Markup Language (XML) data; and providing, by the server computing device, the XML data for transmission to an Application Function (AF); wherein the XML data includes an Attribute Value Pair (AVP) element, and the AVP element includes an AVP-Parameters element including a first XML element representative of an AVP code, a second XML element representative of an AVP flag, and a third XML element representative of an AVP length. 14. The method of claim 13, wherein the AVP element is a Media Component Description element, a Subscription ID element, a Supported Features elements, a Sponsored Connectivity Data element or a Proxy Info element, and wherein the AVP element has a group type. 15. The method of claim 14, wherein the AVP element is a Sponsored Connectivity Data element including a Granted Service Group element and a User Service Group element, and wherein the Granted Service Group element and the User Service Group element have group types. 16. The method of claim 15, wherein the Granted Service Group element and the User Service Group element each include a Money Group element, and wherein the Money Group element has a group type. 17. The method of claim 13, wherein the server computing device is configured to operate within a Diameter realm including the PCRF. 18. The method of claim 13, wherein the server computing device is configured to operate within a domain of the AF. 19. The method of claim 13, wherein the PC is configured to operate outside of a domain of the AF and outside of a Third Generation Partnership Project (3GPP) Public Land Mobile Network (PLMN) including a Diameter realm including the PCRF. 20. A protocol converter (PC), comprising: reception logic to receive a Diameter Protocol (DP) message from a Policy and Charging Rules Function (PCRF); conversion logic to convert the DP message into Extensible Markup Language (XML) data; and provision logic to provide the XML data for transmission to an Application Function (AF); wherein the XML data includes an Attribute Value Pair (AVP) element, and the AVP element includes an AVP-Parameters element including a first XML element representative of an AVP code, a second XML element representative of an AVP flag, and a third XML element representative of an AVP length. 21. The PC of claim 20, wherein the PC is configured to operate within a Diameter realm including the PCRF. 22. The PC of claim 20, wherein: the PC is different from a second PC configured to operate within a second Diameter realm; and the Diameter realm and the second Diameter realm are within a common Third Generation Partnership Project (3GPP) Public Land Mobile Network (PLMN). 23. The PC of claim 20, wherein the XML data includes a plurality of AVP elements, and each AVP element of the plurality of AVP elements includes an AVP-Parameters element including an XML element representative of an AVP code, an XML element representative of an AVP flag, and an XML element representative of an AVP length. 24. The PC of claim 20, wherein the AVP-Parameters element is a required element of the AVP element, according to an XML schema. 25. (canceled)
Embodiments of protocol converters (PCs), and related techniques, are disclosed herein. In some embodiments, a PC may include reception logic to receive Extensible Markup Language (XML) data transmitted by an Application Function (AF), conversion logic to convert the XML data into a Diameter Protocol (DP) message, and provision logic to provide the DP message for transmission to a Policy and Charging Rules Function (PCRF). Other embodiments may be disclosed and/or claimed.1. A protocol converter (PC), comprising: reception logic to receive Extensible Markup Language (XML) data transmitted by an Application Function (AF); conversion logic to convert the XML data into a Diameter Protocol (DP) message; and provision logic to provide the DP message for transmission to a Policy and Charging Rules Function (PCRF); wherein the XML data includes an Attribute Value Pair (AVP) element, and the AVP element includes an AVP-Parameters element including a first XML element representative of an AVP code, a second XML element representative of an AVP flag, and a third XML element representative of an AVP length. 2. The PC of claim 1, wherein the PC is configured to operate within a Diameter realm including the PCRF. 3. The PC of claim 2, wherein: the PC is different from a second PC configured to operate within a second Diameter realm; and the Diameter realm and the second Diameter realm are within a common Third Generation Partnership Project (3GPP) Public Land Mobile Network (PLMN). 4. The PC of claim 1, wherein the PC is configured to operate within a domain of the AF. 5. The PC of claim 1, wherein the PC is located outside of a domain of the AF and outside of a Third Generation Partnership Project (3GPP) Public Land Mobile Network (PLMN) including a Diameter realm including the PCRF. 6. The PC of claim 1, wherein the XML data includes a plurality of AVP elements, and each AVP element of the plurality of AVP elements includes an AVP-Parameters element including an XML element representative of an AVP code, an XML element representative of an AVP flag, and an XML element representative of an AVP length. 7. The PC of claim 1, wherein the AVP-Parameters element is a required element of the AVP element, according to an XML schema. 8. The PC of claim 7, wherein the AVP-Parameters element is included in the AVP element by a reference attribute in the XML schema. 9. One or more computer readable media comprising instructions which, when executed by one or more processing devices of a computing device, cause the computing device to: receive Extensible Markup Language (XML) data transmitted by an Application Function (AF); and generate a Diameter Protocol (DP) message for transmission to a Policy and Charging Rules Function (PCRF) based at least in part on the XML data; wherein the XML data includes an Attribute Value Pair (AVP) element, and the AVP element includes an AVP-Parameters element including a first XML element representative of an AVP code, a second XML element representative of an AVP flag, and a third XML element representative of an AVP length. 10. The one or more computer readable media of claim 9, wherein the AVP element is a Session ID element having a string data type. 11. The one or more computer readable media of claim 9, wherein the AVP element is an Origin Host element, an Origin Realm element, a Destination Realm element, a Destination Host element or a Route Record element, and wherein the AVP element has a string data type. 12. The one or more computer readable media of claim 9, wherein the XML data includes a plurality of AVP elements, and each AVP element of the plurality of AVP elements includes an AVP-Parameters element including an XML element representative of an AVP code, an XML element representative of an AVP flag, and an XML element representative of an AVP length. 13. A method for protocol conversion, comprising: receiving, by a server computing device, a Diameter Protocol (DP) message from a Policy and Charging Rules Function (PCRF); converting, by the server computing device, the DP message into Extensible Markup Language (XML) data; and providing, by the server computing device, the XML data for transmission to an Application Function (AF); wherein the XML data includes an Attribute Value Pair (AVP) element, and the AVP element includes an AVP-Parameters element including a first XML element representative of an AVP code, a second XML element representative of an AVP flag, and a third XML element representative of an AVP length. 14. The method of claim 13, wherein the AVP element is a Media Component Description element, a Subscription ID element, a Supported Features elements, a Sponsored Connectivity Data element or a Proxy Info element, and wherein the AVP element has a group type. 15. The method of claim 14, wherein the AVP element is a Sponsored Connectivity Data element including a Granted Service Group element and a User Service Group element, and wherein the Granted Service Group element and the User Service Group element have group types. 16. The method of claim 15, wherein the Granted Service Group element and the User Service Group element each include a Money Group element, and wherein the Money Group element has a group type. 17. The method of claim 13, wherein the server computing device is configured to operate within a Diameter realm including the PCRF. 18. The method of claim 13, wherein the server computing device is configured to operate within a domain of the AF. 19. The method of claim 13, wherein the PC is configured to operate outside of a domain of the AF and outside of a Third Generation Partnership Project (3GPP) Public Land Mobile Network (PLMN) including a Diameter realm including the PCRF. 20. A protocol converter (PC), comprising: reception logic to receive a Diameter Protocol (DP) message from a Policy and Charging Rules Function (PCRF); conversion logic to convert the DP message into Extensible Markup Language (XML) data; and provision logic to provide the XML data for transmission to an Application Function (AF); wherein the XML data includes an Attribute Value Pair (AVP) element, and the AVP element includes an AVP-Parameters element including a first XML element representative of an AVP code, a second XML element representative of an AVP flag, and a third XML element representative of an AVP length. 21. The PC of claim 20, wherein the PC is configured to operate within a Diameter realm including the PCRF. 22. The PC of claim 20, wherein: the PC is different from a second PC configured to operate within a second Diameter realm; and the Diameter realm and the second Diameter realm are within a common Third Generation Partnership Project (3GPP) Public Land Mobile Network (PLMN). 23. The PC of claim 20, wherein the XML data includes a plurality of AVP elements, and each AVP element of the plurality of AVP elements includes an AVP-Parameters element including an XML element representative of an AVP code, an XML element representative of an AVP flag, and an XML element representative of an AVP length. 24. The PC of claim 20, wherein the AVP-Parameters element is a required element of the AVP element, according to an XML schema. 25. (canceled)
2,400
7,831
7,831
14,910,935
2,467
Achieved is “Inter-node UP aggregation”. A mobile station UE according to the invention includes a MAC layer function for a radio base station MeNB and a MAC layer function for a radio base station SeNB. Each of the MAC layer function for the radio base station MeNB and the MAC layer function for the radio base station SeNB is configured to determine whether or not MAC-PDU received via a physical layer function is addressed to a logical channel managed by the MAC layer function itself, based on whether or not a MAC-ID is added to a header of the MAC-PDU.
1. A mobile station performing carrier aggregation using a component carrier under a first radio base station and a component carrier under a second radio base station, the mobile station comprising: a MAC layer function for the first radio base station; and a MAC layer function for the second radio base station, wherein each of the MAC layer function for the first radio base station and the MAC layer function for the second radio base station is configured to determine whether or not MAC-PDU received via a physical layer function is addressed to a logical channel managed by the MAC layer function itself, based on whether or not predetermined identification information is added to a header of the MAC-PDU. 2. A mobile station performing carrier aggregation using a component carrier under a first radio base station and a component carrier under a second radio base station, the mobile station comprising: a MAC layer function for the first radio base station; and a MAC layer function for the second radio base station, wherein each of the MAC layer function for the first radio base station and the MAC layer function for the second radio base station is configured to determine whether or not MAC-PDU received via a physical layer function is addressed to a logical channel managed by the MAC layer function itself, based on logical channel identification information included in a header of the MAC-PDU. 3. A mobile station performing carrier aggregation using a component carrier under a first radio base station and a component carrier under a second radio base station, the mobile station comprising: a MAC layer function for the first radio base station; and a MAC layer function for the second radio base station, wherein each of the MAC layer function for the first radio base station and the MAC layer function for the second radio base station is configured to determine whether or not MAC-SDU received via an RLC layer function is to be processed by the MAC layer function itself, based on whether or not predetermined identification information identifying the MAC layer function is added to a header of the MAC-SDU. 4. A mobile station performing carrier aggregation using a component carrier under a first radio base station and a component carrier under a second radio base station, the mobile station comprising: a MAC layer function for the first radio base station; and a MAC layer function for the second radio base station, wherein each of the MAC layer function for the first radio base station and the MAC layer function for the second radio base station is configured to determine whether or not MAC-SDU received via a RLC layer function is to be processed by the MAC layer function itself, based on logical channel identification information included in a header of the MAC-SDU. 5. A radio base station functioning as a second radio base station in a mobile communication system in which a mobile station is configured to be capable of performing carrier aggregation using a component carrier under a first radio base station and a component carrier under the second radio base station, the radio base station comprising a MAC layer function, wherein the MAC layer function is configured to add predetermined identification information identifying the MAC layer function to a header of a MAC-SDU to be received via an RLC layer function.
Achieved is “Inter-node UP aggregation”. A mobile station UE according to the invention includes a MAC layer function for a radio base station MeNB and a MAC layer function for a radio base station SeNB. Each of the MAC layer function for the radio base station MeNB and the MAC layer function for the radio base station SeNB is configured to determine whether or not MAC-PDU received via a physical layer function is addressed to a logical channel managed by the MAC layer function itself, based on whether or not a MAC-ID is added to a header of the MAC-PDU.1. A mobile station performing carrier aggregation using a component carrier under a first radio base station and a component carrier under a second radio base station, the mobile station comprising: a MAC layer function for the first radio base station; and a MAC layer function for the second radio base station, wherein each of the MAC layer function for the first radio base station and the MAC layer function for the second radio base station is configured to determine whether or not MAC-PDU received via a physical layer function is addressed to a logical channel managed by the MAC layer function itself, based on whether or not predetermined identification information is added to a header of the MAC-PDU. 2. A mobile station performing carrier aggregation using a component carrier under a first radio base station and a component carrier under a second radio base station, the mobile station comprising: a MAC layer function for the first radio base station; and a MAC layer function for the second radio base station, wherein each of the MAC layer function for the first radio base station and the MAC layer function for the second radio base station is configured to determine whether or not MAC-PDU received via a physical layer function is addressed to a logical channel managed by the MAC layer function itself, based on logical channel identification information included in a header of the MAC-PDU. 3. A mobile station performing carrier aggregation using a component carrier under a first radio base station and a component carrier under a second radio base station, the mobile station comprising: a MAC layer function for the first radio base station; and a MAC layer function for the second radio base station, wherein each of the MAC layer function for the first radio base station and the MAC layer function for the second radio base station is configured to determine whether or not MAC-SDU received via an RLC layer function is to be processed by the MAC layer function itself, based on whether or not predetermined identification information identifying the MAC layer function is added to a header of the MAC-SDU. 4. A mobile station performing carrier aggregation using a component carrier under a first radio base station and a component carrier under a second radio base station, the mobile station comprising: a MAC layer function for the first radio base station; and a MAC layer function for the second radio base station, wherein each of the MAC layer function for the first radio base station and the MAC layer function for the second radio base station is configured to determine whether or not MAC-SDU received via a RLC layer function is to be processed by the MAC layer function itself, based on logical channel identification information included in a header of the MAC-SDU. 5. A radio base station functioning as a second radio base station in a mobile communication system in which a mobile station is configured to be capable of performing carrier aggregation using a component carrier under a first radio base station and a component carrier under the second radio base station, the radio base station comprising a MAC layer function, wherein the MAC layer function is configured to add predetermined identification information identifying the MAC layer function to a header of a MAC-SDU to be received via an RLC layer function.
2,400
7,832
7,832
14,498,723
2,454
A non-limiting example information processing system includes a plurality of user terminals, and a download task list for each user terminal is managed by a list server. Existence/non-existence of renewal of the download task list is managed by a revision server, and the user terminal inquires of the revision server the existence/non-existence of the renewal. If the download task list is renewed, the user terminal acquires the download task list from the list server, and acquires a content from a content server according to an acquired download task list.
1. An information processing system that comprises a first server and a user terminal, wherein the first server comprises an information storing module operable to store download information related to a download for each of a plurality of user terminals or for each of uses of the plurality of user terminals; an information transmitting module operable to transmit download information for the user terminal or the user of the user terminal in response to a request from the user terminal; a content storing module operable to store a content; and a content transmitting module operable to transmit the content that is stored in the content storing module in response to a request from the user terminal, and the user terminal comprises an information acquiring module operable to acquire the download information that is transmitted from the information transmitting module; a content requesting module operable to request transmission of a content to the first server according to the download information that is acquired by the information acquiring module; and a content acquiring module operable to acquire the download information that is transmitted from the information transmitting module in response to a request form the content request module. 2. An information processing system according to claim 1, wherein the user terminal further comprises an accessing module operable to access the first server according to existence/non-existence of renewal of the download information. 3. An information processing system according to claim 2, wherein the user terminal further comprises an information requesting module operable to request to the first server, when the renewal of the download information exists, transmission of the download information by causing the accessing module to access the first server. 4. An information processing system according to claim 2, further comprising a second server operable to manage the existence/non-existence of the renewal of the download information, wherein the user terminal further comprises an inquiry module operable to inquire of the second server the existence/non-existence of the renewal of the download information. 5. An information processing system according to claim 1, wherein the user terminal further comprises an additional information acquiring module operable to acquire additional information that is added to the content. 6. An information processing system according to claim 1, wherein the download information contains different kinds of download tasks. 7. An information processing system according to claim 6, wherein the user terminal is operable to perform different operations at a time that the content acquiring module acquires the content according to the kind of download task. 8. An information processing system according to claim 6, wherein different identification information is applied to each of the download tasks, and the user terminal is operable to manage whether each of the download tasks is to be performed with using the identification information. 9. An information processing system according to claim 8, wherein the user terminal further comprises a success recording module operable to record, when the acquisition of the content by the content acquiring module is successful, that the acquisition of the content is successful corresponding to the identification information of the download task for the content. 10. An information processing system according to claim 9, wherein the content requesting module does not request the transmission of the content when it is recorded corresponding to the identification information of the download task that the acquisition of the content is successful. 11. An information processing system according to claim 8, wherein the user terminal further comprises a failure recording module operable to record, when the acquisition of the content by the content acquiring module is unsuccessful, that the acquisition of the content is unsuccessful corresponding to the identification information of the download task for the content. 12. An information processing system according to claim 11, wherein the content requesting module requests again the transmission of the content when it is recorded that the acquisition of the content is unsuccessful corresponding to the identification information of the download task. 13. An information processing system according to claim 1, wherein the first server comprises a download information server that comprises said information storing module and said information transmitting module, and a content server that comprises said content storing module and said content transmitting module. 14. An information processing method in an information processing system comprising first server that comprises a content storing module operable to store a content and an information storing module operable to store download information related to a download for each of a plurality of user terminals or each of users of the plurality of the user terminals, and a user terminal, comprising steps of: (a) the first server transmits the download information for the user terminal or the user of the user terminal in response to a request from the user terminal; (b) the user terminal acquires the download information that is transmitted in the step (a); (c) the user terminal requests, according to the download information that is acquired in the step (b), transmission of a content to the first server; (d) the first server transmits, in response to a request from the user terminal, a content that is stored in the content storing module; and (e) the user terminal acquires the content that is transmitted in the step (d). 15. A user terminal that is communicably connected to a first server that comprises an information storing module operable to store download information related to each of a plurality of user terminals or each of users of the plurality of the user terminals, an information transmitting module operable to transmit the download information for the user terminal in response to a request from the user terminal, a content storing module operable to store a content, and a content transmitting module operable to transmit the content that is stored in the content storing module in response to a request from the user terminal, one or more processors of the user terminal: acquire the download information that is transmitted from the information transmitting module; request the first server transmission of a content according to the download information that is acquired by the information acquiring module; and acquire the content that is transmitted from the content transmitting module in response to the request by the content request module. 16. A non-transitory computer readable storage medium storing an information processing program of a user terminal that is communicably connected to a first server that comprises an information storing module operable to store download information related to each of a plurality of user terminals or each of users of the plurality of the user terminals, an information transmitting module operable to transmit the download information for the user terminal in response to a request from the user terminal, a content storing module operable to store a content, and a content transmitting module operable to transmit the content that is stored in the content storing module according to a request from the user terminal, the information processing program causes a computer of the user terminal to function as: an information acquiring module operable to acquire the download information that is transmitted from the information transmitting module to store in a storage medium; a content request module operable to request to the first server transmission of a content according to the download information that is acquired by the information acquiring module; and a content acquiring module operable to acquire the content that is transmitted from the content transmitting module in response to a request by the content requesting module to store in the storage medium.
A non-limiting example information processing system includes a plurality of user terminals, and a download task list for each user terminal is managed by a list server. Existence/non-existence of renewal of the download task list is managed by a revision server, and the user terminal inquires of the revision server the existence/non-existence of the renewal. If the download task list is renewed, the user terminal acquires the download task list from the list server, and acquires a content from a content server according to an acquired download task list.1. An information processing system that comprises a first server and a user terminal, wherein the first server comprises an information storing module operable to store download information related to a download for each of a plurality of user terminals or for each of uses of the plurality of user terminals; an information transmitting module operable to transmit download information for the user terminal or the user of the user terminal in response to a request from the user terminal; a content storing module operable to store a content; and a content transmitting module operable to transmit the content that is stored in the content storing module in response to a request from the user terminal, and the user terminal comprises an information acquiring module operable to acquire the download information that is transmitted from the information transmitting module; a content requesting module operable to request transmission of a content to the first server according to the download information that is acquired by the information acquiring module; and a content acquiring module operable to acquire the download information that is transmitted from the information transmitting module in response to a request form the content request module. 2. An information processing system according to claim 1, wherein the user terminal further comprises an accessing module operable to access the first server according to existence/non-existence of renewal of the download information. 3. An information processing system according to claim 2, wherein the user terminal further comprises an information requesting module operable to request to the first server, when the renewal of the download information exists, transmission of the download information by causing the accessing module to access the first server. 4. An information processing system according to claim 2, further comprising a second server operable to manage the existence/non-existence of the renewal of the download information, wherein the user terminal further comprises an inquiry module operable to inquire of the second server the existence/non-existence of the renewal of the download information. 5. An information processing system according to claim 1, wherein the user terminal further comprises an additional information acquiring module operable to acquire additional information that is added to the content. 6. An information processing system according to claim 1, wherein the download information contains different kinds of download tasks. 7. An information processing system according to claim 6, wherein the user terminal is operable to perform different operations at a time that the content acquiring module acquires the content according to the kind of download task. 8. An information processing system according to claim 6, wherein different identification information is applied to each of the download tasks, and the user terminal is operable to manage whether each of the download tasks is to be performed with using the identification information. 9. An information processing system according to claim 8, wherein the user terminal further comprises a success recording module operable to record, when the acquisition of the content by the content acquiring module is successful, that the acquisition of the content is successful corresponding to the identification information of the download task for the content. 10. An information processing system according to claim 9, wherein the content requesting module does not request the transmission of the content when it is recorded corresponding to the identification information of the download task that the acquisition of the content is successful. 11. An information processing system according to claim 8, wherein the user terminal further comprises a failure recording module operable to record, when the acquisition of the content by the content acquiring module is unsuccessful, that the acquisition of the content is unsuccessful corresponding to the identification information of the download task for the content. 12. An information processing system according to claim 11, wherein the content requesting module requests again the transmission of the content when it is recorded that the acquisition of the content is unsuccessful corresponding to the identification information of the download task. 13. An information processing system according to claim 1, wherein the first server comprises a download information server that comprises said information storing module and said information transmitting module, and a content server that comprises said content storing module and said content transmitting module. 14. An information processing method in an information processing system comprising first server that comprises a content storing module operable to store a content and an information storing module operable to store download information related to a download for each of a plurality of user terminals or each of users of the plurality of the user terminals, and a user terminal, comprising steps of: (a) the first server transmits the download information for the user terminal or the user of the user terminal in response to a request from the user terminal; (b) the user terminal acquires the download information that is transmitted in the step (a); (c) the user terminal requests, according to the download information that is acquired in the step (b), transmission of a content to the first server; (d) the first server transmits, in response to a request from the user terminal, a content that is stored in the content storing module; and (e) the user terminal acquires the content that is transmitted in the step (d). 15. A user terminal that is communicably connected to a first server that comprises an information storing module operable to store download information related to each of a plurality of user terminals or each of users of the plurality of the user terminals, an information transmitting module operable to transmit the download information for the user terminal in response to a request from the user terminal, a content storing module operable to store a content, and a content transmitting module operable to transmit the content that is stored in the content storing module in response to a request from the user terminal, one or more processors of the user terminal: acquire the download information that is transmitted from the information transmitting module; request the first server transmission of a content according to the download information that is acquired by the information acquiring module; and acquire the content that is transmitted from the content transmitting module in response to the request by the content request module. 16. A non-transitory computer readable storage medium storing an information processing program of a user terminal that is communicably connected to a first server that comprises an information storing module operable to store download information related to each of a plurality of user terminals or each of users of the plurality of the user terminals, an information transmitting module operable to transmit the download information for the user terminal in response to a request from the user terminal, a content storing module operable to store a content, and a content transmitting module operable to transmit the content that is stored in the content storing module according to a request from the user terminal, the information processing program causes a computer of the user terminal to function as: an information acquiring module operable to acquire the download information that is transmitted from the information transmitting module to store in a storage medium; a content request module operable to request to the first server transmission of a content according to the download information that is acquired by the information acquiring module; and a content acquiring module operable to acquire the content that is transmitted from the content transmitting module in response to a request by the content requesting module to store in the storage medium.
2,400
7,833
7,833
14,623,529
2,434
One embodiment describes a method for permuting data elements, comprising receiving a sequence of data elements, and carrying out a plurality of interchange operations each comprising randomly selecting a data element from the data elements in the sequence, interchanging the data element with another data element at a deterministically predefined position in the sequence of data elements, and applying a predefined permutation to the deterministically predefined position or to the sequence of data elements.
1. A method for permuting data elements, the method comprising: receiving a sequence of data elements; and carrying out a plurality of interchange operations, wherein each interchange operation comprises: randomly selecting a data element from the data elements in the sequence; interchanging the data element with another data element at a deterministically predefined position in the sequence of data elements; applying a predefined permutation to the deterministically predefined position or to the sequence of data elements. 2. The method of claim 1, wherein the predefined permutation is a cyclical permutation. 3. The method of claim 1, wherein the predefined permutation is a cyclical rotation. 4. The method of claim 1, further comprising: receiving a random number and randomly selecting the data element from all data elements in the sequence on the basis of the random number. 5. The method of claim 4, further comprising: receiving the random number from a random number generator. 6. The method of claim 4, wherein the data element is selected by dividing the random number by the number of data elements with a remainder and selecting the data element as that data element which is indicated by the remainder according to indexing of the data elements. 7. The method of claim 1, wherein the data element is selected from a subset of the data elements in the sequence. 8. The method of claim 1, wherein the subset contains a number of data elements which is equal to a power of two. 9. The method of claim 8, wherein the number is equal to the greatest power of two which is less than or equal to the number of data elements in the sequence. 10. The method of claim 1, wherein the predefined permutation is applied to the sequence of data elements and the deterministically predefined position is a constant position. 11. The method of claim 1, further comprising: storing the sequence of data elements in a shift register and cyclically rotating the sequence of data elements using the shift register. 12. The method of claim 1, wherein a unique iteration index is assigned to each interchange operation of the plurality of interchange operations. 13. The method of claim 1, wherein, for an interchange operation, the deterministically predefined other data element is deterministically predefined by the iteration index of the interchange operation. 14. The method of claim 1, wherein, for an interchange operation, the deterministically predefined other data element is that data element which, according to indexing of the data elements, has an index which corresponds to the iteration index of the interchange operation. 15. A permuting apparatus, comprising: an input which is set up to receive a sequence of data elements; a processing device which is set up to carry out a plurality of interchange operations, wherein each interchange operation comprises: randomly selecting a data element from the data elements in the sequence; and interchanging the data element with another data element at a deterministically predefined position in the sequence of data elements; applying a predefined permutation to the deterministically predefined position or to the sequence of data elements.
One embodiment describes a method for permuting data elements, comprising receiving a sequence of data elements, and carrying out a plurality of interchange operations each comprising randomly selecting a data element from the data elements in the sequence, interchanging the data element with another data element at a deterministically predefined position in the sequence of data elements, and applying a predefined permutation to the deterministically predefined position or to the sequence of data elements.1. A method for permuting data elements, the method comprising: receiving a sequence of data elements; and carrying out a plurality of interchange operations, wherein each interchange operation comprises: randomly selecting a data element from the data elements in the sequence; interchanging the data element with another data element at a deterministically predefined position in the sequence of data elements; applying a predefined permutation to the deterministically predefined position or to the sequence of data elements. 2. The method of claim 1, wherein the predefined permutation is a cyclical permutation. 3. The method of claim 1, wherein the predefined permutation is a cyclical rotation. 4. The method of claim 1, further comprising: receiving a random number and randomly selecting the data element from all data elements in the sequence on the basis of the random number. 5. The method of claim 4, further comprising: receiving the random number from a random number generator. 6. The method of claim 4, wherein the data element is selected by dividing the random number by the number of data elements with a remainder and selecting the data element as that data element which is indicated by the remainder according to indexing of the data elements. 7. The method of claim 1, wherein the data element is selected from a subset of the data elements in the sequence. 8. The method of claim 1, wherein the subset contains a number of data elements which is equal to a power of two. 9. The method of claim 8, wherein the number is equal to the greatest power of two which is less than or equal to the number of data elements in the sequence. 10. The method of claim 1, wherein the predefined permutation is applied to the sequence of data elements and the deterministically predefined position is a constant position. 11. The method of claim 1, further comprising: storing the sequence of data elements in a shift register and cyclically rotating the sequence of data elements using the shift register. 12. The method of claim 1, wherein a unique iteration index is assigned to each interchange operation of the plurality of interchange operations. 13. The method of claim 1, wherein, for an interchange operation, the deterministically predefined other data element is deterministically predefined by the iteration index of the interchange operation. 14. The method of claim 1, wherein, for an interchange operation, the deterministically predefined other data element is that data element which, according to indexing of the data elements, has an index which corresponds to the iteration index of the interchange operation. 15. A permuting apparatus, comprising: an input which is set up to receive a sequence of data elements; a processing device which is set up to carry out a plurality of interchange operations, wherein each interchange operation comprises: randomly selecting a data element from the data elements in the sequence; and interchanging the data element with another data element at a deterministically predefined position in the sequence of data elements; applying a predefined permutation to the deterministically predefined position or to the sequence of data elements.
2,400
7,834
7,834
15,006,571
2,451
Various embodiments collect unproductive resources in a network infrastructure. In one embodiment, data relating to resources of a network infrastructure is collected. An analytics model is selected based on a type of the collected data. The selected analytics model is executed to classify a resource unproductive or productive, and to assign a corresponding confidence level. An action plan for each confidence level is determined and the action plan is executed for the resource. The collected data may include resource utilization information, hypervisor information, cloud related meta-data, user knowledge and system knowledge. When data is only resource data, a resource mining model is selected. When the data includes reference data, a reference mining model is selected. When the data comprises reference data and resource data, a reference mining model is selected.
1. A method for collecting unproductive resources in a network infrastructure, the method comprising: collecting data relating to resources of a network infrastructure; selecting an analytics model based on a type of the collected data; executing the selected analytics model to classify a resource as one of unproductive and productive and to assign a corresponding confidence level; determining an action plan for each confidence level; and executing the action plan for the resource. 2. The method of claim 1, wherein the collected data comprises at least one of resource utilization information, hypervisor information, cloud related meta-data, user knowledge and system knowledge. 3. The method of claim 1, wherein the data type comprises only resource data, the selected analytics model is a resource mining model. 4. The method of claim 1, wherein the data type comprises reference data, the selected analytics model is a reference mining model. 5. The method of claim 4, wherein the reference mining model: generates a reference graph of resources within the network infrastructure; assigns a weight to each edge of the reference graph based on a set of heuristic rules; and determines the confidence level for each resource based on reachability. 6. The method of claim 1, wherein the data type comprises reference data and resource data, the selected analytics model is a reference mining model. 7. The method of claim 6, wherein the combined mining model: generates a reference graph of resources within the network infrastructure; assigns a weight to each edge of the reference graph based on a set of heuristic rules; classifies each resource as one of unproductive and productive with a corresponding confidence level for each resource based on reachability; reclassifies each resource as one of unproductive and productive with a corresponding probability level based on resource utilization; and modifies the confidence level based on the reclassification and corresponding probability level. 8. The method of claim 7, wherein a resource is originally classified as productive, the method further comprises ignoring the reclassification. 9. The method of claim 7, wherein a resource is originally classified as unproductive the method further comprises downgrading the confidence level when the resource is reclassified as productive. 10. The method of claim 7, wherein a resource is originally classified as unproductive the method further comprises upgrading the confidence level when the resource is reclassified as unproductive. 11. The method of claim 1, wherein the action plan includes at least one of: notifying a user that a resource is unproductive, suspending the resource, decommissioning the resource and reallocating the resource. 12. An information processing system for collecting unproductive resources in a network infrastructure, the information processing system comprising a memory; a processor operably coupled to the memory; and an enterprise garbage collector operably coupled to the memory and the processor, the enterprise garbage collector configured to perform a method comprising: collecting data relating to resources of a network infrastructure; selecting an analytics model based on a type of the collected data; executing the selected analytics model to classify a resource as one of unproductive and productive and to assign a corresponding confidence level; determining an action plan for each confidence level; and executing the action plan for the resource. 13. The information processing system of claim 12, wherein the collected data comprises at least one of resource utilization information, hypervisor information, cloud related meta-data, user knowledge and system knowledge. 14. The information processing system of claim 12, wherein the data type comprises reference data, the selected analytics model is a reference mining model. 15. The information processing system of claim 14, wherein the reference mining model: generates a reference graph of resources within the network infrastructure; assigns a weight to each edge of the reference graph based on a set of heuristic rules; and determines the confidence level for each resource based on reachability. 16. The information processing system of claim 12, wherein the data type comprises reference data and resource data, the selected analytics model is a reference mining model. 17. The information processing system of claim 16, wherein the combined mining model: generates a reference graph of resources within the network infrastructure; assigns a weight to each edge of the reference graph based on a set of heuristic rules; classifies each resource as one of unproductive and productive with a corresponding confidence level for each resource based on reachability; reclassifies each resource as one of unproductive and productive with a corresponding probability level based on resource utilization; and modifies the confidence level based on the reclassification and corresponding probability level. 18. The information processing system of claim 17, wherein a resource is originally classified as productive, the method further comprises ignoring the reclassification. 19. The information processing system of claim 17, wherein a resource is originally classified as unproductive the method further comprises downgrading the confidence level when the resource is reclassified as productive. 20. A computer program product for collecting unproductive resources in a network infrastructure, the computer program product comprising: a storage medium readable by a processing circuit and storing instructions for execution by the processing circuit for performing a method comprising: collecting data relating to resources of a network infrastructure; selecting an analytics model based on a type of the collected data; executing the selected analytics model to classify a resource as one of unproductive and productive and to assign a corresponding confidence level; determining an action plan for each confidence level; and executing the action plan for the resource.
Various embodiments collect unproductive resources in a network infrastructure. In one embodiment, data relating to resources of a network infrastructure is collected. An analytics model is selected based on a type of the collected data. The selected analytics model is executed to classify a resource unproductive or productive, and to assign a corresponding confidence level. An action plan for each confidence level is determined and the action plan is executed for the resource. The collected data may include resource utilization information, hypervisor information, cloud related meta-data, user knowledge and system knowledge. When data is only resource data, a resource mining model is selected. When the data includes reference data, a reference mining model is selected. When the data comprises reference data and resource data, a reference mining model is selected.1. A method for collecting unproductive resources in a network infrastructure, the method comprising: collecting data relating to resources of a network infrastructure; selecting an analytics model based on a type of the collected data; executing the selected analytics model to classify a resource as one of unproductive and productive and to assign a corresponding confidence level; determining an action plan for each confidence level; and executing the action plan for the resource. 2. The method of claim 1, wherein the collected data comprises at least one of resource utilization information, hypervisor information, cloud related meta-data, user knowledge and system knowledge. 3. The method of claim 1, wherein the data type comprises only resource data, the selected analytics model is a resource mining model. 4. The method of claim 1, wherein the data type comprises reference data, the selected analytics model is a reference mining model. 5. The method of claim 4, wherein the reference mining model: generates a reference graph of resources within the network infrastructure; assigns a weight to each edge of the reference graph based on a set of heuristic rules; and determines the confidence level for each resource based on reachability. 6. The method of claim 1, wherein the data type comprises reference data and resource data, the selected analytics model is a reference mining model. 7. The method of claim 6, wherein the combined mining model: generates a reference graph of resources within the network infrastructure; assigns a weight to each edge of the reference graph based on a set of heuristic rules; classifies each resource as one of unproductive and productive with a corresponding confidence level for each resource based on reachability; reclassifies each resource as one of unproductive and productive with a corresponding probability level based on resource utilization; and modifies the confidence level based on the reclassification and corresponding probability level. 8. The method of claim 7, wherein a resource is originally classified as productive, the method further comprises ignoring the reclassification. 9. The method of claim 7, wherein a resource is originally classified as unproductive the method further comprises downgrading the confidence level when the resource is reclassified as productive. 10. The method of claim 7, wherein a resource is originally classified as unproductive the method further comprises upgrading the confidence level when the resource is reclassified as unproductive. 11. The method of claim 1, wherein the action plan includes at least one of: notifying a user that a resource is unproductive, suspending the resource, decommissioning the resource and reallocating the resource. 12. An information processing system for collecting unproductive resources in a network infrastructure, the information processing system comprising a memory; a processor operably coupled to the memory; and an enterprise garbage collector operably coupled to the memory and the processor, the enterprise garbage collector configured to perform a method comprising: collecting data relating to resources of a network infrastructure; selecting an analytics model based on a type of the collected data; executing the selected analytics model to classify a resource as one of unproductive and productive and to assign a corresponding confidence level; determining an action plan for each confidence level; and executing the action plan for the resource. 13. The information processing system of claim 12, wherein the collected data comprises at least one of resource utilization information, hypervisor information, cloud related meta-data, user knowledge and system knowledge. 14. The information processing system of claim 12, wherein the data type comprises reference data, the selected analytics model is a reference mining model. 15. The information processing system of claim 14, wherein the reference mining model: generates a reference graph of resources within the network infrastructure; assigns a weight to each edge of the reference graph based on a set of heuristic rules; and determines the confidence level for each resource based on reachability. 16. The information processing system of claim 12, wherein the data type comprises reference data and resource data, the selected analytics model is a reference mining model. 17. The information processing system of claim 16, wherein the combined mining model: generates a reference graph of resources within the network infrastructure; assigns a weight to each edge of the reference graph based on a set of heuristic rules; classifies each resource as one of unproductive and productive with a corresponding confidence level for each resource based on reachability; reclassifies each resource as one of unproductive and productive with a corresponding probability level based on resource utilization; and modifies the confidence level based on the reclassification and corresponding probability level. 18. The information processing system of claim 17, wherein a resource is originally classified as productive, the method further comprises ignoring the reclassification. 19. The information processing system of claim 17, wherein a resource is originally classified as unproductive the method further comprises downgrading the confidence level when the resource is reclassified as productive. 20. A computer program product for collecting unproductive resources in a network infrastructure, the computer program product comprising: a storage medium readable by a processing circuit and storing instructions for execution by the processing circuit for performing a method comprising: collecting data relating to resources of a network infrastructure; selecting an analytics model based on a type of the collected data; executing the selected analytics model to classify a resource as one of unproductive and productive and to assign a corresponding confidence level; determining an action plan for each confidence level; and executing the action plan for the resource.
2,400
7,835
7,835
15,455,411
2,422
A controlling device is automatically configured to issue a communication directly to a first controllable appliance to control a functional operation of the first controllable appliance in the event that the first controllable appliance is determined to be unresponsive to a command communication transmitted to the first controllable appliance via a digital communications link or to issue a communication to a second controllable appliance to control the functional operation of the first controllable appliance via a digital communications link in the event that first controllable appliance is determined to be responsive to a command communication transmitted to the first controllable appliance via a digital communications link.
1. A method for configuring a controlling device, comprising: receiving at the controlling device from a first controllable appliance data indicative of a communications port of a second controllable appliance to which the first controllable appliance is communicatively coupled; using by the controlling device the data to configure an input element of the controlling device whereupon a subsequent activation of the input element of the controlling device will cause the controlling device to transmit to the second controllable appliance a command for causing the second controllable appliance to make active the communications port of the second controllable appliance to which the first controllable appliance is communicatively coupled. 2. The method as recited in claim 1, wherein the first controllable appliance obtains the data from the second controllable appliance via use of a HDMI communications coupling between the first controllable appliance and the second controllable appliance. 3. The method as recited in claim 2, wherein the data comprises EDID data which indicates which HDMI communications port of the second controllable appliance is being used to exchange communications with the first controllable appliance. 4. The method as recited in claim 2, wherein the data is obtained from the second controllable appliance via use of a CEC query issued from the first controllable appliance to the second controllable appliance via the HDMI communications coupling. 5. The method as recited in claim 1, wherein activation of the input element of the controlling device will also cause the controlling device to place itself into an operating mode suitable for controlling functional operations of the first controllable appliance. 6. The method as recited in claim 5, wherein the first controllable appliance comprises a media source device and wherein the second controllable appliance comprises a media sink device. 7. The method as recited in claim 6, wherein the media source device comprises a set top box device and the media sink device comprises a television. 8. The method as recited in claim 6, wherein the media source device comprises a removeable media playing device and the media sink device comprises a television.
A controlling device is automatically configured to issue a communication directly to a first controllable appliance to control a functional operation of the first controllable appliance in the event that the first controllable appliance is determined to be unresponsive to a command communication transmitted to the first controllable appliance via a digital communications link or to issue a communication to a second controllable appliance to control the functional operation of the first controllable appliance via a digital communications link in the event that first controllable appliance is determined to be responsive to a command communication transmitted to the first controllable appliance via a digital communications link.1. A method for configuring a controlling device, comprising: receiving at the controlling device from a first controllable appliance data indicative of a communications port of a second controllable appliance to which the first controllable appliance is communicatively coupled; using by the controlling device the data to configure an input element of the controlling device whereupon a subsequent activation of the input element of the controlling device will cause the controlling device to transmit to the second controllable appliance a command for causing the second controllable appliance to make active the communications port of the second controllable appliance to which the first controllable appliance is communicatively coupled. 2. The method as recited in claim 1, wherein the first controllable appliance obtains the data from the second controllable appliance via use of a HDMI communications coupling between the first controllable appliance and the second controllable appliance. 3. The method as recited in claim 2, wherein the data comprises EDID data which indicates which HDMI communications port of the second controllable appliance is being used to exchange communications with the first controllable appliance. 4. The method as recited in claim 2, wherein the data is obtained from the second controllable appliance via use of a CEC query issued from the first controllable appliance to the second controllable appliance via the HDMI communications coupling. 5. The method as recited in claim 1, wherein activation of the input element of the controlling device will also cause the controlling device to place itself into an operating mode suitable for controlling functional operations of the first controllable appliance. 6. The method as recited in claim 5, wherein the first controllable appliance comprises a media source device and wherein the second controllable appliance comprises a media sink device. 7. The method as recited in claim 6, wherein the media source device comprises a set top box device and the media sink device comprises a television. 8. The method as recited in claim 6, wherein the media source device comprises a removeable media playing device and the media sink device comprises a television.
2,400
7,836
7,836
15,145,460
2,439
The present disclosure generally discloses an Internet security mechanism configured to provide security for Internet resources of the Internet using an Internet blockchain. The Internet blockchain may be configured to provide security for Internet resources of the Internet by supporting various types of verification related to Internet resources of the Internet, which may include verification of Internet resource ownership, verification of Internet resource transactions, and so forth. The Internet blockchain may be configured to enable Internet participants (e.g., Internet registries, Domain Name Service (DNS) entities, Autonomous Systems (ASes), or the like) to verify Internet resource ownership of Internet resources (e.g., Internet Protocol (IP) addresses, AS numbers, IP prefixes, DNS domain names, or the like) by Internet participants, to verify Internet resource transactions (e.g., allocation of IP addresses, allocation of AS numbers, advertisements of IP prefixes, allocation of DNS domain names, or the like) attempted by Internet participants, and so forth.
1. An apparatus, comprising: a processor and a memory communicatively connected to the processor, the processor configured to: generate an Internet resource transaction for an Internet resource, the Internet resource transaction indicating an allocation of the Internet resource from a first Internet participant to a second Internet participant; broadcast the Internet resource transaction via a peer-to-peer system; receive, via the peer-to-peer system, an Internet resource block including the Internet resource transaction; and associate the Internet resource block with an Internet blockchain. 2. The apparatus of claim 1, wherein the Internet resource transaction comprises a transaction input comprising a reference to a previous Internet resource transaction for the Internet resource and a digital signature based on a private key of the first Internet participant, wherein the Internet resource transaction comprises a transaction output comprising a public key of the second Internet participant or a shortened version of the public key of the second Internet participant. 3. The apparatus of claim 1, wherein the Internet resource transaction comprises a transaction input comprising a reference to a previous Internet resource transaction for the Internet resource that identifies an Internet blockchain address of the first Internet participant and a verification of the Internet blockchain address of the first Internet participant, wherein the Internet resource transaction comprises a transaction output comprising an Internet blockchain address of the second Internet participant. 4. The apparatus of claim 1, wherein the Internet resource comprises an Internet Protocol (IP) address, an Autonomous System (AS) number, an IP prefix, or a Domain Name Service (DNS) name. 5. The apparatus of claim 1, wherein the Internet resource transaction comprises an allocation of an Internet Protocol (IP) address, an allocation of an Autonomous System (AS) number, an advertisement of an IP prefix, or an allocation of a Domain Name Service (DNS) domain name. 6. The apparatus of claim 1, wherein the Internet resource comprises an Internet Protocol (IP) address, wherein the Internet resource transaction comprises an allocation of the IP address, wherein the first Internet participant comprises an Internet registry entity and the second Internet participant comprises an Autonomous System (AS) entity. 7. The apparatus of claim 1, wherein the Internet resource comprises an Autonomous System (AS) number, wherein the Internet resource transaction comprises an allocation of the AS number, wherein the first Internet participant comprises an Internet registry entity and the second Internet participant comprises an Autonomous System (AS) entity. 8. The apparatus of claim 1, wherein the Internet resource comprises an Internet Protocol (IP) prefix, wherein the Internet resource transaction comprises an IP prefix advertisement. 9. The apparatus of claim 8, wherein the first Internet participant comprises an Internet registry entity and the second Internet participant comprises an Autonomous System (AS) entity. 10. The apparatus of claim 8, wherein the IP prefix advertisement is generated based on a determination to advertise an AS-Path in a Border Gateway Protocol (BGP) Update message. 11. The apparatus of claim 1, wherein the Internet resource comprises a Domain Name Service (DNS) domain name, wherein the Internet resource transaction comprises an allocation of the DNS domain name. 12. The apparatus of claim 1, wherein the Internet resource transaction is for a lease of the Internet resource, wherein the lease of the Internet resource has a lease expiry associated therewith, wherein the processor is configured to: generate a reverse Internet resource transaction for the Internet resource, the reverse Internet resource transaction indicating an allocation of the Internet resource from the second Internet participant to the first Internet participant, the reverse Internet resource transaction configured to take effect at or after the lease expiry of the lease of the Internet resource. 13. The apparatus of claim 12, wherein the processor is configured to: based on a determination that the lease of the Internet resource is renewed, before the lease expiry of the lease of the Internet resource, to provide thereby a new lease of the Internet resource having a new lease expiry associated therewith: generate a new reverse Internet resource transaction for the Internet resource, the new reverse Internet resource transaction indicating an allocation of the Internet resource from the second Internet participant to the first Internet participant, the new reverse Internet resource transaction configured to take effect at or after the new lease expiry of the new lease of the Internet resource. 14. The apparatus of claim 13, wherein the reverse Internet resource transaction has associated therewith a first sequence number, wherein the new reverse Internet resource transaction has associated therewith a second sequence number greater than the first sequence number. 15. The apparatus of claim 12, wherein the processor is configured to: based on a determination that the lease of the Internet resource is not renewed before the lease expiry of the lease of the Internet resource, broadcast the reverse Internet resource transaction via the peer-to-peer system. 16. The apparatus of claim 1, wherein the Internet resource transaction includes a transfer tag, wherein the processor is configured to: set the transfer tag of the Internet resource transaction to a first state to indicate that a further allocation of the Internet resource by the second Internet participant is permitted or set the transfer tag of the Internet resource transaction to a second state to indicate that a further allocation of the Internet resource by the second Internet participant is not permitted. 17. The apparatus of claim 1, wherein the processor is configured to: receive, via the peer-to-peer system, a second Internet resource transaction for a second Internet resource, the second Internet resource transaction indicating an allocation of the second Internet resource from a third Internet participant to a fourth Internet participant; verify the second Internet resource transaction for the second Internet resource; add the second Internet resource transaction to a second Internet resource block based on verification of the second Internet resource transaction for the second Internet resource; and broadcast the second Internet resource block via the peer-to-peer system. 18. The apparatus of claim 1, wherein the apparatus comprises a device of an Internet registry, a device of an Autonomous System, a network device, or an end device. 19. A method, comprising: generating an Internet resource transaction for an Internet resource, the Internet resource transaction indicating an allocation of the Internet resource from a first Internet participant to a second Internet participant; broadcasting the Internet resource transaction via a peer-to-peer system; receiving, via the peer-to-peer system, an Internet resource block including the Internet resource transaction; and associating the Internet resource block with an Internet blockchain. 20. An apparatus, comprising: a processor and a memory communicatively connected to the processor, the processor configured to: receive, via a peer-to-peer system, an Internet resource transaction for an Internet resource, the Internet resource transaction indicating an allocation of the Internet resource from a first Internet participant to a second Internet participant; verify the Internet resource transaction for the Internet resource; add the Internet resource transaction to an Internet resource block based on verification of the Internet resource transaction for the Internet resource; and broadcast the Internet resource block via the peer-to-peer system.
The present disclosure generally discloses an Internet security mechanism configured to provide security for Internet resources of the Internet using an Internet blockchain. The Internet blockchain may be configured to provide security for Internet resources of the Internet by supporting various types of verification related to Internet resources of the Internet, which may include verification of Internet resource ownership, verification of Internet resource transactions, and so forth. The Internet blockchain may be configured to enable Internet participants (e.g., Internet registries, Domain Name Service (DNS) entities, Autonomous Systems (ASes), or the like) to verify Internet resource ownership of Internet resources (e.g., Internet Protocol (IP) addresses, AS numbers, IP prefixes, DNS domain names, or the like) by Internet participants, to verify Internet resource transactions (e.g., allocation of IP addresses, allocation of AS numbers, advertisements of IP prefixes, allocation of DNS domain names, or the like) attempted by Internet participants, and so forth.1. An apparatus, comprising: a processor and a memory communicatively connected to the processor, the processor configured to: generate an Internet resource transaction for an Internet resource, the Internet resource transaction indicating an allocation of the Internet resource from a first Internet participant to a second Internet participant; broadcast the Internet resource transaction via a peer-to-peer system; receive, via the peer-to-peer system, an Internet resource block including the Internet resource transaction; and associate the Internet resource block with an Internet blockchain. 2. The apparatus of claim 1, wherein the Internet resource transaction comprises a transaction input comprising a reference to a previous Internet resource transaction for the Internet resource and a digital signature based on a private key of the first Internet participant, wherein the Internet resource transaction comprises a transaction output comprising a public key of the second Internet participant or a shortened version of the public key of the second Internet participant. 3. The apparatus of claim 1, wherein the Internet resource transaction comprises a transaction input comprising a reference to a previous Internet resource transaction for the Internet resource that identifies an Internet blockchain address of the first Internet participant and a verification of the Internet blockchain address of the first Internet participant, wherein the Internet resource transaction comprises a transaction output comprising an Internet blockchain address of the second Internet participant. 4. The apparatus of claim 1, wherein the Internet resource comprises an Internet Protocol (IP) address, an Autonomous System (AS) number, an IP prefix, or a Domain Name Service (DNS) name. 5. The apparatus of claim 1, wherein the Internet resource transaction comprises an allocation of an Internet Protocol (IP) address, an allocation of an Autonomous System (AS) number, an advertisement of an IP prefix, or an allocation of a Domain Name Service (DNS) domain name. 6. The apparatus of claim 1, wherein the Internet resource comprises an Internet Protocol (IP) address, wherein the Internet resource transaction comprises an allocation of the IP address, wherein the first Internet participant comprises an Internet registry entity and the second Internet participant comprises an Autonomous System (AS) entity. 7. The apparatus of claim 1, wherein the Internet resource comprises an Autonomous System (AS) number, wherein the Internet resource transaction comprises an allocation of the AS number, wherein the first Internet participant comprises an Internet registry entity and the second Internet participant comprises an Autonomous System (AS) entity. 8. The apparatus of claim 1, wherein the Internet resource comprises an Internet Protocol (IP) prefix, wherein the Internet resource transaction comprises an IP prefix advertisement. 9. The apparatus of claim 8, wherein the first Internet participant comprises an Internet registry entity and the second Internet participant comprises an Autonomous System (AS) entity. 10. The apparatus of claim 8, wherein the IP prefix advertisement is generated based on a determination to advertise an AS-Path in a Border Gateway Protocol (BGP) Update message. 11. The apparatus of claim 1, wherein the Internet resource comprises a Domain Name Service (DNS) domain name, wherein the Internet resource transaction comprises an allocation of the DNS domain name. 12. The apparatus of claim 1, wherein the Internet resource transaction is for a lease of the Internet resource, wherein the lease of the Internet resource has a lease expiry associated therewith, wherein the processor is configured to: generate a reverse Internet resource transaction for the Internet resource, the reverse Internet resource transaction indicating an allocation of the Internet resource from the second Internet participant to the first Internet participant, the reverse Internet resource transaction configured to take effect at or after the lease expiry of the lease of the Internet resource. 13. The apparatus of claim 12, wherein the processor is configured to: based on a determination that the lease of the Internet resource is renewed, before the lease expiry of the lease of the Internet resource, to provide thereby a new lease of the Internet resource having a new lease expiry associated therewith: generate a new reverse Internet resource transaction for the Internet resource, the new reverse Internet resource transaction indicating an allocation of the Internet resource from the second Internet participant to the first Internet participant, the new reverse Internet resource transaction configured to take effect at or after the new lease expiry of the new lease of the Internet resource. 14. The apparatus of claim 13, wherein the reverse Internet resource transaction has associated therewith a first sequence number, wherein the new reverse Internet resource transaction has associated therewith a second sequence number greater than the first sequence number. 15. The apparatus of claim 12, wherein the processor is configured to: based on a determination that the lease of the Internet resource is not renewed before the lease expiry of the lease of the Internet resource, broadcast the reverse Internet resource transaction via the peer-to-peer system. 16. The apparatus of claim 1, wherein the Internet resource transaction includes a transfer tag, wherein the processor is configured to: set the transfer tag of the Internet resource transaction to a first state to indicate that a further allocation of the Internet resource by the second Internet participant is permitted or set the transfer tag of the Internet resource transaction to a second state to indicate that a further allocation of the Internet resource by the second Internet participant is not permitted. 17. The apparatus of claim 1, wherein the processor is configured to: receive, via the peer-to-peer system, a second Internet resource transaction for a second Internet resource, the second Internet resource transaction indicating an allocation of the second Internet resource from a third Internet participant to a fourth Internet participant; verify the second Internet resource transaction for the second Internet resource; add the second Internet resource transaction to a second Internet resource block based on verification of the second Internet resource transaction for the second Internet resource; and broadcast the second Internet resource block via the peer-to-peer system. 18. The apparatus of claim 1, wherein the apparatus comprises a device of an Internet registry, a device of an Autonomous System, a network device, or an end device. 19. A method, comprising: generating an Internet resource transaction for an Internet resource, the Internet resource transaction indicating an allocation of the Internet resource from a first Internet participant to a second Internet participant; broadcasting the Internet resource transaction via a peer-to-peer system; receiving, via the peer-to-peer system, an Internet resource block including the Internet resource transaction; and associating the Internet resource block with an Internet blockchain. 20. An apparatus, comprising: a processor and a memory communicatively connected to the processor, the processor configured to: receive, via a peer-to-peer system, an Internet resource transaction for an Internet resource, the Internet resource transaction indicating an allocation of the Internet resource from a first Internet participant to a second Internet participant; verify the Internet resource transaction for the Internet resource; add the Internet resource transaction to an Internet resource block based on verification of the Internet resource transaction for the Internet resource; and broadcast the Internet resource block via the peer-to-peer system.
2,400
7,837
7,837
13,582,878
2,486
A system for verifying medication doses m a filled medication package comprises an imaging unit to produce at least one image of a filled medication package and a verification unit for receiving the image of the filled medication package. The verification unit comprises a dose locator to determine from the image a location of any dose m the filled medication package, and associate a time period to the location. It also comprises a dose verifier to verify an identity of any dose from the visual characteristics of the image as a function of dose reference profiles. The verification unit compares an identity and time period of the doses of the filled medication package to a prescription and has an interface for producing verification output based on the comparison of the verification unit. A method for verifying medication doses m a filled medication package is also provided.
1. A system for verifying medication doses in a filled medication package, comprising an imaging unit to produce at least one image of a filled medication package; a verification unit for receiving the image of the filled medication package, and comprising: a dose locator to determine from the image a location of any dose in the filled medication package, and associate a time period to the location; a dose verifier to verify an identity of any dose from the visual characteristics of the image as a function of dose reference profiles, whereby the verification unit compares an identity and time period of the doses of the filled medication package to a prescription; and an interface for producing verification output based on the comparison of the verification unit. 2. The system according to claim 1, further comprising a visual characteristics database providing the dose reference profiles to the dose verifier. 3. The system according to claim 1, wherein the dose reference profiles comprise visual characteristics in the form of at least one of an outline, a geometry, pattern, color data, marking, code pertaining to a specific dose. 4. The system according to claim 3, wherein the dose reference profiles further comprise data pertaining to at least one of a name, a reference number, a posology of the specific dose. 5. The system according to claim 1, wherein the verification unit comprises a scan reader for at least one of providing dose location data to the dose locator, and for identifying a dose. 6. The system according to claim 1, further comprising a patient prescription database for providing prescription profiles, and further wherein the dose verifier compares the filled medication package to a prescription profile for an identified patient. 7. The system according to claim 6, wherein the verification unit obtains the dose reference profile related to the prescription, and further wherein the dose verifier verifies the identity of any dose by comparing the dose to the obtained dose reference profile. 8. The system according to claim 1, further comprising an image database for storing the image for the prescription. 9. The system according to claim 1, wherein the imaging unit comprises actuators to displace a camera to produce multiple images of the filled medication package. 10. The system according to claim 9, wherein the imaging unit provides coordinates of the camera for each of the multiple images, and wherein the dose locator determines from the coordinates the intake period for doses in the images. 11. A method for verifying medication doses in a filled medication package as a function of a prescription, comprising: obtaining at least one image of the filled medication package; determining an intake period of at least one dose from the at least one image; identifying the at least one dose using visual characteristics of the dose from the image in comparison with dose reference profiles; comparing the identity and the intake period of the at least one dose with a prescription; and outputting data related to the comparing. 12. The method according to claim 11, wherein obtaining at least one image comprises obtaining at least two images and creating at least one of a three-dimensional image and a mosaic for subsequent steps. 13. The method according to claim 11, wherein determining the intake period comprises identifying a compartment of the dose in the filled medication package and associating a day and hour value to the compartment. 14. The method according to claim 11, wherein determining the intake period comprises reading location data related to a compartment of the dose in the filled medication package. 15. The method according to claim 11, further comprising obtaining a patient posologic profile related to the prescription, and wherein comparing comprises comparing the identity and the intake period of the at least one dose with the patient posologic profile. 16. The method according to claim 15, further comprising obtaining dose reference profiles for medication indicated in the patient posologic profile, and wherein identifying the at least one dose from the image comprises comparing the visual characteristics of the dose with data of the obtained dose reference profiles. 17. The method according to claim 11, further comprising storing the at least one image with the prescription. 18. The method according to claim 11, wherein outputting data comprises indicating to an operator an error requiring additional verification. 19. The method according to claim 11, wherein obtaining at least one image of the filled medication package comprises obtaining coordinates of a camera producing the image, and wherein determining an intake period comprises determining the intake period using the coordinates.
A system for verifying medication doses m a filled medication package comprises an imaging unit to produce at least one image of a filled medication package and a verification unit for receiving the image of the filled medication package. The verification unit comprises a dose locator to determine from the image a location of any dose m the filled medication package, and associate a time period to the location. It also comprises a dose verifier to verify an identity of any dose from the visual characteristics of the image as a function of dose reference profiles. The verification unit compares an identity and time period of the doses of the filled medication package to a prescription and has an interface for producing verification output based on the comparison of the verification unit. A method for verifying medication doses m a filled medication package is also provided.1. A system for verifying medication doses in a filled medication package, comprising an imaging unit to produce at least one image of a filled medication package; a verification unit for receiving the image of the filled medication package, and comprising: a dose locator to determine from the image a location of any dose in the filled medication package, and associate a time period to the location; a dose verifier to verify an identity of any dose from the visual characteristics of the image as a function of dose reference profiles, whereby the verification unit compares an identity and time period of the doses of the filled medication package to a prescription; and an interface for producing verification output based on the comparison of the verification unit. 2. The system according to claim 1, further comprising a visual characteristics database providing the dose reference profiles to the dose verifier. 3. The system according to claim 1, wherein the dose reference profiles comprise visual characteristics in the form of at least one of an outline, a geometry, pattern, color data, marking, code pertaining to a specific dose. 4. The system according to claim 3, wherein the dose reference profiles further comprise data pertaining to at least one of a name, a reference number, a posology of the specific dose. 5. The system according to claim 1, wherein the verification unit comprises a scan reader for at least one of providing dose location data to the dose locator, and for identifying a dose. 6. The system according to claim 1, further comprising a patient prescription database for providing prescription profiles, and further wherein the dose verifier compares the filled medication package to a prescription profile for an identified patient. 7. The system according to claim 6, wherein the verification unit obtains the dose reference profile related to the prescription, and further wherein the dose verifier verifies the identity of any dose by comparing the dose to the obtained dose reference profile. 8. The system according to claim 1, further comprising an image database for storing the image for the prescription. 9. The system according to claim 1, wherein the imaging unit comprises actuators to displace a camera to produce multiple images of the filled medication package. 10. The system according to claim 9, wherein the imaging unit provides coordinates of the camera for each of the multiple images, and wherein the dose locator determines from the coordinates the intake period for doses in the images. 11. A method for verifying medication doses in a filled medication package as a function of a prescription, comprising: obtaining at least one image of the filled medication package; determining an intake period of at least one dose from the at least one image; identifying the at least one dose using visual characteristics of the dose from the image in comparison with dose reference profiles; comparing the identity and the intake period of the at least one dose with a prescription; and outputting data related to the comparing. 12. The method according to claim 11, wherein obtaining at least one image comprises obtaining at least two images and creating at least one of a three-dimensional image and a mosaic for subsequent steps. 13. The method according to claim 11, wherein determining the intake period comprises identifying a compartment of the dose in the filled medication package and associating a day and hour value to the compartment. 14. The method according to claim 11, wherein determining the intake period comprises reading location data related to a compartment of the dose in the filled medication package. 15. The method according to claim 11, further comprising obtaining a patient posologic profile related to the prescription, and wherein comparing comprises comparing the identity and the intake period of the at least one dose with the patient posologic profile. 16. The method according to claim 15, further comprising obtaining dose reference profiles for medication indicated in the patient posologic profile, and wherein identifying the at least one dose from the image comprises comparing the visual characteristics of the dose with data of the obtained dose reference profiles. 17. The method according to claim 11, further comprising storing the at least one image with the prescription. 18. The method according to claim 11, wherein outputting data comprises indicating to an operator an error requiring additional verification. 19. The method according to claim 11, wherein obtaining at least one image of the filled medication package comprises obtaining coordinates of a camera producing the image, and wherein determining an intake period comprises determining the intake period using the coordinates.
2,400
7,838
7,838
15,234,618
2,494
A method includes receiving an incoming biometric identification request on a first device from a user. First location data for the first device is determined. Second location data associated with at least one previous biometric identification request associated with the user is retrieved. A second level identification request is selectively initiated on the first device based on at least the first and second location data. A device includes a location module to determine first location data for the device, a biometric sensor to generate an incoming biometric identification request from a user, and a processor to retrieve second location data associated with at least one previous biometric identification request associated with the user and selectively initiate a second level identification request on the device based on at least the first and second location data.
1. A method, comprising: receiving an incoming biometric identification request on a first device from a user; determining first location data for the first device; retrieving second location data associated with at least one previous biometric identification request associated with the user; and selectively initiating a second level identification request on the first device based on at least the first and second location data. 2. The method of claim 1, further comprising accessing a library of identification verification entries associated with the user, each identification verification entry including at least time data and location data. 3. The method of claim 2, wherein each identification verification entry further includes device identity. 4. The method of claim 2, further comprising: determining a usage pattern of the user based on the library; and requiring the second level of identity verification responsive to the incoming biometric identification request diverging from the usage pattern. 5. The method of claim 4, further comprising requiring the second level of identity verification responsive to determining that time data associated with the incoming biometric identification request diverges from the usage pattern. 6. The method of claim 4, further comprising requiring the second level of identity verification responsive to determining that the first location data associated with the incoming biometric identification request diverges from the usage pattern. 7. The method of claim 1, wherein the previous biometric identification request is associated with a second device other than the first device. 8. The method of claim 1, further comprising: determining a time interval between the incoming biometric identification request and the previous biometric identification request; estimating a travel time based on the first and second location data; and selectively initiating the second level identification request on the first device responsive to the estimated travel time exceeding the time interval. 9. The method of claim 8, further comprising estimating the travel time using transportation schedule data. 10. The method of claim 1, further comprising: accessing a library of identification verification entries associated with the user, each identification verification entry including at least time data, location data, and device identity data; determining a time interval between the incoming biometric identification request and a selected subset of the identification verification entries, each identification verification entry in the subset having different device identity data; estimating a travel time for each of the identification verification entries in the subset based on the first location data and the location data for each of the identification verification entries in the subset; and selectively initiating the second level identification request on the first device responsive to any of the estimated travel times exceeding the time interval. 11. A device, comprising: a location module to determine first location data for the device; a biometric sensor to generate an incoming biometric identification request from a user; and a processor to retrieve second location data associated with at least one previous biometric identification request associated with the user and selectively initiate a second level identification request on the device based on at least the first and second location data. 12. The device of claim 11, wherein the processor is to access a library of identification verification entries associated with the user, each identification verification entry including at least time data and location data. 13. The device of claim 12, wherein each identification verification entry further includes device identity. 14. The device of claim 11, wherein the processor is to determine a usage pattern of the user based on the library, and require the second level of identity verification responsive to the incoming biometric identification request diverging from the usage pattern. 15. The device of claim 14, wherein the processor is to require the second level of identity verification responsive to determining that time data associated with the incoming biometric identification request diverges from the usage pattern. 16. The device of claim 14, wherein the processor is to require the second level of identity verification responsive to determining that the first location data associated with the incoming biometric identification request diverges from the usage pattern. 17. The device of claim 11, wherein the previous biometric identification request is associated with a second device other than the device. 18. The device of claim 11, wherein the processor is to determine a time interval between the incoming biometric identification request and the previous biometric identification request, estimate a travel time based on the first and second location data, and selectively initiate the second level identification request on the device responsive to the estimated travel time exceeding the time interval. 19. The device of claim 18, wherein the processor is to estimate the travel time using transportation schedule data. 20. The device of claim 11, wherein the processor is to access a library of identification verification entries associated with the user, each identification verification entry including at least time data, location data, and device identity data, determine a time interval between the incoming biometric identification request and a selected subset of the identification verification entries, each identification verification entry in the subset having different device identity data, estimate a travel time for each of the identification verification entries in the subset based on the first location data and the location data for each of the identification verification entries in the subset, and selectively initiate the second level identification request on the device responsive to any of the estimated travel times exceeding the time interval.
A method includes receiving an incoming biometric identification request on a first device from a user. First location data for the first device is determined. Second location data associated with at least one previous biometric identification request associated with the user is retrieved. A second level identification request is selectively initiated on the first device based on at least the first and second location data. A device includes a location module to determine first location data for the device, a biometric sensor to generate an incoming biometric identification request from a user, and a processor to retrieve second location data associated with at least one previous biometric identification request associated with the user and selectively initiate a second level identification request on the device based on at least the first and second location data.1. A method, comprising: receiving an incoming biometric identification request on a first device from a user; determining first location data for the first device; retrieving second location data associated with at least one previous biometric identification request associated with the user; and selectively initiating a second level identification request on the first device based on at least the first and second location data. 2. The method of claim 1, further comprising accessing a library of identification verification entries associated with the user, each identification verification entry including at least time data and location data. 3. The method of claim 2, wherein each identification verification entry further includes device identity. 4. The method of claim 2, further comprising: determining a usage pattern of the user based on the library; and requiring the second level of identity verification responsive to the incoming biometric identification request diverging from the usage pattern. 5. The method of claim 4, further comprising requiring the second level of identity verification responsive to determining that time data associated with the incoming biometric identification request diverges from the usage pattern. 6. The method of claim 4, further comprising requiring the second level of identity verification responsive to determining that the first location data associated with the incoming biometric identification request diverges from the usage pattern. 7. The method of claim 1, wherein the previous biometric identification request is associated with a second device other than the first device. 8. The method of claim 1, further comprising: determining a time interval between the incoming biometric identification request and the previous biometric identification request; estimating a travel time based on the first and second location data; and selectively initiating the second level identification request on the first device responsive to the estimated travel time exceeding the time interval. 9. The method of claim 8, further comprising estimating the travel time using transportation schedule data. 10. The method of claim 1, further comprising: accessing a library of identification verification entries associated with the user, each identification verification entry including at least time data, location data, and device identity data; determining a time interval between the incoming biometric identification request and a selected subset of the identification verification entries, each identification verification entry in the subset having different device identity data; estimating a travel time for each of the identification verification entries in the subset based on the first location data and the location data for each of the identification verification entries in the subset; and selectively initiating the second level identification request on the first device responsive to any of the estimated travel times exceeding the time interval. 11. A device, comprising: a location module to determine first location data for the device; a biometric sensor to generate an incoming biometric identification request from a user; and a processor to retrieve second location data associated with at least one previous biometric identification request associated with the user and selectively initiate a second level identification request on the device based on at least the first and second location data. 12. The device of claim 11, wherein the processor is to access a library of identification verification entries associated with the user, each identification verification entry including at least time data and location data. 13. The device of claim 12, wherein each identification verification entry further includes device identity. 14. The device of claim 11, wherein the processor is to determine a usage pattern of the user based on the library, and require the second level of identity verification responsive to the incoming biometric identification request diverging from the usage pattern. 15. The device of claim 14, wherein the processor is to require the second level of identity verification responsive to determining that time data associated with the incoming biometric identification request diverges from the usage pattern. 16. The device of claim 14, wherein the processor is to require the second level of identity verification responsive to determining that the first location data associated with the incoming biometric identification request diverges from the usage pattern. 17. The device of claim 11, wherein the previous biometric identification request is associated with a second device other than the device. 18. The device of claim 11, wherein the processor is to determine a time interval between the incoming biometric identification request and the previous biometric identification request, estimate a travel time based on the first and second location data, and selectively initiate the second level identification request on the device responsive to the estimated travel time exceeding the time interval. 19. The device of claim 18, wherein the processor is to estimate the travel time using transportation schedule data. 20. The device of claim 11, wherein the processor is to access a library of identification verification entries associated with the user, each identification verification entry including at least time data, location data, and device identity data, determine a time interval between the incoming biometric identification request and a selected subset of the identification verification entries, each identification verification entry in the subset having different device identity data, estimate a travel time for each of the identification verification entries in the subset based on the first location data and the location data for each of the identification verification entries in the subset, and selectively initiate the second level identification request on the device responsive to any of the estimated travel times exceeding the time interval.
2,400
7,839
7,839
14,911,382
2,467
Techniques for configuring and using measurement gap patterns for offloading purposes are disclosed. An example method, performed in a network node of a wireless communication network, includes selecting ( 410 ) a measurement gap pattern to be used by the mobile terminal, the measurement gap pattern having a series of measurement gap bursts such that the measurement gap bursts are separated by a repetition period and each measurement gap burst comprises two or more measurement gaps, and signaling ( 420 ) the measurement gap pattern to the mobile terminal. In some embodiments, the repetition period is chosen so that the measurement gap pattern repetition period and the long-DRX cycle length in some embodiments are related to each other by an integer power of N.
1-38. (canceled) 39. A method, in a network node of a wireless communication network, for configuring measurements in a mobile terminal, the method comprising: selecting a measurement gap pattern to be used by the mobile terminal, the measurement gap pattern having a series of measurement gap bursts such that the measurement gap bursts are separated by a repetition period and each measurement gap burst comprises two or more measurement gaps; and signaling the measurement gap pattern to the mobile terminal. 40. The method of claim 39, wherein selecting the measurement gap pattern comprises selecting the repetition period or selecting a number of measurement gaps for each measurement gap burst, or both. 41. The method of claim 40, wherein selecting the repetition period or selecting a number of measurement gaps for each measurement gap burst, or both, is based on a cell capacity limit for a serving cell for the mobile terminal. 42. The method of claim 40, wherein selecting the repetition period or selecting a number of measurement gaps for each measurement gap burst, or both, is based on one or more of: a number of carrier frequencies on which the mobile terminal has to perform measurements; a type of measurement; a frequency of gaps in a burst; a type of DRX cycle; a length of DRX cycle; and radio channel conditions. 43. The method of claim 40, wherein selecting the measurement gap pattern comprises selecting the repetition period such that the selected repetition period is an integer multiple of a long-DRX cycle length for the mobile terminal. 44. The method of claim 43, wherein selecting the particular interval comprises selecting the repetition period such that a ratio of the selected repetition period to a long-DRX cycle length for the mobile terminal is an integer power of 2. 45. The method of claim 39, further comprising selecting a measurement gap pattern offset for the measurement gap pattern and signaling the measurement gap pattern offset to the mobile terminal, wherein selecting the measurement gap pattern offset comprises choosing the measurement gap pattern offset so that an initial measurement gap in a measurement gap burst is adjacent to or overlapping with an On-duration interval of a long-DRX cycle for the mobile terminal. 46. The method of claim 39, wherein signaling the measurement gap pattern to the mobile terminal comprises sending the mobile terminal an identifier corresponding to one of two or more predefined measurement patterns known to the mobile terminal. 47. The method of claim 39, wherein signaling the measurement gap pattern to the mobile terminal comprises sending the mobile terminal an indicator of one or more of the following: a number of gaps in a burst; a distance in time between measurement gaps in a burst; a repetition period between bursts; and a measurement gap offset. 48. The method of claim 39, the method further comprising receiving an indication from the mobile terminal, the indication from the mobile terminal indicating a recommended or required value for one or more of: a number of gaps in a burst, a distance in time between measurement gaps in a burst, a repetition period between bursts, and a measurement gap offset, wherein selecting the measurement gap pattern is based on the indication from the mobile terminal. 49. The method of claim 39, the method further comprising receiving a capability indication from the mobile terminal, the capability indication indicating that the mobile terminal is at least capable of performing one or more measurements using the measurement gap pattern having a series of measurement gap bursts such that the measurement gap bursts are separated by a repetition period and each measurement gap burst comprises two or more measurement gaps, wherein selecting the offloading measurement gap pattern and signaling the measurement gap pattern to the mobile terminal are in response to receiving the capability indication. 50. A method, in a mobile terminal operating in a wireless communication network and served by a first cell operating on a first carrier frequency, for performing measurements, the method comprising: receiving signaling indicating a measurement gap pattern to be used by the mobile terminal, the measurement gap pattern having a series of measurement gap bursts such that the measurement gap bursts are separated by a repetition period and each measurement gap burst comprises two or more measurement gaps; and performing one or more measurements on at least one cell on a second carrier frequency according to the signaled measurement gap pattern. 51. The method of claim 50, wherein the signaled measurement gap pattern has a repetition period that is an integer multiple of a long-DRX cycle length for the mobile terminal. 52. The method of claim 51, wherein a ratio of the repetition period to a long-DRX cycle length for the mobile terminal is an integer power of 2. 53. The method of claim 50, wherein receiving signaling indicating the measurement gap pattern comprises receiving an identifier corresponding to one of two or more predefined measurement patterns known to the mobile terminal. 54. The method of claim 50, wherein receiving signaling indicating the measurement gap pattern comprises receiving an indicator of one or more of the following: a number of gaps in a burst; a distance in time between measurement gaps in a burst; a repetition period between bursts; and a measurement gap offset. 55. The method of claim 50, the method further comprising first sending, to a network node in the wireless communication network, an indication, the indication indicating a recommended or required value for one or more of: a number of gaps in a burst, a distance in time between measurement gaps in a burst, a repetition period between bursts, and a measurement gap offset. 56. The method of claim 50, the method further comprising sending a capability indication to a network node in the wireless communication network, the capability indication indicating that the mobile terminal is at least capable of performing one or more measurements using the measurement gap pattern having a series of measurement gap bursts such that the measurement gap bursts are separated by a repetition period and each measurement gap burst comprises two or more measurement gaps. 57. The method of claim 50, wherein the measurements performed on at least one cell operating on the second carrier frequency are offloading measurements, and wherein the offloading measurements are performed by the UE regardless of the signal quality of measurements performed by the UE on the first cell. 58. A network node apparatus comprising a communications interface circuit configured to communicate with a mobile terminal or to communicate with one or more other network nodes, or configured to communicate with the mobile terminal and one or more other network nodes, and further comprising a processing circuit, wherein the processing circuit is configured to: select an measurement gap pattern to be used by the mobile terminal, the measurement gap pattern having a series of measurement gap bursts such that the measurement gap bursts are separated by a repetition period and each measurement gap burst comprises two or more measurement gaps; and signal the measurement gap pattern to the mobile terminal, either directly or via one or more other network nodes, using the communications interface circuit. 59. A mobile terminal configured for operation in a wireless communication network, the mobile terminal comprising a radio transceiver circuit configured to communicate with a radio network node in the wireless communication network and further comprising a processing circuit, wherein the processing circuit is configured to: receive signaling indicating an measurement gap pattern to be used by the mobile terminal, the measurement gap pattern having a series of measurement gap bursts such that the measurement gap bursts are separated by a repetition period and each measurement gap burst comprises two or more measurement gaps; and perform measurements according to the signaled measurement gap pattern.
Techniques for configuring and using measurement gap patterns for offloading purposes are disclosed. An example method, performed in a network node of a wireless communication network, includes selecting ( 410 ) a measurement gap pattern to be used by the mobile terminal, the measurement gap pattern having a series of measurement gap bursts such that the measurement gap bursts are separated by a repetition period and each measurement gap burst comprises two or more measurement gaps, and signaling ( 420 ) the measurement gap pattern to the mobile terminal. In some embodiments, the repetition period is chosen so that the measurement gap pattern repetition period and the long-DRX cycle length in some embodiments are related to each other by an integer power of N.1-38. (canceled) 39. A method, in a network node of a wireless communication network, for configuring measurements in a mobile terminal, the method comprising: selecting a measurement gap pattern to be used by the mobile terminal, the measurement gap pattern having a series of measurement gap bursts such that the measurement gap bursts are separated by a repetition period and each measurement gap burst comprises two or more measurement gaps; and signaling the measurement gap pattern to the mobile terminal. 40. The method of claim 39, wherein selecting the measurement gap pattern comprises selecting the repetition period or selecting a number of measurement gaps for each measurement gap burst, or both. 41. The method of claim 40, wherein selecting the repetition period or selecting a number of measurement gaps for each measurement gap burst, or both, is based on a cell capacity limit for a serving cell for the mobile terminal. 42. The method of claim 40, wherein selecting the repetition period or selecting a number of measurement gaps for each measurement gap burst, or both, is based on one or more of: a number of carrier frequencies on which the mobile terminal has to perform measurements; a type of measurement; a frequency of gaps in a burst; a type of DRX cycle; a length of DRX cycle; and radio channel conditions. 43. The method of claim 40, wherein selecting the measurement gap pattern comprises selecting the repetition period such that the selected repetition period is an integer multiple of a long-DRX cycle length for the mobile terminal. 44. The method of claim 43, wherein selecting the particular interval comprises selecting the repetition period such that a ratio of the selected repetition period to a long-DRX cycle length for the mobile terminal is an integer power of 2. 45. The method of claim 39, further comprising selecting a measurement gap pattern offset for the measurement gap pattern and signaling the measurement gap pattern offset to the mobile terminal, wherein selecting the measurement gap pattern offset comprises choosing the measurement gap pattern offset so that an initial measurement gap in a measurement gap burst is adjacent to or overlapping with an On-duration interval of a long-DRX cycle for the mobile terminal. 46. The method of claim 39, wherein signaling the measurement gap pattern to the mobile terminal comprises sending the mobile terminal an identifier corresponding to one of two or more predefined measurement patterns known to the mobile terminal. 47. The method of claim 39, wherein signaling the measurement gap pattern to the mobile terminal comprises sending the mobile terminal an indicator of one or more of the following: a number of gaps in a burst; a distance in time between measurement gaps in a burst; a repetition period between bursts; and a measurement gap offset. 48. The method of claim 39, the method further comprising receiving an indication from the mobile terminal, the indication from the mobile terminal indicating a recommended or required value for one or more of: a number of gaps in a burst, a distance in time between measurement gaps in a burst, a repetition period between bursts, and a measurement gap offset, wherein selecting the measurement gap pattern is based on the indication from the mobile terminal. 49. The method of claim 39, the method further comprising receiving a capability indication from the mobile terminal, the capability indication indicating that the mobile terminal is at least capable of performing one or more measurements using the measurement gap pattern having a series of measurement gap bursts such that the measurement gap bursts are separated by a repetition period and each measurement gap burst comprises two or more measurement gaps, wherein selecting the offloading measurement gap pattern and signaling the measurement gap pattern to the mobile terminal are in response to receiving the capability indication. 50. A method, in a mobile terminal operating in a wireless communication network and served by a first cell operating on a first carrier frequency, for performing measurements, the method comprising: receiving signaling indicating a measurement gap pattern to be used by the mobile terminal, the measurement gap pattern having a series of measurement gap bursts such that the measurement gap bursts are separated by a repetition period and each measurement gap burst comprises two or more measurement gaps; and performing one or more measurements on at least one cell on a second carrier frequency according to the signaled measurement gap pattern. 51. The method of claim 50, wherein the signaled measurement gap pattern has a repetition period that is an integer multiple of a long-DRX cycle length for the mobile terminal. 52. The method of claim 51, wherein a ratio of the repetition period to a long-DRX cycle length for the mobile terminal is an integer power of 2. 53. The method of claim 50, wherein receiving signaling indicating the measurement gap pattern comprises receiving an identifier corresponding to one of two or more predefined measurement patterns known to the mobile terminal. 54. The method of claim 50, wherein receiving signaling indicating the measurement gap pattern comprises receiving an indicator of one or more of the following: a number of gaps in a burst; a distance in time between measurement gaps in a burst; a repetition period between bursts; and a measurement gap offset. 55. The method of claim 50, the method further comprising first sending, to a network node in the wireless communication network, an indication, the indication indicating a recommended or required value for one or more of: a number of gaps in a burst, a distance in time between measurement gaps in a burst, a repetition period between bursts, and a measurement gap offset. 56. The method of claim 50, the method further comprising sending a capability indication to a network node in the wireless communication network, the capability indication indicating that the mobile terminal is at least capable of performing one or more measurements using the measurement gap pattern having a series of measurement gap bursts such that the measurement gap bursts are separated by a repetition period and each measurement gap burst comprises two or more measurement gaps. 57. The method of claim 50, wherein the measurements performed on at least one cell operating on the second carrier frequency are offloading measurements, and wherein the offloading measurements are performed by the UE regardless of the signal quality of measurements performed by the UE on the first cell. 58. A network node apparatus comprising a communications interface circuit configured to communicate with a mobile terminal or to communicate with one or more other network nodes, or configured to communicate with the mobile terminal and one or more other network nodes, and further comprising a processing circuit, wherein the processing circuit is configured to: select an measurement gap pattern to be used by the mobile terminal, the measurement gap pattern having a series of measurement gap bursts such that the measurement gap bursts are separated by a repetition period and each measurement gap burst comprises two or more measurement gaps; and signal the measurement gap pattern to the mobile terminal, either directly or via one or more other network nodes, using the communications interface circuit. 59. A mobile terminal configured for operation in a wireless communication network, the mobile terminal comprising a radio transceiver circuit configured to communicate with a radio network node in the wireless communication network and further comprising a processing circuit, wherein the processing circuit is configured to: receive signaling indicating an measurement gap pattern to be used by the mobile terminal, the measurement gap pattern having a series of measurement gap bursts such that the measurement gap bursts are separated by a repetition period and each measurement gap burst comprises two or more measurement gaps; and perform measurements according to the signaled measurement gap pattern.
2,400
7,840
7,840
13,579,085
2,462
A mobile station UE includes a measurement unit 102 configured to measure radio quality of a cell during communication or a neighboring cell for each of the two or more carriers, a determination unit 104 configured to determine whether to notify the radio base station eNB of a measurement result regarding each of the two or more carriers in the measurement unit 102, and a transmission unit 106 configured to transmit the measurement result in the measurement unit 102 to the radio base station eNB, wherein the transmission unit 106 transmits, in addition to the measurement result regarding a carrier in which it is determined by the determination unit 104 to notify the radio base station eNB of the measurement result in the measurement unit 102, a measurement result regarding a carrier other than the carrier.
1.-44. (canceled) 45. A mobile station capable of communicating with a radio base station using a carrier aggregation, comprising: a measurement unit configured to measure the radio quality of a cell during communication or a neighboring cell, regarding a carrier to be measured; a determination unit configured to determine a predetermined event, based on the measurement result in the measurement unit; and a transmission unit configured to transmit the measurement result regarding an event trigger cell determined by the determination unit that the predetermined event has been triggered, to the radio base station, wherein the transmission unit is configured to transmit, in addition to the measurement result regarding the event trigger cell, the measurement result regarding the cell during communication in the carrier where a carrier aggregation is performed. 46. A mobile station capable of communicating with a radio base station using a carrier aggregation, comprising: a measurement unit configured to measure the radio quality of a cell during communication or a neighboring cell, regarding a carrier to be measured; a determination unit configured to determine a predetermined event, based on the measurement result in the measurement unit; and a transmission unit configured to transmit the measurement result regarding an event trigger cell determined by the determination unit that the predetermined event has been triggered, to the radio base station, wherein the transmission unit is configured to transmit, in addition to the measurement result regarding the event trigger cell, the measurement result regarding a cell that is not during communication in a carrier other than a carrier of the event trigger cell. 47. A mobile station capable of communicating with a radio base station using a carrier aggregation, comprising: a measurement unit configured to measure the radio quality of a cell during communication or a neighboring cell, regarding a carrier to be measured; a determination unit configured to determine a predetermined event, based on the measurement result in the measurement unit; and a transmission unit configured to transmit the measurement result regarding an event trigger cell determined by the determination unit that the predetermined event has been triggered, to the radio base station, wherein the transmission unit is configured to transmit, in addition to the measurement result regarding the event trigger cell, the measurement result regarding a cell that is not during communication in a carrier other than a carrier of the event trigger cell and a cell having the optimal radio quality. 48. The mobile station according to claim 45, wherein the radio quality includes at least one of received power of a reference signal, received quality of the reference signal, SIR of the reference signal, Channel Quality Indicator, and Channel State Information. 49. The mobile station according to claim 45, wherein the determination unit is configured to determine, at least one of: when radio quality of a neighboring cell is superior to radio quality of a cell during communication by a predetermined offset, when the radio quality of the cell during communication exceeds a first threshold value, or when the radio quality of the cell during communication is inferior to a second threshold value, when the radio quality of the neighboring cell exceeds a fifth threshold value, or when the radio quality of the cell during communication is inferior to a third threshold value and the radio quality of the neighboring cell exceeds a fourth threshold value, and when it is a transmission timing when the measurement result is periodically transmitted, that the predetermined event has been triggered. 50. The mobile station according to claim 46, wherein the radio quality includes at least one of received power of a reference signal, received quality of the reference signal, SIR of the reference signal, Channel Quality Indicator, and Channel State Information. 51. The mobile station according to claim 46, wherein the determination unit is configured to determine, at least one of: when radio quality of a neighboring cell is superior to radio quality of a cell during communication by a predetermined offset, when the radio quality of the cell during communication exceeds a first threshold value, or when the radio quality of the cell during communication is inferior to a second threshold value, when the radio quality of the neighboring cell exceeds a fifth threshold value, or when the radio quality of the cell during communication is inferior to a third threshold value and the radio quality of the neighboring cell exceeds a fourth threshold value, and when it is a transmission timing when the measurement result is periodically transmitted, that the predetermined event has been triggered. 52. The mobile station according to claim 47, wherein the radio quality includes at least one of received power of a reference signal, received quality of the reference signal, SIR of the reference signal, Channel Quality Indicator, and Channel State Information. 53. The mobile station according to claim 47, wherein the determination unit is configured to determine, at least one of: when radio quality of a neighboring cell is superior to radio quality of a cell during communication by a predetermined offset, when the radio quality of the cell during communication exceeds a first threshold value, or when the radio quality of the cell during communication is inferior to a second threshold value, when the radio quality of the neighboring cell exceeds a fifth threshold value, or when the radio quality of the cell during communication is inferior to a third threshold value and the radio quality of the neighboring cell exceeds a fourth threshold value, and when it is a transmission timing when the measurement result is periodically transmitted, that the predetermined event has been triggered. 54. The mobile station according to claim 46, wherein the transmission unit is configured to transmit IDs and radio quality of a predetermined number of cells in an ascending order of the radio quality as the measurement result regarding the cell that is not during communication in a carrier other than the carrier of the event trigger cell. 55. A radio base station capable of communicating with a mobile station using a carrier aggregation, comprising: a measurement instruction unit configured to transmit a control signal for instructing measurement of radio quality of a cell during communication or a neighboring cell, regarding a carrier to be measured, to the mobile station; and a reception unit configured to receive a measurement result regarding an event trigger cell in which it is determined that a predetermined event has been triggered, from the mobile station, wherein the measurement result includes, in addition to a measurement result regarding the event trigger cell, a measurement result regarding a cell that is during communication in a carrier where a carrier aggregation is performed. 56. A radio base station capable of communicating with a mobile station using a carrier aggregation, comprising: a measurement instruction unit configured to transmit a control signal for instructing measurement of radio quality of a cell during communication or a neighboring cell, regarding a carrier to be measured, to the mobile station; and a reception unit configured to receive a measurement result regarding an event trigger cell in which it is determined that a predetermined event has been triggered, from the mobile station, wherein the measurement result includes, in addition to a measurement result regarding the event trigger cell, a measurement result regarding a cell that is not during communication in a carrier other than the carrier of the event trigger cell. 57. A radio base station capable of communicating with a mobile station using a carrier aggregation, comprising: a measurement instruction unit configured to transmit a control signal for instructing measurement of radio quality of a cell during communication or a neighboring cell, regarding a carrier to be measured, to the mobile station; and a reception unit configured to receive a measurement result regarding an event trigger cell in which it is determined that a predetermined event has been triggered, from the mobile station, wherein the measurement result includes, in addition to a measurement result regarding the event trigger cell, a measurement result regarding a cell that is not during communication in a carrier other than the carrier of the event trigger cell and regarding a cell with the optimal radio base quality. 58. The mobile station according to claim 55, wherein the measurement instruction unit is configured to, at least one of: when radio quality of a neighboring cell is superior to radio quality of a cell during communication by a predetermined offset, when the radio quality of the cell during communication exceeds a first threshold value, or when the radio quality of the cell during communication is inferior to a second threshold value, when the radio quality of the neighboring cell exceeds a fifth threshold value, or when the radio quality of the cell during communication is inferior to a third threshold value and the radio quality of the neighboring cell exceeds a fourth threshold value, and when it is a transmission timing when the measurement result is periodically transmitted, instruct the mobile station UE to notify the measurement result. 59. The mobile station according to claim 56, wherein the measurement instruction unit is configured to, at least one of: when radio quality of a neighboring cell is superior to radio quality of a cell during communication by a predetermined offset, when the radio quality of the cell during communication exceeds a first threshold value, or when the radio quality of the cell during communication is inferior to a second threshold value, when the radio quality of the neighboring cell exceeds a fifth threshold value, or when the radio quality of the cell during communication is inferior to a third threshold value and the radio quality of the neighboring cell exceeds a fourth threshold value, and when it is a transmission timing when the measurement result is periodically transmitted, instruct the mobile station UE to notify the measurement result. 60. The mobile station according to claim 57, wherein the measurement instruction unit is configured to, at least one of: when radio quality of a neighboring cell is superior to radio quality of a cell during communication by a predetermined offset, when the radio quality of the cell during communication exceeds a first threshold value, or when the radio quality of the cell during communication is inferior to a second threshold value, when the radio quality of the neighboring cell exceeds a fifth threshold value, or when the radio quality of the cell during communication is inferior to a third threshold value and the radio quality of the neighboring cell exceeds a fourth threshold value, and when it is a transmission timing when the measurement result is periodically transmitted, instruct the mobile station UE to notify the measurement result. 61. The radio base station according to claim 57, wherein the measurement result includes, as the measurement result regarding the cell that is not during communication in a carrier other than a carrier of the event trigger cell, IDs and radio quality of a predetermined number of cells in an ascending order of the radio quality. 62. A communication control method in a mobile station capable of communicating with a radio base station using a carrier aggregation, the method comprising: a first step of measuring the radio quality of a cell during communication or a neighboring cell, regarding a carrier to be measured; a second step of determining a predetermined event, based on the measurement result; a third step of transmitting the measurement result regarding an event trigger cell determined by the determination unit that the predetermined event has been triggered, to the radio base station, wherein in the third step, in addition to the measurement result regarding the event trigger cell, the measurement result regarding the cell during communication in the carrier where a carrier aggregation is performed, is transmitted. 63. A communication control method in a mobile station capable of communicating with a radio base station using a carrier aggregation, the method comprising: a first step of measuring the radio quality of a cell during communication or a neighboring cell, regarding a carrier to be measured; a second step of determining a predetermined event, based on the measurement result; a third step of transmitting the measurement result regarding an event trigger cell determined by the determination unit that the predetermined event has been triggered, to the radio base station, wherein in the third step, in addition to the measurement result regarding the event trigger cell, the measurement result regarding a cell that is not during communication in a carrier other than a carrier of the event trigger cell, is transmitted. 64. A communication control method in a mobile station capable of communicating with a radio base station using a carrier aggregation, the method comprising: a first step of measuring the radio quality of a cell during communication or a neighboring cell, regarding a carrier to be measured; a second step of determining a predetermined event, based on the measurement result; a third step of transmitting the measurement result regarding an event trigger cell determined by the determination unit that the predetermined event has been triggered, to the radio base station, wherein in the third step, in addition to the measurement result regarding the event trigger cell, the measurement result regarding a cell that is not during communication in a carrier other than a carrier of the event trigger cell and a cell having the good radio quality, is transmitted. 65. A communication control method in a radio base station capable of communicating with a mobile station using a carrier aggregation, the method comprising: a first step of transmitting a control signal for instructing measurement of radio quality of a cell during communication or a neighboring cell, regarding a carrier to be measured, to the mobile station; and a second step of receiving a measurement result regarding an event trigger cell in which it is determined that a predetermined event has been triggered, from the mobile station, wherein the measurement result includes, in addition to a measurement result regarding the event trigger cell, a measurement result regarding a cell that is during communication in a carrier where a carrier aggregation is performed. 66. A communication control method in a radio base station capable of communicating with a mobile station using a carrier aggregation, the method comprising: a first step of transmitting a control signal for instructing measurement of radio quality of a cell during communication or a neighboring cell, regarding a carrier to be measured, to the mobile station; and a second step of receiving a measurement result regarding an event trigger cell in which it is determined that a predetermined event has been triggered, from the mobile station, wherein the measurement result includes, in addition to a measurement result regarding the event trigger cell, a measurement result regarding a cell that is not during communication in a carrier other than the event trigger cell. 67. A communication control method in a radio base station capable of communicating with a mobile station using a carrier aggregation, the method comprising: a first step of transmitting a control signal for instructing measurement of radio quality of a cell during communication or a neighboring cell, regarding a carrier to be measured, to the mobile station; and a second step of receiving a measurement result regarding an event trigger cell in which it is determined that a predetermined event has been triggered, from the mobile station, wherein the measurement result includes, in addition to a measurement result regarding the event trigger cell, a measurement result regarding a cell that is not during communication in a carrier other than the carrier of the event trigger cell and regarding a cell with the optimal radio base quality.
A mobile station UE includes a measurement unit 102 configured to measure radio quality of a cell during communication or a neighboring cell for each of the two or more carriers, a determination unit 104 configured to determine whether to notify the radio base station eNB of a measurement result regarding each of the two or more carriers in the measurement unit 102, and a transmission unit 106 configured to transmit the measurement result in the measurement unit 102 to the radio base station eNB, wherein the transmission unit 106 transmits, in addition to the measurement result regarding a carrier in which it is determined by the determination unit 104 to notify the radio base station eNB of the measurement result in the measurement unit 102, a measurement result regarding a carrier other than the carrier.1.-44. (canceled) 45. A mobile station capable of communicating with a radio base station using a carrier aggregation, comprising: a measurement unit configured to measure the radio quality of a cell during communication or a neighboring cell, regarding a carrier to be measured; a determination unit configured to determine a predetermined event, based on the measurement result in the measurement unit; and a transmission unit configured to transmit the measurement result regarding an event trigger cell determined by the determination unit that the predetermined event has been triggered, to the radio base station, wherein the transmission unit is configured to transmit, in addition to the measurement result regarding the event trigger cell, the measurement result regarding the cell during communication in the carrier where a carrier aggregation is performed. 46. A mobile station capable of communicating with a radio base station using a carrier aggregation, comprising: a measurement unit configured to measure the radio quality of a cell during communication or a neighboring cell, regarding a carrier to be measured; a determination unit configured to determine a predetermined event, based on the measurement result in the measurement unit; and a transmission unit configured to transmit the measurement result regarding an event trigger cell determined by the determination unit that the predetermined event has been triggered, to the radio base station, wherein the transmission unit is configured to transmit, in addition to the measurement result regarding the event trigger cell, the measurement result regarding a cell that is not during communication in a carrier other than a carrier of the event trigger cell. 47. A mobile station capable of communicating with a radio base station using a carrier aggregation, comprising: a measurement unit configured to measure the radio quality of a cell during communication or a neighboring cell, regarding a carrier to be measured; a determination unit configured to determine a predetermined event, based on the measurement result in the measurement unit; and a transmission unit configured to transmit the measurement result regarding an event trigger cell determined by the determination unit that the predetermined event has been triggered, to the radio base station, wherein the transmission unit is configured to transmit, in addition to the measurement result regarding the event trigger cell, the measurement result regarding a cell that is not during communication in a carrier other than a carrier of the event trigger cell and a cell having the optimal radio quality. 48. The mobile station according to claim 45, wherein the radio quality includes at least one of received power of a reference signal, received quality of the reference signal, SIR of the reference signal, Channel Quality Indicator, and Channel State Information. 49. The mobile station according to claim 45, wherein the determination unit is configured to determine, at least one of: when radio quality of a neighboring cell is superior to radio quality of a cell during communication by a predetermined offset, when the radio quality of the cell during communication exceeds a first threshold value, or when the radio quality of the cell during communication is inferior to a second threshold value, when the radio quality of the neighboring cell exceeds a fifth threshold value, or when the radio quality of the cell during communication is inferior to a third threshold value and the radio quality of the neighboring cell exceeds a fourth threshold value, and when it is a transmission timing when the measurement result is periodically transmitted, that the predetermined event has been triggered. 50. The mobile station according to claim 46, wherein the radio quality includes at least one of received power of a reference signal, received quality of the reference signal, SIR of the reference signal, Channel Quality Indicator, and Channel State Information. 51. The mobile station according to claim 46, wherein the determination unit is configured to determine, at least one of: when radio quality of a neighboring cell is superior to radio quality of a cell during communication by a predetermined offset, when the radio quality of the cell during communication exceeds a first threshold value, or when the radio quality of the cell during communication is inferior to a second threshold value, when the radio quality of the neighboring cell exceeds a fifth threshold value, or when the radio quality of the cell during communication is inferior to a third threshold value and the radio quality of the neighboring cell exceeds a fourth threshold value, and when it is a transmission timing when the measurement result is periodically transmitted, that the predetermined event has been triggered. 52. The mobile station according to claim 47, wherein the radio quality includes at least one of received power of a reference signal, received quality of the reference signal, SIR of the reference signal, Channel Quality Indicator, and Channel State Information. 53. The mobile station according to claim 47, wherein the determination unit is configured to determine, at least one of: when radio quality of a neighboring cell is superior to radio quality of a cell during communication by a predetermined offset, when the radio quality of the cell during communication exceeds a first threshold value, or when the radio quality of the cell during communication is inferior to a second threshold value, when the radio quality of the neighboring cell exceeds a fifth threshold value, or when the radio quality of the cell during communication is inferior to a third threshold value and the radio quality of the neighboring cell exceeds a fourth threshold value, and when it is a transmission timing when the measurement result is periodically transmitted, that the predetermined event has been triggered. 54. The mobile station according to claim 46, wherein the transmission unit is configured to transmit IDs and radio quality of a predetermined number of cells in an ascending order of the radio quality as the measurement result regarding the cell that is not during communication in a carrier other than the carrier of the event trigger cell. 55. A radio base station capable of communicating with a mobile station using a carrier aggregation, comprising: a measurement instruction unit configured to transmit a control signal for instructing measurement of radio quality of a cell during communication or a neighboring cell, regarding a carrier to be measured, to the mobile station; and a reception unit configured to receive a measurement result regarding an event trigger cell in which it is determined that a predetermined event has been triggered, from the mobile station, wherein the measurement result includes, in addition to a measurement result regarding the event trigger cell, a measurement result regarding a cell that is during communication in a carrier where a carrier aggregation is performed. 56. A radio base station capable of communicating with a mobile station using a carrier aggregation, comprising: a measurement instruction unit configured to transmit a control signal for instructing measurement of radio quality of a cell during communication or a neighboring cell, regarding a carrier to be measured, to the mobile station; and a reception unit configured to receive a measurement result regarding an event trigger cell in which it is determined that a predetermined event has been triggered, from the mobile station, wherein the measurement result includes, in addition to a measurement result regarding the event trigger cell, a measurement result regarding a cell that is not during communication in a carrier other than the carrier of the event trigger cell. 57. A radio base station capable of communicating with a mobile station using a carrier aggregation, comprising: a measurement instruction unit configured to transmit a control signal for instructing measurement of radio quality of a cell during communication or a neighboring cell, regarding a carrier to be measured, to the mobile station; and a reception unit configured to receive a measurement result regarding an event trigger cell in which it is determined that a predetermined event has been triggered, from the mobile station, wherein the measurement result includes, in addition to a measurement result regarding the event trigger cell, a measurement result regarding a cell that is not during communication in a carrier other than the carrier of the event trigger cell and regarding a cell with the optimal radio base quality. 58. The mobile station according to claim 55, wherein the measurement instruction unit is configured to, at least one of: when radio quality of a neighboring cell is superior to radio quality of a cell during communication by a predetermined offset, when the radio quality of the cell during communication exceeds a first threshold value, or when the radio quality of the cell during communication is inferior to a second threshold value, when the radio quality of the neighboring cell exceeds a fifth threshold value, or when the radio quality of the cell during communication is inferior to a third threshold value and the radio quality of the neighboring cell exceeds a fourth threshold value, and when it is a transmission timing when the measurement result is periodically transmitted, instruct the mobile station UE to notify the measurement result. 59. The mobile station according to claim 56, wherein the measurement instruction unit is configured to, at least one of: when radio quality of a neighboring cell is superior to radio quality of a cell during communication by a predetermined offset, when the radio quality of the cell during communication exceeds a first threshold value, or when the radio quality of the cell during communication is inferior to a second threshold value, when the radio quality of the neighboring cell exceeds a fifth threshold value, or when the radio quality of the cell during communication is inferior to a third threshold value and the radio quality of the neighboring cell exceeds a fourth threshold value, and when it is a transmission timing when the measurement result is periodically transmitted, instruct the mobile station UE to notify the measurement result. 60. The mobile station according to claim 57, wherein the measurement instruction unit is configured to, at least one of: when radio quality of a neighboring cell is superior to radio quality of a cell during communication by a predetermined offset, when the radio quality of the cell during communication exceeds a first threshold value, or when the radio quality of the cell during communication is inferior to a second threshold value, when the radio quality of the neighboring cell exceeds a fifth threshold value, or when the radio quality of the cell during communication is inferior to a third threshold value and the radio quality of the neighboring cell exceeds a fourth threshold value, and when it is a transmission timing when the measurement result is periodically transmitted, instruct the mobile station UE to notify the measurement result. 61. The radio base station according to claim 57, wherein the measurement result includes, as the measurement result regarding the cell that is not during communication in a carrier other than a carrier of the event trigger cell, IDs and radio quality of a predetermined number of cells in an ascending order of the radio quality. 62. A communication control method in a mobile station capable of communicating with a radio base station using a carrier aggregation, the method comprising: a first step of measuring the radio quality of a cell during communication or a neighboring cell, regarding a carrier to be measured; a second step of determining a predetermined event, based on the measurement result; a third step of transmitting the measurement result regarding an event trigger cell determined by the determination unit that the predetermined event has been triggered, to the radio base station, wherein in the third step, in addition to the measurement result regarding the event trigger cell, the measurement result regarding the cell during communication in the carrier where a carrier aggregation is performed, is transmitted. 63. A communication control method in a mobile station capable of communicating with a radio base station using a carrier aggregation, the method comprising: a first step of measuring the radio quality of a cell during communication or a neighboring cell, regarding a carrier to be measured; a second step of determining a predetermined event, based on the measurement result; a third step of transmitting the measurement result regarding an event trigger cell determined by the determination unit that the predetermined event has been triggered, to the radio base station, wherein in the third step, in addition to the measurement result regarding the event trigger cell, the measurement result regarding a cell that is not during communication in a carrier other than a carrier of the event trigger cell, is transmitted. 64. A communication control method in a mobile station capable of communicating with a radio base station using a carrier aggregation, the method comprising: a first step of measuring the radio quality of a cell during communication or a neighboring cell, regarding a carrier to be measured; a second step of determining a predetermined event, based on the measurement result; a third step of transmitting the measurement result regarding an event trigger cell determined by the determination unit that the predetermined event has been triggered, to the radio base station, wherein in the third step, in addition to the measurement result regarding the event trigger cell, the measurement result regarding a cell that is not during communication in a carrier other than a carrier of the event trigger cell and a cell having the good radio quality, is transmitted. 65. A communication control method in a radio base station capable of communicating with a mobile station using a carrier aggregation, the method comprising: a first step of transmitting a control signal for instructing measurement of radio quality of a cell during communication or a neighboring cell, regarding a carrier to be measured, to the mobile station; and a second step of receiving a measurement result regarding an event trigger cell in which it is determined that a predetermined event has been triggered, from the mobile station, wherein the measurement result includes, in addition to a measurement result regarding the event trigger cell, a measurement result regarding a cell that is during communication in a carrier where a carrier aggregation is performed. 66. A communication control method in a radio base station capable of communicating with a mobile station using a carrier aggregation, the method comprising: a first step of transmitting a control signal for instructing measurement of radio quality of a cell during communication or a neighboring cell, regarding a carrier to be measured, to the mobile station; and a second step of receiving a measurement result regarding an event trigger cell in which it is determined that a predetermined event has been triggered, from the mobile station, wherein the measurement result includes, in addition to a measurement result regarding the event trigger cell, a measurement result regarding a cell that is not during communication in a carrier other than the event trigger cell. 67. A communication control method in a radio base station capable of communicating with a mobile station using a carrier aggregation, the method comprising: a first step of transmitting a control signal for instructing measurement of radio quality of a cell during communication or a neighboring cell, regarding a carrier to be measured, to the mobile station; and a second step of receiving a measurement result regarding an event trigger cell in which it is determined that a predetermined event has been triggered, from the mobile station, wherein the measurement result includes, in addition to a measurement result regarding the event trigger cell, a measurement result regarding a cell that is not during communication in a carrier other than the carrier of the event trigger cell and regarding a cell with the optimal radio base quality.
2,400
7,841
7,841
15,941,561
2,426
A system and method are provided for detecting the presence of potential commercials in a video data stream. Each of the commercials has an expected time length that is an integer multiple of a first predetermined time length, and has an overall time length that is equal to or less than a second predetermined time length. Transitions in the audio or video of the video data stream are detected and the time of the transitions are recorded. Time differences between one or more successive transitions are detected. Any time differences that are an integer multiple of the first predetermined time length, and that have an overall time length that is equal to or less than the second predetermined time length are identified. The contents of the video data stream associated with the identified time differences are flagged as potential commercials and sent to a content processing platform for further analysis.
1. An automated method of detecting the presence of potential commercials in a video data stream that contains (i) segments of program type content, and (ii) commercial content, wherein the commercial content appears in a commercial break between segments of program type content, each commercial break including one or more commercials, wherein each of the commercials has an expected time length that is an integer multiple of a first predetermined time length, and has an overall time length that is equal to or less than a second predetermined time length, the method comprising: (a) receiving, by a video processing engine, a video data stream; (b) detecting, by the video processing engine, transitions in the audio or video of the video data stream and recording the time of the transitions; (c) calculating for each transition, by the video processing engine using the time of the transitions, time differences between one or more successive transitions; (d) identifying, by the video processing engine, any time differences between the one or more successive transitions that are an integer multiple of the first predetermined time length, and that have an overall time length that is equal to or less than the second predetermined time length, wherein the contents of the video data stream associated with the identified time differences are potential commercials; and (e) electronically sending the contents of the video data stream associated with the identified time differences to a content processing platform that performs recognition processing of the contents to identify any potential commercials. 2. The method of claim 1 wherein the first predetermined time length is 5 seconds. 3. The method of claim 2 wherein the second predetermined time length is 60 seconds. 4. The method of claim 1 wherein the first predetermined time length is 15 seconds. 5. The method of claim 4 wherein the second predetermined time length is 60 seconds. 6. The method of claim 1 wherein a transition in the audio or video of the video data stream is detected by the presence of consecutive black frames, silent audio frames, significant changes in audio level, significant changes in image nature or quality, or any combination thereof. 7. The method of claim 1 wherein in step (c), the video processing engine only calculates the time differences between successively adjacent transitions. 8. An automated system for detecting the presence of potential commercials in a video data stream that contains (i) segments of program type content, and (ii) commercial content, wherein the commercial content appears in a commercial break between segments of program type content, each commercial break including one or more commercials, wherein each of the commercials has an expected time length that is an integer multiple of a first predetermined time length, and has an overall time length that is equal to or less than a second predetermined time length, the system comprising: (a) a video processing engine configured to: (i) receive a video data stream; (ii) detect transitions in the audio or video of the video data stream and record the time of the transitions; (iii) calculate for each transition, using the time of the transitions, time differences between one or more successive transitions; (iv) identify any time differences between the one or more successive transitions that are an integer multiple of the first predetermined time length, and that have an overall time length that is equal to or less than the second predetermined time length, wherein the contents of the video data stream associated with the identified time differences are potential commercials; and (b) a content processing platform that electronically receives the contents of the video data stream associated with the identified time differences, and that performs recognition processing of the contents to identify any potential commercials. 9. The automated system of claim 8 wherein the first predetermined time length is 5 seconds. 10. The automated system of claim 9 wherein the second predetermined time length is 60 seconds. 11. The automated system of claim 8 wherein the first predetermined time length is 15 seconds. 12. The automated system of claim 11 wherein the second predetermined time length is 60 seconds. 13. The automated system of claim 8 wherein a transition in the audio or video of the video data stream is detected by the presence of consecutive black frames, silent audio frames, significant changes in audio level, significant changes in image nature or quality, or any combination thereof. 14. The automated system of claim 8 wherein the video processing engine is configured to only calculate the time differences between successively adjacent transitions.
A system and method are provided for detecting the presence of potential commercials in a video data stream. Each of the commercials has an expected time length that is an integer multiple of a first predetermined time length, and has an overall time length that is equal to or less than a second predetermined time length. Transitions in the audio or video of the video data stream are detected and the time of the transitions are recorded. Time differences between one or more successive transitions are detected. Any time differences that are an integer multiple of the first predetermined time length, and that have an overall time length that is equal to or less than the second predetermined time length are identified. The contents of the video data stream associated with the identified time differences are flagged as potential commercials and sent to a content processing platform for further analysis.1. An automated method of detecting the presence of potential commercials in a video data stream that contains (i) segments of program type content, and (ii) commercial content, wherein the commercial content appears in a commercial break between segments of program type content, each commercial break including one or more commercials, wherein each of the commercials has an expected time length that is an integer multiple of a first predetermined time length, and has an overall time length that is equal to or less than a second predetermined time length, the method comprising: (a) receiving, by a video processing engine, a video data stream; (b) detecting, by the video processing engine, transitions in the audio or video of the video data stream and recording the time of the transitions; (c) calculating for each transition, by the video processing engine using the time of the transitions, time differences between one or more successive transitions; (d) identifying, by the video processing engine, any time differences between the one or more successive transitions that are an integer multiple of the first predetermined time length, and that have an overall time length that is equal to or less than the second predetermined time length, wherein the contents of the video data stream associated with the identified time differences are potential commercials; and (e) electronically sending the contents of the video data stream associated with the identified time differences to a content processing platform that performs recognition processing of the contents to identify any potential commercials. 2. The method of claim 1 wherein the first predetermined time length is 5 seconds. 3. The method of claim 2 wherein the second predetermined time length is 60 seconds. 4. The method of claim 1 wherein the first predetermined time length is 15 seconds. 5. The method of claim 4 wherein the second predetermined time length is 60 seconds. 6. The method of claim 1 wherein a transition in the audio or video of the video data stream is detected by the presence of consecutive black frames, silent audio frames, significant changes in audio level, significant changes in image nature or quality, or any combination thereof. 7. The method of claim 1 wherein in step (c), the video processing engine only calculates the time differences between successively adjacent transitions. 8. An automated system for detecting the presence of potential commercials in a video data stream that contains (i) segments of program type content, and (ii) commercial content, wherein the commercial content appears in a commercial break between segments of program type content, each commercial break including one or more commercials, wherein each of the commercials has an expected time length that is an integer multiple of a first predetermined time length, and has an overall time length that is equal to or less than a second predetermined time length, the system comprising: (a) a video processing engine configured to: (i) receive a video data stream; (ii) detect transitions in the audio or video of the video data stream and record the time of the transitions; (iii) calculate for each transition, using the time of the transitions, time differences between one or more successive transitions; (iv) identify any time differences between the one or more successive transitions that are an integer multiple of the first predetermined time length, and that have an overall time length that is equal to or less than the second predetermined time length, wherein the contents of the video data stream associated with the identified time differences are potential commercials; and (b) a content processing platform that electronically receives the contents of the video data stream associated with the identified time differences, and that performs recognition processing of the contents to identify any potential commercials. 9. The automated system of claim 8 wherein the first predetermined time length is 5 seconds. 10. The automated system of claim 9 wherein the second predetermined time length is 60 seconds. 11. The automated system of claim 8 wherein the first predetermined time length is 15 seconds. 12. The automated system of claim 11 wherein the second predetermined time length is 60 seconds. 13. The automated system of claim 8 wherein a transition in the audio or video of the video data stream is detected by the presence of consecutive black frames, silent audio frames, significant changes in audio level, significant changes in image nature or quality, or any combination thereof. 14. The automated system of claim 8 wherein the video processing engine is configured to only calculate the time differences between successively adjacent transitions.
2,400
7,842
7,842
14,489,999
2,472
A method to mitigate interference in a wireless system is provided. The method includes processing a set of radio network identifiers and limiting a number of hypotheses associated with the radio network identifiers in order to mitigate interference in a wireless network. In another aspect, the method includes processing a set of hypotheses and limiting the set of hypotheses by limiting a number of downlink grants to a common space, limiting the number of downlink grants to a number of instances, or limiting the number of grants to a physical downlink control channel (PDCCH) type. In yet another aspect, the method includes processing a downlink set and generating a target termination level for the downlink data set, the termination level associated with a Hybrid automatic repeat-request.
1. A method for mitigating interference in a wireless communication system, comprising: receiving an interfering wireless transmission from an interfering base station; accessing a constrained set of available parameters used by the interfering base station to generate the interfering wireless transmission; and mitigating, at a user equipment (UE), the interferring wireless transmission using a reduced plurality of hypotheses based upon the constrained set of parameters. 2. The method of claim 1, wherein the interferring wireless transmission is an assignment grant message. 3. The method of claim 2, wherein the available parameters include the resources to transmit the assignment grant message. 4. The method of claim 2, further comprising using a decoded assignment grant message to obtain parameters about a scheduled data transmission. 5. An apparatus for mitigating interference in a wireless communication system, comprising: a receiver for receiving an interferring wireless transmission from an interfering base station; a computing platform for accessing a constrained set of available parameters used by the interfering base station to generate the interferring wireless transmission; and a decoder for mitigating the interferring wireless transmission at a user equipment (UE) using a reduced plurality of hypotheses based upon the constrained set of parameters. 6. The apparatus of claim 5, wherein the interfering wireless transmission is an assignment grant message. 7. The apparatus of claim 5, wherein the interfering wireless transmission is a control channel or a data channel. 8. The apparatus of claim 5, wherein available parameters include a user equipment (UE) identifier; and the UE identifier is constrained to a preferred set of values. 9. The apparatus of claim 5, wherein the computing platform is further for accessing the constrained set of possible radio network identifiers from local storage. 10. The apparatus of claim 5, wherein the receiver is further for wirelessly accessing the constrained set of available parameters from a serving base station relayed from the interfering base station. 11. The apparatus of claim 5, wherein the receiver is further for wirelessly accessing the constrained set of available parameters from a broadcast channel from the interfering base station. 12. The apparatus of claim 5, wherein the computing platform is further for constraining the set of available parameters by limiting user equipment identity space used to encode the transmission. 13. The apparatus of claim 5, wherein the interfering base station comprises a femto cell home base station. 14. The apparatus of claim 5, wherein the computing platform is further for constraining the set of available parameters by limiting downlink grant resource space. 15. The apparatus of claim 5, wherein the computing platform is further for canceling traffic transmissions. 16. The apparatus of claim 5, wherein the computing platform is further for canceling control channel transmission. 17. The apparatus of claim 5, further comprising: a transmitter for reporting pilot strength indicative of a benefit of interference cancellation, wherein the receiver is further for receiving a target termination associated with hybrid automatic repeat-request later than for another wireless device reporting pilot strength less indicative of a benefit of interference cancellation, wherein the constrained set of available downlink scheduling parameters comprises a reduced set of target device identifiers used to encode the interfering signal and comprises a reduced set of available downlink grants. 18. The apparatus of claim 5, further comprising receiving an assigned hybrid automatic repeat request (HARQ) relaxed for sufficient time for interference cancellation. 19. The apparatus of claim 6, wherein the available parameters include the resources to transmit the assignment grant message. 20. The apparatus of claim 6, wherein the computing platform is further for using a decoded assignment grant message to obtain parameters about a scheduled data transmission. 21. The apparatus of claim 20, wherein the computing platform is further for estimating the data transmission by the user equipment (UE). 22. The apparatus of claim 20, wherein the computing platform is further for canceling the estimated transmission at the user equipment (UE). 23. The apparatus of claim 22, wherein the computing platform is further for estimating the data transmission by decoding the data transmission. 24. The apparatus of claim 12, wherein the limited user equipment identity space is cell specific based upon a cell identifier of the interfering base station. 25. The apparatus of claim 12, wherein the limited user equipment identity space is non-cell specific. 26. The apparatus of claim 12, wherein the limited user equipment identity space is allocated and de-allocated in blocks of target device identifiers wherein each block comprises a relatively small fraction of the total available space. 27. The apparatus of claim 12, wherein the limited user equipment identity space comprises cell radio network temporary identity (c-RNTI) values. 28. The apparatus of claim 14, wherein the computing platform is further for limiting downlink grant resource space to a common space. 29. The apparatus of claim 14, wherein the computing platform is further for limiting downlink grant resource space to a specified number of instances selected to support service provided by a femto cell home base station. 30. The apparatus of claim 14, wherein the computing platform is further for limiting downlink grant resource space to one of a plurality of types of downlink control channel.
A method to mitigate interference in a wireless system is provided. The method includes processing a set of radio network identifiers and limiting a number of hypotheses associated with the radio network identifiers in order to mitigate interference in a wireless network. In another aspect, the method includes processing a set of hypotheses and limiting the set of hypotheses by limiting a number of downlink grants to a common space, limiting the number of downlink grants to a number of instances, or limiting the number of grants to a physical downlink control channel (PDCCH) type. In yet another aspect, the method includes processing a downlink set and generating a target termination level for the downlink data set, the termination level associated with a Hybrid automatic repeat-request.1. A method for mitigating interference in a wireless communication system, comprising: receiving an interfering wireless transmission from an interfering base station; accessing a constrained set of available parameters used by the interfering base station to generate the interfering wireless transmission; and mitigating, at a user equipment (UE), the interferring wireless transmission using a reduced plurality of hypotheses based upon the constrained set of parameters. 2. The method of claim 1, wherein the interferring wireless transmission is an assignment grant message. 3. The method of claim 2, wherein the available parameters include the resources to transmit the assignment grant message. 4. The method of claim 2, further comprising using a decoded assignment grant message to obtain parameters about a scheduled data transmission. 5. An apparatus for mitigating interference in a wireless communication system, comprising: a receiver for receiving an interferring wireless transmission from an interfering base station; a computing platform for accessing a constrained set of available parameters used by the interfering base station to generate the interferring wireless transmission; and a decoder for mitigating the interferring wireless transmission at a user equipment (UE) using a reduced plurality of hypotheses based upon the constrained set of parameters. 6. The apparatus of claim 5, wherein the interfering wireless transmission is an assignment grant message. 7. The apparatus of claim 5, wherein the interfering wireless transmission is a control channel or a data channel. 8. The apparatus of claim 5, wherein available parameters include a user equipment (UE) identifier; and the UE identifier is constrained to a preferred set of values. 9. The apparatus of claim 5, wherein the computing platform is further for accessing the constrained set of possible radio network identifiers from local storage. 10. The apparatus of claim 5, wherein the receiver is further for wirelessly accessing the constrained set of available parameters from a serving base station relayed from the interfering base station. 11. The apparatus of claim 5, wherein the receiver is further for wirelessly accessing the constrained set of available parameters from a broadcast channel from the interfering base station. 12. The apparatus of claim 5, wherein the computing platform is further for constraining the set of available parameters by limiting user equipment identity space used to encode the transmission. 13. The apparatus of claim 5, wherein the interfering base station comprises a femto cell home base station. 14. The apparatus of claim 5, wherein the computing platform is further for constraining the set of available parameters by limiting downlink grant resource space. 15. The apparatus of claim 5, wherein the computing platform is further for canceling traffic transmissions. 16. The apparatus of claim 5, wherein the computing platform is further for canceling control channel transmission. 17. The apparatus of claim 5, further comprising: a transmitter for reporting pilot strength indicative of a benefit of interference cancellation, wherein the receiver is further for receiving a target termination associated with hybrid automatic repeat-request later than for another wireless device reporting pilot strength less indicative of a benefit of interference cancellation, wherein the constrained set of available downlink scheduling parameters comprises a reduced set of target device identifiers used to encode the interfering signal and comprises a reduced set of available downlink grants. 18. The apparatus of claim 5, further comprising receiving an assigned hybrid automatic repeat request (HARQ) relaxed for sufficient time for interference cancellation. 19. The apparatus of claim 6, wherein the available parameters include the resources to transmit the assignment grant message. 20. The apparatus of claim 6, wherein the computing platform is further for using a decoded assignment grant message to obtain parameters about a scheduled data transmission. 21. The apparatus of claim 20, wherein the computing platform is further for estimating the data transmission by the user equipment (UE). 22. The apparatus of claim 20, wherein the computing platform is further for canceling the estimated transmission at the user equipment (UE). 23. The apparatus of claim 22, wherein the computing platform is further for estimating the data transmission by decoding the data transmission. 24. The apparatus of claim 12, wherein the limited user equipment identity space is cell specific based upon a cell identifier of the interfering base station. 25. The apparatus of claim 12, wherein the limited user equipment identity space is non-cell specific. 26. The apparatus of claim 12, wherein the limited user equipment identity space is allocated and de-allocated in blocks of target device identifiers wherein each block comprises a relatively small fraction of the total available space. 27. The apparatus of claim 12, wherein the limited user equipment identity space comprises cell radio network temporary identity (c-RNTI) values. 28. The apparatus of claim 14, wherein the computing platform is further for limiting downlink grant resource space to a common space. 29. The apparatus of claim 14, wherein the computing platform is further for limiting downlink grant resource space to a specified number of instances selected to support service provided by a femto cell home base station. 30. The apparatus of claim 14, wherein the computing platform is further for limiting downlink grant resource space to one of a plurality of types of downlink control channel.
2,400
7,843
7,843
14,956,573
2,497
An illustrative embodiment of automated application decomposition generates a set of information specific to an application by one or more external tools. Predefined heuristics and corresponding predefined conclusions, categorized corresponding to one or more external tool domains, are applied to the set of information to produce an intermediate result. The intermediate result is converted into a set of conclusions about factors, representative of the application, used in application decomposition. The set of conclusions is exported and used to generate a model of the application. The model is a starting point for identification of threats and weaknesses specific to the application.
1. A computer-implemented method for providing automated application decomposition, the method comprising: generating, by one or more external tools, a set of information specific to an application; storing the generated set of information; applying predefined heuristics and corresponding predefined conclusions to the set of information to produce an intermediate result, wherein the predefined heuristics and the corresponding predefined conclusions are categorized corresponding to one or more external tool domains; converting the intermediate result into a set of conclusions about factors used in application decomposition, and exporting the set of conclusions, wherein the set of conclusions is representative of the application; and generating a model of the application based on the exported set of conclusions, wherein the model is a starting point for identification of threats and weaknesses specific to the application. 2. The method of claim 1, wherein the set of information comprises information associated with the one or more external tool domains, and wherein the one or more external tool domains are selected from the group consisting of: an application security tool domain, a network security tool domain, and application source domain, a business modeling tool domain, and combinations thereof. 3. The method of claim 1, wherein each predefined heuristic and corresponding predefined conclusions is associated with a respective external tool domain to form a data structure, and wherein each predefined heuristic is mapped to a respective predefined conclusion. 4. The method of claim 1, further comprising aggregating the set of information according to each external tool domain, including aggregating each external tool domain to each external tool. 5. A computer-implemented method for providing automated application decomposition, the method comprising: receiving external tool data representative of an application, wherein the received data is generated from one or more external tools; storing the received data; aggregating the stored data; analyzing the aggregated data, including applying a set of predefined heuristics and corresponding predefined conclusions to the aggregated data to produce analyzed data; and converting the analyzed data into an application model. 6. The process of claim 5, wherein the received data comprises information associated with each of a plurality of external tool domains, and wherein the one or more external tools are selected from the group consisting of: an application security tool domain, a network security tool domain, and application source domain, a business modeling tool domain, and combinations thereof. 7. The process of claim 5, wherein each predefined heuristic and corresponding predefined conclusions is associated with a respective external tool domain to form a data structure, and wherein each predefined heuristic is mapped to a respective predefined conclusion. 8. The process of claim 7, wherein the data structure describes a single particular external tool domain and associated predefined heuristics and the corresponding predefined conclusions. 9. The computer-implemented process of claim 5, wherein the aggregation comprises program code to aggregate the stored data according to each external tool domain, including program code to aggregate each external tool domain to each external tool. 10. An apparatus to provide automated application decomposition, comprising: a collector, the collector to receive of a set of information specific to an application generated by one or more external tools; an analyzer, the analyzer to: apply predefined heuristics and corresponding predefined conclusions to the set of information to produce an intermediate result, wherein the predefined heuristics and the corresponding predefined conclusions are categorized corresponding to one or more external tool domains; and convert the intermediate result into a set of conclusions about factors used in application decomposition, wherein the set of conclusions is representative of the application; an exporter to export the set of conclusions; and a generator to generate a model of the application using the set of conclusions exported, wherein the model is a starting point for identification of threats and weaknesses specific to the application. 11. A computer program product to provide automated application decomposition, the computer program product comprising a computer-readable storage device having computer-executable program code embodied therewith, the program code executable by a processor to: generate, by one or more external tools, a set of information specific to an application; store the generated set of information; compare predefined heuristics and corresponding predefined conclusions with the stored set of information to produce an intermediate result, wherein the predefined heuristics and the corresponding predefined conclusions are categorized corresponding to each of a particular external tool domain; convert the intermediate result into a set of conclusions about factors used in application decomposition, and export the set of conclusions, wherein the set of conclusions is representative of the application; and generate a model of the application based on the exported set of conclusions, wherein the model is a starting point for identification of threats and weaknesses specific to the application. 12. The computer program product of claim 11 wherein the set of information includes information comprising information associated with a particular external tool domain, and wherein the one or more external tools domains are selected from the group consisting of: an application security tool domain, a network security tool domain, and application source domain, a business modeling tool domain, and combinations thereof. 13. The computer program product of claim 12, wherein each predefined heuristic is mapped to a respective predefined conclusion, and wherein the predefined heuristics and predefined conclusions are associated with an external tool domain to form a data structure. 14. The computer program product of claim 13, wherein the data structure describes a single external tool domain and associated predefined heuristics and the corresponding predefined conclusions. 15. The computer program product of claim 12 further comprising program code to aggregate the set of information according to each particular external tool domain, including program code to aggregate each external tool domain to each external tool. 16. An apparatus to provide automated application decomposition, the apparatus comprising: a communications fabric; a memory connected to the communications fabric, wherein the memory contains computer executable program code; a communications unit connected to the communications fabric; an input/output unit connected to the communications fabric; a display connected to the communications fabric; and a processor unit connected to the communications fabric, wherein the processor unit executes the computer executable program code to direct the apparatus to: receive a set of information specific to an application generated by one or more external tools; apply predefined heuristics and corresponding predefined conclusions to produce an intermediate result, wherein the predefined heuristics and the corresponding predefined conclusions are categorized corresponding to one or more external tool domains; convert the intermediate result into a set of conclusions about factors used in the application decomposition, wherein the set of conclusions is representative of the application; export the set of conclusions; and generate a model of the application based on the exported set, wherein the model is a starting point for identification of threats and weaknesses specific to the application. 17. A tool to provide automated application decomposition, the tool comprising: a communications fabric; a memory connected to the communications fabric, wherein the memory contains computer executable program code; a communications unit connected to the communications fabric; an input/output unit connected to the communications fabric; a display connected to the communications fabric; and a processor unit connected to the communications fabric, wherein the processor unit executes the computer executable program code to direct the apparatus to: generate a set of information specific to an application by a tool, wherein the tool belongs to one or more categories of tools, the one or more categories selected from the group consisting of: application security tools providing information associated with testing and exploration traffic, security scan configurations, source code, and code libraries; network security devices providing information associated with network traffic including usage patterns, deployment information and network topology; business modeling tools providing information typically associated with actors, business processes, user actions, and business assets, and combinations thereof; and wherein the set of information is raw data resulting from at least one of multiple, heterogeneous types of scanning and data generation of the tool; apply predefined heuristics and corresponding predefined conclusions to the set of information to produce an intermediate result, wherein the predefined heuristics and the corresponding predefined conclusions are categorized corresponding to a particular external tool domain; convert the intermediate result into a set of conclusions about factors used in application decomposition, wherein the set of conclusions is representative of the application; and export the set of conclusions, wherein the exported set is suitable to generate a model of the application, and wherein the model is a starting point for identification of threats and weaknesses specific to the application.
An illustrative embodiment of automated application decomposition generates a set of information specific to an application by one or more external tools. Predefined heuristics and corresponding predefined conclusions, categorized corresponding to one or more external tool domains, are applied to the set of information to produce an intermediate result. The intermediate result is converted into a set of conclusions about factors, representative of the application, used in application decomposition. The set of conclusions is exported and used to generate a model of the application. The model is a starting point for identification of threats and weaknesses specific to the application.1. A computer-implemented method for providing automated application decomposition, the method comprising: generating, by one or more external tools, a set of information specific to an application; storing the generated set of information; applying predefined heuristics and corresponding predefined conclusions to the set of information to produce an intermediate result, wherein the predefined heuristics and the corresponding predefined conclusions are categorized corresponding to one or more external tool domains; converting the intermediate result into a set of conclusions about factors used in application decomposition, and exporting the set of conclusions, wherein the set of conclusions is representative of the application; and generating a model of the application based on the exported set of conclusions, wherein the model is a starting point for identification of threats and weaknesses specific to the application. 2. The method of claim 1, wherein the set of information comprises information associated with the one or more external tool domains, and wherein the one or more external tool domains are selected from the group consisting of: an application security tool domain, a network security tool domain, and application source domain, a business modeling tool domain, and combinations thereof. 3. The method of claim 1, wherein each predefined heuristic and corresponding predefined conclusions is associated with a respective external tool domain to form a data structure, and wherein each predefined heuristic is mapped to a respective predefined conclusion. 4. The method of claim 1, further comprising aggregating the set of information according to each external tool domain, including aggregating each external tool domain to each external tool. 5. A computer-implemented method for providing automated application decomposition, the method comprising: receiving external tool data representative of an application, wherein the received data is generated from one or more external tools; storing the received data; aggregating the stored data; analyzing the aggregated data, including applying a set of predefined heuristics and corresponding predefined conclusions to the aggregated data to produce analyzed data; and converting the analyzed data into an application model. 6. The process of claim 5, wherein the received data comprises information associated with each of a plurality of external tool domains, and wherein the one or more external tools are selected from the group consisting of: an application security tool domain, a network security tool domain, and application source domain, a business modeling tool domain, and combinations thereof. 7. The process of claim 5, wherein each predefined heuristic and corresponding predefined conclusions is associated with a respective external tool domain to form a data structure, and wherein each predefined heuristic is mapped to a respective predefined conclusion. 8. The process of claim 7, wherein the data structure describes a single particular external tool domain and associated predefined heuristics and the corresponding predefined conclusions. 9. The computer-implemented process of claim 5, wherein the aggregation comprises program code to aggregate the stored data according to each external tool domain, including program code to aggregate each external tool domain to each external tool. 10. An apparatus to provide automated application decomposition, comprising: a collector, the collector to receive of a set of information specific to an application generated by one or more external tools; an analyzer, the analyzer to: apply predefined heuristics and corresponding predefined conclusions to the set of information to produce an intermediate result, wherein the predefined heuristics and the corresponding predefined conclusions are categorized corresponding to one or more external tool domains; and convert the intermediate result into a set of conclusions about factors used in application decomposition, wherein the set of conclusions is representative of the application; an exporter to export the set of conclusions; and a generator to generate a model of the application using the set of conclusions exported, wherein the model is a starting point for identification of threats and weaknesses specific to the application. 11. A computer program product to provide automated application decomposition, the computer program product comprising a computer-readable storage device having computer-executable program code embodied therewith, the program code executable by a processor to: generate, by one or more external tools, a set of information specific to an application; store the generated set of information; compare predefined heuristics and corresponding predefined conclusions with the stored set of information to produce an intermediate result, wherein the predefined heuristics and the corresponding predefined conclusions are categorized corresponding to each of a particular external tool domain; convert the intermediate result into a set of conclusions about factors used in application decomposition, and export the set of conclusions, wherein the set of conclusions is representative of the application; and generate a model of the application based on the exported set of conclusions, wherein the model is a starting point for identification of threats and weaknesses specific to the application. 12. The computer program product of claim 11 wherein the set of information includes information comprising information associated with a particular external tool domain, and wherein the one or more external tools domains are selected from the group consisting of: an application security tool domain, a network security tool domain, and application source domain, a business modeling tool domain, and combinations thereof. 13. The computer program product of claim 12, wherein each predefined heuristic is mapped to a respective predefined conclusion, and wherein the predefined heuristics and predefined conclusions are associated with an external tool domain to form a data structure. 14. The computer program product of claim 13, wherein the data structure describes a single external tool domain and associated predefined heuristics and the corresponding predefined conclusions. 15. The computer program product of claim 12 further comprising program code to aggregate the set of information according to each particular external tool domain, including program code to aggregate each external tool domain to each external tool. 16. An apparatus to provide automated application decomposition, the apparatus comprising: a communications fabric; a memory connected to the communications fabric, wherein the memory contains computer executable program code; a communications unit connected to the communications fabric; an input/output unit connected to the communications fabric; a display connected to the communications fabric; and a processor unit connected to the communications fabric, wherein the processor unit executes the computer executable program code to direct the apparatus to: receive a set of information specific to an application generated by one or more external tools; apply predefined heuristics and corresponding predefined conclusions to produce an intermediate result, wherein the predefined heuristics and the corresponding predefined conclusions are categorized corresponding to one or more external tool domains; convert the intermediate result into a set of conclusions about factors used in the application decomposition, wherein the set of conclusions is representative of the application; export the set of conclusions; and generate a model of the application based on the exported set, wherein the model is a starting point for identification of threats and weaknesses specific to the application. 17. A tool to provide automated application decomposition, the tool comprising: a communications fabric; a memory connected to the communications fabric, wherein the memory contains computer executable program code; a communications unit connected to the communications fabric; an input/output unit connected to the communications fabric; a display connected to the communications fabric; and a processor unit connected to the communications fabric, wherein the processor unit executes the computer executable program code to direct the apparatus to: generate a set of information specific to an application by a tool, wherein the tool belongs to one or more categories of tools, the one or more categories selected from the group consisting of: application security tools providing information associated with testing and exploration traffic, security scan configurations, source code, and code libraries; network security devices providing information associated with network traffic including usage patterns, deployment information and network topology; business modeling tools providing information typically associated with actors, business processes, user actions, and business assets, and combinations thereof; and wherein the set of information is raw data resulting from at least one of multiple, heterogeneous types of scanning and data generation of the tool; apply predefined heuristics and corresponding predefined conclusions to the set of information to produce an intermediate result, wherein the predefined heuristics and the corresponding predefined conclusions are categorized corresponding to a particular external tool domain; convert the intermediate result into a set of conclusions about factors used in application decomposition, wherein the set of conclusions is representative of the application; and export the set of conclusions, wherein the exported set is suitable to generate a model of the application, and wherein the model is a starting point for identification of threats and weaknesses specific to the application.
2,400
7,844
7,844
13,838,075
2,486
A pick-and-place machine and method includes use of a passive component feeder cartridge including a feeder gear. Rotation of the feeder gear causes a component-bearing tape to be fed through the feeder cartridge. A pickup head includes a vacuum nozzle to pick up the components from the tape and a rack gear to engage and drive the feeder gear of the feeder cartridge via translational motion of the pickup head when operatively disposed with respect to a selected feeder cartridge.
1. A method for picking up and placing components on a substrate with a pick-and-place machine, the pick-and-place machine including a pickup device to pick up and place the components and a collimated light source directing collimated light along a light path toward a component and a downstream camera, the method comprising: picking up and holding a component with the pickup device; positioning the held component in a collimated light path such that collimated light passes around and past the held component; projecting a shadow image of the held component onto a diffuser screen also disposed in the collimated light path between the held component and the camera; and effecting a linear correction and/or an angular correction of the held component position, calculated in accordance with the shadow image, before placing the held component onto the substrate. 2. The method according to claim 1, wherein the effecting step includes rotating the pickup device and the held component in opposite directions by predetermined angles to generate data representing different extents of said shadow image for said predetermined rotational angles, and using said data to effect angular correction of the held component position before placing the held component onto the substrate. 3. The method according to claim 1, wherein the effecting step includes calculating a linear correction to adjust coordinates of a predetermined placement location to effect linear correction of the held component position before placing the held component onto the substrate. 4. The method according to claim 1, wherein the collimated light source comprises a light emitting diode or a laser. 5. A pick-and-place machine for picking components from a feeder cartridge and placing the picked components onto a substrate, said machine comprising: a pickup device configured to pick up and place components onto a substrate; a component camera; a collimated light source directing collimated light toward the component camera, around and past a component as it is held by the pickup device after pickup; a diffuser screen disposed in the collimated light path between the held component and the component camera causing a shadow image of the held component to be projected onto the diffuser screen for image capture by said component camera; and at least one control processor configured to effect a linear correction and/or an angular correction of the held component position, calculated in accordance with the shadow image, before placing the held component onto the substrate. 6. The pick-and-place machine according to claim 5, further comprising a pickup device rotation motor to rotate the pickup device, wherein the pickup device rotation motor is configured to rotate the pickup device and the held component to effect angular correction of the held component position before placing the held component onto the substrate. 7. The pick-and-place machine according to claim 4, wherein the collimated light source comprises a light emitting diode or a laser. 8. An optical subsystem in a pick-and-place machine, the pick-and-place machine including a pickup device adapted to pick up a component from a feeder cartridge, hold the component against the pickup device and place the component onto a substrate, the optical subsystem comprising: a first collimated light source arranged to project collimated first light along a first light path and past around the held component; a second light source arranged to project second light along a second light path toward the substrate; a dual camera assembly including a camera lens disposed in the first and second light paths, a first beam splitter disposed to split a portion of the first and second light to (a) a component camera and (b) a multi-purpose camera, wherein said component camera is used when said first collimated light source is active and said multi-purpose camera is used when said second light source is active. 9. The optical subsystem according to claim 8, further comprising a diffuser screen disposed in the first light path between the held component and the camera lens. 10. The optical subsystem according to claim 9, wherein a shadow image of the held component is projected onto the diffuser screen for image capture by the component camera. 11. The optical subsystem according to claim 9, wherein the second light is reflected off of the substrate and into the camera lens. 12. The optical subsystem according to claim 11, further comprising a second beam splitter disposed in the first light path between the diffuser screen and the cameral lens and also disposed in the second light path between the second light source and the substrate. 13. The optical subsystem according to claim 12, further comprising a diffuser disposed in the second light path between the light source and the second beam splitter. 14. The optical subsystem according to claim 8, wherein the first collimated light source comprises a light emitting diode or a laser. 15. The optical subsystem according to claim 8, wherein the second light source comprises an array of multi-color light emitting diodes. 16. The optical subsystem according to claim 8, wherein the dual camera assembly is movable vertically relative to the substrate to provide variable focus ability for the multi-purpose camera. 17. The optical subsystem according to claim 16, wherein the dual camera assembly is fixed with respect to a pickup device thereby providing the component camera with a fixed focus with respect to a picked-up component. 18. The optical subsystem according to claim 8, wherein the optical subsystem is configured to use the multi-purpose camera to detect the presence of the feeder cartridge to derive location information of the feeder cartridge and to acquire machine readable information on the feeder cartridge to derive identification information of a component therein situated. 19. The optical subsystem according to claim 9, further comprising a reverse periscope mirror system disposed in the second light path to enable the multi-purpose camera to capture images of the held component. 20. A pick-and-place machine for picking components from a feeder cartridge and placing the picked components onto a substrate in combination with the optical subsystem of claim 8, said machine comprising: a feeder cartridge including a body portion adapted to accept a tape bearing a plurality of components and a feeder member rotatably connected to the body portion, the feeder cartridge having machine readable information on a surface thereof. wherein rotation of the feeder member causes such a tape to move at least one tape-carried component into a pickup zone; and a pickup head including a pickup device adapted to pick up at least one of the plurality of components from the pickup zone, and hold the component with the pickup device until released to place the component onto the substrate, wherein the optical subsystem is configured to use the multi-purpose camera to detect the presence and location of the feeder cartridge and to acquire machine readable information on the feeder cartridge including identification of the components disposed therewithin. 21. A method for picking up and placing components on a substrate with a pick-and-place machine, the pick-and-place machine including a pickup device to pick up and place the components, the method comprising: providing the optical subsystem of claim 8; picking up and holding a component with the pickup device; positioning the held component in the collimated light path such that collimated light passes around and past the held component; projecting a shadow image of the held component onto a diffuser screen disposed in the collimated light path between the held component and the component camera; and effecting a linear correction and/or an angular correction of the held component position, calculated in accordance with the shadow image, before placing the held component onto the substrate. 22. The method according to claim 21, wherein the effecting step includes rotating the pickup device and the held component in opposite directions by predetermined angles to generate data representing different extents of said shadow image for said predetermined rotational angles, and using said data to effect angular correction of the held component position before placing the held component onto the substrate. 23. The method according to claim 21, wherein the effecting step includes calculating a linear correction to adjust coordinates of a predetermined placement location to effect linear correction of the held component position before placing the held component onto the substrate. 24. The method according to claim 21, wherein the collimated light source comprises a light emitting diode or a laser.
A pick-and-place machine and method includes use of a passive component feeder cartridge including a feeder gear. Rotation of the feeder gear causes a component-bearing tape to be fed through the feeder cartridge. A pickup head includes a vacuum nozzle to pick up the components from the tape and a rack gear to engage and drive the feeder gear of the feeder cartridge via translational motion of the pickup head when operatively disposed with respect to a selected feeder cartridge.1. A method for picking up and placing components on a substrate with a pick-and-place machine, the pick-and-place machine including a pickup device to pick up and place the components and a collimated light source directing collimated light along a light path toward a component and a downstream camera, the method comprising: picking up and holding a component with the pickup device; positioning the held component in a collimated light path such that collimated light passes around and past the held component; projecting a shadow image of the held component onto a diffuser screen also disposed in the collimated light path between the held component and the camera; and effecting a linear correction and/or an angular correction of the held component position, calculated in accordance with the shadow image, before placing the held component onto the substrate. 2. The method according to claim 1, wherein the effecting step includes rotating the pickup device and the held component in opposite directions by predetermined angles to generate data representing different extents of said shadow image for said predetermined rotational angles, and using said data to effect angular correction of the held component position before placing the held component onto the substrate. 3. The method according to claim 1, wherein the effecting step includes calculating a linear correction to adjust coordinates of a predetermined placement location to effect linear correction of the held component position before placing the held component onto the substrate. 4. The method according to claim 1, wherein the collimated light source comprises a light emitting diode or a laser. 5. A pick-and-place machine for picking components from a feeder cartridge and placing the picked components onto a substrate, said machine comprising: a pickup device configured to pick up and place components onto a substrate; a component camera; a collimated light source directing collimated light toward the component camera, around and past a component as it is held by the pickup device after pickup; a diffuser screen disposed in the collimated light path between the held component and the component camera causing a shadow image of the held component to be projected onto the diffuser screen for image capture by said component camera; and at least one control processor configured to effect a linear correction and/or an angular correction of the held component position, calculated in accordance with the shadow image, before placing the held component onto the substrate. 6. The pick-and-place machine according to claim 5, further comprising a pickup device rotation motor to rotate the pickup device, wherein the pickup device rotation motor is configured to rotate the pickup device and the held component to effect angular correction of the held component position before placing the held component onto the substrate. 7. The pick-and-place machine according to claim 4, wherein the collimated light source comprises a light emitting diode or a laser. 8. An optical subsystem in a pick-and-place machine, the pick-and-place machine including a pickup device adapted to pick up a component from a feeder cartridge, hold the component against the pickup device and place the component onto a substrate, the optical subsystem comprising: a first collimated light source arranged to project collimated first light along a first light path and past around the held component; a second light source arranged to project second light along a second light path toward the substrate; a dual camera assembly including a camera lens disposed in the first and second light paths, a first beam splitter disposed to split a portion of the first and second light to (a) a component camera and (b) a multi-purpose camera, wherein said component camera is used when said first collimated light source is active and said multi-purpose camera is used when said second light source is active. 9. The optical subsystem according to claim 8, further comprising a diffuser screen disposed in the first light path between the held component and the camera lens. 10. The optical subsystem according to claim 9, wherein a shadow image of the held component is projected onto the diffuser screen for image capture by the component camera. 11. The optical subsystem according to claim 9, wherein the second light is reflected off of the substrate and into the camera lens. 12. The optical subsystem according to claim 11, further comprising a second beam splitter disposed in the first light path between the diffuser screen and the cameral lens and also disposed in the second light path between the second light source and the substrate. 13. The optical subsystem according to claim 12, further comprising a diffuser disposed in the second light path between the light source and the second beam splitter. 14. The optical subsystem according to claim 8, wherein the first collimated light source comprises a light emitting diode or a laser. 15. The optical subsystem according to claim 8, wherein the second light source comprises an array of multi-color light emitting diodes. 16. The optical subsystem according to claim 8, wherein the dual camera assembly is movable vertically relative to the substrate to provide variable focus ability for the multi-purpose camera. 17. The optical subsystem according to claim 16, wherein the dual camera assembly is fixed with respect to a pickup device thereby providing the component camera with a fixed focus with respect to a picked-up component. 18. The optical subsystem according to claim 8, wherein the optical subsystem is configured to use the multi-purpose camera to detect the presence of the feeder cartridge to derive location information of the feeder cartridge and to acquire machine readable information on the feeder cartridge to derive identification information of a component therein situated. 19. The optical subsystem according to claim 9, further comprising a reverse periscope mirror system disposed in the second light path to enable the multi-purpose camera to capture images of the held component. 20. A pick-and-place machine for picking components from a feeder cartridge and placing the picked components onto a substrate in combination with the optical subsystem of claim 8, said machine comprising: a feeder cartridge including a body portion adapted to accept a tape bearing a plurality of components and a feeder member rotatably connected to the body portion, the feeder cartridge having machine readable information on a surface thereof. wherein rotation of the feeder member causes such a tape to move at least one tape-carried component into a pickup zone; and a pickup head including a pickup device adapted to pick up at least one of the plurality of components from the pickup zone, and hold the component with the pickup device until released to place the component onto the substrate, wherein the optical subsystem is configured to use the multi-purpose camera to detect the presence and location of the feeder cartridge and to acquire machine readable information on the feeder cartridge including identification of the components disposed therewithin. 21. A method for picking up and placing components on a substrate with a pick-and-place machine, the pick-and-place machine including a pickup device to pick up and place the components, the method comprising: providing the optical subsystem of claim 8; picking up and holding a component with the pickup device; positioning the held component in the collimated light path such that collimated light passes around and past the held component; projecting a shadow image of the held component onto a diffuser screen disposed in the collimated light path between the held component and the component camera; and effecting a linear correction and/or an angular correction of the held component position, calculated in accordance with the shadow image, before placing the held component onto the substrate. 22. The method according to claim 21, wherein the effecting step includes rotating the pickup device and the held component in opposite directions by predetermined angles to generate data representing different extents of said shadow image for said predetermined rotational angles, and using said data to effect angular correction of the held component position before placing the held component onto the substrate. 23. The method according to claim 21, wherein the effecting step includes calculating a linear correction to adjust coordinates of a predetermined placement location to effect linear correction of the held component position before placing the held component onto the substrate. 24. The method according to claim 21, wherein the collimated light source comprises a light emitting diode or a laser.
2,400
7,845
7,845
14,992,105
2,413
A transmitting apparatus is provided. The transmitting apparatus includes: a packet generator generating a packet including a header and a payload from an input stream including a plurality of input packets; and a signal processor signal-processing the packet, wherein the header includes a base header which includes: a first field indicating a packet type of the input packets; wherein when the first field is set to a value indicating that the packet type of the input packets is a TS packet, the base header comprises a second field indicating a number of TS packets included in the payload and a third field set to a first value indicating that the header of the packet does not comprises an additional header or a second value indicating that the header of the packet further comprises the additional header, and wherein the third field is set to the second value when TS header compression to remove at least one header of the TS packets is applied to generate the packet.
1. A transmitting apparatus comprising at least one processor configured to implement: a packet generator generating a packet comprising a header and a payload from an input stream comprising a plurality of input packets; and a signal processor signal-processing the packet, wherein the header comprises a base header which comprises: a first field indicating a packet type of the input packets; wherein when the first field is set to a value indicating that the packet type of the input packets is a TS packet, the base header comprises a second field indicating a number of TS packets included in the payload and a third field set to a first value indicating that the header of the packet does not comprises an additional header or a second value indicating that the header of the packet further comprises the additional header, and wherein the third field is set to the second value when TS header compression to remove at least one header of the TS packets is applied to generate the packet. 2. The transmitting apparatus of claim 1, wherein the packet is a link-layer protocol packet which is to be mapped to a physical layer before being transmitted out from the transmitting apparatus. 3. The transmitting apparatus of claim 1, wherein, by the TS header compression, a header of one TS packet among the TS packets is included in the payload of the packet and a header of at least one another TS packet among the TS packets is not included in the payload of the packet. 4. The transmitting apparatus of claim 1, wherein when the third field is set to the second value, the additional header comprises a fourth field set to a third value indicating that the header compression is applied to generate the packet and a fifth field indicating a number of deleted null TS packets, and wherein the deleted null TS packets comprise at least one null TS packet which immediately precedes a first TS packet among the TS packets included in the payload of the packet. 5. The transmitting apparatus of claim 4, wherein when there is a deleted null TS packet, the fifth field is set to a value indicating a number of the deleted null TS packet, and when there is no deleted null TS packet, the fifth field is set to 0. 6. The transmitting apparatus of claim 4, wherein the fifth field is implemented as a 7-bit field, and wherein when the third field is set to the second value and the fourth field is set to a fourth value indicating that the header compression is not applied to generate the packet, the fifth field is set to 0 in a case where 128 null TS packets are deleted. 7. The transmitting apparatus of claim 1, wherein each of the TS packets comprises sync information which is removed when the TS packets are encapsulated in the payload of the packet to generate the packet. 8. The transmitting apparatus of claim 1, wherein the first field, the second field, and the third field are implemented as a 3-bit field, a 4-bit field, and a 1-bit field, respectively. 9. The transmitting apparatus of claim 1, wherein the TS packets comprises at least one moving picture experts group 2 (MPEG2) transport stream (TS) packet. 10. A signal processing method of a transmitting apparatus, the signal processing method comprising: generating a packet comprising a header and a payload based from an input stream comprising a plurality of input packets; and signal-processing the packet, wherein the header comprises a base header which comprises: a first field indicating a packet type of the input packets; herein when the first field is set to a value indicating that the packet type of the input packets is a TS packet, the base header comprises a second field indicating a number of TS packets included in the payload and a third field set to a first value indicating that the header of the packet does not comprises an additional header or a second value indicating that the header of the packet further comprises the additional header, and wherein the third field is set to the second value when TS header compression to remove at least one header of the TS packets is applied to generate the packet. 11. The signal processing method of claim 10, wherein the packet is a link-layer protocol packet which is to be mapped to a physical layer before being transmitted out from the transmitting apparatus. 12. The signal processing method of claim 10, wherein, by the TS header compression, a header of one TS packet among the TS packets is included in the payload of the packet and a header of at least one another TS packet among the TS packets is not included in the payload of the packet. 13. The signal processing method of claim 10, wherein when the third field is set to the second value, the additional header comprises a fourth field set to a third value indicating that the header compression is applied to generate the packet and a fifth field indicating a number of deleted null TS packets, and wherein the deleted null TS packets comprise at least one null TS packet which immediately precedes a first TS packet among the TS packets included in the payload of the packet. 14. The signal processing method of claim 13, wherein when there is a deleted null TS packet, the fifth field is set to a value indicating a number of the deleted null TS packet, and when there is no deleted null TS packet, the fifth field is set to 0. 15. The signal processing method of claim 14, wherein the fifth field is implemented as a 7-bit field, and wherein when the third field is set to the second value and the fourth field is set to a fourth value indicating that the header compression is not applied to generate the packet, the fifth field is set to 0 in a case where 128 null packets are deleted. 16. The signal processing method of claim 10, wherein each of the TS packets comprises sync information which is removed when the TS packets are encapsulated in the payload of the packet to generate the packet. 17. The signal processing method of claim 10, wherein the first field, the second field, and the third field are implemented as a 3-bit field, a 4-bit field, and a 1-bit field, respectively. 18. A computer readable recording medium having recorded thereon a program for executing a signal processing method comprising: generating a packet comprising a header and a payload based from an input stream comprising a plurality of input packets; and signal-processing the packet, wherein the header comprises a base header which comprises: a first field indicating a packet type of the input packets; wherein when the first field is set to a value indicating that the packet type of the input packets is a TS packet, the base header comprises a second field indicating a number of TS packets included in the payload and a third field set to a first value indicating that the header of the packet does not comprises an additional header or a second value indicating that the header of the packet further comprises the additional header, and wherein the third field is set to the second value when TS header compression to remove at least one header of the TS packets is applied to generate the packet.
A transmitting apparatus is provided. The transmitting apparatus includes: a packet generator generating a packet including a header and a payload from an input stream including a plurality of input packets; and a signal processor signal-processing the packet, wherein the header includes a base header which includes: a first field indicating a packet type of the input packets; wherein when the first field is set to a value indicating that the packet type of the input packets is a TS packet, the base header comprises a second field indicating a number of TS packets included in the payload and a third field set to a first value indicating that the header of the packet does not comprises an additional header or a second value indicating that the header of the packet further comprises the additional header, and wherein the third field is set to the second value when TS header compression to remove at least one header of the TS packets is applied to generate the packet.1. A transmitting apparatus comprising at least one processor configured to implement: a packet generator generating a packet comprising a header and a payload from an input stream comprising a plurality of input packets; and a signal processor signal-processing the packet, wherein the header comprises a base header which comprises: a first field indicating a packet type of the input packets; wherein when the first field is set to a value indicating that the packet type of the input packets is a TS packet, the base header comprises a second field indicating a number of TS packets included in the payload and a third field set to a first value indicating that the header of the packet does not comprises an additional header or a second value indicating that the header of the packet further comprises the additional header, and wherein the third field is set to the second value when TS header compression to remove at least one header of the TS packets is applied to generate the packet. 2. The transmitting apparatus of claim 1, wherein the packet is a link-layer protocol packet which is to be mapped to a physical layer before being transmitted out from the transmitting apparatus. 3. The transmitting apparatus of claim 1, wherein, by the TS header compression, a header of one TS packet among the TS packets is included in the payload of the packet and a header of at least one another TS packet among the TS packets is not included in the payload of the packet. 4. The transmitting apparatus of claim 1, wherein when the third field is set to the second value, the additional header comprises a fourth field set to a third value indicating that the header compression is applied to generate the packet and a fifth field indicating a number of deleted null TS packets, and wherein the deleted null TS packets comprise at least one null TS packet which immediately precedes a first TS packet among the TS packets included in the payload of the packet. 5. The transmitting apparatus of claim 4, wherein when there is a deleted null TS packet, the fifth field is set to a value indicating a number of the deleted null TS packet, and when there is no deleted null TS packet, the fifth field is set to 0. 6. The transmitting apparatus of claim 4, wherein the fifth field is implemented as a 7-bit field, and wherein when the third field is set to the second value and the fourth field is set to a fourth value indicating that the header compression is not applied to generate the packet, the fifth field is set to 0 in a case where 128 null TS packets are deleted. 7. The transmitting apparatus of claim 1, wherein each of the TS packets comprises sync information which is removed when the TS packets are encapsulated in the payload of the packet to generate the packet. 8. The transmitting apparatus of claim 1, wherein the first field, the second field, and the third field are implemented as a 3-bit field, a 4-bit field, and a 1-bit field, respectively. 9. The transmitting apparatus of claim 1, wherein the TS packets comprises at least one moving picture experts group 2 (MPEG2) transport stream (TS) packet. 10. A signal processing method of a transmitting apparatus, the signal processing method comprising: generating a packet comprising a header and a payload based from an input stream comprising a plurality of input packets; and signal-processing the packet, wherein the header comprises a base header which comprises: a first field indicating a packet type of the input packets; herein when the first field is set to a value indicating that the packet type of the input packets is a TS packet, the base header comprises a second field indicating a number of TS packets included in the payload and a third field set to a first value indicating that the header of the packet does not comprises an additional header or a second value indicating that the header of the packet further comprises the additional header, and wherein the third field is set to the second value when TS header compression to remove at least one header of the TS packets is applied to generate the packet. 11. The signal processing method of claim 10, wherein the packet is a link-layer protocol packet which is to be mapped to a physical layer before being transmitted out from the transmitting apparatus. 12. The signal processing method of claim 10, wherein, by the TS header compression, a header of one TS packet among the TS packets is included in the payload of the packet and a header of at least one another TS packet among the TS packets is not included in the payload of the packet. 13. The signal processing method of claim 10, wherein when the third field is set to the second value, the additional header comprises a fourth field set to a third value indicating that the header compression is applied to generate the packet and a fifth field indicating a number of deleted null TS packets, and wherein the deleted null TS packets comprise at least one null TS packet which immediately precedes a first TS packet among the TS packets included in the payload of the packet. 14. The signal processing method of claim 13, wherein when there is a deleted null TS packet, the fifth field is set to a value indicating a number of the deleted null TS packet, and when there is no deleted null TS packet, the fifth field is set to 0. 15. The signal processing method of claim 14, wherein the fifth field is implemented as a 7-bit field, and wherein when the third field is set to the second value and the fourth field is set to a fourth value indicating that the header compression is not applied to generate the packet, the fifth field is set to 0 in a case where 128 null packets are deleted. 16. The signal processing method of claim 10, wherein each of the TS packets comprises sync information which is removed when the TS packets are encapsulated in the payload of the packet to generate the packet. 17. The signal processing method of claim 10, wherein the first field, the second field, and the third field are implemented as a 3-bit field, a 4-bit field, and a 1-bit field, respectively. 18. A computer readable recording medium having recorded thereon a program for executing a signal processing method comprising: generating a packet comprising a header and a payload based from an input stream comprising a plurality of input packets; and signal-processing the packet, wherein the header comprises a base header which comprises: a first field indicating a packet type of the input packets; wherein when the first field is set to a value indicating that the packet type of the input packets is a TS packet, the base header comprises a second field indicating a number of TS packets included in the payload and a third field set to a first value indicating that the header of the packet does not comprises an additional header or a second value indicating that the header of the packet further comprises the additional header, and wherein the third field is set to the second value when TS header compression to remove at least one header of the TS packets is applied to generate the packet.
2,400
7,846
7,846
14,606,360
2,463
First user equipment transmits information identifying first interfaces supported by the first user equipment and first channel capacities associated with the first interfaces. The first user equipment receives information identifying a subset of the first interfaces. The subset is selected based on the first channel capacities and second channel capacities of second interfaces associated with at least one second user equipment. The first user equipment is then configured to aggregate the subset of the first interfaces. A policy server selects a subset of first interfaces supported by a first user equipment based on information indicating first channel capacities of the first interfaces and second channel capacities of second interfaces associated with at least one second user equipment. The policy server transmits instructions to the first user equipment to aggregate the subset.
1. A method comprising: transmitting, from first user equipment, information identifying first interfaces supported by the first user equipment and first channel capacities associated with the first interfaces; receiving, at the first user equipment, information identifying a subset of the first interfaces, wherein the subset is selected based on the first channel capacities and second channel capacities of second interfaces associated with at least one second user equipment; and configuring the first user equipment to aggregate the subset of the first interfaces. 2. The method of claim 1, further comprising: transmitting information identifying delays associated with the first interfaces, and wherein receiving the information identifying the subset comprises receiving information identifying a subset selected based on the delays. 3. The method of claim 1, wherein transmitting the information identifying the first interfaces and receiving the information identifying the subset comprises transmitting the information identifying the first interfaces on an uplink of a dedicated bidirectional signaling channel and receiving the information identifying the subset on a downlink of the dedicated bidirectional signaling channel. 4. The method of claim 1, further comprising: measuring at least one value of a signal strength, a transmission rate, and a loss rate; and transmitting information identifying the at least one value, and wherein receiving the information identifying the subset comprises receiving information identifying a subset selected based on the at least one value. 5. The method of claim 1, further comprising: negotiating payment for usage of the subset of the first interfaces in response to receiving the information identifying the subset; and transmitting or receiving information via the subset in response to negotiating the payment. 6. A method comprising: selecting, at a policy server, a subset of first interfaces supported by a first user equipment based on information indicating first channel capacities of the first interfaces and second channel capacities of second interfaces associated with at least one second user equipment; and transmitting, from the policy server to the first user equipment, instructions to aggregate the subset. 7. The method of claim 6, further comprising: receiving, at the policy server, information from the first user equipment identifying the first interfaces and the first channel capacities; and receiving, at the policy server, information from the at least one second user equipment identifying the second interfaces and the second channel capacities. 8. The method of claim 7, wherein receiving the information identifying the first interfaces and transmitting the instructions comprises receiving the information identifying the first interfaces on an uplink of a dedicated bidirectional signaling channel and transmitting the instructions on a downlink of the dedicated bidirectional signaling channel. 9. The method of claim 6, further comprising: receiving information identifying delays associated with the first interfaces, and wherein selecting the subset comprises selecting the subset based on the delays. 10. The method of claim 6, wherein selecting the subset comprises selecting the subset to optimize at least one of an aggregate network capacity and a differential service to the first user equipment and the at least one second user equipment. 11. The method of claim 6, further comprising: transmitting a request to measure at least one value of a signal strength, a transmission rate, and a loss rate; and receiving information identifying the at least one value, and wherein selecting the subset comprises selecting the subset based on the at least one value. 12. The method of claim 6, further comprising: negotiating payment for usage of the subset of the first interfaces in response to receiving the information identifying the subset. 13. The method of claim 6, further comprising: opening a first socket to terminate first connections to the subset of the first interfaces; and opening a second socket to terminate a second connection to a server, wherein the first socket and the second socket are opened in response to receiving the information identifying the first interfaces and the first channel capacities. 14. The method of claim 13, further comprising: providing data received from the server at the second socket to the subset of the first interfaces via the first socket. 15. User equipment comprising: a plurality of first interfaces; a transceiver to transmit information identifying the first interfaces and first channel capacities associated with the first interfaces and receive information identifying a subset of the first interfaces, wherein the subset is selected based on the first channel capacities and second channel capacities of second interfaces associated with at least one other user equipment; and a processor to aggregate the subset of the first interfaces. 16. The user equipment of claim 15, wherein the transceiver is to transmit information identifying delays associated with the first interfaces and receive information identifying a subset selected based on the delays. 17. The user equipment of claim 15, wherein the transceiver is to transmit the information identifying the first interfaces on an uplink of a dedicated bidirectional signaling channel and receive the information identifying the subset on a downlink of the dedicated bidirectional signaling channel. 18. The user equipment of claim 15, wherein the processor is to measure at least one value of a signal strength, a transmission rate, and a loss rate, and wherein the transceiver is to transmit information identifying the at least one value and receive information identifying a subset selected based on the at least one value. 19. The user equipment of claim 15, wherein the processor is to negotiate payment for usage of the subset of the first interfaces in response to receiving the information identifying the subset, and wherein the transceiver is to transmit or receive information via the subset in response to negotiating the payment. 20. An apparatus comprising: a processor to select a subset of first interfaces supported by a first user equipment based on information indicating first channel capacities of the first interfaces and second channel capacities of second interfaces associated with at least one second user equipment; and a transceiver to transmit instructions to aggregate the subset at the first user equipment. 21. The apparatus of claim 20, wherein the transceiver is to receive information from the first user equipment identifying the first interfaces and the first channel capacities, and wherein the transceiver is to receive information from the at least one second user equipment identifying the second interfaces and the second channel capacities. 22. The apparatus of claim 21, wherein the transceiver is to receive the information identifying the first interfaces on an uplink of a dedicated bidirectional signaling channel, and wherein the transceiver is to transmit the instructions on a downlink of the dedicated bidirectional signaling channel. 23. The apparatus of claim 20, wherein the transceiver is to receive information identifying delays associated with the first interfaces, and wherein the processor is to select the subset based on the delays. 24. The apparatus of claim 20, wherein the processor is to select the subset to optimize at least one of an aggregate network capacity and a differential service to the first user equipment and the at least one second user equipment. 25. The apparatus of claim 20, wherein the transceiver is to transmit a request to measure at least one value of a signal strength, a transmission rate, and a loss rate, and wherein the transceiver is to receive information identifying the at least one value, and wherein the processor is to select the subset based on the at least one value. 26. The apparatus of claim 20, wherein the processor is to negotiate payment for usage of the subset of the first interfaces in response to receiving the information identifying the subset. 27. The apparatus of claim 20, wherein the processor is to open a first socket to terminate first connections to the subset of the first interfaces, and wherein the processor is to open a second socket to terminate a second connection to a server, wherein the processor is to open the first socket and the second socket in response to receiving the information identifying the first interfaces and the first channel capacities. 28. The apparatus of claim 27, wherein the processor is to provide data received from the server at the second socket to the subset of the first interfaces via the first socket.
First user equipment transmits information identifying first interfaces supported by the first user equipment and first channel capacities associated with the first interfaces. The first user equipment receives information identifying a subset of the first interfaces. The subset is selected based on the first channel capacities and second channel capacities of second interfaces associated with at least one second user equipment. The first user equipment is then configured to aggregate the subset of the first interfaces. A policy server selects a subset of first interfaces supported by a first user equipment based on information indicating first channel capacities of the first interfaces and second channel capacities of second interfaces associated with at least one second user equipment. The policy server transmits instructions to the first user equipment to aggregate the subset.1. A method comprising: transmitting, from first user equipment, information identifying first interfaces supported by the first user equipment and first channel capacities associated with the first interfaces; receiving, at the first user equipment, information identifying a subset of the first interfaces, wherein the subset is selected based on the first channel capacities and second channel capacities of second interfaces associated with at least one second user equipment; and configuring the first user equipment to aggregate the subset of the first interfaces. 2. The method of claim 1, further comprising: transmitting information identifying delays associated with the first interfaces, and wherein receiving the information identifying the subset comprises receiving information identifying a subset selected based on the delays. 3. The method of claim 1, wherein transmitting the information identifying the first interfaces and receiving the information identifying the subset comprises transmitting the information identifying the first interfaces on an uplink of a dedicated bidirectional signaling channel and receiving the information identifying the subset on a downlink of the dedicated bidirectional signaling channel. 4. The method of claim 1, further comprising: measuring at least one value of a signal strength, a transmission rate, and a loss rate; and transmitting information identifying the at least one value, and wherein receiving the information identifying the subset comprises receiving information identifying a subset selected based on the at least one value. 5. The method of claim 1, further comprising: negotiating payment for usage of the subset of the first interfaces in response to receiving the information identifying the subset; and transmitting or receiving information via the subset in response to negotiating the payment. 6. A method comprising: selecting, at a policy server, a subset of first interfaces supported by a first user equipment based on information indicating first channel capacities of the first interfaces and second channel capacities of second interfaces associated with at least one second user equipment; and transmitting, from the policy server to the first user equipment, instructions to aggregate the subset. 7. The method of claim 6, further comprising: receiving, at the policy server, information from the first user equipment identifying the first interfaces and the first channel capacities; and receiving, at the policy server, information from the at least one second user equipment identifying the second interfaces and the second channel capacities. 8. The method of claim 7, wherein receiving the information identifying the first interfaces and transmitting the instructions comprises receiving the information identifying the first interfaces on an uplink of a dedicated bidirectional signaling channel and transmitting the instructions on a downlink of the dedicated bidirectional signaling channel. 9. The method of claim 6, further comprising: receiving information identifying delays associated with the first interfaces, and wherein selecting the subset comprises selecting the subset based on the delays. 10. The method of claim 6, wherein selecting the subset comprises selecting the subset to optimize at least one of an aggregate network capacity and a differential service to the first user equipment and the at least one second user equipment. 11. The method of claim 6, further comprising: transmitting a request to measure at least one value of a signal strength, a transmission rate, and a loss rate; and receiving information identifying the at least one value, and wherein selecting the subset comprises selecting the subset based on the at least one value. 12. The method of claim 6, further comprising: negotiating payment for usage of the subset of the first interfaces in response to receiving the information identifying the subset. 13. The method of claim 6, further comprising: opening a first socket to terminate first connections to the subset of the first interfaces; and opening a second socket to terminate a second connection to a server, wherein the first socket and the second socket are opened in response to receiving the information identifying the first interfaces and the first channel capacities. 14. The method of claim 13, further comprising: providing data received from the server at the second socket to the subset of the first interfaces via the first socket. 15. User equipment comprising: a plurality of first interfaces; a transceiver to transmit information identifying the first interfaces and first channel capacities associated with the first interfaces and receive information identifying a subset of the first interfaces, wherein the subset is selected based on the first channel capacities and second channel capacities of second interfaces associated with at least one other user equipment; and a processor to aggregate the subset of the first interfaces. 16. The user equipment of claim 15, wherein the transceiver is to transmit information identifying delays associated with the first interfaces and receive information identifying a subset selected based on the delays. 17. The user equipment of claim 15, wherein the transceiver is to transmit the information identifying the first interfaces on an uplink of a dedicated bidirectional signaling channel and receive the information identifying the subset on a downlink of the dedicated bidirectional signaling channel. 18. The user equipment of claim 15, wherein the processor is to measure at least one value of a signal strength, a transmission rate, and a loss rate, and wherein the transceiver is to transmit information identifying the at least one value and receive information identifying a subset selected based on the at least one value. 19. The user equipment of claim 15, wherein the processor is to negotiate payment for usage of the subset of the first interfaces in response to receiving the information identifying the subset, and wherein the transceiver is to transmit or receive information via the subset in response to negotiating the payment. 20. An apparatus comprising: a processor to select a subset of first interfaces supported by a first user equipment based on information indicating first channel capacities of the first interfaces and second channel capacities of second interfaces associated with at least one second user equipment; and a transceiver to transmit instructions to aggregate the subset at the first user equipment. 21. The apparatus of claim 20, wherein the transceiver is to receive information from the first user equipment identifying the first interfaces and the first channel capacities, and wherein the transceiver is to receive information from the at least one second user equipment identifying the second interfaces and the second channel capacities. 22. The apparatus of claim 21, wherein the transceiver is to receive the information identifying the first interfaces on an uplink of a dedicated bidirectional signaling channel, and wherein the transceiver is to transmit the instructions on a downlink of the dedicated bidirectional signaling channel. 23. The apparatus of claim 20, wherein the transceiver is to receive information identifying delays associated with the first interfaces, and wherein the processor is to select the subset based on the delays. 24. The apparatus of claim 20, wherein the processor is to select the subset to optimize at least one of an aggregate network capacity and a differential service to the first user equipment and the at least one second user equipment. 25. The apparatus of claim 20, wherein the transceiver is to transmit a request to measure at least one value of a signal strength, a transmission rate, and a loss rate, and wherein the transceiver is to receive information identifying the at least one value, and wherein the processor is to select the subset based on the at least one value. 26. The apparatus of claim 20, wherein the processor is to negotiate payment for usage of the subset of the first interfaces in response to receiving the information identifying the subset. 27. The apparatus of claim 20, wherein the processor is to open a first socket to terminate first connections to the subset of the first interfaces, and wherein the processor is to open a second socket to terminate a second connection to a server, wherein the processor is to open the first socket and the second socket in response to receiving the information identifying the first interfaces and the first channel capacities. 28. The apparatus of claim 27, wherein the processor is to provide data received from the server at the second socket to the subset of the first interfaces via the first socket.
2,400
7,847
7,847
14,501,706
2,468
Described herein are systems and methods for improved transitions continuity between wireless protocol states. One embodiment relates to a method including, at a user equipment (“UE”), establishing a connection to a first wireless network in accordance with a first wireless communication protocol, wherein the first wireless communication protocol is used for voice communications and data communications between the UE and the first wireless network, receiving a user request to disable the voice communications with the first wireless network, registering for voice communications with a second wireless network in accordance with a second wireless communication protocol, and maintaining the connection to the first wireless network to continue data communications between the UE and the first wireless network, wherein the UE simultaneously operates in the first wireless communication protocol and the second wireless communication protocol.
1. A method, comprising: at a user equipment (“UE”): establishing a connection to a first wireless network in accordance with a first wireless communication protocol, wherein the first wireless communication protocol is used for voice communications and data communications between the UE and the first wireless network; receiving a user request to disable the voice communications with the first wireless network; registering for voice communications with a second wireless network in accordance with a second wireless communication protocol; and maintaining the connection to the first wireless network to continue data communications between the UE and the first wireless network, wherein the UE simultaneously operates in the first wireless communication protocol and the second wireless communication protocol. 2. The method of claim 1, further comprising: entering into an idle state; and reconfiguring a plurality of internal stacks of the UE while in the idle state, wherein the reconfiguring includes indicating a first internal stack related to the second wireless communication protocol is a primary stack and a second internal stack related to the first wireless communication protocol is a secondary stack. 3. The method of claim 1, wherein the first wireless communication protocol includes assigning an address to the UE and wherein the UE maintains the same address throughout the steps of the method. 4. The method of claim 3, wherein the address is an Internet Protocol (IP) address. 5. The method of claim 1, further comprising: sending a request to the first wireless network to indicate a preference to utilize the second wireless communication protocol for voice communications. 6. The method of claim 1, wherein the first wireless network operates in accordance with a long term evolution (“LTE”) or long term evolution advanced (“LTE-A”) wireless communication protocol, and the second wireless network operates in accordance with one of a legacy third generation (“3G”) wireless communication protocol and a legacy second generation (“2G”) wireless communication protocol. 7. The method of claim 1, further comprising: deregistering with an IP Multimedia Subsystem (IMS) before registering for voice communications with the second wireless network. 8. The method of claim 1, further comprising: registering with the first wireless communication protocol for short message service (“SMS”). 9. The method of claim 1, wherein the first wireless network is a packet-switched network and the second wireless network is a circuit switched network. 10. The method of claim 1, further comprising: receiving a further user request to enable the voice communications with the first wireless network; registering for voice communications with the first wireless network in accordance with the first wireless communication protocol; entering into the idle state; reconfiguring the plurality of internal stacks of the UE while in the idle state, wherein the reconfiguring includes indicating a first internal stack related to the second wireless communication protocol is a secondary stack and a second internal stack related to the first wireless communication protocol is a primary stack; and sending a further request to the first wireless network to indicate a preference to utilize the first wireless communication protocol for voice communications. 11. The method of claim 10, further comprising: maintaining a connection with the second wireless network to perform voice communications when there is a failure of the voice communications between the UE and the first wireless network. 12. A user equipment (“UE”), comprising: a processor configured to control establishing and releasing connections between the wireless communication device and a first wireless network and between the wireless communication device and a second wireless network; a transceiver configurable to transmit and receive signals to the first wireless network according to a first wireless communication protocol and to the second wireless network according to a second wireless communication protocol; and a non-transitory memory having a program stored thereon, wherein the execution of the program causes the processor to perform operations comprising: establishing a connection to a first wireless network in accordance with a first wireless communication protocol, wherein the first wireless communication protocol is used for voice communications and data communications between the UE and the first wireless network; receiving a user request to disable the voice communications with the first wireless network; registering for voice communications with a second wireless network in accordance with a second wireless communication protocol; and maintaining the connection to the first wireless network to continue data communications between the UE and the first wireless network, wherein the UE simultaneously operates in the first wireless communication protocol and the second wireless communication protocol. 13. The UE of claim 12, wherein the operations further comprise: entering into an idle state; and reconfiguring a plurality of internal stacks of the UE while in the idle state, wherein the reconfiguring includes indicating a first internal stack related to the second wireless communication protocol is a primary stack and a second internal stack related to the first wireless communication protocol is a secondary stack. 14. The UE of claim 12, wherein the first wireless communication protocol includes assigning an address to the UE and wherein the UE maintains the same address throughout the steps of the method, wherein the address is an Internet Protocol (IP) address. 15. The UE of claim 12, wherein the operations further comprise: sending a request to the first wireless network to indicate a preference to utilize the second wireless communication protocol for voice communications. 16. The UE of claim 12, wherein the first wireless network operates in accordance with a long term evolution (“LTE”) or long term evolution advanced (“LTE-A”) wireless communication protocol, and the second wireless network operates in accordance with one of a legacy third generation (“3G”) wireless communication protocol and a legacy second generation (“2G”) wireless communication protocol. 17. The UE of claim 12, wherein the operations further comprise: deregistering with an IP Multimedia Subsystem (IMS) before registering for voice communications with the second wireless network. 18. The UE of claim 12, wherein the first wireless network is a packet-switched network and the second wireless network is a circuit switched network. 19. A computer program product encoded as computer program code in a non-transitory computer readable medium for configuring wireless circuitry of a wireless communication device, the computer program product comprising instructions for: establishing a connection to a first wireless network in accordance with a first wireless communication protocol, wherein the first wireless communication protocol is used for voice communications and data communications between the UE and the first wireless network; receiving a user request to disable the voice communications with the first wireless network; registering for voice communications with a second wireless network in accordance with a second wireless communication protocol; and maintaining the connection to the first wireless network to continue data communications between the UE and the first wireless network, wherein the UE simultaneously operates in the first wireless communication protocol and the second wireless communication protocol. 20. The computer program product of claim 19, further comprising instructions for: entering into an idle state; reconfiguring a plurality of internal stacks of the UE while in the idle state, wherein the reconfiguring includes indicating a first internal stack related to the second wireless communication protocol is a primary stack and a second internal stack related to the first wireless communication protocol is a secondary stack; and sending a request to the first wireless network to indicate a preference to utilize the second wireless communication protocol for voice communications.
Described herein are systems and methods for improved transitions continuity between wireless protocol states. One embodiment relates to a method including, at a user equipment (“UE”), establishing a connection to a first wireless network in accordance with a first wireless communication protocol, wherein the first wireless communication protocol is used for voice communications and data communications between the UE and the first wireless network, receiving a user request to disable the voice communications with the first wireless network, registering for voice communications with a second wireless network in accordance with a second wireless communication protocol, and maintaining the connection to the first wireless network to continue data communications between the UE and the first wireless network, wherein the UE simultaneously operates in the first wireless communication protocol and the second wireless communication protocol.1. A method, comprising: at a user equipment (“UE”): establishing a connection to a first wireless network in accordance with a first wireless communication protocol, wherein the first wireless communication protocol is used for voice communications and data communications between the UE and the first wireless network; receiving a user request to disable the voice communications with the first wireless network; registering for voice communications with a second wireless network in accordance with a second wireless communication protocol; and maintaining the connection to the first wireless network to continue data communications between the UE and the first wireless network, wherein the UE simultaneously operates in the first wireless communication protocol and the second wireless communication protocol. 2. The method of claim 1, further comprising: entering into an idle state; and reconfiguring a plurality of internal stacks of the UE while in the idle state, wherein the reconfiguring includes indicating a first internal stack related to the second wireless communication protocol is a primary stack and a second internal stack related to the first wireless communication protocol is a secondary stack. 3. The method of claim 1, wherein the first wireless communication protocol includes assigning an address to the UE and wherein the UE maintains the same address throughout the steps of the method. 4. The method of claim 3, wherein the address is an Internet Protocol (IP) address. 5. The method of claim 1, further comprising: sending a request to the first wireless network to indicate a preference to utilize the second wireless communication protocol for voice communications. 6. The method of claim 1, wherein the first wireless network operates in accordance with a long term evolution (“LTE”) or long term evolution advanced (“LTE-A”) wireless communication protocol, and the second wireless network operates in accordance with one of a legacy third generation (“3G”) wireless communication protocol and a legacy second generation (“2G”) wireless communication protocol. 7. The method of claim 1, further comprising: deregistering with an IP Multimedia Subsystem (IMS) before registering for voice communications with the second wireless network. 8. The method of claim 1, further comprising: registering with the first wireless communication protocol for short message service (“SMS”). 9. The method of claim 1, wherein the first wireless network is a packet-switched network and the second wireless network is a circuit switched network. 10. The method of claim 1, further comprising: receiving a further user request to enable the voice communications with the first wireless network; registering for voice communications with the first wireless network in accordance with the first wireless communication protocol; entering into the idle state; reconfiguring the plurality of internal stacks of the UE while in the idle state, wherein the reconfiguring includes indicating a first internal stack related to the second wireless communication protocol is a secondary stack and a second internal stack related to the first wireless communication protocol is a primary stack; and sending a further request to the first wireless network to indicate a preference to utilize the first wireless communication protocol for voice communications. 11. The method of claim 10, further comprising: maintaining a connection with the second wireless network to perform voice communications when there is a failure of the voice communications between the UE and the first wireless network. 12. A user equipment (“UE”), comprising: a processor configured to control establishing and releasing connections between the wireless communication device and a first wireless network and between the wireless communication device and a second wireless network; a transceiver configurable to transmit and receive signals to the first wireless network according to a first wireless communication protocol and to the second wireless network according to a second wireless communication protocol; and a non-transitory memory having a program stored thereon, wherein the execution of the program causes the processor to perform operations comprising: establishing a connection to a first wireless network in accordance with a first wireless communication protocol, wherein the first wireless communication protocol is used for voice communications and data communications between the UE and the first wireless network; receiving a user request to disable the voice communications with the first wireless network; registering for voice communications with a second wireless network in accordance with a second wireless communication protocol; and maintaining the connection to the first wireless network to continue data communications between the UE and the first wireless network, wherein the UE simultaneously operates in the first wireless communication protocol and the second wireless communication protocol. 13. The UE of claim 12, wherein the operations further comprise: entering into an idle state; and reconfiguring a plurality of internal stacks of the UE while in the idle state, wherein the reconfiguring includes indicating a first internal stack related to the second wireless communication protocol is a primary stack and a second internal stack related to the first wireless communication protocol is a secondary stack. 14. The UE of claim 12, wherein the first wireless communication protocol includes assigning an address to the UE and wherein the UE maintains the same address throughout the steps of the method, wherein the address is an Internet Protocol (IP) address. 15. The UE of claim 12, wherein the operations further comprise: sending a request to the first wireless network to indicate a preference to utilize the second wireless communication protocol for voice communications. 16. The UE of claim 12, wherein the first wireless network operates in accordance with a long term evolution (“LTE”) or long term evolution advanced (“LTE-A”) wireless communication protocol, and the second wireless network operates in accordance with one of a legacy third generation (“3G”) wireless communication protocol and a legacy second generation (“2G”) wireless communication protocol. 17. The UE of claim 12, wherein the operations further comprise: deregistering with an IP Multimedia Subsystem (IMS) before registering for voice communications with the second wireless network. 18. The UE of claim 12, wherein the first wireless network is a packet-switched network and the second wireless network is a circuit switched network. 19. A computer program product encoded as computer program code in a non-transitory computer readable medium for configuring wireless circuitry of a wireless communication device, the computer program product comprising instructions for: establishing a connection to a first wireless network in accordance with a first wireless communication protocol, wherein the first wireless communication protocol is used for voice communications and data communications between the UE and the first wireless network; receiving a user request to disable the voice communications with the first wireless network; registering for voice communications with a second wireless network in accordance with a second wireless communication protocol; and maintaining the connection to the first wireless network to continue data communications between the UE and the first wireless network, wherein the UE simultaneously operates in the first wireless communication protocol and the second wireless communication protocol. 20. The computer program product of claim 19, further comprising instructions for: entering into an idle state; reconfiguring a plurality of internal stacks of the UE while in the idle state, wherein the reconfiguring includes indicating a first internal stack related to the second wireless communication protocol is a primary stack and a second internal stack related to the first wireless communication protocol is a secondary stack; and sending a request to the first wireless network to indicate a preference to utilize the second wireless communication protocol for voice communications.
2,400
7,848
7,848
14,127,638
2,425
A method and computer program product for determining whether an object of interest can have its temperature measurement calculated by a thermal imaging camera. To do this, the measurement IFOV is converted into linear units. The measurement IFOV may be displayed on the display of the camera as a graphical indicator ( 100, 100′, 100″, 100 ′″) or a value. An object of interest can be registered with the graphical indicator ( 100, 100′, 100″, 100 ′″) or its dimension compared with the measurement IFOV and then it is determined whether the temperature measurement of the object can be acceptably calculated. Alternately, data obtained by a matrix of pixel elements may be analyzed to determine whether an accurate temperature can be calculated.
1. A method of determining whether an object of interest can have its temperature measurement accurately calculated by a thermal imaging camera comprising: a) displaying a measurement IFOV of the camera on a display of the camera as a graphical box; b) registering the graphical box with the object of interest on the display; and c) determining whether the thermal image of the object of interest fills the graphical box thereby indicating a reliable temperature of the object of interest can be made. 2. A method of determining whether an object of interest can have its temperature measurement accurately calculated by a thermal imaging camera comprising: a) determining a distance between the camera and the object of interest; b) calculating a measurement IFOV in linear units; and c) displaying the calculated measurement IFOV in linear units on the display of the camera to be viewable by a user of the camera. 3. The method of claim 2 wherein step (a) is performed by a laser rangefinder. 4. The method of claim 2 wherein step (a) is performed by the user of the camera entering the distance information on a data entry device of the camera. 5. The method of claim 2 further comprising d) determining whether the camera is an unsafe distance from the object of interest and, if so, e) generating an alarm that the camera is at an unsafe distance. 6. A computer program product, comprising a computer usable medium having a computer readable program code embodied therein, said computer readable program code adapted to be executed to implement a method for determining whether an object of interest can have its temperature measurement accurately calculated by a thermal imaging camera, said method comprising: a) displaying a measurement IFOV on a display of the camera as a graphical box; and b) registering the graphical box with the image of the object of interest on the display. 7. A method of determining whether an object of interest can have its temperature measurement accurately calculated by a thermal imaging camera comprising: a) generating temperature data of an object of interest in the form of a pixel matrix comprised of multiple pixels; and b) performing a statistical analysis on the data generated by the pixel matrix to determine uniformity of the data generated by the pixel matrix. 8. The method of claim 7 further comprising the step of generating a notification if the analysis performed in step (b) indicates that the data is not uniform. 9. The method of claim 7 further comprising the step of generating a notification if the analysis performed in step (b) indicates that the data is uniform. 10. The method of claim 7 further comprising the step of displaying an appropriate message on a display of the camera. 11. The method of claim 10 wherein the notification comprises an alarm. 12. The method of claim 10 wherein the notification comprises an audio recording telling the user of the camera to move closer to the object of interest in order to get an acceptable temperature measurement calculation and once the user has moved to a new distance from the object of interest, performing steps (a) through (d). 13. The method of claim 7 wherein step (b) includes determining a minimum value of the data; determining a maximum value of the data; computing an arithmetic difference between the minimum and maximum values; determining if the arithmetic difference exceeds a predetermined threshold; if the arithmetic difference exceeds the predetermined value, generating an indication that the data is not usable as an accurate temperature. 14. The method of claim 7 wherein step (b) includes computing an arithmetic average of the data; determining if the difference between any of the data from each pixel and the average of the data exceeds a predetermined threshold; if the difference determined in step (e) exceeds the threshold, generating an indication that the data is not usable as an accurate temperature. 15. A portable, hand-held thermal imaging camera comprising: a lens assembly having an associated sensor for detecting thermal images of a target scene; a display adapted to display at least a portion of the thermal image; a processor programmed to calculate a measurement IFOV in linear units and display the calculated measurement IFOV in linear units on the display. 16. A camera according to claim 15 further comprising a distance measuring device for measuring the distance between the camera and the object of interest and providing that measurement to the processor in order for the processor to calculate the measurement IFOV in linear units. 17. A camera according to claim 15 further comprising an input device for entering data reflective of the distance between the camera and the object of interest and providing that data to the processor in order for the processor to calculate the measurement IFOV in linear units. 18. A portable, hand-held thermal imaging camera comprising: a lens assembly having an associated sensor for detecting thermal images of a target scene; a display adapted to display the thermal image; a processor programmed to perform a statistical analysis on data generated by a pixel matrix to determine the uniformity of the data. 19. The camera of claim 18 wherein the processor is programmed to generate a notification based on the statistical analysis performed. 20. The method of claim 19 wherein the notification is an appropriate message displayed on the display of the camera. 21. The camera of claim 19 wherein the notification is an audio recording telling the user of the camera if an accurate temperature measurement can be made, and, if not, telling the user of the camera to move closer to the object of interest and once the user has moved to a new distance from the object of interest, the statistical analysis is performed again and a new notification is generated based on the statistical analysis performed. 22. The camera of claim 18 wherein the pixel matrix comprises three-by-three array of pixels. 23. The camera of claim 18 wherein the statistical analysis performed by the processor comprises: determining a minimum value of the data; determining a maximum value of the data; computing an arithmetic difference between the minimum and maximum values; determining if the arithmetic difference exceeds a predetermined threshold; and if the arithmetic difference exceeds the predetermined value, generating an indication that the data is not usable as an accurate temperature. 24. The camera of claim 18 wherein the statistical analysis performed by the processor comprises: computing an arithmetic average of the data; determining if the difference between any of the data from each pixel and the average of the data exceeds a predetermined threshold; if the difference determined exceeds the threshold, generating an indication that the data is not usable as an accurate temperature.
A method and computer program product for determining whether an object of interest can have its temperature measurement calculated by a thermal imaging camera. To do this, the measurement IFOV is converted into linear units. The measurement IFOV may be displayed on the display of the camera as a graphical indicator ( 100, 100′, 100″, 100 ′″) or a value. An object of interest can be registered with the graphical indicator ( 100, 100′, 100″, 100 ′″) or its dimension compared with the measurement IFOV and then it is determined whether the temperature measurement of the object can be acceptably calculated. Alternately, data obtained by a matrix of pixel elements may be analyzed to determine whether an accurate temperature can be calculated.1. A method of determining whether an object of interest can have its temperature measurement accurately calculated by a thermal imaging camera comprising: a) displaying a measurement IFOV of the camera on a display of the camera as a graphical box; b) registering the graphical box with the object of interest on the display; and c) determining whether the thermal image of the object of interest fills the graphical box thereby indicating a reliable temperature of the object of interest can be made. 2. A method of determining whether an object of interest can have its temperature measurement accurately calculated by a thermal imaging camera comprising: a) determining a distance between the camera and the object of interest; b) calculating a measurement IFOV in linear units; and c) displaying the calculated measurement IFOV in linear units on the display of the camera to be viewable by a user of the camera. 3. The method of claim 2 wherein step (a) is performed by a laser rangefinder. 4. The method of claim 2 wherein step (a) is performed by the user of the camera entering the distance information on a data entry device of the camera. 5. The method of claim 2 further comprising d) determining whether the camera is an unsafe distance from the object of interest and, if so, e) generating an alarm that the camera is at an unsafe distance. 6. A computer program product, comprising a computer usable medium having a computer readable program code embodied therein, said computer readable program code adapted to be executed to implement a method for determining whether an object of interest can have its temperature measurement accurately calculated by a thermal imaging camera, said method comprising: a) displaying a measurement IFOV on a display of the camera as a graphical box; and b) registering the graphical box with the image of the object of interest on the display. 7. A method of determining whether an object of interest can have its temperature measurement accurately calculated by a thermal imaging camera comprising: a) generating temperature data of an object of interest in the form of a pixel matrix comprised of multiple pixels; and b) performing a statistical analysis on the data generated by the pixel matrix to determine uniformity of the data generated by the pixel matrix. 8. The method of claim 7 further comprising the step of generating a notification if the analysis performed in step (b) indicates that the data is not uniform. 9. The method of claim 7 further comprising the step of generating a notification if the analysis performed in step (b) indicates that the data is uniform. 10. The method of claim 7 further comprising the step of displaying an appropriate message on a display of the camera. 11. The method of claim 10 wherein the notification comprises an alarm. 12. The method of claim 10 wherein the notification comprises an audio recording telling the user of the camera to move closer to the object of interest in order to get an acceptable temperature measurement calculation and once the user has moved to a new distance from the object of interest, performing steps (a) through (d). 13. The method of claim 7 wherein step (b) includes determining a minimum value of the data; determining a maximum value of the data; computing an arithmetic difference between the minimum and maximum values; determining if the arithmetic difference exceeds a predetermined threshold; if the arithmetic difference exceeds the predetermined value, generating an indication that the data is not usable as an accurate temperature. 14. The method of claim 7 wherein step (b) includes computing an arithmetic average of the data; determining if the difference between any of the data from each pixel and the average of the data exceeds a predetermined threshold; if the difference determined in step (e) exceeds the threshold, generating an indication that the data is not usable as an accurate temperature. 15. A portable, hand-held thermal imaging camera comprising: a lens assembly having an associated sensor for detecting thermal images of a target scene; a display adapted to display at least a portion of the thermal image; a processor programmed to calculate a measurement IFOV in linear units and display the calculated measurement IFOV in linear units on the display. 16. A camera according to claim 15 further comprising a distance measuring device for measuring the distance between the camera and the object of interest and providing that measurement to the processor in order for the processor to calculate the measurement IFOV in linear units. 17. A camera according to claim 15 further comprising an input device for entering data reflective of the distance between the camera and the object of interest and providing that data to the processor in order for the processor to calculate the measurement IFOV in linear units. 18. A portable, hand-held thermal imaging camera comprising: a lens assembly having an associated sensor for detecting thermal images of a target scene; a display adapted to display the thermal image; a processor programmed to perform a statistical analysis on data generated by a pixel matrix to determine the uniformity of the data. 19. The camera of claim 18 wherein the processor is programmed to generate a notification based on the statistical analysis performed. 20. The method of claim 19 wherein the notification is an appropriate message displayed on the display of the camera. 21. The camera of claim 19 wherein the notification is an audio recording telling the user of the camera if an accurate temperature measurement can be made, and, if not, telling the user of the camera to move closer to the object of interest and once the user has moved to a new distance from the object of interest, the statistical analysis is performed again and a new notification is generated based on the statistical analysis performed. 22. The camera of claim 18 wherein the pixel matrix comprises three-by-three array of pixels. 23. The camera of claim 18 wherein the statistical analysis performed by the processor comprises: determining a minimum value of the data; determining a maximum value of the data; computing an arithmetic difference between the minimum and maximum values; determining if the arithmetic difference exceeds a predetermined threshold; and if the arithmetic difference exceeds the predetermined value, generating an indication that the data is not usable as an accurate temperature. 24. The camera of claim 18 wherein the statistical analysis performed by the processor comprises: computing an arithmetic average of the data; determining if the difference between any of the data from each pixel and the average of the data exceeds a predetermined threshold; if the difference determined exceeds the threshold, generating an indication that the data is not usable as an accurate temperature.
2,400
7,849
7,849
15,620,440
2,424
A computing system obtains a fingerprint of video content being rendered by a video presentation device, including a first portion representing a pre-established video segment and a second portion representing a dynamically-defined video segment. While obtaining the query fingerprint, the computing system (a) detects a match between the first portion of the query fingerprint and a reference fingerprint that represents the pre-established video segment, (b) based on the detecting of the match, identifies the video content being rendered, (c) after identifying the video content being rendered, applies a trained neural network to at least the second portion of the query fingerprint, and (d) detects, based on the applying of the neural network, that rendering of the identified video content continues. And responsive to at least the detecting that rendering of the identified video content continues, the computing system then takes associated action.
1. A method of detecting and responding to rendering of video content by a video presentation device, wherein the video content includes (i) a pre-established video segment that does not vary based on user-interaction during the rendering and (ii) a dynamically-defined video segment that varies based on user-interaction during the rendering, the method comprising: obtaining by a computing system a query fingerprint generated in real-time during the rendering as a representation of the video content being rendered, the query fingerprint including a first portion representing the pre-established video segment and a second portion representing the dynamically-defined video segment; while obtaining the query fingerprint, the computing system (a) detecting a match between the first portion of the query fingerprint and a reference fingerprint that represents the pre-established video segment, (b) based on the detecting of the match, identifying the video content being rendered, (c) after identifying the video content being rendered, applying a trained neural network to at least the second portion of the query fingerprint, and (d) detecting, based on the applying of the neural network, that rendering of the identified video content continues; and responsive to at least the detecting that rendering of the identified video content continues, the computing system taking action specific to the identified video content. 2. The method of claim 1, wherein the video content comprises video game content. 3. The method of claim 2, wherein detecting that rendering of the identified video content continues comprises detecting that the video content being rendered by the video presentation device continues to be video game content. 4. The method of claim 2, wherein identifying the video content being rendered comprises determining an identity of a particular video game being rendered, and wherein detecting that rendering of the identified video content continues comprises detecting that the video content being rendered continues to be the particular video game. 5. The method of claim 2, wherein taking action specific to the identified video content comprises causing presentation of supplemental content comprising an offer for additional video game content. 6. The method of claim 1, further comprising: detecting by the computing system an ending of the detected match, wherein applying by the computing system the trained neural network is responsive to at least the detecting of the ending of the detected match. 7. The method of claim 1, further comprising: determining by the computing system, based on the applying of the trained neural network to at least the second portion of the query fingerprint, that rendering of the dynamically-defined portion of the video content has continued for at least a threshold duration, wherein taking action specific to the identified video content comprises causing a presentation of supplemental content, and wherein causing the presentation of supplemental content is further responsive to the determining that rendering of the dynamically-defined portion of the video content has continued for at least the threshold duration. 8. The method of claim 7, wherein the dynamically-defined portion of the video content comprises interactive video game content, and wherein causing presentation of the supplemental content further responsive to the dynamically-defined portion of the video content having continued for at least the threshold duration comprises causing presentation of video-game help content. 9. The method of claim 7, wherein the pre-established video segment is a first pre-established video segment, wherein the video content includes a second pre-established video segment that also does not vary based on user-interaction during the rendering, and wherein the query fingerprint includes a third portion representing the second pre-established video segment, and wherein determining by the computing system, based on the applying of the trained neural network to at least the second portion of the query fingerprint, that rendering of the dynamically-defined portion of the video content has continued for at least the threshold duration comprises detecting a threshold long duration from rendering the first pre-established video segment until rendering the second pre-established video segment. 10. The method of claim 9, wherein the match is a first match, the method further comprising: detecting by the computing system a second match between the third portion of the query fingerprint and a reference fingerprint that represents the second pre-established video segment and, based on the detecting of the second match, discontinuing by the computing system the applying of the trained neural network to the query fingerprint. 11. The method of claim 1, wherein the computing system communicates with the video presentation device via a network, wherein obtaining by the computing system the query fingerprint generated in real-time during the rendering as a representation of the video content being rendered comprises receiving by the computing system from the video presentation device, via the network, transmissions of the query fingerprint generated in real-time by the video presentation device during the rendering of the video content. 12. The method of claim 1, further comprising: establishing a set of reference data, including the reference fingerprint and the trained neural network, based on computerized analysis of various instances of video game play. 13. The method of claim 12, further comprising: automatically searching for and downloading from a public packet-switched network at least some of the various instances of video game play; and conducting the computerized analysis on the downloaded various instances of video game play. 14. The method of claim 13, wherein the various instances of video game play comprise play-through videos. 15. The method of claim 1, wherein the neural network comprises a Long Short Term Memory neural network. 16. A method of detecting and responding to playing of a video game, wherein the video game is rendered in real-time on a video display unit, and wherein the video game includes (i) cutscene video segments that do not vary based on user-interaction during the rendering and (ii) interactive video segments that vary based on user-interaction during the rendering, the method comprising: obtaining by a computing system a query fingerprint generated in real-time during the rendering as a representation of the video game being played, wherein the query fingerprint includes (i) a first portion representing a first cutscene video segment and (ii) a second portion representing a first interactive video segment; detecting by the computing system a match between the first portion of the query fingerprint and a reference fingerprint that represents the first cutscene video segment and, based on the detected match, identifying by the computing system the video game being rendered; after identifying by the computing system the video content being rendered, applying by the computing system a trained neural network to at least the second portion of the query fingerprint to detect that the video content being rendered continues to be the identified game; and responsive to at least detecting that the video content being rendered continues to be the identified video game, causing by the computing system a presentation of supplemental content. 17. The method of claim 16, further comprising: detecting by the computing system an ending of the detected match, wherein applying by the computing system the trained neural network is responsive to at least the detecting of the ending of the detected match. 18. The method of claim 16, further comprising: determining by the computing system, based on the applying of the trained neural network to at least the second portion of the query fingerprint, that the first interactive video segment has continued for at least a threshold duration, wherein causing the presentation of supplemental content is further responsive to the determining that the interactive portion of the video content has continued for at least the threshold duration, and wherein the supplemental content comprises video-game help content. 19. A computing system comprising: a network communication interface; a processing unit; non-transitory data storage; and program instructions stored in the non-transitory data storage and executable by the processing unit to carry out operations for detecting and responding to rendering of video content by a video presentation device, wherein the video content includes, in order, (i) a pre-established video segment that does not vary based on user-interaction during the rendering and (ii) a dynamically-defined video segment that varies based on user-interaction during the rendering, and wherein the operations comprise: receiving from the video presentation device, via the network communication interface, a query fingerprint generated in real-time during the rendering as a representation of the video content being rendered, wherein the query fingerprint includes, in order, (i) a first portion representing the pre-established video segment and (ii) a second portion representing the dynamically-defined video segment, detecting a match between the first portion of the query fingerprint and a reference fingerprint that represents the pre-established video segment and, based on the detected match, identifying the video content being rendered, after identifying the video content being rendered, applying a machine-learning algorithm to at least the second portion of the query fingerprint to detect that the video content being rendered continues to be the identified video content, and responsive to at least detecting that the video content being rendered continues to be the identified video content, causing a user device to render supplemental content. 20. The computing system of claim 19, wherein the video content comprises video game content, wherein the pre-established video segment comprises a cutscene video segment, wherein the dynamically-defined video segment comprises an interactive gameplay video segment, and wherein the operations further comprise: determining, based on the applying of the machine-learning algorithm to at least the second portion of the query fingerprint, that the interactive gameplay video segment has continued for at least a threshold duration, wherein causing the user device to render the supplemental content is further responsive to the determining that the interactive gameplay video segment has continued for at least the threshold duration, and wherein the supplemental content comprises video-game help content.
A computing system obtains a fingerprint of video content being rendered by a video presentation device, including a first portion representing a pre-established video segment and a second portion representing a dynamically-defined video segment. While obtaining the query fingerprint, the computing system (a) detects a match between the first portion of the query fingerprint and a reference fingerprint that represents the pre-established video segment, (b) based on the detecting of the match, identifies the video content being rendered, (c) after identifying the video content being rendered, applies a trained neural network to at least the second portion of the query fingerprint, and (d) detects, based on the applying of the neural network, that rendering of the identified video content continues. And responsive to at least the detecting that rendering of the identified video content continues, the computing system then takes associated action.1. A method of detecting and responding to rendering of video content by a video presentation device, wherein the video content includes (i) a pre-established video segment that does not vary based on user-interaction during the rendering and (ii) a dynamically-defined video segment that varies based on user-interaction during the rendering, the method comprising: obtaining by a computing system a query fingerprint generated in real-time during the rendering as a representation of the video content being rendered, the query fingerprint including a first portion representing the pre-established video segment and a second portion representing the dynamically-defined video segment; while obtaining the query fingerprint, the computing system (a) detecting a match between the first portion of the query fingerprint and a reference fingerprint that represents the pre-established video segment, (b) based on the detecting of the match, identifying the video content being rendered, (c) after identifying the video content being rendered, applying a trained neural network to at least the second portion of the query fingerprint, and (d) detecting, based on the applying of the neural network, that rendering of the identified video content continues; and responsive to at least the detecting that rendering of the identified video content continues, the computing system taking action specific to the identified video content. 2. The method of claim 1, wherein the video content comprises video game content. 3. The method of claim 2, wherein detecting that rendering of the identified video content continues comprises detecting that the video content being rendered by the video presentation device continues to be video game content. 4. The method of claim 2, wherein identifying the video content being rendered comprises determining an identity of a particular video game being rendered, and wherein detecting that rendering of the identified video content continues comprises detecting that the video content being rendered continues to be the particular video game. 5. The method of claim 2, wherein taking action specific to the identified video content comprises causing presentation of supplemental content comprising an offer for additional video game content. 6. The method of claim 1, further comprising: detecting by the computing system an ending of the detected match, wherein applying by the computing system the trained neural network is responsive to at least the detecting of the ending of the detected match. 7. The method of claim 1, further comprising: determining by the computing system, based on the applying of the trained neural network to at least the second portion of the query fingerprint, that rendering of the dynamically-defined portion of the video content has continued for at least a threshold duration, wherein taking action specific to the identified video content comprises causing a presentation of supplemental content, and wherein causing the presentation of supplemental content is further responsive to the determining that rendering of the dynamically-defined portion of the video content has continued for at least the threshold duration. 8. The method of claim 7, wherein the dynamically-defined portion of the video content comprises interactive video game content, and wherein causing presentation of the supplemental content further responsive to the dynamically-defined portion of the video content having continued for at least the threshold duration comprises causing presentation of video-game help content. 9. The method of claim 7, wherein the pre-established video segment is a first pre-established video segment, wherein the video content includes a second pre-established video segment that also does not vary based on user-interaction during the rendering, and wherein the query fingerprint includes a third portion representing the second pre-established video segment, and wherein determining by the computing system, based on the applying of the trained neural network to at least the second portion of the query fingerprint, that rendering of the dynamically-defined portion of the video content has continued for at least the threshold duration comprises detecting a threshold long duration from rendering the first pre-established video segment until rendering the second pre-established video segment. 10. The method of claim 9, wherein the match is a first match, the method further comprising: detecting by the computing system a second match between the third portion of the query fingerprint and a reference fingerprint that represents the second pre-established video segment and, based on the detecting of the second match, discontinuing by the computing system the applying of the trained neural network to the query fingerprint. 11. The method of claim 1, wherein the computing system communicates with the video presentation device via a network, wherein obtaining by the computing system the query fingerprint generated in real-time during the rendering as a representation of the video content being rendered comprises receiving by the computing system from the video presentation device, via the network, transmissions of the query fingerprint generated in real-time by the video presentation device during the rendering of the video content. 12. The method of claim 1, further comprising: establishing a set of reference data, including the reference fingerprint and the trained neural network, based on computerized analysis of various instances of video game play. 13. The method of claim 12, further comprising: automatically searching for and downloading from a public packet-switched network at least some of the various instances of video game play; and conducting the computerized analysis on the downloaded various instances of video game play. 14. The method of claim 13, wherein the various instances of video game play comprise play-through videos. 15. The method of claim 1, wherein the neural network comprises a Long Short Term Memory neural network. 16. A method of detecting and responding to playing of a video game, wherein the video game is rendered in real-time on a video display unit, and wherein the video game includes (i) cutscene video segments that do not vary based on user-interaction during the rendering and (ii) interactive video segments that vary based on user-interaction during the rendering, the method comprising: obtaining by a computing system a query fingerprint generated in real-time during the rendering as a representation of the video game being played, wherein the query fingerprint includes (i) a first portion representing a first cutscene video segment and (ii) a second portion representing a first interactive video segment; detecting by the computing system a match between the first portion of the query fingerprint and a reference fingerprint that represents the first cutscene video segment and, based on the detected match, identifying by the computing system the video game being rendered; after identifying by the computing system the video content being rendered, applying by the computing system a trained neural network to at least the second portion of the query fingerprint to detect that the video content being rendered continues to be the identified game; and responsive to at least detecting that the video content being rendered continues to be the identified video game, causing by the computing system a presentation of supplemental content. 17. The method of claim 16, further comprising: detecting by the computing system an ending of the detected match, wherein applying by the computing system the trained neural network is responsive to at least the detecting of the ending of the detected match. 18. The method of claim 16, further comprising: determining by the computing system, based on the applying of the trained neural network to at least the second portion of the query fingerprint, that the first interactive video segment has continued for at least a threshold duration, wherein causing the presentation of supplemental content is further responsive to the determining that the interactive portion of the video content has continued for at least the threshold duration, and wherein the supplemental content comprises video-game help content. 19. A computing system comprising: a network communication interface; a processing unit; non-transitory data storage; and program instructions stored in the non-transitory data storage and executable by the processing unit to carry out operations for detecting and responding to rendering of video content by a video presentation device, wherein the video content includes, in order, (i) a pre-established video segment that does not vary based on user-interaction during the rendering and (ii) a dynamically-defined video segment that varies based on user-interaction during the rendering, and wherein the operations comprise: receiving from the video presentation device, via the network communication interface, a query fingerprint generated in real-time during the rendering as a representation of the video content being rendered, wherein the query fingerprint includes, in order, (i) a first portion representing the pre-established video segment and (ii) a second portion representing the dynamically-defined video segment, detecting a match between the first portion of the query fingerprint and a reference fingerprint that represents the pre-established video segment and, based on the detected match, identifying the video content being rendered, after identifying the video content being rendered, applying a machine-learning algorithm to at least the second portion of the query fingerprint to detect that the video content being rendered continues to be the identified video content, and responsive to at least detecting that the video content being rendered continues to be the identified video content, causing a user device to render supplemental content. 20. The computing system of claim 19, wherein the video content comprises video game content, wherein the pre-established video segment comprises a cutscene video segment, wherein the dynamically-defined video segment comprises an interactive gameplay video segment, and wherein the operations further comprise: determining, based on the applying of the machine-learning algorithm to at least the second portion of the query fingerprint, that the interactive gameplay video segment has continued for at least a threshold duration, wherein causing the user device to render the supplemental content is further responsive to the determining that the interactive gameplay video segment has continued for at least the threshold duration, and wherein the supplemental content comprises video-game help content.
2,400
7,850
7,850
15,141,300
2,458
A method, system and computer program product for utilizing a user's free time. A period of free time for the user is identified. A user's request to access an application (e.g., social media application), a view and/or a folder is monitored during the user's period of free time. In response to detecting no content updates when the user accesses the application, view and/or folder during the user's free time, content is selected to be displayed to the user during the user's free time. For example, opportunistic content, such a password change notification, may be displayed to the user five days prior to the normal time of notification. In this manner, the user will be able to address such content during a time the user has free as opposed to being required to address such content when the user has less free time thereby more efficiently utilizing the user's free time.
1. A method for utilizing a user's free time, the method comprising: identifying a period of free time for said user; monitoring an application, view and/or folder to be accessed by said user during said period of free time of said user; detecting no content updates in said application, view and/or folder accessed by said user during said period of free time of said user in comparison to a prior time said user accessed said application, view and/or folder; selecting, by a processor, content to be presented to said user in response to said detection of no content updates in said application, view and/or folder during said period of free time of said user, wherein said selected content comprises one or more the following: opportunistic content, existing content and advertising content; and displaying said selected content to said user during said period of free time of said user. 2. The method as recited in claim 1, wherein said period of free time of said user is identified in response to one of the following: input provided by said user, detecting a time said user is free in a calendar application of said user and detecting a time said user is free in a profile of said user. 3. The method as recited in claim 1 further comprising: monitoring said application, view and/or folder to be refreshed by said user during said period of free time of said user; and determining whether there are any content updates in said refreshed application, view and/or folder in response to said refresh of said application, view and/or folder during said period of free time of said user. 4. The method as recited in claim 1 further comprising: queuing said selected content; prioritizing said queued selected content; and displaying said queued selected content in order of priority to said user during said period of free time of said user. 5. The method as recited in claim 4, wherein said prioritizing is based on one or more of the following: a user's location, a notification assigned to content, a number of social media likes, type of content, priorities assigned to designated content by said user in a profile of said user, a sender and/or other recipients of a message, and an estimated time to complete a task of a message. 6. The method as recited in claim 1, wherein a designated content is not selected to be displayed to said user until said user refreshes said application, view and/or folder. 7. The method as recited in claim 1, wherein said application comprises one of the following: an e-mail application, a social media application, an instant message application, a project management application, a forum. 8. The method as recited in claim 1, wherein said opportunistic content comprises messages that are presented earlier than a normal time of presentation, wherein said existing content comprises unread or unflagged messages.
A method, system and computer program product for utilizing a user's free time. A period of free time for the user is identified. A user's request to access an application (e.g., social media application), a view and/or a folder is monitored during the user's period of free time. In response to detecting no content updates when the user accesses the application, view and/or folder during the user's free time, content is selected to be displayed to the user during the user's free time. For example, opportunistic content, such a password change notification, may be displayed to the user five days prior to the normal time of notification. In this manner, the user will be able to address such content during a time the user has free as opposed to being required to address such content when the user has less free time thereby more efficiently utilizing the user's free time.1. A method for utilizing a user's free time, the method comprising: identifying a period of free time for said user; monitoring an application, view and/or folder to be accessed by said user during said period of free time of said user; detecting no content updates in said application, view and/or folder accessed by said user during said period of free time of said user in comparison to a prior time said user accessed said application, view and/or folder; selecting, by a processor, content to be presented to said user in response to said detection of no content updates in said application, view and/or folder during said period of free time of said user, wherein said selected content comprises one or more the following: opportunistic content, existing content and advertising content; and displaying said selected content to said user during said period of free time of said user. 2. The method as recited in claim 1, wherein said period of free time of said user is identified in response to one of the following: input provided by said user, detecting a time said user is free in a calendar application of said user and detecting a time said user is free in a profile of said user. 3. The method as recited in claim 1 further comprising: monitoring said application, view and/or folder to be refreshed by said user during said period of free time of said user; and determining whether there are any content updates in said refreshed application, view and/or folder in response to said refresh of said application, view and/or folder during said period of free time of said user. 4. The method as recited in claim 1 further comprising: queuing said selected content; prioritizing said queued selected content; and displaying said queued selected content in order of priority to said user during said period of free time of said user. 5. The method as recited in claim 4, wherein said prioritizing is based on one or more of the following: a user's location, a notification assigned to content, a number of social media likes, type of content, priorities assigned to designated content by said user in a profile of said user, a sender and/or other recipients of a message, and an estimated time to complete a task of a message. 6. The method as recited in claim 1, wherein a designated content is not selected to be displayed to said user until said user refreshes said application, view and/or folder. 7. The method as recited in claim 1, wherein said application comprises one of the following: an e-mail application, a social media application, an instant message application, a project management application, a forum. 8. The method as recited in claim 1, wherein said opportunistic content comprises messages that are presented earlier than a normal time of presentation, wherein said existing content comprises unread or unflagged messages.
2,400
7,851
7,851
14,906,982
2,472
There is provided mechanisms for multimedia broadcast multicast service (MBMS) bearer handling in a group communications system. A method is performed by a control node. The method comprises obtaining a need for a new MBMS bearer to be activated. The method comprises activating the new MBMS bearer. The method comprises announcing MBMS bearer identity and complementary service announcement information of the new MBMS bearer on an already announced MBMS bearer, thereby announcing the new MBMS bearer.
1. A method for multimedia broadcast multicast service (MBMS) bearer handling in a group communications system, the method being performed by a control node, the method comprising: obtaining a need for a new MBMS bearer to be activated; activating the new MBMS bearer; and announcing MBMS bearer identity and complementary service announcement information of the new MBMS bearer on an already announced MBMS bearer, thereby announcing the new MBMS bearer. 2. The method according to claim 1, wherein the new MBMS bearer is activated for supporting media transmission in a group call of the group communications system. 3. The method according to claim 1, wherein the MBMS bearer identity and complementary service announcement information is announced on demand and in direct response to the new MBMS bearer being activated. 4. A method for multimedia broadcast multicast service (MBMS) bearer handling in a group communications system, the method being performed by a client node, the method comprising: obtaining a broadcast service announcement of a new MBMS bearer on an already announced MBMS bearer from a control node of the group communications system, wherein the service announcement comprises the MBMS bearer identity and complementary service announcement information of the new MBMS bearer. 5. The method according to claim 4, further comprising: combining the complementary service announcement information with any previously received service announcement information of the new MBMS bearer so as to generate complete service announcement information of the new MBMS bearer. 6. The method according to claim 4, further comprising: monitoring the already announced MBMS bearer upon obtaining the broadcast service announcement. 7. The method according to claim 4, wherein the client node is in idle mode when obtaining the broadcast service announcement. 8. The method according to claim 4, wherein the already announced MBMS bearer is used by the control node for transmitting group communication control messages in the group communications system. 9. The method according to claim 4, wherein the MBMS bearer identity and complementary service announcement information is announced using a Real-Time Protocol, RTP, or a Real-time Transport Control Protocol, RTCP. 10. The method according to claim 4, wherein the complementary service announcement information comprises group communication streaming media initialization parameters of the new MBMS bearer. 11. The method according to claim 10, wherein the streaming media initialization parameters comprises at least one of a multicast Internet Protocol, IP, address, User datagram protocol, UDP, port information, IP source address information of media source, media protocol information, codec information, and reference to at least one other announced MBMS bearer. 12. The method according to claim 4, wherein the complementary service announcement information comprises at least one reference to service announcement information of at least one previously announced MBMS bearer. 13. A control node for multimedia broadcast multicast service (MBMS) bearer handling in a group communications system, the control node comprising processing circuitry, the processing circuitry being configured to cause the control node to: obtain a need for a new MBMS bearer to be activated; activate the new MBMS bearer; and announce MBMS bearer identity and complementary service announcement information of the new MBMS bearer on an already announced MBMS bearer, thereby announcing the new MBMS bearer. 14. A control node for multimedia broadcast multicast service (MBMS) bearer handling in a group communications system, the control node comprising: processing circuitry; and a computer program product (410 a) storing instructions that, when executed by the processing circuitry, causes the control node to: obtain a need for a new MBMS bearer to be activated; activate the new MBMS bearer; and announce MBMS bearer identity and complementary service announcement information of the new MBMS bearer on an already announced MBMS bearer, thereby announcing the new MBMS bearer. 15. (canceled) 16. A client node for multimedia broadcast multicast service (MBMS) bearer handling in a group communications system, the client node comprising processing circuitry, the processing circuitry being configured to cause the client node to: obtain a broadcast service announcement of a new MBMS bearer on an already announced MBMS bearer from a control node of the group communications system, wherein the service announcement comprises the MBMS bearer identity and complementary service announcement information of the new MBMS bearer. 17. A client node for multimedia broadcast multicast service (MBMS) bearer handling in a group communications system, the client node comprising: processing circuitry; and a computer program product storing instructions that, when executed by the processing circuitry, causes the client node to: obtain a broadcast service announcement of a new MBMS bearer on an already announced MBMS bearer from a control node of the group communications system, wherein the service announcement comprises the MBMS bearer identity and complementary service announcement information of the new MBMS bearer. 18. (canceled) 19. A computer program for multimedia broadcast multicast service (MBMS) bearer handling in a group communications system, the computer program comprising computer code which, when run on processing circuitry of a control node, causes the control node to: obtain a need for a new MBMS bearer to be activated; activate the new MBMS bearer; and announce MBMS bearer identity and complementary service announcement information of the new MBMS bearer on an already announced MBMS bearer, thereby announcing the new MBMS bearer. 20. A computer program for multimedia broadcast multicast service (MBMS) bearer handling in a group communications system, the computer program comprising computer code which, when run on processing circuitry of a client node, causes the client node to: obtain (S204) a broadcast service announcement of a new MBMS bearer on an already announced MBMS bearer from a control node of the group communications system, wherein the service announcement comprises the MBMS bearer identity and complementary service announcement information of the new MBMS bearer. 21. (canceled)
There is provided mechanisms for multimedia broadcast multicast service (MBMS) bearer handling in a group communications system. A method is performed by a control node. The method comprises obtaining a need for a new MBMS bearer to be activated. The method comprises activating the new MBMS bearer. The method comprises announcing MBMS bearer identity and complementary service announcement information of the new MBMS bearer on an already announced MBMS bearer, thereby announcing the new MBMS bearer.1. A method for multimedia broadcast multicast service (MBMS) bearer handling in a group communications system, the method being performed by a control node, the method comprising: obtaining a need for a new MBMS bearer to be activated; activating the new MBMS bearer; and announcing MBMS bearer identity and complementary service announcement information of the new MBMS bearer on an already announced MBMS bearer, thereby announcing the new MBMS bearer. 2. The method according to claim 1, wherein the new MBMS bearer is activated for supporting media transmission in a group call of the group communications system. 3. The method according to claim 1, wherein the MBMS bearer identity and complementary service announcement information is announced on demand and in direct response to the new MBMS bearer being activated. 4. A method for multimedia broadcast multicast service (MBMS) bearer handling in a group communications system, the method being performed by a client node, the method comprising: obtaining a broadcast service announcement of a new MBMS bearer on an already announced MBMS bearer from a control node of the group communications system, wherein the service announcement comprises the MBMS bearer identity and complementary service announcement information of the new MBMS bearer. 5. The method according to claim 4, further comprising: combining the complementary service announcement information with any previously received service announcement information of the new MBMS bearer so as to generate complete service announcement information of the new MBMS bearer. 6. The method according to claim 4, further comprising: monitoring the already announced MBMS bearer upon obtaining the broadcast service announcement. 7. The method according to claim 4, wherein the client node is in idle mode when obtaining the broadcast service announcement. 8. The method according to claim 4, wherein the already announced MBMS bearer is used by the control node for transmitting group communication control messages in the group communications system. 9. The method according to claim 4, wherein the MBMS bearer identity and complementary service announcement information is announced using a Real-Time Protocol, RTP, or a Real-time Transport Control Protocol, RTCP. 10. The method according to claim 4, wherein the complementary service announcement information comprises group communication streaming media initialization parameters of the new MBMS bearer. 11. The method according to claim 10, wherein the streaming media initialization parameters comprises at least one of a multicast Internet Protocol, IP, address, User datagram protocol, UDP, port information, IP source address information of media source, media protocol information, codec information, and reference to at least one other announced MBMS bearer. 12. The method according to claim 4, wherein the complementary service announcement information comprises at least one reference to service announcement information of at least one previously announced MBMS bearer. 13. A control node for multimedia broadcast multicast service (MBMS) bearer handling in a group communications system, the control node comprising processing circuitry, the processing circuitry being configured to cause the control node to: obtain a need for a new MBMS bearer to be activated; activate the new MBMS bearer; and announce MBMS bearer identity and complementary service announcement information of the new MBMS bearer on an already announced MBMS bearer, thereby announcing the new MBMS bearer. 14. A control node for multimedia broadcast multicast service (MBMS) bearer handling in a group communications system, the control node comprising: processing circuitry; and a computer program product (410 a) storing instructions that, when executed by the processing circuitry, causes the control node to: obtain a need for a new MBMS bearer to be activated; activate the new MBMS bearer; and announce MBMS bearer identity and complementary service announcement information of the new MBMS bearer on an already announced MBMS bearer, thereby announcing the new MBMS bearer. 15. (canceled) 16. A client node for multimedia broadcast multicast service (MBMS) bearer handling in a group communications system, the client node comprising processing circuitry, the processing circuitry being configured to cause the client node to: obtain a broadcast service announcement of a new MBMS bearer on an already announced MBMS bearer from a control node of the group communications system, wherein the service announcement comprises the MBMS bearer identity and complementary service announcement information of the new MBMS bearer. 17. A client node for multimedia broadcast multicast service (MBMS) bearer handling in a group communications system, the client node comprising: processing circuitry; and a computer program product storing instructions that, when executed by the processing circuitry, causes the client node to: obtain a broadcast service announcement of a new MBMS bearer on an already announced MBMS bearer from a control node of the group communications system, wherein the service announcement comprises the MBMS bearer identity and complementary service announcement information of the new MBMS bearer. 18. (canceled) 19. A computer program for multimedia broadcast multicast service (MBMS) bearer handling in a group communications system, the computer program comprising computer code which, when run on processing circuitry of a control node, causes the control node to: obtain a need for a new MBMS bearer to be activated; activate the new MBMS bearer; and announce MBMS bearer identity and complementary service announcement information of the new MBMS bearer on an already announced MBMS bearer, thereby announcing the new MBMS bearer. 20. A computer program for multimedia broadcast multicast service (MBMS) bearer handling in a group communications system, the computer program comprising computer code which, when run on processing circuitry of a client node, causes the client node to: obtain (S204) a broadcast service announcement of a new MBMS bearer on an already announced MBMS bearer from a control node of the group communications system, wherein the service announcement comprises the MBMS bearer identity and complementary service announcement information of the new MBMS bearer. 21. (canceled)
2,400
7,852
7,852
14,834,688
2,458
A method, system and computer program product for utilizing a user's free time. A period of free time for the user is identified. A user's request to access an application (e.g., social media application), a view and/or a folder is monitored during the user's period of free time. In response to detecting no content updates when the user accesses the application, view and/or folder during the user's free time, content is selected to be displayed to the user during the user's free time. For example, opportunistic content, such a password change notification, may be displayed to the user five days prior to the normal time of notification. In this manner, the user will be able to address such content during a time the user has free as opposed to being required to address such content when the user has less free time thereby more efficiently utilizing the user's free time.
1-8. (canceled) 9. A computer program product for utilizing a user's free time, the computer program product comprising a computer readable storage medium having program code embodied therewith, the program code comprising the programming instructions for: identifying a period of free time for said user; monitoring an application, view and/or folder to be accessed by said user during said period of free time of said user; detecting no content updates in said application, view and/or folder accessed by said user during said period of free time of said user in comparison to a prior time said user accessed said application, view and/or folder; selecting content to be presented to said user in response to said detection of no content updates in said application, view and/or folder during said period of free time of said user, wherein said selected content comprises one or more the following: opportunistic content, existing content and advertising content; and displaying said selected content to said user during said period of free time of said user. 10. The computer program product as recited in claim 9, wherein said period of free time of said user is identified in response to one of the following: input provided by said user, detecting a time said user is free in a calendar application of said user and detecting a time said user is free in a profile of said user. 11. The computer program product as recited in claim 9, wherein the program code further comprises the programming instructions for: monitoring said application, view and/or folder to be refreshed by said user during said period of free time of said user; and determining whether there are any content updates in said refreshed application, view and/or folder in response to said refresh of said application, view and/or folder during said period of free time of said user. 12. The computer program product as recited in claim 9, wherein the program code further comprises the programming instructions for: queuing said selected content; prioritizing said queued selected content; and displaying said queued selected content in order of priority to said user during said period of free time of said user. 13. The computer program product as recited in claim 12, wherein said prioritizing is based on one or more of the following: a user's location, a notification assigned to content, a number of social media likes, type of content, priorities assigned to designated content by said user in a profile of said user, a sender and/or other recipients of a message, and an estimated time to complete a task of a message. 14. The computer program product as recited in claim 9, wherein a designated content is not selected to be displayed to said user until said user refreshes said application, view and/or folder. 15. The computer program product as recited in claim 9, wherein said application comprises one of the following: an e-mail application, a social media application, an instant message application, a project management application, a forum. 16. The computer program product as recited in claim 9, wherein said opportunistic content comprises messages that are presented earlier than a normal time of presentation, wherein said existing content comprises unread or unflagged messages. 17. A system, comprising: a memory unit for storing a computer program for utilizing a user's free time; and a processor coupled to the memory unit, wherein the processor is configured to execute the program instructions of the computer program comprising: identifying a period of free time for said user; monitoring an application, view and/or folder to be accessed by said user during said period of free time of said user; detecting no content updates in said application, view and/or folder accessed by said user during said period of free time of said user in comparison to a prior time said user accessed said application, view and/or folder; selecting content to be presented to said user in response to said detection of no content updates in said application, view and/or folder during said period of free time of said user, wherein said selected content comprises one or more the following: opportunistic content, existing content and advertising content; and displaying said selected content to said user during said period of free time of said user. 18. The system as recited in claim 17, wherein said period of free time of said user is identified in response to one of the following: input provided by said user, detecting a time said user is free in a calendar application of said user and detecting a time said user is free in a profile of said user. 19. The system as recited in claim 17, wherein the program instructions of the computer program further comprises: monitoring said application, view and/or folder to be refreshed by said user during said period of free time of said user; and determining whether there are any content updates in said refreshed application, view and/or folder in response to said refresh of said application, view and/or folder during said period of free time of said user. 20. The system as recited in claim 17, wherein the program instructions of the computer program further comprises: queuing said selected content; prioritizing said queued selected content; and displaying said queued selected content in order of priority to said user during said period of free time of said user. 21. The system as recited in claim 20, wherein said prioritizing is based on one or more of the following: a user's location, a notification assigned to content, a number of social media likes, type of content, priorities assigned to designated content by said user in a profile of said user, a sender and/or other recipients of a message, and an estimated time to complete a task of a message. 22. The system as recited in claim 17, wherein a designated content is not selected to be displayed to said user until said user refreshes said application, view and/or folder. 23. The system as recited in claim 17, wherein said application comprises one of the following: an e-mail application, a social media application, an instant message application, a project management application, a forum. 24. The system as recited in claim 17, wherein said opportunistic content comprises messages that are presented earlier than a normal time of presentation, wherein said existing content comprises unread or unflagged messages.
A method, system and computer program product for utilizing a user's free time. A period of free time for the user is identified. A user's request to access an application (e.g., social media application), a view and/or a folder is monitored during the user's period of free time. In response to detecting no content updates when the user accesses the application, view and/or folder during the user's free time, content is selected to be displayed to the user during the user's free time. For example, opportunistic content, such a password change notification, may be displayed to the user five days prior to the normal time of notification. In this manner, the user will be able to address such content during a time the user has free as opposed to being required to address such content when the user has less free time thereby more efficiently utilizing the user's free time.1-8. (canceled) 9. A computer program product for utilizing a user's free time, the computer program product comprising a computer readable storage medium having program code embodied therewith, the program code comprising the programming instructions for: identifying a period of free time for said user; monitoring an application, view and/or folder to be accessed by said user during said period of free time of said user; detecting no content updates in said application, view and/or folder accessed by said user during said period of free time of said user in comparison to a prior time said user accessed said application, view and/or folder; selecting content to be presented to said user in response to said detection of no content updates in said application, view and/or folder during said period of free time of said user, wherein said selected content comprises one or more the following: opportunistic content, existing content and advertising content; and displaying said selected content to said user during said period of free time of said user. 10. The computer program product as recited in claim 9, wherein said period of free time of said user is identified in response to one of the following: input provided by said user, detecting a time said user is free in a calendar application of said user and detecting a time said user is free in a profile of said user. 11. The computer program product as recited in claim 9, wherein the program code further comprises the programming instructions for: monitoring said application, view and/or folder to be refreshed by said user during said period of free time of said user; and determining whether there are any content updates in said refreshed application, view and/or folder in response to said refresh of said application, view and/or folder during said period of free time of said user. 12. The computer program product as recited in claim 9, wherein the program code further comprises the programming instructions for: queuing said selected content; prioritizing said queued selected content; and displaying said queued selected content in order of priority to said user during said period of free time of said user. 13. The computer program product as recited in claim 12, wherein said prioritizing is based on one or more of the following: a user's location, a notification assigned to content, a number of social media likes, type of content, priorities assigned to designated content by said user in a profile of said user, a sender and/or other recipients of a message, and an estimated time to complete a task of a message. 14. The computer program product as recited in claim 9, wherein a designated content is not selected to be displayed to said user until said user refreshes said application, view and/or folder. 15. The computer program product as recited in claim 9, wherein said application comprises one of the following: an e-mail application, a social media application, an instant message application, a project management application, a forum. 16. The computer program product as recited in claim 9, wherein said opportunistic content comprises messages that are presented earlier than a normal time of presentation, wherein said existing content comprises unread or unflagged messages. 17. A system, comprising: a memory unit for storing a computer program for utilizing a user's free time; and a processor coupled to the memory unit, wherein the processor is configured to execute the program instructions of the computer program comprising: identifying a period of free time for said user; monitoring an application, view and/or folder to be accessed by said user during said period of free time of said user; detecting no content updates in said application, view and/or folder accessed by said user during said period of free time of said user in comparison to a prior time said user accessed said application, view and/or folder; selecting content to be presented to said user in response to said detection of no content updates in said application, view and/or folder during said period of free time of said user, wherein said selected content comprises one or more the following: opportunistic content, existing content and advertising content; and displaying said selected content to said user during said period of free time of said user. 18. The system as recited in claim 17, wherein said period of free time of said user is identified in response to one of the following: input provided by said user, detecting a time said user is free in a calendar application of said user and detecting a time said user is free in a profile of said user. 19. The system as recited in claim 17, wherein the program instructions of the computer program further comprises: monitoring said application, view and/or folder to be refreshed by said user during said period of free time of said user; and determining whether there are any content updates in said refreshed application, view and/or folder in response to said refresh of said application, view and/or folder during said period of free time of said user. 20. The system as recited in claim 17, wherein the program instructions of the computer program further comprises: queuing said selected content; prioritizing said queued selected content; and displaying said queued selected content in order of priority to said user during said period of free time of said user. 21. The system as recited in claim 20, wherein said prioritizing is based on one or more of the following: a user's location, a notification assigned to content, a number of social media likes, type of content, priorities assigned to designated content by said user in a profile of said user, a sender and/or other recipients of a message, and an estimated time to complete a task of a message. 22. The system as recited in claim 17, wherein a designated content is not selected to be displayed to said user until said user refreshes said application, view and/or folder. 23. The system as recited in claim 17, wherein said application comprises one of the following: an e-mail application, a social media application, an instant message application, a project management application, a forum. 24. The system as recited in claim 17, wherein said opportunistic content comprises messages that are presented earlier than a normal time of presentation, wherein said existing content comprises unread or unflagged messages.
2,400
7,853
7,853
15,077,223
2,456
An indication to determine a device to host at least one shared content found on a first device is received. The first device is connected to a network. The network includes two or more devices. To each device of the two or more devices connected to the network, a request to host the at least one shared content found on the first device is transmitted. Responsive to transmitting the request, a response to host from at least one device of the two or more devices connected to the network is received. An optimal device of the at least one device to host the at least one shared content is determined. The at least one shared content is transmitted to the optimal device.
1-7. (canceled) 8. A computer program product for a hosting program extending the availability of shared content, the computer program product comprising: one or more computer readable storage media; and program instructions stored on the one or more computer readable storage media, the program instructions comprising: program instructions to receive an indication to determine a device to host at least one shared content found on a first device, wherein the first device is connected to a network, and wherein the network includes two or more devices; program instructions to transmit to each device of the two or more devices connected to the network, a request to host the at least one shared content found on the first device; program instructions, responsive to transmitting the request, to receive a response to host from at least one device of the two or more devices connected to the network; program instructions to determine an optimal device of the at least one device to host the at least one shared content; and program instructions to transmit the at least one shared content to the optimal device. 9. The computer program product of claim 8, wherein the program instructions to determine the optimal device of the at least one device to host the content comprises: program instructions, responsive to determining that a response to host was received from only one device, to determine an optimal device is the one device. 10. The computer program product of claim 8, wherein the program instruction to determine an optimal device of the at least one device to host the content comprises: program instructions, responsive to determining that a response to host was received from two or more devices, to determine data about the two or more devices, wherein the data is selected from a group consisting of an amount of storage space that is available on each computing device of the two or more computing devices, a battery life of each computing device of the two or more computing devices, an average time each computing device of the two or more computing devices exits the network, and an average amount of time each computing device of the two or more computing devices remains in the network; and determine an optimal device from the two or more devices based on the data. 11. The computer program product of claim 8, wherein the network is a mobile ad hoc network. 12. The computer program product of claim 8, further comprising program instructions, stored on the one or more computer readable storage media, to: receive an indication from a second device of the two or more computing devices to host a second at least one shared content; responsive to receiving the indication to host the second at least one shared content, sending, by one or more processors, a response to the second device that the first device can host the second at least one shared content; receive the second at least one shared content; and store the second at least one shared content, wherein the second at least one shared content is visible to other devices connected to the network. 13. The computer program product of claim 8, further comprising program instructions, stored on the one or more computer readable storage media, to: determine whether the first device has previously shared at least one shared content that is being hosted by any device of the two or more devices connected to the network; and responsive to determining the first device has previously shared at least one shared content that is being hosted by any device of the two or more devices connected to the network, indicate to each device of the two or more devices hosting the at least one shared content to remove the at least one shared content. 14. The computer program product of claim 8, wherein each device of the two or more devices is a mobile device. 15. A computer system for a hosting program extending the availability of shared content, the computer system comprising: one or more computer processors; one or more computer readable storage media; and program instructions stored on the one or more computer readable storage media for execution by at least one of the one or more processors, the program instructions comprising: program instructions to receive an indication to determine a device to host at least one shared content found on a first device, wherein the first device is connected to a network, and wherein the network includes two or more devices; program instructions to transmit to each device of the two or more devices connected to the network, a request to host the at least one shared content found on the first device; program instructions, responsive to transmitting the request, to receive a response to host from at least one device of the two or more devices connected to the network; program instructions to determine an optimal device of the at least one device to host the at least one shared content; and program instructions to transmit the at least one shared content to the optimal device. 16. The computer system of claim 15, wherein the program instruction to determine the optimal device of the at least one device to host the content comprises: program instructions, responsive to determining that a response to host was received from only one device, to determine an optimal device is the one device. 17. The computer system of claim 15, wherein the program instructions to determine an optimal device of the at least one device to host the content comprises: program instructions, responsive to determining that a response to host was received from two or more devices, to determine data about the two or more devices, wherein the data is selected from a group consisting of an amount of storage space that is available on each computing device of the two or more computing devices, a battery life of each computing device of the two or more computing devices, an average time each computing device of the two or more computing devices exits the network, and an average amount of time each computing device of the two or more computing devices remains in the network; and determine an optimal device from the two or more devices based on the data. 18. The computer system of claim 15, wherein the network is a mobile ad hoc network. 19. The computer system of claim 15, further comprising program instructions, stored on the computer readable storage media for execution by at least one of the one or more processors, to: receive an indication from a second device of the two or more computing devices to host a second at least one shared content; responsive to receiving the indication to host the second at least one shared content, sending, by one or more processors, a response to the second device that the first device can host the second at least one shared content; receive the second at least one shared content; and store the second at least one shared content, wherein the second at least one shared content is visible to other devices connected to the network. 20. The computer system of claim 15, further comprising program instructions, stored on the computer readable storage media for execution by at least one of the one or more processors, to: determine whether the first device has previously shared at least one shared content that is being hosted by any device of the two or more devices connected to the network; and responsive to determining the first device has previously shared at least one shared content that is being hosted by any device of the two or more devices connected to the network, indicate to each device of the two or more devices hosting the at least one shared content to remove the at least one shared content.
An indication to determine a device to host at least one shared content found on a first device is received. The first device is connected to a network. The network includes two or more devices. To each device of the two or more devices connected to the network, a request to host the at least one shared content found on the first device is transmitted. Responsive to transmitting the request, a response to host from at least one device of the two or more devices connected to the network is received. An optimal device of the at least one device to host the at least one shared content is determined. The at least one shared content is transmitted to the optimal device.1-7. (canceled) 8. A computer program product for a hosting program extending the availability of shared content, the computer program product comprising: one or more computer readable storage media; and program instructions stored on the one or more computer readable storage media, the program instructions comprising: program instructions to receive an indication to determine a device to host at least one shared content found on a first device, wherein the first device is connected to a network, and wherein the network includes two or more devices; program instructions to transmit to each device of the two or more devices connected to the network, a request to host the at least one shared content found on the first device; program instructions, responsive to transmitting the request, to receive a response to host from at least one device of the two or more devices connected to the network; program instructions to determine an optimal device of the at least one device to host the at least one shared content; and program instructions to transmit the at least one shared content to the optimal device. 9. The computer program product of claim 8, wherein the program instructions to determine the optimal device of the at least one device to host the content comprises: program instructions, responsive to determining that a response to host was received from only one device, to determine an optimal device is the one device. 10. The computer program product of claim 8, wherein the program instruction to determine an optimal device of the at least one device to host the content comprises: program instructions, responsive to determining that a response to host was received from two or more devices, to determine data about the two or more devices, wherein the data is selected from a group consisting of an amount of storage space that is available on each computing device of the two or more computing devices, a battery life of each computing device of the two or more computing devices, an average time each computing device of the two or more computing devices exits the network, and an average amount of time each computing device of the two or more computing devices remains in the network; and determine an optimal device from the two or more devices based on the data. 11. The computer program product of claim 8, wherein the network is a mobile ad hoc network. 12. The computer program product of claim 8, further comprising program instructions, stored on the one or more computer readable storage media, to: receive an indication from a second device of the two or more computing devices to host a second at least one shared content; responsive to receiving the indication to host the second at least one shared content, sending, by one or more processors, a response to the second device that the first device can host the second at least one shared content; receive the second at least one shared content; and store the second at least one shared content, wherein the second at least one shared content is visible to other devices connected to the network. 13. The computer program product of claim 8, further comprising program instructions, stored on the one or more computer readable storage media, to: determine whether the first device has previously shared at least one shared content that is being hosted by any device of the two or more devices connected to the network; and responsive to determining the first device has previously shared at least one shared content that is being hosted by any device of the two or more devices connected to the network, indicate to each device of the two or more devices hosting the at least one shared content to remove the at least one shared content. 14. The computer program product of claim 8, wherein each device of the two or more devices is a mobile device. 15. A computer system for a hosting program extending the availability of shared content, the computer system comprising: one or more computer processors; one or more computer readable storage media; and program instructions stored on the one or more computer readable storage media for execution by at least one of the one or more processors, the program instructions comprising: program instructions to receive an indication to determine a device to host at least one shared content found on a first device, wherein the first device is connected to a network, and wherein the network includes two or more devices; program instructions to transmit to each device of the two or more devices connected to the network, a request to host the at least one shared content found on the first device; program instructions, responsive to transmitting the request, to receive a response to host from at least one device of the two or more devices connected to the network; program instructions to determine an optimal device of the at least one device to host the at least one shared content; and program instructions to transmit the at least one shared content to the optimal device. 16. The computer system of claim 15, wherein the program instruction to determine the optimal device of the at least one device to host the content comprises: program instructions, responsive to determining that a response to host was received from only one device, to determine an optimal device is the one device. 17. The computer system of claim 15, wherein the program instructions to determine an optimal device of the at least one device to host the content comprises: program instructions, responsive to determining that a response to host was received from two or more devices, to determine data about the two or more devices, wherein the data is selected from a group consisting of an amount of storage space that is available on each computing device of the two or more computing devices, a battery life of each computing device of the two or more computing devices, an average time each computing device of the two or more computing devices exits the network, and an average amount of time each computing device of the two or more computing devices remains in the network; and determine an optimal device from the two or more devices based on the data. 18. The computer system of claim 15, wherein the network is a mobile ad hoc network. 19. The computer system of claim 15, further comprising program instructions, stored on the computer readable storage media for execution by at least one of the one or more processors, to: receive an indication from a second device of the two or more computing devices to host a second at least one shared content; responsive to receiving the indication to host the second at least one shared content, sending, by one or more processors, a response to the second device that the first device can host the second at least one shared content; receive the second at least one shared content; and store the second at least one shared content, wherein the second at least one shared content is visible to other devices connected to the network. 20. The computer system of claim 15, further comprising program instructions, stored on the computer readable storage media for execution by at least one of the one or more processors, to: determine whether the first device has previously shared at least one shared content that is being hosted by any device of the two or more devices connected to the network; and responsive to determining the first device has previously shared at least one shared content that is being hosted by any device of the two or more devices connected to the network, indicate to each device of the two or more devices hosting the at least one shared content to remove the at least one shared content.
2,400
7,854
7,854
15,166,119
2,426
Various embodiments facilitate history-based decision making in television receivers, such as set-top boxes. In one embodiment, a history-based decision facilitator (“HBDF”) is provided. The HBDF facilitates decision making in a television receiver based on device history data received from the television receiver. In one embodiment, the HBDF receives an indication of an operation to be performed by the television receiver, the operation including one or more parameters. In response, the HBDF determines values for the one or more parameters, based on device history data received from the television receiver. The HBDF then provides the determined parameter values to the television receiver. In one example application, the HBDF can determine a tuner of the television receiver to utilize for recording a program, based on the history of the television receiver, such as that the determined tuner is typically idle during the scheduled recording time period.
1-20. (canceled) 21. A computing system configured to facilitate history-based decision making in a television receiver, comprising: a memory; and a module stored on the memory that is configured, when executed, to: receive from one or more television receivers device history data that includes indications of operations performed by each of the one or more television receivers; receive an indication of a user-specified function to be performed by the television receiver, the function including one or more parameters that specify operation of the function, the function including recording a program at an indicated time; determine values for the one or more parameters, based on the received device history data, wherein the received device history data represents viewing patterns associated with the one or more television receivers; and cause the television receiver to perform the function with the determined values for the one or more parameters. 22. The computing system of claim 21, wherein the device history data indicates which tuners of the one or more television receivers are typically in use at the indicated time. 23. The computing system of claim 21, wherein the module is further configured to: determine that there is insufficient device history data about the television receiver to determine the values for the one or more parameters; and in response, determine the values for the one or more parameters based on the device history data received from at least one other television receiver. 24. The computing system of claim 23, wherein the module is further configured to: determine the values for the one or more parameters based on device history data received from at least one other television receiver located in a same premises as the television receiver. 25. The computing system of claim 23, wherein the module is further configured to: determine the values for the one or more parameters based on device history data received from at least one other television receiver associated with users of a specified demographic group. 26. The computing system of claim 23, wherein the module is further configured to: determine the values for the one or more parameters based on device history data received from at least one randomly selected television receiver. 27. The computing system of claim 21, wherein the module is further configured to: receive an indication that the television receiver is to record multiple programs at the indicated time, the number of multiple programs to record exceeding the number of tuners in the television receiver; and select one or more programs for recording, the number of selected programs being equal to the number of tuners, based on the viewing patterns represented by the device history data. 28. The computing system of claim 27, wherein the device history data indicates that the selected programs are more frequently viewed than other of the multiple programs that are not selected for recording. 29. The computing system of claim 21, wherein each of the television receivers has at least one tuner, and wherein the module is further configured to: select a first tuner of one of the television receivers based on the viewing patterns indicating that a second tuner is typically in use at the indicated time; and cause the television receiver to use the selected tuner for the recording. 30. The computing system of 29, wherein the television receiver is coupled to multiple displays, and wherein the viewing patterns indicate that a user typically views programs via a display coupled to the second tuner. 31. The computing system of claim 21, wherein the television receiver is a set-top box that includes the computing system, and wherein the module is further configured to receive the device history data from a data store of the television receiver. 32. A method for facilitating history-based decision making in a television receiver, the method comprising: under control of a computer processor, receiving from one or more television receivers device history data that includes indications of operations performed by each of the one or more television receivers; receiving an indication of a user-specified function to be performed by the television receiver, the function including one or more parameters that specify operation of the function, the function including recording a program at an indicated time; determining values for the one or more parameters, based on the received device history data, wherein the received device history data represents viewing patterns associated with the one or more television receivers; and causing the television receiver to perform the function with the determined values for the one or more parameters. 33. The method of claim 32, further comprising: determining that there is insufficient device history data about the television receiver to determine the values for the one or more parameters; and in response, determining values for the one or more parameters based on the device history data received from at least one other television receiver. 34. The method of claim 33, further comprising: determining the values for the one or more parameters based on device history data received from other television receivers located in a same premises as the television receiver. 35. The method of claim 32, further comprising: receiving an indication that a television receiver is to record multiple programs at the indicated time, the number of multiple programs to record exceeding the number of tuners in the television receiver; and selecting one or more programs for recording, the number of selected programs being equal to the number of tuners, based on the viewing patterns represented by the device history data, wherein the device history data indicates that the selected programs are more frequently viewed than other of the multiple programs that are not selected for recording. 36. The method of claim 32, wherein each of the television receiver has at least one tuner, and further comprising: selecting a first tuner of one of the television receivers based on the viewing patterns indicating that a second tuner is typically in use at the indicated time; and causing the television receiver to use the selected tuner for the recording. 37. The method of claim 32, wherein receiving the device history data includes receiving multiple records that each describe an operation performed by the television receiver, each record indicating a device identifier, an operation, and a time. 38. A non-transitory computer-readable storage medium whose contents, when executed, cause a computing system to facilitate history-based decision making in a television receiver, by performing a method comprising: receiving from one or more television receivers device history data that includes indications of operations performed by each of the one or more television receivers; receiving an indication of a user-specified function to be performed by the television receiver, the function including one or more parameters that specify operation of the function, the function including recording a program at an indicated time; determining values for the one or more parameters, based on the received device history data, wherein the received device history data represents viewing patterns associated with the one or more television receivers; and causing the television receiver to perform the function with the determined values for the one or more parameters 39. The non-transitory computer-readable storage medium of claim 38, wherein the television receiver is a set-top box that is remote from the computing system, and wherein causing the television receiver to perform the function includes transmitting to the set-top box the determined values for the one or more parameters. 40. The non-transitory computer-readable storage medium of claim 38 wherein the method further comprises: determining that there is insufficient device history data about the television receiver to determine the values for the one or more parameters; and in response, determining the values for the one or more parameters based on the device history data received from multiple other television receivers.
Various embodiments facilitate history-based decision making in television receivers, such as set-top boxes. In one embodiment, a history-based decision facilitator (“HBDF”) is provided. The HBDF facilitates decision making in a television receiver based on device history data received from the television receiver. In one embodiment, the HBDF receives an indication of an operation to be performed by the television receiver, the operation including one or more parameters. In response, the HBDF determines values for the one or more parameters, based on device history data received from the television receiver. The HBDF then provides the determined parameter values to the television receiver. In one example application, the HBDF can determine a tuner of the television receiver to utilize for recording a program, based on the history of the television receiver, such as that the determined tuner is typically idle during the scheduled recording time period.1-20. (canceled) 21. A computing system configured to facilitate history-based decision making in a television receiver, comprising: a memory; and a module stored on the memory that is configured, when executed, to: receive from one or more television receivers device history data that includes indications of operations performed by each of the one or more television receivers; receive an indication of a user-specified function to be performed by the television receiver, the function including one or more parameters that specify operation of the function, the function including recording a program at an indicated time; determine values for the one or more parameters, based on the received device history data, wherein the received device history data represents viewing patterns associated with the one or more television receivers; and cause the television receiver to perform the function with the determined values for the one or more parameters. 22. The computing system of claim 21, wherein the device history data indicates which tuners of the one or more television receivers are typically in use at the indicated time. 23. The computing system of claim 21, wherein the module is further configured to: determine that there is insufficient device history data about the television receiver to determine the values for the one or more parameters; and in response, determine the values for the one or more parameters based on the device history data received from at least one other television receiver. 24. The computing system of claim 23, wherein the module is further configured to: determine the values for the one or more parameters based on device history data received from at least one other television receiver located in a same premises as the television receiver. 25. The computing system of claim 23, wherein the module is further configured to: determine the values for the one or more parameters based on device history data received from at least one other television receiver associated with users of a specified demographic group. 26. The computing system of claim 23, wherein the module is further configured to: determine the values for the one or more parameters based on device history data received from at least one randomly selected television receiver. 27. The computing system of claim 21, wherein the module is further configured to: receive an indication that the television receiver is to record multiple programs at the indicated time, the number of multiple programs to record exceeding the number of tuners in the television receiver; and select one or more programs for recording, the number of selected programs being equal to the number of tuners, based on the viewing patterns represented by the device history data. 28. The computing system of claim 27, wherein the device history data indicates that the selected programs are more frequently viewed than other of the multiple programs that are not selected for recording. 29. The computing system of claim 21, wherein each of the television receivers has at least one tuner, and wherein the module is further configured to: select a first tuner of one of the television receivers based on the viewing patterns indicating that a second tuner is typically in use at the indicated time; and cause the television receiver to use the selected tuner for the recording. 30. The computing system of 29, wherein the television receiver is coupled to multiple displays, and wherein the viewing patterns indicate that a user typically views programs via a display coupled to the second tuner. 31. The computing system of claim 21, wherein the television receiver is a set-top box that includes the computing system, and wherein the module is further configured to receive the device history data from a data store of the television receiver. 32. A method for facilitating history-based decision making in a television receiver, the method comprising: under control of a computer processor, receiving from one or more television receivers device history data that includes indications of operations performed by each of the one or more television receivers; receiving an indication of a user-specified function to be performed by the television receiver, the function including one or more parameters that specify operation of the function, the function including recording a program at an indicated time; determining values for the one or more parameters, based on the received device history data, wherein the received device history data represents viewing patterns associated with the one or more television receivers; and causing the television receiver to perform the function with the determined values for the one or more parameters. 33. The method of claim 32, further comprising: determining that there is insufficient device history data about the television receiver to determine the values for the one or more parameters; and in response, determining values for the one or more parameters based on the device history data received from at least one other television receiver. 34. The method of claim 33, further comprising: determining the values for the one or more parameters based on device history data received from other television receivers located in a same premises as the television receiver. 35. The method of claim 32, further comprising: receiving an indication that a television receiver is to record multiple programs at the indicated time, the number of multiple programs to record exceeding the number of tuners in the television receiver; and selecting one or more programs for recording, the number of selected programs being equal to the number of tuners, based on the viewing patterns represented by the device history data, wherein the device history data indicates that the selected programs are more frequently viewed than other of the multiple programs that are not selected for recording. 36. The method of claim 32, wherein each of the television receiver has at least one tuner, and further comprising: selecting a first tuner of one of the television receivers based on the viewing patterns indicating that a second tuner is typically in use at the indicated time; and causing the television receiver to use the selected tuner for the recording. 37. The method of claim 32, wherein receiving the device history data includes receiving multiple records that each describe an operation performed by the television receiver, each record indicating a device identifier, an operation, and a time. 38. A non-transitory computer-readable storage medium whose contents, when executed, cause a computing system to facilitate history-based decision making in a television receiver, by performing a method comprising: receiving from one or more television receivers device history data that includes indications of operations performed by each of the one or more television receivers; receiving an indication of a user-specified function to be performed by the television receiver, the function including one or more parameters that specify operation of the function, the function including recording a program at an indicated time; determining values for the one or more parameters, based on the received device history data, wherein the received device history data represents viewing patterns associated with the one or more television receivers; and causing the television receiver to perform the function with the determined values for the one or more parameters 39. The non-transitory computer-readable storage medium of claim 38, wherein the television receiver is a set-top box that is remote from the computing system, and wherein causing the television receiver to perform the function includes transmitting to the set-top box the determined values for the one or more parameters. 40. The non-transitory computer-readable storage medium of claim 38 wherein the method further comprises: determining that there is insufficient device history data about the television receiver to determine the values for the one or more parameters; and in response, determining the values for the one or more parameters based on the device history data received from multiple other television receivers.
2,400
7,855
7,855
15,098,850
2,446
A system includes a vehicle processor configured to receive a query, including response network parameters, from a remote entity. The processor is also configured to determine a response transport policy based on the parameters. The processor is further configured to determine if a network having characteristics defined by the policy in conjunction with parameter values is currently connected and utilize the network, if currently available, to transmit a query response, otherwise queue the response until such a network is connected.
1. A system comprising: a vehicle processor configured to: receive a query, including response network parameters, from a remote entity; determine a response transport policy based on the parameters; determine if a network having characteristics defined by the policy in conjunction with parameter values is currently connected; and utilize the network, if currently available, to transmit a query response, otherwise queue the response until such a network is connected. 2. The system of claim 1, wherein the processor is configured to: subscribe to a notification topic relating to one or more network characteristics if the network having characteristics defined by the policy is not available; and receive a response, based on the subscription, when a network having characteristics corresponding to the one or more characteristics relating to the notification topic is connected. 3. The system of claim 1, wherein policies applicable to queries of a first priority as defined by the query identify a preferred network defined by the policy and a secondary network to be used if the preferred network is not available. 4. The system of claim 1, wherein policies applicable to queries having associated high-level intent response-network parameter values, defined by the query, dictate selection of a preferred network, defined by the policy in conjunction with parameter values, if available, and selection of any-available secondary network if the preferred network is not available. 5. The system of claim 4, wherein the high-level intent parameter values include a parameter dictating selection of a high-bandwidth network. 6. The system of claim 4, wherein the high-level intent parameter values include a parameter dictating selection of a low-latency network. 7. The system of claim 1, wherein the parameter values include specification of a particular network transport-type. 8. The system of claim 1, wherein the parameter values include specification of an entity paying a cost for network transmission. 9. The system of claim 1, wherein the parameter values include specification of a particular date and time for response. 10. The system of claim 1, wherein the parameter values include specification of a Wi-Fi access point MAC ID defining a specific Wi-Fi network to be used in transmitting the response. 11. A computer-implemented method comprising: determining a network policy to transmit a response to a received query, the query including parameters used by a vehicle computer to determine which network policy to use based on included parameter values, the policy defining a network having characteristics matching parameter values; utilizing the network to transmit the response if currently available; and queuing the response if the network is not currently available. 12. The method of claim 11, wherein the parameters include network transport-type preference. 13. The method of claim 11, wherein the parameters include specification of an entity paying a cost for network transmission. 14. The method of claim 11, wherein the parameters include specification of a particular date and time for response. 15. The method of claim 11, wherein the parameters include specification of a Wi-Fi access point MAC ID defining a specific Wi-Fi network to be used in transmitting the response. 16. The method of claim 11, further comprising: determining a secondary network, defined by the determined policy, for use prior to queuing if the initial network defined by the policy is not available. 17. The method of claim 16, wherein the policy defines the secondary network as any-available network. 18. The method of claim 17, wherein the parameter values include at least a high-level intent parameter value. 19. The method of claim 18, wherein the high-level intent parameter value is at least one of either a latency preference or a bandwidth preference. 20. A computer-implemented method comprising: determining a network policy to transmit a response to a received query, the query including parameters used by a vehicle computer to determine which network policy to use based on which parameters are included with the query, the policy defining a network having characteristics matching parameter values included in the query; utilizing the network, if available, to transmit the response; and queuing the response if the network is not available.
A system includes a vehicle processor configured to receive a query, including response network parameters, from a remote entity. The processor is also configured to determine a response transport policy based on the parameters. The processor is further configured to determine if a network having characteristics defined by the policy in conjunction with parameter values is currently connected and utilize the network, if currently available, to transmit a query response, otherwise queue the response until such a network is connected.1. A system comprising: a vehicle processor configured to: receive a query, including response network parameters, from a remote entity; determine a response transport policy based on the parameters; determine if a network having characteristics defined by the policy in conjunction with parameter values is currently connected; and utilize the network, if currently available, to transmit a query response, otherwise queue the response until such a network is connected. 2. The system of claim 1, wherein the processor is configured to: subscribe to a notification topic relating to one or more network characteristics if the network having characteristics defined by the policy is not available; and receive a response, based on the subscription, when a network having characteristics corresponding to the one or more characteristics relating to the notification topic is connected. 3. The system of claim 1, wherein policies applicable to queries of a first priority as defined by the query identify a preferred network defined by the policy and a secondary network to be used if the preferred network is not available. 4. The system of claim 1, wherein policies applicable to queries having associated high-level intent response-network parameter values, defined by the query, dictate selection of a preferred network, defined by the policy in conjunction with parameter values, if available, and selection of any-available secondary network if the preferred network is not available. 5. The system of claim 4, wherein the high-level intent parameter values include a parameter dictating selection of a high-bandwidth network. 6. The system of claim 4, wherein the high-level intent parameter values include a parameter dictating selection of a low-latency network. 7. The system of claim 1, wherein the parameter values include specification of a particular network transport-type. 8. The system of claim 1, wherein the parameter values include specification of an entity paying a cost for network transmission. 9. The system of claim 1, wherein the parameter values include specification of a particular date and time for response. 10. The system of claim 1, wherein the parameter values include specification of a Wi-Fi access point MAC ID defining a specific Wi-Fi network to be used in transmitting the response. 11. A computer-implemented method comprising: determining a network policy to transmit a response to a received query, the query including parameters used by a vehicle computer to determine which network policy to use based on included parameter values, the policy defining a network having characteristics matching parameter values; utilizing the network to transmit the response if currently available; and queuing the response if the network is not currently available. 12. The method of claim 11, wherein the parameters include network transport-type preference. 13. The method of claim 11, wherein the parameters include specification of an entity paying a cost for network transmission. 14. The method of claim 11, wherein the parameters include specification of a particular date and time for response. 15. The method of claim 11, wherein the parameters include specification of a Wi-Fi access point MAC ID defining a specific Wi-Fi network to be used in transmitting the response. 16. The method of claim 11, further comprising: determining a secondary network, defined by the determined policy, for use prior to queuing if the initial network defined by the policy is not available. 17. The method of claim 16, wherein the policy defines the secondary network as any-available network. 18. The method of claim 17, wherein the parameter values include at least a high-level intent parameter value. 19. The method of claim 18, wherein the high-level intent parameter value is at least one of either a latency preference or a bandwidth preference. 20. A computer-implemented method comprising: determining a network policy to transmit a response to a received query, the query including parameters used by a vehicle computer to determine which network policy to use based on which parameters are included with the query, the policy defining a network having characteristics matching parameter values included in the query; utilizing the network, if available, to transmit the response; and queuing the response if the network is not available.
2,400
7,856
7,856
14,296,058
2,424
Methods and systems for displaying fantasy league information are disclosed. In some embodiments, fantasy league information may be displayed as an overlay on broadcast content.
1.-92. (canceled) 93. A method comprising: receiving information associated with one or more players selected by at least one participant in a fantasy league for inclusion in a fantasy team associated with the at least participant; receiving information provided by the at least one participant associated with at least one fantasy team attribute of the fantasy team associated with the at least participant; receiving broadcast content in response to a request from the at least one participant; retrieving non-broadcast information associated with any of the one or more players selected by the at least one participant for inclusion in the fantasy team associated with the at least participant; transmitting one or more instructions to display a descriptor associated with at least one of the one or more players in accordance with their inclusion in the fantasy team associated with the at least one participant; transmitting one or more instructions to display the non-broadcast information associated with at least one of the one or more players in accordance with their inclusion in the fantasy team associated with the at least one participant; transmitting one or more instructions to display the at least one fantasy team attribute; and transmitting one or more instructions to display the broadcast content as an overlay display. 94. The method of claim 93, wherein the receiving information associated with one or more players selected by at least one participant in a fantasy league for inclusion in a fantasy team associated with the at least participant comprises: receiving one or more signals that include the information associated with the one or more players selected by the at least one participant in a fantasy league for inclusion in the fantasy team associated with the at least participant. 95.-97. (canceled) 98. The method of claim 93, wherein the receiving information associated with one or more players selected by at least one participant in a fantasy league for inclusion in a fantasy team associated with the at least participant comprises: grouping the one or more players selected by the at least one participant into the at least one fantasy team and linking the fantasy team attribute to the fantasy team. 99.-100. (canceled) 101. The method of claim 93, wherein the receiving information provided by the at least one participant associated with at least one fantasy team attribute of the fantasy team associated with the at least participant comprises: receiving information associated with at least one participant selected name associated with the at least one fantasy team. 102.-103. (canceled) 104. The method of claim 93, wherein the receiving information provided by the at least one participant associated with at least one fantasy team attribute of the fantasy team associated with the at least participant comprises: receiving information associated with at least one participant selected symbol associated with the at least one fantasy team. 105.-107. (canceled) 108. The method of claim 93, wherein the receiving broadcast content in response to a request from the at least one participant comprises: querying one or more listings of broadcast content to determine broadcast content that is associated with at least one of the one or more players that were selected by the at least one participant and then receiving the broadcast content that is associated with the one or more players that were selected by the at least one participant. 109.-110. (canceled) 111. The method of claim 93, wherein the receiving broadcast content in response to a request from the at least one participant comprises: receiving broadcast content that includes information associated with one or more players selected by the at least one participant and then doing optical character recognition analysis to obtain positional information associated with any of the one or more players selected by the at least one participant that are included in the broadcast content. 112.-114. (canceled) 115. The method of claim 93, wherein the retrieving non-broadcast information associated with any of the one or more players selected by the at least one participant for inclusion in the fantasy team associated with the at least participant comprises: querying one or more networks for non-broadcast information that is associated with at least one of the one or more players that were selected by the at least one participant and then receiving the non-broadcast information that is associated with the at least one of the one or more players that were selected by the at least one participant. 116. (canceled) 117. The method of claim 93, wherein the retrieving non-broadcast information associated with any of the one or more players selected by the at least one participant for inclusion in the fantasy team associated with the at least participant comprises: retrieving information associated with one or more events associated with at least one of the one or more players that were selected by the at least one participant. 118. (canceled) 119. The method of claim 93, wherein the transmitting one or more instructions to display a descriptor associated with at least one of the one or more players in accordance with their inclusion in the fantasy team associated with the at least one participant comprises: transmitting one or more signals that include the one or more instructions to display the descriptor associated with the one or more players selected by the at least one participant. 120.-126. (canceled) 127. The method of claim 93, wherein the transmitting one or more instructions to display the non-broadcast information associated with at least one of the one or more players in accordance with their inclusion in the fantasy team associated with the at least one participant comprises: transmitting one or more instructions to display at least one event associated with at least one of the one or more players selected by the at least one participant. 128. The method of claim 93, wherein the transmitting one or more instructions to display the at least one fantasy team attribute comprises: transmitting one or more signals that include the one or more instructions to display the fantasy team attribute selected by the at least one participant. 129.-131. (canceled) 132. The method of claim 93, wherein the transmitting one or more instructions to display the at least one fantasy team attribute comprises: transmitting one or more instructions to display at least one participant selected symbol associated with the at least one fantasy team. 133.-135. (canceled) 136. The method of claim 93, wherein the transmitting one or more instructions to display the broadcast content as an overlay display comprises: transmitting one or more instructions to display the broadcast content as an overlay display with a name associated with each of the one or more players selected by the at least one participant, the non-broadcast information associated with the one or more players, and the at least one fantasy team attribute. 137. (canceled) 138. The method of claim 93, wherein the transmitting one or more instructions to display the broadcast content as an overlay display comprises: transmitting one or more instructions to display at least one fantasy team attribute selected by the at least one participant mapped onto at least one displayed image of at least one player selected by the at least one participant through use of positional information associated with the at least one player. 139.-141. (canceled) 142. The method of claim 93, further comprising: transmitting one or more instructions to display one or more indicators in response to one or events associated with the one or more players. 143. The method of claim 142, wherein the transmitting one or more instructions to display one or more indicators in response to one or events associated with the one or more players comprises: transmitting one or more signals that include the one or more instructions to display the one or more indicators in response to the one or events associated with the one or more players selected by the at least one participant. 144.-147. (canceled) 148. A system comprising: circuitry configured to receive information associated with one or more players selected by at least one participant in a fantasy league for inclusion in a fantasy team associated with the at least participant; circuitry configured to receive information provided by the at least one participant associated with at least one fantasy team attribute of the fantasy team associated with the at least participant; circuitry configured to receive broadcast content in response to a request from the at least one participant; circuitry configured to retrieve non-broadcast information associated with any of the one or more players selected by the at least one participant for inclusion in the fantasy team associated with the at least participant; circuitry configured to transmit one or more instructions to display a descriptor associated with at least one of the one or more players in accordance with their inclusion in the fantasy team associated with the at least one participant; circuitry configured to transmit one or more instructions to display the non-broadcast information associated with at least one of the one or more players in accordance with their inclusion in the fantasy team associated with the at least one participant; circuitry configured to transmit one or more instructions to display the at least one fantasy team attribute; and circuitry configured to transmit one or more instructions to display the broadcast content as an overlay display. 149. The system of claim 148, wherein the circuitry configured to receive information associated with one or more players selected by at least one participant in a fantasy league for inclusion in a fantasy team associated with the at least participant comprises: circuitry configured to receive one or more signals that include the information associated with the one or more players selected by the at least one participant in a fantasy league for inclusion in the fantasy team associated with the at least participant. 150.-152. (canceled) 153. The system of claim 148, wherein the circuitry configured to receive information associated with one or more players selected by at least one participant in a fantasy league for inclusion in a fantasy team associated with the at least participant comprises: circuitry configured to group the one or more players selected by the at least one participant into the at least one fantasy team and linking the fantasy team attribute to the fantasy team. 154. (canceled) 155. The system of claim 148, wherein the circuitry configured to receive information provided by the at least one participant associated with at least one fantasy team attribute of the fantasy team associated with the at least participant comprises: circuitry configured to receive one or more signals that include the information associated with the at least one fantasy team attribute selected by the at least one participant. 156.-158. (canceled) 159. The system of claim 148, wherein the circuitry configured to receive information provided by the at least one participant associated with at least one fantasy team attribute of the fantasy team associated with the at least participant comprises: circuitry configured to receive information associated with at least one participant selected symbol associated with the at least one fantasy team. 160.-162. (canceled) 163. The system of claim 148, wherein the circuitry configured to receive broadcast content in response to a request from the at least one participant comprises: circuitry configured to query one or more listings of broadcast content to determine broadcast content that is associated with at least one of the one or more players that were selected by the at least one participant and then receiving the broadcast content that is associated with the one or more players that were selected by the at least one participant. 164.-165. (canceled) 166. The system of claim 148, wherein the circuitry configured to receive broadcast content in response to a request from the at least one participant comprises: circuitry configured to receive broadcast content that includes information associated with one or more players selected by the at least one participant and then doing optical character recognition analysis to obtain positional information associated with any of the one or more players selected by the at least one participant that are included in the broadcast content. 167.-169. (canceled) 170. The system of claim 148, wherein the circuitry configured to retrieve non-broadcast information associated with any of the one or more players selected by the at least one participant for inclusion in the fantasy team associated with the at least participant comprises: circuitry configured to query one or more networks for non-broadcast information that is associated with at least one of the one or more players that were selected by the at least one participant and then receiving the non-broadcast information that is associated with the at least one of the one or more players that were selected by the at least one participant. 171. (canceled) 172. The system of claim 148, wherein the circuitry configured to retrieve non-broadcast information associated with any of the one or more players selected by the at least one participant for inclusion in the fantasy team associated with the at least participant comprises: circuitry configured to retrieve information associated with one or more events associated with at least one of the one or more players that were selected by the at least one participant. 173. (canceled) 174. The system of claim 148, wherein the circuitry configured to transmit one or more instructions to display a descriptor associated with at least one of the one or more players in accordance with their inclusion in the fantasy team associated with the at least one participant comprises: circuitry configured to transmit one or more signals that include the one or more instructions to display the descriptor associated with the one or more players selected by the at least one participant. 175.-181. (canceled) 182. The system of claim 148, wherein the circuitry configured to transmit one or more instructions to display the non-broadcast information associated with at least one of the one or more players in accordance with their inclusion in the fantasy team associated with the at least one participant comprises: circuitry configured to transmit one or more instructions to display at least one event associated with at least one of the one or more players selected by the at least one participant. 183. The system of claim 148, wherein the circuitry configured to transmit one or more instructions to display the at least one fantasy team attribute comprises: circuitry configured to transmit one or more signals that include the one or more instructions to display the fantasy team attribute selected by the at least one participant. 184.-186. (canceled) 187. The system of claim 148, wherein the circuitry configured to transmit one or more instructions to display the at least one fantasy team attribute comprises: circuitry configured to transmit one or more instructions to display at least one participant selected symbol associated with the at least one fantasy team. 188.-190. (canceled) 191. The system of claim 148, wherein the circuitry configured to transmit one or more instructions to display the broadcast content as an overlay display comprises: circuitry configured to transmit one or more instructions to display the broadcast content as an overlay display with a name associated with each of the one or more players selected by the at least one participant, the non-broadcast information associated with the one or more players, and the at least one fantasy team attribute. 192.-193. (canceled) 194. The system of claim 148, wherein the circuitry configured to transmit one or more instructions to display the broadcast content as an overlay display comprises: circuitry configured to transmit one or more instructions to display at least one fantasy team name selected by the at least one participant mapped onto at least one displayed image of at least one player selected by the at least one participant through use of positional information associated with the at least one player. 195.-196. (canceled) 197. The system of claim 148, further comprising: circuitry configured to transmit one or more instructions to display one or more indicators in response to one or events associated with the one or more players. 198. The system of claim 197, wherein the circuitry configured to transmit one or more instructions to display one or more indicators in response to one or events associated with the one or more players comprises: circuitry configured to transmit one or more signals that include the one or more instructions to display the one or more indicators in response to the one or more events associated with the one or more players selected by the at least one participant. 199.-202. (canceled) 203. A system comprising: a non-transitory signal-bearing medium bearing one or more instructions that, when executed by one or more processing components, direct performance of operations that include at least: receiving information associated with one or more players selected by at least one participant in a fantasy league for inclusion in a fantasy team associated with the at least participant; receiving information provided by the at least one participant associated with at least one fantasy team attribute of the fantasy team associated with the at least participant; receiving broadcast content in response to a request from at least one participant; retrieving non-broadcast information associated with any of the one or more players selected by the at least one participant for inclusion in the fantasy team associated with the at least participant; transmitting one or more instructions to display a descriptor associated with at least one of the one or more players in accordance with their inclusion in the fantasy team associated with the at least one participant; transmitting one or more instructions to display the non-broadcast information associated with at least one of the one or more players in accordance with their inclusion in the fantasy team associated with the at least one participant; transmitting one or more instructions to display the at least one fantasy team attribute; and transmitting one or more instructions to display the broadcast content as an overlay display. 204. The system of claim 203, wherein the non-transitory signal-bearing medium further comprises: one or more instructions that direct performance of an operation that includes at least transmitting one or more instructions to display one or more indicators in response to one or events associated with the one or more players. 205.-454. (canceled)
Methods and systems for displaying fantasy league information are disclosed. In some embodiments, fantasy league information may be displayed as an overlay on broadcast content.1.-92. (canceled) 93. A method comprising: receiving information associated with one or more players selected by at least one participant in a fantasy league for inclusion in a fantasy team associated with the at least participant; receiving information provided by the at least one participant associated with at least one fantasy team attribute of the fantasy team associated with the at least participant; receiving broadcast content in response to a request from the at least one participant; retrieving non-broadcast information associated with any of the one or more players selected by the at least one participant for inclusion in the fantasy team associated with the at least participant; transmitting one or more instructions to display a descriptor associated with at least one of the one or more players in accordance with their inclusion in the fantasy team associated with the at least one participant; transmitting one or more instructions to display the non-broadcast information associated with at least one of the one or more players in accordance with their inclusion in the fantasy team associated with the at least one participant; transmitting one or more instructions to display the at least one fantasy team attribute; and transmitting one or more instructions to display the broadcast content as an overlay display. 94. The method of claim 93, wherein the receiving information associated with one or more players selected by at least one participant in a fantasy league for inclusion in a fantasy team associated with the at least participant comprises: receiving one or more signals that include the information associated with the one or more players selected by the at least one participant in a fantasy league for inclusion in the fantasy team associated with the at least participant. 95.-97. (canceled) 98. The method of claim 93, wherein the receiving information associated with one or more players selected by at least one participant in a fantasy league for inclusion in a fantasy team associated with the at least participant comprises: grouping the one or more players selected by the at least one participant into the at least one fantasy team and linking the fantasy team attribute to the fantasy team. 99.-100. (canceled) 101. The method of claim 93, wherein the receiving information provided by the at least one participant associated with at least one fantasy team attribute of the fantasy team associated with the at least participant comprises: receiving information associated with at least one participant selected name associated with the at least one fantasy team. 102.-103. (canceled) 104. The method of claim 93, wherein the receiving information provided by the at least one participant associated with at least one fantasy team attribute of the fantasy team associated with the at least participant comprises: receiving information associated with at least one participant selected symbol associated with the at least one fantasy team. 105.-107. (canceled) 108. The method of claim 93, wherein the receiving broadcast content in response to a request from the at least one participant comprises: querying one or more listings of broadcast content to determine broadcast content that is associated with at least one of the one or more players that were selected by the at least one participant and then receiving the broadcast content that is associated with the one or more players that were selected by the at least one participant. 109.-110. (canceled) 111. The method of claim 93, wherein the receiving broadcast content in response to a request from the at least one participant comprises: receiving broadcast content that includes information associated with one or more players selected by the at least one participant and then doing optical character recognition analysis to obtain positional information associated with any of the one or more players selected by the at least one participant that are included in the broadcast content. 112.-114. (canceled) 115. The method of claim 93, wherein the retrieving non-broadcast information associated with any of the one or more players selected by the at least one participant for inclusion in the fantasy team associated with the at least participant comprises: querying one or more networks for non-broadcast information that is associated with at least one of the one or more players that were selected by the at least one participant and then receiving the non-broadcast information that is associated with the at least one of the one or more players that were selected by the at least one participant. 116. (canceled) 117. The method of claim 93, wherein the retrieving non-broadcast information associated with any of the one or more players selected by the at least one participant for inclusion in the fantasy team associated with the at least participant comprises: retrieving information associated with one or more events associated with at least one of the one or more players that were selected by the at least one participant. 118. (canceled) 119. The method of claim 93, wherein the transmitting one or more instructions to display a descriptor associated with at least one of the one or more players in accordance with their inclusion in the fantasy team associated with the at least one participant comprises: transmitting one or more signals that include the one or more instructions to display the descriptor associated with the one or more players selected by the at least one participant. 120.-126. (canceled) 127. The method of claim 93, wherein the transmitting one or more instructions to display the non-broadcast information associated with at least one of the one or more players in accordance with their inclusion in the fantasy team associated with the at least one participant comprises: transmitting one or more instructions to display at least one event associated with at least one of the one or more players selected by the at least one participant. 128. The method of claim 93, wherein the transmitting one or more instructions to display the at least one fantasy team attribute comprises: transmitting one or more signals that include the one or more instructions to display the fantasy team attribute selected by the at least one participant. 129.-131. (canceled) 132. The method of claim 93, wherein the transmitting one or more instructions to display the at least one fantasy team attribute comprises: transmitting one or more instructions to display at least one participant selected symbol associated with the at least one fantasy team. 133.-135. (canceled) 136. The method of claim 93, wherein the transmitting one or more instructions to display the broadcast content as an overlay display comprises: transmitting one or more instructions to display the broadcast content as an overlay display with a name associated with each of the one or more players selected by the at least one participant, the non-broadcast information associated with the one or more players, and the at least one fantasy team attribute. 137. (canceled) 138. The method of claim 93, wherein the transmitting one or more instructions to display the broadcast content as an overlay display comprises: transmitting one or more instructions to display at least one fantasy team attribute selected by the at least one participant mapped onto at least one displayed image of at least one player selected by the at least one participant through use of positional information associated with the at least one player. 139.-141. (canceled) 142. The method of claim 93, further comprising: transmitting one or more instructions to display one or more indicators in response to one or events associated with the one or more players. 143. The method of claim 142, wherein the transmitting one or more instructions to display one or more indicators in response to one or events associated with the one or more players comprises: transmitting one or more signals that include the one or more instructions to display the one or more indicators in response to the one or events associated with the one or more players selected by the at least one participant. 144.-147. (canceled) 148. A system comprising: circuitry configured to receive information associated with one or more players selected by at least one participant in a fantasy league for inclusion in a fantasy team associated with the at least participant; circuitry configured to receive information provided by the at least one participant associated with at least one fantasy team attribute of the fantasy team associated with the at least participant; circuitry configured to receive broadcast content in response to a request from the at least one participant; circuitry configured to retrieve non-broadcast information associated with any of the one or more players selected by the at least one participant for inclusion in the fantasy team associated with the at least participant; circuitry configured to transmit one or more instructions to display a descriptor associated with at least one of the one or more players in accordance with their inclusion in the fantasy team associated with the at least one participant; circuitry configured to transmit one or more instructions to display the non-broadcast information associated with at least one of the one or more players in accordance with their inclusion in the fantasy team associated with the at least one participant; circuitry configured to transmit one or more instructions to display the at least one fantasy team attribute; and circuitry configured to transmit one or more instructions to display the broadcast content as an overlay display. 149. The system of claim 148, wherein the circuitry configured to receive information associated with one or more players selected by at least one participant in a fantasy league for inclusion in a fantasy team associated with the at least participant comprises: circuitry configured to receive one or more signals that include the information associated with the one or more players selected by the at least one participant in a fantasy league for inclusion in the fantasy team associated with the at least participant. 150.-152. (canceled) 153. The system of claim 148, wherein the circuitry configured to receive information associated with one or more players selected by at least one participant in a fantasy league for inclusion in a fantasy team associated with the at least participant comprises: circuitry configured to group the one or more players selected by the at least one participant into the at least one fantasy team and linking the fantasy team attribute to the fantasy team. 154. (canceled) 155. The system of claim 148, wherein the circuitry configured to receive information provided by the at least one participant associated with at least one fantasy team attribute of the fantasy team associated with the at least participant comprises: circuitry configured to receive one or more signals that include the information associated with the at least one fantasy team attribute selected by the at least one participant. 156.-158. (canceled) 159. The system of claim 148, wherein the circuitry configured to receive information provided by the at least one participant associated with at least one fantasy team attribute of the fantasy team associated with the at least participant comprises: circuitry configured to receive information associated with at least one participant selected symbol associated with the at least one fantasy team. 160.-162. (canceled) 163. The system of claim 148, wherein the circuitry configured to receive broadcast content in response to a request from the at least one participant comprises: circuitry configured to query one or more listings of broadcast content to determine broadcast content that is associated with at least one of the one or more players that were selected by the at least one participant and then receiving the broadcast content that is associated with the one or more players that were selected by the at least one participant. 164.-165. (canceled) 166. The system of claim 148, wherein the circuitry configured to receive broadcast content in response to a request from the at least one participant comprises: circuitry configured to receive broadcast content that includes information associated with one or more players selected by the at least one participant and then doing optical character recognition analysis to obtain positional information associated with any of the one or more players selected by the at least one participant that are included in the broadcast content. 167.-169. (canceled) 170. The system of claim 148, wherein the circuitry configured to retrieve non-broadcast information associated with any of the one or more players selected by the at least one participant for inclusion in the fantasy team associated with the at least participant comprises: circuitry configured to query one or more networks for non-broadcast information that is associated with at least one of the one or more players that were selected by the at least one participant and then receiving the non-broadcast information that is associated with the at least one of the one or more players that were selected by the at least one participant. 171. (canceled) 172. The system of claim 148, wherein the circuitry configured to retrieve non-broadcast information associated with any of the one or more players selected by the at least one participant for inclusion in the fantasy team associated with the at least participant comprises: circuitry configured to retrieve information associated with one or more events associated with at least one of the one or more players that were selected by the at least one participant. 173. (canceled) 174. The system of claim 148, wherein the circuitry configured to transmit one or more instructions to display a descriptor associated with at least one of the one or more players in accordance with their inclusion in the fantasy team associated with the at least one participant comprises: circuitry configured to transmit one or more signals that include the one or more instructions to display the descriptor associated with the one or more players selected by the at least one participant. 175.-181. (canceled) 182. The system of claim 148, wherein the circuitry configured to transmit one or more instructions to display the non-broadcast information associated with at least one of the one or more players in accordance with their inclusion in the fantasy team associated with the at least one participant comprises: circuitry configured to transmit one or more instructions to display at least one event associated with at least one of the one or more players selected by the at least one participant. 183. The system of claim 148, wherein the circuitry configured to transmit one or more instructions to display the at least one fantasy team attribute comprises: circuitry configured to transmit one or more signals that include the one or more instructions to display the fantasy team attribute selected by the at least one participant. 184.-186. (canceled) 187. The system of claim 148, wherein the circuitry configured to transmit one or more instructions to display the at least one fantasy team attribute comprises: circuitry configured to transmit one or more instructions to display at least one participant selected symbol associated with the at least one fantasy team. 188.-190. (canceled) 191. The system of claim 148, wherein the circuitry configured to transmit one or more instructions to display the broadcast content as an overlay display comprises: circuitry configured to transmit one or more instructions to display the broadcast content as an overlay display with a name associated with each of the one or more players selected by the at least one participant, the non-broadcast information associated with the one or more players, and the at least one fantasy team attribute. 192.-193. (canceled) 194. The system of claim 148, wherein the circuitry configured to transmit one or more instructions to display the broadcast content as an overlay display comprises: circuitry configured to transmit one or more instructions to display at least one fantasy team name selected by the at least one participant mapped onto at least one displayed image of at least one player selected by the at least one participant through use of positional information associated with the at least one player. 195.-196. (canceled) 197. The system of claim 148, further comprising: circuitry configured to transmit one or more instructions to display one or more indicators in response to one or events associated with the one or more players. 198. The system of claim 197, wherein the circuitry configured to transmit one or more instructions to display one or more indicators in response to one or events associated with the one or more players comprises: circuitry configured to transmit one or more signals that include the one or more instructions to display the one or more indicators in response to the one or more events associated with the one or more players selected by the at least one participant. 199.-202. (canceled) 203. A system comprising: a non-transitory signal-bearing medium bearing one or more instructions that, when executed by one or more processing components, direct performance of operations that include at least: receiving information associated with one or more players selected by at least one participant in a fantasy league for inclusion in a fantasy team associated with the at least participant; receiving information provided by the at least one participant associated with at least one fantasy team attribute of the fantasy team associated with the at least participant; receiving broadcast content in response to a request from at least one participant; retrieving non-broadcast information associated with any of the one or more players selected by the at least one participant for inclusion in the fantasy team associated with the at least participant; transmitting one or more instructions to display a descriptor associated with at least one of the one or more players in accordance with their inclusion in the fantasy team associated with the at least one participant; transmitting one or more instructions to display the non-broadcast information associated with at least one of the one or more players in accordance with their inclusion in the fantasy team associated with the at least one participant; transmitting one or more instructions to display the at least one fantasy team attribute; and transmitting one or more instructions to display the broadcast content as an overlay display. 204. The system of claim 203, wherein the non-transitory signal-bearing medium further comprises: one or more instructions that direct performance of an operation that includes at least transmitting one or more instructions to display one or more indicators in response to one or events associated with the one or more players. 205.-454. (canceled)
2,400
7,857
7,857
15,788,918
2,486
The invention relates to a method for recording images with a light microscope, wherein a specimen container with a specimen is arranged on a specimen holder of the light microscope, and wherein illuminating light is guided onto the specimen. The illuminating light can hereby be cut in a cross-section transversely to an optical axis of the light microscope through a wall of the specimen container to a limited cross-sectional region. First and second diaphragm settings are determined and set, for the limited cross-sectional region of the illuminating light defined by the wall of the specimen container, in which the diaphragm covers equal sized portions of the limited cross-sectional region. In addition the invention relates to a light microscope which is adapted in particular to carry out the method.
1. A method for recording images with a light microscope, wherein a specimen container with a specimen is arranged on a specimen holder of the light microscope, wherein illuminating light is guided onto the specimen, wherein a diaphragm for restricting the illuminating light is brought into an optical path of the illuminating light, wherein a first diaphragm setting is carried out, in which the diaphragm covers a first cross-sectional area portion of the illuminating light, wherein a first image of the specimen is recorded with the first diaphragm setting, wherein a second diaphragm setting is carried out, in which the diaphragm covers a second cross-sectional area portion of the illuminating light which is different from the first cross-sectional area portion, wherein a second image of the specimen is recorded with the second diaphragm setting, wherein the first image and the second image are taken into calculation to create a contrast image, and wherein for a limited cross-sectional region of the illuminating light which is defined by a wall of the specimen container, those diaphragm settings are determined and set as a first and a second diaphragm setting, in which the diaphragm covers equal sized portions of the limited cross-sectional region, wherein the illuminating light is restricted to the limited cross-sectional region by the wall of the specimen container, in a cross-section transverse to an optical axis of the light microscope. 2. The method of claim 1, wherein the diaphragm is brought into the optical path between the specimen and image recording means. 3. The method of claim 1, wherein the diaphragm is brought into the optical path between an illuminating light source and the specimen. 4. The method of claim 1, wherein a mid-point of the limited cross-sectional region of the illuminating light is determined, as a straight line of symmetry a straight line extending through the mid-point is determined, and as a first and second diaphragm setting those diaphragm settings are set, in which the area covered by the diaphragm in the first diaphragm setting and the area covered by the diaphragm in the second diaphragm setting lie symmetrical to the straight line of symmetry. 5. The method of claim 4, wherein the diaphragm settings differ in a rotation angle of a diaphragm edge of the diaphragm around a rotation axis, and as a straight line of symmetry a straight line is fixed which cuts the mid-point and the rotation axis. 6. The method of claim 5, wherein a position of the rotation axis is determined in a calibration measurement. 7. The method of claim 6, wherein at least two pupil images are recorded in the calibration measurement, wherein the diaphragm edge is brought into different rotation angles around the rotation axis, the position of the rotation axis is determined from the orientations of the diaphragm edge in the different pupil images. 8. The method of claim 1, wherein as a straight line of symmetry, a connecting straight line from the optical axis or from the rotation axis to a closest lying wall region of the specimen container is determined, wherein the closest lying wall region is that part of the wall of the specimen container which is closest to the optical axis or to the rotation axis, and as first and second diaphragm settings, those settings are applied, in which the area covered by the diaphragm in the first diaphragm position and the area covered by the diaphragm in the second diaphragm position lie symmetrical to the straight line of symmetry. 9. The method of claim 4, wherein an overview image of the specimen is recorded for the purpose of determination of the first and second diaphragm setting in an overview measurement, the position of a wall of the specimen container is determined in the overview image by means of image processing means, and the closest lying wall region to the optical axis is determined from the determined position of the wall; or the mid-point of the limited cross-sectional region is determined with the determined position of the wall. 10. The method of claim 1, wherein for the purpose of determination of the first and second diaphragm settings the diaphragm is brought into the optical path of the illuminating light, the diaphragm is rotated and in different rotation positions of the diaphragm test images of the specimen are recorded, a respective pair of test images, for which the associated rotation positions of the diaphragm are rotated by 180° relative to each other, are set against each other having regard to an evaluation criterion, one of the pairs of test images is selected with the evaluation criterion and the associated two diaphragm settings are set as the first and second diaphragm settings. 11. The method of claim 1, wherein the diaphragm is rotated continuously, a camera sensor of the light microscope is exposed via multiple rotations of the diaphragm for a first image recording, a light pulse as illuminating light is sent for the first image recording whenever the diaphragm is at a first rotation position as a first diaphragm setting, and otherwise no illuminating light is emitted, the camera sensor of the light microscope is exposed via multiple rotations of the diaphragm for a second image recording, a light pulse as illuminating light is sent for the second image recording whenever the diaphragm is at a second rotation position as a second diaphragm setting, and otherwise no illuminating light is emitted, 12. The method of claim 1, wherein the diaphragm has a circle segment form, of which the circle segment opening has a tip which contacts the optical axis of the light microscope, the diaphragm is rotated continuously, as a first diaphragm setting the diaphragm moves over a first rotation region and as a second diaphragm setting the diaphragm moves over a second rotation region. 13. The method of claim 11, wherein a test image is recorded with at least one of: the first and the second diaphragm setting, an image brightness of the recorded test image or the recorded test images is determined, an exposure time of a camera chip of the light microscope is fixed with the determined image brightness so that a desired image brightness is achieved with the first and second diaphragm settings, and the rotation speed of the diaphragm is selected so that the time which the diaphragm requires to move over the first and the second rotation region is respectively equal to the fixed exposure time. 14. A light microscope with a specimen holder for holding a specimen container with a specimen, with optical means for guiding illuminating light onto the specimen, with a diaphragm which can be arranged for restricting the illuminating light in an optical path of the illuminating light, with electronic control means for setting a first diaphragm setting, in which the diaphragm covers a first cross-sectional area portion of the illuminating light and with image recording means for recording a first image of the specimen with the first diaphragm setting, wherein the electronic control means are adapted to set a second diaphragm setting, in which the diaphragm covers a second cross-sectional area portion of the illuminating light which is different from the first cross-sectional area portion, wherein with the image recording means a second image of the specimen can be recorded with the second diaphragm setting, wherein the electronic control means are adapted to take into calculation the first image and the second image to create a contrast image, wherein the electronic control means are adapted, for a limited cross-sectional region of the illuminating light which is defined through a wall of the specimen container, to determine and set as first and second diaphragm settings those diaphragm settings, in which the diaphragm covers equal sized portions of the limited cross-section region, wherein restricting the illuminating light to the limited cross-sectional region in a cross-section transversely to an optical axis of the light microscope can occur through the wall of the specimen container. 15. The light microscope of claim 14, wherein the light microscope is adapted to carry out the method according to claim 1. 16. The light microscope of claim 14, wherein an objective for guiding illuminating light coming from the specimen to the image recording means is provided, and the diaphragm is arranged in a plane conjugated to an aperture plane of the objective. 17. The light microscope of claim 14, wherein the diaphragm is designed as a diaphragm group with a plurality of single diaphragms, and the electronic control means are adapted to respectively bring a different single diaphragm into the optical path for the different diaphragm settings. 18. The light microscope of claim 14, wherein the diaphragm is light-impermeable in the spectral range of the illuminating light and is light-permeable in a different spectral range from this. 19. The light microscope of claim 14, wherein the diaphragm comprises a two-dimensional array of liquid crystal elements which can be switched between transparency and opacity, and the electronic control means are adapted, for the setting of the first and second diaphragm setting, to switch certain liquid crystal elements to opacity. 20. The light microscope of claim 14, wherein positioning means are provided to displace the specimen holder, the electronic control means are adapted to set different positions of the specimen holder for the examination of different regions of the specimen in the specimen container by means of the positioning means, the electronic control means are adapted to determine a first and a second diaphragm setting for each set position of the specimen holder and to produce a contrast image for each set position of the specimen holder.
The invention relates to a method for recording images with a light microscope, wherein a specimen container with a specimen is arranged on a specimen holder of the light microscope, and wherein illuminating light is guided onto the specimen. The illuminating light can hereby be cut in a cross-section transversely to an optical axis of the light microscope through a wall of the specimen container to a limited cross-sectional region. First and second diaphragm settings are determined and set, for the limited cross-sectional region of the illuminating light defined by the wall of the specimen container, in which the diaphragm covers equal sized portions of the limited cross-sectional region. In addition the invention relates to a light microscope which is adapted in particular to carry out the method.1. A method for recording images with a light microscope, wherein a specimen container with a specimen is arranged on a specimen holder of the light microscope, wherein illuminating light is guided onto the specimen, wherein a diaphragm for restricting the illuminating light is brought into an optical path of the illuminating light, wherein a first diaphragm setting is carried out, in which the diaphragm covers a first cross-sectional area portion of the illuminating light, wherein a first image of the specimen is recorded with the first diaphragm setting, wherein a second diaphragm setting is carried out, in which the diaphragm covers a second cross-sectional area portion of the illuminating light which is different from the first cross-sectional area portion, wherein a second image of the specimen is recorded with the second diaphragm setting, wherein the first image and the second image are taken into calculation to create a contrast image, and wherein for a limited cross-sectional region of the illuminating light which is defined by a wall of the specimen container, those diaphragm settings are determined and set as a first and a second diaphragm setting, in which the diaphragm covers equal sized portions of the limited cross-sectional region, wherein the illuminating light is restricted to the limited cross-sectional region by the wall of the specimen container, in a cross-section transverse to an optical axis of the light microscope. 2. The method of claim 1, wherein the diaphragm is brought into the optical path between the specimen and image recording means. 3. The method of claim 1, wherein the diaphragm is brought into the optical path between an illuminating light source and the specimen. 4. The method of claim 1, wherein a mid-point of the limited cross-sectional region of the illuminating light is determined, as a straight line of symmetry a straight line extending through the mid-point is determined, and as a first and second diaphragm setting those diaphragm settings are set, in which the area covered by the diaphragm in the first diaphragm setting and the area covered by the diaphragm in the second diaphragm setting lie symmetrical to the straight line of symmetry. 5. The method of claim 4, wherein the diaphragm settings differ in a rotation angle of a diaphragm edge of the diaphragm around a rotation axis, and as a straight line of symmetry a straight line is fixed which cuts the mid-point and the rotation axis. 6. The method of claim 5, wherein a position of the rotation axis is determined in a calibration measurement. 7. The method of claim 6, wherein at least two pupil images are recorded in the calibration measurement, wherein the diaphragm edge is brought into different rotation angles around the rotation axis, the position of the rotation axis is determined from the orientations of the diaphragm edge in the different pupil images. 8. The method of claim 1, wherein as a straight line of symmetry, a connecting straight line from the optical axis or from the rotation axis to a closest lying wall region of the specimen container is determined, wherein the closest lying wall region is that part of the wall of the specimen container which is closest to the optical axis or to the rotation axis, and as first and second diaphragm settings, those settings are applied, in which the area covered by the diaphragm in the first diaphragm position and the area covered by the diaphragm in the second diaphragm position lie symmetrical to the straight line of symmetry. 9. The method of claim 4, wherein an overview image of the specimen is recorded for the purpose of determination of the first and second diaphragm setting in an overview measurement, the position of a wall of the specimen container is determined in the overview image by means of image processing means, and the closest lying wall region to the optical axis is determined from the determined position of the wall; or the mid-point of the limited cross-sectional region is determined with the determined position of the wall. 10. The method of claim 1, wherein for the purpose of determination of the first and second diaphragm settings the diaphragm is brought into the optical path of the illuminating light, the diaphragm is rotated and in different rotation positions of the diaphragm test images of the specimen are recorded, a respective pair of test images, for which the associated rotation positions of the diaphragm are rotated by 180° relative to each other, are set against each other having regard to an evaluation criterion, one of the pairs of test images is selected with the evaluation criterion and the associated two diaphragm settings are set as the first and second diaphragm settings. 11. The method of claim 1, wherein the diaphragm is rotated continuously, a camera sensor of the light microscope is exposed via multiple rotations of the diaphragm for a first image recording, a light pulse as illuminating light is sent for the first image recording whenever the diaphragm is at a first rotation position as a first diaphragm setting, and otherwise no illuminating light is emitted, the camera sensor of the light microscope is exposed via multiple rotations of the diaphragm for a second image recording, a light pulse as illuminating light is sent for the second image recording whenever the diaphragm is at a second rotation position as a second diaphragm setting, and otherwise no illuminating light is emitted, 12. The method of claim 1, wherein the diaphragm has a circle segment form, of which the circle segment opening has a tip which contacts the optical axis of the light microscope, the diaphragm is rotated continuously, as a first diaphragm setting the diaphragm moves over a first rotation region and as a second diaphragm setting the diaphragm moves over a second rotation region. 13. The method of claim 11, wherein a test image is recorded with at least one of: the first and the second diaphragm setting, an image brightness of the recorded test image or the recorded test images is determined, an exposure time of a camera chip of the light microscope is fixed with the determined image brightness so that a desired image brightness is achieved with the first and second diaphragm settings, and the rotation speed of the diaphragm is selected so that the time which the diaphragm requires to move over the first and the second rotation region is respectively equal to the fixed exposure time. 14. A light microscope with a specimen holder for holding a specimen container with a specimen, with optical means for guiding illuminating light onto the specimen, with a diaphragm which can be arranged for restricting the illuminating light in an optical path of the illuminating light, with electronic control means for setting a first diaphragm setting, in which the diaphragm covers a first cross-sectional area portion of the illuminating light and with image recording means for recording a first image of the specimen with the first diaphragm setting, wherein the electronic control means are adapted to set a second diaphragm setting, in which the diaphragm covers a second cross-sectional area portion of the illuminating light which is different from the first cross-sectional area portion, wherein with the image recording means a second image of the specimen can be recorded with the second diaphragm setting, wherein the electronic control means are adapted to take into calculation the first image and the second image to create a contrast image, wherein the electronic control means are adapted, for a limited cross-sectional region of the illuminating light which is defined through a wall of the specimen container, to determine and set as first and second diaphragm settings those diaphragm settings, in which the diaphragm covers equal sized portions of the limited cross-section region, wherein restricting the illuminating light to the limited cross-sectional region in a cross-section transversely to an optical axis of the light microscope can occur through the wall of the specimen container. 15. The light microscope of claim 14, wherein the light microscope is adapted to carry out the method according to claim 1. 16. The light microscope of claim 14, wherein an objective for guiding illuminating light coming from the specimen to the image recording means is provided, and the diaphragm is arranged in a plane conjugated to an aperture plane of the objective. 17. The light microscope of claim 14, wherein the diaphragm is designed as a diaphragm group with a plurality of single diaphragms, and the electronic control means are adapted to respectively bring a different single diaphragm into the optical path for the different diaphragm settings. 18. The light microscope of claim 14, wherein the diaphragm is light-impermeable in the spectral range of the illuminating light and is light-permeable in a different spectral range from this. 19. The light microscope of claim 14, wherein the diaphragm comprises a two-dimensional array of liquid crystal elements which can be switched between transparency and opacity, and the electronic control means are adapted, for the setting of the first and second diaphragm setting, to switch certain liquid crystal elements to opacity. 20. The light microscope of claim 14, wherein positioning means are provided to displace the specimen holder, the electronic control means are adapted to set different positions of the specimen holder for the examination of different regions of the specimen in the specimen container by means of the positioning means, the electronic control means are adapted to determine a first and a second diaphragm setting for each set position of the specimen holder and to produce a contrast image for each set position of the specimen holder.
2,400
7,858
7,858
14,946,579
2,455
Systems, components, devices, and methods for privately editing shared files in a collaborative space are provided. A non-limiting example includes a server computing device for allowing a user to privately edited shared files in a collaborative space. The server computing device includes an interface engine configured to generate a user interface. The user interface includes a listing of a plurality of shared files accessible in the collaborative space and an edit privately control to privately edit an identified shared file of the plurality of shared files. When the edit privately control is actuated, the server computing device generates a personal copy of the identified shared file and updates metadata associated with the identified shared file to indicate that the personal copy has been generated.
1. A server computing device for allowing a user to privately edit shared files in a collaborative space, comprising: an interface engine configured to generate a user interface comprising: a listing of a plurality of shared files accessible in the collaborative space; and an edit privately control to privately edit an identified shared file of the plurality of shared files; wherein when the edit privately control is actuated, the server computing device generates a personal copy of the identified shared file and updates metadata associated with the identified shared file to indicate that the personal copy has been generated. 2. The server computing device of claim 1, wherein the listing of shared files comprises a plurality of file-identification controls operative to identify a shared file from the plurality of shared files. 3. The server computing device of claim 2, wherein upon actuation of one of the plurality of file identification controls, the edit privately control is displayed. 4. The server computing device of claim 1, wherein when the edit privately control is actuated, a personal storage location for the user is identified and the personal copy of the identified shared file is generated in the personal storage location. 5. The server computing device of claim 4, wherein the personal storage location is provided by a network-based storage server. 6. The server computing device of claim 1, wherein when the server computing device updates the metadata associated with the identified shared file, the server computing device adds a record associated with the identified shared file comprising the identity of the user and a timestamp comprising the date and time that the personal copy was generated. 7. The server computing device of claim 1, wherein the user interface further comprises an access file control. 8. The server computing device of claim 7, wherein upon actuation of the access file control, the server computing device determines whether personal copies of the identified shared file have been generated. 9. The server computing device of claim 8, wherein when determined that personal copies of the identified shared file have been generated, presenting information related to the personal copies to the user. 10. The server computing device of claim 9, wherein presenting information related to the personal copies to the user comprises transmitting the information related to the personal copies to a user agent associated with the user. 11. The server computing device of claim 10, wherein the information comprises an identity of a user who generated the personal copy and a last modified date for the personal copy. 12. The server computing device of claim 1, wherein the listing includes an indicator associated with a shared file of the plurality of shared files to indicate that a personal copy of the shared file has been made. 13. A method of managing private editing of a shared file, the method comprising: generating a user interface screen comprising a listing of a plurality of shared files accessible in a collaborative space; receiving a request from a user to privately edit an identified shared file from the plurality of shared files; generating a personal copy of the identified shared file; and updating metadata associated with the identified shared file to indicate that the personal copy has been generated. 14. The method of claim 13, further comprising transmitting the user interface screen to a user agent running on a user computing device, wherein the user interface screen is configured to be displayed on the user computing device. 15. The method of claim 14, wherein the user interface screen comprises a webpage and is configured to be displayed by a browser running on the user computing device. 16. The method of claim 14, wherein receiving a request from the user comprises receiving over a network the request from the user agent. 17. The method of claim 13, wherein the user computing device is a smart phone. 18. The method of claim 13, further comprising identifying a personal storage space associated with the user and wherein the personal copy of the identified shared file is generated in the identified personal storage space. 19. A server computing device for allowing a user to privately edit shared files in a collaborative space, comprising: an interface engine configured to generate a user interface comprising: a listing of a plurality of shared files accessible in the collaborative space comprising a plurality of file-identification controls operative to identify a shared file from the plurality of shared files; and an edit privately control to privately edit an identified shared file of the plurality of shared files configured to be displayed upon actuation of one of the plurality of file identification controls; and a personal copy engine configured to when the edit privately control is actuated: identify a personal storage location provided by a network-based storage server associated with the user; generate a personal copy of the identified shared file in the identified personal storage location; and update metadata associated with the identified shared file to store the identity of the user and a timestamp comprising the date and time that the personal copy was generated. 20. The server computing device of claim 19, the user interface further comprising a publish control to publish a personal copy of a shared file to the collaborative space.
Systems, components, devices, and methods for privately editing shared files in a collaborative space are provided. A non-limiting example includes a server computing device for allowing a user to privately edited shared files in a collaborative space. The server computing device includes an interface engine configured to generate a user interface. The user interface includes a listing of a plurality of shared files accessible in the collaborative space and an edit privately control to privately edit an identified shared file of the plurality of shared files. When the edit privately control is actuated, the server computing device generates a personal copy of the identified shared file and updates metadata associated with the identified shared file to indicate that the personal copy has been generated.1. A server computing device for allowing a user to privately edit shared files in a collaborative space, comprising: an interface engine configured to generate a user interface comprising: a listing of a plurality of shared files accessible in the collaborative space; and an edit privately control to privately edit an identified shared file of the plurality of shared files; wherein when the edit privately control is actuated, the server computing device generates a personal copy of the identified shared file and updates metadata associated with the identified shared file to indicate that the personal copy has been generated. 2. The server computing device of claim 1, wherein the listing of shared files comprises a plurality of file-identification controls operative to identify a shared file from the plurality of shared files. 3. The server computing device of claim 2, wherein upon actuation of one of the plurality of file identification controls, the edit privately control is displayed. 4. The server computing device of claim 1, wherein when the edit privately control is actuated, a personal storage location for the user is identified and the personal copy of the identified shared file is generated in the personal storage location. 5. The server computing device of claim 4, wherein the personal storage location is provided by a network-based storage server. 6. The server computing device of claim 1, wherein when the server computing device updates the metadata associated with the identified shared file, the server computing device adds a record associated with the identified shared file comprising the identity of the user and a timestamp comprising the date and time that the personal copy was generated. 7. The server computing device of claim 1, wherein the user interface further comprises an access file control. 8. The server computing device of claim 7, wherein upon actuation of the access file control, the server computing device determines whether personal copies of the identified shared file have been generated. 9. The server computing device of claim 8, wherein when determined that personal copies of the identified shared file have been generated, presenting information related to the personal copies to the user. 10. The server computing device of claim 9, wherein presenting information related to the personal copies to the user comprises transmitting the information related to the personal copies to a user agent associated with the user. 11. The server computing device of claim 10, wherein the information comprises an identity of a user who generated the personal copy and a last modified date for the personal copy. 12. The server computing device of claim 1, wherein the listing includes an indicator associated with a shared file of the plurality of shared files to indicate that a personal copy of the shared file has been made. 13. A method of managing private editing of a shared file, the method comprising: generating a user interface screen comprising a listing of a plurality of shared files accessible in a collaborative space; receiving a request from a user to privately edit an identified shared file from the plurality of shared files; generating a personal copy of the identified shared file; and updating metadata associated with the identified shared file to indicate that the personal copy has been generated. 14. The method of claim 13, further comprising transmitting the user interface screen to a user agent running on a user computing device, wherein the user interface screen is configured to be displayed on the user computing device. 15. The method of claim 14, wherein the user interface screen comprises a webpage and is configured to be displayed by a browser running on the user computing device. 16. The method of claim 14, wherein receiving a request from the user comprises receiving over a network the request from the user agent. 17. The method of claim 13, wherein the user computing device is a smart phone. 18. The method of claim 13, further comprising identifying a personal storage space associated with the user and wherein the personal copy of the identified shared file is generated in the identified personal storage space. 19. A server computing device for allowing a user to privately edit shared files in a collaborative space, comprising: an interface engine configured to generate a user interface comprising: a listing of a plurality of shared files accessible in the collaborative space comprising a plurality of file-identification controls operative to identify a shared file from the plurality of shared files; and an edit privately control to privately edit an identified shared file of the plurality of shared files configured to be displayed upon actuation of one of the plurality of file identification controls; and a personal copy engine configured to when the edit privately control is actuated: identify a personal storage location provided by a network-based storage server associated with the user; generate a personal copy of the identified shared file in the identified personal storage location; and update metadata associated with the identified shared file to store the identity of the user and a timestamp comprising the date and time that the personal copy was generated. 20. The server computing device of claim 19, the user interface further comprising a publish control to publish a personal copy of a shared file to the collaborative space.
2,400
7,859
7,859
14,370,182
2,415
A method of adapting the output power of a radio transmitting entity within a cage having at least one aperture. The method includes the steps of providing at least one sensor to sense the condition of the at least one aperture and providing a controller to adjust the output power of the radio transmitting entity in accordance with the sensed condition of the at least one aperture.
1. A method of adapting the output power of a radio transmitting entity within a cage having at least one aperture, said method comprising the steps of: providing at least one sensor operable to sense a condition of the at least one aperture of the cage; and providing a controller operable to adjust the output power of the radio transmitting entity in accordance with the sensed condition of the at least one aperture of the cage. 2. The method according to claim 1, wherein the condition of the at least one aperture is an open-position of the at least one aperture. 3. The method according to claim 1, wherein the condition of the at least one aperture is an attenuation character of the at least one aperture with regard to radio transmission. 4. The method according to claim 2, wherein the output power is reduced if the at least one aperture opens and the output power is increased if the at least one aperture closes. 5. The method according to claim 1, wherein the at least one aperture is a moveable window or a door. 6. The method according to claim 1, wherein the cage is a cabin of a vehicle or a room in a building. 7. The method according to claim 1, wherein the controller adjusts the output power of the radio transmitting entity as a linear function of the condition of the aperture. 8. The method according to claim 1, wherein the controller adjust the output power of the radio transmitting entity as a non-linear function of the condition of the aperture. 9. The method according to claim 1, wherein the controller adjust the output power of the radio transmitting entity in accordance with a mapping table which maps conditions of the aperture to a value of the output power. 10. The method according to claim 1, wherein the radio transmitting entity is a relay node or a repeater. 11. A radio transmitting entity, comprising: an antenna, adapted to transmit a radio signal; a data receiving entity, adapted to receive condition information of at least one aperature from at least one sensor; and a controller, adapted to adjust the output power for the antenna in accordance with the received condition information. 12. The radio transmitting entity according to claim 11, wherein the controller is adapted to adjust the output power for the antenna based on whether the at least one aperture is in an open-position and/or based on an attenuation characteristic of the at least one aperture with regard to radio transmission. 13. The radio transmitting entity of claim 11, further comprising a vehicle comprising: a pick-up antenna for receiving a radio signal; and at least one sensor which is adapted to monitor the condition of the at least one aperture. 14. The vehicle according to claim 13, wherein the controller is adapted to adjust the output power for the antenna based on whether the at least one aperture is in an open-position and/or based on an attenuation characteristic of the at least one aperture with regard to radio transmission.
A method of adapting the output power of a radio transmitting entity within a cage having at least one aperture. The method includes the steps of providing at least one sensor to sense the condition of the at least one aperture and providing a controller to adjust the output power of the radio transmitting entity in accordance with the sensed condition of the at least one aperture.1. A method of adapting the output power of a radio transmitting entity within a cage having at least one aperture, said method comprising the steps of: providing at least one sensor operable to sense a condition of the at least one aperture of the cage; and providing a controller operable to adjust the output power of the radio transmitting entity in accordance with the sensed condition of the at least one aperture of the cage. 2. The method according to claim 1, wherein the condition of the at least one aperture is an open-position of the at least one aperture. 3. The method according to claim 1, wherein the condition of the at least one aperture is an attenuation character of the at least one aperture with regard to radio transmission. 4. The method according to claim 2, wherein the output power is reduced if the at least one aperture opens and the output power is increased if the at least one aperture closes. 5. The method according to claim 1, wherein the at least one aperture is a moveable window or a door. 6. The method according to claim 1, wherein the cage is a cabin of a vehicle or a room in a building. 7. The method according to claim 1, wherein the controller adjusts the output power of the radio transmitting entity as a linear function of the condition of the aperture. 8. The method according to claim 1, wherein the controller adjust the output power of the radio transmitting entity as a non-linear function of the condition of the aperture. 9. The method according to claim 1, wherein the controller adjust the output power of the radio transmitting entity in accordance with a mapping table which maps conditions of the aperture to a value of the output power. 10. The method according to claim 1, wherein the radio transmitting entity is a relay node or a repeater. 11. A radio transmitting entity, comprising: an antenna, adapted to transmit a radio signal; a data receiving entity, adapted to receive condition information of at least one aperature from at least one sensor; and a controller, adapted to adjust the output power for the antenna in accordance with the received condition information. 12. The radio transmitting entity according to claim 11, wherein the controller is adapted to adjust the output power for the antenna based on whether the at least one aperture is in an open-position and/or based on an attenuation characteristic of the at least one aperture with regard to radio transmission. 13. The radio transmitting entity of claim 11, further comprising a vehicle comprising: a pick-up antenna for receiving a radio signal; and at least one sensor which is adapted to monitor the condition of the at least one aperture. 14. The vehicle according to claim 13, wherein the controller is adapted to adjust the output power for the antenna based on whether the at least one aperture is in an open-position and/or based on an attenuation characteristic of the at least one aperture with regard to radio transmission.
2,400
7,860
7,860
14,242,931
2,436
There is provided a method and system for digital rights enforcement. The method includes: determining digital content requested by a user via a selected user device; determining digital rights associated with the digital content; reviewing the digital rights to determine access rights relating to authorized devices for the user; determining whether the user has exhausted the access rights; and if the access rights are exhausted: determining at least one use factor for each of the user's previously authorized user devices; determining a previously authorized user device on which to revoke access to the digital content based on the at least one use factor; and revoking access rights to the previously authorized user associated device; otherwise downloading the digital content on the selected user device. The system includes a content review module and a revoker module.
1. A method for digital rights enforcement over multiple devices, the method comprising: determining digital content requested by a user via a selected user device; determining digital rights associated with the digital content; determining access rights relating to authorized devices for the user based at least in part on the digital rights associated with the digital content; determining whether the user has exhausted the access rights; and if the access rights are exhausted: determining at least one use factor for each of the user's previously authorized user devices; determining a previously authorized user device on which to revoke access to the digital content based on the at least one use factor; and revoking access rights to the previously authorized user associated device; otherwise downloading the digital content on the selected user device. 2. The method of claim 1, wherein the revoking of the access rights to the previously authorized user device occurs automatically. 3. The method of claim 1, wherein the user is requested to approve the selection of which previously authorized user associated device to revoke prior to the revoking of the access rights. 4. The method of claim 1, wherein one or more of the at least one use factor is selected from the group of: time the digital content was downloaded on the user device; last access of the digital content on the user device; time spent using the digital content on the user device; and frequency of accessing the digital content on the user device. 5. The method of claim 1, further comprising: determining a number of concurrent downloads requested by the user after determining the digital content requested by the user; and if the number of concurrent downloads is above a predetermined threshold, waiting for a preset condition to be satisfied before proceeding. 6. The method of claim 5, wherein the preset condition is the expiry of a predetermined time interval. 7. The method of claim 1, further comprising: encrypting the digital content prior to downloading the digital content on the selected user device. 8. The method of claim 7, wherein the encrypting of the digital content occurs contemporaneous to the request for the digital content. 9. The method of claim 1, further comprising: displaying a catalogue of available digital content to the user prior to determining the digital content requested by the user. 10. The method of claim 9, wherein the displaying of the catalogue comprises: determining user data related to the user; and determining catalogue content from a learning management system based on the user data. 11. The method of claim 1, wherein the revoking of the access rights comprises deleting the digital content from the previously authorized user device. 12. The method of claim 1, wherein the revoking of the access rights comprises deleting a decryption key from the previously authorized user device. 13. The method of claim 1, wherein the revoking access rights comprises: monitoring for connection of the previously authorized user device to a network; and sending a signal revoking the access rights of the previously authorized user device to the previously authorized user device to revoke the digital content. 14. The method of claim 1, further comprising: determining a user identification; and determining access rights relating to authorized devices for the user based at least in part on the user identification. 15. The method of claim 14, wherein the user identification identifies the user as either a student or instructor and the determining of the access rights relating to authorized devices further comprises determining a course related to the digital content. 16. A system for digital rights enforcement over multiple devices, the system comprising: a content review module configured to: determine digital content requested by a user via a selected user device; and determine digital rights associated with the digital content; and an revoker module configured to: determine access rights relating to authorized devices for the user based at least in part on the digital rights associated with the digital content; determine whether the user has exhausted the access rights; and if the access rights are exhausted: determine at least one use factor for each of the user's previously authorized user devices; determine which previously authorized user device on which to revoke access to the digital content based on the at least one use factor; and send a revoke message to revoke the access rights to the previously authorized user device; otherwise allow the download of the digital content on the selected user device. 17. The system of claim 16 further comprising an enforcement module configured to revoke the access rights on the previously authorized user device. 18. The system of claim 16 wherein the revoker module is further configure to provide a prompt to the user wherein the user is requested to approve the selection of which previously authorized user device to revoke prior to the revoking of the access rights. 19. The system of claim 16 wherein one or more of the at least one use factor is selected from the group of: time the digital content was downloaded on the user device; last access of the digital content on the user device; time spent using the digital content on the user device; and frequency of accessing the digital content on the user device. 20. The system of claim 16 wherein the content review module is further configured to: determine a number of concurrent downloads requested by the user after determining the digital content requested by the user; and if the number of concurrent downloads is above a predetermined threshold, wait a predetermined time interval before proceeding. 21. The system of claim 16 wherein the content review module is further configured to: encrypt the digital content prior to downloading the digital content on the selected user device. 22. The system of claim 16 further comprising: a display module configured to display a catalogue of available digital content to the user. 23. The system of claim 17 wherein the enforcement module is configured to revoke the access rights by deleting the digital content from the previously authorized user device. 24. The system of 17 wherein the enforcement module is configured to revoke the access rights by deleting a decryption key from the previously authorized user device.
There is provided a method and system for digital rights enforcement. The method includes: determining digital content requested by a user via a selected user device; determining digital rights associated with the digital content; reviewing the digital rights to determine access rights relating to authorized devices for the user; determining whether the user has exhausted the access rights; and if the access rights are exhausted: determining at least one use factor for each of the user's previously authorized user devices; determining a previously authorized user device on which to revoke access to the digital content based on the at least one use factor; and revoking access rights to the previously authorized user associated device; otherwise downloading the digital content on the selected user device. The system includes a content review module and a revoker module.1. A method for digital rights enforcement over multiple devices, the method comprising: determining digital content requested by a user via a selected user device; determining digital rights associated with the digital content; determining access rights relating to authorized devices for the user based at least in part on the digital rights associated with the digital content; determining whether the user has exhausted the access rights; and if the access rights are exhausted: determining at least one use factor for each of the user's previously authorized user devices; determining a previously authorized user device on which to revoke access to the digital content based on the at least one use factor; and revoking access rights to the previously authorized user associated device; otherwise downloading the digital content on the selected user device. 2. The method of claim 1, wherein the revoking of the access rights to the previously authorized user device occurs automatically. 3. The method of claim 1, wherein the user is requested to approve the selection of which previously authorized user associated device to revoke prior to the revoking of the access rights. 4. The method of claim 1, wherein one or more of the at least one use factor is selected from the group of: time the digital content was downloaded on the user device; last access of the digital content on the user device; time spent using the digital content on the user device; and frequency of accessing the digital content on the user device. 5. The method of claim 1, further comprising: determining a number of concurrent downloads requested by the user after determining the digital content requested by the user; and if the number of concurrent downloads is above a predetermined threshold, waiting for a preset condition to be satisfied before proceeding. 6. The method of claim 5, wherein the preset condition is the expiry of a predetermined time interval. 7. The method of claim 1, further comprising: encrypting the digital content prior to downloading the digital content on the selected user device. 8. The method of claim 7, wherein the encrypting of the digital content occurs contemporaneous to the request for the digital content. 9. The method of claim 1, further comprising: displaying a catalogue of available digital content to the user prior to determining the digital content requested by the user. 10. The method of claim 9, wherein the displaying of the catalogue comprises: determining user data related to the user; and determining catalogue content from a learning management system based on the user data. 11. The method of claim 1, wherein the revoking of the access rights comprises deleting the digital content from the previously authorized user device. 12. The method of claim 1, wherein the revoking of the access rights comprises deleting a decryption key from the previously authorized user device. 13. The method of claim 1, wherein the revoking access rights comprises: monitoring for connection of the previously authorized user device to a network; and sending a signal revoking the access rights of the previously authorized user device to the previously authorized user device to revoke the digital content. 14. The method of claim 1, further comprising: determining a user identification; and determining access rights relating to authorized devices for the user based at least in part on the user identification. 15. The method of claim 14, wherein the user identification identifies the user as either a student or instructor and the determining of the access rights relating to authorized devices further comprises determining a course related to the digital content. 16. A system for digital rights enforcement over multiple devices, the system comprising: a content review module configured to: determine digital content requested by a user via a selected user device; and determine digital rights associated with the digital content; and an revoker module configured to: determine access rights relating to authorized devices for the user based at least in part on the digital rights associated with the digital content; determine whether the user has exhausted the access rights; and if the access rights are exhausted: determine at least one use factor for each of the user's previously authorized user devices; determine which previously authorized user device on which to revoke access to the digital content based on the at least one use factor; and send a revoke message to revoke the access rights to the previously authorized user device; otherwise allow the download of the digital content on the selected user device. 17. The system of claim 16 further comprising an enforcement module configured to revoke the access rights on the previously authorized user device. 18. The system of claim 16 wherein the revoker module is further configure to provide a prompt to the user wherein the user is requested to approve the selection of which previously authorized user device to revoke prior to the revoking of the access rights. 19. The system of claim 16 wherein one or more of the at least one use factor is selected from the group of: time the digital content was downloaded on the user device; last access of the digital content on the user device; time spent using the digital content on the user device; and frequency of accessing the digital content on the user device. 20. The system of claim 16 wherein the content review module is further configured to: determine a number of concurrent downloads requested by the user after determining the digital content requested by the user; and if the number of concurrent downloads is above a predetermined threshold, wait a predetermined time interval before proceeding. 21. The system of claim 16 wherein the content review module is further configured to: encrypt the digital content prior to downloading the digital content on the selected user device. 22. The system of claim 16 further comprising: a display module configured to display a catalogue of available digital content to the user. 23. The system of claim 17 wherein the enforcement module is configured to revoke the access rights by deleting the digital content from the previously authorized user device. 24. The system of 17 wherein the enforcement module is configured to revoke the access rights by deleting a decryption key from the previously authorized user device.
2,400
7,861
7,861
15,196,492
2,433
A novel method for managing firewall configuration of a software defined data center is provided. Such a firewall configuration is divided into multiple sections that each contains a set of firewall rules. Each tenant of the software defined data center has a corresponding set of sections in the firewall configuration. The method allows each tenant to independently access and update/manage its own corresponding set of sections. Multiple tenants or users are allowed to make changes to the firewall configuration simultaneously.
1. A method for managing firewall configuration of a software defined data center that provide computing and networking resources to a plurality of tenants, the method comprising: storing a firewall configuration comprising a plurality of sections, each section comprising a set of firewall rules, each section assigned a different priority key, wherein the plurality of sections are ordered according to the assigned priority keys of the individual sections; receiving a plurality of concurrent requests from different tenants, each request for inserting a new section to the firewall configuration at a specified ordered position relative to other sections; for each new section being inserted, assigning a priority number that reflects the specified ordered position of the new section; and re-labeling a set of sections from a first set of priority numbers to a second, different set of priority numbers in order to make priority numbers available for assignment to subsequently inserted sections. 2. The method of claim 1, wherein assigning a new priority number to the new section comprises determining whether there is an available priority number that can correctly reflect the specified ordered position of the new section. 3. The method of claim 2 further comprising, when there is no available priority number that can correctly reflect the specified ordered position of the new section, performing said relabeling in order to make available a priority number that can correctly reflect the specified ordered position of the new section. 4. The method of claim 3, wherein the second set of priority numbers leaves more available priority numbers around the priority number assigned to the newly inserted section than around any other assigned priority numbers in the first set of priority numbers. 5. The method of claim 1, wherein assigning a priority number to the new section according to the specified ordered position comprises identifying an available priority number in the middle of a gap in priority numbers between a priority number already assigned to a section immediately before the newly inserted section in ordered position and a priority number assigned to a section immediately after the newly inserted section in ordered position. 6. The method of claim 1 further comprising detecting a pattern in a sequence of section insertions, wherein assigning an available priority number to the newly inserted section comprises selecting an available priority number according to the detected pattern. 7. The method of claim 1, where said re-labeling comprises identifying a range of possible priority numbers that is sufficiently sparse, wherein both the first set of priority numbers and the second set of priority numbers fall within the identified range. 8. The method of claim 7, wherein a first subsequent insertion of a section that require a priority number within the identified range is delayed until said re-labeling is complete, wherein a second subsequent insertion of a section that require a priority number outside of the identified range is assigned a priority number before the completion of said re-labeling. 9. The method of claim 8, wherein the first subsequent insertion is for a section of a first tenant and the second subsequent insertion is for a section of a second, different tenant. 10. The method of claim 7, wherein the range for re-labeling is identified by using a binary search tree, wherein each leaf-node of the binary search tree corresponds to a possible priority number, wherein each non-leaf node corresponds to a range of possible priority numbers and is associated with an indication of sparseness of the corresponding range. 11. A method for managing firewall configuration of a software defined data center that provide computing and networking resources to a plurality of tenants, the method comprising: storing a firewall configuration comprising a plurality of sections, wherein a particular section comprises a plurality of firewall rules, each rule assigned a different priority key, wherein the plurality of rules are ordered according to the assigned priority numbers of the individual rules; receiving a plurality of concurrent requests from different tenants, wherein a particular request is for inserting a new rule to a particular section of the firewall configuration at a specified ordered position relative to other rules in the particular sections; for each new rule being inserted into the particular section, assigning a priority number that reflects the specified ordered position of the new rule; and re-labeling a set of rules from a first set of priority numbers to a second, different set of priority numbers in order to make priority numbers available for assignment to rules subsequently inserted into the section. 12. The method of claim 11, wherein assigning a new priority number to the new rule comprises determining whether there is an available priority number that can correctly reflect the specified ordered position of the new rule. 13. The method of claim 12 further comprising, when there is no available priority number that can correctly reflect the specified ordered position of the newly inserted rule, performing said relabeling in order to make available a priority number that can correctly reflect the specified ordered position of the new rule. 14. The method of claim 13, wherein the second set of priority numbers leaves more available priority numbers around the priority number assigned to the newly inserted rule than around any other assigned priority numbers in the first set of priority numbers. 15. The method of claim 11, wherein assigning a priority number to the newly inserted rule according to the specified ordered position comprises identifying an available priority number in the middle of a gap in priority numbers between a priority number already assigned to a rule immediately before the newly inserted section in ordered position and a priority number already assigned to a rule immediately after the newly inserted rule in ordered position. 16. The method of claim 11 further comprising detecting a pattern in a sequence of rule insertions, wherein assigning an available priority number to the newly inserted rule comprises selecting an available priority number according to the detected pattern. 17. The method of claim 11, where said re-labeling comprises identifying a range of possible priority numbers that is sufficiently sparse, wherein both the first set of priority numbers and the second set of priority numbers fall within the identified range. 18. The method of claim 17, wherein a first subsequent insertion of a rule that require a priority number within the identified range is delayed until said re-labeling is complete, wherein a second subsequent insertion of a rule that require a priority number outside of the identified range is assigned a priority number before the completion of said re-labeling. 19. The method of claim 17, wherein the range for re-labeling is identified by using a binary search tree, wherein each leaf-node of the binary search tree corresponds to a possible priority number for a rule in the particular section, wherein each non-leaf node corresponds to a range of possible priority numbers and is associated with an indication of sparseness of the corresponding range.
A novel method for managing firewall configuration of a software defined data center is provided. Such a firewall configuration is divided into multiple sections that each contains a set of firewall rules. Each tenant of the software defined data center has a corresponding set of sections in the firewall configuration. The method allows each tenant to independently access and update/manage its own corresponding set of sections. Multiple tenants or users are allowed to make changes to the firewall configuration simultaneously.1. A method for managing firewall configuration of a software defined data center that provide computing and networking resources to a plurality of tenants, the method comprising: storing a firewall configuration comprising a plurality of sections, each section comprising a set of firewall rules, each section assigned a different priority key, wherein the plurality of sections are ordered according to the assigned priority keys of the individual sections; receiving a plurality of concurrent requests from different tenants, each request for inserting a new section to the firewall configuration at a specified ordered position relative to other sections; for each new section being inserted, assigning a priority number that reflects the specified ordered position of the new section; and re-labeling a set of sections from a first set of priority numbers to a second, different set of priority numbers in order to make priority numbers available for assignment to subsequently inserted sections. 2. The method of claim 1, wherein assigning a new priority number to the new section comprises determining whether there is an available priority number that can correctly reflect the specified ordered position of the new section. 3. The method of claim 2 further comprising, when there is no available priority number that can correctly reflect the specified ordered position of the new section, performing said relabeling in order to make available a priority number that can correctly reflect the specified ordered position of the new section. 4. The method of claim 3, wherein the second set of priority numbers leaves more available priority numbers around the priority number assigned to the newly inserted section than around any other assigned priority numbers in the first set of priority numbers. 5. The method of claim 1, wherein assigning a priority number to the new section according to the specified ordered position comprises identifying an available priority number in the middle of a gap in priority numbers between a priority number already assigned to a section immediately before the newly inserted section in ordered position and a priority number assigned to a section immediately after the newly inserted section in ordered position. 6. The method of claim 1 further comprising detecting a pattern in a sequence of section insertions, wherein assigning an available priority number to the newly inserted section comprises selecting an available priority number according to the detected pattern. 7. The method of claim 1, where said re-labeling comprises identifying a range of possible priority numbers that is sufficiently sparse, wherein both the first set of priority numbers and the second set of priority numbers fall within the identified range. 8. The method of claim 7, wherein a first subsequent insertion of a section that require a priority number within the identified range is delayed until said re-labeling is complete, wherein a second subsequent insertion of a section that require a priority number outside of the identified range is assigned a priority number before the completion of said re-labeling. 9. The method of claim 8, wherein the first subsequent insertion is for a section of a first tenant and the second subsequent insertion is for a section of a second, different tenant. 10. The method of claim 7, wherein the range for re-labeling is identified by using a binary search tree, wherein each leaf-node of the binary search tree corresponds to a possible priority number, wherein each non-leaf node corresponds to a range of possible priority numbers and is associated with an indication of sparseness of the corresponding range. 11. A method for managing firewall configuration of a software defined data center that provide computing and networking resources to a plurality of tenants, the method comprising: storing a firewall configuration comprising a plurality of sections, wherein a particular section comprises a plurality of firewall rules, each rule assigned a different priority key, wherein the plurality of rules are ordered according to the assigned priority numbers of the individual rules; receiving a plurality of concurrent requests from different tenants, wherein a particular request is for inserting a new rule to a particular section of the firewall configuration at a specified ordered position relative to other rules in the particular sections; for each new rule being inserted into the particular section, assigning a priority number that reflects the specified ordered position of the new rule; and re-labeling a set of rules from a first set of priority numbers to a second, different set of priority numbers in order to make priority numbers available for assignment to rules subsequently inserted into the section. 12. The method of claim 11, wherein assigning a new priority number to the new rule comprises determining whether there is an available priority number that can correctly reflect the specified ordered position of the new rule. 13. The method of claim 12 further comprising, when there is no available priority number that can correctly reflect the specified ordered position of the newly inserted rule, performing said relabeling in order to make available a priority number that can correctly reflect the specified ordered position of the new rule. 14. The method of claim 13, wherein the second set of priority numbers leaves more available priority numbers around the priority number assigned to the newly inserted rule than around any other assigned priority numbers in the first set of priority numbers. 15. The method of claim 11, wherein assigning a priority number to the newly inserted rule according to the specified ordered position comprises identifying an available priority number in the middle of a gap in priority numbers between a priority number already assigned to a rule immediately before the newly inserted section in ordered position and a priority number already assigned to a rule immediately after the newly inserted rule in ordered position. 16. The method of claim 11 further comprising detecting a pattern in a sequence of rule insertions, wherein assigning an available priority number to the newly inserted rule comprises selecting an available priority number according to the detected pattern. 17. The method of claim 11, where said re-labeling comprises identifying a range of possible priority numbers that is sufficiently sparse, wherein both the first set of priority numbers and the second set of priority numbers fall within the identified range. 18. The method of claim 17, wherein a first subsequent insertion of a rule that require a priority number within the identified range is delayed until said re-labeling is complete, wherein a second subsequent insertion of a rule that require a priority number outside of the identified range is assigned a priority number before the completion of said re-labeling. 19. The method of claim 17, wherein the range for re-labeling is identified by using a binary search tree, wherein each leaf-node of the binary search tree corresponds to a possible priority number for a rule in the particular section, wherein each non-leaf node corresponds to a range of possible priority numbers and is associated with an indication of sparseness of the corresponding range.
2,400
7,862
7,862
14,533,749
2,487
Methods and systems for simulating performance of a head-up display (HUD) are provided. An example method comprises receiving images of symbology for display by a head-up display, generating distortions to the images as perceived from observer locations through the head-up display, and the distortions are based on design characteristics of an optical component of the head-up display with respect to a model of a projection of the images. The method also includes applying the distortions to the images to generate modified images, and the modified images represent a view of the head-up display corresponding to respective observer locations. The method further includes providing, for stereoscopic display, the modified images overlaying onto a background image. An example system comprises a storage device, a head tracking device to determine the observer location, and a projector to project the modified images onto a display corresponding to the determined observer location.
1. A method comprising: receiving an image of symbology for display by a head-up display; generating, by one or more processors, distortions to the image as perceived from a plurality of observer locations through the head-up display, wherein the distortions are based on design characteristics of an optical component of the head-up display with respect to a model of a projection of the image; applying, by the one or more processors, the distortions to the image to generate an array of modified images, wherein the modified images represent a view of the head-up display corresponding to respective observer locations; and providing, for stereoscopic display, the modified images overlaying onto a background image. 2. The method of claim 1, wherein generating distortions to the image as perceived from the plurality of observer locations through the head-up display comprises: receiving ray trace data of a model of the projection of images by the optical component of the head-up display; and determining ray angle errors over the plurality of observer locations, wherein the ray angle errors are based on a comparison of ideal ray angles of a projection of images with the ray trace data of the model of the projection of images using the design characteristics of the optical component. 3. The method of claim 2, wherein applying the distortions to the image to generate an array of modified images comprises: applying optical effects to the images of symbology including optical effects selected from a group of field of view clipping, luminance modification, and shifting of image content. 4. The method of claim 1, wherein applying the distortions to the image to generate an array of modified images comprises: producing a resulting modified image from each point of view in an eye motion box of the head-up display, wherein the eye motion box includes the plurality of observer locations and indicates an area within which an observer resides to view projected images by the head-up display. 5. The method of claim 1, wherein providing, for stereoscopic display, a plurality of images by overlaying the modified images onto a background image comprises: providing a stereoscopic display of the plurality of images so as to present each eye with a respective modified image. 6. The method of claim 1, wherein providing, for stereoscopic display, a plurality of images by overlaying the modified images onto a background image comprises: associating a first modified image with a second modified image as a pair of images, wherein the first modified image corresponds to an image to present to a right eye and the second modified image corresponds to an image to present to a left eye; and indexing the pair of images with a horizontal and vertical location in an eye motion box of the head-up display, wherein the eye motion box includes the plurality of observer locations and indicates an area within which an observer resides to view projected images by the head-up display; and storing the indexed pair of images for presentation in real-time on a display. 7. The method of claim 1, further comprising: displaying the modified images as a video including a sequence of frames selected to represent the view of the head-up display corresponding to respective observer locations. 8. The method of claim 1, further comprising: receiving information indicating motion of a head of an observer; determining a pair of images, from the modified images, corresponding to right eye and left eye points of view based on the information indicating motion of the head of the observer; and providing the pair of images for display 9. The method of claim 1, further comprising: receiving information indicating a location of an observer selected from the plurality of observer locations; determining a pair of images, from the modified images, corresponding to right eye and left eye points of view and indexed to the location of the observer; and providing the pair of images for display so as to simulate the distortions to the images as perceived from the location of the observer through the head-up display due to the design characteristics of the optical component of the head-up display. 10. The method of claim 1, further comprising: determining one or more given locations of an observer; wherein generating the distortions to the image as perceived from a plurality of observer locations through the head-up display comprises calculating an array of distortion mappings corresponding to possible distortions to images as perceived from the plurality of observer locations through the head-up display; and wherein applying the distortions to the image to generate the array of modified images comprises applying, in real-time, the distortions to the image based on the distortion mappings for the one or more given locations of the observer. 11. A non-transitory computer readable medium having stored thereon instructions that, upon executed by a computing device, cause the computing device to perform functions comprising: receiving an image of symbology for display by a head-up display; generating distortions to the image as perceived from a plurality of observer locations through the head-up display, wherein the distortions are based on design characteristics of an optical component of the head-up display with respect to a model of a projection of the images; applying the distortions to the image to generate an array of modified images, wherein the modified images represent a view of the head-up display corresponding to respective observer locations; and providing, for stereoscopic display, the modified images overlaying onto a background image. 12. The non-transitory computer readable medium of claim 11, wherein generating distortions to the image as perceived from the plurality of observer locations through the head-up display comprises: receiving ray trace data of the model of the projection of images by the optical component of the head-up display; and determining ray angle errors over the plurality of observer locations, wherein the ray angle errors are based on a comparison of ideal ray angles of a projection of images with the ray trace data of the model of the projection of images using the design characteristics of the optical component. 13. The non-transitory computer readable medium of claim 11, wherein applying the distortions to the images to generate an array of modified images comprises: producing a resulting modified image from each point of view in an eye motion box of the head-up display, wherein the eye motion box includes the plurality of observer locations and indicates an area within which an observer resides to view projected images by the head-up display. 14. The non-transitory computer readable medium of claim 11, wherein providing, for stereoscopic display, a plurality of images by overlaying the modified images onto a background image comprises: providing a stereoscopic display of the plurality of images so as to present each eye with a respective modified image. 15. The non-transitory computer readable medium of claim 11, wherein providing, for stereoscopic display, a plurality of images by overlaying the modified images onto a background image comprises: associating a first modified image with a second modified image as a pair of images, wherein the first modified image corresponds to an image to present to a right eye and the second modified image corresponds to an image to present to a left eye; and indexing the pair of images with a horizontal and vertical location in an eye motion box of the head-up display, wherein the eye motion box includes the plurality of observer locations and indicates an area within which an observer resides to view projected images by the head-up display; and storing the indexed pair of images for presentation in real-time on a display. 16. A system comprising: a storage device including a plurality of modified images of symbology for display by a head-up display, and a respective modified image corresponds to an image of symbology as perceived from an observer location through the head-up display distorted by ray angle errors resulting from design characteristics of an optical component of the head-up display; a head tracking device to determine the observer location; a projector capable of displaying stereoscopic images; and a real-time image playback engine communicatively coupled to the storage device, to the head tracking device, and to the projector, and the real-time image playback engine configured to receive the determined observer location and to send to the projector one or more of the plurality of modified images corresponding to the determined observer location. 17. The system of claim 16, wherein the storage device associates a first modified image with a second modified image as a pair of images, wherein the first modified image corresponds to an image to present to a right eye and the second modified image corresponds to an image to present to a left eye, and wherein the storage device indexes the pair of images with a horizontal and vertical location in an eye motion box of the head-up display, wherein the eye motion box includes the plurality of observer locations and indicates an area within which an observer resides to view projected images by the head-up display. 18. The system of claim 16, wherein the projector projects the modified images as a video including a sequence of frames selected to represent the view of the head-up display corresponding to respective observer locations. 19. The system of claim 16, wherein the projector receives from the storage device a pair of images, from the plurality of modified images, corresponding to right eye and left eye points of view based on the observer location, and projects the pair of images onto a display stereoscopically. 20. The system of claim 16, wherein the projector receives from the storage device a pair of images, from the plurality of the modified images, corresponding to right eye and left eye points of view and indexed to the observer location, and wherein the projector projects the pair of images onto a display so as to simulate distortions to the images as perceived from the observer location through the head-up display due to the design characteristics of the optical component of the head-up display.
Methods and systems for simulating performance of a head-up display (HUD) are provided. An example method comprises receiving images of symbology for display by a head-up display, generating distortions to the images as perceived from observer locations through the head-up display, and the distortions are based on design characteristics of an optical component of the head-up display with respect to a model of a projection of the images. The method also includes applying the distortions to the images to generate modified images, and the modified images represent a view of the head-up display corresponding to respective observer locations. The method further includes providing, for stereoscopic display, the modified images overlaying onto a background image. An example system comprises a storage device, a head tracking device to determine the observer location, and a projector to project the modified images onto a display corresponding to the determined observer location.1. A method comprising: receiving an image of symbology for display by a head-up display; generating, by one or more processors, distortions to the image as perceived from a plurality of observer locations through the head-up display, wherein the distortions are based on design characteristics of an optical component of the head-up display with respect to a model of a projection of the image; applying, by the one or more processors, the distortions to the image to generate an array of modified images, wherein the modified images represent a view of the head-up display corresponding to respective observer locations; and providing, for stereoscopic display, the modified images overlaying onto a background image. 2. The method of claim 1, wherein generating distortions to the image as perceived from the plurality of observer locations through the head-up display comprises: receiving ray trace data of a model of the projection of images by the optical component of the head-up display; and determining ray angle errors over the plurality of observer locations, wherein the ray angle errors are based on a comparison of ideal ray angles of a projection of images with the ray trace data of the model of the projection of images using the design characteristics of the optical component. 3. The method of claim 2, wherein applying the distortions to the image to generate an array of modified images comprises: applying optical effects to the images of symbology including optical effects selected from a group of field of view clipping, luminance modification, and shifting of image content. 4. The method of claim 1, wherein applying the distortions to the image to generate an array of modified images comprises: producing a resulting modified image from each point of view in an eye motion box of the head-up display, wherein the eye motion box includes the plurality of observer locations and indicates an area within which an observer resides to view projected images by the head-up display. 5. The method of claim 1, wherein providing, for stereoscopic display, a plurality of images by overlaying the modified images onto a background image comprises: providing a stereoscopic display of the plurality of images so as to present each eye with a respective modified image. 6. The method of claim 1, wherein providing, for stereoscopic display, a plurality of images by overlaying the modified images onto a background image comprises: associating a first modified image with a second modified image as a pair of images, wherein the first modified image corresponds to an image to present to a right eye and the second modified image corresponds to an image to present to a left eye; and indexing the pair of images with a horizontal and vertical location in an eye motion box of the head-up display, wherein the eye motion box includes the plurality of observer locations and indicates an area within which an observer resides to view projected images by the head-up display; and storing the indexed pair of images for presentation in real-time on a display. 7. The method of claim 1, further comprising: displaying the modified images as a video including a sequence of frames selected to represent the view of the head-up display corresponding to respective observer locations. 8. The method of claim 1, further comprising: receiving information indicating motion of a head of an observer; determining a pair of images, from the modified images, corresponding to right eye and left eye points of view based on the information indicating motion of the head of the observer; and providing the pair of images for display 9. The method of claim 1, further comprising: receiving information indicating a location of an observer selected from the plurality of observer locations; determining a pair of images, from the modified images, corresponding to right eye and left eye points of view and indexed to the location of the observer; and providing the pair of images for display so as to simulate the distortions to the images as perceived from the location of the observer through the head-up display due to the design characteristics of the optical component of the head-up display. 10. The method of claim 1, further comprising: determining one or more given locations of an observer; wherein generating the distortions to the image as perceived from a plurality of observer locations through the head-up display comprises calculating an array of distortion mappings corresponding to possible distortions to images as perceived from the plurality of observer locations through the head-up display; and wherein applying the distortions to the image to generate the array of modified images comprises applying, in real-time, the distortions to the image based on the distortion mappings for the one or more given locations of the observer. 11. A non-transitory computer readable medium having stored thereon instructions that, upon executed by a computing device, cause the computing device to perform functions comprising: receiving an image of symbology for display by a head-up display; generating distortions to the image as perceived from a plurality of observer locations through the head-up display, wherein the distortions are based on design characteristics of an optical component of the head-up display with respect to a model of a projection of the images; applying the distortions to the image to generate an array of modified images, wherein the modified images represent a view of the head-up display corresponding to respective observer locations; and providing, for stereoscopic display, the modified images overlaying onto a background image. 12. The non-transitory computer readable medium of claim 11, wherein generating distortions to the image as perceived from the plurality of observer locations through the head-up display comprises: receiving ray trace data of the model of the projection of images by the optical component of the head-up display; and determining ray angle errors over the plurality of observer locations, wherein the ray angle errors are based on a comparison of ideal ray angles of a projection of images with the ray trace data of the model of the projection of images using the design characteristics of the optical component. 13. The non-transitory computer readable medium of claim 11, wherein applying the distortions to the images to generate an array of modified images comprises: producing a resulting modified image from each point of view in an eye motion box of the head-up display, wherein the eye motion box includes the plurality of observer locations and indicates an area within which an observer resides to view projected images by the head-up display. 14. The non-transitory computer readable medium of claim 11, wherein providing, for stereoscopic display, a plurality of images by overlaying the modified images onto a background image comprises: providing a stereoscopic display of the plurality of images so as to present each eye with a respective modified image. 15. The non-transitory computer readable medium of claim 11, wherein providing, for stereoscopic display, a plurality of images by overlaying the modified images onto a background image comprises: associating a first modified image with a second modified image as a pair of images, wherein the first modified image corresponds to an image to present to a right eye and the second modified image corresponds to an image to present to a left eye; and indexing the pair of images with a horizontal and vertical location in an eye motion box of the head-up display, wherein the eye motion box includes the plurality of observer locations and indicates an area within which an observer resides to view projected images by the head-up display; and storing the indexed pair of images for presentation in real-time on a display. 16. A system comprising: a storage device including a plurality of modified images of symbology for display by a head-up display, and a respective modified image corresponds to an image of symbology as perceived from an observer location through the head-up display distorted by ray angle errors resulting from design characteristics of an optical component of the head-up display; a head tracking device to determine the observer location; a projector capable of displaying stereoscopic images; and a real-time image playback engine communicatively coupled to the storage device, to the head tracking device, and to the projector, and the real-time image playback engine configured to receive the determined observer location and to send to the projector one or more of the plurality of modified images corresponding to the determined observer location. 17. The system of claim 16, wherein the storage device associates a first modified image with a second modified image as a pair of images, wherein the first modified image corresponds to an image to present to a right eye and the second modified image corresponds to an image to present to a left eye, and wherein the storage device indexes the pair of images with a horizontal and vertical location in an eye motion box of the head-up display, wherein the eye motion box includes the plurality of observer locations and indicates an area within which an observer resides to view projected images by the head-up display. 18. The system of claim 16, wherein the projector projects the modified images as a video including a sequence of frames selected to represent the view of the head-up display corresponding to respective observer locations. 19. The system of claim 16, wherein the projector receives from the storage device a pair of images, from the plurality of modified images, corresponding to right eye and left eye points of view based on the observer location, and projects the pair of images onto a display stereoscopically. 20. The system of claim 16, wherein the projector receives from the storage device a pair of images, from the plurality of the modified images, corresponding to right eye and left eye points of view and indexed to the observer location, and wherein the projector projects the pair of images onto a display so as to simulate distortions to the images as perceived from the observer location through the head-up display due to the design characteristics of the optical component of the head-up display.
2,400
7,863
7,863
13,455,047
2,459
A social graph may be modeled as a collection of claims. Each claim is associated with an author, an audience, and an assertion about a fact. Probabilistic information may be collected from various sources for a claim, enabling a social networking system to evaluate a truthfulness of the assertion made in the claim. User-declared profile information may be evaluated as claims. A user, entity, or application may make claims about any assertions made in the social networking system. Reputation scores may be determined for users based on evaluations of their historical assertions. Claims may be evaluated for truthfulness using a probabilistic prediction model using heuristics analysis, regression analysis, and machine learning methods. A claims-based profile of users may be provided to viewers based on the contexts in which the claims were made. Viewers may view claims made about users, such as the users' biographical information, contact information, expertise, and interests.
1. A method comprising: receiving information about a plurality of claims, each claim originating from an author of a social networking system and each claim comprising an assertion and a context in which the assertion is made; and for a viewing agent, receiving from the viewing agent a request for information about a particular assertion; collecting a plurality of claims that contain the particular assertion; determining a subjective judgment about the particular assertion from a perspective of the viewing agent, the determining based on the collected plurality of claims containing the particular assertion and the contexts in which the particular assertion were made of the collected plurality of claims; and determining the requested information about the particular assertion based on the determined subjective judgment about the particular assertion; and providing the determined information about the particular assertion for display to the viewing agent. 2. The method of claim 1, wherein receiving information about a plurality of claims, each claim originating from an author of a social networking system further comprises: receiving information about the claim through a user interface provided on the social networking system for authoring claims. 3. The method of claim 1, wherein receiving information about a plurality of claims, each claim originating from an author of a social networking system further comprises: receiving information about the claim from an application operating on the social networking system, where the author comprises an entity represented by the application. 4. The method of claim 1, wherein receiving information about a plurality of claims, each claim originating from an author of a social networking system further comprises: receiving information about the claim from an external website outside the social networking system, where the information about the claim comprises a custom graph action performed on a custom graph object by the author on the external website. 5. The method of claim 1, wherein a context in which the assertion is made further comprises one or more users of the social networking system that have access to the assertion on the social networking system. 6. The method of claim 5, wherein the one or more users of the social networking system are connected to the author on the social networking system. 7. The method of claim 5, wherein the one or more users of the social networking system are unconnected to the author on the social networking system. 8. The method of claim 1, wherein a context in which the assertion is made further comprises a publicly available context. 9. The method of claim 1, wherein a context in which the assertion is made further comprises a privacy control setting associated with the author where the privacy control setting includes one or more designated users connected to the author. 10. The method of claim 1, wherein a statement made on the social networking system further comprises: receiving an indication of the author tagging a subject user in a content post on the social networking system. 11. The method of claim 1, wherein a statement made on the social networking system further comprises: receiving an indication of the author declaring a biographical statement on the social networking system. 12. The method of claim 1, wherein a statement made on the social networking system further comprises: receiving an indication of the author confirming a biographical statement made by another user on the social networking system. 13. The method of claim 1, further comprising: for the viewing agent, selecting a best claim from the plurality of claims about the particular statement based on the subjective judgment of the particular statement from the perspective of the viewing agent; and providing the selected best claim about the particular statement for display to the viewing agent responsive to the request for information about the particular statement. 14. The method of claim 1, wherein, for the viewing agent, determining the subjective judgment about the particular statement further comprises: determining a plurality of truthfulness scores for the collected claims about the particular fact; determining a weighted average of the plurality of truthfulness scores based on the plurality of social connections between the viewing agent and the authors of the collected claims; and determining the subjective judgment about the particular fact for the viewing agent based on comparing the weighted average of the plurality of truthfulness scores to a predetermined truthfulness threshold for the viewing agent. 15. A method comprising: receiving information about an assertion included in a first claim made by a first author of a social networking system, the first claim comprising the assertion, an audience, and a claim type, where the received information includes a second claim made by a second author, the second claim having the assertion of the first claim; retrieving a model stored in the social networking system based on the claim type of the claim; retrieving information about the viewing agent; determining a truth coefficient for the first claim for a viewing agent based on the retrieved model using the received information about the assertion and the retrieved information about the viewing agent, where determining the truth coefficient for the first claim further comprises determining a probability that the assertion is true based on the retrieved information about the viewing agent and the retrieved model; and storing the truth coefficient for the first claim in the social networking system associated with the first author for the viewing agent. 16. The method of claim 15, wherein receiving information about a first claim made by a first author of a social networking system further comprises: receiving information about the first claim from an application operating on the social networking system, where the claim type comprises the application making the claim. 17. The method of claim 15, wherein receiving information about a first claim made by a first author of a social networking system further comprises: receiving information about the first claim from an external website outside the social networking system, where the claim type further comprises a custom graph action performed on a custom graph object by the author on the external website. 18. The method of claim 15, wherein receiving information about a first claim made by a first author of a social networking system further comprises: receiving information about the first claim through a user interface provided on the social networking system for authoring claims; and receiving a selection of a claim type by the first author through the user interface for the claim. 19. The method of claim 15, wherein the assertion further comprises a statement about a user of the social networking system. 20. The method of claim 15, wherein the assertion further comprises a statement about an entity of the social networking system. 21. The method of claim 15, wherein receiving information about a first claim made by a first author of a social networking system further comprises retrieving information about the first author from a profile associated with the first author in the social networking system. 22. The method of claim 15, wherein receiving information about a first claim made by a first author of a social networking system further comprises retrieving information about the first author from a profile associated with the viewing agent in the social networking system. 23. The method of claim 15, wherein an audience further comprises one or more agents of the social networking system selected in a privacy control setting of the author. 24. The method of claim 15, wherein an audience further comprises a selection of one or more users of the social networking system by the author. 25. The method of claim 15, wherein a factor in the retrieved model for the claim based on the claim type further comprises a reputation score of the author. 26. The method of claim 15, wherein receiving information about a claim made by an author of a social networking system further comprises retrieving a plurality of affinity scores of the viewing agent of the claim from a profile of the viewing agent and wherein a factor in the retrieved model for the claim based on the claim type further comprises at least one affinity score of the plurality of affinity scores of the viewing agent of the claim for the author. 27. A method comprising: receiving a first claim about an attribute associated with a subject agent of a social networking system, the first claim having a first author and a first audience; receiving a second claim about the attribute associated with the subject agent of the social networking system, the second claim having a second author and a second audience; receiving a request for the attribute from a viewing agent; retrieving social information about the viewing agent; determining a plurality of truth coefficients for the first claim and the second claim based on the retrieved social information about the viewing agent; and providing the attribute associated with the subject agent based on the plurality of truth coefficients for display to the viewing agent responsive to the request. 28. The method of claim 27, where the viewing agent is connected to the first author and where the viewing agent is not connected to the second author in the social networking system and where the retrieved social information is associated with the first author. 29. The method of claim 27, where the viewing agent is connected to the first author and the second author in the social networking system and where the retrieved social information is associated with the first author and the second author. 30. The method of claim 27, where the viewing agent is not connected to the first author, where the viewing agent is connected to the second author in the social networking system, and where the retrieved social information is associated with the second author. 31. The method of claim 27, where the viewing agent is included in the first audience and the second audience. 32. The method of claim 27, where the viewing agent is included in the first audience and where the viewing agent is not included in the second audience. 33. The method of claim 27, where the viewing agent is not included in the first audience and where the viewing agent is included in the second audience. 34. The method of claim 27, where the viewing agent is not included in the first audience and where the viewing agent is not included in the second audience. 35. The method of claim 27, further comprising: storing the plurality of truth coefficients for the first claim and the second claim in a claim object for the attribute associated with the viewing agent in the social networking system. 36. The method of claim 27, wherein determining a plurality of truth coefficients for the first claim and the second claim based on the retrieved social information about the viewing agent further comprises: retrieving a scoring model for determining the plurality of truth coefficients for the first claim and the second claim, where the scoring model comprises a plurality of weighted factors; determining a first truth coefficient for the first claim using the retrieved scoring model based on the received social information about the viewing agent; and determining a second truth coefficient for the second claim using the retrieved scoring model based on the received social information about the viewing agent. 37. The method of claim 36, wherein the received social information about the viewing agent further comprises an indication that a first affinity score for the first author that exceeds a second affinity score for the second author, the method further comprising: determining an affinity factor in the scoring model for determining the first truth coefficient and the second truth coefficient based on the first affinity score for the first author exceeding the second affinity score for the second author. 38. The method of claim 27, wherein providing the attribute associated with the subject agent based on the plurality of truth coefficients for display to the viewing agent responsive to the request further comprises: determining an affinity factor in the scoring model for determining the first truth coefficient and the second truth coefficient based on the first affinity score for the first author exceeding the second affinity score for the second author; 39. The method of claim 27, further comprising: receiving feedback regarding about the provided attribute associated with the subject agent from the viewing agent; generating a plurality of agent reputation scores for the first author and the second author based on the received feedback; and storing the plurality of agent reputation scores in a plurality of profile objects for the first author and the second author. 40. The method of claim 39, wherein determining a plurality of truth coefficients for the first claim and the second claim based on the retrieved social information about the viewing agent further comprises: retrieving the plurality of agent reputation scores for the first author and the second author; and discounting the plurality of truth coefficients based on the retrieved plurality of agent reputation scores for the first author and the second author.
A social graph may be modeled as a collection of claims. Each claim is associated with an author, an audience, and an assertion about a fact. Probabilistic information may be collected from various sources for a claim, enabling a social networking system to evaluate a truthfulness of the assertion made in the claim. User-declared profile information may be evaluated as claims. A user, entity, or application may make claims about any assertions made in the social networking system. Reputation scores may be determined for users based on evaluations of their historical assertions. Claims may be evaluated for truthfulness using a probabilistic prediction model using heuristics analysis, regression analysis, and machine learning methods. A claims-based profile of users may be provided to viewers based on the contexts in which the claims were made. Viewers may view claims made about users, such as the users' biographical information, contact information, expertise, and interests.1. A method comprising: receiving information about a plurality of claims, each claim originating from an author of a social networking system and each claim comprising an assertion and a context in which the assertion is made; and for a viewing agent, receiving from the viewing agent a request for information about a particular assertion; collecting a plurality of claims that contain the particular assertion; determining a subjective judgment about the particular assertion from a perspective of the viewing agent, the determining based on the collected plurality of claims containing the particular assertion and the contexts in which the particular assertion were made of the collected plurality of claims; and determining the requested information about the particular assertion based on the determined subjective judgment about the particular assertion; and providing the determined information about the particular assertion for display to the viewing agent. 2. The method of claim 1, wherein receiving information about a plurality of claims, each claim originating from an author of a social networking system further comprises: receiving information about the claim through a user interface provided on the social networking system for authoring claims. 3. The method of claim 1, wherein receiving information about a plurality of claims, each claim originating from an author of a social networking system further comprises: receiving information about the claim from an application operating on the social networking system, where the author comprises an entity represented by the application. 4. The method of claim 1, wherein receiving information about a plurality of claims, each claim originating from an author of a social networking system further comprises: receiving information about the claim from an external website outside the social networking system, where the information about the claim comprises a custom graph action performed on a custom graph object by the author on the external website. 5. The method of claim 1, wherein a context in which the assertion is made further comprises one or more users of the social networking system that have access to the assertion on the social networking system. 6. The method of claim 5, wherein the one or more users of the social networking system are connected to the author on the social networking system. 7. The method of claim 5, wherein the one or more users of the social networking system are unconnected to the author on the social networking system. 8. The method of claim 1, wherein a context in which the assertion is made further comprises a publicly available context. 9. The method of claim 1, wherein a context in which the assertion is made further comprises a privacy control setting associated with the author where the privacy control setting includes one or more designated users connected to the author. 10. The method of claim 1, wherein a statement made on the social networking system further comprises: receiving an indication of the author tagging a subject user in a content post on the social networking system. 11. The method of claim 1, wherein a statement made on the social networking system further comprises: receiving an indication of the author declaring a biographical statement on the social networking system. 12. The method of claim 1, wherein a statement made on the social networking system further comprises: receiving an indication of the author confirming a biographical statement made by another user on the social networking system. 13. The method of claim 1, further comprising: for the viewing agent, selecting a best claim from the plurality of claims about the particular statement based on the subjective judgment of the particular statement from the perspective of the viewing agent; and providing the selected best claim about the particular statement for display to the viewing agent responsive to the request for information about the particular statement. 14. The method of claim 1, wherein, for the viewing agent, determining the subjective judgment about the particular statement further comprises: determining a plurality of truthfulness scores for the collected claims about the particular fact; determining a weighted average of the plurality of truthfulness scores based on the plurality of social connections between the viewing agent and the authors of the collected claims; and determining the subjective judgment about the particular fact for the viewing agent based on comparing the weighted average of the plurality of truthfulness scores to a predetermined truthfulness threshold for the viewing agent. 15. A method comprising: receiving information about an assertion included in a first claim made by a first author of a social networking system, the first claim comprising the assertion, an audience, and a claim type, where the received information includes a second claim made by a second author, the second claim having the assertion of the first claim; retrieving a model stored in the social networking system based on the claim type of the claim; retrieving information about the viewing agent; determining a truth coefficient for the first claim for a viewing agent based on the retrieved model using the received information about the assertion and the retrieved information about the viewing agent, where determining the truth coefficient for the first claim further comprises determining a probability that the assertion is true based on the retrieved information about the viewing agent and the retrieved model; and storing the truth coefficient for the first claim in the social networking system associated with the first author for the viewing agent. 16. The method of claim 15, wherein receiving information about a first claim made by a first author of a social networking system further comprises: receiving information about the first claim from an application operating on the social networking system, where the claim type comprises the application making the claim. 17. The method of claim 15, wherein receiving information about a first claim made by a first author of a social networking system further comprises: receiving information about the first claim from an external website outside the social networking system, where the claim type further comprises a custom graph action performed on a custom graph object by the author on the external website. 18. The method of claim 15, wherein receiving information about a first claim made by a first author of a social networking system further comprises: receiving information about the first claim through a user interface provided on the social networking system for authoring claims; and receiving a selection of a claim type by the first author through the user interface for the claim. 19. The method of claim 15, wherein the assertion further comprises a statement about a user of the social networking system. 20. The method of claim 15, wherein the assertion further comprises a statement about an entity of the social networking system. 21. The method of claim 15, wherein receiving information about a first claim made by a first author of a social networking system further comprises retrieving information about the first author from a profile associated with the first author in the social networking system. 22. The method of claim 15, wherein receiving information about a first claim made by a first author of a social networking system further comprises retrieving information about the first author from a profile associated with the viewing agent in the social networking system. 23. The method of claim 15, wherein an audience further comprises one or more agents of the social networking system selected in a privacy control setting of the author. 24. The method of claim 15, wherein an audience further comprises a selection of one or more users of the social networking system by the author. 25. The method of claim 15, wherein a factor in the retrieved model for the claim based on the claim type further comprises a reputation score of the author. 26. The method of claim 15, wherein receiving information about a claim made by an author of a social networking system further comprises retrieving a plurality of affinity scores of the viewing agent of the claim from a profile of the viewing agent and wherein a factor in the retrieved model for the claim based on the claim type further comprises at least one affinity score of the plurality of affinity scores of the viewing agent of the claim for the author. 27. A method comprising: receiving a first claim about an attribute associated with a subject agent of a social networking system, the first claim having a first author and a first audience; receiving a second claim about the attribute associated with the subject agent of the social networking system, the second claim having a second author and a second audience; receiving a request for the attribute from a viewing agent; retrieving social information about the viewing agent; determining a plurality of truth coefficients for the first claim and the second claim based on the retrieved social information about the viewing agent; and providing the attribute associated with the subject agent based on the plurality of truth coefficients for display to the viewing agent responsive to the request. 28. The method of claim 27, where the viewing agent is connected to the first author and where the viewing agent is not connected to the second author in the social networking system and where the retrieved social information is associated with the first author. 29. The method of claim 27, where the viewing agent is connected to the first author and the second author in the social networking system and where the retrieved social information is associated with the first author and the second author. 30. The method of claim 27, where the viewing agent is not connected to the first author, where the viewing agent is connected to the second author in the social networking system, and where the retrieved social information is associated with the second author. 31. The method of claim 27, where the viewing agent is included in the first audience and the second audience. 32. The method of claim 27, where the viewing agent is included in the first audience and where the viewing agent is not included in the second audience. 33. The method of claim 27, where the viewing agent is not included in the first audience and where the viewing agent is included in the second audience. 34. The method of claim 27, where the viewing agent is not included in the first audience and where the viewing agent is not included in the second audience. 35. The method of claim 27, further comprising: storing the plurality of truth coefficients for the first claim and the second claim in a claim object for the attribute associated with the viewing agent in the social networking system. 36. The method of claim 27, wherein determining a plurality of truth coefficients for the first claim and the second claim based on the retrieved social information about the viewing agent further comprises: retrieving a scoring model for determining the plurality of truth coefficients for the first claim and the second claim, where the scoring model comprises a plurality of weighted factors; determining a first truth coefficient for the first claim using the retrieved scoring model based on the received social information about the viewing agent; and determining a second truth coefficient for the second claim using the retrieved scoring model based on the received social information about the viewing agent. 37. The method of claim 36, wherein the received social information about the viewing agent further comprises an indication that a first affinity score for the first author that exceeds a second affinity score for the second author, the method further comprising: determining an affinity factor in the scoring model for determining the first truth coefficient and the second truth coefficient based on the first affinity score for the first author exceeding the second affinity score for the second author. 38. The method of claim 27, wherein providing the attribute associated with the subject agent based on the plurality of truth coefficients for display to the viewing agent responsive to the request further comprises: determining an affinity factor in the scoring model for determining the first truth coefficient and the second truth coefficient based on the first affinity score for the first author exceeding the second affinity score for the second author; 39. The method of claim 27, further comprising: receiving feedback regarding about the provided attribute associated with the subject agent from the viewing agent; generating a plurality of agent reputation scores for the first author and the second author based on the received feedback; and storing the plurality of agent reputation scores in a plurality of profile objects for the first author and the second author. 40. The method of claim 39, wherein determining a plurality of truth coefficients for the first claim and the second claim based on the retrieved social information about the viewing agent further comprises: retrieving the plurality of agent reputation scores for the first author and the second author; and discounting the plurality of truth coefficients based on the retrieved plurality of agent reputation scores for the first author and the second author.
2,400
7,864
7,864
15,143,314
2,487
An apparatus includes a camera, a dark field illumination source, and a fiber inspection housing including a fiber connector input situated to receive an optical fiber connector so that an optical fiber output end of the optical fiber connector is removably insertable into an interior region of the fiber inspection housing and securable at a predetermined location in the interior region, a camera input situated to receive and secure the camera so that the camera is in optical communication with the interior region and the optical fiber output end, and a dark field illumination source input situated to receive the dark field illumination source so that light emitted from the dark field illumination source is received by the optical fiber output end at a dark field illumination angle and is scattered by contamination or defects associated with the optical fiber output end so as to be detectable by the camera.
1. An apparatus, comprising: a camera; a dark field illumination source; and a fiber inspection housing including a fiber connector input situated to receive an optical fiber connector so that an optical fiber output end of the optical fiber connector is removably insertable into an interior region of the fiber inspection housing and securable at a predetermined location in the interior region, a camera input situated to receive and secure the camera so that the camera is in optical communication with the interior region and the optical fiber output end, and a dark field illumination source input situated to receive the dark field illumination source so that light emitted from the dark field illumination source is received by the optical fiber output end at a dark field illumination angle and is scattered by contamination or defects associated with the optical fiber output end so as to be detectable by the camera. 2. The apparatus of claim 1, further comprising the optical fiber connector inserted into and secured in the interior region of the fiber inspection housing so that the optical fiber output end is situated to receive light from the dark field illumination source. 3. The apparatus of claim 1, wherein the dark field illumination angle is greater than or equal to 30 degrees and less than or equal to 90 degrees between an optical axis of the optical fiber output end and a dark field illumination source axis. 4. The apparatus of claim 1, further comprising a bright field illumination source coupled to the fiber inspection housing and situated to illuminate the optical fiber output end so that contamination or defects associated with the optical fiber output end are detectable by the camera. 5. The apparatus of claim 4, wherein the bright field illumination source is spaced apart from the camera on the opposite side of an optical axis of the fiber connector input. 6. The apparatus of claim 4, wherein the bright field illumination source is adjacent to or adjoining the camera so that bright field illumination is directed parallel or coaxial with an optical axis of the camera. 7. The apparatus of claim 1, wherein the fiber connector input is situated to receive and secure the optical fiber output end at the predetermined location so that the optical fiber output end is rotatable about an optical fiber axis. 8. The apparatus of claim 1, wherein the fiber inspection housing includes a cleaning access port situated to allow cleaning of the optical fiber output end situated at the predetermined location in the interior region. 9. The apparatus of claim 1, further comprising a baffle situated to block at least a portion of the light emitted by the dark field illumination source that propagates at greater than the dark field illumination angle or that propagates to surfaces other than the optical fiber output end. 10. The apparatus of claim 1, further comprising a diffuser situated to diffuse light from the bright field illumination source so as to improve a camera image detail. 11. The apparatus of claim 1, wherein the fiber inspection housing is made of a plastic or other non-conductive material so as to inhibit an interlock trigger associated with contact between one or more surfaces of the optical fiber connector and the fiber inspection housing. 12. The apparatus of claim 1, wherein the fiber connector input includes a metal sleeve insert having a recessed portion so as to provide a gap between the metal sleeve and an interlock contact of the optical fiber connector. 13. The apparatus of claim 1, wherein the camera is part of a mobile device, and the camera input is situated to receive the mobile device so that the mobile device camera is removably insertable into the camera input so as to detect defects on the optical fiber output end. 14. The apparatus of claim 1, wherein the fiber inspection housing is portable so that an image of the optical fiber output end with the camera is obtainable without requiring the mounting of the fiber inspection housing to a surface. 15. An optical fiber inspection method, comprising: receiving in a fiber inspection housing an optical fiber connector having an optical fiber axis so that an output fiber end is situated at a predetermined location in an interior region of the fiber inspection housing; bright field illuminating through the interior region of the fiber inspection housing at least one surface of the output fiber end and obtaining a first image of the at least one surface with a camera optically coupled to the output fiber end; and dark field illuminating through the interior region the at least one surface of the output fiber end and obtaining a second image of the at least one surface with the camera. 16. The optical fiber inspection method of claim 15, further comprising: comparing one or both of the first image and second image to one or more baseline images of the output fiber end so as to determine a change in contamination or damage associated with the output fiber end. 17. The optical fiber inspection method of claim 15, further comprising: securing the optical fiber connector in the fiber inspection housing against axial and lateral translation with respect to the optical fiber axis; and rotating the optical fiber connector. 18. The optical fiber inspection method of claim 15, wherein the dark field illuminating includes directing illumination light at an angle of incidence of greater than or equal to 60 degrees with respect to the optical fiber axis into the interior region so as to illuminate the at least one surface. 19. The optical fiber inspection method of claim 15, further comprising: diffusing the directed dark field illumination light with a diffuser and blocking a portion of the diffused light with a baffle so as to reduce the amount of dark field light directed to the output fiber end at a smaller angle with the optical fiber axis. 20. The optical fiber inspection method of claim 15, wherein the bright field illuminating includes directing the illumination light at an angle from parallel to less than or equal to 45 degrees with respect to the optical fiber axis into the interior region so as to illuminate the at least one surface. 21. The optical fiber inspection method of claim 20, wherein the angle is greater than or equal to 5 degrees and less than or equal to 30 degrees with the optical fiber axis. 22. The optical fiber inspection method of claim 15, wherein the camera is situated opposite the bright field illumination source with respect to the optical fiber axis. 23. The optical fiber inspection method of claim 15, wherein the camera includes a plurality of adjacently situated lights so as to provide on-axis illumination of the at least one surface. 24. The optical fiber inspection method of claim 15, further comprising: focusing the camera on a separate surface of the output fiber end and obtaining a separate surface image of the separate surface. 25. The optical fiber inspection method of claim 15, further comprising: cleaning an end surface of the output fiber end with the optical fiber connector secured in the fiber inspection housing. 26. The optical fiber inspection method of claim 15, further comprising: receiving a camera in the fiber inspection housing, wherein the camera is a mobile device camera. 27. The optical fiber inspection method of claim 15, further comprising varying the wavelength of the dark field illumination light or bright field illumination light received by the at least one surface so as to change an image detail associated with the at least one surface.
An apparatus includes a camera, a dark field illumination source, and a fiber inspection housing including a fiber connector input situated to receive an optical fiber connector so that an optical fiber output end of the optical fiber connector is removably insertable into an interior region of the fiber inspection housing and securable at a predetermined location in the interior region, a camera input situated to receive and secure the camera so that the camera is in optical communication with the interior region and the optical fiber output end, and a dark field illumination source input situated to receive the dark field illumination source so that light emitted from the dark field illumination source is received by the optical fiber output end at a dark field illumination angle and is scattered by contamination or defects associated with the optical fiber output end so as to be detectable by the camera.1. An apparatus, comprising: a camera; a dark field illumination source; and a fiber inspection housing including a fiber connector input situated to receive an optical fiber connector so that an optical fiber output end of the optical fiber connector is removably insertable into an interior region of the fiber inspection housing and securable at a predetermined location in the interior region, a camera input situated to receive and secure the camera so that the camera is in optical communication with the interior region and the optical fiber output end, and a dark field illumination source input situated to receive the dark field illumination source so that light emitted from the dark field illumination source is received by the optical fiber output end at a dark field illumination angle and is scattered by contamination or defects associated with the optical fiber output end so as to be detectable by the camera. 2. The apparatus of claim 1, further comprising the optical fiber connector inserted into and secured in the interior region of the fiber inspection housing so that the optical fiber output end is situated to receive light from the dark field illumination source. 3. The apparatus of claim 1, wherein the dark field illumination angle is greater than or equal to 30 degrees and less than or equal to 90 degrees between an optical axis of the optical fiber output end and a dark field illumination source axis. 4. The apparatus of claim 1, further comprising a bright field illumination source coupled to the fiber inspection housing and situated to illuminate the optical fiber output end so that contamination or defects associated with the optical fiber output end are detectable by the camera. 5. The apparatus of claim 4, wherein the bright field illumination source is spaced apart from the camera on the opposite side of an optical axis of the fiber connector input. 6. The apparatus of claim 4, wherein the bright field illumination source is adjacent to or adjoining the camera so that bright field illumination is directed parallel or coaxial with an optical axis of the camera. 7. The apparatus of claim 1, wherein the fiber connector input is situated to receive and secure the optical fiber output end at the predetermined location so that the optical fiber output end is rotatable about an optical fiber axis. 8. The apparatus of claim 1, wherein the fiber inspection housing includes a cleaning access port situated to allow cleaning of the optical fiber output end situated at the predetermined location in the interior region. 9. The apparatus of claim 1, further comprising a baffle situated to block at least a portion of the light emitted by the dark field illumination source that propagates at greater than the dark field illumination angle or that propagates to surfaces other than the optical fiber output end. 10. The apparatus of claim 1, further comprising a diffuser situated to diffuse light from the bright field illumination source so as to improve a camera image detail. 11. The apparatus of claim 1, wherein the fiber inspection housing is made of a plastic or other non-conductive material so as to inhibit an interlock trigger associated with contact between one or more surfaces of the optical fiber connector and the fiber inspection housing. 12. The apparatus of claim 1, wherein the fiber connector input includes a metal sleeve insert having a recessed portion so as to provide a gap between the metal sleeve and an interlock contact of the optical fiber connector. 13. The apparatus of claim 1, wherein the camera is part of a mobile device, and the camera input is situated to receive the mobile device so that the mobile device camera is removably insertable into the camera input so as to detect defects on the optical fiber output end. 14. The apparatus of claim 1, wherein the fiber inspection housing is portable so that an image of the optical fiber output end with the camera is obtainable without requiring the mounting of the fiber inspection housing to a surface. 15. An optical fiber inspection method, comprising: receiving in a fiber inspection housing an optical fiber connector having an optical fiber axis so that an output fiber end is situated at a predetermined location in an interior region of the fiber inspection housing; bright field illuminating through the interior region of the fiber inspection housing at least one surface of the output fiber end and obtaining a first image of the at least one surface with a camera optically coupled to the output fiber end; and dark field illuminating through the interior region the at least one surface of the output fiber end and obtaining a second image of the at least one surface with the camera. 16. The optical fiber inspection method of claim 15, further comprising: comparing one or both of the first image and second image to one or more baseline images of the output fiber end so as to determine a change in contamination or damage associated with the output fiber end. 17. The optical fiber inspection method of claim 15, further comprising: securing the optical fiber connector in the fiber inspection housing against axial and lateral translation with respect to the optical fiber axis; and rotating the optical fiber connector. 18. The optical fiber inspection method of claim 15, wherein the dark field illuminating includes directing illumination light at an angle of incidence of greater than or equal to 60 degrees with respect to the optical fiber axis into the interior region so as to illuminate the at least one surface. 19. The optical fiber inspection method of claim 15, further comprising: diffusing the directed dark field illumination light with a diffuser and blocking a portion of the diffused light with a baffle so as to reduce the amount of dark field light directed to the output fiber end at a smaller angle with the optical fiber axis. 20. The optical fiber inspection method of claim 15, wherein the bright field illuminating includes directing the illumination light at an angle from parallel to less than or equal to 45 degrees with respect to the optical fiber axis into the interior region so as to illuminate the at least one surface. 21. The optical fiber inspection method of claim 20, wherein the angle is greater than or equal to 5 degrees and less than or equal to 30 degrees with the optical fiber axis. 22. The optical fiber inspection method of claim 15, wherein the camera is situated opposite the bright field illumination source with respect to the optical fiber axis. 23. The optical fiber inspection method of claim 15, wherein the camera includes a plurality of adjacently situated lights so as to provide on-axis illumination of the at least one surface. 24. The optical fiber inspection method of claim 15, further comprising: focusing the camera on a separate surface of the output fiber end and obtaining a separate surface image of the separate surface. 25. The optical fiber inspection method of claim 15, further comprising: cleaning an end surface of the output fiber end with the optical fiber connector secured in the fiber inspection housing. 26. The optical fiber inspection method of claim 15, further comprising: receiving a camera in the fiber inspection housing, wherein the camera is a mobile device camera. 27. The optical fiber inspection method of claim 15, further comprising varying the wavelength of the dark field illumination light or bright field illumination light received by the at least one surface so as to change an image detail associated with the at least one surface.
2,400
7,865
7,865
15,196,518
2,433
A novel method for managing firewall configuration of a software defined data center is provided. Such a firewall configuration is divided into multiple sections that each contains a set of firewall rules. Each tenant of the software defined data center has a corresponding set of sections in the firewall configuration. The method allows each tenant to independently access and update/manage its own corresponding set of sections. Multiple tenants or users are allowed to make changes to the firewall configuration simultaneously.
1. A method of providing firewall services at a software defined data center, the method comprising: storing a firewall configuration comprising a plurality of sections, each section comprising a set of firewall rules; maintaining a list of sections for recording an ordering of the plurality of sections; receiving a plurality of requests for adding sections to the firewall configuration, wherein at least two of the requests are concurrent requests by different tenants; and scheduling an activity for making changes to the list of sections based on a request by a particular tenant for adding a first section, wherein the activity is queued for later execution when the position of the first section in the firewall configuration depends on a second section whose position in the firewall configuration is not recorded in the list of directions, wherein the activity is allowed to execute concurrently with other activities when the position of the first section does not depend on a section whose position in the firewall is not recorded in the list of directions. 2. The method of claim 1, wherein the position of a section in the firewall configuration is determined a priority key assigned to the section. 3. The method of claim 2, wherein the scheduled activity for adding the first section executes when the second section is assigned a priority key. 4. The method of claim 1, wherein the scheduled activity for adding the first section is a first activity, wherein priority key of the second section is assigned by second activity. 5. The method of claim 1, wherein each activity maintains a state that reflects the different phases of its current access to its corresponding section of firewall rules. 6. The method of claim 1, wherein each activity is launched from on an application programming interface (API) for a tenant. 7. The method of claim 1, wherein each activity executes on only one section of the plurality of sections. 8. The method of claim 1, wherein each activity is check-pointed in order to allow recovery of the activity from a saved check-point. 9. The method of claim 1, wherein an activity assigns priorities to firewall rules in its corresponding section. 10. The method of claim 1, wherein each activity reports to a controller of the software defined data center upon completion its execution. 11. The method of claim 1 further comprising receiving another request from the particular tenant for updating the firewall configuration before the completion of the scheduled activity. 12. A computing device for providing firewall services at a software defined data center, the computing device comprising: a set of processing units; and a non-transitory computer readable storage medium storing a program for execution by the set of processing units, the program comprising sets of instructions for: storing a firewall configuration comprising a plurality of sections, each section comprising a set of firewall rules; maintaining a list of sections for recording an ordering of the plurality of sections; receiving a plurality of requests for adding or deleting sections in the firewall configuration, wherein at least two of the requests are concurrent requests by different tenants; and scheduling an activity for making changes to the list of sections based on a request by a particular tenant for adding a first section, wherein the activity is queued for later execution when the position of the first section in the firewall configuration depends on a second section whose position in the firewall configuration is not recorded in the list of directions, wherein the activity is allowed to execute concurrently with other activities when the position of the first section does not depend on a section whose position in the firewall is not recorded in the list of directions. 13. The computing device of claim 12, wherein the position of a section in the firewall configuration is determined a priority key assigned to the section. 14. The computing device of claim 13, wherein the scheduled activity for adding the first section executes when the second section is assigned a priority key. 15. The computing device of claim 12, wherein the scheduled activity for adding the first section is a first activity, wherein priority key of the second section is assigned by second activity. 16. The computing device of claim 12, wherein each activity maintains a state that reflects the different phases of its current access to its corresponding section of firewall rules. 17. The computing device of claim 12, wherein each activity executes on only one section of the plurality of sections. 18. The computing device of claim 12, wherein each activity is check-pointed in order to allow recovery of the activity from a saved check-point. 19. The computing device of claim 12, wherein an activity assigns priorities to firewall rules in its corresponding section. 20. The computing device of claim 12 further comprising receiving another request from the particular tenant for updating the firewall configuration before the completion of the scheduled activity.
A novel method for managing firewall configuration of a software defined data center is provided. Such a firewall configuration is divided into multiple sections that each contains a set of firewall rules. Each tenant of the software defined data center has a corresponding set of sections in the firewall configuration. The method allows each tenant to independently access and update/manage its own corresponding set of sections. Multiple tenants or users are allowed to make changes to the firewall configuration simultaneously.1. A method of providing firewall services at a software defined data center, the method comprising: storing a firewall configuration comprising a plurality of sections, each section comprising a set of firewall rules; maintaining a list of sections for recording an ordering of the plurality of sections; receiving a plurality of requests for adding sections to the firewall configuration, wherein at least two of the requests are concurrent requests by different tenants; and scheduling an activity for making changes to the list of sections based on a request by a particular tenant for adding a first section, wherein the activity is queued for later execution when the position of the first section in the firewall configuration depends on a second section whose position in the firewall configuration is not recorded in the list of directions, wherein the activity is allowed to execute concurrently with other activities when the position of the first section does not depend on a section whose position in the firewall is not recorded in the list of directions. 2. The method of claim 1, wherein the position of a section in the firewall configuration is determined a priority key assigned to the section. 3. The method of claim 2, wherein the scheduled activity for adding the first section executes when the second section is assigned a priority key. 4. The method of claim 1, wherein the scheduled activity for adding the first section is a first activity, wherein priority key of the second section is assigned by second activity. 5. The method of claim 1, wherein each activity maintains a state that reflects the different phases of its current access to its corresponding section of firewall rules. 6. The method of claim 1, wherein each activity is launched from on an application programming interface (API) for a tenant. 7. The method of claim 1, wherein each activity executes on only one section of the plurality of sections. 8. The method of claim 1, wherein each activity is check-pointed in order to allow recovery of the activity from a saved check-point. 9. The method of claim 1, wherein an activity assigns priorities to firewall rules in its corresponding section. 10. The method of claim 1, wherein each activity reports to a controller of the software defined data center upon completion its execution. 11. The method of claim 1 further comprising receiving another request from the particular tenant for updating the firewall configuration before the completion of the scheduled activity. 12. A computing device for providing firewall services at a software defined data center, the computing device comprising: a set of processing units; and a non-transitory computer readable storage medium storing a program for execution by the set of processing units, the program comprising sets of instructions for: storing a firewall configuration comprising a plurality of sections, each section comprising a set of firewall rules; maintaining a list of sections for recording an ordering of the plurality of sections; receiving a plurality of requests for adding or deleting sections in the firewall configuration, wherein at least two of the requests are concurrent requests by different tenants; and scheduling an activity for making changes to the list of sections based on a request by a particular tenant for adding a first section, wherein the activity is queued for later execution when the position of the first section in the firewall configuration depends on a second section whose position in the firewall configuration is not recorded in the list of directions, wherein the activity is allowed to execute concurrently with other activities when the position of the first section does not depend on a section whose position in the firewall is not recorded in the list of directions. 13. The computing device of claim 12, wherein the position of a section in the firewall configuration is determined a priority key assigned to the section. 14. The computing device of claim 13, wherein the scheduled activity for adding the first section executes when the second section is assigned a priority key. 15. The computing device of claim 12, wherein the scheduled activity for adding the first section is a first activity, wherein priority key of the second section is assigned by second activity. 16. The computing device of claim 12, wherein each activity maintains a state that reflects the different phases of its current access to its corresponding section of firewall rules. 17. The computing device of claim 12, wherein each activity executes on only one section of the plurality of sections. 18. The computing device of claim 12, wherein each activity is check-pointed in order to allow recovery of the activity from a saved check-point. 19. The computing device of claim 12, wherein an activity assigns priorities to firewall rules in its corresponding section. 20. The computing device of claim 12 further comprising receiving another request from the particular tenant for updating the firewall configuration before the completion of the scheduled activity.
2,400
7,866
7,866
13,928,278
2,445
A remote computing session management process is directed to the execution and management of aspects of virtual instances executed on data center computers at a program execution service (PES) platform. A computing session may be established between the PES platform and a computing device connected to the PES platform over a communications network. The data created by the user of the client computing device interacting with the virtual instance may be stored, and following an interruption of the remote computing session, the data may be used when re-establishing the remote computing session.
1. A system comprising: one or more computers of a Program Execution Service (PES) including processors and memory, the memory including instructions that, upon execution, cause the one or more computers to: receive a request from a computing device to access a virtual desktop instance, the request identifying a user of the computing device; identify a first virtual desktop instance corresponding to the request; cause one or more volumes to attach to the first virtual desktop instance, the one or more volumes including desktop personalization information for the user and a data store for the user, wherein a first operating system running within the first virtual desktop instance is personalized according to the desktop personalization information for the user and one or more operating system folders are mapped to storage in the data store for the user; provide, to the computing device, access to the first virtual desktop instance personalized according to the desktop personalization information for the user and including the one or more operating system folders mapped to storage in the data store for the user; determine an interruption related to the first virtual desktop instance, wherein the interruption prevents the computing device from accessing the first virtual desktop instance; identify a second virtual desktop instance corresponding to the request; cause the one or more volumes to detach from the first virtual desktop instance and attach to the second virtual desktop instance, wherein a second operating system running within the second virtual desktop instance is personalized according to the desktop personalization information for the user and one or more operating system folders are mapped to storage in the data store for the user; and provide, to the computing device, access to the second virtual desktop instance. 2. The system of claim 1, wherein the instructions, upon execution, cause the PES to determine an interruption related to the first virtual desktop instance based at least in part upon an instance manager configured to monitor the state of the first virtual desktop instance detecting a failure of the first virtual desktop instance. 3. The system of claim 1, wherein the first virtual desktop instance is executed on a host computer selected by the PES, and wherein the instructions, upon execution, cause the PES to determine an interruption related to the first virtual desktop instance based at least in part upon the PES detecting a failure of the host computer selected by the PES. 4. The system of claim 3, wherein the instructions, upon execution, cause the PES to determine an interruption related to the first virtual desktop instance based at least in part upon the first virtual desktop instance detecting a degradation or an interruption of a connection between the computing device and the host computer selected. 5. The system of claim 1, wherein the second virtual desktop instance is executed on a host computer selected by the PES, and wherein the host computer is selected by the PES according to a bandwidth of a connection between the computing device and the host computer. 6. A computer-implemented method comprising: determining an event relating to a first virtual desktop instance hosted by a service provider occurred, wherein the first virtual desktop instance is connected to a client computing device associated with a user account for the service provider, wherein the first virtual desktop instance is configured according to a desktop profile for the user, wherein the desktop profile specifies operating system settings; causing a desktop store to be attached via a network to a second virtual desktop instance, wherein the desktop store includes the desktop profile and wherein the operating system settings specified by the desktop profile are used to configure an operating system running within the second virtual desktop instance; and causing the second virtual desktop instance to be connected to the client computing device. 7. The computer-implemented method of claim 6, wherein the event comprises an indication that the first virtual desktop instance is not accessible to the client computing device. 8. The computer-implemented method of claim 6, wherein the desktop store further includes user content, the user content including stored folders of documents created by a user of the user account and wherein the operating system includes a mapping of the stored folders to the desktop store. 9. The computer-implemented method of claim 6, wherein causing the desktop store to be attached via a network comprises causing the desktop store to be attached via an internal network of the service provider. 10. The computer-implemented method of claim 6 further comprising replicating the desktop store to a second backup desktop store. 11. The computer-implemented method of claim 10 further comprising receiving changes to the desktop store and replicating the changes to the backup desktop store. 12. The computer-implemented method of claim 6 further comprising updating the desktop profile upon a determination of a disconnection of the client computing device from the first or second virtual desktop instance. 13. The computer-implemented method of claim 6 further comprising updating the desktop profile while the client computing device is connected to the first or second virtual desktop instance. 14. The computer-implemented method of claim 6, wherein the first virtual desktop instance comprises a first agent configured to monitor and store, on the desktop store, information regarding documents opened by the user and applications running. 15. The computer-implemented method of claim 14, wherein the second virtual desktop instance comprises a second agent configured to retrieve the information monitored and stored by the first agent and to accordingly open documents and applications. 16. Non-transitory physical computer storage comprising computer-executable instructions that, when executed, direct a computing system to at least: receive a request at a data center of a Program Execution Service (PES) from a computing device to access a virtual desktop instance, the request identifying a user of the computing device; identify a first virtual desktop instance corresponding to the request; cause one or more volumes to attach to the first virtual desktop instance, the one or more volumes including desktop personalization information for the user and a data store for the user, wherein a first operating system running within the virtual desktop instance is personalized according to the desktop personalization information for the user and one or more operating system folders are mapped to storage in the data store for the user; provide, to the computing device, access to the first virtual desktop instance; determine an event related to the first virtual desktop instance; identify a second virtual desktop instance corresponding to the request; and provide, to the computing device, access to a second virtual desktop instance. 17. The non-transitory physical computer storage of claim 16, wherein the computer-executable instructions, when executed, further direct the computing system to cause the one or more volumes to detach from the first virtual desktop instance and to attach to the second virtual desktop instance, wherein a second operating system running within the second virtual desktop instance is personalized according to the desktop personalization information for the user and to one or more operating system folders mapped to storage in the data store for the user. 18. The non-transitory physical computer storage of claim 16, wherein the computer-executable instructions, when executed, further direct the computing system to form a first establish a first computing session between the first virtual desktop instance and the computing device. 19. The non-transitory physical computer storage of claim 16, wherein the computer-executable instructions further direct the computing system to establish a second computing session between the second virtual desktop instance and the computing device. 20. The non-transitory physical computer storage of claim 16, wherein the event related to the first virtual desktop instance prevents the computing device from accessing the first virtual desktop instance.
A remote computing session management process is directed to the execution and management of aspects of virtual instances executed on data center computers at a program execution service (PES) platform. A computing session may be established between the PES platform and a computing device connected to the PES platform over a communications network. The data created by the user of the client computing device interacting with the virtual instance may be stored, and following an interruption of the remote computing session, the data may be used when re-establishing the remote computing session.1. A system comprising: one or more computers of a Program Execution Service (PES) including processors and memory, the memory including instructions that, upon execution, cause the one or more computers to: receive a request from a computing device to access a virtual desktop instance, the request identifying a user of the computing device; identify a first virtual desktop instance corresponding to the request; cause one or more volumes to attach to the first virtual desktop instance, the one or more volumes including desktop personalization information for the user and a data store for the user, wherein a first operating system running within the first virtual desktop instance is personalized according to the desktop personalization information for the user and one or more operating system folders are mapped to storage in the data store for the user; provide, to the computing device, access to the first virtual desktop instance personalized according to the desktop personalization information for the user and including the one or more operating system folders mapped to storage in the data store for the user; determine an interruption related to the first virtual desktop instance, wherein the interruption prevents the computing device from accessing the first virtual desktop instance; identify a second virtual desktop instance corresponding to the request; cause the one or more volumes to detach from the first virtual desktop instance and attach to the second virtual desktop instance, wherein a second operating system running within the second virtual desktop instance is personalized according to the desktop personalization information for the user and one or more operating system folders are mapped to storage in the data store for the user; and provide, to the computing device, access to the second virtual desktop instance. 2. The system of claim 1, wherein the instructions, upon execution, cause the PES to determine an interruption related to the first virtual desktop instance based at least in part upon an instance manager configured to monitor the state of the first virtual desktop instance detecting a failure of the first virtual desktop instance. 3. The system of claim 1, wherein the first virtual desktop instance is executed on a host computer selected by the PES, and wherein the instructions, upon execution, cause the PES to determine an interruption related to the first virtual desktop instance based at least in part upon the PES detecting a failure of the host computer selected by the PES. 4. The system of claim 3, wherein the instructions, upon execution, cause the PES to determine an interruption related to the first virtual desktop instance based at least in part upon the first virtual desktop instance detecting a degradation or an interruption of a connection between the computing device and the host computer selected. 5. The system of claim 1, wherein the second virtual desktop instance is executed on a host computer selected by the PES, and wherein the host computer is selected by the PES according to a bandwidth of a connection between the computing device and the host computer. 6. A computer-implemented method comprising: determining an event relating to a first virtual desktop instance hosted by a service provider occurred, wherein the first virtual desktop instance is connected to a client computing device associated with a user account for the service provider, wherein the first virtual desktop instance is configured according to a desktop profile for the user, wherein the desktop profile specifies operating system settings; causing a desktop store to be attached via a network to a second virtual desktop instance, wherein the desktop store includes the desktop profile and wherein the operating system settings specified by the desktop profile are used to configure an operating system running within the second virtual desktop instance; and causing the second virtual desktop instance to be connected to the client computing device. 7. The computer-implemented method of claim 6, wherein the event comprises an indication that the first virtual desktop instance is not accessible to the client computing device. 8. The computer-implemented method of claim 6, wherein the desktop store further includes user content, the user content including stored folders of documents created by a user of the user account and wherein the operating system includes a mapping of the stored folders to the desktop store. 9. The computer-implemented method of claim 6, wherein causing the desktop store to be attached via a network comprises causing the desktop store to be attached via an internal network of the service provider. 10. The computer-implemented method of claim 6 further comprising replicating the desktop store to a second backup desktop store. 11. The computer-implemented method of claim 10 further comprising receiving changes to the desktop store and replicating the changes to the backup desktop store. 12. The computer-implemented method of claim 6 further comprising updating the desktop profile upon a determination of a disconnection of the client computing device from the first or second virtual desktop instance. 13. The computer-implemented method of claim 6 further comprising updating the desktop profile while the client computing device is connected to the first or second virtual desktop instance. 14. The computer-implemented method of claim 6, wherein the first virtual desktop instance comprises a first agent configured to monitor and store, on the desktop store, information regarding documents opened by the user and applications running. 15. The computer-implemented method of claim 14, wherein the second virtual desktop instance comprises a second agent configured to retrieve the information monitored and stored by the first agent and to accordingly open documents and applications. 16. Non-transitory physical computer storage comprising computer-executable instructions that, when executed, direct a computing system to at least: receive a request at a data center of a Program Execution Service (PES) from a computing device to access a virtual desktop instance, the request identifying a user of the computing device; identify a first virtual desktop instance corresponding to the request; cause one or more volumes to attach to the first virtual desktop instance, the one or more volumes including desktop personalization information for the user and a data store for the user, wherein a first operating system running within the virtual desktop instance is personalized according to the desktop personalization information for the user and one or more operating system folders are mapped to storage in the data store for the user; provide, to the computing device, access to the first virtual desktop instance; determine an event related to the first virtual desktop instance; identify a second virtual desktop instance corresponding to the request; and provide, to the computing device, access to a second virtual desktop instance. 17. The non-transitory physical computer storage of claim 16, wherein the computer-executable instructions, when executed, further direct the computing system to cause the one or more volumes to detach from the first virtual desktop instance and to attach to the second virtual desktop instance, wherein a second operating system running within the second virtual desktop instance is personalized according to the desktop personalization information for the user and to one or more operating system folders mapped to storage in the data store for the user. 18. The non-transitory physical computer storage of claim 16, wherein the computer-executable instructions, when executed, further direct the computing system to form a first establish a first computing session between the first virtual desktop instance and the computing device. 19. The non-transitory physical computer storage of claim 16, wherein the computer-executable instructions further direct the computing system to establish a second computing session between the second virtual desktop instance and the computing device. 20. The non-transitory physical computer storage of claim 16, wherein the event related to the first virtual desktop instance prevents the computing device from accessing the first virtual desktop instance.
2,400
7,867
7,867
15,660,264
2,419
A method and apparatus of processing multimedia data comprising a first section received in error are disclosed. The method comprises obtaining error distribution information corresponding to the first section. The method further comprises applying one of a plurality of error recovery schemes to the first section of the multimedia data based on the error distribution information.
1. (canceled) 2. A method of processing multimedia data comprising a first section received in error, the method comprising: obtaining error distribution information corresponding to the first section; selecting one of a plurality of error recovery schemes based on the error distribution information for the first section, wherein the selecting is based at least on whether a channel switch is detected; and processing the first section based on the selected error recovery scheme. 3. The method of claim 2, wherein the multimedia data comprises a plurality of frames, each frame comprising a plurality of sections, and wherein the obtaining comprises generating a map comprising locations of correctly decoded and erroneous sections. 4. The method of claim 2, wherein the plurality of error recovery schemes comprise spatial error concealment, frame rate up conversion, temporal error concealment for P-frame, and temporal error concealment for B-frame. 5. The method of claim 2, wherein the multimedia data comprises information generated from multiple layer protocols. 6. An apparatus for processing multimedia data comprising a first section received in error, comprising: means for obtaining error distribution information corresponding to the first section; means for selecting one of a plurality of error recovery schemes based on the error distribution information for the first section, wherein the selecting is based at least on whether a channel switch is detected; and means for processing the first section based on the selected error recovery scheme. 7. The apparatus of claim 6 wherein the multimedia data comprises a plurality of frames, each frame comprising a plurality of sections, and wherein the obtaining means comprises means for generating a map comprising locations of correctly decoded and erroneous sections. 8. The apparatus of claim 6, wherein the plurality of error recovery schemes comprise spatial error concealment, frame rate up conversion, temporal error concealment for P-frame, and temporal error concealment for B-frame. 9. The apparatus of claim 6, wherein the multimedia data comprises information generated from multiple layer protocols. 10. A processor configured to perform a method, the method comprising: obtaining error distribution information corresponding to the first section; selecting one of a plurality of error recovery schemes based on the error distribution information for the first section, wherein the selecting is based at least on whether a channel switch is detected; and processing the first section based on the selected error recovery scheme. 11. The processor of claim 10, wherein the multimedia data comprises a plurality of frames, each frame comprising a plurality of sections, and wherein the obtaining comprises generating a map comprising locations of correctly decoded and erroneous sections. 12. The processor of claim 10, wherein the plurality of error recovery schemes comprise spatial error concealment, frame rate up conversion, temporal error concealment for P-frame, and temporal error concealment for B-frame. 13. The processor of claim 10, wherein the multimedia data comprises information generated from multiple layer protocols. 14. A computer-readable medium embodying means for causing a computer to execute a method, the method comprising: obtaining error distribution information corresponding to the first section; selecting one of a plurality of error recovery schemes based on the error distribution information for the first section, wherein the selecting is based at least on whether a channel switch is detected; and processing the first section based on the selected error recovery scheme. 15. The computer-readable medium of claim 14, wherein the multimedia data comprises a plurality of frames, each frame comprising a plurality of sections, and wherein the obtaining comprises generating a map comprising locations of correctly decoded and erroneous sections. 16. The computer-readable medium of claim 14, wherein the plurality of error recovery schemes comprise spatial error concealment, frame rate up conversion, temporal error concealment for P-frame, and temporal error concealment for B-frame. 17. The computer-readable medium of claim 14, wherein the multimedia data comprises information generated from multiple layer protocols. 18. An apparatus for processing multimedia data comprising: a receiver configured to receive the multimedia data having a first section received in error; and an error concealer comprising: a selecting module configured to select one of a plurality of error recovery schemes based on the error distribution information for the first section, wherein the error concealer is configured to apply one of the plurality of error recovery schemes based at least on whether a channel switch is detected; and a processing module configured to process the first section based on the selected error recovery scheme. 19. The apparatus of claim 18, further comprising an obtaining module configured to obtain the error distribution information corresponding to the first section. 20. The apparatus of claim 18, wherein the error concealer is further configured to obtain the error distribution information corresponding to the first section. 21. The apparatus of claim 18, wherein the multimedia data comprises information generated from multiple layer protocols.
A method and apparatus of processing multimedia data comprising a first section received in error are disclosed. The method comprises obtaining error distribution information corresponding to the first section. The method further comprises applying one of a plurality of error recovery schemes to the first section of the multimedia data based on the error distribution information.1. (canceled) 2. A method of processing multimedia data comprising a first section received in error, the method comprising: obtaining error distribution information corresponding to the first section; selecting one of a plurality of error recovery schemes based on the error distribution information for the first section, wherein the selecting is based at least on whether a channel switch is detected; and processing the first section based on the selected error recovery scheme. 3. The method of claim 2, wherein the multimedia data comprises a plurality of frames, each frame comprising a plurality of sections, and wherein the obtaining comprises generating a map comprising locations of correctly decoded and erroneous sections. 4. The method of claim 2, wherein the plurality of error recovery schemes comprise spatial error concealment, frame rate up conversion, temporal error concealment for P-frame, and temporal error concealment for B-frame. 5. The method of claim 2, wherein the multimedia data comprises information generated from multiple layer protocols. 6. An apparatus for processing multimedia data comprising a first section received in error, comprising: means for obtaining error distribution information corresponding to the first section; means for selecting one of a plurality of error recovery schemes based on the error distribution information for the first section, wherein the selecting is based at least on whether a channel switch is detected; and means for processing the first section based on the selected error recovery scheme. 7. The apparatus of claim 6 wherein the multimedia data comprises a plurality of frames, each frame comprising a plurality of sections, and wherein the obtaining means comprises means for generating a map comprising locations of correctly decoded and erroneous sections. 8. The apparatus of claim 6, wherein the plurality of error recovery schemes comprise spatial error concealment, frame rate up conversion, temporal error concealment for P-frame, and temporal error concealment for B-frame. 9. The apparatus of claim 6, wherein the multimedia data comprises information generated from multiple layer protocols. 10. A processor configured to perform a method, the method comprising: obtaining error distribution information corresponding to the first section; selecting one of a plurality of error recovery schemes based on the error distribution information for the first section, wherein the selecting is based at least on whether a channel switch is detected; and processing the first section based on the selected error recovery scheme. 11. The processor of claim 10, wherein the multimedia data comprises a plurality of frames, each frame comprising a plurality of sections, and wherein the obtaining comprises generating a map comprising locations of correctly decoded and erroneous sections. 12. The processor of claim 10, wherein the plurality of error recovery schemes comprise spatial error concealment, frame rate up conversion, temporal error concealment for P-frame, and temporal error concealment for B-frame. 13. The processor of claim 10, wherein the multimedia data comprises information generated from multiple layer protocols. 14. A computer-readable medium embodying means for causing a computer to execute a method, the method comprising: obtaining error distribution information corresponding to the first section; selecting one of a plurality of error recovery schemes based on the error distribution information for the first section, wherein the selecting is based at least on whether a channel switch is detected; and processing the first section based on the selected error recovery scheme. 15. The computer-readable medium of claim 14, wherein the multimedia data comprises a plurality of frames, each frame comprising a plurality of sections, and wherein the obtaining comprises generating a map comprising locations of correctly decoded and erroneous sections. 16. The computer-readable medium of claim 14, wherein the plurality of error recovery schemes comprise spatial error concealment, frame rate up conversion, temporal error concealment for P-frame, and temporal error concealment for B-frame. 17. The computer-readable medium of claim 14, wherein the multimedia data comprises information generated from multiple layer protocols. 18. An apparatus for processing multimedia data comprising: a receiver configured to receive the multimedia data having a first section received in error; and an error concealer comprising: a selecting module configured to select one of a plurality of error recovery schemes based on the error distribution information for the first section, wherein the error concealer is configured to apply one of the plurality of error recovery schemes based at least on whether a channel switch is detected; and a processing module configured to process the first section based on the selected error recovery scheme. 19. The apparatus of claim 18, further comprising an obtaining module configured to obtain the error distribution information corresponding to the first section. 20. The apparatus of claim 18, wherein the error concealer is further configured to obtain the error distribution information corresponding to the first section. 21. The apparatus of claim 18, wherein the multimedia data comprises information generated from multiple layer protocols.
2,400
7,868
7,868
14,813,494
2,483
A person is detected from a moving image of the monitoring area, and position information on the person is acquired. Temporal statistical processing is performed on the position information, statistical information relating to a staying situation of the person is acquired in accordance with setting of a target period of time for the statistical processing, and thus a heat map moving image is generated. Furthermore, a mask image corresponding to a person image area is generated at every predetermined point in time based on the position information on the person. A monitoring moving image that results from superimposing the heat map image and the mask image onto a background image is generated and is output at every predetermined point in time.
1. A monitoring apparatus that generates and outputs a monitoring moving image that results from superimposing a foreground image showing an activity situation of a moving object in a monitoring area onto a background image, the monitoring apparatus comprising: a processor; a memory in which an instruction is stored; a position information acquirer that detects a moving object from a moving image of the monitoring area and acquires position information on every moving object; a statistical information acquirer that performs temporal statistical processing on the position information acquired by the position information acquirer and acquires statistical information relating to a staying situation of the moving object in accordance with setting of a target period of time for the statistical processing; a first foreground image generator that generates a first foreground image that results from visualizing the statistical information acquired by the statistical information acquirer; a second foreground image generator that generates a second foreground image corresponding to an image area of the moving object at every predetermined point in time based on the position information acquired by the positional information acquirer; and a moving image output controller that generates and outputs the monitoring moving image that results from superimposing the first and second foreground images that are generated by the first and second foreground image generators, respectively, onto the background image at every predetermined point in time, wherein the position information acquirer, the statistical information acquirer, the first foreground image generator, the second foreground mage generator, and the moving image output controller are configured to execute the instruction of the processor. 2. The monitoring apparatus according to claim 1, further comprising: a display form regulator that relates to a display form of at least one of the first and second foreground images, wherein the display form regulator detects a confused state where the first and second foreground images are confused with each other, and that changes the display form of at least one of the first and second foreground images in such a manner that the confused state is removed. 3. The monitoring apparatus according to claim 2, wherein, in changing the display form of at least one of the first and second foreground images, the display form regulator changes at least one among display elements that are a color, a pattern, a contour, and transmissivity and that determine the display form. 4. The monitoring apparatus according to claim 1, further comprising: a display form setter that relates to the display form of at least one of the first and second foreground images, wherein the display form setter sets the display form of at least one of the first and second foreground images according to a user's input operation. 5. The monitoring apparatus according to claim 4, wherein the display form setter guides the user's input operation relating to the display form in such a manner that a confused state where the first and second foreground images are confused with each other does not occur. 6. The monitoring apparatus according to claim 5, wherein, when setting the display form of at least one of the first and second foreground images, the display form setter limits candidates for the display form that are selectable by the user's input operation in such a manner that the confused state does not occur. 7. The monitoring apparatus according to claim 4, wherein, in setting the display form of at least one of the first and second foreground images, the display form setter sets at least one among display elements that are a color, a pattern, a contour, and transmissivity and that determine the display form, according to a user's input operation. 8. The monitoring apparatus according to claim 1, further comprising: a background image generator that generates the background image from the moving image of the monitoring area, wherein the background image generator generates the background image in accordance with the setting of the target period of time, and wherein the moving image output controller superimposes the first foreground image onto the background image that is consistent with the first foreground image in terms of the target period of time. 9. The monitoring apparatus according to claim 1, further comprising: a process condition setter that relates to a process that is performed in the statistical information acquirer, wherein the process condition setter sets the target period of time according to the user's input operation that arbitrarily designates the target period of time, and wherein, according to the user's input operation that arbitrarily designates a display point in time of the monitoring moving image, the moving image output controller generates and outputs the monitoring moving image at the designated display point in time. 10. A monitoring system that generates and outputs a monitoring moving image that results from superimposing a foreground image showing an activity situation of a moving object in a monitoring area onto a background image, the monitoring system comprising: a camera that captures a moving image of the monitoring area; and multiple information processing apparatuses, wherein any one of the multiple information processing apparatuses includes a processor; a memory in which an instruction is stored; a position information acquirer that detects a moving object from a moving image of the monitoring area and acquires position information on every moving object; a statistical information acquirer that performs temporal statistical processing on the position information acquired by the position information acquirer and acquires statistical information relating to a staying situation of the moving object in accordance with setting of a target period of time for the statistical processing; a first foreground image generator that generates a first foreground image that results from visualizing the statistical information acquired by the statistical information acquirer; a second foreground image generator that generates a second foreground image corresponding to an image area of the moving object at every predetermined point in time based on the position information acquired by the positional information acquirer; and a moving image output controller that generates and outputs the monitoring moving image that results from superimposing the first and second foreground image that are generated by the first and second foreground image generators, respectively, onto the background image at every predetermined point in time, and wherein the position information acquirer, the statistical information acquirer, the first foreground image generator, the second foreground mage generator, and the moving image output controller are configured to execute the instruction of the processor. 11. A monitoring system that generates and outputs a monitoring moving image that results from superimposing a foreground image showing an activity situation of a moving object in a monitoring area onto a background image, the monitoring system comprising: a camera that captures a moving image of the monitoring area; and an information processing apparatus, wherein any one of the camera and the information processing apparatus includes a position information acquirer that detects a moving object from a moving image of the monitoring area and acquires position information on every moving object; a statistical information acquirer that performs temporal statistical processing on the position information acquired by the position information acquirer and acquires statistical information relating to a staying situation of the moving object in accordance with setting of a target period of time for the statistical processing; a first foreground image generator that generates a first foreground image that results from visualizing the statistical information acquired by the statistical information acquirer; a second foreground image generator that generates a second foreground image corresponding to an image area of the moving object at every predetermined point in time based on the position information acquired by the positional information acquirer; and a moving image output controller that generates and outputs the monitoring moving image that results from superimposing the first and second foreground image that are generated by the first and second foreground image generators, respectively, onto the background image at every predetermined point in time. 12. A monitoring method of causing an information processing apparatus to perform processing that generates and outputs a monitoring moving image that results from superimposing a foreground image showing an activity situation of a moving object in a monitoring area onto a background image, wherein an instruction that is executed by a processor of the information processing apparatus and that is stored in a memory includes detecting a moving object from a moving image of the monitoring area and acquiring position information on every moving object, performing temporal statistical processing on the positional information and acquiring statistical information relating to a staying situation of the moving object in accordance with setting of a target period of time for the statistical processing, generating a first foreground image that results from visualizing the statistical information, generating a second foreground image corresponding to an image area of the moving object based on the position information at every predetermined point in time, and generating and outputting the monitoring moving image that results from superimposing the first and second foreground images onto the background image, at every predetermined point in time.
A person is detected from a moving image of the monitoring area, and position information on the person is acquired. Temporal statistical processing is performed on the position information, statistical information relating to a staying situation of the person is acquired in accordance with setting of a target period of time for the statistical processing, and thus a heat map moving image is generated. Furthermore, a mask image corresponding to a person image area is generated at every predetermined point in time based on the position information on the person. A monitoring moving image that results from superimposing the heat map image and the mask image onto a background image is generated and is output at every predetermined point in time.1. A monitoring apparatus that generates and outputs a monitoring moving image that results from superimposing a foreground image showing an activity situation of a moving object in a monitoring area onto a background image, the monitoring apparatus comprising: a processor; a memory in which an instruction is stored; a position information acquirer that detects a moving object from a moving image of the monitoring area and acquires position information on every moving object; a statistical information acquirer that performs temporal statistical processing on the position information acquired by the position information acquirer and acquires statistical information relating to a staying situation of the moving object in accordance with setting of a target period of time for the statistical processing; a first foreground image generator that generates a first foreground image that results from visualizing the statistical information acquired by the statistical information acquirer; a second foreground image generator that generates a second foreground image corresponding to an image area of the moving object at every predetermined point in time based on the position information acquired by the positional information acquirer; and a moving image output controller that generates and outputs the monitoring moving image that results from superimposing the first and second foreground images that are generated by the first and second foreground image generators, respectively, onto the background image at every predetermined point in time, wherein the position information acquirer, the statistical information acquirer, the first foreground image generator, the second foreground mage generator, and the moving image output controller are configured to execute the instruction of the processor. 2. The monitoring apparatus according to claim 1, further comprising: a display form regulator that relates to a display form of at least one of the first and second foreground images, wherein the display form regulator detects a confused state where the first and second foreground images are confused with each other, and that changes the display form of at least one of the first and second foreground images in such a manner that the confused state is removed. 3. The monitoring apparatus according to claim 2, wherein, in changing the display form of at least one of the first and second foreground images, the display form regulator changes at least one among display elements that are a color, a pattern, a contour, and transmissivity and that determine the display form. 4. The monitoring apparatus according to claim 1, further comprising: a display form setter that relates to the display form of at least one of the first and second foreground images, wherein the display form setter sets the display form of at least one of the first and second foreground images according to a user's input operation. 5. The monitoring apparatus according to claim 4, wherein the display form setter guides the user's input operation relating to the display form in such a manner that a confused state where the first and second foreground images are confused with each other does not occur. 6. The monitoring apparatus according to claim 5, wherein, when setting the display form of at least one of the first and second foreground images, the display form setter limits candidates for the display form that are selectable by the user's input operation in such a manner that the confused state does not occur. 7. The monitoring apparatus according to claim 4, wherein, in setting the display form of at least one of the first and second foreground images, the display form setter sets at least one among display elements that are a color, a pattern, a contour, and transmissivity and that determine the display form, according to a user's input operation. 8. The monitoring apparatus according to claim 1, further comprising: a background image generator that generates the background image from the moving image of the monitoring area, wherein the background image generator generates the background image in accordance with the setting of the target period of time, and wherein the moving image output controller superimposes the first foreground image onto the background image that is consistent with the first foreground image in terms of the target period of time. 9. The monitoring apparatus according to claim 1, further comprising: a process condition setter that relates to a process that is performed in the statistical information acquirer, wherein the process condition setter sets the target period of time according to the user's input operation that arbitrarily designates the target period of time, and wherein, according to the user's input operation that arbitrarily designates a display point in time of the monitoring moving image, the moving image output controller generates and outputs the monitoring moving image at the designated display point in time. 10. A monitoring system that generates and outputs a monitoring moving image that results from superimposing a foreground image showing an activity situation of a moving object in a monitoring area onto a background image, the monitoring system comprising: a camera that captures a moving image of the monitoring area; and multiple information processing apparatuses, wherein any one of the multiple information processing apparatuses includes a processor; a memory in which an instruction is stored; a position information acquirer that detects a moving object from a moving image of the monitoring area and acquires position information on every moving object; a statistical information acquirer that performs temporal statistical processing on the position information acquired by the position information acquirer and acquires statistical information relating to a staying situation of the moving object in accordance with setting of a target period of time for the statistical processing; a first foreground image generator that generates a first foreground image that results from visualizing the statistical information acquired by the statistical information acquirer; a second foreground image generator that generates a second foreground image corresponding to an image area of the moving object at every predetermined point in time based on the position information acquired by the positional information acquirer; and a moving image output controller that generates and outputs the monitoring moving image that results from superimposing the first and second foreground image that are generated by the first and second foreground image generators, respectively, onto the background image at every predetermined point in time, and wherein the position information acquirer, the statistical information acquirer, the first foreground image generator, the second foreground mage generator, and the moving image output controller are configured to execute the instruction of the processor. 11. A monitoring system that generates and outputs a monitoring moving image that results from superimposing a foreground image showing an activity situation of a moving object in a monitoring area onto a background image, the monitoring system comprising: a camera that captures a moving image of the monitoring area; and an information processing apparatus, wherein any one of the camera and the information processing apparatus includes a position information acquirer that detects a moving object from a moving image of the monitoring area and acquires position information on every moving object; a statistical information acquirer that performs temporal statistical processing on the position information acquired by the position information acquirer and acquires statistical information relating to a staying situation of the moving object in accordance with setting of a target period of time for the statistical processing; a first foreground image generator that generates a first foreground image that results from visualizing the statistical information acquired by the statistical information acquirer; a second foreground image generator that generates a second foreground image corresponding to an image area of the moving object at every predetermined point in time based on the position information acquired by the positional information acquirer; and a moving image output controller that generates and outputs the monitoring moving image that results from superimposing the first and second foreground image that are generated by the first and second foreground image generators, respectively, onto the background image at every predetermined point in time. 12. A monitoring method of causing an information processing apparatus to perform processing that generates and outputs a monitoring moving image that results from superimposing a foreground image showing an activity situation of a moving object in a monitoring area onto a background image, wherein an instruction that is executed by a processor of the information processing apparatus and that is stored in a memory includes detecting a moving object from a moving image of the monitoring area and acquiring position information on every moving object, performing temporal statistical processing on the positional information and acquiring statistical information relating to a staying situation of the moving object in accordance with setting of a target period of time for the statistical processing, generating a first foreground image that results from visualizing the statistical information, generating a second foreground image corresponding to an image area of the moving object based on the position information at every predetermined point in time, and generating and outputting the monitoring moving image that results from superimposing the first and second foreground images onto the background image, at every predetermined point in time.
2,400
7,869
7,869
15,300,911
2,473
A method for selection of a digital subscriber line (DSL) technology for use by a first DSL transceiver in transferring data over a communications line between the first DSL transceiver and a second DSL transceiver. For the selection, an indication of attenuation in the communications line between the DSL transceivers is obtained and a DSL technology for use by the first DSL transceiver is selected from a plurality of DSL technologies supported by the first DSL transceiver. Selection of the DSL technology is determined on the basis of the indication of attenuation. Optionally, selection of the DSL technology may, in addition, be based on other parameters comprising an indication of the power spectral density mask limiting the power output onto the line by the DSL transceiver; an indication of the noise environment of the communications line; an indication of the highest discrete multitone modulation tone transmitted by the first DSL transceiver over the communications line.
1. A method of selecting from a plurality of digital subscriber line (DSL) technologies supported by a first DSL transceiver, a DSL technology for use by the first DSL transceiver in transferring data over a communications line between the first DSL transceiver and a second DSL transceiver, the method comprising: obtaining an indication of attenuation in the communications line between the DSL transceivers; selecting from the plurality of DSL technologies, a DSL technology for use by the first DSL transceiver in transferring data over the communications line between the DSL transceivers; in which selection of the DSL technology is determined on the basis of one or more parameters; in which the one or more parameters comprise the indication of attenuation in the communications line between the DSL transceivers. 2. The method of claim 1 in which the power output onto the line by the DSL transceiver is limited by a power spectral density mask, in which the method comprises obtaining an indication of the power spectral density mask; in which the one or more parameters also comprise the indication of the power spectral density mask. 3. The method of claim 1 also comprising obtaining an indication of the noise environment of the communications line between the DSL transceivers; in which the one or more parameters also comprise the indication of the noise environment. 4. The method of claim 1, in which the noise environment of the communications line comprises an indication of noise impinging on the line. 5. The method of claim 1 also comprising obtaining an indication of the highest discrete multitone modulation (DMT) tone transmitted by the first DSL transceiver over the communications line between the DSL transceivers; in which the one or more parameters also comprise the indication of the highest frequency DMT tone. 6. The method of claim 1, in which the indication of attenuation is derived from at least one of H log, KL0, LATN and QLN. 7. The method of claim 1, in which the indication of attenuation is measured at the first DSL transceiver. 8. The method of claim 1 comprising reconfiguring the first DSL transceiver to switch from use of a first DSL technology to use of the DSL technology selected, on the basis of the one or more parameters, for transfer of data between the DSL transceivers. 9. The method of claim 8, in which the first DSL technology comprises one of G.Fast, VDSL2, ADSL, ADSL2 and ADSL2+. 10. The method of claim 1, in which the selected DSL technology comprises one of G.Fast, VDSL2, ADSL, ADSL2 and ADSL2+. 11. The method of claim 1, in which the DSL transceivers comprise a digital subscriber line access multiplexer modem and an end-user DSL modem. 12. A digital subscriber line (DSL) controller for controlling configuration of a first DSL transceiver so as to control selection, from a plurality of DSL technologies supported by the first DSL transceiver, of a DSL technology for use by the first DSL transceiver in transferring data over a communications line between the first DSL transceiver and a second DSL transceiver; in which the DSL controller comprises: a line interface for obtaining an indication of attenuation over the communications line between the DSL transceivers; a processor for selecting from the plurality of DSL technologies a DSL technology for transfer of data between the DSL transceivers; in which selection of the DSL technology is determined on the basis of one or more parameters; in which the one or more parameters comprise the indication of attenuation over the communications line between the DSL transceivers. 13. The DSL controller of claim 12, in which the power output onto the line by the first DSL transceiver is limited by a power spectral density mask; in which the DSL controller comprises a processor for obtaining an indication of the power spectral density mask; in which the one or more parameters also comprise the indication of the power spectral density mask. 14. The DSL controller of claim 12, also comprising a line monitor for obtaining an indication of the noise environment of the communications line between the DSL transceivers; in which the one or more parameters also comprise the indication of the noise environment. 15. The DSL controller of claim 12 comprising a processor for reconfiguring the first DSL transceiver to switch from use of a first DSL technology to use of the DSL technology selected, on the basis of the one or more parameters, for transfer of data between the DSL transceivers.
A method for selection of a digital subscriber line (DSL) technology for use by a first DSL transceiver in transferring data over a communications line between the first DSL transceiver and a second DSL transceiver. For the selection, an indication of attenuation in the communications line between the DSL transceivers is obtained and a DSL technology for use by the first DSL transceiver is selected from a plurality of DSL technologies supported by the first DSL transceiver. Selection of the DSL technology is determined on the basis of the indication of attenuation. Optionally, selection of the DSL technology may, in addition, be based on other parameters comprising an indication of the power spectral density mask limiting the power output onto the line by the DSL transceiver; an indication of the noise environment of the communications line; an indication of the highest discrete multitone modulation tone transmitted by the first DSL transceiver over the communications line.1. A method of selecting from a plurality of digital subscriber line (DSL) technologies supported by a first DSL transceiver, a DSL technology for use by the first DSL transceiver in transferring data over a communications line between the first DSL transceiver and a second DSL transceiver, the method comprising: obtaining an indication of attenuation in the communications line between the DSL transceivers; selecting from the plurality of DSL technologies, a DSL technology for use by the first DSL transceiver in transferring data over the communications line between the DSL transceivers; in which selection of the DSL technology is determined on the basis of one or more parameters; in which the one or more parameters comprise the indication of attenuation in the communications line between the DSL transceivers. 2. The method of claim 1 in which the power output onto the line by the DSL transceiver is limited by a power spectral density mask, in which the method comprises obtaining an indication of the power spectral density mask; in which the one or more parameters also comprise the indication of the power spectral density mask. 3. The method of claim 1 also comprising obtaining an indication of the noise environment of the communications line between the DSL transceivers; in which the one or more parameters also comprise the indication of the noise environment. 4. The method of claim 1, in which the noise environment of the communications line comprises an indication of noise impinging on the line. 5. The method of claim 1 also comprising obtaining an indication of the highest discrete multitone modulation (DMT) tone transmitted by the first DSL transceiver over the communications line between the DSL transceivers; in which the one or more parameters also comprise the indication of the highest frequency DMT tone. 6. The method of claim 1, in which the indication of attenuation is derived from at least one of H log, KL0, LATN and QLN. 7. The method of claim 1, in which the indication of attenuation is measured at the first DSL transceiver. 8. The method of claim 1 comprising reconfiguring the first DSL transceiver to switch from use of a first DSL technology to use of the DSL technology selected, on the basis of the one or more parameters, for transfer of data between the DSL transceivers. 9. The method of claim 8, in which the first DSL technology comprises one of G.Fast, VDSL2, ADSL, ADSL2 and ADSL2+. 10. The method of claim 1, in which the selected DSL technology comprises one of G.Fast, VDSL2, ADSL, ADSL2 and ADSL2+. 11. The method of claim 1, in which the DSL transceivers comprise a digital subscriber line access multiplexer modem and an end-user DSL modem. 12. A digital subscriber line (DSL) controller for controlling configuration of a first DSL transceiver so as to control selection, from a plurality of DSL technologies supported by the first DSL transceiver, of a DSL technology for use by the first DSL transceiver in transferring data over a communications line between the first DSL transceiver and a second DSL transceiver; in which the DSL controller comprises: a line interface for obtaining an indication of attenuation over the communications line between the DSL transceivers; a processor for selecting from the plurality of DSL technologies a DSL technology for transfer of data between the DSL transceivers; in which selection of the DSL technology is determined on the basis of one or more parameters; in which the one or more parameters comprise the indication of attenuation over the communications line between the DSL transceivers. 13. The DSL controller of claim 12, in which the power output onto the line by the first DSL transceiver is limited by a power spectral density mask; in which the DSL controller comprises a processor for obtaining an indication of the power spectral density mask; in which the one or more parameters also comprise the indication of the power spectral density mask. 14. The DSL controller of claim 12, also comprising a line monitor for obtaining an indication of the noise environment of the communications line between the DSL transceivers; in which the one or more parameters also comprise the indication of the noise environment. 15. The DSL controller of claim 12 comprising a processor for reconfiguring the first DSL transceiver to switch from use of a first DSL technology to use of the DSL technology selected, on the basis of the one or more parameters, for transfer of data between the DSL transceivers.
2,400
7,870
7,870
14,570,084
2,449
A method for injecting listener-selected content into an internet radio data stream supplied via an internet web site to a listener accessing the internet web site. The method comprises storing musical and non-musical content items in a data base, presenting the listener with a list of the content items, requesting the listener to select desired content items and streaming the desired content items to the listener.
1-22. (canceled) 23. A method for listener selection of musical selections for play back into an internet radio data stream supplied via an internet web site to the listener accessing the internet web site, the method comprising: (a) determining one or more qualitative elements and a qualitative element values for each qualitative element for a plurality of musical selections; (b) receiving listener-supplied quantitative elements; (c) creating a music playlist comprising musical selections that satisfy the listener-supplied quantitative elements and that have a qualitative element value above a predetermined threshold for each qualitative element; and (d) streaming musical selections from the playlist to the listener. 24. The method of claim 23 wherein the qualitative element values comprise a popularity indicator for the musical selection. 25. The method of claim 23 wherein step (a) is executed by a music professional resulting in a “pro rating” indicating an opinion of the musical professional as to the quality of a musical selection. 26. The method of claim 25 wherein the “pro rating” of a musical selection is updated over time. 27. The method of claim 23 wherein the musical selections selected at step (c) are further responsive to a popularity rating for each musical selection. 28. The method of claim 27 wherein the popular rating is updated over time. 29. The method of claim 23 wherein step (a) further comprises applying listener input to qualitative element values as determined by a music professional. 30. The method of claim 23 wherein step (c) further comprises selecting music selections according to a time spent listening to the internet radio data stream by the listener. 31. The method of claim 30 wherein for time spent listening values below a time spent listening threshold, musical selections are selected at step (c) without regard to time spent listening, and for time spent listening values above the time spent listening threshold the quantitative element values are responsive to the time spent listening value. 32. The method of claim 23 wherein the musical selections selected at step (c) are further responsive a category into which the musical selection fits. 33. The method of claim 32 wherein a category indicates a frequency with which a musical selection is to be played. 34. The method of claim 23 wherein quantitative elements comprise genre, era, popularity, label and frequency. 35. The method of claim 23 wherein a weight is supplied by the listener for each one of the listener-supplied quantitative elements. 36. The method of claim 23 wherein the listener-supplied quantitative element are selected and weighted by the listener, wherein the musical selections on the playlist created at step (d) are responsive to selected quantitative elements and a weight for each selected quantitative element. 37. A method for categorizing musical selections comprising: (a) determining, by a music professional, one or more qualitative element values and one or more quantitative element values of a plurality of musical selections, wherein the qualitative elements comprise at least an indicator of popularity of the musical selection; and (b) assigning a category to each one of the plurality of musical selections according to the results of step (a). 38. The method of claim 37 wherein a category indicates a frequency with which a musical selection is played. 39. The method of claim 37 further comprising building a playlist for a listener responsive to the category determined at step (b) and a listener-supplied quantitative element. 40. The method of claim 37 wherein a listener assists the music professional in executing step (a). 41. The method of claim 37 wherein step (b) further comprises assigning a category according to a time spent listening by a listener to a musical selection. 42. The method of claim 37 wherein quantitative element are related to genre, era, popularity, label and frequency.
A method for injecting listener-selected content into an internet radio data stream supplied via an internet web site to a listener accessing the internet web site. The method comprises storing musical and non-musical content items in a data base, presenting the listener with a list of the content items, requesting the listener to select desired content items and streaming the desired content items to the listener.1-22. (canceled) 23. A method for listener selection of musical selections for play back into an internet radio data stream supplied via an internet web site to the listener accessing the internet web site, the method comprising: (a) determining one or more qualitative elements and a qualitative element values for each qualitative element for a plurality of musical selections; (b) receiving listener-supplied quantitative elements; (c) creating a music playlist comprising musical selections that satisfy the listener-supplied quantitative elements and that have a qualitative element value above a predetermined threshold for each qualitative element; and (d) streaming musical selections from the playlist to the listener. 24. The method of claim 23 wherein the qualitative element values comprise a popularity indicator for the musical selection. 25. The method of claim 23 wherein step (a) is executed by a music professional resulting in a “pro rating” indicating an opinion of the musical professional as to the quality of a musical selection. 26. The method of claim 25 wherein the “pro rating” of a musical selection is updated over time. 27. The method of claim 23 wherein the musical selections selected at step (c) are further responsive to a popularity rating for each musical selection. 28. The method of claim 27 wherein the popular rating is updated over time. 29. The method of claim 23 wherein step (a) further comprises applying listener input to qualitative element values as determined by a music professional. 30. The method of claim 23 wherein step (c) further comprises selecting music selections according to a time spent listening to the internet radio data stream by the listener. 31. The method of claim 30 wherein for time spent listening values below a time spent listening threshold, musical selections are selected at step (c) without regard to time spent listening, and for time spent listening values above the time spent listening threshold the quantitative element values are responsive to the time spent listening value. 32. The method of claim 23 wherein the musical selections selected at step (c) are further responsive a category into which the musical selection fits. 33. The method of claim 32 wherein a category indicates a frequency with which a musical selection is to be played. 34. The method of claim 23 wherein quantitative elements comprise genre, era, popularity, label and frequency. 35. The method of claim 23 wherein a weight is supplied by the listener for each one of the listener-supplied quantitative elements. 36. The method of claim 23 wherein the listener-supplied quantitative element are selected and weighted by the listener, wherein the musical selections on the playlist created at step (d) are responsive to selected quantitative elements and a weight for each selected quantitative element. 37. A method for categorizing musical selections comprising: (a) determining, by a music professional, one or more qualitative element values and one or more quantitative element values of a plurality of musical selections, wherein the qualitative elements comprise at least an indicator of popularity of the musical selection; and (b) assigning a category to each one of the plurality of musical selections according to the results of step (a). 38. The method of claim 37 wherein a category indicates a frequency with which a musical selection is played. 39. The method of claim 37 further comprising building a playlist for a listener responsive to the category determined at step (b) and a listener-supplied quantitative element. 40. The method of claim 37 wherein a listener assists the music professional in executing step (a). 41. The method of claim 37 wherein step (b) further comprises assigning a category according to a time spent listening by a listener to a musical selection. 42. The method of claim 37 wherein quantitative element are related to genre, era, popularity, label and frequency.
2,400
7,871
7,871
15,134,440
2,482
A vision system of a vehicle includes a camera disposed at the vehicle and having a field of view exterior of the vehicle. The camera includes an imager and a processor that is operable to process image data captured by the imager. A video display screen is operable to display video images derived from image data captured by the camera. The processor generates a graphic overlay for display with the video images at the video display screen. The processor calibrates the graphic overlay by adapting the view orientation and position of the displayed video images utilizing a spatial transform engine to adapt the view orientation and position to a corrected position and orientation.
1. A vision system of a vehicle, said vision system comprising: a camera disposed at a vehicle and having a field of view exterior of the vehicle; wherein said camera comprises an imager having a pixelated imaging array having a plurality of photosensing elements; wherein said camera comprises a processor operable to process image data captured by said imager; a video display screen operable to display video images derived from image data captured by said imager; wherein said processor generates a graphic overlay for display with the video images at said video display screen; and wherein said processor calibrates the graphic overlay by adapting the view orientation and position of the displayed video images utilizing a spatial transform engine to adapt the view orientation and position to a corrected position and orientation. 2. The vision system of claim 1, wherein the processor calibrates the imager data by turning and distorting image data so that a horizon line is generally horizontal. 3. The vision system of claim 2, wherein the displayed video images are turned and distorted into the corrected position and orientation with the horizon line displayed as generally horizontal. 4. The vision system of claim 3, wherein, with the view orientation and position adapted to the corrected position and orientation, the graphic overlay matches the displayed images without need of changing graphic overlays. 5. The vision system of claim 1, wherein said camera comprises a rearward viewing camera disposed at a rear portion of the vehicle. 6. The vision system of claim 5, wherein the graphic overlay comprises a projected path of travel of the vehicle during a reversing maneuver of the vehicle when said video display screen is displaying video images captured by said rearward viewing camera. 7. The vision system of claim 1, wherein said processor runs the calibration within a companion chip under use of the frames of captured image data it receives from said imager. 8. The vision system of claim 1, wherein said processor uses a grid based optical model. 9. The vision system of claim 1, wherein the vehicle receives a standard spatial transform engine map at the end of line of the assembly line. 10. The vision system of claim 9, wherein the system adapts the spatial transform engine map over a runtime at or after the end of line. 11. A vision system of a vehicle, said vision system comprising: a rearward viewing camera disposed at a rear portion of a vehicle and having a field of view exterior and rearward of the vehicle; wherein said rearward viewing camera comprises an imager having a pixelated imaging array having a plurality of photosensing elements; wherein said rearward viewing camera comprises a companion chip having a processor operable to process image data captured by said imager; wherein said processor runs the calibration with use of the frames of captured image data it receives from said imager; a video display screen operable to display video images derived from image data captured by said imager; wherein said processor generates a graphic overlay for display with the video images at said video display screen; wherein the graphic overlay comprises a projected path of travel of the vehicle during a reversing maneuver of the vehicle when said video display screen is displaying video images captured by said rearward viewing camera; and wherein said processor calibrates the graphic overlay by adapting the view orientation and position of the displayed video images utilizing a spatial transform engine to adapt the view orientation and position to a corrected position and orientation. 12. The vision system of claim 11, wherein the processor calibrates the imager data by turning and distorting image data so that a horizon line is generally horizontal. 13. The vision system of claim 12, wherein the displayed video images are turned and distorted into the corrected position and orientation with the horizon line displayed as generally horizontal. 14. The vision system of claim 13, wherein, with the view orientation and position adapted to the corrected position and orientation, the graphic overlay matches the displayed images without need of changing graphic overlays. 15. The vision system of claim 11, wherein said processor uses a grid based optical model. 16. The vision system of claim 11, wherein the vehicle receives a standard spatial transform engine map at the end of line of the assembly line. 17. The vision system of claim 16, wherein the system adapts the spatial transform engine map over a runtime at or after the end of line. 18. A vision system of a vehicle, said vision system comprising: a rearward viewing camera disposed at a rear portion of a vehicle and having a field of view exterior and rearward of the vehicle; wherein said rearward viewing camera comprises an imager having a pixelated imaging array having a plurality of photosensing elements; wherein said rearward viewing camera comprises a processor operable to process image data captured by said imager; a video display screen operable to display video images derived from image data captured by said imager; wherein said processor generates a graphic overlay for display with the video images at said video display screen; wherein the graphic overlay comprises a projected path of travel of the vehicle during a reversing maneuver of the vehicle when said video display screen is displaying video images captured by said rearward viewing camera; wherein said processor calibrates the graphic overlay by adapting the view orientation and position of the displayed video images utilizing a spatial transform engine to adapt the view orientation and position to a corrected position and orientation; and wherein, with the view orientation and position adapted to the corrected position and orientation, the graphic overlay matches the displayed images without need of changing graphic overlays. 19. The vision system of claim 18, wherein the processor calibrates the imager data by turning and distorting image data so that a horizon line is generally horizontal, and wherein the displayed video images are turned and distorted into the corrected position and orientation with the horizon line displayed as generally horizontal. 20. The vision system of claim 18, wherein the vehicle receives a standard spatial transform engine map at the end of line of the assembly line, and wherein the system adapts the spatial transform engine map over a runtime at or after the end of line.
A vision system of a vehicle includes a camera disposed at the vehicle and having a field of view exterior of the vehicle. The camera includes an imager and a processor that is operable to process image data captured by the imager. A video display screen is operable to display video images derived from image data captured by the camera. The processor generates a graphic overlay for display with the video images at the video display screen. The processor calibrates the graphic overlay by adapting the view orientation and position of the displayed video images utilizing a spatial transform engine to adapt the view orientation and position to a corrected position and orientation.1. A vision system of a vehicle, said vision system comprising: a camera disposed at a vehicle and having a field of view exterior of the vehicle; wherein said camera comprises an imager having a pixelated imaging array having a plurality of photosensing elements; wherein said camera comprises a processor operable to process image data captured by said imager; a video display screen operable to display video images derived from image data captured by said imager; wherein said processor generates a graphic overlay for display with the video images at said video display screen; and wherein said processor calibrates the graphic overlay by adapting the view orientation and position of the displayed video images utilizing a spatial transform engine to adapt the view orientation and position to a corrected position and orientation. 2. The vision system of claim 1, wherein the processor calibrates the imager data by turning and distorting image data so that a horizon line is generally horizontal. 3. The vision system of claim 2, wherein the displayed video images are turned and distorted into the corrected position and orientation with the horizon line displayed as generally horizontal. 4. The vision system of claim 3, wherein, with the view orientation and position adapted to the corrected position and orientation, the graphic overlay matches the displayed images without need of changing graphic overlays. 5. The vision system of claim 1, wherein said camera comprises a rearward viewing camera disposed at a rear portion of the vehicle. 6. The vision system of claim 5, wherein the graphic overlay comprises a projected path of travel of the vehicle during a reversing maneuver of the vehicle when said video display screen is displaying video images captured by said rearward viewing camera. 7. The vision system of claim 1, wherein said processor runs the calibration within a companion chip under use of the frames of captured image data it receives from said imager. 8. The vision system of claim 1, wherein said processor uses a grid based optical model. 9. The vision system of claim 1, wherein the vehicle receives a standard spatial transform engine map at the end of line of the assembly line. 10. The vision system of claim 9, wherein the system adapts the spatial transform engine map over a runtime at or after the end of line. 11. A vision system of a vehicle, said vision system comprising: a rearward viewing camera disposed at a rear portion of a vehicle and having a field of view exterior and rearward of the vehicle; wherein said rearward viewing camera comprises an imager having a pixelated imaging array having a plurality of photosensing elements; wherein said rearward viewing camera comprises a companion chip having a processor operable to process image data captured by said imager; wherein said processor runs the calibration with use of the frames of captured image data it receives from said imager; a video display screen operable to display video images derived from image data captured by said imager; wherein said processor generates a graphic overlay for display with the video images at said video display screen; wherein the graphic overlay comprises a projected path of travel of the vehicle during a reversing maneuver of the vehicle when said video display screen is displaying video images captured by said rearward viewing camera; and wherein said processor calibrates the graphic overlay by adapting the view orientation and position of the displayed video images utilizing a spatial transform engine to adapt the view orientation and position to a corrected position and orientation. 12. The vision system of claim 11, wherein the processor calibrates the imager data by turning and distorting image data so that a horizon line is generally horizontal. 13. The vision system of claim 12, wherein the displayed video images are turned and distorted into the corrected position and orientation with the horizon line displayed as generally horizontal. 14. The vision system of claim 13, wherein, with the view orientation and position adapted to the corrected position and orientation, the graphic overlay matches the displayed images without need of changing graphic overlays. 15. The vision system of claim 11, wherein said processor uses a grid based optical model. 16. The vision system of claim 11, wherein the vehicle receives a standard spatial transform engine map at the end of line of the assembly line. 17. The vision system of claim 16, wherein the system adapts the spatial transform engine map over a runtime at or after the end of line. 18. A vision system of a vehicle, said vision system comprising: a rearward viewing camera disposed at a rear portion of a vehicle and having a field of view exterior and rearward of the vehicle; wherein said rearward viewing camera comprises an imager having a pixelated imaging array having a plurality of photosensing elements; wherein said rearward viewing camera comprises a processor operable to process image data captured by said imager; a video display screen operable to display video images derived from image data captured by said imager; wherein said processor generates a graphic overlay for display with the video images at said video display screen; wherein the graphic overlay comprises a projected path of travel of the vehicle during a reversing maneuver of the vehicle when said video display screen is displaying video images captured by said rearward viewing camera; wherein said processor calibrates the graphic overlay by adapting the view orientation and position of the displayed video images utilizing a spatial transform engine to adapt the view orientation and position to a corrected position and orientation; and wherein, with the view orientation and position adapted to the corrected position and orientation, the graphic overlay matches the displayed images without need of changing graphic overlays. 19. The vision system of claim 18, wherein the processor calibrates the imager data by turning and distorting image data so that a horizon line is generally horizontal, and wherein the displayed video images are turned and distorted into the corrected position and orientation with the horizon line displayed as generally horizontal. 20. The vision system of claim 18, wherein the vehicle receives a standard spatial transform engine map at the end of line of the assembly line, and wherein the system adapts the spatial transform engine map over a runtime at or after the end of line.
2,400
7,872
7,872
15,003,722
2,483
An electronic magnifier is provided. The electronic magnifier includes a camera capturing an image from a document or a picture; an image processing module configured to receive the captured image, magnify the captured image, and generate a composite video output including a magnified image based on the captured image; a USB converter module configured to receive the composite video output of the image processing module and convert the composite output to a USB output; and a WiFi converter module configured to receive the USB output from the USB converter module and convert the USB output to a WiFi output, such that the WiFi output can be received at a device having a display monitor and used by the device to display the magnified image on the display monitor.
1. An electronic magnifier comprising: a camera capturing an image from a document or a picture; an image processing module configured to receive the captured image, magnify the captured image, and generate a composite video output including a magnified image based on the captured image; a USB converter module configured to receive the composite video output of the image processing module and convert the composite output to a USB output; and a WiFi converter module configured to receive the USB output from the USB converter module and convert the USB output to a WiFi output, such that the WiFi output can be received at a device having a display monitor and used by the device to display the magnified image on the display monitor. 2. The electronic magnifier of claim 1, wherein the device includes a television, a display monitor, or a computing device. 3. The electronic magnifier of claim 2, wherein the device includes the computing device and the WiFi converter module includes: a dedicated URL associated with the video output, wherein the dedicated URL provides display of the magnified image via a browser of the computing device. 4. The electronic magnifier of claim 1, further comprising: a charging module including a battery for charging the electronic magnifier, wherein the charging module is configured to prevent battery from being overcharged; a plurality of control buttons, wherein at least one of the plurality of control button is configured to provide an input to the image processing module identifying an image mode for the magnified image; an LED light configured to provide light to the document or the picture; and a sliding switch configured to select an output type of the magnified image from the electronic magnifier. 5. The electronic magnifier of claim 4, wherein the image mode includes a colored image, a magnified black and white image, high contrast black and white image, or a negative high contrast black and white image. 6. The electronic magnifier of claim 4, wherein the output type selected by the sliding switch includes a composite video output, a USB output, and a WiFi output. 7. The electronic magnifier of claim 1, wherein the image processing module is configured to magnify the image based on one or more input signals provided by a user of the electronic magnifier via one or more buttons on the electronic magnifier. 8. The electronic magnifier of claim 1, wherein the image processing module includes an image sensor, and wherein the image sensor is a CMOS sensor or a CCD sensor. 9. A method for generating a magnified image by an electronic magnifier, the method comprising: generating light from a light source towards a document or a picture to be electronically magnified; capturing via a camera an image from the document or the picture based on the light reflected from the document or the picture; magnifying via an amplifier the captured image; generating a composite video signal from the magnified image; converting the composite video signal output to a USB output; converting the USB output to a WiFi output; and providing the composite video signal output, the USB output, and the WiFi output to a device capable of displaying the magnified image. 10. The method of claim 9, wherein the device includes a television, a display monitor, or a computing device. 11. The method of claim 10, wherein the device includes the computing device and converting the USB output to the WiFi output includes: defining a dedicated URL for the video output, wherein the dedicated URL provides display of the magnified image via a browser of the computing device; and wirelessly sending the WiFi output to the computing device with a 2.4 Gigahertz frequency. 12. The method of claim 9, further comprising: receiving one or more input from at least one of a plurality of control buttons of the electronic magnifier, wherein the one or more input identify an image mode for the magnified image, and wherein the magnifying of the image is based on the image mode. 13. The method of claim 12, wherein the image mode includes a colored image, a magnified black and white image, high contrast black and white image, or a negative high contrast black and white image. 14. The method of claim 9, further comprising: receiving an input identifying an output type, from a switch on the electronic magnifier, wherein the output type identifies one of the composite video output, the USB output, and the WiFi output for displaying on the device.
An electronic magnifier is provided. The electronic magnifier includes a camera capturing an image from a document or a picture; an image processing module configured to receive the captured image, magnify the captured image, and generate a composite video output including a magnified image based on the captured image; a USB converter module configured to receive the composite video output of the image processing module and convert the composite output to a USB output; and a WiFi converter module configured to receive the USB output from the USB converter module and convert the USB output to a WiFi output, such that the WiFi output can be received at a device having a display monitor and used by the device to display the magnified image on the display monitor.1. An electronic magnifier comprising: a camera capturing an image from a document or a picture; an image processing module configured to receive the captured image, magnify the captured image, and generate a composite video output including a magnified image based on the captured image; a USB converter module configured to receive the composite video output of the image processing module and convert the composite output to a USB output; and a WiFi converter module configured to receive the USB output from the USB converter module and convert the USB output to a WiFi output, such that the WiFi output can be received at a device having a display monitor and used by the device to display the magnified image on the display monitor. 2. The electronic magnifier of claim 1, wherein the device includes a television, a display monitor, or a computing device. 3. The electronic magnifier of claim 2, wherein the device includes the computing device and the WiFi converter module includes: a dedicated URL associated with the video output, wherein the dedicated URL provides display of the magnified image via a browser of the computing device. 4. The electronic magnifier of claim 1, further comprising: a charging module including a battery for charging the electronic magnifier, wherein the charging module is configured to prevent battery from being overcharged; a plurality of control buttons, wherein at least one of the plurality of control button is configured to provide an input to the image processing module identifying an image mode for the magnified image; an LED light configured to provide light to the document or the picture; and a sliding switch configured to select an output type of the magnified image from the electronic magnifier. 5. The electronic magnifier of claim 4, wherein the image mode includes a colored image, a magnified black and white image, high contrast black and white image, or a negative high contrast black and white image. 6. The electronic magnifier of claim 4, wherein the output type selected by the sliding switch includes a composite video output, a USB output, and a WiFi output. 7. The electronic magnifier of claim 1, wherein the image processing module is configured to magnify the image based on one or more input signals provided by a user of the electronic magnifier via one or more buttons on the electronic magnifier. 8. The electronic magnifier of claim 1, wherein the image processing module includes an image sensor, and wherein the image sensor is a CMOS sensor or a CCD sensor. 9. A method for generating a magnified image by an electronic magnifier, the method comprising: generating light from a light source towards a document or a picture to be electronically magnified; capturing via a camera an image from the document or the picture based on the light reflected from the document or the picture; magnifying via an amplifier the captured image; generating a composite video signal from the magnified image; converting the composite video signal output to a USB output; converting the USB output to a WiFi output; and providing the composite video signal output, the USB output, and the WiFi output to a device capable of displaying the magnified image. 10. The method of claim 9, wherein the device includes a television, a display monitor, or a computing device. 11. The method of claim 10, wherein the device includes the computing device and converting the USB output to the WiFi output includes: defining a dedicated URL for the video output, wherein the dedicated URL provides display of the magnified image via a browser of the computing device; and wirelessly sending the WiFi output to the computing device with a 2.4 Gigahertz frequency. 12. The method of claim 9, further comprising: receiving one or more input from at least one of a plurality of control buttons of the electronic magnifier, wherein the one or more input identify an image mode for the magnified image, and wherein the magnifying of the image is based on the image mode. 13. The method of claim 12, wherein the image mode includes a colored image, a magnified black and white image, high contrast black and white image, or a negative high contrast black and white image. 14. The method of claim 9, further comprising: receiving an input identifying an output type, from a switch on the electronic magnifier, wherein the output type identifies one of the composite video output, the USB output, and the WiFi output for displaying on the device.
2,400
7,873
7,873
15,256,216
2,414
A serial link interface unit includes serialized data stream interfaces configured to receive a serialized data stream having a data rate and set of timeslots; an aggregate serialized data stream interface configured to communicate an aggregate serialized data stream having aggregate data rate and plurality of aggregate timeslot sets each coming sequentially in time, wherein a second aggregate timeslot set comes after a first aggregate timeslot set; and wherein the serial link interface unit interleaves data from the different serialized data streams received at the plurality of first interfaces by mapping data from a first timeslot from each different serialized data stream to the first aggregate timeslot set in the aggregate serialized data stream and mapping data from a second timeslot from each different serialized data stream to the second aggregate timeslot set in the aggregate serialized data stream.
1. A summing unit within a telecommunication system, the summing unit comprising: at least one port configured to receive first multiplexed digital data from a multiplexing unit, the multiplexed digital data including first digital data from a first device multiplexed with second digital data; and at least one summer function configured to sum the first digital data with other digital data to generate summed digital data for conversion to radio frequency signals and transmission at an antenna. 2. The summing unit of claim 1, further comprising: at least a second port configured to receive the other digital data from another device. 3. The summing unit of claim 1, further comprising at least a second port configured to transmit the summed digital data to a remote antenna unit, the remote antenna unit configured to convert at least a portion of the summed digital data into the radio frequency signals within at least one radio frequency band, the remote antenna unit further configured to transmit the radio frequency signals within the at least one radio frequency band from an antenna of a remote unit to at least one subscriber unit. 4. The summing unit of claim 1, wherein the second digital data is from a second device. 5. The summing unit of claim 1, wherein the multiplexing unit is configured to generate the multiplexed digital data by multiplexing the first digital data from the first device with the second digital data. 6. The summing unit of claim 1, wherein an Ethernet switch is positioned within a signal path between the first device and the summing unit. 7. The summing unit of claim 1, wherein the summing unit is remotely located from the multiplexing unit. 8. The summing unit of claim 1, wherein the telecommunications system is a distributed antenna system. 9. A method for communication within a telecommunication system, the method comprising: receiving first multiplexed digital data at a summing unit from a multiplexing unit, the first multiplexed digital data including first digital data from a first device multiplexed with second digital data; and summing the first digital data with other digital data at the summing unit to generate summed digital data for conversion to radio frequency signals and transmission at an antenna. 10. The method of claim 9, further comprising: receiving the other digital data from at the summing unit from another device. 11. The method of claim 9, further comprising: converting at least a portion of the summed digital data into the radio frequency signals within at least one radio frequency band at a remote unit; and transmitting the radio frequency signals within the at least one radio frequency band from an antenna of a remote unit to at least one subscriber unit. 12. The method of claim 9, wherein the second digital data is from a second device. 13. The method of claim 9, wherein the summing unit is remotely located from the multiplexing unit. 14. The method of claim 9, wherein the telecommunications system is a distributed antenna system. 15. A multiplexing unit within a telecommunication system, the multiplexing unit comprising: at least a first port configured to receive first digital data from a first device; at least a second port configured to receive second digital data from a second device; at least one multiplexing function configured to multiplex the first digital data with the second digital data to generate multiplexed digital data; at least a third port configured to transmit the multiplexed digital data to a summing unit, the summing unit configured to receive the multiplexed digital data and to sum the first digital data from the multiplexed digital data with other digital data to generate summed digital data for conversion to radio frequency signals and transmission at an antenna. 16. The multiplexing unit of claim 15, further comprising: wherein the first device is a first network interface configured to receive first signals from at least a first external device external to the telecommunications system and to convert the first signals to the first digital data. 17. The multiplexing unit of claim 16, further comprising: wherein the second device is a second network interface configured to receive second signals from at least a second external device external to the telecommunications system and to convert the second signals to the second digital data. 18. The multiplexing unit of claim 15, wherein the multiplexing unit is remotely located from the summing unit. 19. The multiplexing unit of claim 15, wherein the telecommunications system is a distributed antenna system. 20. A telecommunications system comprising: a multiplexing unit; and a summing unit; wherein the multiplexing unit includes: at least a first port configured to receive first digital data from a first device; at least one multiplexing function configured to multiplex the first digital data with second digital data to generate multiplexed digital data; at least a third port configured to transmit the multiplexed digital data to the summing unit; wherein the summing unit includes: at least one port configured to receive first multiplexed digital data from the multiplexing unit; and at least one summer function configured to sum the first digital data with other digital data to generate summed digital data for conversion to radio frequency signals and transmission at an antenna. 21. The telecommunications system of claim 20, further comprising: wherein the first device is a first network interface configured to receive first signals from at least a first external device external to the telecommunications system and to convert the first signals to the first digital data. 22. The telecommunications system of claim 20, wherein the multiplexing unit further includes: at least a second port configured to receive the second digital data from a second device. 23. The telecommunications system of claim 22, further comprising: wherein the first device is a first network interface configured to receive first signals from at least a first external device external to the telecommunications system and to convert the first signals to the first digital data. wherein the second device is a second network interface configured to receive second signals from at least a second external device external to the telecommunications system and to convert the second signals to the second digital data. 24. The telecommunications system of claim 20, wherein the summing unit further includes: at least a second port configured to receive the other digital data from another device. 25. The telecommunications system of claim 20, wherein the summing unit further includes: at least a second port configured to transmit the summed digital data to a remote antenna unit, the remote antenna unit configured to convert at least a portion of the summed digital data into the radio frequency signals within at least one radio frequency band, the remote antenna unit further configured to transmit the radio frequency signals within the at least one radio frequency band from an antenna of a remote unit to at least one subscriber unit. 26. The telecommunications system of claim 20, further comprising an Ethernet switch positioned within a signal path between the first device and the summing unit. 27. The telecommunications system of claim 20, wherein the multiplexing unit is remotely located from the summing unit. 28. The telecommunications system of claim 20, wherein the telecommunications system is a distributed antenna system. 29. A method for communication within a telecommunication system, the method comprising: receiving first digital data from a first device at a first port of a multiplexing unit; receiving second digital data from a second device at a second port of the multiplexing unit; multiplexing the first digital data with the second digital data at the multiplexing unit to generate multiplexed digital data; transmitting the multiplexed digital data to a summing unit from the multiplexing unit to the summing unit; and summing the first digital data with other digital data at the summing unit to generate summed digital data for conversion to radio frequency signals and transmission at an antenna. 30. The method of claim 29, further comprising: receiving first signals at the first device from at least a first external device external to the telecommunications system; and converting the first signals to the first digital data at the first device. 31. The method of claim 29, further comprising: receiving first signals at the first device from at least a first external device external to the telecommunications system; converting the first signals to the first digital data at the first device; receiving second signals at the second device from at least a second external device external to the telecommunications system; and converting the second signals to the second digital data at the second device. 32. The method of claim 29, further comprising: receiving the other digital data from another device at the summing unit. 33. The method of claim 29, further comprising: transmitting the summed digital data from the summing unit to a remote antenna unit; converting at least a portion of the summed digital data into the radio frequency signals within at least one radio frequency band at the remote antenna unit; and transmitting the radio frequency signals within the at least one radio frequency band from an antenna of the remote antenna unit to at least one subscriber unit. 34. The method of claim 29, further comprising: performing Ethernet switching within a signal path between the first device and the summing unit. 35. The method of claim 29, wherein the multiplexing unit is remotely located from the summing unit. 36. The method unit of claim 29, wherein the telecommunications system is a distributed antenna system. 37. A telecommunications system comprising: a first network interface configured to receive first signals from a first external device external to the telecommunications system, the first network interface configured to convert the first signals into first data; a second network interface configured to receive second signals from a second external device external to the telecommunications system, the second network interface configured to convert the second signals into second data; a first unit communicatively coupled to the first network interface by a first digital communication link and to the second network interface by a second digital communication link, the first unit configured to receive the first data from the first network interface and the second data from the second network interface, the first unit further configured to multiplex at least portions of the first data and the second data into first multiplexed data; and a second unit communicatively coupled to first unit by at least a second digital communication link, the second unit configured to receive the first multiplexed data from the first unit, the second unit further configured to digitally sum at least a portion of the first data from the first multiplexed data with other data to create summed data. 38. The telecommunication system of claim 37, wherein the other data is received from a third unit communicatively coupled to the second unit by at least a third digital communication link. 39. The telecommunication system of claim 37, further comprising: a remote antenna unit communicatively coupled to the second unit by at least a third digital communication link, the remote antenna unit configured to receive the summed data across the third digital communication link; and the remote antenna unit having at least one radio frequency converter configured to convert at least a portion of the summed data into radio frequency signals in at least one radio frequency band and at least one radio frequency transceiver and antenna pair configured to transmit the radio frequency signals in the at least one radio frequency band to at least one subscriber unit. 40. The telecommunication system of claim 39, wherein the remote antenna unit includes a plurality of radio frequency converters and a plurality of radio frequency transceiver and antenna pairs; wherein each radio frequency converter of the plurality of radio frequency converters is configured to convert different summed data into different corresponding radio frequency signals in different corresponding radio frequency bands; and wherein each radio frequency transceiver and antenna pair is configured to transmit the different corresponding radio frequency signals in the different corresponding radio frequency bands to at least one subscriber unit. 41. The telecommunication system of claim 39, wherein the first external device is a base station, wherein the first network interface is configured to receive the first signals in the at least one radio frequency band from the base station and to convert the first signals in the at least one radio frequency band to the first data. 42. The telecommunication system of claim 37, wherein the first network interface is an Ethernet network interface. 43. The telecommunication system of claim 42, wherein the Ethernet interface is communicatively coupled to an internet protocol network, the first network interface configured to receive Ethernet frames from the internet protocol network and to convert the Ethernet frames to the first data. 44. The telecommunication system of claim 42, further comprising: an Ethernet switch positioned within a signal path between the Ethernet network interface and the second unit. 45. The telecommunication system of claim 37, wherein the first network interface is a Common Public Radio Interface (CPRI) converter interface, wherein the first network interface is communicatively coupled to a CPRI base station, the CPRI converter interface configured to receive CPRI data from the CPRI base station, the CPRI converter interface further configured to convert the CPRI data into the first data stream. 46. The telecommunication system of claim 37, wherein the telecommunications system is a distributed antenna system. 47. A method of communication within a telecommunications system, the method comprising: receiving first signals from a first external device external to the telecommunications system at a first network interface of the telecommunications system; converting the first signals into first data at the first network interface; receiving second signals from a second external device external to the telecommunications system at a second network interface of the telecommunications system; converting the second signals into second data at the second network interface; communicating the first data from the first network interface to a first unit of the telecommunications system; communicating the second data from the second network interface to the first unit; multiplexing at least portions of the first data and the second data into first multiplexed data at the first unit; communicating the first multiplexed data from the first unit to a second unit of the telecommunications system; digitally summing at least a portion of the first data with other data to create summed data. 48. The method of claim 47, further comprising: receiving the other data from a third unit communicatively coupled to the second unit. 49. The method of claim 47, further comprising: communicating the summed data from the second unit to a remote unit of the telecommunications system; converting at least a portion of the summed data into radio frequency signals in at least one radio frequency band at the remote unit; and transmitting the radio frequency signals to at least one subscriber unit using an antenna at the remote unit. 50. The method of claim 47, further comprising: wherein the first external device is a base station; wherein receiving the first signals from the first external device at the first device interface includes receiving the first signals in the at least one radio frequency band from the base station at the first device; and wherein converting the first signals into the first data at the first network interface includes converting the first signals in the at least one radio frequency band to the first data. 51. The method of claim 47, wherein the first network interface is an Ethernet network interface. 52. The method of claim 51, further comprising: wherein the Ethernet interface is communicatively coupled to an internet protocol network; wherein receiving the first signals from the first external device at the first device interface includes receiving Ethernet frames from the internet protocol network; and wherein converting the first signals into the first data at the first network interface includes converting the Ethernet frames to the first data. 53. The method of claim 52, further comprising: an Ethernet switch positioned within a signal path between the Ethernet network interface and the second unit. 54. The method of claim 47, further comprising: wherein the first network interface is a Common Public Radio Interface (CPRI) converter interface; wherein receiving the first signals form the first external device includes receiving CPRI data from the CPRI base station; and wherein converting the first signals into the first data at the first network interface includes converting the CPRI data into the first data. 55. The method of claim 47, wherein the telecommunications system is a distributed antenna system.
A serial link interface unit includes serialized data stream interfaces configured to receive a serialized data stream having a data rate and set of timeslots; an aggregate serialized data stream interface configured to communicate an aggregate serialized data stream having aggregate data rate and plurality of aggregate timeslot sets each coming sequentially in time, wherein a second aggregate timeslot set comes after a first aggregate timeslot set; and wherein the serial link interface unit interleaves data from the different serialized data streams received at the plurality of first interfaces by mapping data from a first timeslot from each different serialized data stream to the first aggregate timeslot set in the aggregate serialized data stream and mapping data from a second timeslot from each different serialized data stream to the second aggregate timeslot set in the aggregate serialized data stream.1. A summing unit within a telecommunication system, the summing unit comprising: at least one port configured to receive first multiplexed digital data from a multiplexing unit, the multiplexed digital data including first digital data from a first device multiplexed with second digital data; and at least one summer function configured to sum the first digital data with other digital data to generate summed digital data for conversion to radio frequency signals and transmission at an antenna. 2. The summing unit of claim 1, further comprising: at least a second port configured to receive the other digital data from another device. 3. The summing unit of claim 1, further comprising at least a second port configured to transmit the summed digital data to a remote antenna unit, the remote antenna unit configured to convert at least a portion of the summed digital data into the radio frequency signals within at least one radio frequency band, the remote antenna unit further configured to transmit the radio frequency signals within the at least one radio frequency band from an antenna of a remote unit to at least one subscriber unit. 4. The summing unit of claim 1, wherein the second digital data is from a second device. 5. The summing unit of claim 1, wherein the multiplexing unit is configured to generate the multiplexed digital data by multiplexing the first digital data from the first device with the second digital data. 6. The summing unit of claim 1, wherein an Ethernet switch is positioned within a signal path between the first device and the summing unit. 7. The summing unit of claim 1, wherein the summing unit is remotely located from the multiplexing unit. 8. The summing unit of claim 1, wherein the telecommunications system is a distributed antenna system. 9. A method for communication within a telecommunication system, the method comprising: receiving first multiplexed digital data at a summing unit from a multiplexing unit, the first multiplexed digital data including first digital data from a first device multiplexed with second digital data; and summing the first digital data with other digital data at the summing unit to generate summed digital data for conversion to radio frequency signals and transmission at an antenna. 10. The method of claim 9, further comprising: receiving the other digital data from at the summing unit from another device. 11. The method of claim 9, further comprising: converting at least a portion of the summed digital data into the radio frequency signals within at least one radio frequency band at a remote unit; and transmitting the radio frequency signals within the at least one radio frequency band from an antenna of a remote unit to at least one subscriber unit. 12. The method of claim 9, wherein the second digital data is from a second device. 13. The method of claim 9, wherein the summing unit is remotely located from the multiplexing unit. 14. The method of claim 9, wherein the telecommunications system is a distributed antenna system. 15. A multiplexing unit within a telecommunication system, the multiplexing unit comprising: at least a first port configured to receive first digital data from a first device; at least a second port configured to receive second digital data from a second device; at least one multiplexing function configured to multiplex the first digital data with the second digital data to generate multiplexed digital data; at least a third port configured to transmit the multiplexed digital data to a summing unit, the summing unit configured to receive the multiplexed digital data and to sum the first digital data from the multiplexed digital data with other digital data to generate summed digital data for conversion to radio frequency signals and transmission at an antenna. 16. The multiplexing unit of claim 15, further comprising: wherein the first device is a first network interface configured to receive first signals from at least a first external device external to the telecommunications system and to convert the first signals to the first digital data. 17. The multiplexing unit of claim 16, further comprising: wherein the second device is a second network interface configured to receive second signals from at least a second external device external to the telecommunications system and to convert the second signals to the second digital data. 18. The multiplexing unit of claim 15, wherein the multiplexing unit is remotely located from the summing unit. 19. The multiplexing unit of claim 15, wherein the telecommunications system is a distributed antenna system. 20. A telecommunications system comprising: a multiplexing unit; and a summing unit; wherein the multiplexing unit includes: at least a first port configured to receive first digital data from a first device; at least one multiplexing function configured to multiplex the first digital data with second digital data to generate multiplexed digital data; at least a third port configured to transmit the multiplexed digital data to the summing unit; wherein the summing unit includes: at least one port configured to receive first multiplexed digital data from the multiplexing unit; and at least one summer function configured to sum the first digital data with other digital data to generate summed digital data for conversion to radio frequency signals and transmission at an antenna. 21. The telecommunications system of claim 20, further comprising: wherein the first device is a first network interface configured to receive first signals from at least a first external device external to the telecommunications system and to convert the first signals to the first digital data. 22. The telecommunications system of claim 20, wherein the multiplexing unit further includes: at least a second port configured to receive the second digital data from a second device. 23. The telecommunications system of claim 22, further comprising: wherein the first device is a first network interface configured to receive first signals from at least a first external device external to the telecommunications system and to convert the first signals to the first digital data. wherein the second device is a second network interface configured to receive second signals from at least a second external device external to the telecommunications system and to convert the second signals to the second digital data. 24. The telecommunications system of claim 20, wherein the summing unit further includes: at least a second port configured to receive the other digital data from another device. 25. The telecommunications system of claim 20, wherein the summing unit further includes: at least a second port configured to transmit the summed digital data to a remote antenna unit, the remote antenna unit configured to convert at least a portion of the summed digital data into the radio frequency signals within at least one radio frequency band, the remote antenna unit further configured to transmit the radio frequency signals within the at least one radio frequency band from an antenna of a remote unit to at least one subscriber unit. 26. The telecommunications system of claim 20, further comprising an Ethernet switch positioned within a signal path between the first device and the summing unit. 27. The telecommunications system of claim 20, wherein the multiplexing unit is remotely located from the summing unit. 28. The telecommunications system of claim 20, wherein the telecommunications system is a distributed antenna system. 29. A method for communication within a telecommunication system, the method comprising: receiving first digital data from a first device at a first port of a multiplexing unit; receiving second digital data from a second device at a second port of the multiplexing unit; multiplexing the first digital data with the second digital data at the multiplexing unit to generate multiplexed digital data; transmitting the multiplexed digital data to a summing unit from the multiplexing unit to the summing unit; and summing the first digital data with other digital data at the summing unit to generate summed digital data for conversion to radio frequency signals and transmission at an antenna. 30. The method of claim 29, further comprising: receiving first signals at the first device from at least a first external device external to the telecommunications system; and converting the first signals to the first digital data at the first device. 31. The method of claim 29, further comprising: receiving first signals at the first device from at least a first external device external to the telecommunications system; converting the first signals to the first digital data at the first device; receiving second signals at the second device from at least a second external device external to the telecommunications system; and converting the second signals to the second digital data at the second device. 32. The method of claim 29, further comprising: receiving the other digital data from another device at the summing unit. 33. The method of claim 29, further comprising: transmitting the summed digital data from the summing unit to a remote antenna unit; converting at least a portion of the summed digital data into the radio frequency signals within at least one radio frequency band at the remote antenna unit; and transmitting the radio frequency signals within the at least one radio frequency band from an antenna of the remote antenna unit to at least one subscriber unit. 34. The method of claim 29, further comprising: performing Ethernet switching within a signal path between the first device and the summing unit. 35. The method of claim 29, wherein the multiplexing unit is remotely located from the summing unit. 36. The method unit of claim 29, wherein the telecommunications system is a distributed antenna system. 37. A telecommunications system comprising: a first network interface configured to receive first signals from a first external device external to the telecommunications system, the first network interface configured to convert the first signals into first data; a second network interface configured to receive second signals from a second external device external to the telecommunications system, the second network interface configured to convert the second signals into second data; a first unit communicatively coupled to the first network interface by a first digital communication link and to the second network interface by a second digital communication link, the first unit configured to receive the first data from the first network interface and the second data from the second network interface, the first unit further configured to multiplex at least portions of the first data and the second data into first multiplexed data; and a second unit communicatively coupled to first unit by at least a second digital communication link, the second unit configured to receive the first multiplexed data from the first unit, the second unit further configured to digitally sum at least a portion of the first data from the first multiplexed data with other data to create summed data. 38. The telecommunication system of claim 37, wherein the other data is received from a third unit communicatively coupled to the second unit by at least a third digital communication link. 39. The telecommunication system of claim 37, further comprising: a remote antenna unit communicatively coupled to the second unit by at least a third digital communication link, the remote antenna unit configured to receive the summed data across the third digital communication link; and the remote antenna unit having at least one radio frequency converter configured to convert at least a portion of the summed data into radio frequency signals in at least one radio frequency band and at least one radio frequency transceiver and antenna pair configured to transmit the radio frequency signals in the at least one radio frequency band to at least one subscriber unit. 40. The telecommunication system of claim 39, wherein the remote antenna unit includes a plurality of radio frequency converters and a plurality of radio frequency transceiver and antenna pairs; wherein each radio frequency converter of the plurality of radio frequency converters is configured to convert different summed data into different corresponding radio frequency signals in different corresponding radio frequency bands; and wherein each radio frequency transceiver and antenna pair is configured to transmit the different corresponding radio frequency signals in the different corresponding radio frequency bands to at least one subscriber unit. 41. The telecommunication system of claim 39, wherein the first external device is a base station, wherein the first network interface is configured to receive the first signals in the at least one radio frequency band from the base station and to convert the first signals in the at least one radio frequency band to the first data. 42. The telecommunication system of claim 37, wherein the first network interface is an Ethernet network interface. 43. The telecommunication system of claim 42, wherein the Ethernet interface is communicatively coupled to an internet protocol network, the first network interface configured to receive Ethernet frames from the internet protocol network and to convert the Ethernet frames to the first data. 44. The telecommunication system of claim 42, further comprising: an Ethernet switch positioned within a signal path between the Ethernet network interface and the second unit. 45. The telecommunication system of claim 37, wherein the first network interface is a Common Public Radio Interface (CPRI) converter interface, wherein the first network interface is communicatively coupled to a CPRI base station, the CPRI converter interface configured to receive CPRI data from the CPRI base station, the CPRI converter interface further configured to convert the CPRI data into the first data stream. 46. The telecommunication system of claim 37, wherein the telecommunications system is a distributed antenna system. 47. A method of communication within a telecommunications system, the method comprising: receiving first signals from a first external device external to the telecommunications system at a first network interface of the telecommunications system; converting the first signals into first data at the first network interface; receiving second signals from a second external device external to the telecommunications system at a second network interface of the telecommunications system; converting the second signals into second data at the second network interface; communicating the first data from the first network interface to a first unit of the telecommunications system; communicating the second data from the second network interface to the first unit; multiplexing at least portions of the first data and the second data into first multiplexed data at the first unit; communicating the first multiplexed data from the first unit to a second unit of the telecommunications system; digitally summing at least a portion of the first data with other data to create summed data. 48. The method of claim 47, further comprising: receiving the other data from a third unit communicatively coupled to the second unit. 49. The method of claim 47, further comprising: communicating the summed data from the second unit to a remote unit of the telecommunications system; converting at least a portion of the summed data into radio frequency signals in at least one radio frequency band at the remote unit; and transmitting the radio frequency signals to at least one subscriber unit using an antenna at the remote unit. 50. The method of claim 47, further comprising: wherein the first external device is a base station; wherein receiving the first signals from the first external device at the first device interface includes receiving the first signals in the at least one radio frequency band from the base station at the first device; and wherein converting the first signals into the first data at the first network interface includes converting the first signals in the at least one radio frequency band to the first data. 51. The method of claim 47, wherein the first network interface is an Ethernet network interface. 52. The method of claim 51, further comprising: wherein the Ethernet interface is communicatively coupled to an internet protocol network; wherein receiving the first signals from the first external device at the first device interface includes receiving Ethernet frames from the internet protocol network; and wherein converting the first signals into the first data at the first network interface includes converting the Ethernet frames to the first data. 53. The method of claim 52, further comprising: an Ethernet switch positioned within a signal path between the Ethernet network interface and the second unit. 54. The method of claim 47, further comprising: wherein the first network interface is a Common Public Radio Interface (CPRI) converter interface; wherein receiving the first signals form the first external device includes receiving CPRI data from the CPRI base station; and wherein converting the first signals into the first data at the first network interface includes converting the CPRI data into the first data. 55. The method of claim 47, wherein the telecommunications system is a distributed antenna system.
2,400
7,874
7,874
14,721,783
2,446
A communication device gets a widget resource Uniform Resource Identifier (URI) from the network. The widget resource URI is used by the communication device to get a widget (i.e., a graphical user interface object) of a networked application that is displayed on the communication device. In response to getting the widget resource URI, the communication device downloads a context document from the widget resource URI. The context document defines the widget or a location of a widget document that defines the widget for use in the communication device. The communication device identifies an attachment point for the widget (i.e., a place to display the widget) that is associated with an activation of a device object (e.g., a window). The communication device determines that the attachment point is within a scope. In response to determining that attachment point is within the scope, the widget is displayed on the communication device.
1. A method comprising: getting a widget resource Uniform Resource Identifier (URI) for a communication device, wherein the widget resource URI is located in a network; and in response to getting the widget resource URI for the communication device, the communication device downloading a context document from the widget resource URI, wherein the context document defines a widget or a location of a widget document that defines the widget, for use in the communication device, and wherein the widget communicates with a corresponding network application. 2. The method of claim 1, further comprising: identifying an attachment point for the widget, wherein the attachment point for the widget is associated with an activation of a device object; determining that the attachment point is within a scope; and in response to determining that attachment point is within the scope, displaying the widget on the communication device. 3. The method of claim 1, wherein the attachment point is at least one of the following: a voice call, a video call, a home screen, a contact, a call log, a menu, a feature list, an instant message, and an email. 4. The method of claim 1, further comprising sending a state of the widget to the network application. 5. The method of claim 1, wherein the communication device is unaware of semantics of the network application. 6. The method of claim 1, wherein the context document has a resource tree that defines a plurality of network applications that use a plurality of widgets. 7. The method of claim 6, wherein the resource tree identifies a location of a widget document for each of the plurality of network applications. 8. The method of claim 7 wherein the widget document identifies an address to a get the widget. 9. The method of claim 8, wherein the widget document is fetched from a Hyper Text Transport Protocol (HTTP) server at the address using a HTTP GET or by using WebSockets. 10. The method of claim 1, further comprising: monitoring the widget resource URI using a SIP http-monitor event for a change in the context document; and receiving a SIP notify message that includes an updated context document. 11. The method of claim 1, wherein the corresponding network application can dynamically register the widget in a URI registry. 12. The method of claim 1, wherein the widget is one of a graphical widget, a sound widget, and a vibration widget. 13. A communication device comprising: a resource manager that gets a widget resource Uniform Resource Identifier (URI) for the communication device, wherein the widget resource URI is located in a network; and a download module that downloads a context document from the widget resource URI in response to getting the widget resource URI for the communication device, wherein the context document defines a widget or a location of a widget document that defines the widget, for use in the communication device, and wherein the widget communicates with a corresponding network application. 14. The communication device of claim 13, further comprising a widget management module that identifies an attachment point for the widget, wherein the attachment point for the widget is associated with an activation of a device object, determines that the attachment point is within a scope, and displays the widget on the communication device in response to determining that attachment point is within the scope. 15. The communication device of claim 13, wherein the widget management module sends a state of the widget to the network application. 16. The communication device of claim 13, wherein the communication device is unaware of semantics of the network application. 17. The communication device of claim 13, wherein the context document has a resource tree that defines a plurality of network applications that use a plurality of widgets. 18. The communication device of claim 18, wherein the resource tree identifies a location of a widget document for each of the plurality of network applications and wherein the widget document identifies an address to a get the widget. 19. The communication device of claim 13, wherein: the resource module monitors the widget resource URI using a SIP http-monitor event for a change in the context document and receiving a SIP notify message that includes an updated context document. 20. A non-transitory computer readable medium having stored thereon instructions that, when executed, cause a processor to perform a method, the instructions comprising: instructions to get a widget resource Uniform Resource Identifier (URI) for a communication device, wherein the widget resource URI is located in a network; and in response to getting the widget resource URI for the communication device, instructions to download a context document from the widget resource URI, wherein the context document defines a widget or a location of a widget document that defines the widget, for use in the communication device, and wherein the widget communicates with a corresponding network application.
A communication device gets a widget resource Uniform Resource Identifier (URI) from the network. The widget resource URI is used by the communication device to get a widget (i.e., a graphical user interface object) of a networked application that is displayed on the communication device. In response to getting the widget resource URI, the communication device downloads a context document from the widget resource URI. The context document defines the widget or a location of a widget document that defines the widget for use in the communication device. The communication device identifies an attachment point for the widget (i.e., a place to display the widget) that is associated with an activation of a device object (e.g., a window). The communication device determines that the attachment point is within a scope. In response to determining that attachment point is within the scope, the widget is displayed on the communication device.1. A method comprising: getting a widget resource Uniform Resource Identifier (URI) for a communication device, wherein the widget resource URI is located in a network; and in response to getting the widget resource URI for the communication device, the communication device downloading a context document from the widget resource URI, wherein the context document defines a widget or a location of a widget document that defines the widget, for use in the communication device, and wherein the widget communicates with a corresponding network application. 2. The method of claim 1, further comprising: identifying an attachment point for the widget, wherein the attachment point for the widget is associated with an activation of a device object; determining that the attachment point is within a scope; and in response to determining that attachment point is within the scope, displaying the widget on the communication device. 3. The method of claim 1, wherein the attachment point is at least one of the following: a voice call, a video call, a home screen, a contact, a call log, a menu, a feature list, an instant message, and an email. 4. The method of claim 1, further comprising sending a state of the widget to the network application. 5. The method of claim 1, wherein the communication device is unaware of semantics of the network application. 6. The method of claim 1, wherein the context document has a resource tree that defines a plurality of network applications that use a plurality of widgets. 7. The method of claim 6, wherein the resource tree identifies a location of a widget document for each of the plurality of network applications. 8. The method of claim 7 wherein the widget document identifies an address to a get the widget. 9. The method of claim 8, wherein the widget document is fetched from a Hyper Text Transport Protocol (HTTP) server at the address using a HTTP GET or by using WebSockets. 10. The method of claim 1, further comprising: monitoring the widget resource URI using a SIP http-monitor event for a change in the context document; and receiving a SIP notify message that includes an updated context document. 11. The method of claim 1, wherein the corresponding network application can dynamically register the widget in a URI registry. 12. The method of claim 1, wherein the widget is one of a graphical widget, a sound widget, and a vibration widget. 13. A communication device comprising: a resource manager that gets a widget resource Uniform Resource Identifier (URI) for the communication device, wherein the widget resource URI is located in a network; and a download module that downloads a context document from the widget resource URI in response to getting the widget resource URI for the communication device, wherein the context document defines a widget or a location of a widget document that defines the widget, for use in the communication device, and wherein the widget communicates with a corresponding network application. 14. The communication device of claim 13, further comprising a widget management module that identifies an attachment point for the widget, wherein the attachment point for the widget is associated with an activation of a device object, determines that the attachment point is within a scope, and displays the widget on the communication device in response to determining that attachment point is within the scope. 15. The communication device of claim 13, wherein the widget management module sends a state of the widget to the network application. 16. The communication device of claim 13, wherein the communication device is unaware of semantics of the network application. 17. The communication device of claim 13, wherein the context document has a resource tree that defines a plurality of network applications that use a plurality of widgets. 18. The communication device of claim 18, wherein the resource tree identifies a location of a widget document for each of the plurality of network applications and wherein the widget document identifies an address to a get the widget. 19. The communication device of claim 13, wherein: the resource module monitors the widget resource URI using a SIP http-monitor event for a change in the context document and receiving a SIP notify message that includes an updated context document. 20. A non-transitory computer readable medium having stored thereon instructions that, when executed, cause a processor to perform a method, the instructions comprising: instructions to get a widget resource Uniform Resource Identifier (URI) for a communication device, wherein the widget resource URI is located in a network; and in response to getting the widget resource URI for the communication device, instructions to download a context document from the widget resource URI, wherein the context document defines a widget or a location of a widget document that defines the widget, for use in the communication device, and wherein the widget communicates with a corresponding network application.
2,400
7,875
7,875
14,997,560
2,485
A camera system for use in a mobile handheld computing and communication device with a front side with a display screen and a back side has two separate and independent cameras positioned on the back side of the device, wherein the cameras have a physical separation between them of substantially the same separation as between the eyes on a human face and, wherein the camera system creates a 3D-Like image of an object for storage and for viewing on a display screen.
1. An apparatus for a camera system for use in a mobile handheld wireless device of a type of a smart phone and a tablet computer, with a front side with a display screen and a back side, comprising: (a) the device is a mobile handheld wireless communication and computing device with a processor, a memory and an operating system and with a depth not exceeding half an inch, the device has a camera system with two separate and independent cameras positioned on the back side of the device, wherein the cameras have a physical separation between them of substantially a same separation that is between eyes on a human face; (b) the cameras, each camera with a body, a lens and a CCD image sensor, simultaneously capture two separate images of an object or a scene and a camera logic operating in the processor and the memory of the device merges the two images to create a single 3D-like image for storage and for viewing on the display screen. 2. The apparatus as in claim 1, comprising: each camera of the camera system captures an overlapping view that point to the same object or the scene a distance away from the device, wherein the camera system creates a 3D-like single image for storage and for viewing on the display screen. 3. The apparatus as in claim 1, comprising: (a) the camera system has a left camera and a right camera, that enable the left camera system to simultaneously take a left image of the object or the scene and the right camera system to take a right image of the object or of the scene; (b) a 3D logic that merges the left camera image and the right camera image to create the single 3D-like image of the object. 4. The apparatus as in claim 3, comprising: the 3D logic takes pixels from the left image and the right image to merge the pixels to create a single 3D-like image. 5. The apparatus as in claim 4, comprising: the 3D logic merges the images by positioning the right image pixels right of the left image pixels, thereby creating an image with all the pixels from the left and right images. 6. The apparatus as in claim 4, comprising: the 3D logic positions on the display screen a pixel group from the left camera and a pixel group from the right camera contiguous to each other for a human vision to perceive them as a single point of image with details from both the pixel groups. 7. A camera system for use in a mobile handheld wireless device with a front side with a display screen and a back side, comprising: (a) the device is of a type of a smart phone or a tablet computer with a CPU, a memory and an operating system and with a thickness that does not exceed half an inch and has two separate and independent cameras positioned on the front side of the device and wherein the cameras have a physical separation between them of substantially a same separation that is between eyes on a human face; (b) the cameras, each camera with a body, a lens and a CCD image sensor, capture two separate images of an object and a camera logic operating in a processor and a memory of the device merges the two images to create a 3D-like single image for storage and for viewing on a display screen. 8. The camera system as in claim 7, comprising: each camera captures over lapping views that point to an object a distance away from the device, wherein the camera system creates a 3D-like image for storage and for viewing on a display screen. 9. The camera system as in claim 7, comprising: (a) the camera system has a left camera and a right camera, that enable the left camera system to simultaneously take a left image of an object and the right camera system to take a right image of the object; (b) a 3D logic that merges the left camera image and the right camera image to create 3D-like image of the object. 10. The camera system as in claim 9, comprising: the 3D logic takes pixels from the left image and the right image to merge them to create a single image. 11. The camera system as in claim 10, comprising: the 3D logic merges the images by positioning the right image pixels right of the left image pixels, thereby creating an image with all the pixels from the left and right images. 12. A method for a camera system for use in a mobile handheld wireless device with a front side with a display screen and a back side, comprising the steps of: (a) providing a device of a type of a smart phone and a tablet computer with a CPU, a memory and an operating system and a camera logic, and with a thickness not exceeding half an inch and providing by the device two separate and independent cameras, each camera with a body, a lens and a CCD image sensor, positioned on a side of the device and providing by the cameras a physical separation between them of substantially a same separation that is between eyes on a human face; (b) capturing by the cameras, two separate images of an object or a scene and merging by the camera logic operating in a processor and a memory of the device, the images to create a 3D-Like image for storage and for viewing on a display screen. 13. The method as in claim 12, comprising the steps of: capturing by each camera, over lapping views that point to an object or a scene a distance away from the device, and creating by the camera system a 3D-Like image of the object or the scene for storage and for viewing on a display screen. 14. The system as in claim 12, comprising the steps of: (a) having by the camera system a left camera and a right camera, that enable the left camera system to simultaneously take a left image of an object or a scene and the right camera system to take a right image of the object or the scene; (b) merging by a 3D logic the left camera image and the right camera image to create 3D-Like image of the object. 15. The method as in claim 14, comprising the steps of: merging by the logic pixels from the left image and the right image to create a single image. 16. The method as in claim 14, comprising the steps of: merging by the logic the images by positioning the right image pixels right of the left image pixels, thereby creating an image with all the pixels from the left and right images. 17. The method as in claim 14, comprising the steps of: positioning on a display screen a pixel group from a left camera and a pixel group from a right camera contiguous to each other for a human vision to perceive them as a single point of image with details from both the pixel groups.
A camera system for use in a mobile handheld computing and communication device with a front side with a display screen and a back side has two separate and independent cameras positioned on the back side of the device, wherein the cameras have a physical separation between them of substantially the same separation as between the eyes on a human face and, wherein the camera system creates a 3D-Like image of an object for storage and for viewing on a display screen.1. An apparatus for a camera system for use in a mobile handheld wireless device of a type of a smart phone and a tablet computer, with a front side with a display screen and a back side, comprising: (a) the device is a mobile handheld wireless communication and computing device with a processor, a memory and an operating system and with a depth not exceeding half an inch, the device has a camera system with two separate and independent cameras positioned on the back side of the device, wherein the cameras have a physical separation between them of substantially a same separation that is between eyes on a human face; (b) the cameras, each camera with a body, a lens and a CCD image sensor, simultaneously capture two separate images of an object or a scene and a camera logic operating in the processor and the memory of the device merges the two images to create a single 3D-like image for storage and for viewing on the display screen. 2. The apparatus as in claim 1, comprising: each camera of the camera system captures an overlapping view that point to the same object or the scene a distance away from the device, wherein the camera system creates a 3D-like single image for storage and for viewing on the display screen. 3. The apparatus as in claim 1, comprising: (a) the camera system has a left camera and a right camera, that enable the left camera system to simultaneously take a left image of the object or the scene and the right camera system to take a right image of the object or of the scene; (b) a 3D logic that merges the left camera image and the right camera image to create the single 3D-like image of the object. 4. The apparatus as in claim 3, comprising: the 3D logic takes pixels from the left image and the right image to merge the pixels to create a single 3D-like image. 5. The apparatus as in claim 4, comprising: the 3D logic merges the images by positioning the right image pixels right of the left image pixels, thereby creating an image with all the pixels from the left and right images. 6. The apparatus as in claim 4, comprising: the 3D logic positions on the display screen a pixel group from the left camera and a pixel group from the right camera contiguous to each other for a human vision to perceive them as a single point of image with details from both the pixel groups. 7. A camera system for use in a mobile handheld wireless device with a front side with a display screen and a back side, comprising: (a) the device is of a type of a smart phone or a tablet computer with a CPU, a memory and an operating system and with a thickness that does not exceed half an inch and has two separate and independent cameras positioned on the front side of the device and wherein the cameras have a physical separation between them of substantially a same separation that is between eyes on a human face; (b) the cameras, each camera with a body, a lens and a CCD image sensor, capture two separate images of an object and a camera logic operating in a processor and a memory of the device merges the two images to create a 3D-like single image for storage and for viewing on a display screen. 8. The camera system as in claim 7, comprising: each camera captures over lapping views that point to an object a distance away from the device, wherein the camera system creates a 3D-like image for storage and for viewing on a display screen. 9. The camera system as in claim 7, comprising: (a) the camera system has a left camera and a right camera, that enable the left camera system to simultaneously take a left image of an object and the right camera system to take a right image of the object; (b) a 3D logic that merges the left camera image and the right camera image to create 3D-like image of the object. 10. The camera system as in claim 9, comprising: the 3D logic takes pixels from the left image and the right image to merge them to create a single image. 11. The camera system as in claim 10, comprising: the 3D logic merges the images by positioning the right image pixels right of the left image pixels, thereby creating an image with all the pixels from the left and right images. 12. A method for a camera system for use in a mobile handheld wireless device with a front side with a display screen and a back side, comprising the steps of: (a) providing a device of a type of a smart phone and a tablet computer with a CPU, a memory and an operating system and a camera logic, and with a thickness not exceeding half an inch and providing by the device two separate and independent cameras, each camera with a body, a lens and a CCD image sensor, positioned on a side of the device and providing by the cameras a physical separation between them of substantially a same separation that is between eyes on a human face; (b) capturing by the cameras, two separate images of an object or a scene and merging by the camera logic operating in a processor and a memory of the device, the images to create a 3D-Like image for storage and for viewing on a display screen. 13. The method as in claim 12, comprising the steps of: capturing by each camera, over lapping views that point to an object or a scene a distance away from the device, and creating by the camera system a 3D-Like image of the object or the scene for storage and for viewing on a display screen. 14. The system as in claim 12, comprising the steps of: (a) having by the camera system a left camera and a right camera, that enable the left camera system to simultaneously take a left image of an object or a scene and the right camera system to take a right image of the object or the scene; (b) merging by a 3D logic the left camera image and the right camera image to create 3D-Like image of the object. 15. The method as in claim 14, comprising the steps of: merging by the logic pixels from the left image and the right image to create a single image. 16. The method as in claim 14, comprising the steps of: merging by the logic the images by positioning the right image pixels right of the left image pixels, thereby creating an image with all the pixels from the left and right images. 17. The method as in claim 14, comprising the steps of: positioning on a display screen a pixel group from a left camera and a pixel group from a right camera contiguous to each other for a human vision to perceive them as a single point of image with details from both the pixel groups.
2,400
7,876
7,876
14,580,714
2,468
A system and method for provisionable, multi-modal communications, including detecting a provisioning condition, selecting a communications mode based on the provisioning condition from a first usage mode, a second usage mode, and a third usage mode, and displaying an interface corresponding to the selected communications mode. The first usage mode includes a first communications channel supporting a first communication data consisting of instant messages (IM) and in-network voice data. The second usage mode includes a second communications channel supporting a second communication data consisting of IM, in-network voice data and out-of-network voice data. The third usage mode includes a second communications channel supporting a third communication data comprising video data.
1. A method for providing for selectively provisionable, multi-modal communications, comprising: providing a first set of communications capabilities upon detection of an initial provisioning condition; receiving an upgrade signal; determining an updated provisioning condition based on the upgrade signal; and providing a second set of communications capabilities corresponding to the updated provisioning condition, the second set providing additional communications capabilities not included in the first set. 2. The method of claim 1, wherein the step of providing a first set of communications capabilities comprises unlocking existing but previously restricted communication function using an authentication mechanism. 3. The method of claim 1, wherein the step of providing a first set of communications capabilities comprises restricting sets of communication functions. 4. The method of claim 1, wherein the step of providing a second set of communications capabilities comprises unlocking existing but previously restricted communication function using an authentication mechanism. 5. The method of claim 1, wherein the step of providing a second set of communications capabilities comprises restricting a set of communication functions. 6. The method of claim 1, wherein the first set of communications capabilities provides communications only within a defined domain and the second set of communications capabilities provides communications within the defined domain and further provides out-of-domain communications capability. 7. The method of claim 1, wherein the first set of communications capabilities provides communications within a defined domain and out-of-domain communications capability and the second set of communications capabilities provides communications within the defined domain, out of domain communications capability and further provides video-enhanced communications capability out-of-domain communications capability. 8. The method of claim 1, further comprising displaying an interface corresponding to the second set of communications capabilities. 9. A method for providing for provisioning, multi-modal communications, comprising: providing a plurality of communications capability sets to a communication device, wherein the plural sets of communications capabilities comprise: a first set of communications capabilities for a defined domain; a second set of communications capabilities for out of the defined domain communications; and, a third set of communications capabilities for enhanced video communications; receiving a provisioning signal; determine a provisioning condition based on the provisioning signal; and providing an authentication mechanism to unlock one or more of the plural sets of communications capabilities on the communication device. 10. The method of claim 9, wherein the step of providing a plural sets of communications capabilities comprises restricting one or more of the plural sets of communication functions. 11. The method of claim 9, wherein the second set of communications capabilities provides communications within the defined domain. 12. The method of claim 9, wherein the third set of communications capabilities provides communications within a defined domain and out-of-domain communications capability. 13. The method of claim 9, further comprising displaying an interface corresponding to the unlocked one or more plural sets of communications on the communication device. 14. A computer program product for use with a device on a communications network for providing for provisioning, multi-modal communications, comprising: a plurality of computer readable program code modules embodied on computer readable non-transitory medium; a first one of the plurality of computer readable program code modules for causing a computer to provide a plurality of communications capability sets to a communication device, wherein the plural sets of communications capabilities comprise: a first set of communications capabilities for a defined domain; a second set of communications capabilities for out of the defined domain communications; and, a third set of communications capabilities for enhanced video communications; a second one of the plurality of computer readable program code modules for causing the computer to receive a provisioning signal and to determine a provisioning condition based on the provisioning signal; and; a third one of the plurality of computer readable program code modules for causing the computer to provide an authentication mechanism to unlock one or more of the plural sets of communications capabilities on the communication device.
A system and method for provisionable, multi-modal communications, including detecting a provisioning condition, selecting a communications mode based on the provisioning condition from a first usage mode, a second usage mode, and a third usage mode, and displaying an interface corresponding to the selected communications mode. The first usage mode includes a first communications channel supporting a first communication data consisting of instant messages (IM) and in-network voice data. The second usage mode includes a second communications channel supporting a second communication data consisting of IM, in-network voice data and out-of-network voice data. The third usage mode includes a second communications channel supporting a third communication data comprising video data.1. A method for providing for selectively provisionable, multi-modal communications, comprising: providing a first set of communications capabilities upon detection of an initial provisioning condition; receiving an upgrade signal; determining an updated provisioning condition based on the upgrade signal; and providing a second set of communications capabilities corresponding to the updated provisioning condition, the second set providing additional communications capabilities not included in the first set. 2. The method of claim 1, wherein the step of providing a first set of communications capabilities comprises unlocking existing but previously restricted communication function using an authentication mechanism. 3. The method of claim 1, wherein the step of providing a first set of communications capabilities comprises restricting sets of communication functions. 4. The method of claim 1, wherein the step of providing a second set of communications capabilities comprises unlocking existing but previously restricted communication function using an authentication mechanism. 5. The method of claim 1, wherein the step of providing a second set of communications capabilities comprises restricting a set of communication functions. 6. The method of claim 1, wherein the first set of communications capabilities provides communications only within a defined domain and the second set of communications capabilities provides communications within the defined domain and further provides out-of-domain communications capability. 7. The method of claim 1, wherein the first set of communications capabilities provides communications within a defined domain and out-of-domain communications capability and the second set of communications capabilities provides communications within the defined domain, out of domain communications capability and further provides video-enhanced communications capability out-of-domain communications capability. 8. The method of claim 1, further comprising displaying an interface corresponding to the second set of communications capabilities. 9. A method for providing for provisioning, multi-modal communications, comprising: providing a plurality of communications capability sets to a communication device, wherein the plural sets of communications capabilities comprise: a first set of communications capabilities for a defined domain; a second set of communications capabilities for out of the defined domain communications; and, a third set of communications capabilities for enhanced video communications; receiving a provisioning signal; determine a provisioning condition based on the provisioning signal; and providing an authentication mechanism to unlock one or more of the plural sets of communications capabilities on the communication device. 10. The method of claim 9, wherein the step of providing a plural sets of communications capabilities comprises restricting one or more of the plural sets of communication functions. 11. The method of claim 9, wherein the second set of communications capabilities provides communications within the defined domain. 12. The method of claim 9, wherein the third set of communications capabilities provides communications within a defined domain and out-of-domain communications capability. 13. The method of claim 9, further comprising displaying an interface corresponding to the unlocked one or more plural sets of communications on the communication device. 14. A computer program product for use with a device on a communications network for providing for provisioning, multi-modal communications, comprising: a plurality of computer readable program code modules embodied on computer readable non-transitory medium; a first one of the plurality of computer readable program code modules for causing a computer to provide a plurality of communications capability sets to a communication device, wherein the plural sets of communications capabilities comprise: a first set of communications capabilities for a defined domain; a second set of communications capabilities for out of the defined domain communications; and, a third set of communications capabilities for enhanced video communications; a second one of the plurality of computer readable program code modules for causing the computer to receive a provisioning signal and to determine a provisioning condition based on the provisioning signal; and; a third one of the plurality of computer readable program code modules for causing the computer to provide an authentication mechanism to unlock one or more of the plural sets of communications capabilities on the communication device.
2,400
7,877
7,877
16,008,595
2,486
A fault tolerant display displays safety information on a display shared with an infotainment system even if the processor or software of the infotainment system is unresponsive. The display can be a streaming video from a rear view camera mounted on a vehicle. The safety displayed can be triggered by placing the vehicle in reverse. Failure of the infotainment software and/or processor can be detected by a policy enforcing module that switches to a backup display that streams video directly from the camera in the event of failure of the infotainment processor.
1. A fault tolerant display system for a vehicle, the system comprising: a video camera; an application processor; a display in a cabin of the vehicle; and a hardware module interposed between the video camera, the application processor, and the display; the hardware module configured to: receive streaming video from the video camera; merge the streaming video with overlays from the application processor to create an overlaid streaming video; display the overlaid streaming video on the display in the cabin of the vehicle; detect failure of the application processor; and in response to detecting failure of the application processor, switch to display on the display in the cabin of the vehicle the streaming video from the video camera and at least one overlay generated by the hardware module, the streaming video from the video camera and the at least one overlay generated by the hardware module displayed essentially simultaneously on the display. 2. The system of claim 1, wherein failure of the application processor is detected by incorrect formatting of the display information generated by the application processor. 3. The system of claim 2, wherein the incorrect formatting comprises at least one of: incorrect frame rate, incorrect line rate, average brightness of the display lower than a provided threshold for average brightness of the display, a quantity of non-black pixels lower than a provided threshold for non-black pixels, or placement of features generated by the application processor failing to correspond to objects in the streaming video. 4. The system of claim 1, wherein failure of the application processor is detected by a watchdog timer. 5. The system of claim 1, wherein the overlaid streaming video is displayed within one second of the vehicle shifting into reverse. 6. The system of claim 1, wherein the at least one overlay generated by the hardware module comprises a dynamic overlay of a backup path based on a steering wheel position of the vehicle. 7. The system of claim 1, wherein the at least one overlay generated by the hardware module comprises a dynamic overlay based on hazard detection information. 8. The system of claim 1, wherein the at least one overlay generated by the hardware module comprises a dynamic overlay based on navigation information. 9. The system of claim 1, wherein failure of the application processor is detected when the application processor is detected to be unresponsive. 10. The system of claim 1, wherein failure of the application processor is detected when graphical information received from the application processor fails a quality check. 11. The system of claim 1, wherein the hardware module is further configured to: insert a check field into the streaming video sent to the application processor; and verify a modified check field received from the application processor, the modified check field being returned by the application processor responsive to the check field; wherein failure of the application processor is detected when the modified check field fails verification. 12. The system of claim 1, wherein the hardware module is one of an application specific integrated circuit (ASIC), a field programmable gateway array (FPGA), or a processor separate from the application processor that executes a fault tolerant operating system and application. 13. The system of claim 1, wherein the application processor is an in-vehicle infotainment system. 14. The system of claim 1, wherein the hardware module is further configured to: receive status information of the vehicle from a vehicle sensor, the status information specifying a gear in which the vehicle is operating; and display the streaming video from the video camera on the display in response to the vehicle being shifted into reverse gear when failure of the application processor is detected. 15. A method, comprising: receiving streaming video from a video camera of a vehicle; merging the streaming video with overlays from an application processor to create an overlaid streaming video by a hardware module; displaying the overlaid streaming video on a display in a cabin of the vehicle, the hardware module interposed between the video camera, the application processor, and the display; monitoring the application processor to detect failure of the application processor; and in response to detecting failure of the application processor, switching to displaying on the display in the cabin of the vehicle, the streaming video from the video camera and at least one overlay generated by the hardware module, the streaming video from the video camera and the at least one overlay generated by the hardware module displayed essentially simultaneously. 16. The method of claim 15, wherein the application processor is an in-vehicle infotainment system. 17. The method of claim 15, wherein the hardware module is one of an application specific integrated circuit (ASIC), a field programmable gateway array (FPGA), or a processor separate from the application processor that executes a fault tolerant operating system and application. 18. A computer-readable storage medium comprising computer-executable instructions which when executed cause at least one processor of a computing device, when operably connected to a video camera, an application processor, and a display, to: receive streaming video from a video camera of a vehicle; merge the streaming video with overlays from an application processor to create an overlaid streaming video by a hardware module; display the overlaid streaming video on a display in a cabin of the vehicle, the hardware module interposed between the video camera, the application processor, and the display; monitor the application processor to detect failure of the application processor; and in response to detecting failure of the application processor, switch to displaying on the display in the cabin of the vehicle, the streaming video from the video camera and at least one overlay generated by the hardware module, the streaming video from the video camera and the at least one overlay generated by the hardware module displayed essentially simultaneously. 19. The computer-readable storage medium of claim 18, wherein the application processor is an in-vehicle infotainment system. 20. The computer-readable storage medium of claim 18, wherein the hardware module is one of an application specific integrated circuit (ASIC), a field programmable gateway array (FPGA), or a processor separate from the application processor that executes a fault tolerant operating system and application.
A fault tolerant display displays safety information on a display shared with an infotainment system even if the processor or software of the infotainment system is unresponsive. The display can be a streaming video from a rear view camera mounted on a vehicle. The safety displayed can be triggered by placing the vehicle in reverse. Failure of the infotainment software and/or processor can be detected by a policy enforcing module that switches to a backup display that streams video directly from the camera in the event of failure of the infotainment processor.1. A fault tolerant display system for a vehicle, the system comprising: a video camera; an application processor; a display in a cabin of the vehicle; and a hardware module interposed between the video camera, the application processor, and the display; the hardware module configured to: receive streaming video from the video camera; merge the streaming video with overlays from the application processor to create an overlaid streaming video; display the overlaid streaming video on the display in the cabin of the vehicle; detect failure of the application processor; and in response to detecting failure of the application processor, switch to display on the display in the cabin of the vehicle the streaming video from the video camera and at least one overlay generated by the hardware module, the streaming video from the video camera and the at least one overlay generated by the hardware module displayed essentially simultaneously on the display. 2. The system of claim 1, wherein failure of the application processor is detected by incorrect formatting of the display information generated by the application processor. 3. The system of claim 2, wherein the incorrect formatting comprises at least one of: incorrect frame rate, incorrect line rate, average brightness of the display lower than a provided threshold for average brightness of the display, a quantity of non-black pixels lower than a provided threshold for non-black pixels, or placement of features generated by the application processor failing to correspond to objects in the streaming video. 4. The system of claim 1, wherein failure of the application processor is detected by a watchdog timer. 5. The system of claim 1, wherein the overlaid streaming video is displayed within one second of the vehicle shifting into reverse. 6. The system of claim 1, wherein the at least one overlay generated by the hardware module comprises a dynamic overlay of a backup path based on a steering wheel position of the vehicle. 7. The system of claim 1, wherein the at least one overlay generated by the hardware module comprises a dynamic overlay based on hazard detection information. 8. The system of claim 1, wherein the at least one overlay generated by the hardware module comprises a dynamic overlay based on navigation information. 9. The system of claim 1, wherein failure of the application processor is detected when the application processor is detected to be unresponsive. 10. The system of claim 1, wherein failure of the application processor is detected when graphical information received from the application processor fails a quality check. 11. The system of claim 1, wherein the hardware module is further configured to: insert a check field into the streaming video sent to the application processor; and verify a modified check field received from the application processor, the modified check field being returned by the application processor responsive to the check field; wherein failure of the application processor is detected when the modified check field fails verification. 12. The system of claim 1, wherein the hardware module is one of an application specific integrated circuit (ASIC), a field programmable gateway array (FPGA), or a processor separate from the application processor that executes a fault tolerant operating system and application. 13. The system of claim 1, wherein the application processor is an in-vehicle infotainment system. 14. The system of claim 1, wherein the hardware module is further configured to: receive status information of the vehicle from a vehicle sensor, the status information specifying a gear in which the vehicle is operating; and display the streaming video from the video camera on the display in response to the vehicle being shifted into reverse gear when failure of the application processor is detected. 15. A method, comprising: receiving streaming video from a video camera of a vehicle; merging the streaming video with overlays from an application processor to create an overlaid streaming video by a hardware module; displaying the overlaid streaming video on a display in a cabin of the vehicle, the hardware module interposed between the video camera, the application processor, and the display; monitoring the application processor to detect failure of the application processor; and in response to detecting failure of the application processor, switching to displaying on the display in the cabin of the vehicle, the streaming video from the video camera and at least one overlay generated by the hardware module, the streaming video from the video camera and the at least one overlay generated by the hardware module displayed essentially simultaneously. 16. The method of claim 15, wherein the application processor is an in-vehicle infotainment system. 17. The method of claim 15, wherein the hardware module is one of an application specific integrated circuit (ASIC), a field programmable gateway array (FPGA), or a processor separate from the application processor that executes a fault tolerant operating system and application. 18. A computer-readable storage medium comprising computer-executable instructions which when executed cause at least one processor of a computing device, when operably connected to a video camera, an application processor, and a display, to: receive streaming video from a video camera of a vehicle; merge the streaming video with overlays from an application processor to create an overlaid streaming video by a hardware module; display the overlaid streaming video on a display in a cabin of the vehicle, the hardware module interposed between the video camera, the application processor, and the display; monitor the application processor to detect failure of the application processor; and in response to detecting failure of the application processor, switch to displaying on the display in the cabin of the vehicle, the streaming video from the video camera and at least one overlay generated by the hardware module, the streaming video from the video camera and the at least one overlay generated by the hardware module displayed essentially simultaneously. 19. The computer-readable storage medium of claim 18, wherein the application processor is an in-vehicle infotainment system. 20. The computer-readable storage medium of claim 18, wherein the hardware module is one of an application specific integrated circuit (ASIC), a field programmable gateway array (FPGA), or a processor separate from the application processor that executes a fault tolerant operating system and application.
2,400
7,878
7,878
13,409,897
2,457
A method, a system for accessing a home network device, and a home network access device are disclosed. The method includes the steps as follows. A home network access device finds a home network device and obtains information of the home network device through a home network protocol. A data model of the home network device is established in the home network access device according to the information of the home network device. A remote service device accesses the data model of the home network device established in the home network access device through a remote management protocol.
1. A method for accessing a home network, comprising: finding, by a home network access device, a home network device, and obtaining information of the home network device through a home network protocol; establishing, by the home network access device, a data model of the home network device in the home network access device according to the information of the home network device, so that a remote service device accesses the data model of the home network device through a remote management protocol; and constructing, by the home network access device, a home network protocol packet according to management information set by the remote service device in the established data model of the home network device through the remote management protocol, and sending the home network protocol packet to the home network device. 2. The method according to claim 1, wherein the established data model of the home network device comprises device information objects, service information objects which are a next level of the device information objects, and action information objects which are a next level of the service information objects; and the device information objects comprise device information parameters, the service information objects comprise service information parameters, and the action information objects comprise action information parameters. 3. The method according to claim 2, wherein the action information parameters comprise an in parameter and an operation execution parameter (invoke), and the action information parameters comprise an out parameter, and the constructing, by the home network access device, the home network protocol packet according to management information set by the remote service device in the established data model of the home network device through the remote management protocol comprises: accepting, by the home network access device, the remote service device setting the in parameter corresponding to the management information through a remote procedure call (RPC) method, and accepting the remote service device setting an invoke parameter value corresponding to the management information through the RPC method to true; constructing, by the home network access device, the home network protocol packet comprising corresponding operation information according to the setting of the in parameter corresponding to the management information by the remote service device; and setting, by the home network access device, the value of the invoke parameter corresponding to the management information to false, after setting a value of an out parameter corresponding to the management information, so that the remote service device obtains the value of the out parameter corresponding to the management information through the RPC method. 4. The method according to claim 2, wherein the service information parameters comprise state variables; and after the establishing the data model of the home network device, the method further comprises: changing, by the home network access device, the state variable corresponding to the home network device in the data model according to a state change event message of the home network device after obtaining the state change event message, and notifying state change information of the home network device to the remote service device. 5. The method according to claim 1, wherein the established data model of the home network device comprises device information objects, and service information objects which are a next level of the device information objects, the device information objects comprise device information parameters. 6. The method according to claim 5, wherein the service information objects comprise control command information parameters, and the service information objects comprise out parameter information, the setting, by the remote service device, the management information in the established data model of the home network device through the remote management protocol comprises: setting, by the remote service device, the management information in the control command information parameters of the data model through the RPC method, the constructing, by the home network access device, the home network protocol packet according to the setting comprises: constructing, by the home network access device, the home network protocol packet corresponding to a control command according to control command information of the data model, and setting the out parameter information, after the sending the home network protocol packet to the home network device, the method further comprises: accepting the remote service device obtaining the out parameter information in the service information objects through the RPC method. 7. The method according to claim 5, wherein the service information objects comprise event subscription information and state information; and after the establishing the data model of the home network device, the method further comprises: accepting, by the home network access device, the remote service device setting the event subscription information through the RPC method; changing, by the home network access device, the state information in the data model according to the state change event message of the home network device after obtaining the state change event message, and notifying state change information of the home network device to the remote service device through the remote management protocol. 8. The method according to claim 2, wherein the device information object comprise a service additional parameter; and after the establishing the data model of the home network device, and before the setting, by the remote service device, the management information in the established data module through the remote management protocol, the method further comprises: obtaining, by the remote service device, a parameter type and a parameter span corresponding to the home network device from the service additional parameter, after obtaining the service additional parameter through an RPC method. 9. The method according to claim 5, wherein the device information object comprise a service additional parameter; and after the establishing the data model of the home network device, and before the setting, by the remote service device, the management information in the established data module through the remote management protocol, the method further comprises: obtaining, by the remote service device, a parameter type and a parameter span corresponding to the home network device from the service additional parameter, after obtaining the service additional parameter through a remote procedure call (RPC) method. 10. The method according to claim 1, further comprising: sending, by the home network access device, an execution complete response to the remote service device after constructing the home network protocol packet according to the management information. 11. A communication system for accessing a home network, comprising: a home network access device, configured to find a home network device and obtain information of the home network device through a home network protocol, and establish a data model of the home network device according to the information of the home network device; and a remote service device, configured to access the data model of the home network device established in the home network access device through a remote management protocol; wherein the remote service device is further configured to set management information in the data model established in the home network access device through the remote management protocol; and the home network access device is further configured to construct a home network protocol packet according to the setting to the data model by the remote service device, and send the home network protocol packet to the home network device. 12. The system according to claim 11, wherein the home network access device is further configured to provide state change information to the remote service device, when finding that a state of the home network device is changed, and the remote service device is further configured to obtain the state change information of the home network device provided by the home network access device. 13. The system according to claim 12, wherein the remote service device is further configured to obtain a parameter type and a parameter span corresponding to the home network device from the data model established in the home network access device. 14. A home network access device, comprising: a finding unit, configured to find a home network device and obtain information of the home network device through a home network protocol; and a data model establishing unit, configured to establish and store a data model of the home network device according to the information of the home network device obtained by the finding unit, and accept a remote service device to access the data model through a remote management protocol; a control unit, configured to construct a home network protocol packet according to setting to the parameters in the data model by the remote service device, and send the home network protocol packet to a sending unit; and the sending unit, configured to send the home network protocol packet provided by the control unit. 15. The home network access device according to claim 14, wherein the finding unit is further configured to provide state change information to the sending unit and the data model establishing unit when finding that a state of the home network device is changed; the sending unit is further configured to send the state change information provided by the finding unit; and the data model establishing unit is further configured to set the data model according to the state change information provided by the finding unit.
A method, a system for accessing a home network device, and a home network access device are disclosed. The method includes the steps as follows. A home network access device finds a home network device and obtains information of the home network device through a home network protocol. A data model of the home network device is established in the home network access device according to the information of the home network device. A remote service device accesses the data model of the home network device established in the home network access device through a remote management protocol.1. A method for accessing a home network, comprising: finding, by a home network access device, a home network device, and obtaining information of the home network device through a home network protocol; establishing, by the home network access device, a data model of the home network device in the home network access device according to the information of the home network device, so that a remote service device accesses the data model of the home network device through a remote management protocol; and constructing, by the home network access device, a home network protocol packet according to management information set by the remote service device in the established data model of the home network device through the remote management protocol, and sending the home network protocol packet to the home network device. 2. The method according to claim 1, wherein the established data model of the home network device comprises device information objects, service information objects which are a next level of the device information objects, and action information objects which are a next level of the service information objects; and the device information objects comprise device information parameters, the service information objects comprise service information parameters, and the action information objects comprise action information parameters. 3. The method according to claim 2, wherein the action information parameters comprise an in parameter and an operation execution parameter (invoke), and the action information parameters comprise an out parameter, and the constructing, by the home network access device, the home network protocol packet according to management information set by the remote service device in the established data model of the home network device through the remote management protocol comprises: accepting, by the home network access device, the remote service device setting the in parameter corresponding to the management information through a remote procedure call (RPC) method, and accepting the remote service device setting an invoke parameter value corresponding to the management information through the RPC method to true; constructing, by the home network access device, the home network protocol packet comprising corresponding operation information according to the setting of the in parameter corresponding to the management information by the remote service device; and setting, by the home network access device, the value of the invoke parameter corresponding to the management information to false, after setting a value of an out parameter corresponding to the management information, so that the remote service device obtains the value of the out parameter corresponding to the management information through the RPC method. 4. The method according to claim 2, wherein the service information parameters comprise state variables; and after the establishing the data model of the home network device, the method further comprises: changing, by the home network access device, the state variable corresponding to the home network device in the data model according to a state change event message of the home network device after obtaining the state change event message, and notifying state change information of the home network device to the remote service device. 5. The method according to claim 1, wherein the established data model of the home network device comprises device information objects, and service information objects which are a next level of the device information objects, the device information objects comprise device information parameters. 6. The method according to claim 5, wherein the service information objects comprise control command information parameters, and the service information objects comprise out parameter information, the setting, by the remote service device, the management information in the established data model of the home network device through the remote management protocol comprises: setting, by the remote service device, the management information in the control command information parameters of the data model through the RPC method, the constructing, by the home network access device, the home network protocol packet according to the setting comprises: constructing, by the home network access device, the home network protocol packet corresponding to a control command according to control command information of the data model, and setting the out parameter information, after the sending the home network protocol packet to the home network device, the method further comprises: accepting the remote service device obtaining the out parameter information in the service information objects through the RPC method. 7. The method according to claim 5, wherein the service information objects comprise event subscription information and state information; and after the establishing the data model of the home network device, the method further comprises: accepting, by the home network access device, the remote service device setting the event subscription information through the RPC method; changing, by the home network access device, the state information in the data model according to the state change event message of the home network device after obtaining the state change event message, and notifying state change information of the home network device to the remote service device through the remote management protocol. 8. The method according to claim 2, wherein the device information object comprise a service additional parameter; and after the establishing the data model of the home network device, and before the setting, by the remote service device, the management information in the established data module through the remote management protocol, the method further comprises: obtaining, by the remote service device, a parameter type and a parameter span corresponding to the home network device from the service additional parameter, after obtaining the service additional parameter through an RPC method. 9. The method according to claim 5, wherein the device information object comprise a service additional parameter; and after the establishing the data model of the home network device, and before the setting, by the remote service device, the management information in the established data module through the remote management protocol, the method further comprises: obtaining, by the remote service device, a parameter type and a parameter span corresponding to the home network device from the service additional parameter, after obtaining the service additional parameter through a remote procedure call (RPC) method. 10. The method according to claim 1, further comprising: sending, by the home network access device, an execution complete response to the remote service device after constructing the home network protocol packet according to the management information. 11. A communication system for accessing a home network, comprising: a home network access device, configured to find a home network device and obtain information of the home network device through a home network protocol, and establish a data model of the home network device according to the information of the home network device; and a remote service device, configured to access the data model of the home network device established in the home network access device through a remote management protocol; wherein the remote service device is further configured to set management information in the data model established in the home network access device through the remote management protocol; and the home network access device is further configured to construct a home network protocol packet according to the setting to the data model by the remote service device, and send the home network protocol packet to the home network device. 12. The system according to claim 11, wherein the home network access device is further configured to provide state change information to the remote service device, when finding that a state of the home network device is changed, and the remote service device is further configured to obtain the state change information of the home network device provided by the home network access device. 13. The system according to claim 12, wherein the remote service device is further configured to obtain a parameter type and a parameter span corresponding to the home network device from the data model established in the home network access device. 14. A home network access device, comprising: a finding unit, configured to find a home network device and obtain information of the home network device through a home network protocol; and a data model establishing unit, configured to establish and store a data model of the home network device according to the information of the home network device obtained by the finding unit, and accept a remote service device to access the data model through a remote management protocol; a control unit, configured to construct a home network protocol packet according to setting to the parameters in the data model by the remote service device, and send the home network protocol packet to a sending unit; and the sending unit, configured to send the home network protocol packet provided by the control unit. 15. The home network access device according to claim 14, wherein the finding unit is further configured to provide state change information to the sending unit and the data model establishing unit when finding that a state of the home network device is changed; the sending unit is further configured to send the state change information provided by the finding unit; and the data model establishing unit is further configured to set the data model according to the state change information provided by the finding unit.
2,400
7,879
7,879
14,421,697
2,459
Techniques for providing media content to an adaptive HTTP streaming player. Upon reception of a HTTP request from the adaptive HTTP streaming player, like a DASH player, requesting the media content, a HTTP entity performs a procedure for determining a representation preference indication of the content being available on a fixed quality interface providing data with fixed data quality, which may provide data being for example received over a broadcast interface or being available in a cache. Said representation preference indication is signaled to the adaptive HTTP streaming player, which is adapted to use the representation preference indication for further requests. The adaptive HTTP streaming player is not aware whether the content is available on a fixed or unicast interface, but is forced with the solution to use the preferred representation being available on the fixed quality interface.
1. A method for providing media content to an adaptive HTTP streaming player, the method comprising the steps of: receiving a HTTP request from the adaptive HTTP streaming player requesting the media content; identifying the media content as media content being available on a fixed quality interface; determining a representation preference indication of the media content provided on the fixed quality interface, wherein the representation preference indication indicates a preferred representation of the media content; and signaling the representation preference indication to the adaptive HTTP streaming player in order to instruct the adaptive HTTP streaming player to use the preferred representation of the media content for requesting the media content being provided on the fixed quality interface. 2. The method according to claim 1, wherein the step of identifying comprises checking available Session Description Protocol, SDP, files to find a SDP file corresponding to a media segment being received with the HTTP request. 3. The method according to claim 1, wherein the step of identifying comprises assessing a content identifier received in the HTTP request. 4. The method according to claim 1, wherein the method comprises further checking whether a provision of the content data over a fixed quality interface is possible. 5. The method according to claim 1, wherein the step of identifying comprises determining whether the media content with a fixed quality is available in a cache. 6. The method according to claim 1, wherein the step of determining comprises deriving the representation preference indication from a SDP, Session Description Protocol, file. 7. The method according to claim 1, wherein the step of determining comprises deriving the representation preference indication from a Media Presentation Description, MPD, file. 8. The method according to claim 1, wherein the representation preference indication is a digit number or a string representation. 9. The method according to claim 1, wherein the representation preference indication is a subset of a number of representations. 10. The method according to claim 1 wherein the step of signaling comprises adding the representation preference indication to a response towards the HTTP streaming player. 11. The method according to claim 1, wherein the fixed quality interface is an interface providing data being broadcasted. 12. The method according to claim 1, wherein the fixed quality interface is an interface providing data being stored in a cache. 13. A method for providing media content in an adaptive HTTP streaming player, the method comprising the steps of: sending a HTTP request to a HTTP entity for provision the media content; receiving from the HTTP entity a representation preference indication of the media content provided on a fixed quality interface, wherein the representation preference indication indicates a preferred representation of the media content; and using the received representation preference indication for requesting the media content being provided on the fixed quality interface. 14. The method according to claim 13, wherein the HTTP request comprises a request according to a received Media Presentation Description, MPD, file, wherein the MPD file describes a provision of the media content. 15. The method according to claim 13, wherein the step of receiving from the HTTP entity a representation preference indication comprises continuously checking of the received representation preference indication. 16. The method according to claim 13, wherein the adaptive HTTP streaming player stops to measure any changes in the link quality of the provided data on a unicast interface upon reception of the representation preference indication. 17. A HTTP entity device adapted to provide media content to an adaptive HTTP streaming player, comprising: a receiver adapted to receive a HTTP request from the adaptive HTTP streaming player requesting the media content; an identifier adapted to identify the media content as content being provided on a fixed quality interface; a processor adapted to determine a representation preference indication of the media content provided on the fixed quality interface, wherein the representation preference indication indicates a preferred representation of the media content; and a sender adapted to signal the representation preference indication to the adaptive HTTP streaming player in order to instruct the adaptive HTTP streaming player to use the preferred representation of the media content for requesting the media content being provided on the fixed quality interface. 18. The device according to claim 17, wherein the device comprises further a broadcast interface adapted to receive media segments over broadcast or IP multicast. 19. The device according to claim 17, wherein the device comprises further a unicast interface adapted to fetch media content from a unicast web server. 20. The device according to claim 17, wherein the device comprises further a cache adapted to cache data with a fixed data quality. 21. An adaptive HTTP streaming player device adapted to provide media content comprising: a sender adapted to send a HTTP request for provision of media content to a HTTP entity; a receiver adapted to receive a representation preference indication from the HTTP entity for reception of the media content being provided on the fixed quality interface, wherein the representation preference indication indicates a preferred representation of the media content; and a processor adapted to use the received representation preference indication for requesting the media content being provided on the fixed quality interface. 22. A client device adapted to provide media content, wherein the client device comprises an adaptive HTTP streaming player device comprising: a first receiver adapted to receive a HTTP request from the adaptive HTTP streaming player requesting the media content; an identifier adapted to identify the media content as content being provided on a fixed quality interface; a first processor adapted to determine a representation preference indication of the media content provided on the fixed quality interface wherein the representation preference indication indicates a preferred presentation of the media content; and a first sender adapted to signal the representation preference indication to the adaptive HTTP streaming player in order to instruct the adaptive HTTP streaming player to use the preferred representation of the media content for requesting the media content being provided on the fixed quality interface; and a HTTP entity comprising: a second sender adapted to send a HTTP request for provision of media content to a HTTP entity; a second receiver adapted to receive a representation preference indication from the HTTP entity for reception of the media content being provided on the fixed quality interface wherein the representation preference indication indicates a preferred representation of he media content; and a second processor adapted to use the received representation preference indication for requesting the media content being provided on the fixed quality interface. 23. The client device according to claim 22, wherein the adaptive HTTP streaming player and the HTTP entity are deployed on the same device. 24. The client device according to claim 22, wherein the adaptive HTTP streaming player and the HTTP entity are deployed in separate devices.
Techniques for providing media content to an adaptive HTTP streaming player. Upon reception of a HTTP request from the adaptive HTTP streaming player, like a DASH player, requesting the media content, a HTTP entity performs a procedure for determining a representation preference indication of the content being available on a fixed quality interface providing data with fixed data quality, which may provide data being for example received over a broadcast interface or being available in a cache. Said representation preference indication is signaled to the adaptive HTTP streaming player, which is adapted to use the representation preference indication for further requests. The adaptive HTTP streaming player is not aware whether the content is available on a fixed or unicast interface, but is forced with the solution to use the preferred representation being available on the fixed quality interface.1. A method for providing media content to an adaptive HTTP streaming player, the method comprising the steps of: receiving a HTTP request from the adaptive HTTP streaming player requesting the media content; identifying the media content as media content being available on a fixed quality interface; determining a representation preference indication of the media content provided on the fixed quality interface, wherein the representation preference indication indicates a preferred representation of the media content; and signaling the representation preference indication to the adaptive HTTP streaming player in order to instruct the adaptive HTTP streaming player to use the preferred representation of the media content for requesting the media content being provided on the fixed quality interface. 2. The method according to claim 1, wherein the step of identifying comprises checking available Session Description Protocol, SDP, files to find a SDP file corresponding to a media segment being received with the HTTP request. 3. The method according to claim 1, wherein the step of identifying comprises assessing a content identifier received in the HTTP request. 4. The method according to claim 1, wherein the method comprises further checking whether a provision of the content data over a fixed quality interface is possible. 5. The method according to claim 1, wherein the step of identifying comprises determining whether the media content with a fixed quality is available in a cache. 6. The method according to claim 1, wherein the step of determining comprises deriving the representation preference indication from a SDP, Session Description Protocol, file. 7. The method according to claim 1, wherein the step of determining comprises deriving the representation preference indication from a Media Presentation Description, MPD, file. 8. The method according to claim 1, wherein the representation preference indication is a digit number or a string representation. 9. The method according to claim 1, wherein the representation preference indication is a subset of a number of representations. 10. The method according to claim 1 wherein the step of signaling comprises adding the representation preference indication to a response towards the HTTP streaming player. 11. The method according to claim 1, wherein the fixed quality interface is an interface providing data being broadcasted. 12. The method according to claim 1, wherein the fixed quality interface is an interface providing data being stored in a cache. 13. A method for providing media content in an adaptive HTTP streaming player, the method comprising the steps of: sending a HTTP request to a HTTP entity for provision the media content; receiving from the HTTP entity a representation preference indication of the media content provided on a fixed quality interface, wherein the representation preference indication indicates a preferred representation of the media content; and using the received representation preference indication for requesting the media content being provided on the fixed quality interface. 14. The method according to claim 13, wherein the HTTP request comprises a request according to a received Media Presentation Description, MPD, file, wherein the MPD file describes a provision of the media content. 15. The method according to claim 13, wherein the step of receiving from the HTTP entity a representation preference indication comprises continuously checking of the received representation preference indication. 16. The method according to claim 13, wherein the adaptive HTTP streaming player stops to measure any changes in the link quality of the provided data on a unicast interface upon reception of the representation preference indication. 17. A HTTP entity device adapted to provide media content to an adaptive HTTP streaming player, comprising: a receiver adapted to receive a HTTP request from the adaptive HTTP streaming player requesting the media content; an identifier adapted to identify the media content as content being provided on a fixed quality interface; a processor adapted to determine a representation preference indication of the media content provided on the fixed quality interface, wherein the representation preference indication indicates a preferred representation of the media content; and a sender adapted to signal the representation preference indication to the adaptive HTTP streaming player in order to instruct the adaptive HTTP streaming player to use the preferred representation of the media content for requesting the media content being provided on the fixed quality interface. 18. The device according to claim 17, wherein the device comprises further a broadcast interface adapted to receive media segments over broadcast or IP multicast. 19. The device according to claim 17, wherein the device comprises further a unicast interface adapted to fetch media content from a unicast web server. 20. The device according to claim 17, wherein the device comprises further a cache adapted to cache data with a fixed data quality. 21. An adaptive HTTP streaming player device adapted to provide media content comprising: a sender adapted to send a HTTP request for provision of media content to a HTTP entity; a receiver adapted to receive a representation preference indication from the HTTP entity for reception of the media content being provided on the fixed quality interface, wherein the representation preference indication indicates a preferred representation of the media content; and a processor adapted to use the received representation preference indication for requesting the media content being provided on the fixed quality interface. 22. A client device adapted to provide media content, wherein the client device comprises an adaptive HTTP streaming player device comprising: a first receiver adapted to receive a HTTP request from the adaptive HTTP streaming player requesting the media content; an identifier adapted to identify the media content as content being provided on a fixed quality interface; a first processor adapted to determine a representation preference indication of the media content provided on the fixed quality interface wherein the representation preference indication indicates a preferred presentation of the media content; and a first sender adapted to signal the representation preference indication to the adaptive HTTP streaming player in order to instruct the adaptive HTTP streaming player to use the preferred representation of the media content for requesting the media content being provided on the fixed quality interface; and a HTTP entity comprising: a second sender adapted to send a HTTP request for provision of media content to a HTTP entity; a second receiver adapted to receive a representation preference indication from the HTTP entity for reception of the media content being provided on the fixed quality interface wherein the representation preference indication indicates a preferred representation of he media content; and a second processor adapted to use the received representation preference indication for requesting the media content being provided on the fixed quality interface. 23. The client device according to claim 22, wherein the adaptive HTTP streaming player and the HTTP entity are deployed on the same device. 24. The client device according to claim 22, wherein the adaptive HTTP streaming player and the HTTP entity are deployed in separate devices.
2,400
7,880
7,880
15,230,792
2,463
According to some embodiments, a method in a wireless device of reducing collisions between device-to-device (D2D) communication resources and D2D discovery resources comprises obtaining a first plurality of transmission resources available for transmitting D2D discovery messages, and obtaining a second plurality of transmission resources comprising a subset of the first plurality. The subset comprises transmission resources potentially unavailable for transmitting D2D discovery messages. The method includes associating a first weighted value with each transmission resource of the first plurality not included in the second plurality, and associating a second weighted value with each transmission resource of the second plurality. The method includes selecting a transmission resource from the first plurality of transmission resources using the first and second weighted values, and determining whether the selected transmission resource is available to transmit a discovery message. The method includes transmitting the discovery message using the selected transmission resource.
1. A method in a wireless device of reducing collisions between device-to-device (D2D) communication resources and D2D discovery resources in a wireless communication network, the method comprising: obtaining a first plurality of transmission resources, the first plurality of transmission resources comprising transmission resources available to the wireless device for transmitting D2D discovery messages; obtaining a second plurality of transmission resources, the second plurality of transmission resources comprising a subset of the first plurality of transmission resources, the subset comprising transmission resources potentially unavailable to the wireless device for transmitting D2D discovery messages; associating a first weighted value with each transmission resource of the first plurality of transmission resources not included in the second plurality of transmission resources; associating a second weighted value with each transmission resource of the second plurality of transmission resources; selecting, for use during a first discovery period, a first transmission resource from the first plurality of transmission resources using the first weighted value and the second weighted value; determining whether the selected first transmission resource is available to transmit a discovery message; and upon determining the selected first transmission resource is available to transmit the discovery message, transmitting the discovery message using the selected first transmission resource. 2. The method of claim 1, wherein selecting the transmission resource from the first plurality of transmission resources comprises excluding from selection any transmission resources associated with the second weighted value. 3. The method of claim 1, wherein selecting the transmission resource from the first plurality of transmission resources comprises a pseudo-random selection of transmission resources where transmission resources associated with the first weighted value are more likely to be selected than transmission resources associated with the second weighted value. 4. The method of claim 1, wherein at least one of the first weighted value and the second weighted value are determined based on a D2D traffic type. 5. The method of claim 1, wherein determining whether the selected first transmission resource is available to transmit the discovery message comprises determining a D2D traffic type. 6. The method of claim 1, wherein the second plurality of transmission resources comprises transmission resources configured as control or data transmission resources. 7. The method of claim 6, wherein control transmission resources comprise Long Term Evolution (LTE) Physical Sidelink Control Channel (PSCCH) resources and data transmission resources comprise LTE Physical Sidelink Shared Channel (PSSCH) resources. 8. The method of claim 1, wherein the second plurality of transmission resources comprises resources scheduled for control or data transmission by the wireless device. 9. The method of claim 1, wherein upon determining the selected first transmission resource is not available to transmit the discovery message, the method further comprises selecting, for use during the first discovery period, a second transmission resource from the first plurality of transmission resources using the first weighted value and the second weighted value. 10. The method of claim 1, wherein upon determining the selected first transmission resource is not available to transmit the discovery message, the method further comprises: incrementing a failed transmission count; retaining the discovery message until a second discovery period; selecting, for use during the second discovery period, a second transmission resource from the first plurality of transmission resources using the first weighted value and the second weighted value; and determining whether the selected second transmission resource is available to transmit the retained discovery message based at least in part on the failed transmission count. 11. The method of claim 1, further comprising selecting, for use during a second discovery period, a transmission resource from the first plurality of transmission resources that corresponds to the first transmission resource selected for use during the first discovery period. 12. A wireless device capable of device-to-device (D2D) communication in a wireless communication network, the wireless device comprising a processor, a memory, and a power source, the processor operable to: obtain a first plurality of transmission resources, the first plurality of transmission resources comprising transmission resources available to the wireless device for transmitting D2D discovery messages; obtain a second plurality of transmission resources, the second plurality of transmission resources comprising a subset of the first plurality of transmission resources, the subset comprising transmission resources potentially unavailable to the wireless device for transmitting D2D discovery messages; associate a first weighted value with each transmission resource of the first plurality of transmission resources not included in the second plurality of transmission resources; associate a second weighted value with each transmission resource of the second plurality of transmission resources; select, for use during a first discovery period, a first transmission resource from the first plurality of transmission resources using the first weighted value and the second weighted value; determine whether the selected first transmission resource is available to transmit a discovery message; and upon determining the selected first transmission resource is available to transmit the discovery message, transmit the discovery message using the selected first transmission resource. 13. The wireless device of claim 12, wherein the processor is operable to select the transmission resource from the first plurality of transmission resources by excluding from selection any transmission resources associated with the second weighted value. 14. The wireless device of claim 12, wherein the processor is operable to select the transmission resource from the first plurality of transmission resources by performing a pseudo-random selection of transmission resources where transmission resources associated with the first weighted value are more likely to be selected than transmission resources associated with the second weighted value. 15. The wireless device of claim 12, wherein at least one of the first weighted value and the second weighted value are determined based on a D2D traffic type. 16. The wireless device of claim 12, wherein the processor operable to determine whether the selected first transmission resource is available to transmit the discovery message is operable to determine a D2D traffic type. 17. The wireless device of claim 12, wherein the second plurality of transmission resources comprises transmission resources configured as control or data transmission resources. 18. The wireless device of claim 17, wherein control transmission resources comprise Long Term Evolution (LTE) Physical Sidelink Control Channel (PSCCH) resources and data transmission resources comprise LTE Physical Sidelink Shared Channel (PSSCH) resources. 19. The wireless device of claim 12, wherein the second plurality of transmission resources comprises resources scheduled for control or data transmission by the wireless device. 20. The wireless device of claim 12, wherein the processor, upon determining the selected first transmission resource is not available to transmit the discovery message, is operable to select, for use during the first discovery period, a second transmission resource from the first plurality of transmission resources using the first weighted value and the second weighted value. 21. The wireless device of claim 12, wherein the processor, upon determining the selected first transmission resource is not available to transmit the discovery message, is operable to: increment a failed transmission count; retain the discovery message until a second discovery period; select, for use during the second discovery period, a second transmission resource from the first plurality of transmission resources using the first weighted value and the second weighted value; and determine whether the selected second transmission resource is available to transmit the retained discovery message based at least in part on the failed transmission count. 22. The wireless device of claim 12, the processor further operable to select, for use during a second discovery period, a transmission resource from the first plurality of transmission resources that corresponds to the first transmission resource selected for use during the first discovery period. 24. A user equipment (UE) capable of device-to-device (D2D) communication in a wireless communication network, the UE comprising: an antenna configured to send and receive wireless signals; radio front-end circuitry connected to the antenna and to processing circuitry, and configured to condition signals communicated between the antenna and the processing circuitry; the processing circuitry being configured to: obtain a first plurality of transmission resources, the first plurality of transmission resources comprising transmission resources available to the wireless device for transmitting D2D discovery messages; obtain a second plurality of transmission resources, the second plurality of transmission resources comprising a subset of the first plurality of transmission resources, the subset comprising transmission resources potentially unavailable to the wireless device for transmitting D2D discovery messages; associate a first weighted value with each transmission resource of the first plurality of transmission resources not included in the second plurality of transmission resources; associate a second weighted value with each transmission resource of the second plurality of transmission resources; select, for use during a first discovery period, a first transmission resource from the first plurality of transmission resources using the first weighted value and the second weighted value; determine whether the selected first transmission resource is available to transmit a discovery message; and upon determining the selected first transmission resource is available to transmit the discovery message, transmit the discovery message using the selected first transmission resource; an input interface connected to the processing circuitry and configured to allow input of information into the UE to be processed by the processing circuitry; an output interface connected to the processing circuitry and configured to output information from the UE that has been processed by the processing circuitry; and a battery connected to the processing circuitry and configured to supply power to the UE.
According to some embodiments, a method in a wireless device of reducing collisions between device-to-device (D2D) communication resources and D2D discovery resources comprises obtaining a first plurality of transmission resources available for transmitting D2D discovery messages, and obtaining a second plurality of transmission resources comprising a subset of the first plurality. The subset comprises transmission resources potentially unavailable for transmitting D2D discovery messages. The method includes associating a first weighted value with each transmission resource of the first plurality not included in the second plurality, and associating a second weighted value with each transmission resource of the second plurality. The method includes selecting a transmission resource from the first plurality of transmission resources using the first and second weighted values, and determining whether the selected transmission resource is available to transmit a discovery message. The method includes transmitting the discovery message using the selected transmission resource.1. A method in a wireless device of reducing collisions between device-to-device (D2D) communication resources and D2D discovery resources in a wireless communication network, the method comprising: obtaining a first plurality of transmission resources, the first plurality of transmission resources comprising transmission resources available to the wireless device for transmitting D2D discovery messages; obtaining a second plurality of transmission resources, the second plurality of transmission resources comprising a subset of the first plurality of transmission resources, the subset comprising transmission resources potentially unavailable to the wireless device for transmitting D2D discovery messages; associating a first weighted value with each transmission resource of the first plurality of transmission resources not included in the second plurality of transmission resources; associating a second weighted value with each transmission resource of the second plurality of transmission resources; selecting, for use during a first discovery period, a first transmission resource from the first plurality of transmission resources using the first weighted value and the second weighted value; determining whether the selected first transmission resource is available to transmit a discovery message; and upon determining the selected first transmission resource is available to transmit the discovery message, transmitting the discovery message using the selected first transmission resource. 2. The method of claim 1, wherein selecting the transmission resource from the first plurality of transmission resources comprises excluding from selection any transmission resources associated with the second weighted value. 3. The method of claim 1, wherein selecting the transmission resource from the first plurality of transmission resources comprises a pseudo-random selection of transmission resources where transmission resources associated with the first weighted value are more likely to be selected than transmission resources associated with the second weighted value. 4. The method of claim 1, wherein at least one of the first weighted value and the second weighted value are determined based on a D2D traffic type. 5. The method of claim 1, wherein determining whether the selected first transmission resource is available to transmit the discovery message comprises determining a D2D traffic type. 6. The method of claim 1, wherein the second plurality of transmission resources comprises transmission resources configured as control or data transmission resources. 7. The method of claim 6, wherein control transmission resources comprise Long Term Evolution (LTE) Physical Sidelink Control Channel (PSCCH) resources and data transmission resources comprise LTE Physical Sidelink Shared Channel (PSSCH) resources. 8. The method of claim 1, wherein the second plurality of transmission resources comprises resources scheduled for control or data transmission by the wireless device. 9. The method of claim 1, wherein upon determining the selected first transmission resource is not available to transmit the discovery message, the method further comprises selecting, for use during the first discovery period, a second transmission resource from the first plurality of transmission resources using the first weighted value and the second weighted value. 10. The method of claim 1, wherein upon determining the selected first transmission resource is not available to transmit the discovery message, the method further comprises: incrementing a failed transmission count; retaining the discovery message until a second discovery period; selecting, for use during the second discovery period, a second transmission resource from the first plurality of transmission resources using the first weighted value and the second weighted value; and determining whether the selected second transmission resource is available to transmit the retained discovery message based at least in part on the failed transmission count. 11. The method of claim 1, further comprising selecting, for use during a second discovery period, a transmission resource from the first plurality of transmission resources that corresponds to the first transmission resource selected for use during the first discovery period. 12. A wireless device capable of device-to-device (D2D) communication in a wireless communication network, the wireless device comprising a processor, a memory, and a power source, the processor operable to: obtain a first plurality of transmission resources, the first plurality of transmission resources comprising transmission resources available to the wireless device for transmitting D2D discovery messages; obtain a second plurality of transmission resources, the second plurality of transmission resources comprising a subset of the first plurality of transmission resources, the subset comprising transmission resources potentially unavailable to the wireless device for transmitting D2D discovery messages; associate a first weighted value with each transmission resource of the first plurality of transmission resources not included in the second plurality of transmission resources; associate a second weighted value with each transmission resource of the second plurality of transmission resources; select, for use during a first discovery period, a first transmission resource from the first plurality of transmission resources using the first weighted value and the second weighted value; determine whether the selected first transmission resource is available to transmit a discovery message; and upon determining the selected first transmission resource is available to transmit the discovery message, transmit the discovery message using the selected first transmission resource. 13. The wireless device of claim 12, wherein the processor is operable to select the transmission resource from the first plurality of transmission resources by excluding from selection any transmission resources associated with the second weighted value. 14. The wireless device of claim 12, wherein the processor is operable to select the transmission resource from the first plurality of transmission resources by performing a pseudo-random selection of transmission resources where transmission resources associated with the first weighted value are more likely to be selected than transmission resources associated with the second weighted value. 15. The wireless device of claim 12, wherein at least one of the first weighted value and the second weighted value are determined based on a D2D traffic type. 16. The wireless device of claim 12, wherein the processor operable to determine whether the selected first transmission resource is available to transmit the discovery message is operable to determine a D2D traffic type. 17. The wireless device of claim 12, wherein the second plurality of transmission resources comprises transmission resources configured as control or data transmission resources. 18. The wireless device of claim 17, wherein control transmission resources comprise Long Term Evolution (LTE) Physical Sidelink Control Channel (PSCCH) resources and data transmission resources comprise LTE Physical Sidelink Shared Channel (PSSCH) resources. 19. The wireless device of claim 12, wherein the second plurality of transmission resources comprises resources scheduled for control or data transmission by the wireless device. 20. The wireless device of claim 12, wherein the processor, upon determining the selected first transmission resource is not available to transmit the discovery message, is operable to select, for use during the first discovery period, a second transmission resource from the first plurality of transmission resources using the first weighted value and the second weighted value. 21. The wireless device of claim 12, wherein the processor, upon determining the selected first transmission resource is not available to transmit the discovery message, is operable to: increment a failed transmission count; retain the discovery message until a second discovery period; select, for use during the second discovery period, a second transmission resource from the first plurality of transmission resources using the first weighted value and the second weighted value; and determine whether the selected second transmission resource is available to transmit the retained discovery message based at least in part on the failed transmission count. 22. The wireless device of claim 12, the processor further operable to select, for use during a second discovery period, a transmission resource from the first plurality of transmission resources that corresponds to the first transmission resource selected for use during the first discovery period. 24. A user equipment (UE) capable of device-to-device (D2D) communication in a wireless communication network, the UE comprising: an antenna configured to send and receive wireless signals; radio front-end circuitry connected to the antenna and to processing circuitry, and configured to condition signals communicated between the antenna and the processing circuitry; the processing circuitry being configured to: obtain a first plurality of transmission resources, the first plurality of transmission resources comprising transmission resources available to the wireless device for transmitting D2D discovery messages; obtain a second plurality of transmission resources, the second plurality of transmission resources comprising a subset of the first plurality of transmission resources, the subset comprising transmission resources potentially unavailable to the wireless device for transmitting D2D discovery messages; associate a first weighted value with each transmission resource of the first plurality of transmission resources not included in the second plurality of transmission resources; associate a second weighted value with each transmission resource of the second plurality of transmission resources; select, for use during a first discovery period, a first transmission resource from the first plurality of transmission resources using the first weighted value and the second weighted value; determine whether the selected first transmission resource is available to transmit a discovery message; and upon determining the selected first transmission resource is available to transmit the discovery message, transmit the discovery message using the selected first transmission resource; an input interface connected to the processing circuitry and configured to allow input of information into the UE to be processed by the processing circuitry; an output interface connected to the processing circuitry and configured to output information from the UE that has been processed by the processing circuitry; and a battery connected to the processing circuitry and configured to supply power to the UE.
2,400
7,881
7,881
14,561,455
2,434
Described herein is an efficient, dynamic Symmetric Searchable Encryption (SSE) scheme. A client computing device includes a plurality of files and a dictionary of keywords. An index is generated that indicates, for each keyword and each file, whether a file includes a respective keyword. The index is encrypted and transmitted (with encryptions of the files) to a remote repository. The index is dynamically updateable at the remote repository, and can be utilized to search for files that include keywords in the dictionary without providing the remote repository with information that identifies content of the file or the keyword.
1-20. (canceled) 21. A method executed at a server computing device, the method comprising: storing ciphertexts in a data repository, the ciphertexts being encryptions of files; storing an encrypted index in the data repository, the encrypted index being an encryption of an index that indexes the files by words included in the files; receiving, from a client computing device, a new ciphertext that is to be added to the ciphertexts, the new ciphertext being an encryption of a new file; and updating the encrypted index to reflect addition of the new ciphertext to the ciphertexts, wherein updating of the encrypted index is performed without decrypting the encrypted index to acquire the index. 22. The method of claim 21, wherein the encrypted index has a tree structure. 23. The method of claim 22, wherein the tree structure is a red black tree. 24. The method of claim 21, further comprising: receiving a search token from the client computing device, the search token comprising an encryption of a keyword that is included in the file; searching the encrypted index based upon the search token; identifying the new ciphertext based upon the searching of the encrypted index; and transmitting the new ciphertext to the client computing device. 25. The method of claim 21, the ciphertexts being encrypted emails. 26. The method of claim 21, the ciphertexts being encrypted images. 27. The method of claim 21, further comprising: receiving, from the client computing device, an add token, the add token comprises an update to the encrypted index, wherein updating the encrypted index to reflect addition of the new ciphertext to the ciphertexts comprises updating the encrypted index to include the update in the add token. 28. The method of claim 21, further comprising: receiving a delete token from the client computing device, the delete token comprises an update to the encrypted index that reflects deletion of a ciphertext from the ciphertexts; responsive to receiving the delete token, updating the encrypted index based upon the delete token to reflect deletion of the ciphertext from the ciphertexts, wherein updating of the encrypted index to reflect deletion of the ciphertext is performed without decrypting the encrypted index. 29. The method of claim 21, the ciphertext and the encrypted index are encrypted based upon a key that is inaccessible to the server computing device. 30. A server computing device that is in network communication with a client computing device, the server computing device comprises: computer-readable storage that comprises: ciphertexts, the ciphertexts are encryptions of files; and an encrypted index, the encrypted index being an encryption of an index that indexes the files by keywords included in the files; a processor; and memory that comprises instructions that, when executed by the processor, cause the processor to perform acts comprising: responsive to receipt of a request from the client computing device to add a ciphertext to the ciphertexts in the computer-readable storage, updating the encrypted index to reflect addition of the ciphertext to the ciphertexts, the ciphertext being an encryption of a file, wherein updating the encrypted index is performed without acquiring the index; subsequent to the encrypted index being updated, searching the encrypted index based upon a search token received from the client computing device, the search token comprising an encryption of a keyword that is included in the file; identifying the ciphertext based upon the searching of the encrypted index; and transmitting the ciphertext to the client computing device based upon the searching of the encrypted index. 31. The server computing device of claim 30, the encrypted index having a tree structure. 32. The server computing device of claim 31, the tree structure being a binary tree structure. 33. The server computing device of claim 31, the tree structure being a tertiary tree structure. 34. The server computing device of claim 30, the searching of the encrypted index based upon the search token performed without decrypting the encrypted index to acquire the index, and further without decrypting the encryption of the keyword in the search token. 35. The server computing device of claim 30, the ciphertexts being encryptions of images. 36. The server computing device of claim 30, the ciphertexts being encryptions of messages. 37. The server computing device of claim 30, the acts further comprising: responsive to receipt of a request from the client computing device to delete a second ciphertext from the ciphertexts in the computer-readable storage, updating the encrypted index to reflect deletion of the second ciphertext to the ciphertexts, the second ciphertext being an encryption of a second file, wherein updating the encrypted index to reflect deletion of the second ciphertext is performed without acquiring the index; subsequent to the encrypted index being updated to reflect deletion of the second ciphertext, searching the encrypted index based upon a second search token received from the client computing device, the second search token comprising an encryption of a second keyword that is included in the second file; and failing to identify the second ciphertext in the ciphertexts when searching the encrypted index. 38. The server computing device of claim 30, the request to add the ciphertext to the ciphertexts comprises an add token, the add token comprises an encrypted portion of the index that is to be updated, the acts further comprising updating the encrypted index based upon the encrypted portion of the index included in the add token. 39. The server computing device of claim 30, the ciphertexts ordered in a sequence, and wherein updating of the encrypted index to reflect addition of the ciphertext to the ciphertexts is based upon the sequence. 40. A server computing device comprising a computer-readable medium, the computer-readable medium comprises instructions that, when executed by a processor, cause the processor to perform acts comprising: responsive to receiving one of an add token or a delete token from a client computing device, dynamically updating a searchable encrypted index based upon the add token or the delete token, the updating is performed without decrypting the searchable encrypted index, and wherein updating the encrypted index comprises: when the add token is received, updating the searchable encrypted index to reflect that a file has been added to a file collection; and when the delete token is received, updating the searchable encrypted index to reflect that a file has been deleted from the file collection; and subsequent to dynamically updating the searchable encrypted index, searching the searchable encrypted index using an encrypted keyword received from the client computing device, the searching performed without decrypting the searchable encrypted index and without decrypting the encrypted keyword; based upon the searching of the searchable encrypted index, transmitting data to the client computing device that is indicative of a particular file in the file collection that comprises the keyword.
Described herein is an efficient, dynamic Symmetric Searchable Encryption (SSE) scheme. A client computing device includes a plurality of files and a dictionary of keywords. An index is generated that indicates, for each keyword and each file, whether a file includes a respective keyword. The index is encrypted and transmitted (with encryptions of the files) to a remote repository. The index is dynamically updateable at the remote repository, and can be utilized to search for files that include keywords in the dictionary without providing the remote repository with information that identifies content of the file or the keyword.1-20. (canceled) 21. A method executed at a server computing device, the method comprising: storing ciphertexts in a data repository, the ciphertexts being encryptions of files; storing an encrypted index in the data repository, the encrypted index being an encryption of an index that indexes the files by words included in the files; receiving, from a client computing device, a new ciphertext that is to be added to the ciphertexts, the new ciphertext being an encryption of a new file; and updating the encrypted index to reflect addition of the new ciphertext to the ciphertexts, wherein updating of the encrypted index is performed without decrypting the encrypted index to acquire the index. 22. The method of claim 21, wherein the encrypted index has a tree structure. 23. The method of claim 22, wherein the tree structure is a red black tree. 24. The method of claim 21, further comprising: receiving a search token from the client computing device, the search token comprising an encryption of a keyword that is included in the file; searching the encrypted index based upon the search token; identifying the new ciphertext based upon the searching of the encrypted index; and transmitting the new ciphertext to the client computing device. 25. The method of claim 21, the ciphertexts being encrypted emails. 26. The method of claim 21, the ciphertexts being encrypted images. 27. The method of claim 21, further comprising: receiving, from the client computing device, an add token, the add token comprises an update to the encrypted index, wherein updating the encrypted index to reflect addition of the new ciphertext to the ciphertexts comprises updating the encrypted index to include the update in the add token. 28. The method of claim 21, further comprising: receiving a delete token from the client computing device, the delete token comprises an update to the encrypted index that reflects deletion of a ciphertext from the ciphertexts; responsive to receiving the delete token, updating the encrypted index based upon the delete token to reflect deletion of the ciphertext from the ciphertexts, wherein updating of the encrypted index to reflect deletion of the ciphertext is performed without decrypting the encrypted index. 29. The method of claim 21, the ciphertext and the encrypted index are encrypted based upon a key that is inaccessible to the server computing device. 30. A server computing device that is in network communication with a client computing device, the server computing device comprises: computer-readable storage that comprises: ciphertexts, the ciphertexts are encryptions of files; and an encrypted index, the encrypted index being an encryption of an index that indexes the files by keywords included in the files; a processor; and memory that comprises instructions that, when executed by the processor, cause the processor to perform acts comprising: responsive to receipt of a request from the client computing device to add a ciphertext to the ciphertexts in the computer-readable storage, updating the encrypted index to reflect addition of the ciphertext to the ciphertexts, the ciphertext being an encryption of a file, wherein updating the encrypted index is performed without acquiring the index; subsequent to the encrypted index being updated, searching the encrypted index based upon a search token received from the client computing device, the search token comprising an encryption of a keyword that is included in the file; identifying the ciphertext based upon the searching of the encrypted index; and transmitting the ciphertext to the client computing device based upon the searching of the encrypted index. 31. The server computing device of claim 30, the encrypted index having a tree structure. 32. The server computing device of claim 31, the tree structure being a binary tree structure. 33. The server computing device of claim 31, the tree structure being a tertiary tree structure. 34. The server computing device of claim 30, the searching of the encrypted index based upon the search token performed without decrypting the encrypted index to acquire the index, and further without decrypting the encryption of the keyword in the search token. 35. The server computing device of claim 30, the ciphertexts being encryptions of images. 36. The server computing device of claim 30, the ciphertexts being encryptions of messages. 37. The server computing device of claim 30, the acts further comprising: responsive to receipt of a request from the client computing device to delete a second ciphertext from the ciphertexts in the computer-readable storage, updating the encrypted index to reflect deletion of the second ciphertext to the ciphertexts, the second ciphertext being an encryption of a second file, wherein updating the encrypted index to reflect deletion of the second ciphertext is performed without acquiring the index; subsequent to the encrypted index being updated to reflect deletion of the second ciphertext, searching the encrypted index based upon a second search token received from the client computing device, the second search token comprising an encryption of a second keyword that is included in the second file; and failing to identify the second ciphertext in the ciphertexts when searching the encrypted index. 38. The server computing device of claim 30, the request to add the ciphertext to the ciphertexts comprises an add token, the add token comprises an encrypted portion of the index that is to be updated, the acts further comprising updating the encrypted index based upon the encrypted portion of the index included in the add token. 39. The server computing device of claim 30, the ciphertexts ordered in a sequence, and wherein updating of the encrypted index to reflect addition of the ciphertext to the ciphertexts is based upon the sequence. 40. A server computing device comprising a computer-readable medium, the computer-readable medium comprises instructions that, when executed by a processor, cause the processor to perform acts comprising: responsive to receiving one of an add token or a delete token from a client computing device, dynamically updating a searchable encrypted index based upon the add token or the delete token, the updating is performed without decrypting the searchable encrypted index, and wherein updating the encrypted index comprises: when the add token is received, updating the searchable encrypted index to reflect that a file has been added to a file collection; and when the delete token is received, updating the searchable encrypted index to reflect that a file has been deleted from the file collection; and subsequent to dynamically updating the searchable encrypted index, searching the searchable encrypted index using an encrypted keyword received from the client computing device, the searching performed without decrypting the searchable encrypted index and without decrypting the encrypted keyword; based upon the searching of the searchable encrypted index, transmitting data to the client computing device that is indicative of a particular file in the file collection that comprises the keyword.
2,400
7,882
7,882
13,631,110
2,426
Novel tools and techniques are described for generating or extracting keywords based on trend data related to contemporary news events, social media topics, and/or Internet searches, etc. Local and/or remote content catalogs, which are respectively associated with local and remote content libraries, are searched for relevant multimedia content (e.g., video, audio, and/or written content) using the generated or extracted keywords. Dynamic automated on-demand and/or broadcast channels are generated that incorporate the relevant multimedia content, and streamed and/or broadcast to one or more user devices (including PCs, televisions, and mobile devices). User-interactive selection capabilities are optionally provided during the channel generation process.
1. A method for compiling video content for presentation in dynamic automated content channels to a user, the method comprising: accessing, at a head-end of a telecommunications system, trend data from a trend database, wherein the trend data represents contemporary social media, Internet searches, or news events; generating, at the head-end, keywords based on the trend data; storing, at the head-end, the generated keywords in a keyword database; searching, at the head-end, at least one content catalog of at least one content library for video content that is relevant to the generated keywords; generating, at the head-end, a list of relevant video content based on the search of the at least one content catalog; generating, at the head-end, at least one dynamic automated on-demand channel for streaming the relevant video content, based on the list of relevant video content, wherein the head-end is configured to display a selection screen on the at least one dynamic automated on-demand channel from which the user is enabled to select a program of the relevant video content for streaming; generating, at the head-end, at least one dynamic automated broadcast channel associated with the relevant video content based on the at least one content catalog, wherein the head-end is configured to generate a programming schedule of the relevant video content based on predetermined criteria and to broadcast the relevant video content to a plurality of users on the at least one dynamic automated broadcast channel based on the generated programming schedule, wherein the predetermined criteria include at least one criterion selected from the group consisting of relevance, user preference, popularity, age of viewers, length of video content, subject matter of video content, and broadcaster's program scheduling policies; formatting, at the head-end, the program of relevant video content and the broadcast relevant video content for presentation on at least one user device, wherein the at least one user device includes at least one of a cable television system, an interactive television system, a standard television system, a gaming console, a mobile device, a personal computer, and a tablet computer; and providing, at the at least one user device and selectable by user input, user access to one or more of the at least one dynamic automated on-demand channel and the at least one dynamic automated broadcast channel, the dynamic automated on-demand channel presenting the program of relevant video content and the dynamic automated broadcast channel presenting the broadcast relevant video content. 2. A method for compiling multimedia content for presentation in dynamic automated content channels to a user, the method comprising: accessing, at a server of a telecommunications system, trend data from a trend database; generating, at the server, keywords based on the trend data; searching, at the server, at least one content catalog of at least one content library for multimedia content that is relevant to the generated keywords; generating, at the server, at least one dynamic automated content channel on which the relevant multimedia content is presented; providing, at one or more user devices associated with the user, user access to the at least one dynamic automated content channel; and generating, at the server, at least one dynamic automated broadcast channel associated with the relevant video content based on the at least one content catalog, wherein the head-end is configured to generate a programming schedule of the relevant video content based on predetermined criteria and to broadcast the relevant video content to a plurality of users on the at least one dynamic automated broadcast channel based on the generated programming schedule, wherein the predetermined criteria include at least one criterion selected from the group consisting of relevance, user preference, popularity, age of viewers, length of video content, subject matter of video content, and broadcaster's program scheduling policies. 3. The method of claim 2, wherein the multimedia content includes at least one of video content, audio content, and written content formatted as a video on-demand stream or a video broadcast. 4. The method of claim 2, wherein the server of a telecommunications system includes at least one of a server located at a head-end of the telecommunications system, a server located external to the head-end that is communicatively coupled to the head-end, a server located at a broadcast television distribution system, and a server located external to the broadcast television distribution system that is communicatively coupled to the broadcast television distribution system. 5. The method of claim 2, wherein the trend data represents one or more of contemporary social media, Internet searches, and news events. 6. The method of claim 2, wherein the trend database includes an Internet trend generating database that compiles popularity trends of contemporary social media, Internet searches, or news events based on data compiled from on-line interactions of a plurality of users on the Internet during a predetermined period. 7. The method of claim 6, wherein the predetermined period extends backwards in time from a current time, by seconds, minutes, hours, days, weeks, months, or years. 8. The method of claim 6, wherein the predetermined period includes a user-defined period. 9. The method of claim 2, wherein the trend database includes a user database comprising preferences of the user. 10. The method of claim 9, wherein at least some of the preferences are generated automatically based on personal interactions of the user with social media and the Internet, with respect to contemporary news, events, or user interests. 11. The method of claim 2, further comprising: storing, at the server, the generated keywords in a keyword database. 12. The method of claim 2, wherein the at least one content library includes at least one remote content library that is located external to the server and at least one local content library that is located at the server, wherein the at least one remote content library includes one or more of the Internet, a database server, and an archive, wherein the at least one local content library includes a database. 13. The method of claim 2, further comprising generating, at the server, a list of relevant multimedia content based on the search of the at least one content catalog, wherein generating the at least one dynamic automated content channel is based on the list of relevant multimedia content. 14. The method of claim 2, wherein the at least one dynamic automated content channel includes at least one on-demand channel, wherein the server is configured to display a selection screen on the at least one on-demand channel from which the user is enabled to select one or more of the relevant multimedia content for presentation on the at least one on-demand channel. 15. (canceled) 16. The method of claim 2, wherein the predetermined criteria include at least one of relevance, user preference, popularity, age of viewers, length of multimedia content, subject matter of multimedia content, and broadcaster's program scheduling policies. 17. The method of claim 2, further comprising: formatting, at the server, the relevant multimedia content for presentation on the one or more user devices, wherein the one or more user devices include at least one of a cable television system, an interactive television system, a standard television system, a gaming console, a mobile device, a personal computer, and a tablet computer, and wherein the at least one dynamic automated content channel is configured to present the relevant multimedia content that is formatted for presentation on the user device. 18. The method of claim 2, further comprising: identifying one or more user devices that are associated with the user; retrieving the relevant multimedia content from the at least one content library; formatting the retrieved relevant multimedia content based on characteristics of the identified one or more user devices; and storing the formatted relevant multimedia content in a server, wherein: generating the at least one dynamic automated content channel includes retrieving the formatted relevant multimedia content from the server and compiling the formatted relevant multimedia content for presentation on the one or more user devices, wherein providing user access to the at least one dynamic automated content channel includes enabling the one or more user devices to receive the at least one dynamic automated content channel and transmitting the at least one dynamic automated content channel to the one or more user devices. 19. A system for compiling multimedia content for presentation in dynamic automated content channels to a user, the system comprising: a server at a telecommunications system configured to: access trend data from a trend database; generate keywords based on the trend data; search at least one content catalog of at least one content library for multimedia content that is relevant to the generated keywords; format at least one of the relevant multimedia content for presentation on one or more user devices; and generate at least one dynamic automated broadcast channel associated with the relevant video content based on the at least one content catalog, wherein the head-end is configured to generate a programming schedule of the relevant video content based on predetermined criteria and to broadcast the relevant video content to a plurality of users on the at least one dynamic automated broadcast channel based on the generated programming schedule, wherein the predetermined criteria include at least one criterion selected from the group consisting of relevance, user preference, popularity, age of viewers, length of video content, subject matter of video content, and broadcaster's program scheduling policies; and a transmission system in communication with the server and configured to: transmit the at least one dynamic automated content channel to the one or more user devices for presentation of the relevant multimedia content to the user.
Novel tools and techniques are described for generating or extracting keywords based on trend data related to contemporary news events, social media topics, and/or Internet searches, etc. Local and/or remote content catalogs, which are respectively associated with local and remote content libraries, are searched for relevant multimedia content (e.g., video, audio, and/or written content) using the generated or extracted keywords. Dynamic automated on-demand and/or broadcast channels are generated that incorporate the relevant multimedia content, and streamed and/or broadcast to one or more user devices (including PCs, televisions, and mobile devices). User-interactive selection capabilities are optionally provided during the channel generation process.1. A method for compiling video content for presentation in dynamic automated content channels to a user, the method comprising: accessing, at a head-end of a telecommunications system, trend data from a trend database, wherein the trend data represents contemporary social media, Internet searches, or news events; generating, at the head-end, keywords based on the trend data; storing, at the head-end, the generated keywords in a keyword database; searching, at the head-end, at least one content catalog of at least one content library for video content that is relevant to the generated keywords; generating, at the head-end, a list of relevant video content based on the search of the at least one content catalog; generating, at the head-end, at least one dynamic automated on-demand channel for streaming the relevant video content, based on the list of relevant video content, wherein the head-end is configured to display a selection screen on the at least one dynamic automated on-demand channel from which the user is enabled to select a program of the relevant video content for streaming; generating, at the head-end, at least one dynamic automated broadcast channel associated with the relevant video content based on the at least one content catalog, wherein the head-end is configured to generate a programming schedule of the relevant video content based on predetermined criteria and to broadcast the relevant video content to a plurality of users on the at least one dynamic automated broadcast channel based on the generated programming schedule, wherein the predetermined criteria include at least one criterion selected from the group consisting of relevance, user preference, popularity, age of viewers, length of video content, subject matter of video content, and broadcaster's program scheduling policies; formatting, at the head-end, the program of relevant video content and the broadcast relevant video content for presentation on at least one user device, wherein the at least one user device includes at least one of a cable television system, an interactive television system, a standard television system, a gaming console, a mobile device, a personal computer, and a tablet computer; and providing, at the at least one user device and selectable by user input, user access to one or more of the at least one dynamic automated on-demand channel and the at least one dynamic automated broadcast channel, the dynamic automated on-demand channel presenting the program of relevant video content and the dynamic automated broadcast channel presenting the broadcast relevant video content. 2. A method for compiling multimedia content for presentation in dynamic automated content channels to a user, the method comprising: accessing, at a server of a telecommunications system, trend data from a trend database; generating, at the server, keywords based on the trend data; searching, at the server, at least one content catalog of at least one content library for multimedia content that is relevant to the generated keywords; generating, at the server, at least one dynamic automated content channel on which the relevant multimedia content is presented; providing, at one or more user devices associated with the user, user access to the at least one dynamic automated content channel; and generating, at the server, at least one dynamic automated broadcast channel associated with the relevant video content based on the at least one content catalog, wherein the head-end is configured to generate a programming schedule of the relevant video content based on predetermined criteria and to broadcast the relevant video content to a plurality of users on the at least one dynamic automated broadcast channel based on the generated programming schedule, wherein the predetermined criteria include at least one criterion selected from the group consisting of relevance, user preference, popularity, age of viewers, length of video content, subject matter of video content, and broadcaster's program scheduling policies. 3. The method of claim 2, wherein the multimedia content includes at least one of video content, audio content, and written content formatted as a video on-demand stream or a video broadcast. 4. The method of claim 2, wherein the server of a telecommunications system includes at least one of a server located at a head-end of the telecommunications system, a server located external to the head-end that is communicatively coupled to the head-end, a server located at a broadcast television distribution system, and a server located external to the broadcast television distribution system that is communicatively coupled to the broadcast television distribution system. 5. The method of claim 2, wherein the trend data represents one or more of contemporary social media, Internet searches, and news events. 6. The method of claim 2, wherein the trend database includes an Internet trend generating database that compiles popularity trends of contemporary social media, Internet searches, or news events based on data compiled from on-line interactions of a plurality of users on the Internet during a predetermined period. 7. The method of claim 6, wherein the predetermined period extends backwards in time from a current time, by seconds, minutes, hours, days, weeks, months, or years. 8. The method of claim 6, wherein the predetermined period includes a user-defined period. 9. The method of claim 2, wherein the trend database includes a user database comprising preferences of the user. 10. The method of claim 9, wherein at least some of the preferences are generated automatically based on personal interactions of the user with social media and the Internet, with respect to contemporary news, events, or user interests. 11. The method of claim 2, further comprising: storing, at the server, the generated keywords in a keyword database. 12. The method of claim 2, wherein the at least one content library includes at least one remote content library that is located external to the server and at least one local content library that is located at the server, wherein the at least one remote content library includes one or more of the Internet, a database server, and an archive, wherein the at least one local content library includes a database. 13. The method of claim 2, further comprising generating, at the server, a list of relevant multimedia content based on the search of the at least one content catalog, wherein generating the at least one dynamic automated content channel is based on the list of relevant multimedia content. 14. The method of claim 2, wherein the at least one dynamic automated content channel includes at least one on-demand channel, wherein the server is configured to display a selection screen on the at least one on-demand channel from which the user is enabled to select one or more of the relevant multimedia content for presentation on the at least one on-demand channel. 15. (canceled) 16. The method of claim 2, wherein the predetermined criteria include at least one of relevance, user preference, popularity, age of viewers, length of multimedia content, subject matter of multimedia content, and broadcaster's program scheduling policies. 17. The method of claim 2, further comprising: formatting, at the server, the relevant multimedia content for presentation on the one or more user devices, wherein the one or more user devices include at least one of a cable television system, an interactive television system, a standard television system, a gaming console, a mobile device, a personal computer, and a tablet computer, and wherein the at least one dynamic automated content channel is configured to present the relevant multimedia content that is formatted for presentation on the user device. 18. The method of claim 2, further comprising: identifying one or more user devices that are associated with the user; retrieving the relevant multimedia content from the at least one content library; formatting the retrieved relevant multimedia content based on characteristics of the identified one or more user devices; and storing the formatted relevant multimedia content in a server, wherein: generating the at least one dynamic automated content channel includes retrieving the formatted relevant multimedia content from the server and compiling the formatted relevant multimedia content for presentation on the one or more user devices, wherein providing user access to the at least one dynamic automated content channel includes enabling the one or more user devices to receive the at least one dynamic automated content channel and transmitting the at least one dynamic automated content channel to the one or more user devices. 19. A system for compiling multimedia content for presentation in dynamic automated content channels to a user, the system comprising: a server at a telecommunications system configured to: access trend data from a trend database; generate keywords based on the trend data; search at least one content catalog of at least one content library for multimedia content that is relevant to the generated keywords; format at least one of the relevant multimedia content for presentation on one or more user devices; and generate at least one dynamic automated broadcast channel associated with the relevant video content based on the at least one content catalog, wherein the head-end is configured to generate a programming schedule of the relevant video content based on predetermined criteria and to broadcast the relevant video content to a plurality of users on the at least one dynamic automated broadcast channel based on the generated programming schedule, wherein the predetermined criteria include at least one criterion selected from the group consisting of relevance, user preference, popularity, age of viewers, length of video content, subject matter of video content, and broadcaster's program scheduling policies; and a transmission system in communication with the server and configured to: transmit the at least one dynamic automated content channel to the one or more user devices for presentation of the relevant multimedia content to the user.
2,400
7,883
7,883
15,523,365
2,487
A machine vision based automatic needle cannula inspection system and methods of use. The system comprises of an inspection and control unit, image capture devices ( 32, 33 ), light sources ( 34, 35, 36, 37 ), a unit that makes the needle cannula ( 28 ) and the image capture device(s) ( 32, 33 ) rotate relative to each other, and a rejected part removal unit. By means of rotating the needle cannula ( 28 ) and image capture devices ( 32, 33 ) relatively, a plurality of images captured along the circumferential direction of the needle cannula are directly saved to a computer, the images are then screened, processed and analyzed to fulfill the automatic inspection of multiple quality and technical parameters of the needle cannula without the need to position the bevel area of cannula tip to a specific direction. Inspection parameters and accuracy can be set at any time, the system can automatically record classification and statistics of passed and rejected needle cannulae for query, and the rejected cannulae are removed automatically at next position. All the functions are completed at one work station, and needle cannula tips on both sides can be inspected simultaneously, if needed. Thereby the inspection efficiency and reliability are greatly improved, resulting in extremely extensive application prospects and huge economic values.
1. A machine vision based automatic needle cannula inspection system comprising: An inspection and control unit, to establish and realize its synchronized control and information processing with all other units of the automatic inspection system, and one of the following items a, b or c: a. A needle cannula holding and positioning unit, to separate, position and hold the needle cannula and to be able to keep the said needle cannula in position while the said needle cannula is driven to rotate; A needle cannula driving unit, to rotate the said needle cannula; Fixed image capture device(s), to capture images of rotating needle cannula driven by the said needle cannula driving unit while synchronized and controlled by the said inspection and control unit; b. A needle cannula holding, positioning and rotating unit, to separate, position, hold and rotate the said needle cannula and to be able to keep the said needle cannula in position; Fixed image capture device(s), to capture images of rotating needle cannula while synchronized and controlled by the said inspection and control unit; c. A fixed needle cannula holding and positioning unit, to separate, position and hold the said needle cannula; Image capture device(s) rotating around the said needle cannula, to capture images of the said fixed needle cannula while rotating around the said needle cannula and synchronized and controlled by the said inspection and control unit. 2. A needle cannula inspection system according to claim 1, wherein the said needle cannula holding and positioning unit is a cannula wheel device, or linear stepper tool bars, or a linear stepper belt; Said needle cannula driving unit is a power-driven rotating belt system, or a power-driven rotating wheel, which enables the said fixed image capture device(s) to capture images of rotating needle cannula driven by the said needle cannula driving unit while synchronized and controlled by the said inspection and control unit. 3. A needle cannula inspection system according to claim 1, wherein the said needle cannula holding, positioning and rotating unit is a device that can separate, position, hold and rotate the said needle cannula and to be able to keep the said needle cannula in position, so that the said fixed image capture device(s) can capture images of rotating needle cannula while synchronized and controlled by the said inspection and control unit. 4. A needle cannula inspection system according to claim 1, wherein said fixed needle cannula holding and positioning unit is a cannula wheel device, or linear stepper tool bars, or a linear stepper belt, or any device that can individually separate and fix the said needle cannula; Said image capture device(s) rotating around the said needle cannula is a system that rotates around the said needle cannula when driven by power and is capable of keeping the image capture device(s) focused on said needle cannula while capturing images and synchronized and controlled by the said inspection and control unit. 5. A needle cannula inspection system according to claim 2, wherein, on both sides of the circumferential edge of the said cannula wheel, or on top of the said linear stepper tool bars or the said linear stepper belt, there are uniformly and symmetrically set teeth, between two adjacent teeth there is a tooth groove or slot where said needle cannula to be inspected is placed in, each tooth groove or slot is placed at most one said needle cannula, said cannula wheel only rotates forward one tooth at a time or the said linear stepper tool bars or the said linear stepper belt only move forward one tooth at a time. 6. A needle cannula inspection system according to claim 5, wherein said power-driven rotating belt system or said power-driven rotating wheel is placed above the said cannula wheel or the said linear stepper tool bars or linear stepper belt, forming an engagement area with said cannula wheel or on the said linear stepper tool bars or linear stepper belt in which said power-driven rotating belt or power-driven rotating wheel is pressed onto the said needle cannula near the bottom of tooth grove or slot, when the said belt or wheel is driven to rotate, it will drive the said needle cannula to rotate, said engagement area is a cylindrical area whose diameter is on the circumference of the bottom of said tooth grooves or slots of said cannula wheel, or a plane whose height is the same as the bottom of tooth grooves or slots on said linear stepper tool bars or linear stepper belt, the width of said power-driven rotating belt or power-driven rotating wheel is slightly less than the width of the said engagement area. 7. A needle cannula inspection system according to claim 1, wherein a plurality of images are captured while said image capture device(s) and said needle cannula rotate relatively for a whole circle. 8. A needle cannula inspection system according to claim 7, wherein said image capture device(s) and said needle cannula rotate relatively at a constant speed and a plurality of images are captured at equal intervals for a whole circle. 9. A needle cannula inspection system according to claim 1, wherein said image capture device(s) could be double image capture devices. 10. A needle cannula inspection system according to claim 1, wherein the system further comprises a rejected part removal unit. 11. A needle cannula inspection system according to claim 10, wherein said inspection and control unit is a computer, said image capture device is at least one camera, said inspection and control unit is connected with said image capture device(s), motors of said needle cannula holding and positioning unit or said needle cannula holding, positioning and rotating unit or said fixed needle cannula holding and positioning unit, and said rejected part removal unit respectively with synchronized control settings. 12. A machine vision based automatic needle cannula inspection method comprising: By rotating said needle cannula relative to said image capture device(s), a plurality of images are captured along the circumferential direction of said needle cannula for a whole circle; Various quality and technical parameters of said needle cannula are inspected through screening, processing and analyzing the captured images. 13. A needle cannula inspection method according to claim 12, wherein a plurality of images are captured along the circumferential direction of said needle cannula at equal intervals continuously for a whole circle. 14. A needle cannula inspection method according to claim 12 comprises the following steps: (1) Select and adjust said image capture device(s), lenses and light sources based on the dimension of said needle cannula and set parameters such as distance, aperture and exposure time to capture clear images; (2) Set the accuracy and threshold for each inspection parameter; (3) Connect said computer with said image capture device(s), motors of cannula wheel device or linear stepper tool bars or linear stepper belt and said rejected part removal unit respectively with synchronized control settings. 15. A needle cannula inspection method according to claim 14 comprises further the following steps: (4) Said cannula wheel step rotates forward, or said linear stepper tool bars or linear stepper belt step moves forward; (5) Each tooth groove or slot of said cannula wheel or linear stepper tool bars or linear stepper belt is placed with one needle cannula; (6) Said cannula wheel or linear stepper tool bars or linear stepper belt pauses when the bevel area of said needle cannula in the tooth groove or slot is within the focus position of said image capture device; (7) Said power-driven rotating belt system or said power-driven rotating wheel above the said cannula wheel or linear stepper tool bars or linear stepper belt automatically presses onto the said needle cannula in the tooth groove or slot, and drive the said needle cannula to rotate; (8) Said computer sends a signal to start said image capture device(s); (9) Under illumination of said light sources, a plurality of images are captured at equal intervals while said image capture device(s) and said needle cannula rotate relatively at a constant speed for a whole circle, said images are saved to said computer, processed with machine vision techniques, and whether the needle cannula passes the inspection is recorded. 16. A needle cannula inspection method according to claim 12, wherein multithreading techniques and double image capture devices can be used to inspect both bevel areas at each end for needle cannula with bevel areas at both ends simultaneously. 17. A needle cannula inspection method according to claim 14, wherein said cannula wheel step rotates forward one tooth at a time, or said linear stepper tool bars or linear stepper belt step moves forward one tooth at a time. 18. A needle cannula inspection method according to claim 12, wherein conventional graying, filtering, binarization and rough edge extraction are processed on saved images. 19. A needle cannula inspection method according to claim 15 comprises further the following step: (10) Rejected needle cannula is blown off by compressed air of the rejected part removal device while qualified needle cannulae advance with said cannula wheel or linear stepper tool bars or linear stepper belt into the next process. 20. A needle cannula inspection method according to claim 19 further comprises the following step: (11) Upon completion of said needle cannula rotating relative to said image capture device(s) for a full circle and image capture process, said cannula wheel or linear stepper tool bars or linear stepper belt controlled by the computer signal advances one tooth and wait for the computer signal to start the image capture device(s) on next needle cannula. 21. A needle cannula inspection method according to claim 12, wherein a plurality of images captured on one bevel area of said needle cannula are processed to inspect at least one of the following quality and/or technical parameters: (a) Burrs on bevels and needle tip sharpness; (b) Inward or outward curved needle tips; (c) Accuracy of several bevel angles of needle cannula tip area; (d) Length of needle cannula. 22. A needle cannula inspection method according to claim 21, wherein the inspection on needle burrs on bevels and tip sharpness by processing and analyzing a plurality of images captured on one bevel area of said needle cannula comprises the following steps: (1) Among all the images captured around a full needle cannula circumference on one tip area, choose the one image with largest bright area; then perform accurate continuous area extraction, contour extraction, curve fitting and ellipse fitting to obtain ideal inner contour, outer contour and burrs; (2) When the burr's dimension, if any, exceeds the preset threshold, the needle cannula is disqualified; (3) Perform linear fitting of the upper portion of the bright area's outer contour, the two straight lines form an intersection above the needle tip, if the distance between the said intersection and the uppermost point of the bright area exceeds the preset threshold, the needle cannula is disqualified. 23. A needle cannula inspection method according to claim 21, wherein the inspection on inward or outward curved needle tips by processing and analyzing a plurality of images captured on one bevel area of said needle cannula comprises the following steps: First identify the image with largest bright area as in previous steps, then count forward or backward a number of images, the number is nearest to one-forth of total number of images, in other wards, choose the image that is approximately 90 or 270 degrees to the image with largest bright area; this image is almost the side view of the needle cannula; perform linear fitting of the left and right vertical lines; if the distance between the top point of the longest vertical line and horizontally the leftmost pixel or rightmost pixel exceeds the preset threshold, the needle cannula has a curved tip and is disqualified. 24. A needle cannula inspection method according to claim 23, wherein the inspection on accuracy of several bevel angles of needle cannula tip area by processing and analyzing a plurality of images captured on one bevel area of said needle cannula comprises the following steps: Using the same method as in claim 23, perform linear fitting on a few lines in the bevel area, angles formed between the cannula outer line and fitted lines can be calculated. Accuracy of bevel angles can be decided by comparing with preset threshold; by processing the image of near 180 degrees to this image, the accuracy of bevel angles on the other side can also be inspected. 25. A needle cannula inspection method according to claim 21, wherein the needle cannula length can be calculated when both ends of the needle cannula are inspected and the distance between camera A and camera B is calibrated, thus the needle cannula length can be inspected by comparing with preset threshold. 26. A needle cannula inspection method according to claim 21, wherein the needle cannula length can be calculated when only one end of the needle cannula is inspected, the other end is in a fixed position and the distance between camera and the other end is calibrated, thus the needle cannula length can be inspected by comparing with preset threshold. 27. A needle cannula inspection method according to claim 21, wherein the system can automatically record classification and statistics of passed and rejected cannulae for query. 28. A needle cannula inspection method according to claim 12, wherein a plurality of images captured along the circumferential direction of said needle cannula for a whole circle can be used to build a three-dimensional model, with which quality and technical parameters can be inspected.
A machine vision based automatic needle cannula inspection system and methods of use. The system comprises of an inspection and control unit, image capture devices ( 32, 33 ), light sources ( 34, 35, 36, 37 ), a unit that makes the needle cannula ( 28 ) and the image capture device(s) ( 32, 33 ) rotate relative to each other, and a rejected part removal unit. By means of rotating the needle cannula ( 28 ) and image capture devices ( 32, 33 ) relatively, a plurality of images captured along the circumferential direction of the needle cannula are directly saved to a computer, the images are then screened, processed and analyzed to fulfill the automatic inspection of multiple quality and technical parameters of the needle cannula without the need to position the bevel area of cannula tip to a specific direction. Inspection parameters and accuracy can be set at any time, the system can automatically record classification and statistics of passed and rejected needle cannulae for query, and the rejected cannulae are removed automatically at next position. All the functions are completed at one work station, and needle cannula tips on both sides can be inspected simultaneously, if needed. Thereby the inspection efficiency and reliability are greatly improved, resulting in extremely extensive application prospects and huge economic values.1. A machine vision based automatic needle cannula inspection system comprising: An inspection and control unit, to establish and realize its synchronized control and information processing with all other units of the automatic inspection system, and one of the following items a, b or c: a. A needle cannula holding and positioning unit, to separate, position and hold the needle cannula and to be able to keep the said needle cannula in position while the said needle cannula is driven to rotate; A needle cannula driving unit, to rotate the said needle cannula; Fixed image capture device(s), to capture images of rotating needle cannula driven by the said needle cannula driving unit while synchronized and controlled by the said inspection and control unit; b. A needle cannula holding, positioning and rotating unit, to separate, position, hold and rotate the said needle cannula and to be able to keep the said needle cannula in position; Fixed image capture device(s), to capture images of rotating needle cannula while synchronized and controlled by the said inspection and control unit; c. A fixed needle cannula holding and positioning unit, to separate, position and hold the said needle cannula; Image capture device(s) rotating around the said needle cannula, to capture images of the said fixed needle cannula while rotating around the said needle cannula and synchronized and controlled by the said inspection and control unit. 2. A needle cannula inspection system according to claim 1, wherein the said needle cannula holding and positioning unit is a cannula wheel device, or linear stepper tool bars, or a linear stepper belt; Said needle cannula driving unit is a power-driven rotating belt system, or a power-driven rotating wheel, which enables the said fixed image capture device(s) to capture images of rotating needle cannula driven by the said needle cannula driving unit while synchronized and controlled by the said inspection and control unit. 3. A needle cannula inspection system according to claim 1, wherein the said needle cannula holding, positioning and rotating unit is a device that can separate, position, hold and rotate the said needle cannula and to be able to keep the said needle cannula in position, so that the said fixed image capture device(s) can capture images of rotating needle cannula while synchronized and controlled by the said inspection and control unit. 4. A needle cannula inspection system according to claim 1, wherein said fixed needle cannula holding and positioning unit is a cannula wheel device, or linear stepper tool bars, or a linear stepper belt, or any device that can individually separate and fix the said needle cannula; Said image capture device(s) rotating around the said needle cannula is a system that rotates around the said needle cannula when driven by power and is capable of keeping the image capture device(s) focused on said needle cannula while capturing images and synchronized and controlled by the said inspection and control unit. 5. A needle cannula inspection system according to claim 2, wherein, on both sides of the circumferential edge of the said cannula wheel, or on top of the said linear stepper tool bars or the said linear stepper belt, there are uniformly and symmetrically set teeth, between two adjacent teeth there is a tooth groove or slot where said needle cannula to be inspected is placed in, each tooth groove or slot is placed at most one said needle cannula, said cannula wheel only rotates forward one tooth at a time or the said linear stepper tool bars or the said linear stepper belt only move forward one tooth at a time. 6. A needle cannula inspection system according to claim 5, wherein said power-driven rotating belt system or said power-driven rotating wheel is placed above the said cannula wheel or the said linear stepper tool bars or linear stepper belt, forming an engagement area with said cannula wheel or on the said linear stepper tool bars or linear stepper belt in which said power-driven rotating belt or power-driven rotating wheel is pressed onto the said needle cannula near the bottom of tooth grove or slot, when the said belt or wheel is driven to rotate, it will drive the said needle cannula to rotate, said engagement area is a cylindrical area whose diameter is on the circumference of the bottom of said tooth grooves or slots of said cannula wheel, or a plane whose height is the same as the bottom of tooth grooves or slots on said linear stepper tool bars or linear stepper belt, the width of said power-driven rotating belt or power-driven rotating wheel is slightly less than the width of the said engagement area. 7. A needle cannula inspection system according to claim 1, wherein a plurality of images are captured while said image capture device(s) and said needle cannula rotate relatively for a whole circle. 8. A needle cannula inspection system according to claim 7, wherein said image capture device(s) and said needle cannula rotate relatively at a constant speed and a plurality of images are captured at equal intervals for a whole circle. 9. A needle cannula inspection system according to claim 1, wherein said image capture device(s) could be double image capture devices. 10. A needle cannula inspection system according to claim 1, wherein the system further comprises a rejected part removal unit. 11. A needle cannula inspection system according to claim 10, wherein said inspection and control unit is a computer, said image capture device is at least one camera, said inspection and control unit is connected with said image capture device(s), motors of said needle cannula holding and positioning unit or said needle cannula holding, positioning and rotating unit or said fixed needle cannula holding and positioning unit, and said rejected part removal unit respectively with synchronized control settings. 12. A machine vision based automatic needle cannula inspection method comprising: By rotating said needle cannula relative to said image capture device(s), a plurality of images are captured along the circumferential direction of said needle cannula for a whole circle; Various quality and technical parameters of said needle cannula are inspected through screening, processing and analyzing the captured images. 13. A needle cannula inspection method according to claim 12, wherein a plurality of images are captured along the circumferential direction of said needle cannula at equal intervals continuously for a whole circle. 14. A needle cannula inspection method according to claim 12 comprises the following steps: (1) Select and adjust said image capture device(s), lenses and light sources based on the dimension of said needle cannula and set parameters such as distance, aperture and exposure time to capture clear images; (2) Set the accuracy and threshold for each inspection parameter; (3) Connect said computer with said image capture device(s), motors of cannula wheel device or linear stepper tool bars or linear stepper belt and said rejected part removal unit respectively with synchronized control settings. 15. A needle cannula inspection method according to claim 14 comprises further the following steps: (4) Said cannula wheel step rotates forward, or said linear stepper tool bars or linear stepper belt step moves forward; (5) Each tooth groove or slot of said cannula wheel or linear stepper tool bars or linear stepper belt is placed with one needle cannula; (6) Said cannula wheel or linear stepper tool bars or linear stepper belt pauses when the bevel area of said needle cannula in the tooth groove or slot is within the focus position of said image capture device; (7) Said power-driven rotating belt system or said power-driven rotating wheel above the said cannula wheel or linear stepper tool bars or linear stepper belt automatically presses onto the said needle cannula in the tooth groove or slot, and drive the said needle cannula to rotate; (8) Said computer sends a signal to start said image capture device(s); (9) Under illumination of said light sources, a plurality of images are captured at equal intervals while said image capture device(s) and said needle cannula rotate relatively at a constant speed for a whole circle, said images are saved to said computer, processed with machine vision techniques, and whether the needle cannula passes the inspection is recorded. 16. A needle cannula inspection method according to claim 12, wherein multithreading techniques and double image capture devices can be used to inspect both bevel areas at each end for needle cannula with bevel areas at both ends simultaneously. 17. A needle cannula inspection method according to claim 14, wherein said cannula wheel step rotates forward one tooth at a time, or said linear stepper tool bars or linear stepper belt step moves forward one tooth at a time. 18. A needle cannula inspection method according to claim 12, wherein conventional graying, filtering, binarization and rough edge extraction are processed on saved images. 19. A needle cannula inspection method according to claim 15 comprises further the following step: (10) Rejected needle cannula is blown off by compressed air of the rejected part removal device while qualified needle cannulae advance with said cannula wheel or linear stepper tool bars or linear stepper belt into the next process. 20. A needle cannula inspection method according to claim 19 further comprises the following step: (11) Upon completion of said needle cannula rotating relative to said image capture device(s) for a full circle and image capture process, said cannula wheel or linear stepper tool bars or linear stepper belt controlled by the computer signal advances one tooth and wait for the computer signal to start the image capture device(s) on next needle cannula. 21. A needle cannula inspection method according to claim 12, wherein a plurality of images captured on one bevel area of said needle cannula are processed to inspect at least one of the following quality and/or technical parameters: (a) Burrs on bevels and needle tip sharpness; (b) Inward or outward curved needle tips; (c) Accuracy of several bevel angles of needle cannula tip area; (d) Length of needle cannula. 22. A needle cannula inspection method according to claim 21, wherein the inspection on needle burrs on bevels and tip sharpness by processing and analyzing a plurality of images captured on one bevel area of said needle cannula comprises the following steps: (1) Among all the images captured around a full needle cannula circumference on one tip area, choose the one image with largest bright area; then perform accurate continuous area extraction, contour extraction, curve fitting and ellipse fitting to obtain ideal inner contour, outer contour and burrs; (2) When the burr's dimension, if any, exceeds the preset threshold, the needle cannula is disqualified; (3) Perform linear fitting of the upper portion of the bright area's outer contour, the two straight lines form an intersection above the needle tip, if the distance between the said intersection and the uppermost point of the bright area exceeds the preset threshold, the needle cannula is disqualified. 23. A needle cannula inspection method according to claim 21, wherein the inspection on inward or outward curved needle tips by processing and analyzing a plurality of images captured on one bevel area of said needle cannula comprises the following steps: First identify the image with largest bright area as in previous steps, then count forward or backward a number of images, the number is nearest to one-forth of total number of images, in other wards, choose the image that is approximately 90 or 270 degrees to the image with largest bright area; this image is almost the side view of the needle cannula; perform linear fitting of the left and right vertical lines; if the distance between the top point of the longest vertical line and horizontally the leftmost pixel or rightmost pixel exceeds the preset threshold, the needle cannula has a curved tip and is disqualified. 24. A needle cannula inspection method according to claim 23, wherein the inspection on accuracy of several bevel angles of needle cannula tip area by processing and analyzing a plurality of images captured on one bevel area of said needle cannula comprises the following steps: Using the same method as in claim 23, perform linear fitting on a few lines in the bevel area, angles formed between the cannula outer line and fitted lines can be calculated. Accuracy of bevel angles can be decided by comparing with preset threshold; by processing the image of near 180 degrees to this image, the accuracy of bevel angles on the other side can also be inspected. 25. A needle cannula inspection method according to claim 21, wherein the needle cannula length can be calculated when both ends of the needle cannula are inspected and the distance between camera A and camera B is calibrated, thus the needle cannula length can be inspected by comparing with preset threshold. 26. A needle cannula inspection method according to claim 21, wherein the needle cannula length can be calculated when only one end of the needle cannula is inspected, the other end is in a fixed position and the distance between camera and the other end is calibrated, thus the needle cannula length can be inspected by comparing with preset threshold. 27. A needle cannula inspection method according to claim 21, wherein the system can automatically record classification and statistics of passed and rejected cannulae for query. 28. A needle cannula inspection method according to claim 12, wherein a plurality of images captured along the circumferential direction of said needle cannula for a whole circle can be used to build a three-dimensional model, with which quality and technical parameters can be inspected.
2,400
7,884
7,884
14,519,007
2,465
A method is implemented by a processor of a computing device for generating an output match action table (MAT) or output MAT template from an input MAT template. The input MAT template is transformed through successive updates of symbolic actions using policy rules into the output MAT or output MAT template. The method includes selecting a first MAT row from the input MAT template and selecting a first action field from the first MAT row. A check is made whether the first action field includes a first symbolic action. The first symbolic action is looked up to determine whether a first policy rule has been defined for the first symbolic action. A first action specified by the first policy rule is written into a corresponding action field of a corresponding MAT row in the output MAT template or the output MAT to replace the first symbolic action.
1. A method implemented by a processor of a computing device for generating an output match action table or output match action table template from an input match action table template, where the input match action table template is transformed through successive updates of symbolic actions using policy rules into the output match action table or output match action table template, the method comprising: selecting a first match action table row from the input match action table template; selecting a first action field from the first match action table row; checking whether the first action field includes a first symbolic action; looking up the first symbolic action to determine whether a first policy rule has been defined for the first symbolic action; and writing a first action into a corresponding action field of a corresponding match action table row in the output match action table template or the output match action table to replace the first symbolic action where the first action is specified by the first policy rule. 2. The method of claim 1, wherein the output match action table template is further iteratively processed to further update the symbolic actions by replacing the symbolic actions using a second policy rule, the method comprising: selecting a second match action table row from the output match action table template; selecting a second action field from the second match action table row; checking whether the second action field includes a second symbolic action; looking up the second symbolic action to determine whether the second policy rule in a second policy has been defined for the second symbolic action; and writing a second action into a corresponding action field of a corresponding match action table row in a further output match action table template or further output match action table to replace the second symbolic action where the second action is specified by the second policy rule. 3. The method of claim 1, wherein the computing device is a network device, the process further comprising the step of: installing the output match action table to be executed by a forwarding engine. 4. The method of claim 1, wherein the computing device is a controller in a control plane of a software defined network, the process further comprising the step of: sending the output match action table template or the output match action table to a network device implementing the data plane. 5. The method of claim 1, wherein the first policy rule is defined for the first symbolic action to generate the output match action table template or output match action table for a corresponding application, and wherein the first policy rule is a member of a policy that is one of a set of policies forming a hierarchical tree for differentiating the output match action table template or output match action table to a set of different applications. 6. The method of claim 1, wherein the first action is a symbolic action. 7. The method of claim 1, wherein the first action is an executable action. 8. A network device implementing a method for generating an output match action table from an input match action table template, where the input match action table template is transformed through successive updates of symbolic actions using policy rules into the output match action table, the network device comprising: a non-transitory computer-readable medium having stored therein a match action table configuration module and a forwarding engine; and a network processor coupled to the non-transitory computer-readable medium, the network processor configured to execute the match action table configuration module and the forwarding engine, the match action table configuration module configured to select a first match action table row from the input match action table template, to select a first action field from the first match action table row, to check whether the first action field includes a first symbolic action, to look up the first symbolic action to determine whether a first policy rule has been defined for the first symbolic action, and to write a first action into a corresponding action field of a corresponding match action table row in the output match action table to replace the first symbolic action where the first action is specified by the first policy rule; and the forwarding engine configured to forward protocol data units based on the output match action table generated from the input match action template. 9. The network device of claim 8, wherein the match action table configuration module is configured to install the output match action table to be utilized by the forwarding engine. 10. The network device of claim 8, wherein the first action is an executable action. 11. The network device of claim 8, wherein the first policy rule is defined for the first symbolic action to generate the output match action table for a corresponding application, and wherein the first policy rule is a member of a policy that is one of a set of policies forming a hierarchical tree for differentiating the output match action table to a set of different applications. 12. A computing device implementing a plurality of virtual machines for implementing network function virtualization (NFV), wherein a virtual machine from the plurality of virtual machines is configured to execute a method for generating an output match action table or output match action table template from an input match action table template, where the input match action table template is transformed through successive updates of symbolic actions using policy rules into the output match action table or output match action table template, the computing device comprising: a non-transitory computer-readable medium having stored therein a match action table configuration module; and a processor coupled to the non-transitory computer-readable medium, the processor configured to execute the virtual machine that implements the match action table configuration module, the match action table configuration module configured to select a first match action table row from the input match action table template, to select a first action field from the first match action table row, to check whether the first action field includes a first symbolic action, to look up the first symbolic action to determine whether a first policy rule has been defined for the first symbolic action, and to write a first action into a corresponding action field of a corresponding match action table row in the output match action table or output match action table template to replace the first symbolic action where the first action is specified by the first policy rule. 13. The computing device of claim 12, wherein the match action table configuration module is further configured to further update the symbolic actions by replacing the symbolic actions using a second policy rule, the match action table configuration module configured to select a second match action table row from the output match action table template, to select a second action field from the second match action table row, to check whether the second action field includes a second symbolic action, to look up the second symbolic action to determine whether the second policy rule in a second policy has been defined for the second symbolic action, and to write a second action into a corresponding action field of a corresponding match action table row in a further output match action table template or further output match action table to replace the second symbolic action with the second action specified by the second policy rule. 14. The computing device of claim 12, wherein the match action table configuration module is configured to send the output match action table template to a network device implementing the data plane. 15. The computing device of claim 12, wherein the first policy rule is defined for the first symbolic action to generate the output match action table template or output match action table for a corresponding application, and wherein the first policy rule is a member of a policy that is one of a set of policies forming a hierarchical tree for differentiating the output match action table template or output match action table to a set of different applications. 16. The computing device of claim 12, wherein the first action is a symbolic action. 17. The computing device of claim 12, wherein the first action is an executable action. 18. A control plane device configured to implement at least one centralized control plane for a software defined network (SDN), the centralized control plane configured to execute a method for generating an output match action table or output match action table template from an input match action table template, where the input match action table template is transformed through successive updates of symbolic actions using policy rules into the output match action table or output match action table template, the control plane device comprising: a non-transitory computer-readable medium having stored therein a match action table configuration module; and a processor coupled to the non-transitory computer-readable medium, the processor configured to execute the match action table configuration module, the match action table configuration module configured to select a first match action table row from the input match action table template, to select a first action field from the first match action table row, to check whether the first action field includes a first symbolic action, to look up the first symbolic action to determine whether a first policy rule has been defined for the first symbolic action, and to write a first action into a corresponding action field of a corresponding match action table row in the output match action table or output match action table template to replace the first symbolic action where the first action is specified by the first policy rule. 19. The control plane device of claim 18, wherein the match action table configuration module is further configured to further update the symbolic actions by replacing the symbolic actions using a second policy rule, the match action table configuration module configured to select a second match action table row from the output match action table template, to select a second action field from the second match action table row, to check whether the second action field includes a second symbolic action, to look up the second symbolic action to determine whether the second policy rule in a second policy has been defined for the second symbolic action, and to write a second action into a corresponding action field of a corresponding match action table row in the output match action table template or output match action table to replace the second symbolic action with the second action specified by the second policy rule. 20. The control plane device of claim 18, wherein the match action table configuration module is configured to send the output match action table template to a network device implementing a data plane of the SDN. 21. The control plane device of claim 18, wherein the first policy rule is defined for the first symbolic action to generate the output match action table template or output match action table for a corresponding application, and wherein the first policy rule is a member of a policy that is one of a set of policies forming a hierarchical tree for differentiating the output match action table template or output match action table to a set of different applications. 22. The control plane device of claim 18, wherein the first action is a symbolic action. 23. The control plane device of claim 18, wherein the first action is an executable action.
A method is implemented by a processor of a computing device for generating an output match action table (MAT) or output MAT template from an input MAT template. The input MAT template is transformed through successive updates of symbolic actions using policy rules into the output MAT or output MAT template. The method includes selecting a first MAT row from the input MAT template and selecting a first action field from the first MAT row. A check is made whether the first action field includes a first symbolic action. The first symbolic action is looked up to determine whether a first policy rule has been defined for the first symbolic action. A first action specified by the first policy rule is written into a corresponding action field of a corresponding MAT row in the output MAT template or the output MAT to replace the first symbolic action.1. A method implemented by a processor of a computing device for generating an output match action table or output match action table template from an input match action table template, where the input match action table template is transformed through successive updates of symbolic actions using policy rules into the output match action table or output match action table template, the method comprising: selecting a first match action table row from the input match action table template; selecting a first action field from the first match action table row; checking whether the first action field includes a first symbolic action; looking up the first symbolic action to determine whether a first policy rule has been defined for the first symbolic action; and writing a first action into a corresponding action field of a corresponding match action table row in the output match action table template or the output match action table to replace the first symbolic action where the first action is specified by the first policy rule. 2. The method of claim 1, wherein the output match action table template is further iteratively processed to further update the symbolic actions by replacing the symbolic actions using a second policy rule, the method comprising: selecting a second match action table row from the output match action table template; selecting a second action field from the second match action table row; checking whether the second action field includes a second symbolic action; looking up the second symbolic action to determine whether the second policy rule in a second policy has been defined for the second symbolic action; and writing a second action into a corresponding action field of a corresponding match action table row in a further output match action table template or further output match action table to replace the second symbolic action where the second action is specified by the second policy rule. 3. The method of claim 1, wherein the computing device is a network device, the process further comprising the step of: installing the output match action table to be executed by a forwarding engine. 4. The method of claim 1, wherein the computing device is a controller in a control plane of a software defined network, the process further comprising the step of: sending the output match action table template or the output match action table to a network device implementing the data plane. 5. The method of claim 1, wherein the first policy rule is defined for the first symbolic action to generate the output match action table template or output match action table for a corresponding application, and wherein the first policy rule is a member of a policy that is one of a set of policies forming a hierarchical tree for differentiating the output match action table template or output match action table to a set of different applications. 6. The method of claim 1, wherein the first action is a symbolic action. 7. The method of claim 1, wherein the first action is an executable action. 8. A network device implementing a method for generating an output match action table from an input match action table template, where the input match action table template is transformed through successive updates of symbolic actions using policy rules into the output match action table, the network device comprising: a non-transitory computer-readable medium having stored therein a match action table configuration module and a forwarding engine; and a network processor coupled to the non-transitory computer-readable medium, the network processor configured to execute the match action table configuration module and the forwarding engine, the match action table configuration module configured to select a first match action table row from the input match action table template, to select a first action field from the first match action table row, to check whether the first action field includes a first symbolic action, to look up the first symbolic action to determine whether a first policy rule has been defined for the first symbolic action, and to write a first action into a corresponding action field of a corresponding match action table row in the output match action table to replace the first symbolic action where the first action is specified by the first policy rule; and the forwarding engine configured to forward protocol data units based on the output match action table generated from the input match action template. 9. The network device of claim 8, wherein the match action table configuration module is configured to install the output match action table to be utilized by the forwarding engine. 10. The network device of claim 8, wherein the first action is an executable action. 11. The network device of claim 8, wherein the first policy rule is defined for the first symbolic action to generate the output match action table for a corresponding application, and wherein the first policy rule is a member of a policy that is one of a set of policies forming a hierarchical tree for differentiating the output match action table to a set of different applications. 12. A computing device implementing a plurality of virtual machines for implementing network function virtualization (NFV), wherein a virtual machine from the plurality of virtual machines is configured to execute a method for generating an output match action table or output match action table template from an input match action table template, where the input match action table template is transformed through successive updates of symbolic actions using policy rules into the output match action table or output match action table template, the computing device comprising: a non-transitory computer-readable medium having stored therein a match action table configuration module; and a processor coupled to the non-transitory computer-readable medium, the processor configured to execute the virtual machine that implements the match action table configuration module, the match action table configuration module configured to select a first match action table row from the input match action table template, to select a first action field from the first match action table row, to check whether the first action field includes a first symbolic action, to look up the first symbolic action to determine whether a first policy rule has been defined for the first symbolic action, and to write a first action into a corresponding action field of a corresponding match action table row in the output match action table or output match action table template to replace the first symbolic action where the first action is specified by the first policy rule. 13. The computing device of claim 12, wherein the match action table configuration module is further configured to further update the symbolic actions by replacing the symbolic actions using a second policy rule, the match action table configuration module configured to select a second match action table row from the output match action table template, to select a second action field from the second match action table row, to check whether the second action field includes a second symbolic action, to look up the second symbolic action to determine whether the second policy rule in a second policy has been defined for the second symbolic action, and to write a second action into a corresponding action field of a corresponding match action table row in a further output match action table template or further output match action table to replace the second symbolic action with the second action specified by the second policy rule. 14. The computing device of claim 12, wherein the match action table configuration module is configured to send the output match action table template to a network device implementing the data plane. 15. The computing device of claim 12, wherein the first policy rule is defined for the first symbolic action to generate the output match action table template or output match action table for a corresponding application, and wherein the first policy rule is a member of a policy that is one of a set of policies forming a hierarchical tree for differentiating the output match action table template or output match action table to a set of different applications. 16. The computing device of claim 12, wherein the first action is a symbolic action. 17. The computing device of claim 12, wherein the first action is an executable action. 18. A control plane device configured to implement at least one centralized control plane for a software defined network (SDN), the centralized control plane configured to execute a method for generating an output match action table or output match action table template from an input match action table template, where the input match action table template is transformed through successive updates of symbolic actions using policy rules into the output match action table or output match action table template, the control plane device comprising: a non-transitory computer-readable medium having stored therein a match action table configuration module; and a processor coupled to the non-transitory computer-readable medium, the processor configured to execute the match action table configuration module, the match action table configuration module configured to select a first match action table row from the input match action table template, to select a first action field from the first match action table row, to check whether the first action field includes a first symbolic action, to look up the first symbolic action to determine whether a first policy rule has been defined for the first symbolic action, and to write a first action into a corresponding action field of a corresponding match action table row in the output match action table or output match action table template to replace the first symbolic action where the first action is specified by the first policy rule. 19. The control plane device of claim 18, wherein the match action table configuration module is further configured to further update the symbolic actions by replacing the symbolic actions using a second policy rule, the match action table configuration module configured to select a second match action table row from the output match action table template, to select a second action field from the second match action table row, to check whether the second action field includes a second symbolic action, to look up the second symbolic action to determine whether the second policy rule in a second policy has been defined for the second symbolic action, and to write a second action into a corresponding action field of a corresponding match action table row in the output match action table template or output match action table to replace the second symbolic action with the second action specified by the second policy rule. 20. The control plane device of claim 18, wherein the match action table configuration module is configured to send the output match action table template to a network device implementing a data plane of the SDN. 21. The control plane device of claim 18, wherein the first policy rule is defined for the first symbolic action to generate the output match action table template or output match action table for a corresponding application, and wherein the first policy rule is a member of a policy that is one of a set of policies forming a hierarchical tree for differentiating the output match action table template or output match action table to a set of different applications. 22. The control plane device of claim 18, wherein the first action is a symbolic action. 23. The control plane device of claim 18, wherein the first action is an executable action.
2,400
7,885
7,885
15,370,594
2,421
The present disclosure is directed toward systems and methods for providing a live poll with a video presentation. In particular, the systems and methods described herein provide a video stream received from a broadcaster client device to one or more viewer client devices. Additionally, the systems and methods described herein provide a live poll to the one or more viewer client devices together with the video stream. The systems and methods receive poll responses from the one or more viewer client devices, compile poll results based on the received responses, and provide the poll responses to the broadcaster client device and the one or more viewer client devices.
1. A method comprising: receiving, at a server device, a video stream captured by a camera on a broadcaster client device; providing, to a plurality of viewer client devices, the video stream received from the broadcaster client device; while providing the video stream to the plurality of viewer client devices, receiving, from the broadcaster client device, a live poll request related to the video stream received from the broadcaster client device, wherein the live poll request comprises one or more poll elements, the one or more poll elements defined in response to a broadcasting user interacting with one or more graphical interface elements on the broadcaster client device while the broadcaster client device is providing the video stream captured by the camera on the broadcaster client device; based on receiving the live poll request from the broadcaster client device, generating, at the server device by at least one processor, a poll data structure to store poll information for a live poll corresponding to the video stream received from the broadcaster client device in accordance with the one or more poll elements; and in response to generating the poll data structure, providing, to the plurality of viewer client devices while providing the video stream to the plurality of viewer client devices, a live poll indication that causes each of the plurality of viewer client devices to present a graphical poll interface together with a presentation of the video stream. 2. The method of claim 1, wherein providing the live poll indication that causes each of the plurality of viewer client devices to present the graphical poll interface with the video stream further comprises causing each of the plurality of viewer client devices to overlay the graphical poll interface on a presentation of the video stream. 3. The method of claim 1, further comprising: creating a poll identifier to identify the live poll based on receiving the live poll request from the broadcaster client device; and wherein the poll information comprises one or more of the live poll indication, the one or more poll elements, one or more poll responses, or a poll result. 4. The method of claim 1, wherein receiving the live poll request comprises receiving, from the broadcaster client device, an indication that the broadcasting user selected a poll option from within a graphical menu interface overlaid on a camera feed presented on the broadcaster client device. 5. The method of claim 4, wherein the graphical menu interface comprises a poll creation interface providing a guided process to receive user input that defines the one or more poll elements. 6. The method of claim 5, wherein the one or more poll elements comprise a question and one or more answer choices corresponding to the question. 7. The method of claim 6, wherein: providing the live poll indication further comprises providing the question and the one or more answer choices to each of the plurality of viewer client devices; and the graphical poll interface comprises a presentation of the question and one or more selectable elements associated with the one or more answer choices corresponding to the question. 8. The method of claim 7, wherein the one or more selectable elements associated with the one or more answer choices each comprise a reaction icon. 9. The method of claim 5, wherein the one or more poll elements further comprise a poll type, a poll format, or a poll aesthetic. 10. The method of claim 1, further comprising: receiving a poll response from a viewer client device from the plurality of viewer client devices; updating, in response to the poll response, poll results to reflect the poll response received from the viewer client device; and providing the poll results to the plurality of viewer client devices, wherein providing the poll results causes each of the plurality of viewer client devices to present the poll results within the graphical poll interface. 11. The method of claim 1, further comprising: receiving a comment from the viewer client device from the plurality of viewer client devices; analyzing the comment to determine a relevance of the comment in relation to the video stream; in response to determining that the comment is more relevant to the video stream, assigning a higher priority to the comment; in response to determining that the comment is less relevant to the video stream, assigning a lower priority to the comment; and providing the comment to the plurality of viewer client devices based on an assigned priority to the comment, wherein providing the comment causes each of the plurality of viewer client devices to display the comment. 12. The method of claim 1, further comprising: receiving, from the broadcaster client device, a request to terminate the live poll corresponding to the video stream; in response to receiving the request to terminate the live poll, providing, to the plurality of viewer client devices, a poll termination indication that causes each of the plurality of viewer client devices to cease to present the graphical poll interface. 13. The method of claim 1, further comprising terminating the live poll when the video stream is terminated. 14. The method of claim 1, further comprising: determining that a viewer client device of the plurality of viewer client devices has streamed the video stream for less than a threshold time; and in response to the determination that the viewer client device has streamed the video stream for less than the threshold time, refraining from providing the live poll indication to the viewer client device. 15. The method of claim 1, further comprising: determining, based on one or more viewer attributes, that a first viewer associated with a first viewer client device of the plurality of viewer client devices is a quality audience member; determining, based on the one or more viewer attributes, that a second viewer associated with a second viewer client device of the plurality of viewer client devices is a casual audience member; in response to determining that the first viewer is a quality audience member, providing the live poll indication to the first viewer client device; and in response to determining that the second viewer is a casual audience member, refraining from providing the live poll indication to the second viewer client device. 16. The method of claim 1, further comprising: providing, to a second plurality of viewer client devices, the video stream received from the broadcaster client device, determining that the second plurality of viewer client devices joined the video stream after the live poll was initiated; and withholding participation in the live poll from the second plurality of viewer client devices based on determining that the second plurality of viewer client devices joined the video stream after the live poll was initiated. 17. A computer-readable storage medium having stored thereon computer-executable instructions that, when executed by a processor, cause a computer to: receive a video stream captured by a camera on a broadcaster client device; provide, to a plurality of viewer client devices, the video stream received from the broadcaster client device; while providing the video stream to the plurality of viewer client devices, receive, from the broadcaster client device, a live poll request related to the video stream received from the broadcaster client device, wherein the live poll request comprises one or more elements set by the broadcaster client device in response to a broadcasting user interacting with one or more graphical interface elements on the broadcaster client device while the broadcaster client device is providing the video stream captured by the camera on the broadcaster client device; based on the live poll request from the broadcaster client device, generate a poll data structure to store poll information for a live poll related to the video stream received from the broadcaster client device in accordance with the one or more elements set by the broadcaster client device; and in response to generating the poll data structure, provide while providing the video stream to the plurality of viewer client devices, a live poll indication that causes each of the plurality of viewer client devices to present a graphical poll interface together with a presentation of the video stream. 18. The computer-readable storage medium of claim 17, wherein providing the live poll indication that causes each of the plurality of viewer client devices to present the graphical poll interface with the video stream further comprises causing each of the plurality of viewer client devices to overlay the graphical poll interface on a presentation of the video stream. 19. A system comprising: a computing device comprising a processor; and a non-transitory computer-readable medium storing instructions that, when executed by the processor, cause the system to: receive a video stream captured by a camera on a broadcaster client device; provide, to a plurality of viewer client devices, the video stream received from the broadcaster client device; while providing the video stream to the plurality of viewer client devices, receive, from the broadcaster client device, a live poll request related to the video stream received from the broadcaster client device, wherein the live poll request comprises one or more elements set by the broadcaster client device in response to a broadcasting user interacting with one or more graphical interface elements on the broadcaster client device while the broadcaster client device is providing the video stream captured by the camera on the broadcaster client device; based on the live poll request from the broadcaster client device, generate a poll data structure to store poll information for a live poll related to the video stream received from the broadcaster client device in accordance with the one or more elements set by the broadcaster client device; and in response to generating the poll data structure, provide while providing the video stream to the plurality of viewer client devices, a live poll indication that causes each of the plurality of viewer client devices to present a graphical poll interface together with a presentation of the video stream. 20. The system of claim 19, wherein providing the live poll indication that causes each of the plurality of viewer client devices to present the graphical poll interface with the video stream further comprises causing each of the plurality of viewer client devices to overlay the graphical poll interface on a presentation of the video stream.
The present disclosure is directed toward systems and methods for providing a live poll with a video presentation. In particular, the systems and methods described herein provide a video stream received from a broadcaster client device to one or more viewer client devices. Additionally, the systems and methods described herein provide a live poll to the one or more viewer client devices together with the video stream. The systems and methods receive poll responses from the one or more viewer client devices, compile poll results based on the received responses, and provide the poll responses to the broadcaster client device and the one or more viewer client devices.1. A method comprising: receiving, at a server device, a video stream captured by a camera on a broadcaster client device; providing, to a plurality of viewer client devices, the video stream received from the broadcaster client device; while providing the video stream to the plurality of viewer client devices, receiving, from the broadcaster client device, a live poll request related to the video stream received from the broadcaster client device, wherein the live poll request comprises one or more poll elements, the one or more poll elements defined in response to a broadcasting user interacting with one or more graphical interface elements on the broadcaster client device while the broadcaster client device is providing the video stream captured by the camera on the broadcaster client device; based on receiving the live poll request from the broadcaster client device, generating, at the server device by at least one processor, a poll data structure to store poll information for a live poll corresponding to the video stream received from the broadcaster client device in accordance with the one or more poll elements; and in response to generating the poll data structure, providing, to the plurality of viewer client devices while providing the video stream to the plurality of viewer client devices, a live poll indication that causes each of the plurality of viewer client devices to present a graphical poll interface together with a presentation of the video stream. 2. The method of claim 1, wherein providing the live poll indication that causes each of the plurality of viewer client devices to present the graphical poll interface with the video stream further comprises causing each of the plurality of viewer client devices to overlay the graphical poll interface on a presentation of the video stream. 3. The method of claim 1, further comprising: creating a poll identifier to identify the live poll based on receiving the live poll request from the broadcaster client device; and wherein the poll information comprises one or more of the live poll indication, the one or more poll elements, one or more poll responses, or a poll result. 4. The method of claim 1, wherein receiving the live poll request comprises receiving, from the broadcaster client device, an indication that the broadcasting user selected a poll option from within a graphical menu interface overlaid on a camera feed presented on the broadcaster client device. 5. The method of claim 4, wherein the graphical menu interface comprises a poll creation interface providing a guided process to receive user input that defines the one or more poll elements. 6. The method of claim 5, wherein the one or more poll elements comprise a question and one or more answer choices corresponding to the question. 7. The method of claim 6, wherein: providing the live poll indication further comprises providing the question and the one or more answer choices to each of the plurality of viewer client devices; and the graphical poll interface comprises a presentation of the question and one or more selectable elements associated with the one or more answer choices corresponding to the question. 8. The method of claim 7, wherein the one or more selectable elements associated with the one or more answer choices each comprise a reaction icon. 9. The method of claim 5, wherein the one or more poll elements further comprise a poll type, a poll format, or a poll aesthetic. 10. The method of claim 1, further comprising: receiving a poll response from a viewer client device from the plurality of viewer client devices; updating, in response to the poll response, poll results to reflect the poll response received from the viewer client device; and providing the poll results to the plurality of viewer client devices, wherein providing the poll results causes each of the plurality of viewer client devices to present the poll results within the graphical poll interface. 11. The method of claim 1, further comprising: receiving a comment from the viewer client device from the plurality of viewer client devices; analyzing the comment to determine a relevance of the comment in relation to the video stream; in response to determining that the comment is more relevant to the video stream, assigning a higher priority to the comment; in response to determining that the comment is less relevant to the video stream, assigning a lower priority to the comment; and providing the comment to the plurality of viewer client devices based on an assigned priority to the comment, wherein providing the comment causes each of the plurality of viewer client devices to display the comment. 12. The method of claim 1, further comprising: receiving, from the broadcaster client device, a request to terminate the live poll corresponding to the video stream; in response to receiving the request to terminate the live poll, providing, to the plurality of viewer client devices, a poll termination indication that causes each of the plurality of viewer client devices to cease to present the graphical poll interface. 13. The method of claim 1, further comprising terminating the live poll when the video stream is terminated. 14. The method of claim 1, further comprising: determining that a viewer client device of the plurality of viewer client devices has streamed the video stream for less than a threshold time; and in response to the determination that the viewer client device has streamed the video stream for less than the threshold time, refraining from providing the live poll indication to the viewer client device. 15. The method of claim 1, further comprising: determining, based on one or more viewer attributes, that a first viewer associated with a first viewer client device of the plurality of viewer client devices is a quality audience member; determining, based on the one or more viewer attributes, that a second viewer associated with a second viewer client device of the plurality of viewer client devices is a casual audience member; in response to determining that the first viewer is a quality audience member, providing the live poll indication to the first viewer client device; and in response to determining that the second viewer is a casual audience member, refraining from providing the live poll indication to the second viewer client device. 16. The method of claim 1, further comprising: providing, to a second plurality of viewer client devices, the video stream received from the broadcaster client device, determining that the second plurality of viewer client devices joined the video stream after the live poll was initiated; and withholding participation in the live poll from the second plurality of viewer client devices based on determining that the second plurality of viewer client devices joined the video stream after the live poll was initiated. 17. A computer-readable storage medium having stored thereon computer-executable instructions that, when executed by a processor, cause a computer to: receive a video stream captured by a camera on a broadcaster client device; provide, to a plurality of viewer client devices, the video stream received from the broadcaster client device; while providing the video stream to the plurality of viewer client devices, receive, from the broadcaster client device, a live poll request related to the video stream received from the broadcaster client device, wherein the live poll request comprises one or more elements set by the broadcaster client device in response to a broadcasting user interacting with one or more graphical interface elements on the broadcaster client device while the broadcaster client device is providing the video stream captured by the camera on the broadcaster client device; based on the live poll request from the broadcaster client device, generate a poll data structure to store poll information for a live poll related to the video stream received from the broadcaster client device in accordance with the one or more elements set by the broadcaster client device; and in response to generating the poll data structure, provide while providing the video stream to the plurality of viewer client devices, a live poll indication that causes each of the plurality of viewer client devices to present a graphical poll interface together with a presentation of the video stream. 18. The computer-readable storage medium of claim 17, wherein providing the live poll indication that causes each of the plurality of viewer client devices to present the graphical poll interface with the video stream further comprises causing each of the plurality of viewer client devices to overlay the graphical poll interface on a presentation of the video stream. 19. A system comprising: a computing device comprising a processor; and a non-transitory computer-readable medium storing instructions that, when executed by the processor, cause the system to: receive a video stream captured by a camera on a broadcaster client device; provide, to a plurality of viewer client devices, the video stream received from the broadcaster client device; while providing the video stream to the plurality of viewer client devices, receive, from the broadcaster client device, a live poll request related to the video stream received from the broadcaster client device, wherein the live poll request comprises one or more elements set by the broadcaster client device in response to a broadcasting user interacting with one or more graphical interface elements on the broadcaster client device while the broadcaster client device is providing the video stream captured by the camera on the broadcaster client device; based on the live poll request from the broadcaster client device, generate a poll data structure to store poll information for a live poll related to the video stream received from the broadcaster client device in accordance with the one or more elements set by the broadcaster client device; and in response to generating the poll data structure, provide while providing the video stream to the plurality of viewer client devices, a live poll indication that causes each of the plurality of viewer client devices to present a graphical poll interface together with a presentation of the video stream. 20. The system of claim 19, wherein providing the live poll indication that causes each of the plurality of viewer client devices to present the graphical poll interface with the video stream further comprises causing each of the plurality of viewer client devices to overlay the graphical poll interface on a presentation of the video stream.
2,400
7,886
7,886
15,035,641
2,469
According to an aspect, there is provided a method of operating a mobile device in a communication network. The method comprises receiving a list of wireless local area network (WLAN) identifiers from the communication network ( 600 ). Using the received list of WLAN identifiers in an access network selection and/or traffic steering procedure ( 610 ).
1-66. (canceled) 67. The method of operating a mobile device in a communication network, the method comprising: receiving, from the communication network, a list of wireless local area network (WLAN) identifiers for use in an access network selection or traffic steering procedure performed by the mobile device, storing the received list of WLAN identifiers and removing the stored list of WLAN identifiers following a mobility event, a connectivity event or on expiry of a validity timer for the stored list. 68. The method of claim 67, wherein the step of receiving a list of WLAN identifiers further comprises receiving an identifier for the list of WLAN identifiers. 69. The method of claim 68, wherein the identifier for the list of WLAN identifiers comprises a version number and/or a hash value. 70. The method of claim 67, wherein each of the WLAN identifiers in the list is a service set identification (SSID), a basic SSID (BSSID), an extended SSID (ESSID), a homogenous ESSID (HESSID), or HotSpot 2.0. 71. The method of claim 67, the method further comprising the step of: using the received list of WLAN identifiers in an access network selection and/or traffic steering procedure. 72. The method of claim 67, the method further comprising the step of: sending an indication of the capability of the mobile device to receive a list of WLAN identifiers to the network. 73. The method of claim 67, the method further comprising the step of: sending an indication to the network that the mobile device does not have a stored list of WLAN identifiers, or requires a new list of WLAN identifiers, following a mobility event, a connectivity event or on expiry of a validity timer for the stored list. 74. The method of claim 67, the method further comprising the step of: receiving an identifier for a list of WLAN identifiers that is valid for the area in which the mobile device is located. 75. The method of claim 74, the method further comprising the step of: comparing the received identifier to an identifier for the received list of WLAN identifiers; and requesting a list of WLAN identifiers valid for the area in which the mobile device is located if the received identifier does not match the identifier for the received list of WLAN identifiers. 76. A mobile device for use in a communication network, the mobile device being configured to receive a list of wireless local area network (WLAN) identifiers from the communication network, use the list of WLAN identifiers in an access network selection or traffic steering procedure performed by the mobile device, the mobile device being configured to store the received list of WLAN identifiers and the mobile device being further configured to remove the stored list of WLAN identifiers following a mobility event, a connectivity event or on expiry of a validity timer for the stored list. 77. The mobile device of claim 76, the mobile device comprising: one or more transceiver units configured to communicate with a wide area network, such as a 3GPP-specified network and a wireless local area network (WLAN) such as a Wi-Fi network. 78. The mobile device of claim 76, wherein the mobile device is further configured to receive an identifier for the list of WLAN identifiers. 79. The mobile device of claim 76, wherein each of the WLAN identifiers in the list is a service set identification (SSID), a basic SSID (BSSID), an extended SSID (ESSID), a homogenous ESSID (HESSID), or HotSpot 2.0. 80. The mobile device of claim 76, wherein the mobile device is further configured to send an indication of the capability of the mobile device to receive a list of WLAN identifiers to the network. 81. The mobile device of claim 76, wherein the mobile device is further configured to send an identifier for the stored list of WLAN identifiers to the network. 82. The mobile device of claim 76, wherein the mobile device is further configured to send an indication to the network that the mobile device does not have a stored list of WLAN identifiers, or requires a new list of WLAN identifiers, following a mobility event, a connectivity event or on expiry of a validity timer for the stored list. 83. The mobile device of claim 76, wherein the mobile device is further configured to receive an identifier for a list of WLAN identifiers that is valid for the area in which the mobile device is located. 84. The mobile device of claim 83, wherein the mobile device is further configured to compare the received identifier to an identifier for the received list of WLAN identifiers and request a list of WLAN identifiers valid for the area in which the mobile device is located if the received identifier does not match the identifier for the received list of WLAN identifiers.
According to an aspect, there is provided a method of operating a mobile device in a communication network. The method comprises receiving a list of wireless local area network (WLAN) identifiers from the communication network ( 600 ). Using the received list of WLAN identifiers in an access network selection and/or traffic steering procedure ( 610 ).1-66. (canceled) 67. The method of operating a mobile device in a communication network, the method comprising: receiving, from the communication network, a list of wireless local area network (WLAN) identifiers for use in an access network selection or traffic steering procedure performed by the mobile device, storing the received list of WLAN identifiers and removing the stored list of WLAN identifiers following a mobility event, a connectivity event or on expiry of a validity timer for the stored list. 68. The method of claim 67, wherein the step of receiving a list of WLAN identifiers further comprises receiving an identifier for the list of WLAN identifiers. 69. The method of claim 68, wherein the identifier for the list of WLAN identifiers comprises a version number and/or a hash value. 70. The method of claim 67, wherein each of the WLAN identifiers in the list is a service set identification (SSID), a basic SSID (BSSID), an extended SSID (ESSID), a homogenous ESSID (HESSID), or HotSpot 2.0. 71. The method of claim 67, the method further comprising the step of: using the received list of WLAN identifiers in an access network selection and/or traffic steering procedure. 72. The method of claim 67, the method further comprising the step of: sending an indication of the capability of the mobile device to receive a list of WLAN identifiers to the network. 73. The method of claim 67, the method further comprising the step of: sending an indication to the network that the mobile device does not have a stored list of WLAN identifiers, or requires a new list of WLAN identifiers, following a mobility event, a connectivity event or on expiry of a validity timer for the stored list. 74. The method of claim 67, the method further comprising the step of: receiving an identifier for a list of WLAN identifiers that is valid for the area in which the mobile device is located. 75. The method of claim 74, the method further comprising the step of: comparing the received identifier to an identifier for the received list of WLAN identifiers; and requesting a list of WLAN identifiers valid for the area in which the mobile device is located if the received identifier does not match the identifier for the received list of WLAN identifiers. 76. A mobile device for use in a communication network, the mobile device being configured to receive a list of wireless local area network (WLAN) identifiers from the communication network, use the list of WLAN identifiers in an access network selection or traffic steering procedure performed by the mobile device, the mobile device being configured to store the received list of WLAN identifiers and the mobile device being further configured to remove the stored list of WLAN identifiers following a mobility event, a connectivity event or on expiry of a validity timer for the stored list. 77. The mobile device of claim 76, the mobile device comprising: one or more transceiver units configured to communicate with a wide area network, such as a 3GPP-specified network and a wireless local area network (WLAN) such as a Wi-Fi network. 78. The mobile device of claim 76, wherein the mobile device is further configured to receive an identifier for the list of WLAN identifiers. 79. The mobile device of claim 76, wherein each of the WLAN identifiers in the list is a service set identification (SSID), a basic SSID (BSSID), an extended SSID (ESSID), a homogenous ESSID (HESSID), or HotSpot 2.0. 80. The mobile device of claim 76, wherein the mobile device is further configured to send an indication of the capability of the mobile device to receive a list of WLAN identifiers to the network. 81. The mobile device of claim 76, wherein the mobile device is further configured to send an identifier for the stored list of WLAN identifiers to the network. 82. The mobile device of claim 76, wherein the mobile device is further configured to send an indication to the network that the mobile device does not have a stored list of WLAN identifiers, or requires a new list of WLAN identifiers, following a mobility event, a connectivity event or on expiry of a validity timer for the stored list. 83. The mobile device of claim 76, wherein the mobile device is further configured to receive an identifier for a list of WLAN identifiers that is valid for the area in which the mobile device is located. 84. The mobile device of claim 83, wherein the mobile device is further configured to compare the received identifier to an identifier for the received list of WLAN identifiers and request a list of WLAN identifiers valid for the area in which the mobile device is located if the received identifier does not match the identifier for the received list of WLAN identifiers.
2,400
7,887
7,887
14,714,629
2,442
A mobile device, such as a cellular telephone or a personal digital assistant (PDA), stores first personal data, such as any one or more of image, video, and audio data. The mobile device transmits the first personal data over a first wide area network (WAN) to a personal server.
1. A method performed by at least one computer processor executing computer program instructions stored on at least one non-transitory computer-readable medium, the method comprising: (A) storing first personal data on a mobile device, the mobile device comprising at least one of a cellular telephone and a personal digital assistant, the first personal data comprising at least one of image, video, and audio data; and (B) transmitting the first personal data from the mobile device over a first wide area network connection to a personal server. 2. The method of claim 1, further comprising: (C) receiving second personal data at the mobile device over the first wide area network connection from the personal server, wherein the second personal data comprises at least one of image, video, and audio data; and (D) storing the second personal data on the mobile device. 3. The method of claim 1, wherein the personal server is configured for use by a user. 4. The method of claim 3, wherein the personal server is configured to transmit second personal data to the user and others authorized by the user, but no other users. 5. The method of claim 4, wherein the second personal data comprises at least one of image, video, and audio data. 6. The method of claim 1, wherein the personal server is configured to transmit second personal data to the user and to others authorized by the user, but no other users. 7. The method of claim 1, wherein the personal server comprises a personal server device. 8. The method of claim 7, wherein the personal server device comprises a personal computer. 9. The method of claim 7, wherein the user owns the mobile device and the personal server device. 10. The method of claim 1, wherein the mobile device comprises a cellular telephone. 11. The method of claim 1, wherein the mobile device comprises a personal digital assistant. 12. A non-transitory computer-readable medium comprising computer program instructions stored thereon, wherein the computer program instructions are executable by at least one computer processor to execute a method, the method comprising: (A) storing first personal data on a mobile device, the mobile device comprising at least one of a cellular telephone and a personal digital assistant, the first personal data comprising at least one of image, video, and audio data; and (B) transmitting the first personal data from the mobile device over a first wide area network connection to a personal server. 13. The non-transitory computer-readable medium of claim 12, wherein the method further comprises: (C) receiving second personal data at the mobile device over the first wide area network connection from the personal server, wherein the second personal data comprises at least one of image, video, and audio data; and (D) storing the second personal data on the mobile device. 14. The non-transitory computer-readable medium of claim 12, wherein the personal server is configured for use by a user. 15. The non-transitory computer-readable medium of claim 14, wherein the personal server is configured to transmit second personal data to the user and others authorized by the user, but no other users. 16. The non-transitory computer-readable medium of claim 15, wherein the second personal data comprises at least one of image, video, and audio data. 17. The non-transitory computer-readable medium of claim 12, wherein the personal server is configured to transmit second personal data to the user and to others authorized by the user, but no other users. 18. The non-transitory computer-readable medium of claim 12, wherein the personal server comprises a personal server device. 19. The non-transitory computer-readable medium of claim 18, wherein the personal server device comprises a personal computer. 20. The non-transitory computer-readable medium of claim 18, wherein the user owns the mobile device and the personal server device. 21. The non-transitory computer-readable medium of claim 12, wherein the mobile device comprises a cellular telephone. 22. The non-transitory computer-readable medium of claim 12, wherein the mobile device comprises a personal digital assistant.
A mobile device, such as a cellular telephone or a personal digital assistant (PDA), stores first personal data, such as any one or more of image, video, and audio data. The mobile device transmits the first personal data over a first wide area network (WAN) to a personal server.1. A method performed by at least one computer processor executing computer program instructions stored on at least one non-transitory computer-readable medium, the method comprising: (A) storing first personal data on a mobile device, the mobile device comprising at least one of a cellular telephone and a personal digital assistant, the first personal data comprising at least one of image, video, and audio data; and (B) transmitting the first personal data from the mobile device over a first wide area network connection to a personal server. 2. The method of claim 1, further comprising: (C) receiving second personal data at the mobile device over the first wide area network connection from the personal server, wherein the second personal data comprises at least one of image, video, and audio data; and (D) storing the second personal data on the mobile device. 3. The method of claim 1, wherein the personal server is configured for use by a user. 4. The method of claim 3, wherein the personal server is configured to transmit second personal data to the user and others authorized by the user, but no other users. 5. The method of claim 4, wherein the second personal data comprises at least one of image, video, and audio data. 6. The method of claim 1, wherein the personal server is configured to transmit second personal data to the user and to others authorized by the user, but no other users. 7. The method of claim 1, wherein the personal server comprises a personal server device. 8. The method of claim 7, wherein the personal server device comprises a personal computer. 9. The method of claim 7, wherein the user owns the mobile device and the personal server device. 10. The method of claim 1, wherein the mobile device comprises a cellular telephone. 11. The method of claim 1, wherein the mobile device comprises a personal digital assistant. 12. A non-transitory computer-readable medium comprising computer program instructions stored thereon, wherein the computer program instructions are executable by at least one computer processor to execute a method, the method comprising: (A) storing first personal data on a mobile device, the mobile device comprising at least one of a cellular telephone and a personal digital assistant, the first personal data comprising at least one of image, video, and audio data; and (B) transmitting the first personal data from the mobile device over a first wide area network connection to a personal server. 13. The non-transitory computer-readable medium of claim 12, wherein the method further comprises: (C) receiving second personal data at the mobile device over the first wide area network connection from the personal server, wherein the second personal data comprises at least one of image, video, and audio data; and (D) storing the second personal data on the mobile device. 14. The non-transitory computer-readable medium of claim 12, wherein the personal server is configured for use by a user. 15. The non-transitory computer-readable medium of claim 14, wherein the personal server is configured to transmit second personal data to the user and others authorized by the user, but no other users. 16. The non-transitory computer-readable medium of claim 15, wherein the second personal data comprises at least one of image, video, and audio data. 17. The non-transitory computer-readable medium of claim 12, wherein the personal server is configured to transmit second personal data to the user and to others authorized by the user, but no other users. 18. The non-transitory computer-readable medium of claim 12, wherein the personal server comprises a personal server device. 19. The non-transitory computer-readable medium of claim 18, wherein the personal server device comprises a personal computer. 20. The non-transitory computer-readable medium of claim 18, wherein the user owns the mobile device and the personal server device. 21. The non-transitory computer-readable medium of claim 12, wherein the mobile device comprises a cellular telephone. 22. The non-transitory computer-readable medium of claim 12, wherein the mobile device comprises a personal digital assistant.
2,400
7,888
7,888
15,854,983
2,415
A computer-implemented method for establishing a VOIP communication between a PBX system and a first terminal device is disclosed. The first terminal device has a VOIP application or video call application. The PBX system and the first terminal device are able to communicate via a first communication connection and a second communication connection. When the PBX system receives a call to be forwarded to the first terminal device the PBX system verifies whether the first terminal device is logged in. If the PBX system verifies that the first terminal device is not logged in, the call is rejected. If the PBX system verifies that the first terminal device is logged in, the PBX system determines whether the application on the first terminal device is running in a background mode or in a foreground mode. When the PBX system determines that the application is running in the foreground mode, the PBX system uses the first connection for forwarding the call. When the PBX system determines that the application is running in the background mode the PBX system uses the second connection to receive information about the communication connection being used.
1. A computer-implemented method for establishing a VOIP communication between a PBX system and a first terminal device in a communication network, wherein the first terminal device is provided with a VOIP application or video call application, and wherein the PBX system and the first terminal device are able to communicate via a first communication connection and a second communication connection in the communication network, the method comprising: receiving, by the PBX system, a call from a second terminal device to be forwarded to the first terminal device; verifying, by the PBX system, if the first terminal device is logged in the communication network, wherein when the PBX system verifies that the first terminal device is not logged in, the call is rejected, and when the PBX system verifies that the first terminal device is logged in, then the PBX system performs the steps of: determining, whether the VOIP application or video call application on the first terminal device is running in a background mode with the VOIP application or video call application being inactive, or in a foreground mode with the VOIP application or video call application being active, and when the PBX system determines that the VOIP application or video call application is running in the foreground mode, using the first connection between the PBX system and the first terminal device for forwarding the call to the first terminal device, and, when the PBX system determines that the VOIP application or video call application is running in the background mode, using the second connection between the PBX system and the first terminal device for receiving information from the first terminal device on what type of its communication connection that it is using at that point of time. 2. The method according to claim 1, wherein when the PBX system cannot determine that the VOIP application or video call application is running in the foreground mode, the PBX system transmits to a remote notification server being provided in the communication network a first message in order to cause the remote notification server to send a remote notification message to the first terminal device. 3. The method according to claim 2, wherein the second connection between the PBX system and the first terminal device is activated, and the PBX system, after the first terminal device, has received the remote notification message from the remote notification server, receives a message from the first terminal device via the second connection comprising information that the VOIP application or video call application is moved into foreground mode. 4. The method according to claim 2, wherein the second connection between the PBX system and the first terminal device is activated, and the PBX system, after the first terminal device has received the remote notification message from the remote notification server, the PBX system receives a message from the first terminal device via the second connection, the message comprising information on what type of communication connection the first terminal device is using at that point of time. 5. The method according to claim 4, wherein the PBX system, upon receiving information on the type of communication connection that the first terminal device is using at that point of time, deflects the call to that communication connection. 6. The method according to claim 4, wherein the PBX system, upon receiving information on the type of communication connection that the first terminal device is using at that point of time, deflects the call to Voice Mail or to a third terminal device, which is also equipped with a VOIP application or video call application. 7. The method according to claim 2, wherein, after the remote notification server has sent a remote notification message to the first terminal device, a time window is started expiring either upon receipt of information on the type of connection by the PBX system or upon reaching a predetermined upper time limit. 8. The method according to claim 1, wherein the type of communication connection comprises at least one of local area network (LAN), wide area network (WAN), and global system for mobile communications (GSM). 9. The method according to claim 1, wherein the first connection between the PBX system and the first terminal device are activated, and when the VOIP application or video call application is in the foreground mode, further comprising and is terminating the call by the VOIP application, when the VOIP application or video call application moves to the background mode. 10. The method according to claim 1, wherein the first connection is based on Hypertext Transfer Protocol (HTTP), Socket or Web Socket Protocol. 11. The method according to claim 1, wherein the second connection is based on Hypertext Transfer Protocol (HTTP), Socket or Web Socket Protocol. 12. An improved PBX system of the type capable of communicating with a first terminal device, the first terminal device being equipped with a VOIP application or video call application for forwarding a VOIP call or video call from a second terminal device to which the system is being adapted to connect, and to a remote notification server, wherein the improvement comprises a core unit which is adapted for communicating with the VOIP application of the first terminal device, and a provider unit, which is adapted to send a remote notification to a the VOIP application of the first terminal device via a remote notification server, wherein the core unit is adapted to communicate with the first terminal device via a first connection, when the VOIP application on the first terminal device is running in a foreground mode, and communicate via a second connection for receiving information from the first terminal device on what type of communication connection the first terminal device is currently using. 13. The improved PBX system according to claim 12, wherein the first connection is based on Hypertext Transfer Protocol (HTTP), Socket or WebSocket, and wherein the second connection is also based on Hypertext Transfer Protocol (HTTP), Socket or Web Socket Protocol. 14. A communication network comprising an improved private branch exchange system of the type capable of communicating with a first terminal device, the first terminal device being equipped with a VOIP application or video call application for forwarding a VOIP call or video call from a second terminal device to which the system is being adapted to connect, and to a remote notification server, wherein the improvement comprises a core unit which is adapted for communicating with the VOIP application of the first terminal device, and a provider unit, which is adapted to send a remote notification to a the VOIP application of the first terminal device via a remote notification server, wherein the core unit is adapted to communicate with the first terminal device via a first connection, when the VOIP application on the first terminal device is running in a foreground mode, and communicate via a second connection for receiving information from the first terminal device on what type of communication connection the first terminal device is currently using, the first terminal device being equipped with a VOIP application or a video call application, and a remote notification server.
A computer-implemented method for establishing a VOIP communication between a PBX system and a first terminal device is disclosed. The first terminal device has a VOIP application or video call application. The PBX system and the first terminal device are able to communicate via a first communication connection and a second communication connection. When the PBX system receives a call to be forwarded to the first terminal device the PBX system verifies whether the first terminal device is logged in. If the PBX system verifies that the first terminal device is not logged in, the call is rejected. If the PBX system verifies that the first terminal device is logged in, the PBX system determines whether the application on the first terminal device is running in a background mode or in a foreground mode. When the PBX system determines that the application is running in the foreground mode, the PBX system uses the first connection for forwarding the call. When the PBX system determines that the application is running in the background mode the PBX system uses the second connection to receive information about the communication connection being used.1. A computer-implemented method for establishing a VOIP communication between a PBX system and a first terminal device in a communication network, wherein the first terminal device is provided with a VOIP application or video call application, and wherein the PBX system and the first terminal device are able to communicate via a first communication connection and a second communication connection in the communication network, the method comprising: receiving, by the PBX system, a call from a second terminal device to be forwarded to the first terminal device; verifying, by the PBX system, if the first terminal device is logged in the communication network, wherein when the PBX system verifies that the first terminal device is not logged in, the call is rejected, and when the PBX system verifies that the first terminal device is logged in, then the PBX system performs the steps of: determining, whether the VOIP application or video call application on the first terminal device is running in a background mode with the VOIP application or video call application being inactive, or in a foreground mode with the VOIP application or video call application being active, and when the PBX system determines that the VOIP application or video call application is running in the foreground mode, using the first connection between the PBX system and the first terminal device for forwarding the call to the first terminal device, and, when the PBX system determines that the VOIP application or video call application is running in the background mode, using the second connection between the PBX system and the first terminal device for receiving information from the first terminal device on what type of its communication connection that it is using at that point of time. 2. The method according to claim 1, wherein when the PBX system cannot determine that the VOIP application or video call application is running in the foreground mode, the PBX system transmits to a remote notification server being provided in the communication network a first message in order to cause the remote notification server to send a remote notification message to the first terminal device. 3. The method according to claim 2, wherein the second connection between the PBX system and the first terminal device is activated, and the PBX system, after the first terminal device, has received the remote notification message from the remote notification server, receives a message from the first terminal device via the second connection comprising information that the VOIP application or video call application is moved into foreground mode. 4. The method according to claim 2, wherein the second connection between the PBX system and the first terminal device is activated, and the PBX system, after the first terminal device has received the remote notification message from the remote notification server, the PBX system receives a message from the first terminal device via the second connection, the message comprising information on what type of communication connection the first terminal device is using at that point of time. 5. The method according to claim 4, wherein the PBX system, upon receiving information on the type of communication connection that the first terminal device is using at that point of time, deflects the call to that communication connection. 6. The method according to claim 4, wherein the PBX system, upon receiving information on the type of communication connection that the first terminal device is using at that point of time, deflects the call to Voice Mail or to a third terminal device, which is also equipped with a VOIP application or video call application. 7. The method according to claim 2, wherein, after the remote notification server has sent a remote notification message to the first terminal device, a time window is started expiring either upon receipt of information on the type of connection by the PBX system or upon reaching a predetermined upper time limit. 8. The method according to claim 1, wherein the type of communication connection comprises at least one of local area network (LAN), wide area network (WAN), and global system for mobile communications (GSM). 9. The method according to claim 1, wherein the first connection between the PBX system and the first terminal device are activated, and when the VOIP application or video call application is in the foreground mode, further comprising and is terminating the call by the VOIP application, when the VOIP application or video call application moves to the background mode. 10. The method according to claim 1, wherein the first connection is based on Hypertext Transfer Protocol (HTTP), Socket or Web Socket Protocol. 11. The method according to claim 1, wherein the second connection is based on Hypertext Transfer Protocol (HTTP), Socket or Web Socket Protocol. 12. An improved PBX system of the type capable of communicating with a first terminal device, the first terminal device being equipped with a VOIP application or video call application for forwarding a VOIP call or video call from a second terminal device to which the system is being adapted to connect, and to a remote notification server, wherein the improvement comprises a core unit which is adapted for communicating with the VOIP application of the first terminal device, and a provider unit, which is adapted to send a remote notification to a the VOIP application of the first terminal device via a remote notification server, wherein the core unit is adapted to communicate with the first terminal device via a first connection, when the VOIP application on the first terminal device is running in a foreground mode, and communicate via a second connection for receiving information from the first terminal device on what type of communication connection the first terminal device is currently using. 13. The improved PBX system according to claim 12, wherein the first connection is based on Hypertext Transfer Protocol (HTTP), Socket or WebSocket, and wherein the second connection is also based on Hypertext Transfer Protocol (HTTP), Socket or Web Socket Protocol. 14. A communication network comprising an improved private branch exchange system of the type capable of communicating with a first terminal device, the first terminal device being equipped with a VOIP application or video call application for forwarding a VOIP call or video call from a second terminal device to which the system is being adapted to connect, and to a remote notification server, wherein the improvement comprises a core unit which is adapted for communicating with the VOIP application of the first terminal device, and a provider unit, which is adapted to send a remote notification to a the VOIP application of the first terminal device via a remote notification server, wherein the core unit is adapted to communicate with the first terminal device via a first connection, when the VOIP application on the first terminal device is running in a foreground mode, and communicate via a second connection for receiving information from the first terminal device on what type of communication connection the first terminal device is currently using, the first terminal device being equipped with a VOIP application or a video call application, and a remote notification server.
2,400
7,889
7,889
14,707,419
2,425
A device for generative production of at least one component area of a component, in particular a component of a turbine or a compressor, is disclosed. The device includes at least one powder feed for application of at least one powder layer to a build-up and joining zone of a component platform that can be lowered and at least one radiation source for generating at least one high-energy beam by which the powder layer can be fused and/or sintered locally in the area of the build-up and joining zone to form a component layer. The device further includes a camera system which can produce at least one stereoscopic image for three-dimensional detection of at least one area of the component layer. A method for producing at least one component region of a component, in particular a component of a turbine or a compressor, is also disclosed.
1. A device for generative production of a component area of a component, comprising: a powder feed, wherein a powder layer is applyable by the powder feed to a build-up and joining zone of a component platform that is lowerable; a radiation source, wherein a high-energy beam is generatable by the radiation source and wherein the powder layer is fusable and/or sinterable locally in an area of the build-up and joining zone by the high-energy beam to form a component layer; and a camera system, wherein a stereoscopic image of a region of the component layer is producible by the camera system for three-dimensional detection of the region of the component layer. 2. The device according to claim 1, wherein the camera system includes at least two cameras spaced a distance apart from one another. 3. The device according to claim 1, wherein the camera system is a strip projection system. 4. The device according to claim 1, wherein the camera system includes at least one infrared sensor. 5. The device according to claim 1, wherein the camera system is stationary and/or movable with respect to the build-up and joining zone. 6. The device according to claim 1 further comprising an illumination system, wherein at least one region of the component layer is illuminatable with different angles of illumination and/or with different wavelengths and/or wavelength ranges by the illumination system. 7. The device according to claim 6, wherein the illumination system includes at least one infrared light source and/or at least one light source wherein the component layer is illuminatable sequentially in time with strips of different widths by the at least one infrared light source and the at least one light source. 8. The device according to claim 7, wherein the at least one infrared light source is an IR laser. 9. The device according to claim 1, wherein a plurality of stereoscopic images of the component layer is producible by the camera system. 10. The device according to claim 1 further comprising an evaluation device connected to the camera system, wherein a surface quality of the component layer is ascertainable by the evaluation device on a basis of the stereoscopic image. 11. The device according to claim 1, wherein the component is a component of a turbine or of a compressor. 12. A method for producing a component region of a component, comprising the steps of: a) application of a powdered component material to a component platform in an area of a build-up and joining zone of the component platform; b) fusion and/or sintering of the powdered component material by supplying energy by a high-energy beam in the area of the build-up and joining zone to form a component layer; c) lowering of the component platform by a predefined layer thickness; d) repeating steps a) through c) to complete the component region; and e) producing a stereoscopic image by a camera system of a region of the component layer for three-dimensional detection of the region of the component layer. 13. The method according to claim 12, wherein a respective stereoscopic image is produced for a plurality of component layers and/or for each component layer. 14. The method according to claim 12, wherein a surface quality of the component layer is ascertained on a basis of the stereoscopic image. 15. The method according to claim 12, wherein the energy supplied by the high-energy beam is controlled on a basis of the stereoscope image. 16. The method according to claim 12, wherein the component is a component of a turbine or of a compressor.
A device for generative production of at least one component area of a component, in particular a component of a turbine or a compressor, is disclosed. The device includes at least one powder feed for application of at least one powder layer to a build-up and joining zone of a component platform that can be lowered and at least one radiation source for generating at least one high-energy beam by which the powder layer can be fused and/or sintered locally in the area of the build-up and joining zone to form a component layer. The device further includes a camera system which can produce at least one stereoscopic image for three-dimensional detection of at least one area of the component layer. A method for producing at least one component region of a component, in particular a component of a turbine or a compressor, is also disclosed.1. A device for generative production of a component area of a component, comprising: a powder feed, wherein a powder layer is applyable by the powder feed to a build-up and joining zone of a component platform that is lowerable; a radiation source, wherein a high-energy beam is generatable by the radiation source and wherein the powder layer is fusable and/or sinterable locally in an area of the build-up and joining zone by the high-energy beam to form a component layer; and a camera system, wherein a stereoscopic image of a region of the component layer is producible by the camera system for three-dimensional detection of the region of the component layer. 2. The device according to claim 1, wherein the camera system includes at least two cameras spaced a distance apart from one another. 3. The device according to claim 1, wherein the camera system is a strip projection system. 4. The device according to claim 1, wherein the camera system includes at least one infrared sensor. 5. The device according to claim 1, wherein the camera system is stationary and/or movable with respect to the build-up and joining zone. 6. The device according to claim 1 further comprising an illumination system, wherein at least one region of the component layer is illuminatable with different angles of illumination and/or with different wavelengths and/or wavelength ranges by the illumination system. 7. The device according to claim 6, wherein the illumination system includes at least one infrared light source and/or at least one light source wherein the component layer is illuminatable sequentially in time with strips of different widths by the at least one infrared light source and the at least one light source. 8. The device according to claim 7, wherein the at least one infrared light source is an IR laser. 9. The device according to claim 1, wherein a plurality of stereoscopic images of the component layer is producible by the camera system. 10. The device according to claim 1 further comprising an evaluation device connected to the camera system, wherein a surface quality of the component layer is ascertainable by the evaluation device on a basis of the stereoscopic image. 11. The device according to claim 1, wherein the component is a component of a turbine or of a compressor. 12. A method for producing a component region of a component, comprising the steps of: a) application of a powdered component material to a component platform in an area of a build-up and joining zone of the component platform; b) fusion and/or sintering of the powdered component material by supplying energy by a high-energy beam in the area of the build-up and joining zone to form a component layer; c) lowering of the component platform by a predefined layer thickness; d) repeating steps a) through c) to complete the component region; and e) producing a stereoscopic image by a camera system of a region of the component layer for three-dimensional detection of the region of the component layer. 13. The method according to claim 12, wherein a respective stereoscopic image is produced for a plurality of component layers and/or for each component layer. 14. The method according to claim 12, wherein a surface quality of the component layer is ascertained on a basis of the stereoscopic image. 15. The method according to claim 12, wherein the energy supplied by the high-energy beam is controlled on a basis of the stereoscope image. 16. The method according to claim 12, wherein the component is a component of a turbine or of a compressor.
2,400
7,890
7,890
15,427,091
2,424
A system for retrieval of executable applications, comprising: a broadcast tele-vision receiver apparatus; and a server; wherein the broadcast television receiver apparatus includes a communication unit having an interface for bidirectional communication with a network and adapted to determine channel information from a currently decoded channel carried in a broadcast television signal, the channel information identifying the currently decoded channel, the communication unit being further adapted to send the channel information to a server over the network, and to receive application information from the server, the application information describing a set of applications which are available for execution, and to receive executable code components for the set of applications corresponding to the application information, and wherein the broadcast television receiver apparatus further includes a data processor adapted to execute the application whilst the channel is decoded; and wherein the server is adapted to receive the channel information over the network, to determine the application information by analyzing the channel information, and to send the application information to the communication unit.
1. An electronic device comprising: an interface configured to provide a bidirectional communication link over a network and receive a content item transmitted via the internet; and circuitry configured to decode the received content item, wherein the interface is configured to receive a data feed comprising textual data wrapped in a tag structure associated with the content item based on information identifying the content item, and the circuitry is configured to execute a software stack configured to interpret the textual data wrapped in a tag structure of the data feed to control omitting part of the data feed for output with the content item based on control information; and control outputting the data feed with the exception of the omitted part of the data feed interpreted by the software stack. 2. The electronic device according to claim 1, wherein the control information defines part of the data feed which is to be outputted for display. 3. The electronic device according to claim 1, wherein the interface is configured to receive further data feeds comprising textual data wrapped in a tag structure. 4. The electronic device according to claim 1, wherein the control information defines content in the data feed which is to be omitted. 5. The electronic device according to claim 4, wherein the data feed includes image data. 6. The electronic device according to claim 4, wherein the data feed includes an audio/video file or audio/video stream. 7. The electronic device according to claim 1, wherein the data feed is associated with an application. 8. The electronic device according to claim 7, wherein the application provides a bidirectional connection with a provider of the content item for receiving comments on the content item. 9. The electronic device according to claim 7, further comprising: a memory, wherein the application is downloaded via the interface and stored in the memory. 10. The electronic device according to claim 1, wherein the interface is configured to receive the data feed via a uniform resource identifier (URI) for the data feed. 11. The electronic device according to claim 1, wherein the omission of part of the data feed is based on the device receiving a user input. 12. The electronic device according to claim 1, wherein the data feed includes uniform resource identifiers (URIs) identifying content. 13. The electronic device according to claim 7, wherein the data feed of the application is output for display in a border portion of a display. 14. The electronic device according to claim 7, wherein the application is output for display as part of a graphical user interface (GUI) of the application and overlaid on a video image of the content item. 15. The electronic device according to claim 1, wherein the control information includes control markers which are interpreted by the software stack to determine parts of the data feed to output or to omit from an output. 16. The electronic device according to claim 15, wherein the control markers define content in retrieval via one or more uniform resource identifier (URIs) in the data feed. 17. A method comprising: receiving a content item via an interface configured to provide a bidirectional communication link over a network, the content item having been transmitted via the internet; decoding the received content item; receiving a data feed comprising textual data wrapped in a tag structure, the data feed being associated with the content item based on information identifying the content item; interpreting by circuitry the textual data wrapped in a tag structure of the data feed to control omitting part of the data feed for output with the content item based on control information; and controlling outputting the data feed with the exception of the omitted part of the data feed interpreted by the circuitry. 18. A method comprising: transmitting via the internet a content item to a an interface of an electronic device; defining parts of a data feed comprising textual data wrapped in a tag structure by content control markers which, in response to control information cause omission or inclusion of parts of the data feed for display ; associating the data feed with the content item based on information identifying the content item; and transmitting the data feed via the internet contemporaneously with the content item. 19. A non-transitory storage medium having stored thereon code components which when executed by a computer cause the method of claim 17 to be performed. 20. A non-transitory storage medium having stored thereon code components which when executed by a computer cause the method of claim 18 to be performed.
A system for retrieval of executable applications, comprising: a broadcast tele-vision receiver apparatus; and a server; wherein the broadcast television receiver apparatus includes a communication unit having an interface for bidirectional communication with a network and adapted to determine channel information from a currently decoded channel carried in a broadcast television signal, the channel information identifying the currently decoded channel, the communication unit being further adapted to send the channel information to a server over the network, and to receive application information from the server, the application information describing a set of applications which are available for execution, and to receive executable code components for the set of applications corresponding to the application information, and wherein the broadcast television receiver apparatus further includes a data processor adapted to execute the application whilst the channel is decoded; and wherein the server is adapted to receive the channel information over the network, to determine the application information by analyzing the channel information, and to send the application information to the communication unit.1. An electronic device comprising: an interface configured to provide a bidirectional communication link over a network and receive a content item transmitted via the internet; and circuitry configured to decode the received content item, wherein the interface is configured to receive a data feed comprising textual data wrapped in a tag structure associated with the content item based on information identifying the content item, and the circuitry is configured to execute a software stack configured to interpret the textual data wrapped in a tag structure of the data feed to control omitting part of the data feed for output with the content item based on control information; and control outputting the data feed with the exception of the omitted part of the data feed interpreted by the software stack. 2. The electronic device according to claim 1, wherein the control information defines part of the data feed which is to be outputted for display. 3. The electronic device according to claim 1, wherein the interface is configured to receive further data feeds comprising textual data wrapped in a tag structure. 4. The electronic device according to claim 1, wherein the control information defines content in the data feed which is to be omitted. 5. The electronic device according to claim 4, wherein the data feed includes image data. 6. The electronic device according to claim 4, wherein the data feed includes an audio/video file or audio/video stream. 7. The electronic device according to claim 1, wherein the data feed is associated with an application. 8. The electronic device according to claim 7, wherein the application provides a bidirectional connection with a provider of the content item for receiving comments on the content item. 9. The electronic device according to claim 7, further comprising: a memory, wherein the application is downloaded via the interface and stored in the memory. 10. The electronic device according to claim 1, wherein the interface is configured to receive the data feed via a uniform resource identifier (URI) for the data feed. 11. The electronic device according to claim 1, wherein the omission of part of the data feed is based on the device receiving a user input. 12. The electronic device according to claim 1, wherein the data feed includes uniform resource identifiers (URIs) identifying content. 13. The electronic device according to claim 7, wherein the data feed of the application is output for display in a border portion of a display. 14. The electronic device according to claim 7, wherein the application is output for display as part of a graphical user interface (GUI) of the application and overlaid on a video image of the content item. 15. The electronic device according to claim 1, wherein the control information includes control markers which are interpreted by the software stack to determine parts of the data feed to output or to omit from an output. 16. The electronic device according to claim 15, wherein the control markers define content in retrieval via one or more uniform resource identifier (URIs) in the data feed. 17. A method comprising: receiving a content item via an interface configured to provide a bidirectional communication link over a network, the content item having been transmitted via the internet; decoding the received content item; receiving a data feed comprising textual data wrapped in a tag structure, the data feed being associated with the content item based on information identifying the content item; interpreting by circuitry the textual data wrapped in a tag structure of the data feed to control omitting part of the data feed for output with the content item based on control information; and controlling outputting the data feed with the exception of the omitted part of the data feed interpreted by the circuitry. 18. A method comprising: transmitting via the internet a content item to a an interface of an electronic device; defining parts of a data feed comprising textual data wrapped in a tag structure by content control markers which, in response to control information cause omission or inclusion of parts of the data feed for display ; associating the data feed with the content item based on information identifying the content item; and transmitting the data feed via the internet contemporaneously with the content item. 19. A non-transitory storage medium having stored thereon code components which when executed by a computer cause the method of claim 17 to be performed. 20. A non-transitory storage medium having stored thereon code components which when executed by a computer cause the method of claim 18 to be performed.
2,400
7,891
7,891
14,780,530
2,476
A network node may predict, from user equipment, UE mobility attributes and/or state, likely target SCells and pre-configure the UE with information about those SCells, allowing quick deactivation and activation when the UE reports one of the predicted target SCells as being better than then the existing current SCell.
1. A method performed by a network node in a wireless communication system, said wireless communication system providing carrier aggregation (CA) for a user equipment (UE), said UE being located in and connected to a primary cell (PCell), the method comprising: transmitting, to the UE, initial configuration data that comprises information regarding at least one secondary cell (SCell), one of which is a current SCell to which the UE is to be connected, and at least one event triggering condition that defines radio signal measurement conditions for use by the UE when switching connection between a current SCell and a subsequent SCell, and repeating the steps of: obtaining monitoring data associated with the UE, said monitoring data comprising spatial information regarding movement of the UE in relation to the at least one SCell, calculating, based on the monitoring data, at least one prediction of at least one subsequent predicted SCell into which the UE will enter, transmitting, to the UE, information that specifies said at least one predicted subsequent SCell, providing, to the at least one subsequent predicted SCell, preparation information that comprises information for the at least one subsequent predicted SCell that it is to operate as a SCell in relation to the UE. 2. The method of claim 1, comprising: determining whether or not the UE has switched from being connected to the current SCell to being connected to one specific SCell among the at least one subsequent predicted SCell, and, if so: updating the monitoring data with information that comprises spatial movement of the UE into the specific SCell, whereby the specific SCell becomes the current SCell. 3. The method of claim 1, wherein the at least one event triggering condition is configured for triggering any event of: event X1 being triggered by the UE based on an outcome of a comparison of signal measurements performed on the current SCell and the at least one predicted subsequent SCell by the UE, event X2 being triggered by the UE based on an outcome of a comparison of a signal measurement performed by the UE by comparing the at least one predicted subsequent SCell with a threshold, and event X3 being triggered based on an outcome of a comparison of a signal measurement performed by the UE on the current SCell with a threshold. 4. The method of claim 1, wherein the obtaining of monitoring data comprises receiving mobility attributes associated with the UE, and wherein: the calculation of at least one prediction of at least one subsequent predicted SCell into which the UE will enter comprises using the received mobility attributes. 5. The method of claim 1, wherein the obtaining of monitoring data comprises determining mobility attributes associated with the UE, and wherein: the transmission of information that specifies said at least one predicted subsequent SCell comprises transmission of said mobility attributes, and the calculation of at least one prediction of at least one subsequent predicted SCell into which the UE will enter comprises using the received mobility attributes. 6. The method of claim 1, comprising: receiving, from the UE, information regarding the UE capability of being preconfigured with one or more SCells for use as one or more SCell at a future time, and wherein the initial configuration data comprises at least part of said information regarding the UE capability. 7. The method of claim 1, comprising determining that a handover to a subsequent PCell is in progress, and in response to this determination, providing information regarding to the subsequent PCell, said information comprising any of UE movement and mobility attributes associated with the UE. 8. A method, performed by a user equipment (UE), said UE being located in and connected to a primary cell (PCell) in a wireless communication system, said wireless communication system providing carrier aggregation (CA), the method comprising: receiving, from a network node, initial configuration data that comprises information regarding at least one secondary cell (SCell), one of which is a current SCell to which the UE is to be connected, and at least one event triggering condition that defines radio signal measurement conditions for use by the UE when switching connection between a current SCell and a subsequent SCell, connecting to the current SCell, and repeating the steps of: receiving, from the network node, information that specifies at least one predicted subsequent SCell, measuring radio signals associated with the current SCell and radio signals associated with said at least one SCell, determining, based on the measuring of radio signals, an event according to the at least one event triggering condition and, if said event indicates that a specific SCell among the at least one predicted subsequent SCell is better than the current SCell: deactivating the current SCell and activating the specific SCell that is better than the current SCell whereby the specific SCell becomes the current SCell, and providing, to the network node, a report that comprises information regarding the determined event and information regarding the activation of the specific SCell that is better than the current SCell. 9. The method of claim 8, wherein the at least one event triggering condition is configured for triggering any event of: event X1 being triggered by the UE based on an outcome of a comparison of signal measurements performed on the current SCell and the at least one predicted subsequent Scell by the UE, event X2 being triggered by the UE based on an outcome of a comparison of a signal measurement performed by the UE by comparing the at least one predicted subsequent SCell with a threshold, and event X3 being triggered based on an outcome of a comparison of a signal measurement performed by the UE on the current SCell with a threshold. 10. The method of claim 8, comprising: determining, if no event is determined that indicates that a specific SCell among the at least one predicted subsequent SCell is better than the current SCell, an event that indicates whether or not a specific SCell that is not among the at least one predicted SCell is better than the current SCell, and if said event indicates that a specific SCell that is not among the at least one predicted SCell is better than the current SCell: providing, to the network node, a report that comprises information regarding the determined event and information regarding the activation of the specific SCell that is not among the at least one predicted SCell and that is better than the current SCell. 11. The method of claim 10, comprising: obtaining mobility attributes associated with the UE, and wherein the provision of a report to the network node comprises providing said mobility attributes. 12. The method of claim 11, further comprising: calculating, based on the monitoring data, at least one prediction of at least one subsequent predicted SCell into which the UE will enter, and wherein the provision of a report to the network node comprises providing said prediction of at least one subsequent predicted SCell. 13. The method of claim 8, comprising: transmitting, to the network node, information regarding the UE capability of being preconfigured with one or more SCells for use as one or more SCell at a future time. 14. A network node comprising input/output circuitry, a processor and a memory, said memory containing instructions executable by said processor whereby said node is operative to: transmit, to a user equipment (UE), initial configuration data that comprises information regarding at least one secondary cell (SCell), one of which is a current SCell to which the UE is to be connected, and at least one event triggering condition that defines radio signal measurement conditions for use by the UE when switching connection between a current SCell and a subsequent SCell, and repeating the steps of: obtain monitoring data associated with the UE, said monitoring data comprising spatial information regarding movement of the UE in relation to the at least one SCell, calculate, based on the monitoring data, at least one prediction of at least one subsequent predicted SCell into which the UE will enter, transmit, to the UE, information that specifies said at least one predicted subsequent SCell, provide, to the at least one subsequent predicted SCell, preparation information that comprises information for the at least one subsequent predicted SCell that it is to operate as a SCell in relation to the UE. 15. A user equipment comprising radio frequency circuitry, a processor and a memory, said memory containing instructions executable by said processor whereby said node is operative to: receive, from a network node, initial configuration data that comprises information regarding at least one secondary cell (SCell), one of which is a current SCell to which the UE is to be connected, and at least one event triggering condition that defines radio signal measurement conditions for use by the UE when switching connection between a current SCell and a subsequent SCell, connect to the current SCell, and repeating the steps of: receive, from the network node, information that specifies at least one predicted subsequent SCell, measure radio signals associated with the current SCell and radio signals associated with said at least one SCell, determine, based on the measuring of radio signals, an event according to the at least one event triggering condition and, if said event indicates that a specific SCell among the at least one predicted subsequent SCell is better than the current SCell: deactivate the current SCell and activating the specific SCell that is better than the current SCell whereby the specific SCell becomes the current SCell, and provide, to the network node, a report that comprises information regarding the determined event and information regarding the activation of the specific SCell that is better than the current SCell. 16. A nontransitory computer readable storage medium comprising a computer program comprising instructions which, when executed on at least one processor in a network node in a wireless communication system, said wireless communication system providing carrier aggregation (CA) for a user equipment (UE), said UE being located in and connected to a primary cell, cause the network node to carry out a method comprising: transmitting, to the UE, initial configuration data that comprises information regarding at least one secondary cell (SCell), one of which is a current SCell to which the UE is to be connected, and at least one event triggering condition that defines radio signal measurement conditions for use by the UE when switching connection between a current SCell and a subsequent SCell, and repeating the steps of: obtaining monitoring data associated with the UE, said monitoring data comprising spatial information regarding movement of the UE in relation to the at least one SCell, calculating, based on the monitoring data, at least one prediction of at least one subsequent predicted SCell into which the UE will enter, transmitting, to the UE, information that specifies said at least one predicted subsequent SCell, providing, to the at least one subsequent predicted SCell, preparation information that comprises information for the at least one subsequent predicted SCell that it is to operate as a SCell in relation to the UE. 17. A nontransitory computer readable storage medium comprising a computer program comprising instructions which, when executed on at least one processor in a user equipment (UE), said UE being located in and connected to a primary cell (PCell) in a wireless communication system, said wireless communication system providing carrier aggregation (CA), cause the UE to carry out a method comprising: receiving, from a network node, initial configuration data that comprises information regarding at least one secondary cell (SCell), one of which is a current SCell to which the UE is to be connected, and at least one event triggering condition that defines radio signal measurement conditions for use by the UE when switching connection between a current SCell and a subsequent SCell, connecting to the current SCell, and repeating the steps of: receiving, from the network node, information that specifies at least one predicted subsequent SCell, measuring radio signals associated with the current SCell and radio signals associated with said at least one SCell, determining, based on the measuring of radio signals, an event according to the at least one event triggering condition and, if said event indicates that a specific SCell among the at least one predicted subsequent SCell is better than the current SCell: deactivating the current SCell and activating the specific SCell that is better than the current SCell whereby the specific SCell becomes the current SCell, and providing, to the network node, a report that comprises information regarding the determined event and information regarding the activation of the specific SCell that is better than the current SCell. 18. (canceled)
A network node may predict, from user equipment, UE mobility attributes and/or state, likely target SCells and pre-configure the UE with information about those SCells, allowing quick deactivation and activation when the UE reports one of the predicted target SCells as being better than then the existing current SCell.1. A method performed by a network node in a wireless communication system, said wireless communication system providing carrier aggregation (CA) for a user equipment (UE), said UE being located in and connected to a primary cell (PCell), the method comprising: transmitting, to the UE, initial configuration data that comprises information regarding at least one secondary cell (SCell), one of which is a current SCell to which the UE is to be connected, and at least one event triggering condition that defines radio signal measurement conditions for use by the UE when switching connection between a current SCell and a subsequent SCell, and repeating the steps of: obtaining monitoring data associated with the UE, said monitoring data comprising spatial information regarding movement of the UE in relation to the at least one SCell, calculating, based on the monitoring data, at least one prediction of at least one subsequent predicted SCell into which the UE will enter, transmitting, to the UE, information that specifies said at least one predicted subsequent SCell, providing, to the at least one subsequent predicted SCell, preparation information that comprises information for the at least one subsequent predicted SCell that it is to operate as a SCell in relation to the UE. 2. The method of claim 1, comprising: determining whether or not the UE has switched from being connected to the current SCell to being connected to one specific SCell among the at least one subsequent predicted SCell, and, if so: updating the monitoring data with information that comprises spatial movement of the UE into the specific SCell, whereby the specific SCell becomes the current SCell. 3. The method of claim 1, wherein the at least one event triggering condition is configured for triggering any event of: event X1 being triggered by the UE based on an outcome of a comparison of signal measurements performed on the current SCell and the at least one predicted subsequent SCell by the UE, event X2 being triggered by the UE based on an outcome of a comparison of a signal measurement performed by the UE by comparing the at least one predicted subsequent SCell with a threshold, and event X3 being triggered based on an outcome of a comparison of a signal measurement performed by the UE on the current SCell with a threshold. 4. The method of claim 1, wherein the obtaining of monitoring data comprises receiving mobility attributes associated with the UE, and wherein: the calculation of at least one prediction of at least one subsequent predicted SCell into which the UE will enter comprises using the received mobility attributes. 5. The method of claim 1, wherein the obtaining of monitoring data comprises determining mobility attributes associated with the UE, and wherein: the transmission of information that specifies said at least one predicted subsequent SCell comprises transmission of said mobility attributes, and the calculation of at least one prediction of at least one subsequent predicted SCell into which the UE will enter comprises using the received mobility attributes. 6. The method of claim 1, comprising: receiving, from the UE, information regarding the UE capability of being preconfigured with one or more SCells for use as one or more SCell at a future time, and wherein the initial configuration data comprises at least part of said information regarding the UE capability. 7. The method of claim 1, comprising determining that a handover to a subsequent PCell is in progress, and in response to this determination, providing information regarding to the subsequent PCell, said information comprising any of UE movement and mobility attributes associated with the UE. 8. A method, performed by a user equipment (UE), said UE being located in and connected to a primary cell (PCell) in a wireless communication system, said wireless communication system providing carrier aggregation (CA), the method comprising: receiving, from a network node, initial configuration data that comprises information regarding at least one secondary cell (SCell), one of which is a current SCell to which the UE is to be connected, and at least one event triggering condition that defines radio signal measurement conditions for use by the UE when switching connection between a current SCell and a subsequent SCell, connecting to the current SCell, and repeating the steps of: receiving, from the network node, information that specifies at least one predicted subsequent SCell, measuring radio signals associated with the current SCell and radio signals associated with said at least one SCell, determining, based on the measuring of radio signals, an event according to the at least one event triggering condition and, if said event indicates that a specific SCell among the at least one predicted subsequent SCell is better than the current SCell: deactivating the current SCell and activating the specific SCell that is better than the current SCell whereby the specific SCell becomes the current SCell, and providing, to the network node, a report that comprises information regarding the determined event and information regarding the activation of the specific SCell that is better than the current SCell. 9. The method of claim 8, wherein the at least one event triggering condition is configured for triggering any event of: event X1 being triggered by the UE based on an outcome of a comparison of signal measurements performed on the current SCell and the at least one predicted subsequent Scell by the UE, event X2 being triggered by the UE based on an outcome of a comparison of a signal measurement performed by the UE by comparing the at least one predicted subsequent SCell with a threshold, and event X3 being triggered based on an outcome of a comparison of a signal measurement performed by the UE on the current SCell with a threshold. 10. The method of claim 8, comprising: determining, if no event is determined that indicates that a specific SCell among the at least one predicted subsequent SCell is better than the current SCell, an event that indicates whether or not a specific SCell that is not among the at least one predicted SCell is better than the current SCell, and if said event indicates that a specific SCell that is not among the at least one predicted SCell is better than the current SCell: providing, to the network node, a report that comprises information regarding the determined event and information regarding the activation of the specific SCell that is not among the at least one predicted SCell and that is better than the current SCell. 11. The method of claim 10, comprising: obtaining mobility attributes associated with the UE, and wherein the provision of a report to the network node comprises providing said mobility attributes. 12. The method of claim 11, further comprising: calculating, based on the monitoring data, at least one prediction of at least one subsequent predicted SCell into which the UE will enter, and wherein the provision of a report to the network node comprises providing said prediction of at least one subsequent predicted SCell. 13. The method of claim 8, comprising: transmitting, to the network node, information regarding the UE capability of being preconfigured with one or more SCells for use as one or more SCell at a future time. 14. A network node comprising input/output circuitry, a processor and a memory, said memory containing instructions executable by said processor whereby said node is operative to: transmit, to a user equipment (UE), initial configuration data that comprises information regarding at least one secondary cell (SCell), one of which is a current SCell to which the UE is to be connected, and at least one event triggering condition that defines radio signal measurement conditions for use by the UE when switching connection between a current SCell and a subsequent SCell, and repeating the steps of: obtain monitoring data associated with the UE, said monitoring data comprising spatial information regarding movement of the UE in relation to the at least one SCell, calculate, based on the monitoring data, at least one prediction of at least one subsequent predicted SCell into which the UE will enter, transmit, to the UE, information that specifies said at least one predicted subsequent SCell, provide, to the at least one subsequent predicted SCell, preparation information that comprises information for the at least one subsequent predicted SCell that it is to operate as a SCell in relation to the UE. 15. A user equipment comprising radio frequency circuitry, a processor and a memory, said memory containing instructions executable by said processor whereby said node is operative to: receive, from a network node, initial configuration data that comprises information regarding at least one secondary cell (SCell), one of which is a current SCell to which the UE is to be connected, and at least one event triggering condition that defines radio signal measurement conditions for use by the UE when switching connection between a current SCell and a subsequent SCell, connect to the current SCell, and repeating the steps of: receive, from the network node, information that specifies at least one predicted subsequent SCell, measure radio signals associated with the current SCell and radio signals associated with said at least one SCell, determine, based on the measuring of radio signals, an event according to the at least one event triggering condition and, if said event indicates that a specific SCell among the at least one predicted subsequent SCell is better than the current SCell: deactivate the current SCell and activating the specific SCell that is better than the current SCell whereby the specific SCell becomes the current SCell, and provide, to the network node, a report that comprises information regarding the determined event and information regarding the activation of the specific SCell that is better than the current SCell. 16. A nontransitory computer readable storage medium comprising a computer program comprising instructions which, when executed on at least one processor in a network node in a wireless communication system, said wireless communication system providing carrier aggregation (CA) for a user equipment (UE), said UE being located in and connected to a primary cell, cause the network node to carry out a method comprising: transmitting, to the UE, initial configuration data that comprises information regarding at least one secondary cell (SCell), one of which is a current SCell to which the UE is to be connected, and at least one event triggering condition that defines radio signal measurement conditions for use by the UE when switching connection between a current SCell and a subsequent SCell, and repeating the steps of: obtaining monitoring data associated with the UE, said monitoring data comprising spatial information regarding movement of the UE in relation to the at least one SCell, calculating, based on the monitoring data, at least one prediction of at least one subsequent predicted SCell into which the UE will enter, transmitting, to the UE, information that specifies said at least one predicted subsequent SCell, providing, to the at least one subsequent predicted SCell, preparation information that comprises information for the at least one subsequent predicted SCell that it is to operate as a SCell in relation to the UE. 17. A nontransitory computer readable storage medium comprising a computer program comprising instructions which, when executed on at least one processor in a user equipment (UE), said UE being located in and connected to a primary cell (PCell) in a wireless communication system, said wireless communication system providing carrier aggregation (CA), cause the UE to carry out a method comprising: receiving, from a network node, initial configuration data that comprises information regarding at least one secondary cell (SCell), one of which is a current SCell to which the UE is to be connected, and at least one event triggering condition that defines radio signal measurement conditions for use by the UE when switching connection between a current SCell and a subsequent SCell, connecting to the current SCell, and repeating the steps of: receiving, from the network node, information that specifies at least one predicted subsequent SCell, measuring radio signals associated with the current SCell and radio signals associated with said at least one SCell, determining, based on the measuring of radio signals, an event according to the at least one event triggering condition and, if said event indicates that a specific SCell among the at least one predicted subsequent SCell is better than the current SCell: deactivating the current SCell and activating the specific SCell that is better than the current SCell whereby the specific SCell becomes the current SCell, and providing, to the network node, a report that comprises information regarding the determined event and information regarding the activation of the specific SCell that is better than the current SCell. 18. (canceled)
2,400
7,892
7,892
15,477,369
2,486
Each of plural devices includes a laser emitter and a camera for detecting reflections of laser light emitted by the device, so that plural of the devices can generate their own depth maps showing images within the field of view of their cameras. The resolution of each depth map may be improved by accessing a data store of prior images of objects and combining the prior images using super-resolution with current images of the depth maps.
1. A device comprising: at least one computer medium that is not a transitory signal and that comprises instructions executable by at least one processor to: generate, using a first device, at least a first current image of at least a second device in a field of view of a camera; the first image being a first 3D depth map; access a data structure of stored images; responsive to identifying a match between the first image and a first stored image in the data structure, combine the first image and the first stored image to render a modified depth map; aggregate the modified depth map with a modified depth map generated using images taken by the second device to render an aggregated depth map for a reference location that is distanced from a location of the first device. 2. The device of claim 1, wherein the instructions are executable to: identify the match between the first image and a first stored image at least in part using at least one stored characteristic of the first stored image. 3. The device of claim 2, wherein the stored characteristic includes a shape of an object in the first stored image. 4. The device of claim 2, wherein the stored characteristic includes an edge of an object in the first stored image. 5. The device of claim 1, wherein the instructions are executable to: combine the first image and the first stored image by superimposition to render the modified depth map, the modified depth map having a higher resolution than the depth map established by the first image. 6. The device of claim 5, wherein superimposition of the first image and first stored image are undertaken using super-resolution. 7. The device of claim 1, wherein the instructions are executable to: remove a portion of at least one of the first image, first stored image to render a respective cropped image prior to combining the first image and the first stored image to render the modified depth map. 8. An assembly comprising: plural computerized devices; each computerized device comprising at least one laser emitter configured to output signals useful for generating at least one three dimensional (3D) depth map; a first one of the computerized devices being programmed with instructions to: generate at least a first current image of at least one object in a field of view of a camera associated with the first one of the computerized devices; access a data structure of stored images; responsive to identifying a match between the first image and a first stored image in the data structure, combine the first image and the first stored image to render a modified three dimensional (3D) depth map. 9. The assembly of claim 8, wherein the instructions are executable to: identify the match between the first image and a first stored image at least in part using at least one stored characteristic of the first stored image. 10. The assembly of claim 9, wherein the stored characteristic includes a shape of an object in the first stored image. 11. The assembly of claim 9, wherein the stored characteristic includes an edge of an object in the first stored image. 12. The assembly of claim 8, wherein the instructions are executable to: combine the first image and the first stored image by superimposition to render the modified depth map, the modified depth map having a higher resolution than the first image. 13. The assembly of claim 12, wherein superimposition of the first image and first stored image are undertaken using super-resolution. 14. The assembly of claim 8, wherein the instructions are executable to: remove a portion of at least one of the first image, first stored image to render a respective cropped image prior to combining the first image and the first stored image to render the modified depth map. 15. A method comprising: using images from a first motorized mobile object, generating a first three dimensional (3D) depth map of at least a second motorized mobile object in space; using images from the second motorized mobile object generating a first second dimensional (3D) depth map of at least the first motorized mobile object in space; generating an aggregate 3D depth map from the first and second 3D depth maps referenced to a location spaced from at least the first motorized mobile object; and improving a resolution of at least one of the 3D depth maps by accessing a data store of prior images of objects and combining at least one the prior images using super-resolution with the at least one of the 3D depth maps to render a modified 3D depth map. 16. The method of claim 15, comprising: identifying a match between the at least one of the 3D depth maps and a first stored image in the data store and responsive thereto, combining the at least one of the 3D depth maps and the first stored image to render the modified 3D depth map. 17. The method of claim 15, comprising: identifying the match between the at least one of the 3D depth maps and a first stored image at least in part using at least one stored characteristic of the first stored image. 18. The method of claim 17, wherein the stored characteristic includes a shape of an object in the first stored image. 19. The method of claim 17, wherein the stored characteristic includes an edge of an object in the first stored image. 20. The method of claim 15, wherein the combining includes combining the at least one of the 3D depth maps and the first stored image by superimposition to render the modified depth map.
Each of plural devices includes a laser emitter and a camera for detecting reflections of laser light emitted by the device, so that plural of the devices can generate their own depth maps showing images within the field of view of their cameras. The resolution of each depth map may be improved by accessing a data store of prior images of objects and combining the prior images using super-resolution with current images of the depth maps.1. A device comprising: at least one computer medium that is not a transitory signal and that comprises instructions executable by at least one processor to: generate, using a first device, at least a first current image of at least a second device in a field of view of a camera; the first image being a first 3D depth map; access a data structure of stored images; responsive to identifying a match between the first image and a first stored image in the data structure, combine the first image and the first stored image to render a modified depth map; aggregate the modified depth map with a modified depth map generated using images taken by the second device to render an aggregated depth map for a reference location that is distanced from a location of the first device. 2. The device of claim 1, wherein the instructions are executable to: identify the match between the first image and a first stored image at least in part using at least one stored characteristic of the first stored image. 3. The device of claim 2, wherein the stored characteristic includes a shape of an object in the first stored image. 4. The device of claim 2, wherein the stored characteristic includes an edge of an object in the first stored image. 5. The device of claim 1, wherein the instructions are executable to: combine the first image and the first stored image by superimposition to render the modified depth map, the modified depth map having a higher resolution than the depth map established by the first image. 6. The device of claim 5, wherein superimposition of the first image and first stored image are undertaken using super-resolution. 7. The device of claim 1, wherein the instructions are executable to: remove a portion of at least one of the first image, first stored image to render a respective cropped image prior to combining the first image and the first stored image to render the modified depth map. 8. An assembly comprising: plural computerized devices; each computerized device comprising at least one laser emitter configured to output signals useful for generating at least one three dimensional (3D) depth map; a first one of the computerized devices being programmed with instructions to: generate at least a first current image of at least one object in a field of view of a camera associated with the first one of the computerized devices; access a data structure of stored images; responsive to identifying a match between the first image and a first stored image in the data structure, combine the first image and the first stored image to render a modified three dimensional (3D) depth map. 9. The assembly of claim 8, wherein the instructions are executable to: identify the match between the first image and a first stored image at least in part using at least one stored characteristic of the first stored image. 10. The assembly of claim 9, wherein the stored characteristic includes a shape of an object in the first stored image. 11. The assembly of claim 9, wherein the stored characteristic includes an edge of an object in the first stored image. 12. The assembly of claim 8, wherein the instructions are executable to: combine the first image and the first stored image by superimposition to render the modified depth map, the modified depth map having a higher resolution than the first image. 13. The assembly of claim 12, wherein superimposition of the first image and first stored image are undertaken using super-resolution. 14. The assembly of claim 8, wherein the instructions are executable to: remove a portion of at least one of the first image, first stored image to render a respective cropped image prior to combining the first image and the first stored image to render the modified depth map. 15. A method comprising: using images from a first motorized mobile object, generating a first three dimensional (3D) depth map of at least a second motorized mobile object in space; using images from the second motorized mobile object generating a first second dimensional (3D) depth map of at least the first motorized mobile object in space; generating an aggregate 3D depth map from the first and second 3D depth maps referenced to a location spaced from at least the first motorized mobile object; and improving a resolution of at least one of the 3D depth maps by accessing a data store of prior images of objects and combining at least one the prior images using super-resolution with the at least one of the 3D depth maps to render a modified 3D depth map. 16. The method of claim 15, comprising: identifying a match between the at least one of the 3D depth maps and a first stored image in the data store and responsive thereto, combining the at least one of the 3D depth maps and the first stored image to render the modified 3D depth map. 17. The method of claim 15, comprising: identifying the match between the at least one of the 3D depth maps and a first stored image at least in part using at least one stored characteristic of the first stored image. 18. The method of claim 17, wherein the stored characteristic includes a shape of an object in the first stored image. 19. The method of claim 17, wherein the stored characteristic includes an edge of an object in the first stored image. 20. The method of claim 15, wherein the combining includes combining the at least one of the 3D depth maps and the first stored image by superimposition to render the modified depth map.
2,400
7,893
7,893
14,933,937
2,424
A method, executed by a processor, is used to determine presence of a viewer at a media device. The method includes receiving viewer biometric data captured by a biometric capture device associated with the media device; determining a category of the viewer based on the captured viewer biometric data; comparing the captured viewer biometric data to a reference to determine a possible identity of the viewer, by: determining a presence probability for the viewer based on a match between the biometric data and the reference, and determining a confidence level for the probability; and when the probability and confidence level equal or exceed a threshold, determining the viewer is present at the media device.
1. A method for determining viewer presence at a media device, comprising: receiving, by a location engine executed by a processor of a measurement device from a first device, a first identification of a presence of a viewer at a first location of a building including the first device; receiving, by the location engine from a second device, a second identification of a presence of the viewer at a second location of the building including the second device, the second location different from and proximate to the first location; determining, by a presence engine executed by the processor, a first probability of the first identification and a second probability of the second identification, the first probability indicating a first likelihood that the viewer is present at the first location, the second probability indicating a second likelihood that the viewer is present at the second location; determining, by the presence engine, based on the first probability of the first identification exceeding the second probability of the second identification, that the viewer is viewing media on the first device at the first location and not the second device at the second location; automatically authenticating, by an authentication engine executed by the processor, without active entry of authentication credential input by the viewer on either the first device or the second device, the viewer to the first device at the first location and not the second device at the second location responsive to determining that the viewer is viewing media on the first device at the first location; and recording, by a measurement engine executed by the processor, a consumption metric for the viewer of media displayed on the first device responsive to automatically authenticating the viewer to the first device. 2. (canceled) 3. (canceled) 4. The method of claim 1, further comprising reducing the second probability of the second identification, responsive to the first probability of the first identification exceeding the second probability of the second identification. 5. The method of claim 1, further comprising reducing the second probability of the second identification, responsive to a negative historical association between the second location and the viewer. 6. The method of claim 1, wherein the second identification of a presence of the viewer at the second location further comprises an identification of a presence of a plurality of viewers including the viewer at the second location; and wherein determining that the viewer is viewing media on the first device rather than the second device further comprises reducing the second probability of the second identification, responsive to the first probability of the first identification exceeding the second probability of the second identification. 7. The method of claim 6, wherein the measurement device is not able to distinguish individuals of the plurality of viewers at the second location. 8. The method of claim 1, further comprising generating a three-dimensional matrix of viewers, locations, and media devices, by a use matrix engine executed by the processor, indicating the presence of the viewer and first device in the first location, responsive to the determination. 9. The method of claim 8, further comprising subsequently identifying that the first device is in a third location; and updating the matrix to indicate the presence of the viewer and first device in the third location, responsive to the identification. 10. The method of claim 8, wherein the matrix further indicates the probability of the first device being in the first location, and the probability of the second device being in the second location. 11. A system for determining viewer presence at a media device, comprising: a measurement device comprising a processor executing a location engine, a presence engine, an authentication engine, and a measurement engine; wherein the location engine is configured to: receive, from a first device, a first identification of a presence of a viewer at a first location of a building including the first device, and receive, from a second device, a second identification of a presence of the viewer at a second location of the building including the second device, the second location different from and proximate to the first location; wherein the presence engine is configured to: determine a first probability of the first identification and a second probability of the second identification, the first probability indicating a first likelihood that the viewer is present at the first location, the second probability indicating a second likelihood that the viewer is present at the second location; determine that the viewer is viewing media on the first device at the first location and not the second device at the second location, based on the first probability of the first identification exceeding second probability of the second identification; and wherein the authentication engine is configured to automatically authenticate, without active entry of authentication credential input by the viewer on either the first device or the second device, the viewer to the first device at the first location and not the second device at the second location responsive to determining that the viewer is viewing media on the first device at the first location; wherein the measurement engine is configured to record a consumption metric for the viewer of media displayed on the first device responsive to authenticating the viewer to the first device. 12. (canceled) 13. (canceled) 14. The system of claim 11, wherein the presence engine is further configured to reduce the second probability of the second identification, responsive to the first probability of the first identification exceeding the second probability of the second identification. 15. The system of claim 11, wherein the presence engine is further configured to reduce the second probability of the second identification, responsive to a negative historical association between the second location and the viewer. 16. The system of claim 11, wherein the second identification of a presence of the viewer at the second location further comprises an identification of a presence of a plurality of viewers including the viewer at the second location; and wherein the presence engine is further configured to reduce the second probability of the second identification, responsive to the first probability of the first identification exceeding the second probability of the second identification. 17. The system of claim 16, wherein the measurement device is not able to distinguish individuals of the plurality of viewers at the second location. 18. The system of claim 11, wherein the measurement device further comprises a use matrix engine configured to generate a three-dimensional matrix of viewers, locations, and media devices, indicating the presence of the viewer and first device in the first location, responsive to the determination. 19. The system of claim 18, wherein the matrix further indicates the probability of the first device being in the first location, and the probability of the second device being in the second location. 20. A non-transitory computer-readable storage medium storing instructions that, when executed by one or more data processors, cause the one or more data processors to perform operations comprising: receiving, from a first device, a first identification of a presence of a viewer at a first location of a building including the first device; receiving, from a second device, a second identification of a presence of the viewer at a second location of the building including the second device, the second location different from and proximate to the first location; determining a first probability of the first identification and a second probability of the second identification, the first probability indicating a first likelihood that the viewer is present at the first location, the second probability indicating a second likelihood that the viewer is present at the second location; determining, based on the first probability of the first identification exceeding the second probability of the second identification, that the viewer is viewing media on the first device at the first location and not the second device at the second location; automatically authenticating, without active entry of authentication credential input by the viewer on either the first device or the second device, the viewer to the first device at the first location and not the second device at the second location responsive to determining that the viewer is viewing media on the first device at the first location; and recording a consumption metric for the viewer of media displayed on the first device responsive to authenticating the viewer to the first device. 21. The method of claim 1, wherein authenticating the viewer to the first device at the first location further comprises automatically logging the viewer into a service provided on the first device at the first location based on determining that the viewer is viewing media on the first device at the first location. 22. The method of claim 1, wherein determining that the viewer is viewing media on the first device at the first location further comprises determining that the viewer is viewing media on the first device at the first location subsequent to viewing the media on the second device at the second location; and wherein authenticating the viewer to the first device further comprises switching authentication of the viewer from the second device at the second location to the first device at the first location, responsive to determining that the viewer is viewing media on the first device at the first location subsequent to viewing the media on the second device at the second location. 23. The system of claim 11, wherein the authentication engine is further configured to automatically login the viewer into a service provided on the first device at the first location based on determining that the viewer is viewing media on the first device at the first location. 24. The non-transitory computer-readable storage medium of claim 20, wherein the operations further comprise automatically logging the viewer into a service provided on the first device at the first location based on determining that the viewer is viewing media on the first device at the first location.
A method, executed by a processor, is used to determine presence of a viewer at a media device. The method includes receiving viewer biometric data captured by a biometric capture device associated with the media device; determining a category of the viewer based on the captured viewer biometric data; comparing the captured viewer biometric data to a reference to determine a possible identity of the viewer, by: determining a presence probability for the viewer based on a match between the biometric data and the reference, and determining a confidence level for the probability; and when the probability and confidence level equal or exceed a threshold, determining the viewer is present at the media device.1. A method for determining viewer presence at a media device, comprising: receiving, by a location engine executed by a processor of a measurement device from a first device, a first identification of a presence of a viewer at a first location of a building including the first device; receiving, by the location engine from a second device, a second identification of a presence of the viewer at a second location of the building including the second device, the second location different from and proximate to the first location; determining, by a presence engine executed by the processor, a first probability of the first identification and a second probability of the second identification, the first probability indicating a first likelihood that the viewer is present at the first location, the second probability indicating a second likelihood that the viewer is present at the second location; determining, by the presence engine, based on the first probability of the first identification exceeding the second probability of the second identification, that the viewer is viewing media on the first device at the first location and not the second device at the second location; automatically authenticating, by an authentication engine executed by the processor, without active entry of authentication credential input by the viewer on either the first device or the second device, the viewer to the first device at the first location and not the second device at the second location responsive to determining that the viewer is viewing media on the first device at the first location; and recording, by a measurement engine executed by the processor, a consumption metric for the viewer of media displayed on the first device responsive to automatically authenticating the viewer to the first device. 2. (canceled) 3. (canceled) 4. The method of claim 1, further comprising reducing the second probability of the second identification, responsive to the first probability of the first identification exceeding the second probability of the second identification. 5. The method of claim 1, further comprising reducing the second probability of the second identification, responsive to a negative historical association between the second location and the viewer. 6. The method of claim 1, wherein the second identification of a presence of the viewer at the second location further comprises an identification of a presence of a plurality of viewers including the viewer at the second location; and wherein determining that the viewer is viewing media on the first device rather than the second device further comprises reducing the second probability of the second identification, responsive to the first probability of the first identification exceeding the second probability of the second identification. 7. The method of claim 6, wherein the measurement device is not able to distinguish individuals of the plurality of viewers at the second location. 8. The method of claim 1, further comprising generating a three-dimensional matrix of viewers, locations, and media devices, by a use matrix engine executed by the processor, indicating the presence of the viewer and first device in the first location, responsive to the determination. 9. The method of claim 8, further comprising subsequently identifying that the first device is in a third location; and updating the matrix to indicate the presence of the viewer and first device in the third location, responsive to the identification. 10. The method of claim 8, wherein the matrix further indicates the probability of the first device being in the first location, and the probability of the second device being in the second location. 11. A system for determining viewer presence at a media device, comprising: a measurement device comprising a processor executing a location engine, a presence engine, an authentication engine, and a measurement engine; wherein the location engine is configured to: receive, from a first device, a first identification of a presence of a viewer at a first location of a building including the first device, and receive, from a second device, a second identification of a presence of the viewer at a second location of the building including the second device, the second location different from and proximate to the first location; wherein the presence engine is configured to: determine a first probability of the first identification and a second probability of the second identification, the first probability indicating a first likelihood that the viewer is present at the first location, the second probability indicating a second likelihood that the viewer is present at the second location; determine that the viewer is viewing media on the first device at the first location and not the second device at the second location, based on the first probability of the first identification exceeding second probability of the second identification; and wherein the authentication engine is configured to automatically authenticate, without active entry of authentication credential input by the viewer on either the first device or the second device, the viewer to the first device at the first location and not the second device at the second location responsive to determining that the viewer is viewing media on the first device at the first location; wherein the measurement engine is configured to record a consumption metric for the viewer of media displayed on the first device responsive to authenticating the viewer to the first device. 12. (canceled) 13. (canceled) 14. The system of claim 11, wherein the presence engine is further configured to reduce the second probability of the second identification, responsive to the first probability of the first identification exceeding the second probability of the second identification. 15. The system of claim 11, wherein the presence engine is further configured to reduce the second probability of the second identification, responsive to a negative historical association between the second location and the viewer. 16. The system of claim 11, wherein the second identification of a presence of the viewer at the second location further comprises an identification of a presence of a plurality of viewers including the viewer at the second location; and wherein the presence engine is further configured to reduce the second probability of the second identification, responsive to the first probability of the first identification exceeding the second probability of the second identification. 17. The system of claim 16, wherein the measurement device is not able to distinguish individuals of the plurality of viewers at the second location. 18. The system of claim 11, wherein the measurement device further comprises a use matrix engine configured to generate a three-dimensional matrix of viewers, locations, and media devices, indicating the presence of the viewer and first device in the first location, responsive to the determination. 19. The system of claim 18, wherein the matrix further indicates the probability of the first device being in the first location, and the probability of the second device being in the second location. 20. A non-transitory computer-readable storage medium storing instructions that, when executed by one or more data processors, cause the one or more data processors to perform operations comprising: receiving, from a first device, a first identification of a presence of a viewer at a first location of a building including the first device; receiving, from a second device, a second identification of a presence of the viewer at a second location of the building including the second device, the second location different from and proximate to the first location; determining a first probability of the first identification and a second probability of the second identification, the first probability indicating a first likelihood that the viewer is present at the first location, the second probability indicating a second likelihood that the viewer is present at the second location; determining, based on the first probability of the first identification exceeding the second probability of the second identification, that the viewer is viewing media on the first device at the first location and not the second device at the second location; automatically authenticating, without active entry of authentication credential input by the viewer on either the first device or the second device, the viewer to the first device at the first location and not the second device at the second location responsive to determining that the viewer is viewing media on the first device at the first location; and recording a consumption metric for the viewer of media displayed on the first device responsive to authenticating the viewer to the first device. 21. The method of claim 1, wherein authenticating the viewer to the first device at the first location further comprises automatically logging the viewer into a service provided on the first device at the first location based on determining that the viewer is viewing media on the first device at the first location. 22. The method of claim 1, wherein determining that the viewer is viewing media on the first device at the first location further comprises determining that the viewer is viewing media on the first device at the first location subsequent to viewing the media on the second device at the second location; and wherein authenticating the viewer to the first device further comprises switching authentication of the viewer from the second device at the second location to the first device at the first location, responsive to determining that the viewer is viewing media on the first device at the first location subsequent to viewing the media on the second device at the second location. 23. The system of claim 11, wherein the authentication engine is further configured to automatically login the viewer into a service provided on the first device at the first location based on determining that the viewer is viewing media on the first device at the first location. 24. The non-transitory computer-readable storage medium of claim 20, wherein the operations further comprise automatically logging the viewer into a service provided on the first device at the first location based on determining that the viewer is viewing media on the first device at the first location.
2,400
7,894
7,894
15,253,177
2,444
A system includes a processor configured to receive a 29-bit request transmitted over a vehicle controller area network (CAN) bus. The processor is also configured to identify a vehicle electronic control unit (ECU) as a target recipient based on a target identifier included with the request. The processor is further configured to identify a source which sent the request based on a source identifier included with the request. Also, the processor is configured to verify the identified source as permitted to send the request to the ECU and, responsive to the verification, route the request to an ECU application, executing on the ECU, identified by an application identifier included with the request.
1. A system comprising: a processor configured to: receive a 29-bit request transmitted over a vehicle controller area network (CAN) bus; identify a vehicle electronic control unit (ECU) as a target recipient based on a target identifier included with the request; identify a source which sent the request based on a source identifier included with the request; verify the identified source as permitted to send the request to the ECU; and responsive to the verification, route the request to an ECU application, executing on the ECU, identified by an application identifier included with the request. 2. The system of claim 1, wherein the target identifier is a 10-bit identifier. 3. The system of claim 1, wherein the target identifier identifies a software-abstracted address for the ECU. 4. The system of claim 1, wherein the source identifier is a 10-bit identifier. 5. The system of claim 1, wherein the application identifier is a 3-bit identifier. 6. The system of claim 1, wherein the processor is configured to: determine if the ECU is capable of handling 29-bit requests; and reject the request if the ECU is incapable of handling 29-bit requests. 7. The system of claim 1, wherein the processor is configured to: identify a request priority based on a priority designation included with the request; and prioritize the request for processing in accordance with the request priority. 8. The system of claim 7, wherein the priority designation is a 3-bit identifier. 9. The system of claim 1, wherein the request is agnostic with regards to a physical address of the ECU. 10. A computer-implemented method comprising: responsive to receipt of a 29-bit message, including a 10-bit target identifier identifying a target electronic control unit (ECU) and 10-bit source identifier identifying a message source, routing, the message to the identified target ECU via a synchronous data link control module, following verification by the ECU of both the identified source as being permitted to exchange messages with the ECU and 29-bit request handling capability. 11. The method of claim 10, wherein the 10-bit target identifier identifies an abstracted ECU address. 12. The method of claim 10, further comprising: extracting an application identifier from the message, via the ECU, identifying an ECU application designated to handle the message; and routing a message payload to the ECU application identifier by the application identifier. 13. The method of claim 10, wherein the application identifier is a 3-bit identifier. 14. A non-transitory computer-readable storage medium storing instructions that, when executed by a processor, cause the processor to perform a method comprising: identifying a vehicle electronic control unit (ECU) as a target recipient based on a target identifier included with a 29-bit request from a vehicle controller area network (CAN) bus; verifying a source identified in the 29-bit request as permitted to send the request to the ECU; and route the request to an ECU application, executing on the ECU, responsive to the verification, the application identified by an application identifier included with the request. 15. The storage medium of claim 14, wherein the target identifier is a 10-bit identifier. 16. The storage medium of claim 15, wherein the target identifier identifies a software-abstracted address for the ECU. 17. The storage medium of claim 14, wherein the verifying is performed by the ECU. 18. The storage medium of claim 14 wherein the application is identified by a 3-bit identifier. 19. The storage medium of claim 14, wherein the method further includes rejecting the request responsive to a determination by the ECU that the ECU is incapable of handling 29-bit requests. 20. The storage medium of claim 14, wherein the request is agnostic with regards to a physical address of the ECU.
A system includes a processor configured to receive a 29-bit request transmitted over a vehicle controller area network (CAN) bus. The processor is also configured to identify a vehicle electronic control unit (ECU) as a target recipient based on a target identifier included with the request. The processor is further configured to identify a source which sent the request based on a source identifier included with the request. Also, the processor is configured to verify the identified source as permitted to send the request to the ECU and, responsive to the verification, route the request to an ECU application, executing on the ECU, identified by an application identifier included with the request.1. A system comprising: a processor configured to: receive a 29-bit request transmitted over a vehicle controller area network (CAN) bus; identify a vehicle electronic control unit (ECU) as a target recipient based on a target identifier included with the request; identify a source which sent the request based on a source identifier included with the request; verify the identified source as permitted to send the request to the ECU; and responsive to the verification, route the request to an ECU application, executing on the ECU, identified by an application identifier included with the request. 2. The system of claim 1, wherein the target identifier is a 10-bit identifier. 3. The system of claim 1, wherein the target identifier identifies a software-abstracted address for the ECU. 4. The system of claim 1, wherein the source identifier is a 10-bit identifier. 5. The system of claim 1, wherein the application identifier is a 3-bit identifier. 6. The system of claim 1, wherein the processor is configured to: determine if the ECU is capable of handling 29-bit requests; and reject the request if the ECU is incapable of handling 29-bit requests. 7. The system of claim 1, wherein the processor is configured to: identify a request priority based on a priority designation included with the request; and prioritize the request for processing in accordance with the request priority. 8. The system of claim 7, wherein the priority designation is a 3-bit identifier. 9. The system of claim 1, wherein the request is agnostic with regards to a physical address of the ECU. 10. A computer-implemented method comprising: responsive to receipt of a 29-bit message, including a 10-bit target identifier identifying a target electronic control unit (ECU) and 10-bit source identifier identifying a message source, routing, the message to the identified target ECU via a synchronous data link control module, following verification by the ECU of both the identified source as being permitted to exchange messages with the ECU and 29-bit request handling capability. 11. The method of claim 10, wherein the 10-bit target identifier identifies an abstracted ECU address. 12. The method of claim 10, further comprising: extracting an application identifier from the message, via the ECU, identifying an ECU application designated to handle the message; and routing a message payload to the ECU application identifier by the application identifier. 13. The method of claim 10, wherein the application identifier is a 3-bit identifier. 14. A non-transitory computer-readable storage medium storing instructions that, when executed by a processor, cause the processor to perform a method comprising: identifying a vehicle electronic control unit (ECU) as a target recipient based on a target identifier included with a 29-bit request from a vehicle controller area network (CAN) bus; verifying a source identified in the 29-bit request as permitted to send the request to the ECU; and route the request to an ECU application, executing on the ECU, responsive to the verification, the application identified by an application identifier included with the request. 15. The storage medium of claim 14, wherein the target identifier is a 10-bit identifier. 16. The storage medium of claim 15, wherein the target identifier identifies a software-abstracted address for the ECU. 17. The storage medium of claim 14, wherein the verifying is performed by the ECU. 18. The storage medium of claim 14 wherein the application is identified by a 3-bit identifier. 19. The storage medium of claim 14, wherein the method further includes rejecting the request responsive to a determination by the ECU that the ECU is incapable of handling 29-bit requests. 20. The storage medium of claim 14, wherein the request is agnostic with regards to a physical address of the ECU.
2,400
7,895
7,895
14,660,461
2,457
The current document is directed to systems, and methods incorporated within the systems, that carry out probability-distribution-based analysis of log-file entries. A monitoring subsystem within a distributed computer system uses probability-distribution-based analysis of log-file entries to detect changes in the state of the distributed computer system. A log-file-analysis subsystem within a distributed computer system uses probability-distribution-based analysis of log-file entries to identify subsets of log-file entries that predict anomalies and impending problems in the distributed computer system. In many implementations, a numerical comparison of probability distributions of log-file-entry types is used to detect state changes in the distributed computer system.
1. A log-file analysis system comprising: one or more processors; one or more memories; and computer instructions, stored in one or more of the one or more memories that, when executed by one or more of the one or more processors, control the log-file analysis system to generate a first probability distribution of all or a subset of the event types in a first set of log-file entries, generate a second probability distribution of all or a subset of the event types in a second set of log files, generate a numeric divergence metric from the first and second probability distributions, and when the numeric divergence metric is greater than a threshold value, generate one of a displayed indication, alarm, event, or other physical-state transformation to indicate that the first and second sets of log-file entries exhibit more than a threshold level of difference. 2. The log-file analysis system of claim 1 wherein the log-file analysis system generates a probability distribution of all or a subset of the event types in a set of log-file entries by: determining and storing the count of log-file entries for each event type of for each event type within the subset of event types; determining the total number N of log-file entries in the set of log-file entries; and determining and storing, in memory, the probability for each event type or each event type within the set of event types as the count of log-file entries for the event type divided by N. 3. The log-file analysis system of claim 1 wherein numeric divergence metric is the Jensen-Shannon divergence metric. 4. A log-file analysis subsystem within a computer system having one or more processors, one or more memories, and computer instructions, stored in one or more of the one or more memories that, when executed by one or more of the one or more processors, control the log-file analysis system to monitor a state of the computer system by repeatedly: generating a probability distribution of all or a subset of the event types in one or more log files for a time interval to represent the state of a monitored computer system for the time interval, and storing the generated probability distribution in association with an indication of the time interval. 5. The log-file analysis system of claim 4 wherein the log-file analysis system generates a probability distribution of all or a subset of the event types in one or more log files for a time interval by: selecting a set of log-file entries represents events from the one or more log files; determining and storing the count of log-file entries for each event type or each event type within the subset of event types; determining the total number N of log-file entries in the selected set of log-file entries; and determining and storing, in memory, the probability for each event type or each event type within the subset of event types as the count of log-file entries for the event type divided by N. 6. The log-file analysis subsystem of claim 4 wherein monitoring the state of the computer system by the log-file analysis system further includes: after generating and storing each probability distribution following generation and storing of an initial set of probability distributions, computing a divergence metric from the two most recently generated and stored probability distributions; and when divergence metric is greater than a threshold value, raising an alarm to indicate, or displaying an indication of; a significant system-state change. 7. The log-file analysis subsystem of claim 4 wherein the divergence metric is the Jensen-Shannon divergence metric. 8. The log-file analysis subsystem of claim 4 monitoring the state of the computer system by the log-file analysis system further includes: using the stored probability distributions collected over a first time interval spanning multiple shorter, secondary time intervals to generate a typical probability distribution for each of a set of time intervals selected from the multiple shorter, secondary time intervals; and at subsequent secondary time intervals, generating a probability distribution for the event types of log entries selected from the most recently completed secondary time interval, computing a Jensen-Shannon divergence metric for the probability distribution generated from the most recently completed secondary time interval and the typical probability distribution for the most recently completed secondary time interval, and when Jensen-Shannon divergence metric is greater than a threshold value, raising an alarm to indicate, or displaying an indication of, a system-state change. 9. The log-file analysis subsystem of claim 4 wherein the divergence metric is the Jensen-Shannon divergence metric. 10. The log-file analysis subsystem of claim 4 wherein monitoring the state of the computer system by the log-file analysis system further includes: for each of a number of different subsets of the event types for which the log-file analysis subsystem has generated and stored probability distributions for different time intervals, computing a Jensen-Shannon divergence metric for the probability distributions for different pairs of time intervals, and computing a measure of the variance of the Jensen-Shannon divergence metrics computed for the probability distributions for different pairs of the time intervals; and selecting, as a basis for a monitoring fingerprint, a subset of the event types having the greatest computed variance. 11. The log-file analysis subsystem of claim 4 wherein the divergence metric is the Jensen-Shannon divergence metric. 12. A method that monitors a state of a distributed computer system that includes multiple, network interconnected discrete computer systems, each having one or more processors, one or more memories, and one or more data-storage devices, one or more of the discrete computer systems including computer instructions, stored in one or more of the one or more memories of the discrete computer system, that, when executed by one or more of the one or more processors, control the discrete computer system to carry out the method comprising: repeatedly generating a probability distribution of all or a subset of the event types in one or more log files for a time interval to represent the state of a monitored computer system for the time interval, and storing the generated probability distribution in association with an indication of the time interval in one or more of one or more memories and/or data-storage devices. 13. The method of claim 12 wherein generating a probability distribution of all or a subset of the event types in one or more log files for a time interval further includes: selecting a set of log-file entries represents events from the one or more log files; determining and storing the count of log-file entries for each event type or each event type within the subset of event types; determining the total number N of log-file entries in the selected set of log-file entries; and determining and storing, in memory, the probability for each event type or each event type within the subset of event types as the count of log-file entries for the event type divided by N. 14. The method of claim 12 further including: after generating and storing each probability distribution following generation and storing of an initial set of probability distributions, computing a divergence metric from the two most recently generated and stored probability distributions; and when divergence metric is greater than a threshold value, raising an alarm to indicate, or displaying an indication of, a system-state change. 15. The method of claim 14 wherein the divergence metric is the Jensen-Shannon divergence metric. 16. The method of claim 12 further including: using the stored probability distributions collected over a first time interval spanning multiple shorter, secondary time intervals to generate a typical probability distribution for each of a set of time intervals selected from the multiple shorter, secondary time intervals; and at subsequent secondary time intervals, generating a probability distribution for the event types of log entries selected from the most recently completed secondary time interval, computing a Jensen-Shannon divergence metric for the probability distribution generated from the most recently completed secondary time interval and the typical probability distribution for the most recently completed secondary time interval, and when Jensen-Shannon divergence metric is greater than a threshold value, raising an alarm to indicate, or displaying an indication of, a system-state change. 17. The method of claim 16 wherein the divergence metric is the Jensen-Shannon divergence metric. 18. The method of claim 12 further including: for each of a number of different subsets of the event types for which the log-file analysis subsystem has generated and stored probability distributions for different time intervals, computing a Jensen-Shannon divergence metric for the probability distributions for different pairs of time intervals, and computing a measure of the variance of the Jensen-Shannon divergence metrics computed for the probability distributions for different pairs of the time intervals; and selecting, as a basis for a monitoring fingerprint, a subset of the event types having the greatest computed variance. 19. The method of claim 18 wherein the divergence metric is the Jensen-Shannon divergence metric. 20. A computer-readable device that stores a set of computer instructions that, when executed on one or more processors of a computer system that additionally includes one or more memories, controls the computer system to: generate a first probability distribution of all or a subset of the event types in a first set of log-file entries, generate a second probability distribution of all or a subset of the event types in a second set of log files, generate a numeric divergence metric from the first and second probability distributions, and when the numeric divergence metric is greater than a threshold value, generate one of a displayed indication, alarm, event, or other physical-state transformation to indicate that the first and second sets of log-file entries exhibit more than a threshold level of difference.
The current document is directed to systems, and methods incorporated within the systems, that carry out probability-distribution-based analysis of log-file entries. A monitoring subsystem within a distributed computer system uses probability-distribution-based analysis of log-file entries to detect changes in the state of the distributed computer system. A log-file-analysis subsystem within a distributed computer system uses probability-distribution-based analysis of log-file entries to identify subsets of log-file entries that predict anomalies and impending problems in the distributed computer system. In many implementations, a numerical comparison of probability distributions of log-file-entry types is used to detect state changes in the distributed computer system.1. A log-file analysis system comprising: one or more processors; one or more memories; and computer instructions, stored in one or more of the one or more memories that, when executed by one or more of the one or more processors, control the log-file analysis system to generate a first probability distribution of all or a subset of the event types in a first set of log-file entries, generate a second probability distribution of all or a subset of the event types in a second set of log files, generate a numeric divergence metric from the first and second probability distributions, and when the numeric divergence metric is greater than a threshold value, generate one of a displayed indication, alarm, event, or other physical-state transformation to indicate that the first and second sets of log-file entries exhibit more than a threshold level of difference. 2. The log-file analysis system of claim 1 wherein the log-file analysis system generates a probability distribution of all or a subset of the event types in a set of log-file entries by: determining and storing the count of log-file entries for each event type of for each event type within the subset of event types; determining the total number N of log-file entries in the set of log-file entries; and determining and storing, in memory, the probability for each event type or each event type within the set of event types as the count of log-file entries for the event type divided by N. 3. The log-file analysis system of claim 1 wherein numeric divergence metric is the Jensen-Shannon divergence metric. 4. A log-file analysis subsystem within a computer system having one or more processors, one or more memories, and computer instructions, stored in one or more of the one or more memories that, when executed by one or more of the one or more processors, control the log-file analysis system to monitor a state of the computer system by repeatedly: generating a probability distribution of all or a subset of the event types in one or more log files for a time interval to represent the state of a monitored computer system for the time interval, and storing the generated probability distribution in association with an indication of the time interval. 5. The log-file analysis system of claim 4 wherein the log-file analysis system generates a probability distribution of all or a subset of the event types in one or more log files for a time interval by: selecting a set of log-file entries represents events from the one or more log files; determining and storing the count of log-file entries for each event type or each event type within the subset of event types; determining the total number N of log-file entries in the selected set of log-file entries; and determining and storing, in memory, the probability for each event type or each event type within the subset of event types as the count of log-file entries for the event type divided by N. 6. The log-file analysis subsystem of claim 4 wherein monitoring the state of the computer system by the log-file analysis system further includes: after generating and storing each probability distribution following generation and storing of an initial set of probability distributions, computing a divergence metric from the two most recently generated and stored probability distributions; and when divergence metric is greater than a threshold value, raising an alarm to indicate, or displaying an indication of; a significant system-state change. 7. The log-file analysis subsystem of claim 4 wherein the divergence metric is the Jensen-Shannon divergence metric. 8. The log-file analysis subsystem of claim 4 monitoring the state of the computer system by the log-file analysis system further includes: using the stored probability distributions collected over a first time interval spanning multiple shorter, secondary time intervals to generate a typical probability distribution for each of a set of time intervals selected from the multiple shorter, secondary time intervals; and at subsequent secondary time intervals, generating a probability distribution for the event types of log entries selected from the most recently completed secondary time interval, computing a Jensen-Shannon divergence metric for the probability distribution generated from the most recently completed secondary time interval and the typical probability distribution for the most recently completed secondary time interval, and when Jensen-Shannon divergence metric is greater than a threshold value, raising an alarm to indicate, or displaying an indication of, a system-state change. 9. The log-file analysis subsystem of claim 4 wherein the divergence metric is the Jensen-Shannon divergence metric. 10. The log-file analysis subsystem of claim 4 wherein monitoring the state of the computer system by the log-file analysis system further includes: for each of a number of different subsets of the event types for which the log-file analysis subsystem has generated and stored probability distributions for different time intervals, computing a Jensen-Shannon divergence metric for the probability distributions for different pairs of time intervals, and computing a measure of the variance of the Jensen-Shannon divergence metrics computed for the probability distributions for different pairs of the time intervals; and selecting, as a basis for a monitoring fingerprint, a subset of the event types having the greatest computed variance. 11. The log-file analysis subsystem of claim 4 wherein the divergence metric is the Jensen-Shannon divergence metric. 12. A method that monitors a state of a distributed computer system that includes multiple, network interconnected discrete computer systems, each having one or more processors, one or more memories, and one or more data-storage devices, one or more of the discrete computer systems including computer instructions, stored in one or more of the one or more memories of the discrete computer system, that, when executed by one or more of the one or more processors, control the discrete computer system to carry out the method comprising: repeatedly generating a probability distribution of all or a subset of the event types in one or more log files for a time interval to represent the state of a monitored computer system for the time interval, and storing the generated probability distribution in association with an indication of the time interval in one or more of one or more memories and/or data-storage devices. 13. The method of claim 12 wherein generating a probability distribution of all or a subset of the event types in one or more log files for a time interval further includes: selecting a set of log-file entries represents events from the one or more log files; determining and storing the count of log-file entries for each event type or each event type within the subset of event types; determining the total number N of log-file entries in the selected set of log-file entries; and determining and storing, in memory, the probability for each event type or each event type within the subset of event types as the count of log-file entries for the event type divided by N. 14. The method of claim 12 further including: after generating and storing each probability distribution following generation and storing of an initial set of probability distributions, computing a divergence metric from the two most recently generated and stored probability distributions; and when divergence metric is greater than a threshold value, raising an alarm to indicate, or displaying an indication of, a system-state change. 15. The method of claim 14 wherein the divergence metric is the Jensen-Shannon divergence metric. 16. The method of claim 12 further including: using the stored probability distributions collected over a first time interval spanning multiple shorter, secondary time intervals to generate a typical probability distribution for each of a set of time intervals selected from the multiple shorter, secondary time intervals; and at subsequent secondary time intervals, generating a probability distribution for the event types of log entries selected from the most recently completed secondary time interval, computing a Jensen-Shannon divergence metric for the probability distribution generated from the most recently completed secondary time interval and the typical probability distribution for the most recently completed secondary time interval, and when Jensen-Shannon divergence metric is greater than a threshold value, raising an alarm to indicate, or displaying an indication of, a system-state change. 17. The method of claim 16 wherein the divergence metric is the Jensen-Shannon divergence metric. 18. The method of claim 12 further including: for each of a number of different subsets of the event types for which the log-file analysis subsystem has generated and stored probability distributions for different time intervals, computing a Jensen-Shannon divergence metric for the probability distributions for different pairs of time intervals, and computing a measure of the variance of the Jensen-Shannon divergence metrics computed for the probability distributions for different pairs of the time intervals; and selecting, as a basis for a monitoring fingerprint, a subset of the event types having the greatest computed variance. 19. The method of claim 18 wherein the divergence metric is the Jensen-Shannon divergence metric. 20. A computer-readable device that stores a set of computer instructions that, when executed on one or more processors of a computer system that additionally includes one or more memories, controls the computer system to: generate a first probability distribution of all or a subset of the event types in a first set of log-file entries, generate a second probability distribution of all or a subset of the event types in a second set of log files, generate a numeric divergence metric from the first and second probability distributions, and when the numeric divergence metric is greater than a threshold value, generate one of a displayed indication, alarm, event, or other physical-state transformation to indicate that the first and second sets of log-file entries exhibit more than a threshold level of difference.
2,400
7,896
7,896
12,907,284
2,485
A region within a field of view of a video stream associated with an Internet Protocol (IP) camera can be identified. The region can be associated with one or more logical boundaries which can correspond to one or more physical boundaries within a customer service area of a place of business. The customer service area can be a domain in which a customer interacts with a business product and/or a business service. A customer crossing a logical boundary of the customer service area can be detected in real-time. The detecting can be performed by a directional tripwire analytics which can comprise of an object tracking algorithm, a face detection functionality, and/or a shape detection procedure. The traffic flow associated with the region can be programmatically determined which can include flow density, flow rate, and flow speed.
1. A method for monitoring traffic flow within a customer service area comprising: identifying a region within a field of view of a video stream associated with a camera, wherein the region is associated with a plurality of logical boundaries, wherein the logical boundaries corresponds to a plurality of physical boundaries within a customer service area of a place of business, wherein the customer service area is a domain in which a customer interacts with at least one of a business product and a business service; detecting in real-time or near real-time within the video stream a customer crossing at least one of the plurality of logical boundaries of the customer service area; and programmatically determining the traffic flow associated with the region, wherein the traffic flow is at least one of a flow density, flow rate, and flow speed. 2. The method of claim 1, wherein the detecting is performed by a directional tripwire analytics, wherein the directional tripwire analytics is at least one of an object tracking algorithm, a face detection functionality, and a shape detection procedure. 3. The method of claim 1, wherein the customer service area is defined by at least one boundary associated with a physical artifact, wherein the physical artifact is at least one of a handrail, an adhesive tape, flagging tape, a pressure sensitive tape, and a painted demarcation. 4. The method of claim 1, further comprising: generating an alert based on the determining and when the alert matches a trigger within the video analytics system, creating an event for the alert, wherein the event comprises of at least one of a timestamp, a location, and a status; and composing a notification associated with the event and conveying the notification to a relevant entity associated with the retail store, wherein the entity is at least one of a notification component and a notification device. 5. The method of claim 4, wherein the notification is conveyed in a format conforming to at least one of an email, text message, voice message, Instant Message (IM), pager alert, and facsimile. 6. The method of claim 4, wherein the notification is conveyed to an entity proximate to the location associated with the event, and wherein the notification is conveyed to a centralized back-office computing device. 7. The method of claim 4, wherein the notification is conveyed to a fixed notification device, wherein the fixed notification device is at least one of a loudspeaker and a lighting fixture. 8. The method of claim 2, wherein determining is performed via directional tripwire analytics associated with an IBM SMART SURVEILLANCE SYSTEM. 9. The method of claim 1, wherein the detecting is assisted by input from sensors within the place of business. 10. A system for monitoring traffic flow within a customer service area comprising: a region within a customer service area of a place of business defined within a field of view of a camera, wherein the region comprises of at least one physical boundary, wherein the at least one physical boundary corresponds to at least one logical boundary, wherein the logical boundary is a virtual tripwire associated with a directional tripwire analytic; an analytics engine able to determine a entity triggering the directional tripwire analytic, wherein the triggering is responsive to identifying an entity intersecting the virtual tripwire within a video stream associated with the IP camera; a notification engine configured to generate a notification of an event occurrence within the region, wherein the event occurrence is a traffic flow condition associated with the region; and a trigger associated with the directional tripwire analytic comprising of at least one of a criteria and an action, wherein the criteria is associated with a traffic flow property of the region, wherein the property is at least one of a flow rate, flow density, and flow speed. 11. The system of claim 10, further comprising: a video management system able to store the video stream associated with the IP camera; and a video library configured to store metadata associated with the video stream, wherein the metadata comprises of at least a video analytics information and a user specified information. 12. The system of claim 10, further comprising: a presence server configured to convey location information of an entity proximate to a region to the notification engine, wherein the entity is at least one of an worker and a notification device. 13. The system of claim 10 wherein the notification is presented within an application interface of a notification device, wherein the notification device is at least one of a back-office computing device, portable computing device, and a desktop computer. 14. The system of claim 10, wherein the notification comprises of at least one of a timestamp, a text description, a location, and a video stream. 15. The system of claim 10, wherein the claimed system is associated with an IBM MIDDLEWARE FOR LARGE SCALE SURVEILLANCE (MILS) software. 16. An apparatus including an interface for monitoring traffic flow within a customer service area comprising: a tangible memory storing at least one computer program product; a processor operable to execute the computer program product to cause the interface window to be displayed by the display hardware; and the computer program product when executed by the processor being operable to identify a region within a field of view of a video stream associated with an Internet Protocol (IP) camera, wherein the region is associated with a plurality of logical boundaries, wherein the logical boundaries corresponds to a plurality of physical boundaries within a customer service area of a place of business, wherein the customer service area is a domain in which a customer interacts with at least one of a business product and a business service; the computer program product when executed by the processor being operable to detect in real-time within the video stream a customer crossing at least one of the plurality of logical boundaries of the customer service area, wherein the detecting is performed by a directional tripwire analytics, wherein the directional tripwire analytics is at least one of an object tracking algorithm, a face detection functionality, and a shape detection procedure; and the computer program product when executed by the processor being operable to programmatically determine the traffic flow associated with the region, wherein the traffic flow is at least one of a flow density, flow rate, and flow speed. 17. The apparatus of claim 16, further comprising: when the traffic flow matches a trigger criteria, generating an event occurrence and performing a notification action. 18. The apparatus of claim 16, further comprising: display hardware within with an interface window of a graphical user interface is displayed to a user; wherein the computer program product presents a notification within the graphical user interface, wherein the notification presents traffic flow statistics associated the region within the customer service area. 19. The apparatus of claim 16, wherein the interface is associated with a computing application, wherein the computing application is a component of a Service Oriented Architecture. 20. The apparatus of claim 16, wherein the interface permits searching event occurrences by a plurality of search parameters, wherein the search parameter is at least one of a time, location, event type, and user-specified metadata.
A region within a field of view of a video stream associated with an Internet Protocol (IP) camera can be identified. The region can be associated with one or more logical boundaries which can correspond to one or more physical boundaries within a customer service area of a place of business. The customer service area can be a domain in which a customer interacts with a business product and/or a business service. A customer crossing a logical boundary of the customer service area can be detected in real-time. The detecting can be performed by a directional tripwire analytics which can comprise of an object tracking algorithm, a face detection functionality, and/or a shape detection procedure. The traffic flow associated with the region can be programmatically determined which can include flow density, flow rate, and flow speed.1. A method for monitoring traffic flow within a customer service area comprising: identifying a region within a field of view of a video stream associated with a camera, wherein the region is associated with a plurality of logical boundaries, wherein the logical boundaries corresponds to a plurality of physical boundaries within a customer service area of a place of business, wherein the customer service area is a domain in which a customer interacts with at least one of a business product and a business service; detecting in real-time or near real-time within the video stream a customer crossing at least one of the plurality of logical boundaries of the customer service area; and programmatically determining the traffic flow associated with the region, wherein the traffic flow is at least one of a flow density, flow rate, and flow speed. 2. The method of claim 1, wherein the detecting is performed by a directional tripwire analytics, wherein the directional tripwire analytics is at least one of an object tracking algorithm, a face detection functionality, and a shape detection procedure. 3. The method of claim 1, wherein the customer service area is defined by at least one boundary associated with a physical artifact, wherein the physical artifact is at least one of a handrail, an adhesive tape, flagging tape, a pressure sensitive tape, and a painted demarcation. 4. The method of claim 1, further comprising: generating an alert based on the determining and when the alert matches a trigger within the video analytics system, creating an event for the alert, wherein the event comprises of at least one of a timestamp, a location, and a status; and composing a notification associated with the event and conveying the notification to a relevant entity associated with the retail store, wherein the entity is at least one of a notification component and a notification device. 5. The method of claim 4, wherein the notification is conveyed in a format conforming to at least one of an email, text message, voice message, Instant Message (IM), pager alert, and facsimile. 6. The method of claim 4, wherein the notification is conveyed to an entity proximate to the location associated with the event, and wherein the notification is conveyed to a centralized back-office computing device. 7. The method of claim 4, wherein the notification is conveyed to a fixed notification device, wherein the fixed notification device is at least one of a loudspeaker and a lighting fixture. 8. The method of claim 2, wherein determining is performed via directional tripwire analytics associated with an IBM SMART SURVEILLANCE SYSTEM. 9. The method of claim 1, wherein the detecting is assisted by input from sensors within the place of business. 10. A system for monitoring traffic flow within a customer service area comprising: a region within a customer service area of a place of business defined within a field of view of a camera, wherein the region comprises of at least one physical boundary, wherein the at least one physical boundary corresponds to at least one logical boundary, wherein the logical boundary is a virtual tripwire associated with a directional tripwire analytic; an analytics engine able to determine a entity triggering the directional tripwire analytic, wherein the triggering is responsive to identifying an entity intersecting the virtual tripwire within a video stream associated with the IP camera; a notification engine configured to generate a notification of an event occurrence within the region, wherein the event occurrence is a traffic flow condition associated with the region; and a trigger associated with the directional tripwire analytic comprising of at least one of a criteria and an action, wherein the criteria is associated with a traffic flow property of the region, wherein the property is at least one of a flow rate, flow density, and flow speed. 11. The system of claim 10, further comprising: a video management system able to store the video stream associated with the IP camera; and a video library configured to store metadata associated with the video stream, wherein the metadata comprises of at least a video analytics information and a user specified information. 12. The system of claim 10, further comprising: a presence server configured to convey location information of an entity proximate to a region to the notification engine, wherein the entity is at least one of an worker and a notification device. 13. The system of claim 10 wherein the notification is presented within an application interface of a notification device, wherein the notification device is at least one of a back-office computing device, portable computing device, and a desktop computer. 14. The system of claim 10, wherein the notification comprises of at least one of a timestamp, a text description, a location, and a video stream. 15. The system of claim 10, wherein the claimed system is associated with an IBM MIDDLEWARE FOR LARGE SCALE SURVEILLANCE (MILS) software. 16. An apparatus including an interface for monitoring traffic flow within a customer service area comprising: a tangible memory storing at least one computer program product; a processor operable to execute the computer program product to cause the interface window to be displayed by the display hardware; and the computer program product when executed by the processor being operable to identify a region within a field of view of a video stream associated with an Internet Protocol (IP) camera, wherein the region is associated with a plurality of logical boundaries, wherein the logical boundaries corresponds to a plurality of physical boundaries within a customer service area of a place of business, wherein the customer service area is a domain in which a customer interacts with at least one of a business product and a business service; the computer program product when executed by the processor being operable to detect in real-time within the video stream a customer crossing at least one of the plurality of logical boundaries of the customer service area, wherein the detecting is performed by a directional tripwire analytics, wherein the directional tripwire analytics is at least one of an object tracking algorithm, a face detection functionality, and a shape detection procedure; and the computer program product when executed by the processor being operable to programmatically determine the traffic flow associated with the region, wherein the traffic flow is at least one of a flow density, flow rate, and flow speed. 17. The apparatus of claim 16, further comprising: when the traffic flow matches a trigger criteria, generating an event occurrence and performing a notification action. 18. The apparatus of claim 16, further comprising: display hardware within with an interface window of a graphical user interface is displayed to a user; wherein the computer program product presents a notification within the graphical user interface, wherein the notification presents traffic flow statistics associated the region within the customer service area. 19. The apparatus of claim 16, wherein the interface is associated with a computing application, wherein the computing application is a component of a Service Oriented Architecture. 20. The apparatus of claim 16, wherein the interface permits searching event occurrences by a plurality of search parameters, wherein the search parameter is at least one of a time, location, event type, and user-specified metadata.
2,400
7,897
7,897
15,533,059
2,426
A method for programming an electronic program guide (EPG) grid guide is disclosed herein. The method includes determining EPG metadata from a database, sorting metadata based on a time and a metadata field, determining the metadata field to be displayed, and rendering the EPG grid guide based on the time and the metadata field. A method for programming a set top box (STB) is also disclosed herein. The method includes providing a time of day, receiving a user's viewing preferences, adjusting information based on the user's viewing preferences in at least one application, wherein the user's viewing preferences are a function of the time of day, and transmitting the adjusted information to a display device.
1.-7. (canceled) 8. A method (FIG. 6) for programming a set top box (STB), the method comprising: providing a time of day; receiving a user's viewing preferences; adjusting information based on the user's viewing preferences in at least one application, wherein the user's viewing preferences are a function of the time of day; and transmitting the adjusted information to a display device. 9. The method of claim 8, wherein the adjusted information is minimized at a specific time of day. 10. The method of claim 8, wherein the adjusted information is maximized at a specific time of day. 11. The method of claim 8, wherein the adjusted information is selected from the group consisting of: title, actor, genre, guests, and episode number. 12. The method of claim 8, wherein the at least one application is selected from the group consisting of: Netflix and Hulu. 13. A set top box (STB) (FIG. 2) comprising: a clock configured to provide a time of day; a receiver configured to receive a user's viewing preferences; a processor configured to adjust information based on the user's viewing preferences in at least one application, wherein the user's viewing preferences are a function of the time of day; and a transmitter configured to transmit the adjusted information to a display device. 14. The STB of claim 13, wherein the adjusted information is minimized at a specific time of day. 15. The STB claim 13, wherein the adjusted information is maximized at a specific time of day. 16.-17. (canceled)
A method for programming an electronic program guide (EPG) grid guide is disclosed herein. The method includes determining EPG metadata from a database, sorting metadata based on a time and a metadata field, determining the metadata field to be displayed, and rendering the EPG grid guide based on the time and the metadata field. A method for programming a set top box (STB) is also disclosed herein. The method includes providing a time of day, receiving a user's viewing preferences, adjusting information based on the user's viewing preferences in at least one application, wherein the user's viewing preferences are a function of the time of day, and transmitting the adjusted information to a display device.1.-7. (canceled) 8. A method (FIG. 6) for programming a set top box (STB), the method comprising: providing a time of day; receiving a user's viewing preferences; adjusting information based on the user's viewing preferences in at least one application, wherein the user's viewing preferences are a function of the time of day; and transmitting the adjusted information to a display device. 9. The method of claim 8, wherein the adjusted information is minimized at a specific time of day. 10. The method of claim 8, wherein the adjusted information is maximized at a specific time of day. 11. The method of claim 8, wherein the adjusted information is selected from the group consisting of: title, actor, genre, guests, and episode number. 12. The method of claim 8, wherein the at least one application is selected from the group consisting of: Netflix and Hulu. 13. A set top box (STB) (FIG. 2) comprising: a clock configured to provide a time of day; a receiver configured to receive a user's viewing preferences; a processor configured to adjust information based on the user's viewing preferences in at least one application, wherein the user's viewing preferences are a function of the time of day; and a transmitter configured to transmit the adjusted information to a display device. 14. The STB of claim 13, wherein the adjusted information is minimized at a specific time of day. 15. The STB claim 13, wherein the adjusted information is maximized at a specific time of day. 16.-17. (canceled)
2,400
7,898
7,898
14,515,829
2,414
Systems, methods, apparatuses, and computer program products for an optimized procedure, signaling, and configuration for the reporting of a mobility state estimate (MSE) and/or mobility history information are provided. One method may include reporting, by a user device, mobility information to an associated network, and indicating one or more time periods during which the user device has been out of service coverage of the network.
1. An apparatus, comprising: at least one processor; and at least one memory including computer program code, wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus at least to report mobility information to an associated network; and indicate one or more time periods during which the apparatus has been out of service coverage of the network. 2. The apparatus according to claim 1, wherein the mobility information comprises a mobility state estimate (MSE). 3. The apparatus according to claim 1, wherein the mobility information comprises mobility history information. 4. The apparatus according to claim 1, wherein the at least one memory and the computer program code are further configured, with the at least one processor, to cause the apparatus at least to indicate the one or more time periods by adding an identifier to the mobility information to indicate a time spent by the apparatus out of the service coverage of the network. 5. The apparatus according to claim 1, wherein the at least one memory and the computer program code are further configured, with the at least one processor, to cause the apparatus at least to indicate a total accumulated out of service time for the apparatus. 6. The apparatus according to claim 3, wherein the history information further comprises a set of cell identifiers and out of service indications associated with the time spent in a cell or out of coverage. 7. The apparatus according to claim 1, wherein the apparatus comprises a user equipment. 8. A computer program, embodied on a non-transitory computer readable medium, the computer program configured to control a processor to perform a process, comprising: reporting, by a user device, mobility information to an associated network; and indicating one or more time periods during which the user device has been out of service coverage of the network. 9. An apparatus, comprising: at least one processor; and at least one memory including computer program code, wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus at least to receive mobility information from a user device associated with a network; wherein the mobility information further comprises an indication of one or more time periods during which the user device has been out of the service coverage of the network. 10. The apparatus according to claim 9, wherein the mobility information comprises a mobility state estimate (MSE). 11. The apparatus according to claim 9, wherein the mobility information comprises mobility history information. 12. The apparatus according to claim 9, wherein the at least one memory and the computer program code are further configured, with the at least one processor, to cause the apparatus at least to receive an identifier within the mobility information to indicate a time spent by the user device out of the service coverage of the network. 13. The apparatus according to claim 9, wherein the at least one memory and the computer program code are further configured, with the at least one processor, to cause the apparatus at least to receive a total accumulated out of service time for the user device. 14. The apparatus according to claim 11, wherein the history information further comprises a set of cell identifiers and out of service indications associated with the time spent in a cell or out of coverage. 15. The apparatus according to claim 9, wherein the apparatus comprises an evolved node B (eNB). 16. A computer program, embodied on a non-transitory computer readable medium, the computer program configured to control a processor to perform a process, comprising: receiving mobility information from a user device associated with a network; wherein the receiving of the mobility information further comprises receiving an indication of one or more time periods during which the user device has been out of the service coverage of the network.
Systems, methods, apparatuses, and computer program products for an optimized procedure, signaling, and configuration for the reporting of a mobility state estimate (MSE) and/or mobility history information are provided. One method may include reporting, by a user device, mobility information to an associated network, and indicating one or more time periods during which the user device has been out of service coverage of the network.1. An apparatus, comprising: at least one processor; and at least one memory including computer program code, wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus at least to report mobility information to an associated network; and indicate one or more time periods during which the apparatus has been out of service coverage of the network. 2. The apparatus according to claim 1, wherein the mobility information comprises a mobility state estimate (MSE). 3. The apparatus according to claim 1, wherein the mobility information comprises mobility history information. 4. The apparatus according to claim 1, wherein the at least one memory and the computer program code are further configured, with the at least one processor, to cause the apparatus at least to indicate the one or more time periods by adding an identifier to the mobility information to indicate a time spent by the apparatus out of the service coverage of the network. 5. The apparatus according to claim 1, wherein the at least one memory and the computer program code are further configured, with the at least one processor, to cause the apparatus at least to indicate a total accumulated out of service time for the apparatus. 6. The apparatus according to claim 3, wherein the history information further comprises a set of cell identifiers and out of service indications associated with the time spent in a cell or out of coverage. 7. The apparatus according to claim 1, wherein the apparatus comprises a user equipment. 8. A computer program, embodied on a non-transitory computer readable medium, the computer program configured to control a processor to perform a process, comprising: reporting, by a user device, mobility information to an associated network; and indicating one or more time periods during which the user device has been out of service coverage of the network. 9. An apparatus, comprising: at least one processor; and at least one memory including computer program code, wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus at least to receive mobility information from a user device associated with a network; wherein the mobility information further comprises an indication of one or more time periods during which the user device has been out of the service coverage of the network. 10. The apparatus according to claim 9, wherein the mobility information comprises a mobility state estimate (MSE). 11. The apparatus according to claim 9, wherein the mobility information comprises mobility history information. 12. The apparatus according to claim 9, wherein the at least one memory and the computer program code are further configured, with the at least one processor, to cause the apparatus at least to receive an identifier within the mobility information to indicate a time spent by the user device out of the service coverage of the network. 13. The apparatus according to claim 9, wherein the at least one memory and the computer program code are further configured, with the at least one processor, to cause the apparatus at least to receive a total accumulated out of service time for the user device. 14. The apparatus according to claim 11, wherein the history information further comprises a set of cell identifiers and out of service indications associated with the time spent in a cell or out of coverage. 15. The apparatus according to claim 9, wherein the apparatus comprises an evolved node B (eNB). 16. A computer program, embodied on a non-transitory computer readable medium, the computer program configured to control a processor to perform a process, comprising: receiving mobility information from a user device associated with a network; wherein the receiving of the mobility information further comprises receiving an indication of one or more time periods during which the user device has been out of the service coverage of the network.
2,400
7,899
7,899
15,367,226
2,426
A communication system for vehicles includes a camera disposed at a first vehicle and having a field of view exterior of the first vehicle. The camera captures image data. A first communication device disposed at the first vehicle wirelessly transmits image data captured by the camera. A second communication device disposed at a second vehicle receives the transmitted captured image data from the first communication device. At least one of (i) an image processor disposed at the second vehicle processes the received transmitted captured image data for a driver assistance system of the second vehicle and (ii) a display of the second vehicle displays images derived from the received transmitted captured image data for viewing by a driver of the second vehicle.
1. A communication system for vehicles, said communication system comprising: a camera disposed at a first vehicle and having a field of view exterior of the first vehicle, said camera capturing image data; a first communication device disposed at the first vehicle, said first communication device wirelessly transmitting image data captured by said camera; a second communication device disposed at a second vehicle, said second communication device receiving the transmitted captured image data from said first communication device; and wherein at least one of (i) an image processor disposed at the second vehicle processes the received transmitted captured image data for a driver assistance system of the second vehicle and (ii) a display disposed at the second vehicle displays images derived from the received transmitted captured image data for viewing by a driver of the second vehicle. 2. The communication system of claim 1, wherein said first and second communication devices comprise first and second dedicated short range communication devices. 3. The communication system of claim 2, wherein each of said first and second dedicated short range communication devices have a first channel dedicated for safety related communications and a second channel dedicated for communication of the captured image data. 4. The communication system of claim 1, wherein the first vehicle comprises a trailer and the second vehicle comprises a towing vehicle that is towing the trailer. 5. The communication system of claim 4, wherein the trailer includes a plurality of cameras, and wherein at least one of said cameras has a field of view interior of the trailer. 6. The communication system of claim 4, wherein an image processor of the towing vehicle processes the received transmitted captured image data to detect objects exterior of the trailer. 7. The communication system of claim 4, wherein a display of the towing vehicle displays images derived from the received transmitted captured image data for viewing by a driver of the towing vehicle while the driver is driving the towing vehicle and towing the trailer. 8. The communication system of claim 1, wherein the first vehicle comprises a lead vehicle of a platoon of vehicles and wherein the second vehicle comprises at least one following vehicle of the platoon of vehicles that is following the lead vehicle. 9. The communication system of claim 8, wherein said camera comprises a forward viewing camera of the lead vehicle. 10. The communication system of claim 9, wherein an image processor of the following vehicle processes the received transmitted captured image data for a driver assistance system of the following vehicle. 11. The communication system of claim 10, wherein said image processor processes the received transmitted captured image data for lane marker detection at the road ahead of the lead vehicle. 12. The communication system of claim 9, wherein a display of the following vehicle displays images derived from the received transmitted captured image data for viewing by a driver of the following vehicle. 13. The communication system of claim 9, wherein the second vehicle comprises a plurality of following vehicles following the lead vehicle, and wherein each of the following vehicles comprises a second communication device for receiving the transmitted captured image data from said first communication device. 14. The communication system of claim 1, wherein an image processor disposed at the second vehicle processes the received transmitted captured image data for a driver assistance system of the second vehicle. 15. The communication system of claim 1, wherein a display disposed at the second vehicle displays images derived from the received transmitted captured image data for viewing by a driver of the second vehicle. 16. A communication system for vehicles, said communication system comprising: A plurality of cameras disposed at a first vehicle, wherein some of said cameras have a field of view exterior of the first vehicle and at least one of said cameras has a field of view interior of the first vehicle, said cameras capturing image data; a first communication device disposed at the first vehicle, said first communication device wirelessly transmitting image data captured by said cameras; a second communication device disposed at a second vehicle, said second communication device receiving the transmitted captured image data from said first communication device; wherein said first and second communication devices comprise first and second dedicated short range communication devices; wherein the first vehicle comprises a trailer and the second vehicle comprises a towing vehicle that is towing the trailer; and wherein at least one of (i) an image processor disposed at the second vehicle processes the received transmitted captured image data for a driver assistance system of the second vehicle and (ii) a display disposed at the second vehicle displays images derived from the received transmitted captured image data for viewing by a driver of the second vehicle. 17. The communication system of claim 16, wherein each of said first and second dedicated short range communication devices have a first channel dedicated for safety related communications and a second channel dedicated for communication of the captured image data. 18. A communication system for vehicles, said communication system comprising: a camera disposed at a first vehicle and having a field of view exterior of the first vehicle, said camera capturing image data; a first communication device disposed at the first vehicle, said first communication device wirelessly transmitting image data captured by said camera; a second communication device disposed at a second vehicle, said second communication device receiving the transmitted captured image data from said first communication device; wherein said first and second communication devices comprise first and second dedicated short range communication devices; wherein the first vehicle comprises a lead vehicle of a platoon of vehicles and wherein the second vehicle comprises at least one following vehicle of the platoon of vehicles that is following the lead vehicle; wherein said camera comprises a forward viewing camera of the first vehicle; and wherein an image processor of the second vehicle processes the received transmitted captured image data for a driver assistance system of the second vehicle, and wherein said image processor processes the received transmitted captured image data for lane marker detection at the road ahead of the first vehicle. 19. The communication system of claim 18, wherein each of said first and second dedicated short range communication devices have a first channel dedicated for safety related communications and a second channel dedicated for communication of the captured image data. 20. The communication system of claim 18, wherein a display of the second vehicle displays images derived from the received transmitted captured image data for viewing by a driver of the second vehicle.
A communication system for vehicles includes a camera disposed at a first vehicle and having a field of view exterior of the first vehicle. The camera captures image data. A first communication device disposed at the first vehicle wirelessly transmits image data captured by the camera. A second communication device disposed at a second vehicle receives the transmitted captured image data from the first communication device. At least one of (i) an image processor disposed at the second vehicle processes the received transmitted captured image data for a driver assistance system of the second vehicle and (ii) a display of the second vehicle displays images derived from the received transmitted captured image data for viewing by a driver of the second vehicle.1. A communication system for vehicles, said communication system comprising: a camera disposed at a first vehicle and having a field of view exterior of the first vehicle, said camera capturing image data; a first communication device disposed at the first vehicle, said first communication device wirelessly transmitting image data captured by said camera; a second communication device disposed at a second vehicle, said second communication device receiving the transmitted captured image data from said first communication device; and wherein at least one of (i) an image processor disposed at the second vehicle processes the received transmitted captured image data for a driver assistance system of the second vehicle and (ii) a display disposed at the second vehicle displays images derived from the received transmitted captured image data for viewing by a driver of the second vehicle. 2. The communication system of claim 1, wherein said first and second communication devices comprise first and second dedicated short range communication devices. 3. The communication system of claim 2, wherein each of said first and second dedicated short range communication devices have a first channel dedicated for safety related communications and a second channel dedicated for communication of the captured image data. 4. The communication system of claim 1, wherein the first vehicle comprises a trailer and the second vehicle comprises a towing vehicle that is towing the trailer. 5. The communication system of claim 4, wherein the trailer includes a plurality of cameras, and wherein at least one of said cameras has a field of view interior of the trailer. 6. The communication system of claim 4, wherein an image processor of the towing vehicle processes the received transmitted captured image data to detect objects exterior of the trailer. 7. The communication system of claim 4, wherein a display of the towing vehicle displays images derived from the received transmitted captured image data for viewing by a driver of the towing vehicle while the driver is driving the towing vehicle and towing the trailer. 8. The communication system of claim 1, wherein the first vehicle comprises a lead vehicle of a platoon of vehicles and wherein the second vehicle comprises at least one following vehicle of the platoon of vehicles that is following the lead vehicle. 9. The communication system of claim 8, wherein said camera comprises a forward viewing camera of the lead vehicle. 10. The communication system of claim 9, wherein an image processor of the following vehicle processes the received transmitted captured image data for a driver assistance system of the following vehicle. 11. The communication system of claim 10, wherein said image processor processes the received transmitted captured image data for lane marker detection at the road ahead of the lead vehicle. 12. The communication system of claim 9, wherein a display of the following vehicle displays images derived from the received transmitted captured image data for viewing by a driver of the following vehicle. 13. The communication system of claim 9, wherein the second vehicle comprises a plurality of following vehicles following the lead vehicle, and wherein each of the following vehicles comprises a second communication device for receiving the transmitted captured image data from said first communication device. 14. The communication system of claim 1, wherein an image processor disposed at the second vehicle processes the received transmitted captured image data for a driver assistance system of the second vehicle. 15. The communication system of claim 1, wherein a display disposed at the second vehicle displays images derived from the received transmitted captured image data for viewing by a driver of the second vehicle. 16. A communication system for vehicles, said communication system comprising: A plurality of cameras disposed at a first vehicle, wherein some of said cameras have a field of view exterior of the first vehicle and at least one of said cameras has a field of view interior of the first vehicle, said cameras capturing image data; a first communication device disposed at the first vehicle, said first communication device wirelessly transmitting image data captured by said cameras; a second communication device disposed at a second vehicle, said second communication device receiving the transmitted captured image data from said first communication device; wherein said first and second communication devices comprise first and second dedicated short range communication devices; wherein the first vehicle comprises a trailer and the second vehicle comprises a towing vehicle that is towing the trailer; and wherein at least one of (i) an image processor disposed at the second vehicle processes the received transmitted captured image data for a driver assistance system of the second vehicle and (ii) a display disposed at the second vehicle displays images derived from the received transmitted captured image data for viewing by a driver of the second vehicle. 17. The communication system of claim 16, wherein each of said first and second dedicated short range communication devices have a first channel dedicated for safety related communications and a second channel dedicated for communication of the captured image data. 18. A communication system for vehicles, said communication system comprising: a camera disposed at a first vehicle and having a field of view exterior of the first vehicle, said camera capturing image data; a first communication device disposed at the first vehicle, said first communication device wirelessly transmitting image data captured by said camera; a second communication device disposed at a second vehicle, said second communication device receiving the transmitted captured image data from said first communication device; wherein said first and second communication devices comprise first and second dedicated short range communication devices; wherein the first vehicle comprises a lead vehicle of a platoon of vehicles and wherein the second vehicle comprises at least one following vehicle of the platoon of vehicles that is following the lead vehicle; wherein said camera comprises a forward viewing camera of the first vehicle; and wherein an image processor of the second vehicle processes the received transmitted captured image data for a driver assistance system of the second vehicle, and wherein said image processor processes the received transmitted captured image data for lane marker detection at the road ahead of the first vehicle. 19. The communication system of claim 18, wherein each of said first and second dedicated short range communication devices have a first channel dedicated for safety related communications and a second channel dedicated for communication of the captured image data. 20. The communication system of claim 18, wherein a display of the second vehicle displays images derived from the received transmitted captured image data for viewing by a driver of the second vehicle.
2,400