Unnamed: 0
int64
0
350k
level_0
int64
0
351k
ApplicationNumber
int64
9.75M
96.1M
ArtUnit
int64
1.6k
3.99k
Abstract
stringlengths
1
8.37k
Claims
stringlengths
3
292k
abstract-claims
stringlengths
68
293k
TechCenter
int64
1.6k
3.9k
8,000
8,000
14,913,399
2,425
Methods and apparatuses are provided with a solution to adjacent channel interference when a multi-carrier modulation system (e.g., OFDM) replaces a legacy modulation system and co-exists with it for a period of time. The adjacent channel interference can be reduced by blocking (setting to 0) and not using some of the carriers at the edge of the spectrum during the transition period. This effectively reduces the bandwidth of the channel and consequently, the adjacent channel interference caused by the multi-carrier signal. However, at some point in time, the legacy system will be turned off and the adjacent channel interference into the original channels will no longer be important. The present principles propose a mechanism to allow for the unblocking of the removed carriers once the interference problem becomes less strict.
1. An apparatus for transmitting a multi-carrier modulated signal comprising: a source (111, 200) that provides data, said data comprising a bandwidth parameter, said bandwidth parameter comprising a normal bandwidth mode, at least one reduced bandwidth mode and at least one extended bandwidth mode; and a multi-carrier modulator (114) that modulates said data by allocating said data to a plurality of carriers on a physical channel according to said bandwidth parameter to create said modulated signal. 2. The apparatus according to claim 1 wherein the at least one reduced bandwidth mode has a smaller number of carriers than the normal bandwidth mode and the at least one extended bandwidth mode has a larger number of carriers than the normal bandwidth mode. 3. The apparatus according to claim 1 further comprising: a channel encoder (113) for at least channel encoding said data prior to the multi-carrier modulator. 4. The apparatus according to claim 1 wherein at least one reduced bandwidth mode is created by eliminating normal bandwidth carriers evenly on both edges of the spectrum of said modulated signal. 5. The apparatus according to claim 1 wherein at least one reduced bandwidth mode is created by eliminating normal bandwidth carriers on only one edge of the spectrum of said modulated signal. 6. The apparatus according to claim 1 wherein at least one reduced bandwidth mode is created by eliminating normal bandwidth carriers unevenly on both edges of the spectrum of said modulated signal. 7. The apparatus according to claim 1 wherein at least one reduced carrier mode is used for reducing adjacent channel interference on at least one adjacent channel to said physical channel carrying said multi-carrier signal. 8. The apparatus according to claim 7 wherein the at least one adjacent channel carries a modulated signal satisfying a spectral mask for a legacy communication system. 9. The apparatus according to claim 8 wherein the legacy communication system is ATSC and the multi-carrier modulation is OFDM. 10. An apparatus for receiving a multi-carrier modulated signal comprising: a multi-carrier demodulator (124, 310) that demodulates said modulated signal, said signal comprising a plurality of signaling data and other than signaling data modulated symbols, said modulated symbols comprising a plurality of carriers on a physical channel, to obtain demodulated data symbols, wherein demodulating said other than signaling data symbol is performed according to a bandwidth parameter; and a signaling data detector (322) that detects signaling data from demodulated signaling data symbols and that recovers said bandwidth parameter, said bandwidth parameter comprising a normal bandwidth mode, at least one reduced bandwidth mode and at least one extended bandwidth mode. 11. The apparatus according to claim 10 wherein the at least one reduced bandwidth mode has a smaller number of carriers than the normal bandwidth mode and the at least one extended bandwidth mode has a larger number of carriers than the normal bandwidth mode. 12. The apparatus according to claim 10 further comprising: a channel decoder (123, 320) for at least channel decoding said demodulated data symbols after the multi-carrier demodulator. 13. The apparatus according to claim 10 wherein at least one reduced bandwidth mode is created by eliminating normal bandwidth carriers evenly on both edges of the spectrum of said modulated signal and the demodulator disregards eliminated carriers. 14. The apparatus according to claim 10 wherein at least one reduced bandwidth mode is created by eliminating normal bandwidth carriers on only one edge of the spectrum of said modulated signal and the demodulator disregards eliminated carriers. 15. The apparatus according to claim 10 wherein at least one reduced bandwidth mode is created by eliminating normal bandwidth carriers unevenly on both edges of the spectrum of said modulated signal and the demodulator disregards eliminated carriers. 16. The apparatus according to claim 10 wherein at least one reduced carrier mode is used for reducing adjacent channel interference on at least one adjacent channel to said physical channel carrying said multi-carrier signal. 17. The apparatus according to claim 16 wherein the at least one adjacent channel carries a modulated signal satisfying a spectral mask for a legacy communication system. 18. The apparatus according to claim 17 wherein the legacy communication system is ATSC and the multi-carrier modulation is OFDM. 19. The apparatus of claim 10 wherein the demodulator for the signaling data symbols which do not contain the bandwidth parameter performs demodulation according to the bandwidth parameter. 20. A method for transmitting a multi-carrier modulated signal comprising: providing data (910), said data comprising a bandwidth parameter, said bandwidth parameter comprising a normal bandwidth mode, at least one reduced bandwidth mode and at least one extended bandwidth mode; and multi-carrier modulating (940) said data by allocating said data to a plurality of carriers on a physical channel according to said bandwidth parameter to create said modulated signal. 21. The method according to claim 20 wherein the at least one reduced bandwidth mode has a smaller number of carriers than the normal bandwidth mode and the at least one extended bandwidth mode has a larger number of carriers than the normal bandwidth mode. 22. The method according to claim 20 further comprising: channel encoding (930) said data prior to multi-carrier modulating. 23. The method according to claim 20 wherein at least one reduced bandwidth mode is created by eliminating normal bandwidth carriers evenly on both edges of the spectrum of said modulated signal. 24. The method according to claim 20 wherein at least one reduced bandwidth mode is created by eliminating normal bandwidth carriers on only one edge of the spectrum of said modulated signal. 25. The method according to claim 20 wherein at least one reduced bandwidth mode is created by eliminating normal bandwidth carriers unevenly on both edges of the spectrum of said modulated signal. 26. The method according to claim 20 wherein at least one reduced carrier mode is used for reducing adjacent channel interference on at least one adjacent channel to said physical channel carrying said multi-carrier signal. 27. The method according to claim 26 wherein the at least one adjacent channel carries a modulated signal satisfying a spectral mask for a legacy communication system. 28. The method according to claim 27 wherein the legacy communication system is ATSC and the multi-carrier modulation is OFDM. 29. A method for receiving a multi-carrier modulated signal comprising: multi-carrier demodulating (1010) said modulated signal, said signal comprising a plurality of signaling data and other than signaling data modulated symbols, said modulated symbols comprising a plurality of carriers on a physical channel, to obtain demodulated data symbols, wherein demodulating said other than signaling data symbol is performed according to a bandwidth parameter; and detecting signaling data (1030) from demodulated signaling data symbols and for recovering said bandwidth parameter, said bandwidth parameter comprising a normal bandwidth mode, at least one reduced bandwidth mode and at least one extended bandwidth mode. 30. The method according to claim 29 wherein the at least one reduced bandwidth mode has a smaller number of carriers than the normal bandwidth mode and the at least one extended bandwidth mode has a larger number of carriers than the normal bandwidth mode. 31. The method according to claim 29 further comprising: channel decoding (1020) said demodulated data symbols after the multi-carrier demodulator. 32. The method according to claim 29 wherein at least one reduced bandwidth mode is created by eliminating normal bandwidth carriers evenly on both edges of the spectrum of said modulated signal and the demodulator disregards eliminated carriers. 33. The method according to claim 29 wherein at least one reduced bandwidth mode is created by eliminating normal bandwidth carriers on only one edge of the spectrum of said modulated signal and the demodulator disregards eliminated carriers. 34. The method according to claim 29 wherein at least one reduced bandwidth mode is created by eliminating normal bandwidth carriers unevenly on both edges of the spectrum of said modulated signal and the demodulator disregards eliminated carriers. 35. The method according to claim 29 wherein at least one reduced carrier mode is used for reducing adjacent channel interference on at least one adjacent channel to said physical channel carrying said multi-carrier signal. 36. The method according to claim 35 wherein the at least one adjacent channel carries a modulated signal satisfying a spectral mask for a legacy communication system. 37. The method according to claim 36 wherein the legacy communication system is ATSC and the multi-carrier modulation is OFDM. 38. The method of claim 29 wherein demodulating the signaling data symbols which do not contain the bandwidth parameter is performed according to the bandwidth parameter.
Methods and apparatuses are provided with a solution to adjacent channel interference when a multi-carrier modulation system (e.g., OFDM) replaces a legacy modulation system and co-exists with it for a period of time. The adjacent channel interference can be reduced by blocking (setting to 0) and not using some of the carriers at the edge of the spectrum during the transition period. This effectively reduces the bandwidth of the channel and consequently, the adjacent channel interference caused by the multi-carrier signal. However, at some point in time, the legacy system will be turned off and the adjacent channel interference into the original channels will no longer be important. The present principles propose a mechanism to allow for the unblocking of the removed carriers once the interference problem becomes less strict.1. An apparatus for transmitting a multi-carrier modulated signal comprising: a source (111, 200) that provides data, said data comprising a bandwidth parameter, said bandwidth parameter comprising a normal bandwidth mode, at least one reduced bandwidth mode and at least one extended bandwidth mode; and a multi-carrier modulator (114) that modulates said data by allocating said data to a plurality of carriers on a physical channel according to said bandwidth parameter to create said modulated signal. 2. The apparatus according to claim 1 wherein the at least one reduced bandwidth mode has a smaller number of carriers than the normal bandwidth mode and the at least one extended bandwidth mode has a larger number of carriers than the normal bandwidth mode. 3. The apparatus according to claim 1 further comprising: a channel encoder (113) for at least channel encoding said data prior to the multi-carrier modulator. 4. The apparatus according to claim 1 wherein at least one reduced bandwidth mode is created by eliminating normal bandwidth carriers evenly on both edges of the spectrum of said modulated signal. 5. The apparatus according to claim 1 wherein at least one reduced bandwidth mode is created by eliminating normal bandwidth carriers on only one edge of the spectrum of said modulated signal. 6. The apparatus according to claim 1 wherein at least one reduced bandwidth mode is created by eliminating normal bandwidth carriers unevenly on both edges of the spectrum of said modulated signal. 7. The apparatus according to claim 1 wherein at least one reduced carrier mode is used for reducing adjacent channel interference on at least one adjacent channel to said physical channel carrying said multi-carrier signal. 8. The apparatus according to claim 7 wherein the at least one adjacent channel carries a modulated signal satisfying a spectral mask for a legacy communication system. 9. The apparatus according to claim 8 wherein the legacy communication system is ATSC and the multi-carrier modulation is OFDM. 10. An apparatus for receiving a multi-carrier modulated signal comprising: a multi-carrier demodulator (124, 310) that demodulates said modulated signal, said signal comprising a plurality of signaling data and other than signaling data modulated symbols, said modulated symbols comprising a plurality of carriers on a physical channel, to obtain demodulated data symbols, wherein demodulating said other than signaling data symbol is performed according to a bandwidth parameter; and a signaling data detector (322) that detects signaling data from demodulated signaling data symbols and that recovers said bandwidth parameter, said bandwidth parameter comprising a normal bandwidth mode, at least one reduced bandwidth mode and at least one extended bandwidth mode. 11. The apparatus according to claim 10 wherein the at least one reduced bandwidth mode has a smaller number of carriers than the normal bandwidth mode and the at least one extended bandwidth mode has a larger number of carriers than the normal bandwidth mode. 12. The apparatus according to claim 10 further comprising: a channel decoder (123, 320) for at least channel decoding said demodulated data symbols after the multi-carrier demodulator. 13. The apparatus according to claim 10 wherein at least one reduced bandwidth mode is created by eliminating normal bandwidth carriers evenly on both edges of the spectrum of said modulated signal and the demodulator disregards eliminated carriers. 14. The apparatus according to claim 10 wherein at least one reduced bandwidth mode is created by eliminating normal bandwidth carriers on only one edge of the spectrum of said modulated signal and the demodulator disregards eliminated carriers. 15. The apparatus according to claim 10 wherein at least one reduced bandwidth mode is created by eliminating normal bandwidth carriers unevenly on both edges of the spectrum of said modulated signal and the demodulator disregards eliminated carriers. 16. The apparatus according to claim 10 wherein at least one reduced carrier mode is used for reducing adjacent channel interference on at least one adjacent channel to said physical channel carrying said multi-carrier signal. 17. The apparatus according to claim 16 wherein the at least one adjacent channel carries a modulated signal satisfying a spectral mask for a legacy communication system. 18. The apparatus according to claim 17 wherein the legacy communication system is ATSC and the multi-carrier modulation is OFDM. 19. The apparatus of claim 10 wherein the demodulator for the signaling data symbols which do not contain the bandwidth parameter performs demodulation according to the bandwidth parameter. 20. A method for transmitting a multi-carrier modulated signal comprising: providing data (910), said data comprising a bandwidth parameter, said bandwidth parameter comprising a normal bandwidth mode, at least one reduced bandwidth mode and at least one extended bandwidth mode; and multi-carrier modulating (940) said data by allocating said data to a plurality of carriers on a physical channel according to said bandwidth parameter to create said modulated signal. 21. The method according to claim 20 wherein the at least one reduced bandwidth mode has a smaller number of carriers than the normal bandwidth mode and the at least one extended bandwidth mode has a larger number of carriers than the normal bandwidth mode. 22. The method according to claim 20 further comprising: channel encoding (930) said data prior to multi-carrier modulating. 23. The method according to claim 20 wherein at least one reduced bandwidth mode is created by eliminating normal bandwidth carriers evenly on both edges of the spectrum of said modulated signal. 24. The method according to claim 20 wherein at least one reduced bandwidth mode is created by eliminating normal bandwidth carriers on only one edge of the spectrum of said modulated signal. 25. The method according to claim 20 wherein at least one reduced bandwidth mode is created by eliminating normal bandwidth carriers unevenly on both edges of the spectrum of said modulated signal. 26. The method according to claim 20 wherein at least one reduced carrier mode is used for reducing adjacent channel interference on at least one adjacent channel to said physical channel carrying said multi-carrier signal. 27. The method according to claim 26 wherein the at least one adjacent channel carries a modulated signal satisfying a spectral mask for a legacy communication system. 28. The method according to claim 27 wherein the legacy communication system is ATSC and the multi-carrier modulation is OFDM. 29. A method for receiving a multi-carrier modulated signal comprising: multi-carrier demodulating (1010) said modulated signal, said signal comprising a plurality of signaling data and other than signaling data modulated symbols, said modulated symbols comprising a plurality of carriers on a physical channel, to obtain demodulated data symbols, wherein demodulating said other than signaling data symbol is performed according to a bandwidth parameter; and detecting signaling data (1030) from demodulated signaling data symbols and for recovering said bandwidth parameter, said bandwidth parameter comprising a normal bandwidth mode, at least one reduced bandwidth mode and at least one extended bandwidth mode. 30. The method according to claim 29 wherein the at least one reduced bandwidth mode has a smaller number of carriers than the normal bandwidth mode and the at least one extended bandwidth mode has a larger number of carriers than the normal bandwidth mode. 31. The method according to claim 29 further comprising: channel decoding (1020) said demodulated data symbols after the multi-carrier demodulator. 32. The method according to claim 29 wherein at least one reduced bandwidth mode is created by eliminating normal bandwidth carriers evenly on both edges of the spectrum of said modulated signal and the demodulator disregards eliminated carriers. 33. The method according to claim 29 wherein at least one reduced bandwidth mode is created by eliminating normal bandwidth carriers on only one edge of the spectrum of said modulated signal and the demodulator disregards eliminated carriers. 34. The method according to claim 29 wherein at least one reduced bandwidth mode is created by eliminating normal bandwidth carriers unevenly on both edges of the spectrum of said modulated signal and the demodulator disregards eliminated carriers. 35. The method according to claim 29 wherein at least one reduced carrier mode is used for reducing adjacent channel interference on at least one adjacent channel to said physical channel carrying said multi-carrier signal. 36. The method according to claim 35 wherein the at least one adjacent channel carries a modulated signal satisfying a spectral mask for a legacy communication system. 37. The method according to claim 36 wherein the legacy communication system is ATSC and the multi-carrier modulation is OFDM. 38. The method of claim 29 wherein demodulating the signaling data symbols which do not contain the bandwidth parameter is performed according to the bandwidth parameter.
2,400
8,001
8,001
15,193,020
2,449
Techniques of network virtualization of containers in cloud-based system are disclosed herein. In one embodiment, a method includes receiving a selection of a host in the computer system to instantiate a container in response to a request from a user. In response to the received selection, the method includes identifying parameters of network operations on the selected host to instantiate the requested container and assigning a network address to the container to be instantiated on the selected host in the computer system, the assigned network address is addressable from outside of the selected host without network name translation. The method can then include transmitting an instruction to the selected host to instantiate the requested container based on the assigned network address.
1. A method performed by a computing device in a computing system having a plurality of hosts interconnected by a computer network, comprising: receiving a request to instantiate a container from a user, the container including a software package having a software application in a filesystem sufficiently complete for execution of the application in an operating system by a processor; in response to the received request, selecting one of the hosts in the computing system as a container host to instantiate the requested container; based on the selection of the host, configuring network settings for the requested container to be instantiated on the selected host in the computing system, the network settings including an assigned IP address based on which the container is accessible from outside of the selected host without network name translation; and transmitting an instruction to the selected host to instantiate the requested container based on the configured network settings, the instantiated container being network addressable from outside of the container host. 2. The method of claim 1 wherein selecting one of the hosts in the computing system includes selecting a physical server in the computing system as the container host. 3. The method of claim 1 wherein selecting one of the hosts in the computing system includes selecting a virtual machine hosted on a physical server in the computing system as the container host. 4. The method of claim 1 wherein: the assigned IP address includes a first IP address in a virtual network; and the selected host has a second assigned IP address in the same virtual network. 5. The method of claim 1 wherein: the assigned IP address includes a first IP address in a first virtual network; and the selected host has a second assigned IP address in a second virtual network different than the first virtual network, the first IP address is the same as the second IP address. 6. The method of claim 1 wherein configuring network settings for the requested container includes: querying the selected host for parameters of network operations on the selected host; receiving a response from the selected host, the response containing the parameters of network operations on the selected host; and determining a software defined network policy as a part of the network settings for the requested container based on the received parameters of network operations on the selected host in the received response. 7. The method of claim 6 wherein the software defined network policy including information regarding settings for network route determination and load balancing for the requested container. 8. The method of claim 1 wherein: the container is a first container; the host is a first host; and the method further includes routing a message from a second container or a virtual machine to the first container based on the assigned IP address of the first container, the second container or the virtual machine residing on a second host different than the first host. 9. The method of claim 6 wherein: the container is a first container; the container host includes a first virtual machine; and the method further includes routing a message from a second container to the first container based on the assigned IP address of the first container, the second container residing on a second virtual machine different than the first virtual machine. 10. A computing device in a computing system having a plurality of hosts interconnected by a computer network, the computing device comprising: a processor; and a memory having instructions executable by the processor to cause the processor to perform a process including: receiving a selection of one of the hosts in the computing system as a container host to instantiate a container in response to a request from a user, the container including a software package having a software application in a filesystem sufficiently complete for execution of the application in an operating system by a processor; based on the received selection, configuring network settings for the requested container to be instantiated on the selected host in the computing system, the network settings including an assigned network address based on which the container is accessible from outside of the selected host without network name translation at the container host; and transmitting an instruction to the selected host to instantiate the requested container based on the configured network settings. 11. The computing device of claim 10 wherein selecting one of the hosts in the computing system includes selecting a physical server in the computing system as the container host. 12. The computing device of claim 10 wherein selecting one of the hosts in the computing system as the container host includes selecting a virtual machine hosted on a physical server in the computing system as the container host. 13. The computing device of claim 10 wherein: the assigned IP address includes a first IP address in a virtual network; and the selected host has a second assigned IP address in the same virtual network. 14. The computing device of claim 10 wherein: the assigned IP address includes a first IP address in a first virtual network; and the selected host has a second assigned IP address in a second virtual network different than the first virtual network. 15. The computing device of claim 10 wherein configuring network settings for the requested container includes: transmitting a query to the selected host for parameters of network operations on the selected host; receiving a response from the selected host in response to the transmitted query, the response containing the parameters of network operations on the selected host; and determining the network settings for the requested container based on the received parameters of network operations on the selected host in the received response. 16. The computing device of claim 10 wherein the determined network settings include information regarding settings for network route determination and load balancing for the requested container. 17. A method performed by a computing device in a computing system having a plurality of hosts interconnected by a computer network, comprising: receiving a selection of a host in the computing system to instantiate a container in response to a request from a user, the container including a software package having a software application in a filesystem sufficiently complete for execution of the application in an operating system on the selected host; in response to the received selection, identifying parameters of network operations on the selected host to instantiate the requested container; and based on the identified parameters of the network operations on the selected host, assigning a network address to the container to be instantiated on the selected host in the computing system, the assigned network address is addressable from outside of the selected host without network name translation; and transmitting an instruction to the selected host to instantiate the requested container based on the assigned network address. 18. The method of claim 17 wherein identifying the parameters of network operations includes: transmitting a query to the selected host for the parameters of network operations on the selected host; and receiving a response from the selected host in response to the transmitted query, the response containing the parameters of network operations on the selected host. 19. The method of claim 17 wherein: the container is a first container; the assigned IP address is a first IP address that belongs to a virtual network; and the selected host also includes a second container having a second IP address that also belongs to the virtual network. 20. The method of claim 17 wherein: the container is a first container; the assigned IP address is a first IP address that belongs to a first virtual network; and the selected host also includes a second container having a second IP address that belongs to a second virtual network different than the first virtual network.
Techniques of network virtualization of containers in cloud-based system are disclosed herein. In one embodiment, a method includes receiving a selection of a host in the computer system to instantiate a container in response to a request from a user. In response to the received selection, the method includes identifying parameters of network operations on the selected host to instantiate the requested container and assigning a network address to the container to be instantiated on the selected host in the computer system, the assigned network address is addressable from outside of the selected host without network name translation. The method can then include transmitting an instruction to the selected host to instantiate the requested container based on the assigned network address.1. A method performed by a computing device in a computing system having a plurality of hosts interconnected by a computer network, comprising: receiving a request to instantiate a container from a user, the container including a software package having a software application in a filesystem sufficiently complete for execution of the application in an operating system by a processor; in response to the received request, selecting one of the hosts in the computing system as a container host to instantiate the requested container; based on the selection of the host, configuring network settings for the requested container to be instantiated on the selected host in the computing system, the network settings including an assigned IP address based on which the container is accessible from outside of the selected host without network name translation; and transmitting an instruction to the selected host to instantiate the requested container based on the configured network settings, the instantiated container being network addressable from outside of the container host. 2. The method of claim 1 wherein selecting one of the hosts in the computing system includes selecting a physical server in the computing system as the container host. 3. The method of claim 1 wherein selecting one of the hosts in the computing system includes selecting a virtual machine hosted on a physical server in the computing system as the container host. 4. The method of claim 1 wherein: the assigned IP address includes a first IP address in a virtual network; and the selected host has a second assigned IP address in the same virtual network. 5. The method of claim 1 wherein: the assigned IP address includes a first IP address in a first virtual network; and the selected host has a second assigned IP address in a second virtual network different than the first virtual network, the first IP address is the same as the second IP address. 6. The method of claim 1 wherein configuring network settings for the requested container includes: querying the selected host for parameters of network operations on the selected host; receiving a response from the selected host, the response containing the parameters of network operations on the selected host; and determining a software defined network policy as a part of the network settings for the requested container based on the received parameters of network operations on the selected host in the received response. 7. The method of claim 6 wherein the software defined network policy including information regarding settings for network route determination and load balancing for the requested container. 8. The method of claim 1 wherein: the container is a first container; the host is a first host; and the method further includes routing a message from a second container or a virtual machine to the first container based on the assigned IP address of the first container, the second container or the virtual machine residing on a second host different than the first host. 9. The method of claim 6 wherein: the container is a first container; the container host includes a first virtual machine; and the method further includes routing a message from a second container to the first container based on the assigned IP address of the first container, the second container residing on a second virtual machine different than the first virtual machine. 10. A computing device in a computing system having a plurality of hosts interconnected by a computer network, the computing device comprising: a processor; and a memory having instructions executable by the processor to cause the processor to perform a process including: receiving a selection of one of the hosts in the computing system as a container host to instantiate a container in response to a request from a user, the container including a software package having a software application in a filesystem sufficiently complete for execution of the application in an operating system by a processor; based on the received selection, configuring network settings for the requested container to be instantiated on the selected host in the computing system, the network settings including an assigned network address based on which the container is accessible from outside of the selected host without network name translation at the container host; and transmitting an instruction to the selected host to instantiate the requested container based on the configured network settings. 11. The computing device of claim 10 wherein selecting one of the hosts in the computing system includes selecting a physical server in the computing system as the container host. 12. The computing device of claim 10 wherein selecting one of the hosts in the computing system as the container host includes selecting a virtual machine hosted on a physical server in the computing system as the container host. 13. The computing device of claim 10 wherein: the assigned IP address includes a first IP address in a virtual network; and the selected host has a second assigned IP address in the same virtual network. 14. The computing device of claim 10 wherein: the assigned IP address includes a first IP address in a first virtual network; and the selected host has a second assigned IP address in a second virtual network different than the first virtual network. 15. The computing device of claim 10 wherein configuring network settings for the requested container includes: transmitting a query to the selected host for parameters of network operations on the selected host; receiving a response from the selected host in response to the transmitted query, the response containing the parameters of network operations on the selected host; and determining the network settings for the requested container based on the received parameters of network operations on the selected host in the received response. 16. The computing device of claim 10 wherein the determined network settings include information regarding settings for network route determination and load balancing for the requested container. 17. A method performed by a computing device in a computing system having a plurality of hosts interconnected by a computer network, comprising: receiving a selection of a host in the computing system to instantiate a container in response to a request from a user, the container including a software package having a software application in a filesystem sufficiently complete for execution of the application in an operating system on the selected host; in response to the received selection, identifying parameters of network operations on the selected host to instantiate the requested container; and based on the identified parameters of the network operations on the selected host, assigning a network address to the container to be instantiated on the selected host in the computing system, the assigned network address is addressable from outside of the selected host without network name translation; and transmitting an instruction to the selected host to instantiate the requested container based on the assigned network address. 18. The method of claim 17 wherein identifying the parameters of network operations includes: transmitting a query to the selected host for the parameters of network operations on the selected host; and receiving a response from the selected host in response to the transmitted query, the response containing the parameters of network operations on the selected host. 19. The method of claim 17 wherein: the container is a first container; the assigned IP address is a first IP address that belongs to a virtual network; and the selected host also includes a second container having a second IP address that also belongs to the virtual network. 20. The method of claim 17 wherein: the container is a first container; the assigned IP address is a first IP address that belongs to a first virtual network; and the selected host also includes a second container having a second IP address that belongs to a second virtual network different than the first virtual network.
2,400
8,002
8,002
14,577,255
2,486
An optical imaging and processing system includes an optical connection and an optical element disposed at a first end of the optical connection. The first end of the optical connection is configured to extend into a turbine component interior such that the optical element is disposed within the turbine component interior. The system also includes a photodiode array disposed at a second end of the optical connection, where the optical element is configured to transmit a video stream of the turbine component interior to the photodiode array as the optical element is moved within the turbine component interior between multiple vantage points. The system also includes a processor coupled to the photodiode array, wherein the processor is configured to process the video stream to generate a three-dimensional model of at least a portion of the turbine component interior without utilizing a previously defined three-dimensional model input of the turbine component interior.
1. An optical imaging and processing system, comprising: an optical connection and an optical element disposed at a first end of the optical connection, wherein the first end of the optical connection is configured to extend into a turbine component interior such that the optical element is disposed within the turbine component interior; a photodiode array disposed at a second end of the optical connection, wherein the optical element is configured to transmit a video stream of the turbine component interior to the photodiode array as the optical element is moved within the turbine component interior between multiple vantage points; a processor coupled to the photodiode array, wherein the processor is configured to process the video stream to generate a three-dimensional model of at least a portion of the turbine component interior without utilizing a previously defined three-dimensional model input of the turbine component interior. 2. The system of claim 1, wherein the processor is configured to: determine identifying features within image frames of the video stream from the multiple vantage points; determine corresponding identifying features between the image frames; correlate the corresponding identifying features between the image frames to determine relative localization data of the image frames and/or the corresponding identifying features between the image frames; and locate the corresponding identifying features, based on the relative localization data of the image frames and/or the corresponding identifying features between the image frames, in a point cloud such that the point cloud forms the three-dimensional model. 3. The system of claim 2, wherein the image frames comprise at least a first image frame, a second image frame, and a third image frame, wherein the first and second image frames are processed by the processor first to locate corresponding identifying features between the first and second image frames in the point cloud, and wherein the second and third image frames are processed second to locate corresponding identifying features between the second and third image frames in the point cloud. 4. The system of claim 2, wherein relative localization data comprises relative position and/or relative orientation. 5. The system of claim 1, comprising a repositioning device configured to reposition the optical element within the turbine component interior between the multiple vantage points as the video stream is transmitted from the optical element to the photodiode array. 6. The system of claim 1, comprising a display coupled to the processor, wherein the display is configured to display the three-dimensional model. 7. The system of claim 1, wherein the processor is configured to automatically navigate the three-dimensional model for determining defects within the turbine component interior. 8. The system of claim 1, wherein the turbine component is a turbine blade or a compressor blade. 9. The system of claim 1, wherein the photodiode array is part of the processor. 10. The system of claim 1, wherein the processor compares a three-dimensional model input of the turbine component interior with the three-dimensional model generated by the processor to refine the three-dimensional model into a refined three-dimensional model. 11. A method for generating a three-dimensional model of a turbine component interior utilizing an optical imaging and processing system, comprising: capturing a video stream having a plurality of image frames of the turbine component interior via an optical element and an array coupled to the optical element via an optical connection, wherein the optical element is configured to be disposed in the turbine component interior and to transmit the video stream through the optical connection to the array; storing, in a processor of the optical imaging and processing system, the video stream having the plurality of image frames; identifying one or more identifying features in at least a first image frame and a second image frame of the plurality of image frames; determining corresponding identifying features between the first image frame and the second image frame; processing the corresponding identifying features between the first image frame and the second image frame to determine relative localization data between the first image frame and the second image frame and/or the corresponding identifying features in the first and second image frames; placing the corresponding identifying features, based on the relative localization data, into a point cloud for generating the three-dimensional model of the turbine component interior. 12. The method of claim 11, wherein processing the corresponding identifying features between the first image frame and the second image to determine relative localization data between the first image frame and the second image frame and/or the corresponding identifying features in the first and second image frames comprises: setting the first image frame as the initial reference frame and translating, rotating, and/or scaling the corresponding identifying features from the second image frame to correlate with the corresponding identifying features in the first image frame; storing translation, rotation, and/or scaling factors related to the translating, rotating, and/or scaling of the corresponding identifying features from the second image frame; and utilizing the translation, rotation, and/or scaling factors to determine the relative localization data between the first image frame and the second image frame and/or the corresponding identifying features in the first and second image frames. 13. The method of claim 12, wherein the plurality of image frames further comprises a third image frame and a fourth image frame, wherein processing the corresponding identifying features between the first image frame and the second image frame is iteratively repeated for the second image frame and the third image frame utilizing the second image frame as the initial reference frame, and the third image frame and the fourth image frame utilizing the third image frame as the initial reference frame. 14. The method of claim 11, comprising repositioning the optical element, disposed within the turbine component interior through a single viewing port, via a repositioning device of the optical imaging and processing system, such that the optical element and the array may capture the plurality of image frames from multiple vantage points within the turbine component interior. 15. The method of claim 11, comprising displaying the three-dimensional model on a display coupled to the processor. 16. The method of claim 11, comprising automatically navigating the three-dimensional model to determine defects within the turbine component interior. 17. A method for determining defects in a turbine component interior utilizing an optical imaging and processing system, comprising: generating a three-dimensional (3D) model of the turbine component interior, comprising: capturing a video stream, via an optical element, having a plurality of image frames of the turbine component interior; transmitting the video stream having the plurality of image frames of to a processor of the optical imaging and processing system; determining identifying features in the plurality of image frames; determining corresponding identifying features between a first image frame and a second image frame of the plurality of image frames; correlating the corresponding identifying features between the first image frame and the second image frame to substantially simultaneously determine relative localization data of the first and second image frames and the corresponding identifying features between the first and second image frames; and locating the corresponding identifying features, based on the relative localization data, into a point cloud to form the 3D model of the turbine component interior. 18. The method of claim 17, wherein generating the 3D model of the turbine component interior further comprises: determining corresponding identifying features between the second image frame and a third image frame of the plurality of image frames; correlating the corresponding identifying features between the second image frame and the third image frame to substantially simultaneously determine relative localization data of the second and third image frames and the corresponding identifying features between the second and third image frames; and locating the corresponding identifying features, based on the relative localization data, into the point cloud to form the 3D model of the turbine component interior. 19. The method of claim 17, comprising: displaying the 3D model on a display coupled to the processor; and navigating the 3D model to determine defects within the turbine component interior. 20. The method of claim 17, comprising iteratively processing the first and second image frames, then the second and a third image frame, then the third and a fourth image frame, and so on and so forth, such that the point cloud forms the three-dimensional model. 21. The method of claim 17, wherein the relative localization data comprises relative positions and/or relative orientations.
An optical imaging and processing system includes an optical connection and an optical element disposed at a first end of the optical connection. The first end of the optical connection is configured to extend into a turbine component interior such that the optical element is disposed within the turbine component interior. The system also includes a photodiode array disposed at a second end of the optical connection, where the optical element is configured to transmit a video stream of the turbine component interior to the photodiode array as the optical element is moved within the turbine component interior between multiple vantage points. The system also includes a processor coupled to the photodiode array, wherein the processor is configured to process the video stream to generate a three-dimensional model of at least a portion of the turbine component interior without utilizing a previously defined three-dimensional model input of the turbine component interior.1. An optical imaging and processing system, comprising: an optical connection and an optical element disposed at a first end of the optical connection, wherein the first end of the optical connection is configured to extend into a turbine component interior such that the optical element is disposed within the turbine component interior; a photodiode array disposed at a second end of the optical connection, wherein the optical element is configured to transmit a video stream of the turbine component interior to the photodiode array as the optical element is moved within the turbine component interior between multiple vantage points; a processor coupled to the photodiode array, wherein the processor is configured to process the video stream to generate a three-dimensional model of at least a portion of the turbine component interior without utilizing a previously defined three-dimensional model input of the turbine component interior. 2. The system of claim 1, wherein the processor is configured to: determine identifying features within image frames of the video stream from the multiple vantage points; determine corresponding identifying features between the image frames; correlate the corresponding identifying features between the image frames to determine relative localization data of the image frames and/or the corresponding identifying features between the image frames; and locate the corresponding identifying features, based on the relative localization data of the image frames and/or the corresponding identifying features between the image frames, in a point cloud such that the point cloud forms the three-dimensional model. 3. The system of claim 2, wherein the image frames comprise at least a first image frame, a second image frame, and a third image frame, wherein the first and second image frames are processed by the processor first to locate corresponding identifying features between the first and second image frames in the point cloud, and wherein the second and third image frames are processed second to locate corresponding identifying features between the second and third image frames in the point cloud. 4. The system of claim 2, wherein relative localization data comprises relative position and/or relative orientation. 5. The system of claim 1, comprising a repositioning device configured to reposition the optical element within the turbine component interior between the multiple vantage points as the video stream is transmitted from the optical element to the photodiode array. 6. The system of claim 1, comprising a display coupled to the processor, wherein the display is configured to display the three-dimensional model. 7. The system of claim 1, wherein the processor is configured to automatically navigate the three-dimensional model for determining defects within the turbine component interior. 8. The system of claim 1, wherein the turbine component is a turbine blade or a compressor blade. 9. The system of claim 1, wherein the photodiode array is part of the processor. 10. The system of claim 1, wherein the processor compares a three-dimensional model input of the turbine component interior with the three-dimensional model generated by the processor to refine the three-dimensional model into a refined three-dimensional model. 11. A method for generating a three-dimensional model of a turbine component interior utilizing an optical imaging and processing system, comprising: capturing a video stream having a plurality of image frames of the turbine component interior via an optical element and an array coupled to the optical element via an optical connection, wherein the optical element is configured to be disposed in the turbine component interior and to transmit the video stream through the optical connection to the array; storing, in a processor of the optical imaging and processing system, the video stream having the plurality of image frames; identifying one or more identifying features in at least a first image frame and a second image frame of the plurality of image frames; determining corresponding identifying features between the first image frame and the second image frame; processing the corresponding identifying features between the first image frame and the second image frame to determine relative localization data between the first image frame and the second image frame and/or the corresponding identifying features in the first and second image frames; placing the corresponding identifying features, based on the relative localization data, into a point cloud for generating the three-dimensional model of the turbine component interior. 12. The method of claim 11, wherein processing the corresponding identifying features between the first image frame and the second image to determine relative localization data between the first image frame and the second image frame and/or the corresponding identifying features in the first and second image frames comprises: setting the first image frame as the initial reference frame and translating, rotating, and/or scaling the corresponding identifying features from the second image frame to correlate with the corresponding identifying features in the first image frame; storing translation, rotation, and/or scaling factors related to the translating, rotating, and/or scaling of the corresponding identifying features from the second image frame; and utilizing the translation, rotation, and/or scaling factors to determine the relative localization data between the first image frame and the second image frame and/or the corresponding identifying features in the first and second image frames. 13. The method of claim 12, wherein the plurality of image frames further comprises a third image frame and a fourth image frame, wherein processing the corresponding identifying features between the first image frame and the second image frame is iteratively repeated for the second image frame and the third image frame utilizing the second image frame as the initial reference frame, and the third image frame and the fourth image frame utilizing the third image frame as the initial reference frame. 14. The method of claim 11, comprising repositioning the optical element, disposed within the turbine component interior through a single viewing port, via a repositioning device of the optical imaging and processing system, such that the optical element and the array may capture the plurality of image frames from multiple vantage points within the turbine component interior. 15. The method of claim 11, comprising displaying the three-dimensional model on a display coupled to the processor. 16. The method of claim 11, comprising automatically navigating the three-dimensional model to determine defects within the turbine component interior. 17. A method for determining defects in a turbine component interior utilizing an optical imaging and processing system, comprising: generating a three-dimensional (3D) model of the turbine component interior, comprising: capturing a video stream, via an optical element, having a plurality of image frames of the turbine component interior; transmitting the video stream having the plurality of image frames of to a processor of the optical imaging and processing system; determining identifying features in the plurality of image frames; determining corresponding identifying features between a first image frame and a second image frame of the plurality of image frames; correlating the corresponding identifying features between the first image frame and the second image frame to substantially simultaneously determine relative localization data of the first and second image frames and the corresponding identifying features between the first and second image frames; and locating the corresponding identifying features, based on the relative localization data, into a point cloud to form the 3D model of the turbine component interior. 18. The method of claim 17, wherein generating the 3D model of the turbine component interior further comprises: determining corresponding identifying features between the second image frame and a third image frame of the plurality of image frames; correlating the corresponding identifying features between the second image frame and the third image frame to substantially simultaneously determine relative localization data of the second and third image frames and the corresponding identifying features between the second and third image frames; and locating the corresponding identifying features, based on the relative localization data, into the point cloud to form the 3D model of the turbine component interior. 19. The method of claim 17, comprising: displaying the 3D model on a display coupled to the processor; and navigating the 3D model to determine defects within the turbine component interior. 20. The method of claim 17, comprising iteratively processing the first and second image frames, then the second and a third image frame, then the third and a fourth image frame, and so on and so forth, such that the point cloud forms the three-dimensional model. 21. The method of claim 17, wherein the relative localization data comprises relative positions and/or relative orientations.
2,400
8,003
8,003
13,923,261
2,451
Provided herein are systems and methods that allow for converting or translating Dynamic Adaptive Streaming over HTTP (DASH) to HTTP Live Streaming (HLS) and vice versa.
1. A method of translating dynamic adaptive streaming over HTTP (DASH) to HTTP live streaming (HLS), the method comprising: receiving a media presentation description (mpd) file from a DASH server; extracting content from the mpd file; building a manifest file from the extracted content; and providing the manifest file to an HLS client. 2. The method of claim 1, wherein the extracting comprises parsing content from the mpd file, wherein the content is provided in xml. 3. The method of claim 2, wherein predetermined fields in the mpd file are parsed. 4. The method of claim 3, wherein the extracting comprises extracting links to content in the parsed predetermined fields. 5. The method of claim 1, wherein the building a manifest file comprises providing at least one line of metadata followed by one or more links. 6. The method of claim 1, further comprising: receiving a media segment file from the DASH server, the media segment file comprising media content. 7. The method of claim 6, further comprising: providing the media segment file to the HLS client. 8. The method of claim 7, wherein the providing the media segment comprises streaming media content to the HLS client at a first bitrate. 9. The method of claim 8, wherein the first bitrate is a lowest available bitrate. 10. The method of claim 8, the method further comprising: determining if the HLS client can receive a media segment at a higher bitrate, and if so, streaming media content to the HLS client at a second bitrate that is higher than the first bitrate. 11. A converter system comprising: a processor configured to load and execute instructions from a translator module; and said translator module configured to: receive a media presentation description (mpd) file from a DASH server; extract content from the mpd file; build a manifest file from the extracted content; and provide the manifest file to an HLS client. 12. The system of claim 11, wherein the converter system is in communication with said DASH server. 13. The system of claim 11, wherein the converter system is in communication with said HLS client. 14. The system of claim 13, wherein the converter system is integral to said HLS client. 15. The system of claim 11, wherein said extract comprises parsing content from the mpd file, wherein the content is provided in xml. 16. The system of claim 15, wherein predetermined fields in the mpd file are parsed. 17. The system of claim 15, wherein said extract comprises extracting links to content in the parsed predetermined fields. 18. The system of claim 1, wherein said build a manifest file comprises providing at least one line of metadata followed by one or more links. 19. The system of claim 11, wherein said translator module is further configured to: receive a media segment file from the DASH server, the media segment file comprising media content. 20. The system of claim 19, wherein said translator module is further configured to: provide the media segment file to the HLS client. 21. The system of claim 20, wherein said provide the media segment comprises streaming media content to the HLS client at a first bitrate. 22. The system of claim 21, wherein the first bitrate is a lowest available bitrate. 23. The system of claim 21, wherein said translator module is further configured to: determine if the HLS client can receive a media segment at a higher bitrate, and if so, stream media content to the HLS client at a second bitrate that is higher than the first bitrate. 24. The system of claim 23, wherein the translator module comprises an adaptive algorithm module to determine if the HLS client can receive a media segment at a higher bitrate.
Provided herein are systems and methods that allow for converting or translating Dynamic Adaptive Streaming over HTTP (DASH) to HTTP Live Streaming (HLS) and vice versa.1. A method of translating dynamic adaptive streaming over HTTP (DASH) to HTTP live streaming (HLS), the method comprising: receiving a media presentation description (mpd) file from a DASH server; extracting content from the mpd file; building a manifest file from the extracted content; and providing the manifest file to an HLS client. 2. The method of claim 1, wherein the extracting comprises parsing content from the mpd file, wherein the content is provided in xml. 3. The method of claim 2, wherein predetermined fields in the mpd file are parsed. 4. The method of claim 3, wherein the extracting comprises extracting links to content in the parsed predetermined fields. 5. The method of claim 1, wherein the building a manifest file comprises providing at least one line of metadata followed by one or more links. 6. The method of claim 1, further comprising: receiving a media segment file from the DASH server, the media segment file comprising media content. 7. The method of claim 6, further comprising: providing the media segment file to the HLS client. 8. The method of claim 7, wherein the providing the media segment comprises streaming media content to the HLS client at a first bitrate. 9. The method of claim 8, wherein the first bitrate is a lowest available bitrate. 10. The method of claim 8, the method further comprising: determining if the HLS client can receive a media segment at a higher bitrate, and if so, streaming media content to the HLS client at a second bitrate that is higher than the first bitrate. 11. A converter system comprising: a processor configured to load and execute instructions from a translator module; and said translator module configured to: receive a media presentation description (mpd) file from a DASH server; extract content from the mpd file; build a manifest file from the extracted content; and provide the manifest file to an HLS client. 12. The system of claim 11, wherein the converter system is in communication with said DASH server. 13. The system of claim 11, wherein the converter system is in communication with said HLS client. 14. The system of claim 13, wherein the converter system is integral to said HLS client. 15. The system of claim 11, wherein said extract comprises parsing content from the mpd file, wherein the content is provided in xml. 16. The system of claim 15, wherein predetermined fields in the mpd file are parsed. 17. The system of claim 15, wherein said extract comprises extracting links to content in the parsed predetermined fields. 18. The system of claim 1, wherein said build a manifest file comprises providing at least one line of metadata followed by one or more links. 19. The system of claim 11, wherein said translator module is further configured to: receive a media segment file from the DASH server, the media segment file comprising media content. 20. The system of claim 19, wherein said translator module is further configured to: provide the media segment file to the HLS client. 21. The system of claim 20, wherein said provide the media segment comprises streaming media content to the HLS client at a first bitrate. 22. The system of claim 21, wherein the first bitrate is a lowest available bitrate. 23. The system of claim 21, wherein said translator module is further configured to: determine if the HLS client can receive a media segment at a higher bitrate, and if so, stream media content to the HLS client at a second bitrate that is higher than the first bitrate. 24. The system of claim 23, wherein the translator module comprises an adaptive algorithm module to determine if the HLS client can receive a media segment at a higher bitrate.
2,400
8,004
8,004
15,160,886
2,481
The disclosure relates to a method and an apparatus for assisting a maneuvering procedure of a vehicle. In the course of a method for assisting a maneuvering procedure of a vehicle, image data relating to the environment of the vehicle are registered by using at least one vehicle-specific sensor provided on the vehicle, and on the basis of these image data a visual representation of the environment of the vehicle is transmitted to the driver, said method having the following steps: receiving further image data relating to the environment of the vehicle that were registered by at least one external sensor, linking the image data received from this external sensor with the image data registered by the at least one vehicle-specific sensor, and transmitting a visual representation of the environment of the vehicle to the driver on the basis of the linked image data.
1. A method for assisting a maneuvering procedure of a vehicle, wherein image data relating to the environment of the vehicle are registered by using at least one vehicle-specific sensor provided on the vehicle, and wherein on the basis of these image data a visual representation of the environment of the vehicle is transmitted to the driver, wherein the method has the following steps: receiving further image data relating to the environment of the vehicle, which were registered by at least one external sensor; linking the image data received from this external sensor with the image data registered by the at least one vehicle-specific sensor; and transmitting a visual representation of the environment of the vehicle to the driver on the basis of the linked image data. 2. The method as claimed in claim 1, wherein the receiving or linking of the further image data takes place after automatic set-up of a wireless communication between the vehicle and the external sensor. 3. The method as claimed in claim 1, wherein the receiving or linking of the further image data takes place only if the respective external sensor satisfies at least one predetermined criterion. 4. The method as claimed in claim 3, wherein the at least one predetermined criterion is a criterion relating to the relative position of the vehicle and the external sensor. 5. The method as claimed in claim 3, wherein the at least one predetermined criterion has been selected from the following group: existence of a direct line-of-sight connection between the vehicle and the external sensor; suitability of the external sensor for wireless transmission of the image data received from this external sensor to the vehicle; existence of a zone at least temporarily not capable of being registered by the at least one vehicle-specific sensor but capable of being registered by the external sensor. 6. The method as claimed in claim 1, wherein the at least one external sensor is a sensor provided on a separate vehicle. 7. The method as claimed in claim 1, wherein the at least one external sensor is a sensor provided on a traffic-infrastructure fixture. 8. The method as claimed in claim 1, wherein the at least one external sensor is a sensor provided on a mobile communications device. 9. The method as claimed in claim 1, wherein the transmitting of the visual representation of the environment of the vehicle to the driver takes place in the form of a 360° view. 10. An apparatus for assisting a maneuvering procedure of a vehicle, wherein the apparatus has been configured to implement a method as claimed in claim 1.
The disclosure relates to a method and an apparatus for assisting a maneuvering procedure of a vehicle. In the course of a method for assisting a maneuvering procedure of a vehicle, image data relating to the environment of the vehicle are registered by using at least one vehicle-specific sensor provided on the vehicle, and on the basis of these image data a visual representation of the environment of the vehicle is transmitted to the driver, said method having the following steps: receiving further image data relating to the environment of the vehicle that were registered by at least one external sensor, linking the image data received from this external sensor with the image data registered by the at least one vehicle-specific sensor, and transmitting a visual representation of the environment of the vehicle to the driver on the basis of the linked image data.1. A method for assisting a maneuvering procedure of a vehicle, wherein image data relating to the environment of the vehicle are registered by using at least one vehicle-specific sensor provided on the vehicle, and wherein on the basis of these image data a visual representation of the environment of the vehicle is transmitted to the driver, wherein the method has the following steps: receiving further image data relating to the environment of the vehicle, which were registered by at least one external sensor; linking the image data received from this external sensor with the image data registered by the at least one vehicle-specific sensor; and transmitting a visual representation of the environment of the vehicle to the driver on the basis of the linked image data. 2. The method as claimed in claim 1, wherein the receiving or linking of the further image data takes place after automatic set-up of a wireless communication between the vehicle and the external sensor. 3. The method as claimed in claim 1, wherein the receiving or linking of the further image data takes place only if the respective external sensor satisfies at least one predetermined criterion. 4. The method as claimed in claim 3, wherein the at least one predetermined criterion is a criterion relating to the relative position of the vehicle and the external sensor. 5. The method as claimed in claim 3, wherein the at least one predetermined criterion has been selected from the following group: existence of a direct line-of-sight connection between the vehicle and the external sensor; suitability of the external sensor for wireless transmission of the image data received from this external sensor to the vehicle; existence of a zone at least temporarily not capable of being registered by the at least one vehicle-specific sensor but capable of being registered by the external sensor. 6. The method as claimed in claim 1, wherein the at least one external sensor is a sensor provided on a separate vehicle. 7. The method as claimed in claim 1, wherein the at least one external sensor is a sensor provided on a traffic-infrastructure fixture. 8. The method as claimed in claim 1, wherein the at least one external sensor is a sensor provided on a mobile communications device. 9. The method as claimed in claim 1, wherein the transmitting of the visual representation of the environment of the vehicle to the driver takes place in the form of a 360° view. 10. An apparatus for assisting a maneuvering procedure of a vehicle, wherein the apparatus has been configured to implement a method as claimed in claim 1.
2,400
8,005
8,005
14,978,316
2,454
Disclosed in some examples are methods, systems, and devices which perform automatic selection of an application-layer communication protocol based upon one or more communication characteristics of the sending application and one or more characteristics of the network connection between the sending device and the recipient. The selection of which protocol to use may be made on a message-by-message basis, periodically at various intervals (e.g., every predetermined time period), once upon application initialization, or the like. By dynamically selecting an application-layer communications protocol, an application may leverage the advantages of a specific protocol given the communication characteristics of the application and characteristics of the network connection at that time.
1. A method for communicating with a remote device, the method comprising: using a computer processor and a network interface: discovering a set of supported application-layer communications protocols of the remote device; selecting one of the set of supported application-layer communications protocols as a selected application-layer communications protocol for a message received from a source application, based upon a characteristic of a computer network used to communicate with the remote device and a communication characteristic of the source application of the message; constructing the message according to the selected application-layer communications protocol; and transmitting the message to the remote device over the computer network using the selected application-layer communications protocol and the network interface. 2. The method of claim 1, comprising: receiving a second message for transmission to the remote device from the source application; selecting one of the set of supported application-layer communications protocols as a second selected application-layer communications protocol for the message based upon a new measurement of the characteristic of the computer network used to communicate with the remote device and the communication characteristic of the source application of the message; constructing the second message according to the second selected application-layer communications protocol; and transmitting the message to the remote device over the computer network, wherein the selected application-layer communications protocol used to construct and transmit the message is a different application-layer communications protocol than the second selected application-layer communications protocol used to construct the second message. 3. The method of claim 1, wherein the selected application-layer communications protocol is one of: a HyperText Transfer Protocol (HTTP), a Constrained Application Protocol (CoAP), MQ Telemetry Transport (MATT) protocol, and an OPC Unified Architecture (UA) protocol. 4. The method of claim 1, wherein discovering the set of supported application-layer communications protocols of the remote device comprises requesting available message brokers from the remote device using a Hypertext Transfer Protocol (HTTP) GET request. 5. The method of claim 1, wherein selecting one of the set of supported application-layer communications protocols of the remote device as the selected application-layer communications protocol based upon the characteristic of the network used to communicate with the remote device and the communication characteristic of the source application comprises: detecting the characteristic of the computer network; determining the communication characteristic of the source application; and selecting rows of a database matching the characteristic of the computer network and the communication characteristic of the source application; and selecting the application-layer communications protocol corresponding to a selected row that has a lowest transmission time. 6. The method of claim 5, wherein the characteristic of the computer network is one of: one way latency, two way latency, packet loss, jitter, bandwidth, bit-error rate, error rate, or availability. 7. The method of claim 5, wherein the communication characteristic is one of: one-way latency tolerance, two-way latency tolerance, packet loss tolerance, jitter tolerance, bandwidth requirements, whether an acknowledgement is required, bit-error rate tolerance, error rate tolerances, availability, whether the message needs to be delivered at least once, or whether the message may only be delivered once. 8. The method of claim 5, comprising, updating the database based upon a communication parameter of the transmitted message. 9. A device comprising: a processor; a network interface; a non-transitory machine readable medium, comprising instructions, which when performed by the processor, cause the processor to: discover a set of supported application-layer communications protocols of a remote device; select one of the set of supported application-layer communications protocols as a selected application-layer communications protocol for a message received from a source application, based upon a characteristic of a computer network used to communicate with the remote device and a communication characteristic of the source application of the message; construct the message according to the selected application-layer communications protocol; and transmit the message to the remote device over the computer network using the selected application-layer communications protocol and the network interface. 10. The device of claim 9, wherein the instructions comprise instructions to cause the processor to: receive a second message for transmission to the remote device from the source application; select one of the set of supported application-layer communications protocols as a second selected application-layer communications protocol for the message based upon a new measurement of the characteristic of the computer network used to communicate with the remote device and the communication characteristic of the source application of the message; construct the second message according to the second selected application-layer communications protocol; and transmit the message to the remote device over the computer network, wherein the selected application-layer communications protocol used to construct and transmit the message is a different application-layer communications protocol than the second selected application-layer communications protocol used to construct the second message. 11. The device of claim 9, wherein the selected application-layer communications protocol is one of: a HyperText Transfer Protocol (HTTP), a Constrained Application Protocol (CoAP), MQ Telemetry Transport (MQTT) protocol, and an OPC Unified Architecture (UA) protocol. 12. The device of claim 9, wherein the instructions that cause the processor to discover the set of supported application-layer communications protocols of the remote device comprises instructions to cause the processor to: request available message brokers from the remote device using a Hypertext Transfer Protocol (HTTP) GET request. 13. The device of claim 9, wherein the instructions that cause the processor to select one of the set of supported application-layer communications protocols of the remote device as the selected application-layer communications protocol based upon the characteristic of the network used to communicate with the remote device and the communication characteristic of the source application comprises the instructions to cause the processor to: detect the characteristic of the computer network; determine the communication characteristic of the source application; and select rows of a database matching the characteristic of the computer network and the communication characteristic of the source application; and select the application-layer communications protocol corresponding to a selected row that has a lowest transmission time. 14. The device of claim 13, wherein the characteristic of the computer network is one of: one way latency, two way latency, packet loss, jitter, bandwidth, bit-error rate, error rate, or availability. 15. The device of claim 13, wherein the communication characteristic is one of: one-way latency tolerance, two-way latency tolerance, packet loss tolerance, jitter tolerance, bandwidth requirements, whether an acknowledgement is required, bit-error rate tolerance, error rate tolerances, availability, whether the message needs to be delivered at least once, or whether the message may only be delivered once. 16. The device of claim 13, wherein the instructions comprise instructions to cause the processor to: update the database based upon a communication parameter of the transmitted message. 17. A non-transitory machine readable medium, comprising instructions, which when performed by the machine, cause the machine to: discover a set of supported application-layer communications protocols of a remote device; select one of the set of supported application-layer communications protocols as a selected application-layer communications protocol for a message received from a source application, based upon a characteristic of a computer network used to communicate with the remote device and a communication characteristic of the source application of the message; construct the message according to the selected application-layer communications protocol; and transmit the message to the remote device over the computer network using the selected application-layer communications protocol. 18. The non-transitory machine readable medium of claim 17, wherein the instructions comprise instructions to cause the processor to: receive a second message for transmission to the remote device from the source application; select one of the set of supported application-layer communications protocols as a second selected application-layer communications protocol for the message based upon a new measurement of the characteristic of the computer network used to communicate with the remote device and the communication characteristic of the source application of the message; construct the second message according to the second selected application-layer communications protocol; and transmit the message to the remote device over the computer network, wherein the selected application-layer communications protocol used to construct and transmit the message is a different application-layer communications protocol than the second selected application-layer communications protocol used to construct the second message. 19. The non-transitory machine readable medium of claim 17, wherein the selected application-layer communications protocol is one of: a HyperText Transfer Protocol (HTTP), a Constrained Application Protocol (CoAP), MQ Telemetry Transport (MQTT) protocol, and an OPC Unified Architecture (UA) protocol. 20. The non-transitory machine readable medium of claim 17, wherein the instructions that cause the processor to discover the set of supported application-layer communications protocols of the remote device comprises instructions to cause the processor to: requesting available message brokers from the remote device using a Hypertext Transfer Protocol (HTTP) GET request. 21. The non-transitory machine readable medium of claim 17, wherein the instructions that cause the processor to select one of the set of supported application-layer communications protocols of the remote device as the selected application-layer communications protocol based upon the characteristic of the network used to communicate with the remote device and the communication characteristic of the source application comprises instructions to cause the processor to: detect the characteristic of the computer network; determine the communication characteristic of the source application; and select rows of a database matching the characteristic of the computer network and the communication characteristic of the source application; and select the application-layer communications protocol corresponding to a selected row that has a lowest transmission time.
Disclosed in some examples are methods, systems, and devices which perform automatic selection of an application-layer communication protocol based upon one or more communication characteristics of the sending application and one or more characteristics of the network connection between the sending device and the recipient. The selection of which protocol to use may be made on a message-by-message basis, periodically at various intervals (e.g., every predetermined time period), once upon application initialization, or the like. By dynamically selecting an application-layer communications protocol, an application may leverage the advantages of a specific protocol given the communication characteristics of the application and characteristics of the network connection at that time.1. A method for communicating with a remote device, the method comprising: using a computer processor and a network interface: discovering a set of supported application-layer communications protocols of the remote device; selecting one of the set of supported application-layer communications protocols as a selected application-layer communications protocol for a message received from a source application, based upon a characteristic of a computer network used to communicate with the remote device and a communication characteristic of the source application of the message; constructing the message according to the selected application-layer communications protocol; and transmitting the message to the remote device over the computer network using the selected application-layer communications protocol and the network interface. 2. The method of claim 1, comprising: receiving a second message for transmission to the remote device from the source application; selecting one of the set of supported application-layer communications protocols as a second selected application-layer communications protocol for the message based upon a new measurement of the characteristic of the computer network used to communicate with the remote device and the communication characteristic of the source application of the message; constructing the second message according to the second selected application-layer communications protocol; and transmitting the message to the remote device over the computer network, wherein the selected application-layer communications protocol used to construct and transmit the message is a different application-layer communications protocol than the second selected application-layer communications protocol used to construct the second message. 3. The method of claim 1, wherein the selected application-layer communications protocol is one of: a HyperText Transfer Protocol (HTTP), a Constrained Application Protocol (CoAP), MQ Telemetry Transport (MATT) protocol, and an OPC Unified Architecture (UA) protocol. 4. The method of claim 1, wherein discovering the set of supported application-layer communications protocols of the remote device comprises requesting available message brokers from the remote device using a Hypertext Transfer Protocol (HTTP) GET request. 5. The method of claim 1, wherein selecting one of the set of supported application-layer communications protocols of the remote device as the selected application-layer communications protocol based upon the characteristic of the network used to communicate with the remote device and the communication characteristic of the source application comprises: detecting the characteristic of the computer network; determining the communication characteristic of the source application; and selecting rows of a database matching the characteristic of the computer network and the communication characteristic of the source application; and selecting the application-layer communications protocol corresponding to a selected row that has a lowest transmission time. 6. The method of claim 5, wherein the characteristic of the computer network is one of: one way latency, two way latency, packet loss, jitter, bandwidth, bit-error rate, error rate, or availability. 7. The method of claim 5, wherein the communication characteristic is one of: one-way latency tolerance, two-way latency tolerance, packet loss tolerance, jitter tolerance, bandwidth requirements, whether an acknowledgement is required, bit-error rate tolerance, error rate tolerances, availability, whether the message needs to be delivered at least once, or whether the message may only be delivered once. 8. The method of claim 5, comprising, updating the database based upon a communication parameter of the transmitted message. 9. A device comprising: a processor; a network interface; a non-transitory machine readable medium, comprising instructions, which when performed by the processor, cause the processor to: discover a set of supported application-layer communications protocols of a remote device; select one of the set of supported application-layer communications protocols as a selected application-layer communications protocol for a message received from a source application, based upon a characteristic of a computer network used to communicate with the remote device and a communication characteristic of the source application of the message; construct the message according to the selected application-layer communications protocol; and transmit the message to the remote device over the computer network using the selected application-layer communications protocol and the network interface. 10. The device of claim 9, wherein the instructions comprise instructions to cause the processor to: receive a second message for transmission to the remote device from the source application; select one of the set of supported application-layer communications protocols as a second selected application-layer communications protocol for the message based upon a new measurement of the characteristic of the computer network used to communicate with the remote device and the communication characteristic of the source application of the message; construct the second message according to the second selected application-layer communications protocol; and transmit the message to the remote device over the computer network, wherein the selected application-layer communications protocol used to construct and transmit the message is a different application-layer communications protocol than the second selected application-layer communications protocol used to construct the second message. 11. The device of claim 9, wherein the selected application-layer communications protocol is one of: a HyperText Transfer Protocol (HTTP), a Constrained Application Protocol (CoAP), MQ Telemetry Transport (MQTT) protocol, and an OPC Unified Architecture (UA) protocol. 12. The device of claim 9, wherein the instructions that cause the processor to discover the set of supported application-layer communications protocols of the remote device comprises instructions to cause the processor to: request available message brokers from the remote device using a Hypertext Transfer Protocol (HTTP) GET request. 13. The device of claim 9, wherein the instructions that cause the processor to select one of the set of supported application-layer communications protocols of the remote device as the selected application-layer communications protocol based upon the characteristic of the network used to communicate with the remote device and the communication characteristic of the source application comprises the instructions to cause the processor to: detect the characteristic of the computer network; determine the communication characteristic of the source application; and select rows of a database matching the characteristic of the computer network and the communication characteristic of the source application; and select the application-layer communications protocol corresponding to a selected row that has a lowest transmission time. 14. The device of claim 13, wherein the characteristic of the computer network is one of: one way latency, two way latency, packet loss, jitter, bandwidth, bit-error rate, error rate, or availability. 15. The device of claim 13, wherein the communication characteristic is one of: one-way latency tolerance, two-way latency tolerance, packet loss tolerance, jitter tolerance, bandwidth requirements, whether an acknowledgement is required, bit-error rate tolerance, error rate tolerances, availability, whether the message needs to be delivered at least once, or whether the message may only be delivered once. 16. The device of claim 13, wherein the instructions comprise instructions to cause the processor to: update the database based upon a communication parameter of the transmitted message. 17. A non-transitory machine readable medium, comprising instructions, which when performed by the machine, cause the machine to: discover a set of supported application-layer communications protocols of a remote device; select one of the set of supported application-layer communications protocols as a selected application-layer communications protocol for a message received from a source application, based upon a characteristic of a computer network used to communicate with the remote device and a communication characteristic of the source application of the message; construct the message according to the selected application-layer communications protocol; and transmit the message to the remote device over the computer network using the selected application-layer communications protocol. 18. The non-transitory machine readable medium of claim 17, wherein the instructions comprise instructions to cause the processor to: receive a second message for transmission to the remote device from the source application; select one of the set of supported application-layer communications protocols as a second selected application-layer communications protocol for the message based upon a new measurement of the characteristic of the computer network used to communicate with the remote device and the communication characteristic of the source application of the message; construct the second message according to the second selected application-layer communications protocol; and transmit the message to the remote device over the computer network, wherein the selected application-layer communications protocol used to construct and transmit the message is a different application-layer communications protocol than the second selected application-layer communications protocol used to construct the second message. 19. The non-transitory machine readable medium of claim 17, wherein the selected application-layer communications protocol is one of: a HyperText Transfer Protocol (HTTP), a Constrained Application Protocol (CoAP), MQ Telemetry Transport (MQTT) protocol, and an OPC Unified Architecture (UA) protocol. 20. The non-transitory machine readable medium of claim 17, wherein the instructions that cause the processor to discover the set of supported application-layer communications protocols of the remote device comprises instructions to cause the processor to: requesting available message brokers from the remote device using a Hypertext Transfer Protocol (HTTP) GET request. 21. The non-transitory machine readable medium of claim 17, wherein the instructions that cause the processor to select one of the set of supported application-layer communications protocols of the remote device as the selected application-layer communications protocol based upon the characteristic of the network used to communicate with the remote device and the communication characteristic of the source application comprises instructions to cause the processor to: detect the characteristic of the computer network; determine the communication characteristic of the source application; and select rows of a database matching the characteristic of the computer network and the communication characteristic of the source application; and select the application-layer communications protocol corresponding to a selected row that has a lowest transmission time.
2,400
8,006
8,006
15,597,435
2,456
Disclosed are various embodiments for accessing resources when a client device complies with distribution rules. A client device receives selected resources and distribution rules associated with the resources. The client device determines whether the client device complies with the distribution rules. When the resources are modified, the changes are sent to a distribution service associated with the resources.
1. A system for modifying securely managed resources comprising: at least one memory; and a client device in communication with the at least one memory, the client device configured to at least: transmit a request to access a distribution service associated with a plurality of resources; receive at least one resource selected from the plurality of resources for provisioning to the client device; receive at least one distribution rule associated with the at least one resource; determine, for the at least one resource, whether the client device complies with the at least one distribution rule associated with the at least one resource; determine whether the at least one resource was modified on the client device to generate a modified at least one resource; responsive to the at least one resource being modified, store the modified at least one resource in the at least one memory accessible to the client device; send a request to the client device to transmit the modified at least one resource to the distribution service; and cause the modified at least one resource to be transmitted to the distribution service. 2. The system of claim 1, wherein the at least one resource is selected by the distribution service by at least: identifying at least one resource grouping identifier associated with the client device or a user of the client device; and identifying, based at least in part on the identified at least one resource grouping identifier, at least one particular resource associated with the at least one resource grouping identifiers. 3. The system of claim 1, wherein the client device is further configured to at least: determine that the at least one distribution rule requires additional authorization to access the at least one resource; and render a prompt for additional authorization credentials via a display associated with the client device. 4. The system of claim 1, wherein the client device is further configured to at least determine, on a periodic basis, whether the at least one resource was modified. 5. The system of claim 1, wherein the client device is further configured to at least: store the at least one distribution rule associated with the at least one resource in the at least one memory; transmit a second request to access the distribution service associated with the plurality of resources; and transmit an indication to the distribution service that the client device complies with the at least one distribution rule stored in the at least one memory. 6. The system of claim 1, wherein the client device is further configured to at least render the at least one resource via a display associated with the client device. 7. The system of claim 1, wherein the client device is further configured to at least determine whether the client device and a user account associated with the client device are authorized to access the at least one resource, wherein the at least one distribution rule is received responsive to the client device and the user account being authorized to access the at least one resource. 8. A method comprising: transmitting, by a client device, a request to access a distribution service associated with a plurality of resources; receiving, by the client device, at least one resource selected from the plurality of resources for provisioning to the client device; receiving, by the client device, at least one distribution rule associated with the at least one resource; determining, by the client device, for the at least one resource, whether the client device complies with the at least one distribution rule associated with the at least one resource; determining, by the client device, whether the at least one resource was modified on the client device to generated a modified at least one resource; in response to the at least one resource being modified and complying with the at least one distribution rule, storing, by the client device, the modified at least one resource in a memory accessible to the client device; sending, by the client device, a request to the client device to transmit the modified at least one resource to the distribution service; and causing, by the client device, the modified at least one resource to be transmitted to the distribution service. 9. The method of claim 8, wherein the at least one resource is selected by the distribution service by at least: identifying at least one resource grouping identifier associated with the client device or a user of the client device; and identifying, based at least in part on the identified at least one resource grouping identifier, at least one particular resource associated with the at least one resource grouping identifiers. 10. The method of claim 8, further comprising: determining, by the client device, that the at least one distribution requires additional authorization to access the at least one resource; and rendering, by the client device, a prompt for additional authorization credentials via a display associated with the client device. 11. The method of claim 8, further comprising periodically determining, by the client device, whether the at least one resource was modified. 12. The method of claim 8, further comprising: storing, by the client device, the at least one distribution rule associated with the at least one resource in the memory; transmitting, by the client device, a second request to access the distribution service associated with the plurality of resources; and transmitting, by the client device, an indication to the distribution service that the client device complies with the at least one distribution rule stored in the memory. 13. The method of claim 8, further comprising rendering, by the client device, the at least one resource via a display associated with the client device. 14. The method of claim 8, further comprising determining, by the client device, whether the client device and a user account associated with the client device are authorized to access the at least one resource, wherein the at least one distribution rule is received responsive to the client device and the user account being authorized to access the at least one resource. 15. A non-transitory computer-readable medium embodying a program that, when executed by a client device, causes the client device to at least: transmit a request to access a distribution service associated with a plurality of resources; receive at least one resource selected from the plurality of resources for provisioning to the client device; receive at least one distribution rule associated with the at least one resource; determine for the at least one resource, whether the client device complies with the at least one distribution rule associated with the at least one resource; determine whether the at least one resource was modified on the client device to generated a modified at least one resource; responsive to the at least one resource being modified, store the modified at least one resource in a memory accessible to the client device; send a request to the client device to transmit the modified at least one resource to the distribution service; and cause the modified at least one resource to be transmitted to the distribution service. 16. The non-transitory computer-readable medium of claim 15, wherein the at least one resource is selected by the distribution service by at least: identifying at least one resource grouping identifier associated with the client device or a user of the client device; and identifying, based at least in part on the identified at least one resource grouping identifier, at least one particular resource associated with the at least one resource grouping identifiers. 17. The non-transitory computer-readable medium of claim 15, wherein the program further causes the client device to at least: determine that the at least one distribution requires additional authorization to access the at least one resource; and render a prompt for additional authorization credentials via a display associated with the client device. 18. The non-transitory computer-readable medium of claim 15, wherein the program further causes the client device to at least determine, on a periodic basis, whether the at least one resource was modified. 19. The non-transitory computer-readable medium of claim 15, wherein the program further causes the client device to at least: store the at least one distribution rule associated with the at least one resource in the memory; transmit a second request to access the distribution service associated with the plurality of resources; and transmit an indication to the distribution service that the client device complies with the at least one distribution rule stored in the memory. 20. The non-transitory computer-readable medium of claim 15, wherein the program further causes the client device to at least determine whether the client device and a user account associated with the client device are authorized to access the at least one resource, wherein the at least one distribution rule is received responsive to the client device and the user account being authorized to access the at least one resource.
Disclosed are various embodiments for accessing resources when a client device complies with distribution rules. A client device receives selected resources and distribution rules associated with the resources. The client device determines whether the client device complies with the distribution rules. When the resources are modified, the changes are sent to a distribution service associated with the resources.1. A system for modifying securely managed resources comprising: at least one memory; and a client device in communication with the at least one memory, the client device configured to at least: transmit a request to access a distribution service associated with a plurality of resources; receive at least one resource selected from the plurality of resources for provisioning to the client device; receive at least one distribution rule associated with the at least one resource; determine, for the at least one resource, whether the client device complies with the at least one distribution rule associated with the at least one resource; determine whether the at least one resource was modified on the client device to generate a modified at least one resource; responsive to the at least one resource being modified, store the modified at least one resource in the at least one memory accessible to the client device; send a request to the client device to transmit the modified at least one resource to the distribution service; and cause the modified at least one resource to be transmitted to the distribution service. 2. The system of claim 1, wherein the at least one resource is selected by the distribution service by at least: identifying at least one resource grouping identifier associated with the client device or a user of the client device; and identifying, based at least in part on the identified at least one resource grouping identifier, at least one particular resource associated with the at least one resource grouping identifiers. 3. The system of claim 1, wherein the client device is further configured to at least: determine that the at least one distribution rule requires additional authorization to access the at least one resource; and render a prompt for additional authorization credentials via a display associated with the client device. 4. The system of claim 1, wherein the client device is further configured to at least determine, on a periodic basis, whether the at least one resource was modified. 5. The system of claim 1, wherein the client device is further configured to at least: store the at least one distribution rule associated with the at least one resource in the at least one memory; transmit a second request to access the distribution service associated with the plurality of resources; and transmit an indication to the distribution service that the client device complies with the at least one distribution rule stored in the at least one memory. 6. The system of claim 1, wherein the client device is further configured to at least render the at least one resource via a display associated with the client device. 7. The system of claim 1, wherein the client device is further configured to at least determine whether the client device and a user account associated with the client device are authorized to access the at least one resource, wherein the at least one distribution rule is received responsive to the client device and the user account being authorized to access the at least one resource. 8. A method comprising: transmitting, by a client device, a request to access a distribution service associated with a plurality of resources; receiving, by the client device, at least one resource selected from the plurality of resources for provisioning to the client device; receiving, by the client device, at least one distribution rule associated with the at least one resource; determining, by the client device, for the at least one resource, whether the client device complies with the at least one distribution rule associated with the at least one resource; determining, by the client device, whether the at least one resource was modified on the client device to generated a modified at least one resource; in response to the at least one resource being modified and complying with the at least one distribution rule, storing, by the client device, the modified at least one resource in a memory accessible to the client device; sending, by the client device, a request to the client device to transmit the modified at least one resource to the distribution service; and causing, by the client device, the modified at least one resource to be transmitted to the distribution service. 9. The method of claim 8, wherein the at least one resource is selected by the distribution service by at least: identifying at least one resource grouping identifier associated with the client device or a user of the client device; and identifying, based at least in part on the identified at least one resource grouping identifier, at least one particular resource associated with the at least one resource grouping identifiers. 10. The method of claim 8, further comprising: determining, by the client device, that the at least one distribution requires additional authorization to access the at least one resource; and rendering, by the client device, a prompt for additional authorization credentials via a display associated with the client device. 11. The method of claim 8, further comprising periodically determining, by the client device, whether the at least one resource was modified. 12. The method of claim 8, further comprising: storing, by the client device, the at least one distribution rule associated with the at least one resource in the memory; transmitting, by the client device, a second request to access the distribution service associated with the plurality of resources; and transmitting, by the client device, an indication to the distribution service that the client device complies with the at least one distribution rule stored in the memory. 13. The method of claim 8, further comprising rendering, by the client device, the at least one resource via a display associated with the client device. 14. The method of claim 8, further comprising determining, by the client device, whether the client device and a user account associated with the client device are authorized to access the at least one resource, wherein the at least one distribution rule is received responsive to the client device and the user account being authorized to access the at least one resource. 15. A non-transitory computer-readable medium embodying a program that, when executed by a client device, causes the client device to at least: transmit a request to access a distribution service associated with a plurality of resources; receive at least one resource selected from the plurality of resources for provisioning to the client device; receive at least one distribution rule associated with the at least one resource; determine for the at least one resource, whether the client device complies with the at least one distribution rule associated with the at least one resource; determine whether the at least one resource was modified on the client device to generated a modified at least one resource; responsive to the at least one resource being modified, store the modified at least one resource in a memory accessible to the client device; send a request to the client device to transmit the modified at least one resource to the distribution service; and cause the modified at least one resource to be transmitted to the distribution service. 16. The non-transitory computer-readable medium of claim 15, wherein the at least one resource is selected by the distribution service by at least: identifying at least one resource grouping identifier associated with the client device or a user of the client device; and identifying, based at least in part on the identified at least one resource grouping identifier, at least one particular resource associated with the at least one resource grouping identifiers. 17. The non-transitory computer-readable medium of claim 15, wherein the program further causes the client device to at least: determine that the at least one distribution requires additional authorization to access the at least one resource; and render a prompt for additional authorization credentials via a display associated with the client device. 18. The non-transitory computer-readable medium of claim 15, wherein the program further causes the client device to at least determine, on a periodic basis, whether the at least one resource was modified. 19. The non-transitory computer-readable medium of claim 15, wherein the program further causes the client device to at least: store the at least one distribution rule associated with the at least one resource in the memory; transmit a second request to access the distribution service associated with the plurality of resources; and transmit an indication to the distribution service that the client device complies with the at least one distribution rule stored in the memory. 20. The non-transitory computer-readable medium of claim 15, wherein the program further causes the client device to at least determine whether the client device and a user account associated with the client device are authorized to access the at least one resource, wherein the at least one distribution rule is received responsive to the client device and the user account being authorized to access the at least one resource.
2,400
8,007
8,007
14,500,526
2,449
Described are systems and methods for transferring calls between multiple stations. An exemplary system includes a first station and a second station that establishes a first communication session having a first call identification with the first station. The system further includes a third station and a network device that includes stored data indicating a relationship between the first station and the third station, the network device configured to receive the first call identification from the first station and transmit the first call identification to the third station based on the relationship, wherein the third station is configured to receive the first call identification and send an invite to the second station to replace the first communication session with the first station with a second communication session with the third station, the invite including the first call identification and a second call identification that identifies the second communication session.
1. A system, comprising: a first station; a second station that establishes a first communication session with the first station, the first communication session having a first call identification that identifies the first communication session; a third station; and a network device that includes stored data indicating a relationship between the first station and the third station, the network device configured to receive the first call identification from the first station and transmit the first call identification to the third station based on the relationship, wherein the third station is configured to receive the first call identification and send an invite to the second station to replace the first communication session with the first station with a second communication session with the third station, the invite including the first call identification and a second call identification that identifies the second communication session. 2. The system of claim 1, wherein the second station is configured to terminate the first communication session based on receiving the invite. 3. The system of claim 1, wherein the third station is configured to transmit the second call identification to the network device when the second communication session is established. 4. The system of claim 3, wherein the network device is configured to transmit the second call identification to the first station. 5. The system of claim 4, wherein the first station is configured to send a further invite to the second station to replace the second communication session with the third station with a third communication session with the first station, the further invite including the second call identification and a third call identification that identifies the third communication session. 6. The system of claim 1, further comprising: a fourth station that is related to the first and third stations based on information stored in the network device, wherein the network device is further configured to transmit the first call identification to the fourth station substantially simultaneously with transmitting the first call identification to the third station. 7. The system of claim 1, wherein the network device stores a database of user accounts, wherein each of the first and third stations transmit information to the network device that relates each of the first and third stations with one of the user accounts, the relationship between the first and third stations being based relating to the one of the user accounts. 8. A method comprising: at a first station: receiving a first call identification of a first communication session between a second station and a third station, wherein the first call identification is received from a network device based on information stored at the network device indicating the first station is related to the second station; receiving an input indicating the first communication session is to be transferred from the second station to the first station; transmitting an invite including the first call identification and a second call identification to the third station, wherein the invite indicates to the third station that the first communication session with the second station is to be terminated and a second communication session with the first station is to be established, wherein the second communication session is identified by the second call identification; and establishing the second communication session with the third station. 9. The method of claim 8, wherein the first station establishes the relation to the second station by: transmitting user information to the network device to generate a user account; and transmitting first station information of the first station to relate the first station with the user account. 10. The method of claim 9, wherein the first station is related to the second station based on the second station transmitting second station information to the network device to relate the second station with the user account. 11. The method of claim 8, further comprising: transmitting the second call identification to the network device upon the second communication session being established. 12. A method, comprising: at a first station: establishing a first communication session with a second station, wherein the first communication session is identified by a first call identification; transmitting the first call identification to a network device, wherein the network device propagates the first call identification to a third station, the first and third stations being related based on information stored at the network device; and terminating the first communication session with the second station when the first communication session is replaced by a second communication session between the third station and the second station, wherein the second communication session is established by the third station transmitting a transfer invite including the first call identification to the second station. 13. The method of claim 12, wherein establishing the first communication session includes: transmitting an invite to the second station for the first communication session to be performed; receiving a response to the invite from the second station, the response including the first call identification to be used for the communication session; and transmitting an acknowledgement to the second station indicating the response was received and the first call identification is acknowledged. 14. The method of claim 12, wherein establishing the first communication session includes: receiving an invite from the second station for the first communication session to be performed, the invite also being received by the third station based upon the relation between the first and third stations. 15. The method of claim 14, wherein establishing the first communication session includes: generating the first call identification to identify the first communication session; transmitting a response to the invite to the second station, the response including the first call identification to identify the communication session; and receiving an acknowledgement from the second station indicating the response was received and the call identification is acknowledged. 16. The method of claim 12, further comprising: transmitting user information to the network device to generate a user account; and transmitting first station information of the first station to relate the first station with the user account. 17. The method of claim 16, further comprising: at the second station: transmitting second station information of the second station to relate the second station with the user account, the network device relating the first station with the second station based on the first and second stations being related to the user account. 18. The method of claim 12, further comprising: after the communication session has been terminated, receiving a second call identification identifying the second communication session from the network device based on the relation between the first station and the third station. 19. The method of claim 17, further comprising: at a fourth station: transmitting fourth station information of the fourth station to the network device to relate the fourth station with the user account, the network device relating the fourth station with the first and third stations.
Described are systems and methods for transferring calls between multiple stations. An exemplary system includes a first station and a second station that establishes a first communication session having a first call identification with the first station. The system further includes a third station and a network device that includes stored data indicating a relationship between the first station and the third station, the network device configured to receive the first call identification from the first station and transmit the first call identification to the third station based on the relationship, wherein the third station is configured to receive the first call identification and send an invite to the second station to replace the first communication session with the first station with a second communication session with the third station, the invite including the first call identification and a second call identification that identifies the second communication session.1. A system, comprising: a first station; a second station that establishes a first communication session with the first station, the first communication session having a first call identification that identifies the first communication session; a third station; and a network device that includes stored data indicating a relationship between the first station and the third station, the network device configured to receive the first call identification from the first station and transmit the first call identification to the third station based on the relationship, wherein the third station is configured to receive the first call identification and send an invite to the second station to replace the first communication session with the first station with a second communication session with the third station, the invite including the first call identification and a second call identification that identifies the second communication session. 2. The system of claim 1, wherein the second station is configured to terminate the first communication session based on receiving the invite. 3. The system of claim 1, wherein the third station is configured to transmit the second call identification to the network device when the second communication session is established. 4. The system of claim 3, wherein the network device is configured to transmit the second call identification to the first station. 5. The system of claim 4, wherein the first station is configured to send a further invite to the second station to replace the second communication session with the third station with a third communication session with the first station, the further invite including the second call identification and a third call identification that identifies the third communication session. 6. The system of claim 1, further comprising: a fourth station that is related to the first and third stations based on information stored in the network device, wherein the network device is further configured to transmit the first call identification to the fourth station substantially simultaneously with transmitting the first call identification to the third station. 7. The system of claim 1, wherein the network device stores a database of user accounts, wherein each of the first and third stations transmit information to the network device that relates each of the first and third stations with one of the user accounts, the relationship between the first and third stations being based relating to the one of the user accounts. 8. A method comprising: at a first station: receiving a first call identification of a first communication session between a second station and a third station, wherein the first call identification is received from a network device based on information stored at the network device indicating the first station is related to the second station; receiving an input indicating the first communication session is to be transferred from the second station to the first station; transmitting an invite including the first call identification and a second call identification to the third station, wherein the invite indicates to the third station that the first communication session with the second station is to be terminated and a second communication session with the first station is to be established, wherein the second communication session is identified by the second call identification; and establishing the second communication session with the third station. 9. The method of claim 8, wherein the first station establishes the relation to the second station by: transmitting user information to the network device to generate a user account; and transmitting first station information of the first station to relate the first station with the user account. 10. The method of claim 9, wherein the first station is related to the second station based on the second station transmitting second station information to the network device to relate the second station with the user account. 11. The method of claim 8, further comprising: transmitting the second call identification to the network device upon the second communication session being established. 12. A method, comprising: at a first station: establishing a first communication session with a second station, wherein the first communication session is identified by a first call identification; transmitting the first call identification to a network device, wherein the network device propagates the first call identification to a third station, the first and third stations being related based on information stored at the network device; and terminating the first communication session with the second station when the first communication session is replaced by a second communication session between the third station and the second station, wherein the second communication session is established by the third station transmitting a transfer invite including the first call identification to the second station. 13. The method of claim 12, wherein establishing the first communication session includes: transmitting an invite to the second station for the first communication session to be performed; receiving a response to the invite from the second station, the response including the first call identification to be used for the communication session; and transmitting an acknowledgement to the second station indicating the response was received and the first call identification is acknowledged. 14. The method of claim 12, wherein establishing the first communication session includes: receiving an invite from the second station for the first communication session to be performed, the invite also being received by the third station based upon the relation between the first and third stations. 15. The method of claim 14, wherein establishing the first communication session includes: generating the first call identification to identify the first communication session; transmitting a response to the invite to the second station, the response including the first call identification to identify the communication session; and receiving an acknowledgement from the second station indicating the response was received and the call identification is acknowledged. 16. The method of claim 12, further comprising: transmitting user information to the network device to generate a user account; and transmitting first station information of the first station to relate the first station with the user account. 17. The method of claim 16, further comprising: at the second station: transmitting second station information of the second station to relate the second station with the user account, the network device relating the first station with the second station based on the first and second stations being related to the user account. 18. The method of claim 12, further comprising: after the communication session has been terminated, receiving a second call identification identifying the second communication session from the network device based on the relation between the first station and the third station. 19. The method of claim 17, further comprising: at a fourth station: transmitting fourth station information of the fourth station to the network device to relate the fourth station with the user account, the network device relating the fourth station with the first and third stations.
2,400
8,008
8,008
13,348,510
2,483
Innovations described herein provide a framework for advertising encoder capabilities, initializing encoder configuration, and signaling run-time control messages for video coding and decoding. For example, an encoding controller receives a request for encoder capability data from a decoding host controller, determines the capability data, and sends the capability data in reply. The capability data can include data that indicate a number of bitstreams, each providing an alternative version of input video, as well as data that indicate scalable video coding capabilities. The decoding host controller creates stream configuration request data based on the encoder capability data, and sends the configuration request data to the encoding controller. During decoding, the decoding host controller can create and send a control message for run-time control of encoding, where the control message includes a stream identifier for a bitstream and layer identifiers for a given layer of the bitstream.
1. In a computing system that implements an encoding controller, a method comprising: receiving a request for encoder capability data; with the computing system that implements the encoding controller, determining the encoder capability data, the encoder capability data including (1) data that indicate a number of bitstreams each providing an alternative version of input video, and (2) data that indicate scalable video coding capabilities for encoding of the bitstreams; and sending the encoder capability data. 2. The method of claim 1 wherein the request is received as part of a function call from a decoding host controller, and wherein the encoder capability data are sent as part of a reply to the decoding host controller. 3. The method of claim 1 wherein the number of bitstreams is a maximum number of bitstreams, wherein each of the bitstreams can be encoded as a scalable bitstream or non-scalable bitstream, and wherein the scalable video coding capabilities apply for all of the bitstreams. 4. The method of claim 1 wherein the encoder capability data further include data that indicate computational limits for the encoding of the bitstreams. 5. The method of claim 4 wherein the computational limits are parameterized in terms of macroblocks per second. 6. The method of claim 4 wherein the computational limits are organized in an array having multiple indices, the multiple indices including a first index for number of spatial resolutions and a second index for degree of scalability. 7. The method of claim 1 wherein the encoder capability data further include data that indicate spatial resolution and/or frame rate of the input video. 8. A computer-readable medium storing computer-executable instructions for causing a computing system programmed thereby to perform a method comprising: determining encoder capability data; creating stream configuration request data based at least in part on the encoder capability data, the stream configuration request data including (1) data that indicate a number of bitstreams each providing an alternative version of input video, and (2) data that indicate scalable video coding options for the bitstreams; and sending the stream configuration request data. 9. The computer-readable medium of claim 8 wherein the encoder capability data are received from an encoding controller, and wherein the stream configuration request data are sent as part of a function call to the encoding controller. 10. The computer-readable medium of claim 8 wherein the number of bitstreams is a target number of bitstreams, wherein each of the bitstreams can be encoded as a scalable bitstream or non-scalable bitstream, and wherein the scalable video coding options are indicated separately for each of the bitstreams. 11. The computer-readable medium of claim 8 wherein the stream configuration request data are based at least in part on data, in the encoder capability data, that indicate computational limits for encoding. 12. The computer-readable medium of claim 8 wherein the data that indicate the scalable video coding options includes, for each of the bitstreams: spatial resolution for a base layer of the bitstream; number of temporal enhancement layers of the bitstream; and one or more attributes for signal to noise ratio (SNR) enhancement layers at the spatial resolution for the base layer of the bitstream. 13. The computer-readable medium of claim 12 wherein the data that indicate the scalable video coding options further include, for each of the bitstreams, for an additional enhancement layer of the bitstream: an upscaling ratio to reach a spatial resolution for the additional enhancement layer; and one or more attributes of SNR enhancement layers at the spatial resolution for the additional enhancement layer. 14. A computing system that implements a decoding host controller, the computing system including a processor, memory and storage that stores computer-executable instructions for causing the computing system to perform a method comprising: during decoding of encoded video data of a bitstream, creating a control message for run-time control of encoding for the bitstream, wherein the control message includes layer identifier data, the layer identifier data including a stream identifier of the bitstream and a layer identifier of a given layer of the bitstream; and sending the control message. 15. The computing system of claim 14 wherein the control message is a request to insert a synchronization picture for the given layer of the bitstream. 16. The computing system of claim 14 wherein the control message is a request to change spatial resolution for the given layer of the bitstream. 17. The computing system of claim 14 wherein the control message is a request to set a priority identifier for the given layer of the bitstream. 18. The computing system of claim 14 wherein the control message is a request to set quantization parameters and/or rate control parameters for the given layer of the bitstream. 19. The computing system of claim 14 wherein the control message is a request to start streaming of a subset of the bitstream, the subset including encoded video data for the given layer of the bitstream and any layers upon which the given layer depends. 20. The computing system of claim 14 wherein the control message is a request to stop streaming of a subset of the bitstream, the subset including encoded video data for the given layer of the bitstream and any higher layers of the bitstream.
Innovations described herein provide a framework for advertising encoder capabilities, initializing encoder configuration, and signaling run-time control messages for video coding and decoding. For example, an encoding controller receives a request for encoder capability data from a decoding host controller, determines the capability data, and sends the capability data in reply. The capability data can include data that indicate a number of bitstreams, each providing an alternative version of input video, as well as data that indicate scalable video coding capabilities. The decoding host controller creates stream configuration request data based on the encoder capability data, and sends the configuration request data to the encoding controller. During decoding, the decoding host controller can create and send a control message for run-time control of encoding, where the control message includes a stream identifier for a bitstream and layer identifiers for a given layer of the bitstream.1. In a computing system that implements an encoding controller, a method comprising: receiving a request for encoder capability data; with the computing system that implements the encoding controller, determining the encoder capability data, the encoder capability data including (1) data that indicate a number of bitstreams each providing an alternative version of input video, and (2) data that indicate scalable video coding capabilities for encoding of the bitstreams; and sending the encoder capability data. 2. The method of claim 1 wherein the request is received as part of a function call from a decoding host controller, and wherein the encoder capability data are sent as part of a reply to the decoding host controller. 3. The method of claim 1 wherein the number of bitstreams is a maximum number of bitstreams, wherein each of the bitstreams can be encoded as a scalable bitstream or non-scalable bitstream, and wherein the scalable video coding capabilities apply for all of the bitstreams. 4. The method of claim 1 wherein the encoder capability data further include data that indicate computational limits for the encoding of the bitstreams. 5. The method of claim 4 wherein the computational limits are parameterized in terms of macroblocks per second. 6. The method of claim 4 wherein the computational limits are organized in an array having multiple indices, the multiple indices including a first index for number of spatial resolutions and a second index for degree of scalability. 7. The method of claim 1 wherein the encoder capability data further include data that indicate spatial resolution and/or frame rate of the input video. 8. A computer-readable medium storing computer-executable instructions for causing a computing system programmed thereby to perform a method comprising: determining encoder capability data; creating stream configuration request data based at least in part on the encoder capability data, the stream configuration request data including (1) data that indicate a number of bitstreams each providing an alternative version of input video, and (2) data that indicate scalable video coding options for the bitstreams; and sending the stream configuration request data. 9. The computer-readable medium of claim 8 wherein the encoder capability data are received from an encoding controller, and wherein the stream configuration request data are sent as part of a function call to the encoding controller. 10. The computer-readable medium of claim 8 wherein the number of bitstreams is a target number of bitstreams, wherein each of the bitstreams can be encoded as a scalable bitstream or non-scalable bitstream, and wherein the scalable video coding options are indicated separately for each of the bitstreams. 11. The computer-readable medium of claim 8 wherein the stream configuration request data are based at least in part on data, in the encoder capability data, that indicate computational limits for encoding. 12. The computer-readable medium of claim 8 wherein the data that indicate the scalable video coding options includes, for each of the bitstreams: spatial resolution for a base layer of the bitstream; number of temporal enhancement layers of the bitstream; and one or more attributes for signal to noise ratio (SNR) enhancement layers at the spatial resolution for the base layer of the bitstream. 13. The computer-readable medium of claim 12 wherein the data that indicate the scalable video coding options further include, for each of the bitstreams, for an additional enhancement layer of the bitstream: an upscaling ratio to reach a spatial resolution for the additional enhancement layer; and one or more attributes of SNR enhancement layers at the spatial resolution for the additional enhancement layer. 14. A computing system that implements a decoding host controller, the computing system including a processor, memory and storage that stores computer-executable instructions for causing the computing system to perform a method comprising: during decoding of encoded video data of a bitstream, creating a control message for run-time control of encoding for the bitstream, wherein the control message includes layer identifier data, the layer identifier data including a stream identifier of the bitstream and a layer identifier of a given layer of the bitstream; and sending the control message. 15. The computing system of claim 14 wherein the control message is a request to insert a synchronization picture for the given layer of the bitstream. 16. The computing system of claim 14 wherein the control message is a request to change spatial resolution for the given layer of the bitstream. 17. The computing system of claim 14 wherein the control message is a request to set a priority identifier for the given layer of the bitstream. 18. The computing system of claim 14 wherein the control message is a request to set quantization parameters and/or rate control parameters for the given layer of the bitstream. 19. The computing system of claim 14 wherein the control message is a request to start streaming of a subset of the bitstream, the subset including encoded video data for the given layer of the bitstream and any layers upon which the given layer depends. 20. The computing system of claim 14 wherein the control message is a request to stop streaming of a subset of the bitstream, the subset including encoded video data for the given layer of the bitstream and any higher layers of the bitstream.
2,400
8,009
8,009
14,016,040
2,425
In embodiments of video media item selection, items that have been designated for association with video media are displayed while the video media is also displayed for viewing. An item grab application is implemented to receive a user input as an item selection of an item that is associated with the video media while being displayed for viewing. An item page for the selected item can be displayed, where the item page includes an identifier and image of the selected item, as well as a selectable link to the video media. The item grab application can also post the item selection to a social media site when the user shares the selected item. The item selection is posted without the video media that the selected item is associated with, and the video media is selectable for viewing from the item selection that is posted to the social media site.
1. A method, comprising: receiving a user input as an item selection of an item while video media is displayed for viewing, the item having been designated for association with the video media; initiating an item page being displayed for the selected item, the item page including a display of at least an identifier of the selected item, an image of the selected item, and a selectable link to the video media; and posting the item selection from the video media to a social media site responsive to the user sharing the item selection of the selected item. 2. The method as recited in claim 1, wherein posting the item selection from the video media to the social media site posts the item selection without the video media that the selected item is associated with. 3. The method as recited in claim 1, further comprising sharing the item selection via one or more social media applications, and wherein the video media that is associated with the selected item is selectable for viewing from the item selection that is posted to a social media site. 4. The method as recited in claim 3, further comprising receiving back a notification that a social media user further selected the item selection at the social media site. 5. The method as recited in claim 1, further comprising displaying the video media for viewing concurrently with the item that is associated with the video media. 6. The method as recited in claim 1, wherein the video media is displayed on a television display device, and the item that is associated with the video media is downloaded for display concurrently with the video media displayed on the television display device. 7. The method as recited in claim 1, further comprising: communicating the item selection to a data server that is associated with a content producer of the video media; and receiving the item page from the data server to said initiate the item page being displayed for the selected item. 8. The method as recited in claim 1, further comprising: receiving additional user inputs, each as another item selection of additional items that are associated with the video media while the video media is displayed for viewing; and maintaining the item selections as a grab bag associated with the user for subsequent review of the selected additional items. 9. The method as recited in claim 1, wherein the selectable link to the video media of the item selection comprises one of: the selectable link to a start of the video media that is associated with the selected item; or the selectable link to a segment of the video media where the selected item occurs in the video media. 10. The method as recited in claim 1, wherein item tags of the item that is associated with the video media have properties that include at least a start time and a time duration to display the item while the video media is displayed for viewing. 11. The method as recited in claim 1, wherein the item selection includes an additional selectable link to content of the selected item, the content including at least information to purchase one of a product or a service corresponding to the selected item. 12. The method as recited in claim 1, further comprising communicating item selection information to a data server that is associated with a content producer of the video media, the item selection information accessible for advertising analytics. 13. A method, comprising: displaying items associated with video media that is displayed for viewing, the items having been designated for association with the video media by a content producer of the video media; receiving a user input as an item selection to select an item associated with the video media while the video media is displayed for viewing; and posting the item selection to a social media site responsive to a user sharing the item selection of the selected item, the item selection posted without the video media that the selected item is associated with, and the video media being selectable for viewing from the item selection that is posted to the social media site. 14. The method as recited in claim 13, further comprising: communicating the item selection to a data server that is associated with the content producer of the video media; and receiving an item page from the data server for display, the item page including at least an identifier of the selected item, an image of the selected item, and a selectable link to the video media. 15. The method as recited in claim 14, wherein the selectable link to the video media of the item selection comprises one of: the selectable link to a start of the video media that is associated with the selected item; or the selectable link to a segment of the video media where the selected item occurs in the video media. 16. The method as recited in claim 13, further comprising: receiving the items that are associated with the video media from a data server that is associated with the content producer of the video media; and said displaying the items on a display device of a computing device concurrently with the video media being displayed on a television display device. 17. The method as recited in claim 13, wherein item tags of the items that are associated with the video media have properties that include at least a start time and a time duration to display an item while the video media is displayed for viewing. 18. Computer-readable storage media comprising an item grab application stored as instructions that are executable and, responsive to execution of the instructions by a processor of a computing device, the computing device performs operations of the item grab application comprising to: receive a user input as an item selection of an item associated with video media while the video media is displayed for viewing, the item having been designated for association with the video media by a content producer of the video media; initiate an item page for the selected item being displayed, the item page including a display of at least an identifier of the selected item, an image of the selected item, and a selectable link to the video media; and post the item selection to a social media site responsive to a user sharing the item selection of the selected item, the item selection posted without the video media that the selected item is associated with, and the video media being selectable for viewing from the item selection that is posted to the social media site. 19. Computer-readable storage media as recited in claim 18, wherein the computing device performs the operations of the item grab application further comprising to communicate item selection information to a data server that is associated with the content producer of the video media, the item selection information accessible for advertising analytics. 20. Computer-readable storage media as recited in claim 18, wherein the computing device performs the operations of the item grab application further comprising to: receive items that are associated with the video media from a data server that is associated with the content producer of the video media; and one of: initiate displaying the video media for viewing concurrently with the items that are associated with the video media on a display device of the computing device; or initiate displaying the items on the display device of the computing device concurrently with the video media being displayed on a television display device.
In embodiments of video media item selection, items that have been designated for association with video media are displayed while the video media is also displayed for viewing. An item grab application is implemented to receive a user input as an item selection of an item that is associated with the video media while being displayed for viewing. An item page for the selected item can be displayed, where the item page includes an identifier and image of the selected item, as well as a selectable link to the video media. The item grab application can also post the item selection to a social media site when the user shares the selected item. The item selection is posted without the video media that the selected item is associated with, and the video media is selectable for viewing from the item selection that is posted to the social media site.1. A method, comprising: receiving a user input as an item selection of an item while video media is displayed for viewing, the item having been designated for association with the video media; initiating an item page being displayed for the selected item, the item page including a display of at least an identifier of the selected item, an image of the selected item, and a selectable link to the video media; and posting the item selection from the video media to a social media site responsive to the user sharing the item selection of the selected item. 2. The method as recited in claim 1, wherein posting the item selection from the video media to the social media site posts the item selection without the video media that the selected item is associated with. 3. The method as recited in claim 1, further comprising sharing the item selection via one or more social media applications, and wherein the video media that is associated with the selected item is selectable for viewing from the item selection that is posted to a social media site. 4. The method as recited in claim 3, further comprising receiving back a notification that a social media user further selected the item selection at the social media site. 5. The method as recited in claim 1, further comprising displaying the video media for viewing concurrently with the item that is associated with the video media. 6. The method as recited in claim 1, wherein the video media is displayed on a television display device, and the item that is associated with the video media is downloaded for display concurrently with the video media displayed on the television display device. 7. The method as recited in claim 1, further comprising: communicating the item selection to a data server that is associated with a content producer of the video media; and receiving the item page from the data server to said initiate the item page being displayed for the selected item. 8. The method as recited in claim 1, further comprising: receiving additional user inputs, each as another item selection of additional items that are associated with the video media while the video media is displayed for viewing; and maintaining the item selections as a grab bag associated with the user for subsequent review of the selected additional items. 9. The method as recited in claim 1, wherein the selectable link to the video media of the item selection comprises one of: the selectable link to a start of the video media that is associated with the selected item; or the selectable link to a segment of the video media where the selected item occurs in the video media. 10. The method as recited in claim 1, wherein item tags of the item that is associated with the video media have properties that include at least a start time and a time duration to display the item while the video media is displayed for viewing. 11. The method as recited in claim 1, wherein the item selection includes an additional selectable link to content of the selected item, the content including at least information to purchase one of a product or a service corresponding to the selected item. 12. The method as recited in claim 1, further comprising communicating item selection information to a data server that is associated with a content producer of the video media, the item selection information accessible for advertising analytics. 13. A method, comprising: displaying items associated with video media that is displayed for viewing, the items having been designated for association with the video media by a content producer of the video media; receiving a user input as an item selection to select an item associated with the video media while the video media is displayed for viewing; and posting the item selection to a social media site responsive to a user sharing the item selection of the selected item, the item selection posted without the video media that the selected item is associated with, and the video media being selectable for viewing from the item selection that is posted to the social media site. 14. The method as recited in claim 13, further comprising: communicating the item selection to a data server that is associated with the content producer of the video media; and receiving an item page from the data server for display, the item page including at least an identifier of the selected item, an image of the selected item, and a selectable link to the video media. 15. The method as recited in claim 14, wherein the selectable link to the video media of the item selection comprises one of: the selectable link to a start of the video media that is associated with the selected item; or the selectable link to a segment of the video media where the selected item occurs in the video media. 16. The method as recited in claim 13, further comprising: receiving the items that are associated with the video media from a data server that is associated with the content producer of the video media; and said displaying the items on a display device of a computing device concurrently with the video media being displayed on a television display device. 17. The method as recited in claim 13, wherein item tags of the items that are associated with the video media have properties that include at least a start time and a time duration to display an item while the video media is displayed for viewing. 18. Computer-readable storage media comprising an item grab application stored as instructions that are executable and, responsive to execution of the instructions by a processor of a computing device, the computing device performs operations of the item grab application comprising to: receive a user input as an item selection of an item associated with video media while the video media is displayed for viewing, the item having been designated for association with the video media by a content producer of the video media; initiate an item page for the selected item being displayed, the item page including a display of at least an identifier of the selected item, an image of the selected item, and a selectable link to the video media; and post the item selection to a social media site responsive to a user sharing the item selection of the selected item, the item selection posted without the video media that the selected item is associated with, and the video media being selectable for viewing from the item selection that is posted to the social media site. 19. Computer-readable storage media as recited in claim 18, wherein the computing device performs the operations of the item grab application further comprising to communicate item selection information to a data server that is associated with the content producer of the video media, the item selection information accessible for advertising analytics. 20. Computer-readable storage media as recited in claim 18, wherein the computing device performs the operations of the item grab application further comprising to: receive items that are associated with the video media from a data server that is associated with the content producer of the video media; and one of: initiate displaying the video media for viewing concurrently with the items that are associated with the video media on a display device of the computing device; or initiate displaying the items on the display device of the computing device concurrently with the video media being displayed on a television display device.
2,400
8,010
8,010
15,125,757
2,465
A base station ( 300 ), a wireless device ( 302 ) and methods thereinfor supporting radio communication, wherein the base station ( 300 ) employs carrier aggregation with multiple carriers serving a primary cell, PCell, and at least one secondary cell, SCell. The base station ( 300 ) signals (3:3) an SCell status to the wireless device ( 302 ), the SCell status indicating whether the at least one SCell will be in active state where the base station ( 300 ) transmits downlink signals on a carrier serving the at least one SCell, or in inactive state where the base station ( 300 ) does not transmit downlink signals on the carrier serving the at least one SCell. Thereby, the wireless device ( 302 ) can adapt its behaviour depending on the signalled SCell status, e.g. by turning off its receiver and not perform any signal measurements when the SCell is in inactive state.
1-43. (canceled) 44-81. (canceled) 82. A method performed by a base station of a wireless network, for supporting radio communication between wireless devices and the base station, wherein the base station employs carrier aggregation with multiple carriers serving a primary cell (PCell) and at least one secondary cell (SCell), wherein the base station serves the PCell on licensed frequency spectrum and serves the at least one SCell on unlicensed frequency spectrum, the method comprising: signaling an SCell status to the wireless devices, the SCell status indicating whether the at least one SCell will be in an active state where the base station transmits downlink signals on a carrier serving the at least one SCell, or in an inactive state where the base station does not transmit downlink signals on the carrier serving the at least one SCell, wherein the signaled SCell status indicates that the at least one SCell will be in the active state when the base station detects that the unlicensed frequency spectrum is idle and available for radio communication. 83. The method according to claim 82, wherein the signaled SCell status indicates that the at least one SCell will be in the inactive state when the base station has capacity and resources for serving all of the wireless devices on the PCell. 84. The method according to claim 82, wherein the SCell status is carried by a Physical Downlink Control Channel (PDCCH), scrambled by a Radio Network Temporary Identifier (RNTI) that indicates the SCell status. 85. The method according to claim 84, wherein the base station provides the RNTI to at least one of the wireless devices. 86. The method according to claim 82, wherein the SCell status is carried by a Physical Hybrid ARQ Indicator Channel (PHICH). 87. The method according to claim 82, wherein the SCell status is carried by a physical channel in a control region of a subframe. 88. The method according to claim 82, wherein the base station signals the SCell status on a carrier serving the PCell. 89. The method according to claim 82, wherein the base station signals the SCell status by a bit indicating whether the SCell will be in the active state or in the inactive state. 90. The method according to claim 82, wherein the base station signals the SCell status by multiple bits indicating whether respective multiple SCells will be in the active state or in the inactive state. 91. The method according to claim 82, wherein the signaled SCell status indicates that the at least one SCell will be in the active state for a predetermined time duration. 92. The method according to claim 82, wherein the signaled SCell status indicates that the at least one SCell will be in the active state according to an indicated Time Division-Duplex (TDD) uplink/downlink configuration during a certain time period, wherein the time period is predefined or indicated in the signaled SCell status. 93. The method according to claim 82, wherein the signaled SCell status comprises an activity value indicating a number of subframes in which the at least one SCell will be in the active state. 94. The method according to claim 82, wherein the signaled SCell status comprises multiple activity values valid for respective multiple SCells, each activity value indicating a number of subframes in which each respective SCell will be in the active state. 95. The method according to claim 82, wherein the base station signals the SCell status to one or more neighboring base stations. 96. A base station of a wireless network, the base station being operable to support radio communication between wireless devices and the base station, wherein the base station employs carrier aggregation with multiple carriers serving a primary cell (PCell) and at least one secondary cell (SCell), wherein the base station is configured to serve the PCell on licensed frequency spectrum and serve the SCell on unlicensed frequency spectrum, the base station comprising: communication circuitry configured for communication with the wireless devices; and processing circuitry operatively associated with the communication circuitry and configured to: signal an SCell status to the wireless devices, the SCell status indicating whether the at least one SCell will be in an active state where the base station transmits downlink signals on a carrier serving the at least one SCell, or in an inactive state where the base station does not transmit downlink signals on the carrier serving the at least one SCell, wherein the signaled SCell status indicates that the at least one SCell will be in the active state when the base station detects that the unlicensed frequency spectrum is idle and available for radio communication. 97. The base station according to claim 96, wherein the signaled SCell status indicates that the at least one SCell will be in the inactive state when the base station has capacity and resources for serving all of the wireless devices on the PCell. 98. The base station according to claim 96, wherein the SCell status is carried by a Physical Downlink Control Channel (PDCCH), scrambled by a Radio Network Temporary Identifier (RNTI) that indicates the SCell status. 99. The base station according to claim 98, wherein the processing circuitry is configured to provide the RNTI to at least one of the wireless devices. 100. The base station according to claim 96, wherein the SCell status is carried by a Physical Hybrid ARQ Indicator Channel (PHICH). 101. The base station according to claim 96, wherein the SCell status is carried by a physical channel in a control region of a subframe. 102. The base station according to claim 96, wherein the processing circuitry is configured to signal the SCell status on a carrier serving the PCell. 103. The base station according to claim 96, wherein the processing circuitry is configured to signal the SCell status by a bit indicating whether the SCell will be in the active state or in the inactive state. 104. The base station according to claim 96, wherein the processing circuitry is configured to signal the SCell status by multiple bits indicating whether respective multiple SCells will be in the active state or in the inactive state. 105. The base station according to claim 96, wherein the signaled SCell status indicates that the at least one SCell will be in the active state for a predetermined time duration. 106. The base station according to claim 96, wherein the signaled SCell status indicates that the at least one SCell will be in the active state according to an indicated Time Division-Duplex (TDD) uplink/downlink configuration during a certain time period, wherein the time period is predefined or indicated in the signaled SCell status. 107. The base station according to claim 96, wherein the signaled SCell status comprises an activity value indicating a number of subframes in which the at least one SCell will be in the active state. 108. The base station according to claim 96, wherein the signaled SCell status comprises multiple activity values valid for respective multiple SCells, each activity value indicating a number of subframes in which each respective SCell will be in the active state. 109. The base station according to claim 96, wherein the processing circuitry is configured to signal the SCell status to one or more neighboring base stations. 110. A method performed by a wireless device operable for radio communication with a base station of a wireless network, the wireless device being capable of using carrier aggregation with multiple carriers serving a primary cell (PCell) and at least one secondary cell (SCell), wherein licensed frequency spectrum is used for the PCell, and unlicensed frequency spectrum is used for the at least one SCell, the method comprising: receiving an SCell status from the base station, the SCell status indicating whether the at least one SCell will be in an active state where the base station transmits downlink signals on a carrier serving the at least one SCell, or in an inactive state where the base station does not transmit downlink signals on the carrier serving the at least one SCell, wherein the signaled SCell status indicates that the at least one SCell will be in the active state when the unlicensed frequency spectrum is idle and available for radio communication; and performing signal measurements on the SCell only when the SCell status indicates that the at least one SCell will be in the active state. 111. The method according to claim 110, wherein the wireless device notifies the base station that it is capable of being served by the SCell on unlicensed frequency spectrum. 112. The method according to claim 110, wherein the wireless device acquires from the base station a frame/subframe on which the SCell status can be monitored in group/common signaling and a group/common Radio Network Temporary Identifier (RNTI) to be used for detecting the group/common signaling. 113. The method according to claim 110, wherein the wireless device turns off reception on the at least one SCell when the SCell status indicates that the at least one SCell is inactive. 114. A wireless device configured for radio communication with a base station of a wireless network, the wireless device being capable of using carrier aggregation with multiple carriers serving a primary cell (PCell) and at least one secondary cell (SCell), wherein licensed frequency spectrum is used for the PCell, and unlicensed frequency spectrum is used for the at least one SCell, the wireless device comprising: communication circuitry configured for communication with the base station; and processing circuitry operatively associated with the communication circuitry and configured to: receive an SCell status from the base station, the SCell status indicating whether the at least one SCell will be in an active state where the base station transmits downlink signals on a carrier serving the at least one SCell, or in an inactive state where the base station does not transmit downlink signals on the carrier serving the at least one SCell, wherein the signaled SCell status indicates that the at least one SCell will be in the active state when the unlicensed frequency spectrum is idle and available for radio communication; and perform signal measurements on the SCell only when the SCell status indicates that the at least one SCell will be in the active state. 115. The wireless device according to claim 114, wherein the processing circuitry is configured to notify the base station that it is capable of being served by the SCell on unlicensed frequency spectrum. 116. The wireless device according to claim 114, wherein the processing circuitry is configured to acquire from the base station a frame/subframe on which the SCell status can be monitored in group/common signaling and a group/common Radio Network Temporary Identifier (RNTI) to be used for detecting the group/common signaling. 117. The wireless device according to claim 114, wherein the processing circuitry is configured to turn off reception on the at least one SCell when the SCell status indicates that the at least one SCell is inactive. 118. A computer-readable storage medium storing a computer program comprising instructions that, when executed on at least one processor of a base station that is operable to support communication with wireless devices and that employs carrier aggregation with multiple carriers serving a primary cell (PCell) using licensed frequency spectrum and at least one secondary cell (SCell) using unlicensed frequency spectrum, cause the at least one processor to: signal an SCell status to the wireless devices, the SCell status indicating whether the at least one SCell will be in an active state where the base station transmits downlink signals on a carrier serving the at least one SCell, or in an inactive state where the base station does not transmit downlink signals on the carrier serving the at least one SCell, wherein the signaled SCell status indicates that the at least one SCell will be in the active state when the base station detects that the unlicensed frequency spectrum is idle and available for radio communication. 119. A computer-readable storage medium storing a computer program comprising instructions that, when executed on at least one processor of a wireless device that is capable of communication with a base station and that uses carrier aggregation with multiple carriers serving a primary cell (PCell) using licensed frequency spectrum and at least one secondary cell (SCell) using unlicensed frequency spectrum, cause the at least one processor to: receive an SCell status from the base station, the SCell status indicating whether the at least one SCell will be in an active state where the base station transmits downlink signals on a carrier serving the at least one SCell, or in an inactive state where the base station does not transmit downlink signals on the carrier serving the at least one SCell, wherein the signaled SCell status indicates that the at least one SCell will be in the active state when the unlicensed frequency spectrum is idle and available for radio communication;, and perform signal measurements on the SCell only when the SCell status indicates that the at least one SCell will be in the active state.
A base station ( 300 ), a wireless device ( 302 ) and methods thereinfor supporting radio communication, wherein the base station ( 300 ) employs carrier aggregation with multiple carriers serving a primary cell, PCell, and at least one secondary cell, SCell. The base station ( 300 ) signals (3:3) an SCell status to the wireless device ( 302 ), the SCell status indicating whether the at least one SCell will be in active state where the base station ( 300 ) transmits downlink signals on a carrier serving the at least one SCell, or in inactive state where the base station ( 300 ) does not transmit downlink signals on the carrier serving the at least one SCell. Thereby, the wireless device ( 302 ) can adapt its behaviour depending on the signalled SCell status, e.g. by turning off its receiver and not perform any signal measurements when the SCell is in inactive state.1-43. (canceled) 44-81. (canceled) 82. A method performed by a base station of a wireless network, for supporting radio communication between wireless devices and the base station, wherein the base station employs carrier aggregation with multiple carriers serving a primary cell (PCell) and at least one secondary cell (SCell), wherein the base station serves the PCell on licensed frequency spectrum and serves the at least one SCell on unlicensed frequency spectrum, the method comprising: signaling an SCell status to the wireless devices, the SCell status indicating whether the at least one SCell will be in an active state where the base station transmits downlink signals on a carrier serving the at least one SCell, or in an inactive state where the base station does not transmit downlink signals on the carrier serving the at least one SCell, wherein the signaled SCell status indicates that the at least one SCell will be in the active state when the base station detects that the unlicensed frequency spectrum is idle and available for radio communication. 83. The method according to claim 82, wherein the signaled SCell status indicates that the at least one SCell will be in the inactive state when the base station has capacity and resources for serving all of the wireless devices on the PCell. 84. The method according to claim 82, wherein the SCell status is carried by a Physical Downlink Control Channel (PDCCH), scrambled by a Radio Network Temporary Identifier (RNTI) that indicates the SCell status. 85. The method according to claim 84, wherein the base station provides the RNTI to at least one of the wireless devices. 86. The method according to claim 82, wherein the SCell status is carried by a Physical Hybrid ARQ Indicator Channel (PHICH). 87. The method according to claim 82, wherein the SCell status is carried by a physical channel in a control region of a subframe. 88. The method according to claim 82, wherein the base station signals the SCell status on a carrier serving the PCell. 89. The method according to claim 82, wherein the base station signals the SCell status by a bit indicating whether the SCell will be in the active state or in the inactive state. 90. The method according to claim 82, wherein the base station signals the SCell status by multiple bits indicating whether respective multiple SCells will be in the active state or in the inactive state. 91. The method according to claim 82, wherein the signaled SCell status indicates that the at least one SCell will be in the active state for a predetermined time duration. 92. The method according to claim 82, wherein the signaled SCell status indicates that the at least one SCell will be in the active state according to an indicated Time Division-Duplex (TDD) uplink/downlink configuration during a certain time period, wherein the time period is predefined or indicated in the signaled SCell status. 93. The method according to claim 82, wherein the signaled SCell status comprises an activity value indicating a number of subframes in which the at least one SCell will be in the active state. 94. The method according to claim 82, wherein the signaled SCell status comprises multiple activity values valid for respective multiple SCells, each activity value indicating a number of subframes in which each respective SCell will be in the active state. 95. The method according to claim 82, wherein the base station signals the SCell status to one or more neighboring base stations. 96. A base station of a wireless network, the base station being operable to support radio communication between wireless devices and the base station, wherein the base station employs carrier aggregation with multiple carriers serving a primary cell (PCell) and at least one secondary cell (SCell), wherein the base station is configured to serve the PCell on licensed frequency spectrum and serve the SCell on unlicensed frequency spectrum, the base station comprising: communication circuitry configured for communication with the wireless devices; and processing circuitry operatively associated with the communication circuitry and configured to: signal an SCell status to the wireless devices, the SCell status indicating whether the at least one SCell will be in an active state where the base station transmits downlink signals on a carrier serving the at least one SCell, or in an inactive state where the base station does not transmit downlink signals on the carrier serving the at least one SCell, wherein the signaled SCell status indicates that the at least one SCell will be in the active state when the base station detects that the unlicensed frequency spectrum is idle and available for radio communication. 97. The base station according to claim 96, wherein the signaled SCell status indicates that the at least one SCell will be in the inactive state when the base station has capacity and resources for serving all of the wireless devices on the PCell. 98. The base station according to claim 96, wherein the SCell status is carried by a Physical Downlink Control Channel (PDCCH), scrambled by a Radio Network Temporary Identifier (RNTI) that indicates the SCell status. 99. The base station according to claim 98, wherein the processing circuitry is configured to provide the RNTI to at least one of the wireless devices. 100. The base station according to claim 96, wherein the SCell status is carried by a Physical Hybrid ARQ Indicator Channel (PHICH). 101. The base station according to claim 96, wherein the SCell status is carried by a physical channel in a control region of a subframe. 102. The base station according to claim 96, wherein the processing circuitry is configured to signal the SCell status on a carrier serving the PCell. 103. The base station according to claim 96, wherein the processing circuitry is configured to signal the SCell status by a bit indicating whether the SCell will be in the active state or in the inactive state. 104. The base station according to claim 96, wherein the processing circuitry is configured to signal the SCell status by multiple bits indicating whether respective multiple SCells will be in the active state or in the inactive state. 105. The base station according to claim 96, wherein the signaled SCell status indicates that the at least one SCell will be in the active state for a predetermined time duration. 106. The base station according to claim 96, wherein the signaled SCell status indicates that the at least one SCell will be in the active state according to an indicated Time Division-Duplex (TDD) uplink/downlink configuration during a certain time period, wherein the time period is predefined or indicated in the signaled SCell status. 107. The base station according to claim 96, wherein the signaled SCell status comprises an activity value indicating a number of subframes in which the at least one SCell will be in the active state. 108. The base station according to claim 96, wherein the signaled SCell status comprises multiple activity values valid for respective multiple SCells, each activity value indicating a number of subframes in which each respective SCell will be in the active state. 109. The base station according to claim 96, wherein the processing circuitry is configured to signal the SCell status to one or more neighboring base stations. 110. A method performed by a wireless device operable for radio communication with a base station of a wireless network, the wireless device being capable of using carrier aggregation with multiple carriers serving a primary cell (PCell) and at least one secondary cell (SCell), wherein licensed frequency spectrum is used for the PCell, and unlicensed frequency spectrum is used for the at least one SCell, the method comprising: receiving an SCell status from the base station, the SCell status indicating whether the at least one SCell will be in an active state where the base station transmits downlink signals on a carrier serving the at least one SCell, or in an inactive state where the base station does not transmit downlink signals on the carrier serving the at least one SCell, wherein the signaled SCell status indicates that the at least one SCell will be in the active state when the unlicensed frequency spectrum is idle and available for radio communication; and performing signal measurements on the SCell only when the SCell status indicates that the at least one SCell will be in the active state. 111. The method according to claim 110, wherein the wireless device notifies the base station that it is capable of being served by the SCell on unlicensed frequency spectrum. 112. The method according to claim 110, wherein the wireless device acquires from the base station a frame/subframe on which the SCell status can be monitored in group/common signaling and a group/common Radio Network Temporary Identifier (RNTI) to be used for detecting the group/common signaling. 113. The method according to claim 110, wherein the wireless device turns off reception on the at least one SCell when the SCell status indicates that the at least one SCell is inactive. 114. A wireless device configured for radio communication with a base station of a wireless network, the wireless device being capable of using carrier aggregation with multiple carriers serving a primary cell (PCell) and at least one secondary cell (SCell), wherein licensed frequency spectrum is used for the PCell, and unlicensed frequency spectrum is used for the at least one SCell, the wireless device comprising: communication circuitry configured for communication with the base station; and processing circuitry operatively associated with the communication circuitry and configured to: receive an SCell status from the base station, the SCell status indicating whether the at least one SCell will be in an active state where the base station transmits downlink signals on a carrier serving the at least one SCell, or in an inactive state where the base station does not transmit downlink signals on the carrier serving the at least one SCell, wherein the signaled SCell status indicates that the at least one SCell will be in the active state when the unlicensed frequency spectrum is idle and available for radio communication; and perform signal measurements on the SCell only when the SCell status indicates that the at least one SCell will be in the active state. 115. The wireless device according to claim 114, wherein the processing circuitry is configured to notify the base station that it is capable of being served by the SCell on unlicensed frequency spectrum. 116. The wireless device according to claim 114, wherein the processing circuitry is configured to acquire from the base station a frame/subframe on which the SCell status can be monitored in group/common signaling and a group/common Radio Network Temporary Identifier (RNTI) to be used for detecting the group/common signaling. 117. The wireless device according to claim 114, wherein the processing circuitry is configured to turn off reception on the at least one SCell when the SCell status indicates that the at least one SCell is inactive. 118. A computer-readable storage medium storing a computer program comprising instructions that, when executed on at least one processor of a base station that is operable to support communication with wireless devices and that employs carrier aggregation with multiple carriers serving a primary cell (PCell) using licensed frequency spectrum and at least one secondary cell (SCell) using unlicensed frequency spectrum, cause the at least one processor to: signal an SCell status to the wireless devices, the SCell status indicating whether the at least one SCell will be in an active state where the base station transmits downlink signals on a carrier serving the at least one SCell, or in an inactive state where the base station does not transmit downlink signals on the carrier serving the at least one SCell, wherein the signaled SCell status indicates that the at least one SCell will be in the active state when the base station detects that the unlicensed frequency spectrum is idle and available for radio communication. 119. A computer-readable storage medium storing a computer program comprising instructions that, when executed on at least one processor of a wireless device that is capable of communication with a base station and that uses carrier aggregation with multiple carriers serving a primary cell (PCell) using licensed frequency spectrum and at least one secondary cell (SCell) using unlicensed frequency spectrum, cause the at least one processor to: receive an SCell status from the base station, the SCell status indicating whether the at least one SCell will be in an active state where the base station transmits downlink signals on a carrier serving the at least one SCell, or in an inactive state where the base station does not transmit downlink signals on the carrier serving the at least one SCell, wherein the signaled SCell status indicates that the at least one SCell will be in the active state when the unlicensed frequency spectrum is idle and available for radio communication;, and perform signal measurements on the SCell only when the SCell status indicates that the at least one SCell will be in the active state.
2,400
8,011
8,011
15,033,609
2,482
The invention relates to a predictive coding/decoding method/device for a group of pictures belonging to a sequence of images, using at least one reference image belonging to a group of pictures other than the group of pictures to code, and converting the values of the pixels of the images of the group of pictures from a configurable transform such that these values are expressed in a target dynamic. The method is characterised in that it converts the values of the pixels of each reference image from the transform thus configured identically to the one used to convert the values of the pixels of the images of the group of pictures to code.
1. Predictive coding method of a first group of pictures belonging to a sequence of images, using at least one reference image belonging to a second group of pictures other than the first group of pictures to be coded, and converting the values of the pixels of the first and second group of pictures from a transform using parameters in such a manner that these values are expressed in a target dynamic, it converts the values of the pixels of each reference image from the transform using the parameters used for transforming the values of the pixels of the images of the first group of pictures, characterised in that the parameters (pi) used to transform the images of the first group of pictures (GOPOi) and each reference image are determined by considering the images of the first group of pictures (GOPi) and each reference image. 2. Predictive decoding method of a first group of pictures belonging to a sequence of images, using at least one reference image belonging to a second group of pictures other than the first group of pictures to be decoded, and converting the values of the pixels of the the first and second group of pictures from a transform using parameters in such a manner that these values are expressed in a target dynamic, the method comprising converting the values of the pixels of each reference image from the transform using the parameters used for transforming the values of the pixels of the images of the first group of pictures to be decoded, the parameters (pi) used to transform the images of the first group of pictures (GOPi) and each reference image (Ri−1 j) are determined by considering the images of the first group of pictures (GOPi) and each reference image. 3. Predictive coding device of a first group of pictures belonging to a sequence of images, characterised in that it comprises means to: predictively code the images of the first group of pictures by using at least one reference image belonging to a second group of pictures other than the first group of pictures to be coded, convert the values of the pixels of the first and second group of pictures from a transform using parameters in such a manner that these values are expressed in a target dynamic, and convert the values of the pixels of each reference image from the transform using the parameters used for transforming the values of the pixels of the images of the first group of pictures to be coded, the parameters (pi) used to transform the images of the first group of pictures (GOPi) and each reference image (Ri−1 j) are determined by considering the images of the first group of pictures (GOPi) and each reference image. 4. Predictive decoding device of a first group of pictures belonging to a sequence of images, characterised in that it comprises means to: predictively decode the images of the first a group of pictures by using at least one reference image belonging to a second group of pictures other than the first group of pictures to be coded, convert the values of the pixels of the first and second group of pictures from a transform using parameters in such a manner that these values are expressed in a target dynamic, and convert the values of the pixels of each reference image from the transform using the parameters used for transforming the values of the pixels of the images of the first group of pictures to be decoded, the parameters (pi) used to transform the images of the first group of pictures (GOPi) and each reference image (Ri−1 j) are determined by considering the images of the first group of pictures (GOPi) and each reference image.
The invention relates to a predictive coding/decoding method/device for a group of pictures belonging to a sequence of images, using at least one reference image belonging to a group of pictures other than the group of pictures to code, and converting the values of the pixels of the images of the group of pictures from a configurable transform such that these values are expressed in a target dynamic. The method is characterised in that it converts the values of the pixels of each reference image from the transform thus configured identically to the one used to convert the values of the pixels of the images of the group of pictures to code.1. Predictive coding method of a first group of pictures belonging to a sequence of images, using at least one reference image belonging to a second group of pictures other than the first group of pictures to be coded, and converting the values of the pixels of the first and second group of pictures from a transform using parameters in such a manner that these values are expressed in a target dynamic, it converts the values of the pixels of each reference image from the transform using the parameters used for transforming the values of the pixels of the images of the first group of pictures, characterised in that the parameters (pi) used to transform the images of the first group of pictures (GOPOi) and each reference image are determined by considering the images of the first group of pictures (GOPi) and each reference image. 2. Predictive decoding method of a first group of pictures belonging to a sequence of images, using at least one reference image belonging to a second group of pictures other than the first group of pictures to be decoded, and converting the values of the pixels of the the first and second group of pictures from a transform using parameters in such a manner that these values are expressed in a target dynamic, the method comprising converting the values of the pixels of each reference image from the transform using the parameters used for transforming the values of the pixels of the images of the first group of pictures to be decoded, the parameters (pi) used to transform the images of the first group of pictures (GOPi) and each reference image (Ri−1 j) are determined by considering the images of the first group of pictures (GOPi) and each reference image. 3. Predictive coding device of a first group of pictures belonging to a sequence of images, characterised in that it comprises means to: predictively code the images of the first group of pictures by using at least one reference image belonging to a second group of pictures other than the first group of pictures to be coded, convert the values of the pixels of the first and second group of pictures from a transform using parameters in such a manner that these values are expressed in a target dynamic, and convert the values of the pixels of each reference image from the transform using the parameters used for transforming the values of the pixels of the images of the first group of pictures to be coded, the parameters (pi) used to transform the images of the first group of pictures (GOPi) and each reference image (Ri−1 j) are determined by considering the images of the first group of pictures (GOPi) and each reference image. 4. Predictive decoding device of a first group of pictures belonging to a sequence of images, characterised in that it comprises means to: predictively decode the images of the first a group of pictures by using at least one reference image belonging to a second group of pictures other than the first group of pictures to be coded, convert the values of the pixels of the first and second group of pictures from a transform using parameters in such a manner that these values are expressed in a target dynamic, and convert the values of the pixels of each reference image from the transform using the parameters used for transforming the values of the pixels of the images of the first group of pictures to be decoded, the parameters (pi) used to transform the images of the first group of pictures (GOPi) and each reference image (Ri−1 j) are determined by considering the images of the first group of pictures (GOPi) and each reference image.
2,400
8,012
8,012
14,928,503
2,436
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security platform is “big data” driven and employs machine learning to perform security analytics. The security platform performs user/entity behavioral analytics (UEBA) to detect the security related anomalies and threats, regardless of whether such anomalies/threats were previously known. The security platform can include both real-time and batch paths/modes for detecting anomalies and threats. By visually presenting analytical results scored with risk ratings and supporting evidence, the security platform enables network security administrators to respond to a detected anomaly or threat, and to take action promptly.
1. A computerized method comprising: receiving event data associated with network activities by entities that interact with a computer network, wherein types of entities include at least one of devices, applications, and/or network users; identifying instances of potential network compromise automatically determined from the event data, wherein instances include threats and/or anomalies, and the identified instances are associated with at least one entity; automatically determining a score for each entity, wherein the score indicates a risk level based at least in part on the number and/or type of identified instances of potential network compromise associated with the entity; and causing display, in a graphical user interface, of an indication of the score for each of the entities. 2. The method of claim 1, wherein the graphical user interface further provides at least one entities view comprising a listing of entities of at least one type that participated in network activities that triggered determinations of potential network compromise; wherein each entity listed in the entities view includes the associated score and a link which, upon selection by a user, causes the graphical user interface to generate a detailed view comprising additional data about the selected entity. 3. The method of claim 2, wherein the entities view lists, for each entity, the number of threats associated with the entity. 4. The method of claim 2, wherein the entities view lists, for each entity, the number of anomalies associated with the entity. 5. The method of claim 2, wherein the entities view lists, for each entity, the number of threats and anomalies associated with the entity. 6. The method of claim 2, wherein the graphical user interface provides a prompt for filtering the entities view according to score, and upon selection by a user of a score via the graphical user interface, filtering the entities view to include only the entities associated with scores corresponding to the user's selection. 7. The method of claim 1, wherein the entities view comprises a listing of users in a computer network of an organization including the department in which the user is assigned in the organization. 8. The method of claim 2, wherein the entities view comprises a listing of network users in a computer network of an organization, and further includes, for each network user, the date of the most recent automated determination regarding the network user's involvement in a potential instance of network compromise. 9. The method of claim 2, wherein the entities view comprises a listing of devices communicating on the network and associated with an instance of network compromise, and further wherein the listing includes, for each device, the date of the most recent automated determination regarding the device's involvement in a potential instance of network compromise. 10. The method of claim 2, wherein the entities view includes, for each entity, the date of the most recent update regarding the entity's participation in a potential instance of network compromise, and wherein the graphical user interface provides a prompt for filtering the entities view according to date, and upon selection by a user of a temporal range via the graphical user interface, filtering the entities view to include only the entities associated with a date of most recent update falling within the selected temporal range. 11. The method of claim 2, wherein the entities view comprises a listing of applications that have run on the network and are associated with an instance of network compromise, and, upon selection of an entry in the listing, providing a detailed view illustrating the relationship between the application and the at least one identified instance of potential network compromise associated with the application. 12. The method of claim 2, further comprising: upon selection by a user of an entity in the listing via the graphical user interface, generating a detailed view of the entity providing additional information, including a trends graph illustrating any changes in the score associated with the entity over a period of time. 13. The method of claim 2, further comprising: upon selection by a user of an entity in the listing via the graphical user interface, generating a detailed view of the entity providing additional information, including an illustration of the relationship between the entity and the associated at least one instance of potential network compromise. 14. The method of claim 2, further comprising: upon selection by a user of an entity in the listing via the graphical user interface, generating a detailed view of the entity providing additional information including, if relevant event data is available, an illustration of how recent network activities associated with the entity has varied from a baseline of activity. 15. The method of claim 2, wherein, upon selection by a user of an entity in the listing via the graphical user interface, generating a detailed view of the entity providing a prompt for a user to tag the selected entity for future tracking, and upon receiving a selection by a user of a tag, associating the tag with the selected entity such that the tag is included in the additional data provided in response to subsequent requests to generate the detailed view of the selected entity. 16. The method of claim 2, wherein the entities view comprises a listing of network users in a computer network of an organization and upon selection by a user of a network user in the listing, a detailed network user view is generated that identifies other network users determined to be similar. 17. The method of claim 2, wherein, upon selection by a user of an entity in the listing via the graphical user interface, generating a detailed view of the entity that provides additional information concerning the entity, upon receiving a selection by a user, via the graphical user interface, of a link in the detailed view, generating an instances view listing instances of potential network compromise that are associated with the entity. 18. The method of claim 2, wherein, upon selection by a user of an entity in the listing via the graphical user interface, generating a detailed view of the entity that provides additional information concerning the entity, upon receiving a selection by a user, via the graphical user interface, of a link in the detailed view, generating an instances view listing instances of potential network compromise that are associated with the entity, wherein each listed instance includes a link to a detailed view of that instance. 19. A non-transitory, computer-readable storage medium storing instructions, an execution of which in a computer system causes the computer system to perform operations comprising: receiving event data associated with network activities by entities that interact with a computer network, wherein types of entities include at least one of devices, applications, and/or network users; identifying instances of potential network compromise automatically determined from the event data, wherein instances include threats and anomalies, and the identified instances are associated with at least one entity; automatically determining a score for each entity, wherein the score indicates a risk level based at least in part on the number and/or type of identified instances of potential network compromise associated with the entity; causing for display, in graphical user interface, of an indication of the score for each of the entities. 20. The computer-readable storage medium of claim 19, wherein the graphical user interface provides at least one entities view comprising a listing of entities of at least one type that participated in network activities that triggered determinations of potential network compromise; wherein each entity listed in the entities view includes the associated score and a link which, upon selection by a user, causes the graphical user interface to generate a detailed view comprising additional data about the selected entity. 21. The computer-readable storage medium of claim 20, wherein the entities view lists, for each entity, the number of threats associated with the entity. 22. The computer-readable storage medium of claim 20, wherein the entities view lists, for each entity, the number of anomalies associated with the entity. 23. The computer-readable storage medium of claim 20, wherein the entities view lists, for each entity, the number of threats and anomalies associated with the entity. 24. The computer-readable storage medium of claim 20, wherein the graphical user interface provides a prompt for filtering the entities view according to score, and upon selection by a user of a score via the graphical user interface, filtering the entities view to include only the entities associated with scores corresponding to the user's selection. 25. The computer-readable storage medium of claim 20, wherein the entities view comprises a listing of users in a computer network of an organization including, if known, the department in which the user is assigned in the organization. 26. The computer-readable storage medium of claim 20, wherein the entities view comprises a listing of network users in a computer network of an organization, and further includes, for each network user, the date of the most recent automated determination regarding the network user's participation in a potential instance of network compromise. 27. A computer system comprising: computer memory for storing machine data; and a processor for: receiving event data associated with network activities by entities that interact with a computer network, wherein types of entities include at least one of devices, applications, and/or network users; identifying instances of potential network compromise automatically determined from the event data, wherein instances include threats and/or anomalies, and the identified instances are associated with one or more entities; automatically determining a score for each entity, wherein the score indicates a risk level based at least in part on the number and type of identified instances of potential network compromise associated with the entity; causing display, in a graphical user interface, of an indication of the score for each of the entities. 28. The computer system of claim 27, wherein the graphical user interface provides at least one entities view comprising a listing of entities of at least one type that participated in network activities that triggered determinations of potential network compromise; wherein each entity listed in the entities view includes the associated score and a link which, upon selection by a user, causes the graphical user interface to generate a detailed view comprising additional data about the selected entity. 29. The computer system of claim 28, wherein the entities view lists, for each entity, the number of threats associated with the entity. 30. The computer system of claim 28, wherein the entities view lists, for each entity, the number of anomalies associated with the entity.
A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security platform is “big data” driven and employs machine learning to perform security analytics. The security platform performs user/entity behavioral analytics (UEBA) to detect the security related anomalies and threats, regardless of whether such anomalies/threats were previously known. The security platform can include both real-time and batch paths/modes for detecting anomalies and threats. By visually presenting analytical results scored with risk ratings and supporting evidence, the security platform enables network security administrators to respond to a detected anomaly or threat, and to take action promptly.1. A computerized method comprising: receiving event data associated with network activities by entities that interact with a computer network, wherein types of entities include at least one of devices, applications, and/or network users; identifying instances of potential network compromise automatically determined from the event data, wherein instances include threats and/or anomalies, and the identified instances are associated with at least one entity; automatically determining a score for each entity, wherein the score indicates a risk level based at least in part on the number and/or type of identified instances of potential network compromise associated with the entity; and causing display, in a graphical user interface, of an indication of the score for each of the entities. 2. The method of claim 1, wherein the graphical user interface further provides at least one entities view comprising a listing of entities of at least one type that participated in network activities that triggered determinations of potential network compromise; wherein each entity listed in the entities view includes the associated score and a link which, upon selection by a user, causes the graphical user interface to generate a detailed view comprising additional data about the selected entity. 3. The method of claim 2, wherein the entities view lists, for each entity, the number of threats associated with the entity. 4. The method of claim 2, wherein the entities view lists, for each entity, the number of anomalies associated with the entity. 5. The method of claim 2, wherein the entities view lists, for each entity, the number of threats and anomalies associated with the entity. 6. The method of claim 2, wherein the graphical user interface provides a prompt for filtering the entities view according to score, and upon selection by a user of a score via the graphical user interface, filtering the entities view to include only the entities associated with scores corresponding to the user's selection. 7. The method of claim 1, wherein the entities view comprises a listing of users in a computer network of an organization including the department in which the user is assigned in the organization. 8. The method of claim 2, wherein the entities view comprises a listing of network users in a computer network of an organization, and further includes, for each network user, the date of the most recent automated determination regarding the network user's involvement in a potential instance of network compromise. 9. The method of claim 2, wherein the entities view comprises a listing of devices communicating on the network and associated with an instance of network compromise, and further wherein the listing includes, for each device, the date of the most recent automated determination regarding the device's involvement in a potential instance of network compromise. 10. The method of claim 2, wherein the entities view includes, for each entity, the date of the most recent update regarding the entity's participation in a potential instance of network compromise, and wherein the graphical user interface provides a prompt for filtering the entities view according to date, and upon selection by a user of a temporal range via the graphical user interface, filtering the entities view to include only the entities associated with a date of most recent update falling within the selected temporal range. 11. The method of claim 2, wherein the entities view comprises a listing of applications that have run on the network and are associated with an instance of network compromise, and, upon selection of an entry in the listing, providing a detailed view illustrating the relationship between the application and the at least one identified instance of potential network compromise associated with the application. 12. The method of claim 2, further comprising: upon selection by a user of an entity in the listing via the graphical user interface, generating a detailed view of the entity providing additional information, including a trends graph illustrating any changes in the score associated with the entity over a period of time. 13. The method of claim 2, further comprising: upon selection by a user of an entity in the listing via the graphical user interface, generating a detailed view of the entity providing additional information, including an illustration of the relationship between the entity and the associated at least one instance of potential network compromise. 14. The method of claim 2, further comprising: upon selection by a user of an entity in the listing via the graphical user interface, generating a detailed view of the entity providing additional information including, if relevant event data is available, an illustration of how recent network activities associated with the entity has varied from a baseline of activity. 15. The method of claim 2, wherein, upon selection by a user of an entity in the listing via the graphical user interface, generating a detailed view of the entity providing a prompt for a user to tag the selected entity for future tracking, and upon receiving a selection by a user of a tag, associating the tag with the selected entity such that the tag is included in the additional data provided in response to subsequent requests to generate the detailed view of the selected entity. 16. The method of claim 2, wherein the entities view comprises a listing of network users in a computer network of an organization and upon selection by a user of a network user in the listing, a detailed network user view is generated that identifies other network users determined to be similar. 17. The method of claim 2, wherein, upon selection by a user of an entity in the listing via the graphical user interface, generating a detailed view of the entity that provides additional information concerning the entity, upon receiving a selection by a user, via the graphical user interface, of a link in the detailed view, generating an instances view listing instances of potential network compromise that are associated with the entity. 18. The method of claim 2, wherein, upon selection by a user of an entity in the listing via the graphical user interface, generating a detailed view of the entity that provides additional information concerning the entity, upon receiving a selection by a user, via the graphical user interface, of a link in the detailed view, generating an instances view listing instances of potential network compromise that are associated with the entity, wherein each listed instance includes a link to a detailed view of that instance. 19. A non-transitory, computer-readable storage medium storing instructions, an execution of which in a computer system causes the computer system to perform operations comprising: receiving event data associated with network activities by entities that interact with a computer network, wherein types of entities include at least one of devices, applications, and/or network users; identifying instances of potential network compromise automatically determined from the event data, wherein instances include threats and anomalies, and the identified instances are associated with at least one entity; automatically determining a score for each entity, wherein the score indicates a risk level based at least in part on the number and/or type of identified instances of potential network compromise associated with the entity; causing for display, in graphical user interface, of an indication of the score for each of the entities. 20. The computer-readable storage medium of claim 19, wherein the graphical user interface provides at least one entities view comprising a listing of entities of at least one type that participated in network activities that triggered determinations of potential network compromise; wherein each entity listed in the entities view includes the associated score and a link which, upon selection by a user, causes the graphical user interface to generate a detailed view comprising additional data about the selected entity. 21. The computer-readable storage medium of claim 20, wherein the entities view lists, for each entity, the number of threats associated with the entity. 22. The computer-readable storage medium of claim 20, wherein the entities view lists, for each entity, the number of anomalies associated with the entity. 23. The computer-readable storage medium of claim 20, wherein the entities view lists, for each entity, the number of threats and anomalies associated with the entity. 24. The computer-readable storage medium of claim 20, wherein the graphical user interface provides a prompt for filtering the entities view according to score, and upon selection by a user of a score via the graphical user interface, filtering the entities view to include only the entities associated with scores corresponding to the user's selection. 25. The computer-readable storage medium of claim 20, wherein the entities view comprises a listing of users in a computer network of an organization including, if known, the department in which the user is assigned in the organization. 26. The computer-readable storage medium of claim 20, wherein the entities view comprises a listing of network users in a computer network of an organization, and further includes, for each network user, the date of the most recent automated determination regarding the network user's participation in a potential instance of network compromise. 27. A computer system comprising: computer memory for storing machine data; and a processor for: receiving event data associated with network activities by entities that interact with a computer network, wherein types of entities include at least one of devices, applications, and/or network users; identifying instances of potential network compromise automatically determined from the event data, wherein instances include threats and/or anomalies, and the identified instances are associated with one or more entities; automatically determining a score for each entity, wherein the score indicates a risk level based at least in part on the number and type of identified instances of potential network compromise associated with the entity; causing display, in a graphical user interface, of an indication of the score for each of the entities. 28. The computer system of claim 27, wherein the graphical user interface provides at least one entities view comprising a listing of entities of at least one type that participated in network activities that triggered determinations of potential network compromise; wherein each entity listed in the entities view includes the associated score and a link which, upon selection by a user, causes the graphical user interface to generate a detailed view comprising additional data about the selected entity. 29. The computer system of claim 28, wherein the entities view lists, for each entity, the number of threats associated with the entity. 30. The computer system of claim 28, wherein the entities view lists, for each entity, the number of anomalies associated with the entity.
2,400
8,013
8,013
14,573,307
2,486
A vision system of a vehicle includes a camera disposed at a vehicle and having a field of view exterior of the vehicle. The camera may have a wide angle lens with more distortion at the side regions of the field of view than at a center region of the field of view. An image processor processes captured image data to determine gradient information of captured image data, and responsive to processing gradient information, determines a potential cross traffic object at one of the side regions of the field of view. The image processor processes multiple frames of captured image data to determine movement of an upper portion and a lower portion of a gradient of the determined potential cross traffic object and, responsive to such processing, determines if the detected potential cross traffic object is a cross traffic object that is moving into the path of the vehicle.
1. A vision system of a vehicle, said vision system comprising: a camera disposed at a vehicle and having a field of view exterior of the vehicle; wherein said camera has a wide angle lens with more optical distortion at the side regions of the field of view than at a center region of the field of view; an image processor operable to process image data captured by said camera; wherein said image processor, responsive to image processing of captured image data, determines gradient information of captured image data; wherein said image processor, responsive to processing of gradient information, determines the presence of a potential cross traffic object at one of the side regions of the field of view; wherein said image processor processes multiple frames of captured image data to determine movement of an upper portion and a lower portion of the gradient of the determined potential cross traffic object; and wherein said vision system, responsive to said image processor processing multiple frames of captured image data, determines if the detected potential cross traffic object is a cross traffic object that is moving into the path of the vehicle. 2. The vision system of claim 1, wherein said vision system determines movement between the top and bottom portions of the gradient of the determined potential cross traffic and differentially compares the movements to determine if the determined potential cross traffic is a cross traffic object. 3. The vision system of claim 1, wherein said image processor determines intensity gradient information of captured image data. 4. The vision system of claim 1, wherein the vision system determines movement between top and bottom points of the gradient of the determined potential cross traffic object to track movement of the determined potential cross traffic object. 5. The vision system of claim 1, wherein said vision system determines movement between top and bottom points of a vertical gradient. 6. The vision system of claim 1, wherein said vision system determines movement between top and bottom points of a vertical gradient to estimate if the object is a two dimensional object or a three dimensional object. 7. The vision system of claim 1, wherein said camera outputs a low resolution VGA image that is processed by said image processor. 8. The vision system of claim 1, wherein said camera is disposed at a forward portion of the vehicle and has a forward field of view. 9. The vision system of claim 8, wherein said wide angle lens comprises a fish eye lens. 10. The vision system of claim 1, wherein said camera is disposed at a rearward portion of the vehicle and has a rearward field of view. 11. The vision system of claim 1, wherein said vision system processes multiple frames of captured image data to track the upper and lower portions of the gradient of the determined potential cross traffic object over a variable amount of time, and wherein the amount of time is varied responsive to an estimated speed of travel of the determined potential cross traffic object relative to the vehicle. 12. A vision system of a vehicle, said vision system comprising: a camera disposed at a vehicle and having a field of view exterior of the vehicle; wherein said camera has a wide angle lens with more optical distortion at the side regions of the field of view than at a center region of the field of view; an image processor operable to process image data captured by said camera; wherein said image processor, responsive to image processing of captured image data, determines intensity gradient information of captured image data; wherein said image processor, responsive to processing of intensity gradient information using an edge detection algorithm, determines the presence of a potential cross traffic object at one of the side regions of the field of view; wherein said image processor processes multiple frames of captured image data to determine movement of an upper portion of a gradient of the determined potential cross traffic object relative to a lower portion of the gradient of the determined potential cross traffic object; and wherein said vision system, responsive to said image processor processing multiple frames of captured image data, determines if the detected potential cross traffic object is a cross traffic object that is moving into the path of the vehicle. 13. The vision system of claim 12, wherein said vision system differentially compares the movement of the upper portion of the gradient relative to the lower portion of the gradient to determine if the determined potential cross traffic is a cross traffic object. 14. The vision system of claim 12, wherein the vision system determines movement between the upper and lower portions of the gradient of the determined potential cross traffic object to track movement of the determined potential cross traffic object. 15. The vision system of claim 12, wherein said camera is disposed at a forward portion of the vehicle and has a forward field of view. 16. The vision system of claim 12, wherein said camera is disposed at a rearward portion of the vehicle and has a rearward field of view. 17. The vision system of claim 12, wherein said vision system processes multiple frames of captured image data to track the upper and lower portions of the gradient of the determined potential cross traffic object over a variable amount of time, and wherein the amount of time is varied responsive to an estimated speed of travel of the determined potential cross traffic object relative to the vehicle. 18. A vision system of a vehicle, said vision system comprising: a camera disposed at a vehicle and having a field of view exterior of the vehicle; wherein said camera has a wide angle lens with more optical distortion at the side regions of the field of view than at a center region of the field of view; an image processor operable to process image data captured by said camera; wherein said image processor, responsive to image processing of captured image data, determines gradient information of captured image data; wherein said image processor, responsive to processing of gradient information, determines the presence of a potential cross traffic object at one of the side regions of the field of view; wherein said image processor processes multiple frames of captured image data to determine movement of an upper portion of a gradient of the determined potential cross traffic object relative to a lower portion of the gradient of the determined potential cross traffic object; and wherein said image processor processes multiple frames of captured image data and said vision system tracks the relative movement of the upper and lower portions of the gradient to determine if the detected potential cross traffic object is indicative of a cross traffic object that is moving into the path of the vehicle. 19. The vision system of claim 18, wherein said image processor determines intensity gradient information of captured image data. 20. The vision system of claim 18, wherein said vision system processes multiple frames of captured image data to track the upper and lower portions of the gradient of the determined potential cross traffic object over a variable amount of time, and wherein the amount of time is varied responsive to an estimated speed of travel of the determined potential cross traffic object relative to the vehicle.
A vision system of a vehicle includes a camera disposed at a vehicle and having a field of view exterior of the vehicle. The camera may have a wide angle lens with more distortion at the side regions of the field of view than at a center region of the field of view. An image processor processes captured image data to determine gradient information of captured image data, and responsive to processing gradient information, determines a potential cross traffic object at one of the side regions of the field of view. The image processor processes multiple frames of captured image data to determine movement of an upper portion and a lower portion of a gradient of the determined potential cross traffic object and, responsive to such processing, determines if the detected potential cross traffic object is a cross traffic object that is moving into the path of the vehicle.1. A vision system of a vehicle, said vision system comprising: a camera disposed at a vehicle and having a field of view exterior of the vehicle; wherein said camera has a wide angle lens with more optical distortion at the side regions of the field of view than at a center region of the field of view; an image processor operable to process image data captured by said camera; wherein said image processor, responsive to image processing of captured image data, determines gradient information of captured image data; wherein said image processor, responsive to processing of gradient information, determines the presence of a potential cross traffic object at one of the side regions of the field of view; wherein said image processor processes multiple frames of captured image data to determine movement of an upper portion and a lower portion of the gradient of the determined potential cross traffic object; and wherein said vision system, responsive to said image processor processing multiple frames of captured image data, determines if the detected potential cross traffic object is a cross traffic object that is moving into the path of the vehicle. 2. The vision system of claim 1, wherein said vision system determines movement between the top and bottom portions of the gradient of the determined potential cross traffic and differentially compares the movements to determine if the determined potential cross traffic is a cross traffic object. 3. The vision system of claim 1, wherein said image processor determines intensity gradient information of captured image data. 4. The vision system of claim 1, wherein the vision system determines movement between top and bottom points of the gradient of the determined potential cross traffic object to track movement of the determined potential cross traffic object. 5. The vision system of claim 1, wherein said vision system determines movement between top and bottom points of a vertical gradient. 6. The vision system of claim 1, wherein said vision system determines movement between top and bottom points of a vertical gradient to estimate if the object is a two dimensional object or a three dimensional object. 7. The vision system of claim 1, wherein said camera outputs a low resolution VGA image that is processed by said image processor. 8. The vision system of claim 1, wherein said camera is disposed at a forward portion of the vehicle and has a forward field of view. 9. The vision system of claim 8, wherein said wide angle lens comprises a fish eye lens. 10. The vision system of claim 1, wherein said camera is disposed at a rearward portion of the vehicle and has a rearward field of view. 11. The vision system of claim 1, wherein said vision system processes multiple frames of captured image data to track the upper and lower portions of the gradient of the determined potential cross traffic object over a variable amount of time, and wherein the amount of time is varied responsive to an estimated speed of travel of the determined potential cross traffic object relative to the vehicle. 12. A vision system of a vehicle, said vision system comprising: a camera disposed at a vehicle and having a field of view exterior of the vehicle; wherein said camera has a wide angle lens with more optical distortion at the side regions of the field of view than at a center region of the field of view; an image processor operable to process image data captured by said camera; wherein said image processor, responsive to image processing of captured image data, determines intensity gradient information of captured image data; wherein said image processor, responsive to processing of intensity gradient information using an edge detection algorithm, determines the presence of a potential cross traffic object at one of the side regions of the field of view; wherein said image processor processes multiple frames of captured image data to determine movement of an upper portion of a gradient of the determined potential cross traffic object relative to a lower portion of the gradient of the determined potential cross traffic object; and wherein said vision system, responsive to said image processor processing multiple frames of captured image data, determines if the detected potential cross traffic object is a cross traffic object that is moving into the path of the vehicle. 13. The vision system of claim 12, wherein said vision system differentially compares the movement of the upper portion of the gradient relative to the lower portion of the gradient to determine if the determined potential cross traffic is a cross traffic object. 14. The vision system of claim 12, wherein the vision system determines movement between the upper and lower portions of the gradient of the determined potential cross traffic object to track movement of the determined potential cross traffic object. 15. The vision system of claim 12, wherein said camera is disposed at a forward portion of the vehicle and has a forward field of view. 16. The vision system of claim 12, wherein said camera is disposed at a rearward portion of the vehicle and has a rearward field of view. 17. The vision system of claim 12, wherein said vision system processes multiple frames of captured image data to track the upper and lower portions of the gradient of the determined potential cross traffic object over a variable amount of time, and wherein the amount of time is varied responsive to an estimated speed of travel of the determined potential cross traffic object relative to the vehicle. 18. A vision system of a vehicle, said vision system comprising: a camera disposed at a vehicle and having a field of view exterior of the vehicle; wherein said camera has a wide angle lens with more optical distortion at the side regions of the field of view than at a center region of the field of view; an image processor operable to process image data captured by said camera; wherein said image processor, responsive to image processing of captured image data, determines gradient information of captured image data; wherein said image processor, responsive to processing of gradient information, determines the presence of a potential cross traffic object at one of the side regions of the field of view; wherein said image processor processes multiple frames of captured image data to determine movement of an upper portion of a gradient of the determined potential cross traffic object relative to a lower portion of the gradient of the determined potential cross traffic object; and wherein said image processor processes multiple frames of captured image data and said vision system tracks the relative movement of the upper and lower portions of the gradient to determine if the detected potential cross traffic object is indicative of a cross traffic object that is moving into the path of the vehicle. 19. The vision system of claim 18, wherein said image processor determines intensity gradient information of captured image data. 20. The vision system of claim 18, wherein said vision system processes multiple frames of captured image data to track the upper and lower portions of the gradient of the determined potential cross traffic object over a variable amount of time, and wherein the amount of time is varied responsive to an estimated speed of travel of the determined potential cross traffic object relative to the vehicle.
2,400
8,014
8,014
15,189,501
2,461
In one aspect, a method includes performing, by a wireless station, a fine timing measurement (FTM) procedure with each of one or more FTM-enabled access points (APs) to obtain a respective one or more FTM-based round-trip time (RTT) measurement between the wireless station and each of the one or more FTM-enabled APs. The method also includes performing a non-FTM procedure with each of one or more non-FTM-enabled APs to obtain a respective one or more non-FTM-based RTT measurement. The wireless station then calculates a position of the wireless device based on both the one or more FTM-based RTT measurements and the one or more non-FTM-based RTT measurements.
1. A method performed by a wireless station, the method comprising: performing a fine timing measurement (FTM) procedure with each of one or more FTM-enabled access points (APs) to obtain a respective one or more FTM-based round-trip time (RTT) measurements between the wireless station and each of the one or more FTM-enabled APs, wherein the FTM procedure comprises: exchanging at least one FTM message with an FTM-enabled AP of the one or more FTM-enabled APs; and calculating an FTM-based RTT measurement of the one or more FTM-based RTT measurements based on the exchanging of the at least one FTM message; performing a non-FTM procedure with each of one or more non-FTM-enabled APs to obtain a respective one or more non-FTM-based RTT measurements, wherein the non-FTM procedure includes: transmitting a non-FTM message from the wireless station to a non-FTM-enabled AP of the one or more non-FTM-enabled APs; receiving a non-FTM response message from the non-FTM-enabled AP of the one or more non-FTM-enabled APs in response to the non-FTM message; and calculating a non-FTM-based RTT measurement of the one or more non-FTM-based RTT measurements based on a difference between a time of arrival of the non-FTM response message and a time of departure of the non-FTM message; and calculating a position of the wireless station based on both the one or more FTM-based RTT measurements and the one or more non-FTM-based RTT measurements. 2. The method of claim 1, further comprising: obtaining a position of the one or more non-FTM-enabled APs and a position of the one or more FTM-enabled APs; determining whether a number of the one or more FTM-enabled APs is greater than a first threshold; and if so, jointly calculating the position of the wireless station and a turnaround calibration factor (TCF) for at least one of the one or more non-FTM-enabled APs based on both the one or more FTM-based RTT measurements and the one or more non-FTM-based RTT measurements. 3. The method of claim 2, wherein obtaining the position of the one or more non-FTM-enabled APs and the position of the one or more FTM-enabled APs comprises receiving position assistance data from a server, wherein the position assistance data includes at least one position of the one or more non-FTM-enabled APs or of the one or more FTM-enabled APs from the server. 4. The method of claim 2, wherein obtaining the position of the one or more non-FTM-enabled APs and the position of the one or more FTM-enabled APs comprises: receiving the position of the one or more non-FTM-enabled APs in a message transmitted by the one or more non-FTM-enabled APs; and receiving the position of the one or more FTM-enabled APs in a message transmitted by the one or more FTM-enabled APs. 5. The method of claim 1, further comprising: determining whether a number of the one or more FTM-enabled APs is greater than a second threshold; and if so, jointly calculating the position of the wireless station, a position of the one or more non-FTM-enabled APs, and a turnaround calibration factor (TCF) for at least one of the one or more non-FTM-enabled APs based on both the one or more FTM-based RTT measurements and the one or more non-FTM-based RTT measurements. 6. The method of claim 1, further comprising: determining whether a number of the one or more FTM-enabled APs is greater than a third threshold; and if so, determining a position of the wireless station based on the one or more FTM-based RTT measurements; and calculating a turnaround calibration factor (TCF) for at least one of the one or more non-FTM-enabled APs based on the position of the wireless station and both the one or more FTM-based RTT measurements and the one or more non-FTM-based RTT measurements. 7. The method of claim 1, wherein the exchanging of the at least one FTM message with the FTM-enabled AP of the one or more FTM-enabled APs of the FTM procedure comprises: transmitting an FTM request message from the wireless station to the FTM-enabled AP; receiving an FTM response message from the FTM-enabled AP; transmitting an FTM acknowledgement message from the wireless station to the FTM-enabled AP; and receiving timing information from the FTM-enabled AP, wherein the timing information comprises a time of departure of the FTM response message from the FTM-enabled AP and a time of arrival of the FTM acknowledgement message at the FTM-enabled AP. 8. The method of claim 1, wherein the non-FTM message comprises a request-to-send (RTS) message, and wherein the non-FTM response message comprises a clear-to-send (CTS) message. 9. A wireless station, comprising: a transceiver; at least one processor; and at least one memory coupled to the at least one processor, the at least one processor and the at least one memory being configured to direct the wireless station to: perform a fine timing measurement (FTM) procedure with each of one or more FTM-enabled access points (APs) to obtain a respective one or more FTM-based round-trip time (RTT) measurements between the wireless station and each of the one or more FTM-enabled APs, wherein the FTM procedure comprises: exchanging at least one FTM message with an FTM-enabled AP of the one or more FTM-enabled APs; and calculating an FTM-based RTT measurement of the one or more FTM-based RTT measurements based on the exchanging of the at least one FTM message; perform a non-FTM procedure with each of one or more non-FTM-enabled APs to obtain a respective one or more non-FTM-based RTT measurements, wherein the non-FTM procedure includes: transmitting a non-FTM message from the wireless station to a non-FTM-enabled AP of the one or more non-FTM-enabled APs; receiving a non-FTM response message from the non-FTM-enabled AP of the one or more non-FTM-enabled APs in response to the non-FTM message; and calculating a non-FTM-based RTT measurement of the one or more non-FTM-based RTT measurements based on a difference between a time of arrival of the non-FTM response message and a time of departure of the non-FTM message; and calculate a position of the wireless station based on both the one or more FTM-based RTT measurements and the one or more non-FTM-based RTT measurements. 10. The wireless station of claim 9, wherein the at least one processor and the at least one memory are further configured to direct the wireless station to: obtain a position of the one or more non-FTM-enabled APs and a position of the one or more FTM-enabled APs; determine whether a number of the one or more FTM-enabled APs is greater than a first threshold; and if so, jointly calculate the position of the wireless station and a turnaround calibration factor (TCF) for at least one of the one or more non-FTM-enabled APs based on both the one or more FTM-based RTT measurements and the one or more non-FTM-based RTT measurements. 11. The wireless station of claim 10, wherein the at least one processor and the at least one memory are further configured to direct the wireless station to: receive position assistance data from a server, wherein the position assistance data includes at least one position of the one or more non-FTM-enabled APs or of the one or more FTM-enabled APs from the server. 12. The wireless station of claim 10, wherein the at least one processor and the at least one memory are further configured to direct the wireless station to: receive the position of the one or more non-FTM-enabled APs in a message transmitted by the one or more non-FTM-enabled APs; and receive the position of the one or more FTM-enabled APs in a message transmitted by the one or more FTM-enabled APs. 13. The wireless station of claim 9, wherein the at least one processor and the at least one memory are further configured to direct the wireless station to: determine whether a number of the one or more FTM-enabled APs is greater than a second threshold; and if so, jointly calculate the position of the wireless station, a position of the one or more non-FTM-enabled APs, and a turnaround calibration factor (TCF) for at least one of the one or more non-FTM-enabled APs based on both the one or more FTM-based RTT measurements and the one or more non-FTM-based RTT measurements. 14. The wireless station of claim 9, wherein the at least one processor and the at least one memory are further configured to direct the wireless station to: determine whether a number of the one or more FTM-enabled APs is greater than a third threshold; and if so, determine a position of the wireless station based on the one or more FTM-based RTT measurements; and calculate a turnaround calibration factor (TCF) for at least one of the one or more non-FTM-enabled APs based on the position of the wireless station and both the one or more FTM-based RTT measurements and the one or more non-FTM-based RTT measurements. 15. The wireless station of claim 9, wherein the exchanging of the at least one FTM message with the FTM-enabled AP of the one or more FTM-enabled APs of the FTM procedure comprises: transmitting an FTM request message from the wireless station to the FTM-enabled AP; receiving an FTM response message from the FTM-enabled AP; transmitting an FTM acknowledgement message from the wireless station to the FTM-enabled AP; and receiving timing information from the FTM-enabled AP, wherein the timing information comprises a time of departure of the FTM response message from the FTM-enabled AP and a time of arrival of the FTM acknowledgement message at the FTM-enabled AP. 16. The wireless station of claim 9, wherein the non-FTM message comprises a request-to-send (RTS) message, and wherein the non-FTM response message comprises a clear-to-send (CTS) message. 17. A wireless station, comprising: means for performing a fine timing measurement (FTM) procedure with each of one or more FTM-enabled access points (APs) to obtain a respective one or more FTM-based round-trip time (RTT) measurements between the wireless station and each of the one or more FTM-enabled APs, wherein the means for performing the FTM procedure comprises: means for exchanging at least one FTM message with an FTM-enabled AP of the one or more FTM-enabled APs; and means for calculating an FTM-based RTT measurement of the one or more FTM-based RTT measurements based on the exchanging of the at least one FTM message; means for performing a non-FTM procedure with each of one or more non-FTM-enabled APs to obtain a respective one or more non-FTM-based RTT measurements, wherein the means for performing the non-FTM procedure includes: means for transmitting a non-FTM message from the wireless station to a non-FTM-enabled AP of the one or more non-FTM-enabled APs; means for receiving a non-FTM response message from the non-FTM-enabled AP of the one or more non-FTM-enabled APs in response to the non-FTM message; means for calculating a non-FTM-based RTT measurement of the one or more non-FTM-based RTT measurements based on a difference between a time of arrival of the non-FTM response message and a time of departure of the non-FTM message; and means for calculating a position of the wireless station based on both the one or more FTM-based RTT measurements and the one or more non-FTM-based RTT measurements. 18. The wireless station of claim 17, further comprising: means for obtaining a position of the one or more non-FTM-enabled APs and a position of the one or more FTM-enabled APs; means for determining whether a number of the one or more FTM-enabled APs is greater than a first threshold; and if so, means for jointly calculating the position of the wireless station and a turnaround calibration factor (TCF) for at least one of the one or more non-FTM-enabled APs based on both the one or more FTM-based RTT measurements and the one or more non-FTM-based RTT measurements. 19. The wireless station of claim 18, wherein the means for obtaining the position of the one or more non-FTM-enabled APs and the position of the one or more FTM-enabled APs comprises means for receiving position assistance data from a server, wherein the position assistance data includes at least one position of the one or more non-FTM-enabled APs or of the one or more FTM-enabled APs from the server. 20. The wireless station of claim 18, wherein the means for obtaining the position of the one or more non-FTM-enabled APs and the position of the one or more FTM-enabled APs comprises: means for receiving the position of the one or more non-FTM-enabled APs in a message transmitted by the one or more non-FTM-enabled APs; and means for receiving the position of the one or more FTM-enabled APs in a message transmitted by the one or more FTM-enabled APs. 21. The wireless station of claim 17, further comprising: means for determining whether a number of the one or more FTM-enabled APs is greater than a second threshold; and if so, means for jointly calculating the position of the wireless station, a position of the one or more non-FTM-enabled APs, and a turnaround calibration factor (TCF) for at least one of the one or more non-FTM-enabled APs based on both the one or more FTM-based RTT measurements and the one or more non-FTM-based RTT measurements. 22. The wireless station of claim 17, further comprising means for determining whether a number of the one or more FTM-enabled APs is greater than a third threshold; and if so, means for determining a position of the wireless station based on the one or more FTM-based RTT measurements; and means for calculating a turnaround calibration factor (TCF) for at least one of the one or more non-FTM-enabled APs based on the position of the wireless station and both the one or more FTM-based RTT measurements and the one or more non-FTM-based RTT measurements. 23. The wireless station of claim 17, wherein the means for exchanging the at least one FTM message with the FTM-enabled AP of the one or more FTM-enabled APs of the FTM procedure comprises: means for transmitting an FTM request message from the wireless station to the FTM-enabled AP; means for receiving an FTM response message from the FTM-enabled AP; means for transmitting an FTM acknowledgement message from the wireless station to the FTM-enabled AP; and means for receiving timing information from the FTM-enabled AP, wherein the timing information comprises a time of departure of the FTM response message from the FTM-enabled AP and a time of arrival of the FTM acknowledgement message at the FTM-enabled AP. 24. The wireless station of claim 17, wherein the non-FTM message comprises a request-to-send (RTS) message, and wherein the non-FTM response message comprises a clear-to-send (CTS) message. 25. A non-transitory computer-readable medium including program code stored thereon, wherein the program code includes instructions to direct a wireless station to: perform a fine timing measurement (FTM) procedure with each of one or more FTM-enabled access points (APs) to obtain a respective one or more FTM-based round-trip time (RTT) measurements between the wireless station and each of the one or more FTM-enabled APs, wherein the FTM procedure comprises: exchanging at least one FTM message with an FTM-enabled AP of the one or more FTM-enabled APs; and calculating an FTM-based RTT measurement of the one or more FTM-based RTT measurements based on the exchanging of the at least one FTM message; perform a non-FTM procedure with each of one or more non-FTM-enabled APs to obtain a respective one or more non-FTM-based RTT measurements, wherein the non-FTM procedure includes: transmitting a non-FTM message from the wireless station to a non-FTM-enabled AP of the one or more non-FTM-enabled APs; receiving a non-FTM response message from the non-FTM-enabled AP of the one or more non-FTM-enabled APs in response to the non-FTM message; and calculating a non-FTM-based RTT measurement of the one or more non-FTM-based RTT measurements based on a difference between a time of arrival of the non-FTM response message and a time of departure of the non-FTM message; and calculate a position of the wireless station based on both the one or more FTM-based RTT measurements and the one or more non-FTM-based RTT measurements. 26. The non-transitory computer-readable medium of claim 25, wherein the program code further includes instructions to direct a wireless station to: obtain a position of the one or more non-FTM-enabled APs and a position of the one or more FTM-enabled APs; determine whether a number of the one or more FTM-enabled APs is greater than a first threshold; and if so, jointly calculate the position of the wireless station and a turnaround calibration factor (TCF) for at least one of the one or more non-FTM-enabled APs based on both the one or more FTM-based RTT measurements and the one or more non-FTM-based RTT measurements. 27. The non-transitory computer-readable medium of claim 25, wherein the program code further includes instructions to direct a wireless station to: determine whether a number of the one or more FTM-enabled APs is greater than a second threshold; and if so, jointly calculate the position of the wireless station, a position of the one or more non-FTM-enabled APs, and a turnaround calibration factor (TCF) for at least one of the one or more non-FTM-enabled APs based on both the one or more FTM-based RTT measurements and the one or more non-FTM-based RTT measurements. 28. The non-transitory computer-readable medium of claim 25, wherein the program code further includes instructions to direct a wireless station to: determine whether a number of the one or more FTM-enabled APs is greater than a third threshold; and if so, determine a position of the wireless station based on the one or more FTM-based RTT measurements; and calculate a turnaround calibration factor (TCF) for at least one of the one or more non-FTM-enabled APs based on the position of the wireless station and both the one or more FTM-based RTT measurements and the one or more non-FTM-based RTT measurements. 29. The non-transitory computer-readable medium of claim 25, wherein the exchanging the at least one FTM message with the FTM-enabled AP of the one or more FTM-enabled APs of the FTM procedure comprises: transmitting an FTM request message from the wireless station to the FTM-enabled AP; receiving an FTM response message from the FTM-enabled AP; transmitting an FTM acknowledgement message from the wireless station to the FTM-enabled AP; and receiving timing information from the FTM-enabled AP, wherein the timing information comprises a time of departure of the FTM response message from the FTM-enabled AP and a time of arrival of the FTM acknowledgement message at the FTM-enabled AP. 30. The non-transitory computer-readable medium of claim 25, wherein the non-FTM message comprises a request-to-send (RTS) message, and wherein the non-FTM response message comprises a clear-to-send (CTS) message.
In one aspect, a method includes performing, by a wireless station, a fine timing measurement (FTM) procedure with each of one or more FTM-enabled access points (APs) to obtain a respective one or more FTM-based round-trip time (RTT) measurement between the wireless station and each of the one or more FTM-enabled APs. The method also includes performing a non-FTM procedure with each of one or more non-FTM-enabled APs to obtain a respective one or more non-FTM-based RTT measurement. The wireless station then calculates a position of the wireless device based on both the one or more FTM-based RTT measurements and the one or more non-FTM-based RTT measurements.1. A method performed by a wireless station, the method comprising: performing a fine timing measurement (FTM) procedure with each of one or more FTM-enabled access points (APs) to obtain a respective one or more FTM-based round-trip time (RTT) measurements between the wireless station and each of the one or more FTM-enabled APs, wherein the FTM procedure comprises: exchanging at least one FTM message with an FTM-enabled AP of the one or more FTM-enabled APs; and calculating an FTM-based RTT measurement of the one or more FTM-based RTT measurements based on the exchanging of the at least one FTM message; performing a non-FTM procedure with each of one or more non-FTM-enabled APs to obtain a respective one or more non-FTM-based RTT measurements, wherein the non-FTM procedure includes: transmitting a non-FTM message from the wireless station to a non-FTM-enabled AP of the one or more non-FTM-enabled APs; receiving a non-FTM response message from the non-FTM-enabled AP of the one or more non-FTM-enabled APs in response to the non-FTM message; and calculating a non-FTM-based RTT measurement of the one or more non-FTM-based RTT measurements based on a difference between a time of arrival of the non-FTM response message and a time of departure of the non-FTM message; and calculating a position of the wireless station based on both the one or more FTM-based RTT measurements and the one or more non-FTM-based RTT measurements. 2. The method of claim 1, further comprising: obtaining a position of the one or more non-FTM-enabled APs and a position of the one or more FTM-enabled APs; determining whether a number of the one or more FTM-enabled APs is greater than a first threshold; and if so, jointly calculating the position of the wireless station and a turnaround calibration factor (TCF) for at least one of the one or more non-FTM-enabled APs based on both the one or more FTM-based RTT measurements and the one or more non-FTM-based RTT measurements. 3. The method of claim 2, wherein obtaining the position of the one or more non-FTM-enabled APs and the position of the one or more FTM-enabled APs comprises receiving position assistance data from a server, wherein the position assistance data includes at least one position of the one or more non-FTM-enabled APs or of the one or more FTM-enabled APs from the server. 4. The method of claim 2, wherein obtaining the position of the one or more non-FTM-enabled APs and the position of the one or more FTM-enabled APs comprises: receiving the position of the one or more non-FTM-enabled APs in a message transmitted by the one or more non-FTM-enabled APs; and receiving the position of the one or more FTM-enabled APs in a message transmitted by the one or more FTM-enabled APs. 5. The method of claim 1, further comprising: determining whether a number of the one or more FTM-enabled APs is greater than a second threshold; and if so, jointly calculating the position of the wireless station, a position of the one or more non-FTM-enabled APs, and a turnaround calibration factor (TCF) for at least one of the one or more non-FTM-enabled APs based on both the one or more FTM-based RTT measurements and the one or more non-FTM-based RTT measurements. 6. The method of claim 1, further comprising: determining whether a number of the one or more FTM-enabled APs is greater than a third threshold; and if so, determining a position of the wireless station based on the one or more FTM-based RTT measurements; and calculating a turnaround calibration factor (TCF) for at least one of the one or more non-FTM-enabled APs based on the position of the wireless station and both the one or more FTM-based RTT measurements and the one or more non-FTM-based RTT measurements. 7. The method of claim 1, wherein the exchanging of the at least one FTM message with the FTM-enabled AP of the one or more FTM-enabled APs of the FTM procedure comprises: transmitting an FTM request message from the wireless station to the FTM-enabled AP; receiving an FTM response message from the FTM-enabled AP; transmitting an FTM acknowledgement message from the wireless station to the FTM-enabled AP; and receiving timing information from the FTM-enabled AP, wherein the timing information comprises a time of departure of the FTM response message from the FTM-enabled AP and a time of arrival of the FTM acknowledgement message at the FTM-enabled AP. 8. The method of claim 1, wherein the non-FTM message comprises a request-to-send (RTS) message, and wherein the non-FTM response message comprises a clear-to-send (CTS) message. 9. A wireless station, comprising: a transceiver; at least one processor; and at least one memory coupled to the at least one processor, the at least one processor and the at least one memory being configured to direct the wireless station to: perform a fine timing measurement (FTM) procedure with each of one or more FTM-enabled access points (APs) to obtain a respective one or more FTM-based round-trip time (RTT) measurements between the wireless station and each of the one or more FTM-enabled APs, wherein the FTM procedure comprises: exchanging at least one FTM message with an FTM-enabled AP of the one or more FTM-enabled APs; and calculating an FTM-based RTT measurement of the one or more FTM-based RTT measurements based on the exchanging of the at least one FTM message; perform a non-FTM procedure with each of one or more non-FTM-enabled APs to obtain a respective one or more non-FTM-based RTT measurements, wherein the non-FTM procedure includes: transmitting a non-FTM message from the wireless station to a non-FTM-enabled AP of the one or more non-FTM-enabled APs; receiving a non-FTM response message from the non-FTM-enabled AP of the one or more non-FTM-enabled APs in response to the non-FTM message; and calculating a non-FTM-based RTT measurement of the one or more non-FTM-based RTT measurements based on a difference between a time of arrival of the non-FTM response message and a time of departure of the non-FTM message; and calculate a position of the wireless station based on both the one or more FTM-based RTT measurements and the one or more non-FTM-based RTT measurements. 10. The wireless station of claim 9, wherein the at least one processor and the at least one memory are further configured to direct the wireless station to: obtain a position of the one or more non-FTM-enabled APs and a position of the one or more FTM-enabled APs; determine whether a number of the one or more FTM-enabled APs is greater than a first threshold; and if so, jointly calculate the position of the wireless station and a turnaround calibration factor (TCF) for at least one of the one or more non-FTM-enabled APs based on both the one or more FTM-based RTT measurements and the one or more non-FTM-based RTT measurements. 11. The wireless station of claim 10, wherein the at least one processor and the at least one memory are further configured to direct the wireless station to: receive position assistance data from a server, wherein the position assistance data includes at least one position of the one or more non-FTM-enabled APs or of the one or more FTM-enabled APs from the server. 12. The wireless station of claim 10, wherein the at least one processor and the at least one memory are further configured to direct the wireless station to: receive the position of the one or more non-FTM-enabled APs in a message transmitted by the one or more non-FTM-enabled APs; and receive the position of the one or more FTM-enabled APs in a message transmitted by the one or more FTM-enabled APs. 13. The wireless station of claim 9, wherein the at least one processor and the at least one memory are further configured to direct the wireless station to: determine whether a number of the one or more FTM-enabled APs is greater than a second threshold; and if so, jointly calculate the position of the wireless station, a position of the one or more non-FTM-enabled APs, and a turnaround calibration factor (TCF) for at least one of the one or more non-FTM-enabled APs based on both the one or more FTM-based RTT measurements and the one or more non-FTM-based RTT measurements. 14. The wireless station of claim 9, wherein the at least one processor and the at least one memory are further configured to direct the wireless station to: determine whether a number of the one or more FTM-enabled APs is greater than a third threshold; and if so, determine a position of the wireless station based on the one or more FTM-based RTT measurements; and calculate a turnaround calibration factor (TCF) for at least one of the one or more non-FTM-enabled APs based on the position of the wireless station and both the one or more FTM-based RTT measurements and the one or more non-FTM-based RTT measurements. 15. The wireless station of claim 9, wherein the exchanging of the at least one FTM message with the FTM-enabled AP of the one or more FTM-enabled APs of the FTM procedure comprises: transmitting an FTM request message from the wireless station to the FTM-enabled AP; receiving an FTM response message from the FTM-enabled AP; transmitting an FTM acknowledgement message from the wireless station to the FTM-enabled AP; and receiving timing information from the FTM-enabled AP, wherein the timing information comprises a time of departure of the FTM response message from the FTM-enabled AP and a time of arrival of the FTM acknowledgement message at the FTM-enabled AP. 16. The wireless station of claim 9, wherein the non-FTM message comprises a request-to-send (RTS) message, and wherein the non-FTM response message comprises a clear-to-send (CTS) message. 17. A wireless station, comprising: means for performing a fine timing measurement (FTM) procedure with each of one or more FTM-enabled access points (APs) to obtain a respective one or more FTM-based round-trip time (RTT) measurements between the wireless station and each of the one or more FTM-enabled APs, wherein the means for performing the FTM procedure comprises: means for exchanging at least one FTM message with an FTM-enabled AP of the one or more FTM-enabled APs; and means for calculating an FTM-based RTT measurement of the one or more FTM-based RTT measurements based on the exchanging of the at least one FTM message; means for performing a non-FTM procedure with each of one or more non-FTM-enabled APs to obtain a respective one or more non-FTM-based RTT measurements, wherein the means for performing the non-FTM procedure includes: means for transmitting a non-FTM message from the wireless station to a non-FTM-enabled AP of the one or more non-FTM-enabled APs; means for receiving a non-FTM response message from the non-FTM-enabled AP of the one or more non-FTM-enabled APs in response to the non-FTM message; means for calculating a non-FTM-based RTT measurement of the one or more non-FTM-based RTT measurements based on a difference between a time of arrival of the non-FTM response message and a time of departure of the non-FTM message; and means for calculating a position of the wireless station based on both the one or more FTM-based RTT measurements and the one or more non-FTM-based RTT measurements. 18. The wireless station of claim 17, further comprising: means for obtaining a position of the one or more non-FTM-enabled APs and a position of the one or more FTM-enabled APs; means for determining whether a number of the one or more FTM-enabled APs is greater than a first threshold; and if so, means for jointly calculating the position of the wireless station and a turnaround calibration factor (TCF) for at least one of the one or more non-FTM-enabled APs based on both the one or more FTM-based RTT measurements and the one or more non-FTM-based RTT measurements. 19. The wireless station of claim 18, wherein the means for obtaining the position of the one or more non-FTM-enabled APs and the position of the one or more FTM-enabled APs comprises means for receiving position assistance data from a server, wherein the position assistance data includes at least one position of the one or more non-FTM-enabled APs or of the one or more FTM-enabled APs from the server. 20. The wireless station of claim 18, wherein the means for obtaining the position of the one or more non-FTM-enabled APs and the position of the one or more FTM-enabled APs comprises: means for receiving the position of the one or more non-FTM-enabled APs in a message transmitted by the one or more non-FTM-enabled APs; and means for receiving the position of the one or more FTM-enabled APs in a message transmitted by the one or more FTM-enabled APs. 21. The wireless station of claim 17, further comprising: means for determining whether a number of the one or more FTM-enabled APs is greater than a second threshold; and if so, means for jointly calculating the position of the wireless station, a position of the one or more non-FTM-enabled APs, and a turnaround calibration factor (TCF) for at least one of the one or more non-FTM-enabled APs based on both the one or more FTM-based RTT measurements and the one or more non-FTM-based RTT measurements. 22. The wireless station of claim 17, further comprising means for determining whether a number of the one or more FTM-enabled APs is greater than a third threshold; and if so, means for determining a position of the wireless station based on the one or more FTM-based RTT measurements; and means for calculating a turnaround calibration factor (TCF) for at least one of the one or more non-FTM-enabled APs based on the position of the wireless station and both the one or more FTM-based RTT measurements and the one or more non-FTM-based RTT measurements. 23. The wireless station of claim 17, wherein the means for exchanging the at least one FTM message with the FTM-enabled AP of the one or more FTM-enabled APs of the FTM procedure comprises: means for transmitting an FTM request message from the wireless station to the FTM-enabled AP; means for receiving an FTM response message from the FTM-enabled AP; means for transmitting an FTM acknowledgement message from the wireless station to the FTM-enabled AP; and means for receiving timing information from the FTM-enabled AP, wherein the timing information comprises a time of departure of the FTM response message from the FTM-enabled AP and a time of arrival of the FTM acknowledgement message at the FTM-enabled AP. 24. The wireless station of claim 17, wherein the non-FTM message comprises a request-to-send (RTS) message, and wherein the non-FTM response message comprises a clear-to-send (CTS) message. 25. A non-transitory computer-readable medium including program code stored thereon, wherein the program code includes instructions to direct a wireless station to: perform a fine timing measurement (FTM) procedure with each of one or more FTM-enabled access points (APs) to obtain a respective one or more FTM-based round-trip time (RTT) measurements between the wireless station and each of the one or more FTM-enabled APs, wherein the FTM procedure comprises: exchanging at least one FTM message with an FTM-enabled AP of the one or more FTM-enabled APs; and calculating an FTM-based RTT measurement of the one or more FTM-based RTT measurements based on the exchanging of the at least one FTM message; perform a non-FTM procedure with each of one or more non-FTM-enabled APs to obtain a respective one or more non-FTM-based RTT measurements, wherein the non-FTM procedure includes: transmitting a non-FTM message from the wireless station to a non-FTM-enabled AP of the one or more non-FTM-enabled APs; receiving a non-FTM response message from the non-FTM-enabled AP of the one or more non-FTM-enabled APs in response to the non-FTM message; and calculating a non-FTM-based RTT measurement of the one or more non-FTM-based RTT measurements based on a difference between a time of arrival of the non-FTM response message and a time of departure of the non-FTM message; and calculate a position of the wireless station based on both the one or more FTM-based RTT measurements and the one or more non-FTM-based RTT measurements. 26. The non-transitory computer-readable medium of claim 25, wherein the program code further includes instructions to direct a wireless station to: obtain a position of the one or more non-FTM-enabled APs and a position of the one or more FTM-enabled APs; determine whether a number of the one or more FTM-enabled APs is greater than a first threshold; and if so, jointly calculate the position of the wireless station and a turnaround calibration factor (TCF) for at least one of the one or more non-FTM-enabled APs based on both the one or more FTM-based RTT measurements and the one or more non-FTM-based RTT measurements. 27. The non-transitory computer-readable medium of claim 25, wherein the program code further includes instructions to direct a wireless station to: determine whether a number of the one or more FTM-enabled APs is greater than a second threshold; and if so, jointly calculate the position of the wireless station, a position of the one or more non-FTM-enabled APs, and a turnaround calibration factor (TCF) for at least one of the one or more non-FTM-enabled APs based on both the one or more FTM-based RTT measurements and the one or more non-FTM-based RTT measurements. 28. The non-transitory computer-readable medium of claim 25, wherein the program code further includes instructions to direct a wireless station to: determine whether a number of the one or more FTM-enabled APs is greater than a third threshold; and if so, determine a position of the wireless station based on the one or more FTM-based RTT measurements; and calculate a turnaround calibration factor (TCF) for at least one of the one or more non-FTM-enabled APs based on the position of the wireless station and both the one or more FTM-based RTT measurements and the one or more non-FTM-based RTT measurements. 29. The non-transitory computer-readable medium of claim 25, wherein the exchanging the at least one FTM message with the FTM-enabled AP of the one or more FTM-enabled APs of the FTM procedure comprises: transmitting an FTM request message from the wireless station to the FTM-enabled AP; receiving an FTM response message from the FTM-enabled AP; transmitting an FTM acknowledgement message from the wireless station to the FTM-enabled AP; and receiving timing information from the FTM-enabled AP, wherein the timing information comprises a time of departure of the FTM response message from the FTM-enabled AP and a time of arrival of the FTM acknowledgement message at the FTM-enabled AP. 30. The non-transitory computer-readable medium of claim 25, wherein the non-FTM message comprises a request-to-send (RTS) message, and wherein the non-FTM response message comprises a clear-to-send (CTS) message.
2,400
8,015
8,015
14,924,374
2,441
Techniques for processing application data are described. The techniques include transmitting packets of application data to a data management server. The data management server maintains rules that dictate where the packets go as well as what actions are taken in response to the packets. Based on the rules, the data management server transmits the packets to destinations that may perform various actions. The actions performed by destinations may include logging data received from the applications, or performing other actions such as notifying an administrator or other entity of a particular event, or the like. The described architecture decouples functions such as logging, notification, and the like from the applications for which they are performed, which provides benefits such as improved scalability, as well as removing the need for application developers to build such functionality directly into the applications. This reduces application development time and improves the robustness of application functionality.
1. A method for processing application data, comprising: receiving a first packet of data from a first packet emitter associated with a first application providing the application data; identifying a first emitter ID associated with the first packet emitter; identifying a first application data processing destination based on the first emitter ID; transmitting the first packet of data to the first application data processing destination; and processing the first packet of data according to a first rule associated with the emitter ID and associated with the first application data processing destination, the first rule comprising an indication that the first data processing destination is to process the first packet. 2. The method of claim 1, wherein the first rule comprises: an indication that the first application data processing destination is to perform a first action based on the first packet due to the first packet including the emitter ID that is associated with the first application. 3. The method of claim 1, further comprising: examining the first rule to determine that an indication of the first destination is included within the first rule; and transmitting the first rule to the first application data processing destination responsive to examining the first rule to determine that the indication of the first application data processing destination is included in the first rule. 4. The method of claim 3, wherein transmitting the first rule to the first application data processing destination comprises: transmitting the first rule to a messaging bus that stores a queue associated with the first application data processing destination; determining that the first application data processing destination is subscribed to the queue; and transmitting the first rule to the first application data processing application responsive to determining that the first application processing destination is subscribed to the queue. 5. The method of claim 1, wherein the first rule comprises: a trigger that specifies a condition that, when satisfied by data included in the first packet, causes the first application data processing destination to perform a first action specified in the first rule. 6. The method of claim 5, wherein: the first application data processing destination comprises a log server, and the first action comprises logging data included within the first packet to storage. 7. The method of claim 5, wherein: the first application data processing destination comprises an event server, and the first action comprises transmitting a notification via a notification transmission protocol. 8. The method of claim 1, further comprising: receiving a second packet of data from a second packet emitter associated with a second application; determining that no rules exist that specify that any destination processes packets received from the second packet emitter; and responsive to determining that no rules exist that specify that any destination processes packets received from the second packet emitter, discarding the second packet of data. 9. The method of claim 1, wherein transmitting the first packet of data to the first application data processing destination comprises: transmitting the first packet of data to a messaging bus that stores a queue associated with the first packet emitter; determining that the first application data processing destination is subscribed to the queue; and transmitting the first packet of data to the first application data processing application responsive to determining that the first application processing destination is subscribed to the queue. 10. A system for processing application data, comprising: a data management server configured to: receive a first packet of data from a first packet emitter associated with a first application providing the application data, identify a first emitter ID associated with the first packet emitter, identify a first application data processing destination based on the first emitter ID, and transmit the first packet of data to the first application data processing destination; and the first application data processing destination, configured to process the first packet of data according to a first rule associated with the emitter ID and associated with the first application data processing destination, the first rule comprising an indication that the first data processing destination is to process the first packet. 11. The system of claim 10, wherein the first rule comprises: an indication that the first application data processing destination is to perform a first action based on the first packet due to the first packet including the emitter ID that is associated with the first application. 12. The system of claim 10, wherein the data management server is further configured to: examine the first rule to determine that an indication of the first destination is included within the first rule; and transmit the first rule to the first application data processing destination responsive to examining the first rule to determine that the indication of the first application data processing destination is included in the first rule. 13. The system of claim 12, wherein the data management server is configured to transmit the first rule to the first application data processing destination by: transmitting the first rule to a messaging bus that stores a queue associated with the first application data processing destination; determining that the first application data processing destination is subscribed to the queue; and transmitting the first rule to the first application data processing application responsive to determining that the first application processing destination is subscribed to the queue. 14. The system of claim 10, wherein the first rule comprises: a trigger that specifies a condition that, when satisfied by data included in the first packet, causes the first application data processing destination to perform a first action specified in the first rule. 15. The system of claim 14, wherein: the first application data processing destination comprises a log server, and the first action comprises logging data included within the first packet to storage. 16. The system of claim 14, wherein: the first application data processing destination comprises an event server, and the first action comprises transmitting a notification via a notification transmission protocol. 17. The system of claim 10, wherein the data management server is further configured to: receive a second packet of data from a second packet emitter associated with a second application; determine that no rules exist that specify that any destination processes packets received from the second packet emitter; and responsive to determining that no rules exist that specify that any destination processes packets received from the second packet emitter, discard the second packet of data. 18. The system of claim 10, wherein the data management server is configured to transmit the first packet of data to the first application data processing destination by: transmitting the first packet of data to a messaging bus that stores a queue associated with the first packet emitter; determining that the first application data processing destination is subscribed to the queue; and transmitting the first packet of data to the first application data processing application responsive to determining that the first application processing destination is subscribed to the queue. 19. A non-transitory computer-readable medium storing instructions that, when executed by a processor, cause the processor to perform a method, the method comprising: receiving a first packet of data from a first packet emitter associated with a first application providing the application data; identifying a first emitter ID associated with the first packet emitter; identifying a first application data processing destination based on the first emitter ID; transmitting the first packet of data to the first application data processing destination; and processing the first packet of data according to a first rule associated with the emitter ID and associated with the first application data processing destination, the first rule comprising an indication that the first data processing destination is to process the first packet. 20. The non-transitory computer-readable medium of claim 19, wherein the first rule comprises: an indication that the first application data processing destination is to perform a first action based on the first packet due to the first packet including the emitter ID that is associated with the first application.
Techniques for processing application data are described. The techniques include transmitting packets of application data to a data management server. The data management server maintains rules that dictate where the packets go as well as what actions are taken in response to the packets. Based on the rules, the data management server transmits the packets to destinations that may perform various actions. The actions performed by destinations may include logging data received from the applications, or performing other actions such as notifying an administrator or other entity of a particular event, or the like. The described architecture decouples functions such as logging, notification, and the like from the applications for which they are performed, which provides benefits such as improved scalability, as well as removing the need for application developers to build such functionality directly into the applications. This reduces application development time and improves the robustness of application functionality.1. A method for processing application data, comprising: receiving a first packet of data from a first packet emitter associated with a first application providing the application data; identifying a first emitter ID associated with the first packet emitter; identifying a first application data processing destination based on the first emitter ID; transmitting the first packet of data to the first application data processing destination; and processing the first packet of data according to a first rule associated with the emitter ID and associated with the first application data processing destination, the first rule comprising an indication that the first data processing destination is to process the first packet. 2. The method of claim 1, wherein the first rule comprises: an indication that the first application data processing destination is to perform a first action based on the first packet due to the first packet including the emitter ID that is associated with the first application. 3. The method of claim 1, further comprising: examining the first rule to determine that an indication of the first destination is included within the first rule; and transmitting the first rule to the first application data processing destination responsive to examining the first rule to determine that the indication of the first application data processing destination is included in the first rule. 4. The method of claim 3, wherein transmitting the first rule to the first application data processing destination comprises: transmitting the first rule to a messaging bus that stores a queue associated with the first application data processing destination; determining that the first application data processing destination is subscribed to the queue; and transmitting the first rule to the first application data processing application responsive to determining that the first application processing destination is subscribed to the queue. 5. The method of claim 1, wherein the first rule comprises: a trigger that specifies a condition that, when satisfied by data included in the first packet, causes the first application data processing destination to perform a first action specified in the first rule. 6. The method of claim 5, wherein: the first application data processing destination comprises a log server, and the first action comprises logging data included within the first packet to storage. 7. The method of claim 5, wherein: the first application data processing destination comprises an event server, and the first action comprises transmitting a notification via a notification transmission protocol. 8. The method of claim 1, further comprising: receiving a second packet of data from a second packet emitter associated with a second application; determining that no rules exist that specify that any destination processes packets received from the second packet emitter; and responsive to determining that no rules exist that specify that any destination processes packets received from the second packet emitter, discarding the second packet of data. 9. The method of claim 1, wherein transmitting the first packet of data to the first application data processing destination comprises: transmitting the first packet of data to a messaging bus that stores a queue associated with the first packet emitter; determining that the first application data processing destination is subscribed to the queue; and transmitting the first packet of data to the first application data processing application responsive to determining that the first application processing destination is subscribed to the queue. 10. A system for processing application data, comprising: a data management server configured to: receive a first packet of data from a first packet emitter associated with a first application providing the application data, identify a first emitter ID associated with the first packet emitter, identify a first application data processing destination based on the first emitter ID, and transmit the first packet of data to the first application data processing destination; and the first application data processing destination, configured to process the first packet of data according to a first rule associated with the emitter ID and associated with the first application data processing destination, the first rule comprising an indication that the first data processing destination is to process the first packet. 11. The system of claim 10, wherein the first rule comprises: an indication that the first application data processing destination is to perform a first action based on the first packet due to the first packet including the emitter ID that is associated with the first application. 12. The system of claim 10, wherein the data management server is further configured to: examine the first rule to determine that an indication of the first destination is included within the first rule; and transmit the first rule to the first application data processing destination responsive to examining the first rule to determine that the indication of the first application data processing destination is included in the first rule. 13. The system of claim 12, wherein the data management server is configured to transmit the first rule to the first application data processing destination by: transmitting the first rule to a messaging bus that stores a queue associated with the first application data processing destination; determining that the first application data processing destination is subscribed to the queue; and transmitting the first rule to the first application data processing application responsive to determining that the first application processing destination is subscribed to the queue. 14. The system of claim 10, wherein the first rule comprises: a trigger that specifies a condition that, when satisfied by data included in the first packet, causes the first application data processing destination to perform a first action specified in the first rule. 15. The system of claim 14, wherein: the first application data processing destination comprises a log server, and the first action comprises logging data included within the first packet to storage. 16. The system of claim 14, wherein: the first application data processing destination comprises an event server, and the first action comprises transmitting a notification via a notification transmission protocol. 17. The system of claim 10, wherein the data management server is further configured to: receive a second packet of data from a second packet emitter associated with a second application; determine that no rules exist that specify that any destination processes packets received from the second packet emitter; and responsive to determining that no rules exist that specify that any destination processes packets received from the second packet emitter, discard the second packet of data. 18. The system of claim 10, wherein the data management server is configured to transmit the first packet of data to the first application data processing destination by: transmitting the first packet of data to a messaging bus that stores a queue associated with the first packet emitter; determining that the first application data processing destination is subscribed to the queue; and transmitting the first packet of data to the first application data processing application responsive to determining that the first application processing destination is subscribed to the queue. 19. A non-transitory computer-readable medium storing instructions that, when executed by a processor, cause the processor to perform a method, the method comprising: receiving a first packet of data from a first packet emitter associated with a first application providing the application data; identifying a first emitter ID associated with the first packet emitter; identifying a first application data processing destination based on the first emitter ID; transmitting the first packet of data to the first application data processing destination; and processing the first packet of data according to a first rule associated with the emitter ID and associated with the first application data processing destination, the first rule comprising an indication that the first data processing destination is to process the first packet. 20. The non-transitory computer-readable medium of claim 19, wherein the first rule comprises: an indication that the first application data processing destination is to perform a first action based on the first packet due to the first packet including the emitter ID that is associated with the first application.
2,400
8,016
8,016
15,172,750
2,433
Disclosed are various embodiments for an authentication manager. In one embodiment, the authentication manager performs an identity verification on a network site. The authentication manager determines that a particular portable data store is present in the client computing device, and then reads a security credential from the particular portable data store. The authentication manager automatically sends data encoding the security credential to the network site.
1. A system, comprising: a client computing device; and an authentication manager executable in the client computing device, wherein when executed the authentication manager causes the client computing device to at least: perform an identity verification on a network site; determine that a particular portable data store is present in the client computing device; read a security credential from the particular portable data store; and automatically send data encoding the security credential to the network site. 2. The system of claim 1, wherein the particular portable data store stores a plurality of security credentials corresponding to a plurality of network sites. 3. The system of claim 1, wherein the particular portable data store is removably attached to the client computing device. 4. The system of claim 1, wherein the security credential is stored by the particular portable data store in an encrypted format. 5. The system of claim 1, wherein the particular portable data store includes a biometric recognition device, and the particular portable data store is configured to provide access to the security credential in response to the biometric recognition device authenticating a user. 6. The system of claim 5, wherein the biometric recognition device comprises a fingerprint scanner. 7. The system of claim 1, wherein the particular portable data store comprises hardware configured to receive a user-provided password, and access by the authentication manager to the security credential is provided in response to the user-provided password being entered. 8. The system of claim 1, wherein the authentication manager is stored on the particular portable data store and is executed by the client computing device in response to the particular portable data store being attached to the client computing device. 9. A method, comprising: receiving, via an authentication manager executed by a client, a configuration file including a security credential specification for a network site; extracting, via the authentication manager executed by the client, a maximum credential length and a character set from the security credential specification; and automatically generating, via the authentication manager executed by the client, a security credential for the network site based at least in part on the maximum credential length and the character set allowed by the security credential specification. 10. The method of claim 9, further comprising sharing, via the authentication manager executed by the client, the security credential with a plurality of authorized users. 11. The method of claim 9, wherein the configuration file is received from a third-party configuration file server. 12. The method of claim 9, further comprising: verifying, via the authentication manager executed by the client, an identity of the network site; retrieving, via the authentication manager executed by the client, the security credential from a data store; and automatically providing, via the authentication manager executed by the client, data encoding the security credential to the network site in order to authenticate. 13. The method of claim 9, further comprising: determining, via the authentication manager executed by the client, an account creation endpoint for the network site specified in the configuration file; and automatically creating, via the authentication manager executed by the client, an account with the network site having the security credential via the account creation endpoint. 14. The method of claim 9, further comprising storing, via the authentication manager executed by the client, the security credential in a portable data store attached to the client. 15. The method of claim 14, wherein the authentication manager is stored on and executed from the portable data store. 16. The method of claim 9, further comprising automatically filling, via the authentication manager executed by the client, the security credential in an account creation form for the network site. 17. The method of claim 16, further comprising: receiving, via the authentication manager executed by the client, a user tag of an input element in the account creation form; storing, via the authentication manager executed by the client, the user tag in another configuration file; and sending, via the authentication manager executed by the client, the other configuration file to a configuration file server accessible by a plurality of other instances of the authentication manager associated with a plurality of other users. 18. A non-transitory computer-readable medium embodying an authentication manager executable in a client computing device, wherein when executed the authentication manager causes the client computing device to at least: receive a configuration file including a security credential specification for a network site; extract a parameter from the security credential specification; automatically generate a security credential for the network site based at least in part on the parameter from the security credential specification; automatically create an account for the network site using the security credential; and store the security credential in a particular portable data store removably attached to the client computing device. 19. The non-transitory computer-readable medium of claim 18, wherein when executed the authentication manager further causes the client computing device to at least: perform an identity verification on the network site; determine that the particular portable data store is present in the client computing device; read the security credential from the particular portable data store; and automatically send data encoding the security credential to the network site. 20. The non-transitory computer-readable medium of claim 18, wherein the parameter comprises at least one of: a maximum credential length or a character set.
Disclosed are various embodiments for an authentication manager. In one embodiment, the authentication manager performs an identity verification on a network site. The authentication manager determines that a particular portable data store is present in the client computing device, and then reads a security credential from the particular portable data store. The authentication manager automatically sends data encoding the security credential to the network site.1. A system, comprising: a client computing device; and an authentication manager executable in the client computing device, wherein when executed the authentication manager causes the client computing device to at least: perform an identity verification on a network site; determine that a particular portable data store is present in the client computing device; read a security credential from the particular portable data store; and automatically send data encoding the security credential to the network site. 2. The system of claim 1, wherein the particular portable data store stores a plurality of security credentials corresponding to a plurality of network sites. 3. The system of claim 1, wherein the particular portable data store is removably attached to the client computing device. 4. The system of claim 1, wherein the security credential is stored by the particular portable data store in an encrypted format. 5. The system of claim 1, wherein the particular portable data store includes a biometric recognition device, and the particular portable data store is configured to provide access to the security credential in response to the biometric recognition device authenticating a user. 6. The system of claim 5, wherein the biometric recognition device comprises a fingerprint scanner. 7. The system of claim 1, wherein the particular portable data store comprises hardware configured to receive a user-provided password, and access by the authentication manager to the security credential is provided in response to the user-provided password being entered. 8. The system of claim 1, wherein the authentication manager is stored on the particular portable data store and is executed by the client computing device in response to the particular portable data store being attached to the client computing device. 9. A method, comprising: receiving, via an authentication manager executed by a client, a configuration file including a security credential specification for a network site; extracting, via the authentication manager executed by the client, a maximum credential length and a character set from the security credential specification; and automatically generating, via the authentication manager executed by the client, a security credential for the network site based at least in part on the maximum credential length and the character set allowed by the security credential specification. 10. The method of claim 9, further comprising sharing, via the authentication manager executed by the client, the security credential with a plurality of authorized users. 11. The method of claim 9, wherein the configuration file is received from a third-party configuration file server. 12. The method of claim 9, further comprising: verifying, via the authentication manager executed by the client, an identity of the network site; retrieving, via the authentication manager executed by the client, the security credential from a data store; and automatically providing, via the authentication manager executed by the client, data encoding the security credential to the network site in order to authenticate. 13. The method of claim 9, further comprising: determining, via the authentication manager executed by the client, an account creation endpoint for the network site specified in the configuration file; and automatically creating, via the authentication manager executed by the client, an account with the network site having the security credential via the account creation endpoint. 14. The method of claim 9, further comprising storing, via the authentication manager executed by the client, the security credential in a portable data store attached to the client. 15. The method of claim 14, wherein the authentication manager is stored on and executed from the portable data store. 16. The method of claim 9, further comprising automatically filling, via the authentication manager executed by the client, the security credential in an account creation form for the network site. 17. The method of claim 16, further comprising: receiving, via the authentication manager executed by the client, a user tag of an input element in the account creation form; storing, via the authentication manager executed by the client, the user tag in another configuration file; and sending, via the authentication manager executed by the client, the other configuration file to a configuration file server accessible by a plurality of other instances of the authentication manager associated with a plurality of other users. 18. A non-transitory computer-readable medium embodying an authentication manager executable in a client computing device, wherein when executed the authentication manager causes the client computing device to at least: receive a configuration file including a security credential specification for a network site; extract a parameter from the security credential specification; automatically generate a security credential for the network site based at least in part on the parameter from the security credential specification; automatically create an account for the network site using the security credential; and store the security credential in a particular portable data store removably attached to the client computing device. 19. The non-transitory computer-readable medium of claim 18, wherein when executed the authentication manager further causes the client computing device to at least: perform an identity verification on the network site; determine that the particular portable data store is present in the client computing device; read the security credential from the particular portable data store; and automatically send data encoding the security credential to the network site. 20. The non-transitory computer-readable medium of claim 18, wherein the parameter comprises at least one of: a maximum credential length or a character set.
2,400
8,017
8,017
15,448,254
2,491
A software module executes in a first isolated execution environment. The module determines the first environment has caused data to the written to a first clipboard maintained by the first environment. The module consults policy data to determine whether the data should additionally be written to a second clipboard maintained by a second isolated execution environment. The policy data does not allow one or more types of clipboard objects to be written to the second clipboard even if they were written to the first clipboard at the initiation of or approved by a user to prevent the user from introducing a potentially hazardous type of object into the second clipboard. Upon the module determining that the policy data allows the data to be written to the second clipboard, the software module causes the data to written to the second clipboard.
1. One or more non-transitory machine-readable storage mediums storing one or more sequences of instructions, which when executed by one or more processors, cause: upon a software module, executing in a first isolated execution environment, determining that the first isolated execution environment has caused data to the written to a first clipboard maintained by the first isolated execution environment, the software module consulting policy data to determine whether the data should additionally be written to a second clipboard maintained by a second isolated execution environment, wherein the policy data does not allow one or more types of clipboard objects to be written to the second clipboard even a particular object of said one or more types of clipboard objects was written to the first clipboard at the initiation of or approved by said user to prevent said user from introducing a potentially hazardous type of object into said second clipboard; and upon the software module determining that the policy data allows the data to be written to the second clipboard, the software module causing the data to be written to the second clipboard. 2. The one or more non-transitory machine-readable storage mediums of claim 1, wherein execution of the one or more sequences of instructions further cause: the software module, in consultation with the policy data, verifying said data prior to permitting said data to be written to the second clipboard maintained by the second isolated execution environment. 3. The one or more non-transitory machine-readable storage mediums of claim 1, wherein execution of the one or more sequences of instructions further cause: upon the software module determining a portion of said data written to a first clipboard is a particular type of clipboard object, causing said portion of said data to be converted to a second type of clipboard object permitted by said policy data prior to writing said data to the second clipboard maintained by the second isolated execution environment. 4. The one or more non-transitory machine-readable storage mediums of claim 1, wherein the policy data resides within the second isolated execution environment. 5. The one or more non-transitory machine-readable storage mediums of claim 1, wherein execution of the one or more sequences of instructions further causes: upon determining that a particular policy defined by the policy data considers separate data transfers to the first clipboard as a single logical unit, the software module causing each of the separate data transfers to be written to the second clipboard as one logical unit after determining the policy data allows the separate data transfers to be written to the second clipboard. 6. The one or more non-transitory machine-readable storage mediums of claim 1, wherein the software module consulting the policy data further comprises: the software module determining whether the policy defined by the policy data permits an object type of data written to a first clipboard to be written to the second clipboard maintained by the second isolated execution environment. 7. The one or more non-transitory machine-readable storage mediums of claim 1, wherein a policy defined by the policy data is dependent upon, at least in part, a level of trust between the first isolated execution environment and the second isolated execution environment. 8. An apparatus, comprising: one or more processors; and one or more non-transitory machine-readable storage mediums storing one or more sequences of instructions, which when executed, cause: upon a software module, executing in a first isolated execution environment, determining that the first isolated execution environment has caused data to be written to a first clipboard maintained by the first isolated execution environment, the software module consulting policy data to determine whether the data should additionally be written to a second clipboard maintained by a second isolated execution environment, wherein the policy data does not allow one or more types of clipboard objects to be written to the second clipboard even a particular object of said one or more types of clipboard objects was written to the first clipboard at the initiation of or approved by said user to prevent said user from introducing a potentially hazardous type of object into said second clipboard; and upon the software module determining that the policy data allows the data to be written to the second clipboard, the software module causing the data to be written to the second clipboard. 9. The apparatus of claim 8, wherein execution of the one or more sequences of instructions further cause: the software module, in consultation with the policy data, verifying said data prior to permitting said data to be written to the second clipboard maintained by the second isolated execution environment. 10. The apparatus of claim 8, wherein execution of the one or more sequences of instructions further cause: upon the software module determining a portion of said data written to a first clipboard is a particular type of clipboard object, causing said portion of said data to be converted to a second type of clipboard object permitted by said policy data prior to writing said data to the second clipboard maintained by the second isolated execution environment. 11. The apparatus of claim 8, wherein the policy data resides within the second isolated execution environment. 12. The apparatus of claim 8, wherein execution of the one or more sequences of instructions further causes: upon determining that a particular policy defined by the policy data considers separate data transfers to the first clipboard as a single logical unit, the software module causing each of the separate data transfers to be written to the second clipboard as one logical unit after determining the policy data allows the separate data transfers to be written to the second clipboard. 13. The apparatus of claim 8, wherein the software module consulting the policy data further comprises: the software module determining whether the policy defined by the policy data permits an object type of data written to a first clipboard to be written to the second clipboard maintained by the second isolated execution environment. 14. The apparatus of claim 8, wherein a policy defined by the policy data is dependent upon, at least in part, a level of trust between the first isolated execution environment and the second isolated execution environment. 15. A method performed by one or more processors executing one or more sequences of instructions, comprising: upon a software module, executing in a first isolated execution environment, determining that the first isolated execution environment has caused data to be written to a first clipboard maintained by the first isolated execution environment, the software module consulting policy data to determine whether the data should additionally be written to a second clipboard maintained by a second isolated execution environment, wherein the policy data does not allow one or more types of clipboard objects to be written to the second clipboard even a particular object of said one or more types of clipboard objects was written to the first clipboard at the initiation of or approved by said user to prevent said user from introducing a potentially hazardous type of object into said second clipboard; and upon the software module determining that the policy data allows the data to be written to the second clipboard, the software module causing the data to be written to the second clipboard. 16. The method of claim 15, wherein execution of the one or more sequences of instructions further cause: the software module, in consultation with the policy data, verifying said data prior to permitting said data to be written to the second clipboard maintained by the second isolated execution environment. 17. The method of claim 15, wherein execution of the one or more sequences of instructions further cause: upon the software module determining a portion of said data written to a first clipboard is a particular type of clipboard object, causing said portion of said data to be converted to a second type of clipboard object permitted by said policy data prior to writing said data to the second clipboard maintained by the second isolated execution environment. 18. The method of claim 15, wherein the policy data resides within the second isolated execution environment. 19. The method of claim 15, wherein execution of the one or more sequences of instructions further causes: upon determining that a particular policy defined by the policy data considers separate data transfers to the first clipboard as a single logical unit, the software module causing each of the separate data transfers to be written to the second clipboard as one logical unit after determining the policy data allows the separate data transfers to be written to the second clipboard. 20. The method of claim 15, wherein the software module consulting the policy data further comprises: the software module determining whether the policy defined by the policy data permits an object type of data written to a first clipboard to be written to the second clipboard maintained by the second isolated execution environment. 21. The method of claim 15, wherein a policy defined by the policy data is dependent upon, at least in part, a level of trust between the first isolated execution environment and the second isolated execution environment.
A software module executes in a first isolated execution environment. The module determines the first environment has caused data to the written to a first clipboard maintained by the first environment. The module consults policy data to determine whether the data should additionally be written to a second clipboard maintained by a second isolated execution environment. The policy data does not allow one or more types of clipboard objects to be written to the second clipboard even if they were written to the first clipboard at the initiation of or approved by a user to prevent the user from introducing a potentially hazardous type of object into the second clipboard. Upon the module determining that the policy data allows the data to be written to the second clipboard, the software module causes the data to written to the second clipboard.1. One or more non-transitory machine-readable storage mediums storing one or more sequences of instructions, which when executed by one or more processors, cause: upon a software module, executing in a first isolated execution environment, determining that the first isolated execution environment has caused data to the written to a first clipboard maintained by the first isolated execution environment, the software module consulting policy data to determine whether the data should additionally be written to a second clipboard maintained by a second isolated execution environment, wherein the policy data does not allow one or more types of clipboard objects to be written to the second clipboard even a particular object of said one or more types of clipboard objects was written to the first clipboard at the initiation of or approved by said user to prevent said user from introducing a potentially hazardous type of object into said second clipboard; and upon the software module determining that the policy data allows the data to be written to the second clipboard, the software module causing the data to be written to the second clipboard. 2. The one or more non-transitory machine-readable storage mediums of claim 1, wherein execution of the one or more sequences of instructions further cause: the software module, in consultation with the policy data, verifying said data prior to permitting said data to be written to the second clipboard maintained by the second isolated execution environment. 3. The one or more non-transitory machine-readable storage mediums of claim 1, wherein execution of the one or more sequences of instructions further cause: upon the software module determining a portion of said data written to a first clipboard is a particular type of clipboard object, causing said portion of said data to be converted to a second type of clipboard object permitted by said policy data prior to writing said data to the second clipboard maintained by the second isolated execution environment. 4. The one or more non-transitory machine-readable storage mediums of claim 1, wherein the policy data resides within the second isolated execution environment. 5. The one or more non-transitory machine-readable storage mediums of claim 1, wherein execution of the one or more sequences of instructions further causes: upon determining that a particular policy defined by the policy data considers separate data transfers to the first clipboard as a single logical unit, the software module causing each of the separate data transfers to be written to the second clipboard as one logical unit after determining the policy data allows the separate data transfers to be written to the second clipboard. 6. The one or more non-transitory machine-readable storage mediums of claim 1, wherein the software module consulting the policy data further comprises: the software module determining whether the policy defined by the policy data permits an object type of data written to a first clipboard to be written to the second clipboard maintained by the second isolated execution environment. 7. The one or more non-transitory machine-readable storage mediums of claim 1, wherein a policy defined by the policy data is dependent upon, at least in part, a level of trust between the first isolated execution environment and the second isolated execution environment. 8. An apparatus, comprising: one or more processors; and one or more non-transitory machine-readable storage mediums storing one or more sequences of instructions, which when executed, cause: upon a software module, executing in a first isolated execution environment, determining that the first isolated execution environment has caused data to be written to a first clipboard maintained by the first isolated execution environment, the software module consulting policy data to determine whether the data should additionally be written to a second clipboard maintained by a second isolated execution environment, wherein the policy data does not allow one or more types of clipboard objects to be written to the second clipboard even a particular object of said one or more types of clipboard objects was written to the first clipboard at the initiation of or approved by said user to prevent said user from introducing a potentially hazardous type of object into said second clipboard; and upon the software module determining that the policy data allows the data to be written to the second clipboard, the software module causing the data to be written to the second clipboard. 9. The apparatus of claim 8, wherein execution of the one or more sequences of instructions further cause: the software module, in consultation with the policy data, verifying said data prior to permitting said data to be written to the second clipboard maintained by the second isolated execution environment. 10. The apparatus of claim 8, wherein execution of the one or more sequences of instructions further cause: upon the software module determining a portion of said data written to a first clipboard is a particular type of clipboard object, causing said portion of said data to be converted to a second type of clipboard object permitted by said policy data prior to writing said data to the second clipboard maintained by the second isolated execution environment. 11. The apparatus of claim 8, wherein the policy data resides within the second isolated execution environment. 12. The apparatus of claim 8, wherein execution of the one or more sequences of instructions further causes: upon determining that a particular policy defined by the policy data considers separate data transfers to the first clipboard as a single logical unit, the software module causing each of the separate data transfers to be written to the second clipboard as one logical unit after determining the policy data allows the separate data transfers to be written to the second clipboard. 13. The apparatus of claim 8, wherein the software module consulting the policy data further comprises: the software module determining whether the policy defined by the policy data permits an object type of data written to a first clipboard to be written to the second clipboard maintained by the second isolated execution environment. 14. The apparatus of claim 8, wherein a policy defined by the policy data is dependent upon, at least in part, a level of trust between the first isolated execution environment and the second isolated execution environment. 15. A method performed by one or more processors executing one or more sequences of instructions, comprising: upon a software module, executing in a first isolated execution environment, determining that the first isolated execution environment has caused data to be written to a first clipboard maintained by the first isolated execution environment, the software module consulting policy data to determine whether the data should additionally be written to a second clipboard maintained by a second isolated execution environment, wherein the policy data does not allow one or more types of clipboard objects to be written to the second clipboard even a particular object of said one or more types of clipboard objects was written to the first clipboard at the initiation of or approved by said user to prevent said user from introducing a potentially hazardous type of object into said second clipboard; and upon the software module determining that the policy data allows the data to be written to the second clipboard, the software module causing the data to be written to the second clipboard. 16. The method of claim 15, wherein execution of the one or more sequences of instructions further cause: the software module, in consultation with the policy data, verifying said data prior to permitting said data to be written to the second clipboard maintained by the second isolated execution environment. 17. The method of claim 15, wherein execution of the one or more sequences of instructions further cause: upon the software module determining a portion of said data written to a first clipboard is a particular type of clipboard object, causing said portion of said data to be converted to a second type of clipboard object permitted by said policy data prior to writing said data to the second clipboard maintained by the second isolated execution environment. 18. The method of claim 15, wherein the policy data resides within the second isolated execution environment. 19. The method of claim 15, wherein execution of the one or more sequences of instructions further causes: upon determining that a particular policy defined by the policy data considers separate data transfers to the first clipboard as a single logical unit, the software module causing each of the separate data transfers to be written to the second clipboard as one logical unit after determining the policy data allows the separate data transfers to be written to the second clipboard. 20. The method of claim 15, wherein the software module consulting the policy data further comprises: the software module determining whether the policy defined by the policy data permits an object type of data written to a first clipboard to be written to the second clipboard maintained by the second isolated execution environment. 21. The method of claim 15, wherein a policy defined by the policy data is dependent upon, at least in part, a level of trust between the first isolated execution environment and the second isolated execution environment.
2,400
8,018
8,018
14,970,248
2,481
The present disclosure is drawn to scanning platforms. For example, a scanning platform can include an upper portion formed of a silicone polymer. The upper portion can include an upper surface that is chemically activated by a corona treatment. A layer of adhesion promoting compound can be bonded to the upper surface. The adhesion promoting compound can include a glycol, glycol ether, or combinations thereof.
1. A scanning platform, comprising: an upper portion formed of a silicone polymer, wherein an upper surface of the upper portion is chemically activated by a corona treatment; and a layer of an adhesion promoting compound bonded to the upper surface, wherein the adhesion promoting compound comprises a glycol, glycol ether, or combinations thereof. 2. The scanning platform according to claim 1, wherein the scanning platform is supported by and positioned above a base portion. 3. The scanning platform according to claim 2, wherein the scanning platform is rotatable with respect to the base portion. 4. The scanning platform according to claim 2, wherein the scanning platform is tiltable with respect to the base portion. 5. The scanning platform according to claim 2, wherein the scanning platform is rotatable and tiltable with respect to the base portion, and further comprising a controller in communication with the platform to rotate and tilt the platform. 6. The scanning platform according to claim 1, further comprising an adhesive putty adhered to the scanning platform. 7. The scanning platform according to claim 1, wherein the chemically activated upper surface includes hydroxyl groups, carboxyl groups, carbonyl groups, or combinations thereof such that the adhesion promoting compound is chemically bonded to the surface through ether linkages, ester linkages, urethane linkages, or combinations thereof. 8. The scanning platform according to claim 1, wherein the adhesion promoting compound comprises ethylene glycol, ethylene glycol monomethyl ether, diethylene glycol, diethylene glycol monomethyl ether, triethylene glycol, triethylene glycol monomethyl ether, propylene glycol, propylene glycol monomethyl ether, dipropylene glycol, dipropylene glycol monomethyl ether, tripropylene glycol, tripropylene glycol monomethyl ether, or combinations thereof. 9. The scanning platform according to claim 1, wherein the adhesion promoting compound further comprises an isocyanate, a poly-isocyanate, or combinations thereof. 10. A method, comprising: treating an upper surface of a scanning platform with a corona discharge to chemically activate the upper surface, wherein the upper surface is formed of a silicone polymer; applying a solution of an adhesion promoting compound to the chemically activated upper surface, wherein the adhesion promoting compound is a glycol, glycol ether, or combinations thereof; and drying the solution of the adhesion promoting compound to form a layer of the adhesion promoting compound bonded to the chemically activated upper surface. 11. The method of claim 10, wherein the solution of the adhesion promoting compound is applied within 15 minutes after treating the upper surface with the corona discharge. 12. The method according to claim 10, wherein the solution of the adhesion promoting compound is an aqueous solution. 13. The method according to claim 10, wherein the solution of the adhesion promoting compound is an aqueous solution comprising ethylene glycol, ethylene glycol monomethyl ether, diethylene glycol, diethylene glycol monomethyl ether, triethylene glycol, triethylene glycol monomethyl ether, propylene glycol, propylene glycol monomethyl ether, dipropylene glycol, dipropylene glycol monomethyl ether, tripropylene glycol, tripropylene glycol monomethyl ether, or combinations thereof. 14. The method according to claim 10, wherein the adhesion promoting compound further comprises an isocyanate, a poly-isocyanate, or combinations thereof. 15. The method according to claim 10, further comprising adhering an object to be scanned to the upper surface using an adhesive putty. 16. The method according to claim 15, wherein the adhesion of the adhesive putty to the upper surface is from about 2 to about 10 times stronger compared to an identical silicone polymer surface that has not been treated with the corona discharge and adhesion promoting compound. 17. A system, comprising: a scanning platform comprising: an upper portion formed of a silicone polymer, wherein the upper portion includes an upper surface that is chemically activated by a corona treatment, and a layer of an adhesion promoting compound bonded to the chemically activated upper surface, wherein the adhesion promoting compound comprises a glycol, glycol ether, or combinations thereof; a base portion, wherein the scanning platform is supported by and positioned above the base portion; a pattern projector to project a light pattern onto an object to be scanned on the scanning platform; a plurality of imagers to record digital images of light reflected from the object to be scanned on the platform; and a controller in communication with the scanning platform, pattern projector, and plurality of imagers, wherein the controller is to rotate the platform and form a digital 3-dimensional model of the object to be scanned based on the digital images formed by the plurality of imagers. 18. The system according to claim 17, wherein the adhesion promoting compound further comprises an isocyanate, a poly-isocyanate, or combinations thereof. 19. The system according to claim 17, wherein the scanning platform is tiltable with respect to the base portion 20. The system according to claim 17, further comprising an adhesive putty adhered to the scanning platform.
The present disclosure is drawn to scanning platforms. For example, a scanning platform can include an upper portion formed of a silicone polymer. The upper portion can include an upper surface that is chemically activated by a corona treatment. A layer of adhesion promoting compound can be bonded to the upper surface. The adhesion promoting compound can include a glycol, glycol ether, or combinations thereof.1. A scanning platform, comprising: an upper portion formed of a silicone polymer, wherein an upper surface of the upper portion is chemically activated by a corona treatment; and a layer of an adhesion promoting compound bonded to the upper surface, wherein the adhesion promoting compound comprises a glycol, glycol ether, or combinations thereof. 2. The scanning platform according to claim 1, wherein the scanning platform is supported by and positioned above a base portion. 3. The scanning platform according to claim 2, wherein the scanning platform is rotatable with respect to the base portion. 4. The scanning platform according to claim 2, wherein the scanning platform is tiltable with respect to the base portion. 5. The scanning platform according to claim 2, wherein the scanning platform is rotatable and tiltable with respect to the base portion, and further comprising a controller in communication with the platform to rotate and tilt the platform. 6. The scanning platform according to claim 1, further comprising an adhesive putty adhered to the scanning platform. 7. The scanning platform according to claim 1, wherein the chemically activated upper surface includes hydroxyl groups, carboxyl groups, carbonyl groups, or combinations thereof such that the adhesion promoting compound is chemically bonded to the surface through ether linkages, ester linkages, urethane linkages, or combinations thereof. 8. The scanning platform according to claim 1, wherein the adhesion promoting compound comprises ethylene glycol, ethylene glycol monomethyl ether, diethylene glycol, diethylene glycol monomethyl ether, triethylene glycol, triethylene glycol monomethyl ether, propylene glycol, propylene glycol monomethyl ether, dipropylene glycol, dipropylene glycol monomethyl ether, tripropylene glycol, tripropylene glycol monomethyl ether, or combinations thereof. 9. The scanning platform according to claim 1, wherein the adhesion promoting compound further comprises an isocyanate, a poly-isocyanate, or combinations thereof. 10. A method, comprising: treating an upper surface of a scanning platform with a corona discharge to chemically activate the upper surface, wherein the upper surface is formed of a silicone polymer; applying a solution of an adhesion promoting compound to the chemically activated upper surface, wherein the adhesion promoting compound is a glycol, glycol ether, or combinations thereof; and drying the solution of the adhesion promoting compound to form a layer of the adhesion promoting compound bonded to the chemically activated upper surface. 11. The method of claim 10, wherein the solution of the adhesion promoting compound is applied within 15 minutes after treating the upper surface with the corona discharge. 12. The method according to claim 10, wherein the solution of the adhesion promoting compound is an aqueous solution. 13. The method according to claim 10, wherein the solution of the adhesion promoting compound is an aqueous solution comprising ethylene glycol, ethylene glycol monomethyl ether, diethylene glycol, diethylene glycol monomethyl ether, triethylene glycol, triethylene glycol monomethyl ether, propylene glycol, propylene glycol monomethyl ether, dipropylene glycol, dipropylene glycol monomethyl ether, tripropylene glycol, tripropylene glycol monomethyl ether, or combinations thereof. 14. The method according to claim 10, wherein the adhesion promoting compound further comprises an isocyanate, a poly-isocyanate, or combinations thereof. 15. The method according to claim 10, further comprising adhering an object to be scanned to the upper surface using an adhesive putty. 16. The method according to claim 15, wherein the adhesion of the adhesive putty to the upper surface is from about 2 to about 10 times stronger compared to an identical silicone polymer surface that has not been treated with the corona discharge and adhesion promoting compound. 17. A system, comprising: a scanning platform comprising: an upper portion formed of a silicone polymer, wherein the upper portion includes an upper surface that is chemically activated by a corona treatment, and a layer of an adhesion promoting compound bonded to the chemically activated upper surface, wherein the adhesion promoting compound comprises a glycol, glycol ether, or combinations thereof; a base portion, wherein the scanning platform is supported by and positioned above the base portion; a pattern projector to project a light pattern onto an object to be scanned on the scanning platform; a plurality of imagers to record digital images of light reflected from the object to be scanned on the platform; and a controller in communication with the scanning platform, pattern projector, and plurality of imagers, wherein the controller is to rotate the platform and form a digital 3-dimensional model of the object to be scanned based on the digital images formed by the plurality of imagers. 18. The system according to claim 17, wherein the adhesion promoting compound further comprises an isocyanate, a poly-isocyanate, or combinations thereof. 19. The system according to claim 17, wherein the scanning platform is tiltable with respect to the base portion 20. The system according to claim 17, further comprising an adhesive putty adhered to the scanning platform.
2,400
8,019
8,019
15,642,617
2,432
Described herein are methods, systems, and software for encrypting and erasing data objects in a content node. In one example, a method of operating a content node that caches content divided into one or more data objects includes encrypting the one or more data objects using separate encryption keys for each of the one or more data objects, the separate encryption keys comprising a common portion shared by the one or more data objects and an individualized portion unique to each data object. The method further provides receiving a purge request to erase at least one data object and, responsive to the purge request, erasing at least one of the common portion or the individualized portion for the at least one data object based on the purge request.
1. A method of operating a computing system that stores data objects, the method comprising: receiving a purge request to erase one or more of the data objects, wherein each of the data objects is encrypted using an encryption key unique to the data object; in response to the purge request and for each data object of the one or more data objects, identifying an encryption key associated with the data object; identifying a type of purge request associated with the purge request; and erasing a portion of the encryption key for each of the one or more data objects based on the type of purge request. 2. The method of claim 1 further comprising encrypting the data objects using the encryption keys, wherein the encryption keys each comprise a plurality of portions. 3. The method of claim 2, wherein the plurality of portions comprise at least a first portion shared by the data objects and a second portion unique to each data object of the data objects. 4. The method of claim 3, wherein identifying a type of purge request associated with the purge request comprises identifying whether the purge request indicates a request to purge all of the data objects or a request to purge a subset of the data objects that is less than all of the data objects. 5. The method of claim 4, wherein erasing a portion of the encryption key for each of the one or more data objects based on the type of purge request comprises: if the purge request indicates a request to purge all of the data objects, erasing the first portion of the encryption key for each of the one or more data objects; if the purge request indicates a request to purge a subset of the data objects that is less than all of the data objects, erasing the second portion of the encryption key for each of the one or more data objects. 6. The method of claim 1, wherein the data objects comprise hypertext markup (HTML) pages, images, audio files, or videos. 7. The method of claim 1, wherein the computing system comprises a content node that caches the data objects between origin servers and end user devices. 8. The method of claim 7, wherein the data objects correspond to a first service provider, and wherein the computing system stores additional data objects corresponding to one or more additional service providers. 9. A computing apparatus comprising: one or more non-transitory computer readable storage media; a processing system operatively coupled with the one or more non-transitory computer readable media; and processing instructions stored on the one or more non-transitory computer readable storage media to store data objects on a computing system that, when read and executed by the processing system, direct the processing system to at least: receive a purge request to erase one or more of the data objects, wherein each of the data objects is encrypted using an encryption key unique to the data object; in response to the purge request and for each data object of the one or more data objects, identify an encryption key associated with the data object; identify a type of purge request associated with the purge request; and erase a portion of the encryption key for each of the one or more data objects based on the type of purge request. 10. The computing apparatus of claim 9, wherein the program instructions further direct the processing system to encrypt the data objects using the encryption keys, wherein the encryption keys each comprise a plurality of portions. 11. The computing apparatus of claim 10, wherein the plurality of portions comprise at least a first portion shared by the data objects and a second portion unique to each data object of the data objects. 12. The computing apparatus of claim 11, wherein identifying a type of purge request associated with the purge request comprises identifying whether the purge request indicates a request to purge all of the data objects or a request to purge a subset of the data objects that is less than all of the data objects. 13. The computing apparatus of claim 12, wherein erasing a portion of the encryption key for each of the one or more data objects based on the type of purge request comprises: if the purge request indicates a request to purge all of the data objects, erasing the first portion of the encryption key for each of the one or more data objects; if the purge request indicates a request to purge a subset of the data objects that is less than all of the data objects, erasing the second portion of the encryption key for each of the one or more data objects. 14. The computing apparatus of claim 9, wherein the data objects comprise hypertext markup (HTML) pages, images, audio files, or videos. 15. The computing apparatus of claim 9, wherein the computing system comprises a content node that caches the data objects between origin servers and end user devices. 16. The computing apparatus of claim 9, wherein the data objects correspond to a first service provider, and wherein the computing system stores additional data objects corresponding to one or more additional service providers. 17. An apparatus comprising: one or more non-transitory computer readable storage media; and processing instructions stored on the one or more non-transitory computer readable storage media to store data objects on a computing system that, when read and executed by a processing system, direct the processing system to at least: receive a purge request to erase one or more of the data objects, wherein each of the data objects is encrypted using an encryption key unique to the data object; in response to the purge request and for each data object of the one or more data objects, identify an encryption key associated with the data object; identify a type of purge request associated with the purge request; and erase a portion of the encryption key for each of the one or more data objects based on the type of purge request. 18. The apparatus of claim 17, wherein the program instructions further direct the processing system to encrypt the data objects using the encryption keys, wherein the encryption keys comprise a plurality of portions. 19. The apparatus of claim 18, wherein the plurality of portions comprise at least a first portion shared by the data objects and a second portion unique to each data object of the data objects. 20. The apparatus of claim 19, wherein identifying a type of purge request associated with the purge request comprises identifying whether the purge request indicates a request to purge all of the data objects or a request to purge a subset of the data objects that is less than all of the data objects, and wherein erasing a portion of the encryption key for each of the one or more data objects based on the type of purge request comprises: if the purge request indicates a request to purge all of the data objects, erasing the first portion of the encryption key for each of the one or more data objects; if the purge request indicates a request to purge a subset of the data objects that is less than all of the data objects, erasing the second portion of the encryption key for each of the one or more data objects.
Described herein are methods, systems, and software for encrypting and erasing data objects in a content node. In one example, a method of operating a content node that caches content divided into one or more data objects includes encrypting the one or more data objects using separate encryption keys for each of the one or more data objects, the separate encryption keys comprising a common portion shared by the one or more data objects and an individualized portion unique to each data object. The method further provides receiving a purge request to erase at least one data object and, responsive to the purge request, erasing at least one of the common portion or the individualized portion for the at least one data object based on the purge request.1. A method of operating a computing system that stores data objects, the method comprising: receiving a purge request to erase one or more of the data objects, wherein each of the data objects is encrypted using an encryption key unique to the data object; in response to the purge request and for each data object of the one or more data objects, identifying an encryption key associated with the data object; identifying a type of purge request associated with the purge request; and erasing a portion of the encryption key for each of the one or more data objects based on the type of purge request. 2. The method of claim 1 further comprising encrypting the data objects using the encryption keys, wherein the encryption keys each comprise a plurality of portions. 3. The method of claim 2, wherein the plurality of portions comprise at least a first portion shared by the data objects and a second portion unique to each data object of the data objects. 4. The method of claim 3, wherein identifying a type of purge request associated with the purge request comprises identifying whether the purge request indicates a request to purge all of the data objects or a request to purge a subset of the data objects that is less than all of the data objects. 5. The method of claim 4, wherein erasing a portion of the encryption key for each of the one or more data objects based on the type of purge request comprises: if the purge request indicates a request to purge all of the data objects, erasing the first portion of the encryption key for each of the one or more data objects; if the purge request indicates a request to purge a subset of the data objects that is less than all of the data objects, erasing the second portion of the encryption key for each of the one or more data objects. 6. The method of claim 1, wherein the data objects comprise hypertext markup (HTML) pages, images, audio files, or videos. 7. The method of claim 1, wherein the computing system comprises a content node that caches the data objects between origin servers and end user devices. 8. The method of claim 7, wherein the data objects correspond to a first service provider, and wherein the computing system stores additional data objects corresponding to one or more additional service providers. 9. A computing apparatus comprising: one or more non-transitory computer readable storage media; a processing system operatively coupled with the one or more non-transitory computer readable media; and processing instructions stored on the one or more non-transitory computer readable storage media to store data objects on a computing system that, when read and executed by the processing system, direct the processing system to at least: receive a purge request to erase one or more of the data objects, wherein each of the data objects is encrypted using an encryption key unique to the data object; in response to the purge request and for each data object of the one or more data objects, identify an encryption key associated with the data object; identify a type of purge request associated with the purge request; and erase a portion of the encryption key for each of the one or more data objects based on the type of purge request. 10. The computing apparatus of claim 9, wherein the program instructions further direct the processing system to encrypt the data objects using the encryption keys, wherein the encryption keys each comprise a plurality of portions. 11. The computing apparatus of claim 10, wherein the plurality of portions comprise at least a first portion shared by the data objects and a second portion unique to each data object of the data objects. 12. The computing apparatus of claim 11, wherein identifying a type of purge request associated with the purge request comprises identifying whether the purge request indicates a request to purge all of the data objects or a request to purge a subset of the data objects that is less than all of the data objects. 13. The computing apparatus of claim 12, wherein erasing a portion of the encryption key for each of the one or more data objects based on the type of purge request comprises: if the purge request indicates a request to purge all of the data objects, erasing the first portion of the encryption key for each of the one or more data objects; if the purge request indicates a request to purge a subset of the data objects that is less than all of the data objects, erasing the second portion of the encryption key for each of the one or more data objects. 14. The computing apparatus of claim 9, wherein the data objects comprise hypertext markup (HTML) pages, images, audio files, or videos. 15. The computing apparatus of claim 9, wherein the computing system comprises a content node that caches the data objects between origin servers and end user devices. 16. The computing apparatus of claim 9, wherein the data objects correspond to a first service provider, and wherein the computing system stores additional data objects corresponding to one or more additional service providers. 17. An apparatus comprising: one or more non-transitory computer readable storage media; and processing instructions stored on the one or more non-transitory computer readable storage media to store data objects on a computing system that, when read and executed by a processing system, direct the processing system to at least: receive a purge request to erase one or more of the data objects, wherein each of the data objects is encrypted using an encryption key unique to the data object; in response to the purge request and for each data object of the one or more data objects, identify an encryption key associated with the data object; identify a type of purge request associated with the purge request; and erase a portion of the encryption key for each of the one or more data objects based on the type of purge request. 18. The apparatus of claim 17, wherein the program instructions further direct the processing system to encrypt the data objects using the encryption keys, wherein the encryption keys comprise a plurality of portions. 19. The apparatus of claim 18, wherein the plurality of portions comprise at least a first portion shared by the data objects and a second portion unique to each data object of the data objects. 20. The apparatus of claim 19, wherein identifying a type of purge request associated with the purge request comprises identifying whether the purge request indicates a request to purge all of the data objects or a request to purge a subset of the data objects that is less than all of the data objects, and wherein erasing a portion of the encryption key for each of the one or more data objects based on the type of purge request comprises: if the purge request indicates a request to purge all of the data objects, erasing the first portion of the encryption key for each of the one or more data objects; if the purge request indicates a request to purge a subset of the data objects that is less than all of the data objects, erasing the second portion of the encryption key for each of the one or more data objects.
2,400
8,020
8,020
15,046,918
2,435
There are provided measures for enabling dynamic remote malware scanning. Such measures could exemplarily comprise include identification of an electronic file to be scanned for malware, generation of at least one scanning object of the identified electronic file on the basis of a dynamic configuration by a remote entity, said at least one scanning object being generated by using malware-susceptible data of the identified electronic file and neglecting malware-insusceptible data of the identified electronic file, transfer of the at least one scanning object of the identified electronic file for remote malware scanning to the remote entity, and execution of a malware scan of the at least one scanning object of the electronic file at the remote entity by a malware scanning engine or application.
1. A method of scanning an electronic file for malware in a network, the method comprising: generating one or more scanning objects of the electronic file on the basis of a dynamic configuration provided to a first node of the network by a second node of the network, the dynamic configuration defining malware-susceptible data of the electronic file, and the scanning object(s) being generated by using the malware-susceptible data of the electronic file and neglecting malware-insusceptible data of the electronic file; generating a signature of the scanning object(s); and if the signature matches a previously identified signature, determining whether or not the electronic file is malware based on an indication associated with the matching previously identified signature, or receiving an indication from the second node of whether or not the electronic file is malware; and if the signature does not match a previously identified signature, sending the scanning object(s) to the second node for scanning and receiving a scanning result from the second node. 2. The method according to claim 1, further comprising: determining if the signature matches a previously identified signature. 3. The method according to claim 1, further comprising: sending a request to the second node for a determination of whether the signature matches a previously identified signature, and receiving a determination result from the second node. 4. The method according to claim 3, wherein the indication from the second node of whether or not the electronic file is malware is received together with the determination result. 5. The method according to claim 1, further comprising: retrieving, at the first node, relevant file information for the electronic file; transferring the retrieved relevant file information from the first node to the second node; receiving one or more instructions for generation of one or more scanning objects of the electronic file from the second node at the first node; and setting the dynamic configuration on the basis of the received one or more instructions. 6. The method according to claim 5, said relevant file information including one or more of file type/format, file size, file permissions, libraries used, file structure, file header, and file path. 7. The method according to claim 5, said one or more instructions including at least one of an instruction on whether or not the one or more scanning objects are to be generated for the electronic file and an instruction on how the one or more scanning objects are to be generated for the electronic file. 8. The method according to claim 7, said instruction on how the one or more scanning objects are to be generated for the identified electronic file including at least one of an indication of malware-susceptible data to be used and/or malware-insusceptible data to be neglected and an indication of type/format and/or structure and/or contents of the at least one scanning object to be generated. 9. The method according to claim 1, wherein generating one or more scanning objects of the identified electronic file comprises at least one of: picking, from the electronic file, malware-susceptible data of the electronic file, and creating a skeleton version of the electronic file by copying malware-susceptible data of the electronic file into the skeleton version and omitting malware-insusceptible data of the electronic file from the skeleton version. 10. The method according to claim 1, wherein the electronic file to be scanned comprises a file of at least one of an Android Application Package (APK), a Portable Executable (PE), a Microsoft Soft Installer (MSI) or any other format capable of distributing and/or installing application software or middleware on a computer. 11. The method according to claim 1, wherein the first node comprises a malware scanning agent, and the second node comprises a malware scanning engine or application. 12. The method according to claim 1, performed at the first node. 13. An apparatus, comprising: a memory configured to store computer program code; and a processor configured to read and execute computer program code stored in the memory, wherein the processor is configured to cause the apparatus to perform: generating one or more scanning objects of the electronic file on the basis of a dynamic configuration provided to a first node of a network by a second node of the network, the dynamic configuration defining malware-susceptible data of the electronic file, and the scanning object(s) being generated by using the malware-susceptible data of the electronic file and neglecting malware-insusceptible data of the electronic file; generating a signature of the scanning object(s); and if the signature matches a previously identified signature, determining whether or not the electronic file is malware based on an indication associated with the matching previously identified signature, or receiving an indication from the second node of whether or not the electronic file is malware; and if the signature does not match a previously identified signature, sending the scanning object(s) to the second node for scanning and receiving a scanning result from the second node. 14. The apparatus according to claim 13, wherein the processor is further configured to cause the apparatus to perform: determining if the signature matches a previously identified signature. 15. The apparatus according to claim 13, wherein the processor is further configured to cause the apparatus to perform: sending a request to the second node for a determination of whether the signature matches a previously identified signature, and receiving a determination result from the second node. 16. The apparatus according to claim 15, wherein the indication from the second node of whether or not the electronic file is malware is received together with the determination result. 17. A computer program, comprising instructions which, when executed on at least one processor, cause the at least one processor to carry out a method according to claim 1.
There are provided measures for enabling dynamic remote malware scanning. Such measures could exemplarily comprise include identification of an electronic file to be scanned for malware, generation of at least one scanning object of the identified electronic file on the basis of a dynamic configuration by a remote entity, said at least one scanning object being generated by using malware-susceptible data of the identified electronic file and neglecting malware-insusceptible data of the identified electronic file, transfer of the at least one scanning object of the identified electronic file for remote malware scanning to the remote entity, and execution of a malware scan of the at least one scanning object of the electronic file at the remote entity by a malware scanning engine or application.1. A method of scanning an electronic file for malware in a network, the method comprising: generating one or more scanning objects of the electronic file on the basis of a dynamic configuration provided to a first node of the network by a second node of the network, the dynamic configuration defining malware-susceptible data of the electronic file, and the scanning object(s) being generated by using the malware-susceptible data of the electronic file and neglecting malware-insusceptible data of the electronic file; generating a signature of the scanning object(s); and if the signature matches a previously identified signature, determining whether or not the electronic file is malware based on an indication associated with the matching previously identified signature, or receiving an indication from the second node of whether or not the electronic file is malware; and if the signature does not match a previously identified signature, sending the scanning object(s) to the second node for scanning and receiving a scanning result from the second node. 2. The method according to claim 1, further comprising: determining if the signature matches a previously identified signature. 3. The method according to claim 1, further comprising: sending a request to the second node for a determination of whether the signature matches a previously identified signature, and receiving a determination result from the second node. 4. The method according to claim 3, wherein the indication from the second node of whether or not the electronic file is malware is received together with the determination result. 5. The method according to claim 1, further comprising: retrieving, at the first node, relevant file information for the electronic file; transferring the retrieved relevant file information from the first node to the second node; receiving one or more instructions for generation of one or more scanning objects of the electronic file from the second node at the first node; and setting the dynamic configuration on the basis of the received one or more instructions. 6. The method according to claim 5, said relevant file information including one or more of file type/format, file size, file permissions, libraries used, file structure, file header, and file path. 7. The method according to claim 5, said one or more instructions including at least one of an instruction on whether or not the one or more scanning objects are to be generated for the electronic file and an instruction on how the one or more scanning objects are to be generated for the electronic file. 8. The method according to claim 7, said instruction on how the one or more scanning objects are to be generated for the identified electronic file including at least one of an indication of malware-susceptible data to be used and/or malware-insusceptible data to be neglected and an indication of type/format and/or structure and/or contents of the at least one scanning object to be generated. 9. The method according to claim 1, wherein generating one or more scanning objects of the identified electronic file comprises at least one of: picking, from the electronic file, malware-susceptible data of the electronic file, and creating a skeleton version of the electronic file by copying malware-susceptible data of the electronic file into the skeleton version and omitting malware-insusceptible data of the electronic file from the skeleton version. 10. The method according to claim 1, wherein the electronic file to be scanned comprises a file of at least one of an Android Application Package (APK), a Portable Executable (PE), a Microsoft Soft Installer (MSI) or any other format capable of distributing and/or installing application software or middleware on a computer. 11. The method according to claim 1, wherein the first node comprises a malware scanning agent, and the second node comprises a malware scanning engine or application. 12. The method according to claim 1, performed at the first node. 13. An apparatus, comprising: a memory configured to store computer program code; and a processor configured to read and execute computer program code stored in the memory, wherein the processor is configured to cause the apparatus to perform: generating one or more scanning objects of the electronic file on the basis of a dynamic configuration provided to a first node of a network by a second node of the network, the dynamic configuration defining malware-susceptible data of the electronic file, and the scanning object(s) being generated by using the malware-susceptible data of the electronic file and neglecting malware-insusceptible data of the electronic file; generating a signature of the scanning object(s); and if the signature matches a previously identified signature, determining whether or not the electronic file is malware based on an indication associated with the matching previously identified signature, or receiving an indication from the second node of whether or not the electronic file is malware; and if the signature does not match a previously identified signature, sending the scanning object(s) to the second node for scanning and receiving a scanning result from the second node. 14. The apparatus according to claim 13, wherein the processor is further configured to cause the apparatus to perform: determining if the signature matches a previously identified signature. 15. The apparatus according to claim 13, wherein the processor is further configured to cause the apparatus to perform: sending a request to the second node for a determination of whether the signature matches a previously identified signature, and receiving a determination result from the second node. 16. The apparatus according to claim 15, wherein the indication from the second node of whether or not the electronic file is malware is received together with the determination result. 17. A computer program, comprising instructions which, when executed on at least one processor, cause the at least one processor to carry out a method according to claim 1.
2,400
8,021
8,021
14,302,229
2,424
A method of detecting frames in a video that demarcate a pre-determined type of video segment within the video is provided. The method includes identifying visually distinctive candidate marker frames within the video, grouping the candidate marker frames into a plurality of groups based on visual similarity, computing a collective score for each of the groups based on temporal proximity of each of the candidate marker frames within the group to related events occurring within the video, and selecting at least one of the groups based on the collective proximity scores as marker frames that demarcate the pre-determined type of video segment. A video processing electronic device and at least one non-transitory computer readable storage medium having computer program instructions stored thereon for performing the method are also provided.
1. A method of detecting frames in a video that demarcate a pre-determined type of video segment within the video, comprising the steps of: identifying visually distinctive frames within the video as candidate marker frames; grouping the candidate marker frames into a plurality of groups based on visual similarity; computing a collective score for each of the groups based on temporal proximity of each of the candidate marker frames in each of the groups to related events within the video; and selecting at least one of the groups based on the collective scores as marker frames that demarcate the pre-determined type of video segment. 2. A method according to claim 1, further comprising the step of locating the pre-determined type of video segments within the video by detecting location of marker frames in the video. 3. A method according to claim 2, further comprising the step of creating non-linear video content including the pre-determined type of video segments. 4. A method according to claim 1, wherein said related events within the video are detected events within the video. 5. A method according to claim 4, wherein said detected events are selected from a group consisting of slow motion, telestration, and absence of score panel, and wherein said selecting step includes determining the group of candidate markers having a collective score indicating the closest temporal proximity to the detected events. 6. A method according to claim 1, wherein said related events within the video are candidate marker frames from a second group of candidate marker frames, and wherein each of the candidate marker frames from the second group of candidate marker frames demarcates the end of a pre-determined type of video segment within the video. 7. A method according to claim 1, wherein said identifying step includes a step of separately evaluating each frame of the video. 8. A method according to claim 1, wherein said evaluating step includes transforming each frame of the video into a set of visual features. 9. A method according to claim 8, wherein the set of visual features includes at least one of a Color Layout Descriptor (CLD), a color histogram, and an Edge Histogram Descriptor (EHD). 10. A method according to claim 8, wherein said identifying step includes a step of generating a probability distribution for the set of visual features. 11. A method according to claim 10, wherein said identifying step includes classifying frames of the video as being a visually distinctive candidate marker frame based on crossing a threshold defined within the probability distribution. 12. A method according to claim 1, wherein said grouping step includes a step of determining visual similarity between candidate marker frames so that visually similar candidate marker frames are placed in the same group. 13. A method according to claim 12, wherein said grouping step includes hashing. 14. A method according to claim 1, wherein the marker frames demarcate at least one of the beginning and end of the pre-determined type of video segment. 15. A method according to claim 1, wherein the pre-determined type of video segment includes replay video segments. 16. A method according to claim 1, further comprising the step of searching and matching for the marker frames and neighbor frames surrounding the marker frames at different locations within the video. 17. A video processing electronic device for detecting frames in a video that demarcate a pre-determined type of video segment within the video, comprising at least one processing unit configured to: identify visually distinctive candidate marker frames within the video; group the candidate marker frames into a plurality of groups based on visual similarity; compute a score for each of the groups based on temporal proximity of each of the candidate marker frames within the group to related events in the pre-determined type of video segment within the video; and select at least one of the groups based on the score as marker frames that demarcate the pre-determined type of video segment. 18. A video processing electronic device according to claim 17, wherein said at least on processing unit is configured to automatically locate the pre-determined type of video segments within the video by detecting the marker frames in the video and to create video content including the pre-determined video segments. 19. At least one non-transitory computer readable storage medium having computer program instructions stored thereon that, when executed by at least one processor, cause the at least one processor to automatically detect frames in a video that demarcate a pre-determined type of video segment within the video by performing the following operations: identify visually distinctive candidate marker frames within the video; group the candidate marker frames into a plurality of groups based on visual similarity; compute a score for each of the groups based on temporal proximity of each of the candidate marker frames within the group to related events in the pre-determined type of video segment within the video; and select at least one of the groups based on the score as marker frames that demarcate the pre-determined type of video segment. 20. At least one non-transitory computer readable storage medium having computer program instructions stored thereon according to claim 19, wherein when the computer program instructions are executed by at least one processor, the pre-determined type of video segments within the video are automatically detected by detecting the marker frames in the video.
A method of detecting frames in a video that demarcate a pre-determined type of video segment within the video is provided. The method includes identifying visually distinctive candidate marker frames within the video, grouping the candidate marker frames into a plurality of groups based on visual similarity, computing a collective score for each of the groups based on temporal proximity of each of the candidate marker frames within the group to related events occurring within the video, and selecting at least one of the groups based on the collective proximity scores as marker frames that demarcate the pre-determined type of video segment. A video processing electronic device and at least one non-transitory computer readable storage medium having computer program instructions stored thereon for performing the method are also provided.1. A method of detecting frames in a video that demarcate a pre-determined type of video segment within the video, comprising the steps of: identifying visually distinctive frames within the video as candidate marker frames; grouping the candidate marker frames into a plurality of groups based on visual similarity; computing a collective score for each of the groups based on temporal proximity of each of the candidate marker frames in each of the groups to related events within the video; and selecting at least one of the groups based on the collective scores as marker frames that demarcate the pre-determined type of video segment. 2. A method according to claim 1, further comprising the step of locating the pre-determined type of video segments within the video by detecting location of marker frames in the video. 3. A method according to claim 2, further comprising the step of creating non-linear video content including the pre-determined type of video segments. 4. A method according to claim 1, wherein said related events within the video are detected events within the video. 5. A method according to claim 4, wherein said detected events are selected from a group consisting of slow motion, telestration, and absence of score panel, and wherein said selecting step includes determining the group of candidate markers having a collective score indicating the closest temporal proximity to the detected events. 6. A method according to claim 1, wherein said related events within the video are candidate marker frames from a second group of candidate marker frames, and wherein each of the candidate marker frames from the second group of candidate marker frames demarcates the end of a pre-determined type of video segment within the video. 7. A method according to claim 1, wherein said identifying step includes a step of separately evaluating each frame of the video. 8. A method according to claim 1, wherein said evaluating step includes transforming each frame of the video into a set of visual features. 9. A method according to claim 8, wherein the set of visual features includes at least one of a Color Layout Descriptor (CLD), a color histogram, and an Edge Histogram Descriptor (EHD). 10. A method according to claim 8, wherein said identifying step includes a step of generating a probability distribution for the set of visual features. 11. A method according to claim 10, wherein said identifying step includes classifying frames of the video as being a visually distinctive candidate marker frame based on crossing a threshold defined within the probability distribution. 12. A method according to claim 1, wherein said grouping step includes a step of determining visual similarity between candidate marker frames so that visually similar candidate marker frames are placed in the same group. 13. A method according to claim 12, wherein said grouping step includes hashing. 14. A method according to claim 1, wherein the marker frames demarcate at least one of the beginning and end of the pre-determined type of video segment. 15. A method according to claim 1, wherein the pre-determined type of video segment includes replay video segments. 16. A method according to claim 1, further comprising the step of searching and matching for the marker frames and neighbor frames surrounding the marker frames at different locations within the video. 17. A video processing electronic device for detecting frames in a video that demarcate a pre-determined type of video segment within the video, comprising at least one processing unit configured to: identify visually distinctive candidate marker frames within the video; group the candidate marker frames into a plurality of groups based on visual similarity; compute a score for each of the groups based on temporal proximity of each of the candidate marker frames within the group to related events in the pre-determined type of video segment within the video; and select at least one of the groups based on the score as marker frames that demarcate the pre-determined type of video segment. 18. A video processing electronic device according to claim 17, wherein said at least on processing unit is configured to automatically locate the pre-determined type of video segments within the video by detecting the marker frames in the video and to create video content including the pre-determined video segments. 19. At least one non-transitory computer readable storage medium having computer program instructions stored thereon that, when executed by at least one processor, cause the at least one processor to automatically detect frames in a video that demarcate a pre-determined type of video segment within the video by performing the following operations: identify visually distinctive candidate marker frames within the video; group the candidate marker frames into a plurality of groups based on visual similarity; compute a score for each of the groups based on temporal proximity of each of the candidate marker frames within the group to related events in the pre-determined type of video segment within the video; and select at least one of the groups based on the score as marker frames that demarcate the pre-determined type of video segment. 20. At least one non-transitory computer readable storage medium having computer program instructions stored thereon according to claim 19, wherein when the computer program instructions are executed by at least one processor, the pre-determined type of video segments within the video are automatically detected by detecting the marker frames in the video.
2,400
8,022
8,022
14,851,092
2,472
Various communication systems may benefit from the appropriate logging of measurements. For example, communication systems employing multimedia broadcast multicast service may benefit from logging multicast-broadcast single-frequency network measurements. A method can include logging, by a user equipment, a multicast-broadcast single-frequency network measurement corresponding to a logging period. The method can also include storing, at the time the multicast-broadcast single-frequency network measurement is made, cell measurement results.
1. A method comprising: logging, by a user equipment, a multicast-broadcast single-frequency network measurement corresponding to a logging period; and storing, at the time the multicast-broadcast single-frequency network measurement is made, cell measurement results. 2. The method of claim 1, wherein the cell measurement results are used for coarse location estimation. 3. The method of claim 1, wherein the user equipment logs a latest multicast-broadcast single-frequency network measurement prior to an end of the logging period. 4. An apparatus, comprising: at least one processor; and at least one memory including computer program code, wherein the at least one memory and the computer program code are configured to, with the at least one processor, cause the apparatus at least to log, by a user equipment, a multicast-broadcast single-frequency network measurement corresponding to a logging period; and store, at the time the multicast-broadcast single-frequency network measurement is made, cell measurement results. 5. The apparatus of claim 4, wherein the at least one memory and the computer program code are configured to, with the at least one processor, cause the apparatus at least to use the cell measurement results for coarse location estimation. 6. The apparatus of claim 4, wherein the user equipment is configured to log a latest multicast-broadcast single-frequency network measurement prior to an end of the logging period. 7. The apparatus of claim 4, wherein the user equipment is configured to log only a latest multicast-broadcast single-frequency network measurement prior to an end of the logging period. 8. The apparatus of claim 4, wherein the multicast-broadcast single-frequency network measurement comprises at least one of a reference signal received power measurement or a reference signal received quality measurement. 9. The apparatus of claim 4, wherein the multicast-broadcast single-frequency network measurement comprises a block error rate measurement. 10. The apparatus of claim 4, wherein the at least one memory and the computer program code are configured to, with the at least one processor, cause the apparatus at least to associate the measurement with time information related to an actual measurement time instant. 11. The apparatus of claim 4, wherein the at least one memory and the computer program code can be configured to, with the at least one processor, cause the apparatus at least to collect available accurate location information at a time of the measurement. 12. The apparatus of claim 11, wherein the at least one memory and the computer program code are configured to, with the at least one processor, cause the apparatus at least to take into account a validity time of the available accurate location information. 13. The apparatus of claim 12, wherein the length of the measurement period is presented as the number of logging periods, radio frames or radio sub-frames. 14. The apparatus of claim 12, wherein the length of the measurement period is presented as absolute time. 15. A method, comprising: using, by a user equipment, a predetermined number of samples to calculate a multicast-broadcast single-frequency network measurement result; determining a time from a first sample of the predetermined number of samples to a last sample of the predetermined number of samples; and associating the determined time with the measurement result that is to be logged. 16. The method of claim 15, further comprising: logging the measurement result with the associated time. 17. An apparatus, comprising: at least one processor; and at least one memory including computer program code, wherein the at least one memory and the computer program code are configured to, with the at least one processor, cause the apparatus at least to use a predetermined number of samples to calculate a multicast-broadcast single-frequency network measurement result; determine a time from a first sample of the predetermined number of samples to a last sample of the predetermined number of samples; and associate the determined time with the measurement result that is to be logged. 18. The apparatus of claim 17, wherein the at least one memory and the computer program code are configured to, with the at least one processor, cause the apparatus at least to log the measurement result with the associated time. 19. The apparatus of claim 17, wherein the time is represented in at least one way selected from time in seconds, time as the number of frames or subframes, or time as the number of logging periods. 20. The apparatus of claim 17, wherein the at least one memory and the computer program code are configured to, with the at least one processor, cause the apparatus at least to add information to the log including information about whether all the samples are from the same logging period or whether the successive logged results are the same.
Various communication systems may benefit from the appropriate logging of measurements. For example, communication systems employing multimedia broadcast multicast service may benefit from logging multicast-broadcast single-frequency network measurements. A method can include logging, by a user equipment, a multicast-broadcast single-frequency network measurement corresponding to a logging period. The method can also include storing, at the time the multicast-broadcast single-frequency network measurement is made, cell measurement results.1. A method comprising: logging, by a user equipment, a multicast-broadcast single-frequency network measurement corresponding to a logging period; and storing, at the time the multicast-broadcast single-frequency network measurement is made, cell measurement results. 2. The method of claim 1, wherein the cell measurement results are used for coarse location estimation. 3. The method of claim 1, wherein the user equipment logs a latest multicast-broadcast single-frequency network measurement prior to an end of the logging period. 4. An apparatus, comprising: at least one processor; and at least one memory including computer program code, wherein the at least one memory and the computer program code are configured to, with the at least one processor, cause the apparatus at least to log, by a user equipment, a multicast-broadcast single-frequency network measurement corresponding to a logging period; and store, at the time the multicast-broadcast single-frequency network measurement is made, cell measurement results. 5. The apparatus of claim 4, wherein the at least one memory and the computer program code are configured to, with the at least one processor, cause the apparatus at least to use the cell measurement results for coarse location estimation. 6. The apparatus of claim 4, wherein the user equipment is configured to log a latest multicast-broadcast single-frequency network measurement prior to an end of the logging period. 7. The apparatus of claim 4, wherein the user equipment is configured to log only a latest multicast-broadcast single-frequency network measurement prior to an end of the logging period. 8. The apparatus of claim 4, wherein the multicast-broadcast single-frequency network measurement comprises at least one of a reference signal received power measurement or a reference signal received quality measurement. 9. The apparatus of claim 4, wherein the multicast-broadcast single-frequency network measurement comprises a block error rate measurement. 10. The apparatus of claim 4, wherein the at least one memory and the computer program code are configured to, with the at least one processor, cause the apparatus at least to associate the measurement with time information related to an actual measurement time instant. 11. The apparatus of claim 4, wherein the at least one memory and the computer program code can be configured to, with the at least one processor, cause the apparatus at least to collect available accurate location information at a time of the measurement. 12. The apparatus of claim 11, wherein the at least one memory and the computer program code are configured to, with the at least one processor, cause the apparatus at least to take into account a validity time of the available accurate location information. 13. The apparatus of claim 12, wherein the length of the measurement period is presented as the number of logging periods, radio frames or radio sub-frames. 14. The apparatus of claim 12, wherein the length of the measurement period is presented as absolute time. 15. A method, comprising: using, by a user equipment, a predetermined number of samples to calculate a multicast-broadcast single-frequency network measurement result; determining a time from a first sample of the predetermined number of samples to a last sample of the predetermined number of samples; and associating the determined time with the measurement result that is to be logged. 16. The method of claim 15, further comprising: logging the measurement result with the associated time. 17. An apparatus, comprising: at least one processor; and at least one memory including computer program code, wherein the at least one memory and the computer program code are configured to, with the at least one processor, cause the apparatus at least to use a predetermined number of samples to calculate a multicast-broadcast single-frequency network measurement result; determine a time from a first sample of the predetermined number of samples to a last sample of the predetermined number of samples; and associate the determined time with the measurement result that is to be logged. 18. The apparatus of claim 17, wherein the at least one memory and the computer program code are configured to, with the at least one processor, cause the apparatus at least to log the measurement result with the associated time. 19. The apparatus of claim 17, wherein the time is represented in at least one way selected from time in seconds, time as the number of frames or subframes, or time as the number of logging periods. 20. The apparatus of claim 17, wherein the at least one memory and the computer program code are configured to, with the at least one processor, cause the apparatus at least to add information to the log including information about whether all the samples are from the same logging period or whether the successive logged results are the same.
2,400
8,023
8,023
15,502,436
2,476
To perform handover in a multi-carrier network, a node that is currently serving a user equipment, UE, informs the neighboring nodes about the UE position and UE capabilities in terms of supported carriers. The neighboring nodes reply with a figure of merit indicative of connection efficacy, or data from which connection efficacy can be estimated, such as predicted signal quality and strength for each specified carrier. The serving node then determines, based on these predicted values, how to restrict mobility reference signal, MRS, measurements to promising candidate combinations of neighboring nodes and their carriers. Turning on of reference signals is thus limited, excluding nodes and carriers that will not be able to accept handover on technical or policy grounds, as well as nodes or carriers which have poor predicted signal quality.
1-41. (canceled) 42. A method for User Equipment (UE) handover in a system capable of communicating on multiple carriers, the method comprising: identifying a need for a serving network entity to make a UE handover; making a pre-selection among one or more neighboring network entities about which to consider further as candidate network entities for handover, and on which carriers, wherein the pre-selection is based on a prediction of connection feasibility between at least one UE and each neighboring network entity; instructing reference signal measurements to be made between the at least one UE and each candidate network entity limited to the carrier or carriers decided on for each candidate network entity in the pre-selection; selecting a network entity, and at least one associated carrier, for handover from among the pre-selected candidate network entities based on results from the reference signal measurements; and instructing execution of the handover. 43. The method of claim 42, wherein the connection feasibility prediction between the at least one UE and each candidate network entity is based on at least one of the position of the at least one UE and on which carriers are useable by each pairing of UE and candidate network entity. 44. The method of claim 43, wherein which carriers are useable by each pairing of UE and candidate network entity is based on which carriers are supported by each pairing. 45. The method of claim 42, wherein making the pre-selection comprises the serving network entity sending requests to one or more neighboring network entities to specify carriers they would recommend for their communication with the at least one UE. 46. The method of claim 42, wherein making the pre-selection comprises: the serving network entity collecting UE capability information on which carriers are useable by the at least one UE; the serving network entity sending the UE capability information and the UE position to each of the one or more neighboring network entities; and receiving from each neighboring network entity the connection feasibility prediction. 47. The method of claim 42, wherein the connection feasibility prediction involves an estimate of connection quality. 48. The method of claim 47, wherein the connection feasibility prediction is a probability that the connection quality exceeds a threshold value deemed acceptable for a reliable connection. 49. The method of claim 42: wherein the at least one UE comprises a first UE and a second UE; wherein the pre-selection of at least one of the candidate network entities is based on combining a first connection feasibility prediction for the first UE and a second connection feasibility prediction for the second UE. 50. A non-transitory computer readable recording medium storing a computer program product for controlling User Equipment (UE) handover in a system capable of communicating on multiple carriers, the computer program product comprising software instructions which, when run on processing circuitry of a network entity, causes the network entity to perform the method of claim 42. 51. A controller for a network entity capable of communicating on multiple carriers, the controller comprising: processing circuitry; memory containing instructions executable by the processing circuitry whereby the controller is operative to manage User Equipment (UE) handover by: identifying a need for the network entity to make a UE handover; making a pre-selection among one or more neighboring network entities about which to consider further as candidate network entities for handover, and on which carriers, wherein the pre-selection is based on a prediction of connection feasibility between the at least one UE and each neighboring network entity; instructing reference signal measurements to be made between the UE and each candidate network entity limited to the carrier or carriers decided on for each candidate network entity in the pre-selection; selecting a network entity, and at least one associated carrier, for handover from among the pre-selected candidate network entities based on results from the reference signal measurements; and instructing execution of the handover. 52. The controller of claim 51, wherein the connection feasibility prediction between the at least one UE and each candidate network entity is based on the position of the at least one UE and on which carriers are useable by each pairing of UE and candidate network entity. 53. The controller of claim 52, wherein which carriers are useable by each pairing of UE and candidate network entity is based on which carriers are supported by each pairing. 54. The controller of claim 51, wherein making the pre-selection comprises the serving network entity sending requests to one or more neighboring network entities to specify carriers they would recommend for their communication with the at least one UE. 55. The controller of claim 51, wherein making the pre-selection comprises: the serving network entity collecting UE capability information on which carriers are useable by the at least one UE; the serving network entity sending the UE capability information and the UE position to each of the one or more neighboring network entities; and receiving from each neighboring network entity the connection feasibility prediction. 56. The controller of claim 51, wherein the connection feasibility prediction involves an estimate of connection quality. 57. The controller of claim 56, wherein the connection feasibility prediction is a probability that the connection quality exceeds a threshold value deemed acceptable for a reliable connection. 58. A controller for a network entity, the controller comprising: processing circuitry; memory containing instructions executable by the processing circuitry whereby the controller is operative to support User Equipment (UE) handover in relation to at least one UE that the network entity is not currently serving by: receiving a first request from another network entity, the first request specifying for at least one UE its position and which carrier or carriers the at least one UE is capable of communicating on; processing the first request to make a prediction of connection feasibility between the network entity and the at least one UE for the specified carriers; and responding to the first request to inform the other network entity of the connection feasibility prediction. 59. The controller of claim 58, wherein the connection feasibility prediction involves an estimate of connection quality. 60. The controller of claim 59, wherein the connection feasibility prediction is a probability that the connection quality exceeds a threshold value deemed acceptable for a reliable connection. 61. The controller of claim 58, wherein the instructions are such that the processing circuitry is operable to support UE handover by responding to a second request from another network entity to participate in reference signal measurements by instructing the network entity to transmit a reference signal on a carrier specified in the second request. 62. A method for controlling a network entity to support User Equipment (UE) handover in relation to at least one UE that the network entity is not currently serving, the method comprising: receiving a first request from another network entity, the first request specifying for a UE its position and which carrier or carriers the at least one UE is capable of communicating on; processing the first request to make a prediction of connection feasibility between the network entity and the at least one UE for the specified carriers; and responding to the first request to inform the other network entity of the connection feasibility prediction. 63. The method of claim 62, wherein the connection feasibility prediction involves an estimate of connection quality. 64. The method of claim 63, wherein the connection feasibility prediction is a probability that the connection quality exceeds a threshold value deemed acceptable for a reliable connection. 65. The method of claim 62, further comprising responding to a second request from another network entity to participate in reference signal measurements by instructing the network entity to transmit a reference signal on a carrier specified in the second request. 66. A non-transitory computer readable recording medium storing a computer program product for controlling a network entity to support User Equipment (UE) handover in relation to at least one UE that the network entity is not currently serving, the computer program product comprising software instructions which, when run on processing circuitry of the network entity, causes the network entity to perform the method of claim 62.
To perform handover in a multi-carrier network, a node that is currently serving a user equipment, UE, informs the neighboring nodes about the UE position and UE capabilities in terms of supported carriers. The neighboring nodes reply with a figure of merit indicative of connection efficacy, or data from which connection efficacy can be estimated, such as predicted signal quality and strength for each specified carrier. The serving node then determines, based on these predicted values, how to restrict mobility reference signal, MRS, measurements to promising candidate combinations of neighboring nodes and their carriers. Turning on of reference signals is thus limited, excluding nodes and carriers that will not be able to accept handover on technical or policy grounds, as well as nodes or carriers which have poor predicted signal quality.1-41. (canceled) 42. A method for User Equipment (UE) handover in a system capable of communicating on multiple carriers, the method comprising: identifying a need for a serving network entity to make a UE handover; making a pre-selection among one or more neighboring network entities about which to consider further as candidate network entities for handover, and on which carriers, wherein the pre-selection is based on a prediction of connection feasibility between at least one UE and each neighboring network entity; instructing reference signal measurements to be made between the at least one UE and each candidate network entity limited to the carrier or carriers decided on for each candidate network entity in the pre-selection; selecting a network entity, and at least one associated carrier, for handover from among the pre-selected candidate network entities based on results from the reference signal measurements; and instructing execution of the handover. 43. The method of claim 42, wherein the connection feasibility prediction between the at least one UE and each candidate network entity is based on at least one of the position of the at least one UE and on which carriers are useable by each pairing of UE and candidate network entity. 44. The method of claim 43, wherein which carriers are useable by each pairing of UE and candidate network entity is based on which carriers are supported by each pairing. 45. The method of claim 42, wherein making the pre-selection comprises the serving network entity sending requests to one or more neighboring network entities to specify carriers they would recommend for their communication with the at least one UE. 46. The method of claim 42, wherein making the pre-selection comprises: the serving network entity collecting UE capability information on which carriers are useable by the at least one UE; the serving network entity sending the UE capability information and the UE position to each of the one or more neighboring network entities; and receiving from each neighboring network entity the connection feasibility prediction. 47. The method of claim 42, wherein the connection feasibility prediction involves an estimate of connection quality. 48. The method of claim 47, wherein the connection feasibility prediction is a probability that the connection quality exceeds a threshold value deemed acceptable for a reliable connection. 49. The method of claim 42: wherein the at least one UE comprises a first UE and a second UE; wherein the pre-selection of at least one of the candidate network entities is based on combining a first connection feasibility prediction for the first UE and a second connection feasibility prediction for the second UE. 50. A non-transitory computer readable recording medium storing a computer program product for controlling User Equipment (UE) handover in a system capable of communicating on multiple carriers, the computer program product comprising software instructions which, when run on processing circuitry of a network entity, causes the network entity to perform the method of claim 42. 51. A controller for a network entity capable of communicating on multiple carriers, the controller comprising: processing circuitry; memory containing instructions executable by the processing circuitry whereby the controller is operative to manage User Equipment (UE) handover by: identifying a need for the network entity to make a UE handover; making a pre-selection among one or more neighboring network entities about which to consider further as candidate network entities for handover, and on which carriers, wherein the pre-selection is based on a prediction of connection feasibility between the at least one UE and each neighboring network entity; instructing reference signal measurements to be made between the UE and each candidate network entity limited to the carrier or carriers decided on for each candidate network entity in the pre-selection; selecting a network entity, and at least one associated carrier, for handover from among the pre-selected candidate network entities based on results from the reference signal measurements; and instructing execution of the handover. 52. The controller of claim 51, wherein the connection feasibility prediction between the at least one UE and each candidate network entity is based on the position of the at least one UE and on which carriers are useable by each pairing of UE and candidate network entity. 53. The controller of claim 52, wherein which carriers are useable by each pairing of UE and candidate network entity is based on which carriers are supported by each pairing. 54. The controller of claim 51, wherein making the pre-selection comprises the serving network entity sending requests to one or more neighboring network entities to specify carriers they would recommend for their communication with the at least one UE. 55. The controller of claim 51, wherein making the pre-selection comprises: the serving network entity collecting UE capability information on which carriers are useable by the at least one UE; the serving network entity sending the UE capability information and the UE position to each of the one or more neighboring network entities; and receiving from each neighboring network entity the connection feasibility prediction. 56. The controller of claim 51, wherein the connection feasibility prediction involves an estimate of connection quality. 57. The controller of claim 56, wherein the connection feasibility prediction is a probability that the connection quality exceeds a threshold value deemed acceptable for a reliable connection. 58. A controller for a network entity, the controller comprising: processing circuitry; memory containing instructions executable by the processing circuitry whereby the controller is operative to support User Equipment (UE) handover in relation to at least one UE that the network entity is not currently serving by: receiving a first request from another network entity, the first request specifying for at least one UE its position and which carrier or carriers the at least one UE is capable of communicating on; processing the first request to make a prediction of connection feasibility between the network entity and the at least one UE for the specified carriers; and responding to the first request to inform the other network entity of the connection feasibility prediction. 59. The controller of claim 58, wherein the connection feasibility prediction involves an estimate of connection quality. 60. The controller of claim 59, wherein the connection feasibility prediction is a probability that the connection quality exceeds a threshold value deemed acceptable for a reliable connection. 61. The controller of claim 58, wherein the instructions are such that the processing circuitry is operable to support UE handover by responding to a second request from another network entity to participate in reference signal measurements by instructing the network entity to transmit a reference signal on a carrier specified in the second request. 62. A method for controlling a network entity to support User Equipment (UE) handover in relation to at least one UE that the network entity is not currently serving, the method comprising: receiving a first request from another network entity, the first request specifying for a UE its position and which carrier or carriers the at least one UE is capable of communicating on; processing the first request to make a prediction of connection feasibility between the network entity and the at least one UE for the specified carriers; and responding to the first request to inform the other network entity of the connection feasibility prediction. 63. The method of claim 62, wherein the connection feasibility prediction involves an estimate of connection quality. 64. The method of claim 63, wherein the connection feasibility prediction is a probability that the connection quality exceeds a threshold value deemed acceptable for a reliable connection. 65. The method of claim 62, further comprising responding to a second request from another network entity to participate in reference signal measurements by instructing the network entity to transmit a reference signal on a carrier specified in the second request. 66. A non-transitory computer readable recording medium storing a computer program product for controlling a network entity to support User Equipment (UE) handover in relation to at least one UE that the network entity is not currently serving, the computer program product comprising software instructions which, when run on processing circuitry of the network entity, causes the network entity to perform the method of claim 62.
2,400
8,024
8,024
15,086,388
2,495
Robotic customer service agents are provided such that, when properly authenticated, they are operable to perform a customer service task. A contact center may dispatch a robot, an accessory for a customer-owned robot, or instructions to transform an unconfigured robot, such as a generic robot, into a configured robot operable to perform the task. If the robot, such as the base or entire robot, robot at the service location, an associated user, hardware addition, and/or software addition is authentic, then the robot may be operated in an authenticated mode. If non-authenticated, then the robot may operate in a non-authenticated mode, such as one consisting of one or more tasks or features being disabled. Additionally, authentication may be temporary (e.g., time restricted) or event restricted (e.g., as long as a result stays within a given range, the robot is being observed, etc.).
1. A robot, comprising: a communication interface; a microprocessor in communication with the communication interface and when provided with instructions cause the microprocessor to: perform an authentication of the robot at a service location; upon the authentication being successful, operating the robot in an authenticated mode; and upon the authentication not being successful, operating the robot in a non-authenticated mode. 2. The robot of claim 1, further comprising: a data storage; an input component; an output component; and wherein the microprocessor causes the robot to perform the authentication comprising, presenting, via the output component, a challenge portion of a challenge-response to a user; wherein the microprocessor receives, via the input component, an observed response to the challenge-response from the user; wherein the microprocessor accesses an expected response from the data storage; wherein the microprocessor compares the observed response with the expected response; and wherein the microprocessor, upon determining the observed response matches the expected response within a previously determined margin of error, indicates the challenge-response was successful. 3. The robot of claim 2, wherein the expected response comprises a physical action. 4. The robot of claim 1, further comprising: a data storage; an input component; an output component; and wherein the microprocessor causes the robot to perform the authentication comprising, presenting, via the output component, a challenge portion of a challenge-response for the service location; wherein the microprocessor receives, via the input component, an observed attribute of the service location as an observed response; wherein the microprocessor accesses an expected attribute as an expected response from the data storage; wherein the microprocessor compares the observed attribute with the expected attribute; and wherein the microprocessor, upon determining the observed attribute matches the expected response within a previously determined margin of error, indicates the challenge-response was successful. 5. The robot of claim 2, wherein the data storage is accessed via the communication interface in communication with a contact center. 6. The robot of claim 1, further comprising: a data storage; an input component; an output component; and the microprocessor receives a challenge portion of a challenge-response; the microprocessor accesses a stored response to the challenge-response; the microprocessor presents, via the output component, the stored response; and wherein the microprocessor determines the challenge-response was successful upon receiving an indication, via the input component, that the challenge-response was successful. 7. The robot of claim 6, wherein the stored response is accessed from a contact center via the communication interface. 8. The robot of claim 1, wherein the microprocessor operates the robot in the authenticated mode and, upon the microprocessor determining a revocation event has occurred, operates the robot in the non-authenticated mode. 9. The robot of claim 8, further comprising: an input component; the microprocessor determines, via the input component, the robot is being supervised by a human and, in response to the determination, operates the robot in the authenticated mode; and wherein the microprocessor, upon determining the robot is no longer being supervised by the human, terminates operation of the robot in the authenticated mode. 10. The robot of claim 9, wherein the microprocessor determines the robot is being supervised by the human, comprising a user. 11. The robot of claim 1, wherein the microprocessor fails the authentication upon determining a hardware component or a software component is not authentic. 12. The robot of claim 1, wherein the robot is configured to perform a task while operating in the authenticated mode and is configured to not perform the task while operating in the non-authenticated mode. 13. A system, comprising: a communication interface; a sever; the server receives a request, via the communication interface, to perform an authentication comprising a robot at a service location, and the robot requires the authentication from the server to perform a customer service task at the service location; and wherein the server determines whether the robot at the service location is authentic and provides indicia of the determination to the robot. 14. The system of claim 13, further comprising: a data storage; and wherein: the server further receives an observed input to an input component associated with the robot; the server accesses an expected input from the data storage; and wherein the server determines whether the robot at the service location is authentic, comprising determining the expected input and the observed input match with a previously determined margin of error. 15. The system of claim 14, wherein; the server accesses a challenge-response from the data storage; the server sends a challenge portion of the challenge-response to the robot, whereby the robot presents the challenge portion to a user at the service location; and wherein the server receives the observed input in response to the challenge-response. 16. The system of claim 13, further comprising, receiving, by the server, the request to perform the authentication originating from a user device associated with a user at the service location. 17. The system of claim 13, further comprising, receiving, by the server, the request to perform the authentication originating from a component provided to the robot and wherein the authentication enables the component to perform the customer service task. 18. A system, comprising: means to communicate; means to authenticate a robot at a customer service location; means to operate the robot in an authorized mode, comprising enabling the robot to perform a customer service task, upon the means to authenticate the robot at the customer service location indicating authorization; and means to operate the robot in a non-authorized mode, comprising not enabling the robot to perform the customer service task, upon the means to authenticate the robot at the customer service location not indicating authentication. 19. The system of claim 18, further comprising, means to determine authentication upon determining the robot comprises authorized hardware or software. 20. The system of claim 18, further comprising, means to determine authentication upon determining the robot is in the presence of an expected user at the service location.
Robotic customer service agents are provided such that, when properly authenticated, they are operable to perform a customer service task. A contact center may dispatch a robot, an accessory for a customer-owned robot, or instructions to transform an unconfigured robot, such as a generic robot, into a configured robot operable to perform the task. If the robot, such as the base or entire robot, robot at the service location, an associated user, hardware addition, and/or software addition is authentic, then the robot may be operated in an authenticated mode. If non-authenticated, then the robot may operate in a non-authenticated mode, such as one consisting of one or more tasks or features being disabled. Additionally, authentication may be temporary (e.g., time restricted) or event restricted (e.g., as long as a result stays within a given range, the robot is being observed, etc.).1. A robot, comprising: a communication interface; a microprocessor in communication with the communication interface and when provided with instructions cause the microprocessor to: perform an authentication of the robot at a service location; upon the authentication being successful, operating the robot in an authenticated mode; and upon the authentication not being successful, operating the robot in a non-authenticated mode. 2. The robot of claim 1, further comprising: a data storage; an input component; an output component; and wherein the microprocessor causes the robot to perform the authentication comprising, presenting, via the output component, a challenge portion of a challenge-response to a user; wherein the microprocessor receives, via the input component, an observed response to the challenge-response from the user; wherein the microprocessor accesses an expected response from the data storage; wherein the microprocessor compares the observed response with the expected response; and wherein the microprocessor, upon determining the observed response matches the expected response within a previously determined margin of error, indicates the challenge-response was successful. 3. The robot of claim 2, wherein the expected response comprises a physical action. 4. The robot of claim 1, further comprising: a data storage; an input component; an output component; and wherein the microprocessor causes the robot to perform the authentication comprising, presenting, via the output component, a challenge portion of a challenge-response for the service location; wherein the microprocessor receives, via the input component, an observed attribute of the service location as an observed response; wherein the microprocessor accesses an expected attribute as an expected response from the data storage; wherein the microprocessor compares the observed attribute with the expected attribute; and wherein the microprocessor, upon determining the observed attribute matches the expected response within a previously determined margin of error, indicates the challenge-response was successful. 5. The robot of claim 2, wherein the data storage is accessed via the communication interface in communication with a contact center. 6. The robot of claim 1, further comprising: a data storage; an input component; an output component; and the microprocessor receives a challenge portion of a challenge-response; the microprocessor accesses a stored response to the challenge-response; the microprocessor presents, via the output component, the stored response; and wherein the microprocessor determines the challenge-response was successful upon receiving an indication, via the input component, that the challenge-response was successful. 7. The robot of claim 6, wherein the stored response is accessed from a contact center via the communication interface. 8. The robot of claim 1, wherein the microprocessor operates the robot in the authenticated mode and, upon the microprocessor determining a revocation event has occurred, operates the robot in the non-authenticated mode. 9. The robot of claim 8, further comprising: an input component; the microprocessor determines, via the input component, the robot is being supervised by a human and, in response to the determination, operates the robot in the authenticated mode; and wherein the microprocessor, upon determining the robot is no longer being supervised by the human, terminates operation of the robot in the authenticated mode. 10. The robot of claim 9, wherein the microprocessor determines the robot is being supervised by the human, comprising a user. 11. The robot of claim 1, wherein the microprocessor fails the authentication upon determining a hardware component or a software component is not authentic. 12. The robot of claim 1, wherein the robot is configured to perform a task while operating in the authenticated mode and is configured to not perform the task while operating in the non-authenticated mode. 13. A system, comprising: a communication interface; a sever; the server receives a request, via the communication interface, to perform an authentication comprising a robot at a service location, and the robot requires the authentication from the server to perform a customer service task at the service location; and wherein the server determines whether the robot at the service location is authentic and provides indicia of the determination to the robot. 14. The system of claim 13, further comprising: a data storage; and wherein: the server further receives an observed input to an input component associated with the robot; the server accesses an expected input from the data storage; and wherein the server determines whether the robot at the service location is authentic, comprising determining the expected input and the observed input match with a previously determined margin of error. 15. The system of claim 14, wherein; the server accesses a challenge-response from the data storage; the server sends a challenge portion of the challenge-response to the robot, whereby the robot presents the challenge portion to a user at the service location; and wherein the server receives the observed input in response to the challenge-response. 16. The system of claim 13, further comprising, receiving, by the server, the request to perform the authentication originating from a user device associated with a user at the service location. 17. The system of claim 13, further comprising, receiving, by the server, the request to perform the authentication originating from a component provided to the robot and wherein the authentication enables the component to perform the customer service task. 18. A system, comprising: means to communicate; means to authenticate a robot at a customer service location; means to operate the robot in an authorized mode, comprising enabling the robot to perform a customer service task, upon the means to authenticate the robot at the customer service location indicating authorization; and means to operate the robot in a non-authorized mode, comprising not enabling the robot to perform the customer service task, upon the means to authenticate the robot at the customer service location not indicating authentication. 19. The system of claim 18, further comprising, means to determine authentication upon determining the robot comprises authorized hardware or software. 20. The system of claim 18, further comprising, means to determine authentication upon determining the robot is in the presence of an expected user at the service location.
2,400
8,025
8,025
14,549,735
2,422
A disclosed apparatus includes a plurality of camera units. Control logic, operatively coupled to each camera unit, is operative to perform a parallax operation using at least two image frames from at least two camera units to determine a common focus distance, subsequent to completing independent auto-focus operations and respective lens position adjustments for the at least two camera units. The control logic provides a control signal to at least one of the camera units to adjust its actuator to adjust lens position in response to the determined common focus distance. A test procedure is used to map focus distance to lens position for each camera unit and to generate a lookup table. The control logic uses the lookup table unique to each camera unit to adjust the lens settings according to the determined common focus distance. The parallax operation is iterated until the common focus distance converges.
1. An apparatus, comprising: a plurality of camera units, each camera unit comprising a lens, a sensor, and an actuator to adjust the lens position; and control logic, operatively coupled to each camera unit, operative to: perform a parallax operation using at least two image frames from at least two camera units to determine a common focus distance, subsequent to completing independent auto-focus operations and respective lens position adjustments for the at least two camera units; and provide a control signal to at least one of the camera units to adjust the at least one camera unit actuator, in response to the common focus distance determination, to set the at least one camera unit lens to a lens position corresponding to the common focus distance. 2. The apparatus of claim 1, further comprising: non-volatile, non-transitory memory, operatively coupled to the control logic; and camera calibration data for each camera unit, stored in the non-volatile, non-transitory memory and related to lens position versus focus distance settings for each camera unit. 3. The apparatus of claim 2, wherein the control logic is further operative to: access the memory to obtain the camera calibration data for each camera unit. 4. The apparatus of claim 1, wherein the control logic is further operative to: obtain an initial lens position setting for each camera unit from the corresponding actuator of each camera unit. 5. The apparatus of claim 4, wherein the control logic is further operative to: iterate the parallax operation by obtaining another at least two image frames subsequent to setting the at least one camera unit lens to a lens position corresponding to the common focus distance and determine an iterated common focus distance; and provide at least a second control signal to at least one or another of the at least two camera units to set the respective lens position to a final lens position corresponding to the iterated common focus distance. 6. The apparatus of claim 4, wherein the control logic is further operative to: provide the control signals as a lens position setting unique to each camera unit based on camera calibration data for each camera unit, stored in a non-volatile, non-transitory memory and related to lens position versus focus distance settings for each camera unit. 7. The apparatus of claim 6, wherein the non-volatile, non-transitory memory is distributed as a separate memory located in each camera unit, operatively coupled to the control logic; and wherein the camera calibration data specific to each camera unit, is stored in the memory of each camera unit, respectively. 8. A method comprising: performing a parallax operation using at least two image frames from at least two camera units to determine a common focus distance, subsequent to completing independent auto-focus operations and respective lens position adjustments for the at least two camera units; and adjusting an actuator of at least one camera unit, in response to the common focus distance determination, to set the at least one camera unit lens to a lens position corresponding to the common focus distance. 9. The method of claim 8, further comprising: obtaining camera calibration data for each camera unit, stored in non-volatile, non-transitory memory and related to lens position versus focus distance settings for each camera unit. 10. The method of claim 9, further comprising: accessing the memory to obtain the camera calibration data for each camera unit; and adjusting the actuator of the at least one camera unit using the related camera calibration data. 11. The method of claim 8, further comprising: obtaining an initial lens position setting for each camera unit from corresponding actuator of each camera unit. 12. The method of claim 11, further comprising: iterating the parallax operation by obtaining another at least two image frames subsequent to setting the at least one camera unit lens to a lens position corresponding to the common focus distance and determine an iterated common focus distance; and adjusting an actuator of at least one or another of the at least two camera units to set the respective lens position to a final lens position corresponding to the iterated common focus distance. 13. The method of claim 11, further comprising: adjusting the actuator using a lens position setting unique to each camera unit based on camera calibration data for each camera unit, stored in a non-volatile, non-transitory memory and related to lens position versus focus distance settings for each camera unit. 14. The method of claim 13, further comprising: accessing memory that is distributed as a separate memory located in each camera unit to obtain the lens position setting. 15. A method comprising: calculating a macro distance and maximum focus distance for a camera unit under test, according to the lens specification of the camera unit under test; setting the camera unit under test to manual focus mode; capturing at least one image frame of a contrast chart for each lens position in a range of interest for a plurality of test stops between the macro distance and the maximum focus distance; determining an optimal lens position for each test stop using the captured image frames to generate a plurality of data points of focus distance versus optimal lens position. 16. The method of claim 15, further comprising: generating a look up table for the camera unit under test using the plurality of data points, the lookup table mapping focus distance to lens position settings.
A disclosed apparatus includes a plurality of camera units. Control logic, operatively coupled to each camera unit, is operative to perform a parallax operation using at least two image frames from at least two camera units to determine a common focus distance, subsequent to completing independent auto-focus operations and respective lens position adjustments for the at least two camera units. The control logic provides a control signal to at least one of the camera units to adjust its actuator to adjust lens position in response to the determined common focus distance. A test procedure is used to map focus distance to lens position for each camera unit and to generate a lookup table. The control logic uses the lookup table unique to each camera unit to adjust the lens settings according to the determined common focus distance. The parallax operation is iterated until the common focus distance converges.1. An apparatus, comprising: a plurality of camera units, each camera unit comprising a lens, a sensor, and an actuator to adjust the lens position; and control logic, operatively coupled to each camera unit, operative to: perform a parallax operation using at least two image frames from at least two camera units to determine a common focus distance, subsequent to completing independent auto-focus operations and respective lens position adjustments for the at least two camera units; and provide a control signal to at least one of the camera units to adjust the at least one camera unit actuator, in response to the common focus distance determination, to set the at least one camera unit lens to a lens position corresponding to the common focus distance. 2. The apparatus of claim 1, further comprising: non-volatile, non-transitory memory, operatively coupled to the control logic; and camera calibration data for each camera unit, stored in the non-volatile, non-transitory memory and related to lens position versus focus distance settings for each camera unit. 3. The apparatus of claim 2, wherein the control logic is further operative to: access the memory to obtain the camera calibration data for each camera unit. 4. The apparatus of claim 1, wherein the control logic is further operative to: obtain an initial lens position setting for each camera unit from the corresponding actuator of each camera unit. 5. The apparatus of claim 4, wherein the control logic is further operative to: iterate the parallax operation by obtaining another at least two image frames subsequent to setting the at least one camera unit lens to a lens position corresponding to the common focus distance and determine an iterated common focus distance; and provide at least a second control signal to at least one or another of the at least two camera units to set the respective lens position to a final lens position corresponding to the iterated common focus distance. 6. The apparatus of claim 4, wherein the control logic is further operative to: provide the control signals as a lens position setting unique to each camera unit based on camera calibration data for each camera unit, stored in a non-volatile, non-transitory memory and related to lens position versus focus distance settings for each camera unit. 7. The apparatus of claim 6, wherein the non-volatile, non-transitory memory is distributed as a separate memory located in each camera unit, operatively coupled to the control logic; and wherein the camera calibration data specific to each camera unit, is stored in the memory of each camera unit, respectively. 8. A method comprising: performing a parallax operation using at least two image frames from at least two camera units to determine a common focus distance, subsequent to completing independent auto-focus operations and respective lens position adjustments for the at least two camera units; and adjusting an actuator of at least one camera unit, in response to the common focus distance determination, to set the at least one camera unit lens to a lens position corresponding to the common focus distance. 9. The method of claim 8, further comprising: obtaining camera calibration data for each camera unit, stored in non-volatile, non-transitory memory and related to lens position versus focus distance settings for each camera unit. 10. The method of claim 9, further comprising: accessing the memory to obtain the camera calibration data for each camera unit; and adjusting the actuator of the at least one camera unit using the related camera calibration data. 11. The method of claim 8, further comprising: obtaining an initial lens position setting for each camera unit from corresponding actuator of each camera unit. 12. The method of claim 11, further comprising: iterating the parallax operation by obtaining another at least two image frames subsequent to setting the at least one camera unit lens to a lens position corresponding to the common focus distance and determine an iterated common focus distance; and adjusting an actuator of at least one or another of the at least two camera units to set the respective lens position to a final lens position corresponding to the iterated common focus distance. 13. The method of claim 11, further comprising: adjusting the actuator using a lens position setting unique to each camera unit based on camera calibration data for each camera unit, stored in a non-volatile, non-transitory memory and related to lens position versus focus distance settings for each camera unit. 14. The method of claim 13, further comprising: accessing memory that is distributed as a separate memory located in each camera unit to obtain the lens position setting. 15. A method comprising: calculating a macro distance and maximum focus distance for a camera unit under test, according to the lens specification of the camera unit under test; setting the camera unit under test to manual focus mode; capturing at least one image frame of a contrast chart for each lens position in a range of interest for a plurality of test stops between the macro distance and the maximum focus distance; determining an optimal lens position for each test stop using the captured image frames to generate a plurality of data points of focus distance versus optimal lens position. 16. The method of claim 15, further comprising: generating a look up table for the camera unit under test using the plurality of data points, the lookup table mapping focus distance to lens position settings.
2,400
8,026
8,026
15,371,365
2,484
A method for the continuous automated audio synchronization of an alternative audio track with the playback of the combined audio and video of a motion picture includes selecting a motion picture in a user interface to an audio synchronization application executing in memory of a mobile computing device along with a corresponding movie theater in which the selected motion picture is scheduled to be presented, and downloading an alternative audio file for the selected motion picture and the corresponding movie theater. The method also includes detecting a location of the mobile computing device. Finally, in response to a determination that the mobile computing device is proximate to the movie theater, a start time of a next scheduled presentation of the selected motion picture is determined and audio synchronization of the alternative audio file triggered at a time that is within a threshold of the determined start time.
1. A method for the continuous automated audio synchronization of an alternative audio track with the playback of the combined audio and video of a motion picture, the method comprising: selecting a motion picture in a user interface to an audio synchronization application executing in memory of a mobile computing device; downloading an alternative audio file for the selected motion picture; detecting a location of the mobile computing device; and, responsive to a determination that the mobile computing device is proximate to a movie theater, determining a start time of a next scheduled presentation of the selected motion picture and triggering audio synchronization of the alternative audio file by the application at a time that is within a threshold of the determined start time. 2. The method of claim 1, wherein the audio synchronization comprises: receiving audio through a microphone of the mobile computing device; selecting a portion of the received audio; comparing the portion of the received audio to pre-stored audio portions in a table in the mobile computing device that maps the pre-stored audio portions to an index into the alternative audio file; matching the portion of the received audio to one of the pre-stored audio portions in the table; and, playing back the alternative audio file in the mobile computing device from a location indicated by an index mapped to the mapped one of the pre-stored audio portions. 3. The method of claim 1, further comprising: geo-fencing multiple different movie theaters; and, determining that the mobile computing device is proximate to the movie theater when the mobile computing device is geo-located within a geo-fence corresponding to the movie theater. 4. The method of claim 1, further comprising: determining that audio synchronization of the alternative audio file has failed; and, in response to determining that the audio synchronization of the alternative audio file has failed, re-triggering audio synchronization. 5. The method of claim 4, further comprising: discontinuing audio synchronization of the alternative audio file in response to a manual directive received in the mobile computing device. 6. A mobile data processing system configured for the continuous automated audio synchronization of an alternative audio track with the playback of the combined audio and video of a motion picture, the system comprising: a mobile computing device with memory and at least one processor; fixed storage disposed in the mobile computing device; and, an audio synchronization application executing in the memory of the mobile computing device, the application comprising program code enabled upon execution to select a motion picture in a user interface to the application, download into the fixed storage an alternative audio file for the selected motion picture, detect a location of the mobile computing device, and to respond to a determination that the mobile computing device is proximate to a movie theater by determining a start time of a next scheduled presentation of the selected motion picture and triggering audio synchronization of the alternative audio file at a time that is within a threshold of the determined start time. 7. The system of claim 6, wherein the program code of the application performs the audio synchronization by: receiving audio through a microphone of the mobile computing device; selecting a portion of the received audio; comparing the portion of the received audio to pre-stored audio portions in a table in the mobile computing device that maps the pre-stored audio portions to an index into the alternative audio file; matching the portion of the received audio to one of the pre-stored audio portions in the table; and, playing back the alternative audio file in the mobile computing device from a location indicated by an index mapped to the mapped one of the pre-stored audio portions. 8. The system of claim 6, wherein the program code additionally: geo-fences multiple different movie theaters; and, determines that the mobile computing device is proximate to the movie theater when the mobile computing device is geo-located within a geo-fence corresponding to the movie theater. 9. The system of claim 6, wherein the program code of the application additionally determines that audio synchronization of the alternative audio file has failed; and, in response to determining that the audio synchronization of the alternative audio file has failed, re-triggers audio synchronization. 10. The system of claim 9, wherein the program code of the application additionally: discontinues audio synchronization of the alternative audio file in response to a manual directive received in the mobile computing device. 11. A computer program product for the continuous automated audio synchronization of an alternative audio track with the playback of the combined audio and video of a motion picture, the computer program product comprising a non-transitory computer readable storage medium having program instructions embodied therewith, the program instructions executable by a device to cause the device to perform a method comprising: selecting a motion picture in a user interface to an audio synchronization application executing in memory of a mobile computing device; downloading an alternative audio file for the selected motion picture; detecting a location of the mobile computing device; and, responsive to a determination that the mobile computing device is proximate to a movie theater, determining a start time of a next scheduled presentation of the selected motion picture and triggering audio synchronization of the alternative audio file at a time that is within a threshold of the determined start time. 12. The computer program product of claim 11, wherein the audio synchronization comprises: receiving audio through a microphone of the mobile computing device; selecting a portion of the received audio; comparing the portion of the received audio to pre-stored audio portions in a table in the mobile computing device that maps the pre-stored audio portions to an index into the alternative audio file; matching the portion of the received audio to one of the pre-stored audio portions in the table; and, playing back the alternative audio file in the mobile computing device from a location indicated by an index mapped to the mapped one of the pre-stored audio portions. 13. The computer program product of claim 11, further comprising: geo-fencing multiple different movie theaters; and, determining that the mobile computing device is proximate to the movie theater when the mobile computing device is geo-located within a geo-fence corresponding to the movie theater; 14. The computer program product of claim 11, further comprising: determining that audio synchronization of the alternative audio file has failed; and, in response to determining that the audio synchronization of the alternative audio file has failed, re-triggering audio synchronization. 15. The computer program product of claim 14, further comprising: discontinuing audio synchronization of the alternative audio file in response to a manual directive received in the mobile computing device.
A method for the continuous automated audio synchronization of an alternative audio track with the playback of the combined audio and video of a motion picture includes selecting a motion picture in a user interface to an audio synchronization application executing in memory of a mobile computing device along with a corresponding movie theater in which the selected motion picture is scheduled to be presented, and downloading an alternative audio file for the selected motion picture and the corresponding movie theater. The method also includes detecting a location of the mobile computing device. Finally, in response to a determination that the mobile computing device is proximate to the movie theater, a start time of a next scheduled presentation of the selected motion picture is determined and audio synchronization of the alternative audio file triggered at a time that is within a threshold of the determined start time.1. A method for the continuous automated audio synchronization of an alternative audio track with the playback of the combined audio and video of a motion picture, the method comprising: selecting a motion picture in a user interface to an audio synchronization application executing in memory of a mobile computing device; downloading an alternative audio file for the selected motion picture; detecting a location of the mobile computing device; and, responsive to a determination that the mobile computing device is proximate to a movie theater, determining a start time of a next scheduled presentation of the selected motion picture and triggering audio synchronization of the alternative audio file by the application at a time that is within a threshold of the determined start time. 2. The method of claim 1, wherein the audio synchronization comprises: receiving audio through a microphone of the mobile computing device; selecting a portion of the received audio; comparing the portion of the received audio to pre-stored audio portions in a table in the mobile computing device that maps the pre-stored audio portions to an index into the alternative audio file; matching the portion of the received audio to one of the pre-stored audio portions in the table; and, playing back the alternative audio file in the mobile computing device from a location indicated by an index mapped to the mapped one of the pre-stored audio portions. 3. The method of claim 1, further comprising: geo-fencing multiple different movie theaters; and, determining that the mobile computing device is proximate to the movie theater when the mobile computing device is geo-located within a geo-fence corresponding to the movie theater. 4. The method of claim 1, further comprising: determining that audio synchronization of the alternative audio file has failed; and, in response to determining that the audio synchronization of the alternative audio file has failed, re-triggering audio synchronization. 5. The method of claim 4, further comprising: discontinuing audio synchronization of the alternative audio file in response to a manual directive received in the mobile computing device. 6. A mobile data processing system configured for the continuous automated audio synchronization of an alternative audio track with the playback of the combined audio and video of a motion picture, the system comprising: a mobile computing device with memory and at least one processor; fixed storage disposed in the mobile computing device; and, an audio synchronization application executing in the memory of the mobile computing device, the application comprising program code enabled upon execution to select a motion picture in a user interface to the application, download into the fixed storage an alternative audio file for the selected motion picture, detect a location of the mobile computing device, and to respond to a determination that the mobile computing device is proximate to a movie theater by determining a start time of a next scheduled presentation of the selected motion picture and triggering audio synchronization of the alternative audio file at a time that is within a threshold of the determined start time. 7. The system of claim 6, wherein the program code of the application performs the audio synchronization by: receiving audio through a microphone of the mobile computing device; selecting a portion of the received audio; comparing the portion of the received audio to pre-stored audio portions in a table in the mobile computing device that maps the pre-stored audio portions to an index into the alternative audio file; matching the portion of the received audio to one of the pre-stored audio portions in the table; and, playing back the alternative audio file in the mobile computing device from a location indicated by an index mapped to the mapped one of the pre-stored audio portions. 8. The system of claim 6, wherein the program code additionally: geo-fences multiple different movie theaters; and, determines that the mobile computing device is proximate to the movie theater when the mobile computing device is geo-located within a geo-fence corresponding to the movie theater. 9. The system of claim 6, wherein the program code of the application additionally determines that audio synchronization of the alternative audio file has failed; and, in response to determining that the audio synchronization of the alternative audio file has failed, re-triggers audio synchronization. 10. The system of claim 9, wherein the program code of the application additionally: discontinues audio synchronization of the alternative audio file in response to a manual directive received in the mobile computing device. 11. A computer program product for the continuous automated audio synchronization of an alternative audio track with the playback of the combined audio and video of a motion picture, the computer program product comprising a non-transitory computer readable storage medium having program instructions embodied therewith, the program instructions executable by a device to cause the device to perform a method comprising: selecting a motion picture in a user interface to an audio synchronization application executing in memory of a mobile computing device; downloading an alternative audio file for the selected motion picture; detecting a location of the mobile computing device; and, responsive to a determination that the mobile computing device is proximate to a movie theater, determining a start time of a next scheduled presentation of the selected motion picture and triggering audio synchronization of the alternative audio file at a time that is within a threshold of the determined start time. 12. The computer program product of claim 11, wherein the audio synchronization comprises: receiving audio through a microphone of the mobile computing device; selecting a portion of the received audio; comparing the portion of the received audio to pre-stored audio portions in a table in the mobile computing device that maps the pre-stored audio portions to an index into the alternative audio file; matching the portion of the received audio to one of the pre-stored audio portions in the table; and, playing back the alternative audio file in the mobile computing device from a location indicated by an index mapped to the mapped one of the pre-stored audio portions. 13. The computer program product of claim 11, further comprising: geo-fencing multiple different movie theaters; and, determining that the mobile computing device is proximate to the movie theater when the mobile computing device is geo-located within a geo-fence corresponding to the movie theater; 14. The computer program product of claim 11, further comprising: determining that audio synchronization of the alternative audio file has failed; and, in response to determining that the audio synchronization of the alternative audio file has failed, re-triggering audio synchronization. 15. The computer program product of claim 14, further comprising: discontinuing audio synchronization of the alternative audio file in response to a manual directive received in the mobile computing device.
2,400
8,027
8,027
14,559,383
2,413
Certain aspects of the present disclosure relate to techniques for designing Modulation-Coding Scheme (MSC) set fields in a transmission frame of Very High Throughput (VHT) wireless systems.
1. A method for wireless communications, comprising: receiving, at an apparatus from another apparatus, a frame comprising a first indication about a plurality of modulation-coding schemes (MCSs) supported by the other apparatus for receiving a corresponding different number of spatial streams (SSs); and selecting a rate for communication to the other apparatus based at least in part on the first indication. 2. The method of claim 1, further comprising: transmitting data to the other apparatus according to the rate. 3. The method of claim 1, wherein the frame further comprises a second indication about a highest data rate supported by the other apparatus for reception. 4. The method of claim 3, wherein the frame further comprises at least one of: a field specifying whether the other apparatus advertises its transmitting MCS capability, a third indication about a plurality of MCSs supported by the other apparatus for transmitting a corresponding different number of SSs, or a fourth indication about a highest data rate supported for transmission by the other apparatus. 5. The method of claim 4, further comprising: selecting a communicating apparatus among the other apparatus and one or more apparatuses based at least in part on the third indication. 6. The method of claim 5, further comprising: receiving data from the selected communicating apparatus. 7. The method of claim 5, wherein the selected communicating apparatus is with a highest available transmit power among the other apparatus and the one or more apparatuses. 8. The method of claim 5, wherein the selected communicating apparatus comprises transmitting capability that is the most commensurate with receiving capability of the apparatus among the other apparatus and the one or more apparatuses. 9. The method of claim 4, further comprising: ignoring the third indication, if the field is set to a specific value. 10. An apparatus for wireless communications, comprising: means for receiving, from another apparatus, a frame comprising a first indication about a plurality of modulation-coding schemes (MCSs) supported by the other apparatus for receiving a corresponding different number of spatial streams (SSs); and means for selecting a rate for communication to the other apparatus based at least in part on the first indication. 11. The apparatus of claim 10, further comprising: means for transmitting data to the other apparatus according to the rate. 12. The apparatus of claim 10, wherein the frame further comprises a second indication about a highest data rate supported by the other apparatus for reception. 13. The apparatus of claim 12, wherein the frame further comprises at least one of: a field specifying whether the other apparatus advertises its transmitting MCS capability, a third indication about a plurality of MCSs supported by the other apparatus for transmitting a corresponding different number of SSs, or a fourth indication about a highest data rate supported for transmission by the other apparatus. 14. The apparatus of claim 13, further comprising: means for selecting a communicating apparatus among the other apparatus and one or more apparatuses based at least in part on the third indication. 15. The apparatus of claim 14, wherein the means for receiving is further configured to: receive data from the selected communicating apparatus. 16. The apparatus of claim 14, wherein the selected communicating apparatus is with a highest available transmit power among the other apparatus and the one or more apparatuses. 17. The apparatus of claim 14, wherein the selected communicating apparatus comprises transmitting capability that is the most commensurate with receiving capability of the apparatus among the other apparatus and the one or more apparatuses. 18. The apparatus of claim 13, further comprising: means for ignoring the third indication, if the field is set to a specific value. 19. An apparatus for wireless communications, comprising: a receiver configured to receive, from another apparatus, a frame comprising a first indication about a plurality of modulation-coding schemes (MCSs) supported by the other apparatus for receiving a corresponding different number of spatial streams (SSs); and a circuit configured to select a rate for communication to the other apparatus based at least in part on the first indication. 20. A computer readable medium containing executable instructions for wireless communications, the executable instructions comprising instructions for: receiving, at an apparatus from another apparatus, a frame comprising a first indication about a plurality of modulation-coding schemes (MCSs) supported by the other apparatus for receiving a corresponding different number of spatial streams (SSs); and selecting a rate for communication to the other apparatus based at least in part on the first indication. 21. A method for wireless communications, comprising: receiving, at an apparatus from another apparatus, a frame comprising a first indication about a plurality of modulation-coding schemes (MCSs) supported by the other apparatus for receiving a corresponding different number of spatial streams (SSs); and selecting a rate for communication to the other apparatus based at least in part on the first indication, wherein the first indication comprises a value for each of a plurality of bandwidths, and the value represents a highest MCS among the MCSs supported for reception by the other apparatus for that bandwidth. 22. The method of claim 21, wherein the plurality of bandwidths comprises at least one of: a bandwidth of 20 MHz, a bandwidth of 40 MHz, a bandwidth of 80 MHz, or a bandwidth of 160 MHz. 23. The method of claim 21, further comprising: transmitting data to the other apparatus according to the rate. 24. The method of claim 21, wherein the frame further comprises at least one of a field specifying whether the other apparatus advertises its transmitting MCS capability, or a second indication about a plurality of MCSs supported by the other apparatus for transmitting a corresponding different number of SSs. 25. The method of claim 24, further comprising: selecting a communicating apparatus among the other apparatus and one or more apparatuses based at least in part on the second indication. 26. The method of claim 25, further comprising: receiving data from the selected communicating apparatus. 27. The method of claim 25, wherein the selected communicating apparatus is with a highest available transmit power among the other apparatus and the one or more apparatuses. 28. The method of claim 25, wherein the selected communicating apparatus comprises transmitting capability that is the most commensurate with receiving capability of the apparatus among the other apparatus and the one or more apparatuses. 29. The method of claim 24, further comprising: ignoring the second indication, if the field is set to a specific value. 30. The method of claim 24, wherein: the second indication comprises a value for each of a plurality of bandwidths, and the value represents a highest MCS among the MCSs supported for transmission by the other apparatus for that bandwidth. 31. An apparatus for wireless communications, comprising: means for receiving, from another apparatus, a frame comprising a first indication about a plurality of modulation-coding schemes (MCSs) supported by the other apparatus for receiving a corresponding different number of spatial streams (SSs); and means for selecting a rate for communication to the other apparatus based at least in part on the first indication, wherein the first indication comprises a value for each of a plurality of bandwidths, and the value represents a highest MCS among the MCSs supported for reception by the other apparatus for that bandwidth. 32. The apparatus of claim 31, wherein the plurality of bandwidths comprises at least one of: a bandwidth of 20 MHz, a bandwidth of 40 MHz, a bandwidth of 80 MHz, or a bandwidth of 160 MHz. 33. The apparatus of claim 31, further comprising: means for transmitting data to the other apparatus according to the rate. 34. The apparatus of claim 31, wherein the frame further comprises at least one of a field specifying whether the other apparatus advertises its transmitting MCS capability, or a second indication about a plurality of MCSs supported by the other apparatus for transmitting a corresponding different number of SSs. 35. The apparatus of claim 34, further comprising: means for selecting a communicating apparatus among the other apparatus and one or more apparatuses based at least in part on the second indication. 36. The apparatus of claim 35, wherein the means for receiving is further configured to: receive data from the selected communicating apparatus. 37. The apparatus of claim 35, wherein the selected communicating apparatus is with a highest available transmit power among the other apparatus and the one or more apparatuses. 38. The apparatus of claim 35, wherein the selected communicating apparatus comprises transmitting capability that is the most commensurate with receiving capability of the apparatus among the other apparatus and the one or more apparatuses. 39. The apparatus of claim 34, further comprising: means for ignoring the second indication, if the field is set to a specific value. 40. The apparatus of claim 34, wherein: the second indication comprises a value for each of a plurality of bandwidths, and the value represents a highest MCS among the MCSs supported for transmission by the other apparatus for that bandwidth. 41. An apparatus for wireless communications, comprising: a receiver configured to receive, from another apparatus, a frame comprising a first indication about a plurality of modulation-coding schemes (MCSs) supported by the other apparatus for receiving a corresponding different number of spatial streams (SSs); and a circuit configured to select a rate for communication to the other apparatus based at least in part on the first indication, wherein the first indication comprises a value for each of a plurality of bandwidths, and the value represents a highest MCS among the MCSs supported for reception by the other apparatus for that bandwidth. 42. A computer readable medium containing executable instructions for wireless communications, the executable instructions comprising instructions for: receiving, at an apparatus from another apparatus, a frame comprising a first indication about a plurality of modulation-coding schemes (MCSs) supported by the other apparatus for receiving a corresponding different number of spatial streams (SSs); and selecting a rate for communication to the other apparatus based at least in part on the first indication, wherein the first indication comprises a value for each of a plurality of bandwidths, and the value represents a highest MCS among the MCSs supported for reception by the other apparatus for that bandwidth.
Certain aspects of the present disclosure relate to techniques for designing Modulation-Coding Scheme (MSC) set fields in a transmission frame of Very High Throughput (VHT) wireless systems.1. A method for wireless communications, comprising: receiving, at an apparatus from another apparatus, a frame comprising a first indication about a plurality of modulation-coding schemes (MCSs) supported by the other apparatus for receiving a corresponding different number of spatial streams (SSs); and selecting a rate for communication to the other apparatus based at least in part on the first indication. 2. The method of claim 1, further comprising: transmitting data to the other apparatus according to the rate. 3. The method of claim 1, wherein the frame further comprises a second indication about a highest data rate supported by the other apparatus for reception. 4. The method of claim 3, wherein the frame further comprises at least one of: a field specifying whether the other apparatus advertises its transmitting MCS capability, a third indication about a plurality of MCSs supported by the other apparatus for transmitting a corresponding different number of SSs, or a fourth indication about a highest data rate supported for transmission by the other apparatus. 5. The method of claim 4, further comprising: selecting a communicating apparatus among the other apparatus and one or more apparatuses based at least in part on the third indication. 6. The method of claim 5, further comprising: receiving data from the selected communicating apparatus. 7. The method of claim 5, wherein the selected communicating apparatus is with a highest available transmit power among the other apparatus and the one or more apparatuses. 8. The method of claim 5, wherein the selected communicating apparatus comprises transmitting capability that is the most commensurate with receiving capability of the apparatus among the other apparatus and the one or more apparatuses. 9. The method of claim 4, further comprising: ignoring the third indication, if the field is set to a specific value. 10. An apparatus for wireless communications, comprising: means for receiving, from another apparatus, a frame comprising a first indication about a plurality of modulation-coding schemes (MCSs) supported by the other apparatus for receiving a corresponding different number of spatial streams (SSs); and means for selecting a rate for communication to the other apparatus based at least in part on the first indication. 11. The apparatus of claim 10, further comprising: means for transmitting data to the other apparatus according to the rate. 12. The apparatus of claim 10, wherein the frame further comprises a second indication about a highest data rate supported by the other apparatus for reception. 13. The apparatus of claim 12, wherein the frame further comprises at least one of: a field specifying whether the other apparatus advertises its transmitting MCS capability, a third indication about a plurality of MCSs supported by the other apparatus for transmitting a corresponding different number of SSs, or a fourth indication about a highest data rate supported for transmission by the other apparatus. 14. The apparatus of claim 13, further comprising: means for selecting a communicating apparatus among the other apparatus and one or more apparatuses based at least in part on the third indication. 15. The apparatus of claim 14, wherein the means for receiving is further configured to: receive data from the selected communicating apparatus. 16. The apparatus of claim 14, wherein the selected communicating apparatus is with a highest available transmit power among the other apparatus and the one or more apparatuses. 17. The apparatus of claim 14, wherein the selected communicating apparatus comprises transmitting capability that is the most commensurate with receiving capability of the apparatus among the other apparatus and the one or more apparatuses. 18. The apparatus of claim 13, further comprising: means for ignoring the third indication, if the field is set to a specific value. 19. An apparatus for wireless communications, comprising: a receiver configured to receive, from another apparatus, a frame comprising a first indication about a plurality of modulation-coding schemes (MCSs) supported by the other apparatus for receiving a corresponding different number of spatial streams (SSs); and a circuit configured to select a rate for communication to the other apparatus based at least in part on the first indication. 20. A computer readable medium containing executable instructions for wireless communications, the executable instructions comprising instructions for: receiving, at an apparatus from another apparatus, a frame comprising a first indication about a plurality of modulation-coding schemes (MCSs) supported by the other apparatus for receiving a corresponding different number of spatial streams (SSs); and selecting a rate for communication to the other apparatus based at least in part on the first indication. 21. A method for wireless communications, comprising: receiving, at an apparatus from another apparatus, a frame comprising a first indication about a plurality of modulation-coding schemes (MCSs) supported by the other apparatus for receiving a corresponding different number of spatial streams (SSs); and selecting a rate for communication to the other apparatus based at least in part on the first indication, wherein the first indication comprises a value for each of a plurality of bandwidths, and the value represents a highest MCS among the MCSs supported for reception by the other apparatus for that bandwidth. 22. The method of claim 21, wherein the plurality of bandwidths comprises at least one of: a bandwidth of 20 MHz, a bandwidth of 40 MHz, a bandwidth of 80 MHz, or a bandwidth of 160 MHz. 23. The method of claim 21, further comprising: transmitting data to the other apparatus according to the rate. 24. The method of claim 21, wherein the frame further comprises at least one of a field specifying whether the other apparatus advertises its transmitting MCS capability, or a second indication about a plurality of MCSs supported by the other apparatus for transmitting a corresponding different number of SSs. 25. The method of claim 24, further comprising: selecting a communicating apparatus among the other apparatus and one or more apparatuses based at least in part on the second indication. 26. The method of claim 25, further comprising: receiving data from the selected communicating apparatus. 27. The method of claim 25, wherein the selected communicating apparatus is with a highest available transmit power among the other apparatus and the one or more apparatuses. 28. The method of claim 25, wherein the selected communicating apparatus comprises transmitting capability that is the most commensurate with receiving capability of the apparatus among the other apparatus and the one or more apparatuses. 29. The method of claim 24, further comprising: ignoring the second indication, if the field is set to a specific value. 30. The method of claim 24, wherein: the second indication comprises a value for each of a plurality of bandwidths, and the value represents a highest MCS among the MCSs supported for transmission by the other apparatus for that bandwidth. 31. An apparatus for wireless communications, comprising: means for receiving, from another apparatus, a frame comprising a first indication about a plurality of modulation-coding schemes (MCSs) supported by the other apparatus for receiving a corresponding different number of spatial streams (SSs); and means for selecting a rate for communication to the other apparatus based at least in part on the first indication, wherein the first indication comprises a value for each of a plurality of bandwidths, and the value represents a highest MCS among the MCSs supported for reception by the other apparatus for that bandwidth. 32. The apparatus of claim 31, wherein the plurality of bandwidths comprises at least one of: a bandwidth of 20 MHz, a bandwidth of 40 MHz, a bandwidth of 80 MHz, or a bandwidth of 160 MHz. 33. The apparatus of claim 31, further comprising: means for transmitting data to the other apparatus according to the rate. 34. The apparatus of claim 31, wherein the frame further comprises at least one of a field specifying whether the other apparatus advertises its transmitting MCS capability, or a second indication about a plurality of MCSs supported by the other apparatus for transmitting a corresponding different number of SSs. 35. The apparatus of claim 34, further comprising: means for selecting a communicating apparatus among the other apparatus and one or more apparatuses based at least in part on the second indication. 36. The apparatus of claim 35, wherein the means for receiving is further configured to: receive data from the selected communicating apparatus. 37. The apparatus of claim 35, wherein the selected communicating apparatus is with a highest available transmit power among the other apparatus and the one or more apparatuses. 38. The apparatus of claim 35, wherein the selected communicating apparatus comprises transmitting capability that is the most commensurate with receiving capability of the apparatus among the other apparatus and the one or more apparatuses. 39. The apparatus of claim 34, further comprising: means for ignoring the second indication, if the field is set to a specific value. 40. The apparatus of claim 34, wherein: the second indication comprises a value for each of a plurality of bandwidths, and the value represents a highest MCS among the MCSs supported for transmission by the other apparatus for that bandwidth. 41. An apparatus for wireless communications, comprising: a receiver configured to receive, from another apparatus, a frame comprising a first indication about a plurality of modulation-coding schemes (MCSs) supported by the other apparatus for receiving a corresponding different number of spatial streams (SSs); and a circuit configured to select a rate for communication to the other apparatus based at least in part on the first indication, wherein the first indication comprises a value for each of a plurality of bandwidths, and the value represents a highest MCS among the MCSs supported for reception by the other apparatus for that bandwidth. 42. A computer readable medium containing executable instructions for wireless communications, the executable instructions comprising instructions for: receiving, at an apparatus from another apparatus, a frame comprising a first indication about a plurality of modulation-coding schemes (MCSs) supported by the other apparatus for receiving a corresponding different number of spatial streams (SSs); and selecting a rate for communication to the other apparatus based at least in part on the first indication, wherein the first indication comprises a value for each of a plurality of bandwidths, and the value represents a highest MCS among the MCSs supported for reception by the other apparatus for that bandwidth.
2,400
8,028
8,028
14,951,450
2,483
An apparatus for measuring edge features of a work piece includes an optical sensor assembly and a reference device. The reference device includes a contact surface configured to contact a surface of the work piece adjacent to an edge of the work piece and a marked surface including a plurality of markings indicating positions relative to the contact surface. The reference device is configured to be coupled to a portion of the optical sensor assembly such that the optical sensor assembly is positioned to capture an image representing a portion of the marked surface and an edge feature of the work piece.
1. An apparatus for measuring edge features of a work piece, the apparatus comprising: an optical sensor assembly; and a reference device including: a contact surface configured to contact a surface adjacent to an edge of the work piece; and a marked surface including a plurality of markings indicating positions relative to the contact surface, wherein the reference device is configured to be coupled to a portion of the optical sensor assembly such that the optical sensor assembly is positioned to capture an image representing a portion of the marked surface and an edge feature of the work piece. 2. The apparatus of claim 1, further comprising a rotary stage configured to rotate at least a portion of the optical sensor assembly to capture images representing the edge features at multiple angular positions on the work piece. 3. The apparatus of claim 1, wherein the optical sensor assembly is configured to capture a single image having a 360 degree field of view representing the edge features at multiple angular positions on the work piece. 4. The apparatus of claim 1, wherein the reference device includes one or more walls defining a cavity sized to enclose a region of the work piece that includes the edge of the work piece. 5. The apparatus of claim 4, wherein the region includes a hole in the work piece, and the cavity is sized to enclose the hole at a distance sufficient to avoid contact between the reference device and the edge features. 6. The apparatus of claim 4, wherein the marked surface corresponds to an interior wall of the cavity. 7. The apparatus of claim 1, wherein the plurality of markings indicate distances to the contact surface and angular positions around the marked surface. 8. The apparatus of claim 1, wherein the plurality of markings include gray code markings. 9. The apparatus of claim 1, wherein the optical sensor assembly includes a light source and an image sensor. 10. The apparatus of claim 1, wherein the optical sensor assembly includes one or more mirrors and one or more lenses. 11. The apparatus of claim 1, wherein the optical sensor assembly includes an interface to provide image data corresponding to the image to a computing device. 12. The apparatus of claim 1, further comprising a bore diameter gauge coupled to the optical sensor assembly. 13. The apparatus of claim 1, further comprising a guide coupled to a housing of the optical sensor assembly to center the housing in a hole in the work piece. 14. A reference device for measuring edge features of a work piece, the reference device comprising: a contact surface configured to contact a surface adjacent to an edge of the work piece; a marked surface including a plurality of markings indicating positions relative to the contact surface; and an alignment portion configured to be coupled to a portion of an optical sensor assembly such that the optical sensor assembly is positioned to capture an image representing a portion of the marked surface and an edge feature of the work piece. 15. The reference device of claim 14, wherein the plurality of markings are formed on a marked layer that is affixed to the marked surface. 16. A method of measuring an edge feature of a work piece, the method comprising: obtaining image data representing the edge feature of the work piece and a portion of a marked surface of a reference device, the reference device including a contact surface configured to contact a surface of the work piece while the image data is captured; detecting, in the image data, particular markings of a plurality of markings on the marked surface, the particular markings indicating a position relative to the contact surface; and determining a measurement associated with the edge feature based on the particular markings. 17. The method of claim 16, wherein obtaining the image data includes receiving the image data from an optical sensor assembly while the optical sensor assembly is coupled to the reference device. 18. The method of claim 16, wherein the image data represents a 360 degree field of the edge features at multiple angular positions on the work piece. 19. The method of claim 16, further comprising measuring a diameter of a hole concurrently with obtaining the image data, wherein the hole defines an edge associated with the edge feature. 20. The method of claim 16, further comprising inserting at least a portion of an optical sensor assembly into a hole to obtain the image data, wherein the hole defines an edge associated with the edge feature. 21. The method of claim 16, further comprising comparing the measurement associated with the edge feature to a threshold and generating an alert if the measurement associated with the edge feature exceeds the threshold. 22. The method of claim 16, further comprising generating a display including information indicating the measurement associated with the edge feature.
An apparatus for measuring edge features of a work piece includes an optical sensor assembly and a reference device. The reference device includes a contact surface configured to contact a surface of the work piece adjacent to an edge of the work piece and a marked surface including a plurality of markings indicating positions relative to the contact surface. The reference device is configured to be coupled to a portion of the optical sensor assembly such that the optical sensor assembly is positioned to capture an image representing a portion of the marked surface and an edge feature of the work piece.1. An apparatus for measuring edge features of a work piece, the apparatus comprising: an optical sensor assembly; and a reference device including: a contact surface configured to contact a surface adjacent to an edge of the work piece; and a marked surface including a plurality of markings indicating positions relative to the contact surface, wherein the reference device is configured to be coupled to a portion of the optical sensor assembly such that the optical sensor assembly is positioned to capture an image representing a portion of the marked surface and an edge feature of the work piece. 2. The apparatus of claim 1, further comprising a rotary stage configured to rotate at least a portion of the optical sensor assembly to capture images representing the edge features at multiple angular positions on the work piece. 3. The apparatus of claim 1, wherein the optical sensor assembly is configured to capture a single image having a 360 degree field of view representing the edge features at multiple angular positions on the work piece. 4. The apparatus of claim 1, wherein the reference device includes one or more walls defining a cavity sized to enclose a region of the work piece that includes the edge of the work piece. 5. The apparatus of claim 4, wherein the region includes a hole in the work piece, and the cavity is sized to enclose the hole at a distance sufficient to avoid contact between the reference device and the edge features. 6. The apparatus of claim 4, wherein the marked surface corresponds to an interior wall of the cavity. 7. The apparatus of claim 1, wherein the plurality of markings indicate distances to the contact surface and angular positions around the marked surface. 8. The apparatus of claim 1, wherein the plurality of markings include gray code markings. 9. The apparatus of claim 1, wherein the optical sensor assembly includes a light source and an image sensor. 10. The apparatus of claim 1, wherein the optical sensor assembly includes one or more mirrors and one or more lenses. 11. The apparatus of claim 1, wherein the optical sensor assembly includes an interface to provide image data corresponding to the image to a computing device. 12. The apparatus of claim 1, further comprising a bore diameter gauge coupled to the optical sensor assembly. 13. The apparatus of claim 1, further comprising a guide coupled to a housing of the optical sensor assembly to center the housing in a hole in the work piece. 14. A reference device for measuring edge features of a work piece, the reference device comprising: a contact surface configured to contact a surface adjacent to an edge of the work piece; a marked surface including a plurality of markings indicating positions relative to the contact surface; and an alignment portion configured to be coupled to a portion of an optical sensor assembly such that the optical sensor assembly is positioned to capture an image representing a portion of the marked surface and an edge feature of the work piece. 15. The reference device of claim 14, wherein the plurality of markings are formed on a marked layer that is affixed to the marked surface. 16. A method of measuring an edge feature of a work piece, the method comprising: obtaining image data representing the edge feature of the work piece and a portion of a marked surface of a reference device, the reference device including a contact surface configured to contact a surface of the work piece while the image data is captured; detecting, in the image data, particular markings of a plurality of markings on the marked surface, the particular markings indicating a position relative to the contact surface; and determining a measurement associated with the edge feature based on the particular markings. 17. The method of claim 16, wherein obtaining the image data includes receiving the image data from an optical sensor assembly while the optical sensor assembly is coupled to the reference device. 18. The method of claim 16, wherein the image data represents a 360 degree field of the edge features at multiple angular positions on the work piece. 19. The method of claim 16, further comprising measuring a diameter of a hole concurrently with obtaining the image data, wherein the hole defines an edge associated with the edge feature. 20. The method of claim 16, further comprising inserting at least a portion of an optical sensor assembly into a hole to obtain the image data, wherein the hole defines an edge associated with the edge feature. 21. The method of claim 16, further comprising comparing the measurement associated with the edge feature to a threshold and generating an alert if the measurement associated with the edge feature exceeds the threshold. 22. The method of claim 16, further comprising generating a display including information indicating the measurement associated with the edge feature.
2,400
8,029
8,029
14,354,487
2,426
A plurality of sets of primary product keys is established or generated, each set containing at least two different primary product keys. One primary product key of each set is made available to each receiver or group of receivers, such that each receiver or group of receivers is provided with a different combination of said primary product keys. For each set of primary product keys, the plurality of receivers or groups of receivers is provided with a different primary entitlement control message corresponding to each primary product key of said set, each such primary entitlement control message distributing a primary control word for recovery through decryption using the corresponding primary product key. The primary control words can then be used for purposes such as tracing compromise of the conditional access system, or arranging for differently fingerprinted content to be decoded at different receivers or groups of receivers.
1. A method, implemented by one or more processors, of enabling selected use of control words distributed to each of a plurality of receivers or groups of receivers, comprising: establishing a plurality of sets of primary product keys, each set containing at least two different primary product keys; making available one and only one primary product key of each set to each receiver or group of receivers, such that each receiver or group of receivers is provided with a different combination of said primary product keys; for each set of primary product keys, providing to the plurality of receivers or groups of receivers a different primary entitlement control message corresponding to each primary product key of said set, each such primary entitlement control message distributing a primary control word for recovery through decryption using the corresponding primary product key. 2. The method of claim 1 wherein, in the step of providing, each such primary entitlement control message distributes a primary control word which can be recovered through decryption using the corresponding primary product key, but not through decryption using any other primary product key of the set of primary product keys. 3. The method of claim 1, wherein the said primary entitlement control messages corresponding to a particular set of primary product keys are provided to the plurality of receivers or groups of receivers such that all of the primary control words distributed using the primary control messages are active, in those receivers in which they are recovered through decryption, in the same crypto period. 4. The method of claim 1 further comprising: providing to the plurality of receivers or groups of receivers, for each set of primary product keys, a plurality of copies of a portion of content, each copy being encrypted such that it can be obtained through decryption using a different said primary control word, each such primary control word being recovered through decryption using a corresponding different primary product key of said set. 5. The method of claim 4 further comprising watermarking each copy of each portion of content such that each copy of any particular portion is watermarked with a different watermark symbol. 6. The method of claim 1 further comprising making available a secondary product key to a subset of said plurality of receivers or groups of receivers, and in the step of providing, each primary control word also requiring use of the secondary product key to recover the primary control word from the primary entitlement control message by decryption. 7. The method of claim 6 wherein in the step of providing, each primary control word is recovered by combining a result of decryption of a primary entitlement control message using a corresponding primary product key with a result of decryption of a secondary entitlement control message using a corresponding secondary product key. 8. The method of claim 6 wherein in the step of providing, each primary control word requires use of a combination of the corresponding primary product key with the secondary product key to recover the primary control word from the primary entitlement control message by decryption. 9. The method of claim 1 further comprising making available a secondary product key to a subset of said plurality of receivers or groups of receivers, and in the step of providing, providing one or more secondary entitlement control messages, each such secondary entitlement control message distributing a secondary control word which requires the secondary product key to recover by decryption, each primary entitlement control message being encrypted so as to require a said secondary control word in addition to a said corresponding primary product key of said set to recover the distributed primary control word from the primary entitlement control message by decryption. 10. The method of claim 9 wherein each primary entitlement control message is encrypted so as to require a said secondary control word to decrypt said primary entitlement control message before the primary control word can be recovered through decryption using the corresponding primary product key. 11. The method of claim 9 wherein the primary entitlement control messages are contained within one or more first entitlement control streams of a transport stream, and the one or more secondary entitlement control messages are contained within a second entitlement control stream of said transport stream, the method further comprising including in said transport stream: first mapping data comprising one or more first conditional access stream labels identifying said one or more first entitlement control streams; and second mapping data comprising a second content stream label identifying said one or more first entitlement control streams, and a second conditional access stream label identifying said second entitlement control stream. 12. The method of claim 11 wherein the first mapping data further comprises a first content stream label identifying a stream of portions of content encrypted so as to require at least some of said primary control words to obtain by decryption. 13. The method of claim 11 wherein the first mapping data and second mapping data are first and second entries in an MPEG program mapping table included in the transport stream. 14. The method of claim 13 wherein the first and second conditional access stream labels are included in conditional access descriptors of the MPEG program mapping table. 15. The method of claim 1 wherein said primary and/or secondary product keys are made available by inclusion in one or more entitlement management messages included in the transport stream. 16. A head-end comprising: a primary product key generator arranged to generate a plurality of sets of primary product keys, each set containing at least two different primary product keys; a product key scheduler arranged to make available one and only one primary product key of each set to each receiver or group of receivers at a particular time, such that each receiver or group of receivers is provided at that time with a different combination of said primary product keys; an ECM scheduler arranged to provide to the plurality of receivers or groups of receivers, for each set of primary product keys, a different primary entitlement control message corresponding to each primary product key of said set, each such primary entitlement control message distributing a primary control word which can be obtained through decryption using the corresponding primary product key. 17. The head-end of claim 16 further arranged to provide to the plurality of receivers or groups of receivers, for each set of primary product keys, a plurality of copies of a portion of content, each copy being encrypted such that it can be obtained through decryption using a different said primary control word, each such primary control word being obtained through decryption using a corresponding different primary product key of said set.
A plurality of sets of primary product keys is established or generated, each set containing at least two different primary product keys. One primary product key of each set is made available to each receiver or group of receivers, such that each receiver or group of receivers is provided with a different combination of said primary product keys. For each set of primary product keys, the plurality of receivers or groups of receivers is provided with a different primary entitlement control message corresponding to each primary product key of said set, each such primary entitlement control message distributing a primary control word for recovery through decryption using the corresponding primary product key. The primary control words can then be used for purposes such as tracing compromise of the conditional access system, or arranging for differently fingerprinted content to be decoded at different receivers or groups of receivers.1. A method, implemented by one or more processors, of enabling selected use of control words distributed to each of a plurality of receivers or groups of receivers, comprising: establishing a plurality of sets of primary product keys, each set containing at least two different primary product keys; making available one and only one primary product key of each set to each receiver or group of receivers, such that each receiver or group of receivers is provided with a different combination of said primary product keys; for each set of primary product keys, providing to the plurality of receivers or groups of receivers a different primary entitlement control message corresponding to each primary product key of said set, each such primary entitlement control message distributing a primary control word for recovery through decryption using the corresponding primary product key. 2. The method of claim 1 wherein, in the step of providing, each such primary entitlement control message distributes a primary control word which can be recovered through decryption using the corresponding primary product key, but not through decryption using any other primary product key of the set of primary product keys. 3. The method of claim 1, wherein the said primary entitlement control messages corresponding to a particular set of primary product keys are provided to the plurality of receivers or groups of receivers such that all of the primary control words distributed using the primary control messages are active, in those receivers in which they are recovered through decryption, in the same crypto period. 4. The method of claim 1 further comprising: providing to the plurality of receivers or groups of receivers, for each set of primary product keys, a plurality of copies of a portion of content, each copy being encrypted such that it can be obtained through decryption using a different said primary control word, each such primary control word being recovered through decryption using a corresponding different primary product key of said set. 5. The method of claim 4 further comprising watermarking each copy of each portion of content such that each copy of any particular portion is watermarked with a different watermark symbol. 6. The method of claim 1 further comprising making available a secondary product key to a subset of said plurality of receivers or groups of receivers, and in the step of providing, each primary control word also requiring use of the secondary product key to recover the primary control word from the primary entitlement control message by decryption. 7. The method of claim 6 wherein in the step of providing, each primary control word is recovered by combining a result of decryption of a primary entitlement control message using a corresponding primary product key with a result of decryption of a secondary entitlement control message using a corresponding secondary product key. 8. The method of claim 6 wherein in the step of providing, each primary control word requires use of a combination of the corresponding primary product key with the secondary product key to recover the primary control word from the primary entitlement control message by decryption. 9. The method of claim 1 further comprising making available a secondary product key to a subset of said plurality of receivers or groups of receivers, and in the step of providing, providing one or more secondary entitlement control messages, each such secondary entitlement control message distributing a secondary control word which requires the secondary product key to recover by decryption, each primary entitlement control message being encrypted so as to require a said secondary control word in addition to a said corresponding primary product key of said set to recover the distributed primary control word from the primary entitlement control message by decryption. 10. The method of claim 9 wherein each primary entitlement control message is encrypted so as to require a said secondary control word to decrypt said primary entitlement control message before the primary control word can be recovered through decryption using the corresponding primary product key. 11. The method of claim 9 wherein the primary entitlement control messages are contained within one or more first entitlement control streams of a transport stream, and the one or more secondary entitlement control messages are contained within a second entitlement control stream of said transport stream, the method further comprising including in said transport stream: first mapping data comprising one or more first conditional access stream labels identifying said one or more first entitlement control streams; and second mapping data comprising a second content stream label identifying said one or more first entitlement control streams, and a second conditional access stream label identifying said second entitlement control stream. 12. The method of claim 11 wherein the first mapping data further comprises a first content stream label identifying a stream of portions of content encrypted so as to require at least some of said primary control words to obtain by decryption. 13. The method of claim 11 wherein the first mapping data and second mapping data are first and second entries in an MPEG program mapping table included in the transport stream. 14. The method of claim 13 wherein the first and second conditional access stream labels are included in conditional access descriptors of the MPEG program mapping table. 15. The method of claim 1 wherein said primary and/or secondary product keys are made available by inclusion in one or more entitlement management messages included in the transport stream. 16. A head-end comprising: a primary product key generator arranged to generate a plurality of sets of primary product keys, each set containing at least two different primary product keys; a product key scheduler arranged to make available one and only one primary product key of each set to each receiver or group of receivers at a particular time, such that each receiver or group of receivers is provided at that time with a different combination of said primary product keys; an ECM scheduler arranged to provide to the plurality of receivers or groups of receivers, for each set of primary product keys, a different primary entitlement control message corresponding to each primary product key of said set, each such primary entitlement control message distributing a primary control word which can be obtained through decryption using the corresponding primary product key. 17. The head-end of claim 16 further arranged to provide to the plurality of receivers or groups of receivers, for each set of primary product keys, a plurality of copies of a portion of content, each copy being encrypted such that it can be obtained through decryption using a different said primary control word, each such primary control word being obtained through decryption using a corresponding different primary product key of said set.
2,400
8,030
8,030
14,339,421
2,433
There is provided a method and system for securely coupling and transferring data between devices. In a preferred embodiment, the devices may comprise two devices, a transferring device and a receiving device, and both devices are mobile devices. Embodiments of the present invention allow the wireless transfer of data such as contacts, photo images, video files, or other data from one device to another device, without need for special hardware or cabling.
1. A method for interchanging data between a plurality of provided devices with data transfer software installed on the devices, the method comprising: configuring the data transfer software on two devices from the plurality of devices to identify each of the two devices to be either a respective source device or a target device, wherein one or more data items from the source device are intended to be transmitted to the target device; designating one of the source device and the target device to become a network server, wherein: the designated device is configured to operate as a network server to the non-designated device; and the non-designated device is configured to operate as a network client to the designated device; generating a pairing authenticator comprising routing information; and communicating the pairing authenticator whereby the routing information allows unique association between the client device and the server device through the network. 2. The method of claim 1 further comprising: identifying data items on the source device for transfer to the target device, whereby a group transfer list is compiled that comprises identifying information for one or more of the identified data items; and for each identified data item in the group transfer list: a. transmit metadata about the identified data item from the source device to the target device; b. determine, based on analysis of the metadata by the target device, whether to perform transfer of the identified data item, wherein: c. if the determination concludes that the data item is not to be transferred, processing continues with no transfer of the identified data item and proceeding to a next identified data item in the group transfer list; d. transmit the identified data item to the target device; and e. continue to the next identified data item in the group transfer list, if any remain un-transmitted. 3. The method of claim 2 wherein the pairing authenticator is generated by the server. 4. The method of claim 2 wherein the pairing authenticator is generated by the client. 5. The method of claim 2 wherein the pairing authenticator comprises a QR code. 6. The method of claim 5 wherein the pairing authenticator is communicated from the client device to the server device. 7. The method of claim 5 wherein the pairing authenticator is communicated by: displaying the QR code on the display of one of the two devices; and scanning the code with a provided camera and software included in another of the two devices. 8. The method of claim 2 further comprising: generating a visual indicia by the server; transmitting the visual indicia to the client; and displaying the visual indicia on the server and the client to allow visual confirmation of a network configuration between the server and the client. 9. The method of claim 8 wherein the visual indicia comprises one of: a stored visual image, a color scheme, a word, a number, and a photograph taken by the server. 10. The method of claim 8 further comprising prompting the user, by the server, to view and confirm display of the visual indicia matches on devices that are desired to transfer data. 11. The method of claim 2 wherein device pairings are confirmed by: generating a server authentication token comprising a time of tap by sensing data from an accelerometer in the server device indicating an impulse tap force was applied to the server device, and associating the time the tap occurred to the server device with a time of day; generating a client authentication token comprising a time of tap by sensing data from an accelerometer in the client device indicating an impulse tap force was applied to the client device, and associating the time the tap occurred to the client device with a time of day; and comparing the server authentication token with the client authentication token to determine whether both tokens indicate taps occurred to the client device and the server device within a predetermined timing window. 12. The method of claim 11 wherein the predetermined timing windows is 500 milliseconds. 13. The method of claim 2 wherein identifying data items on the source device for transfer to the target device further includes scanning data items on the source device, and displaying the scanned data items on the source device for selection by a user. 14. The method of claim 2, wherein identifying data items on the source device for transfer to the target device further comprises normalizing the identified data items for transfer to the target device. 15. The method of claim 2, further comprising generating, by the source device, respective source hash values for at least one of the identified data items; generating, by the target device, respective target hash values for data items residing on the target device; transmitting the source hash values to the target device; and comparing the source hash values with the target hash values. 16. The method of claim 2, further comprising creating group transfer metadata for a group of data items corresponding to the group transfer list. 17. The method of claim 16, further comprising sending, by the source device the group transfer metadata to target device. 18. The method of claim 1 wherein the plurality of provided devices further comprise one of a personal computer, a laptop, a laptop computer, a desktop computer, a mobile subscriber communication device, a mobile phone, a mobile smart phone, a mobile feature phone, a personal digital assistant (PDA), a data tablet, a digital camera, a video camera, a video game console, a media player, a Google Glass device, a global positioning system (GPS), Universal Serial Bus (USB) keys, mobile weapons, mobile storage devices, vehicles including a communication device, and combinations thereof. 19. The method of claim 1, wherein: one of the two devices includes an intermediary device coupled to a third device; the third device includes data items to be transferred to the target device; and the intermediary device communicates with the target device, emulating the third device as a source device to provide data items to be transferred from the third device to the target device through the network established between the target device and the intermediary device. 20. The method of claim 19, wherein the third device comprises a dysfunctional mobile device. 21. The method of claim 2 wherein the plurality of provided devices further comprise vehicles including a communication device. 22. A method for interchanging data between a plurality of provided vehicles equipped with communication devices with data transfer software installed within the provided vehicles, the method comprising: configuring the data transfer software on two vehicles from the plurality of vehicles to identify each of the two vehicles to be either a respective source device or a target device, wherein one or more data items from the source device are intended to be transmitted to the target device; designating one of the source device and the target device to become a network server, wherein: the designated device is configured to operate as a network server to the non-designated device; and the non-designated device is configured to operate as a network client to the designated device; displaying, by one of the vehicles, a pairing authenticator comprising routing information; and communicating the pairing authenticator whereby the routing information allows unique association between the client device and the server device through the network. 23. The method of claim 22 further comprising: identifying data items on the source device for transfer to the target device, whereby a group transfer list is compiled that comprises identifying information for one or more of the identified data items; and for each identified data item in the group transfer list: a. transmit metadata about the identified data item from the source device to the target device; b. determine, based on analysis of the metadata by the target device, whether to perform transfer of the identified data item, wherein: c. if the determination concludes that the data item is not to be transferred, processing continues with no transfer of the identified data item and proceeding to a next identified data item in the group transfer list; d. transmit the identified data item to the target device; and e. continue to the next identified data item in the group transfer list, if any remain un-transmitted. 24. The method of claim 22 wherein communicating the pairing authenticator further comprises: displaying a QR code on a first vehicle of two of the vehicles; and scanning the QR code by a camera included within a second vehicle of the two vehicles. 25. The method of claim 22 wherein the data items comprise one of acceleration data, steering data, braking data, navigation data, audiovisual data, and navigation data.
There is provided a method and system for securely coupling and transferring data between devices. In a preferred embodiment, the devices may comprise two devices, a transferring device and a receiving device, and both devices are mobile devices. Embodiments of the present invention allow the wireless transfer of data such as contacts, photo images, video files, or other data from one device to another device, without need for special hardware or cabling.1. A method for interchanging data between a plurality of provided devices with data transfer software installed on the devices, the method comprising: configuring the data transfer software on two devices from the plurality of devices to identify each of the two devices to be either a respective source device or a target device, wherein one or more data items from the source device are intended to be transmitted to the target device; designating one of the source device and the target device to become a network server, wherein: the designated device is configured to operate as a network server to the non-designated device; and the non-designated device is configured to operate as a network client to the designated device; generating a pairing authenticator comprising routing information; and communicating the pairing authenticator whereby the routing information allows unique association between the client device and the server device through the network. 2. The method of claim 1 further comprising: identifying data items on the source device for transfer to the target device, whereby a group transfer list is compiled that comprises identifying information for one or more of the identified data items; and for each identified data item in the group transfer list: a. transmit metadata about the identified data item from the source device to the target device; b. determine, based on analysis of the metadata by the target device, whether to perform transfer of the identified data item, wherein: c. if the determination concludes that the data item is not to be transferred, processing continues with no transfer of the identified data item and proceeding to a next identified data item in the group transfer list; d. transmit the identified data item to the target device; and e. continue to the next identified data item in the group transfer list, if any remain un-transmitted. 3. The method of claim 2 wherein the pairing authenticator is generated by the server. 4. The method of claim 2 wherein the pairing authenticator is generated by the client. 5. The method of claim 2 wherein the pairing authenticator comprises a QR code. 6. The method of claim 5 wherein the pairing authenticator is communicated from the client device to the server device. 7. The method of claim 5 wherein the pairing authenticator is communicated by: displaying the QR code on the display of one of the two devices; and scanning the code with a provided camera and software included in another of the two devices. 8. The method of claim 2 further comprising: generating a visual indicia by the server; transmitting the visual indicia to the client; and displaying the visual indicia on the server and the client to allow visual confirmation of a network configuration between the server and the client. 9. The method of claim 8 wherein the visual indicia comprises one of: a stored visual image, a color scheme, a word, a number, and a photograph taken by the server. 10. The method of claim 8 further comprising prompting the user, by the server, to view and confirm display of the visual indicia matches on devices that are desired to transfer data. 11. The method of claim 2 wherein device pairings are confirmed by: generating a server authentication token comprising a time of tap by sensing data from an accelerometer in the server device indicating an impulse tap force was applied to the server device, and associating the time the tap occurred to the server device with a time of day; generating a client authentication token comprising a time of tap by sensing data from an accelerometer in the client device indicating an impulse tap force was applied to the client device, and associating the time the tap occurred to the client device with a time of day; and comparing the server authentication token with the client authentication token to determine whether both tokens indicate taps occurred to the client device and the server device within a predetermined timing window. 12. The method of claim 11 wherein the predetermined timing windows is 500 milliseconds. 13. The method of claim 2 wherein identifying data items on the source device for transfer to the target device further includes scanning data items on the source device, and displaying the scanned data items on the source device for selection by a user. 14. The method of claim 2, wherein identifying data items on the source device for transfer to the target device further comprises normalizing the identified data items for transfer to the target device. 15. The method of claim 2, further comprising generating, by the source device, respective source hash values for at least one of the identified data items; generating, by the target device, respective target hash values for data items residing on the target device; transmitting the source hash values to the target device; and comparing the source hash values with the target hash values. 16. The method of claim 2, further comprising creating group transfer metadata for a group of data items corresponding to the group transfer list. 17. The method of claim 16, further comprising sending, by the source device the group transfer metadata to target device. 18. The method of claim 1 wherein the plurality of provided devices further comprise one of a personal computer, a laptop, a laptop computer, a desktop computer, a mobile subscriber communication device, a mobile phone, a mobile smart phone, a mobile feature phone, a personal digital assistant (PDA), a data tablet, a digital camera, a video camera, a video game console, a media player, a Google Glass device, a global positioning system (GPS), Universal Serial Bus (USB) keys, mobile weapons, mobile storage devices, vehicles including a communication device, and combinations thereof. 19. The method of claim 1, wherein: one of the two devices includes an intermediary device coupled to a third device; the third device includes data items to be transferred to the target device; and the intermediary device communicates with the target device, emulating the third device as a source device to provide data items to be transferred from the third device to the target device through the network established between the target device and the intermediary device. 20. The method of claim 19, wherein the third device comprises a dysfunctional mobile device. 21. The method of claim 2 wherein the plurality of provided devices further comprise vehicles including a communication device. 22. A method for interchanging data between a plurality of provided vehicles equipped with communication devices with data transfer software installed within the provided vehicles, the method comprising: configuring the data transfer software on two vehicles from the plurality of vehicles to identify each of the two vehicles to be either a respective source device or a target device, wherein one or more data items from the source device are intended to be transmitted to the target device; designating one of the source device and the target device to become a network server, wherein: the designated device is configured to operate as a network server to the non-designated device; and the non-designated device is configured to operate as a network client to the designated device; displaying, by one of the vehicles, a pairing authenticator comprising routing information; and communicating the pairing authenticator whereby the routing information allows unique association between the client device and the server device through the network. 23. The method of claim 22 further comprising: identifying data items on the source device for transfer to the target device, whereby a group transfer list is compiled that comprises identifying information for one or more of the identified data items; and for each identified data item in the group transfer list: a. transmit metadata about the identified data item from the source device to the target device; b. determine, based on analysis of the metadata by the target device, whether to perform transfer of the identified data item, wherein: c. if the determination concludes that the data item is not to be transferred, processing continues with no transfer of the identified data item and proceeding to a next identified data item in the group transfer list; d. transmit the identified data item to the target device; and e. continue to the next identified data item in the group transfer list, if any remain un-transmitted. 24. The method of claim 22 wherein communicating the pairing authenticator further comprises: displaying a QR code on a first vehicle of two of the vehicles; and scanning the QR code by a camera included within a second vehicle of the two vehicles. 25. The method of claim 22 wherein the data items comprise one of acceleration data, steering data, braking data, navigation data, audiovisual data, and navigation data.
2,400
8,031
8,031
15,379,884
2,477
Various communication systems may benefit from improved network access. For example, communication systems may benefit from deriving a radio network temporary identification at both a user equipment and a base station, without requiring additional uplink signaling. A method, in certain embodiments, may include sending a short identification from a user equipment to a base station during a contention based access instance. The short identification is generated based on an initial cell radio network temporary identification. The method may also include receiving at the user equipment a user equipment radio network temporary identification from the base station. The user equipment radio network temporary identification is based on the short identification. In addition, the method may include generating at the user equipment a subsequent cell radio network temporary identification based at least on the short identification and the received user equipment radio network temporary identification.
1. An apparatus comprising: at least one memory comprising computer program code; at least one processor; wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus at least to: send a short identification from a user equipment to a base station during a contention based access instance, wherein the short identification is generated based on an initial cell radio network temporary identification; receive at the user equipment a user equipment radio network temporary identification from the base station; and generate at the user equipment a subsequent cell radio network temporary identification based at least on the short identification and the received user equipment radio network temporary identification. 2. The apparatus according to claim 1, wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus at least to: switch from the contention based access to a scheduled based access using the subsequent cell radio network temporary identification. 3. The apparatus according to claim 2, wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus at least to: transmit data from the user equipment to a base station using the scheduled based access. 4. The apparatus according to claim 1, wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus at least to: enter a power saving mode after generating at the subsequent cell radio network temporary identification. 5. The apparatus according to claim 4, wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus at least to: discard the subsequent cell radio network temporary identification when entering the power saving mode. 6. The apparatus according to claim 1, wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus at least to: generate at the user equipment a new short identification based on the subsequent cell radio network temporary identification, wherein the new short identification is used in future contention based access instances. 7. The apparatus according to claim 1, wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus at least to: receive at the user equipment a contention based access response comprising an acknowledgement or a negative acknowledgment, wherein the contention based response also comprises the user equipment radio network temporary identification. 8. The apparatus according to claim 7, wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus at least to: retransmit from the user equipment the short identification upon receiving of the negative acknowledgement. 9. The apparatus according to claim 1, wherein the short identification is included in the contention based header data sent to the base station. 10. The apparatus according to claim 1, wherein the generating of the subsequent cell radio network temporary identification is based at least on a resource pool from which the user equipment has initiated the contention based access. 11. The apparatus according to claim 1, wherein a length of the short equipment identification is based on the capacity of a contention based physical layer configuration. 12. The apparatus according to claim 1, wherein the short identification is shorter in length than the user equipment radio network temporary identification. 13. An apparatus comprising: at least one memory comprising computer program code; at least one processor; wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus at least to: receive a short identification at a base station from a user equipment during a contention based access instance, wherein the short identification is based on an initial cell radio network temporary identification; generate at the base station a user equipment radio network temporary identification; generate at the base station a subsequent cell radio network temporary identification based at least on the short identification and the user equipment radio network temporary identification. 14. The apparatus according to claim 13, wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus at least to: switch from the contention based access to a scheduled access based access using the subsequent cell radio network temporary identification. 15. The apparatus according to claim 14, wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus at least to: receive data from the user equipment to a base station using the scheduled access. 16. The apparatus according to claim 13, wherein the user equipment radio network temporary identification is shorter in length than the subsequent cell radio network temporary identification. 17. The apparatus according to claim 13, wherein the short identification is included in header data during the contention based access instance received by the base station. 18. The apparatus according to claim 13, wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus at least to: send a contention based response comprising an acknowledgement or a negative acknowledgement. 19. The apparatus according to claim 13, wherein the generating of the subsequent cell radio network temporary identification is based at least on a resource pool from which the user equipment has initiated the contention based access. 20. The apparatus according to claim 13, wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus at least to: decode or decrypting at the base station the sent header including the short identification.
Various communication systems may benefit from improved network access. For example, communication systems may benefit from deriving a radio network temporary identification at both a user equipment and a base station, without requiring additional uplink signaling. A method, in certain embodiments, may include sending a short identification from a user equipment to a base station during a contention based access instance. The short identification is generated based on an initial cell radio network temporary identification. The method may also include receiving at the user equipment a user equipment radio network temporary identification from the base station. The user equipment radio network temporary identification is based on the short identification. In addition, the method may include generating at the user equipment a subsequent cell radio network temporary identification based at least on the short identification and the received user equipment radio network temporary identification.1. An apparatus comprising: at least one memory comprising computer program code; at least one processor; wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus at least to: send a short identification from a user equipment to a base station during a contention based access instance, wherein the short identification is generated based on an initial cell radio network temporary identification; receive at the user equipment a user equipment radio network temporary identification from the base station; and generate at the user equipment a subsequent cell radio network temporary identification based at least on the short identification and the received user equipment radio network temporary identification. 2. The apparatus according to claim 1, wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus at least to: switch from the contention based access to a scheduled based access using the subsequent cell radio network temporary identification. 3. The apparatus according to claim 2, wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus at least to: transmit data from the user equipment to a base station using the scheduled based access. 4. The apparatus according to claim 1, wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus at least to: enter a power saving mode after generating at the subsequent cell radio network temporary identification. 5. The apparatus according to claim 4, wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus at least to: discard the subsequent cell radio network temporary identification when entering the power saving mode. 6. The apparatus according to claim 1, wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus at least to: generate at the user equipment a new short identification based on the subsequent cell radio network temporary identification, wherein the new short identification is used in future contention based access instances. 7. The apparatus according to claim 1, wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus at least to: receive at the user equipment a contention based access response comprising an acknowledgement or a negative acknowledgment, wherein the contention based response also comprises the user equipment radio network temporary identification. 8. The apparatus according to claim 7, wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus at least to: retransmit from the user equipment the short identification upon receiving of the negative acknowledgement. 9. The apparatus according to claim 1, wherein the short identification is included in the contention based header data sent to the base station. 10. The apparatus according to claim 1, wherein the generating of the subsequent cell radio network temporary identification is based at least on a resource pool from which the user equipment has initiated the contention based access. 11. The apparatus according to claim 1, wherein a length of the short equipment identification is based on the capacity of a contention based physical layer configuration. 12. The apparatus according to claim 1, wherein the short identification is shorter in length than the user equipment radio network temporary identification. 13. An apparatus comprising: at least one memory comprising computer program code; at least one processor; wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus at least to: receive a short identification at a base station from a user equipment during a contention based access instance, wherein the short identification is based on an initial cell radio network temporary identification; generate at the base station a user equipment radio network temporary identification; generate at the base station a subsequent cell radio network temporary identification based at least on the short identification and the user equipment radio network temporary identification. 14. The apparatus according to claim 13, wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus at least to: switch from the contention based access to a scheduled access based access using the subsequent cell radio network temporary identification. 15. The apparatus according to claim 14, wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus at least to: receive data from the user equipment to a base station using the scheduled access. 16. The apparatus according to claim 13, wherein the user equipment radio network temporary identification is shorter in length than the subsequent cell radio network temporary identification. 17. The apparatus according to claim 13, wherein the short identification is included in header data during the contention based access instance received by the base station. 18. The apparatus according to claim 13, wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus at least to: send a contention based response comprising an acknowledgement or a negative acknowledgement. 19. The apparatus according to claim 13, wherein the generating of the subsequent cell radio network temporary identification is based at least on a resource pool from which the user equipment has initiated the contention based access. 20. The apparatus according to claim 13, wherein the at least one memory and the computer program code are configured, with the at least one processor, to cause the apparatus at least to: decode or decrypting at the base station the sent header including the short identification.
2,400
8,032
8,032
14,137,544
2,446
Provided herein are system and methods whereby a speaker in a webconference may take control of a pointer that is visible to other participants of the webconference. Speaker detection identifies the speaker, or “active talker,” and then provides, or offers, pointer control to the detected speaker. The speaker may then be able to utilize their client device's input device, such as a mouse, touchpad, or other pointer control mechanism to control a common pointer visible to the other participants of the webconference. The a host of the webconference maintains control of the other aspects of the webconference, as well, administrative control of the pointer and may, for example, rescind pointer assignment given to a particular “active talker.”
1. A method, comprising: establishing a collaboration session between a first and second user, the collaboration session having an audio portion and a visual portion; monitoring activity on the audio portion; determining that the second user is active on the audio portion; and in response to determining that the second user is active on the audio portion, transferring pointer control, of a pointer of the visual portion, from the first user to the second user, thereby enabling the second user to affect the visual portion. 2. The method of claim 1, wherein the first user retains presentation control of the visual portion other than the pointer control while the second user is in possession of the pointer control. 3. The method of claim 2, the first user is a host of the collaboration session and the second user is a non-host participant of the collaboration session even while the second user has pointer control. 4. The method of claim 1, further comprising, in response to determining that the second user is active on the audio portion, providing an indication to the second user that pointer control is transferred to the second user. 5. The method of claim 4, wherein transferring pointer control to the second user is conditional upon the second user indicating an intention to have pointer control. 6. The method of claim 1, wherein transferring pointer control to the second user is conditional upon determining that the second user has been speaking for a length of time beyond a threshold amount of time. 7. The method of claim 1, further comprising, displaying an indicia of control in the visual portion in accord with the one of the first and second user having pointer control. 8. A system, comprising: a server operable to present an audio portion of a collaboration session on an audio channel and a visual portion of the collaboration session on a video channel, the visual portion having a pointer; a speaker detection module operable to determine an active user from a number of users is active on the audio portion; and a pointer control assignment module operable to assign control of the pointer to the active user. 9. The system of claim 8, wherein the speaker detection module is a component of the server. 10. The system of claim 8, further comprising, a pointer acceptance module, operable to notify the active user of the availability to have pointer control assigned thereto and signal the pointer control assignment module upon receiving an indicia of the active user's intent to be assigned pointer control. 11. The system of claim 8, further comprising, an administrative module operable to modify the pointer control assignment module to perform at least one of revoke pointer control assigned to the active user, prevent at least one of the number of users from being assigned control of the pointer, and determining a speaking threshold amount of time that must be met by the active user prior to the active user being assigned control of the pointer. 12. The system of claim 8, wherein the audio portion is provided via a first network using a first communication protocol whereas the visual portion is provided via a second network using a second communication protocol. 13. The system of claim 8, wherein the audio channel and the video channel are provided within the same delivery channel. 14. A non-transitory medium with instructions stored thereon that, when executed by a machine, cause the machine to perform: establishing a collaboration session with a first and second user, the collaboration session having an audio portion delivered via an audio channel and a visual portion, including a pointer, delivered via a video channel, and the visual portion being controlled by the first user; monitoring the audio portion; determining the second user is active on the monitored audio portion; and upon the second user being active on the audio portion, transferring control of the pointer of the video portion to the second user. 15. The instructions of claim 14, further comprising, retaining control of the video portion, other than the pointer, by the first user. 16. The instructions of claim 15, wherein the first user is a host of the collaboration session and the second user is a non-host participant of the collaboration session even while the second user has pointer control. 17. The instructions of claim 14, further comprising, upon determining the second user is active on the audio portion, indicating to the second user that pointer control is available thereto. 18. The instructions of claim 17, wherein transferring control of the pointer to the second user is conditional upon the second user indicating an intention to have control of the pointer. 19. The instructions of claim 14, wherein transferring control of the pointer to the second user is conditional upon determining that the second user has been speaking for a length of time beyond a previously determined threshold. 20. The instructions of claim 14, further comprising, displaying an indicia of control in the visual portion in accord with the one of the first and second user having pointer control.
Provided herein are system and methods whereby a speaker in a webconference may take control of a pointer that is visible to other participants of the webconference. Speaker detection identifies the speaker, or “active talker,” and then provides, or offers, pointer control to the detected speaker. The speaker may then be able to utilize their client device's input device, such as a mouse, touchpad, or other pointer control mechanism to control a common pointer visible to the other participants of the webconference. The a host of the webconference maintains control of the other aspects of the webconference, as well, administrative control of the pointer and may, for example, rescind pointer assignment given to a particular “active talker.”1. A method, comprising: establishing a collaboration session between a first and second user, the collaboration session having an audio portion and a visual portion; monitoring activity on the audio portion; determining that the second user is active on the audio portion; and in response to determining that the second user is active on the audio portion, transferring pointer control, of a pointer of the visual portion, from the first user to the second user, thereby enabling the second user to affect the visual portion. 2. The method of claim 1, wherein the first user retains presentation control of the visual portion other than the pointer control while the second user is in possession of the pointer control. 3. The method of claim 2, the first user is a host of the collaboration session and the second user is a non-host participant of the collaboration session even while the second user has pointer control. 4. The method of claim 1, further comprising, in response to determining that the second user is active on the audio portion, providing an indication to the second user that pointer control is transferred to the second user. 5. The method of claim 4, wherein transferring pointer control to the second user is conditional upon the second user indicating an intention to have pointer control. 6. The method of claim 1, wherein transferring pointer control to the second user is conditional upon determining that the second user has been speaking for a length of time beyond a threshold amount of time. 7. The method of claim 1, further comprising, displaying an indicia of control in the visual portion in accord with the one of the first and second user having pointer control. 8. A system, comprising: a server operable to present an audio portion of a collaboration session on an audio channel and a visual portion of the collaboration session on a video channel, the visual portion having a pointer; a speaker detection module operable to determine an active user from a number of users is active on the audio portion; and a pointer control assignment module operable to assign control of the pointer to the active user. 9. The system of claim 8, wherein the speaker detection module is a component of the server. 10. The system of claim 8, further comprising, a pointer acceptance module, operable to notify the active user of the availability to have pointer control assigned thereto and signal the pointer control assignment module upon receiving an indicia of the active user's intent to be assigned pointer control. 11. The system of claim 8, further comprising, an administrative module operable to modify the pointer control assignment module to perform at least one of revoke pointer control assigned to the active user, prevent at least one of the number of users from being assigned control of the pointer, and determining a speaking threshold amount of time that must be met by the active user prior to the active user being assigned control of the pointer. 12. The system of claim 8, wherein the audio portion is provided via a first network using a first communication protocol whereas the visual portion is provided via a second network using a second communication protocol. 13. The system of claim 8, wherein the audio channel and the video channel are provided within the same delivery channel. 14. A non-transitory medium with instructions stored thereon that, when executed by a machine, cause the machine to perform: establishing a collaboration session with a first and second user, the collaboration session having an audio portion delivered via an audio channel and a visual portion, including a pointer, delivered via a video channel, and the visual portion being controlled by the first user; monitoring the audio portion; determining the second user is active on the monitored audio portion; and upon the second user being active on the audio portion, transferring control of the pointer of the video portion to the second user. 15. The instructions of claim 14, further comprising, retaining control of the video portion, other than the pointer, by the first user. 16. The instructions of claim 15, wherein the first user is a host of the collaboration session and the second user is a non-host participant of the collaboration session even while the second user has pointer control. 17. The instructions of claim 14, further comprising, upon determining the second user is active on the audio portion, indicating to the second user that pointer control is available thereto. 18. The instructions of claim 17, wherein transferring control of the pointer to the second user is conditional upon the second user indicating an intention to have control of the pointer. 19. The instructions of claim 14, wherein transferring control of the pointer to the second user is conditional upon determining that the second user has been speaking for a length of time beyond a previously determined threshold. 20. The instructions of claim 14, further comprising, displaying an indicia of control in the visual portion in accord with the one of the first and second user having pointer control.
2,400
8,033
8,033
14,833,040
2,425
A simplified and accelerated determination of how much of a display element, generated by instructions executing on a computing device, is displayed is achieved through approximations based on a two-dimensional array whose dimensions are commensurate with a size of the display element. Each entry in the array is initialized to one binary value. If the display element is cut off by either physical display boundaries or by boundaries of a host display element, or if it is overlapped by another element, then the entries in the array corresponding to those portions of the display element that are not visible are changed to another binary value. Subsequently, the quantity of entries in the array having the original, initialized binary value, as compared with the total quantity of entries in the array, can provide an accurate approximation for how much of the display element was displayed.
1. A computing device comprising: one or more processing units; a graphics hardware interface; and one or more computer-readable media comprising computer-executable instructions which, when executed by the one or more processing units, cause the computing device to: generate a two-dimensional array data structure having a quantity of rows and columns based on a graphical size of a first display element, whose visibility on a physical display device, communicationally coupled to the computing device through the graphics hardware interface, is to be determined, the first display element being visually displayed on the physical display device; initialize the array data structure by storing a first binary value in each entry of the array data structure; identify a first portion of the first display element that is not visually displayed on the physical display device; change, to a second binary value differing from the first binary value, each entry in the array data structure corresponding to the identified first portion of the first display element; aggregate the binary values stored in each entry of the array data structure; and generate a determination that the first display element is sufficiently visible if a comparison, between a quantity of entries in the array data structure that are set to the first binary value and a total quantity of entries in the array data structure, exceeds a threshold, the comparison being based on the aggregation. 2. The computing device of claim 1, wherein the computer-executable instructions causing the computing device to identify the first portion comprise computer-executable instructions which, when executed by the one or more processing units, cause the computing device to identify a second display element, differing from the first display element, the second display element being visually displayed on the physical display device such that the second display element overlaps the first display element and prevents the first portion of the first display element from being visually displayed on the physical display device; and wherein further the second display element is a sibling display element to the first display element. 3. The computing device of claim 1, wherein the computer-executable instructions causing the computing device to identify the first portion comprise computer-executable instructions which, when executed by the one or more processing units, cause the computing device to identify a second display element, differing from the first display element, the second display element defining visual boundaries beyond which the first portion of the first display element is not visually displayed on the physical display device; and wherein further the second display element is a parent display element to the first display element. 4. The computing device of claim 1, wherein the computer-executable instructions causing the computing device to identify the first portion comprise computer-executable instructions which, when executed by the one or more processing units, cause the computing device to identify a second display element, differing from the first display element, the second display element being visually displayed on the physical display device such that the second display element overlaps the first display element and prevents the first portion of the first display element from being visually displayed on the physical display device; and wherein further the second display element is a notification generated by an operating system of the computing device. 5. The computing device of claim 1, wherein the first display element is visually positioned such that the first portion of the first display element extends beyond a boundary of the physical display device and the first portion is for that reason not visually displayed on the physical display device. 6. The computing device of claim 1, wherein the quantity of rows of the two-dimensional array data structure is equivalent to a height of the first display element in pixels and wherein further the quantity of columns of the two-dimensional array data structure is equivalent to a width of the first display element in pixels. 7. The computing device of claim 1, wherein a user interface visually presented on the physical display device is generated in accordance with a view hierarchy; and wherein further the computer-executable instructions causing the computing device to identify the first portion comprise computer-executable instructions which, when executed by the one or more processing units, cause the computing device to traverse the view hierarchy to identify the first portion. 8. A method of increasing a speed, and reducing a processor load, of determining whether more than a threshold amount of a first display element is visible on a physical display device communicationally coupled to a computing device performing the method, the method comprising: generating, on the computing device, a two-dimensional array data structure having a quantity of rows and columns based on a graphical size of the first display element; initializing, on the computing device, the array data structure by storing a first binary value in each entry of the array data structure; identifying, on the computing device, a first portion of the first display element that is not visually displayed on the physical display device; changing, on the computing device, to a second binary value differing from the first binary value, each entry in the array data structure corresponding to the identified first portion of the first display element; aggregating, on the computing device, the binary values stored in each entry of the array data structure; and determining, on the computing device, that the first display element is sufficiently visible if a comparison, between a quantity of entries in the array data structure that are set to the first binary value and a total quantity of entries in the array data structure, exceeds a threshold, the comparison being based on the aggregation. 9. The method of claim 8, wherein the identifying comprises identifying a second display element, differing from the first display element, that is visually displayed on the physical display device such that the second display element overlaps the first display element and prevents the first portion of the first display element from being visually displayed on the physical display device; and wherein further the second display element is a sibling display element to the first display element. 10. The method of claim 8, wherein the identifying comprises identifying a second display element, differing from the first display element, that defines visual boundaries beyond which the first portion of the first display element is not visually displayed on the physical display device; and wherein further the second display element is a parent display element to the first display element. 11. The method of claim 8, wherein the identifying comprises identifying a second display element, differing from the first display element, that is visually displayed on the physical display device such that the second display element overlaps the first display element and prevents the first portion of the first display element from being visually displayed on the physical display device; and wherein further the second display element is a notification generated by an operating system of the computing device. 12. The method of claim 8, wherein the first display element is visually positioned such that the first portion of the first display element extends beyond a boundary of the physical display device and the first portion is for that reason not visually displayed on the physical display device. 13. The method of claim 8, wherein the quantity of rows of the two-dimensional array data structure is equivalent to a height of the first display element in pixels and wherein further the quantity of columns of the two-dimensional array data structure is equivalent to a width of the first display element in pixels. 14. The method of claim 8, wherein a user interface, that is visually presented on the physical display device by the computing device, is generated in accordance with a view hierarchy; and wherein further the computer-executable instructions causing the computing device to identify the first portion comprise computer-executable instructions which, when executed by the one or more processing units, cause the computing device to traverse the view hierarchy to identify the first portion. 15. One or more computer-readable storage media comprising computer-executable instructions which, when executed by one or more processing units of a computing device, cause the computing device to: generate a two-dimensional array data structure having a quantity of rows and columns based on a graphical size of a first display element, whose visibility on a physical display device, communicationally coupled to the computing device, is to be determined, the first display element being visually displayed on the physical display device; initialize the array data structure by storing a first binary value in each entry of the array data structure; identify a first portion of the first display element that is not visually displayed on the physical display device; change, to a second binary value differing from the first binary value, each entry in the array data structure corresponding to the identified first portion of the first display element; aggregate the binary values stored in each entry of the array data structure; and generate a determination that the first display element is sufficiently visible if a comparison, between a quantity of entries in the array data structure that are set to the first binary value and a total quantity of entries in the array data structure, exceeds a threshold, the comparison being based on the aggregation. 16. The computer-readable storage media of claim 15, wherein the computer-executable instructions for identifying the first portion comprise computer-executable instructions which, when executed by the one or more processing units, cause the computing device to identify a second display element, differing from the first display element, the second display element being visually displayed on the physical display device such that the second display element overlaps the first display element and prevents the first portion of the first display element from being visually displayed on the physical display device; and wherein further the second display element is a sibling display element to the first display element. 17. The computer-readable storage media of claim 15, wherein the computer-executable instructions for identifying the first portion comprise computer-executable instructions which, when executed by the one or more processing units, cause the computing device to identify a second display element, differing from the first display element, the second display element defining visual boundaries beyond which the first portion of the first display element is not visually displayed on the physical display device; and wherein further the second display element is a parent display element to the first display element. 18. The computer-readable storage media of claim 15, wherein the computer-executable instructions for identifying the first portion comprise computer-executable instructions which, when executed by the one or more processing units, cause the computing device to identify a second display element, differing from the first display element, the second display element being visually displayed on the physical display device such that the second display element overlaps the first display element and prevents the first portion of the first display element from being visually displayed on the physical display device; and wherein further the second display element is a notification generated by an operating system of the computing device. 19. The computer-readable storage media of claim 15, wherein the first display element is visually positioned such that the first portion of the first display element extends beyond a boundary of the physical display device and the first portion is for that reason not visually displayed on the physical display device. 20. The computer-readable storage media of claim 15, wherein the quantity of rows of the two-dimensional array data structure is equivalent to a height of the first display element in pixels and wherein further the quantity of columns of the two-dimensional array data structure is equivalent to a width of the first display element in pixels.
A simplified and accelerated determination of how much of a display element, generated by instructions executing on a computing device, is displayed is achieved through approximations based on a two-dimensional array whose dimensions are commensurate with a size of the display element. Each entry in the array is initialized to one binary value. If the display element is cut off by either physical display boundaries or by boundaries of a host display element, or if it is overlapped by another element, then the entries in the array corresponding to those portions of the display element that are not visible are changed to another binary value. Subsequently, the quantity of entries in the array having the original, initialized binary value, as compared with the total quantity of entries in the array, can provide an accurate approximation for how much of the display element was displayed.1. A computing device comprising: one or more processing units; a graphics hardware interface; and one or more computer-readable media comprising computer-executable instructions which, when executed by the one or more processing units, cause the computing device to: generate a two-dimensional array data structure having a quantity of rows and columns based on a graphical size of a first display element, whose visibility on a physical display device, communicationally coupled to the computing device through the graphics hardware interface, is to be determined, the first display element being visually displayed on the physical display device; initialize the array data structure by storing a first binary value in each entry of the array data structure; identify a first portion of the first display element that is not visually displayed on the physical display device; change, to a second binary value differing from the first binary value, each entry in the array data structure corresponding to the identified first portion of the first display element; aggregate the binary values stored in each entry of the array data structure; and generate a determination that the first display element is sufficiently visible if a comparison, between a quantity of entries in the array data structure that are set to the first binary value and a total quantity of entries in the array data structure, exceeds a threshold, the comparison being based on the aggregation. 2. The computing device of claim 1, wherein the computer-executable instructions causing the computing device to identify the first portion comprise computer-executable instructions which, when executed by the one or more processing units, cause the computing device to identify a second display element, differing from the first display element, the second display element being visually displayed on the physical display device such that the second display element overlaps the first display element and prevents the first portion of the first display element from being visually displayed on the physical display device; and wherein further the second display element is a sibling display element to the first display element. 3. The computing device of claim 1, wherein the computer-executable instructions causing the computing device to identify the first portion comprise computer-executable instructions which, when executed by the one or more processing units, cause the computing device to identify a second display element, differing from the first display element, the second display element defining visual boundaries beyond which the first portion of the first display element is not visually displayed on the physical display device; and wherein further the second display element is a parent display element to the first display element. 4. The computing device of claim 1, wherein the computer-executable instructions causing the computing device to identify the first portion comprise computer-executable instructions which, when executed by the one or more processing units, cause the computing device to identify a second display element, differing from the first display element, the second display element being visually displayed on the physical display device such that the second display element overlaps the first display element and prevents the first portion of the first display element from being visually displayed on the physical display device; and wherein further the second display element is a notification generated by an operating system of the computing device. 5. The computing device of claim 1, wherein the first display element is visually positioned such that the first portion of the first display element extends beyond a boundary of the physical display device and the first portion is for that reason not visually displayed on the physical display device. 6. The computing device of claim 1, wherein the quantity of rows of the two-dimensional array data structure is equivalent to a height of the first display element in pixels and wherein further the quantity of columns of the two-dimensional array data structure is equivalent to a width of the first display element in pixels. 7. The computing device of claim 1, wherein a user interface visually presented on the physical display device is generated in accordance with a view hierarchy; and wherein further the computer-executable instructions causing the computing device to identify the first portion comprise computer-executable instructions which, when executed by the one or more processing units, cause the computing device to traverse the view hierarchy to identify the first portion. 8. A method of increasing a speed, and reducing a processor load, of determining whether more than a threshold amount of a first display element is visible on a physical display device communicationally coupled to a computing device performing the method, the method comprising: generating, on the computing device, a two-dimensional array data structure having a quantity of rows and columns based on a graphical size of the first display element; initializing, on the computing device, the array data structure by storing a first binary value in each entry of the array data structure; identifying, on the computing device, a first portion of the first display element that is not visually displayed on the physical display device; changing, on the computing device, to a second binary value differing from the first binary value, each entry in the array data structure corresponding to the identified first portion of the first display element; aggregating, on the computing device, the binary values stored in each entry of the array data structure; and determining, on the computing device, that the first display element is sufficiently visible if a comparison, between a quantity of entries in the array data structure that are set to the first binary value and a total quantity of entries in the array data structure, exceeds a threshold, the comparison being based on the aggregation. 9. The method of claim 8, wherein the identifying comprises identifying a second display element, differing from the first display element, that is visually displayed on the physical display device such that the second display element overlaps the first display element and prevents the first portion of the first display element from being visually displayed on the physical display device; and wherein further the second display element is a sibling display element to the first display element. 10. The method of claim 8, wherein the identifying comprises identifying a second display element, differing from the first display element, that defines visual boundaries beyond which the first portion of the first display element is not visually displayed on the physical display device; and wherein further the second display element is a parent display element to the first display element. 11. The method of claim 8, wherein the identifying comprises identifying a second display element, differing from the first display element, that is visually displayed on the physical display device such that the second display element overlaps the first display element and prevents the first portion of the first display element from being visually displayed on the physical display device; and wherein further the second display element is a notification generated by an operating system of the computing device. 12. The method of claim 8, wherein the first display element is visually positioned such that the first portion of the first display element extends beyond a boundary of the physical display device and the first portion is for that reason not visually displayed on the physical display device. 13. The method of claim 8, wherein the quantity of rows of the two-dimensional array data structure is equivalent to a height of the first display element in pixels and wherein further the quantity of columns of the two-dimensional array data structure is equivalent to a width of the first display element in pixels. 14. The method of claim 8, wherein a user interface, that is visually presented on the physical display device by the computing device, is generated in accordance with a view hierarchy; and wherein further the computer-executable instructions causing the computing device to identify the first portion comprise computer-executable instructions which, when executed by the one or more processing units, cause the computing device to traverse the view hierarchy to identify the first portion. 15. One or more computer-readable storage media comprising computer-executable instructions which, when executed by one or more processing units of a computing device, cause the computing device to: generate a two-dimensional array data structure having a quantity of rows and columns based on a graphical size of a first display element, whose visibility on a physical display device, communicationally coupled to the computing device, is to be determined, the first display element being visually displayed on the physical display device; initialize the array data structure by storing a first binary value in each entry of the array data structure; identify a first portion of the first display element that is not visually displayed on the physical display device; change, to a second binary value differing from the first binary value, each entry in the array data structure corresponding to the identified first portion of the first display element; aggregate the binary values stored in each entry of the array data structure; and generate a determination that the first display element is sufficiently visible if a comparison, between a quantity of entries in the array data structure that are set to the first binary value and a total quantity of entries in the array data structure, exceeds a threshold, the comparison being based on the aggregation. 16. The computer-readable storage media of claim 15, wherein the computer-executable instructions for identifying the first portion comprise computer-executable instructions which, when executed by the one or more processing units, cause the computing device to identify a second display element, differing from the first display element, the second display element being visually displayed on the physical display device such that the second display element overlaps the first display element and prevents the first portion of the first display element from being visually displayed on the physical display device; and wherein further the second display element is a sibling display element to the first display element. 17. The computer-readable storage media of claim 15, wherein the computer-executable instructions for identifying the first portion comprise computer-executable instructions which, when executed by the one or more processing units, cause the computing device to identify a second display element, differing from the first display element, the second display element defining visual boundaries beyond which the first portion of the first display element is not visually displayed on the physical display device; and wherein further the second display element is a parent display element to the first display element. 18. The computer-readable storage media of claim 15, wherein the computer-executable instructions for identifying the first portion comprise computer-executable instructions which, when executed by the one or more processing units, cause the computing device to identify a second display element, differing from the first display element, the second display element being visually displayed on the physical display device such that the second display element overlaps the first display element and prevents the first portion of the first display element from being visually displayed on the physical display device; and wherein further the second display element is a notification generated by an operating system of the computing device. 19. The computer-readable storage media of claim 15, wherein the first display element is visually positioned such that the first portion of the first display element extends beyond a boundary of the physical display device and the first portion is for that reason not visually displayed on the physical display device. 20. The computer-readable storage media of claim 15, wherein the quantity of rows of the two-dimensional array data structure is equivalent to a height of the first display element in pixels and wherein further the quantity of columns of the two-dimensional array data structure is equivalent to a width of the first display element in pixels.
2,400
8,034
8,034
15,361,748
2,425
A vehicle vision system for a vehicle includes an image sensor having a field of view and capturing image data of a scene exterior of the vehicle. A monitor monitors electrical power consumption of the vehicle. At least one lighting system draws electrical power from the vehicle when operated. An image processor processes image data captured by the image sensor. The electrical power drawn by the at least one lighting system is varied at least in part responsive to processing of captured image data by the image processor in order to adjust fuel consumption by the vehicle.
1. A vehicle vision system for a vehicle, said vehicle vision system comprising: an image sensor having a field of view and capturing image data of a scene exterior of a vehicle equipped with said vision system; a monitor monitoring electrical power consumption of the equipped vehicle; at least one lighting system that draws electrical power from the vehicle when operated; an image processor processing image data captured by said image sensor; and wherein the electrical power drawn by said at least one lighting system is varied at least in part responsive to processing of captured image data by said image processor in order to adjust fuel consumption by the equipped vehicle. 2. The vehicle vision system of claim 1, wherein the electrical power drawn by said at least one lighting system is reduced at least in part responsive to processing of captured image data by said image processor in order to reduce fuel consumption by the equipped vehicle. 3. The vehicle vision system of claim 1, wherein said vehicle vision system reduces the light generated by said vehicle lighting system during driving conditions when less vehicle lighting is desired while directing light at areas where it is determined that light is desired. 4. The vehicle vision system of claim 1, wherein said image sensor has a forward field of view and captures image data of a scene forward of the equipped vehicle and in the direction of forward travel of the equipped vehicle. 5. The vehicle vision system of claim 1, wherein said vehicle vision system is operable to detect situations in which said at least one lighting system can be turned off or operated under reduced electrical power consumption. 6. The vehicle vision system of claim 5, wherein said vehicle vision system detects said situations at least in part via processing of captured image data by said processor. 7. The vehicle vision system of claim 1, wherein said at least one lighting system comprises a headlight of the equipped vehicle. 8. The vehicle vision system of claim 7, wherein the headlight comprises multiple light emitting diodes, and wherein said vehicle vision system controls an orientation and intensity of light emitted by the multiple light emitting diodes. 9. The vehicle vision system of claim 8, wherein said vehicle vision system controls the multiple light emitting diodes to provide a tailorable lighting system that is tailorable responsive to determination of other vehicles present ahead of the equipped vehicle. 10. The vehicle vision system of claim 1, wherein said vehicle vision system estimates a separation gap between the equipped vehicle and a leading vehicle. 11. The vehicle vision system of claim 10, wherein said separation gap is adjusted based on a current driving condition. 12. The vehicle vision system of claim 10, wherein said vehicle vision system adjusts said separation gap based on a driving capability of the driver of the equipped vehicle. 13. The vehicle vision system of claim 1, wherein said vehicle vision system determines movement of an object within said field of view. 14. The vehicle vision system of claim 1, wherein said vehicle vision system is part of an adaptive cruise control system of the equipped vehicle. 15. The vehicle vision system of claim 1, wherein said vehicle vision system is operable to adjust an adaptive cruise control system of the equipped vehicle responsive to determination of a road condition ahead of the equipped vehicle. 16. The vehicle vision system of claim 15, wherein said vehicle vision system is operable to change a separation gap between the equipped vehicle and a vehicle ahead of the equipped vehicle based, at least in part, on an estimated stopping distance of the equipped vehicle. 17. A vehicle vision system for a vehicle, said vehicle vision system comprising: an image sensor having a forward field of view and capturing image data of a scene forward of a vehicle equipped with said vision system and in the direction of forward travel of the equipped vehicle; a monitor monitoring electrical power consumption of the equipped vehicle; at least one lighting system that draws electrical power from the vehicle when operated; wherein said at least one lighting system comprises a headlight of the equipped vehicle; an image processor processing image data captured by said image sensor; wherein the electrical power drawn by said at least one lighting system is varied at least in part responsive to processing of captured image data by said image processor in order to adjust fuel consumption by the equipped vehicle; wherein the electrical power drawn by said at least one lighting system is reduced at least in part responsive to processing of captured image data by said image processor in order to reduce fuel consumption by the equipped vehicle; and wherein said vehicle vision system reduces the light generated by said vehicle lighting system during driving conditions when less vehicle lighting is desired while directing light at areas where it is determined that light is desired. 18. The vehicle vision system of claim 17, wherein the headlight comprises multiple light emitting diodes, and wherein said vehicle vision system controls an orientation and intensity of light emitted by the multiple light emitting diodes. 19. The vehicle vision system of claim 18, wherein said vehicle vision system controls the multiple light emitting diodes to provide a tailorable lighting system that is tailorable responsive to determination of other vehicles present ahead of the equipped vehicle. 20. A vehicle vision system for a vehicle, said vehicle vision system comprising: an image sensor having a forward field of view and capturing image data of a scene forward of a vehicle equipped with said vision system and in the direction of forward travel of the equipped vehicle; a monitor monitoring electrical power consumption of the equipped vehicle; at least one lighting system that draws electrical power from the vehicle when operated; wherein said at least one lighting system comprises a headlight of the equipped vehicle; an image processor processing image data captured by said image sensor; wherein the electrical power drawn by said at least one lighting system is varied at least in part responsive to processing of captured image data by said image processor in order to adjust fuel consumption by the equipped vehicle; wherein said vehicle vision system is operable to detect situations in which said at least one lighting system can be turned off or operated under reduced electrical power consumption; and wherein said vehicle vision system detects said situations at least in part via processing of captured image data by said processor.
A vehicle vision system for a vehicle includes an image sensor having a field of view and capturing image data of a scene exterior of the vehicle. A monitor monitors electrical power consumption of the vehicle. At least one lighting system draws electrical power from the vehicle when operated. An image processor processes image data captured by the image sensor. The electrical power drawn by the at least one lighting system is varied at least in part responsive to processing of captured image data by the image processor in order to adjust fuel consumption by the vehicle.1. A vehicle vision system for a vehicle, said vehicle vision system comprising: an image sensor having a field of view and capturing image data of a scene exterior of a vehicle equipped with said vision system; a monitor monitoring electrical power consumption of the equipped vehicle; at least one lighting system that draws electrical power from the vehicle when operated; an image processor processing image data captured by said image sensor; and wherein the electrical power drawn by said at least one lighting system is varied at least in part responsive to processing of captured image data by said image processor in order to adjust fuel consumption by the equipped vehicle. 2. The vehicle vision system of claim 1, wherein the electrical power drawn by said at least one lighting system is reduced at least in part responsive to processing of captured image data by said image processor in order to reduce fuel consumption by the equipped vehicle. 3. The vehicle vision system of claim 1, wherein said vehicle vision system reduces the light generated by said vehicle lighting system during driving conditions when less vehicle lighting is desired while directing light at areas where it is determined that light is desired. 4. The vehicle vision system of claim 1, wherein said image sensor has a forward field of view and captures image data of a scene forward of the equipped vehicle and in the direction of forward travel of the equipped vehicle. 5. The vehicle vision system of claim 1, wherein said vehicle vision system is operable to detect situations in which said at least one lighting system can be turned off or operated under reduced electrical power consumption. 6. The vehicle vision system of claim 5, wherein said vehicle vision system detects said situations at least in part via processing of captured image data by said processor. 7. The vehicle vision system of claim 1, wherein said at least one lighting system comprises a headlight of the equipped vehicle. 8. The vehicle vision system of claim 7, wherein the headlight comprises multiple light emitting diodes, and wherein said vehicle vision system controls an orientation and intensity of light emitted by the multiple light emitting diodes. 9. The vehicle vision system of claim 8, wherein said vehicle vision system controls the multiple light emitting diodes to provide a tailorable lighting system that is tailorable responsive to determination of other vehicles present ahead of the equipped vehicle. 10. The vehicle vision system of claim 1, wherein said vehicle vision system estimates a separation gap between the equipped vehicle and a leading vehicle. 11. The vehicle vision system of claim 10, wherein said separation gap is adjusted based on a current driving condition. 12. The vehicle vision system of claim 10, wherein said vehicle vision system adjusts said separation gap based on a driving capability of the driver of the equipped vehicle. 13. The vehicle vision system of claim 1, wherein said vehicle vision system determines movement of an object within said field of view. 14. The vehicle vision system of claim 1, wherein said vehicle vision system is part of an adaptive cruise control system of the equipped vehicle. 15. The vehicle vision system of claim 1, wherein said vehicle vision system is operable to adjust an adaptive cruise control system of the equipped vehicle responsive to determination of a road condition ahead of the equipped vehicle. 16. The vehicle vision system of claim 15, wherein said vehicle vision system is operable to change a separation gap between the equipped vehicle and a vehicle ahead of the equipped vehicle based, at least in part, on an estimated stopping distance of the equipped vehicle. 17. A vehicle vision system for a vehicle, said vehicle vision system comprising: an image sensor having a forward field of view and capturing image data of a scene forward of a vehicle equipped with said vision system and in the direction of forward travel of the equipped vehicle; a monitor monitoring electrical power consumption of the equipped vehicle; at least one lighting system that draws electrical power from the vehicle when operated; wherein said at least one lighting system comprises a headlight of the equipped vehicle; an image processor processing image data captured by said image sensor; wherein the electrical power drawn by said at least one lighting system is varied at least in part responsive to processing of captured image data by said image processor in order to adjust fuel consumption by the equipped vehicle; wherein the electrical power drawn by said at least one lighting system is reduced at least in part responsive to processing of captured image data by said image processor in order to reduce fuel consumption by the equipped vehicle; and wherein said vehicle vision system reduces the light generated by said vehicle lighting system during driving conditions when less vehicle lighting is desired while directing light at areas where it is determined that light is desired. 18. The vehicle vision system of claim 17, wherein the headlight comprises multiple light emitting diodes, and wherein said vehicle vision system controls an orientation and intensity of light emitted by the multiple light emitting diodes. 19. The vehicle vision system of claim 18, wherein said vehicle vision system controls the multiple light emitting diodes to provide a tailorable lighting system that is tailorable responsive to determination of other vehicles present ahead of the equipped vehicle. 20. A vehicle vision system for a vehicle, said vehicle vision system comprising: an image sensor having a forward field of view and capturing image data of a scene forward of a vehicle equipped with said vision system and in the direction of forward travel of the equipped vehicle; a monitor monitoring electrical power consumption of the equipped vehicle; at least one lighting system that draws electrical power from the vehicle when operated; wherein said at least one lighting system comprises a headlight of the equipped vehicle; an image processor processing image data captured by said image sensor; wherein the electrical power drawn by said at least one lighting system is varied at least in part responsive to processing of captured image data by said image processor in order to adjust fuel consumption by the equipped vehicle; wherein said vehicle vision system is operable to detect situations in which said at least one lighting system can be turned off or operated under reduced electrical power consumption; and wherein said vehicle vision system detects said situations at least in part via processing of captured image data by said processor.
2,400
8,035
8,035
14,998,083
2,413
Systems, apparatuses and methods may provide for a smart power manager that dynamically activates or deactivates the individual lanes of each link of a router based on the allocated power limit and the connected applications. The smart power manager may optimize the router throughput for a given power limit dictated by a global power manager, and use a fine grained credit mechanism to track active lanes. The router power manager may also adjust the number of active lanes for each link individually so that highly utilized links will have more active lanes than links that are idle.
1. A router comprising: an interface to communicate with a power supply source; a plurality of links to communicate with one or more of processor nodes or external routers, wherein each of the plurality of links includes a plurality of lanes; a power manager, connected to the plurality of links, to receive a power availability limit with respect to the router; one or more link utilization managers to determine a link utilization level of each link of the plurality of links of the router; and one or more controllers to dynamically activate or deactivate individual lanes of each of the plurality of links based on the determined link utilization level of each of the plurality of links. 2. The router of claim 1, wherein all lanes of a link of the plurality of links are to remain active when the link utilization level of the link is greater than a predetermined threshold, and individual lanes of the link are to be deactivated when the link utilization level of the link is below the predetermined threshold. 3. The router of claim 1, wherein the one or more link utilization managers are to track active lanes in each of the plurality of links to determine the link utilization level. 4. The router of claim 3, further comprising a lane credit manager to assign lane credits to each active lane. 5. The router of claim 4, wherein the lane credit manager is to transmit, in response to one or more credit requests, one or more credit notifications to one or more of the plurality of links based on the assigned lane credits; wherein the one or more credit notifications are associated with one or more individual lane activations, and receive one or more credit returns from one or more of the plurality of links, wherein the credit returns are associated with one or more individual lane deactivations 6. The router of claim 4, wherein the lane credit manager is to determine the lane credits based on the received power availability limit. 7. An apparatus comprising: a power manager to receive a power availability limit with respect to a router; one or more link utilization managers to determine a link utilization level of each link of a plurality of links of the router; and one or more controllers to dynamically activate or deactivate individual lanes of each of the plurality of links based on the determined link utilization level of each of the plurality of links. 8. The apparatus of claim 7, wherein all lanes of a link of the plurality of links are to remain active when the link utilization level of the link is greater than a predetermined threshold, and individual lanes of the link are to be deactivated when the link utilization level of the link is below the predetermined threshold. 9. The apparatus of claim 7, wherein the one or more link utilization managers are to track active lanes in each of the plurality of links to determine the link utilization level. 10. The apparatus of claim 9, further comprising a lane credit manager to assign lane credits to each active lane. 11. The apparatus of claim 10, wherein the lane credit manager is to transmit, in response to one or more credit requests, one or more credit notifications to one or more of the plurality of links based on the assigned lane credits, wherein the one or more credit notifications are associated with one or more individual lane activations and receive one or more credit returns from one or more of the plurality of links, wherein the credit returns are associated with one or more individual lane deactivations. 12. The apparatus of claim 10, wherein the lane credit manager is to determine the lane credits based on the received power availability limit. 13. A method comprising: receiving a power availability limit with respect to a router; determining a link utilization level of each link of a plurality of links of the router; and dynamically activating or deactivating individual lanes of each of the plurality of links based on the determined link utilization level of each of the plurality of links. 14. The method of claim 13, wherein all lanes of a link of the plurality of links remain active when the link utilization level of the link is greater than a predetermined threshold and individual lanes of the link are deactivated when the link utilization level of the link is below the predetermined threshold. 15. The method of claim 13, wherein determining the link utilization level includes tracking active lanes in each of the plurality of links. 16. The method of claim 15, further comprising assigning lane credits to each active lane. 17. The method of claim 16, further including: transmitting, in response to one or more credit requests, one or more credit notifications to one or more of the plurality of links based on the assigned lane credits, wherein the one or more credit notifications are associated with one or more individual lane activations; and receiving one or more credit returns from one or more of the plurality of links, wherein the credit returns are associated with one or more individual lane deactivations. 18. The method of claim 16, further including determining the lane credits based on the received power availability limit. 19. At least one computer readable storage medium comprising a set of instructions, which when executed by an apparatus, cause the apparatus to: receive a power availability limit with respect to a router; determine a link utilization level of each link of a plurality of links of the router; and dynamically activate or deactivate individual lanes of each of the plurality of links based on the determined link utilization level of each of the plurality of links. 20. The at least one computer readable storage medium of claim 19, wherein all lanes of a link of the plurality of links remain active when the link utilization level of the link is greater than a predetermined threshold and individual lanes of the link are deactivated when the link utilization level of the link is below the predetermined threshold. 21. The at least one computer readable storage medium of claim 19, wherein the instructions, when executed, cause the apparatus to track active lanes in each of the plurality of links to determine the link utilization level. 22. The at least one computer readable storage medium of claim 21, wherein the instructions, when executed, cause the apparatus to assign lane credits to each active lane. 23. The at least one computer readable storage medium of claim 22, wherein the instructions, when executed, cause the apparatus to: transmit, in response to one or more credit requests, one or more credit notifications to one or more of the plurality of links based on the assigned lane credits, wherein the one or more credit notifications are associated with one or more individual lane activations; and receive one or more credit returns from one or more of the plurality of links, wherein the credit returns are associated with one or more individual lane deactivations. 24. The at least one computer readable storage medium of claim 22, wherein the instructions, when executed, cause the apparatus to determine the lane credits based on the received power availability limit.
Systems, apparatuses and methods may provide for a smart power manager that dynamically activates or deactivates the individual lanes of each link of a router based on the allocated power limit and the connected applications. The smart power manager may optimize the router throughput for a given power limit dictated by a global power manager, and use a fine grained credit mechanism to track active lanes. The router power manager may also adjust the number of active lanes for each link individually so that highly utilized links will have more active lanes than links that are idle.1. A router comprising: an interface to communicate with a power supply source; a plurality of links to communicate with one or more of processor nodes or external routers, wherein each of the plurality of links includes a plurality of lanes; a power manager, connected to the plurality of links, to receive a power availability limit with respect to the router; one or more link utilization managers to determine a link utilization level of each link of the plurality of links of the router; and one or more controllers to dynamically activate or deactivate individual lanes of each of the plurality of links based on the determined link utilization level of each of the plurality of links. 2. The router of claim 1, wherein all lanes of a link of the plurality of links are to remain active when the link utilization level of the link is greater than a predetermined threshold, and individual lanes of the link are to be deactivated when the link utilization level of the link is below the predetermined threshold. 3. The router of claim 1, wherein the one or more link utilization managers are to track active lanes in each of the plurality of links to determine the link utilization level. 4. The router of claim 3, further comprising a lane credit manager to assign lane credits to each active lane. 5. The router of claim 4, wherein the lane credit manager is to transmit, in response to one or more credit requests, one or more credit notifications to one or more of the plurality of links based on the assigned lane credits; wherein the one or more credit notifications are associated with one or more individual lane activations, and receive one or more credit returns from one or more of the plurality of links, wherein the credit returns are associated with one or more individual lane deactivations 6. The router of claim 4, wherein the lane credit manager is to determine the lane credits based on the received power availability limit. 7. An apparatus comprising: a power manager to receive a power availability limit with respect to a router; one or more link utilization managers to determine a link utilization level of each link of a plurality of links of the router; and one or more controllers to dynamically activate or deactivate individual lanes of each of the plurality of links based on the determined link utilization level of each of the plurality of links. 8. The apparatus of claim 7, wherein all lanes of a link of the plurality of links are to remain active when the link utilization level of the link is greater than a predetermined threshold, and individual lanes of the link are to be deactivated when the link utilization level of the link is below the predetermined threshold. 9. The apparatus of claim 7, wherein the one or more link utilization managers are to track active lanes in each of the plurality of links to determine the link utilization level. 10. The apparatus of claim 9, further comprising a lane credit manager to assign lane credits to each active lane. 11. The apparatus of claim 10, wherein the lane credit manager is to transmit, in response to one or more credit requests, one or more credit notifications to one or more of the plurality of links based on the assigned lane credits, wherein the one or more credit notifications are associated with one or more individual lane activations and receive one or more credit returns from one or more of the plurality of links, wherein the credit returns are associated with one or more individual lane deactivations. 12. The apparatus of claim 10, wherein the lane credit manager is to determine the lane credits based on the received power availability limit. 13. A method comprising: receiving a power availability limit with respect to a router; determining a link utilization level of each link of a plurality of links of the router; and dynamically activating or deactivating individual lanes of each of the plurality of links based on the determined link utilization level of each of the plurality of links. 14. The method of claim 13, wherein all lanes of a link of the plurality of links remain active when the link utilization level of the link is greater than a predetermined threshold and individual lanes of the link are deactivated when the link utilization level of the link is below the predetermined threshold. 15. The method of claim 13, wherein determining the link utilization level includes tracking active lanes in each of the plurality of links. 16. The method of claim 15, further comprising assigning lane credits to each active lane. 17. The method of claim 16, further including: transmitting, in response to one or more credit requests, one or more credit notifications to one or more of the plurality of links based on the assigned lane credits, wherein the one or more credit notifications are associated with one or more individual lane activations; and receiving one or more credit returns from one or more of the plurality of links, wherein the credit returns are associated with one or more individual lane deactivations. 18. The method of claim 16, further including determining the lane credits based on the received power availability limit. 19. At least one computer readable storage medium comprising a set of instructions, which when executed by an apparatus, cause the apparatus to: receive a power availability limit with respect to a router; determine a link utilization level of each link of a plurality of links of the router; and dynamically activate or deactivate individual lanes of each of the plurality of links based on the determined link utilization level of each of the plurality of links. 20. The at least one computer readable storage medium of claim 19, wherein all lanes of a link of the plurality of links remain active when the link utilization level of the link is greater than a predetermined threshold and individual lanes of the link are deactivated when the link utilization level of the link is below the predetermined threshold. 21. The at least one computer readable storage medium of claim 19, wherein the instructions, when executed, cause the apparatus to track active lanes in each of the plurality of links to determine the link utilization level. 22. The at least one computer readable storage medium of claim 21, wherein the instructions, when executed, cause the apparatus to assign lane credits to each active lane. 23. The at least one computer readable storage medium of claim 22, wherein the instructions, when executed, cause the apparatus to: transmit, in response to one or more credit requests, one or more credit notifications to one or more of the plurality of links based on the assigned lane credits, wherein the one or more credit notifications are associated with one or more individual lane activations; and receive one or more credit returns from one or more of the plurality of links, wherein the credit returns are associated with one or more individual lane deactivations. 24. The at least one computer readable storage medium of claim 22, wherein the instructions, when executed, cause the apparatus to determine the lane credits based on the received power availability limit.
2,400
8,036
8,036
14,725,089
2,485
A diagnostic device for viewing problems occurring inside of a circuitous tube in a flexible member conveyor system or the like by attaching a camera to the flexible member or to one of the discs attached to the flexible member so that the camera can take photos or video to show views of the tube as the camera passes through the circuitous tube flexible member conveyor system, the flexible member typically being a cable or a chain.
1. A diagnostic apparatus comprising: a flexible member having a plurality of discs attached thereto, the flexible conveyor member and plurality of discs being adapted to be moved through a tube for conveying materials disposed in the tube; and a camera attached to at least one of the flexible member or one of the discs. 2. The diagnostic apparatus of claim 1 wherein the camera comprises a battery and a removable memory card. 3. The diagnostic apparatus of claim 1 wherein the camera comprises a battery and a radio frequency transmitter for transmitting images wirelessly to a computer for viewing the images. 4. The diagnostic apparatus of claim 1 wherein the camera comprises a battery, internal memory and a connector to facilitate connection of a data transfer communication cable. 5. The diagnostic apparatus of claim 1 further comprising a clamp operatively holding the camera attached to the flexible member. 6. The diagnostic apparatus of claim 5 further wherein the clamp includes at least two pieces. 7. The diagnostic apparatus of claim 1 further comprising a clamp operatively holding the camera attached to one of the discs. 8. The diagnostic apparatus of claim 1 wherein the flexible member is a cable having a first end and a second end and with a cable connector connecting the first end to the second end thereof and wherein the camera is connected to the flexible member via the cable connector.
A diagnostic device for viewing problems occurring inside of a circuitous tube in a flexible member conveyor system or the like by attaching a camera to the flexible member or to one of the discs attached to the flexible member so that the camera can take photos or video to show views of the tube as the camera passes through the circuitous tube flexible member conveyor system, the flexible member typically being a cable or a chain.1. A diagnostic apparatus comprising: a flexible member having a plurality of discs attached thereto, the flexible conveyor member and plurality of discs being adapted to be moved through a tube for conveying materials disposed in the tube; and a camera attached to at least one of the flexible member or one of the discs. 2. The diagnostic apparatus of claim 1 wherein the camera comprises a battery and a removable memory card. 3. The diagnostic apparatus of claim 1 wherein the camera comprises a battery and a radio frequency transmitter for transmitting images wirelessly to a computer for viewing the images. 4. The diagnostic apparatus of claim 1 wherein the camera comprises a battery, internal memory and a connector to facilitate connection of a data transfer communication cable. 5. The diagnostic apparatus of claim 1 further comprising a clamp operatively holding the camera attached to the flexible member. 6. The diagnostic apparatus of claim 5 further wherein the clamp includes at least two pieces. 7. The diagnostic apparatus of claim 1 further comprising a clamp operatively holding the camera attached to one of the discs. 8. The diagnostic apparatus of claim 1 wherein the flexible member is a cable having a first end and a second end and with a cable connector connecting the first end to the second end thereof and wherein the camera is connected to the flexible member via the cable connector.
2,400
8,037
8,037
13,906,035
2,416
A network mechanism for a communication network, e.g., Ethernet environment, includes a first control mechanism with an assigned first physical port and a second control mechanism with an assigned second physical port, the first and the second physical port being configured to receive and send data via a transmission medium. The network mechanism is configured such that transmitted data from the first control mechanism are coupled by an internal transmit connector of the first control mechanism via the first physical port into the transmission medium and received data at the second physical port are routed to an internal receive connector of the first control mechanism. Alternatively, received data can be routed crosswise to the other control mechanism, i.e., the control mechanism not assigned to the receiving physical port. The crosswise routing enables the formation of two independent ring-shaped communication paths of different transmit/receive directions within a single physical ring-shaped network.
1. A network mechanism for a communication network, comprising: a first control mechanism, a second control mechanism, a first physical port assigned to the first control mechanism and a second physical port assigned to the second control mechanism, wherein the first and the second physical port are configured to receive data from a transmission medium and to send data, and wherein the network mechanism is configured such that either: transmitted data from the first control mechanism are coupled by an internal transmit connector of the first control mechanism via the first physical port into the transmission medium and received data arriving at the second physical port are routed to an internal receive connector of the first control mechanism, or received data arriving at the first physical port are routed to an internal receive connector of the first control mechanism and transmitted data from the first control mechanism are coupled by an internal transmit connector of the first control mechanism via the second physical port into the transmission medium. 2. The network mechanism of claim 1, wherein the network mechanism is further configured such that either: transmitted data from the second control mechanism are coupled by an internal transmit connector of the second control mechanism via the second physical port in the transmission medium and received data arriving at the first physical port are routed to an internal receive connector of the second control mechanism, or received data arriving at the second physical port are routed to an internal receive connector of the second control mechanism and transmitted data from the second control mechanism are coupled by an internal transmit connector of the second control mechanism via the first physical port into the transmission medium. 3. The network mechanism of claim 1, wherein the network mechanism is further configured such that received data arriving at the first physical port do not go to the internal receive connector of the first control mechanism. 4. The network mechanism of claim 1, wherein the network mechanism is further configured such that received data arriving at the second physical port are not sent to the internal receive connector of the second control mechanism. 5. The network mechanism of claim 1, wherein a respective physical port comprises an external transmit connector and an external receive connector, wherein the external receive connector of the first physical port is connected directly to the internal receive connector of the second control mechanism. 6. The network mechanism of claim 1, wherein a respective physical port comprises an external transmit connector and an external receive connector, wherein the external receive connector of the second physical port is connected directly to the internal receive connector of the first control mechanism. 7. The network mechanism of claim 1, wherein a respective physical port comprises an external transmit connector and an external receive connector, wherein the external transmit connector of the first physical port is connected directly to the internal transmit connector of the second control mechanism. 8. The network mechanism of claim 1, wherein a respective physical port comprises an external transmit connector and an external receive connector, wherein the external transmit connector of the second physical port is connected directly to the internal transmit connector of the first control mechanism. 9. The network mechanism of claim 1, further comprising: a first switch mechanism and a second switch mechanism, wherein each respective switch mechanism comprises a plurality of switch ports, wherein each switch port comprises an internal transmit connector and an internal receive connector, wherein the first switch mechanism with a first switch port is communicatively coupled to the first control mechanism, and the second switch mechanism with a second switch port is communicatively coupled to the second control mechanism. 10. The network mechanism of claim 9, wherein each of the first and second physical ports comprises an external transmit connector and an external receive connector, wherein the external receive connector of the first physical port is coupled to an internal receive connector of a switch port of the second switch mechanism. 11. The network mechanism of claim 9, wherein each of the first and second physical ports comprises an external transmit connector and an external receive connector, wherein the external receive connector of the second physical port is coupled to an internal receive connector of a switch port of the first switch mechanism. 12. The network mechanism of claim 9, wherein each of the first and second physical ports comprises an external transmit connector and an external receive connector, wherein the external transmit connector of the first physical port is coupled to an internal transmit connector of a switch port of the second switch mechanism. 13. The network mechanism of claim 12, wherein each of the first and second physical ports comprises an external transmit connector and an external receive connector, wherein the external transmit connector of the second physical port is coupled to an internal transmit connector of a switch port of the first switch mechanism. 14. The network mechanism of claim 8, wherein at least one internal transmit connector of a switch port of a switch mechanism is coupled to a receive connector of a switch port of the same switch mechanism. 15. The network mechanism of claim 8, wherein at least one of the first and second switch mechanisms is configured such that data received at an internal receive connector of the switch port are sent to the internal transmit connector of the same switch port. 16. The network mechanism of claim 8 wherein the first and second switch mechanisms are communicatively coupled to each other via a switch port. 17. The network mechanism of claim 8, wherein at least one of the first and second switch mechanisms is configured to route data received by the control mechanism communicatively coupled to the switch port at an internal receive connector of the switch port to an internal transmit connector of a switch port of the at least one switch mechanism, which is connected to an internal receive connector of a switch port of the other switch mechanism or an internal receive connector of the other control mechanism. 18. The network mechanism of claim 17, wherein the internal receive connector and the internal transmit connector of the at least one switch mechanism belong to the same switch port of the at least one switch mechanism. 19. The network mechanism of claim 1, wherein each of the first and second control mechanisms comprises a further internal transmit connector and an internal receive connector, wherein the control mechanisms are directly communicatively connected to each other. 20. The network mechanism of claim 1, wherein the first control mechanism is configured to generate first data and the second control mechanism is configured to generate second data, wherein the first data and the second data are linked to each other by a prespecified coding. 21. The network mechanism of claim 1, wherein the first control mechanism, the first switch mechanism, and the first physical port form a first individual integrated circuit or module, and wherein the second control mechanism, the second switch mechanism, and the second physical port form a second individual integrated circuit or module. 22. The network mechanism of claim 1, wherein at least one of the external transmit connector and the external receive connector is configured to attach at least one twisted-pair cable. 23. The network mechanism of claim 1, wherein the physical port is configured to attach at least one optical waveguide. 24. The network mechanism of claim 1, wherein the network mechanism is configured for use in an Ethernet protocol environment according to the IEEE 802.3 Standard in a switched network. 25. A network arrangement comprising: a plurality of network mechanisms including a first network mechanism and a second network mechanism, each network mechanism comprising: a first control mechanism and a first physical port assigned to the first control mechanism, and a second control mechanism and second physical port assigned to the second control mechanism, wherein to form a ring structure the first physical port assigned to the first control mechanism in the first network mechanism is communicatively coupled with the aid of a transmission medium to the second physical port assigned to the second control mechanism in the second network mechanism. 26. The network arrangement of claim 25, wherein each of the first and second network mechanisms further comprises: a first physical port assigned to the first control mechanism for sending data, a further first physical port assigned to the first control mechanism for receiving data, a second physical port assigned to the second control mechanism for receiving data, and a further second physical port assigned to the second control mechanism for sending data, and wherein the first physical port of the first network mechanism is coupled to the first further physical port of the second network mechanism and the second further physical port of the second network mechanism is coupled to the second physical port of the first network mechanism. 27. A method for operating a network arrangement comprising a plurality of network mechanisms including a first network mechanism and a second network mechanism, each network mechanism comprising a first control mechanism and a first physical port assigned to the first control mechanism, and a second control mechanism and second physical port assigned to the second control mechanism, wherein to form a ring structure the first physical port assigned to the first control mechanism in the first network mechanism is communicatively coupled with the aid of a transmission medium to the second physical port assigned to the second control mechanism in the second network mechanism, the method comprising: at the first physical port of the first network mechanism, rerouting data received by the transmission medium to the second physical port of the first network mechanism and sent from the second physical port to the transmission medium. 28. The method of claim 27 further comprising: generating first data by the first control mechanism and of second data by the second control mechanism, wherein the first data and the second data are linked to each other by a prespecified coding; transmitting the first data from the first control mechanism to the second control mechanism and the transmission of the second data from the second control mechanism to the first control mechanism; sending the first data and the second data via a first communication path from the physical port of the first control mechanism to the physical port of the second control mechanism; and sending the first data and the second data via a second communication path from the physical port of the second control mechanism to the physical port of the first control mechanism; wherein the data of the first and of the second communication paths travel through the same network mechanisms in opposite directions. 29. The method of claim 27, further comprising comparing the first data with the second data in at least one of the first and second control mechanisms to determine a comparison result; and rendering the network mechanism passive as a function of the comparison result. 30. A computer program product, which initiates the performance of a method as claimed in claim 27 on one or more program-controlled mechanisms. 31. A data carrier with a stored computer program with commands, which initiates the performance of a method as claimed in claim 27 on one or more program-controlled mechanisms.
A network mechanism for a communication network, e.g., Ethernet environment, includes a first control mechanism with an assigned first physical port and a second control mechanism with an assigned second physical port, the first and the second physical port being configured to receive and send data via a transmission medium. The network mechanism is configured such that transmitted data from the first control mechanism are coupled by an internal transmit connector of the first control mechanism via the first physical port into the transmission medium and received data at the second physical port are routed to an internal receive connector of the first control mechanism. Alternatively, received data can be routed crosswise to the other control mechanism, i.e., the control mechanism not assigned to the receiving physical port. The crosswise routing enables the formation of two independent ring-shaped communication paths of different transmit/receive directions within a single physical ring-shaped network.1. A network mechanism for a communication network, comprising: a first control mechanism, a second control mechanism, a first physical port assigned to the first control mechanism and a second physical port assigned to the second control mechanism, wherein the first and the second physical port are configured to receive data from a transmission medium and to send data, and wherein the network mechanism is configured such that either: transmitted data from the first control mechanism are coupled by an internal transmit connector of the first control mechanism via the first physical port into the transmission medium and received data arriving at the second physical port are routed to an internal receive connector of the first control mechanism, or received data arriving at the first physical port are routed to an internal receive connector of the first control mechanism and transmitted data from the first control mechanism are coupled by an internal transmit connector of the first control mechanism via the second physical port into the transmission medium. 2. The network mechanism of claim 1, wherein the network mechanism is further configured such that either: transmitted data from the second control mechanism are coupled by an internal transmit connector of the second control mechanism via the second physical port in the transmission medium and received data arriving at the first physical port are routed to an internal receive connector of the second control mechanism, or received data arriving at the second physical port are routed to an internal receive connector of the second control mechanism and transmitted data from the second control mechanism are coupled by an internal transmit connector of the second control mechanism via the first physical port into the transmission medium. 3. The network mechanism of claim 1, wherein the network mechanism is further configured such that received data arriving at the first physical port do not go to the internal receive connector of the first control mechanism. 4. The network mechanism of claim 1, wherein the network mechanism is further configured such that received data arriving at the second physical port are not sent to the internal receive connector of the second control mechanism. 5. The network mechanism of claim 1, wherein a respective physical port comprises an external transmit connector and an external receive connector, wherein the external receive connector of the first physical port is connected directly to the internal receive connector of the second control mechanism. 6. The network mechanism of claim 1, wherein a respective physical port comprises an external transmit connector and an external receive connector, wherein the external receive connector of the second physical port is connected directly to the internal receive connector of the first control mechanism. 7. The network mechanism of claim 1, wherein a respective physical port comprises an external transmit connector and an external receive connector, wherein the external transmit connector of the first physical port is connected directly to the internal transmit connector of the second control mechanism. 8. The network mechanism of claim 1, wherein a respective physical port comprises an external transmit connector and an external receive connector, wherein the external transmit connector of the second physical port is connected directly to the internal transmit connector of the first control mechanism. 9. The network mechanism of claim 1, further comprising: a first switch mechanism and a second switch mechanism, wherein each respective switch mechanism comprises a plurality of switch ports, wherein each switch port comprises an internal transmit connector and an internal receive connector, wherein the first switch mechanism with a first switch port is communicatively coupled to the first control mechanism, and the second switch mechanism with a second switch port is communicatively coupled to the second control mechanism. 10. The network mechanism of claim 9, wherein each of the first and second physical ports comprises an external transmit connector and an external receive connector, wherein the external receive connector of the first physical port is coupled to an internal receive connector of a switch port of the second switch mechanism. 11. The network mechanism of claim 9, wherein each of the first and second physical ports comprises an external transmit connector and an external receive connector, wherein the external receive connector of the second physical port is coupled to an internal receive connector of a switch port of the first switch mechanism. 12. The network mechanism of claim 9, wherein each of the first and second physical ports comprises an external transmit connector and an external receive connector, wherein the external transmit connector of the first physical port is coupled to an internal transmit connector of a switch port of the second switch mechanism. 13. The network mechanism of claim 12, wherein each of the first and second physical ports comprises an external transmit connector and an external receive connector, wherein the external transmit connector of the second physical port is coupled to an internal transmit connector of a switch port of the first switch mechanism. 14. The network mechanism of claim 8, wherein at least one internal transmit connector of a switch port of a switch mechanism is coupled to a receive connector of a switch port of the same switch mechanism. 15. The network mechanism of claim 8, wherein at least one of the first and second switch mechanisms is configured such that data received at an internal receive connector of the switch port are sent to the internal transmit connector of the same switch port. 16. The network mechanism of claim 8 wherein the first and second switch mechanisms are communicatively coupled to each other via a switch port. 17. The network mechanism of claim 8, wherein at least one of the first and second switch mechanisms is configured to route data received by the control mechanism communicatively coupled to the switch port at an internal receive connector of the switch port to an internal transmit connector of a switch port of the at least one switch mechanism, which is connected to an internal receive connector of a switch port of the other switch mechanism or an internal receive connector of the other control mechanism. 18. The network mechanism of claim 17, wherein the internal receive connector and the internal transmit connector of the at least one switch mechanism belong to the same switch port of the at least one switch mechanism. 19. The network mechanism of claim 1, wherein each of the first and second control mechanisms comprises a further internal transmit connector and an internal receive connector, wherein the control mechanisms are directly communicatively connected to each other. 20. The network mechanism of claim 1, wherein the first control mechanism is configured to generate first data and the second control mechanism is configured to generate second data, wherein the first data and the second data are linked to each other by a prespecified coding. 21. The network mechanism of claim 1, wherein the first control mechanism, the first switch mechanism, and the first physical port form a first individual integrated circuit or module, and wherein the second control mechanism, the second switch mechanism, and the second physical port form a second individual integrated circuit or module. 22. The network mechanism of claim 1, wherein at least one of the external transmit connector and the external receive connector is configured to attach at least one twisted-pair cable. 23. The network mechanism of claim 1, wherein the physical port is configured to attach at least one optical waveguide. 24. The network mechanism of claim 1, wherein the network mechanism is configured for use in an Ethernet protocol environment according to the IEEE 802.3 Standard in a switched network. 25. A network arrangement comprising: a plurality of network mechanisms including a first network mechanism and a second network mechanism, each network mechanism comprising: a first control mechanism and a first physical port assigned to the first control mechanism, and a second control mechanism and second physical port assigned to the second control mechanism, wherein to form a ring structure the first physical port assigned to the first control mechanism in the first network mechanism is communicatively coupled with the aid of a transmission medium to the second physical port assigned to the second control mechanism in the second network mechanism. 26. The network arrangement of claim 25, wherein each of the first and second network mechanisms further comprises: a first physical port assigned to the first control mechanism for sending data, a further first physical port assigned to the first control mechanism for receiving data, a second physical port assigned to the second control mechanism for receiving data, and a further second physical port assigned to the second control mechanism for sending data, and wherein the first physical port of the first network mechanism is coupled to the first further physical port of the second network mechanism and the second further physical port of the second network mechanism is coupled to the second physical port of the first network mechanism. 27. A method for operating a network arrangement comprising a plurality of network mechanisms including a first network mechanism and a second network mechanism, each network mechanism comprising a first control mechanism and a first physical port assigned to the first control mechanism, and a second control mechanism and second physical port assigned to the second control mechanism, wherein to form a ring structure the first physical port assigned to the first control mechanism in the first network mechanism is communicatively coupled with the aid of a transmission medium to the second physical port assigned to the second control mechanism in the second network mechanism, the method comprising: at the first physical port of the first network mechanism, rerouting data received by the transmission medium to the second physical port of the first network mechanism and sent from the second physical port to the transmission medium. 28. The method of claim 27 further comprising: generating first data by the first control mechanism and of second data by the second control mechanism, wherein the first data and the second data are linked to each other by a prespecified coding; transmitting the first data from the first control mechanism to the second control mechanism and the transmission of the second data from the second control mechanism to the first control mechanism; sending the first data and the second data via a first communication path from the physical port of the first control mechanism to the physical port of the second control mechanism; and sending the first data and the second data via a second communication path from the physical port of the second control mechanism to the physical port of the first control mechanism; wherein the data of the first and of the second communication paths travel through the same network mechanisms in opposite directions. 29. The method of claim 27, further comprising comparing the first data with the second data in at least one of the first and second control mechanisms to determine a comparison result; and rendering the network mechanism passive as a function of the comparison result. 30. A computer program product, which initiates the performance of a method as claimed in claim 27 on one or more program-controlled mechanisms. 31. A data carrier with a stored computer program with commands, which initiates the performance of a method as claimed in claim 27 on one or more program-controlled mechanisms.
2,400
8,038
8,038
15,376,075
2,444
A cloud environment is provided generally having at least one private data center possessing a controller/routing system and nonvolatile mass storage, a plurality of data objects retained in the nonvolatile mass storage, and a public cloud storage service provider linked to the controller/routing system. The public cloud storage service provider possessing a database containing policy decisions and metadata of the plurality of data objects. When a data object is uploaded by an end-user to a specific data bucket in the cloud environment, the private data center is the recipient of the data object because the specific data bucket is located in the private data center and not in the public cloud storage service. Meta data and location information about the data object is uploaded to the public cloud storage service provider. The private data center is not in possession of the policy decisions and the metadata for data objects. The public cloud storage service provider is communicatively linked to the end-user computing system by way of the controller/routing system. The data center is independent of the public cloud storage provider.
1. A method comprising: providing a first data center possessing a first controller/routing system and non-volatile mass storage, a public cloud storage provider independent from but connected to said first controller/routing system, and a first end-user computing system; connecting said first end-user to said first controller/routing system through a web address; after said connecting step, said first end-user computing system uploading a first data object to a previously defined data bucket to said web address; and storing said first data object to said nonvolatile mass storage in said first data center and storing metadata and directory information about said first data object to a database for said data bucket, said database retained solely in said public cloud storage provider and said first data object never stored in said public cloud storage provider. 2. The method of claim 1 further comprising said first end-user computing system transmitting authorization access codes to said web address along with requesting data directory contents for said data bucket before said uploading step. 3. The method of claim 2 further comprising transmitting said authorization codes from said first data center to said public cloud service provider followed by said first data center receiving said data directory contents for said data bucket from said public cloud storage provider; and sending on said data directory contents to said first end-user computing system. 4. The method of claim 3 wherein said first end-user computing system communicates with said first data center in a public interface protocol and said first data center communicates with said public cloud storage provider in a private control protocol. 5. The method of claim 4 wherein said first controller/routing system converts each transactions received from said first end-user computing system in said public interface protocol to said private control protocol before sending on to said public cloud storage provider, and wherein said first controller/routing system converts all transactions received from said public cloud storage provider in said private control protocol to said public interface protocol before sending on to said first end-user computing system. 6. The method of claim 1 wherein said web address connects said first end-user computing system to a public interface program that appears to said first end-user computing system to be said public cloud storage provider even though it is said first data center instead. 7. The method of claim 1 wherein said metadata includes data object location/s, migration information, access information, time and dates of activities related to said data object, and replication information. 8. The method of claim 1 wherein every transaction between said first end-user and said first data center is by way of a stateless communication protocol. 9. The method of claim 1 further comprising providing a second data center possessing a second controller/routing system, said second data center connected to said public cloud storage provider, said second data center targeted via a second web address, said second data center in a second location different from said first data center and connected to said first data center over data pathway that excludes said public cloud storage provider; a second end-user connecting to said second data center via said second web address even though said second end-user is geographically closer to said first data center than said second data center; rerouting said second end-user to said first data center; said second end-user uploading a second data object to said data bucket in said first data center; updating second data object metadata to said database said data bucket in said public cloud. 10. The method of claim 1 further comprising providing a second data center possessing a second controller/routing system, said second data center connected to said public cloud storage provider, said second data center targeted via a second web address, said second data center in a location different from said first data center and connected to said first data center over data pathway that excludes said public cloud storage provider; said data bucket replicated in said second data center using said data pathway; said second end-user uploading a second data object to said data bucket in said second data center behind said second web address; replicating said second data object in said data bucket in said first data center over said data pathway so that said data bucket in both said first data center and said second data center are synced together, said second data object never exists in said public cloud storage provider; uploading second data object metadata to said data bucket in said public cloud storage provider. 11. The method of claim 10 further comprising generating a history of activity for said second data object and storing said history of activity in said public cloud storage provider. 12. A storage arrangement comprising: a first data center possessing non-volatile mass storage; a public cloud storage service independent from but connected to said first data center; a first end-user computing system; a first end-user linked to said first data center; means for orchestrating communication between said first data center and said first end-user computing system and for orchestrating communication between said first data center and said public cloud storage service; means for directing a first data object to storage to a predefined data bucket in said nonvolatile mass storage, the first data object sent from said first end-user; and means for transmitting metadata corresponding to said first data object to a database managed by said public cloud storage provider, said first data object is never fully retained in said public cloud storage provider and said database is never fully stored in said first data center. 13. The storage arrangement of claim 12 further comprising policy decisions and a data directory for said data bucket retained solely in said public cloud storage provider. 14. The storage arrangement of claim 13 further comprising means for receiving and executing at least one of said policy decisions in said first data center received from said public cloud storage provider. 15. The storage's arrangement of claim 12 wherein said first data center communicatively interacts with said public cloud storage provider using a private control protocol and said first data center communicatively interacts with said first end-user computing system using a public interface protocol. 16. The storage arrangement of claim 12 wherein only an abbreviated portion of said first data object is retained in said public cloud storage provider. 17. The storage arrangement of claim 12 further comprising means for providing said public cloud storage provider at least one record of a storage related activity involving said first data object, said at least one record is retained in said public cloud storage provider. 18. A storage arrangement comprising: a first data center possessing non-volatile mass storage and a first master controller/routing system; a public cloud storage provider independent from but connected to said first data center by way of said first master controller/routing system; a first end-user computing system connected to said first data center by way of said first master controller/routing system; a first data object, previously received from said first end-user, logically stored to a data bucket, said first data object in said data bucket retained by said nonvolatile mass storage, said first data object or copy of said first data object never stored in said public cloud storage provider; and a database for said data bucket retained and managed by said public cloud storage provider, said database including metadata about said first data object and policy decisions for said first data object, said database exclusively located in said public cloud storage provider. 19. The storage arrangement of claim 18 further comprising an abbreviated representation of said first data object retained in said public cloud storage provider. 20. The storage arrangement of claim 18 wherein said first master controller/routing system is adapted to be connected to said first end-user via web address and is adapted to be accessed through a public interface software platform that appears to be a public cloud to said first end-user.
A cloud environment is provided generally having at least one private data center possessing a controller/routing system and nonvolatile mass storage, a plurality of data objects retained in the nonvolatile mass storage, and a public cloud storage service provider linked to the controller/routing system. The public cloud storage service provider possessing a database containing policy decisions and metadata of the plurality of data objects. When a data object is uploaded by an end-user to a specific data bucket in the cloud environment, the private data center is the recipient of the data object because the specific data bucket is located in the private data center and not in the public cloud storage service. Meta data and location information about the data object is uploaded to the public cloud storage service provider. The private data center is not in possession of the policy decisions and the metadata for data objects. The public cloud storage service provider is communicatively linked to the end-user computing system by way of the controller/routing system. The data center is independent of the public cloud storage provider.1. A method comprising: providing a first data center possessing a first controller/routing system and non-volatile mass storage, a public cloud storage provider independent from but connected to said first controller/routing system, and a first end-user computing system; connecting said first end-user to said first controller/routing system through a web address; after said connecting step, said first end-user computing system uploading a first data object to a previously defined data bucket to said web address; and storing said first data object to said nonvolatile mass storage in said first data center and storing metadata and directory information about said first data object to a database for said data bucket, said database retained solely in said public cloud storage provider and said first data object never stored in said public cloud storage provider. 2. The method of claim 1 further comprising said first end-user computing system transmitting authorization access codes to said web address along with requesting data directory contents for said data bucket before said uploading step. 3. The method of claim 2 further comprising transmitting said authorization codes from said first data center to said public cloud service provider followed by said first data center receiving said data directory contents for said data bucket from said public cloud storage provider; and sending on said data directory contents to said first end-user computing system. 4. The method of claim 3 wherein said first end-user computing system communicates with said first data center in a public interface protocol and said first data center communicates with said public cloud storage provider in a private control protocol. 5. The method of claim 4 wherein said first controller/routing system converts each transactions received from said first end-user computing system in said public interface protocol to said private control protocol before sending on to said public cloud storage provider, and wherein said first controller/routing system converts all transactions received from said public cloud storage provider in said private control protocol to said public interface protocol before sending on to said first end-user computing system. 6. The method of claim 1 wherein said web address connects said first end-user computing system to a public interface program that appears to said first end-user computing system to be said public cloud storage provider even though it is said first data center instead. 7. The method of claim 1 wherein said metadata includes data object location/s, migration information, access information, time and dates of activities related to said data object, and replication information. 8. The method of claim 1 wherein every transaction between said first end-user and said first data center is by way of a stateless communication protocol. 9. The method of claim 1 further comprising providing a second data center possessing a second controller/routing system, said second data center connected to said public cloud storage provider, said second data center targeted via a second web address, said second data center in a second location different from said first data center and connected to said first data center over data pathway that excludes said public cloud storage provider; a second end-user connecting to said second data center via said second web address even though said second end-user is geographically closer to said first data center than said second data center; rerouting said second end-user to said first data center; said second end-user uploading a second data object to said data bucket in said first data center; updating second data object metadata to said database said data bucket in said public cloud. 10. The method of claim 1 further comprising providing a second data center possessing a second controller/routing system, said second data center connected to said public cloud storage provider, said second data center targeted via a second web address, said second data center in a location different from said first data center and connected to said first data center over data pathway that excludes said public cloud storage provider; said data bucket replicated in said second data center using said data pathway; said second end-user uploading a second data object to said data bucket in said second data center behind said second web address; replicating said second data object in said data bucket in said first data center over said data pathway so that said data bucket in both said first data center and said second data center are synced together, said second data object never exists in said public cloud storage provider; uploading second data object metadata to said data bucket in said public cloud storage provider. 11. The method of claim 10 further comprising generating a history of activity for said second data object and storing said history of activity in said public cloud storage provider. 12. A storage arrangement comprising: a first data center possessing non-volatile mass storage; a public cloud storage service independent from but connected to said first data center; a first end-user computing system; a first end-user linked to said first data center; means for orchestrating communication between said first data center and said first end-user computing system and for orchestrating communication between said first data center and said public cloud storage service; means for directing a first data object to storage to a predefined data bucket in said nonvolatile mass storage, the first data object sent from said first end-user; and means for transmitting metadata corresponding to said first data object to a database managed by said public cloud storage provider, said first data object is never fully retained in said public cloud storage provider and said database is never fully stored in said first data center. 13. The storage arrangement of claim 12 further comprising policy decisions and a data directory for said data bucket retained solely in said public cloud storage provider. 14. The storage arrangement of claim 13 further comprising means for receiving and executing at least one of said policy decisions in said first data center received from said public cloud storage provider. 15. The storage's arrangement of claim 12 wherein said first data center communicatively interacts with said public cloud storage provider using a private control protocol and said first data center communicatively interacts with said first end-user computing system using a public interface protocol. 16. The storage arrangement of claim 12 wherein only an abbreviated portion of said first data object is retained in said public cloud storage provider. 17. The storage arrangement of claim 12 further comprising means for providing said public cloud storage provider at least one record of a storage related activity involving said first data object, said at least one record is retained in said public cloud storage provider. 18. A storage arrangement comprising: a first data center possessing non-volatile mass storage and a first master controller/routing system; a public cloud storage provider independent from but connected to said first data center by way of said first master controller/routing system; a first end-user computing system connected to said first data center by way of said first master controller/routing system; a first data object, previously received from said first end-user, logically stored to a data bucket, said first data object in said data bucket retained by said nonvolatile mass storage, said first data object or copy of said first data object never stored in said public cloud storage provider; and a database for said data bucket retained and managed by said public cloud storage provider, said database including metadata about said first data object and policy decisions for said first data object, said database exclusively located in said public cloud storage provider. 19. The storage arrangement of claim 18 further comprising an abbreviated representation of said first data object retained in said public cloud storage provider. 20. The storage arrangement of claim 18 wherein said first master controller/routing system is adapted to be connected to said first end-user via web address and is adapted to be accessed through a public interface software platform that appears to be a public cloud to said first end-user.
2,400
8,039
8,039
14,582,110
2,461
Embodiments of systems and methods for time domain multiplexing solutions for in-device coexistence are generally described herein. Other embodiments may be described and claimed.
1. User equipment (UE), comprising: logic, at least a portion of which is in hardware, to detect in-device coexistence interference between multiple radios that when operational use different wireless protocols, one of which comprises a long term evolution (LTE) wireless protocol, and send information to indicate a time division multiplexing (TDM) pattern for a hybrid automatic repeat request (HARQ) process for the LTE wireless protocol, the TDM pattern to indicate one or more subframes for use by the HARQ process; and a radio-frequency (RF) transmitter coupled to the logic, the RF transmitter to transmit electromagnetic signals representing the information on a wireless uplink channel. 2. The UE of claim 1, the information to represent the TDM pattern as a series of bits. 3. The UE of claim 1, the information to represent the TDM pattern as a series of bits, where a bit set to a value of one (1) indicates a subframe that can be used for the HARQ process. 4. The UE of claim 1, the information to represent the TDM pattern as a series of bits, where a bit set to a value of zero (0) indicates a subframe that cannot be used for the HARQ process. 5. The UE of claim 1, the LTE wireless protocol to use frequency division duplexing (FDD). 6. The UE of claim 1, the LTE wireless protocol to use time division duplexing (TDD). 7. The UE of claim 1, the logic to receive configuration information that includes the TDM pattern. 8. The UE of claim 1, the logic to receive configuration information that includes a different TDM pattern. 9. The UE of claim 1, comprising an antenna, processor, a memory and a display. 10. The UE of claim 1, the LTE wireless protocol comprising a LTE advanced wireless protocol. 11. User equipment (UE), comprising: a first radio to operate with a long term evolution (LTE) wireless protocol; a second radio to operate with a wireless fidelity (Wi-Fi) wireless protocol; and a processor coupled to the first radio and the second radio, the processor to detect in-device coexistence interference between the first and second radios, and send time division multiplexing (TDM) based information to an evolved node B (eNode-B) via the first radio, the information to represent a pattern for a hybrid automatic repeat request (HARQ) process for the LTE wireless protocol, the pattern to indicate one or more subframes for use by the first radio for the HARQ process to reduce in-device coexistence interference with the second radio. 12. The UE of claim 11, the pattern to comprise a bitmap, where a bit set to one (1) indicates a subframe that can be used for the HARQ process, and a bit set to zero (0) indicates a subframe that cannot be used for the HARQ process. 13. The UE of claim 11, the pattern to comprise a bitmap, where a bit set to one (1) indicates a subframe that can be used to send an acknowledgement (ACK) or a negative acknowledgement (NACK) for the HARQ process. 14. The UE of claim 11, the pattern to comprise a bitmap, where a bit set to one (1) indicates a subframe that can be used to receive a retransmission of data on a downlink channel in response to a negative acknowledgement (NACK) for the HARQ process. 15. The UE of claim 11, the pattern to comprise a bitmap, where a bit set to zero (0) bit indicates a subframe that cannot be used for the HARQ process. 16. The UE of claim 11, comprising an antenna, a controller, a memory and a display. 17. At least one computer-readable storage medium comprising instructions that, when executed, cause a system to: detect in-device coexistence interference between multiple radios using different wireless protocols, with at least one of the different wireless protocols to comprise a long term evolution (LTE) wireless protocol; send information representing a time division multiplexing (TDM) pattern for a hybrid automatic repeat request (HARQ) process for the LTE wireless protocol, the TDM pattern to indicate one or more subframes for use by the HARQ process as a string of bits; and control operation of the multiple radios based on the TDM pattern. 18. The computer-readable storage medium of claim 17, comprising instructions that when executed cause the system to send HARQ information in the one or more subframes based on the TDM pattern. 19. The computer-readable storage medium of claim 17, comprising instructions that when executed cause the system to receive HARQ information in the one or more subframes based on the TDM pattern. 20. The computer-readable storage medium of claim 17, comprising instructions that when executed cause the system to send discontinuous reception (DRX) information. 21. The computer-readable storage medium of claim 17, comprising instructions that when executed cause the system to discontinuously monitor a physical downlink control channel (PDCCH) based on the TDM pattern. 22. An evolved node B (eNode-B), comprising: a wireless transceiver; and a processor coupled to the wireless transceiver, the processor to receive information from user equipment (UE) via the wireless transceiver, the information to indicate a time division multiplexing (TDM) pattern for a hybrid automatic repeat request (HARQ) process for a long term evolution (LTE) wireless protocol, the TDM pattern to indicate one or more subframes for use by the HARQ process, and assign the HARQ process to at least one subframe from the indicated one or more subframes in order to resolve in-device coexistence interference between multiple radios of the UE, the multiple radios to operate in accordance with different wireless protocols, one of which comprises the LTE wireless protocol. 23. The eNode-B of claim 22, the information to represent the TDM pattern as a series of bits. 24. The eNode-B of claim 22, the information to represent the TDM pattern as a series of bits, where a bit set to a value of one (1) indicates a subframe that can be used for the HARQ process. 25. The eNode-B of claim 22, the information to represent the TDM pattern as a series of bits, where a bit set to a value of zero (0) indicates a subframe that cannot be used for the HARQ process. 26. The eNode-B of claim 22, the LTE wireless protocol to use frequency division duplexing (FDD). 27. The eNode-B of claim 22, the LTE wireless protocol to use time division duplexing (TDD). 28. The eNode-B of claim 22, the wireless transceiver coupled to one or more antennas. 29. The eNode-B of claim 22, the LTE wireless protocol comprising a LTE advanced wireless protocol. 30. At least one computer-readable storage medium comprising instructions that, when executed, cause a system to: receive information from user equipment (UE), the information to indicate a time division multiplexing (TDM) pattern for a hybrid automatic repeat request (HARQ) process for a long term evolution (LTE) wireless protocol, the TDM pattern to indicate one or more subframes for use by the HARQ process; and assign the HARQ process to at least one subframe from the indicated one or more subframes in order to resolve in-device coexistence interference between multiple radios of the UE, the multiple radios to operate in accordance with different wireless protocols, one of which comprises the LTE wireless protocol. 31. The computer-readable storage medium of claim 30, the information to represent the TDM pattern as a series of bits. 32. The computer-readable storage medium of claim 30, the information to represent the TDM pattern as a series of bits, where a bit set to a value of one (1) indicates a subframe that can be used for the HARQ process. 33. The computer-readable storage medium of claim 30, the information to represent the TDM pattern as a series of bits, where a bit set to a value of zero (0) indicates a subframe that cannot be used for the HARQ process. 34. The computer-readable storage medium of claim 30, comprising instructions that when executed cause the system to send HARQ information in the at least one subframe. 35. The computer-readable storage medium of claim 30, comprising instructions that when executed cause the system to receive HARQ information in the at least one subframe.
Embodiments of systems and methods for time domain multiplexing solutions for in-device coexistence are generally described herein. Other embodiments may be described and claimed.1. User equipment (UE), comprising: logic, at least a portion of which is in hardware, to detect in-device coexistence interference between multiple radios that when operational use different wireless protocols, one of which comprises a long term evolution (LTE) wireless protocol, and send information to indicate a time division multiplexing (TDM) pattern for a hybrid automatic repeat request (HARQ) process for the LTE wireless protocol, the TDM pattern to indicate one or more subframes for use by the HARQ process; and a radio-frequency (RF) transmitter coupled to the logic, the RF transmitter to transmit electromagnetic signals representing the information on a wireless uplink channel. 2. The UE of claim 1, the information to represent the TDM pattern as a series of bits. 3. The UE of claim 1, the information to represent the TDM pattern as a series of bits, where a bit set to a value of one (1) indicates a subframe that can be used for the HARQ process. 4. The UE of claim 1, the information to represent the TDM pattern as a series of bits, where a bit set to a value of zero (0) indicates a subframe that cannot be used for the HARQ process. 5. The UE of claim 1, the LTE wireless protocol to use frequency division duplexing (FDD). 6. The UE of claim 1, the LTE wireless protocol to use time division duplexing (TDD). 7. The UE of claim 1, the logic to receive configuration information that includes the TDM pattern. 8. The UE of claim 1, the logic to receive configuration information that includes a different TDM pattern. 9. The UE of claim 1, comprising an antenna, processor, a memory and a display. 10. The UE of claim 1, the LTE wireless protocol comprising a LTE advanced wireless protocol. 11. User equipment (UE), comprising: a first radio to operate with a long term evolution (LTE) wireless protocol; a second radio to operate with a wireless fidelity (Wi-Fi) wireless protocol; and a processor coupled to the first radio and the second radio, the processor to detect in-device coexistence interference between the first and second radios, and send time division multiplexing (TDM) based information to an evolved node B (eNode-B) via the first radio, the information to represent a pattern for a hybrid automatic repeat request (HARQ) process for the LTE wireless protocol, the pattern to indicate one or more subframes for use by the first radio for the HARQ process to reduce in-device coexistence interference with the second radio. 12. The UE of claim 11, the pattern to comprise a bitmap, where a bit set to one (1) indicates a subframe that can be used for the HARQ process, and a bit set to zero (0) indicates a subframe that cannot be used for the HARQ process. 13. The UE of claim 11, the pattern to comprise a bitmap, where a bit set to one (1) indicates a subframe that can be used to send an acknowledgement (ACK) or a negative acknowledgement (NACK) for the HARQ process. 14. The UE of claim 11, the pattern to comprise a bitmap, where a bit set to one (1) indicates a subframe that can be used to receive a retransmission of data on a downlink channel in response to a negative acknowledgement (NACK) for the HARQ process. 15. The UE of claim 11, the pattern to comprise a bitmap, where a bit set to zero (0) bit indicates a subframe that cannot be used for the HARQ process. 16. The UE of claim 11, comprising an antenna, a controller, a memory and a display. 17. At least one computer-readable storage medium comprising instructions that, when executed, cause a system to: detect in-device coexistence interference between multiple radios using different wireless protocols, with at least one of the different wireless protocols to comprise a long term evolution (LTE) wireless protocol; send information representing a time division multiplexing (TDM) pattern for a hybrid automatic repeat request (HARQ) process for the LTE wireless protocol, the TDM pattern to indicate one or more subframes for use by the HARQ process as a string of bits; and control operation of the multiple radios based on the TDM pattern. 18. The computer-readable storage medium of claim 17, comprising instructions that when executed cause the system to send HARQ information in the one or more subframes based on the TDM pattern. 19. The computer-readable storage medium of claim 17, comprising instructions that when executed cause the system to receive HARQ information in the one or more subframes based on the TDM pattern. 20. The computer-readable storage medium of claim 17, comprising instructions that when executed cause the system to send discontinuous reception (DRX) information. 21. The computer-readable storage medium of claim 17, comprising instructions that when executed cause the system to discontinuously monitor a physical downlink control channel (PDCCH) based on the TDM pattern. 22. An evolved node B (eNode-B), comprising: a wireless transceiver; and a processor coupled to the wireless transceiver, the processor to receive information from user equipment (UE) via the wireless transceiver, the information to indicate a time division multiplexing (TDM) pattern for a hybrid automatic repeat request (HARQ) process for a long term evolution (LTE) wireless protocol, the TDM pattern to indicate one or more subframes for use by the HARQ process, and assign the HARQ process to at least one subframe from the indicated one or more subframes in order to resolve in-device coexistence interference between multiple radios of the UE, the multiple radios to operate in accordance with different wireless protocols, one of which comprises the LTE wireless protocol. 23. The eNode-B of claim 22, the information to represent the TDM pattern as a series of bits. 24. The eNode-B of claim 22, the information to represent the TDM pattern as a series of bits, where a bit set to a value of one (1) indicates a subframe that can be used for the HARQ process. 25. The eNode-B of claim 22, the information to represent the TDM pattern as a series of bits, where a bit set to a value of zero (0) indicates a subframe that cannot be used for the HARQ process. 26. The eNode-B of claim 22, the LTE wireless protocol to use frequency division duplexing (FDD). 27. The eNode-B of claim 22, the LTE wireless protocol to use time division duplexing (TDD). 28. The eNode-B of claim 22, the wireless transceiver coupled to one or more antennas. 29. The eNode-B of claim 22, the LTE wireless protocol comprising a LTE advanced wireless protocol. 30. At least one computer-readable storage medium comprising instructions that, when executed, cause a system to: receive information from user equipment (UE), the information to indicate a time division multiplexing (TDM) pattern for a hybrid automatic repeat request (HARQ) process for a long term evolution (LTE) wireless protocol, the TDM pattern to indicate one or more subframes for use by the HARQ process; and assign the HARQ process to at least one subframe from the indicated one or more subframes in order to resolve in-device coexistence interference between multiple radios of the UE, the multiple radios to operate in accordance with different wireless protocols, one of which comprises the LTE wireless protocol. 31. The computer-readable storage medium of claim 30, the information to represent the TDM pattern as a series of bits. 32. The computer-readable storage medium of claim 30, the information to represent the TDM pattern as a series of bits, where a bit set to a value of one (1) indicates a subframe that can be used for the HARQ process. 33. The computer-readable storage medium of claim 30, the information to represent the TDM pattern as a series of bits, where a bit set to a value of zero (0) indicates a subframe that cannot be used for the HARQ process. 34. The computer-readable storage medium of claim 30, comprising instructions that when executed cause the system to send HARQ information in the at least one subframe. 35. The computer-readable storage medium of claim 30, comprising instructions that when executed cause the system to receive HARQ information in the at least one subframe.
2,400
8,040
8,040
14,006,882
2,473
Example embodiments presented herein are directed towards a wireless terminal and base station, and corresponding methods therein, for providing a handover for a subset of bearers associated with the wireless terminal. The subset of bearers is less than a total number of bearers associated with the wireless terminal. Thus, upon the completion of the handover procedure, at least one bearer will stay connected with a source base station.
1-34. (canceled) 35. A method, in a wireless terminal, for a handover of a sub-set of bearers associated with the wireless terminal, said sub-set of bearers being less than all bearers associated with the wireless terminal, the method comprising: receiving, from a source or a target base station, a message, said message indicating that a handover procedure will take place for an identified sub-set of bearers; and handing over the identified sub-set of bearers to the target base station, wherein at least one bearer associated with the wireless terminal, which is not part of the identified sub-set of bearers, remains connected to the source base station. 36. The method of claim 35, further comprising sending, to the source base station or the target base station, a capability parameter, said capability parameter providing an indication of whether or not the wireless terminal supports selective handover procedures. 37. The method of claim 35, wherein the message further comprises at least one Physical Cell Identifier, PCI, identifying a cell in which at least one bearer of the identified sub-set of bearers will be handed over to, the method further comprising maintaining a list of PCIs for each anchor and assisting link. 38. The method of claim 35, wherein the sub-set of bearers is an empty sub-set of bearers. 39. The method of claim 35, further comprising sending, to the target base station, a random access synchronization request. 40. The method of claim 39, further comprising receiving, from the target base station, a random access response comprising an uplink grant and/or a timing advance command. 41. The method of claim 35, further comprising receiving, from the source or a target base station, a plurality of configuration instructions for performing measurements, wherein each configuration instruction corresponds to at least a respective sub-set of cells monitored by the wireless terminal. 42. The method of claim 41, wherein the plurality of configuration instructions comprises an identity at least one serving cell associated with at least one respective configuration instruction. 43. The method of claim 41, wherein at least one configuration instruction comprises a triggering event, said triggering event indicating when a measurement associated with the at least one configuration instruction is to begin. 44. A wireless terminal for a handover of a sub-set of bearers associated with the wireless terminal, said sub-set of bearers being less than all bearers associated with the wireless terminal, the wireless terminal comprising: radio circuitry configured to receive, from a source or a target base station, a message, said message indicating that a handover procedure will take place for an identified sub-set of bearers; and processing circuitry configured to hand over the identified sub-set of bearers to the target base station, wherein at least one bearer associated with the wireless terminal, which is not part of the identified sub-set of bearers, remains connected to the source base station. 45. The wireless terminal of claim 44, wherein the radio circuitry is further configured to send, to the source base station or the target base station, a capability parameter, said capability parameter providing an indication of whether or not the wireless terminal supports selective handover procedures. 46. The wireless terminal of claim 44, wherein the notification further comprises at least one Physical Cell Identifier, PCI, identifying a cell in which at least one bearer of the identified sub-set of bearers will be handed over to, wherein the processing circuitry is further configured to maintain a list of PCIs for each anchor and assisting link. 47. The wireless terminal of claim 44, wherein the sub-set of bearers is an empty sub-set of bearers. 48. The wireless terminal of claim 44, wherein the radio circuitry is further configured to send, to the target base station, a random access synchronization request. 49. The wireless terminal of claim 48, wherein the radio circuitry is further configured to receive, from the target base station, a random access response comprising an uplink grant and/or timing advance command. 50. The wireless terminal of claim 44, wherein the radio circuitry is further configured to receive, from the source or the target base station, a plurality of configuration instructions for performing measurements, wherein each configuration instruction corresponds to at least a respective sub-set of cells monitored by the wireless terminal. 51. The wireless terminal of claim 50, wherein the plurality of configuration instructions comprises an identification of at least one serving cell associated with at least one respective configuration instruction. 52. The wireless terminal of claim 50, wherein at least one configuration instruction comprises a triggering event, said triggering event indicating when a measurement associated with a respective configuration instruction is to begin. 53. A method, in a base station, for providing a handover of at least a sub-set of bearers associated with a wireless terminal, said sub-set of bearers being less than all bearers associated with the wireless terminal, the method comprising: determining a need for a handover procedure; selecting the sub-set of bearers associated with the wireless terminal for the handover procedure; and sending, to the wireless terminal, a message indicating a handover procedure for the sub-set of bearers. 54. The method of claim 53, wherein the sub-set of bearers is an empty set of bearers. 55. The method of claim 53, further comprising receiving, from the wireless terminal, a capability parameter, said capability parameter providing an indication of whether or not the wireless terminal supports selective handover procedures. 56. The method of claim 53, wherein the base station is a source or target base station and the message for the handover procedure is sent on behalf of the target base station. 57. The method of claim 53, further comprising: receiving, from the wireless terminal, a random access synchronization request; and sending, to the wireless terminal, an uplink grant and/or a timing advance command. 58. The method of claim 53, further comprising sending, to the wireless terminal, a plurality of configuration instructions for performing measurements, wherein each configuration instruction corresponds to at least a respective sub-set of cells monitored by the wireless terminal. 59. The method of claim 58, wherein the plurality of configuration instructions comprises an identification of at least one serving cell associated with at least one respective configuration instruction. 60. The method of claim 58, wherein at least one configuration instruction comprises a triggering event, said triggering event indicating when a measurement associated with a respective configuration instruction is to begin. 61. A base station, for providing a handover of at least a sub-set of bearers associated with a wireless terminal, said sub-set of bearers being less than all bearers associated with the wireless terminal, the base station comprising: processing circuitry configured to determine a need for a handover procedure; the processing circuitry further configured to select the sub-set of bearers associated with the wireless terminal for the handover procedure; and radio circuitry configured to send, to the wireless terminal, a message indicating a handover procedure for the sub-set of bearers. 62. The base station of claim 61, wherein the sub-set of bearers is an empty set of bearers. 63. The base station of claim 61, wherein the radio circuitry is further configured to receive, from the wireless terminal, a capability parameter, said capability parameter providing an indication of whether or not the wireless terminal supports selective handover procedures. 64. The base station of claim 61, wherein the base station is a source or target base station and the message for the handover procedure is sent on behalf of the target base station. 65. The base station of claim 61, wherein the radio circuitry is further configured to receive, from the wireless terminal, a random access synchronization request; and the radio circuitry is also configured to send, to the wireless terminal, an uplink grant and/or a timing advance command. 66. The base station of claim 61, wherein the radio circuitry is further configured to send, to the wireless terminal, a plurality of configuration instructions for performing measurements, wherein each configuration instruction corresponds to at least a respective sub-set of cells monitored by the wireless terminal. 67. The base station of claim 66, wherein the plurality of configuration instructions comprises an identification of at least one serving cell associated with at least one respective configuration instruction. 68. The base station of claim 66, wherein at least one configuration instruction comprises a triggering event, said triggering event indicating when a measurement associated with a respective configuration instruction is to begin.
Example embodiments presented herein are directed towards a wireless terminal and base station, and corresponding methods therein, for providing a handover for a subset of bearers associated with the wireless terminal. The subset of bearers is less than a total number of bearers associated with the wireless terminal. Thus, upon the completion of the handover procedure, at least one bearer will stay connected with a source base station.1-34. (canceled) 35. A method, in a wireless terminal, for a handover of a sub-set of bearers associated with the wireless terminal, said sub-set of bearers being less than all bearers associated with the wireless terminal, the method comprising: receiving, from a source or a target base station, a message, said message indicating that a handover procedure will take place for an identified sub-set of bearers; and handing over the identified sub-set of bearers to the target base station, wherein at least one bearer associated with the wireless terminal, which is not part of the identified sub-set of bearers, remains connected to the source base station. 36. The method of claim 35, further comprising sending, to the source base station or the target base station, a capability parameter, said capability parameter providing an indication of whether or not the wireless terminal supports selective handover procedures. 37. The method of claim 35, wherein the message further comprises at least one Physical Cell Identifier, PCI, identifying a cell in which at least one bearer of the identified sub-set of bearers will be handed over to, the method further comprising maintaining a list of PCIs for each anchor and assisting link. 38. The method of claim 35, wherein the sub-set of bearers is an empty sub-set of bearers. 39. The method of claim 35, further comprising sending, to the target base station, a random access synchronization request. 40. The method of claim 39, further comprising receiving, from the target base station, a random access response comprising an uplink grant and/or a timing advance command. 41. The method of claim 35, further comprising receiving, from the source or a target base station, a plurality of configuration instructions for performing measurements, wherein each configuration instruction corresponds to at least a respective sub-set of cells monitored by the wireless terminal. 42. The method of claim 41, wherein the plurality of configuration instructions comprises an identity at least one serving cell associated with at least one respective configuration instruction. 43. The method of claim 41, wherein at least one configuration instruction comprises a triggering event, said triggering event indicating when a measurement associated with the at least one configuration instruction is to begin. 44. A wireless terminal for a handover of a sub-set of bearers associated with the wireless terminal, said sub-set of bearers being less than all bearers associated with the wireless terminal, the wireless terminal comprising: radio circuitry configured to receive, from a source or a target base station, a message, said message indicating that a handover procedure will take place for an identified sub-set of bearers; and processing circuitry configured to hand over the identified sub-set of bearers to the target base station, wherein at least one bearer associated with the wireless terminal, which is not part of the identified sub-set of bearers, remains connected to the source base station. 45. The wireless terminal of claim 44, wherein the radio circuitry is further configured to send, to the source base station or the target base station, a capability parameter, said capability parameter providing an indication of whether or not the wireless terminal supports selective handover procedures. 46. The wireless terminal of claim 44, wherein the notification further comprises at least one Physical Cell Identifier, PCI, identifying a cell in which at least one bearer of the identified sub-set of bearers will be handed over to, wherein the processing circuitry is further configured to maintain a list of PCIs for each anchor and assisting link. 47. The wireless terminal of claim 44, wherein the sub-set of bearers is an empty sub-set of bearers. 48. The wireless terminal of claim 44, wherein the radio circuitry is further configured to send, to the target base station, a random access synchronization request. 49. The wireless terminal of claim 48, wherein the radio circuitry is further configured to receive, from the target base station, a random access response comprising an uplink grant and/or timing advance command. 50. The wireless terminal of claim 44, wherein the radio circuitry is further configured to receive, from the source or the target base station, a plurality of configuration instructions for performing measurements, wherein each configuration instruction corresponds to at least a respective sub-set of cells monitored by the wireless terminal. 51. The wireless terminal of claim 50, wherein the plurality of configuration instructions comprises an identification of at least one serving cell associated with at least one respective configuration instruction. 52. The wireless terminal of claim 50, wherein at least one configuration instruction comprises a triggering event, said triggering event indicating when a measurement associated with a respective configuration instruction is to begin. 53. A method, in a base station, for providing a handover of at least a sub-set of bearers associated with a wireless terminal, said sub-set of bearers being less than all bearers associated with the wireless terminal, the method comprising: determining a need for a handover procedure; selecting the sub-set of bearers associated with the wireless terminal for the handover procedure; and sending, to the wireless terminal, a message indicating a handover procedure for the sub-set of bearers. 54. The method of claim 53, wherein the sub-set of bearers is an empty set of bearers. 55. The method of claim 53, further comprising receiving, from the wireless terminal, a capability parameter, said capability parameter providing an indication of whether or not the wireless terminal supports selective handover procedures. 56. The method of claim 53, wherein the base station is a source or target base station and the message for the handover procedure is sent on behalf of the target base station. 57. The method of claim 53, further comprising: receiving, from the wireless terminal, a random access synchronization request; and sending, to the wireless terminal, an uplink grant and/or a timing advance command. 58. The method of claim 53, further comprising sending, to the wireless terminal, a plurality of configuration instructions for performing measurements, wherein each configuration instruction corresponds to at least a respective sub-set of cells monitored by the wireless terminal. 59. The method of claim 58, wherein the plurality of configuration instructions comprises an identification of at least one serving cell associated with at least one respective configuration instruction. 60. The method of claim 58, wherein at least one configuration instruction comprises a triggering event, said triggering event indicating when a measurement associated with a respective configuration instruction is to begin. 61. A base station, for providing a handover of at least a sub-set of bearers associated with a wireless terminal, said sub-set of bearers being less than all bearers associated with the wireless terminal, the base station comprising: processing circuitry configured to determine a need for a handover procedure; the processing circuitry further configured to select the sub-set of bearers associated with the wireless terminal for the handover procedure; and radio circuitry configured to send, to the wireless terminal, a message indicating a handover procedure for the sub-set of bearers. 62. The base station of claim 61, wherein the sub-set of bearers is an empty set of bearers. 63. The base station of claim 61, wherein the radio circuitry is further configured to receive, from the wireless terminal, a capability parameter, said capability parameter providing an indication of whether or not the wireless terminal supports selective handover procedures. 64. The base station of claim 61, wherein the base station is a source or target base station and the message for the handover procedure is sent on behalf of the target base station. 65. The base station of claim 61, wherein the radio circuitry is further configured to receive, from the wireless terminal, a random access synchronization request; and the radio circuitry is also configured to send, to the wireless terminal, an uplink grant and/or a timing advance command. 66. The base station of claim 61, wherein the radio circuitry is further configured to send, to the wireless terminal, a plurality of configuration instructions for performing measurements, wherein each configuration instruction corresponds to at least a respective sub-set of cells monitored by the wireless terminal. 67. The base station of claim 66, wherein the plurality of configuration instructions comprises an identification of at least one serving cell associated with at least one respective configuration instruction. 68. The base station of claim 66, wherein at least one configuration instruction comprises a triggering event, said triggering event indicating when a measurement associated with a respective configuration instruction is to begin.
2,400
8,041
8,041
15,152,151
2,484
A method and apparatus for digital image correlation. A camera system is used to obtain larger scale images of a larger scale dot pattern on a surface of a workpiece and smaller scale images of a smaller scale dot pattern on the surface of the same workpiece. The smaller scale dot pattern forms a larger dot in the larger scale dot pattern in the larger scale images. The larger scale images and the smaller scale images may be used to determine a measurement of the workpiece.
1-20. (canceled) 21. A method for applying a multiple-scale dot pattern on a workpiece, comprising: applying a plurality of dots of a first size on a surface of the workpiece to form a first scale dot pattern, wherein the plurality of dots together, at a first field of view greater than a second field of view at which individual ones of plurality of dots can be measured, form a first dot of a second size larger than any of the plurality of dots of the first size; and applying a second plurality of dots of the first size on the surface of the workpiece to form second scale dot pattern of about a same scale as the first scale dot pattern, wherein the second plurality of dots together, at the first field of view, form a second dot of the second size; wherein applying the second plurality of dots is performed such that the first dot and the second dot together form a third scale dot pattern that is larger than both the first scale dot pattern and the second scale dot pattern. 22. The method of claim 21 further comprising: placing a template comprising a plurality of apertures on the surface; applying the first plurality of dots and the second plurality of dots in an area on the surface defined by apertures in the plurality of apertures; and applying additional dots of the second size on the surface in areas defined by the apertures, each of the plurality of additional dots comprising another plurality of dots of the first size. 23. The method of claim 22, wherein applying dots of the first size comprises airbrush spraying in the number of selected apertures. 24. The method of claim 21, wherein applying dots of the first size comprises printing the smaller scale dot pattern on the surface. 25. The method of claim 21 further comprising: obtaining, by a camera system, a first set of images of the third scale dot pattern at a first field of view; obtaining, by the camera system, second set of images of the first scale dot pattern at a second field of view smaller than the first field of view; and using both the first set of images and the second set of images to determine a measurement of the workpiece. 26. The method of claim 25, wherein the first images and the second images are obtained at a same time by the camera system. 27. The method of claim 25, wherein the measurement is selected from a measurement of a displacement of the workpiece and a measurement of a strain on the workpiece. 28. The method of claim 25 wherein: the camera system comprises a first set of cameras configured to obtain the first scale images; and the camera system comprises a second set of cameras configured to obtain the second scale images. 29. The method of claim 25, wherein: the camera system comprises a single set of cameras configured to obtain the first scale images; and further comprising changing a configuration of the single set of cameras to obtain the second scale images. 30. The method of claim 21, wherein the third scale dot pattern comprises smaller dots within larger dots. 31. A workpiece having a multiple-scale dot pattern on a workpiece, comprising: a plurality of dots of a first size applied on a surface of the workpiece to form a first scale dot pattern, wherein the plurality of dots together, at a first field of view greater than a second field of view at which individual ones of plurality of dots can be measured, form a first dot of a second size larger than any of the plurality of dots of the first size; and a second plurality of dots of the first size applied on the surface of the workpiece to form second scale dot pattern of about a same scale as the first scale dot pattern, wherein the second plurality of dots together, at the first field of view, form a second dot of the second size; wherein the first dot and the second dot together form a third scale dot pattern that is larger than both the first scale dot pattern and the second scale dot pattern. 32. The workpiece of claim 31 further comprising: additional dots of the second size applied on the surface, each of the additional dots comprising another plurality of dots of the first size. 33. The workpiece of claim 32, wherein the dots of the first size comprises airbrushed dots. 34. The workpiece of claim 31, wherein the dots of the first size comprises printed dots. 35. A device for measuring a workpiece having a multiple-scale dot pattern on the workpiece, comprising: a plurality of dots of a first size applied on a surface of the workpiece to form a first scale dot pattern, wherein the plurality of dots together, at a first field of view greater than a second field of view at which individual ones of plurality of dots can be measured, form a first dot of a second size larger than any of the plurality of dots of the first size; a second plurality of dots of the first size applied on the surface of the workpiece to form second scale dot pattern of about a same scale as the first scale dot pattern, wherein the second plurality of dots together, at the first field of view, form a second dot of the second size, wherein the first dot and the second dot together form a third scale dot pattern that is larger than both the first scale dot pattern and the second scale dot pattern; a camera system configured to take a first set of images of the third scale dot pattern at a first field of view and to take a second set of images of the first scale dot pattern at a second field of view smaller than the first field of view; and a processor configured to use both the first set of images and the second set of images to determine a measurement of the workpiece. 36. The device of claim 35, wherein camera system is configured to take the first images and the second images are obtained at a same time. 37. The device of claim 35, wherein the measurement is selected from a measurement of a displacement of the workpiece and a measurement of a strain on the workpiece. 38. The device of claim 35 wherein: the camera system comprises a first set of cameras configured to obtain the first scale images; and the camera system comprises a second set of cameras configured to obtain the second scale images. 39. The device of claim 35, wherein: the camera system comprises a single set of cameras configured to obtain the first scale images; and further comprising changing a configuration of the single set of cameras to obtain the second scale images. 40. The device of claim 35, wherein the third scale dot pattern comprises smaller dots within larger dots.
A method and apparatus for digital image correlation. A camera system is used to obtain larger scale images of a larger scale dot pattern on a surface of a workpiece and smaller scale images of a smaller scale dot pattern on the surface of the same workpiece. The smaller scale dot pattern forms a larger dot in the larger scale dot pattern in the larger scale images. The larger scale images and the smaller scale images may be used to determine a measurement of the workpiece.1-20. (canceled) 21. A method for applying a multiple-scale dot pattern on a workpiece, comprising: applying a plurality of dots of a first size on a surface of the workpiece to form a first scale dot pattern, wherein the plurality of dots together, at a first field of view greater than a second field of view at which individual ones of plurality of dots can be measured, form a first dot of a second size larger than any of the plurality of dots of the first size; and applying a second plurality of dots of the first size on the surface of the workpiece to form second scale dot pattern of about a same scale as the first scale dot pattern, wherein the second plurality of dots together, at the first field of view, form a second dot of the second size; wherein applying the second plurality of dots is performed such that the first dot and the second dot together form a third scale dot pattern that is larger than both the first scale dot pattern and the second scale dot pattern. 22. The method of claim 21 further comprising: placing a template comprising a plurality of apertures on the surface; applying the first plurality of dots and the second plurality of dots in an area on the surface defined by apertures in the plurality of apertures; and applying additional dots of the second size on the surface in areas defined by the apertures, each of the plurality of additional dots comprising another plurality of dots of the first size. 23. The method of claim 22, wherein applying dots of the first size comprises airbrush spraying in the number of selected apertures. 24. The method of claim 21, wherein applying dots of the first size comprises printing the smaller scale dot pattern on the surface. 25. The method of claim 21 further comprising: obtaining, by a camera system, a first set of images of the third scale dot pattern at a first field of view; obtaining, by the camera system, second set of images of the first scale dot pattern at a second field of view smaller than the first field of view; and using both the first set of images and the second set of images to determine a measurement of the workpiece. 26. The method of claim 25, wherein the first images and the second images are obtained at a same time by the camera system. 27. The method of claim 25, wherein the measurement is selected from a measurement of a displacement of the workpiece and a measurement of a strain on the workpiece. 28. The method of claim 25 wherein: the camera system comprises a first set of cameras configured to obtain the first scale images; and the camera system comprises a second set of cameras configured to obtain the second scale images. 29. The method of claim 25, wherein: the camera system comprises a single set of cameras configured to obtain the first scale images; and further comprising changing a configuration of the single set of cameras to obtain the second scale images. 30. The method of claim 21, wherein the third scale dot pattern comprises smaller dots within larger dots. 31. A workpiece having a multiple-scale dot pattern on a workpiece, comprising: a plurality of dots of a first size applied on a surface of the workpiece to form a first scale dot pattern, wherein the plurality of dots together, at a first field of view greater than a second field of view at which individual ones of plurality of dots can be measured, form a first dot of a second size larger than any of the plurality of dots of the first size; and a second plurality of dots of the first size applied on the surface of the workpiece to form second scale dot pattern of about a same scale as the first scale dot pattern, wherein the second plurality of dots together, at the first field of view, form a second dot of the second size; wherein the first dot and the second dot together form a third scale dot pattern that is larger than both the first scale dot pattern and the second scale dot pattern. 32. The workpiece of claim 31 further comprising: additional dots of the second size applied on the surface, each of the additional dots comprising another plurality of dots of the first size. 33. The workpiece of claim 32, wherein the dots of the first size comprises airbrushed dots. 34. The workpiece of claim 31, wherein the dots of the first size comprises printed dots. 35. A device for measuring a workpiece having a multiple-scale dot pattern on the workpiece, comprising: a plurality of dots of a first size applied on a surface of the workpiece to form a first scale dot pattern, wherein the plurality of dots together, at a first field of view greater than a second field of view at which individual ones of plurality of dots can be measured, form a first dot of a second size larger than any of the plurality of dots of the first size; a second plurality of dots of the first size applied on the surface of the workpiece to form second scale dot pattern of about a same scale as the first scale dot pattern, wherein the second plurality of dots together, at the first field of view, form a second dot of the second size, wherein the first dot and the second dot together form a third scale dot pattern that is larger than both the first scale dot pattern and the second scale dot pattern; a camera system configured to take a first set of images of the third scale dot pattern at a first field of view and to take a second set of images of the first scale dot pattern at a second field of view smaller than the first field of view; and a processor configured to use both the first set of images and the second set of images to determine a measurement of the workpiece. 36. The device of claim 35, wherein camera system is configured to take the first images and the second images are obtained at a same time. 37. The device of claim 35, wherein the measurement is selected from a measurement of a displacement of the workpiece and a measurement of a strain on the workpiece. 38. The device of claim 35 wherein: the camera system comprises a first set of cameras configured to obtain the first scale images; and the camera system comprises a second set of cameras configured to obtain the second scale images. 39. The device of claim 35, wherein: the camera system comprises a single set of cameras configured to obtain the first scale images; and further comprising changing a configuration of the single set of cameras to obtain the second scale images. 40. The device of claim 35, wherein the third scale dot pattern comprises smaller dots within larger dots.
2,400
8,042
8,042
14,586,622
2,459
Handling of multiple connections during NAT traversal for a node behind a symmetric NAT is disclosed. The likelihood of connection failure during symmetric NAT traversal may be reduced by serializing critical time windows after port prediction. Once a connection request has been sent for a first connection, port prediction for a subsequent connection may be delayed until a connectivity check has begun for the first connection. This process may be repeated to handle NAT traversal for multiple simultaneous connections to different nodes.
1. A method for peer-to-peer connection over a network between a first node behind a first symmetric network address translator (NAT) and two or more other nodes, the method comprising: a) performing a check of connectivity between the first node and a second node using one or more predicted transport addresses; and b) delaying port prediction for communication between the first node and a third node until after the check of connectivity between the first node and the second node has begun. 2. The method of claim 1, further comprising: c) after b), performing the port prediction for communication between the first node and a third node, wherein the first node constructs a list of predicted transport addresses on the first symmetric NAT; d) sending a connection request message containing the list of predicted transport addresses from the first node to a third node; e) performing a check of connectivity between the first node and the third node using the predicted transport addresses. 3. The method of claim 2, further comprising: f) delaying port prediction for communication between the first node and a fourth node until after the check of connectivity between the first node and the third node. 4. The method of claim 1 wherein performing the check of connectivity includes sending Session Traversal Utility for NAT (STUN) packets from the second node to one or more of the one or more predicted transport addresses. 5. The method of claim 4 wherein performing the check of connectivity further includes sending a STUN packet response from the first node to the second node, wherein the STUN packet response includes a transport address of an external port on the first symmetric NAT through which one of the STUN packets sent from the second node reached the first node. 6. The method of claim 1, further comprising: waiting for a period of time Tw before a) in response to a message from the second node indicating that the second node is queued for connection to another node; canceling initiation of a communication session between the first node and the second node, wherein the amount of time Tw is greater than or equal to zero and less than a timeout for connectivity failure between the first and second nodes. 7. The method of claim 1, wherein performing the check of connectivity between the first node and the second node includes sending one or more test packets from the first node to the second node using a transport address of the one or more predicted transport addresses. 8. The method of claim 7 wherein delaying port prediction for communication between the first node and the third node includes delaying port prediction for communication between the first node and the third node until after a first of the one or more test packets has been sent. 9. A node, comprising: a processor; a memory; a network interface; and instructions embodied in the memory and configured for execution on the processor, the instructions comprising: a set of instructions that, when executed, cause the node to: i) perform a check of connectivity between the first node and a second node using one or more predicted transport addresses; and ii) delaying port prediction for communication between the first node and a third node until after the check of connectivity between the first node and the second node has begun. 10. The node of claim 9, wherein the instructions further comprise a set of instructions that, when executed, cause the node to: iii) after ii), perform the port prediction for communication between the first node and a third node, wherein the first node constructs a list of predicted transport addresses on the first symmetric NAT; iv) send a connection request message containing the list of predicted transport addresses from the first node to a third node; and v) performing a check of connectivity between the first node and the third node using the predicted transport addresses. 11. The node of claim 10, wherein the instructions further comprise a set of instructions that, when executed, cause the node to: vi) delaying port prediction for communication between the first node and a fourth node until after the check of connectivity between the first node and the third node. 12. The node of claim 9, wherein performing the check of connectivity includes sending Session Traversal Utility for NAT (STUN) packets from the second node to one or more of the one or more predicted transport addresses. 13. The node of claim 12, wherein performing the check of connectivity further includes sending a STUN packet response from the first node to the second node, wherein the STUN packet response includes a transport address of an external port on the first symmetric NAT through which one of the STUN packets sent from the second node reached the first node. 14. The node of claim 9, wherein the instructions further comprise a set of instructions that, when executed, cause the node to: wait for a period of time Tw before a) in response to a message from the second node indicating that the second node is queued for connection to another node; canceling initiation of a communication session between the first node and the second node, wherein the amount of time Tw is greater than or equal to zero and less than a timeout for connectivity failure between the first and second nodes. 15. The node of claim 9, wherein performing the check of connectivity between the first node and the second node includes sending one or more test packets from the first node to the second node using a transport address of the one or more predicted transport addresses. 16. The node of claim 15 wherein delaying port prediction for communication between the first node and the third node includes delaying port prediction for communication between the first node and the third node until after a first of the one or more test packets has been sent. 17. A non-transitory computer readable medium having instructions therein configured to implement a method for peer-to-peer connection over a network between a first node behind a first symmetric network address translator (NAT) and two or more other nodes upon execution, the method comprising: a) performing a check of connectivity between the first node and a second node using one or more predicted transport addresses; and b) delaying port prediction for communication between the first node and a third node until after the check of connectivity between the first node and the second node has begun. 18. The non-transitory computer readable medium of claim 17, wherein performing the check of connectivity includes sending Session Traversal Utility for NAT (STUN) packets from the second node to one or more transport addresses in the list of predicted transport addresses in the connection request message. 19. The non-transitory computer readable medium of claim 18 wherein performing the check of connectivity further includes sending a STUN packet response from the first node to the second node, wherein the STUN packet response includes a transport address of an external port on the first symmetric NAT through which one of the STUN packets sent from the second node reached the first node. 20. The non-transitory computer readable medium of claim 17, wherein performing the check of connectivity between the first node and the second node includes sending one or more test packets from the first node to the second node one ore more of the one or more predicted transport addresses.
Handling of multiple connections during NAT traversal for a node behind a symmetric NAT is disclosed. The likelihood of connection failure during symmetric NAT traversal may be reduced by serializing critical time windows after port prediction. Once a connection request has been sent for a first connection, port prediction for a subsequent connection may be delayed until a connectivity check has begun for the first connection. This process may be repeated to handle NAT traversal for multiple simultaneous connections to different nodes.1. A method for peer-to-peer connection over a network between a first node behind a first symmetric network address translator (NAT) and two or more other nodes, the method comprising: a) performing a check of connectivity between the first node and a second node using one or more predicted transport addresses; and b) delaying port prediction for communication between the first node and a third node until after the check of connectivity between the first node and the second node has begun. 2. The method of claim 1, further comprising: c) after b), performing the port prediction for communication between the first node and a third node, wherein the first node constructs a list of predicted transport addresses on the first symmetric NAT; d) sending a connection request message containing the list of predicted transport addresses from the first node to a third node; e) performing a check of connectivity between the first node and the third node using the predicted transport addresses. 3. The method of claim 2, further comprising: f) delaying port prediction for communication between the first node and a fourth node until after the check of connectivity between the first node and the third node. 4. The method of claim 1 wherein performing the check of connectivity includes sending Session Traversal Utility for NAT (STUN) packets from the second node to one or more of the one or more predicted transport addresses. 5. The method of claim 4 wherein performing the check of connectivity further includes sending a STUN packet response from the first node to the second node, wherein the STUN packet response includes a transport address of an external port on the first symmetric NAT through which one of the STUN packets sent from the second node reached the first node. 6. The method of claim 1, further comprising: waiting for a period of time Tw before a) in response to a message from the second node indicating that the second node is queued for connection to another node; canceling initiation of a communication session between the first node and the second node, wherein the amount of time Tw is greater than or equal to zero and less than a timeout for connectivity failure between the first and second nodes. 7. The method of claim 1, wherein performing the check of connectivity between the first node and the second node includes sending one or more test packets from the first node to the second node using a transport address of the one or more predicted transport addresses. 8. The method of claim 7 wherein delaying port prediction for communication between the first node and the third node includes delaying port prediction for communication between the first node and the third node until after a first of the one or more test packets has been sent. 9. A node, comprising: a processor; a memory; a network interface; and instructions embodied in the memory and configured for execution on the processor, the instructions comprising: a set of instructions that, when executed, cause the node to: i) perform a check of connectivity between the first node and a second node using one or more predicted transport addresses; and ii) delaying port prediction for communication between the first node and a third node until after the check of connectivity between the first node and the second node has begun. 10. The node of claim 9, wherein the instructions further comprise a set of instructions that, when executed, cause the node to: iii) after ii), perform the port prediction for communication between the first node and a third node, wherein the first node constructs a list of predicted transport addresses on the first symmetric NAT; iv) send a connection request message containing the list of predicted transport addresses from the first node to a third node; and v) performing a check of connectivity between the first node and the third node using the predicted transport addresses. 11. The node of claim 10, wherein the instructions further comprise a set of instructions that, when executed, cause the node to: vi) delaying port prediction for communication between the first node and a fourth node until after the check of connectivity between the first node and the third node. 12. The node of claim 9, wherein performing the check of connectivity includes sending Session Traversal Utility for NAT (STUN) packets from the second node to one or more of the one or more predicted transport addresses. 13. The node of claim 12, wherein performing the check of connectivity further includes sending a STUN packet response from the first node to the second node, wherein the STUN packet response includes a transport address of an external port on the first symmetric NAT through which one of the STUN packets sent from the second node reached the first node. 14. The node of claim 9, wherein the instructions further comprise a set of instructions that, when executed, cause the node to: wait for a period of time Tw before a) in response to a message from the second node indicating that the second node is queued for connection to another node; canceling initiation of a communication session between the first node and the second node, wherein the amount of time Tw is greater than or equal to zero and less than a timeout for connectivity failure between the first and second nodes. 15. The node of claim 9, wherein performing the check of connectivity between the first node and the second node includes sending one or more test packets from the first node to the second node using a transport address of the one or more predicted transport addresses. 16. The node of claim 15 wherein delaying port prediction for communication between the first node and the third node includes delaying port prediction for communication between the first node and the third node until after a first of the one or more test packets has been sent. 17. A non-transitory computer readable medium having instructions therein configured to implement a method for peer-to-peer connection over a network between a first node behind a first symmetric network address translator (NAT) and two or more other nodes upon execution, the method comprising: a) performing a check of connectivity between the first node and a second node using one or more predicted transport addresses; and b) delaying port prediction for communication between the first node and a third node until after the check of connectivity between the first node and the second node has begun. 18. The non-transitory computer readable medium of claim 17, wherein performing the check of connectivity includes sending Session Traversal Utility for NAT (STUN) packets from the second node to one or more transport addresses in the list of predicted transport addresses in the connection request message. 19. The non-transitory computer readable medium of claim 18 wherein performing the check of connectivity further includes sending a STUN packet response from the first node to the second node, wherein the STUN packet response includes a transport address of an external port on the first symmetric NAT through which one of the STUN packets sent from the second node reached the first node. 20. The non-transitory computer readable medium of claim 17, wherein performing the check of connectivity between the first node and the second node includes sending one or more test packets from the first node to the second node one ore more of the one or more predicted transport addresses.
2,400
8,043
8,043
14,567,985
2,473
Aspects of the present disclosure provide for the pairing of an inter-band carrier with a time division duplex (TDD) carrier. If the paired band is a frequency division duplex (FDD) band, then base stations and mobile devices may transmit and receive additional thin control channels on FDD carriers to enable full duplex operations. If the paired band is a TDD band, then a conjugate or inverse carrier may be used such that full duplex, or a close approximation thereto, is achieved. With the introduction of a paired channel and fast control channels, rapid uplink/downlink switching may be achieved for TDD carriers efficiently and effectively. Other aspects, embodiments, and features are also claimed and described.
1. A method of wireless communication operable at a scheduling entity, comprising: wirelessly communicating utilizing a first transmission time interval (TTI) over a first carrier, the first carrier being a time division duplex (TDD) carrier; and wirelessly communicating utilizing a second TTI different from the first TTI and at least partially overlapping the first TTI, over a second carrier paired with the first carrier but separated from the first carrier in frequency. 2. The method of claim 1, wherein the second TTI is shorter in duration than the first TTI. 3. The method of claim 1, wherein the second carrier comprises at least one control channel for controlling data transmissions on the first carrier. 4. The method of claim 3, wherein the second carrier is a frequency division duplex (FDD) carrier. 5. The method of claim 4, further comprising: receiving a scheduling request from a first subordinate entity on a feedback channel on the FDD carrier; transmitting an uplink grant to the first subordinate entity on the FDD carrier in response to the scheduling request, the uplink grant configured to identify granted resources on the TDD carrier for an uplink transmission by the first subordinate entity utilizing the second TTI; transmitting a grant modification on the FDD carrier, the grant modification configured to modify an existing grant of resources for at least one subordinate entity for an uplink data transmission utilizing the first TTI in accordance with the uplink grant to the first subordinate entity; and receiving the uplink transmission from the first subordinate entity utilizing the second TTI in accordance with the uplink grant. 6. The method of claim 4, further comprising: transmitting a downlink grant to a first subordinate entity on a grant channel on the FDD carrier utilizing the second TTI; and transmitting downlink data corresponding to the downlink grant to the first subordinate entity on the TDD carrier utilizing the second TTI. 7. The method of claim 6, wherein the transmitting of the downlink grant and the transmitting of the downlink data corresponding to the downlink grant are simultaneous to one another. 8. The method of claim 6, further comprising: suspending a reception of uplink data on the TDD carrier utilizing the first TTI while transmitting the downlink data corresponding to the downlink grant utilizing the second TTI; and resuming the reception of the uplink data on the TDD carrier utilizing the first TTI after completion of the transmitting downlink data corresponding to the downlink grant utilizing the second TTI. 9. The method of claim 8, wherein the resuming the reception of the uplink data on the TDD carrier utilizing the first TTI is delayed by a guard time after the completion of the transmitting downlink data corresponding to the downlink grant utilizing the second TTI. 10. The method of claim 4, further comprising: receiving a scheduling request from a first subordinate entity on a feedback channel on the FDD carrier; transmitting an uplink grant to the first subordinate entity in response to the scheduling request, the uplink grant configured to identify granted resources on the TDD carrier for an uplink data transmission by the first subordinate entity utilizing the second TTI; transmitting a grant modification on the FDD carrier, the grant modification configured to modify an existing grant of resources for at least one subordinate entity for a downlink data transmission utilizing the first TTI in accordance with the uplink grant to the first subordinate entity; and receiving the uplink data from the first subordinate entity utilizing the second TTI in accordance with the uplink grant. 11. The method of claim 10, wherein transmitting the grant modification on the FDD carrier and transmitting the downlink data to the first subordinate entity are simultaneous to one another. 12. The method of claim 10, further comprising: suspending a transmission of downlink data on the TDD carrier utilizing the first TTI while receiving the uplink data corresponding to the uplink grant utilizing the second TTI; and resuming the transmission of the downlink data on the TDD carrier utilizing the first TTI after completion of the receiving uplink data corresponding to the uplink grant utilizing the second TTI. 13. The method of claim 12, wherein the suspending the transmission of the downlink data on the TDD carrier utilizing the first TTI begins at a guard time duration prior to a start of the receiving the uplink data corresponding to the uplink grant utilizing the second TTI. 14. The method of claim 1, wherein the second carrier is a TDD carrier having a conjugate pairing with the first carrier, wherein at least a portion of time slots in the first carrier are complementary in direction to a direction of time-aligned time slots in the second carrier. 15. The method of claim 14, further comprising: receiving a scheduling request from a first subordinate entity on a feedback channel on the first carrier; transmitting an uplink grant to the first subordinate entity on the second carrier in response to the scheduling request, the uplink grant configured to identify granted resources on the first carrier for an uplink transmission by the first subordinate entity utilizing the second TTI; transmitting a grant modification on the second carrier, the grant modification configured to modify an existing grant of resources for at least one subordinate entity for an uplink data transmission utilizing the first TTI in accordance with the uplink grant to the first subordinate entity; and receiving the uplink transmission from the first subordinate entity utilizing the second TTI in accordance with the uplink grant. 16. The method of claim 14, further comprising: transmitting a downlink grant to a first subordinate entity on a grant channel on the second carrier utilizing the second TTI; and transmitting downlink data corresponding to the downlink grant, to the first subordinate entity on the first carrier utilizing the second TTI. 17. The method of claim 16, wherein the transmitting of the downlink grant and the transmitting of the downlink data corresponding to the downlink grant are simultaneous to one another. 18. The method of claim 16, further comprising: suspending a transmission of downlink data on the first carrier utilizing the first TTI while transmitting the downlink data corresponding to the downlink grant utilizing the second TTI; and resuming the transmission of the downlink data on the first carrier utilizing the first TTI after completion of the transmitting downlink data corresponding to the downlink grant utilizing the second TTI. 19. The method of claim 18, wherein the resuming the transmission of the downlink data on the first carrier utilizing the first TTI is delayed by a guard time after the completion of the transmitting downlink data corresponding to the downlink grant utilizing the second TTI. 20. The method of claim 14, further comprising: receiving a scheduling request from a first subordinate entity on a feedback channel on the second carrier; transmitting an uplink grant to the first subordinate entity in response to the scheduling request, the uplink grant configured to identify granted resources on the first carrier for an uplink data transmission by the first subordinate entity utilizing the second TTI; transmitting a grant modification on the first carrier, the grant modification configured to modify an existing grant of resources for at least one subordinate entity for a downlink data transmission utilizing the first TTI in accordance with the uplink grant to the first subordinate entity; and receiving the uplink data from the first subordinate entity utilizing the second TTI in accordance with the uplink grant. 21. The method of claim 20, wherein transmitting the grant modification on the first carrier and transmitting the downlink data to the first subordinate entity are simultaneous to one another. 22. The method of claim 20, further comprising: suspending a transmission of downlink data on the first carrier utilizing the first TTI while receiving the uplink data corresponding to the uplink grant utilizing the second TTI; and resuming the transmission of the downlink data on the first carrier utilizing the first TTI after completion of the receiving uplink data corresponding to the uplink grant utilizing the second TTI. 23. The method of claim 22, wherein the suspending the transmission of the downlink data on the first carrier utilizing the first TTI begins at a guard time duration prior to a start of the receiving the uplink data corresponding to the uplink grant utilizing the second TTI. 24. A scheduling entity configured for wireless communication, comprising: at least one processor; a computer-readable medium communicatively coupled to the at least one processor; and a transceiver communicatively coupled to the at least one processor, wherein the at least one processor is configured to: utilize the transceiver to wirelessly communicate utilizing a first transmission time interval (TTI) over a first carrier, the first carrier being a time division duplex (TDD) carrier; and utilize the transceiver to wirelessly communicate utilizing a second TTI different from the first TTI and at least partially overlapping the first TTI, over a second carrier paired with the first carrier but separated from the first carrier in frequency. 25. The scheduling entity of claim 24, wherein the second TTI is shorter in duration than the first TTI. 26. The scheduling entity of claim 24, wherein the second carrier comprises at least one control channel for controlling data transmissions on the first carrier. 27. The scheduling entity of claim 26, wherein the second carrier is a frequency division duplex (FDD) carrier. 28. The scheduling entity of claim 27, wherein the at least one processor is further configured to: utilize the transceiver to receive a scheduling request from a first subordinate entity on a feedback channel on the FDD carrier; utilize the transceiver to transmit an uplink grant to the first subordinate entity on the FDD carrier in response to the scheduling request, the uplink grant configured to identify granted resources on the TDD carrier for an uplink transmission by the first subordinate entity utilizing the second TTI; utilize the transceiver to transmit a grant modification on the FDD carrier, the grant modification configured to modify an existing grant of resources for at least one subordinate entity for an uplink data transmission utilizing the first TTI in accordance with the uplink grant to the first subordinate entity; and utilize the transceiver to receive the uplink transmission from the first subordinate entity utilizing the second TTI in accordance with the uplink grant. 29. The scheduling entity of claim 27, wherein the at least one processor is further configured to: utilize the transceiver to transmit a downlink grant to a first subordinate entity on a grant channel on the FDD carrier utilizing the second TTI; and utilize the transceiver to transmit downlink data corresponding to the downlink grant to the first subordinate entity on the TDD carrier utilizing the second TTI. 30. The scheduling entity of claim 29, wherein the at least one processor is further configured to utilize the transceiver to transmit the downlink grant and to transmit the downlink data corresponding to the downlink grant simultaneous to one another. 31. The scheduling entity of claim 29, wherein the at least one processor is further configured to: suspend a reception of uplink data on the TDD carrier utilizing the first TTI while transmitting the downlink data corresponding to the downlink grant utilizing the second TTI; and resume the reception of the uplink data on the TDD carrier utilizing the first TTI after completion of the transmitting downlink data corresponding to the downlink grant utilizing the second TTI. 32. The scheduling entity of claim 31, wherein the at least one processor is further configured to delay the resuming of the reception of the uplink data on the TDD carrier utilizing the first TTI, by a guard time after the completion of the transmitting downlink data corresponding to the downlink grant utilizing the second TTI. 33. The scheduling entity of claim 27, wherein the at least one processor is further configured to: utilize the transceiver to receive a scheduling request from a first subordinate entity on a feedback channel on the FDD carrier; utilize the transceiver to transmit an uplink grant to the first subordinate entity in response to the scheduling request, the uplink grant configured to identify granted resources on the TDD carrier for an uplink data transmission by the first subordinate entity utilizing the second TTI; utilize the transceiver to transmit a grant modification on the FDD carrier, the grant modification configured to modify an existing grant of resources for at least one subordinate entity for a downlink data transmission utilizing the first TTI in accordance with the uplink grant to the first subordinate entity; and utilize the transceiver to receive the uplink data from the first subordinate entity utilizing the second TTI in accordance with the uplink grant. 34. The scheduling entity of claim 33, wherein the at least one processor is further configured to utilize the transceiver to transmit the grant modification on the FDD carrier and to transmit the downlink data to the first subordinate entity simultaneous to one another. 35. The scheduling entity of claim 33, wherein the at least one processor is further configured to: suspend a transmission of downlink data on the TDD carrier utilizing the first TTI while receiving the uplink data corresponding to the uplink grant utilizing the second TTI; and utilize the transceiver to resume the transmission of the downlink data on the TDD carrier utilizing the first TTI after completion of the receiving uplink data corresponding to the uplink grant utilizing the second TTI. 36. The scheduling entity of claim 35, wherein the at least one processor is further configured to suspend the transmission of the downlink data on the TDD carrier utilizing the first TTI beginning at a guard time duration prior to a start of the receiving the uplink data corresponding to the uplink grant utilizing the second TTI. 37. The scheduling entity of claim 24, wherein the second carrier is a TDD carrier having a conjugate pairing with the first carrier, wherein at least a portion of time slots in the first carrier are complementary in direction to a direction of time-aligned time slots in the second carrier. 38. The scheduling entity of claim 37, wherein the at least one processor is further configured to: utilize the transceiver to receive a scheduling request from a first subordinate entity on a feedback channel on the first carrier; utilize the transceiver to transmit an uplink grant to the first subordinate entity on the second carrier in response to the scheduling request, the uplink grant configured to identify granted resources on the first carrier for an uplink transmission by the first subordinate entity utilizing the second TTI; utilize the transceiver to transmit a grant modification on the second carrier, the grant modification configured to modify an existing grant of resources for at least one subordinate entity for an uplink data transmission utilizing the first TTI in accordance with the uplink grant to the first subordinate entity; and utilize the transceiver to receive the uplink transmission from the first subordinate entity utilizing the second TTI in accordance with the uplink grant. 39. The scheduling entity of claim 37, wherein the at least one processor is further configured to: utilize the transceiver to transmit a downlink grant to a first subordinate entity on a grant channel on the second carrier utilizing the second TTI; and utilize the transceiver to transmit downlink data corresponding to the downlink grant, to the first subordinate entity on the first carrier utilizing the second TTI. 40. The scheduling entity of claim 39, wherein the at least one processor is further configured to utilize the transceiver to transmit the downlink grant and to transmit the downlink data corresponding to the downlink grant simultaneous to one another. 41. The scheduling entity of claim 39, wherein the at least one processor is further configured to: suspend a transmission of downlink data on the first carrier utilizing the first TTI while transmitting the downlink data corresponding to the downlink grant utilizing the second TTI; and utilize the transceiver to resume the transmission of the downlink data on the first carrier utilizing the first TTI after completion of the transmitting downlink data corresponding to the downlink grant utilizing the second TTI. 42. The scheduling entity of claim 41, wherein the at least one processor is further configured to delay resuming the transmission of the downlink data on the first carrier utilizing the first TTI, by a guard time after the completion of the transmitting downlink data corresponding to the downlink grant utilizing the second TTI. 43. The scheduling entity of claim 37, wherein the at least one processor is further configured to: utilize the transceiver to receive a scheduling request from a first subordinate entity on a feedback channel on the second carrier; utilize the transceiver to transmit an uplink grant to the first subordinate entity in response to the scheduling request, the uplink grant configured to identify granted resources on the first carrier for an uplink data transmission by the first subordinate entity utilizing the second TTI; utilize the transceiver to transmit a grant modification on the first carrier, the grant modification configured to modify an existing grant of resources for at least one subordinate entity for a downlink data transmission utilizing the first TTI in accordance with the uplink grant to the first subordinate entity; and utilize the transceiver to receive the uplink data from the first subordinate entity utilizing the second TTI in accordance with the uplink grant. 44. The scheduling entity of claim 43, wherein at least one processor is further configured to utilize the transceiver to transmit the grant modification on the first carrier and to transmit the downlink data to the first subordinate entity simultaneous to one another. 45. The scheduling entity of claim 43, wherein the at least one processor is further configured to: suspend a transmission of downlink data on the first carrier utilizing the first TTI while receiving the uplink data corresponding to the uplink grant utilizing the second TTI; and utilize the transceiver to resume the transmission of the downlink data on the first carrier utilizing the first TTI after completion of the receiving uplink data corresponding to the uplink grant utilizing the second TTI. 46. The scheduling entity of claim 45, wherein the at least one processor is further configured to suspend the transmission of the downlink data on the first carrier utilizing the first TTI beginning at a guard time duration prior to a start of the receiving the uplink data corresponding to the uplink grant utilizing the second TTI. 47. A scheduling entity configured for wireless communication, comprising: means for wirelessly communicating utilizing a first transmission time interval (TTI) over a first carrier, the first carrier being a time division duplex (TDD) carrier; and means for wirelessly communicating utilizing a second TTI different from the first TTI and at least partially overlapping the first TTI, over a second carrier paired with the first carrier but separated from the first carrier in frequency. 48. The scheduling entity of claim 47, wherein the second TTI is shorter in duration than the first TTI. 49. The scheduling entity of claim 47, wherein the second carrier comprises at least one control channel for controlling data transmissions on the first carrier. 50. The scheduling entity of claim 49, wherein the second carrier is a frequency division duplex (FDD) carrier. 51. The scheduling entity of claim 50, further comprising: means for receiving a scheduling request from a first subordinate entity on a feedback channel on the FDD carrier; means for transmitting an uplink grant to the first subordinate entity on the FDD carrier in response to the scheduling request, the uplink grant configured to identify granted resources on the TDD carrier for an uplink transmission by the first subordinate entity utilizing the second TTI; means for transmitting a grant modification on the FDD carrier, the grant modification configured to modify an existing grant of resources for at least one subordinate entity for an uplink data transmission utilizing the first TTI in accordance with the uplink grant to the first subordinate entity; and means for receiving the uplink transmission from the first subordinate entity utilizing the second TTI in accordance with the uplink grant. 52. The scheduling entity of claim 50, further comprising: means for transmitting a downlink grant to a first subordinate entity on a grant channel on the FDD carrier utilizing the second TTI; and means for transmitting downlink data corresponding to the downlink grant to the first subordinate entity on the TDD carrier utilizing the second TTI. 53. The scheduling entity of claim 52, wherein the means for transmitting the downlink grant and the means for transmitting of the downlink data corresponding to the downlink grant are configured to transmit the downlink grant and the downlink data simultaneous to one another. 54. The scheduling entity of claim 52, further comprising: means for suspending a reception of uplink data on the TDD carrier utilizing the first TTI while transmitting the downlink data corresponding to the downlink grant utilizing the second TTI; and means for resuming the reception of the uplink data on the TDD carrier utilizing the first TTI after completion of the transmitting downlink data corresponding to the downlink grant utilizing the second TTI. 55. The scheduling entity of claim 54, wherein the means for resuming the reception of the uplink data on the TDD carrier utilizing the first TTI is configured to delay the resuming by a guard time after the completion of the transmitting downlink data corresponding to the downlink grant utilizing the second TTI. 56. The scheduling entity of claim 50, further comprising: means for receiving a scheduling request from a first subordinate entity on a feedback channel on the FDD carrier; means for transmitting an uplink grant to the first subordinate entity in response to the scheduling request, the uplink grant configured to identify granted resources on the TDD carrier for an uplink data transmission by the first subordinate entity utilizing the second TTI; means for transmitting a grant modification on the FDD carrier, the grant modification configured to modify an existing grant of resources for at least one subordinate entity for a downlink data transmission utilizing the first TTI in accordance with the uplink grant to the first subordinate entity; and means for receiving the uplink data from the first subordinate entity utilizing the second TTI in accordance with the uplink grant. 57. The scheduling entity of claim 56, wherein means for transmitting the grant modification on the FDD carrier and the means for transmitting the downlink data to the first subordinate entity are configured to transmit the grant modification and the downlink data simultaneous to one another. 58. The scheduling entity of claim 56, further comprising: means for suspending a transmission of downlink data on the TDD carrier utilizing the first TTI while receiving the uplink data corresponding to the uplink grant utilizing the second TTI; and means for resuming the transmission of the downlink data on the TDD carrier utilizing the first TTI after completion of the receiving uplink data corresponding to the uplink grant utilizing the second TTI. 59. The scheduling entity of claim 58, wherein the means for suspending the transmission of the downlink data on the TDD carrier utilizing the first TTI is configured to begin the suspending at a guard time duration prior to a start of the receiving the uplink data corresponding to the uplink grant utilizing the second TTI. 60. The scheduling entity of claim 47, wherein the second carrier is a TDD carrier having a conjugate pairing with the first carrier, wherein at least a portion of time slots in the first carrier are complementary in direction to a direction of time-aligned time slots in the second carrier. 61. The scheduling entity of claim 60, further comprising: means for receiving a scheduling request from a first subordinate entity on a feedback channel on the first carrier; means for transmitting an uplink grant to the first subordinate entity on the second carrier in response to the scheduling request, the uplink grant configured to identify granted resources on the first carrier for an uplink transmission by the first subordinate entity utilizing the second TTI; means for transmitting a grant modification on the second carrier, the grant modification configured to modify an existing grant of resources for at least one subordinate entity for an uplink data transmission utilizing the first TTI in accordance with the uplink grant to the first subordinate entity; and means for receiving the uplink transmission from the first subordinate entity utilizing the second TTI in accordance with the uplink grant. 62. The scheduling entity of claim 60, further comprising: means for transmitting a downlink grant to a first subordinate entity on a grant channel on the second carrier utilizing the second TTI; and means for transmitting downlink data corresponding to the downlink grant, to the first subordinate entity on the first carrier utilizing the second TTI. 63. The scheduling entity of claim 62, wherein the means for transmitting the downlink grant and the means for transmitting the downlink data corresponding to the downlink grant are configured to transmit the downlink grant and the downlink data simultaneous to one another. 64. The scheduling entity of claim 62, further comprising: means for suspending a transmission of downlink data on the first carrier utilizing the first TTI while transmitting the downlink data corresponding to the downlink grant utilizing the second TTI; and means for resuming the transmission of the downlink data on the first carrier utilizing the first TTI after completion of the transmitting downlink data corresponding to the downlink grant utilizing the second TTI. 65. The scheduling entity of claim 64, wherein the means for resuming the transmission of the downlink data on the first carrier utilizing the first TTI is configured to delay the resuming by a guard time after the completion of the transmitting downlink data corresponding to the downlink grant utilizing the second TTI. 66. The scheduling entity of claim 60, further comprising: means for receiving a scheduling request from a first subordinate entity on a feedback channel on the second carrier; means for transmitting an uplink grant to the first subordinate entity in response to the scheduling request, the uplink grant configured to identify granted resources on the first carrier for an uplink data transmission by the first subordinate entity utilizing the second TTI; means for transmitting a grant modification on the first carrier, the grant modification configured to modify an existing grant of resources for at least one subordinate entity for a downlink data transmission utilizing the first TTI in accordance with the uplink grant to the first subordinate entity; and means for receiving the uplink data from the first subordinate entity utilizing the second TTI in accordance with the uplink grant. 67. The scheduling entity of claim 66, wherein means for transmitting the grant modification on the first carrier and the means for transmitting the downlink data to the first subordinate entity are configured to transmit the grant modification and the downlink data simultaneous to one another. 68. The scheduling entity of claim 66, further comprising: means for suspending a transmission of downlink data on the first carrier utilizing the first TTI while receiving the uplink data corresponding to the uplink grant utilizing the second TTI; and means for resuming the transmission of the downlink data on the first carrier utilizing the first TTI after completion of the receiving uplink data corresponding to the uplink grant utilizing the second TTI. 69. The scheduling entity of claim 68, wherein the means for suspending the transmission of the downlink data on the first carrier utilizing the first TTI is configured to begin the suspending at a guard time duration prior to a start of the receiving the uplink data corresponding to the uplink grant utilizing the second TTI. 70. A computer-readable medium storing computer-executable code, at a scheduling entity configured for wireless communication, comprising: instructions for causing a computer to wirelessly communicate utilizing a first transmission time interval (TTI) over a first carrier, the first carrier being a time division duplex (TDD) carrier; and instructions for causing a computer to wirelessly communicate utilizing a second TTI different from the first TTI and at least partially overlapping the first TTI, over a second carrier paired with the first carrier but separated from the first carrier in frequency. 71. The computer-readable medium of claim 70, wherein the second TTI is shorter in duration than the first TTI. 72. The computer-readable medium of claim 70, wherein the second carrier comprises at least one control channel for controlling data transmissions on the first carrier. 73. The computer-readable medium of claim 72, wherein the second carrier is a frequency division duplex (FDD) carrier. 74. The computer-readable medium of claim 73, further comprising: instructions for causing a computer to receive a scheduling request from a first subordinate entity on a feedback channel on the FDD carrier; instructions for causing a computer to transmit an uplink grant to the first subordinate entity on the FDD carrier in response to the scheduling request, the uplink grant configured to identify granted resources on the TDD carrier for an uplink transmission by the first subordinate entity utilizing the second TTI; instructions for causing a computer to transmit a grant modification on the FDD carrier, the grant modification configured to modify an existing grant of resources for at least one subordinate entity for an uplink data transmission utilizing the first TTI in accordance with the uplink grant to the first subordinate entity; and instructions for causing a computer to receive the uplink transmission from the first subordinate entity utilizing the second TTI in accordance with the uplink grant. 75. The computer-readable medium of claim 73, further comprising: instructions for causing a computer to transmit a downlink grant to a first subordinate entity on a grant channel on the FDD carrier utilizing the second TTI; and instructions for causing a computer to transmit downlink data corresponding to the downlink grant to the first subordinate entity on the TDD carrier utilizing the second TTI. 76. The computer-readable medium of claim 75, wherein the instructions for causing a computer to transmit the downlink grant and the instructions for causing a computer to transmit of the downlink data corresponding to the downlink grant are configured to cause the computer to transmit the downlink grant and the downlink data simultaneous to one another. 77. The computer-readable medium of claim 75, further comprising: instructions for causing a computer to suspend a reception of uplink data on the TDD carrier utilizing the first TTI while transmitting the downlink data corresponding to the downlink grant utilizing the second TTI; and instructions for causing a computer to resume the reception of the uplink data on the TDD carrier utilizing the first TTI after completion of the transmitting downlink data corresponding to the downlink grant utilizing the second TTI. 78. The computer-readable medium of claim 77, wherein the instructions for causing a computer to resume the reception of the uplink data on the TDD carrier utilizing the first TTI is configured to delay the resumption by a guard time after the completion of the transmitting downlink data corresponding to the downlink grant utilizing the second TTI. 79. The computer-readable medium of claim 73, further comprising: instructions for causing a computer to receive a scheduling request from a first subordinate entity on a feedback channel on the FDD carrier; instructions for causing a computer to transmit an uplink grant to the first subordinate entity in response to the scheduling request, the uplink grant configured to identify granted resources on the TDD carrier for an uplink data transmission by the first subordinate entity utilizing the second TTI; instructions for causing a computer to transmit a grant modification on the FDD carrier, the grant modification configured to modify an existing grant of resources for at least one subordinate entity for a downlink data transmission utilizing the first TTI in accordance with the uplink grant to the first subordinate entity; and instructions for causing a computer to receive the uplink data from the first subordinate entity utilizing the second TTI in accordance with the uplink grant. 80. The computer-readable medium of claim 79, wherein instructions for causing a computer to transmit the grant modification on the FDD carrier and the instructions for causing a computer to transmit the downlink data to the first subordinate entity are configured to transmit the grant modification and the downlink data simultaneous to one another. 81. The computer-readable medium of claim 79, further comprising: instructions for causing a computer to suspend a transmission of downlink data on the TDD carrier utilizing the first TTI while receiving the uplink data corresponding to the uplink grant utilizing the second TTI; and instructions for causing a computer to resume the transmission of the downlink data on the TDD carrier utilizing the first TTI after completion of the receiving uplink data corresponding to the uplink grant utilizing the second TTI. 82. The computer-readable medium of claim 81, wherein the instructions for causing a computer to suspend the transmission of the downlink data on the TDD carrier utilizing the first TTI are configured to begin the suspension at a guard time duration prior to a start of the receiving the uplink data corresponding to the uplink grant utilizing the second TTI. 83. The computer-readable medium of claim 70, wherein the second carrier is a TDD carrier having a conjugate pairing with the first carrier, wherein at least a portion of time slots in the first carrier are complementary in direction to a direction of time-aligned time slots in the second carrier. 84. The computer-readable medium of claim 83, further comprising: instructions for causing a computer to receive a scheduling request from a first subordinate entity on a feedback channel on the first carrier; instructions for causing a computer to transmit an uplink grant to the first subordinate entity on the second carrier in response to the scheduling request, the uplink grant configured to identify granted resources on the first carrier for an uplink transmission by the first subordinate entity utilizing the second TTI; instructions for causing a computer to transmit a grant modification on the second carrier, the grant modification configured to modify an existing grant of resources for at least one subordinate entity for an uplink data transmission utilizing the first TTI in accordance with the uplink grant to the first subordinate entity; and instructions for causing a computer to receive the uplink transmission from the first subordinate entity utilizing the second TTI in accordance with the uplink grant. 85. The computer-readable medium of claim 83, further comprising: instructions for causing a computer to transmit a downlink grant to a first subordinate entity on a grant channel on the second carrier utilizing the second TTI; and instructions for causing a computer to transmit downlink data corresponding to the downlink grant, to the first subordinate entity on the first carrier utilizing the second TTI. 86. The computer-readable medium of claim 85, wherein the instructions for causing a computer to transmit the downlink grant and the instructions for causing a computer to transmit the downlink data corresponding to the downlink grant are configured to transmit the downlink grant and the downlink data simultaneous to one another. 87. The computer-readable medium of claim 85, further comprising: instructions for causing a computer to suspend a transmission of downlink data on the first carrier utilizing the first TTI while transmitting the downlink data corresponding to the downlink grant utilizing the second TTI; and instructions for causing a computer to resume the transmission of the downlink data on the first carrier utilizing the first TTI after completion of the transmitting downlink data corresponding to the downlink grant utilizing the second TTI. 88. The computer-readable medium of claim 87, wherein the instructions for causing a computer to resume the transmission of the downlink data on the first carrier utilizing the first TTI are configured to delay the resumption by a guard time after the completion of the transmitting downlink data corresponding to the downlink grant utilizing the second TTI. 89. The computer-readable medium of claim 83, further comprising: instructions for causing a computer to receive a scheduling request from a first subordinate entity on a feedback channel on the second carrier; instructions for causing a computer to transmit an uplink grant to the first subordinate entity in response to the scheduling request, the uplink grant configured to identify granted resources on the first carrier for an uplink data transmission by the first subordinate entity utilizing the second TTI; instructions for causing a computer to transmit a grant modification on the first carrier, the grant modification configured to modify an existing grant of resources for at least one subordinate entity for a downlink data transmission utilizing the first TTI in accordance with the uplink grant to the first subordinate entity; and instructions for causing a computer to receive the uplink data from the first subordinate entity utilizing the second TTI in accordance with the uplink grant. 90. The computer-readable medium of claim 89, wherein instructions for causing a computer to transmit the grant modification on the first carrier and the instructions for causing a computer to transmit the downlink data to the first subordinate entity are configured to transmit the grant modification and the downlink data simultaneous to one another. 91. The computer-readable medium of claim 89, further comprising: instructions for causing a computer to suspend a transmission of downlink data on the first carrier utilizing the first TTI while receiving the uplink data corresponding to the uplink grant utilizing the second TTI; and instructions for causing a computer to resume the transmission of the downlink data on the first carrier utilizing the first TTI after completion of the receiving uplink data corresponding to the uplink grant utilizing the second TTI. 92. The computer-readable medium of claim 91, wherein the instructions for causing a computer to suspend the transmission of the downlink data on the first carrier utilizing the first TTI are configured to begin the suspension at a guard time duration prior to a start of the receiving the uplink data corresponding to the uplink grant utilizing the second TTI.
Aspects of the present disclosure provide for the pairing of an inter-band carrier with a time division duplex (TDD) carrier. If the paired band is a frequency division duplex (FDD) band, then base stations and mobile devices may transmit and receive additional thin control channels on FDD carriers to enable full duplex operations. If the paired band is a TDD band, then a conjugate or inverse carrier may be used such that full duplex, or a close approximation thereto, is achieved. With the introduction of a paired channel and fast control channels, rapid uplink/downlink switching may be achieved for TDD carriers efficiently and effectively. Other aspects, embodiments, and features are also claimed and described.1. A method of wireless communication operable at a scheduling entity, comprising: wirelessly communicating utilizing a first transmission time interval (TTI) over a first carrier, the first carrier being a time division duplex (TDD) carrier; and wirelessly communicating utilizing a second TTI different from the first TTI and at least partially overlapping the first TTI, over a second carrier paired with the first carrier but separated from the first carrier in frequency. 2. The method of claim 1, wherein the second TTI is shorter in duration than the first TTI. 3. The method of claim 1, wherein the second carrier comprises at least one control channel for controlling data transmissions on the first carrier. 4. The method of claim 3, wherein the second carrier is a frequency division duplex (FDD) carrier. 5. The method of claim 4, further comprising: receiving a scheduling request from a first subordinate entity on a feedback channel on the FDD carrier; transmitting an uplink grant to the first subordinate entity on the FDD carrier in response to the scheduling request, the uplink grant configured to identify granted resources on the TDD carrier for an uplink transmission by the first subordinate entity utilizing the second TTI; transmitting a grant modification on the FDD carrier, the grant modification configured to modify an existing grant of resources for at least one subordinate entity for an uplink data transmission utilizing the first TTI in accordance with the uplink grant to the first subordinate entity; and receiving the uplink transmission from the first subordinate entity utilizing the second TTI in accordance with the uplink grant. 6. The method of claim 4, further comprising: transmitting a downlink grant to a first subordinate entity on a grant channel on the FDD carrier utilizing the second TTI; and transmitting downlink data corresponding to the downlink grant to the first subordinate entity on the TDD carrier utilizing the second TTI. 7. The method of claim 6, wherein the transmitting of the downlink grant and the transmitting of the downlink data corresponding to the downlink grant are simultaneous to one another. 8. The method of claim 6, further comprising: suspending a reception of uplink data on the TDD carrier utilizing the first TTI while transmitting the downlink data corresponding to the downlink grant utilizing the second TTI; and resuming the reception of the uplink data on the TDD carrier utilizing the first TTI after completion of the transmitting downlink data corresponding to the downlink grant utilizing the second TTI. 9. The method of claim 8, wherein the resuming the reception of the uplink data on the TDD carrier utilizing the first TTI is delayed by a guard time after the completion of the transmitting downlink data corresponding to the downlink grant utilizing the second TTI. 10. The method of claim 4, further comprising: receiving a scheduling request from a first subordinate entity on a feedback channel on the FDD carrier; transmitting an uplink grant to the first subordinate entity in response to the scheduling request, the uplink grant configured to identify granted resources on the TDD carrier for an uplink data transmission by the first subordinate entity utilizing the second TTI; transmitting a grant modification on the FDD carrier, the grant modification configured to modify an existing grant of resources for at least one subordinate entity for a downlink data transmission utilizing the first TTI in accordance with the uplink grant to the first subordinate entity; and receiving the uplink data from the first subordinate entity utilizing the second TTI in accordance with the uplink grant. 11. The method of claim 10, wherein transmitting the grant modification on the FDD carrier and transmitting the downlink data to the first subordinate entity are simultaneous to one another. 12. The method of claim 10, further comprising: suspending a transmission of downlink data on the TDD carrier utilizing the first TTI while receiving the uplink data corresponding to the uplink grant utilizing the second TTI; and resuming the transmission of the downlink data on the TDD carrier utilizing the first TTI after completion of the receiving uplink data corresponding to the uplink grant utilizing the second TTI. 13. The method of claim 12, wherein the suspending the transmission of the downlink data on the TDD carrier utilizing the first TTI begins at a guard time duration prior to a start of the receiving the uplink data corresponding to the uplink grant utilizing the second TTI. 14. The method of claim 1, wherein the second carrier is a TDD carrier having a conjugate pairing with the first carrier, wherein at least a portion of time slots in the first carrier are complementary in direction to a direction of time-aligned time slots in the second carrier. 15. The method of claim 14, further comprising: receiving a scheduling request from a first subordinate entity on a feedback channel on the first carrier; transmitting an uplink grant to the first subordinate entity on the second carrier in response to the scheduling request, the uplink grant configured to identify granted resources on the first carrier for an uplink transmission by the first subordinate entity utilizing the second TTI; transmitting a grant modification on the second carrier, the grant modification configured to modify an existing grant of resources for at least one subordinate entity for an uplink data transmission utilizing the first TTI in accordance with the uplink grant to the first subordinate entity; and receiving the uplink transmission from the first subordinate entity utilizing the second TTI in accordance with the uplink grant. 16. The method of claim 14, further comprising: transmitting a downlink grant to a first subordinate entity on a grant channel on the second carrier utilizing the second TTI; and transmitting downlink data corresponding to the downlink grant, to the first subordinate entity on the first carrier utilizing the second TTI. 17. The method of claim 16, wherein the transmitting of the downlink grant and the transmitting of the downlink data corresponding to the downlink grant are simultaneous to one another. 18. The method of claim 16, further comprising: suspending a transmission of downlink data on the first carrier utilizing the first TTI while transmitting the downlink data corresponding to the downlink grant utilizing the second TTI; and resuming the transmission of the downlink data on the first carrier utilizing the first TTI after completion of the transmitting downlink data corresponding to the downlink grant utilizing the second TTI. 19. The method of claim 18, wherein the resuming the transmission of the downlink data on the first carrier utilizing the first TTI is delayed by a guard time after the completion of the transmitting downlink data corresponding to the downlink grant utilizing the second TTI. 20. The method of claim 14, further comprising: receiving a scheduling request from a first subordinate entity on a feedback channel on the second carrier; transmitting an uplink grant to the first subordinate entity in response to the scheduling request, the uplink grant configured to identify granted resources on the first carrier for an uplink data transmission by the first subordinate entity utilizing the second TTI; transmitting a grant modification on the first carrier, the grant modification configured to modify an existing grant of resources for at least one subordinate entity for a downlink data transmission utilizing the first TTI in accordance with the uplink grant to the first subordinate entity; and receiving the uplink data from the first subordinate entity utilizing the second TTI in accordance with the uplink grant. 21. The method of claim 20, wherein transmitting the grant modification on the first carrier and transmitting the downlink data to the first subordinate entity are simultaneous to one another. 22. The method of claim 20, further comprising: suspending a transmission of downlink data on the first carrier utilizing the first TTI while receiving the uplink data corresponding to the uplink grant utilizing the second TTI; and resuming the transmission of the downlink data on the first carrier utilizing the first TTI after completion of the receiving uplink data corresponding to the uplink grant utilizing the second TTI. 23. The method of claim 22, wherein the suspending the transmission of the downlink data on the first carrier utilizing the first TTI begins at a guard time duration prior to a start of the receiving the uplink data corresponding to the uplink grant utilizing the second TTI. 24. A scheduling entity configured for wireless communication, comprising: at least one processor; a computer-readable medium communicatively coupled to the at least one processor; and a transceiver communicatively coupled to the at least one processor, wherein the at least one processor is configured to: utilize the transceiver to wirelessly communicate utilizing a first transmission time interval (TTI) over a first carrier, the first carrier being a time division duplex (TDD) carrier; and utilize the transceiver to wirelessly communicate utilizing a second TTI different from the first TTI and at least partially overlapping the first TTI, over a second carrier paired with the first carrier but separated from the first carrier in frequency. 25. The scheduling entity of claim 24, wherein the second TTI is shorter in duration than the first TTI. 26. The scheduling entity of claim 24, wherein the second carrier comprises at least one control channel for controlling data transmissions on the first carrier. 27. The scheduling entity of claim 26, wherein the second carrier is a frequency division duplex (FDD) carrier. 28. The scheduling entity of claim 27, wherein the at least one processor is further configured to: utilize the transceiver to receive a scheduling request from a first subordinate entity on a feedback channel on the FDD carrier; utilize the transceiver to transmit an uplink grant to the first subordinate entity on the FDD carrier in response to the scheduling request, the uplink grant configured to identify granted resources on the TDD carrier for an uplink transmission by the first subordinate entity utilizing the second TTI; utilize the transceiver to transmit a grant modification on the FDD carrier, the grant modification configured to modify an existing grant of resources for at least one subordinate entity for an uplink data transmission utilizing the first TTI in accordance with the uplink grant to the first subordinate entity; and utilize the transceiver to receive the uplink transmission from the first subordinate entity utilizing the second TTI in accordance with the uplink grant. 29. The scheduling entity of claim 27, wherein the at least one processor is further configured to: utilize the transceiver to transmit a downlink grant to a first subordinate entity on a grant channel on the FDD carrier utilizing the second TTI; and utilize the transceiver to transmit downlink data corresponding to the downlink grant to the first subordinate entity on the TDD carrier utilizing the second TTI. 30. The scheduling entity of claim 29, wherein the at least one processor is further configured to utilize the transceiver to transmit the downlink grant and to transmit the downlink data corresponding to the downlink grant simultaneous to one another. 31. The scheduling entity of claim 29, wherein the at least one processor is further configured to: suspend a reception of uplink data on the TDD carrier utilizing the first TTI while transmitting the downlink data corresponding to the downlink grant utilizing the second TTI; and resume the reception of the uplink data on the TDD carrier utilizing the first TTI after completion of the transmitting downlink data corresponding to the downlink grant utilizing the second TTI. 32. The scheduling entity of claim 31, wherein the at least one processor is further configured to delay the resuming of the reception of the uplink data on the TDD carrier utilizing the first TTI, by a guard time after the completion of the transmitting downlink data corresponding to the downlink grant utilizing the second TTI. 33. The scheduling entity of claim 27, wherein the at least one processor is further configured to: utilize the transceiver to receive a scheduling request from a first subordinate entity on a feedback channel on the FDD carrier; utilize the transceiver to transmit an uplink grant to the first subordinate entity in response to the scheduling request, the uplink grant configured to identify granted resources on the TDD carrier for an uplink data transmission by the first subordinate entity utilizing the second TTI; utilize the transceiver to transmit a grant modification on the FDD carrier, the grant modification configured to modify an existing grant of resources for at least one subordinate entity for a downlink data transmission utilizing the first TTI in accordance with the uplink grant to the first subordinate entity; and utilize the transceiver to receive the uplink data from the first subordinate entity utilizing the second TTI in accordance with the uplink grant. 34. The scheduling entity of claim 33, wherein the at least one processor is further configured to utilize the transceiver to transmit the grant modification on the FDD carrier and to transmit the downlink data to the first subordinate entity simultaneous to one another. 35. The scheduling entity of claim 33, wherein the at least one processor is further configured to: suspend a transmission of downlink data on the TDD carrier utilizing the first TTI while receiving the uplink data corresponding to the uplink grant utilizing the second TTI; and utilize the transceiver to resume the transmission of the downlink data on the TDD carrier utilizing the first TTI after completion of the receiving uplink data corresponding to the uplink grant utilizing the second TTI. 36. The scheduling entity of claim 35, wherein the at least one processor is further configured to suspend the transmission of the downlink data on the TDD carrier utilizing the first TTI beginning at a guard time duration prior to a start of the receiving the uplink data corresponding to the uplink grant utilizing the second TTI. 37. The scheduling entity of claim 24, wherein the second carrier is a TDD carrier having a conjugate pairing with the first carrier, wherein at least a portion of time slots in the first carrier are complementary in direction to a direction of time-aligned time slots in the second carrier. 38. The scheduling entity of claim 37, wherein the at least one processor is further configured to: utilize the transceiver to receive a scheduling request from a first subordinate entity on a feedback channel on the first carrier; utilize the transceiver to transmit an uplink grant to the first subordinate entity on the second carrier in response to the scheduling request, the uplink grant configured to identify granted resources on the first carrier for an uplink transmission by the first subordinate entity utilizing the second TTI; utilize the transceiver to transmit a grant modification on the second carrier, the grant modification configured to modify an existing grant of resources for at least one subordinate entity for an uplink data transmission utilizing the first TTI in accordance with the uplink grant to the first subordinate entity; and utilize the transceiver to receive the uplink transmission from the first subordinate entity utilizing the second TTI in accordance with the uplink grant. 39. The scheduling entity of claim 37, wherein the at least one processor is further configured to: utilize the transceiver to transmit a downlink grant to a first subordinate entity on a grant channel on the second carrier utilizing the second TTI; and utilize the transceiver to transmit downlink data corresponding to the downlink grant, to the first subordinate entity on the first carrier utilizing the second TTI. 40. The scheduling entity of claim 39, wherein the at least one processor is further configured to utilize the transceiver to transmit the downlink grant and to transmit the downlink data corresponding to the downlink grant simultaneous to one another. 41. The scheduling entity of claim 39, wherein the at least one processor is further configured to: suspend a transmission of downlink data on the first carrier utilizing the first TTI while transmitting the downlink data corresponding to the downlink grant utilizing the second TTI; and utilize the transceiver to resume the transmission of the downlink data on the first carrier utilizing the first TTI after completion of the transmitting downlink data corresponding to the downlink grant utilizing the second TTI. 42. The scheduling entity of claim 41, wherein the at least one processor is further configured to delay resuming the transmission of the downlink data on the first carrier utilizing the first TTI, by a guard time after the completion of the transmitting downlink data corresponding to the downlink grant utilizing the second TTI. 43. The scheduling entity of claim 37, wherein the at least one processor is further configured to: utilize the transceiver to receive a scheduling request from a first subordinate entity on a feedback channel on the second carrier; utilize the transceiver to transmit an uplink grant to the first subordinate entity in response to the scheduling request, the uplink grant configured to identify granted resources on the first carrier for an uplink data transmission by the first subordinate entity utilizing the second TTI; utilize the transceiver to transmit a grant modification on the first carrier, the grant modification configured to modify an existing grant of resources for at least one subordinate entity for a downlink data transmission utilizing the first TTI in accordance with the uplink grant to the first subordinate entity; and utilize the transceiver to receive the uplink data from the first subordinate entity utilizing the second TTI in accordance with the uplink grant. 44. The scheduling entity of claim 43, wherein at least one processor is further configured to utilize the transceiver to transmit the grant modification on the first carrier and to transmit the downlink data to the first subordinate entity simultaneous to one another. 45. The scheduling entity of claim 43, wherein the at least one processor is further configured to: suspend a transmission of downlink data on the first carrier utilizing the first TTI while receiving the uplink data corresponding to the uplink grant utilizing the second TTI; and utilize the transceiver to resume the transmission of the downlink data on the first carrier utilizing the first TTI after completion of the receiving uplink data corresponding to the uplink grant utilizing the second TTI. 46. The scheduling entity of claim 45, wherein the at least one processor is further configured to suspend the transmission of the downlink data on the first carrier utilizing the first TTI beginning at a guard time duration prior to a start of the receiving the uplink data corresponding to the uplink grant utilizing the second TTI. 47. A scheduling entity configured for wireless communication, comprising: means for wirelessly communicating utilizing a first transmission time interval (TTI) over a first carrier, the first carrier being a time division duplex (TDD) carrier; and means for wirelessly communicating utilizing a second TTI different from the first TTI and at least partially overlapping the first TTI, over a second carrier paired with the first carrier but separated from the first carrier in frequency. 48. The scheduling entity of claim 47, wherein the second TTI is shorter in duration than the first TTI. 49. The scheduling entity of claim 47, wherein the second carrier comprises at least one control channel for controlling data transmissions on the first carrier. 50. The scheduling entity of claim 49, wherein the second carrier is a frequency division duplex (FDD) carrier. 51. The scheduling entity of claim 50, further comprising: means for receiving a scheduling request from a first subordinate entity on a feedback channel on the FDD carrier; means for transmitting an uplink grant to the first subordinate entity on the FDD carrier in response to the scheduling request, the uplink grant configured to identify granted resources on the TDD carrier for an uplink transmission by the first subordinate entity utilizing the second TTI; means for transmitting a grant modification on the FDD carrier, the grant modification configured to modify an existing grant of resources for at least one subordinate entity for an uplink data transmission utilizing the first TTI in accordance with the uplink grant to the first subordinate entity; and means for receiving the uplink transmission from the first subordinate entity utilizing the second TTI in accordance with the uplink grant. 52. The scheduling entity of claim 50, further comprising: means for transmitting a downlink grant to a first subordinate entity on a grant channel on the FDD carrier utilizing the second TTI; and means for transmitting downlink data corresponding to the downlink grant to the first subordinate entity on the TDD carrier utilizing the second TTI. 53. The scheduling entity of claim 52, wherein the means for transmitting the downlink grant and the means for transmitting of the downlink data corresponding to the downlink grant are configured to transmit the downlink grant and the downlink data simultaneous to one another. 54. The scheduling entity of claim 52, further comprising: means for suspending a reception of uplink data on the TDD carrier utilizing the first TTI while transmitting the downlink data corresponding to the downlink grant utilizing the second TTI; and means for resuming the reception of the uplink data on the TDD carrier utilizing the first TTI after completion of the transmitting downlink data corresponding to the downlink grant utilizing the second TTI. 55. The scheduling entity of claim 54, wherein the means for resuming the reception of the uplink data on the TDD carrier utilizing the first TTI is configured to delay the resuming by a guard time after the completion of the transmitting downlink data corresponding to the downlink grant utilizing the second TTI. 56. The scheduling entity of claim 50, further comprising: means for receiving a scheduling request from a first subordinate entity on a feedback channel on the FDD carrier; means for transmitting an uplink grant to the first subordinate entity in response to the scheduling request, the uplink grant configured to identify granted resources on the TDD carrier for an uplink data transmission by the first subordinate entity utilizing the second TTI; means for transmitting a grant modification on the FDD carrier, the grant modification configured to modify an existing grant of resources for at least one subordinate entity for a downlink data transmission utilizing the first TTI in accordance with the uplink grant to the first subordinate entity; and means for receiving the uplink data from the first subordinate entity utilizing the second TTI in accordance with the uplink grant. 57. The scheduling entity of claim 56, wherein means for transmitting the grant modification on the FDD carrier and the means for transmitting the downlink data to the first subordinate entity are configured to transmit the grant modification and the downlink data simultaneous to one another. 58. The scheduling entity of claim 56, further comprising: means for suspending a transmission of downlink data on the TDD carrier utilizing the first TTI while receiving the uplink data corresponding to the uplink grant utilizing the second TTI; and means for resuming the transmission of the downlink data on the TDD carrier utilizing the first TTI after completion of the receiving uplink data corresponding to the uplink grant utilizing the second TTI. 59. The scheduling entity of claim 58, wherein the means for suspending the transmission of the downlink data on the TDD carrier utilizing the first TTI is configured to begin the suspending at a guard time duration prior to a start of the receiving the uplink data corresponding to the uplink grant utilizing the second TTI. 60. The scheduling entity of claim 47, wherein the second carrier is a TDD carrier having a conjugate pairing with the first carrier, wherein at least a portion of time slots in the first carrier are complementary in direction to a direction of time-aligned time slots in the second carrier. 61. The scheduling entity of claim 60, further comprising: means for receiving a scheduling request from a first subordinate entity on a feedback channel on the first carrier; means for transmitting an uplink grant to the first subordinate entity on the second carrier in response to the scheduling request, the uplink grant configured to identify granted resources on the first carrier for an uplink transmission by the first subordinate entity utilizing the second TTI; means for transmitting a grant modification on the second carrier, the grant modification configured to modify an existing grant of resources for at least one subordinate entity for an uplink data transmission utilizing the first TTI in accordance with the uplink grant to the first subordinate entity; and means for receiving the uplink transmission from the first subordinate entity utilizing the second TTI in accordance with the uplink grant. 62. The scheduling entity of claim 60, further comprising: means for transmitting a downlink grant to a first subordinate entity on a grant channel on the second carrier utilizing the second TTI; and means for transmitting downlink data corresponding to the downlink grant, to the first subordinate entity on the first carrier utilizing the second TTI. 63. The scheduling entity of claim 62, wherein the means for transmitting the downlink grant and the means for transmitting the downlink data corresponding to the downlink grant are configured to transmit the downlink grant and the downlink data simultaneous to one another. 64. The scheduling entity of claim 62, further comprising: means for suspending a transmission of downlink data on the first carrier utilizing the first TTI while transmitting the downlink data corresponding to the downlink grant utilizing the second TTI; and means for resuming the transmission of the downlink data on the first carrier utilizing the first TTI after completion of the transmitting downlink data corresponding to the downlink grant utilizing the second TTI. 65. The scheduling entity of claim 64, wherein the means for resuming the transmission of the downlink data on the first carrier utilizing the first TTI is configured to delay the resuming by a guard time after the completion of the transmitting downlink data corresponding to the downlink grant utilizing the second TTI. 66. The scheduling entity of claim 60, further comprising: means for receiving a scheduling request from a first subordinate entity on a feedback channel on the second carrier; means for transmitting an uplink grant to the first subordinate entity in response to the scheduling request, the uplink grant configured to identify granted resources on the first carrier for an uplink data transmission by the first subordinate entity utilizing the second TTI; means for transmitting a grant modification on the first carrier, the grant modification configured to modify an existing grant of resources for at least one subordinate entity for a downlink data transmission utilizing the first TTI in accordance with the uplink grant to the first subordinate entity; and means for receiving the uplink data from the first subordinate entity utilizing the second TTI in accordance with the uplink grant. 67. The scheduling entity of claim 66, wherein means for transmitting the grant modification on the first carrier and the means for transmitting the downlink data to the first subordinate entity are configured to transmit the grant modification and the downlink data simultaneous to one another. 68. The scheduling entity of claim 66, further comprising: means for suspending a transmission of downlink data on the first carrier utilizing the first TTI while receiving the uplink data corresponding to the uplink grant utilizing the second TTI; and means for resuming the transmission of the downlink data on the first carrier utilizing the first TTI after completion of the receiving uplink data corresponding to the uplink grant utilizing the second TTI. 69. The scheduling entity of claim 68, wherein the means for suspending the transmission of the downlink data on the first carrier utilizing the first TTI is configured to begin the suspending at a guard time duration prior to a start of the receiving the uplink data corresponding to the uplink grant utilizing the second TTI. 70. A computer-readable medium storing computer-executable code, at a scheduling entity configured for wireless communication, comprising: instructions for causing a computer to wirelessly communicate utilizing a first transmission time interval (TTI) over a first carrier, the first carrier being a time division duplex (TDD) carrier; and instructions for causing a computer to wirelessly communicate utilizing a second TTI different from the first TTI and at least partially overlapping the first TTI, over a second carrier paired with the first carrier but separated from the first carrier in frequency. 71. The computer-readable medium of claim 70, wherein the second TTI is shorter in duration than the first TTI. 72. The computer-readable medium of claim 70, wherein the second carrier comprises at least one control channel for controlling data transmissions on the first carrier. 73. The computer-readable medium of claim 72, wherein the second carrier is a frequency division duplex (FDD) carrier. 74. The computer-readable medium of claim 73, further comprising: instructions for causing a computer to receive a scheduling request from a first subordinate entity on a feedback channel on the FDD carrier; instructions for causing a computer to transmit an uplink grant to the first subordinate entity on the FDD carrier in response to the scheduling request, the uplink grant configured to identify granted resources on the TDD carrier for an uplink transmission by the first subordinate entity utilizing the second TTI; instructions for causing a computer to transmit a grant modification on the FDD carrier, the grant modification configured to modify an existing grant of resources for at least one subordinate entity for an uplink data transmission utilizing the first TTI in accordance with the uplink grant to the first subordinate entity; and instructions for causing a computer to receive the uplink transmission from the first subordinate entity utilizing the second TTI in accordance with the uplink grant. 75. The computer-readable medium of claim 73, further comprising: instructions for causing a computer to transmit a downlink grant to a first subordinate entity on a grant channel on the FDD carrier utilizing the second TTI; and instructions for causing a computer to transmit downlink data corresponding to the downlink grant to the first subordinate entity on the TDD carrier utilizing the second TTI. 76. The computer-readable medium of claim 75, wherein the instructions for causing a computer to transmit the downlink grant and the instructions for causing a computer to transmit of the downlink data corresponding to the downlink grant are configured to cause the computer to transmit the downlink grant and the downlink data simultaneous to one another. 77. The computer-readable medium of claim 75, further comprising: instructions for causing a computer to suspend a reception of uplink data on the TDD carrier utilizing the first TTI while transmitting the downlink data corresponding to the downlink grant utilizing the second TTI; and instructions for causing a computer to resume the reception of the uplink data on the TDD carrier utilizing the first TTI after completion of the transmitting downlink data corresponding to the downlink grant utilizing the second TTI. 78. The computer-readable medium of claim 77, wherein the instructions for causing a computer to resume the reception of the uplink data on the TDD carrier utilizing the first TTI is configured to delay the resumption by a guard time after the completion of the transmitting downlink data corresponding to the downlink grant utilizing the second TTI. 79. The computer-readable medium of claim 73, further comprising: instructions for causing a computer to receive a scheduling request from a first subordinate entity on a feedback channel on the FDD carrier; instructions for causing a computer to transmit an uplink grant to the first subordinate entity in response to the scheduling request, the uplink grant configured to identify granted resources on the TDD carrier for an uplink data transmission by the first subordinate entity utilizing the second TTI; instructions for causing a computer to transmit a grant modification on the FDD carrier, the grant modification configured to modify an existing grant of resources for at least one subordinate entity for a downlink data transmission utilizing the first TTI in accordance with the uplink grant to the first subordinate entity; and instructions for causing a computer to receive the uplink data from the first subordinate entity utilizing the second TTI in accordance with the uplink grant. 80. The computer-readable medium of claim 79, wherein instructions for causing a computer to transmit the grant modification on the FDD carrier and the instructions for causing a computer to transmit the downlink data to the first subordinate entity are configured to transmit the grant modification and the downlink data simultaneous to one another. 81. The computer-readable medium of claim 79, further comprising: instructions for causing a computer to suspend a transmission of downlink data on the TDD carrier utilizing the first TTI while receiving the uplink data corresponding to the uplink grant utilizing the second TTI; and instructions for causing a computer to resume the transmission of the downlink data on the TDD carrier utilizing the first TTI after completion of the receiving uplink data corresponding to the uplink grant utilizing the second TTI. 82. The computer-readable medium of claim 81, wherein the instructions for causing a computer to suspend the transmission of the downlink data on the TDD carrier utilizing the first TTI are configured to begin the suspension at a guard time duration prior to a start of the receiving the uplink data corresponding to the uplink grant utilizing the second TTI. 83. The computer-readable medium of claim 70, wherein the second carrier is a TDD carrier having a conjugate pairing with the first carrier, wherein at least a portion of time slots in the first carrier are complementary in direction to a direction of time-aligned time slots in the second carrier. 84. The computer-readable medium of claim 83, further comprising: instructions for causing a computer to receive a scheduling request from a first subordinate entity on a feedback channel on the first carrier; instructions for causing a computer to transmit an uplink grant to the first subordinate entity on the second carrier in response to the scheduling request, the uplink grant configured to identify granted resources on the first carrier for an uplink transmission by the first subordinate entity utilizing the second TTI; instructions for causing a computer to transmit a grant modification on the second carrier, the grant modification configured to modify an existing grant of resources for at least one subordinate entity for an uplink data transmission utilizing the first TTI in accordance with the uplink grant to the first subordinate entity; and instructions for causing a computer to receive the uplink transmission from the first subordinate entity utilizing the second TTI in accordance with the uplink grant. 85. The computer-readable medium of claim 83, further comprising: instructions for causing a computer to transmit a downlink grant to a first subordinate entity on a grant channel on the second carrier utilizing the second TTI; and instructions for causing a computer to transmit downlink data corresponding to the downlink grant, to the first subordinate entity on the first carrier utilizing the second TTI. 86. The computer-readable medium of claim 85, wherein the instructions for causing a computer to transmit the downlink grant and the instructions for causing a computer to transmit the downlink data corresponding to the downlink grant are configured to transmit the downlink grant and the downlink data simultaneous to one another. 87. The computer-readable medium of claim 85, further comprising: instructions for causing a computer to suspend a transmission of downlink data on the first carrier utilizing the first TTI while transmitting the downlink data corresponding to the downlink grant utilizing the second TTI; and instructions for causing a computer to resume the transmission of the downlink data on the first carrier utilizing the first TTI after completion of the transmitting downlink data corresponding to the downlink grant utilizing the second TTI. 88. The computer-readable medium of claim 87, wherein the instructions for causing a computer to resume the transmission of the downlink data on the first carrier utilizing the first TTI are configured to delay the resumption by a guard time after the completion of the transmitting downlink data corresponding to the downlink grant utilizing the second TTI. 89. The computer-readable medium of claim 83, further comprising: instructions for causing a computer to receive a scheduling request from a first subordinate entity on a feedback channel on the second carrier; instructions for causing a computer to transmit an uplink grant to the first subordinate entity in response to the scheduling request, the uplink grant configured to identify granted resources on the first carrier for an uplink data transmission by the first subordinate entity utilizing the second TTI; instructions for causing a computer to transmit a grant modification on the first carrier, the grant modification configured to modify an existing grant of resources for at least one subordinate entity for a downlink data transmission utilizing the first TTI in accordance with the uplink grant to the first subordinate entity; and instructions for causing a computer to receive the uplink data from the first subordinate entity utilizing the second TTI in accordance with the uplink grant. 90. The computer-readable medium of claim 89, wherein instructions for causing a computer to transmit the grant modification on the first carrier and the instructions for causing a computer to transmit the downlink data to the first subordinate entity are configured to transmit the grant modification and the downlink data simultaneous to one another. 91. The computer-readable medium of claim 89, further comprising: instructions for causing a computer to suspend a transmission of downlink data on the first carrier utilizing the first TTI while receiving the uplink data corresponding to the uplink grant utilizing the second TTI; and instructions for causing a computer to resume the transmission of the downlink data on the first carrier utilizing the first TTI after completion of the receiving uplink data corresponding to the uplink grant utilizing the second TTI. 92. The computer-readable medium of claim 91, wherein the instructions for causing a computer to suspend the transmission of the downlink data on the first carrier utilizing the first TTI are configured to begin the suspension at a guard time duration prior to a start of the receiving the uplink data corresponding to the uplink grant utilizing the second TTI.
2,400
8,044
8,044
14,965,682
2,454
A novel design of a gateway that handles traffic in and out of a network by using a datapath daemon is provided. The datapath daemon is a run-to-completion process that performs various data-plane packet-processing operations at the edge of the network. The datapath daemon dispatches packets to other processes or processing threads outside of the daemon by utilizing a user space network stack.
1. A method comprising: receiving a packet from a physical network at a gateway of a logical network, the logical network comprising a set of logical entities as a data path for forwarding the packet to its destination, wherein an operating system of the gateway comprises a user space and a kernel space; and executing a plurality of pipeline stages at a first daemon for the received packet, the plurality of pipeline stages corresponding to logical entities along the data path, wherein the first daemon uses a second daemon to execute a particular pipeline stage by exporting a first packet to the second daemon, said exporting comprises using a network stack operating in the user space when transporting packets between the first and second daemons. 2. The method of claim 1, wherein the first daemon uses a second daemon to execute a particular pipeline stage by further importing a second packet from the second daemon by using the user space network stack. 3. The method of claim 1, wherein the operating system provides a network stack in the kernel space that is not used for transporting packets between the first and second daemons. 4. The method of claim 1, wherein transporting packets between the first and second daemons comprises storing data to and retrieving data from a ring buffer in the user space. 5. The method of claim 1, wherein the user space network stack is a separate process from the first daemon. 6. The method of claim 1, wherein the user space network stack is one of a plurality of pipeline stages executed at the first daemon. 7. The method of claim 1, wherein the second daemon is an application layer load balancer. 8. The method of claim 1, wherein the second daemon is a control plane process. 9. The method of claim 8, wherein the control plane process is for handling border gateway protocol (BGP), and the transported packets comprises a BGP packet comprising routing information. 10. The method of claim 1, wherein the first daemon is a datapath daemon that executes the plurality of pipeline stages in a run-to-completion thread. 11. A computing device comprising: a network interface controller (NIC) for receiving a packet from a physical communication medium; one or more processing units executing sets of instructions for: receiving a packet from a physical network at a gateway of a logical network, the logical network comprising a set of logical entities as a data path for forwarding the packet to its destination, wherein an operating system of the gateway comprises a user space and a kernel space; and executing a plurality of pipeline stages at a first daemon for the received packet, the plurality of pipeline stages corresponding to logical entities along the data path, wherein the first daemon uses a second daemon to execute a particular pipeline stage by exporting a first packet to the second daemon, said exporting comprises using a network stack operating in the user space when transporting packets between the first and second daemons. 12. The computing device of claim 11, wherein the first daemon uses a second daemon to execute a particular pipeline stage by further importing a second packet from the second daemon by using the user space network stack. 13. The computing device of claim 11, wherein the operating system provides a network stack in the kernel space that is not used for transporting packets between the first and second daemons. 14. The computing device of claim 11, wherein the set of instructions for transporting packets between the first and second daemons comprises a set of instructions for storing data to and retrieving data from a ring buffer in the user space. 15. The computing device of claim 11, wherein the user space network stack is a separate process from the first daemon. 16. The computing device of claim 11, wherein the user space network stack is one of a plurality of pipeline stages executed at the first daemon. 17. The computing device of claim 11, wherein the second daemon is an application layer load balancer. 18. The computing device of claim 11, wherein the second daemon is a control plane process. 19. The computing device of claim 18, wherein the control plane process is for handling border gateway protocol (BGP), and the transported packets comprises a BGP packet comprising routing information. 20. The computing device of claim 11, wherein the first daemon is a datapath daemon that executes the plurality of pipeline stages in a run-to-completion thread.
A novel design of a gateway that handles traffic in and out of a network by using a datapath daemon is provided. The datapath daemon is a run-to-completion process that performs various data-plane packet-processing operations at the edge of the network. The datapath daemon dispatches packets to other processes or processing threads outside of the daemon by utilizing a user space network stack.1. A method comprising: receiving a packet from a physical network at a gateway of a logical network, the logical network comprising a set of logical entities as a data path for forwarding the packet to its destination, wherein an operating system of the gateway comprises a user space and a kernel space; and executing a plurality of pipeline stages at a first daemon for the received packet, the plurality of pipeline stages corresponding to logical entities along the data path, wherein the first daemon uses a second daemon to execute a particular pipeline stage by exporting a first packet to the second daemon, said exporting comprises using a network stack operating in the user space when transporting packets between the first and second daemons. 2. The method of claim 1, wherein the first daemon uses a second daemon to execute a particular pipeline stage by further importing a second packet from the second daemon by using the user space network stack. 3. The method of claim 1, wherein the operating system provides a network stack in the kernel space that is not used for transporting packets between the first and second daemons. 4. The method of claim 1, wherein transporting packets between the first and second daemons comprises storing data to and retrieving data from a ring buffer in the user space. 5. The method of claim 1, wherein the user space network stack is a separate process from the first daemon. 6. The method of claim 1, wherein the user space network stack is one of a plurality of pipeline stages executed at the first daemon. 7. The method of claim 1, wherein the second daemon is an application layer load balancer. 8. The method of claim 1, wherein the second daemon is a control plane process. 9. The method of claim 8, wherein the control plane process is for handling border gateway protocol (BGP), and the transported packets comprises a BGP packet comprising routing information. 10. The method of claim 1, wherein the first daemon is a datapath daemon that executes the plurality of pipeline stages in a run-to-completion thread. 11. A computing device comprising: a network interface controller (NIC) for receiving a packet from a physical communication medium; one or more processing units executing sets of instructions for: receiving a packet from a physical network at a gateway of a logical network, the logical network comprising a set of logical entities as a data path for forwarding the packet to its destination, wherein an operating system of the gateway comprises a user space and a kernel space; and executing a plurality of pipeline stages at a first daemon for the received packet, the plurality of pipeline stages corresponding to logical entities along the data path, wherein the first daemon uses a second daemon to execute a particular pipeline stage by exporting a first packet to the second daemon, said exporting comprises using a network stack operating in the user space when transporting packets between the first and second daemons. 12. The computing device of claim 11, wherein the first daemon uses a second daemon to execute a particular pipeline stage by further importing a second packet from the second daemon by using the user space network stack. 13. The computing device of claim 11, wherein the operating system provides a network stack in the kernel space that is not used for transporting packets between the first and second daemons. 14. The computing device of claim 11, wherein the set of instructions for transporting packets between the first and second daemons comprises a set of instructions for storing data to and retrieving data from a ring buffer in the user space. 15. The computing device of claim 11, wherein the user space network stack is a separate process from the first daemon. 16. The computing device of claim 11, wherein the user space network stack is one of a plurality of pipeline stages executed at the first daemon. 17. The computing device of claim 11, wherein the second daemon is an application layer load balancer. 18. The computing device of claim 11, wherein the second daemon is a control plane process. 19. The computing device of claim 18, wherein the control plane process is for handling border gateway protocol (BGP), and the transported packets comprises a BGP packet comprising routing information. 20. The computing device of claim 11, wherein the first daemon is a datapath daemon that executes the plurality of pipeline stages in a run-to-completion thread.
2,400
8,045
8,045
15,312,747
2,411
Certain aspects of the present disclosure relate to techniques and apparatus for reducing collisions between CDRX and paging operations.
1. A method for wireless communications by a user equipment (UE), comprising: entering a mode wherein the UE alternates between a listening period and a non-listening period while connected to a first radio access technology (RAT) network, wherein the listening period is determined based on an offset value assigned by the first RAT network; determining that a plurality of listening periods conflict with one or more paging intervals in a second RAT network; and taking action to obtain a new offset value in an attempt to avoid conflicts between one or more subsequent listening periods and the one or more paging intervals in the second RAT network. 2. The method of claim 1, wherein taking action to obtain a new offset value comprises taking action to disconnect from and reconnect to the first RAT network. 3. The method of claim 2, wherein taking action to disconnect from and reconnect to the first RAT network comprises declaring a radio link failure (RLF). 4. The method of claim 2, wherein taking action to disconnect from and reconnect to the first RAT network includes sending an RRC connection reestablishment request. 5. The method of claim 1, further comprising: determining that one or more subsequent listening periods conflict with one or more paging intervals in the second RAT network after taking action to obtain the new offset value; and in response, determining not to take action to obtain another new offset value. 6. The method of claim 1, wherein taking action to obtain a new offset value comprises transmitting a request to the first RAT network to assign a new offset value. 7. The method of claim 1, wherein the UE is a single-radio device. 8. The method of claim 1, wherein the mode is an RRC connected state discontinuous reception operation mode. 9.-33. (canceled) 34. An apparatus for wireless communications, comprising: a processing system configured to: enter a mode wherein the apparatus alternates between a listening period and a non-listening period while connected to a first radio access technology (RAT) network, wherein the listening period is determined based on an offset value assigned by the first RAT network, determine that a plurality of listening periods conflict with one or more paging intervals in a second RAT network, and take action to obtain a new offset value in an attempt to avoid conflicts between one or more subsequent listening periods and the one or more paging intervals in the second RAT network; and a memory coupled with the processing system. 35. The apparatus of claim 34, wherein the processing system is configured to take action to obtain a new offset value by taking action to disconnect from and reconnect to the first RAT network. 36. The apparatus of claim 35, wherein the processing system is configured to take action to disconnect from and reconnect to the first RAT network by declaring a radio link failure (RLF). 37. The apparatus of claim 35, wherein the processing system is configured to take action to disconnect from and reconnect to the first RAT network by sending an RRC connection reestablishment request. 38. The apparatus of claim 34, wherein the processing system is further configured to: determine that one or more subsequent listening periods conflict with one or more paging intervals in the second RAT network after taking action to obtain the new offset value; and in response, determine not to take action to obtain another new offset value. 39. The apparatus of claim 34, wherein the processing system is configured to take action to obtain a new offset value by causing the apparatus to transmit a request to the first RAT network to assign a new offset value. 40. The apparatus of claim 34, further comprising: a single radio. 41. The apparatus of claim 34, wherein the mode is an RRC connected state discontinuous reception operation mode. 42. An apparatus for wireless communications, comprising: means for entering a mode wherein the UE alternates between a listening period and a non-listening period while connected to a first radio access technology (RAT) network, wherein the listening period is determined based on an offset value assigned by the first RAT network; means for determining that a plurality of listening periods conflict with one or more paging intervals in a second RAT network; and means for taking action to obtain a new offset value in an attempt to avoid conflicts between one or more subsequent listening periods and the one or more paging intervals in the second RAT network. 43. The apparatus of claim 42, wherein the means for taking action to obtain a new offset value comprises means for taking action to disconnect from and reconnect to the first RAT network. 44. The apparatus of claim 43, wherein the means for taking action to disconnect from and reconnect to the first RAT network comprises means for declaring a radio link failure (RLF). 45. The apparatus of claim 43, wherein the means for taking action to disconnect from and reconnect to the first RAT network comprises means for sending an RRC connection reestablishment request.
Certain aspects of the present disclosure relate to techniques and apparatus for reducing collisions between CDRX and paging operations.1. A method for wireless communications by a user equipment (UE), comprising: entering a mode wherein the UE alternates between a listening period and a non-listening period while connected to a first radio access technology (RAT) network, wherein the listening period is determined based on an offset value assigned by the first RAT network; determining that a plurality of listening periods conflict with one or more paging intervals in a second RAT network; and taking action to obtain a new offset value in an attempt to avoid conflicts between one or more subsequent listening periods and the one or more paging intervals in the second RAT network. 2. The method of claim 1, wherein taking action to obtain a new offset value comprises taking action to disconnect from and reconnect to the first RAT network. 3. The method of claim 2, wherein taking action to disconnect from and reconnect to the first RAT network comprises declaring a radio link failure (RLF). 4. The method of claim 2, wherein taking action to disconnect from and reconnect to the first RAT network includes sending an RRC connection reestablishment request. 5. The method of claim 1, further comprising: determining that one or more subsequent listening periods conflict with one or more paging intervals in the second RAT network after taking action to obtain the new offset value; and in response, determining not to take action to obtain another new offset value. 6. The method of claim 1, wherein taking action to obtain a new offset value comprises transmitting a request to the first RAT network to assign a new offset value. 7. The method of claim 1, wherein the UE is a single-radio device. 8. The method of claim 1, wherein the mode is an RRC connected state discontinuous reception operation mode. 9.-33. (canceled) 34. An apparatus for wireless communications, comprising: a processing system configured to: enter a mode wherein the apparatus alternates between a listening period and a non-listening period while connected to a first radio access technology (RAT) network, wherein the listening period is determined based on an offset value assigned by the first RAT network, determine that a plurality of listening periods conflict with one or more paging intervals in a second RAT network, and take action to obtain a new offset value in an attempt to avoid conflicts between one or more subsequent listening periods and the one or more paging intervals in the second RAT network; and a memory coupled with the processing system. 35. The apparatus of claim 34, wherein the processing system is configured to take action to obtain a new offset value by taking action to disconnect from and reconnect to the first RAT network. 36. The apparatus of claim 35, wherein the processing system is configured to take action to disconnect from and reconnect to the first RAT network by declaring a radio link failure (RLF). 37. The apparatus of claim 35, wherein the processing system is configured to take action to disconnect from and reconnect to the first RAT network by sending an RRC connection reestablishment request. 38. The apparatus of claim 34, wherein the processing system is further configured to: determine that one or more subsequent listening periods conflict with one or more paging intervals in the second RAT network after taking action to obtain the new offset value; and in response, determine not to take action to obtain another new offset value. 39. The apparatus of claim 34, wherein the processing system is configured to take action to obtain a new offset value by causing the apparatus to transmit a request to the first RAT network to assign a new offset value. 40. The apparatus of claim 34, further comprising: a single radio. 41. The apparatus of claim 34, wherein the mode is an RRC connected state discontinuous reception operation mode. 42. An apparatus for wireless communications, comprising: means for entering a mode wherein the UE alternates between a listening period and a non-listening period while connected to a first radio access technology (RAT) network, wherein the listening period is determined based on an offset value assigned by the first RAT network; means for determining that a plurality of listening periods conflict with one or more paging intervals in a second RAT network; and means for taking action to obtain a new offset value in an attempt to avoid conflicts between one or more subsequent listening periods and the one or more paging intervals in the second RAT network. 43. The apparatus of claim 42, wherein the means for taking action to obtain a new offset value comprises means for taking action to disconnect from and reconnect to the first RAT network. 44. The apparatus of claim 43, wherein the means for taking action to disconnect from and reconnect to the first RAT network comprises means for declaring a radio link failure (RLF). 45. The apparatus of claim 43, wherein the means for taking action to disconnect from and reconnect to the first RAT network comprises means for sending an RRC connection reestablishment request.
2,400
8,046
8,046
14,071,294
2,467
In a communications system including a base station capable of altering a frequency bandwidth which is used for transmitting broadcast data for providing point-to-multipoint broadcasting communications service and which is used for transmitting individual communications data for providing point-to-point individual communications service, and a mobile terminal capable of altering a receivable bandwidth which is used for receiving at least the broadcast data and the individual communications data transmitted from the base station, decision processing of making a decision as to whether the mobile terminal can receive reception-desired content it desires to receive among contents provided by the broadcasting communications service is executed in accordance with a frequency occupying bandwidth used for transmitting the reception-desired content. Thus, the mobile terminal becomes able to make a decision as to whether it can receive particular E-MBMS content considering its own UE position.
1. (canceled) 2. A communication method of performing radio communication between a mobile terminal and a base station, the communication method comprising steps of: discontinuously transmitting data of a multimedia broadcast multicast service (MBMS); and discontinuously transmitting synchronization signals, wherein the data of the MBMS and the synchronization signals are transmitted at different time from each other. 3. A mobile communication system comprising: a mobile terminal; and a base station that performs radio communication with the mobile terminal, the base station having a first transmitter that discontinuously transmits data of a multimedia broadcast multicast service (MBMS) and a second transmitter that discontinuously transmits synchronization signals, wherein the first transmitter and the second transmitter transmit the data of the MBMS and the synchronization signals, respectively, at different time from each other. 4. A base station that performs radio communication with a mobile terminal, the base station comprising: a first transmitter that discontinuously transmits data of a multimedia broadcast multicast service (MBMS); and a second transmitter that discontinuously transmits synchronization signals, wherein the first transmitter and the second transmitter transmit the data of the MBMS and the synchronization signals, respectively, at different time from each other. 5. A mobile terminal that performs radio communication with a base station, the mobile terminal comprising: a first receiver that discontinuously receives data of a multimedia broadcast multicast service (MBMS); and a second receiver that discontinuously receives synchronization signals, wherein the first receiver and the second receiver receive the data of the MBMS and the synchronization signals, respectively, at different time from each other.
In a communications system including a base station capable of altering a frequency bandwidth which is used for transmitting broadcast data for providing point-to-multipoint broadcasting communications service and which is used for transmitting individual communications data for providing point-to-point individual communications service, and a mobile terminal capable of altering a receivable bandwidth which is used for receiving at least the broadcast data and the individual communications data transmitted from the base station, decision processing of making a decision as to whether the mobile terminal can receive reception-desired content it desires to receive among contents provided by the broadcasting communications service is executed in accordance with a frequency occupying bandwidth used for transmitting the reception-desired content. Thus, the mobile terminal becomes able to make a decision as to whether it can receive particular E-MBMS content considering its own UE position.1. (canceled) 2. A communication method of performing radio communication between a mobile terminal and a base station, the communication method comprising steps of: discontinuously transmitting data of a multimedia broadcast multicast service (MBMS); and discontinuously transmitting synchronization signals, wherein the data of the MBMS and the synchronization signals are transmitted at different time from each other. 3. A mobile communication system comprising: a mobile terminal; and a base station that performs radio communication with the mobile terminal, the base station having a first transmitter that discontinuously transmits data of a multimedia broadcast multicast service (MBMS) and a second transmitter that discontinuously transmits synchronization signals, wherein the first transmitter and the second transmitter transmit the data of the MBMS and the synchronization signals, respectively, at different time from each other. 4. A base station that performs radio communication with a mobile terminal, the base station comprising: a first transmitter that discontinuously transmits data of a multimedia broadcast multicast service (MBMS); and a second transmitter that discontinuously transmits synchronization signals, wherein the first transmitter and the second transmitter transmit the data of the MBMS and the synchronization signals, respectively, at different time from each other. 5. A mobile terminal that performs radio communication with a base station, the mobile terminal comprising: a first receiver that discontinuously receives data of a multimedia broadcast multicast service (MBMS); and a second receiver that discontinuously receives synchronization signals, wherein the first receiver and the second receiver receive the data of the MBMS and the synchronization signals, respectively, at different time from each other.
2,400
8,047
8,047
12,809,299
2,483
Apparatus for inspection includes an imaging assembly, including a plurality of cameras, which are mounted in different, respective locations in the imaging assembly and are configured to capture respective images of a sample. A motion assembly is configured to move at least one of the imaging assembly and the sample so as to cause the imaging assembly to scan the sample with a scan accuracy that is limited by a predetermined position tolerance. An image processor is coupled to receive and process the images captured by the cameras so as to locate a defect in the sample with a position accuracy that is finer than the position tolerance.
1. Apparatus for inspection, comprising: an imaging assembly, comprising a plurality of cameras, which are mounted in different, respective locations in the imaging assembly and are configured to capture respective images of a sample; a motion assembly, which is configured to move at least one of the imaging assembly and the sample so as to cause the imaging assembly to scan the sample with a scan accuracy that is limited by a predetermined position tolerance; and an image processor, which is coupled to receive and process the images captured by the cameras so as to locate a defect in the sample with a position accuracy that is finer than the position tolerance. 2. The apparatus according to claim 1, wherein each of the respective images contains a respective area of the sample, having a region of overlap with one or more neighboring images captured by the cameras in the imaging assembly, and wherein the image processor is configured to register the respective images with one another using the region of overlap in order to compute a position of the defect. 3. The apparatus according to claim 2, wherein the neighboring images have respective relative offsets that vary within the position tolerance of the motion assembly, and wherein the image processor is configured to compute the respective relative offsets. 4. The apparatus according to claim 3, wherein the images comprise pixels having a pitch, and wherein the image processor is configured to compute the respective relative offsets with a precision that is finer than the pitch, and to combine the images using the respective relative offsets to produce a combined image having a resolution finer than the pitch. 5. The apparatus according to claim 2, wherein the images comprise pixels having pixel values and have a given signal/noise ratio (SNR), and wherein the image processor is configured to sum the pixel values of the neighboring images in the region of overlap in order to produce a combined image having a greater SNR than the given SNR. 6. The apparatus according to claim 2, wherein the image processor is configured to recover a virtual position clock responsively to a periodic pattern on the sample that appears in the respective images captured by at least one of the cameras and to relative movement between the sample and the imaging assembly that is applied by the motion assembly, and to use the virtual position clock in registering the respective images with one another. 7. The apparatus according to claim 1, and comprising at least one light source, which is configured to illuminate the sample in at least first and second different illumination configurations during a scan of the sample by the imaging assembly, so that the images captured by the cameras comprise at least first and second sets of the images captured respectively in the first and second illumination configurations at different positions in the scan. 8. The apparatus according to claim 1, wherein the motion assembly is configured to move the sample relative to the imaging assembly without gripping the sample. 9. The apparatus according to claim 1, wherein the plurality of the cameras comprises at least twenty cameras. 10. The apparatus according to claim 9, wherein the plurality of the cameras comprises at least one hundred cameras. 11. The apparatus according to claim 1, wherein the cameras in the imaging assembly are arranged in respective positions in at least one row along a direction transverse to a scan direction of the motion assembly so that the images captured by each of the cameras as the imaging assembly scans the sample cover a respective swath of the sample along a scan direction of the motion assembly, and so that the swaths together cover an entire active area of the sample in a single scan of the imaging assembly across the sample. 12. The apparatus according to claim 11, wherein the at least one row comprises at least first and second rows, and wherein the respective positions of the cameras in the first row are staggered in the transverse direction relative to the positions of the cameras in the second row. 13. The apparatus according to claim 1, wherein the motion assembly is configured to cause the imaging assembly to scan the sample in a scan direction, and wherein the apparatus comprises at least one post-inspection camera and a transverse motion unit, which is configured to shift the at least one post-inspection camera in a direction transverse to the scan direction while the imaging assembly scans the sample so that the at least one post-inspection camera images an area of the defect located by the image processor. 14. The apparatus according to claim 13, wherein the image processor is configured to compute an error signal, indicative of a deviation of movement of the motion assembly relative to an ideal motion model, and to drive the at least one post-inspection camera to image the area of the defect responsively to the error signal. 15. A method for inspection, comprising: scanning a sample using an imaging assembly, comprising a plurality of cameras, which are mounted in different, respective locations in the imaging assembly, with a scan accuracy that is limited by a predetermined position tolerance; capturing respective images of the sample using the cameras while scanning the sample; and processing the images captured by the cameras so as to locate a defect in the sample with a position accuracy that is finer than the position tolerance. 16. The method according to claim 15, wherein each of the respective images contains a respective area of the sample, having a region of overlap with one or more neighboring images captured by the cameras in the imaging assembly, and wherein processing the images comprises registering the respective images with one another using the region of overlap in order to compute a position of the defect. 17. The method according to claim 16, wherein the neighboring images have respective relative offsets that vary within the position tolerance of the motion assembly, and wherein registering the respective images comprises computing the respective relative offsets. 18. The method according to claim 17, wherein the images comprise pixels having a pitch, and wherein computing the respective relative offsets comprises determining the respective relative offsets with a precision that is finer than the pitch, and wherein processing the images comprises combining the images using the respective relative offsets to produce a combined image having a resolution finer than the pitch. 19. The method according to claim 16, wherein the images comprise pixels having pixel values and have a given signal/noise ratio (SNR), and wherein processing the images comprises summing the pixel values of the neighboring images in the region of overlap in order to produce a combined image having a greater SNR than the given SNR. 20. The method according to claim 16, wherein processing the images comprises recovering a virtual position clock responsively to a periodic pattern on the sample that appears in the respective images captured by at least one of the cameras and to relative movement between the sample and the imaging assembly while scanning the sample, using the virtual position clock in registering the respective images with one another. 21. The method according to claim 15, and comprising illuminating the sample in at least first and second different illumination configurations during a scan of the sample by the imaging assembly, so that the images captured by the cameras comprise at least first and second sets of the images captured respectively in the first and second illumination configurations at different positions in the scan. 22. The method according to claim 15, wherein scanning the sample comprises moving the sample relative to the imaging assembly without gripping the sample. 23. The method according to claim 15, wherein the plurality of the cameras comprises at least twenty cameras. 24. The method according to claim 15, wherein the cameras in the imaging assembly are arranged in respective positions in at least one row along a direction transverse to a scan direction of the imaging assembly so that the images captured by each of the cameras while scanning the sample cover a respective swath of the sample along the scan direction, and so that the swaths together cover an entire active area of the sample in a single scan across the sample. 25. The method according to claim 24, wherein the at least one row comprises at least first and second rows, and wherein the respective positions of the cameras in the first row are staggered in the transverse direction relative to the positions of the cameras in the second row. 26. The method according to claim 15, wherein the sample is scanned by the imaging assembly in a scan direction, and wherein the method comprises shifting at least one post-inspection camera in a direction transverse to the scan direction while the imaging assembly scans the sample so as to position the at least one post-inspection camera over an area of the defect located by the image processor, and capturing an image of the area of the defect using the at least one post-inspection camera. 27. The method according to claim 26, wherein capturing the image comprises computing an error signal that is indicative of a deviation of movement of the imaging assembly relative to an ideal motion model, and driving the at least one post-inspection camera to image the area of the defect responsively to the error signal.
Apparatus for inspection includes an imaging assembly, including a plurality of cameras, which are mounted in different, respective locations in the imaging assembly and are configured to capture respective images of a sample. A motion assembly is configured to move at least one of the imaging assembly and the sample so as to cause the imaging assembly to scan the sample with a scan accuracy that is limited by a predetermined position tolerance. An image processor is coupled to receive and process the images captured by the cameras so as to locate a defect in the sample with a position accuracy that is finer than the position tolerance.1. Apparatus for inspection, comprising: an imaging assembly, comprising a plurality of cameras, which are mounted in different, respective locations in the imaging assembly and are configured to capture respective images of a sample; a motion assembly, which is configured to move at least one of the imaging assembly and the sample so as to cause the imaging assembly to scan the sample with a scan accuracy that is limited by a predetermined position tolerance; and an image processor, which is coupled to receive and process the images captured by the cameras so as to locate a defect in the sample with a position accuracy that is finer than the position tolerance. 2. The apparatus according to claim 1, wherein each of the respective images contains a respective area of the sample, having a region of overlap with one or more neighboring images captured by the cameras in the imaging assembly, and wherein the image processor is configured to register the respective images with one another using the region of overlap in order to compute a position of the defect. 3. The apparatus according to claim 2, wherein the neighboring images have respective relative offsets that vary within the position tolerance of the motion assembly, and wherein the image processor is configured to compute the respective relative offsets. 4. The apparatus according to claim 3, wherein the images comprise pixels having a pitch, and wherein the image processor is configured to compute the respective relative offsets with a precision that is finer than the pitch, and to combine the images using the respective relative offsets to produce a combined image having a resolution finer than the pitch. 5. The apparatus according to claim 2, wherein the images comprise pixels having pixel values and have a given signal/noise ratio (SNR), and wherein the image processor is configured to sum the pixel values of the neighboring images in the region of overlap in order to produce a combined image having a greater SNR than the given SNR. 6. The apparatus according to claim 2, wherein the image processor is configured to recover a virtual position clock responsively to a periodic pattern on the sample that appears in the respective images captured by at least one of the cameras and to relative movement between the sample and the imaging assembly that is applied by the motion assembly, and to use the virtual position clock in registering the respective images with one another. 7. The apparatus according to claim 1, and comprising at least one light source, which is configured to illuminate the sample in at least first and second different illumination configurations during a scan of the sample by the imaging assembly, so that the images captured by the cameras comprise at least first and second sets of the images captured respectively in the first and second illumination configurations at different positions in the scan. 8. The apparatus according to claim 1, wherein the motion assembly is configured to move the sample relative to the imaging assembly without gripping the sample. 9. The apparatus according to claim 1, wherein the plurality of the cameras comprises at least twenty cameras. 10. The apparatus according to claim 9, wherein the plurality of the cameras comprises at least one hundred cameras. 11. The apparatus according to claim 1, wherein the cameras in the imaging assembly are arranged in respective positions in at least one row along a direction transverse to a scan direction of the motion assembly so that the images captured by each of the cameras as the imaging assembly scans the sample cover a respective swath of the sample along a scan direction of the motion assembly, and so that the swaths together cover an entire active area of the sample in a single scan of the imaging assembly across the sample. 12. The apparatus according to claim 11, wherein the at least one row comprises at least first and second rows, and wherein the respective positions of the cameras in the first row are staggered in the transverse direction relative to the positions of the cameras in the second row. 13. The apparatus according to claim 1, wherein the motion assembly is configured to cause the imaging assembly to scan the sample in a scan direction, and wherein the apparatus comprises at least one post-inspection camera and a transverse motion unit, which is configured to shift the at least one post-inspection camera in a direction transverse to the scan direction while the imaging assembly scans the sample so that the at least one post-inspection camera images an area of the defect located by the image processor. 14. The apparatus according to claim 13, wherein the image processor is configured to compute an error signal, indicative of a deviation of movement of the motion assembly relative to an ideal motion model, and to drive the at least one post-inspection camera to image the area of the defect responsively to the error signal. 15. A method for inspection, comprising: scanning a sample using an imaging assembly, comprising a plurality of cameras, which are mounted in different, respective locations in the imaging assembly, with a scan accuracy that is limited by a predetermined position tolerance; capturing respective images of the sample using the cameras while scanning the sample; and processing the images captured by the cameras so as to locate a defect in the sample with a position accuracy that is finer than the position tolerance. 16. The method according to claim 15, wherein each of the respective images contains a respective area of the sample, having a region of overlap with one or more neighboring images captured by the cameras in the imaging assembly, and wherein processing the images comprises registering the respective images with one another using the region of overlap in order to compute a position of the defect. 17. The method according to claim 16, wherein the neighboring images have respective relative offsets that vary within the position tolerance of the motion assembly, and wherein registering the respective images comprises computing the respective relative offsets. 18. The method according to claim 17, wherein the images comprise pixels having a pitch, and wherein computing the respective relative offsets comprises determining the respective relative offsets with a precision that is finer than the pitch, and wherein processing the images comprises combining the images using the respective relative offsets to produce a combined image having a resolution finer than the pitch. 19. The method according to claim 16, wherein the images comprise pixels having pixel values and have a given signal/noise ratio (SNR), and wherein processing the images comprises summing the pixel values of the neighboring images in the region of overlap in order to produce a combined image having a greater SNR than the given SNR. 20. The method according to claim 16, wherein processing the images comprises recovering a virtual position clock responsively to a periodic pattern on the sample that appears in the respective images captured by at least one of the cameras and to relative movement between the sample and the imaging assembly while scanning the sample, using the virtual position clock in registering the respective images with one another. 21. The method according to claim 15, and comprising illuminating the sample in at least first and second different illumination configurations during a scan of the sample by the imaging assembly, so that the images captured by the cameras comprise at least first and second sets of the images captured respectively in the first and second illumination configurations at different positions in the scan. 22. The method according to claim 15, wherein scanning the sample comprises moving the sample relative to the imaging assembly without gripping the sample. 23. The method according to claim 15, wherein the plurality of the cameras comprises at least twenty cameras. 24. The method according to claim 15, wherein the cameras in the imaging assembly are arranged in respective positions in at least one row along a direction transverse to a scan direction of the imaging assembly so that the images captured by each of the cameras while scanning the sample cover a respective swath of the sample along the scan direction, and so that the swaths together cover an entire active area of the sample in a single scan across the sample. 25. The method according to claim 24, wherein the at least one row comprises at least first and second rows, and wherein the respective positions of the cameras in the first row are staggered in the transverse direction relative to the positions of the cameras in the second row. 26. The method according to claim 15, wherein the sample is scanned by the imaging assembly in a scan direction, and wherein the method comprises shifting at least one post-inspection camera in a direction transverse to the scan direction while the imaging assembly scans the sample so as to position the at least one post-inspection camera over an area of the defect located by the image processor, and capturing an image of the area of the defect using the at least one post-inspection camera. 27. The method according to claim 26, wherein capturing the image comprises computing an error signal that is indicative of a deviation of movement of the imaging assembly relative to an ideal motion model, and driving the at least one post-inspection camera to image the area of the defect responsively to the error signal.
2,400
8,048
8,048
14,309,291
2,492
An encryption key may be generated based on personalized unit data associated with a software download recipient, for example, a secure processor. In some aspects, the secure processor may generate a decryption key based on its personalized unit data, and a software download may be performed between the software provider and the secure processor using the generated encryption keys. The secure processor may then decrypt and load the software for execution. The encryption and decryption key generation may also be based on a sequence number or other data indicating one or more previous software downloads at the secure processor. Using the sequence number or other data, sequences of multiple encryption and/or decryption keys may be generated to support multiple software downloads to a secure processor.
1. (canceled) 2. A method comprising: retrieving, by a secure device, personalized unit data and a sequence number stored in a memory of the secure device; generating, by the secure device, a first decryption key based on the personalized unit data and the sequence number, wherein generating the first decryption key comprises executing at least a portion of a key generation algorithm a number of times based on the sequence number; and decrypting, by the secure device, first content using the first decryption key. 3. The method of claim 2, further comprising: after decrypting the first content using the first decryption key, changing the sequence number stored in the memory of the secure device to an updated sequence number; receiving second content; in response to receiving the second content, generating a second decryption key based on the personalized unit data and the updated sequence number, the generating comprising executing at least a portion of the key generation algorithm a number of times based on the updated sequence number, wherein the second decryption key is different than the first decryption key; and decrypting the second content using the second decryption key. 4. The method of claim 3, wherein generating the first decryption key comprises generating a predetermined number (N) of decryption keys using the key generation algorithm and using the Nth generated decryption key as the first decryption key, and wherein generating the second decryption key comprises generating N−1 decryption keys using the key generation algorithm and using the Nth−1 generated decryption key as the second decryption key. 5. The method of claim 2, further comprising: determining that the decryption of the first content using the first decryption key was not successful; determining that the sequence number in the memory of the secure device should not be changed, based on the determination that the decryption of the first content using the first decryption key was not successful; receiving second content; and decrypting the second content using the first decryption key. 6. The method of claim 2, wherein the personalized unit data is based on a serial number of the secure device. 7. The method of claim 2, further comprising: determining, by the secure device, that the decryption of the first content using the first decryption key was successful; and in response to determining that the decryption of the first content using the first decryption key was successful, incrementing or decrementing the sequence number stored within the memory of the secure device. 8. The method of claim 2, wherein the first content corresponds to a first software code image, and wherein the method further comprises: executing the first software code image at the secure device; determining, by the secure device, that the execution of the first code image was successful; and in response to determining that the execution of the first code image was successful, incrementing or decrementing the sequence number stored within the memory of the secure device. 9. The method of claim 2, further comprising: incrementing or decrementing the sequence number stored within the memory of the secure device, wherein the sequence number is incremented or decremented regardless of whether the decryption of the first content using the first decryption key was successful. 10. The method of claim 2, wherein the personalized unit data is based on at least a type or version of software currently loaded on the secure device. 11. A method comprising: retrieving from a secure memory, by a computing device, first personalized unit data and a first sequence number associated with a first secure processor; generating, by the computing device, a first encryption key based on the first personalized unit data and the first sequence number, wherein generating the first encryption key comprises executing at least a portion of a key generation algorithm a number of times based on the first sequence number; and encrypting, by the computing device, a first content download using the first encryption key; and transmitting, by the computing device, the encrypted first content download to the first secure processor. 12. The method of claim 11, further comprising: retrieving second personalized unit data associated with a second secure processor; generating a second encryption key based on the second personalized unit data associated with the second secure processor, wherein the second encryption key is different from the first encryption key; encrypting the first content download using the second encryption key; and transmitting the first content download encrypted with the second encryption key to the second secure processor. 13. The method claim 11, further comprising: after transmitting the encrypted first content download to the first secure processor, changing the first sequence number to an updated first sequence number; and storing at the computing device the updated first sequence number in a memory, the updated first sequence number corresponding to the number of previous content downloads performed at the first secure processor. 14. The method of claim 13, further comprising: generating a second encryption key based on the personalized unit data associated with the first secure processor and the updated first sequence number, the generating comprising iteratively executing at least a portion of the key generation algorithm a number of times based on the updated first sequence number, wherein the second encryption key is different than the first encryption key; encrypting a second content download using the second encryption key; and transmitting the encrypted second content download to the first secure processor. 15. The method of claim 11, further comprising: storing, at the computing device, a plurality of unique personalized unit data and a plurality of content download sequence numbers, wherein each unique personalized unit data and each content download sequence number correspond to one of a plurality of secure processors associated with the computing device. 16. The method of claim 11, further comprising: receiving, by the computing device, a confirmation message from the first secure processor, the confirmation message indicating that the encrypted first content was successfully decrypted by the first secure processor; and in response to receiving the confirmation message indicating that the encrypted first content was successfully decrypted by the first secure processor, incrementing or decrementing the first sequence number associated with the first secure processor in a memory of the computing device. 17. The method of claim 11, further comprising: receiving, by the computing device, a confirmation message from the first secure processor, the confirmation message indicating that the encrypted first content was successfully executed by the first secure processor; and in response to receiving the confirmation message indicating that the encrypted first content was successfully executed by the first secure processor, incrementing or decrementing, in a memory of the computing device, the first sequence number associated with the first secure processor. 18. The method of claim 11, further comprising: incrementing or decrementing, in a memory of the computing device, the first sequence number associated with the first secure processor, wherein the first sequence number is incremented or decremented regardless of whether the encrypted first content was successfully decrypted or successfully executed by the first secure processor. 19. A method, comprising: encrypting, by a control server, a first content download for a first secure processor, wherein the encrypting is based on a first sequence number associated with the first secure processor; transmitting, by the control server, the encrypted first content download to the first secure processor; receiving, by the control server, a confirmation message indicating that the encrypted first content download was successfully executed by the first secure processor; and in response to receiving the confirmation message, updating the first sequence number corresponding to the first secure processor within a secure memory of the control server. 20. The method of claim 19, wherein encrypting the first content download comprises: generating a first encryption key based on the first sequence number and based on first personalized unit data associated with the first secure processor, said generating comprising executing at least a portion of a key generation algorithm a number of times based on the first sequence number; and encrypting the first content download using the first encryption key. 21. The method of claim 19, wherein updating the first sequence number comprises incrementing or decrementing the first sequence number within the secure memory of the control server, in response to receiving the confirmation message.
An encryption key may be generated based on personalized unit data associated with a software download recipient, for example, a secure processor. In some aspects, the secure processor may generate a decryption key based on its personalized unit data, and a software download may be performed between the software provider and the secure processor using the generated encryption keys. The secure processor may then decrypt and load the software for execution. The encryption and decryption key generation may also be based on a sequence number or other data indicating one or more previous software downloads at the secure processor. Using the sequence number or other data, sequences of multiple encryption and/or decryption keys may be generated to support multiple software downloads to a secure processor.1. (canceled) 2. A method comprising: retrieving, by a secure device, personalized unit data and a sequence number stored in a memory of the secure device; generating, by the secure device, a first decryption key based on the personalized unit data and the sequence number, wherein generating the first decryption key comprises executing at least a portion of a key generation algorithm a number of times based on the sequence number; and decrypting, by the secure device, first content using the first decryption key. 3. The method of claim 2, further comprising: after decrypting the first content using the first decryption key, changing the sequence number stored in the memory of the secure device to an updated sequence number; receiving second content; in response to receiving the second content, generating a second decryption key based on the personalized unit data and the updated sequence number, the generating comprising executing at least a portion of the key generation algorithm a number of times based on the updated sequence number, wherein the second decryption key is different than the first decryption key; and decrypting the second content using the second decryption key. 4. The method of claim 3, wherein generating the first decryption key comprises generating a predetermined number (N) of decryption keys using the key generation algorithm and using the Nth generated decryption key as the first decryption key, and wherein generating the second decryption key comprises generating N−1 decryption keys using the key generation algorithm and using the Nth−1 generated decryption key as the second decryption key. 5. The method of claim 2, further comprising: determining that the decryption of the first content using the first decryption key was not successful; determining that the sequence number in the memory of the secure device should not be changed, based on the determination that the decryption of the first content using the first decryption key was not successful; receiving second content; and decrypting the second content using the first decryption key. 6. The method of claim 2, wherein the personalized unit data is based on a serial number of the secure device. 7. The method of claim 2, further comprising: determining, by the secure device, that the decryption of the first content using the first decryption key was successful; and in response to determining that the decryption of the first content using the first decryption key was successful, incrementing or decrementing the sequence number stored within the memory of the secure device. 8. The method of claim 2, wherein the first content corresponds to a first software code image, and wherein the method further comprises: executing the first software code image at the secure device; determining, by the secure device, that the execution of the first code image was successful; and in response to determining that the execution of the first code image was successful, incrementing or decrementing the sequence number stored within the memory of the secure device. 9. The method of claim 2, further comprising: incrementing or decrementing the sequence number stored within the memory of the secure device, wherein the sequence number is incremented or decremented regardless of whether the decryption of the first content using the first decryption key was successful. 10. The method of claim 2, wherein the personalized unit data is based on at least a type or version of software currently loaded on the secure device. 11. A method comprising: retrieving from a secure memory, by a computing device, first personalized unit data and a first sequence number associated with a first secure processor; generating, by the computing device, a first encryption key based on the first personalized unit data and the first sequence number, wherein generating the first encryption key comprises executing at least a portion of a key generation algorithm a number of times based on the first sequence number; and encrypting, by the computing device, a first content download using the first encryption key; and transmitting, by the computing device, the encrypted first content download to the first secure processor. 12. The method of claim 11, further comprising: retrieving second personalized unit data associated with a second secure processor; generating a second encryption key based on the second personalized unit data associated with the second secure processor, wherein the second encryption key is different from the first encryption key; encrypting the first content download using the second encryption key; and transmitting the first content download encrypted with the second encryption key to the second secure processor. 13. The method claim 11, further comprising: after transmitting the encrypted first content download to the first secure processor, changing the first sequence number to an updated first sequence number; and storing at the computing device the updated first sequence number in a memory, the updated first sequence number corresponding to the number of previous content downloads performed at the first secure processor. 14. The method of claim 13, further comprising: generating a second encryption key based on the personalized unit data associated with the first secure processor and the updated first sequence number, the generating comprising iteratively executing at least a portion of the key generation algorithm a number of times based on the updated first sequence number, wherein the second encryption key is different than the first encryption key; encrypting a second content download using the second encryption key; and transmitting the encrypted second content download to the first secure processor. 15. The method of claim 11, further comprising: storing, at the computing device, a plurality of unique personalized unit data and a plurality of content download sequence numbers, wherein each unique personalized unit data and each content download sequence number correspond to one of a plurality of secure processors associated with the computing device. 16. The method of claim 11, further comprising: receiving, by the computing device, a confirmation message from the first secure processor, the confirmation message indicating that the encrypted first content was successfully decrypted by the first secure processor; and in response to receiving the confirmation message indicating that the encrypted first content was successfully decrypted by the first secure processor, incrementing or decrementing the first sequence number associated with the first secure processor in a memory of the computing device. 17. The method of claim 11, further comprising: receiving, by the computing device, a confirmation message from the first secure processor, the confirmation message indicating that the encrypted first content was successfully executed by the first secure processor; and in response to receiving the confirmation message indicating that the encrypted first content was successfully executed by the first secure processor, incrementing or decrementing, in a memory of the computing device, the first sequence number associated with the first secure processor. 18. The method of claim 11, further comprising: incrementing or decrementing, in a memory of the computing device, the first sequence number associated with the first secure processor, wherein the first sequence number is incremented or decremented regardless of whether the encrypted first content was successfully decrypted or successfully executed by the first secure processor. 19. A method, comprising: encrypting, by a control server, a first content download for a first secure processor, wherein the encrypting is based on a first sequence number associated with the first secure processor; transmitting, by the control server, the encrypted first content download to the first secure processor; receiving, by the control server, a confirmation message indicating that the encrypted first content download was successfully executed by the first secure processor; and in response to receiving the confirmation message, updating the first sequence number corresponding to the first secure processor within a secure memory of the control server. 20. The method of claim 19, wherein encrypting the first content download comprises: generating a first encryption key based on the first sequence number and based on first personalized unit data associated with the first secure processor, said generating comprising executing at least a portion of a key generation algorithm a number of times based on the first sequence number; and encrypting the first content download using the first encryption key. 21. The method of claim 19, wherein updating the first sequence number comprises incrementing or decrementing the first sequence number within the secure memory of the control server, in response to receiving the confirmation message.
2,400
8,049
8,049
15,715,903
2,488
An encoder is configured to encode a representation of a current picture of a video stream of multiple pictures. The encoder is further configured to encode, for each of a plurality of reference pictures included in a buffer description for the current picture, a respective one-bit flag according to one of two available values for the one-bit flag. The two available values for the one-bit flag include a first value explicitly indicating to a decoder to include the reference picture in a reference picture list for decoding the current picture. The two available values for the one-bit flag further include a second value explicitly indicating to the decoder not to include the reference picture in the reference picture list for decoding the current picture. The encoder is further configured to output the representation of the current picture and the one-bit flags.
1. An encoder comprising a processor, wherein the processor is configured to: encode a representation of a current picture of a video stream of multiple pictures; encode, for each of a plurality of reference pictures included in a buffer description for the current picture, a respective one-bit flag according to one of two available values for the one-bit flag, the two available values for the one-bit flag comprising: a first value explicitly indicating to a decoder to include the reference picture in a reference picture list for decoding the current picture; and a second value explicitly indicating to the decoder not to include the reference picture in the reference picture list for decoding the current picture; output the representation of the current picture and the one-bit flags. 2. The encoder of claim 1, wherein to encode the one-bit flags, the processor is configured to set the one-bit flag corresponding to a first reference picture of the plurality of reference pictures to the second value responsive to determining that a layer identity of the first reference picture is higher than a layer identity of the current picture. 3. The encoder of claim 1, wherein to encode the one-bit flags, the processor is configured to set the one-bit flag corresponding to a second reference picture of the plurality of reference pictures to the first value responsive to determining that a layer identity of the second reference picture is not higher than a layer identity of the current picture. 4. The encoder of claim 3, wherein the processor is configured to set the one-bit flag corresponding to the second reference picture to the first value in further response to the second reference picture having a quantization parameter higher than a given threshold. 5. The encoder of claim 1, wherein the first value and second value are “1” and “0,” respectively. 6. The encoder of claim 1, wherein to output the representation of the current picture and the one-bit flags, the processor is configured to output the one-bit flags in a slice header of the representation of the current picture. 7. The encoder of claim 1, wherein to output the representation of the current picture and the one-bit flags, the processor is configured to output the one-bit flags in a sequence parameter set external from the representation of the current picture. 8. The encoder of claim 1, wherein to output the representation of the current picture and the one-bit flags, the processor is configured to output the one-bit flags in a picture parameter set external from the representation of the current picture. 9. The encoder of claim 1, wherein to output the one-bit flags, the processor is configured to indicate to the decoder that a reference picture, corresponding to a one-bit flag set to the first value and missing from a decoded picture buffer of the decoder, has been unintentionally lost. 10. The encoder of claim 1, wherein to output the one-bit flags, the processor is configured to indicate to the decoder that a reference picture, corresponding to a one-bit flag set to the second value and missing from a decoded picture buffer of the decoder, has been correctly removed from the decoded picture buffer. 11. A method of picture encoding, implemented by an encoder, the method comprising: encoding a representation of a current picture of a video stream of multiple pictures; encoding, for each of a plurality of reference pictures included in a buffer description for the current picture, a respective one-bit flag according to one of two available values for the one-bit flag, the two available values for the one-bit flag comprising: a first value explicitly indicating to a decoder to include the reference picture in a reference picture list for decoding the current picture; and a second value explicitly indicating to the decoder not to include the reference picture in the reference picture list for decoding the current picture; outputting the representation of the current picture and the one-bit flags. 12. The method of claim 11, wherein encoding the one-bit flags comprises setting the one-bit flag corresponding to a first reference picture of the plurality of reference pictures to the second value responsive to determining that a layer identity of the first reference picture is higher than a layer identity of the current picture. 13. The method of claim 11, wherein encoding the one-bit flags comprises setting the one-bit flag corresponding to a second reference picture of the plurality of reference pictures to the first value responsive to determining that a layer identity of the second reference picture is not higher than a layer identity of the current picture. 14. The method of claim 13, wherein setting the one-bit flag corresponding to the second reference picture to the first value is in further response to the second reference picture having a quantization parameter higher than a given threshold. 15. The method of claim 11, wherein the first value and second value are “1” and “0,” respectively. 16. The method of claim 11, wherein outputting the representation of the current picture and the one-bit flags comprises outputting the one-bit flags in a slice header of the representation of the current picture. 17. The method of claim 11, wherein outputting the representation of the current picture and the one-bit flags comprises outputting the one-bit flags in a sequence parameter set external from the representation of the current picture. 18. The method of claim 11, wherein outputting the representation of the current picture and the one-bit flags comprises outputting the one-bit flags in a picture parameter set external from the representation of the current picture. 19. The method of claim 11, wherein outputting the one-bit flags comprises indicating to the decoder that a reference picture, corresponding to a one-bit flag set to the first value and missing from a decoded picture buffer of the decoder, has been unintentionally lost. 20. The method of claim 11, wherein outputting the one-bit flags comprises indicating to the decoder that a reference picture, corresponding to a one-bit flag set to the second value and missing from a decoded picture buffer of the decoder, has been correctly removed from the decoded picture buffer. 21. A non-transitory computer readable medium storing a computer program product for controlling a programmable encoder, the computer program product comprising software instructions that, when run by the programmable encoder, cause the programmable encoder to: encode a representation of a current picture of a video stream of multiple pictures; encode, for each of a plurality of reference pictures included in a buffer description for the current picture, a respective one-bit flag according to one of two available values for the one-bit flag, the two available values for the one-bit flag comprising: a first value explicitly indicating to a decoder to include the reference picture in a reference picture list for decoding the current picture; and a second value explicitly indicating to the decoder not to include the reference picture in the reference picture list for decoding the current picture; output the representation of the current picture and the one-bit flags.
An encoder is configured to encode a representation of a current picture of a video stream of multiple pictures. The encoder is further configured to encode, for each of a plurality of reference pictures included in a buffer description for the current picture, a respective one-bit flag according to one of two available values for the one-bit flag. The two available values for the one-bit flag include a first value explicitly indicating to a decoder to include the reference picture in a reference picture list for decoding the current picture. The two available values for the one-bit flag further include a second value explicitly indicating to the decoder not to include the reference picture in the reference picture list for decoding the current picture. The encoder is further configured to output the representation of the current picture and the one-bit flags.1. An encoder comprising a processor, wherein the processor is configured to: encode a representation of a current picture of a video stream of multiple pictures; encode, for each of a plurality of reference pictures included in a buffer description for the current picture, a respective one-bit flag according to one of two available values for the one-bit flag, the two available values for the one-bit flag comprising: a first value explicitly indicating to a decoder to include the reference picture in a reference picture list for decoding the current picture; and a second value explicitly indicating to the decoder not to include the reference picture in the reference picture list for decoding the current picture; output the representation of the current picture and the one-bit flags. 2. The encoder of claim 1, wherein to encode the one-bit flags, the processor is configured to set the one-bit flag corresponding to a first reference picture of the plurality of reference pictures to the second value responsive to determining that a layer identity of the first reference picture is higher than a layer identity of the current picture. 3. The encoder of claim 1, wherein to encode the one-bit flags, the processor is configured to set the one-bit flag corresponding to a second reference picture of the plurality of reference pictures to the first value responsive to determining that a layer identity of the second reference picture is not higher than a layer identity of the current picture. 4. The encoder of claim 3, wherein the processor is configured to set the one-bit flag corresponding to the second reference picture to the first value in further response to the second reference picture having a quantization parameter higher than a given threshold. 5. The encoder of claim 1, wherein the first value and second value are “1” and “0,” respectively. 6. The encoder of claim 1, wherein to output the representation of the current picture and the one-bit flags, the processor is configured to output the one-bit flags in a slice header of the representation of the current picture. 7. The encoder of claim 1, wherein to output the representation of the current picture and the one-bit flags, the processor is configured to output the one-bit flags in a sequence parameter set external from the representation of the current picture. 8. The encoder of claim 1, wherein to output the representation of the current picture and the one-bit flags, the processor is configured to output the one-bit flags in a picture parameter set external from the representation of the current picture. 9. The encoder of claim 1, wherein to output the one-bit flags, the processor is configured to indicate to the decoder that a reference picture, corresponding to a one-bit flag set to the first value and missing from a decoded picture buffer of the decoder, has been unintentionally lost. 10. The encoder of claim 1, wherein to output the one-bit flags, the processor is configured to indicate to the decoder that a reference picture, corresponding to a one-bit flag set to the second value and missing from a decoded picture buffer of the decoder, has been correctly removed from the decoded picture buffer. 11. A method of picture encoding, implemented by an encoder, the method comprising: encoding a representation of a current picture of a video stream of multiple pictures; encoding, for each of a plurality of reference pictures included in a buffer description for the current picture, a respective one-bit flag according to one of two available values for the one-bit flag, the two available values for the one-bit flag comprising: a first value explicitly indicating to a decoder to include the reference picture in a reference picture list for decoding the current picture; and a second value explicitly indicating to the decoder not to include the reference picture in the reference picture list for decoding the current picture; outputting the representation of the current picture and the one-bit flags. 12. The method of claim 11, wherein encoding the one-bit flags comprises setting the one-bit flag corresponding to a first reference picture of the plurality of reference pictures to the second value responsive to determining that a layer identity of the first reference picture is higher than a layer identity of the current picture. 13. The method of claim 11, wherein encoding the one-bit flags comprises setting the one-bit flag corresponding to a second reference picture of the plurality of reference pictures to the first value responsive to determining that a layer identity of the second reference picture is not higher than a layer identity of the current picture. 14. The method of claim 13, wherein setting the one-bit flag corresponding to the second reference picture to the first value is in further response to the second reference picture having a quantization parameter higher than a given threshold. 15. The method of claim 11, wherein the first value and second value are “1” and “0,” respectively. 16. The method of claim 11, wherein outputting the representation of the current picture and the one-bit flags comprises outputting the one-bit flags in a slice header of the representation of the current picture. 17. The method of claim 11, wherein outputting the representation of the current picture and the one-bit flags comprises outputting the one-bit flags in a sequence parameter set external from the representation of the current picture. 18. The method of claim 11, wherein outputting the representation of the current picture and the one-bit flags comprises outputting the one-bit flags in a picture parameter set external from the representation of the current picture. 19. The method of claim 11, wherein outputting the one-bit flags comprises indicating to the decoder that a reference picture, corresponding to a one-bit flag set to the first value and missing from a decoded picture buffer of the decoder, has been unintentionally lost. 20. The method of claim 11, wherein outputting the one-bit flags comprises indicating to the decoder that a reference picture, corresponding to a one-bit flag set to the second value and missing from a decoded picture buffer of the decoder, has been correctly removed from the decoded picture buffer. 21. A non-transitory computer readable medium storing a computer program product for controlling a programmable encoder, the computer program product comprising software instructions that, when run by the programmable encoder, cause the programmable encoder to: encode a representation of a current picture of a video stream of multiple pictures; encode, for each of a plurality of reference pictures included in a buffer description for the current picture, a respective one-bit flag according to one of two available values for the one-bit flag, the two available values for the one-bit flag comprising: a first value explicitly indicating to a decoder to include the reference picture in a reference picture list for decoding the current picture; and a second value explicitly indicating to the decoder not to include the reference picture in the reference picture list for decoding the current picture; output the representation of the current picture and the one-bit flags.
2,400
8,050
8,050
15,130,446
2,485
A situational awareness system is provided for a motor vehicle. That situational awareness system includes a rear view mirror having a right side section, a left side section and a center section. In addition, the situational awareness system includes: an imaging system including a right side camera, a left side camera and a center rear camera and a display system including a right side display, a left side display and a center rear display. Still further, the situational awareness system includes a control module configured to activate the imaging system and the display system to project images through the various sections of the rear view mirror.
1. A situational awareness system for a motor vehicle, comprising: a rear view mirror including a right side section, a left side section and a center section; an imaging system including a right side camera, a left side camera and a center rear camera; a display system including a right side display, a left side display and a center rear display; and a control module configured to selectively activate (a) said right side display to project an image from said right side camera through said right side section of said rear view mirror, (b) said left side display to project an image from said left side camera through said left side section of said rear view mirror and (c) said center rear display to project an image from said center rear camera through said center section of said rear view mirror. 2. The situational awareness system of claim 1, further including a right side blind spot warning element and a left side blind spot warning element. 3. The situational awareness system of claim 2, wherein said right side blind spot warning element comprises a right side portion of a rim of said rear view mirror that illuminates. 4. The situational awareness system of claim 3, wherein said left side blind spot warning element comprises a left side portion of said rim of said rear view mirror that illuminates. 5. The situational awareness system of claim 1, wherein said control module is further configured to automatically activate said right side camera and said right side display when an operator of said motor vehicle initiates a right turn signal. 6. The situational awareness system of claim 5, wherein said control module is further configured to automatically activate said left side camera and said left side display when said operator of said motor vehicle initiates a left turn signal. 7. The situational awareness system of claim 6, wherein said control module is further configured to activate said right side camera and said right side display, said left side camera and said left side display and said center rear camera and said center rear display when the operator of the motor vehicle places a transmission of said motor vehicle in reverse. 8. A method for improving situational awareness for an operator of a motor vehicle, comprising: monitoring, by an imaging system, a first area on a right side of said motor vehicle, a second area behind said motor vehicle and a third area on a left side of said motor vehicle; and selectively projecting, by a display system, a first image of said first area through a right side section of a rear view mirror, a second image of said second area through a center section of said rear view mirror and a third image of said third area through a left side section of said rear view mirror. 9. The method of claim 8, further including activating by a control module, said imaging system and said display system. 10. The method of claim 9, including providing a blind spot warning. 11. The method of claim 10, including illuminating a right rim portion of said rear view mirror when an object is detected in said first area. 12. The method of claim 11, including illuminating a left rim portion of said rear view mirror when an object is detected in said third area. 13. The method of claim 12, including automatically activating by said control module, said imaging system and said display system when said operator of said motor vehicle initiates a turn signal. 14. The method of claim 13, including imaging said first area on said right side of said motor vehicle and projecting said first image of said first area through said right side section of said rear view mirror when said operator initiates a right turn signal. 15. The method of claim 14, including imaging said third area on said left side of said motor vehicle and projecting said third image of said third area through said left side section of said rear view mirror when said operator initiates a left turn signal. 16. The method of claim 15, including (a) activating said imaging system, by said control module, and imaging said first area, said second area and said third area, (b) activating said display system by said control module and projecting, by said display system, said first image through said right side section of said rear view mirror, said second image through said center section of said rear view mirror and said third image through said left side section of said rear view mirror when said operator places a transmission of said motor vehicle in reverse. 17. The method of claim 8, including automatically activating, by said control module, said imaging system and said display system when said operator of said motor vehicle initiates a turn signal. 18. The method of claim 17, including imaging said first area on said right side of said motor vehicle and projecting said first image of said first area through said right side section of said rear view mirror when said operator initiates a right turn signal. 19. The method of claim 18, including imaging said third area on said left side of said motor vehicle and projecting said third image of said third area through said left side section of said rear view mirror when said operator initiates a left turn signal. 20. The method of claim 8, including (a) activating said imaging system, by said control module, and imaging said first area, said second area and said third area, (b) activating said display system by said control module and projecting, by said display system, said first image through said right side section of said rear view mirror, said second image through said center section of said rear view mirror and said third image through said left side section of said rear view mirror when said operator places a transmission of said motor vehicle in reverse.
A situational awareness system is provided for a motor vehicle. That situational awareness system includes a rear view mirror having a right side section, a left side section and a center section. In addition, the situational awareness system includes: an imaging system including a right side camera, a left side camera and a center rear camera and a display system including a right side display, a left side display and a center rear display. Still further, the situational awareness system includes a control module configured to activate the imaging system and the display system to project images through the various sections of the rear view mirror.1. A situational awareness system for a motor vehicle, comprising: a rear view mirror including a right side section, a left side section and a center section; an imaging system including a right side camera, a left side camera and a center rear camera; a display system including a right side display, a left side display and a center rear display; and a control module configured to selectively activate (a) said right side display to project an image from said right side camera through said right side section of said rear view mirror, (b) said left side display to project an image from said left side camera through said left side section of said rear view mirror and (c) said center rear display to project an image from said center rear camera through said center section of said rear view mirror. 2. The situational awareness system of claim 1, further including a right side blind spot warning element and a left side blind spot warning element. 3. The situational awareness system of claim 2, wherein said right side blind spot warning element comprises a right side portion of a rim of said rear view mirror that illuminates. 4. The situational awareness system of claim 3, wherein said left side blind spot warning element comprises a left side portion of said rim of said rear view mirror that illuminates. 5. The situational awareness system of claim 1, wherein said control module is further configured to automatically activate said right side camera and said right side display when an operator of said motor vehicle initiates a right turn signal. 6. The situational awareness system of claim 5, wherein said control module is further configured to automatically activate said left side camera and said left side display when said operator of said motor vehicle initiates a left turn signal. 7. The situational awareness system of claim 6, wherein said control module is further configured to activate said right side camera and said right side display, said left side camera and said left side display and said center rear camera and said center rear display when the operator of the motor vehicle places a transmission of said motor vehicle in reverse. 8. A method for improving situational awareness for an operator of a motor vehicle, comprising: monitoring, by an imaging system, a first area on a right side of said motor vehicle, a second area behind said motor vehicle and a third area on a left side of said motor vehicle; and selectively projecting, by a display system, a first image of said first area through a right side section of a rear view mirror, a second image of said second area through a center section of said rear view mirror and a third image of said third area through a left side section of said rear view mirror. 9. The method of claim 8, further including activating by a control module, said imaging system and said display system. 10. The method of claim 9, including providing a blind spot warning. 11. The method of claim 10, including illuminating a right rim portion of said rear view mirror when an object is detected in said first area. 12. The method of claim 11, including illuminating a left rim portion of said rear view mirror when an object is detected in said third area. 13. The method of claim 12, including automatically activating by said control module, said imaging system and said display system when said operator of said motor vehicle initiates a turn signal. 14. The method of claim 13, including imaging said first area on said right side of said motor vehicle and projecting said first image of said first area through said right side section of said rear view mirror when said operator initiates a right turn signal. 15. The method of claim 14, including imaging said third area on said left side of said motor vehicle and projecting said third image of said third area through said left side section of said rear view mirror when said operator initiates a left turn signal. 16. The method of claim 15, including (a) activating said imaging system, by said control module, and imaging said first area, said second area and said third area, (b) activating said display system by said control module and projecting, by said display system, said first image through said right side section of said rear view mirror, said second image through said center section of said rear view mirror and said third image through said left side section of said rear view mirror when said operator places a transmission of said motor vehicle in reverse. 17. The method of claim 8, including automatically activating, by said control module, said imaging system and said display system when said operator of said motor vehicle initiates a turn signal. 18. The method of claim 17, including imaging said first area on said right side of said motor vehicle and projecting said first image of said first area through said right side section of said rear view mirror when said operator initiates a right turn signal. 19. The method of claim 18, including imaging said third area on said left side of said motor vehicle and projecting said third image of said third area through said left side section of said rear view mirror when said operator initiates a left turn signal. 20. The method of claim 8, including (a) activating said imaging system, by said control module, and imaging said first area, said second area and said third area, (b) activating said display system by said control module and projecting, by said display system, said first image through said right side section of said rear view mirror, said second image through said center section of said rear view mirror and said third image through said left side section of said rear view mirror when said operator places a transmission of said motor vehicle in reverse.
2,400
8,051
8,051
11,560,437
2,443
Method of limiting offending messages communicated over a network, such as but not limited to messages associated with Spam and DoS attacks. The message limiting optionally including limiting bandwidth or other communication capabilities associated with an entity communicating or facilitating communication of the messages.
1. A method of mitigating malicious messages communicated over a network from a computer to one or more remotely located network elements associated with a network, the method comprising: monitoring traffic levels for at least one type of message emitting from the computer; and limiting communication capabilities associated with the computer and one or more of the messaging types having traffic levels above a corresponding threshold such that the computer is able to continue to transmit the messages associated with the limited messaging types at reduced traffic levels. 2. The method of claim 1 further comprising tagging the messages associated with the limited messaging types and diverting the tagged messages to a sink-hole location on the network. 3. The method of claim 2 further comprising tagging all messages transmitted from the computer and diverting the tagged messages to the sink-hole. 4. The method of claim 1 further comprising notifying a user of the computer of the limited communication capabilities. 5. The method of claim 1 further comprising diverting domain name system (DNS) requests associated with the computer to an address associated with a utility entity of the network, the utility entity including features for restoring the limited communication capabilities. 6. The method of claim 1 further comprising limiting the communication capabilities to those associated with traffic levels below a normal traffic level. 7. The method of claim 1 further comprising limiting the communication capabilities to those associated with traffic levels below a restricted traffic level. 8. The method of claim 1 wherein limiting the communication capabilities includes limiting bandwidth allocated to a port associated with the messages. 9. The method of claim 8 further comprising limiting bandwidth for the port associated with email, DNS queries, or web queries, such as HTTP/HTTPs. 10. The method of claim 1 wherein limiting the communication capabilities includes communicating instructions to a cable modem associated with the computer that is used to transmit the messages over the network. 11. A method of mitigating malicious messages communicated over a network, the method comprising: monitoring traffic levels of messages communicated over the network; and limiting communication capabilities of an entity associated with the messages when traffic levels exceed a predetermined threshold such that the entity is able to continue to transmit the messages at a reduced traffic level. 12. The method of claim 11 further comprising tagging the messages and diverting the tagged messages to a sink-hole location on the network. 13. The method of claim 12 further comprising tagging all messages transmitted from the computer and diverting the tagged messages to the sink-hole. 14. The method of claim 11 further comprising diverting domain name system (DNS) requests associated with the entity to an address associated with a utility entity of the network, the utility entity including features for restoring the limited communicated capabilities. 15. The method of claim 11 wherein limiting the communication capabilities includes limiting bandwidth allocated to a port associated with the messages. 16. A computer-readable medium having instructions to facilitate mitigating malicious messages communicated over a network, the medium having instructions for: monitoring traffic levels of messages communicated over the network; and limiting communication capabilities of an entity associated with the messages when traffic levels exceed a predetermined threshold such that the entity is able to continue to transmit the messages at a reduced traffic level. 17. The medium of claim 16 further comprising instructions for facilitating tagging of the messages and diverting the tagged messages to a sink-hole location on the network. 18. The medium of claim 17 further comprising instructions for facilitating tagging of all messages transmitted from the computer and diverting the tagged messages to the sink-hole. 19. The medium of claim 16 further comprising instructions for facilitating diverting domain name system (DNS) requests associated with the entity to an address associated with a utility entity of the network, the utility entity including features for restoring the limited communicated capabilities. 20. The medium of claim 16 wherein the instructions for limiting the communication capabilities include instructions for limiting bandwidth allocated to a port associated with the messages.
Method of limiting offending messages communicated over a network, such as but not limited to messages associated with Spam and DoS attacks. The message limiting optionally including limiting bandwidth or other communication capabilities associated with an entity communicating or facilitating communication of the messages.1. A method of mitigating malicious messages communicated over a network from a computer to one or more remotely located network elements associated with a network, the method comprising: monitoring traffic levels for at least one type of message emitting from the computer; and limiting communication capabilities associated with the computer and one or more of the messaging types having traffic levels above a corresponding threshold such that the computer is able to continue to transmit the messages associated with the limited messaging types at reduced traffic levels. 2. The method of claim 1 further comprising tagging the messages associated with the limited messaging types and diverting the tagged messages to a sink-hole location on the network. 3. The method of claim 2 further comprising tagging all messages transmitted from the computer and diverting the tagged messages to the sink-hole. 4. The method of claim 1 further comprising notifying a user of the computer of the limited communication capabilities. 5. The method of claim 1 further comprising diverting domain name system (DNS) requests associated with the computer to an address associated with a utility entity of the network, the utility entity including features for restoring the limited communication capabilities. 6. The method of claim 1 further comprising limiting the communication capabilities to those associated with traffic levels below a normal traffic level. 7. The method of claim 1 further comprising limiting the communication capabilities to those associated with traffic levels below a restricted traffic level. 8. The method of claim 1 wherein limiting the communication capabilities includes limiting bandwidth allocated to a port associated with the messages. 9. The method of claim 8 further comprising limiting bandwidth for the port associated with email, DNS queries, or web queries, such as HTTP/HTTPs. 10. The method of claim 1 wherein limiting the communication capabilities includes communicating instructions to a cable modem associated with the computer that is used to transmit the messages over the network. 11. A method of mitigating malicious messages communicated over a network, the method comprising: monitoring traffic levels of messages communicated over the network; and limiting communication capabilities of an entity associated with the messages when traffic levels exceed a predetermined threshold such that the entity is able to continue to transmit the messages at a reduced traffic level. 12. The method of claim 11 further comprising tagging the messages and diverting the tagged messages to a sink-hole location on the network. 13. The method of claim 12 further comprising tagging all messages transmitted from the computer and diverting the tagged messages to the sink-hole. 14. The method of claim 11 further comprising diverting domain name system (DNS) requests associated with the entity to an address associated with a utility entity of the network, the utility entity including features for restoring the limited communicated capabilities. 15. The method of claim 11 wherein limiting the communication capabilities includes limiting bandwidth allocated to a port associated with the messages. 16. A computer-readable medium having instructions to facilitate mitigating malicious messages communicated over a network, the medium having instructions for: monitoring traffic levels of messages communicated over the network; and limiting communication capabilities of an entity associated with the messages when traffic levels exceed a predetermined threshold such that the entity is able to continue to transmit the messages at a reduced traffic level. 17. The medium of claim 16 further comprising instructions for facilitating tagging of the messages and diverting the tagged messages to a sink-hole location on the network. 18. The medium of claim 17 further comprising instructions for facilitating tagging of all messages transmitted from the computer and diverting the tagged messages to the sink-hole. 19. The medium of claim 16 further comprising instructions for facilitating diverting domain name system (DNS) requests associated with the entity to an address associated with a utility entity of the network, the utility entity including features for restoring the limited communicated capabilities. 20. The medium of claim 16 wherein the instructions for limiting the communication capabilities include instructions for limiting bandwidth allocated to a port associated with the messages.
2,400
8,052
8,052
15,156,900
2,484
A video-providing system includes a first grouping unit configured to generate a first group that is a collection of one or more video files; a second group unit configured to group at least a portion of video files from the video files included in the first group; and a providing unit configured to provide video files selected from the video files included in the second group unit.
1. A video providing system for providing user selected portions of a video, the system comprising: a first grouper configured to generate a first group that is a set of one or more video files; a second grouper configured to group at least a portion of the video files included in the first group; and a provider configured to provide a video file selected by the user from the video files included in the second grouper. 2. The video providing system of claim 1, wherein the first grouper is further configured to generate the first group based on at least one of position information and time information of each of the one or more video files. 3. The video providing system of claim 1, wherein the first grouper is further configured to generate the first group based on an audio file extracted from the one or more video files. 4. The video providing system of claim 1, wherein the second grouper is further configured to generate a second group by synchronizing at least a portion of the video files included in the first group. 5. The video providing system of claim 1, wherein the second grouper is further configured to generate a second group by synchronizing at least a portion of the video files based on a time index of each of at least a portion of the video files. 6. The video providing system of claim 1, wherein the second grouper is further configured to generate a second group by synchronizing at least a portion of the video files based on an audio file of each of at least a portion of the video files. 7. The video providing system of claim 1, wherein the second grouper is further configured to match each of at least a portion of the video files to a control interface, and the provider is further configured to provide the selected video file through the control interface. 8. The video providing system of claim 1, wherein the provider is further configured to provide the selected video file after a video file being provided prior to a selection point in time at which the selection is performed, and to provide the selected video file by using a time index of the selection point in time as a start time. 9. The video providing system of claim 8, wherein the provider is further configured to selectively provide an audio file being provided prior to the selection point in time together with an image file of the selected video file. 10. The video providing system of claim 1, wherein the provider is further configured to provide a master file based on a time index of the selection point in time and the selected video file. 11. A video providing method of providing user selected portions of a video, the method comprising: generating, by a processor, a first group that is a set of one or more video files; grouping, into a second group, at least a portion of the video files included in the first group; and providing a video file selected by the user from the video files included in the second group. 12. The video providing method of claim 11, wherein the generating of the first group comprises generating the first group based on at least one of position information and time information of each of the one or more video files. 13. The video providing method of claim 11, wherein the generating of the first group comprises generating the first group based on an audio file extracted from the one or more video files. 14. The video providing method of claim 11, wherein the grouping into the second group comprises grouping, into the second group, at least a portion of the video files included in the first group by synchronizing at least a portion of the video files included in the first group. 15. The video providing method of claim 11, wherein the grouping into the second group comprises grouping, into the second group, at least a portion of the video files by synchronizing at least a portion of the video files based on a time index of each of at least a portion of the video files. 16. The video providing method of claim 11, wherein the grouping into the second group comprises grouping at least a portion of the video files into the second group by synchronizing at least a portion of the video files based on an audio file of each of at least a portion of the video files. 17. The video providing method of claim 11, wherein the grouping into the second group further comprising matching each of at least a portion of the video files to a control interface, and the providing of the selected video file comprises providing the selected video file through the control interface. 18. The video providing method of claim 11, wherein the providing of the selected video file comprises providing the selected video file after a video file being provided prior to a selection point in time at which the selection is performed, and providing the selected video file by using a time index of the selection point in time as a start time. 19. The video providing method of claim 18, wherein the providing of the selected video file by using the time index of the selection point in time as the start time further comprises selectively providing an audio file being provided prior to the selection point in time together with an image file of the selected video file. 20. The video providing method of claim 11, wherein the providing of the selected video file further comprises providing a master file based on a time index of the selection point in time and the selected video file. 21. A non-transitory computer-readable recording medium storing a program to implement the method according to claim 11. 22. A computer program for executing a video providing method, wherein the computer program comprises a computer program code to control a computer to perform: generating a first group that is a set of one or more video files; grouping, into a second group, at least a portion of the video files included in the first group; and providing a video file selected from the video files included in the second group.
A video-providing system includes a first grouping unit configured to generate a first group that is a collection of one or more video files; a second group unit configured to group at least a portion of video files from the video files included in the first group; and a providing unit configured to provide video files selected from the video files included in the second group unit.1. A video providing system for providing user selected portions of a video, the system comprising: a first grouper configured to generate a first group that is a set of one or more video files; a second grouper configured to group at least a portion of the video files included in the first group; and a provider configured to provide a video file selected by the user from the video files included in the second grouper. 2. The video providing system of claim 1, wherein the first grouper is further configured to generate the first group based on at least one of position information and time information of each of the one or more video files. 3. The video providing system of claim 1, wherein the first grouper is further configured to generate the first group based on an audio file extracted from the one or more video files. 4. The video providing system of claim 1, wherein the second grouper is further configured to generate a second group by synchronizing at least a portion of the video files included in the first group. 5. The video providing system of claim 1, wherein the second grouper is further configured to generate a second group by synchronizing at least a portion of the video files based on a time index of each of at least a portion of the video files. 6. The video providing system of claim 1, wherein the second grouper is further configured to generate a second group by synchronizing at least a portion of the video files based on an audio file of each of at least a portion of the video files. 7. The video providing system of claim 1, wherein the second grouper is further configured to match each of at least a portion of the video files to a control interface, and the provider is further configured to provide the selected video file through the control interface. 8. The video providing system of claim 1, wherein the provider is further configured to provide the selected video file after a video file being provided prior to a selection point in time at which the selection is performed, and to provide the selected video file by using a time index of the selection point in time as a start time. 9. The video providing system of claim 8, wherein the provider is further configured to selectively provide an audio file being provided prior to the selection point in time together with an image file of the selected video file. 10. The video providing system of claim 1, wherein the provider is further configured to provide a master file based on a time index of the selection point in time and the selected video file. 11. A video providing method of providing user selected portions of a video, the method comprising: generating, by a processor, a first group that is a set of one or more video files; grouping, into a second group, at least a portion of the video files included in the first group; and providing a video file selected by the user from the video files included in the second group. 12. The video providing method of claim 11, wherein the generating of the first group comprises generating the first group based on at least one of position information and time information of each of the one or more video files. 13. The video providing method of claim 11, wherein the generating of the first group comprises generating the first group based on an audio file extracted from the one or more video files. 14. The video providing method of claim 11, wherein the grouping into the second group comprises grouping, into the second group, at least a portion of the video files included in the first group by synchronizing at least a portion of the video files included in the first group. 15. The video providing method of claim 11, wherein the grouping into the second group comprises grouping, into the second group, at least a portion of the video files by synchronizing at least a portion of the video files based on a time index of each of at least a portion of the video files. 16. The video providing method of claim 11, wherein the grouping into the second group comprises grouping at least a portion of the video files into the second group by synchronizing at least a portion of the video files based on an audio file of each of at least a portion of the video files. 17. The video providing method of claim 11, wherein the grouping into the second group further comprising matching each of at least a portion of the video files to a control interface, and the providing of the selected video file comprises providing the selected video file through the control interface. 18. The video providing method of claim 11, wherein the providing of the selected video file comprises providing the selected video file after a video file being provided prior to a selection point in time at which the selection is performed, and providing the selected video file by using a time index of the selection point in time as a start time. 19. The video providing method of claim 18, wherein the providing of the selected video file by using the time index of the selection point in time as the start time further comprises selectively providing an audio file being provided prior to the selection point in time together with an image file of the selected video file. 20. The video providing method of claim 11, wherein the providing of the selected video file further comprises providing a master file based on a time index of the selection point in time and the selected video file. 21. A non-transitory computer-readable recording medium storing a program to implement the method according to claim 11. 22. A computer program for executing a video providing method, wherein the computer program comprises a computer program code to control a computer to perform: generating a first group that is a set of one or more video files; grouping, into a second group, at least a portion of the video files included in the first group; and providing a video file selected from the video files included in the second group.
2,400
8,053
8,053
14,090,334
2,456
A system may receive raw information associated with a network and may prepare the raw information to create optimized information. The optimized information may include the raw information that has been sorted. The system may correlate the optimized information to create a set of correlated information. The system may aggregate at least two sets of correlated information to create aggregated information. The system may determine that network analytics are to be performed using the set of correlated information or the aggregated information. The system may determine information associated with performing the network analytics, including the set of correlated information or the aggregated information. The system may perform the network analytics based on the information associated with performing the network analytics. The system may provide a result associated with performing the network analytics. The result may indicate a manner in which to improve a performance of the network.
1. A system, comprising: one or more devices to: receive raw information associated with a network, the raw information including information associated with a group of network devices included in the network; prepare the raw information to create optimized information, the optimized information including the raw information that has been sorted based on a type of information associated with the raw information; correlate the optimized information to create a set of correlated information, the set of correlated information including information that identifies a relationship between at least two portions of the optimized information; aggregate at least two sets of correlated information to create aggregated information, the aggregated information including information that identifies a relationship between at least two portions of the at least two sets of correlated information; determine that network analytics are to be performed using the set of correlated information or the aggregated information; determine information associated with performing the network analytics, the information including the set of correlated information or the aggregated information; perform the network analytics based on the information associated with performing the network analytics; and provide a result associated with performing the network analytics, the result indicating a manner in which to improve a performance of a network device of the group of network devices. 2. The system of claim 1, where the one or more devices are further to: determine that a portion of the raw information is missing from the raw information; determine an extrapolated portion of information based on determining that the portion of the raw information is missing; and where the one or more processors, when preparing the raw information, are further to: prepare the raw information by adding the extrapolated portion of information to the raw information. 3. The system of claim 1, where the one or more devices, when preparing the raw information to create the optimized information, are further to: create a group of dimension tables that includes the optimized information; create a group of fact tables based on the group of dimension tables; and store the group of dimension tables and the group of fact tables such that the group of dimension tables and the group of fact tables are available to create the set of correlated information. 4. The system of claim 1, where the one or more devices, when correlating the optimized information to create the set of correlated information, are further to: create a group of dimension tables that includes the set of correlated information; create a group of fact tables based on the group of dimension tables; and store the group of dimension tables and the group of fact tables such that the group of dimension tables and the group of fact tables are available to perform short term analytics. 5. The system of claim 1, where the one or more devices are further to: determine that short term analytics are to be performed; and where the one or more processors, when determining that the network analytics are to be performed using the set of correlated information or the aggregated information, are further to: determine that the networks analytics are to be performed using the set of correlated information based on determining that short term analytics are to be performed. 6. The system of claim 1, where the one or more devices, when determining the information associated with performing the network analytics, are further to: determine information associated with a forecast model associated with performing the network analytics. 7. The system of claim 1, where the one or more devices, when providing the result associated with performing the network analytics, are further to: provide the result to a device associated with optimizing a performance of the network. 8. A computer-readable medium storing instructions, the instructions comprising: one or more instructions that, when executed by one or more processors, cause the one or more processors to: receive raw data associated with a network, the raw data including data associated with network devices included in the network; process the raw data to create optimized data, the optimized data including raw data that has been sorted based on a type of data associated with the raw data; correlate the optimized data to create a set of correlated data, the set of correlated data identifying a relationship between portions of the optimized data; aggregate a plurality of sets of correlated data to create aggregated data, the aggregated data identifying a relationship between at least two portions of the plurality of sets of correlated data; determine that network analytics are to be performed using the set of correlated data or the aggregated data; determine information associated with performing the network analytics, the information including the set of correlated data or the aggregated data; perform the network analytics based on the information associated with performing the network analytics; and provide a result associated with performing the network analytics, the result indicating a manner in which to improve a configuration of the network. 9. The computer-readable medium of claim 8, where the one or more instructions, when executed by the one or more processors, further cause the one or more processors to: determine that a portion of the raw data is unavailable; determine an extrapolated portion of data based on determining that the portion of the raw data is unavailable; and where the one or more instructions, that cause the one or more processors to, process the raw data, further cause the one or more processors to: process the raw data by adding the extrapolated portion of data to the raw data. 10. The computer-readable medium of claim 8, where the one or more instructions, that cause the one or more processors to correlate the optimized data to create the set of correlated data, further cause the one or more processors to: create a group of dimension tables that includes the set of correlated data; create a group of fact tables based on the group of dimension tables; and store the group of dimension tables and the group of fact tables such that the group of dimension tables and the group of fact tables are available to perform short term analytics. 11. The computer-readable medium of claim 8, where the one or more instructions, that cause the one or more processors to aggregate the plurality of sets of correlated data to create aggregated data, further cause the one or more processors to: create a group of dimension tables that includes the aggregated data; create a group of fact tables based on the group of dimension tables; and store the group of dimension tables and the group of fact tables such that the group of dimension tables and the group of fact tables are available to perform long term analytics. 12. The computer-readable medium of claim 8, where the one or more instructions, when executed by the one or more processors, further cause the one or more processors to: determine that short term analytics are to be performed; and where the one or more instructions, that cause the one or more processors to determine that the network analytics are to be performed using the set of correlated data or the aggregated data, further cause the one or more processors to: determine that the networks analytics are to be performed using the set of correlated data based on determining that short term analytics are to be performed. 13. The computer-readable medium of claim 8, where the one or more instructions, when executed by the one or more processors, further cause the one or more processors to: determine that long term analytics are to be performed; and where the one or more instructions, that cause the one or more processors to determine that the network analytics are to be performed using the set of correlated data or the aggregated data, further cause the one or more processors to: determine that the networks analytics are to be performed using the aggregated data based on determining that long term analytics are to be performed. 14. The computer-readable medium of claim 8, where the one or more instructions, that cause the one or more processors to determine the information associated with performing the network analytics, further cause the one or more processors to: determine information associated with performing deterministic network analytics. 15. A method, comprising: receiving, by one or more devices, raw information associated with performing network analytics; processing, by the one or more devices, the raw information to generate optimized information, the raw information being processed based on a type of information associated with the raw information; correlating, by the one or more devices, the optimized information to generate a set of correlated information, the set of correlated information including information indicating a relationship between portions of the optimized information; aggregating, by the one or more devices, sets of correlated information to generate aggregated information, the sets of correlated information including the set of correlated information, and the aggregated information including information indicating a relationship between portions of the sets of correlated information; determining, by the one or more devices, that network analytics are to be performed using the set of correlated information or the aggregated information; identifying, by the one or more devices, information associated with performing the network analytics, the information including the set of correlated information or the aggregated information and including a model associated with computing the network analytics; computing, by the one or more devices, the network analytics based on the information associated with computing the network analytics; and providing, by the one or more devices, a result based on computing the network analytics, the result indicating a manner in which to improve a performance of a network device included in the network. 16. The method of claim 15, further comprising: determining that a portion of the raw information is missing; and providing an indication, associated with the missing raw information, the indication indicating that additional information is to be collected in the future such that there is no missing raw information. 17. The method of claim 15, where aggregating the sets of correlated information to generate aggregated information further comprises: generating a group of dimension tables that includes the aggregated information; generating a group of fact tables based on the group of dimension tables; and storing the group of dimension tables and the group of fact tables such that the group of dimension tables and the group of fact tables are available to perform long term analytics. 18. The method of claim 15, further comprising: determining that long term analytics are to be performed; and where determining that the network analytics are to be performed using the set of correlated information or the aggregated information further comprises: determining that the networks analytics are to be performed using the aggregated information based on determining that long term analytics are to be performed. 19. The method of claim 15, where identifying the information associated with performing the network analytics further comprises: identifying information associated with performing non-deterministic network analytics. 20. The method of claim 15, further comprising: generating the model based on the raw information, the optimized information, the correlated information, or the aggregated information; and where computing the network analytics further comprises: computing the network analytics based on the model.
A system may receive raw information associated with a network and may prepare the raw information to create optimized information. The optimized information may include the raw information that has been sorted. The system may correlate the optimized information to create a set of correlated information. The system may aggregate at least two sets of correlated information to create aggregated information. The system may determine that network analytics are to be performed using the set of correlated information or the aggregated information. The system may determine information associated with performing the network analytics, including the set of correlated information or the aggregated information. The system may perform the network analytics based on the information associated with performing the network analytics. The system may provide a result associated with performing the network analytics. The result may indicate a manner in which to improve a performance of the network.1. A system, comprising: one or more devices to: receive raw information associated with a network, the raw information including information associated with a group of network devices included in the network; prepare the raw information to create optimized information, the optimized information including the raw information that has been sorted based on a type of information associated with the raw information; correlate the optimized information to create a set of correlated information, the set of correlated information including information that identifies a relationship between at least two portions of the optimized information; aggregate at least two sets of correlated information to create aggregated information, the aggregated information including information that identifies a relationship between at least two portions of the at least two sets of correlated information; determine that network analytics are to be performed using the set of correlated information or the aggregated information; determine information associated with performing the network analytics, the information including the set of correlated information or the aggregated information; perform the network analytics based on the information associated with performing the network analytics; and provide a result associated with performing the network analytics, the result indicating a manner in which to improve a performance of a network device of the group of network devices. 2. The system of claim 1, where the one or more devices are further to: determine that a portion of the raw information is missing from the raw information; determine an extrapolated portion of information based on determining that the portion of the raw information is missing; and where the one or more processors, when preparing the raw information, are further to: prepare the raw information by adding the extrapolated portion of information to the raw information. 3. The system of claim 1, where the one or more devices, when preparing the raw information to create the optimized information, are further to: create a group of dimension tables that includes the optimized information; create a group of fact tables based on the group of dimension tables; and store the group of dimension tables and the group of fact tables such that the group of dimension tables and the group of fact tables are available to create the set of correlated information. 4. The system of claim 1, where the one or more devices, when correlating the optimized information to create the set of correlated information, are further to: create a group of dimension tables that includes the set of correlated information; create a group of fact tables based on the group of dimension tables; and store the group of dimension tables and the group of fact tables such that the group of dimension tables and the group of fact tables are available to perform short term analytics. 5. The system of claim 1, where the one or more devices are further to: determine that short term analytics are to be performed; and where the one or more processors, when determining that the network analytics are to be performed using the set of correlated information or the aggregated information, are further to: determine that the networks analytics are to be performed using the set of correlated information based on determining that short term analytics are to be performed. 6. The system of claim 1, where the one or more devices, when determining the information associated with performing the network analytics, are further to: determine information associated with a forecast model associated with performing the network analytics. 7. The system of claim 1, where the one or more devices, when providing the result associated with performing the network analytics, are further to: provide the result to a device associated with optimizing a performance of the network. 8. A computer-readable medium storing instructions, the instructions comprising: one or more instructions that, when executed by one or more processors, cause the one or more processors to: receive raw data associated with a network, the raw data including data associated with network devices included in the network; process the raw data to create optimized data, the optimized data including raw data that has been sorted based on a type of data associated with the raw data; correlate the optimized data to create a set of correlated data, the set of correlated data identifying a relationship between portions of the optimized data; aggregate a plurality of sets of correlated data to create aggregated data, the aggregated data identifying a relationship between at least two portions of the plurality of sets of correlated data; determine that network analytics are to be performed using the set of correlated data or the aggregated data; determine information associated with performing the network analytics, the information including the set of correlated data or the aggregated data; perform the network analytics based on the information associated with performing the network analytics; and provide a result associated with performing the network analytics, the result indicating a manner in which to improve a configuration of the network. 9. The computer-readable medium of claim 8, where the one or more instructions, when executed by the one or more processors, further cause the one or more processors to: determine that a portion of the raw data is unavailable; determine an extrapolated portion of data based on determining that the portion of the raw data is unavailable; and where the one or more instructions, that cause the one or more processors to, process the raw data, further cause the one or more processors to: process the raw data by adding the extrapolated portion of data to the raw data. 10. The computer-readable medium of claim 8, where the one or more instructions, that cause the one or more processors to correlate the optimized data to create the set of correlated data, further cause the one or more processors to: create a group of dimension tables that includes the set of correlated data; create a group of fact tables based on the group of dimension tables; and store the group of dimension tables and the group of fact tables such that the group of dimension tables and the group of fact tables are available to perform short term analytics. 11. The computer-readable medium of claim 8, where the one or more instructions, that cause the one or more processors to aggregate the plurality of sets of correlated data to create aggregated data, further cause the one or more processors to: create a group of dimension tables that includes the aggregated data; create a group of fact tables based on the group of dimension tables; and store the group of dimension tables and the group of fact tables such that the group of dimension tables and the group of fact tables are available to perform long term analytics. 12. The computer-readable medium of claim 8, where the one or more instructions, when executed by the one or more processors, further cause the one or more processors to: determine that short term analytics are to be performed; and where the one or more instructions, that cause the one or more processors to determine that the network analytics are to be performed using the set of correlated data or the aggregated data, further cause the one or more processors to: determine that the networks analytics are to be performed using the set of correlated data based on determining that short term analytics are to be performed. 13. The computer-readable medium of claim 8, where the one or more instructions, when executed by the one or more processors, further cause the one or more processors to: determine that long term analytics are to be performed; and where the one or more instructions, that cause the one or more processors to determine that the network analytics are to be performed using the set of correlated data or the aggregated data, further cause the one or more processors to: determine that the networks analytics are to be performed using the aggregated data based on determining that long term analytics are to be performed. 14. The computer-readable medium of claim 8, where the one or more instructions, that cause the one or more processors to determine the information associated with performing the network analytics, further cause the one or more processors to: determine information associated with performing deterministic network analytics. 15. A method, comprising: receiving, by one or more devices, raw information associated with performing network analytics; processing, by the one or more devices, the raw information to generate optimized information, the raw information being processed based on a type of information associated with the raw information; correlating, by the one or more devices, the optimized information to generate a set of correlated information, the set of correlated information including information indicating a relationship between portions of the optimized information; aggregating, by the one or more devices, sets of correlated information to generate aggregated information, the sets of correlated information including the set of correlated information, and the aggregated information including information indicating a relationship between portions of the sets of correlated information; determining, by the one or more devices, that network analytics are to be performed using the set of correlated information or the aggregated information; identifying, by the one or more devices, information associated with performing the network analytics, the information including the set of correlated information or the aggregated information and including a model associated with computing the network analytics; computing, by the one or more devices, the network analytics based on the information associated with computing the network analytics; and providing, by the one or more devices, a result based on computing the network analytics, the result indicating a manner in which to improve a performance of a network device included in the network. 16. The method of claim 15, further comprising: determining that a portion of the raw information is missing; and providing an indication, associated with the missing raw information, the indication indicating that additional information is to be collected in the future such that there is no missing raw information. 17. The method of claim 15, where aggregating the sets of correlated information to generate aggregated information further comprises: generating a group of dimension tables that includes the aggregated information; generating a group of fact tables based on the group of dimension tables; and storing the group of dimension tables and the group of fact tables such that the group of dimension tables and the group of fact tables are available to perform long term analytics. 18. The method of claim 15, further comprising: determining that long term analytics are to be performed; and where determining that the network analytics are to be performed using the set of correlated information or the aggregated information further comprises: determining that the networks analytics are to be performed using the aggregated information based on determining that long term analytics are to be performed. 19. The method of claim 15, where identifying the information associated with performing the network analytics further comprises: identifying information associated with performing non-deterministic network analytics. 20. The method of claim 15, further comprising: generating the model based on the raw information, the optimized information, the correlated information, or the aggregated information; and where computing the network analytics further comprises: computing the network analytics based on the model.
2,400
8,054
8,054
14,256,385
2,485
An analytical recognition system includes one or more video cameras configured to capture video and a video analytics module configured to perform real-time video processing and analyzation of the captured video and generate non-video data. The video analytic module includes one or more algorithms configured to identify an abnormal situation. Each abnormal situation alerts the video analytics module to automatically issue an alert and track one or more objects or individuals by utilizing the one or more video cameras. The abnormal situation is selected from the group consisting of action of a particular individual, non-action of a particular individual, a temporal event, and an externally generated event.
1. An analytical recognition system, comprising: at least one video camera configured to capture video; and a video analytics module configured to perform real-time video processing and analyzation of the captured video and generate non-video data, the video analytic module including one or more algorithms configured to identify an abnormal situation, each abnormal situation alerting the video analytics module to automatically issue an alert and track one or more objects or individuals by utilizing the at least one camera, wherein the abnormal situation is selected from the group consisting of action of a particular individual, non-action of a particular individual, a temporal event, and an externally generated event. 2. An analytical system according to claim 1 wherein the video analytics module identifies and stores in a database one or more characteristics of the particular individual for future recognition by the video analytics module and the one or more algorithms to identify an abnormal situation. 3. An analytical system according to claim 2 wherein the one or more characteristics of the particular individual is selected from the group consisting of hair style, tattoos, piercings, clothing, logos, contrasting colors, gang-related indicia, and jewelry. 4. An analytical system according to claim 1 wherein the video analytics module stores the captured video in a database accessible by a user and wherein the user identifies one or more characteristics of the particular individual for future recognition by the video analytics module and the one or more algorithms to identify an abnormal situation. 5. An analytical system according to claim 4 wherein the one or more characteristics of the particular individual is selected from the group consisting of hair style, tattoos, piercings, clothing, logos, contrasting colors, gang-related indicia, and jewelry. 6. An analytical system according to claim 1 wherein the video analytics module connects to an array of cameras organized in a network and wherein upon issuance of an alert each camera in the network is utilized to track one or more objects or individuals. 7. An analytical system according to claim 1 wherein the video analytics module identifies and stores in a database one or more characteristics of the particular individual for future recognition by the video analytics module and the one or more algorithms to identify an abnormal situation and issue an alert wherein the video analytics module connects to an array of cameras organized in a network to analyze captured video. 8. An analytical system according to claim 7 wherein the one or more characteristics of the particular individual is selected from the group consisting of hair style, tattoos, piercings, clothing, logos, contrasting colors, gang-related indicia, and jewelry. 9. An analytical system according to claim 7 wherein an owner of one of the cameras in the array of cameras forming the network may opt on a subscription basis for receiving particular alerts or being part of the camera network. 10. An analytical system according to claim 2 wherein the one or more characteristics of the particular individual includes a person's gait. 11. An analytical system according to claim 10 wherein each person's gait is determined based on a combination of one or more of the following walking variables including: limp, shuffle, head angle, stride, hand/arm sway, hand gestures, walk velocity, step frequency, angle between feet, and hand/arm position. 12. An analytical recognition system, comprising: at least one video camera configured to capture a video sequence of a physical space; and a video analytics module configured to perform real-time video processing and analyzation to determine a crowd parameter by automated processing of the video sequence of the physical space, the video analytic module including at least one algorithm configured to determine a rate of change in the crowd parameter. 13. An analytical system according to claim 12 wherein the crowd parameter is a real-time crowd count. 14. An analytical system according to claim 12 wherein the crowd parameter is a real-time crowd density estimation. 15. An analytical system according to claim 12 wherein when the rate of change in the crowd parameter exceeds a predetermined threshold, the video analytics module automatically issues an alert. 16. An analytical system according to claim 12 wherein the rate of change in the crowd parameter is indicative of crowd convergence. 17. An analytical system according to claim 16 wherein when the rate of change in the crowd parameter is indicative of crowd convergence, the video analytics module alerts security of a potential flash mob or gang robbery. 18. An analytical system according to claim 17 wherein the video analytics module is connected to an array of cameras organized in a network and wherein upon issuance of an alert each camera in the network is utilized to track one or more objects or individuals. 19. An analytical system according to claim 12 wherein the rate of change in the crowd parameter is indicative of crowd divergence. 20. An analytical system according to claim 19 wherein when the rate of change in the crowd parameter is indicative of crowd divergence, the video analytics module alerts security of a potentially hazardous situation or criminal activity.
An analytical recognition system includes one or more video cameras configured to capture video and a video analytics module configured to perform real-time video processing and analyzation of the captured video and generate non-video data. The video analytic module includes one or more algorithms configured to identify an abnormal situation. Each abnormal situation alerts the video analytics module to automatically issue an alert and track one or more objects or individuals by utilizing the one or more video cameras. The abnormal situation is selected from the group consisting of action of a particular individual, non-action of a particular individual, a temporal event, and an externally generated event.1. An analytical recognition system, comprising: at least one video camera configured to capture video; and a video analytics module configured to perform real-time video processing and analyzation of the captured video and generate non-video data, the video analytic module including one or more algorithms configured to identify an abnormal situation, each abnormal situation alerting the video analytics module to automatically issue an alert and track one or more objects or individuals by utilizing the at least one camera, wherein the abnormal situation is selected from the group consisting of action of a particular individual, non-action of a particular individual, a temporal event, and an externally generated event. 2. An analytical system according to claim 1 wherein the video analytics module identifies and stores in a database one or more characteristics of the particular individual for future recognition by the video analytics module and the one or more algorithms to identify an abnormal situation. 3. An analytical system according to claim 2 wherein the one or more characteristics of the particular individual is selected from the group consisting of hair style, tattoos, piercings, clothing, logos, contrasting colors, gang-related indicia, and jewelry. 4. An analytical system according to claim 1 wherein the video analytics module stores the captured video in a database accessible by a user and wherein the user identifies one or more characteristics of the particular individual for future recognition by the video analytics module and the one or more algorithms to identify an abnormal situation. 5. An analytical system according to claim 4 wherein the one or more characteristics of the particular individual is selected from the group consisting of hair style, tattoos, piercings, clothing, logos, contrasting colors, gang-related indicia, and jewelry. 6. An analytical system according to claim 1 wherein the video analytics module connects to an array of cameras organized in a network and wherein upon issuance of an alert each camera in the network is utilized to track one or more objects or individuals. 7. An analytical system according to claim 1 wherein the video analytics module identifies and stores in a database one or more characteristics of the particular individual for future recognition by the video analytics module and the one or more algorithms to identify an abnormal situation and issue an alert wherein the video analytics module connects to an array of cameras organized in a network to analyze captured video. 8. An analytical system according to claim 7 wherein the one or more characteristics of the particular individual is selected from the group consisting of hair style, tattoos, piercings, clothing, logos, contrasting colors, gang-related indicia, and jewelry. 9. An analytical system according to claim 7 wherein an owner of one of the cameras in the array of cameras forming the network may opt on a subscription basis for receiving particular alerts or being part of the camera network. 10. An analytical system according to claim 2 wherein the one or more characteristics of the particular individual includes a person's gait. 11. An analytical system according to claim 10 wherein each person's gait is determined based on a combination of one or more of the following walking variables including: limp, shuffle, head angle, stride, hand/arm sway, hand gestures, walk velocity, step frequency, angle between feet, and hand/arm position. 12. An analytical recognition system, comprising: at least one video camera configured to capture a video sequence of a physical space; and a video analytics module configured to perform real-time video processing and analyzation to determine a crowd parameter by automated processing of the video sequence of the physical space, the video analytic module including at least one algorithm configured to determine a rate of change in the crowd parameter. 13. An analytical system according to claim 12 wherein the crowd parameter is a real-time crowd count. 14. An analytical system according to claim 12 wherein the crowd parameter is a real-time crowd density estimation. 15. An analytical system according to claim 12 wherein when the rate of change in the crowd parameter exceeds a predetermined threshold, the video analytics module automatically issues an alert. 16. An analytical system according to claim 12 wherein the rate of change in the crowd parameter is indicative of crowd convergence. 17. An analytical system according to claim 16 wherein when the rate of change in the crowd parameter is indicative of crowd convergence, the video analytics module alerts security of a potential flash mob or gang robbery. 18. An analytical system according to claim 17 wherein the video analytics module is connected to an array of cameras organized in a network and wherein upon issuance of an alert each camera in the network is utilized to track one or more objects or individuals. 19. An analytical system according to claim 12 wherein the rate of change in the crowd parameter is indicative of crowd divergence. 20. An analytical system according to claim 19 wherein when the rate of change in the crowd parameter is indicative of crowd divergence, the video analytics module alerts security of a potentially hazardous situation or criminal activity.
2,400
8,055
8,055
14,687,869
2,432
Some embodiments provide a method for configuring a logical firewall in a hosting system that includes a set of nodes. The logical firewall is part of a logical network that includes a set of logical forwarding elements. The method receives a configuration for the firewall that specifies packet processing rules for the firewall. The method identifies several of the nodes on which to implement the logical forwarding elements. The method distributes the firewall configuration for implementation on the identified nodes. At a node, the firewall of some embodiments receives a a packet, from a managed switching element within the node, through a software port between the managed switching element and the distributed firewall application. The firewall determines whether to allow the packet based on the received configuration. When the packet is allowed, the firewall the packet back to the managed switching element through the software port.
1-21. (canceled) 22. For a firewall application operating on a physical machine, a method for implementing a distributed firewall for a logical network implemented across a plurality of managed forwarding elements, the method comprising: receiving a packet, from a managed forwarding element within the physical machine, through a software port between the managed forwarding element and the firewall application; identifying which of a plurality of sets of processing rules applies to the packet, wherein different sets of processing rules are for implementing different distributed firewalls, each of which is implemented by a plurality of firewall applications on a plurality of physical machines; determining whether to allow the packet based on the identified set of processing rules; and when the packet is allowed, sending the packet back to the managed forwarding element through the software port. 23. The method of claim 22, wherein the different sets of processing rules are received from a network control system that also configures the managed forwarding element. 24. The method of claim 22, wherein each distributed firewall of the different distributed firewalls processes packets for a different logical network. 25. The method of claim 22, wherein the firewall application implements a distributed firewall for the logical network, wherein the logical network logically connects a set of end machines through a set of logical forwarding elements, wherein a subset of the end machines, logically connected through a subset of the logical forwarding elements, resides on the same physical machine as the managed forwarding element. 26. The method of claim 25, wherein the distributed firewall connects to a logical router implemented by the managed forwarding element, the logical router comprising a set of routing policies that determines whether to send the packet to the distributed firewall. 27. The method of claim 25, wherein the managed forwarding element implements the subset of logical forwarding elements. 28. The method of claim 22, wherein when the processing rules specify to drop the packet, the packet is not sent back to the managed forwarding element. 29. The method of claim 22, wherein the packet sent back to the managed forwarding element is treated as a new packet by the managed forwarding element. 30. The method of claim 22 further comprising negotiating the software port with the managed forwarding element prior to receiving any packets from the managed forwarding element. 31. The method of claim 22 further comprising: reading a slice identifier appended to the packet after receiving the packet; and matching the slice identifier with a particular set of processing rules that is for implementing a particular distributed firewall prior to determining whether to allow the packet. 32. The method of claim 31, wherein the particular set of processing rules is a first set of processing rules and the particular distributed firewall is a first distributed firewall, the method further comprising: receiving a second packet with a second, different slice identifier from the managed forwarding element within the physical machine; matching the second slice identifier with a second, different set of processing rules that is for implementing a second different distributed firewall; and determining whether to allow the second packet based on the second set of processing rules. 33. The method of claim 32, wherein the first and second slice identifiers are appended to the first and second packets, respectively by the managed forwarding element. 34. The method of claim 22, wherein each set of processing rules comprises a set of rules for determining whether to allow, block, or drop packets based on information about the packets. 35. The method of claim 34, wherein the information about the packets comprises stateful transport connection information. 36. A machine readable medium storing a firewall application for implementing a distributed firewall for a logical network implemented across a plurality of managed forwarding elements, the firewall application executable by at least one processing unit of a physical machine, the firewall application comprising sets of instructions for: receiving a packet, from a managed forwarding element within the physical machine, through a software port between the managed forwarding element and the firewall application; identifying which of a plurality of sets of processing rules applies to the packet, wherein different sets of processing rules are for implementing different distributed firewalls, each of which is implemented by a plurality of firewall applications on a plurality of physical machines; determining whether to allow the packet based on the identified set of processing rules; and when the packet is allowed, sending the packet back to the managed forwarding element through the software port. 37. The machine readable medium of claim 36, wherein the processing rules are received from a network control system that also configures the plurality of managed forwarding elements to implement the logical network. 38. The machine readable medium of claim 36, wherein the firewall application further comprises sets of instructions for: reading a slice identifier appended to the packet after receiving the packet; and matching the slice identifier with a particular set of processing rules that is for implementing a particular distributed firewall prior to determining whether to allow the packet. 39. The machine readable medium of claim 38, wherein the particular set of processing rules is a first set of processing rules and the particular distributed firewall is a first distributed firewall, wherein the firewall application further comprises sets of instructions for: receiving a second packet with a second, different slice identifier from the managed forwarding element within the physical machine; matching the second slice identifier with a second, different set of processing rules that is for implementing a second different distributed firewall; and determining whether to allow the second packet based on the second set of processing rules. 40. The machine readable medium of claim 36, wherein each set of processing rules in the plurality of sets of processing rules comprises a set of rules for determining whether to allow, block, or drop packets based on information about the packets. 41. The machine readable medium of claim 40, wherein the information about the packets comprises stateful transport connection information.
Some embodiments provide a method for configuring a logical firewall in a hosting system that includes a set of nodes. The logical firewall is part of a logical network that includes a set of logical forwarding elements. The method receives a configuration for the firewall that specifies packet processing rules for the firewall. The method identifies several of the nodes on which to implement the logical forwarding elements. The method distributes the firewall configuration for implementation on the identified nodes. At a node, the firewall of some embodiments receives a a packet, from a managed switching element within the node, through a software port between the managed switching element and the distributed firewall application. The firewall determines whether to allow the packet based on the received configuration. When the packet is allowed, the firewall the packet back to the managed switching element through the software port.1-21. (canceled) 22. For a firewall application operating on a physical machine, a method for implementing a distributed firewall for a logical network implemented across a plurality of managed forwarding elements, the method comprising: receiving a packet, from a managed forwarding element within the physical machine, through a software port between the managed forwarding element and the firewall application; identifying which of a plurality of sets of processing rules applies to the packet, wherein different sets of processing rules are for implementing different distributed firewalls, each of which is implemented by a plurality of firewall applications on a plurality of physical machines; determining whether to allow the packet based on the identified set of processing rules; and when the packet is allowed, sending the packet back to the managed forwarding element through the software port. 23. The method of claim 22, wherein the different sets of processing rules are received from a network control system that also configures the managed forwarding element. 24. The method of claim 22, wherein each distributed firewall of the different distributed firewalls processes packets for a different logical network. 25. The method of claim 22, wherein the firewall application implements a distributed firewall for the logical network, wherein the logical network logically connects a set of end machines through a set of logical forwarding elements, wherein a subset of the end machines, logically connected through a subset of the logical forwarding elements, resides on the same physical machine as the managed forwarding element. 26. The method of claim 25, wherein the distributed firewall connects to a logical router implemented by the managed forwarding element, the logical router comprising a set of routing policies that determines whether to send the packet to the distributed firewall. 27. The method of claim 25, wherein the managed forwarding element implements the subset of logical forwarding elements. 28. The method of claim 22, wherein when the processing rules specify to drop the packet, the packet is not sent back to the managed forwarding element. 29. The method of claim 22, wherein the packet sent back to the managed forwarding element is treated as a new packet by the managed forwarding element. 30. The method of claim 22 further comprising negotiating the software port with the managed forwarding element prior to receiving any packets from the managed forwarding element. 31. The method of claim 22 further comprising: reading a slice identifier appended to the packet after receiving the packet; and matching the slice identifier with a particular set of processing rules that is for implementing a particular distributed firewall prior to determining whether to allow the packet. 32. The method of claim 31, wherein the particular set of processing rules is a first set of processing rules and the particular distributed firewall is a first distributed firewall, the method further comprising: receiving a second packet with a second, different slice identifier from the managed forwarding element within the physical machine; matching the second slice identifier with a second, different set of processing rules that is for implementing a second different distributed firewall; and determining whether to allow the second packet based on the second set of processing rules. 33. The method of claim 32, wherein the first and second slice identifiers are appended to the first and second packets, respectively by the managed forwarding element. 34. The method of claim 22, wherein each set of processing rules comprises a set of rules for determining whether to allow, block, or drop packets based on information about the packets. 35. The method of claim 34, wherein the information about the packets comprises stateful transport connection information. 36. A machine readable medium storing a firewall application for implementing a distributed firewall for a logical network implemented across a plurality of managed forwarding elements, the firewall application executable by at least one processing unit of a physical machine, the firewall application comprising sets of instructions for: receiving a packet, from a managed forwarding element within the physical machine, through a software port between the managed forwarding element and the firewall application; identifying which of a plurality of sets of processing rules applies to the packet, wherein different sets of processing rules are for implementing different distributed firewalls, each of which is implemented by a plurality of firewall applications on a plurality of physical machines; determining whether to allow the packet based on the identified set of processing rules; and when the packet is allowed, sending the packet back to the managed forwarding element through the software port. 37. The machine readable medium of claim 36, wherein the processing rules are received from a network control system that also configures the plurality of managed forwarding elements to implement the logical network. 38. The machine readable medium of claim 36, wherein the firewall application further comprises sets of instructions for: reading a slice identifier appended to the packet after receiving the packet; and matching the slice identifier with a particular set of processing rules that is for implementing a particular distributed firewall prior to determining whether to allow the packet. 39. The machine readable medium of claim 38, wherein the particular set of processing rules is a first set of processing rules and the particular distributed firewall is a first distributed firewall, wherein the firewall application further comprises sets of instructions for: receiving a second packet with a second, different slice identifier from the managed forwarding element within the physical machine; matching the second slice identifier with a second, different set of processing rules that is for implementing a second different distributed firewall; and determining whether to allow the second packet based on the second set of processing rules. 40. The machine readable medium of claim 36, wherein each set of processing rules in the plurality of sets of processing rules comprises a set of rules for determining whether to allow, block, or drop packets based on information about the packets. 41. The machine readable medium of claim 40, wherein the information about the packets comprises stateful transport connection information.
2,400
8,056
8,056
14,701,453
2,444
In an example embodiment, zone information is received from a distributed database, the zone information including a mapping between each of a plurality of client applications and a corresponding zone. Then a first adapter is assigned to a first client application based on the mapping. A second adapter is then assigned to a second client application based on the mapping. When data is received from the first client application, the data from the first client application is parsed using the first adapter, producing output to a search core and an indexing core associated with a zone corresponding to the first client application.
1. A method comprising: retrieving zone information from a distributed database, the zone information including a mapping between each of a plurality of client applications and a corresponding zone; assigning a first adapter to a first client application based on the mapping; assigning a second adapter to a second client application based on the mapping; receiving data from the first client application; and parsing the data from the first client application using the first adapter, producing output to a search core and an indexing core associated with a zone corresponding to the first client application. 2. The method of claim 1, wherein a zone is a logical separation of one or more applications within a cluster of computing devices. 3. The method of claim 1, each of the corresponding zones being configured to have a different set of resources, allowing it to be scaled independently of other zones. 4. The method of claim 1, the data comprising shard information and the parsing of the data includes sending the shard information to an index builder for shard writing, the index builder being dedicated to the corresponding zone. 5. The method of claim 1, each zone having its own adapter. 6. The method of claim 1, wherein multiple zones are assigned to the same adapter. 7. The method of claim 1, the first adapter comprising a plurality of properties defining a number of zones assigned to the adapter and number of hosts per zone. 8. A system comprising: a distributed database containing a mapping between each of a plurality of client applications and a corresponding zone; a first zone comprising: a search core; and an indexing core; a second zone comprising: a search core; and an indexing core; and an indexing manager configured to: retrieve the mapping from the distributed database; assign a first adapter to a first client application based on the mapping; assign a second adapter to a second client application based on the mapping; receive data from the first client application; parse the data from the first client application using the first adapter, producing output to the search core and an indexing core of the first zone. 9. The system of claim 8, the distributed database being an HBase database. 10. The system of claim 8, the indexing manager further configured to create a shard using the mapping. 11. The system of claim 8, each of the corresponding zones being configured to have a different set of resources, allowing it to be scaled independently of other zones. 12. The system of claim 8, each zone having its own adapter. 13. The system of claim 8, wherein multiple zones are assigned to the same adapter. 14. The system of claim 8, the first adapter comprising a plurality of properties defining a number of zones assigned to the adapter and number of hosts per zone. 15. A non-transitory machine-readable storage medium comprising a set of instructions which, when executed by a processor, causes execution of operations comprising: retrieving zone information from a distributed database, the zone information including a mapping between each of a plurality of client applications and a corresponding zone; assigning a first adapter to a first client application based on the mapping; assigning a second adapter to a second client application based on the mapping; receiving data from the first client application; and parsing the data from the first client application using the first adapter, producing output to a search core and an indexing core associated with a zone corresponding to the first client application. 16. The non-transitory machine-readable storage medium of claim 15, each of the corresponding zones being configured to have a different set of resources, allowing it to be scaled independently of other zones. 17. The non-transitory machine-readable storage medium of claim 15, the data comprising shard information and the parsing of the data includes sending the shard information to an index builder for shard writing, the index builder being dedicated to the corresponding zone. 18. The non-transitory machine-readable storage medium of claim 15, each zone having its own adapter. 19. The non-transitory machine-readable storage medium of claim 15, wherein multiple zones are assigned to the same adapter. 20. The non-transitory machine-readable storage medium of claim 15, the first adapter comprising a plurality of properties defining a number of zones assigned to the adapter and number of hosts per zone.
In an example embodiment, zone information is received from a distributed database, the zone information including a mapping between each of a plurality of client applications and a corresponding zone. Then a first adapter is assigned to a first client application based on the mapping. A second adapter is then assigned to a second client application based on the mapping. When data is received from the first client application, the data from the first client application is parsed using the first adapter, producing output to a search core and an indexing core associated with a zone corresponding to the first client application.1. A method comprising: retrieving zone information from a distributed database, the zone information including a mapping between each of a plurality of client applications and a corresponding zone; assigning a first adapter to a first client application based on the mapping; assigning a second adapter to a second client application based on the mapping; receiving data from the first client application; and parsing the data from the first client application using the first adapter, producing output to a search core and an indexing core associated with a zone corresponding to the first client application. 2. The method of claim 1, wherein a zone is a logical separation of one or more applications within a cluster of computing devices. 3. The method of claim 1, each of the corresponding zones being configured to have a different set of resources, allowing it to be scaled independently of other zones. 4. The method of claim 1, the data comprising shard information and the parsing of the data includes sending the shard information to an index builder for shard writing, the index builder being dedicated to the corresponding zone. 5. The method of claim 1, each zone having its own adapter. 6. The method of claim 1, wherein multiple zones are assigned to the same adapter. 7. The method of claim 1, the first adapter comprising a plurality of properties defining a number of zones assigned to the adapter and number of hosts per zone. 8. A system comprising: a distributed database containing a mapping between each of a plurality of client applications and a corresponding zone; a first zone comprising: a search core; and an indexing core; a second zone comprising: a search core; and an indexing core; and an indexing manager configured to: retrieve the mapping from the distributed database; assign a first adapter to a first client application based on the mapping; assign a second adapter to a second client application based on the mapping; receive data from the first client application; parse the data from the first client application using the first adapter, producing output to the search core and an indexing core of the first zone. 9. The system of claim 8, the distributed database being an HBase database. 10. The system of claim 8, the indexing manager further configured to create a shard using the mapping. 11. The system of claim 8, each of the corresponding zones being configured to have a different set of resources, allowing it to be scaled independently of other zones. 12. The system of claim 8, each zone having its own adapter. 13. The system of claim 8, wherein multiple zones are assigned to the same adapter. 14. The system of claim 8, the first adapter comprising a plurality of properties defining a number of zones assigned to the adapter and number of hosts per zone. 15. A non-transitory machine-readable storage medium comprising a set of instructions which, when executed by a processor, causes execution of operations comprising: retrieving zone information from a distributed database, the zone information including a mapping between each of a plurality of client applications and a corresponding zone; assigning a first adapter to a first client application based on the mapping; assigning a second adapter to a second client application based on the mapping; receiving data from the first client application; and parsing the data from the first client application using the first adapter, producing output to a search core and an indexing core associated with a zone corresponding to the first client application. 16. The non-transitory machine-readable storage medium of claim 15, each of the corresponding zones being configured to have a different set of resources, allowing it to be scaled independently of other zones. 17. The non-transitory machine-readable storage medium of claim 15, the data comprising shard information and the parsing of the data includes sending the shard information to an index builder for shard writing, the index builder being dedicated to the corresponding zone. 18. The non-transitory machine-readable storage medium of claim 15, each zone having its own adapter. 19. The non-transitory machine-readable storage medium of claim 15, wherein multiple zones are assigned to the same adapter. 20. The non-transitory machine-readable storage medium of claim 15, the first adapter comprising a plurality of properties defining a number of zones assigned to the adapter and number of hosts per zone.
2,400
8,057
8,057
12,938,089
2,423
A display control program includes virtual camera setting instructions for setting respective positions and directions of a right virtual camera and a left virtual camera within a prescribed virtual space used for virtual photographing in the virtual space, and view volume setting instructions for setting respective view volumes of the right virtual camera and the left virtual camera. The view volume setting instructions are adapted to set the view volumes such that both of the view volume of the right virtual camera and the view volume of the left virtual camera include a display target region, which is a region in the virtual space at least to be displayed on a display, and the view volume of at least one virtual camera extends asymmetrically with respect to a line extending from the position of one virtual camera in the camera direction, toward a side where the other virtual camera is present.
1. A non-transitory storage medium encoded with a computer-readable display control program and executable by a computer for controlling a display capable of providing stereoscopic display, the computer-readable display control program comprising: virtual camera setting instructions for setting respective positions and directions of a right virtual camera and a left virtual camera within a prescribed virtual space used for virtual photographing in said virtual space, said right virtual camera and said left virtual camera being for generating a right image and a left image used for providing stereoscopic display of an image expressing said virtual space on said display, respectively, said virtual camera setting instructions being adapted such that camera directions of said right virtual camera and said left virtual camera are oriented in an identical direction and the camera direction is perpendicular to a straight line passing through the positions of both of these virtual cameras; and view volume setting instructions for setting respective view volumes of said right virtual camera and said left virtual camera, said view volume setting instructions being adapted to set the view volumes such that both of the view volumes of said right virtual camera and said left virtual camera include a display target region, which is a region in said virtual space at least to be displayed on said display, and the view volume of at least one virtual camera extends asymmetrically with respect to a line extending from the position of one virtual camera in said camera direction, toward a side where the other virtual camera is present. 2. The non-transitory storage medium according to claim 1, wherein said virtual camera setting instructions are adapted to set said right virtual camera and said left virtual camera such that said camera directions of the right virtual camera and the left virtual camera are identical to a reference camera direction which is a camera direction of a reference virtual camera, in response to setting of said reference virtual camera within said virtual space, and said view volume setting instructions are adapted to set as said display target region, a reference virtual plane region, which is included in a view volume of said reference virtual camera and is a region on a prescribed plane perpendicular to said reference camera direction. 3. The non-transitory storage medium according to claim 2, wherein said virtual camera setting instructions are adapted to carry out at least one of setting said right virtual camera at a position resulted from movement of an arrangement position of said reference virtual camera toward right along a direction perpendicular to said reference camera direction, and setting said left virtual camera at a position resulted from movement of an arrangement position of said reference virtual camera toward left along the direction perpendicular to said reference camera direction. 4. The non-transitory storage medium according to claim 3, wherein said virtual camera setting instructions are adapted to set said right virtual camera at the position resulted from movement of the arrangement position of said reference virtual camera toward right by a prescribed distance along the direction perpendicular to said reference camera direction and to set said left virtual camera at the position resulted from movement of the arrangement position of said reference virtual camera toward left by said prescribed distance along the direction perpendicular to said reference camera direction. 5. The non-transitory storage medium according to claim 2, wherein said view volume setting instructions are adapted to set the respective view volumes of said right virtual camera and said left virtual camera such that both of (i) a cross-section at a position corresponding to said reference virtual plane region in the view volume of said right virtual camera and (ii) a cross-section at a position corresponding to said reference virtual plane region in the view volume of said left virtual camera match with a cross-section at a position corresponding to said reference virtual plane region in the view volume of said reference virtual camera. 6. The non-transitory storage medium according to claim 2, wherein said view volume setting instructions include instructions for obtaining a plurality of vertex positions of said reference virtual plane region defining the view volume of said reference virtual camera, instructions for setting the view volume of said right virtual camera by using lines extending from the position of said right virtual camera to respective ones of said plurality of vertex positions, and instructions for setting the view volume of said left virtual camera by using lines extending from the position of said left virtual camera to respective ones of said plurality of vertex positions. 7. The non-transitory storage medium according to claim 2, wherein said view volume setting instructions are adapted to set the respective view volumes of said right virtual camera and said left virtual camera by using a near clipping plane and a far clipping plane of the view volume of said reference virtual camera. 8. The non-transitory storage medium according to claim 2, wherein said display control program further includes first information output instructions for outputting information indicating the respective view volumes of said right virtual camera and said left virtual camera, that are set as a result of execution of said view volume setting instructions. 9. The non-transitory storage medium according to claim 2, wherein said display control program further includes second information output instructions for outputting information indicating a distance between said right virtual camera and said left virtual camera, that is set as a result of execution of said virtual camera setting instructions. 10. The non-transitory storage medium according to claim 9, wherein said second information output instructions are adapted to output a ratio of the distance between said right virtual camera and said left virtual camera, with a width of said reference virtual plane region serving as a reference. 11. The non-transitory storage medium according to claim 2, wherein said display control program includes a program encoded as a library. 12. The non-transitory storage medium according to claim 2, wherein said view volume setting instructions are adapted to set the view volume of said right virtual camera extending asymmetrically and the view volume of said left virtual camera extending asymmetrically such that they extend toward one side, in a manner symmetric with respect to each other. 13. The non-transitory storage medium according to claim 12, wherein said display control program is adapted to accept information for designating a position of a parallax assessment plane in parallel to said reference virtual plane region, for evaluating an amount of parallax produced between said right image generated by said right virtual camera and said left image generated by said left virtual camera. 14. The non-transitory storage medium according to claim 12, wherein said display control program is adapted to set a parallax assessment plane in parallel to said reference virtual plane region, for evaluating an amount of parallax produced between said right image generated by said right virtual camera and said left image generated by said left virtual camera, at a position farthest from said reference virtual camera in the view volumes of said respective virtual cameras. 15. The non-transitory storage medium according to claim 14, wherein said parallax assessment plane is provided on a side opposite to said reference virtual camera, with respect to said reference virtual plane region. 16. The non-transitory storage medium according to claim 2, wherein said virtual camera setting instructions include maximum distance determination instructions for determining a tolerable maximum distance between said right virtual camera and said left virtual camera. 17. The non-transitory storage medium according to claim 16, wherein said display control program further includes mode setting instructions for setting any of first and second modes, and said virtual camera setting instructions include instructions for setting said right virtual camera and said left virtual camera such that an amount of parallax produced between said right image generated by said right virtual camera and said left image generated by said left virtual camera does not exceed a predetermined value when said first mode is set, and instructions for setting said right virtual camera and said left virtual camera such that a distance from said reference virtual plane region to said right virtual camera and said left virtual camera is set to a predetermined value when said second mode is set. 18. The non-transitory storage medium according to claim 1, wherein said display control program further includes change acceptance instructions for changing at least one of the position of said right virtual camera and the position of said left virtual camera set as a result of execution of said virtual camera setting instructions, in response to an indication to change stereoscopic effect. 19. The non-transitory storage medium according to claim 18, wherein said view volume setting instructions are adapted to change the respective view volumes of said right virtual camera and said left virtual camera when the position of said right virtual camera or the position of said left virtual camera is changed as a result of execution of said change acceptance instructions. 20. The non-transitory storage medium according to claim 18, wherein said change acceptance instructions are adapted to accept said indication to change stereoscopic effect in accordance with a sliding operation along a prescribed one axis direction. 21. The non-transitory storage medium according to claim 18, wherein said change acceptance instructions are adapted to bring the distance between said right virtual camera and said left virtual camera initially set as a result of execution of said virtual camera setting instructions into correspondence with a substantially maximum value of an adjustment range based on said indication of stereoscopic effect. 22. An information processing system, comprising: a display capable of providing stereoscopic display; and a virtual camera setting unit for setting respective positions and directions of a right virtual camera and a left virtual camera within a prescribed virtual space used for virtual photographing in said virtual space, said right virtual camera and said left virtual camera being for generating a right image and a left image used for providing stereoscopic display of an image expressing said virtual space on said display respectively, said virtual camera setting unit being configured such that camera directions of said right virtual camera and said left virtual camera are oriented in an identical direction and the camera direction is perpendicular to a straight line passing through the positions of both of these virtual cameras; and a view volume setting unit for setting respective view volumes of said right virtual camera and said left virtual camera, said view volume setting unit being adapted to set the view volumes such that both of the view volumes of said right virtual camera and said left virtual camera include a display target region, which is a region in said virtual space at least to be displayed on said display, and the view volume of at least one virtual camera extends asymmetrically with respect to a line extending from the position of one virtual camera in said camera direction, toward a side where the other virtual camera is present. 23. A non-transitory storage medium encoded with a computer-readable program and executable by a computer utilized for controlling stereoscopic display, the computer-readable program comprising: input instructions for accepting input of a first projection matrix and a first view matrix defining a reference virtual camera in a prescribed virtual space as well as a distance from the reference virtual camera to a virtual plane region, said virtual plane region being a region on a prescribed plane perpendicular to a reference camera direction which is a camera direction of the reference virtual camera; virtual camera setting instructions for setting said reference virtual camera in said virtual space based on said first projection matrix, said first view matrix, and the distance from said reference virtual camera to said virtual plane region accepted as a result of execution of said input instructions and to set respective positions and directions of a right virtual camera and a left virtual camera within said virtual space used for virtual photographing in said virtual space, said virtual camera setting instructions being adapted such that camera directions of said right virtual camera and said left virtual camera are oriented in an identical direction and the camera direction is perpendicular to a straight line passing through the positions of both of these virtual cameras; view volume setting instructions for setting respective view volumes of said right virtual camera and said left virtual camera, said view volume setting instructions being adapted to set the view volumes such that both of the view volume of said right virtual camera and the view volume of said left virtual camera include a display target region, which is a region in said virtual space at least to stereoscopically be displayed, and the view volume of at least one virtual camera extends asymmetrically with respect to a line extending from the position of one virtual camera in said camera direction, toward a side where the other virtual camera is present; and output instructions for outputting a second projection matrix and a second view matrix defining said right virtual camera set as a result of execution of said virtual camera setting instructions and said view volume setting instructions and a third projection matrix and a third view matrix defining said left virtual camera set as a result of execution of said virtual camera setting instructions and said view volume setting instructions.
A display control program includes virtual camera setting instructions for setting respective positions and directions of a right virtual camera and a left virtual camera within a prescribed virtual space used for virtual photographing in the virtual space, and view volume setting instructions for setting respective view volumes of the right virtual camera and the left virtual camera. The view volume setting instructions are adapted to set the view volumes such that both of the view volume of the right virtual camera and the view volume of the left virtual camera include a display target region, which is a region in the virtual space at least to be displayed on a display, and the view volume of at least one virtual camera extends asymmetrically with respect to a line extending from the position of one virtual camera in the camera direction, toward a side where the other virtual camera is present.1. A non-transitory storage medium encoded with a computer-readable display control program and executable by a computer for controlling a display capable of providing stereoscopic display, the computer-readable display control program comprising: virtual camera setting instructions for setting respective positions and directions of a right virtual camera and a left virtual camera within a prescribed virtual space used for virtual photographing in said virtual space, said right virtual camera and said left virtual camera being for generating a right image and a left image used for providing stereoscopic display of an image expressing said virtual space on said display, respectively, said virtual camera setting instructions being adapted such that camera directions of said right virtual camera and said left virtual camera are oriented in an identical direction and the camera direction is perpendicular to a straight line passing through the positions of both of these virtual cameras; and view volume setting instructions for setting respective view volumes of said right virtual camera and said left virtual camera, said view volume setting instructions being adapted to set the view volumes such that both of the view volumes of said right virtual camera and said left virtual camera include a display target region, which is a region in said virtual space at least to be displayed on said display, and the view volume of at least one virtual camera extends asymmetrically with respect to a line extending from the position of one virtual camera in said camera direction, toward a side where the other virtual camera is present. 2. The non-transitory storage medium according to claim 1, wherein said virtual camera setting instructions are adapted to set said right virtual camera and said left virtual camera such that said camera directions of the right virtual camera and the left virtual camera are identical to a reference camera direction which is a camera direction of a reference virtual camera, in response to setting of said reference virtual camera within said virtual space, and said view volume setting instructions are adapted to set as said display target region, a reference virtual plane region, which is included in a view volume of said reference virtual camera and is a region on a prescribed plane perpendicular to said reference camera direction. 3. The non-transitory storage medium according to claim 2, wherein said virtual camera setting instructions are adapted to carry out at least one of setting said right virtual camera at a position resulted from movement of an arrangement position of said reference virtual camera toward right along a direction perpendicular to said reference camera direction, and setting said left virtual camera at a position resulted from movement of an arrangement position of said reference virtual camera toward left along the direction perpendicular to said reference camera direction. 4. The non-transitory storage medium according to claim 3, wherein said virtual camera setting instructions are adapted to set said right virtual camera at the position resulted from movement of the arrangement position of said reference virtual camera toward right by a prescribed distance along the direction perpendicular to said reference camera direction and to set said left virtual camera at the position resulted from movement of the arrangement position of said reference virtual camera toward left by said prescribed distance along the direction perpendicular to said reference camera direction. 5. The non-transitory storage medium according to claim 2, wherein said view volume setting instructions are adapted to set the respective view volumes of said right virtual camera and said left virtual camera such that both of (i) a cross-section at a position corresponding to said reference virtual plane region in the view volume of said right virtual camera and (ii) a cross-section at a position corresponding to said reference virtual plane region in the view volume of said left virtual camera match with a cross-section at a position corresponding to said reference virtual plane region in the view volume of said reference virtual camera. 6. The non-transitory storage medium according to claim 2, wherein said view volume setting instructions include instructions for obtaining a plurality of vertex positions of said reference virtual plane region defining the view volume of said reference virtual camera, instructions for setting the view volume of said right virtual camera by using lines extending from the position of said right virtual camera to respective ones of said plurality of vertex positions, and instructions for setting the view volume of said left virtual camera by using lines extending from the position of said left virtual camera to respective ones of said plurality of vertex positions. 7. The non-transitory storage medium according to claim 2, wherein said view volume setting instructions are adapted to set the respective view volumes of said right virtual camera and said left virtual camera by using a near clipping plane and a far clipping plane of the view volume of said reference virtual camera. 8. The non-transitory storage medium according to claim 2, wherein said display control program further includes first information output instructions for outputting information indicating the respective view volumes of said right virtual camera and said left virtual camera, that are set as a result of execution of said view volume setting instructions. 9. The non-transitory storage medium according to claim 2, wherein said display control program further includes second information output instructions for outputting information indicating a distance between said right virtual camera and said left virtual camera, that is set as a result of execution of said virtual camera setting instructions. 10. The non-transitory storage medium according to claim 9, wherein said second information output instructions are adapted to output a ratio of the distance between said right virtual camera and said left virtual camera, with a width of said reference virtual plane region serving as a reference. 11. The non-transitory storage medium according to claim 2, wherein said display control program includes a program encoded as a library. 12. The non-transitory storage medium according to claim 2, wherein said view volume setting instructions are adapted to set the view volume of said right virtual camera extending asymmetrically and the view volume of said left virtual camera extending asymmetrically such that they extend toward one side, in a manner symmetric with respect to each other. 13. The non-transitory storage medium according to claim 12, wherein said display control program is adapted to accept information for designating a position of a parallax assessment plane in parallel to said reference virtual plane region, for evaluating an amount of parallax produced between said right image generated by said right virtual camera and said left image generated by said left virtual camera. 14. The non-transitory storage medium according to claim 12, wherein said display control program is adapted to set a parallax assessment plane in parallel to said reference virtual plane region, for evaluating an amount of parallax produced between said right image generated by said right virtual camera and said left image generated by said left virtual camera, at a position farthest from said reference virtual camera in the view volumes of said respective virtual cameras. 15. The non-transitory storage medium according to claim 14, wherein said parallax assessment plane is provided on a side opposite to said reference virtual camera, with respect to said reference virtual plane region. 16. The non-transitory storage medium according to claim 2, wherein said virtual camera setting instructions include maximum distance determination instructions for determining a tolerable maximum distance between said right virtual camera and said left virtual camera. 17. The non-transitory storage medium according to claim 16, wherein said display control program further includes mode setting instructions for setting any of first and second modes, and said virtual camera setting instructions include instructions for setting said right virtual camera and said left virtual camera such that an amount of parallax produced between said right image generated by said right virtual camera and said left image generated by said left virtual camera does not exceed a predetermined value when said first mode is set, and instructions for setting said right virtual camera and said left virtual camera such that a distance from said reference virtual plane region to said right virtual camera and said left virtual camera is set to a predetermined value when said second mode is set. 18. The non-transitory storage medium according to claim 1, wherein said display control program further includes change acceptance instructions for changing at least one of the position of said right virtual camera and the position of said left virtual camera set as a result of execution of said virtual camera setting instructions, in response to an indication to change stereoscopic effect. 19. The non-transitory storage medium according to claim 18, wherein said view volume setting instructions are adapted to change the respective view volumes of said right virtual camera and said left virtual camera when the position of said right virtual camera or the position of said left virtual camera is changed as a result of execution of said change acceptance instructions. 20. The non-transitory storage medium according to claim 18, wherein said change acceptance instructions are adapted to accept said indication to change stereoscopic effect in accordance with a sliding operation along a prescribed one axis direction. 21. The non-transitory storage medium according to claim 18, wherein said change acceptance instructions are adapted to bring the distance between said right virtual camera and said left virtual camera initially set as a result of execution of said virtual camera setting instructions into correspondence with a substantially maximum value of an adjustment range based on said indication of stereoscopic effect. 22. An information processing system, comprising: a display capable of providing stereoscopic display; and a virtual camera setting unit for setting respective positions and directions of a right virtual camera and a left virtual camera within a prescribed virtual space used for virtual photographing in said virtual space, said right virtual camera and said left virtual camera being for generating a right image and a left image used for providing stereoscopic display of an image expressing said virtual space on said display respectively, said virtual camera setting unit being configured such that camera directions of said right virtual camera and said left virtual camera are oriented in an identical direction and the camera direction is perpendicular to a straight line passing through the positions of both of these virtual cameras; and a view volume setting unit for setting respective view volumes of said right virtual camera and said left virtual camera, said view volume setting unit being adapted to set the view volumes such that both of the view volumes of said right virtual camera and said left virtual camera include a display target region, which is a region in said virtual space at least to be displayed on said display, and the view volume of at least one virtual camera extends asymmetrically with respect to a line extending from the position of one virtual camera in said camera direction, toward a side where the other virtual camera is present. 23. A non-transitory storage medium encoded with a computer-readable program and executable by a computer utilized for controlling stereoscopic display, the computer-readable program comprising: input instructions for accepting input of a first projection matrix and a first view matrix defining a reference virtual camera in a prescribed virtual space as well as a distance from the reference virtual camera to a virtual plane region, said virtual plane region being a region on a prescribed plane perpendicular to a reference camera direction which is a camera direction of the reference virtual camera; virtual camera setting instructions for setting said reference virtual camera in said virtual space based on said first projection matrix, said first view matrix, and the distance from said reference virtual camera to said virtual plane region accepted as a result of execution of said input instructions and to set respective positions and directions of a right virtual camera and a left virtual camera within said virtual space used for virtual photographing in said virtual space, said virtual camera setting instructions being adapted such that camera directions of said right virtual camera and said left virtual camera are oriented in an identical direction and the camera direction is perpendicular to a straight line passing through the positions of both of these virtual cameras; view volume setting instructions for setting respective view volumes of said right virtual camera and said left virtual camera, said view volume setting instructions being adapted to set the view volumes such that both of the view volume of said right virtual camera and the view volume of said left virtual camera include a display target region, which is a region in said virtual space at least to stereoscopically be displayed, and the view volume of at least one virtual camera extends asymmetrically with respect to a line extending from the position of one virtual camera in said camera direction, toward a side where the other virtual camera is present; and output instructions for outputting a second projection matrix and a second view matrix defining said right virtual camera set as a result of execution of said virtual camera setting instructions and said view volume setting instructions and a third projection matrix and a third view matrix defining said left virtual camera set as a result of execution of said virtual camera setting instructions and said view volume setting instructions.
2,400
8,058
8,058
14,153,110
2,442
Disclosed is a method of transparently detecting authentication status of endpoint devices in a network. This method may be used for differentiating guest or rogue endpoints from enterprise endpoints.
1. A method for determining network resource access for a specific computational device connected to a data network, said method comprising: recording, by a network security monitoring device communicatively coupled to the data network, authentication attempt related data traffic, to which the monitoring device is not a party, which authentication attempt related data traffic is between the specific computational device and an authentication server communicatively coupled to the data network; updating, by the network security monitoring device, at least one record associated with the specific computational device within a data table, based on the recorded authentication attempt related data traffic; and factoring the at least one record associated with the specific computational device within the data table when determining access to network computational resources for the specific computational device 2. The method according to claim 1, wherein the record is updated, by the network security monitoring device, to indicate that the device is a guest or a rogue device when authentication response related data traffic from the authentication server indicates a login failure. 3. The method according to claim 1, wherein the record is updated, by the network security monitoring device, to indicate that the device is a non-guest device when authentication response related data traffic from the authentication server indicates a successful login. 4. A network monitoring device for determining network resource access for a specific computational device connected to a data network, said monitoring device comprising: communication circuitry adapted to record data traffic exchanged between other devices within a data network; a network monitoring module including processing circuitry functionally associated with said communication circuitry and configured to: (1) monitor, via said communication circuitry, authentication attempt related data traffic, to which the monitoring device is not a party, which authentication attempt related data traffic is between the specific computational device and an authentication server communicatively coupled to the data network; and (2) to update at least one record associated with the specific computational device within a data table, based on the monitored authentication attempt related data traffic; wherein, the at least one record associated with the specific computational device within the data table is considered when determining access to network resources for the specific computational device. 5. The device according to claim 4, wherein the record is updated to indicate that the device is a guest or a rogue device when authentication response related data traffic from the authentication server indicates a login failure. 6. The device according to claim 4, wherein the record is updated to indicate that the device is a non-guest device when authentication response related data traffic from the authentication server indicates a successful login.
Disclosed is a method of transparently detecting authentication status of endpoint devices in a network. This method may be used for differentiating guest or rogue endpoints from enterprise endpoints.1. A method for determining network resource access for a specific computational device connected to a data network, said method comprising: recording, by a network security monitoring device communicatively coupled to the data network, authentication attempt related data traffic, to which the monitoring device is not a party, which authentication attempt related data traffic is between the specific computational device and an authentication server communicatively coupled to the data network; updating, by the network security monitoring device, at least one record associated with the specific computational device within a data table, based on the recorded authentication attempt related data traffic; and factoring the at least one record associated with the specific computational device within the data table when determining access to network computational resources for the specific computational device 2. The method according to claim 1, wherein the record is updated, by the network security monitoring device, to indicate that the device is a guest or a rogue device when authentication response related data traffic from the authentication server indicates a login failure. 3. The method according to claim 1, wherein the record is updated, by the network security monitoring device, to indicate that the device is a non-guest device when authentication response related data traffic from the authentication server indicates a successful login. 4. A network monitoring device for determining network resource access for a specific computational device connected to a data network, said monitoring device comprising: communication circuitry adapted to record data traffic exchanged between other devices within a data network; a network monitoring module including processing circuitry functionally associated with said communication circuitry and configured to: (1) monitor, via said communication circuitry, authentication attempt related data traffic, to which the monitoring device is not a party, which authentication attempt related data traffic is between the specific computational device and an authentication server communicatively coupled to the data network; and (2) to update at least one record associated with the specific computational device within a data table, based on the monitored authentication attempt related data traffic; wherein, the at least one record associated with the specific computational device within the data table is considered when determining access to network resources for the specific computational device. 5. The device according to claim 4, wherein the record is updated to indicate that the device is a guest or a rogue device when authentication response related data traffic from the authentication server indicates a login failure. 6. The device according to claim 4, wherein the record is updated to indicate that the device is a non-guest device when authentication response related data traffic from the authentication server indicates a successful login.
2,400
8,059
8,059
14,918,348
2,477
An air to ground communication system provides internet access to aircraft from ground based stations. The air to ground system shares spectrum with uplink portions of a satellite communication spectrum. Interference mitigation techniques are employed to avoid interference between the ground based communications and satellite communications. Fade mitigation techniques are employed to provide communication to aircraft at low angles of elevation in the presence of rain.
1. A ground base station comprising: a transceiver configured to transmit and receive signals on a satellite uplink band; and a controller configured to reduce interference with satellite communications on the satellite uplink band, the controller further configured: to handoff an aircraft transceiver to another ground base station when the ground base station and aircraft transceiver are aligned with a non-geostationary satellite when the other ground base station is available for handoff, and to control transmit power of the transceiver to use a reduced power for maintaining a communication link while reducing interference with satellite communications. 2. The ground base station of claim 1, in which the controller is further configured to spread transmit power across a frequency band to reduce power spectral density of transmissions. 3. The ground base station of claim 1, in which the ground base station is further configured to direct transmissions away from a geostationary arc of Earth. 4. The ground base station of claim 1, in which the controller is further configured to reduce interference with satellite communications by directing ground base station antennas away from the equator. 5. The ground base station of claim 1, in which the controller is further configured to reduce interference with satellite communications by reducing a data rate on the communication link between the ground base station and the aircraft transceiver until the ground base station and the aircraft transceiver are no longer aligned with the non-geostationary satellite. 6. The ground base station of claim 1, in which the controller is further configured to select the other ground base station based at least in part on a data rate available from the other ground base station and whether the other ground base station and the aircraft transceiver are aligned with the non-geostationary satellite. 7. The ground base station of claim 1, in which receiving antennas and transmit antennas are configured separately by beam forming on a single antenna. 8. A method of avoiding signal degradation in a wireless air to ground communication system, comprising: monitoring a signal strength between a ground base station and an aircraft transceiver communicating in a satellite uplink band; determining based on the signal strength whether a signal is subject to excessive rain fade according to a predetermined criteria; and in response to determining that the signal strength is subject to excessive rain fade, handing off the communication from the ground base station to a second ground base station. 9. The method of claim 8, further comprising: returning the communication to the ground base station in response to determining the signal strength is no longer subject to excessive rain fade. 10. The method of claim 8, further comprising: searching for signals being transmitted from neighboring ground base stations away from a geostationary arc of Earth; determining a best ground base station with which to communicate based on the signal strength; and in response to determining the best ground base station, establishing communication with the best ground base station. 11. The method of claim 8, further comprising: controlling transmit power of the ground base station and the aircraft transceiver to use a reduced power for maintaining a communication link while reducing interference with satellite communications. 12. The method of claim 8, further comprising: estimating a received Signal to Interference plus Noise (SINR) at the ground base station and the aircraft transceiver; and adjusting data rates of the ground base station and the aircraft transceiver to a highest rate that the transceiver may still correctly decode a signal with a predetermined probability. 13. The method of claim 12, in which a beam of the ground base station is directed toward the aircraft transceiver based upon position location information indicating a location of the aircraft transceiver. 14. The method of claim 8, further comprising: adjusting a beam of the aircraft transceiver to be directed toward a ground base station serving the aircraft transceiver. 15. The method of claim 8, further comprising: assigning time slots to system wide control channels on a downlink direction to the aircraft transceiver; transmitting on a wide beam in the assigned time slots to enable signal strength measurements; and transmitting data on a narrow beam directed to the aircraft transceiver in other time slots. 16. An apparatus for avoiding signal degradation in a wireless air to ground communication system, comprising: means for monitoring a signal strength between a ground base station and an aircraft transceiver communicating in a satellite uplink band; means for determining based on the signal strength whether the signal is subject to excessive rain fade according to a predetermined criteria; and means for handing off the communication from the ground base station to a second ground base station in response to determining that the signal strength is subject to excessive rain fade. 17. The apparatus of claim 16, further comprising: means for returning the communication to the ground base station in response to determining the signal strength is no longer subject to excessive rain fade. 18. The apparatus of claim 16, further comprising: means for searching for signals being transmitted from neighboring ground base stations away from a geostationary arc of Earth; means for determining a best ground base station with which to communicate based on the signal strength; and means for establishing communication with the best ground base station in response to determining the best ground base station. 19. The apparatus of claim 16, further comprising: means for controlling transmit power of the ground base station and the aircraft transceiver to use a reduced power for maintaining a communication link while reducing interference with satellite communications. 20. The apparatus of claim 16, further comprising: means for estimating a received Signal to Interference plus Noise (SINR) at the ground base station and the aircraft transceiver; and means for adjusting data rates of the ground base station and the aircraft transceiver to a highest rate that the transceiver may still correctly decode a signal with a predetermined probability. 21. The apparatus of claim 20, in which a beam of the ground base station is directed toward the aircraft transceiver based upon position location information indicating a location of the aircraft transceiver. 22. The apparatus of claim 16, further comprising: means for adjusting a beam of the aircraft transceiver to be directed toward a ground base station serving the aircraft transceiver. 23. The apparatus of claim 16, further comprising: means for assigning time slots to system wide control channels on a downlink direction to the aircraft transceiver; means for transmitting on a wide beam in the assigned time slots to enable signal strength measurements; and means for transmitting data on a narrow beam directed to the aircraft transceiver in other time slots. 24. An apparatus for wireless communication comprising: at least one processor; and a memory coupled to the at least one processor, the at least one processor being configured: to monitor a signal strength between a ground base station and an aircraft transceiver communicating in a satellite uplink band; to determine based on the signal strength whether a signal is subject to excessive rain fade according to a predetermined criteria; and to hand off the communication from the ground base station to a second ground base station in response to determining that the signal strength is subject to excessive rain fade.
An air to ground communication system provides internet access to aircraft from ground based stations. The air to ground system shares spectrum with uplink portions of a satellite communication spectrum. Interference mitigation techniques are employed to avoid interference between the ground based communications and satellite communications. Fade mitigation techniques are employed to provide communication to aircraft at low angles of elevation in the presence of rain.1. A ground base station comprising: a transceiver configured to transmit and receive signals on a satellite uplink band; and a controller configured to reduce interference with satellite communications on the satellite uplink band, the controller further configured: to handoff an aircraft transceiver to another ground base station when the ground base station and aircraft transceiver are aligned with a non-geostationary satellite when the other ground base station is available for handoff, and to control transmit power of the transceiver to use a reduced power for maintaining a communication link while reducing interference with satellite communications. 2. The ground base station of claim 1, in which the controller is further configured to spread transmit power across a frequency band to reduce power spectral density of transmissions. 3. The ground base station of claim 1, in which the ground base station is further configured to direct transmissions away from a geostationary arc of Earth. 4. The ground base station of claim 1, in which the controller is further configured to reduce interference with satellite communications by directing ground base station antennas away from the equator. 5. The ground base station of claim 1, in which the controller is further configured to reduce interference with satellite communications by reducing a data rate on the communication link between the ground base station and the aircraft transceiver until the ground base station and the aircraft transceiver are no longer aligned with the non-geostationary satellite. 6. The ground base station of claim 1, in which the controller is further configured to select the other ground base station based at least in part on a data rate available from the other ground base station and whether the other ground base station and the aircraft transceiver are aligned with the non-geostationary satellite. 7. The ground base station of claim 1, in which receiving antennas and transmit antennas are configured separately by beam forming on a single antenna. 8. A method of avoiding signal degradation in a wireless air to ground communication system, comprising: monitoring a signal strength between a ground base station and an aircraft transceiver communicating in a satellite uplink band; determining based on the signal strength whether a signal is subject to excessive rain fade according to a predetermined criteria; and in response to determining that the signal strength is subject to excessive rain fade, handing off the communication from the ground base station to a second ground base station. 9. The method of claim 8, further comprising: returning the communication to the ground base station in response to determining the signal strength is no longer subject to excessive rain fade. 10. The method of claim 8, further comprising: searching for signals being transmitted from neighboring ground base stations away from a geostationary arc of Earth; determining a best ground base station with which to communicate based on the signal strength; and in response to determining the best ground base station, establishing communication with the best ground base station. 11. The method of claim 8, further comprising: controlling transmit power of the ground base station and the aircraft transceiver to use a reduced power for maintaining a communication link while reducing interference with satellite communications. 12. The method of claim 8, further comprising: estimating a received Signal to Interference plus Noise (SINR) at the ground base station and the aircraft transceiver; and adjusting data rates of the ground base station and the aircraft transceiver to a highest rate that the transceiver may still correctly decode a signal with a predetermined probability. 13. The method of claim 12, in which a beam of the ground base station is directed toward the aircraft transceiver based upon position location information indicating a location of the aircraft transceiver. 14. The method of claim 8, further comprising: adjusting a beam of the aircraft transceiver to be directed toward a ground base station serving the aircraft transceiver. 15. The method of claim 8, further comprising: assigning time slots to system wide control channels on a downlink direction to the aircraft transceiver; transmitting on a wide beam in the assigned time slots to enable signal strength measurements; and transmitting data on a narrow beam directed to the aircraft transceiver in other time slots. 16. An apparatus for avoiding signal degradation in a wireless air to ground communication system, comprising: means for monitoring a signal strength between a ground base station and an aircraft transceiver communicating in a satellite uplink band; means for determining based on the signal strength whether the signal is subject to excessive rain fade according to a predetermined criteria; and means for handing off the communication from the ground base station to a second ground base station in response to determining that the signal strength is subject to excessive rain fade. 17. The apparatus of claim 16, further comprising: means for returning the communication to the ground base station in response to determining the signal strength is no longer subject to excessive rain fade. 18. The apparatus of claim 16, further comprising: means for searching for signals being transmitted from neighboring ground base stations away from a geostationary arc of Earth; means for determining a best ground base station with which to communicate based on the signal strength; and means for establishing communication with the best ground base station in response to determining the best ground base station. 19. The apparatus of claim 16, further comprising: means for controlling transmit power of the ground base station and the aircraft transceiver to use a reduced power for maintaining a communication link while reducing interference with satellite communications. 20. The apparatus of claim 16, further comprising: means for estimating a received Signal to Interference plus Noise (SINR) at the ground base station and the aircraft transceiver; and means for adjusting data rates of the ground base station and the aircraft transceiver to a highest rate that the transceiver may still correctly decode a signal with a predetermined probability. 21. The apparatus of claim 20, in which a beam of the ground base station is directed toward the aircraft transceiver based upon position location information indicating a location of the aircraft transceiver. 22. The apparatus of claim 16, further comprising: means for adjusting a beam of the aircraft transceiver to be directed toward a ground base station serving the aircraft transceiver. 23. The apparatus of claim 16, further comprising: means for assigning time slots to system wide control channels on a downlink direction to the aircraft transceiver; means for transmitting on a wide beam in the assigned time slots to enable signal strength measurements; and means for transmitting data on a narrow beam directed to the aircraft transceiver in other time slots. 24. An apparatus for wireless communication comprising: at least one processor; and a memory coupled to the at least one processor, the at least one processor being configured: to monitor a signal strength between a ground base station and an aircraft transceiver communicating in a satellite uplink band; to determine based on the signal strength whether a signal is subject to excessive rain fade according to a predetermined criteria; and to hand off the communication from the ground base station to a second ground base station in response to determining that the signal strength is subject to excessive rain fade.
2,400
8,060
8,060
15,193,602
2,436
A fine grained permission method and system that parameterizes permissions based on an objective criterion. The method includes accessing libraries of application programs requiring a permission, automatically extracting types of the parameters and respective corresponding fields read by the libraries requiring the permission, filtering the extracted types of parameters and fields based on a usage criteria to determine a filtered type of parameter and field for the permission and storing the filtered type parameter and field for the permission in a database. A request for a permission is passed to a fine grained permission module which obtains the filtered type of parameter and field for the permission, determines a specific parameter for the permission based on the filtered type of parameter and field and parameterizes the permission using the specific parameter. Downloading of the application program is completed by limiting the permission based on the specific parameter.
1. A method for limiting application program permissions comprising; (a) accessing libraries of a plurality application programs requiring a first permission, the plurality of application programs being for a specific operating system; (b) automatically extracting types of the parameters and respective corresponding fields read by the libraries requiring the first permission; (c) filtering the extracted types of parameters and respective corresponding fields based on a usage criteria to determine a filtered type of parameter and respective corresponding field for the permission; (d) storing the filtered type parameter and respective corresponding field for the first permission in a database. 2. The method of claim 1, further including repeating the steps (a)-(d) for a plurality of permissions for a plurality of application programs for the specific operating system. 3. The method of claim 1, further including: (e) receiving a request for a permission required by a library of an application program running on the specific operating system; (f) obtaining from the database the filtered type of parameter and respective corresponding field for the permission; (g) determining a specific parameter for the permission based on the filtered type of parameter and respective corresponding field obtained from the database; (h) parameterizing the permission using the specific parameter; and (i) limiting the permission based on the specific parameter. 4. The method of claim 1, wherein step (c) includes determining the types of parameters and respective corresponding fields most often used by the libraries requiring the permission. 5. The method of claim 4, wherein the step (c) includes determining the types of parameters and respective corresponding fields used by at least a threshold percentage of the libraries requiring the permission. 6. A system comprising: at least one data processor connected to at least one memory that stores software instructions, where execution of the software instructions by the at least one data processor causes the system to limit application program permissions by: (a) accessing libraries of a plurality application programs requiring a first permission, the plurality of application programs being for a specific operating system; (b) automatically extracting types of the parameters and respective corresponding fields read by the libraries requiring the first permission; (c) filtering the extracted types of parameters and respective corresponding fields based on a usage criteria to determine a filtered type of parameter and respective corresponding field for the permission; (d) storing the filtered type parameter and respective corresponding field for the first permission in a database. 7. The system of claim 6, further including repeating the steps (a)-(d) for a plurality of permissions for a plurality of application programs for the specific operating system. 8. The system of claim 6, wherein execution of the software instructions by the at least one data processor causes the system to further perform the steps of: (e) receiving a request for a permission required by a library of an application program running on the specific operating system; (f) obtaining from the database the filtered type of parameter and respective corresponding field for the permission; (g) determining a specific parameter for the permission based on the filtered type of parameter and respective corresponding field obtained from the database; (h) parameterizing the permission using the specific parameter; and (i) limiting the permission based on the specific parameter. 9. The system of claim 6, wherein step (c) includes determining the types of parameters and respective corresponding fields most often used by the libraries requiring the permission. 10. The system of claim 9, wherein the step (c) includes determining the types of parameters and respective corresponding fields used by at least a threshold percentage of the libraries requiring the permission. 11. The system of claim 8, comprising a mobile device having the at least one data processor connected to the at least one memory that stores the software instructions, the system further comprising an application program module for downloading the application program by limiting the permission based on the specific parameter. 12. The system of claim 11, further comprising a fine grained permission module for obtaining from the database the filtered type of parameter and respective corresponding field for the permission, for determining a specific parameter for the permission based on the filtered type of parameter and respective corresponding field obtained from the database and parameterizing the permission using the specific parameter. 13. A computer program product comprising: software instructions on a non-transitory computer-readable medium, where execution of the software instructions using a computer causes the computer to limit application program permissions by: (a) accessing libraries of a plurality application programs requiring a first permission, the plurality of application programs being for a specific operating system; (b) automatically extracting types of the parameters and respective corresponding fields read by the libraries requiring the first permission; (c) filtering the extracted types of parameters and respective corresponding fields based on a usage criteria to determine a filtered type of parameter and respective corresponding field for the permission; (d) storing the filtered type parameter and respective corresponding field for the first permission in a database. 14. The computer program product of claim 13, further including repeating the steps (a)-(d) for a plurality of permissions for a plurality of application programs for the specific operating system. 15. The computer program product of claim 13, further including: (e) receiving a request for a permission required by a library of an application program running on the specific operating system; (f) obtaining from the database the filtered type of parameter and respective corresponding field for the permission; (g) determining a specific parameter for the permission based on the filtered type of parameter and respective corresponding field obtained from the database; (h) parameterizing the permission using the specific parameter; and (i) limiting the permission based on the specific parameter. 16. The computer program product of claim 13, wherein step (c) includes determining the types of parameters and respective corresponding fields most often used by the libraries requiring the permission. 17. The computer program product of claim 16, wherein the step (c) includes determining the types of parameters and respective corresponding fields used by at least a threshold percentage of the libraries requiring the permission. 18. The computer program product of claim 15, software instructions include an application program module for a mobile device for downloading the application program by limiting the permission based on the specific parameter. 19. The computer program product of claim 18, wherein the software instructions include a fine grained permission module for obtaining from the database the filtered type of parameter and respective corresponding field for the permission, for determining a specific parameter for the permission based on the filtered type of parameter and respective corresponding field obtained from the database and parameterizing the permission using the specific parameter.
A fine grained permission method and system that parameterizes permissions based on an objective criterion. The method includes accessing libraries of application programs requiring a permission, automatically extracting types of the parameters and respective corresponding fields read by the libraries requiring the permission, filtering the extracted types of parameters and fields based on a usage criteria to determine a filtered type of parameter and field for the permission and storing the filtered type parameter and field for the permission in a database. A request for a permission is passed to a fine grained permission module which obtains the filtered type of parameter and field for the permission, determines a specific parameter for the permission based on the filtered type of parameter and field and parameterizes the permission using the specific parameter. Downloading of the application program is completed by limiting the permission based on the specific parameter.1. A method for limiting application program permissions comprising; (a) accessing libraries of a plurality application programs requiring a first permission, the plurality of application programs being for a specific operating system; (b) automatically extracting types of the parameters and respective corresponding fields read by the libraries requiring the first permission; (c) filtering the extracted types of parameters and respective corresponding fields based on a usage criteria to determine a filtered type of parameter and respective corresponding field for the permission; (d) storing the filtered type parameter and respective corresponding field for the first permission in a database. 2. The method of claim 1, further including repeating the steps (a)-(d) for a plurality of permissions for a plurality of application programs for the specific operating system. 3. The method of claim 1, further including: (e) receiving a request for a permission required by a library of an application program running on the specific operating system; (f) obtaining from the database the filtered type of parameter and respective corresponding field for the permission; (g) determining a specific parameter for the permission based on the filtered type of parameter and respective corresponding field obtained from the database; (h) parameterizing the permission using the specific parameter; and (i) limiting the permission based on the specific parameter. 4. The method of claim 1, wherein step (c) includes determining the types of parameters and respective corresponding fields most often used by the libraries requiring the permission. 5. The method of claim 4, wherein the step (c) includes determining the types of parameters and respective corresponding fields used by at least a threshold percentage of the libraries requiring the permission. 6. A system comprising: at least one data processor connected to at least one memory that stores software instructions, where execution of the software instructions by the at least one data processor causes the system to limit application program permissions by: (a) accessing libraries of a plurality application programs requiring a first permission, the plurality of application programs being for a specific operating system; (b) automatically extracting types of the parameters and respective corresponding fields read by the libraries requiring the first permission; (c) filtering the extracted types of parameters and respective corresponding fields based on a usage criteria to determine a filtered type of parameter and respective corresponding field for the permission; (d) storing the filtered type parameter and respective corresponding field for the first permission in a database. 7. The system of claim 6, further including repeating the steps (a)-(d) for a plurality of permissions for a plurality of application programs for the specific operating system. 8. The system of claim 6, wherein execution of the software instructions by the at least one data processor causes the system to further perform the steps of: (e) receiving a request for a permission required by a library of an application program running on the specific operating system; (f) obtaining from the database the filtered type of parameter and respective corresponding field for the permission; (g) determining a specific parameter for the permission based on the filtered type of parameter and respective corresponding field obtained from the database; (h) parameterizing the permission using the specific parameter; and (i) limiting the permission based on the specific parameter. 9. The system of claim 6, wherein step (c) includes determining the types of parameters and respective corresponding fields most often used by the libraries requiring the permission. 10. The system of claim 9, wherein the step (c) includes determining the types of parameters and respective corresponding fields used by at least a threshold percentage of the libraries requiring the permission. 11. The system of claim 8, comprising a mobile device having the at least one data processor connected to the at least one memory that stores the software instructions, the system further comprising an application program module for downloading the application program by limiting the permission based on the specific parameter. 12. The system of claim 11, further comprising a fine grained permission module for obtaining from the database the filtered type of parameter and respective corresponding field for the permission, for determining a specific parameter for the permission based on the filtered type of parameter and respective corresponding field obtained from the database and parameterizing the permission using the specific parameter. 13. A computer program product comprising: software instructions on a non-transitory computer-readable medium, where execution of the software instructions using a computer causes the computer to limit application program permissions by: (a) accessing libraries of a plurality application programs requiring a first permission, the plurality of application programs being for a specific operating system; (b) automatically extracting types of the parameters and respective corresponding fields read by the libraries requiring the first permission; (c) filtering the extracted types of parameters and respective corresponding fields based on a usage criteria to determine a filtered type of parameter and respective corresponding field for the permission; (d) storing the filtered type parameter and respective corresponding field for the first permission in a database. 14. The computer program product of claim 13, further including repeating the steps (a)-(d) for a plurality of permissions for a plurality of application programs for the specific operating system. 15. The computer program product of claim 13, further including: (e) receiving a request for a permission required by a library of an application program running on the specific operating system; (f) obtaining from the database the filtered type of parameter and respective corresponding field for the permission; (g) determining a specific parameter for the permission based on the filtered type of parameter and respective corresponding field obtained from the database; (h) parameterizing the permission using the specific parameter; and (i) limiting the permission based on the specific parameter. 16. The computer program product of claim 13, wherein step (c) includes determining the types of parameters and respective corresponding fields most often used by the libraries requiring the permission. 17. The computer program product of claim 16, wherein the step (c) includes determining the types of parameters and respective corresponding fields used by at least a threshold percentage of the libraries requiring the permission. 18. The computer program product of claim 15, software instructions include an application program module for a mobile device for downloading the application program by limiting the permission based on the specific parameter. 19. The computer program product of claim 18, wherein the software instructions include a fine grained permission module for obtaining from the database the filtered type of parameter and respective corresponding field for the permission, for determining a specific parameter for the permission based on the filtered type of parameter and respective corresponding field obtained from the database and parameterizing the permission using the specific parameter.
2,400
8,061
8,061
13,117,417
2,439
A controller receives an encrypted media stream (“EMS”) and an identifier indicative of a selected content key from a headend. The EMS is encrypted with an encryption key and can be decrypted with a corresponding decryption key which is determinable from the selected content key. The controller receives indexes and content keys from the headend prior to receiving the EMS. Each index respectively corresponds to an identifier with one index corresponding to the identifier indicative of the selected content key. The content keys correspond to the indexes with one content key corresponding to the index corresponding to the identifier indicative of the selected content key. The controller selects the index corresponding to the identifier indicative of the selected content key upon receiving the EMS, determines the selected content key from the selected index, determines the decryption key from the selected content key, and decrypts the EMS with the decryption key.
1. A method comprising: receiving, at a computing device, an encrypted media stream; receiving, at the computing device, an identifier; receiving, at the computing device, a plurality of indexes, wherein one of the indexes corresponds to the identifier; storing the plurality of indexes in an index memory; receiving, at the computing device, a plurality of content keys, wherein one of the content keys corresponds to the index that corresponds to the identifier; storing the plurality of content keys in a content key memory; selecting, by the computing device, the index corresponding to the identifier from the index memory; selecting, by the computing device, a content key using the selected index from the content key memory; generating, by the computing device, a decryption key based on the selected content key; and decrypting, by the computing device, at least a portion of the encrypted media stream using the decryption key. 2. The method of claim 1 wherein the plurality of indexes is received at the computing device in an entitlement management message prior to receiving the encrypted media stream. 3. The method of claim 1 wherein the plurality of content keys is received at the computing device in an entitlement management message prior to receiving the encrypted media stream. 4. The method of claim 1 wherein storing the plurality of indexes in the index memory results in the plurality of indexes being stored in an index table included in the index memory. 5. The method of claim 1 wherein storing the plurality of content keys in the content key memory results in the plurality of content keys being stored in a content key list included in the content key memory. 6. The method of claim 1 wherein the computing device is a set-top-box. 7. The method of claim 1 wherein the identifier is a program identifier for a video program included in the encrypted media stream. 8. The method of claim 1 wherein the identifier is a video-on-demand identifier. 9. The method of claim 1 wherein the generating includes generating the decryption key as a function of the selected content key and a working key modifier. 10. The method of claim 9 wherein the generating includes generating the decryption key as a function of the selected content key and the working key modifier using at least one of an exclusive OR (EXOR) operation and a hashing operation. 11. The method of claim 1 wherein the plurality of indexes comprises a plurality of initialization vector (“IV”) values and the plurality of content keys comprises initialization vectors. 12. A controller comprising: digital circuitry configured to receive an encrypted media stream, wherein the encrypted media stream is encrypted with an encryption key and is configured to be decrypted with a decryption key corresponding to the encryption key, wherein the decryption key is configured to be determined from a selected content key; wherein the digital circuitry is configured to receive with the encrypted media stream an identifier indicative of the selected content key from without receiving with the encrypted media stream either the decryption key or the selected content key; a first non-transitory memory including a plurality of indexes received prior to the encrypted media stream being received by the digital circuitry, wherein each index respectively corresponds to an identifier, with one of the indexes corresponding to the identifier indicative of the selected content key; and a second non-transitory memory including a plurality of content keys received prior to the encrypted media stream being received by the digital circuitry, wherein the plurality of content keys correspond to the plurality of indexes, with one of the content keys corresponding to the index which corresponds to the identifier indicative of the selected content key; wherein the digital circuitry is configured to select from the first non-transitory memory the index corresponding to the identifier indicative of the selected content key in response to receiving the encrypted media stream; wherein the digital circuitry is configured to determine from the second non-transitory memory the selected content key using the selected index; wherein the digital circuitry is configured to determine the decryption key from the selected content key and decrypt the encrypted media stream with the decryption key. 13. The controller of claim 12 wherein: the first non-transitory memory includes a content key index table which includes the plurality of indexes, and the second non-transitory memory includes a content key list which includes the plurality of content keys. 14. The controller of claim 12 wherein: the digital circuitry, the first non-transitory memory, and the second non- transitory memory are part of a set-top-box. 15. The controller of claim 12 wherein: the first non-transitory memory receives the plurality of indexes in an entitlement management message downloaded to the first non-transitory memory prior to the encrypted media stream being received by the digital circuitry. 16. The controller of claim 12 wherein: determining the decryption key from the selected content key includes determining the decryption key from the selected content key and a working key modifier. 17. The controller of claim 16 wherein: the digital circuitry is configured to determine the decryption key from the selected content key and the working key modifier using an exclusive OR (EXOR) or a hashing operator. 18. A controller comprising: a processor, a memory storing executable instructions configured to, when executed by the processor, cause the controller to: receive an encrypted media stream, receive at the computing device an identifier from the provider, receive a plurality of indexes, wherein one of the indexes corresponds to the identifier, store the plurality of indexes in an index memory, receive a plurality of content keys, wherein one of the content keys corresponds to the index that corresponds to the identifier, store the plurality of content keys in a content key memory, select the index corresponding to the identifier from the index memory, select a content key using the selected index from the content key memory, generating a decryption key using the selected content key, and decrypt at least a portion of the encrypted media stream using the decryption key. 19. The controller of claim 18 wherein the memory further stores executable instructions configured to, when executed by the processor, cause the controller to: extract the plurality of indexes from an entitlement management message. 20. The controller of claim 18 wherein the memory further stores executable instructions configured to, when executed by the processor, cause the controller to: extract the plurality of content keys from an entitlement management message.
A controller receives an encrypted media stream (“EMS”) and an identifier indicative of a selected content key from a headend. The EMS is encrypted with an encryption key and can be decrypted with a corresponding decryption key which is determinable from the selected content key. The controller receives indexes and content keys from the headend prior to receiving the EMS. Each index respectively corresponds to an identifier with one index corresponding to the identifier indicative of the selected content key. The content keys correspond to the indexes with one content key corresponding to the index corresponding to the identifier indicative of the selected content key. The controller selects the index corresponding to the identifier indicative of the selected content key upon receiving the EMS, determines the selected content key from the selected index, determines the decryption key from the selected content key, and decrypts the EMS with the decryption key.1. A method comprising: receiving, at a computing device, an encrypted media stream; receiving, at the computing device, an identifier; receiving, at the computing device, a plurality of indexes, wherein one of the indexes corresponds to the identifier; storing the plurality of indexes in an index memory; receiving, at the computing device, a plurality of content keys, wherein one of the content keys corresponds to the index that corresponds to the identifier; storing the plurality of content keys in a content key memory; selecting, by the computing device, the index corresponding to the identifier from the index memory; selecting, by the computing device, a content key using the selected index from the content key memory; generating, by the computing device, a decryption key based on the selected content key; and decrypting, by the computing device, at least a portion of the encrypted media stream using the decryption key. 2. The method of claim 1 wherein the plurality of indexes is received at the computing device in an entitlement management message prior to receiving the encrypted media stream. 3. The method of claim 1 wherein the plurality of content keys is received at the computing device in an entitlement management message prior to receiving the encrypted media stream. 4. The method of claim 1 wherein storing the plurality of indexes in the index memory results in the plurality of indexes being stored in an index table included in the index memory. 5. The method of claim 1 wherein storing the plurality of content keys in the content key memory results in the plurality of content keys being stored in a content key list included in the content key memory. 6. The method of claim 1 wherein the computing device is a set-top-box. 7. The method of claim 1 wherein the identifier is a program identifier for a video program included in the encrypted media stream. 8. The method of claim 1 wherein the identifier is a video-on-demand identifier. 9. The method of claim 1 wherein the generating includes generating the decryption key as a function of the selected content key and a working key modifier. 10. The method of claim 9 wherein the generating includes generating the decryption key as a function of the selected content key and the working key modifier using at least one of an exclusive OR (EXOR) operation and a hashing operation. 11. The method of claim 1 wherein the plurality of indexes comprises a plurality of initialization vector (“IV”) values and the plurality of content keys comprises initialization vectors. 12. A controller comprising: digital circuitry configured to receive an encrypted media stream, wherein the encrypted media stream is encrypted with an encryption key and is configured to be decrypted with a decryption key corresponding to the encryption key, wherein the decryption key is configured to be determined from a selected content key; wherein the digital circuitry is configured to receive with the encrypted media stream an identifier indicative of the selected content key from without receiving with the encrypted media stream either the decryption key or the selected content key; a first non-transitory memory including a plurality of indexes received prior to the encrypted media stream being received by the digital circuitry, wherein each index respectively corresponds to an identifier, with one of the indexes corresponding to the identifier indicative of the selected content key; and a second non-transitory memory including a plurality of content keys received prior to the encrypted media stream being received by the digital circuitry, wherein the plurality of content keys correspond to the plurality of indexes, with one of the content keys corresponding to the index which corresponds to the identifier indicative of the selected content key; wherein the digital circuitry is configured to select from the first non-transitory memory the index corresponding to the identifier indicative of the selected content key in response to receiving the encrypted media stream; wherein the digital circuitry is configured to determine from the second non-transitory memory the selected content key using the selected index; wherein the digital circuitry is configured to determine the decryption key from the selected content key and decrypt the encrypted media stream with the decryption key. 13. The controller of claim 12 wherein: the first non-transitory memory includes a content key index table which includes the plurality of indexes, and the second non-transitory memory includes a content key list which includes the plurality of content keys. 14. The controller of claim 12 wherein: the digital circuitry, the first non-transitory memory, and the second non- transitory memory are part of a set-top-box. 15. The controller of claim 12 wherein: the first non-transitory memory receives the plurality of indexes in an entitlement management message downloaded to the first non-transitory memory prior to the encrypted media stream being received by the digital circuitry. 16. The controller of claim 12 wherein: determining the decryption key from the selected content key includes determining the decryption key from the selected content key and a working key modifier. 17. The controller of claim 16 wherein: the digital circuitry is configured to determine the decryption key from the selected content key and the working key modifier using an exclusive OR (EXOR) or a hashing operator. 18. A controller comprising: a processor, a memory storing executable instructions configured to, when executed by the processor, cause the controller to: receive an encrypted media stream, receive at the computing device an identifier from the provider, receive a plurality of indexes, wherein one of the indexes corresponds to the identifier, store the plurality of indexes in an index memory, receive a plurality of content keys, wherein one of the content keys corresponds to the index that corresponds to the identifier, store the plurality of content keys in a content key memory, select the index corresponding to the identifier from the index memory, select a content key using the selected index from the content key memory, generating a decryption key using the selected content key, and decrypt at least a portion of the encrypted media stream using the decryption key. 19. The controller of claim 18 wherein the memory further stores executable instructions configured to, when executed by the processor, cause the controller to: extract the plurality of indexes from an entitlement management message. 20. The controller of claim 18 wherein the memory further stores executable instructions configured to, when executed by the processor, cause the controller to: extract the plurality of content keys from an entitlement management message.
2,400
8,062
8,062
14,799,954
2,437
A method and system for adaptively securing a protected entity against a potential advanced persistent threat (APT) are provided. The method includes probing a plurality of resources in a network prone to be exploited by an APT attacker; operating at least one security service configured to output signals indicative of APT related activity of each of the plurality of probed resources; generating at least one security event respective of the output signals; determining if the at least one security event satisfies at least one workflow rule; and upon determining that the at least one security event satisfies the at least one workflow rule, generating at least one action with respect to the potential APT attack.
1. A method for adaptively securing a protected entity against a potential advanced persistent threat (APT), comprising: probing a plurality of resources in a network prone to be exploited by an APT attacker; operating at least one security service configured to output signals indicative of APT related activity of each of the plurality of probed resources; generating at least one security event respective of the output signals; determining if the at least one security event satisfies at least one workflow rule; and upon determining that the at least one security event satisfies the at least one workflow rule, generating at least one action with respect to the potential APT attack. 2. The method of claim 1, wherein a resource of the plurality of resources is at least one of: an internal resource in the network and an external resource to the network. 3. The method of claim 2, wherein the plurality of resources are determined respective of different protected tenants in the network, wherein the network is at least an enterprise network. 4. The method of claim 1, wherein the APT related activity includes at least one of: abnormal usage and abnormal operation of each of the plurality of probed resources. 5. The method of claim 4, wherein the APT related activity includes at least one of: scanning, malware propagation, remote desktop communication channels, processes performed in installation channels, brute-force attacks, protocol usage patterns representing fake applications, and drop-zone traffic representing data leaks. 6. The method of claim 4, wherein APT related activity of each of the plurality of probed resources is analyzed by a plurality of security services. 7. The method of claim 1, wherein the at least one workflow rule applies a set of logical operators on the at least one security event to generate the at least one action. 8. The method of claim 1, wherein generating the at least one security event respective of the plurality of output signals further comprises: determining if the plurality of output signals satisfies at least one event rule; and upon determining that the plurality of output signals satisfies the at least one event rule, generating the at least one security event. 9. The method of claim 8, wherein the at least one event rule evaluates at least one of: a signal value, a signal duration, and a signal frequency. 10. The method of claim 1, wherein the at least one security service is any one of: a user network and application behavior anomaly (UNABA), a sandbox, a reputation, a user identity, an attack signature, a challenge-response, a real time risk-chain pattern generation, an anti-virus, and a Web application firewall. 11. The method of claim 1, wherein the at least one security service is a UNABA security service, and wherein operating the UNABA security service further comprises: detecting APT related activity exploiting legitimate users in the network, wherein the APT attacker pretends normal behavior of the users. 12. The method of claim 11, further comprising: maintaining a profile for each host, wherein the profile includes adaptive and real-time baseline parameters for the host's activity over a period of predefined time; and computing, using a plurality of security decision engines, signals of anomaly (SoA) based on the probed APT related activity and the baseline parameters and a set of engine rules, wherein a SoA the signal output by the UNABA security service. 13. The method of claim 12, further comprising: correlating signals provided by other services with the computed SoA; and outputting the correlated signal. 14. The method of claim 12, further comprising: programming each of the plurality of security decision engines to evaluate or detect user behavioral anomalies caused due to APT related activity. 15. The method of claim 1, wherein the at least one action includes activating additional security services to perform any one of: a mitigation action, an investigation action, a detection action. 16. A non-transitory computer readable medium having stored thereon instructions for causing one or more processing units to execute the method according to claim 1. 17. A system for adaptively securing a protected entity against a potential advanced persistent threat (APT), comprising: a processor; and a memory, the memory containing instructions that, when executed by the processor, configure the system to: probe a plurality of resources in a network prone to be exploited by an APT attacker; operate at least one security service configured to output signals indicative of APT related activity of each of the plurality of probed resources; generate at least one security event respective of the output signals; determine if the at least one security event satisfies at least one workflow rule; and generate at least one action with respect to the potential APT attack, upon determining that the at least one security event satisfies the at least one workflow rule. 18. The system of claim 17, wherein a resource of the plurality of resources is at least one of: an internal resource in the network and an external resource to the network. 19. The system of claim 18, wherein the plurality of resources are determined respective of different protected tenants in the network, wherein the network is at least an enterprise network. 20. The system of claim 17, wherein the APT related activity includes at least one of: abnormal usage and abnormal operation of each of the plurality of probed resources. 21. The system of claim 20, wherein the APT related activity includes at least one of: scanning, malware propagation, remote desktop communication channels, processes performed in installation channels, brute-force attacks, protocol usage patterns representing fake applications, and drop-zone traffic representing data leaks. 22. The system of claim 20, wherein APT related activity of each of the plurality of probed resources is analyzed by a plurality of security services. 23. The system of claim 17, wherein the at least one workflow rule applies a set of logical operators on the at least one security event to generate the at least one action. 24. The system of claim 17, wherein the system is further configured to: determine if the plurality of output signals satisfies at least one event rule; and generate the at least one security event, upon determining that the plurality of output signals satisfies the at least one event rule. 25. The system of claim 24, wherein the at least one event rule evaluates at least one of: a signal value, a signal duration, and a signal frequency. 26. The system of claim 17, wherein the at least one security service is any one of: a user network and application behavior anomaly (UNABA), a sandbox, a reputation, a user identity, an attack signature, a challenge-response, a real time risk-chain pattern generation, an anti-virus, and a Web application firewall. 27. The system of claim 17, wherein the at least one security service is a UNABA security service, and wherein operating the UNABA security service further comprises: detecting APT related activity exploiting legitimate users in the network, wherein the APT attacker pretends normal behavior of the users. 28. The system of claim 17, wherein the system is further configured to: maintain a profile for each host, wherein the profile includes adaptive and real-time baseline parameters for the host's activity over a period of predefined time; and compute, using a plurality of security decision engines, signals of anomaly (SoA) based on the probed APT related activity and the baseline parameters and a set of engine rules, wherein a SoA the signal output by the UNABA security service. 29. The system of claim 28, wherein the system is further configured to: correlate signals provided by other services with the computed SoA; and output the correlated signal. 30. The system of claim 28, wherein the system is further configured to: programming each of the plurality of security decision engines to evaluate or detect user behavioral anomalies caused due to APT related activity. 31. The system of claim 17, wherein the at least one action includes activating additional security services to perform any one of: a mitigation action, an investigation action, a detection action.
A method and system for adaptively securing a protected entity against a potential advanced persistent threat (APT) are provided. The method includes probing a plurality of resources in a network prone to be exploited by an APT attacker; operating at least one security service configured to output signals indicative of APT related activity of each of the plurality of probed resources; generating at least one security event respective of the output signals; determining if the at least one security event satisfies at least one workflow rule; and upon determining that the at least one security event satisfies the at least one workflow rule, generating at least one action with respect to the potential APT attack.1. A method for adaptively securing a protected entity against a potential advanced persistent threat (APT), comprising: probing a plurality of resources in a network prone to be exploited by an APT attacker; operating at least one security service configured to output signals indicative of APT related activity of each of the plurality of probed resources; generating at least one security event respective of the output signals; determining if the at least one security event satisfies at least one workflow rule; and upon determining that the at least one security event satisfies the at least one workflow rule, generating at least one action with respect to the potential APT attack. 2. The method of claim 1, wherein a resource of the plurality of resources is at least one of: an internal resource in the network and an external resource to the network. 3. The method of claim 2, wherein the plurality of resources are determined respective of different protected tenants in the network, wherein the network is at least an enterprise network. 4. The method of claim 1, wherein the APT related activity includes at least one of: abnormal usage and abnormal operation of each of the plurality of probed resources. 5. The method of claim 4, wherein the APT related activity includes at least one of: scanning, malware propagation, remote desktop communication channels, processes performed in installation channels, brute-force attacks, protocol usage patterns representing fake applications, and drop-zone traffic representing data leaks. 6. The method of claim 4, wherein APT related activity of each of the plurality of probed resources is analyzed by a plurality of security services. 7. The method of claim 1, wherein the at least one workflow rule applies a set of logical operators on the at least one security event to generate the at least one action. 8. The method of claim 1, wherein generating the at least one security event respective of the plurality of output signals further comprises: determining if the plurality of output signals satisfies at least one event rule; and upon determining that the plurality of output signals satisfies the at least one event rule, generating the at least one security event. 9. The method of claim 8, wherein the at least one event rule evaluates at least one of: a signal value, a signal duration, and a signal frequency. 10. The method of claim 1, wherein the at least one security service is any one of: a user network and application behavior anomaly (UNABA), a sandbox, a reputation, a user identity, an attack signature, a challenge-response, a real time risk-chain pattern generation, an anti-virus, and a Web application firewall. 11. The method of claim 1, wherein the at least one security service is a UNABA security service, and wherein operating the UNABA security service further comprises: detecting APT related activity exploiting legitimate users in the network, wherein the APT attacker pretends normal behavior of the users. 12. The method of claim 11, further comprising: maintaining a profile for each host, wherein the profile includes adaptive and real-time baseline parameters for the host's activity over a period of predefined time; and computing, using a plurality of security decision engines, signals of anomaly (SoA) based on the probed APT related activity and the baseline parameters and a set of engine rules, wherein a SoA the signal output by the UNABA security service. 13. The method of claim 12, further comprising: correlating signals provided by other services with the computed SoA; and outputting the correlated signal. 14. The method of claim 12, further comprising: programming each of the plurality of security decision engines to evaluate or detect user behavioral anomalies caused due to APT related activity. 15. The method of claim 1, wherein the at least one action includes activating additional security services to perform any one of: a mitigation action, an investigation action, a detection action. 16. A non-transitory computer readable medium having stored thereon instructions for causing one or more processing units to execute the method according to claim 1. 17. A system for adaptively securing a protected entity against a potential advanced persistent threat (APT), comprising: a processor; and a memory, the memory containing instructions that, when executed by the processor, configure the system to: probe a plurality of resources in a network prone to be exploited by an APT attacker; operate at least one security service configured to output signals indicative of APT related activity of each of the plurality of probed resources; generate at least one security event respective of the output signals; determine if the at least one security event satisfies at least one workflow rule; and generate at least one action with respect to the potential APT attack, upon determining that the at least one security event satisfies the at least one workflow rule. 18. The system of claim 17, wherein a resource of the plurality of resources is at least one of: an internal resource in the network and an external resource to the network. 19. The system of claim 18, wherein the plurality of resources are determined respective of different protected tenants in the network, wherein the network is at least an enterprise network. 20. The system of claim 17, wherein the APT related activity includes at least one of: abnormal usage and abnormal operation of each of the plurality of probed resources. 21. The system of claim 20, wherein the APT related activity includes at least one of: scanning, malware propagation, remote desktop communication channels, processes performed in installation channels, brute-force attacks, protocol usage patterns representing fake applications, and drop-zone traffic representing data leaks. 22. The system of claim 20, wherein APT related activity of each of the plurality of probed resources is analyzed by a plurality of security services. 23. The system of claim 17, wherein the at least one workflow rule applies a set of logical operators on the at least one security event to generate the at least one action. 24. The system of claim 17, wherein the system is further configured to: determine if the plurality of output signals satisfies at least one event rule; and generate the at least one security event, upon determining that the plurality of output signals satisfies the at least one event rule. 25. The system of claim 24, wherein the at least one event rule evaluates at least one of: a signal value, a signal duration, and a signal frequency. 26. The system of claim 17, wherein the at least one security service is any one of: a user network and application behavior anomaly (UNABA), a sandbox, a reputation, a user identity, an attack signature, a challenge-response, a real time risk-chain pattern generation, an anti-virus, and a Web application firewall. 27. The system of claim 17, wherein the at least one security service is a UNABA security service, and wherein operating the UNABA security service further comprises: detecting APT related activity exploiting legitimate users in the network, wherein the APT attacker pretends normal behavior of the users. 28. The system of claim 17, wherein the system is further configured to: maintain a profile for each host, wherein the profile includes adaptive and real-time baseline parameters for the host's activity over a period of predefined time; and compute, using a plurality of security decision engines, signals of anomaly (SoA) based on the probed APT related activity and the baseline parameters and a set of engine rules, wherein a SoA the signal output by the UNABA security service. 29. The system of claim 28, wherein the system is further configured to: correlate signals provided by other services with the computed SoA; and output the correlated signal. 30. The system of claim 28, wherein the system is further configured to: programming each of the plurality of security decision engines to evaluate or detect user behavioral anomalies caused due to APT related activity. 31. The system of claim 17, wherein the at least one action includes activating additional security services to perform any one of: a mitigation action, an investigation action, a detection action.
2,400
8,063
8,063
14,455,856
2,483
Innovations in intra block copy (“BC”) prediction as well as innovations in encoder-side search patterns and approaches to partitioning. For example, some of the innovations relate to use of asymmetric partitions for intra BC prediction. Other innovations relate to search patterns or approaches that an encoder uses during block vector estimation (for intra BC prediction) or motion estimation. Still other innovations relate to uses of BV search ranges that have a horizontal or vertical bias during BV estimation.
1. In a computing device that implements an image or video encoder, a method comprising: encoding an image or video to produce encoded data, including performing intra block copy (“BC”) prediction for a current block that is asymmetrically partitioned for the intra BC prediction; and outputting the encoded data as part of a bitstream. 2. The method of claim 1 wherein the current block is a 2N×2N block, and wherein the current block is partitioned into (1) a 2N×N/2 block and 2N×3N/2 block or (2) a 2N×3N/2 block and 2N×N/2 block. 3. The method of claim 1 wherein the current block is a 2N×2N block, and wherein the current block is partitioned into (1) an N/2×2N block and 3N/2×2N block or (2) a 3N/2×2N block and N/2×2N block. 4. The method of claim 1 wherein the encoding further includes performing intra BC prediction for another block that is symmetrically partitioned for the intra BC prediction, wherein the other block is a 2N×2N block, and wherein the other block is partitioned into (1) two 2N×N blocks, (2) two N×2N blocks, or (3) four N×N blocks, each of which can be further partitioned into two N×N/2 blocks, two N/2×N blocks or four N/2×N/2 blocks. 5. The method of claim 1 wherein the current block is a 64×64 block, 32×32 block, 16×16 block or 8×8 block. 6. The method of claim 1 wherein the video is artificially-created video. 7. A computing device that implements an image or video decoder, wherein the computing device is adapted to perform a method comprising: receiving encoded data as part of a bitstream; and decoding the encoded data to reconstruct an image or video, including performing intra block copy (“BC”) prediction for a current block that is asymmetrically partitioned for the intra BC prediction 8. The computing device of claim 7 wherein the current block is a 2N×2N block, and wherein the current block is partitioned into (1) a 2N×N/2 block and 2N×3N/2 block or (2) a 2N×3N/2 block and 2N×N/2 block. 9. The computing device of claim 7 wherein the current block is a 2N×2N block, and wherein the current block is partitioned into (1) an N/2×2N block and 3N/2×2N block or (2) a 3N/2×2N block and N/2×2N block. 10. The computing device of claim 7 wherein the decoding further includes performing intra BC prediction for another block that is symmetrically partitioned for the intra BC prediction, wherein the other block is a 2N×2N block, and wherein the other block is partitioned into (1) two 2N×N blocks, (2) two N×2N blocks, or (3) four N×N blocks, each of which can be further partitioned into two N×N/2 blocks, two N/2×N blocks or four N/2×N/2 blocks. 11. The computing device of claim 7 wherein the current block is a 64×64 block, 32×32 block, 16×16 block or 8×8 block. 12. The computing device of claim 7 wherein the video is artificially-created video. 13. One or more computer-readable media storing computer-executable instructions for causing a computing device programmed thereby to perform a method comprising: encoding an image or video to produce encoded data, including computing a prediction for a current block of a current picture, wherein the computing the prediction uses a bottom-up approach to identify partitions of the current block; and outputting the encoded data as part of a bitstream. 14. The one or more computer-readable media of claim 13 wherein the prediction is part of motion estimation. 15. The one or more computer-readable media of claim 13 wherein the prediction is part of block vector estimation for intra block copy prediction. 16. The one or more computer-readable media of claim 13 wherein the partitions for the current block are two partitions that have different dimensions. 17. The one or more computer-readable media of claim 13 wherein the current block is a 2N×2N block, and wherein the bottom-up approach includes: checking modes per N×N block of the 2N×2N block; selecting best modes for the respective N×N blocks of the 2N×2N block; caching vector values for the respective N×N blocks of the 2N×2N block; checking modes with a 2N-dimension for the 2N×2N block, including using the cached vector values; selecting a best mode with a 2N-dimension for the 2N×2N block; and selecting between the best mode with a 2N-dimension for the 2N×2N block and the selected best modes for the respective N×N blocks of the 2N×2N block. 18. The one or more computer-readable media of claim 13 wherein the current block is a 2N×2N block, and wherein the bottom-up approach includes: checking a subset of modes per N×N block of the 2N×2N block; caching vector values for the respective N×N blocks of the 2N×2N block; checking a subset of modes with a 2N-dimension for the 2N×2N block, including using the cached vector values; selecting a best mode with a 2N-dimension for the 2N×2N block; and selecting between the best mode with a 2N-dimension for the 2N×2N block and best modes for the respective N×N blocks of the 2N×2N block. 19. The one or more computer-readable media of claim 18 wherein the subset of modes per N×N block is a mode with two N×N/2 blocks, and wherein the subset of modes with a 2N-dimension are a mode with a 2N×2N block, a mode with two 2N×N blocks, a mode with a 2N×N/2 block and 2N×3N/2 block, and mode with a 2N×3N/2 block and 2N×N/2 block. 20. The one or more computer-readable media of claim 18 wherein the subset of modes per N×N block is a mode with two N/2×N blocks, and wherein the subset of modes with a 2N-dimension are a mode with a 2N×2N block, a mode with two N×2N blocks, a mode with a N/2×2N block and 3N/2×2N block, and mode with a 3N/2×2N block and N/2×2N block.
Innovations in intra block copy (“BC”) prediction as well as innovations in encoder-side search patterns and approaches to partitioning. For example, some of the innovations relate to use of asymmetric partitions for intra BC prediction. Other innovations relate to search patterns or approaches that an encoder uses during block vector estimation (for intra BC prediction) or motion estimation. Still other innovations relate to uses of BV search ranges that have a horizontal or vertical bias during BV estimation.1. In a computing device that implements an image or video encoder, a method comprising: encoding an image or video to produce encoded data, including performing intra block copy (“BC”) prediction for a current block that is asymmetrically partitioned for the intra BC prediction; and outputting the encoded data as part of a bitstream. 2. The method of claim 1 wherein the current block is a 2N×2N block, and wherein the current block is partitioned into (1) a 2N×N/2 block and 2N×3N/2 block or (2) a 2N×3N/2 block and 2N×N/2 block. 3. The method of claim 1 wherein the current block is a 2N×2N block, and wherein the current block is partitioned into (1) an N/2×2N block and 3N/2×2N block or (2) a 3N/2×2N block and N/2×2N block. 4. The method of claim 1 wherein the encoding further includes performing intra BC prediction for another block that is symmetrically partitioned for the intra BC prediction, wherein the other block is a 2N×2N block, and wherein the other block is partitioned into (1) two 2N×N blocks, (2) two N×2N blocks, or (3) four N×N blocks, each of which can be further partitioned into two N×N/2 blocks, two N/2×N blocks or four N/2×N/2 blocks. 5. The method of claim 1 wherein the current block is a 64×64 block, 32×32 block, 16×16 block or 8×8 block. 6. The method of claim 1 wherein the video is artificially-created video. 7. A computing device that implements an image or video decoder, wherein the computing device is adapted to perform a method comprising: receiving encoded data as part of a bitstream; and decoding the encoded data to reconstruct an image or video, including performing intra block copy (“BC”) prediction for a current block that is asymmetrically partitioned for the intra BC prediction 8. The computing device of claim 7 wherein the current block is a 2N×2N block, and wherein the current block is partitioned into (1) a 2N×N/2 block and 2N×3N/2 block or (2) a 2N×3N/2 block and 2N×N/2 block. 9. The computing device of claim 7 wherein the current block is a 2N×2N block, and wherein the current block is partitioned into (1) an N/2×2N block and 3N/2×2N block or (2) a 3N/2×2N block and N/2×2N block. 10. The computing device of claim 7 wherein the decoding further includes performing intra BC prediction for another block that is symmetrically partitioned for the intra BC prediction, wherein the other block is a 2N×2N block, and wherein the other block is partitioned into (1) two 2N×N blocks, (2) two N×2N blocks, or (3) four N×N blocks, each of which can be further partitioned into two N×N/2 blocks, two N/2×N blocks or four N/2×N/2 blocks. 11. The computing device of claim 7 wherein the current block is a 64×64 block, 32×32 block, 16×16 block or 8×8 block. 12. The computing device of claim 7 wherein the video is artificially-created video. 13. One or more computer-readable media storing computer-executable instructions for causing a computing device programmed thereby to perform a method comprising: encoding an image or video to produce encoded data, including computing a prediction for a current block of a current picture, wherein the computing the prediction uses a bottom-up approach to identify partitions of the current block; and outputting the encoded data as part of a bitstream. 14. The one or more computer-readable media of claim 13 wherein the prediction is part of motion estimation. 15. The one or more computer-readable media of claim 13 wherein the prediction is part of block vector estimation for intra block copy prediction. 16. The one or more computer-readable media of claim 13 wherein the partitions for the current block are two partitions that have different dimensions. 17. The one or more computer-readable media of claim 13 wherein the current block is a 2N×2N block, and wherein the bottom-up approach includes: checking modes per N×N block of the 2N×2N block; selecting best modes for the respective N×N blocks of the 2N×2N block; caching vector values for the respective N×N blocks of the 2N×2N block; checking modes with a 2N-dimension for the 2N×2N block, including using the cached vector values; selecting a best mode with a 2N-dimension for the 2N×2N block; and selecting between the best mode with a 2N-dimension for the 2N×2N block and the selected best modes for the respective N×N blocks of the 2N×2N block. 18. The one or more computer-readable media of claim 13 wherein the current block is a 2N×2N block, and wherein the bottom-up approach includes: checking a subset of modes per N×N block of the 2N×2N block; caching vector values for the respective N×N blocks of the 2N×2N block; checking a subset of modes with a 2N-dimension for the 2N×2N block, including using the cached vector values; selecting a best mode with a 2N-dimension for the 2N×2N block; and selecting between the best mode with a 2N-dimension for the 2N×2N block and best modes for the respective N×N blocks of the 2N×2N block. 19. The one or more computer-readable media of claim 18 wherein the subset of modes per N×N block is a mode with two N×N/2 blocks, and wherein the subset of modes with a 2N-dimension are a mode with a 2N×2N block, a mode with two 2N×N blocks, a mode with a 2N×N/2 block and 2N×3N/2 block, and mode with a 2N×3N/2 block and 2N×N/2 block. 20. The one or more computer-readable media of claim 18 wherein the subset of modes per N×N block is a mode with two N/2×N blocks, and wherein the subset of modes with a 2N-dimension are a mode with a 2N×2N block, a mode with two N×2N blocks, a mode with a N/2×2N block and 3N/2×2N block, and mode with a 3N/2×2N block and N/2×2N block.
2,400
8,064
8,064
15,346,584
2,465
A user equipment (UE) in a wireless communication system. The UE comprises at least one processor configured to determine a first subcarrier spacing and a transceiver configured to transmit, to a base station (BS), random access signals generated with the first subcarrier spacing and receive a downlink control signaling comprising a physical (PHY) resource configuration that includes a second subcarrier spacing. The UE further comprises at least one processor configured to set the PHY resource configuration for at least one of uplink transmission or downlink reception.
1. A user equipment (UE) in a wireless communication system, the UE comprising: at least one processor configured to determine a first subcarrier spacing; and a transceiver configured to: transmit, to a base station (BS), random access signals generated with the first subcarrier spacing; and receive a downlink control signaling comprising a physical (PHY) resource configuration that includes a second subcarrier spacing, wherein the at least one processor is further configured to set the PHY resource configuration for at least one of uplink transmission or downlink reception. 2. The UE of claim 1, wherein: the transceiver is further configured to: receive the PHY resource configuration in a subband that is located on a center of a system bandwidth, the subband including downlink synchronization signals; and perform the at least one of uplink transmission or downlink reception according to the PHY resource configuration. 3. The UE of claim 1, wherein the PHY resource configuration comprises a plurality of configurations that include a subcarrier spacing value and a subband, the subcarrier spacing value to be used for the subband for the at least one of uplink transmission or downlink reception. 4. The UE of claim 1, wherein the transceiver is further configured to receive a downlink control signaling comprising multiple PHY resource configurations each of which includes a subcarrier spacing value. 5. The UE of claim 1, wherein the PHY resource configuration further comprises information indicating an existence of a blank interval on boundaries of consecutive slots on which the UE is scheduled to receive a number of transport blocks. 6. The UE of claim 1, wherein the PHY resource configuration further comprises information to generate a reference signal scrambling sequence. 7. The UE of claim 1, wherein the PHY resource configuration comprises resources corresponding to at least one of ultra reliable and low latency (URLL) configuration information, enhanced mobile broadband (eMBB) configuration information, or massive machine type communication (mMTC) configuration information. 8. A base station (BS) in a wireless communication system, the BS comprising: a transceiver is further configured to: receive, from a user equipment (UE), random access signals generated with a first subcarrier spacing; and transmit a downlink control signaling comprising a physical (PHY) resource configuration that includes a second subcarrier spacing; and at least one processor configured to set the PHY resource configuration for at least one of uplink reception or downlink transmission. 9. The BS of claim 8, wherein the transceiver is further configured to: transmit the PHY resource configuration in a subband that is located on a center of a system bandwidth, the subband including downlink synchronization signals; and perform the at least one of uplink reception or downlink transmission according to the PHY resource configuration. 10. The BS of claim 8, wherein the PHY resource configuration comprises a plurality of configurations that includes a subcarrier spacing value and a subband, the subcarrier spacing value to be used for the subband for the at least one of uplink reception or downlink transmission. 11. The BS of claim 8, wherein the transceiver is further configured to transmit a downlink control signaling comprising multiple PHY resource configurations each of which includes a subcarrier spacing value. 12. The BS of claim 8, wherein the PHY resource configuration further comprises information indicating an existence of a blank interval on a boundaries of consecutive slots on which the UE is scheduled to receive a number of transport blocks. 13. The BS of claim 12, wherein the PHY resource configuration further comprises information to generate a reference signal scrambling sequence. 14. The BS of claim 8, wherein the PHY resource configuration comprises resources corresponding to at least one of ultra reliable and low latency (URLL) configuration information, enhanced mobile broadband (eMBB) configuration information, or massive machine type communication (mMTC) configuration information. 15. A method of user equipment (UE) in a wireless communication system, the method comprising: determining a first subcarrier spacing; transmitting, to a base station (BS), random access signals generated with the first subcarrier spacing; receiving a downlink control signaling comprising a physical (PHY) resource configuration that includes a second subcarrier spacing; and setting the PHY resource configuration for at least one of uplink transmission or downlink reception. 16. The method of claim 15, further comprising: receiving the PHY resource configuration in a subband that is located on a center of a system bandwidth, the subband including downlink synchronization signals; and performing the at least one of uplink transmission or downlink reception according to the PHY resource configuration. 17. The method of claim 15, wherein the PHY resource configuration comprises a plurality of configurations that includes a subcarrier spacing value and a subband, the subcarrier spacing value to be used for the subband for the at least one of uplink transmission or downlink reception. 18. The method of claim 15, further comprising receiving a downlink control signaling comprising multiple PHY resource configurations each of which includes a subcarrier spacing value. 19. The method of claim 15, wherein the PHY resource configuration further comprises information indicating an existence of a blank interval on boundaries of consecutive slots on which the UE is scheduled to receive a number of transport blocks. 20. The method of claim 15, wherein the PHY resource configuration further comprises information to generate a reference signal scrambling sequence.
A user equipment (UE) in a wireless communication system. The UE comprises at least one processor configured to determine a first subcarrier spacing and a transceiver configured to transmit, to a base station (BS), random access signals generated with the first subcarrier spacing and receive a downlink control signaling comprising a physical (PHY) resource configuration that includes a second subcarrier spacing. The UE further comprises at least one processor configured to set the PHY resource configuration for at least one of uplink transmission or downlink reception.1. A user equipment (UE) in a wireless communication system, the UE comprising: at least one processor configured to determine a first subcarrier spacing; and a transceiver configured to: transmit, to a base station (BS), random access signals generated with the first subcarrier spacing; and receive a downlink control signaling comprising a physical (PHY) resource configuration that includes a second subcarrier spacing, wherein the at least one processor is further configured to set the PHY resource configuration for at least one of uplink transmission or downlink reception. 2. The UE of claim 1, wherein: the transceiver is further configured to: receive the PHY resource configuration in a subband that is located on a center of a system bandwidth, the subband including downlink synchronization signals; and perform the at least one of uplink transmission or downlink reception according to the PHY resource configuration. 3. The UE of claim 1, wherein the PHY resource configuration comprises a plurality of configurations that include a subcarrier spacing value and a subband, the subcarrier spacing value to be used for the subband for the at least one of uplink transmission or downlink reception. 4. The UE of claim 1, wherein the transceiver is further configured to receive a downlink control signaling comprising multiple PHY resource configurations each of which includes a subcarrier spacing value. 5. The UE of claim 1, wherein the PHY resource configuration further comprises information indicating an existence of a blank interval on boundaries of consecutive slots on which the UE is scheduled to receive a number of transport blocks. 6. The UE of claim 1, wherein the PHY resource configuration further comprises information to generate a reference signal scrambling sequence. 7. The UE of claim 1, wherein the PHY resource configuration comprises resources corresponding to at least one of ultra reliable and low latency (URLL) configuration information, enhanced mobile broadband (eMBB) configuration information, or massive machine type communication (mMTC) configuration information. 8. A base station (BS) in a wireless communication system, the BS comprising: a transceiver is further configured to: receive, from a user equipment (UE), random access signals generated with a first subcarrier spacing; and transmit a downlink control signaling comprising a physical (PHY) resource configuration that includes a second subcarrier spacing; and at least one processor configured to set the PHY resource configuration for at least one of uplink reception or downlink transmission. 9. The BS of claim 8, wherein the transceiver is further configured to: transmit the PHY resource configuration in a subband that is located on a center of a system bandwidth, the subband including downlink synchronization signals; and perform the at least one of uplink reception or downlink transmission according to the PHY resource configuration. 10. The BS of claim 8, wherein the PHY resource configuration comprises a plurality of configurations that includes a subcarrier spacing value and a subband, the subcarrier spacing value to be used for the subband for the at least one of uplink reception or downlink transmission. 11. The BS of claim 8, wherein the transceiver is further configured to transmit a downlink control signaling comprising multiple PHY resource configurations each of which includes a subcarrier spacing value. 12. The BS of claim 8, wherein the PHY resource configuration further comprises information indicating an existence of a blank interval on a boundaries of consecutive slots on which the UE is scheduled to receive a number of transport blocks. 13. The BS of claim 12, wherein the PHY resource configuration further comprises information to generate a reference signal scrambling sequence. 14. The BS of claim 8, wherein the PHY resource configuration comprises resources corresponding to at least one of ultra reliable and low latency (URLL) configuration information, enhanced mobile broadband (eMBB) configuration information, or massive machine type communication (mMTC) configuration information. 15. A method of user equipment (UE) in a wireless communication system, the method comprising: determining a first subcarrier spacing; transmitting, to a base station (BS), random access signals generated with the first subcarrier spacing; receiving a downlink control signaling comprising a physical (PHY) resource configuration that includes a second subcarrier spacing; and setting the PHY resource configuration for at least one of uplink transmission or downlink reception. 16. The method of claim 15, further comprising: receiving the PHY resource configuration in a subband that is located on a center of a system bandwidth, the subband including downlink synchronization signals; and performing the at least one of uplink transmission or downlink reception according to the PHY resource configuration. 17. The method of claim 15, wherein the PHY resource configuration comprises a plurality of configurations that includes a subcarrier spacing value and a subband, the subcarrier spacing value to be used for the subband for the at least one of uplink transmission or downlink reception. 18. The method of claim 15, further comprising receiving a downlink control signaling comprising multiple PHY resource configurations each of which includes a subcarrier spacing value. 19. The method of claim 15, wherein the PHY resource configuration further comprises information indicating an existence of a blank interval on boundaries of consecutive slots on which the UE is scheduled to receive a number of transport blocks. 20. The method of claim 15, wherein the PHY resource configuration further comprises information to generate a reference signal scrambling sequence.
2,400
8,065
8,065
14,836,695
2,463
Methods and systems for a frame structure for machine-type communications (MTC) with adjustable pulse bandwidth are described. In an embodiment, the frame structure is an uplink frame structure that illustrates a representation of a plurality of coverage levels. The coverage levels are associated with a coverage range of a base station. Each coverage level is associated with corresponding sub-frames, and each sub-frame within a coverage level has the same sub-frame length and bandwidth.
1. A frame structure for machine-type communication in a wireless communication system, the wireless communication system comprising a base station and a plurality of machine-type communication devices (MTCDs), the frame structure comprising: at least one first sub-frame associated with a first MTCD of the plurality of MTCDs, the first MTCD within a first coverage level of the base station, the at least one first sub-frame having a first sub-frame length and a first signal pulse bandwidth; and at least one second sub-frame associated with a second MTCD of the plurality of MTCDs, the second MTCD within a second coverage level of the base station different from the first coverage level, the at least one second sub-frame having a second sub-frame length different from the first sub-frame length and a second signal pulse bandwidth different from the first signal pulse bandwidth. 2. The frame structure according to claim 1, wherein the at least one first sub-frame comprises a plurality of first sub-frames and the at least one second sub-frame comprises a plurality of second sub-frames, wherein each first sub-frame has equal length and each second sub-frame has equal length. 3. The frame structure according to claim 2, wherein a magnitude of the first sub-frame length multiplied by the first signal pulse bandwidth is equal to a magnitude of the second sub-frame length multiplied by the second signal pulse bandwidth. 4. The frame structure according to claim 2, wherein the second sub-frame length is an integer number times the first sub-frame length. 5. The frame structure according to claim 2, wherein the first sub-frame comprises a transition window for timing synchronization between consecutive sub-frames within the frame structure. 6. The frame structure according to claim 5, wherein the transition window comprises one or more of a time window, a cyclic prefix and a time cushion. 7. The frame structure according to claim 1, wherein a boundary of the first sub-frame is aligned with a frame boundary for mobile broadband transmission. 8. A method for providing a frame structure for machine-type communication in a wireless communication system, the communication system comprising a base station and a plurality of machine-type communication devices (MTCDs), the method comprising: dividing, by the base station, a frame of time-frequency space into at least one first sub-frame and at least one second sub-frame, the at least one first sub-frame associated with a first MTCD of the plurality of MTCDs, the first MTCD within a first coverage level of the base station, the at least one first sub-frame having a first sub-frame length and a first signal pulse bandwidth; the at least one second sub-frame associated with a second MTCD of the plurality of MTCDs, the second MTCD within a second coverage level of the base station different from the first coverage level, the at least one second sub-frame having a second sub-frame length different from the first sub-frame length and a second signal pulse bandwidth different from the first signal pulse bandwidth; and transmitting, by the base station, information about the at least one first sub-frame and the at least one second sub-frame to the first MTCD. 9. The method according to claim 8, wherein dividing the frame into the at least one first sub frame comprises dividing the frame into a plurality a first sub-frames and dividing the frame into the at least one second sub frame comprises dividing the frame into a plurality of second sub-frames, each first sub-frame having equal length and each second sub-frame having equal length. 10. The method according to claim 9, wherein a magnitude of the first sub-frame length multiplied by the first signal pulse bandwidth is equal to a magnitude of the second sub-frame length multiplied by the second signal pulse bandwidth. 11. The method according to claim 9, wherein the second sub-frame length is an integer number times the first sub-frame length. 12. The method according to claim 9, further comprising dividing the frame into the plurality of first sub-frames and the plurality of second sub-frames using frequency division multiplexing. 13. The method according to claim 12, further comprising dividing the frame into the plurality of first sub-frames and the plurality of second sub-frames using time division multiplexing. 14. The method according to claim 9, wherein the transmitted information comprises scheduling control information. 15. The method according to claim 14, wherein the scheduling control information comprises one or more of terminal identification information, a starting index of the at least one first sub-frame, a starting index of the at least one second sub-frame, and a number of sub-frames used for each transmission. 16. The method according to claim 14, wherein the scheduling control information comprises group based scheduling information, wherein the group based scheduling information comprises a group identification assigned to the first MTCD and a position index within a group of MTCDs, wherein the base station schedules a resource assignment for each group of MTCDs by specifying the group identification. 17. The method according to claim 16, wherein the group of MTCDs is formed in accordance with one or more of similar quality of service requirements and similar geographic location. 18. A base station for providing a frame structure for machine-type communication in a wireless communication system, the communication system comprising a plurality of machine-type communication devices (MTCDs) coupled to the base station, the base station comprising: a processor; and memory coupled to the processor including instructions that, when executed by the processor, cause the base station to: divide a frame of time-frequency space into at least one first sub-frame and at least one second sub-frame, the at least one first sub-frame associated with a first MTCD of the plurality of MTCDs, the first MTCD within a first coverage level of the base station, the at least one first sub-frame having a first sub-frame length and a first signal pulse bandwidth; the at least one second sub-frame associated with a second MTCD of the plurality of MTCDs different from the first MTCD, the second MTCD within a second coverage level of the base station different from the first coverage level, the at least one second sub-frame having a second sub-frame length different from the first sub-frame length and a second signal pulse bandwidth different from the first signal pulse bandwidth; and transmit information about the at least one first sub-frame and the at least one second sub-frame to the first MTCD. 19. The base station according to claim 18, further including instructions that, when executed by the processor, cause the base station to divide the at least one first sub-frame into a plurality of first sub-frames and divide the at least one second sub-frame into a plurality of second sub-frames, wherein each first sub-frame has equal length and each second sub-frame has equal length. 20. The base station according to claim 19, further including instructions that, when executed by the processor, cause the base station to divide the frame into the plurality of first sub-frames and the plurality of second sub-frames using frequency division multiplexing. 21. The base station according to claim 20, further including instructions that, when executed by the processor, cause the base station to divide the frame into the plurality of first sub-frames and the plurality of second sub-frames using time division multiplexing. 22. A method for operating a machine-type communication device (MTCD) in a wireless communication system, the communication system comprising a base station coupled to a plurality of MTCDs, the method comprising: receiving, by a first MTCD of the plurality of MTCDs, information associated with a frame of time-frequency space divided into at least one first sub-frame and at least one second sub-frame from the base station, the at least one first sub-frame associated with a first coverage level of the base station within which the first MTCD is in, the at least one first sub-frame having a first sub-frame length and a first signal pulse bandwidth, the at least one second sub-frame associated with a second MTCD of the plurality of MTCDs different from the first MTCD, the second MTCD within a second coverage level of the base station different from the first coverage level, the at least one second sub-frame having a second sub-frame length different from the first sub-frame length and a second signal pulse bandwidth different from the first signal pulse bandwidth; generating, by the first MTCD, a packet including data, the packet generated in accordance with the at least one first sub-frame and the at least one second sub-frame; and transmitting, by the first MTCD, the packet to the base station. 23. A first machine-type communication device (MTCD) for communicating in a wireless communication system, the communication system comprising a base station coupled to a plurality of MTCDs, the first MTCD comprising: a processor; and memory coupled to the processor including instructions that, when executed by the processor, cause the first MTCD to: receive information associated with a frame of time-frequency space divided into at least one first sub-frame and at least one second sub-frame from the base station, the at least one first sub-frame associated with a first coverage level of the base station within which the first MTCD is in, the at least one first sub-frame having a first sub-frame length and a first signal pulse bandwidth, the at least one second sub-frame associated with a second MTCD of the plurality of MTCDs different from the first MTCD, the second MTCD within a second coverage level of the base station different from the first coverage level, the at least one second sub-frame having a second sub-frame length different from the first sub-frame length and a second signal pulse bandwidth different from the first signal pulse bandwidth; generate a packet including data, the packet generated in accordance with the at least one first sub-frame and the at least one second sub-frame; and transmit the packet to the base station.
Methods and systems for a frame structure for machine-type communications (MTC) with adjustable pulse bandwidth are described. In an embodiment, the frame structure is an uplink frame structure that illustrates a representation of a plurality of coverage levels. The coverage levels are associated with a coverage range of a base station. Each coverage level is associated with corresponding sub-frames, and each sub-frame within a coverage level has the same sub-frame length and bandwidth.1. A frame structure for machine-type communication in a wireless communication system, the wireless communication system comprising a base station and a plurality of machine-type communication devices (MTCDs), the frame structure comprising: at least one first sub-frame associated with a first MTCD of the plurality of MTCDs, the first MTCD within a first coverage level of the base station, the at least one first sub-frame having a first sub-frame length and a first signal pulse bandwidth; and at least one second sub-frame associated with a second MTCD of the plurality of MTCDs, the second MTCD within a second coverage level of the base station different from the first coverage level, the at least one second sub-frame having a second sub-frame length different from the first sub-frame length and a second signal pulse bandwidth different from the first signal pulse bandwidth. 2. The frame structure according to claim 1, wherein the at least one first sub-frame comprises a plurality of first sub-frames and the at least one second sub-frame comprises a plurality of second sub-frames, wherein each first sub-frame has equal length and each second sub-frame has equal length. 3. The frame structure according to claim 2, wherein a magnitude of the first sub-frame length multiplied by the first signal pulse bandwidth is equal to a magnitude of the second sub-frame length multiplied by the second signal pulse bandwidth. 4. The frame structure according to claim 2, wherein the second sub-frame length is an integer number times the first sub-frame length. 5. The frame structure according to claim 2, wherein the first sub-frame comprises a transition window for timing synchronization between consecutive sub-frames within the frame structure. 6. The frame structure according to claim 5, wherein the transition window comprises one or more of a time window, a cyclic prefix and a time cushion. 7. The frame structure according to claim 1, wherein a boundary of the first sub-frame is aligned with a frame boundary for mobile broadband transmission. 8. A method for providing a frame structure for machine-type communication in a wireless communication system, the communication system comprising a base station and a plurality of machine-type communication devices (MTCDs), the method comprising: dividing, by the base station, a frame of time-frequency space into at least one first sub-frame and at least one second sub-frame, the at least one first sub-frame associated with a first MTCD of the plurality of MTCDs, the first MTCD within a first coverage level of the base station, the at least one first sub-frame having a first sub-frame length and a first signal pulse bandwidth; the at least one second sub-frame associated with a second MTCD of the plurality of MTCDs, the second MTCD within a second coverage level of the base station different from the first coverage level, the at least one second sub-frame having a second sub-frame length different from the first sub-frame length and a second signal pulse bandwidth different from the first signal pulse bandwidth; and transmitting, by the base station, information about the at least one first sub-frame and the at least one second sub-frame to the first MTCD. 9. The method according to claim 8, wherein dividing the frame into the at least one first sub frame comprises dividing the frame into a plurality a first sub-frames and dividing the frame into the at least one second sub frame comprises dividing the frame into a plurality of second sub-frames, each first sub-frame having equal length and each second sub-frame having equal length. 10. The method according to claim 9, wherein a magnitude of the first sub-frame length multiplied by the first signal pulse bandwidth is equal to a magnitude of the second sub-frame length multiplied by the second signal pulse bandwidth. 11. The method according to claim 9, wherein the second sub-frame length is an integer number times the first sub-frame length. 12. The method according to claim 9, further comprising dividing the frame into the plurality of first sub-frames and the plurality of second sub-frames using frequency division multiplexing. 13. The method according to claim 12, further comprising dividing the frame into the plurality of first sub-frames and the plurality of second sub-frames using time division multiplexing. 14. The method according to claim 9, wherein the transmitted information comprises scheduling control information. 15. The method according to claim 14, wherein the scheduling control information comprises one or more of terminal identification information, a starting index of the at least one first sub-frame, a starting index of the at least one second sub-frame, and a number of sub-frames used for each transmission. 16. The method according to claim 14, wherein the scheduling control information comprises group based scheduling information, wherein the group based scheduling information comprises a group identification assigned to the first MTCD and a position index within a group of MTCDs, wherein the base station schedules a resource assignment for each group of MTCDs by specifying the group identification. 17. The method according to claim 16, wherein the group of MTCDs is formed in accordance with one or more of similar quality of service requirements and similar geographic location. 18. A base station for providing a frame structure for machine-type communication in a wireless communication system, the communication system comprising a plurality of machine-type communication devices (MTCDs) coupled to the base station, the base station comprising: a processor; and memory coupled to the processor including instructions that, when executed by the processor, cause the base station to: divide a frame of time-frequency space into at least one first sub-frame and at least one second sub-frame, the at least one first sub-frame associated with a first MTCD of the plurality of MTCDs, the first MTCD within a first coverage level of the base station, the at least one first sub-frame having a first sub-frame length and a first signal pulse bandwidth; the at least one second sub-frame associated with a second MTCD of the plurality of MTCDs different from the first MTCD, the second MTCD within a second coverage level of the base station different from the first coverage level, the at least one second sub-frame having a second sub-frame length different from the first sub-frame length and a second signal pulse bandwidth different from the first signal pulse bandwidth; and transmit information about the at least one first sub-frame and the at least one second sub-frame to the first MTCD. 19. The base station according to claim 18, further including instructions that, when executed by the processor, cause the base station to divide the at least one first sub-frame into a plurality of first sub-frames and divide the at least one second sub-frame into a plurality of second sub-frames, wherein each first sub-frame has equal length and each second sub-frame has equal length. 20. The base station according to claim 19, further including instructions that, when executed by the processor, cause the base station to divide the frame into the plurality of first sub-frames and the plurality of second sub-frames using frequency division multiplexing. 21. The base station according to claim 20, further including instructions that, when executed by the processor, cause the base station to divide the frame into the plurality of first sub-frames and the plurality of second sub-frames using time division multiplexing. 22. A method for operating a machine-type communication device (MTCD) in a wireless communication system, the communication system comprising a base station coupled to a plurality of MTCDs, the method comprising: receiving, by a first MTCD of the plurality of MTCDs, information associated with a frame of time-frequency space divided into at least one first sub-frame and at least one second sub-frame from the base station, the at least one first sub-frame associated with a first coverage level of the base station within which the first MTCD is in, the at least one first sub-frame having a first sub-frame length and a first signal pulse bandwidth, the at least one second sub-frame associated with a second MTCD of the plurality of MTCDs different from the first MTCD, the second MTCD within a second coverage level of the base station different from the first coverage level, the at least one second sub-frame having a second sub-frame length different from the first sub-frame length and a second signal pulse bandwidth different from the first signal pulse bandwidth; generating, by the first MTCD, a packet including data, the packet generated in accordance with the at least one first sub-frame and the at least one second sub-frame; and transmitting, by the first MTCD, the packet to the base station. 23. A first machine-type communication device (MTCD) for communicating in a wireless communication system, the communication system comprising a base station coupled to a plurality of MTCDs, the first MTCD comprising: a processor; and memory coupled to the processor including instructions that, when executed by the processor, cause the first MTCD to: receive information associated with a frame of time-frequency space divided into at least one first sub-frame and at least one second sub-frame from the base station, the at least one first sub-frame associated with a first coverage level of the base station within which the first MTCD is in, the at least one first sub-frame having a first sub-frame length and a first signal pulse bandwidth, the at least one second sub-frame associated with a second MTCD of the plurality of MTCDs different from the first MTCD, the second MTCD within a second coverage level of the base station different from the first coverage level, the at least one second sub-frame having a second sub-frame length different from the first sub-frame length and a second signal pulse bandwidth different from the first signal pulse bandwidth; generate a packet including data, the packet generated in accordance with the at least one first sub-frame and the at least one second sub-frame; and transmit the packet to the base station.
2,400
8,066
8,066
15,042,116
2,448
One embodiment of the invention disclosed herein provides techniques for detecting and remediating an outlier server in a distributed computer system. A control server retrieves a group of time-series data sets associated with a first time period, where each time-series data set represents a performance metric for a different server in a group of servers. The control server generates a cluster that includes two or more of the time-series data sets, where the performance metric for each server that is associated with one of the time-series data sets in the cluster is within a threshold distance from the performance metric for the servers that are associated with the other time-series data sets in the cluster. The control server determines that a particular time-series data set corresponds to a server included in the group of servers and is not included in the cluster, and marks the server as an outlier server.
1. A method, comprising: retrieving a first plurality of time-series data sets associated with a first time period, wherein each time-series data set included in the first plurality of time-series data sets represents a performance metric for a different server included in a plurality of servers; generating a first cluster that includes two or more of the time-series data sets included in the first plurality of time-series data sets, wherein the performance metric for each server included in the plurality of servers that is associated with one of the time-series data sets included in the first cluster is within a threshold distance from the performance metric for the servers included in the plurality of servers that are associated with the other time-series data sets included in the first cluster; determining that a first time-series data set included in the first plurality of time-series data sets corresponds to a first server included in the plurality of servers and is not included in the first cluster; and marking the first server as an outlier server. 2. The method of claim 1, further comprising: receiving an indication that the first server is expected to be an outlier server; marking the first server as an expected outlier server. 3. The method of claim 2, wherein the indication indicates that the first server is performing a maintenance operation. 4. The method of claim 1, further comprising: retrieving a second plurality of time-series data sets for a second time period, each time-series data set included in the second plurality of time-series data sets representing the metric for a different server in the plurality of servers; and clustering a least a portion of the time-series data sets included in the second plurality of time-series data sets into a second cluster, wherein the metric for each time-series data set in the second cluster is within a threshold distance from the metric for the other time-series data sets included in the second cluster. 5. The method of claim 4, further comprising: determining that a second time-series data set included in the second plurality of time-series data sets corresponds to the first server and is included in the second cluster; and marking the first server as no longer an outlier server. 6. The method of claim 1, further comprising performing one or more remedial operations associated with the first server. 7. The method of claim 1, wherein the one or more remedial operations include at least one of: transmitting a message to a second server that identifies the first server as an outlier server; preventing the first server from receiving additional requests from an endpoint device; terminating operation of the first server; rebooting the first server; and gathering forensic data associated with the first machine for further analysis. 8. The method of claim 1, wherein the performance metric comprises a response latency, an error rate, a processor utilization, a memory utilization, or a system disk utilization. 9. A non-transitory computer-readable storage medium including instructions that, when executed by a processor, cause the processor to perform the steps of: retrieving a first plurality of time-series data sets associated with a first time period, wherein each time-series data set included in the first plurality of time-series data sets represents a composite performance metric of two or more performance metrics for a different server included in a plurality of servers; receiving an indication that one server included in the plurality of servers is a first outlier server; generating a first cluster that includes two or more of the time-series data sets included in the first plurality of time-series data sets, wherein the composite performance metric for each server included in the plurality of servers that is associated with one of the time-series data sets included in the first cluster is within a threshold distance from the composite performance metric for the servers included in the plurality of servers that are associated with the other time-series data sets included in the first cluster; determining that a first time-series data set included in the first plurality of time-series data sets corresponds to a first server included in the plurality of servers and is not included in the first cluster; and marking the first server as the first outlier server. 10. The non-transitory computer-readable storage medium of claim 9, further comprising: receiving an indication that the first server is expected to be an outlier server; marking the first server as an expected outlier server. 11. The non-transitory computer-readable storage medium of claim 10, wherein the indication indicates that the first server is performing a maintenance operation. 12. The non-transitory computer-readable storage medium of claim 9, further comprising: retrieving a second plurality of time-series data sets for a second time period, each time-series data set included in the second plurality of time-series data sets representing the metric for a different server in the plurality of servers; and clustering a least a portion of the time-series data sets included in the second plurality of time-series data sets into a second cluster, wherein the metric for each time-series data set in the second cluster is within a threshold distance from the metric for the other time-series data sets included in the second cluster. 13. The non-transitory computer-readable storage medium of claim 12, further comprising: determining that a second time-series data set included in the second plurality of time-series data sets corresponds to the first server and is included in the second cluster; and marking the first server as no longer an outlier server. 14. The non-transitory computer-readable storage medium of claim 9, wherein generating a first cluster that includes two or more of the time-series data sets included in the first plurality of time-series data sets comprises performing a density-based spatial clustering of applications with noise (DBSCAN) analysis on the first plurality of time-series data sets based on the threshold distance. 15. The non-transitory computer-readable storage medium of claim 14, further comprising determining a minimum cluster size for the DBSCAN analysis based at least in part on the two or more performance metrics. 16. The non-transitory computer-readable storage medium of claim 9, wherein the composite performance metric is based on two or more of a response latency, an error rate, a processor utilization, a memory utilization, and a system disk utilization. 17. A system, comprising: a memory that includes a control application; and a processor that is coupled to the memory and, upon executing the control application, is configured to: retrieving a first plurality of time-series data sets associated with a first time period, wherein each time-series data set included in the first plurality of time-series data sets represents a performance metric for a different server included in a plurality of servers; calculating a first threshold distance associated with the first plurality of time-series data sets based on the performance metric; generating a first cluster that includes two or more of the time-series data sets included in the first plurality of time-series data sets, wherein the performance metric for each server included in the plurality of servers that is associated with one of the time-series data sets included in the first cluster is within the first threshold distance from the performance metric for the servers included in the plurality of servers that are associated with the other time-series data sets included in the first cluster; and identifying a first subset of one or more time-series data sets included in the first plurality of time-series data sets that are not included in the first cluster. 18. The system of claim 17, further comprising: identifying a first subset of one or more servers included in the first plurality of servers, wherein each server included in the first subset of one or more servers corresponds to a different time-series data set included in the first subset of one or more time-series data sets; and marking each server included in the first subset of one or more servers as an outlier server. 19. The system of claim 17, further comprising: receiving a value representing a quantity of servers included in the plurality of servers that are outlier servers; determining that a quantity of time-series data sets included in the first subset of one or more time-series data sets exceeds the value; and calculating a second threshold distance associated with the first plurality of time-series data sets; wherein the second threshold distance is greater than the first threshold distance. 20. The system of claim 19, further comprising: generating a second cluster that includes two or more of the time-series data sets included in the first plurality of time-series data sets, wherein the performance metric for each server included in the plurality of servers that is associated with one of the time-series data sets included in the second cluster is within the second threshold distance from the performance metric for the servers included in the plurality of servers that are associated with the other time-series data sets included in the second cluster; identifying a second subset of one or more time-series data sets included in the first plurality of time-series data sets that are not included in the second cluster; and determining that a quantity of time-series data sets included in the second subset of one or more time-series data sets is equal to the value.
One embodiment of the invention disclosed herein provides techniques for detecting and remediating an outlier server in a distributed computer system. A control server retrieves a group of time-series data sets associated with a first time period, where each time-series data set represents a performance metric for a different server in a group of servers. The control server generates a cluster that includes two or more of the time-series data sets, where the performance metric for each server that is associated with one of the time-series data sets in the cluster is within a threshold distance from the performance metric for the servers that are associated with the other time-series data sets in the cluster. The control server determines that a particular time-series data set corresponds to a server included in the group of servers and is not included in the cluster, and marks the server as an outlier server.1. A method, comprising: retrieving a first plurality of time-series data sets associated with a first time period, wherein each time-series data set included in the first plurality of time-series data sets represents a performance metric for a different server included in a plurality of servers; generating a first cluster that includes two or more of the time-series data sets included in the first plurality of time-series data sets, wherein the performance metric for each server included in the plurality of servers that is associated with one of the time-series data sets included in the first cluster is within a threshold distance from the performance metric for the servers included in the plurality of servers that are associated with the other time-series data sets included in the first cluster; determining that a first time-series data set included in the first plurality of time-series data sets corresponds to a first server included in the plurality of servers and is not included in the first cluster; and marking the first server as an outlier server. 2. The method of claim 1, further comprising: receiving an indication that the first server is expected to be an outlier server; marking the first server as an expected outlier server. 3. The method of claim 2, wherein the indication indicates that the first server is performing a maintenance operation. 4. The method of claim 1, further comprising: retrieving a second plurality of time-series data sets for a second time period, each time-series data set included in the second plurality of time-series data sets representing the metric for a different server in the plurality of servers; and clustering a least a portion of the time-series data sets included in the second plurality of time-series data sets into a second cluster, wherein the metric for each time-series data set in the second cluster is within a threshold distance from the metric for the other time-series data sets included in the second cluster. 5. The method of claim 4, further comprising: determining that a second time-series data set included in the second plurality of time-series data sets corresponds to the first server and is included in the second cluster; and marking the first server as no longer an outlier server. 6. The method of claim 1, further comprising performing one or more remedial operations associated with the first server. 7. The method of claim 1, wherein the one or more remedial operations include at least one of: transmitting a message to a second server that identifies the first server as an outlier server; preventing the first server from receiving additional requests from an endpoint device; terminating operation of the first server; rebooting the first server; and gathering forensic data associated with the first machine for further analysis. 8. The method of claim 1, wherein the performance metric comprises a response latency, an error rate, a processor utilization, a memory utilization, or a system disk utilization. 9. A non-transitory computer-readable storage medium including instructions that, when executed by a processor, cause the processor to perform the steps of: retrieving a first plurality of time-series data sets associated with a first time period, wherein each time-series data set included in the first plurality of time-series data sets represents a composite performance metric of two or more performance metrics for a different server included in a plurality of servers; receiving an indication that one server included in the plurality of servers is a first outlier server; generating a first cluster that includes two or more of the time-series data sets included in the first plurality of time-series data sets, wherein the composite performance metric for each server included in the plurality of servers that is associated with one of the time-series data sets included in the first cluster is within a threshold distance from the composite performance metric for the servers included in the plurality of servers that are associated with the other time-series data sets included in the first cluster; determining that a first time-series data set included in the first plurality of time-series data sets corresponds to a first server included in the plurality of servers and is not included in the first cluster; and marking the first server as the first outlier server. 10. The non-transitory computer-readable storage medium of claim 9, further comprising: receiving an indication that the first server is expected to be an outlier server; marking the first server as an expected outlier server. 11. The non-transitory computer-readable storage medium of claim 10, wherein the indication indicates that the first server is performing a maintenance operation. 12. The non-transitory computer-readable storage medium of claim 9, further comprising: retrieving a second plurality of time-series data sets for a second time period, each time-series data set included in the second plurality of time-series data sets representing the metric for a different server in the plurality of servers; and clustering a least a portion of the time-series data sets included in the second plurality of time-series data sets into a second cluster, wherein the metric for each time-series data set in the second cluster is within a threshold distance from the metric for the other time-series data sets included in the second cluster. 13. The non-transitory computer-readable storage medium of claim 12, further comprising: determining that a second time-series data set included in the second plurality of time-series data sets corresponds to the first server and is included in the second cluster; and marking the first server as no longer an outlier server. 14. The non-transitory computer-readable storage medium of claim 9, wherein generating a first cluster that includes two or more of the time-series data sets included in the first plurality of time-series data sets comprises performing a density-based spatial clustering of applications with noise (DBSCAN) analysis on the first plurality of time-series data sets based on the threshold distance. 15. The non-transitory computer-readable storage medium of claim 14, further comprising determining a minimum cluster size for the DBSCAN analysis based at least in part on the two or more performance metrics. 16. The non-transitory computer-readable storage medium of claim 9, wherein the composite performance metric is based on two or more of a response latency, an error rate, a processor utilization, a memory utilization, and a system disk utilization. 17. A system, comprising: a memory that includes a control application; and a processor that is coupled to the memory and, upon executing the control application, is configured to: retrieving a first plurality of time-series data sets associated with a first time period, wherein each time-series data set included in the first plurality of time-series data sets represents a performance metric for a different server included in a plurality of servers; calculating a first threshold distance associated with the first plurality of time-series data sets based on the performance metric; generating a first cluster that includes two or more of the time-series data sets included in the first plurality of time-series data sets, wherein the performance metric for each server included in the plurality of servers that is associated with one of the time-series data sets included in the first cluster is within the first threshold distance from the performance metric for the servers included in the plurality of servers that are associated with the other time-series data sets included in the first cluster; and identifying a first subset of one or more time-series data sets included in the first plurality of time-series data sets that are not included in the first cluster. 18. The system of claim 17, further comprising: identifying a first subset of one or more servers included in the first plurality of servers, wherein each server included in the first subset of one or more servers corresponds to a different time-series data set included in the first subset of one or more time-series data sets; and marking each server included in the first subset of one or more servers as an outlier server. 19. The system of claim 17, further comprising: receiving a value representing a quantity of servers included in the plurality of servers that are outlier servers; determining that a quantity of time-series data sets included in the first subset of one or more time-series data sets exceeds the value; and calculating a second threshold distance associated with the first plurality of time-series data sets; wherein the second threshold distance is greater than the first threshold distance. 20. The system of claim 19, further comprising: generating a second cluster that includes two or more of the time-series data sets included in the first plurality of time-series data sets, wherein the performance metric for each server included in the plurality of servers that is associated with one of the time-series data sets included in the second cluster is within the second threshold distance from the performance metric for the servers included in the plurality of servers that are associated with the other time-series data sets included in the second cluster; identifying a second subset of one or more time-series data sets included in the first plurality of time-series data sets that are not included in the second cluster; and determining that a quantity of time-series data sets included in the second subset of one or more time-series data sets is equal to the value.
2,400
8,067
8,067
12,676,891
2,416
One object of the present invention is an architecture for interworking between WiMAX and 3GPP networks, said architecture comprising: an interworking node IWK which connects with the 3GPP Packet Core Network using 3GPP Gi interface, face, and with the WiMAX Connectivity Service Network CSN using WiMAX R3 interface.
1. An architecture for interworking between WiMAX and 3GPP networks, said architecture comprising: an interworking node IWK which connects with the 3GPP Packet Core Network using 3GPP Gi interface, and with the WiMAX Connectivity Service Network CSN using WiMAX R3 interface. 2. An architecture according to claim 1, wherein IWK interfaces with a GGSN in the 3GPP Packet Core Network using 3GPP Gi interface. 3. An architecture according to claim 1, wherein IWK comprises a Foreign Agent FA. 4. An architecture according to claim 1, wherein IWK comprises Proxy-AAA-Server, DHCP relay, and a Foreign Agent FA. 5. An architecture according to claim 1, wherein Home CSN is considered by GGSN as an ISP identified by a dedicated APN. 6. A method for handover between WiMAX and 3GPP networks using an architecture according to claim 1, comprising the steps of: handover preparation, handover execution. 7. A method according to claim 6, wherein a handover comprises the steps of: IWK managing in a coordinated way handovers from/to WiMAX network, using WiMAX R4 interface. 8. A method according to claim 6, wherein the preparation of a handover from WIMAX to 3GPP comprises the steps of: a Mobile Station MS sending to the WiMAX network a Handover Request MOB-MSHO-REQ message specifying in a BSID list a fake Base Station Identity BS ID associated with IWK, ASN-GW sending a R4 Handover Request R4 HO_Req message to IWK. 9. A method according to claim 6, wherein the preparation of a handover from WIMAX to 3GPP comprises a step of: IWK storing in a Mobile Station MS context, WiMAX context information received in a R4 Handover Request R4 HO_Req message. 10. A method according to claim 6, wherein the preparation of a handover from WiMAX to 3GPP comprises a step of: IWK storing in a Mobile Station MS context, WiMAX context information received in a R4 Anchor_DPF_Req message. 11. A method according to claim 9, wherein said WiMAX context information comprises Home Address HoA, Home Agent Address HA @, and Mobile IP MIP keys. 12. A method according to claim 6, wherein said handover preparation comprises a step of: setting up a GRE tunnel between ASN-GW and IWK. 13. A method according to claim 6, wherein the execution of a handover from WiMAX to 3GPP comprises the steps of: upon attaching to the 3GPP network, a Mobile Station MS performing PDP context setup towards IWK, MS requesting an IP address using either PPP or non-transparent PDP context type, IWK resolving the PDP context setup using the WiMAX Home Address HoA associated with the MS in a MS Context stored in IWK. 14. A method according to claim 6, wherein the execution of a handover from WiMAX to 3GPP comprises the steps of: upon attaching to 3GPP network, a Mobile Station MS sending a MOB_HO-IND message to the WiMAX network, ASN-GW sending a R4 Handover Confirmation R4 HO_CNF message to IWK, upon the forwarding of data by ASN-GW to IWK through a GRE tunnel, IWK sending a PDP PDU to GGSN, GGSN initializing a Network-Requested PDP context activation procedure. 15. A method according to claim 6, wherein the execution of a handover from WiMAX to 3GPP comprises a step of: upon a Mobile Station MS attaching to 3GPP network, setting up a PDP context of IP non-transparent type and with static mode, MS requiring to use previously stored WiMAX Home Address HoA. 16. A method according to claim 6, wherein the execution of a handover from WiMAX to 3GPP comprises the steps of: IWK requesting FA relocation to ASN-GW, ASN-GW providing in reply the necessary MIP keys to be used to update the current FA-HA registration. 17. A method according to claim 6, wherein the preparation of a handover from 3GPP to WiMAX comprises a step of: a Mobile Station MS using a dedicated Signaling Agent to send a Handover Request to IWK. 18. A method according to claim 6, wherein the preparation of a handover from 3GPP to WiMAX comprises a step of: IWK selecting a new Base Station Identity BS ID given its own fake BS ID and the WiMAX BS/ASN-GW topology configuration map. 19. A method for assigning a common IP address in WiMAX and 3GPP networks, comprising a step of: retrieving a Mobile Station MS IP address from WiMAX network when providing the IP address to the MS in 3GPP network, transparently by IWK. 20. A method according to claim 19, comprising the steps of: upon attaching to the 3GPP network, MS requesting non-transparent PDP Context creation, selecting IWK through APN field and providing its WiMAX Identity through the PCO field, when handling the PDP context creation, GGSN building and sending a DHCP request to IWK, mapping the PCO field to a DHCP field, IWK, acting as a DHCP relay or client, starting DHCP procedure towards WiMax DHCP Server, IWK receiving the MS IP address from WiMax DHCP Server and delivering it to GGSN, GGSN activating the PDP context with the MS IP address that is returned to the MS for configuration. 21. A method according to claim 19, comprising a step of: constructing a Mobile Station MS context in IWK containing the MSISDN, IMSI and IP address of the MS for the usage of a DHCP server and Home Agent HA belonging to the WiMAX CSN. 22. A method according to claim 19, comprising the steps: upon attaching to the 3GPP network, MS requesting non-transparent PDP Context creation, selecting IWK through APN, upon receiving a Create PDP context Request message, GGSN sending a RADIUS Access Request message to WiMAX AAA Server, via S-IWK acting as proxy-AAA server, said message containing user's MSISDN and IMSI, IWK storing MSISDN and IMSI in a MS context, WiMAX AAA Server returning a RADIUS Access Accept message to GGSN via IWK, performing a DHCP procedure, via IWK acting as DHCP relay and replacing MSISDN by NAI based IMSI in the client-identifier field to get an IP address corresponding to WiMAX Home Address HoA. 23. A method for 3GPP network entry, comprising a step of: performing 3GPP network entry, using WiMAX R3 interface between IWK and WiMAX CSN. 24. A method according to claim 23, comprising the steps of: upon MS attaching to the 3GPP network, setting up a PDP context with PPP type and APN mapping to IWK address with L2TP, performing EAP procedure between MS and WiMAX AAA Server via IWK acting as an Authenticator, performing DHCP procedure between IWK and WiMAX DHCP Server. 25. A method according to claim 24, comprising a step of: during said EAP procedure, MA Server sending to IWK Mobile Station MS context information including Home Address HoA, Home Agent Address HA@, DHCP Servers addresses DHCP@, and Mobile IP MIP keys. 26. A method according to claim 23, comprising the steps of: upon attaching to the 3GPP network, MS requesting IP non-transparent PDP context, with APN mapping to IWK address, performing DHCP procedure between GGSN and WiMAX DHCP Server via IWK acting as a DHCP relay, IWK mapping IMSI to WiMAX MAC address, and DHCP Server allocating MS IP address corresponding to WiMAX Home Address HoA. 27. A method according to claim 24, comprising a step of: MS storing said allocated IP address. 28. An Interworking node IWK for an architecture according to claim 1. 29. A 3GPP Packet Core Network entity such as in particular GGSN, for an architecture according to claim 1. 30. An Interworking node IWK according to claim 28, comprising means for performing at least one of handover preparation and execution, retrieving a Mobile Station MS IP address from WiMAX network when providing the IP address to the MS in 3GPP network transparently by IWK, or performing 3GPP network entry using WiMAX R3 interface between IWK and WiMAX CSN. 31. A 3GPP Packet Core Network entity such as in particular GGSN, comprising means for performing at least one of handover preparation and execution, retrieving a Mobile Station MS IP address from WiMAX network when providing the IP address to the MS in 3GPP network transparently by IWK, or performing 3GPP network entry using WiMAX R3 interface between IWK and WiMAX CSN. 32. A Mobile Station MS, comprising means for performing at least one of handover preparation and execution, retrieving a Mobile Station MS IP address from WiMAX network when providing the IP address to the MS in 3GPP network transparently by IWK, or performing 3GPP network entry using WiMAX R3 interface between IWK and WiMAX CSN.
One object of the present invention is an architecture for interworking between WiMAX and 3GPP networks, said architecture comprising: an interworking node IWK which connects with the 3GPP Packet Core Network using 3GPP Gi interface, face, and with the WiMAX Connectivity Service Network CSN using WiMAX R3 interface.1. An architecture for interworking between WiMAX and 3GPP networks, said architecture comprising: an interworking node IWK which connects with the 3GPP Packet Core Network using 3GPP Gi interface, and with the WiMAX Connectivity Service Network CSN using WiMAX R3 interface. 2. An architecture according to claim 1, wherein IWK interfaces with a GGSN in the 3GPP Packet Core Network using 3GPP Gi interface. 3. An architecture according to claim 1, wherein IWK comprises a Foreign Agent FA. 4. An architecture according to claim 1, wherein IWK comprises Proxy-AAA-Server, DHCP relay, and a Foreign Agent FA. 5. An architecture according to claim 1, wherein Home CSN is considered by GGSN as an ISP identified by a dedicated APN. 6. A method for handover between WiMAX and 3GPP networks using an architecture according to claim 1, comprising the steps of: handover preparation, handover execution. 7. A method according to claim 6, wherein a handover comprises the steps of: IWK managing in a coordinated way handovers from/to WiMAX network, using WiMAX R4 interface. 8. A method according to claim 6, wherein the preparation of a handover from WIMAX to 3GPP comprises the steps of: a Mobile Station MS sending to the WiMAX network a Handover Request MOB-MSHO-REQ message specifying in a BSID list a fake Base Station Identity BS ID associated with IWK, ASN-GW sending a R4 Handover Request R4 HO_Req message to IWK. 9. A method according to claim 6, wherein the preparation of a handover from WIMAX to 3GPP comprises a step of: IWK storing in a Mobile Station MS context, WiMAX context information received in a R4 Handover Request R4 HO_Req message. 10. A method according to claim 6, wherein the preparation of a handover from WiMAX to 3GPP comprises a step of: IWK storing in a Mobile Station MS context, WiMAX context information received in a R4 Anchor_DPF_Req message. 11. A method according to claim 9, wherein said WiMAX context information comprises Home Address HoA, Home Agent Address HA @, and Mobile IP MIP keys. 12. A method according to claim 6, wherein said handover preparation comprises a step of: setting up a GRE tunnel between ASN-GW and IWK. 13. A method according to claim 6, wherein the execution of a handover from WiMAX to 3GPP comprises the steps of: upon attaching to the 3GPP network, a Mobile Station MS performing PDP context setup towards IWK, MS requesting an IP address using either PPP or non-transparent PDP context type, IWK resolving the PDP context setup using the WiMAX Home Address HoA associated with the MS in a MS Context stored in IWK. 14. A method according to claim 6, wherein the execution of a handover from WiMAX to 3GPP comprises the steps of: upon attaching to 3GPP network, a Mobile Station MS sending a MOB_HO-IND message to the WiMAX network, ASN-GW sending a R4 Handover Confirmation R4 HO_CNF message to IWK, upon the forwarding of data by ASN-GW to IWK through a GRE tunnel, IWK sending a PDP PDU to GGSN, GGSN initializing a Network-Requested PDP context activation procedure. 15. A method according to claim 6, wherein the execution of a handover from WiMAX to 3GPP comprises a step of: upon a Mobile Station MS attaching to 3GPP network, setting up a PDP context of IP non-transparent type and with static mode, MS requiring to use previously stored WiMAX Home Address HoA. 16. A method according to claim 6, wherein the execution of a handover from WiMAX to 3GPP comprises the steps of: IWK requesting FA relocation to ASN-GW, ASN-GW providing in reply the necessary MIP keys to be used to update the current FA-HA registration. 17. A method according to claim 6, wherein the preparation of a handover from 3GPP to WiMAX comprises a step of: a Mobile Station MS using a dedicated Signaling Agent to send a Handover Request to IWK. 18. A method according to claim 6, wherein the preparation of a handover from 3GPP to WiMAX comprises a step of: IWK selecting a new Base Station Identity BS ID given its own fake BS ID and the WiMAX BS/ASN-GW topology configuration map. 19. A method for assigning a common IP address in WiMAX and 3GPP networks, comprising a step of: retrieving a Mobile Station MS IP address from WiMAX network when providing the IP address to the MS in 3GPP network, transparently by IWK. 20. A method according to claim 19, comprising the steps of: upon attaching to the 3GPP network, MS requesting non-transparent PDP Context creation, selecting IWK through APN field and providing its WiMAX Identity through the PCO field, when handling the PDP context creation, GGSN building and sending a DHCP request to IWK, mapping the PCO field to a DHCP field, IWK, acting as a DHCP relay or client, starting DHCP procedure towards WiMax DHCP Server, IWK receiving the MS IP address from WiMax DHCP Server and delivering it to GGSN, GGSN activating the PDP context with the MS IP address that is returned to the MS for configuration. 21. A method according to claim 19, comprising a step of: constructing a Mobile Station MS context in IWK containing the MSISDN, IMSI and IP address of the MS for the usage of a DHCP server and Home Agent HA belonging to the WiMAX CSN. 22. A method according to claim 19, comprising the steps: upon attaching to the 3GPP network, MS requesting non-transparent PDP Context creation, selecting IWK through APN, upon receiving a Create PDP context Request message, GGSN sending a RADIUS Access Request message to WiMAX AAA Server, via S-IWK acting as proxy-AAA server, said message containing user's MSISDN and IMSI, IWK storing MSISDN and IMSI in a MS context, WiMAX AAA Server returning a RADIUS Access Accept message to GGSN via IWK, performing a DHCP procedure, via IWK acting as DHCP relay and replacing MSISDN by NAI based IMSI in the client-identifier field to get an IP address corresponding to WiMAX Home Address HoA. 23. A method for 3GPP network entry, comprising a step of: performing 3GPP network entry, using WiMAX R3 interface between IWK and WiMAX CSN. 24. A method according to claim 23, comprising the steps of: upon MS attaching to the 3GPP network, setting up a PDP context with PPP type and APN mapping to IWK address with L2TP, performing EAP procedure between MS and WiMAX AAA Server via IWK acting as an Authenticator, performing DHCP procedure between IWK and WiMAX DHCP Server. 25. A method according to claim 24, comprising a step of: during said EAP procedure, MA Server sending to IWK Mobile Station MS context information including Home Address HoA, Home Agent Address HA@, DHCP Servers addresses DHCP@, and Mobile IP MIP keys. 26. A method according to claim 23, comprising the steps of: upon attaching to the 3GPP network, MS requesting IP non-transparent PDP context, with APN mapping to IWK address, performing DHCP procedure between GGSN and WiMAX DHCP Server via IWK acting as a DHCP relay, IWK mapping IMSI to WiMAX MAC address, and DHCP Server allocating MS IP address corresponding to WiMAX Home Address HoA. 27. A method according to claim 24, comprising a step of: MS storing said allocated IP address. 28. An Interworking node IWK for an architecture according to claim 1. 29. A 3GPP Packet Core Network entity such as in particular GGSN, for an architecture according to claim 1. 30. An Interworking node IWK according to claim 28, comprising means for performing at least one of handover preparation and execution, retrieving a Mobile Station MS IP address from WiMAX network when providing the IP address to the MS in 3GPP network transparently by IWK, or performing 3GPP network entry using WiMAX R3 interface between IWK and WiMAX CSN. 31. A 3GPP Packet Core Network entity such as in particular GGSN, comprising means for performing at least one of handover preparation and execution, retrieving a Mobile Station MS IP address from WiMAX network when providing the IP address to the MS in 3GPP network transparently by IWK, or performing 3GPP network entry using WiMAX R3 interface between IWK and WiMAX CSN. 32. A Mobile Station MS, comprising means for performing at least one of handover preparation and execution, retrieving a Mobile Station MS IP address from WiMAX network when providing the IP address to the MS in 3GPP network transparently by IWK, or performing 3GPP network entry using WiMAX R3 interface between IWK and WiMAX CSN.
2,400
8,068
8,068
14,567,993
2,473
Aspects of the present disclosure provide for the pairing of an inter-band carrier with a time division duplex (TDD) carrier. If the paired band is a frequency division duplex (FDD) band, then base stations and mobile devices may transmit and receive additional thin control channels on FDD carriers to enable full duplex operations. If the paired band is a TDD band, then a conjugate or inverse carrier may be used such that full duplex, or a close approximation thereto, is achieved. With the introduction of a paired channel and fast control channels, rapid uplink/downlink switching may be achieved for TDD carriers efficiently and effectively. Other aspects, embodiments, and features are also claimed and described.
1. A method of wireless communication operable at a subordinate entity, comprising: wirelessly communicating with a scheduling entity utilizing a first transmission time interval (TTI) over a first carrier, the first carrier being a time division duplex (TDD) carrier; and wirelessly communicating with the scheduling entity utilizing a second TTI different from the first TTI and at least partially overlapping the first TTI, over a second carrier paired with the first carrier but separated from the first carrier in frequency. 2. The method of claim 1, wherein the second TTI is shorter in duration than the first TTI. 3. The method of claim 1, wherein the second carrier comprises at least one control channel for controlling data transmissions on the first carrier. 4. The method of claim 3, wherein the second carrier is a frequency division duplex (FDD) carrier. 5. The method of claim 4, further comprising: transmitting a scheduling request to the scheduling entity on a feedback channel on the FDD carrier; receiving an uplink grant from the scheduling entity on the FDD carrier in response to the scheduling request, the uplink grant configured to identify granted resources on the TDD carrier for an uplink data transmission utilizing the second TTI; and transmitting the uplink data to the scheduling entity utilizing the second TTI in accordance with the uplink grant. 6. The method of claim 4, further comprising: receiving from the scheduling entity a grant modification on the FDD carrier, the grant modification configured to modify an existing grant of resources for an uplink data transmission utilizing the first TTI; and driving a zero input to a power amplifier associated with a transceiver to suspend uplink transmissions in accordance with the grant modification. 7. The method of claim 4, further comprising: receiving a downlink grant from the scheduling entity on a grant channel on the FDD carrier utilizing the second TTI; and receiving downlink data corresponding to the downlink grant from the scheduling entity on the TDD carrier utilizing the second TTI. 8. The method of claim 7, wherein the downlink grant and the downlink data corresponding to the downlink grant are received simultaneous to one another. 9. The method of claim 4, further comprising: receiving and buffering a downlink grant from the scheduling entity on a grant channel on the FDD carrier utilizing the second TTI, while transmitting uplink data on the TDD carrier. 10. The method of claim 4, further comprising: receiving from the scheduling entity a grant modification on the FDD carrier, the grant modification configured to modify an existing grant of resources for downlink data utilizing the first TTI; and modifying reception of the downlink data on the TDD carrier utilizing the first TTI in accordance with the grant modification. 11. The method of claim 10, wherein the modifying reception of the downlink data comprises suspending reception of the downlink data during at least one second TTI. 12. The method of claim 1, wherein the second carrier is a TDD carrier having a conjugate pairing with the first carrier, wherein at least a portion of time slots in the first carrier are complementary in direction to a direction of time-aligned time slots in the second carrier. 13. The method of claim 12, further comprising: transmitting a scheduling request to a scheduling entity on a feedback channel on the first carrier; receiving an uplink grant from the scheduling entity on the second carrier in response to the scheduling request, the uplink grant configured to identify granted resources on the first carrier for an uplink data transmission utilizing the second TTI; and transmitting the uplink data to the scheduling entity utilizing the second TTI in accordance with the uplink grant. 14. The method of claim 12, further comprising receiving a grant modification on the second carrier, the grant modification configured to modify an existing grant of resources for an uplink data transmission utilizing the first TTI; and modifying the uplink data transmission in accordance with the grant modification. 15. The method of claim 14, wherein the modifying the uplink data comprises suspending transmission of the uplink data. 16. The method of claim 12, further comprising: receiving a downlink grant from a scheduling entity on a grant channel on the second carrier utilizing the second TTI; and receiving downlink data corresponding to the downlink grant, from the scheduling entity on the first carrier utilizing the second TTI. 17. The method of claim 16, wherein the downlink grant and the downlink data are received simultaneous to one another. 18. The method of claim 12, further comprising: receiving and buffering a downlink grant from a scheduling entity on a grant channel on the second carrier utilizing the second TTI, while transmitting uplink data on the first carrier utilizing the first TTI. 19. The method of claim 12, further comprising: transmitting a scheduling request to a scheduling entity on a feedback channel on the second carrier; receiving an uplink grant from the scheduling entity in response to the scheduling request, the uplink grant configured to identify granted resources on the first carrier for an uplink data transmission utilizing the second TTI; and transmitting the uplink data to the scheduling entity utilizing the second TTI on the first carrier in accordance with the uplink grant. 20. The method of claim 19, wherein the grant modification and the downlink data are received simultaneous to one another. 21. The method of claim 12, further comprising: receiving from the scheduling entity a grant modification on the first carrier, the grant modification configured to modify an existing grant of resources for downlink data utilizing the first TTI; and modifying reception of the downlink data on the second carrier utilizing the first TTI in accordance with the grant modification. 22. The method of claim 21, wherein the modifying reception of the downlink data comprises suspending reception of the downlink data during at least one second TTI. 23. A subordinate entity configured for wireless communication, comprising: at least one processor; a computer-readable medium communicatively coupled to the at least one processor; and a transceiver communicatively coupled to the at least one processor, wherein the at least one processor is configured to: utilize the transceiver to wirelessly communicate with a scheduling entity utilizing a first transmission time interval (TTI) over a first carrier, the first carrier being a time division duplex (TDD) carrier; and utilize the transceiver to wirelessly communicate with the scheduling entity utilizing a second TTI different from the first TTI and at least partially overlapping the first TTI, over a second carrier paired with the first carrier but separated from the first carrier in frequency. 24. The subordinate entity of claim 23, wherein the second TTI is shorter in duration than the first TTI. 25. The subordinate entity of claim 23, wherein the second carrier comprises at least one control channel for controlling data transmissions on the first carrier. 26. The subordinate entity of claim 23, wherein the second carrier is a frequency division duplex (FDD) carrier. 27. The subordinate entity of claim 26, wherein the at least one processor is further configured to: utilize the transceiver to transmit a scheduling request to the scheduling entity on a feedback channel on the FDD carrier; utilize the transceiver to receive an uplink grant from the scheduling entity on the FDD carrier in response to the scheduling request, the uplink grant configured to identify granted resources on the TDD carrier for an uplink data transmission utilizing the second TTI; and utilize the transceiver to transmit the uplink data to the scheduling entity utilizing the second TTI in accordance with the uplink grant. 28. The subordinate entity of claim 26, wherein the at least one processor is further configured to: utilize the transceiver to receive from the scheduling entity a grant modification on the FDD carrier, the grant modification configured to modify an existing grant of resources for an uplink data transmission utilizing the first TTI; and drive a zero input to a power amplifier associated with the transceiver to suspend uplink transmissions in accordance with the grant modification. 29. The subordinate entity of claim 26, wherein the at least one processor is further configured to: utilize the transceiver to receive a downlink grant from the scheduling entity on a grant channel on the FDD carrier utilizing the second TTI; and utilize the transceiver to receive downlink data corresponding to the downlink grant from the scheduling entity on the TDD carrier utilizing the second TTI. 30. The subordinate entity of claim 29, wherein the downlink grant and the downlink data corresponding to the downlink grant are received simultaneous to one another. 31. The subordinate entity of claim 26, wherein the at least one processor is further configured to: utilize the transceiver to receive a downlink grant from the scheduling entity on a grant channel on the FDD carrier utilizing the second TTI; and buffer the downlink grant while transmitting uplink data on the TDD carrier. 32. The subordinate entity of claim 26, wherein the at least one processor is further configured to: utilize the transceiver to receive from the scheduling entity a grant modification on the FDD carrier, the grant modification configured to modify an existing grant of resources for downlink data utilizing the first TTI; and modify reception of the downlink data on the TDD carrier utilizing the first TTI in accordance with the grant modification. 33. The subordinate entity of claim 32, wherein the at least one processor, being configured to modify reception of the downlink data, is further configured to suspend reception of the downlink data during at least one second TTI. 34. The subordinate entity of claim 23, wherein the second carrier is a TDD carrier having a conjugate pairing with the first carrier, wherein at least a portion of time slots in the first carrier are complementary in direction to a direction of time-aligned time slots in the second carrier. 35. The subordinate entity of claim 34, wherein the at least one processor is further configured to: utilize the transceiver to transmit a scheduling request to a scheduling entity on a feedback channel on the first carrier; utilize the transceiver to receive an uplink grant from the scheduling entity on the second carrier in response to the scheduling request, the uplink grant configured to identify granted resources on the first carrier for an uplink data transmission utilizing the second TTI; and utilize the transceiver to transmit the uplink data to the scheduling entity utilizing the second TTI in accordance with the uplink grant. 36. The subordinate entity of claim 34, wherein the at least one processor is further configured to: utilize the transceiver to receive a grant modification on the second carrier, the grant modification configured to modify an existing grant of resources for an uplink data transmission utilizing the first TTI; and modify the uplink data transmission in accordance with the grant modification. 37. The subordinate entity of claim 36, wherein the at least one processor, being configured to modify the uplink data, is further configured to suspend transmission of the uplink data. 38. The subordinate entity of claim 34, wherein the at least one processor is further configured to: utilize the transceiver to receive a downlink grant from a scheduling entity on a grant channel on the second carrier utilizing the second TTI; and utilize the transceiver to receive downlink data corresponding to the downlink grant, from the scheduling entity on the first carrier utilizing the second TTI. 39. The subordinate entity of claim 38, wherein the at least one processor is further configured to receive the downlink grant and the downlink data simultaneous to one another. 40. The subordinate entity of claim 34, wherein the at least one processor is further configured to: utilize the transceiver to receive a downlink grant from a scheduling entity on a grant channel on the second carrier utilizing the second TTI; and buffer the downlink grant while transmitting uplink data on the first carrier utilizing the first TTI. 41. The subordinate entity of claim 34, wherein the at least one processor is further configured to: utilize the transceiver to transmit a scheduling request to a scheduling entity on a feedback channel on the second carrier; utilize the transceiver to receive an uplink grant from the scheduling entity in response to the scheduling request, the uplink grant configured to identify granted resources on the first carrier for an uplink data transmission utilizing the second TTI; and utilize the transceiver to transmit the uplink data to the scheduling entity utilizing the second TTI on the first carrier in accordance with the uplink grant. 42. The subordinate entity of claim 41, wherein the at least one processor is further configured to receive the grant modification and the downlink data simultaneous to one another. 43. The subordinate entity of claim 34, wherein the at least one processor is further configured to: utilize the transceiver to receive from the scheduling entity a grant modification on the first carrier, the grant modification configured to modify an existing grant of resources for downlink data utilizing the first TTI; and utilize the transceiver to modify reception of the downlink data on the second carrier utilizing the first TTI in accordance with the grant modification. 44. The subordinate entity of claim 43, wherein the at least one processor, being configured to modify reception of the downlink data, is further configured to suspend reception of the downlink data during at least one second TTI. 45. A subordinate entity configured for wireless communication, comprising: means for wirelessly communicating with a scheduling entity utilizing a first transmission time interval (TTI) over a first carrier, the first carrier being a time division duplex (TDD) carrier; and means for wirelessly communicating with the scheduling entity utilizing a second TTI different from the first TTI and at least partially overlapping the first TTI, over a second carrier paired with the first carrier but separated from the first carrier in frequency. 46. The subordinate entity of claim 45, wherein the second TTI is shorter in duration than the first TTI. 47. The subordinate entity of claim 45, wherein the second carrier comprises at least one control channel for controlling data transmissions on the first carrier. 48. The subordinate entity of claim 45, wherein the second carrier is a frequency division duplex (FDD) carrier. 49. The subordinate entity of claim 48, further comprising: means for transmitting a scheduling request to the scheduling entity on a feedback channel on the FDD carrier; means for receiving an uplink grant from the scheduling entity on the FDD carrier in response to the scheduling request, the uplink grant configured to identify granted resources on the TDD carrier for an uplink data transmission utilizing the second TTI; and means for transmitting the uplink data to the scheduling entity utilizing the second TTI in accordance with the uplink grant. 50. The subordinate entity of claim 48, further comprising: means for receiving from the scheduling entity a grant modification on the FDD carrier, the grant modification configured to modify an existing grant of resources for an uplink data transmission utilizing the first TTI; and means for driving a zero input to a power amplifier associated with a transceiver to suspend uplink transmissions in accordance with the grant modification. 51. The subordinate entity of claim 48, further comprising: means for receiving a downlink grant from the scheduling entity on a grant channel on the FDD carrier utilizing the second TTI; and means for receiving downlink data corresponding to the downlink grant from the scheduling entity on the TDD carrier utilizing the second TTI. 52. The subordinate entity of claim 51, wherein the means for receiving the downlink grant and the means for receiving the downlink data corresponding to the downlink grant are configured to receive the downlink grant and the downlink data simultaneous to one another. 53. The subordinate entity of claim 48, further comprising: means for receiving and buffering a downlink grant from the scheduling entity on a grant channel on the FDD carrier utilizing the second TTI while transmitting uplink data on the TDD carrier. 54. The subordinate entity of claim 48, further comprising: means for receiving from the scheduling entity a grant modification on the FDD carrier, the grant modification configured to modify an existing grant of resources for downlink data utilizing the first TTI; and means for modifying reception of the downlink data on the TDD carrier utilizing the first TTI in accordance with the grant modification. 55. The subordinate entity of claim 54, wherein the means for modifying reception of the downlink data is configured for suspending reception of the downlink data during at least one second TTI. 56. The subordinate entity of claim 45, wherein the second carrier is a TDD carrier having a conjugate pairing with the first carrier, wherein at least a portion of time slots in the first carrier are complementary in direction to a direction of time-aligned time slots in the second carrier. 57. The subordinate entity of claim 56, further comprising: means for transmitting a scheduling request to a scheduling entity on a feedback channel on the first carrier; means for receiving an uplink grant from the scheduling entity on the second carrier in response to the scheduling request, the uplink grant configured to identify granted resources on the first carrier for an uplink data transmission utilizing the second TTI; and means for transmitting the uplink data to the scheduling entity utilizing the second TTI in accordance with the uplink grant. 58. The subordinate entity of claim 56, further comprising: means for receiving a grant modification on the second carrier, the grant modification configured to modify an existing grant of resources for an uplink data transmission utilizing the first TTI; and means for modifying the uplink data transmission in accordance with the grant modification. 59. The subordinate entity of claim 58, wherein the means for modifying the uplink data are configured for suspending transmission of the uplink data. 60. The subordinate entity of claim 56, further comprising: means for receiving a downlink grant from a scheduling entity on a grant channel on the second carrier utilizing the second TTI; and means for receiving downlink data corresponding to the downlink grant, from the scheduling entity on the first carrier utilizing the second TTI. 61. The subordinate entity of claim 60, wherein the means for receiving the downlink grant and the means for receiving the downlink data are configured to receive the downlink grant and the downlink data simultaneous to one another. 62. The subordinate entity of claim 56, further comprising: means for receiving and buffering a downlink grant from a scheduling entity on a grant channel on the second carrier utilizing the second TTI, while transmitting uplink data on the first carrier utilizing the first TTI. 63. The subordinate entity of claim 56, further comprising: means for transmitting a scheduling request to a scheduling entity on a feedback channel on the second carrier; means for receiving an uplink grant from the scheduling entity in response to the scheduling request, the uplink grant configured to identify granted resources on the first carrier for an uplink data transmission utilizing the second TTI; and means for transmitting the uplink data to the scheduling entity utilizing the second TTI on the first carrier in accordance with the uplink grant. 64. The subordinate entity of claim 63, wherein the means for receiving the grant modification and the means for receiving the downlink data are configured to receive the grant modification and the downlink data simultaneous to one another. 65. The subordinate entity of claim 56, further comprising: means for receiving from the scheduling entity a grant modification on the first carrier, the grant modification configured to modify an existing grant of resources for downlink data utilizing the first TTI; and means for modifying reception of the downlink data on the second carrier utilizing the first TTI in accordance with the grant modification. 66. The subordinate entity of claim 65, wherein the means for modifying reception of the downlink data are configured for suspending reception of the downlink data during at least one second TTI. 67. A computer-readable medium storing computer-executable code on a subordinate entity configured for wireless communication, comprising: instructions for causing a computer to wirelessly communicate with a scheduling entity utilizing a first transmission time interval (TTI) over a first carrier, the first carrier being a time division duplex (TDD) carrier; and instructions for causing a computer to wirelessly communicate with the scheduling entity utilizing a second TTI different from the first TTI and at least partially overlapping the first TTI, over a second carrier paired with the first carrier but separated from the first carrier in frequency. 68. The computer-readable medium of claim 67, wherein the second TTI is shorter in duration than the first TTI. 69. The computer-readable medium of claim 67, wherein the second carrier comprises at least one control channel for controlling data transmissions on the first carrier. 70. The computer-readable medium of claim 69, wherein the second carrier is a frequency division duplex (FDD) carrier. 71. The computer-readable medium of claim 70, further comprising: instructions for causing a computer to transmit a scheduling request to the scheduling entity on a feedback channel on the FDD carrier; instructions for causing a computer to receive an uplink grant from the scheduling entity on the FDD carrier in response to the scheduling request, the uplink grant configured to identify granted resources on the TDD carrier for an uplink data transmission utilizing the second TTI; and instructions for causing a computer to transmit the uplink data to the scheduling entity utilizing the second TTI in accordance with the uplink grant. 72. The computer-readable medium of claim 70, further comprising: instructions for causing a computer to receive from the scheduling entity a grant modification on the FDD carrier, the grant modification configured to modify an existing grant of resources for an uplink data transmission utilizing the first TTI; and instructions for causing a computer to drive a zero input to a power amplifier associated with a transceiver to suspend uplink transmissions in accordance with the grant modification. 73. The computer-readable medium of claim 70, further comprising: instructions for causing a computer to receive a downlink grant from the scheduling entity on a grant channel on the FDD carrier utilizing the second TTI; and instructions for causing a computer to receive downlink data corresponding to the downlink grant from the scheduling entity on the TDD carrier utilizing the second TTI. 74. The computer-readable medium of claim 73, wherein the instructions for causing a computer to receive a downlink grant and the instructions for causing a computer to receive downlink data corresponding to the downlink grant are configured to receive the downlink grant and the downlink data simultaneous to one another. 75. The computer-readable medium of claim 70, further comprising: instructions for causing a computer to receive and buffer a downlink grant from the scheduling entity on a grant channel on the FDD carrier utilizing the second TTI, while transmitting uplink data on the TDD carrier. 76. The computer-readable medium of claim 70, further comprising: instructions for causing a computer to receive from the scheduling entity a grant modification on the FDD carrier, the grant modification configured to modify an existing grant of resources for downlink data utilizing the first TTI; and instructions for causing a computer to modify reception of the downlink data on the TDD carrier utilizing the first TTI in accordance with the grant modification. 77. The computer-readable medium of claim 76, wherein the instructions for causing a computer to modify reception of the downlink data are further configured for suspending reception of the downlink data during at least one second TTI. 78. The computer-readable medium of claim 67, wherein the second carrier is a TDD carrier having a conjugate pairing with the first carrier, wherein at least a portion of time slots in the first carrier are complementary in direction to a direction of time-aligned time slots in the second carrier. 79. The computer-readable medium of claim 78, further comprising: instructions for causing a computer to transmit a scheduling request to a scheduling entity on a feedback channel on the first carrier; instructions for causing a computer to receive an uplink grant from the scheduling entity on the second carrier in response to the scheduling request, the uplink grant configured to identify granted resources on the first carrier for an uplink data transmission utilizing the second TTI; and instructions for causing a computer to transmit the uplink data to the scheduling entity utilizing the second TTI in accordance with the uplink grant. 80. The computer-readable medium of claim 78, further comprising: instructions for causing a computer to receive a grant modification on the second carrier, the grant modification configured to modify an existing grant of resources for an uplink data transmission utilizing the first TTI; and instructions for causing a computer to modify the uplink data transmission in accordance with the grant modification. 81. The computer-readable medium of claim 80, wherein the instructions for causing a computer to modify the uplink data are further configured for suspending transmission of the uplink data. 82. The computer-readable medium of claim 78, further comprising: instructions for causing a computer to receive a downlink grant from a scheduling entity on a grant channel on the second carrier utilizing the second TTI; and instructions for causing a computer to receive downlink data corresponding to the downlink grant, from the scheduling entity on the first carrier utilizing the second TTI. 83. The computer-readable medium of claim 82, wherein the instructions for causing a computer to receive a downlink grant and the instructions for causing a computer to receive downlink data are configured to receive the downlink grant and the downlink data simultaneous to one another. 84. The computer-readable medium of claim 78, further comprising: instructions for causing a computer to receive and buffer a downlink grant from a scheduling entity on a grant channel on the second carrier utilizing the second TTI, while transmitting uplink data on the first carrier utilizing the first TTI. 85. The computer-readable medium of claim 78, further comprising: instructions for causing a computer to transmit a scheduling request to a scheduling entity on a feedback channel on the second carrier; instructions for causing a computer to receive an uplink grant from the scheduling entity in response to the scheduling request, the uplink grant configured to identify granted resources on the first carrier for an uplink data transmission utilizing the second TTI; and instructions for causing a computer to transmit the uplink data to the scheduling entity utilizing the second TTI on the first carrier in accordance with the uplink grant. 86. The computer-readable medium of claim 85, wherein the instructions for causing a computer to receive a grant modification and the instructions for causing a computer to receive downlink data are configured to receive the grant modification and the downlink data simultaneous to one another. 87. The computer-readable medium of claim 78, further comprising: instructions for causing a computer to receive from the scheduling entity a grant modification on the first carrier, the grant modification configured to modify an existing grant of resources for downlink data utilizing the first TTI; and instructions for causing a computer to modify reception of the downlink data on the second carrier utilizing the first TTI in accordance with the grant modification. 88. The computer-readable medium of claim 87, wherein the instructions for causing a computer to modify reception of the downlink data are further configured for suspending reception of the downlink data during at least one second TTI.
Aspects of the present disclosure provide for the pairing of an inter-band carrier with a time division duplex (TDD) carrier. If the paired band is a frequency division duplex (FDD) band, then base stations and mobile devices may transmit and receive additional thin control channels on FDD carriers to enable full duplex operations. If the paired band is a TDD band, then a conjugate or inverse carrier may be used such that full duplex, or a close approximation thereto, is achieved. With the introduction of a paired channel and fast control channels, rapid uplink/downlink switching may be achieved for TDD carriers efficiently and effectively. Other aspects, embodiments, and features are also claimed and described.1. A method of wireless communication operable at a subordinate entity, comprising: wirelessly communicating with a scheduling entity utilizing a first transmission time interval (TTI) over a first carrier, the first carrier being a time division duplex (TDD) carrier; and wirelessly communicating with the scheduling entity utilizing a second TTI different from the first TTI and at least partially overlapping the first TTI, over a second carrier paired with the first carrier but separated from the first carrier in frequency. 2. The method of claim 1, wherein the second TTI is shorter in duration than the first TTI. 3. The method of claim 1, wherein the second carrier comprises at least one control channel for controlling data transmissions on the first carrier. 4. The method of claim 3, wherein the second carrier is a frequency division duplex (FDD) carrier. 5. The method of claim 4, further comprising: transmitting a scheduling request to the scheduling entity on a feedback channel on the FDD carrier; receiving an uplink grant from the scheduling entity on the FDD carrier in response to the scheduling request, the uplink grant configured to identify granted resources on the TDD carrier for an uplink data transmission utilizing the second TTI; and transmitting the uplink data to the scheduling entity utilizing the second TTI in accordance with the uplink grant. 6. The method of claim 4, further comprising: receiving from the scheduling entity a grant modification on the FDD carrier, the grant modification configured to modify an existing grant of resources for an uplink data transmission utilizing the first TTI; and driving a zero input to a power amplifier associated with a transceiver to suspend uplink transmissions in accordance with the grant modification. 7. The method of claim 4, further comprising: receiving a downlink grant from the scheduling entity on a grant channel on the FDD carrier utilizing the second TTI; and receiving downlink data corresponding to the downlink grant from the scheduling entity on the TDD carrier utilizing the second TTI. 8. The method of claim 7, wherein the downlink grant and the downlink data corresponding to the downlink grant are received simultaneous to one another. 9. The method of claim 4, further comprising: receiving and buffering a downlink grant from the scheduling entity on a grant channel on the FDD carrier utilizing the second TTI, while transmitting uplink data on the TDD carrier. 10. The method of claim 4, further comprising: receiving from the scheduling entity a grant modification on the FDD carrier, the grant modification configured to modify an existing grant of resources for downlink data utilizing the first TTI; and modifying reception of the downlink data on the TDD carrier utilizing the first TTI in accordance with the grant modification. 11. The method of claim 10, wherein the modifying reception of the downlink data comprises suspending reception of the downlink data during at least one second TTI. 12. The method of claim 1, wherein the second carrier is a TDD carrier having a conjugate pairing with the first carrier, wherein at least a portion of time slots in the first carrier are complementary in direction to a direction of time-aligned time slots in the second carrier. 13. The method of claim 12, further comprising: transmitting a scheduling request to a scheduling entity on a feedback channel on the first carrier; receiving an uplink grant from the scheduling entity on the second carrier in response to the scheduling request, the uplink grant configured to identify granted resources on the first carrier for an uplink data transmission utilizing the second TTI; and transmitting the uplink data to the scheduling entity utilizing the second TTI in accordance with the uplink grant. 14. The method of claim 12, further comprising receiving a grant modification on the second carrier, the grant modification configured to modify an existing grant of resources for an uplink data transmission utilizing the first TTI; and modifying the uplink data transmission in accordance with the grant modification. 15. The method of claim 14, wherein the modifying the uplink data comprises suspending transmission of the uplink data. 16. The method of claim 12, further comprising: receiving a downlink grant from a scheduling entity on a grant channel on the second carrier utilizing the second TTI; and receiving downlink data corresponding to the downlink grant, from the scheduling entity on the first carrier utilizing the second TTI. 17. The method of claim 16, wherein the downlink grant and the downlink data are received simultaneous to one another. 18. The method of claim 12, further comprising: receiving and buffering a downlink grant from a scheduling entity on a grant channel on the second carrier utilizing the second TTI, while transmitting uplink data on the first carrier utilizing the first TTI. 19. The method of claim 12, further comprising: transmitting a scheduling request to a scheduling entity on a feedback channel on the second carrier; receiving an uplink grant from the scheduling entity in response to the scheduling request, the uplink grant configured to identify granted resources on the first carrier for an uplink data transmission utilizing the second TTI; and transmitting the uplink data to the scheduling entity utilizing the second TTI on the first carrier in accordance with the uplink grant. 20. The method of claim 19, wherein the grant modification and the downlink data are received simultaneous to one another. 21. The method of claim 12, further comprising: receiving from the scheduling entity a grant modification on the first carrier, the grant modification configured to modify an existing grant of resources for downlink data utilizing the first TTI; and modifying reception of the downlink data on the second carrier utilizing the first TTI in accordance with the grant modification. 22. The method of claim 21, wherein the modifying reception of the downlink data comprises suspending reception of the downlink data during at least one second TTI. 23. A subordinate entity configured for wireless communication, comprising: at least one processor; a computer-readable medium communicatively coupled to the at least one processor; and a transceiver communicatively coupled to the at least one processor, wherein the at least one processor is configured to: utilize the transceiver to wirelessly communicate with a scheduling entity utilizing a first transmission time interval (TTI) over a first carrier, the first carrier being a time division duplex (TDD) carrier; and utilize the transceiver to wirelessly communicate with the scheduling entity utilizing a second TTI different from the first TTI and at least partially overlapping the first TTI, over a second carrier paired with the first carrier but separated from the first carrier in frequency. 24. The subordinate entity of claim 23, wherein the second TTI is shorter in duration than the first TTI. 25. The subordinate entity of claim 23, wherein the second carrier comprises at least one control channel for controlling data transmissions on the first carrier. 26. The subordinate entity of claim 23, wherein the second carrier is a frequency division duplex (FDD) carrier. 27. The subordinate entity of claim 26, wherein the at least one processor is further configured to: utilize the transceiver to transmit a scheduling request to the scheduling entity on a feedback channel on the FDD carrier; utilize the transceiver to receive an uplink grant from the scheduling entity on the FDD carrier in response to the scheduling request, the uplink grant configured to identify granted resources on the TDD carrier for an uplink data transmission utilizing the second TTI; and utilize the transceiver to transmit the uplink data to the scheduling entity utilizing the second TTI in accordance with the uplink grant. 28. The subordinate entity of claim 26, wherein the at least one processor is further configured to: utilize the transceiver to receive from the scheduling entity a grant modification on the FDD carrier, the grant modification configured to modify an existing grant of resources for an uplink data transmission utilizing the first TTI; and drive a zero input to a power amplifier associated with the transceiver to suspend uplink transmissions in accordance with the grant modification. 29. The subordinate entity of claim 26, wherein the at least one processor is further configured to: utilize the transceiver to receive a downlink grant from the scheduling entity on a grant channel on the FDD carrier utilizing the second TTI; and utilize the transceiver to receive downlink data corresponding to the downlink grant from the scheduling entity on the TDD carrier utilizing the second TTI. 30. The subordinate entity of claim 29, wherein the downlink grant and the downlink data corresponding to the downlink grant are received simultaneous to one another. 31. The subordinate entity of claim 26, wherein the at least one processor is further configured to: utilize the transceiver to receive a downlink grant from the scheduling entity on a grant channel on the FDD carrier utilizing the second TTI; and buffer the downlink grant while transmitting uplink data on the TDD carrier. 32. The subordinate entity of claim 26, wherein the at least one processor is further configured to: utilize the transceiver to receive from the scheduling entity a grant modification on the FDD carrier, the grant modification configured to modify an existing grant of resources for downlink data utilizing the first TTI; and modify reception of the downlink data on the TDD carrier utilizing the first TTI in accordance with the grant modification. 33. The subordinate entity of claim 32, wherein the at least one processor, being configured to modify reception of the downlink data, is further configured to suspend reception of the downlink data during at least one second TTI. 34. The subordinate entity of claim 23, wherein the second carrier is a TDD carrier having a conjugate pairing with the first carrier, wherein at least a portion of time slots in the first carrier are complementary in direction to a direction of time-aligned time slots in the second carrier. 35. The subordinate entity of claim 34, wherein the at least one processor is further configured to: utilize the transceiver to transmit a scheduling request to a scheduling entity on a feedback channel on the first carrier; utilize the transceiver to receive an uplink grant from the scheduling entity on the second carrier in response to the scheduling request, the uplink grant configured to identify granted resources on the first carrier for an uplink data transmission utilizing the second TTI; and utilize the transceiver to transmit the uplink data to the scheduling entity utilizing the second TTI in accordance with the uplink grant. 36. The subordinate entity of claim 34, wherein the at least one processor is further configured to: utilize the transceiver to receive a grant modification on the second carrier, the grant modification configured to modify an existing grant of resources for an uplink data transmission utilizing the first TTI; and modify the uplink data transmission in accordance with the grant modification. 37. The subordinate entity of claim 36, wherein the at least one processor, being configured to modify the uplink data, is further configured to suspend transmission of the uplink data. 38. The subordinate entity of claim 34, wherein the at least one processor is further configured to: utilize the transceiver to receive a downlink grant from a scheduling entity on a grant channel on the second carrier utilizing the second TTI; and utilize the transceiver to receive downlink data corresponding to the downlink grant, from the scheduling entity on the first carrier utilizing the second TTI. 39. The subordinate entity of claim 38, wherein the at least one processor is further configured to receive the downlink grant and the downlink data simultaneous to one another. 40. The subordinate entity of claim 34, wherein the at least one processor is further configured to: utilize the transceiver to receive a downlink grant from a scheduling entity on a grant channel on the second carrier utilizing the second TTI; and buffer the downlink grant while transmitting uplink data on the first carrier utilizing the first TTI. 41. The subordinate entity of claim 34, wherein the at least one processor is further configured to: utilize the transceiver to transmit a scheduling request to a scheduling entity on a feedback channel on the second carrier; utilize the transceiver to receive an uplink grant from the scheduling entity in response to the scheduling request, the uplink grant configured to identify granted resources on the first carrier for an uplink data transmission utilizing the second TTI; and utilize the transceiver to transmit the uplink data to the scheduling entity utilizing the second TTI on the first carrier in accordance with the uplink grant. 42. The subordinate entity of claim 41, wherein the at least one processor is further configured to receive the grant modification and the downlink data simultaneous to one another. 43. The subordinate entity of claim 34, wherein the at least one processor is further configured to: utilize the transceiver to receive from the scheduling entity a grant modification on the first carrier, the grant modification configured to modify an existing grant of resources for downlink data utilizing the first TTI; and utilize the transceiver to modify reception of the downlink data on the second carrier utilizing the first TTI in accordance with the grant modification. 44. The subordinate entity of claim 43, wherein the at least one processor, being configured to modify reception of the downlink data, is further configured to suspend reception of the downlink data during at least one second TTI. 45. A subordinate entity configured for wireless communication, comprising: means for wirelessly communicating with a scheduling entity utilizing a first transmission time interval (TTI) over a first carrier, the first carrier being a time division duplex (TDD) carrier; and means for wirelessly communicating with the scheduling entity utilizing a second TTI different from the first TTI and at least partially overlapping the first TTI, over a second carrier paired with the first carrier but separated from the first carrier in frequency. 46. The subordinate entity of claim 45, wherein the second TTI is shorter in duration than the first TTI. 47. The subordinate entity of claim 45, wherein the second carrier comprises at least one control channel for controlling data transmissions on the first carrier. 48. The subordinate entity of claim 45, wherein the second carrier is a frequency division duplex (FDD) carrier. 49. The subordinate entity of claim 48, further comprising: means for transmitting a scheduling request to the scheduling entity on a feedback channel on the FDD carrier; means for receiving an uplink grant from the scheduling entity on the FDD carrier in response to the scheduling request, the uplink grant configured to identify granted resources on the TDD carrier for an uplink data transmission utilizing the second TTI; and means for transmitting the uplink data to the scheduling entity utilizing the second TTI in accordance with the uplink grant. 50. The subordinate entity of claim 48, further comprising: means for receiving from the scheduling entity a grant modification on the FDD carrier, the grant modification configured to modify an existing grant of resources for an uplink data transmission utilizing the first TTI; and means for driving a zero input to a power amplifier associated with a transceiver to suspend uplink transmissions in accordance with the grant modification. 51. The subordinate entity of claim 48, further comprising: means for receiving a downlink grant from the scheduling entity on a grant channel on the FDD carrier utilizing the second TTI; and means for receiving downlink data corresponding to the downlink grant from the scheduling entity on the TDD carrier utilizing the second TTI. 52. The subordinate entity of claim 51, wherein the means for receiving the downlink grant and the means for receiving the downlink data corresponding to the downlink grant are configured to receive the downlink grant and the downlink data simultaneous to one another. 53. The subordinate entity of claim 48, further comprising: means for receiving and buffering a downlink grant from the scheduling entity on a grant channel on the FDD carrier utilizing the second TTI while transmitting uplink data on the TDD carrier. 54. The subordinate entity of claim 48, further comprising: means for receiving from the scheduling entity a grant modification on the FDD carrier, the grant modification configured to modify an existing grant of resources for downlink data utilizing the first TTI; and means for modifying reception of the downlink data on the TDD carrier utilizing the first TTI in accordance with the grant modification. 55. The subordinate entity of claim 54, wherein the means for modifying reception of the downlink data is configured for suspending reception of the downlink data during at least one second TTI. 56. The subordinate entity of claim 45, wherein the second carrier is a TDD carrier having a conjugate pairing with the first carrier, wherein at least a portion of time slots in the first carrier are complementary in direction to a direction of time-aligned time slots in the second carrier. 57. The subordinate entity of claim 56, further comprising: means for transmitting a scheduling request to a scheduling entity on a feedback channel on the first carrier; means for receiving an uplink grant from the scheduling entity on the second carrier in response to the scheduling request, the uplink grant configured to identify granted resources on the first carrier for an uplink data transmission utilizing the second TTI; and means for transmitting the uplink data to the scheduling entity utilizing the second TTI in accordance with the uplink grant. 58. The subordinate entity of claim 56, further comprising: means for receiving a grant modification on the second carrier, the grant modification configured to modify an existing grant of resources for an uplink data transmission utilizing the first TTI; and means for modifying the uplink data transmission in accordance with the grant modification. 59. The subordinate entity of claim 58, wherein the means for modifying the uplink data are configured for suspending transmission of the uplink data. 60. The subordinate entity of claim 56, further comprising: means for receiving a downlink grant from a scheduling entity on a grant channel on the second carrier utilizing the second TTI; and means for receiving downlink data corresponding to the downlink grant, from the scheduling entity on the first carrier utilizing the second TTI. 61. The subordinate entity of claim 60, wherein the means for receiving the downlink grant and the means for receiving the downlink data are configured to receive the downlink grant and the downlink data simultaneous to one another. 62. The subordinate entity of claim 56, further comprising: means for receiving and buffering a downlink grant from a scheduling entity on a grant channel on the second carrier utilizing the second TTI, while transmitting uplink data on the first carrier utilizing the first TTI. 63. The subordinate entity of claim 56, further comprising: means for transmitting a scheduling request to a scheduling entity on a feedback channel on the second carrier; means for receiving an uplink grant from the scheduling entity in response to the scheduling request, the uplink grant configured to identify granted resources on the first carrier for an uplink data transmission utilizing the second TTI; and means for transmitting the uplink data to the scheduling entity utilizing the second TTI on the first carrier in accordance with the uplink grant. 64. The subordinate entity of claim 63, wherein the means for receiving the grant modification and the means for receiving the downlink data are configured to receive the grant modification and the downlink data simultaneous to one another. 65. The subordinate entity of claim 56, further comprising: means for receiving from the scheduling entity a grant modification on the first carrier, the grant modification configured to modify an existing grant of resources for downlink data utilizing the first TTI; and means for modifying reception of the downlink data on the second carrier utilizing the first TTI in accordance with the grant modification. 66. The subordinate entity of claim 65, wherein the means for modifying reception of the downlink data are configured for suspending reception of the downlink data during at least one second TTI. 67. A computer-readable medium storing computer-executable code on a subordinate entity configured for wireless communication, comprising: instructions for causing a computer to wirelessly communicate with a scheduling entity utilizing a first transmission time interval (TTI) over a first carrier, the first carrier being a time division duplex (TDD) carrier; and instructions for causing a computer to wirelessly communicate with the scheduling entity utilizing a second TTI different from the first TTI and at least partially overlapping the first TTI, over a second carrier paired with the first carrier but separated from the first carrier in frequency. 68. The computer-readable medium of claim 67, wherein the second TTI is shorter in duration than the first TTI. 69. The computer-readable medium of claim 67, wherein the second carrier comprises at least one control channel for controlling data transmissions on the first carrier. 70. The computer-readable medium of claim 69, wherein the second carrier is a frequency division duplex (FDD) carrier. 71. The computer-readable medium of claim 70, further comprising: instructions for causing a computer to transmit a scheduling request to the scheduling entity on a feedback channel on the FDD carrier; instructions for causing a computer to receive an uplink grant from the scheduling entity on the FDD carrier in response to the scheduling request, the uplink grant configured to identify granted resources on the TDD carrier for an uplink data transmission utilizing the second TTI; and instructions for causing a computer to transmit the uplink data to the scheduling entity utilizing the second TTI in accordance with the uplink grant. 72. The computer-readable medium of claim 70, further comprising: instructions for causing a computer to receive from the scheduling entity a grant modification on the FDD carrier, the grant modification configured to modify an existing grant of resources for an uplink data transmission utilizing the first TTI; and instructions for causing a computer to drive a zero input to a power amplifier associated with a transceiver to suspend uplink transmissions in accordance with the grant modification. 73. The computer-readable medium of claim 70, further comprising: instructions for causing a computer to receive a downlink grant from the scheduling entity on a grant channel on the FDD carrier utilizing the second TTI; and instructions for causing a computer to receive downlink data corresponding to the downlink grant from the scheduling entity on the TDD carrier utilizing the second TTI. 74. The computer-readable medium of claim 73, wherein the instructions for causing a computer to receive a downlink grant and the instructions for causing a computer to receive downlink data corresponding to the downlink grant are configured to receive the downlink grant and the downlink data simultaneous to one another. 75. The computer-readable medium of claim 70, further comprising: instructions for causing a computer to receive and buffer a downlink grant from the scheduling entity on a grant channel on the FDD carrier utilizing the second TTI, while transmitting uplink data on the TDD carrier. 76. The computer-readable medium of claim 70, further comprising: instructions for causing a computer to receive from the scheduling entity a grant modification on the FDD carrier, the grant modification configured to modify an existing grant of resources for downlink data utilizing the first TTI; and instructions for causing a computer to modify reception of the downlink data on the TDD carrier utilizing the first TTI in accordance with the grant modification. 77. The computer-readable medium of claim 76, wherein the instructions for causing a computer to modify reception of the downlink data are further configured for suspending reception of the downlink data during at least one second TTI. 78. The computer-readable medium of claim 67, wherein the second carrier is a TDD carrier having a conjugate pairing with the first carrier, wherein at least a portion of time slots in the first carrier are complementary in direction to a direction of time-aligned time slots in the second carrier. 79. The computer-readable medium of claim 78, further comprising: instructions for causing a computer to transmit a scheduling request to a scheduling entity on a feedback channel on the first carrier; instructions for causing a computer to receive an uplink grant from the scheduling entity on the second carrier in response to the scheduling request, the uplink grant configured to identify granted resources on the first carrier for an uplink data transmission utilizing the second TTI; and instructions for causing a computer to transmit the uplink data to the scheduling entity utilizing the second TTI in accordance with the uplink grant. 80. The computer-readable medium of claim 78, further comprising: instructions for causing a computer to receive a grant modification on the second carrier, the grant modification configured to modify an existing grant of resources for an uplink data transmission utilizing the first TTI; and instructions for causing a computer to modify the uplink data transmission in accordance with the grant modification. 81. The computer-readable medium of claim 80, wherein the instructions for causing a computer to modify the uplink data are further configured for suspending transmission of the uplink data. 82. The computer-readable medium of claim 78, further comprising: instructions for causing a computer to receive a downlink grant from a scheduling entity on a grant channel on the second carrier utilizing the second TTI; and instructions for causing a computer to receive downlink data corresponding to the downlink grant, from the scheduling entity on the first carrier utilizing the second TTI. 83. The computer-readable medium of claim 82, wherein the instructions for causing a computer to receive a downlink grant and the instructions for causing a computer to receive downlink data are configured to receive the downlink grant and the downlink data simultaneous to one another. 84. The computer-readable medium of claim 78, further comprising: instructions for causing a computer to receive and buffer a downlink grant from a scheduling entity on a grant channel on the second carrier utilizing the second TTI, while transmitting uplink data on the first carrier utilizing the first TTI. 85. The computer-readable medium of claim 78, further comprising: instructions for causing a computer to transmit a scheduling request to a scheduling entity on a feedback channel on the second carrier; instructions for causing a computer to receive an uplink grant from the scheduling entity in response to the scheduling request, the uplink grant configured to identify granted resources on the first carrier for an uplink data transmission utilizing the second TTI; and instructions for causing a computer to transmit the uplink data to the scheduling entity utilizing the second TTI on the first carrier in accordance with the uplink grant. 86. The computer-readable medium of claim 85, wherein the instructions for causing a computer to receive a grant modification and the instructions for causing a computer to receive downlink data are configured to receive the grant modification and the downlink data simultaneous to one another. 87. The computer-readable medium of claim 78, further comprising: instructions for causing a computer to receive from the scheduling entity a grant modification on the first carrier, the grant modification configured to modify an existing grant of resources for downlink data utilizing the first TTI; and instructions for causing a computer to modify reception of the downlink data on the second carrier utilizing the first TTI in accordance with the grant modification. 88. The computer-readable medium of claim 87, wherein the instructions for causing a computer to modify reception of the downlink data are further configured for suspending reception of the downlink data during at least one second TTI.
2,400
8,069
8,069
14,426,414
2,476
Embodiments herein relate to transmitting specific traffic along a blocked link. A status of links between switches of a network is monitored. The status of the links is one of blocked and non-blocked. A blocked link is not used by a Spanning Tree Protocol (STP). At least one of the network switches is configured to transmit the specific traffic along the blocked link.
1. A device, comprising: a controller to monitor a logical topology of a network, the network including a plurality of network switches connected via links and the logical topology including a link being blocked by a Spanning Tree Protocol (STP), wherein the controller is to configure at least one of the network switches to transmit specific traffic along the blocked link. 2. The device of claim 1, wherein the blocked link is not used by general traffic that is separate from the specific traffic, the controller is to configure a blocked port of the at least one network switch associated with the blocked link, to allow the specific traffic to traverse the blocked link, and the controller is to define a path along the links to forward the specific traffic, the path including the blocked link. 3. The device of claim 2, wherein, the controller is to define the path is to include a non-blocked link, if none of the links connecting to one of the network switches along the path are blocked, and the non-blocked link is used by the general traffic. 4. The device of claim 2, wherein, the at least one network switch is to direct the specific traffic to one or more of the blocked links based on a Software Defined Networking (SDN) architecture that separates a control plane from a forwarding plane of the at least one network switch, and the controller is to access the forwarding plane of the at least one network switch to setup a rule that directs the specific traffic along the blocked port. 5. The device of claim 2, wherein the controller is at least one of included in one of the network switches and a higher layer device separate from the network switches. 6. The device of claim 5, wherein, the controller is the higher layer device, and the controller is to configure a port parameter of one of the network devices along the path, a link corresponding to the configured port parameter to appear less desirable to the STP. 7. The device of claim 6, wherein, the configured parameter to cause the STP to change a status of the corresponding link from non-blocked to blocked, and the port parameter to relate to at least one of a port priority, a path cost, a port location, a port speed and a hop count. 8. The device of claim 6, wherein, the network is to include a Multiple STP (MSTP) to manage a plurality of Virtual Local Area Networks (VLAN), the MSTP to block different links for different VLANs, the controller is to direct the specific traffic along one or more of ports of at least one of the network switches based on which of the VLANs is active at a given time, and the controller is to configure an instance of the port parameter to direct the specific traffic. 9. The device of claim 2, wherein, the specific traffic relates data having at least one of latency, packet-loss and security requirements different than that of the general traffic, and the specific traffic is based on type of at least one of a user, priority, source and content of the data. 10. The device of claim 1, wherein the controller is to configure the at least one network switch to direct the specific type of traffic along the blocked links via an OpenFlow protocol. 11. The device of claim 1, wherein, the controller is to define primary and secondary paths along the links to forward the specific traffic, and the controller is to configure at least one of the network switches to forward the specific traffic along the secondary path, if at least one of the links of the first path fails. 12. A method, comprising: monitoring a status of links between switches of a network, the status of the links to be one of blocked and non-blocked, a blocked link of the links to not be used by a Spanning Tree Protocol (STP); and configuring at least one port of at least one of the switches to transmit specific traffic along the blocked link, the STP to continue not using the blocked link to transmit general traffic that is separate from the specific traffic. 13. The method of claim 12, wherein the configuring is to configure the switches at a layer-2 level, the monitoring is before the configuring, and the configuring is by a controller that communicates with the switches via a Simple Network Management Protocol (SNMP). 14. A non-transitory computer-readable storage medium storing instructions that, if executed by a processor of a device, cause the processor to: collect topological information about links between switches of a network; determine which of the links is blocked by a Spanning Tree Protocol (STP); and configure at least one of the switches via an OpenFlow protocol to allow specific traffic to be transmitted along at least one of the blocked links. 15. The non-transitory computer-readable storage medium of claim 14, wherein the switches are to operate according to commands from both the STP and Openflow protocols.
Embodiments herein relate to transmitting specific traffic along a blocked link. A status of links between switches of a network is monitored. The status of the links is one of blocked and non-blocked. A blocked link is not used by a Spanning Tree Protocol (STP). At least one of the network switches is configured to transmit the specific traffic along the blocked link.1. A device, comprising: a controller to monitor a logical topology of a network, the network including a plurality of network switches connected via links and the logical topology including a link being blocked by a Spanning Tree Protocol (STP), wherein the controller is to configure at least one of the network switches to transmit specific traffic along the blocked link. 2. The device of claim 1, wherein the blocked link is not used by general traffic that is separate from the specific traffic, the controller is to configure a blocked port of the at least one network switch associated with the blocked link, to allow the specific traffic to traverse the blocked link, and the controller is to define a path along the links to forward the specific traffic, the path including the blocked link. 3. The device of claim 2, wherein, the controller is to define the path is to include a non-blocked link, if none of the links connecting to one of the network switches along the path are blocked, and the non-blocked link is used by the general traffic. 4. The device of claim 2, wherein, the at least one network switch is to direct the specific traffic to one or more of the blocked links based on a Software Defined Networking (SDN) architecture that separates a control plane from a forwarding plane of the at least one network switch, and the controller is to access the forwarding plane of the at least one network switch to setup a rule that directs the specific traffic along the blocked port. 5. The device of claim 2, wherein the controller is at least one of included in one of the network switches and a higher layer device separate from the network switches. 6. The device of claim 5, wherein, the controller is the higher layer device, and the controller is to configure a port parameter of one of the network devices along the path, a link corresponding to the configured port parameter to appear less desirable to the STP. 7. The device of claim 6, wherein, the configured parameter to cause the STP to change a status of the corresponding link from non-blocked to blocked, and the port parameter to relate to at least one of a port priority, a path cost, a port location, a port speed and a hop count. 8. The device of claim 6, wherein, the network is to include a Multiple STP (MSTP) to manage a plurality of Virtual Local Area Networks (VLAN), the MSTP to block different links for different VLANs, the controller is to direct the specific traffic along one or more of ports of at least one of the network switches based on which of the VLANs is active at a given time, and the controller is to configure an instance of the port parameter to direct the specific traffic. 9. The device of claim 2, wherein, the specific traffic relates data having at least one of latency, packet-loss and security requirements different than that of the general traffic, and the specific traffic is based on type of at least one of a user, priority, source and content of the data. 10. The device of claim 1, wherein the controller is to configure the at least one network switch to direct the specific type of traffic along the blocked links via an OpenFlow protocol. 11. The device of claim 1, wherein, the controller is to define primary and secondary paths along the links to forward the specific traffic, and the controller is to configure at least one of the network switches to forward the specific traffic along the secondary path, if at least one of the links of the first path fails. 12. A method, comprising: monitoring a status of links between switches of a network, the status of the links to be one of blocked and non-blocked, a blocked link of the links to not be used by a Spanning Tree Protocol (STP); and configuring at least one port of at least one of the switches to transmit specific traffic along the blocked link, the STP to continue not using the blocked link to transmit general traffic that is separate from the specific traffic. 13. The method of claim 12, wherein the configuring is to configure the switches at a layer-2 level, the monitoring is before the configuring, and the configuring is by a controller that communicates with the switches via a Simple Network Management Protocol (SNMP). 14. A non-transitory computer-readable storage medium storing instructions that, if executed by a processor of a device, cause the processor to: collect topological information about links between switches of a network; determine which of the links is blocked by a Spanning Tree Protocol (STP); and configure at least one of the switches via an OpenFlow protocol to allow specific traffic to be transmitted along at least one of the blocked links. 15. The non-transitory computer-readable storage medium of claim 14, wherein the switches are to operate according to commands from both the STP and Openflow protocols.
2,400
8,070
8,070
15,661,755
2,449
Provisioning capacity measuring may be provided. First, a provisioning monitoring job may run on a grid manager that spawns a plurality of farm monitoring jobs onto a respective plurality of farms. Next, a user count for each of the respective plurality of farms may be respectively provided. The user count may comprise a number of users on each of the respective plurality of farms. An event alert may be provided when the user count for any of the respective plurality of farms is greater than a threshold.
1-20. (canceled) 21. A method for measuring provisioning capacity, the method comprising: executing a provisioning monitoring job on a grid manager; executing, by the provisioning monitoring job, a plurality of farm monitoring jobs onto a plurality of farms associated with the grid manager, the plurality of farm monitoring jobs comprising a plurality of content farm monitoring jobs to monitor a plurality of content farms associated with the grid manager and a plurality of directory service monitoring jobs to monitor a plurality of directory service farms associated with the plurality of content farms; receiving, from the plurality of directory service monitoring jobs, a user count for each of the respective plurality of directory service farms, the user count for the plurality of directory service farms comprising a number of users associated with each of the plurality of directory service farms and an indication of one of the plurality of content farms in which each of the reside, receiving, from the plurality of the content farm monitoring jobs, the user count for each of the respective plurality of content farms; aggregating the user count and the indications received for the plurality of directory service farms; determining the user count for each of the plurality of content farms and the user count for each of the plurality of directory service farms; and providing an event alert when the user count for one of the respective plurality of farms is greater than a threshold comprising a fraction of a capacity level of the one of the plurality of farms. 22. The method of claim 21, wherein executing the provisioning monitoring job on the grid manager comprises executing the provisioning monitoring job on the grid manager being configured to run on a network including the plurality of farms. 23. The method of claim 21, wherein executing the provisioning monitoring job on the grid manager comprises executing the provisioning monitoring job on the grid manager periodically. 24. The method of claim 21, wherein receiving the user count for each of the respective plurality of farms comprises receiving the user count at the grid manager. 25. The method of claim 21, further comprising saving, to a grid manager database, the user count for each of the respective plurality of farms. 26. The method of claim 21, further comprising saving, to a grid manager database, the user count for each of the respective plurality of farms, the grid manager database residing on the grid manager. 27. The method of claim 21, wherein providing the event alert comprises providing the event alert by the grid manager. 28. A system for measuring provisioning capacity, the system comprising: a memory storage; and a processor coupled to the memory storage, wherein the processor is operative to: execute a provisioning monitoring job on a grid manager; execute, by the provisioning monitoring job, a plurality of farm monitoring jobs onto a plurality of farms associated with the grid manager, the plurality of farm monitoring jobs comprising a plurality of content farm monitoring jobs to monitor a plurality of content farms associated with the grid manager and a plurality of directory service monitoring jobs to monitor a plurality of directory service farms associated with the plurality of content farms; receive, from the plurality of directory service monitoring jobs, a user count for each of the respective plurality of directory service farms, the user count for the plurality of directory service farms comprising a number of users associated with each of the plurality of directory service farms and an indication of one of the plurality of content farms in which each of the reside, receive, from the plurality of the content farm monitoring jobs, the user count for each of the respective plurality of content farms; aggregate the user count and the indications received for the plurality of directory service farms; determine the user count for each of the plurality of content farms and the user count for each of the plurality of directory service farms; and provide an event alert when the user count for one of the respective plurality of farms is greater than a threshold comprising a fraction of a capacity level of the one of the plurality of farms. 29. The system of claim 28, wherein the processor being further operative to save, to a grid manager database, the user count for each of the respective plurality of farms. 30. The system of claim 28, wherein executing the provisioning monitoring job on the grid manager comprises executing the provisioning monitoring job on the grid manager being configured to run on a network including the plurality of farms. 31. The system of claim 28, wherein executing the provisioning monitoring job on the grid manager comprises executing the provisioning monitoring job on the grid manager periodically. 32. The system of claim 28, wherein each of the plurality of farms comprises a plurality of computer servers cooperating to accomplish server requirements beyond the capability of any single one of the plurality of servers. 33. The system of claim 28, wherein the capacity level comprises a limit on the number of licensed users and the number of unlicensed users associated with each of the plurality of farms. 34. A method of measuring provisioning capacity, the method comprising: executing a provisioning monitoring job on a grid manager; executing, by the provisioning monitoring job, a plurality of directory service farm monitoring jobs onto each of a plurality of directory services farms associated with plurality of content farms associated with the grid manager, wherein each of the plurality of directory service farm monitoring jobs provides: (i) a user count associated with each of the plurality of directory service farms; and (ii) an indication of one of the plurality of content farms with which each of the users is associated; executing, by the provisioning monitoring job, a content farm monitoring job onto each of the plurality of content farms, wherein a first content farm monitoring job uses the user counts and the indications provided by the plurality of directory service farm monitoring jobs to aggregate the count users to tally the user count associated with a first content farm; receiving, by the grid manager, the aggregated user count for each of the content farms and the user count for each of the plurality of directory service farms; and providing, by the grid manager, an event alert when the user count of one of the plurality of directory service farms or the plurality of content farms is greater than a threshold comprising a fraction of a capacity level of the one of the plurality of content farms or the plurality of directory service farms. 35. The method of claim 34, further comprising storing, in a database associated with the grid manager, a count of licensed users and a count of unlicensed users within each of the plurality of content farms and the plurality of directory services farms. 36. The method of claim 21, wherein each of the plurality of farms is associated with a plurality of thresholds comprising a first threshold and a second threshold, the second threshold being higher than the first threshold, and wherein providing the event alert comprises: providing, when the user count for one of the respective plurality of farms is greater that the first threshold, a first event alert, and providing, when the user count for one of the respective plurality of farms increases to the second threshold, a second event alert. 37. The system of claim 28, wherein each of the plurality of farms is associated with a plurality of thresholds comprising a first threshold and a second threshold, the second threshold being higher than the first threshold, and wherein providing the event alert comprises: providing, when the user count for one of the respective plurality of farms is greater that the first threshold, a first event alert, and providing, when the user count for one of the respective plurality of farms increases to the second threshold, a second event alert. 38. The method of claim 34, wherein each of the plurality of farms is associated with a plurality of thresholds comprising a first threshold and a second threshold, the second threshold being higher than the first threshold, and wherein providing the event alert comprises: providing, when the user count for one of the respective plurality of farms is greater that the first threshold, a first event alert, and providing, when the user count for one of the respective plurality of farms increases to the second threshold, a second event alert. 39. The method of claim 34, wherein executing the provisioning monitoring job on the grid manager comprises executing the provisioning monitoring job on the grid manager being configured to run on a network including the plurality of farms. 40. The method of claim 34, wherein executing the provisioning monitoring job on the grid manager comprises executing the provisioning monitoring job on the grid manager periodically.
Provisioning capacity measuring may be provided. First, a provisioning monitoring job may run on a grid manager that spawns a plurality of farm monitoring jobs onto a respective plurality of farms. Next, a user count for each of the respective plurality of farms may be respectively provided. The user count may comprise a number of users on each of the respective plurality of farms. An event alert may be provided when the user count for any of the respective plurality of farms is greater than a threshold.1-20. (canceled) 21. A method for measuring provisioning capacity, the method comprising: executing a provisioning monitoring job on a grid manager; executing, by the provisioning monitoring job, a plurality of farm monitoring jobs onto a plurality of farms associated with the grid manager, the plurality of farm monitoring jobs comprising a plurality of content farm monitoring jobs to monitor a plurality of content farms associated with the grid manager and a plurality of directory service monitoring jobs to monitor a plurality of directory service farms associated with the plurality of content farms; receiving, from the plurality of directory service monitoring jobs, a user count for each of the respective plurality of directory service farms, the user count for the plurality of directory service farms comprising a number of users associated with each of the plurality of directory service farms and an indication of one of the plurality of content farms in which each of the reside, receiving, from the plurality of the content farm monitoring jobs, the user count for each of the respective plurality of content farms; aggregating the user count and the indications received for the plurality of directory service farms; determining the user count for each of the plurality of content farms and the user count for each of the plurality of directory service farms; and providing an event alert when the user count for one of the respective plurality of farms is greater than a threshold comprising a fraction of a capacity level of the one of the plurality of farms. 22. The method of claim 21, wherein executing the provisioning monitoring job on the grid manager comprises executing the provisioning monitoring job on the grid manager being configured to run on a network including the plurality of farms. 23. The method of claim 21, wherein executing the provisioning monitoring job on the grid manager comprises executing the provisioning monitoring job on the grid manager periodically. 24. The method of claim 21, wherein receiving the user count for each of the respective plurality of farms comprises receiving the user count at the grid manager. 25. The method of claim 21, further comprising saving, to a grid manager database, the user count for each of the respective plurality of farms. 26. The method of claim 21, further comprising saving, to a grid manager database, the user count for each of the respective plurality of farms, the grid manager database residing on the grid manager. 27. The method of claim 21, wherein providing the event alert comprises providing the event alert by the grid manager. 28. A system for measuring provisioning capacity, the system comprising: a memory storage; and a processor coupled to the memory storage, wherein the processor is operative to: execute a provisioning monitoring job on a grid manager; execute, by the provisioning monitoring job, a plurality of farm monitoring jobs onto a plurality of farms associated with the grid manager, the plurality of farm monitoring jobs comprising a plurality of content farm monitoring jobs to monitor a plurality of content farms associated with the grid manager and a plurality of directory service monitoring jobs to monitor a plurality of directory service farms associated with the plurality of content farms; receive, from the plurality of directory service monitoring jobs, a user count for each of the respective plurality of directory service farms, the user count for the plurality of directory service farms comprising a number of users associated with each of the plurality of directory service farms and an indication of one of the plurality of content farms in which each of the reside, receive, from the plurality of the content farm monitoring jobs, the user count for each of the respective plurality of content farms; aggregate the user count and the indications received for the plurality of directory service farms; determine the user count for each of the plurality of content farms and the user count for each of the plurality of directory service farms; and provide an event alert when the user count for one of the respective plurality of farms is greater than a threshold comprising a fraction of a capacity level of the one of the plurality of farms. 29. The system of claim 28, wherein the processor being further operative to save, to a grid manager database, the user count for each of the respective plurality of farms. 30. The system of claim 28, wherein executing the provisioning monitoring job on the grid manager comprises executing the provisioning monitoring job on the grid manager being configured to run on a network including the plurality of farms. 31. The system of claim 28, wherein executing the provisioning monitoring job on the grid manager comprises executing the provisioning monitoring job on the grid manager periodically. 32. The system of claim 28, wherein each of the plurality of farms comprises a plurality of computer servers cooperating to accomplish server requirements beyond the capability of any single one of the plurality of servers. 33. The system of claim 28, wherein the capacity level comprises a limit on the number of licensed users and the number of unlicensed users associated with each of the plurality of farms. 34. A method of measuring provisioning capacity, the method comprising: executing a provisioning monitoring job on a grid manager; executing, by the provisioning monitoring job, a plurality of directory service farm monitoring jobs onto each of a plurality of directory services farms associated with plurality of content farms associated with the grid manager, wherein each of the plurality of directory service farm monitoring jobs provides: (i) a user count associated with each of the plurality of directory service farms; and (ii) an indication of one of the plurality of content farms with which each of the users is associated; executing, by the provisioning monitoring job, a content farm monitoring job onto each of the plurality of content farms, wherein a first content farm monitoring job uses the user counts and the indications provided by the plurality of directory service farm monitoring jobs to aggregate the count users to tally the user count associated with a first content farm; receiving, by the grid manager, the aggregated user count for each of the content farms and the user count for each of the plurality of directory service farms; and providing, by the grid manager, an event alert when the user count of one of the plurality of directory service farms or the plurality of content farms is greater than a threshold comprising a fraction of a capacity level of the one of the plurality of content farms or the plurality of directory service farms. 35. The method of claim 34, further comprising storing, in a database associated with the grid manager, a count of licensed users and a count of unlicensed users within each of the plurality of content farms and the plurality of directory services farms. 36. The method of claim 21, wherein each of the plurality of farms is associated with a plurality of thresholds comprising a first threshold and a second threshold, the second threshold being higher than the first threshold, and wherein providing the event alert comprises: providing, when the user count for one of the respective plurality of farms is greater that the first threshold, a first event alert, and providing, when the user count for one of the respective plurality of farms increases to the second threshold, a second event alert. 37. The system of claim 28, wherein each of the plurality of farms is associated with a plurality of thresholds comprising a first threshold and a second threshold, the second threshold being higher than the first threshold, and wherein providing the event alert comprises: providing, when the user count for one of the respective plurality of farms is greater that the first threshold, a first event alert, and providing, when the user count for one of the respective plurality of farms increases to the second threshold, a second event alert. 38. The method of claim 34, wherein each of the plurality of farms is associated with a plurality of thresholds comprising a first threshold and a second threshold, the second threshold being higher than the first threshold, and wherein providing the event alert comprises: providing, when the user count for one of the respective plurality of farms is greater that the first threshold, a first event alert, and providing, when the user count for one of the respective plurality of farms increases to the second threshold, a second event alert. 39. The method of claim 34, wherein executing the provisioning monitoring job on the grid manager comprises executing the provisioning monitoring job on the grid manager being configured to run on a network including the plurality of farms. 40. The method of claim 34, wherein executing the provisioning monitoring job on the grid manager comprises executing the provisioning monitoring job on the grid manager periodically.
2,400
8,071
8,071
15,706,806
2,424
The playback of video content upon a display is enhanced through the unobtrusive presentation of extrinsic data upon the same display. A video content feature is rendered on a display. A quantity of extrinsic data relevant to a current time in the video content feature is determined based at least in part on viewing history of a user. A graphical element presenting at least a portion of the extrinsic data is rendered on the display while the video content feature is also being rendered on the display.
1. A non-transitory computer-readable medium embodying a program that, when executed by at least one computing device, causes the at least one computing device to at least: cause a video content feature to be rendered on a display; determine a quantity of extrinsic data relevant to a current time in the video content feature to be presented in the video content feature based at least in part on a user account history indicating that a user account associated with the display has viewed the video content feature previously; and cause a graphical element to be rendered on the display while the video content feature is also being rendered on the display in response to determining the quantity of extrinsic data, the graphical element presenting at least a portion of the extrinsic data. 2. The non-transitory computer-readable medium of claim 1, wherein the at least one computing device is further configured to determine a resolution used by the display, wherein a size of the graphical element is determined as a function of the resolution. 3. The non-transitory computer-readable medium of claim 1, wherein the extrinsic data comprises at least one of: a name of a performer in the video content feature, a description of the performer, a biography of the performer, or a filmography of the performer. 4. The non-transitory computer-readable medium of claim 1, wherein the program further causes the at least one computing device to at least determine a relevancy of the extrinsic data to the current time based at least in part on scene data, the scene data comprising a plurality of collections of scenes having a distinct plot element or setting. 5. The non-transitory computer-readable medium of claim 4, wherein the scene data further comprises positional information as to where a product appears within a frame, and the program further causes the at least one computing device to at least cause a promotion to be rendered on the display relative to where the product appears within the frame. 6. The non-transitory computer-readable medium of claim 1, wherein the program further causes the at least one computing device to at least determine a configuration setting corresponding to a size of closed caption text, wherein a size of the graphical element is based at least in part on the size of closed caption text. 7. The non-transitory computer-readable medium of claim 1, wherein the extrinsic data comprises information about a music track that is included in the video content feature, and the program further causes the at least one computing device to at least determine whether the current time corresponds to a play of the music track in the video content feature, the at least the portion of the extrinsic data being determined based at least in part on whether the current time corresponds to the play of the music track. 8. A system, comprising: a data store; and at least one computing device in communication with the data store, the at least one computing device being configured to at least: cause a video content feature to be rendered on a display; determine that an appearance of a character in a current scene of the video content feature corresponds to a first recognizable appearance of the character in the video content feature; determine that a viewing history indicates a user account associated with the display previously viewed the video content feature; and cause information about the character to be rendered on the display while the video content feature is also being rendered on the display in response to determining that the appearance of the character corresponds to the first recognizable appearance of the character, a quantity of information being based at least in part on the viewing history indicating the user account previously viewed the video content feature. 9. The system of claim 8, wherein the at least one computing device is further configured to at least generate a collection of extrinsic data relevant to the video content feature, the information about the character being determined based at least in part on the collection of extrinsic data. 10. The system of claim 8, wherein the video content feature comprises an episode of a series, and the at least one computing device is further configured to at least determine that the appearance of the character in the current scene of the video content feature corresponds to the first recognizable appearance of the character in the series. 11. The system of claim 8, wherein the information about the character includes a name of the character, a name of a cast member who is performing the character, and an image of the cast member while not performing the character. 12. The system of claim 8, wherein the at least one computing device is further configured to at least determine whether a duration since a most recent viewing in the viewing history exceeds a predefined threshold, wherein the quantity of information is further based at least in part on whether the duration exceeds the predefined threshold. 13. The system of claim 8, wherein the at least one computing device is further configured to at least identify at least one face in a current frame of the video content feature, a position of the information about the character being determined to avoid obscuring the at least one face. 14. A method, comprising: rendering, via at least one computing device, a video content feature on a display; determining, via the at least one computing device, that a viewing history indicates a user account associated with the display previously viewed the video content feature; determining, via the at least one computing device, a quantity of extrinsic data to present relevant to a current time in the video content feature based at least in part on the viewing history indicating the user account previously viewed the video content feature; and rendering, via the at least one computing device, a graphical element presenting at least a portion of the extrinsic data on the display while the video content feature is also being rendered on the display. 15. The method of claim 14, further comprising determining, via the at least one computing device, that a duration since a most recent viewing in the viewing history exceeds a predefined threshold, wherein the quantity of the extrinsic data to present relevant to the current time in the video content feature is further based at least in part on the duration exceeding the predefined threshold. 16. The method of claim 14, further comprising dynamically updating, via the at least one computing device, the graphical element to present updated extrinsic data relevant to an updated current time in the video content feature, the updated current time being subsequent to the current time. 17. The method of claim 14, further comprising selecting, via the at least one computing device, a region in which the graphical element is to be rendered based at least in part on an analysis of the video content feature. 18. The method of claim 14, further comprising determining, via the at least one computing device, a duration of time to render the graphical element on the display based at least in part on a type of the extrinsic data rendered on the display. 19. The method of claim 14, further comprising analyzing, via the at least one computing device, visual characteristics of the video content feature to determine a position to show the graphical element, wherein the graphical element is rendered at the position. 20. The method of claim 14, further comprising altering, via the at least one computing device, a size of the video content feature on the display to accommodate the graphical element.
The playback of video content upon a display is enhanced through the unobtrusive presentation of extrinsic data upon the same display. A video content feature is rendered on a display. A quantity of extrinsic data relevant to a current time in the video content feature is determined based at least in part on viewing history of a user. A graphical element presenting at least a portion of the extrinsic data is rendered on the display while the video content feature is also being rendered on the display.1. A non-transitory computer-readable medium embodying a program that, when executed by at least one computing device, causes the at least one computing device to at least: cause a video content feature to be rendered on a display; determine a quantity of extrinsic data relevant to a current time in the video content feature to be presented in the video content feature based at least in part on a user account history indicating that a user account associated with the display has viewed the video content feature previously; and cause a graphical element to be rendered on the display while the video content feature is also being rendered on the display in response to determining the quantity of extrinsic data, the graphical element presenting at least a portion of the extrinsic data. 2. The non-transitory computer-readable medium of claim 1, wherein the at least one computing device is further configured to determine a resolution used by the display, wherein a size of the graphical element is determined as a function of the resolution. 3. The non-transitory computer-readable medium of claim 1, wherein the extrinsic data comprises at least one of: a name of a performer in the video content feature, a description of the performer, a biography of the performer, or a filmography of the performer. 4. The non-transitory computer-readable medium of claim 1, wherein the program further causes the at least one computing device to at least determine a relevancy of the extrinsic data to the current time based at least in part on scene data, the scene data comprising a plurality of collections of scenes having a distinct plot element or setting. 5. The non-transitory computer-readable medium of claim 4, wherein the scene data further comprises positional information as to where a product appears within a frame, and the program further causes the at least one computing device to at least cause a promotion to be rendered on the display relative to where the product appears within the frame. 6. The non-transitory computer-readable medium of claim 1, wherein the program further causes the at least one computing device to at least determine a configuration setting corresponding to a size of closed caption text, wherein a size of the graphical element is based at least in part on the size of closed caption text. 7. The non-transitory computer-readable medium of claim 1, wherein the extrinsic data comprises information about a music track that is included in the video content feature, and the program further causes the at least one computing device to at least determine whether the current time corresponds to a play of the music track in the video content feature, the at least the portion of the extrinsic data being determined based at least in part on whether the current time corresponds to the play of the music track. 8. A system, comprising: a data store; and at least one computing device in communication with the data store, the at least one computing device being configured to at least: cause a video content feature to be rendered on a display; determine that an appearance of a character in a current scene of the video content feature corresponds to a first recognizable appearance of the character in the video content feature; determine that a viewing history indicates a user account associated with the display previously viewed the video content feature; and cause information about the character to be rendered on the display while the video content feature is also being rendered on the display in response to determining that the appearance of the character corresponds to the first recognizable appearance of the character, a quantity of information being based at least in part on the viewing history indicating the user account previously viewed the video content feature. 9. The system of claim 8, wherein the at least one computing device is further configured to at least generate a collection of extrinsic data relevant to the video content feature, the information about the character being determined based at least in part on the collection of extrinsic data. 10. The system of claim 8, wherein the video content feature comprises an episode of a series, and the at least one computing device is further configured to at least determine that the appearance of the character in the current scene of the video content feature corresponds to the first recognizable appearance of the character in the series. 11. The system of claim 8, wherein the information about the character includes a name of the character, a name of a cast member who is performing the character, and an image of the cast member while not performing the character. 12. The system of claim 8, wherein the at least one computing device is further configured to at least determine whether a duration since a most recent viewing in the viewing history exceeds a predefined threshold, wherein the quantity of information is further based at least in part on whether the duration exceeds the predefined threshold. 13. The system of claim 8, wherein the at least one computing device is further configured to at least identify at least one face in a current frame of the video content feature, a position of the information about the character being determined to avoid obscuring the at least one face. 14. A method, comprising: rendering, via at least one computing device, a video content feature on a display; determining, via the at least one computing device, that a viewing history indicates a user account associated with the display previously viewed the video content feature; determining, via the at least one computing device, a quantity of extrinsic data to present relevant to a current time in the video content feature based at least in part on the viewing history indicating the user account previously viewed the video content feature; and rendering, via the at least one computing device, a graphical element presenting at least a portion of the extrinsic data on the display while the video content feature is also being rendered on the display. 15. The method of claim 14, further comprising determining, via the at least one computing device, that a duration since a most recent viewing in the viewing history exceeds a predefined threshold, wherein the quantity of the extrinsic data to present relevant to the current time in the video content feature is further based at least in part on the duration exceeding the predefined threshold. 16. The method of claim 14, further comprising dynamically updating, via the at least one computing device, the graphical element to present updated extrinsic data relevant to an updated current time in the video content feature, the updated current time being subsequent to the current time. 17. The method of claim 14, further comprising selecting, via the at least one computing device, a region in which the graphical element is to be rendered based at least in part on an analysis of the video content feature. 18. The method of claim 14, further comprising determining, via the at least one computing device, a duration of time to render the graphical element on the display based at least in part on a type of the extrinsic data rendered on the display. 19. The method of claim 14, further comprising analyzing, via the at least one computing device, visual characteristics of the video content feature to determine a position to show the graphical element, wherein the graphical element is rendered at the position. 20. The method of claim 14, further comprising altering, via the at least one computing device, a size of the video content feature on the display to accommodate the graphical element.
2,400
8,072
8,072
15,046,909
2,477
A UE transmits a radio access capability to a base station. The radio access capability is transmitted via an information element that comprises a bitmap in which a bit has a value that indicates, to the base station, support of a modification to at least one of a maximum power reduction or a spectrum emission requirement. According to embodiments, the base station manages the UE based on the supported modification. Such managing of the UE may include, for example, one or more of admission control, imposing scheduling restrictions, and imposing handover restrictions.
1. A method, implemented by a user equipment (UE) in a wireless communication network, the method comprising: transmitting, by the UE to a base station in the wireless communication network, a radio access capability of the UE; wherein the radio access capability of the UE is transmitted via an information element that comprises a bitmap in which a bit has a value that indicates, to the base station, support of a modification to at least one of a maximum power reduction (MPR) or a spectrum emission requirement. 2. The method of claim 1, wherein the value of the bit indicates support of a modification to a network signaling value (NS-value). 3. The method of claim 1, wherein the at least one of the MPR or the spectrum emission requirement are represented by an NS-value. 4. The method of claim 1, wherein the value of the bit is set to 1 to indicate the support of the modification. 5. The method of claim 1, wherein the modification is a release-independent modification. 6. A method, implemented by a base station operating a cell in a wireless communication network, the method comprising: receiving, from a user equipment (UE), a radio access capability of the UE; wherein the radio access capability of the UE is received via an information element that comprises a bitmap in which a bit has a value that indicates that the UE supports a modification to at least one of a maximum power reduction (MPR) or a spectrum emission requirement; and responsive to the receiving, managing the UE based on the supported modification. 7. The method of claim 6, wherein managing the UE comprises performing admission control for the UE based on the supported modification. 8. The method of claim 6, wherein managing the UE comprises imposing scheduling restrictions on the UE based on the supported modification. 9. The method of claim 6, wherein managing the UE comprises imposing restrictions on inter-band handover of the UE based on the supported modification. 10. The method of claim 6, wherein the at least one of the MPR or the spectrum emission requirement are represented by a network signaling value (NS-value). 11. The method of claim 6, wherein the supported modification is a release-independent modification. 12. A user equipment (UE) in a wireless communication network, the UE comprising: a transceiver configured to exchange signals with a base station in the wireless communication network; controller circuitry communicatively coupled to the transceiver and configured to transmit a radio access capability of the UE to the base station via the transceiver; wherein to transmit the radio access capability of the UE, the controller circuitry is configured to transmit an information element that comprises a bitmap in which a bit has a value that indicates, to the base station, support of a modification to at least one of a maximum power reduction (MPR) or a spectrum emission requirement. 13. The UE of claim 12, further comprising a memory communicatively coupled to the controller circuitry and configured to store the radio access capability in a data structure. 14. The UE of claim 12, wherein the value of the bit indicates support of a modification to a network signaling value (NS-value). 15. The UE of claim 12, wherein the at least one of the MPR or the spectrum emission requirement are represented by an NS-value. 16. The UE of claim 12, wherein the value of the bit is set to 1 to indicate the support of the modification. 17. The UE of claim 12, wherein the modification is a release-independent modification. 18. A base station in a wireless communication network, the base station comprising: a transceiver configured to exchange signals with a user equipment (UE) in the wireless communication network; controller circuitry communicatively coupled to the transceiver and configured to receive a radio access capability of the UE from the UE via the transceiver; wherein to receive the radio access capability, the controller circuitry is configured to receive an information element comprising a bitmap in which a bit has a value that indicates, to the base station, support of a modification to at least one of a maximum power reduction (MPR) or a spectrum emission requirement; wherein the controller circuitry is further configured to, responsive to receiving the radio access capability, manage the UE according to the supported modification. 19. The base station of claim 18, wherein to manage the UE, the controller circuitry is configured to perform admission control on the UE based on the supported modification. 20. The base station of claim 18, wherein to manage the UE, the controller circuitry is configured to impose scheduling restrictions on the UE based on the supported modification. 21. The base station of claim 18, wherein to manage the UE, the controller circuitry is configured to impose restrictions on inter-band handover of the UE based on the supported modification. 22. The base station of claim 18, wherein the at least one of the MPR or the spectrum emission requirement are represented by a parameter comprises a network signaling value (NS-value). 23. The base station of claim 18, wherein the UE supports a release-independent modification to a radio parameter.
A UE transmits a radio access capability to a base station. The radio access capability is transmitted via an information element that comprises a bitmap in which a bit has a value that indicates, to the base station, support of a modification to at least one of a maximum power reduction or a spectrum emission requirement. According to embodiments, the base station manages the UE based on the supported modification. Such managing of the UE may include, for example, one or more of admission control, imposing scheduling restrictions, and imposing handover restrictions.1. A method, implemented by a user equipment (UE) in a wireless communication network, the method comprising: transmitting, by the UE to a base station in the wireless communication network, a radio access capability of the UE; wherein the radio access capability of the UE is transmitted via an information element that comprises a bitmap in which a bit has a value that indicates, to the base station, support of a modification to at least one of a maximum power reduction (MPR) or a spectrum emission requirement. 2. The method of claim 1, wherein the value of the bit indicates support of a modification to a network signaling value (NS-value). 3. The method of claim 1, wherein the at least one of the MPR or the spectrum emission requirement are represented by an NS-value. 4. The method of claim 1, wherein the value of the bit is set to 1 to indicate the support of the modification. 5. The method of claim 1, wherein the modification is a release-independent modification. 6. A method, implemented by a base station operating a cell in a wireless communication network, the method comprising: receiving, from a user equipment (UE), a radio access capability of the UE; wherein the radio access capability of the UE is received via an information element that comprises a bitmap in which a bit has a value that indicates that the UE supports a modification to at least one of a maximum power reduction (MPR) or a spectrum emission requirement; and responsive to the receiving, managing the UE based on the supported modification. 7. The method of claim 6, wherein managing the UE comprises performing admission control for the UE based on the supported modification. 8. The method of claim 6, wherein managing the UE comprises imposing scheduling restrictions on the UE based on the supported modification. 9. The method of claim 6, wherein managing the UE comprises imposing restrictions on inter-band handover of the UE based on the supported modification. 10. The method of claim 6, wherein the at least one of the MPR or the spectrum emission requirement are represented by a network signaling value (NS-value). 11. The method of claim 6, wherein the supported modification is a release-independent modification. 12. A user equipment (UE) in a wireless communication network, the UE comprising: a transceiver configured to exchange signals with a base station in the wireless communication network; controller circuitry communicatively coupled to the transceiver and configured to transmit a radio access capability of the UE to the base station via the transceiver; wherein to transmit the radio access capability of the UE, the controller circuitry is configured to transmit an information element that comprises a bitmap in which a bit has a value that indicates, to the base station, support of a modification to at least one of a maximum power reduction (MPR) or a spectrum emission requirement. 13. The UE of claim 12, further comprising a memory communicatively coupled to the controller circuitry and configured to store the radio access capability in a data structure. 14. The UE of claim 12, wherein the value of the bit indicates support of a modification to a network signaling value (NS-value). 15. The UE of claim 12, wherein the at least one of the MPR or the spectrum emission requirement are represented by an NS-value. 16. The UE of claim 12, wherein the value of the bit is set to 1 to indicate the support of the modification. 17. The UE of claim 12, wherein the modification is a release-independent modification. 18. A base station in a wireless communication network, the base station comprising: a transceiver configured to exchange signals with a user equipment (UE) in the wireless communication network; controller circuitry communicatively coupled to the transceiver and configured to receive a radio access capability of the UE from the UE via the transceiver; wherein to receive the radio access capability, the controller circuitry is configured to receive an information element comprising a bitmap in which a bit has a value that indicates, to the base station, support of a modification to at least one of a maximum power reduction (MPR) or a spectrum emission requirement; wherein the controller circuitry is further configured to, responsive to receiving the radio access capability, manage the UE according to the supported modification. 19. The base station of claim 18, wherein to manage the UE, the controller circuitry is configured to perform admission control on the UE based on the supported modification. 20. The base station of claim 18, wherein to manage the UE, the controller circuitry is configured to impose scheduling restrictions on the UE based on the supported modification. 21. The base station of claim 18, wherein to manage the UE, the controller circuitry is configured to impose restrictions on inter-band handover of the UE based on the supported modification. 22. The base station of claim 18, wherein the at least one of the MPR or the spectrum emission requirement are represented by a parameter comprises a network signaling value (NS-value). 23. The base station of claim 18, wherein the UE supports a release-independent modification to a radio parameter.
2,400
8,073
8,073
14,418,838
2,467
A method for component carrier configuration is provided. The method includes: generating, by a Base Station (BS), secondary cell (SCell) configuration information and transmitting it to a User Equipment (UE); transmitting, by the BS, an SCell activation request for the UE to a micro BS and receiving from the micro BS an SCell activation response to the SCell activation request; and transmitting, by the BS, SCell activation information to the UE if the received SCell activation response indicates that the SCell activation request is accepted by the micro BS. The SCell configuration information contains group numbers and indices of SCells associated with the BS and the micro BS, respectively, and indicates a secondary primary cell (S-PCell) associated with the micro BS. The present invention also provides a BS and a UE. With the method for component carrier configuration and the corresponding BS and UE according to the present invention, the channel state information of the UE can be fed back on an uplink working of the micro cell base station.
1-20. (canceled) 21. A base station apparatus comprising: a configuration unit configured to and/or programmed to configure a first cell group and a second cell group; the first cell group comprising a PCell (Primary Cell), the second cell group comprising a secondary PCell which is different from the PCell, SPS (Semi-Persistent Scheduling) being configured for the secondary PCell; and a reception unit configured to and/or programmed to receive a PUCCH (Physical Uplink Control CHannel) on the PCell. 22. The base station apparatus according to claim 21 further comprising: a request unit configured to and/or programmed to transmit an x2 signal which is used to request adding a cell to the second cell group. 23. The base station apparatus according to claim 21 wherein the configuration unit is configured to and/or programmed to transmit a reconfiguration message to release a cell from or to add a cell to the second cell group. 24. The base station apparatus according to claim 21, wherein transmission timing advance of a cell which is included in the second cell group and is other than the secondary PCell, is same as transmission timing advance of the secondary PCell in a case where the cell and the secondary PCell belong to a same timing advance group. 25. The base station apparatus according to claim 21, wherein an index of the secondary PCell is larger or smaller than an index of any other cell in the second cell group. 26. A terminal apparatus comprising: a reception unit configured to and/or programmed to be configured with a first cell group and a second cell group; the first cell group comprising a PCell (Primary Cell), the second cell group comprising a secondary PCell which is different from the PCell, SPS (Semi-Persistent Scheduling) being configured for the secondary PCell; and a transmission unit configured to and/or programmed to transmit a first PUCCH (Physical Uplink Control CHannel) on the PCell and to transmit a second PUCCH on the secondary PCell. 27. The terminal apparatus according to claim 26, wherein the reception unit is configured to and/or programmed to receive a reconfiguration message to release a cell from or to add a cell to the second cell group. 28. The terminal apparatus according to claim 26, wherein transmission timing advance of a cell which is included in the second cell group and is other than the secondary PCell, is same as transmission timing advance of the secondary PCell in a case where the cell and the secondary PCell belong to a same timing advance group. 29. The terminal apparatus according to claim 26, wherein indexes of cells included in the first cell group are set independently with indexes of cells in the second cell group. 30. The terminal apparatus according to claim 26, wherein indexes of cells included in the first cell group and indexes of cells included in the second cell group are jointly numbered. 31. The terminal apparatus according to claim 26, wherein an index of the secondary PCell is larger or smaller than any other index of cell in the second cell group. 32. A communication method of a base station apparatus comprising: configuring a first cell group and a second cell group; the first cell group comprising a PCell (Primary Cell), the second cell group comprising a secondary PCell which is different from the PCell, SPS (Semi-Persistent Scheduling) being configured for the secondary PCell; and receiving a PUCCH (Physical Uplink Control CHannel) on the PCell. 33. A communication method of a terminal apparatus comprising: being configured with a first cell group and a second cell group; the first cell group comprising a PCell (Primary Cell), the second cell group comprising a secondary PCell which is different from the PCell, SPS (Semi-Persistent Scheduling) being configured for the secondary PCell; transmitting a first PUCCH (Physical Uplink Control CHannel) on the PCell and transmitting a second PUCCH on the secondary PCell.
A method for component carrier configuration is provided. The method includes: generating, by a Base Station (BS), secondary cell (SCell) configuration information and transmitting it to a User Equipment (UE); transmitting, by the BS, an SCell activation request for the UE to a micro BS and receiving from the micro BS an SCell activation response to the SCell activation request; and transmitting, by the BS, SCell activation information to the UE if the received SCell activation response indicates that the SCell activation request is accepted by the micro BS. The SCell configuration information contains group numbers and indices of SCells associated with the BS and the micro BS, respectively, and indicates a secondary primary cell (S-PCell) associated with the micro BS. The present invention also provides a BS and a UE. With the method for component carrier configuration and the corresponding BS and UE according to the present invention, the channel state information of the UE can be fed back on an uplink working of the micro cell base station.1-20. (canceled) 21. A base station apparatus comprising: a configuration unit configured to and/or programmed to configure a first cell group and a second cell group; the first cell group comprising a PCell (Primary Cell), the second cell group comprising a secondary PCell which is different from the PCell, SPS (Semi-Persistent Scheduling) being configured for the secondary PCell; and a reception unit configured to and/or programmed to receive a PUCCH (Physical Uplink Control CHannel) on the PCell. 22. The base station apparatus according to claim 21 further comprising: a request unit configured to and/or programmed to transmit an x2 signal which is used to request adding a cell to the second cell group. 23. The base station apparatus according to claim 21 wherein the configuration unit is configured to and/or programmed to transmit a reconfiguration message to release a cell from or to add a cell to the second cell group. 24. The base station apparatus according to claim 21, wherein transmission timing advance of a cell which is included in the second cell group and is other than the secondary PCell, is same as transmission timing advance of the secondary PCell in a case where the cell and the secondary PCell belong to a same timing advance group. 25. The base station apparatus according to claim 21, wherein an index of the secondary PCell is larger or smaller than an index of any other cell in the second cell group. 26. A terminal apparatus comprising: a reception unit configured to and/or programmed to be configured with a first cell group and a second cell group; the first cell group comprising a PCell (Primary Cell), the second cell group comprising a secondary PCell which is different from the PCell, SPS (Semi-Persistent Scheduling) being configured for the secondary PCell; and a transmission unit configured to and/or programmed to transmit a first PUCCH (Physical Uplink Control CHannel) on the PCell and to transmit a second PUCCH on the secondary PCell. 27. The terminal apparatus according to claim 26, wherein the reception unit is configured to and/or programmed to receive a reconfiguration message to release a cell from or to add a cell to the second cell group. 28. The terminal apparatus according to claim 26, wherein transmission timing advance of a cell which is included in the second cell group and is other than the secondary PCell, is same as transmission timing advance of the secondary PCell in a case where the cell and the secondary PCell belong to a same timing advance group. 29. The terminal apparatus according to claim 26, wherein indexes of cells included in the first cell group are set independently with indexes of cells in the second cell group. 30. The terminal apparatus according to claim 26, wherein indexes of cells included in the first cell group and indexes of cells included in the second cell group are jointly numbered. 31. The terminal apparatus according to claim 26, wherein an index of the secondary PCell is larger or smaller than any other index of cell in the second cell group. 32. A communication method of a base station apparatus comprising: configuring a first cell group and a second cell group; the first cell group comprising a PCell (Primary Cell), the second cell group comprising a secondary PCell which is different from the PCell, SPS (Semi-Persistent Scheduling) being configured for the secondary PCell; and receiving a PUCCH (Physical Uplink Control CHannel) on the PCell. 33. A communication method of a terminal apparatus comprising: being configured with a first cell group and a second cell group; the first cell group comprising a PCell (Primary Cell), the second cell group comprising a secondary PCell which is different from the PCell, SPS (Semi-Persistent Scheduling) being configured for the secondary PCell; transmitting a first PUCCH (Physical Uplink Control CHannel) on the PCell and transmitting a second PUCCH on the secondary PCell.
2,400
8,074
8,074
14,161,391
2,449
Techniques are disclosed for notifying network control software of new and moved source MAC addresses. In one embodiment, a switch may redirect a packet sent by a new or migrated virtual machine to the network control software as a notification. The switch does not forward the packet, thereby protecting against denial of service attacks. The switch further adds to a forwarding database a temporary entry which includes a “No_Redirect” flag for a new source MAC address, or updates an existing entry for a source MAC address that hits in the forwarding database by setting the “No_Redirect” flag. The “No_Redirect” flag indicates whether a notification has already been sent to the network control software for this source MAC address. The switch may periodically retry the notification to the network control software, until the network control software validates the source MAC address, depending on whether the “No_Redirect” is set.
1-8. (canceled) 9. One or more non-transitory computer-readable storage media storing instructions, which when executed by a client device and a server system, performs operations for notifying network control software of new and moved source media access control (MAC) addresses, comprising: receiving, by a switch device, a first packet; if the first packet includes a new source MAC address, inserting into a forwarding database a temporary entry which includes the source MAC address and a flag which is set to indicate that the network control software has been notified; if the first packet includes a moved source MAC address, updating an existing entry in the forwarding database which includes the source MAC address by setting the flag for the entry; and forwarding the first packet towards the network control software. 10. The non-transitory computer-readable storage media of claim 9, wherein the first packet is not forwarded towards a port associated with the target MAC address included in the first packet. 11. The non-transitory computer-readable storage media of claim 9, wherein the temporary entry includes a field indicating the temporary status of the entry and wherein the temporary entry does not include routing information. 12. The non-transitory computer-readable storage media of claim 9, wherein the flag is periodically reset by an aging function which walks the forwarding database. 13. The non-transitory computer-readable storage media of claim 9, the operations further comprising: determining that a second packet has a source MAC address that matches the temporary entry or the existing entry; and redirecting the received second packet to the network control software if the flag is reset for the temporary entry or the existing entry. 14. The non-transitory computer-readable storage media of claim 9, the operations further comprising, adding, by the network control software, an access control list (ACL) rule to block or discard packets received from the source MAC address of the first packet if the network control software does not validate the source MAC address. 15. The non-transitory computer-readable storage media of claim 9, the operations further comprising, inserting into the forwarding database, by the network control software, an entry which includes routing information for the first packet and resetting the flag if the network control software validates the source MAC address. 16. The non-transitory computer-readable storage media of claim 9, wherein the first packet was transmitted by a new virtual machine or a moved virtual machine. 17. A system, comprising: a client device, having a processor and memory, configured to execute a program for notifying network control software of new and moved source media access control (MAC) addresses, by performing operations comprising: receiving a first packet, if the first packet includes a new source MAC address, inserting into a forwarding database a temporary entry which includes the source MAC address and a flag which is set to indicate that the network control software has been notified, if the first packet includes a moved source MAC address, updating an existing entry in the forwarding database which includes the source MAC address by setting the flag for the entry, and forwarding the first packet towards the network control software. 18. The system of claim 17, wherein the temporary entry includes a field indicating the temporary status of the entry and wherein the temporary entry does not include routing information. 19. The system of claim 17, wherein the flag is periodically reset by an aging function which walks the forwarding database. 20. The system of claim 17, the operations further comprising: determining that a second packet has a source MAC address that matches the temporary entry or the existing entry; and redirecting the received second packet to the network control software if the flag is reset for the temporary entry or the existing entry.
Techniques are disclosed for notifying network control software of new and moved source MAC addresses. In one embodiment, a switch may redirect a packet sent by a new or migrated virtual machine to the network control software as a notification. The switch does not forward the packet, thereby protecting against denial of service attacks. The switch further adds to a forwarding database a temporary entry which includes a “No_Redirect” flag for a new source MAC address, or updates an existing entry for a source MAC address that hits in the forwarding database by setting the “No_Redirect” flag. The “No_Redirect” flag indicates whether a notification has already been sent to the network control software for this source MAC address. The switch may periodically retry the notification to the network control software, until the network control software validates the source MAC address, depending on whether the “No_Redirect” is set.1-8. (canceled) 9. One or more non-transitory computer-readable storage media storing instructions, which when executed by a client device and a server system, performs operations for notifying network control software of new and moved source media access control (MAC) addresses, comprising: receiving, by a switch device, a first packet; if the first packet includes a new source MAC address, inserting into a forwarding database a temporary entry which includes the source MAC address and a flag which is set to indicate that the network control software has been notified; if the first packet includes a moved source MAC address, updating an existing entry in the forwarding database which includes the source MAC address by setting the flag for the entry; and forwarding the first packet towards the network control software. 10. The non-transitory computer-readable storage media of claim 9, wherein the first packet is not forwarded towards a port associated with the target MAC address included in the first packet. 11. The non-transitory computer-readable storage media of claim 9, wherein the temporary entry includes a field indicating the temporary status of the entry and wherein the temporary entry does not include routing information. 12. The non-transitory computer-readable storage media of claim 9, wherein the flag is periodically reset by an aging function which walks the forwarding database. 13. The non-transitory computer-readable storage media of claim 9, the operations further comprising: determining that a second packet has a source MAC address that matches the temporary entry or the existing entry; and redirecting the received second packet to the network control software if the flag is reset for the temporary entry or the existing entry. 14. The non-transitory computer-readable storage media of claim 9, the operations further comprising, adding, by the network control software, an access control list (ACL) rule to block or discard packets received from the source MAC address of the first packet if the network control software does not validate the source MAC address. 15. The non-transitory computer-readable storage media of claim 9, the operations further comprising, inserting into the forwarding database, by the network control software, an entry which includes routing information for the first packet and resetting the flag if the network control software validates the source MAC address. 16. The non-transitory computer-readable storage media of claim 9, wherein the first packet was transmitted by a new virtual machine or a moved virtual machine. 17. A system, comprising: a client device, having a processor and memory, configured to execute a program for notifying network control software of new and moved source media access control (MAC) addresses, by performing operations comprising: receiving a first packet, if the first packet includes a new source MAC address, inserting into a forwarding database a temporary entry which includes the source MAC address and a flag which is set to indicate that the network control software has been notified, if the first packet includes a moved source MAC address, updating an existing entry in the forwarding database which includes the source MAC address by setting the flag for the entry, and forwarding the first packet towards the network control software. 18. The system of claim 17, wherein the temporary entry includes a field indicating the temporary status of the entry and wherein the temporary entry does not include routing information. 19. The system of claim 17, wherein the flag is periodically reset by an aging function which walks the forwarding database. 20. The system of claim 17, the operations further comprising: determining that a second packet has a source MAC address that matches the temporary entry or the existing entry; and redirecting the received second packet to the network control software if the flag is reset for the temporary entry or the existing entry.
2,400
8,075
8,075
14,985,473
2,439
Detecting and preventing phishing attacks in real-time features protection of users from feeding sensitive data to phishing sites, educating users for theft awareness, and protecting enterprise credentials. A requested document traversing a gateway is embedded with a detection module. When a user accesses the document, the embedded detection module is executed in the context of the document, checks if the document is prompting the user for sensitive information, determining if the document is part of a phishing attack, and initiates mitigation, warning, and/or education techniques.
1. A method for identifying a phishing attack comprising the steps of: (a) embedding a detection module in a document being sent to a user; (b) detecting, by said detection module, said document prompting the user for sensitive information; and (c) determining if said document is part of a phishing attack, wherein said detection module executes in a context of said document, and wherein said determining is at least in part by said detection module. 2. The method of claim 1 wherein said document is sent from a server via a gateway to the user on a client. 3. The method of claim 2 wherein said embedding is performed by said gateway. 4. The method of claim 1 wherein said embedding is via a technique selected from the group consisting of: (a) enhancing said document, (b) injecting, (c) JavaScript injection, and (d) wrapping. 5. The method of claim 1 wherein said document is selected from the group consisting of: (a) a web page, (b) downloaded web content, (c) an email message, and (d) an email attachment 6. The method of claim 1 wherein said detecting is via a technique selected from the group consisting of: (a) reputation checking, (b) detecting evasion techniques, (c) similarity checking, (d) detecting a deception technique, (e) evaluating quality of document construction, (f) lack of previous use history of said document's site by other users, and (g) lack of previous use history of said document's site by the user. 7. The method of claim 1 wherein said context is selected from the group consisting of: (a) a browser, (b) a browser extension, (c) a secure container application, (d) client applications, (e) a network proxy, and (f) a transparent in line network device. 8. The method of claim 1 further including the step of: if said determining is successful, then initiating a technique selected from the group consisting of: (a) disabling one or more elements of said document, (b) disabling posting data to said document's originating site, (c) blocking network traffic to and from said document's originating site, (d) alerting a network administrator, (e) alerting the user, and (f) alerting other uses that have communicated with this phishing site. 9. A system for identifying a phishing attack, the system comprising: a processing system containing one or more processors, said processing system being configured to: (a) receive a document that has been embedded with a detection module; (b) detect said document prompting a user for sensitive information by executing said detection module when said document is accessed; and (c) determine if said document is part of a phishing attack, wherein said detection module executes in a context of said document, and wherein said determining is at least in part by said detection module. 10. The system of claim 9 wherein said processing system is a client machine, and said document is sent from a server via a gateway to the user on said client machine. 11. The system of claim 10 wherein said detection module is embedded by said gateway. 12. The system of claim 9 wherein said processing system is further configured to: if said document is determined to be part of a phishing attack, then initiating a technique selected from the group consisting of: (a) disabling one or more elements of said document, (b) disabling posting data to said document's originating site, (c) blocking network traffic to and from said document's originating site, (d) alerting a network administrator, (e) alerting the user, and (f) alerting other uses that have communicated with this phishing site. 13. A non-transitory computer-readable storage medium having embedded thereon computer-readable code for identifying a phishing attack, the computer-readable code comprising program code for: (a) embedding a detection module in a document being sent to a user; (b) detecting, by said detection module, said document prompting the user for sensitive information; and (c) determining if said document is part of a phishing attack, wherein said detection module executes in a context of said document, and wherein said determining is at least in part by said detection module.
Detecting and preventing phishing attacks in real-time features protection of users from feeding sensitive data to phishing sites, educating users for theft awareness, and protecting enterprise credentials. A requested document traversing a gateway is embedded with a detection module. When a user accesses the document, the embedded detection module is executed in the context of the document, checks if the document is prompting the user for sensitive information, determining if the document is part of a phishing attack, and initiates mitigation, warning, and/or education techniques.1. A method for identifying a phishing attack comprising the steps of: (a) embedding a detection module in a document being sent to a user; (b) detecting, by said detection module, said document prompting the user for sensitive information; and (c) determining if said document is part of a phishing attack, wherein said detection module executes in a context of said document, and wherein said determining is at least in part by said detection module. 2. The method of claim 1 wherein said document is sent from a server via a gateway to the user on a client. 3. The method of claim 2 wherein said embedding is performed by said gateway. 4. The method of claim 1 wherein said embedding is via a technique selected from the group consisting of: (a) enhancing said document, (b) injecting, (c) JavaScript injection, and (d) wrapping. 5. The method of claim 1 wherein said document is selected from the group consisting of: (a) a web page, (b) downloaded web content, (c) an email message, and (d) an email attachment 6. The method of claim 1 wherein said detecting is via a technique selected from the group consisting of: (a) reputation checking, (b) detecting evasion techniques, (c) similarity checking, (d) detecting a deception technique, (e) evaluating quality of document construction, (f) lack of previous use history of said document's site by other users, and (g) lack of previous use history of said document's site by the user. 7. The method of claim 1 wherein said context is selected from the group consisting of: (a) a browser, (b) a browser extension, (c) a secure container application, (d) client applications, (e) a network proxy, and (f) a transparent in line network device. 8. The method of claim 1 further including the step of: if said determining is successful, then initiating a technique selected from the group consisting of: (a) disabling one or more elements of said document, (b) disabling posting data to said document's originating site, (c) blocking network traffic to and from said document's originating site, (d) alerting a network administrator, (e) alerting the user, and (f) alerting other uses that have communicated with this phishing site. 9. A system for identifying a phishing attack, the system comprising: a processing system containing one or more processors, said processing system being configured to: (a) receive a document that has been embedded with a detection module; (b) detect said document prompting a user for sensitive information by executing said detection module when said document is accessed; and (c) determine if said document is part of a phishing attack, wherein said detection module executes in a context of said document, and wherein said determining is at least in part by said detection module. 10. The system of claim 9 wherein said processing system is a client machine, and said document is sent from a server via a gateway to the user on said client machine. 11. The system of claim 10 wherein said detection module is embedded by said gateway. 12. The system of claim 9 wherein said processing system is further configured to: if said document is determined to be part of a phishing attack, then initiating a technique selected from the group consisting of: (a) disabling one or more elements of said document, (b) disabling posting data to said document's originating site, (c) blocking network traffic to and from said document's originating site, (d) alerting a network administrator, (e) alerting the user, and (f) alerting other uses that have communicated with this phishing site. 13. A non-transitory computer-readable storage medium having embedded thereon computer-readable code for identifying a phishing attack, the computer-readable code comprising program code for: (a) embedding a detection module in a document being sent to a user; (b) detecting, by said detection module, said document prompting the user for sensitive information; and (c) determining if said document is part of a phishing attack, wherein said detection module executes in a context of said document, and wherein said determining is at least in part by said detection module.
2,400
8,076
8,076
13,377,142
2,482
There is disclosed an apparatus including: a source for providing encoded data of image data or audio data, the encoded data including a plurality of pieces of element data being able to be decoded independently, each of the plurality of pieces of element data including at least one block; first processing means for generating block information identifying a first block to be processed first among the at least one block; a plurality of second processing means for generating block information identifying a subsequent block to the first block based on an order of decoding processing in element data corresponding to the block information; a plurality of decoding means for decoding, in parallel, a block identified by referring to one piece of unreferenced block information among the generated block information; and storing means for storing the decoded block and forming decoded element data corresponding to the block. An editing apparatus including such an apparatus is also disclosed.
1-13. (canceled) 14. An apparatus for decoding encoded data of image data or audio data, the apparatus comprising: a memory providing said encoded data including a plurality of pieces of element data being able to be decoded independently, each of the plurality of pieces of element data including at least one block; a first processor generating block information identifying a first block to be processed first among said at least one block; a plurality of second processors generating block information identifying a subsequent block to the first block based on an order of decoding processing in element data corresponding to the block information; a plurality of decoders decoding, in parallel, a block identified by referring to one piece of block information which was not referred yet among the generated block information; and a memory storing the decoded block and forming decoded element data corresponding to the block, wherein for a block corresponding to block information which was referred yet among the bock information generated by the second processing means, a priority representing the order of decoding processing associated with the block is calculated. 15. The apparatus according to claim 14, wherein the priority is based on a ratio in which decoding processing of the corresponding element data has progressed. 16. The apparatus according to claim 14, wherein the priority is based on the processing time of unprocessed blocks of the corresponding element data. 17. The apparatus according to claim 14, further comprising a memory storing the generated block information, wherein the decoder preferentially decodes a block identified based on a time at which the block information is stored. 18. A method for decoding encoded data of image data or audio data, the method comprising the steps of: generating, in a processor, block information identifying a block which is processed first among at least one block which configures each of a plurality of pieces of element data included in said encoded data, the element data being able to be decoded independently, an order of decoding processing in element data corresponding to the block being given to the block; calculating a priority representing the order of processing for decoding for a block corresponding to the generated block information; associating the priority with the block; decoding, in a plurality of processors, a block corresponding to block information with the highest priority by referring to priorities of a plurality of pieces of the generated block information which was not referred yet in parallel; generating, in the plurality of processors, block information identifying a subsequent block which belongs to element data configured by the decoded block in parallel based on the order of decoding processing; and repeating the step of decoding and the step of generating the block information identifying the subsequent block until all the blocks are decoded. 19. The method according to claim 18, wherein the priority is based on a ratio in which decoding processing of the corresponding element data has progressed. 20. The method according to claim 18, wherein the priority is based on the processing time of unprocessed blocks of the corresponding element data. 21. The method according to claim 18, further comprising the step of storing the generated block information in a memory, wherein in the step of decoding the block, the plurality of processors preferentially decode a block identified based on a time at which the block information is stored in the memory. 22. A recording medium recording a program for decoding encoded data of image data or audio data, the program being configured to make a processor execute the step of generating block information identifying a block which is processed first among at least one block which configures each of a plurality of pieces of element data included in encoded data including image data or audio data, the element data being able to be decoded independently, an order of decoding processing in element data corresponding to the block being given to the block, and to make a plurality of processors execute the steps of: calculating a priority representing the order of processing for decoding for a block corresponding to the generated block information; associating the priority with the block; decoding a block corresponding to block information with the highest priority by referring to priorities of a plurality of pieces of the generated block information which was not referred yet in parallel; generating block information identifying a subsequent block which belongs to element data configured by the decoded block in parallel based on the order of the decoding processing; and repeating the step of decoding and the step of generating the block information identifying the subsequent block until all the blocks are decoded. 23. An editing apparatus comprising: a memory providing encoded data of image data or audio data, the encoded data including a plurality of pieces of element data being able to be decoded independently, each of the plurality of pieces of element data including at least one block; a first processor generating block information identifying a block to be processed first among said at least one block; a plurality of second processors generating block information identifying a subsequent block to the first block based on an order of decoding processing in element data corresponding to the block information; a plurality of decoders decoding, in parallel, a block identified by referring to one piece of unreferenced block information among the generated block information; a memory storing the decoded block and forming decoded element data corresponding to the block; and an editor editing the decoded element data , wherein for a block corresponding to block information which was referred yet among the bock information generated by the second processing means, a priority representing the order of decoding processing associated with the block is calculated.
There is disclosed an apparatus including: a source for providing encoded data of image data or audio data, the encoded data including a plurality of pieces of element data being able to be decoded independently, each of the plurality of pieces of element data including at least one block; first processing means for generating block information identifying a first block to be processed first among the at least one block; a plurality of second processing means for generating block information identifying a subsequent block to the first block based on an order of decoding processing in element data corresponding to the block information; a plurality of decoding means for decoding, in parallel, a block identified by referring to one piece of unreferenced block information among the generated block information; and storing means for storing the decoded block and forming decoded element data corresponding to the block. An editing apparatus including such an apparatus is also disclosed.1-13. (canceled) 14. An apparatus for decoding encoded data of image data or audio data, the apparatus comprising: a memory providing said encoded data including a plurality of pieces of element data being able to be decoded independently, each of the plurality of pieces of element data including at least one block; a first processor generating block information identifying a first block to be processed first among said at least one block; a plurality of second processors generating block information identifying a subsequent block to the first block based on an order of decoding processing in element data corresponding to the block information; a plurality of decoders decoding, in parallel, a block identified by referring to one piece of block information which was not referred yet among the generated block information; and a memory storing the decoded block and forming decoded element data corresponding to the block, wherein for a block corresponding to block information which was referred yet among the bock information generated by the second processing means, a priority representing the order of decoding processing associated with the block is calculated. 15. The apparatus according to claim 14, wherein the priority is based on a ratio in which decoding processing of the corresponding element data has progressed. 16. The apparatus according to claim 14, wherein the priority is based on the processing time of unprocessed blocks of the corresponding element data. 17. The apparatus according to claim 14, further comprising a memory storing the generated block information, wherein the decoder preferentially decodes a block identified based on a time at which the block information is stored. 18. A method for decoding encoded data of image data or audio data, the method comprising the steps of: generating, in a processor, block information identifying a block which is processed first among at least one block which configures each of a plurality of pieces of element data included in said encoded data, the element data being able to be decoded independently, an order of decoding processing in element data corresponding to the block being given to the block; calculating a priority representing the order of processing for decoding for a block corresponding to the generated block information; associating the priority with the block; decoding, in a plurality of processors, a block corresponding to block information with the highest priority by referring to priorities of a plurality of pieces of the generated block information which was not referred yet in parallel; generating, in the plurality of processors, block information identifying a subsequent block which belongs to element data configured by the decoded block in parallel based on the order of decoding processing; and repeating the step of decoding and the step of generating the block information identifying the subsequent block until all the blocks are decoded. 19. The method according to claim 18, wherein the priority is based on a ratio in which decoding processing of the corresponding element data has progressed. 20. The method according to claim 18, wherein the priority is based on the processing time of unprocessed blocks of the corresponding element data. 21. The method according to claim 18, further comprising the step of storing the generated block information in a memory, wherein in the step of decoding the block, the plurality of processors preferentially decode a block identified based on a time at which the block information is stored in the memory. 22. A recording medium recording a program for decoding encoded data of image data or audio data, the program being configured to make a processor execute the step of generating block information identifying a block which is processed first among at least one block which configures each of a plurality of pieces of element data included in encoded data including image data or audio data, the element data being able to be decoded independently, an order of decoding processing in element data corresponding to the block being given to the block, and to make a plurality of processors execute the steps of: calculating a priority representing the order of processing for decoding for a block corresponding to the generated block information; associating the priority with the block; decoding a block corresponding to block information with the highest priority by referring to priorities of a plurality of pieces of the generated block information which was not referred yet in parallel; generating block information identifying a subsequent block which belongs to element data configured by the decoded block in parallel based on the order of the decoding processing; and repeating the step of decoding and the step of generating the block information identifying the subsequent block until all the blocks are decoded. 23. An editing apparatus comprising: a memory providing encoded data of image data or audio data, the encoded data including a plurality of pieces of element data being able to be decoded independently, each of the plurality of pieces of element data including at least one block; a first processor generating block information identifying a block to be processed first among said at least one block; a plurality of second processors generating block information identifying a subsequent block to the first block based on an order of decoding processing in element data corresponding to the block information; a plurality of decoders decoding, in parallel, a block identified by referring to one piece of unreferenced block information among the generated block information; a memory storing the decoded block and forming decoded element data corresponding to the block; and an editor editing the decoded element data , wherein for a block corresponding to block information which was referred yet among the bock information generated by the second processing means, a priority representing the order of decoding processing associated with the block is calculated.
2,400
8,077
8,077
15,241,603
2,461
In embodiments, one or more wireless stations operate to configure direct communication with neighboring mobile stations, i.e., communication between the mobile stations without utilizing an intermediate access point. Configuration of NAN includes mapping of NAN clusters and multi-hop data routing within a NAN cluster. A wireless device may transmit a subscribe service discovery frame (SDF) to one or more neighboring wireless devices and receive a respective publish SDF from the one or more wireless devices, the respective publish SDF including respective wireless device information. The wireless device may maintain a data structure comprising the respective wireless device information. In some embodiments, the wireless device information may include an address, hop count, and/or service indications, e.g., for data routing and/or service discovery.
1. A wireless station, comprising: at least one antenna; a first wireless interface and a second wireless interface, each configured to perform wireless communications; and at least one processor communicatively coupled to one or more radios, wherein the one or more radios are associated with the first and second wireless interfaces; wherein the wireless station is configured to: detect one or more neighboring wireless stations that are configured to perform Wi-Fi communication; transmit a subscribe service discovery frame (SDF) to the one or more neighboring wireless stations, wherein the subscribe SDF indicates a service sought by the wireless station; and receive a publish SDF from a first neighboring wireless station of the one or more neighboring wireless stations, wherein the publish SDF includes device information for the neighboring wireless station and a remote wireless station, wherein the remote wireless station is not detected by the wireless station, and wherein the remote wireless station is configured to provide the service. 2. The wireless station of claim 1, wherein the device information includes a hop count to each of the first neighboring wireless station and the remote wireless station. 3. The wireless station of claim 1, wherein the wireless station is further configured to: maintain a data structure comprising the device information. 4. The wireless station of claim 3, wherein the device information includes one or more of: a medium access control (MAC) address for each of the wireless station, the first neighboring wireless station, and the remote wireless station; or a hop count to each of the first neighboring wireless station and the remote wireless station. 5. The wireless station of claim 1, wherein the wireless station is further configured to: update a data structure comprising the device information; and forward, in a payload of a follow up SDF, the data structure to a second neighboring wireless station of the one or more neighboring wireless stations. 6. The wireless station of claim 5, wherein the data structure includes a first hop count parameter that indicates a first number of wireless stations between the wireless station and the first neighboring wireless station and a second hop count parameter that indicates a second number of wireless stations between the wireless station and the remote wireless station. 7. The wireless station of claim 1, wherein the subscribe SDF includes a parameter requesting discovery of neighboring non-Wi-Fi wireless stations. 8. The wireless station of claim 7, wherein the wireless station is further configured to: receive a follow-up SDF from a second neighboring wireless station of the one or more neighboring wireless stations, wherein the follow-up SDF includes device information regarding a neighboring non-Wi-Fi wireless station. 9. An apparatus, comprising: a memory; and a processing element in communication with the memory, wherein the processing element is configured to: receive a first subscribe service discovery frame (SDF) from a first neighboring wireless station, wherein the subscribe SDF includes a medium access control (MAC) address of the first neighboring wireless station and a first hop count parameter associated with the first neighboring wireless station; update a data structure comprising neighbor device information, wherein updating the data structure includes incrementing, by the processing element, the first hop count parameter to generate a second hop count parameter associated with the first neighboring wireless station; and generate instructions to transmit a second subscribe SDF to a second neighboring wireless station, wherein the second subscribe SDF includes the MAC address and the second hop count parameter. 10. The apparatus of claim 9, wherein the processing element is further configured to: generate instructions to transmit a publish SDF to the first neighboring wireless station, wherein the publish SDF includes device information regarding a wireless station associated with the processing element. 11. The apparatus of claim 9, wherein the processing element is further configured to: receive a publish SDF from the second neighboring wireless station, wherein the second publish SDF includes a MAC address of the second neighboring wireless device and a third hop count parameter associated with the second neighboring wireless station. 12. The apparatus of claim 9, wherein the first subscribe SDF includes a parameter requesting discovery of neighboring non-Wi-Fi wireless stations. 13. The apparatus of claim 12, wherein the processing element is further configured to: discover a neighboring non-Wi-Fi wireless station; and generate instructions to transmit a follow up SDF to the first neighboring wireless station, wherein the follow-up SDF includes device information regarding the neighboring non-Wi-Fi wireless station. 14. The apparatus of claim 9, wherein the first subscribe SDF indicates a service sought by the first neighboring wireless station. 15. A non-transitory computer readable memory medium storing program instructions executable by a processor of a wireless station to: generate an instruction to transmit a first service discovery frame (SDF) to a neighboring wireless station, wherein the first SDF indicates a service sought by the wireless station; receive a second SDF from the first neighboring wireless station, wherein the second SDF includes first device information comprising a first hop count parameter, a first address, and a first service instance, wherein the first device information is associated with the first neighboring wireless device; and maintain a data structure comprising the first device information. 16. The non-transitory computer readable memory medium of claim 15, wherein the program instructions are further executable by the processor to: receive a follow up SDF from the first neighboring wireless station, wherein the follow up SDF includes second device information comprising a second hop count parameter, a second address, and a second service instance, wherein the second device information is associated with the second neighboring wireless device. 17. The non-transitory computer readable memory medium of claim 16, wherein the program instructions are further executable by the processor to: update the data structure with the second device information. 18. The non-transitory computer readable memory medium of claim 15, wherein the first hop count parameter indicates a number of wireless stations between the wireless station and the first neighboring wireless station. 19. The non-transitory computer readable memory medium of claim 15, wherein the first SDF includes a parameter requesting discovery of neighboring non-Wi-Fi wireless stations. 20. The non-transitory computer readable memory medium of claim 19, wherein the program instructions are further executable by a processor to: receive a follow-up SDF, wherein the follow-up SDF includes device information regarding a neighboring non-Wi-Fi wireless station.
In embodiments, one or more wireless stations operate to configure direct communication with neighboring mobile stations, i.e., communication between the mobile stations without utilizing an intermediate access point. Configuration of NAN includes mapping of NAN clusters and multi-hop data routing within a NAN cluster. A wireless device may transmit a subscribe service discovery frame (SDF) to one or more neighboring wireless devices and receive a respective publish SDF from the one or more wireless devices, the respective publish SDF including respective wireless device information. The wireless device may maintain a data structure comprising the respective wireless device information. In some embodiments, the wireless device information may include an address, hop count, and/or service indications, e.g., for data routing and/or service discovery.1. A wireless station, comprising: at least one antenna; a first wireless interface and a second wireless interface, each configured to perform wireless communications; and at least one processor communicatively coupled to one or more radios, wherein the one or more radios are associated with the first and second wireless interfaces; wherein the wireless station is configured to: detect one or more neighboring wireless stations that are configured to perform Wi-Fi communication; transmit a subscribe service discovery frame (SDF) to the one or more neighboring wireless stations, wherein the subscribe SDF indicates a service sought by the wireless station; and receive a publish SDF from a first neighboring wireless station of the one or more neighboring wireless stations, wherein the publish SDF includes device information for the neighboring wireless station and a remote wireless station, wherein the remote wireless station is not detected by the wireless station, and wherein the remote wireless station is configured to provide the service. 2. The wireless station of claim 1, wherein the device information includes a hop count to each of the first neighboring wireless station and the remote wireless station. 3. The wireless station of claim 1, wherein the wireless station is further configured to: maintain a data structure comprising the device information. 4. The wireless station of claim 3, wherein the device information includes one or more of: a medium access control (MAC) address for each of the wireless station, the first neighboring wireless station, and the remote wireless station; or a hop count to each of the first neighboring wireless station and the remote wireless station. 5. The wireless station of claim 1, wherein the wireless station is further configured to: update a data structure comprising the device information; and forward, in a payload of a follow up SDF, the data structure to a second neighboring wireless station of the one or more neighboring wireless stations. 6. The wireless station of claim 5, wherein the data structure includes a first hop count parameter that indicates a first number of wireless stations between the wireless station and the first neighboring wireless station and a second hop count parameter that indicates a second number of wireless stations between the wireless station and the remote wireless station. 7. The wireless station of claim 1, wherein the subscribe SDF includes a parameter requesting discovery of neighboring non-Wi-Fi wireless stations. 8. The wireless station of claim 7, wherein the wireless station is further configured to: receive a follow-up SDF from a second neighboring wireless station of the one or more neighboring wireless stations, wherein the follow-up SDF includes device information regarding a neighboring non-Wi-Fi wireless station. 9. An apparatus, comprising: a memory; and a processing element in communication with the memory, wherein the processing element is configured to: receive a first subscribe service discovery frame (SDF) from a first neighboring wireless station, wherein the subscribe SDF includes a medium access control (MAC) address of the first neighboring wireless station and a first hop count parameter associated with the first neighboring wireless station; update a data structure comprising neighbor device information, wherein updating the data structure includes incrementing, by the processing element, the first hop count parameter to generate a second hop count parameter associated with the first neighboring wireless station; and generate instructions to transmit a second subscribe SDF to a second neighboring wireless station, wherein the second subscribe SDF includes the MAC address and the second hop count parameter. 10. The apparatus of claim 9, wherein the processing element is further configured to: generate instructions to transmit a publish SDF to the first neighboring wireless station, wherein the publish SDF includes device information regarding a wireless station associated with the processing element. 11. The apparatus of claim 9, wherein the processing element is further configured to: receive a publish SDF from the second neighboring wireless station, wherein the second publish SDF includes a MAC address of the second neighboring wireless device and a third hop count parameter associated with the second neighboring wireless station. 12. The apparatus of claim 9, wherein the first subscribe SDF includes a parameter requesting discovery of neighboring non-Wi-Fi wireless stations. 13. The apparatus of claim 12, wherein the processing element is further configured to: discover a neighboring non-Wi-Fi wireless station; and generate instructions to transmit a follow up SDF to the first neighboring wireless station, wherein the follow-up SDF includes device information regarding the neighboring non-Wi-Fi wireless station. 14. The apparatus of claim 9, wherein the first subscribe SDF indicates a service sought by the first neighboring wireless station. 15. A non-transitory computer readable memory medium storing program instructions executable by a processor of a wireless station to: generate an instruction to transmit a first service discovery frame (SDF) to a neighboring wireless station, wherein the first SDF indicates a service sought by the wireless station; receive a second SDF from the first neighboring wireless station, wherein the second SDF includes first device information comprising a first hop count parameter, a first address, and a first service instance, wherein the first device information is associated with the first neighboring wireless device; and maintain a data structure comprising the first device information. 16. The non-transitory computer readable memory medium of claim 15, wherein the program instructions are further executable by the processor to: receive a follow up SDF from the first neighboring wireless station, wherein the follow up SDF includes second device information comprising a second hop count parameter, a second address, and a second service instance, wherein the second device information is associated with the second neighboring wireless device. 17. The non-transitory computer readable memory medium of claim 16, wherein the program instructions are further executable by the processor to: update the data structure with the second device information. 18. The non-transitory computer readable memory medium of claim 15, wherein the first hop count parameter indicates a number of wireless stations between the wireless station and the first neighboring wireless station. 19. The non-transitory computer readable memory medium of claim 15, wherein the first SDF includes a parameter requesting discovery of neighboring non-Wi-Fi wireless stations. 20. The non-transitory computer readable memory medium of claim 19, wherein the program instructions are further executable by a processor to: receive a follow-up SDF, wherein the follow-up SDF includes device information regarding a neighboring non-Wi-Fi wireless station.
2,400
8,078
8,078
15,191,273
2,422
System for visually depicting fields of view for a commercial vehicle within a driver's cab of the commercial vehicle, the system having at least one display device disposed within the driver's cab and having at least one display unit being configured to display at least one field of view, wherein the at least one display device is configured to be arranged within the driver's cab of the commercial vehicle such that the longitudinal axis thereof is substantially horizontally aligned.
1. A system for visually depicting fields of view for a commercial vehicle within a driver's cab of the commercial vehicle, the system comprising: at least one display device disposed within the driver's cab and comprising at least one display unit being configured to display at least one field of view (A, B, C), wherein the at least one display device is configured to be arranged within the driver's cab (8) of the commercial vehicle such that the longitudinal axis thereof is substantially horizontally aligned. 2. The system according to claim 1, wherein the at least one display device is configured to be substantially disposed upright on a driver's side and/or a co-driver's side. 3. The system according to claim 1, wherein the at least one display device is configured to be substantially disposed upright on a driver's side and/or a co-driver's side and to be pivotally disposed with respect to the horizontal plane. 4. The system according to claim 1, wherein the at least on display device is configured to be disposed on a driver's side of the commercial vehicle and to depict a field of view on the at least one display unit, the field of view corresponding to an area left next to the commercial vehicle in forward driving direction. 5. The system according to claim 1, further comprising: at least one image capture unit configured to capture image data representing the at least one field of view, wherein the at least one image capture unit is configured to be integrally formed with a mirror attached to the commercial vehicle, the mirror providing a prescribed field of view. 6. The system according to claim 1, wherein the system is configured to display fields of view of a roof mirror, a wide-angle mirror and/or fender mirror on one or more display units directly bordering each other, separate from each other and/or overlapping each other on the at least one display device. 7. The system according to claim 6, wherein the system is configured to display the fields of view in accordance with vehicle parameters. 8. The system according to claim 1, wherein the system is configured to display adjacent fields of view (A, B, C) directly bordering each other on the at least one display device. 9. The system according to claim 1, wherein the at least one field of view (A, B, C) contains the field of view of a left primary mirror and/or the field of view of a left wide-angle mirror and the field of view of a right primary mirror and/or the field of view of a right wide-angle mirror. 10. The system according to claim 9, wherein the system is adapted to depict the field of view of the left primary mirror and/or the field of view of the left wide-angle mirror on the left side of the at least one display unit. 11. The system according to claim 9, wherein the system is adapted to depict the field of view of the right primary mirror and/or the field of view of the right wide-angle mirror on the right side on the display unit. 12. The system according to claim 10, wherein the system is adapted to depict the field of view of the right primary mirror and/or the field of view of the right wide-angle mirror on the right side on the display unit. 13. The system according to claim 1, wherein the system is adapted to permanently depict the fields of view (A, B, C) on the at least one display unit at the same position and with the same size. 14. The system according to claim 1, wherein the system is adapted to permanently depict the fields of view (A, B, C) on the at least one display unit at varying positions and/or with varying sizes. 15. The system according to claim 1, wherein the system is adapted to depict at least one additional viewing area in accordance with the vehicle speed and/or vehicle driving direction. 16. The system according to claim 14, wherein the system is adapted to display, with reference to the commercial vehicle, position information superimposed with at least one of the fields of view (A, B, C) or the at least one of the viewing areas. 17. The system according to claim 1, wherein the display device includes two, three or four display units, which are separated from each other. 18. The system according to claim 1, wherein the display device includes at least two image capture units and the system is adapted to combine the field of view information for one to-be-depicted field of view from the field of view information of the at least two image capture units. 19. The system according to claim 1, wherein the display device includes at least two image capture units, which are adapted to sense redundant field of view information for one to-be-depicted field of view (A, B, C). 20. The system according to claim 1, wherein a first image capture unit having a first resolution for capturing a first angle of view and a second image capture unit having a second resolution for capturing a second angle of view, which is different from the first angle of view, are provided, and wherein the first resolution is higher than the second resolution, and wherein the two viewing areas captured by the image capture units are shown in a common display unit and do not substantially overlap, wherein the confluence portion of the field of view of a primary mirror and the field of view of a wide-angle mirror of the same vehicle side is shown, where-in preferably the first angle of view is smaller than the second image angle of view. 21. The system according to claim 1, further including a power supply device that is independent of an on-board power supply of the commercial vehicle. 22. A system for visually depicting fields of view for a commercial vehicle within a driver's cab of the commercial vehicle, the system comprising: at least one display device disposed within the driver's cab and comprising at least one display unit being configured to display at least two different fields of view (A, B, C), wherein the at least two different fields of view are displayed on the at least one display device in a common image, and the at least one display device is configured to be arranged within the driver's cab of the commercial vehicle such that the longitudinal axis thereof is substantially horizontally aligned. 23. The system according to claim 22, wherein the at least one display device is configured to be substantially disposed upright on a driver's side and/or a co-driver's side. 24. The system according to claim 22, wherein the at least one display device is configured to be substantially disposed upright on a driver's side and/or a co-driver's side and to be pivot-ally disposed with respect to a horizontal plane. 25. The system according to claim 22, further comprising at least one image capture unit configured to capture image data representing the at least one field of view, wherein the at least one image capture unit is configured to be integrally formed with a mirror attached to the commercial vehicle, the mirror providing a prescribed field of view. 26. The system according to claim 22, wherein the system is configured to depict the different fields of view (A, B, C) on one or more display units overlapping each other. 27. The system according to claim 22, wherein the system is configured to be disposed on the co-driver's side within the driver's cab, wherein the at least two fields of view correspond to areas right next to the commercial vehicle in forward drive direction. 28. The system according to claim 22, wherein the system is configured to display fields of view of a roof mirror, ramp mirror, a wide-angle mirror and/or fender mirror on one or more dis-play units directly bordering each other, separate from each other and/or overlapping each other. 29. The system according to claim 28, wherein the system is configured to display the fields of view in accordance with vehicle parameters. 30. The system according to claim 22, wherein the system is configured to display adjacent fields of view directly bordering each other. 31. The system according to claim 22, wherein the at least one field of view contains the field of view of a left primary mirror and/or the field of view of a left wide-angle mirror and the field of view of a right primary mirror and/or the field of view of a right wide-angle mirror. 32. The system according to claim 31, wherein the system is adapted to depict the field of view of the left primary mirror and/or the field of view of the left wide-angle mirror on the left side of the at least one display unit. 33. The system according to claim 31, wherein the system is adapted to depict the field of view of the right primary mirror and/or the field of view of the right wide-angle mirror on the right side on the display unit. 34. The system according to claim 22, wherein the system is adapted to permanently depict the fields of view on the at least one display unit at the same position and with the same size. 35. The system according to claim 22, wherein the system is adapted to permanently depict the fields of view on the display unit at varying positions and/or with varying sizes. 36. The system according to claim 22, wherein the system is adapted to depict at least one additional viewing area in accordance with the vehicle speed and/or vehicle driving direction. 37. The system according to claim 36, wherein the system is adapted to display, with reference to the commercial vehicle, position information superimposed with at least one of the fields of view (A, B, C) or the at least one of the additional viewing areas. 38. The system according to claim 22, wherein the display device includes two, three or four display units, which are separated from each other. 39. The system according to claim 22, wherein the display device includes at least two image capture units and the display device is adapted to combine the field of view information for one to-be-depicted field of view from the field of view information of the at least two image capture units. 40. The system according to claim 22, wherein the display device includes at least two image capture units, which are adapted to sense redundant field of view information for one to-be-depicted field of view. 41. The system according to claim 22, wherein a first image capture unit having a first resolution for capturing a first angle of view and a second image capture unit having a second resolution for capturing a second angle of view, which is different from the first angle of view, are provided, and wherein the first resolution is higher than the second resolution, and wherein the two viewing areas captured by the image capture units are shown in a common display unit and do not substantially overlap, wherein the confluence portion of the field of view of a primary mirror and the field of view of a wide-angle mirror of the same vehicle side is shown, where-in preferably the first angle of view is smaller than the second image angle of view. 42. The system according to claim 22, further including a power supply device that is independent of an on-board power supply of the commercial vehicle.
System for visually depicting fields of view for a commercial vehicle within a driver's cab of the commercial vehicle, the system having at least one display device disposed within the driver's cab and having at least one display unit being configured to display at least one field of view, wherein the at least one display device is configured to be arranged within the driver's cab of the commercial vehicle such that the longitudinal axis thereof is substantially horizontally aligned.1. A system for visually depicting fields of view for a commercial vehicle within a driver's cab of the commercial vehicle, the system comprising: at least one display device disposed within the driver's cab and comprising at least one display unit being configured to display at least one field of view (A, B, C), wherein the at least one display device is configured to be arranged within the driver's cab (8) of the commercial vehicle such that the longitudinal axis thereof is substantially horizontally aligned. 2. The system according to claim 1, wherein the at least one display device is configured to be substantially disposed upright on a driver's side and/or a co-driver's side. 3. The system according to claim 1, wherein the at least one display device is configured to be substantially disposed upright on a driver's side and/or a co-driver's side and to be pivotally disposed with respect to the horizontal plane. 4. The system according to claim 1, wherein the at least on display device is configured to be disposed on a driver's side of the commercial vehicle and to depict a field of view on the at least one display unit, the field of view corresponding to an area left next to the commercial vehicle in forward driving direction. 5. The system according to claim 1, further comprising: at least one image capture unit configured to capture image data representing the at least one field of view, wherein the at least one image capture unit is configured to be integrally formed with a mirror attached to the commercial vehicle, the mirror providing a prescribed field of view. 6. The system according to claim 1, wherein the system is configured to display fields of view of a roof mirror, a wide-angle mirror and/or fender mirror on one or more display units directly bordering each other, separate from each other and/or overlapping each other on the at least one display device. 7. The system according to claim 6, wherein the system is configured to display the fields of view in accordance with vehicle parameters. 8. The system according to claim 1, wherein the system is configured to display adjacent fields of view (A, B, C) directly bordering each other on the at least one display device. 9. The system according to claim 1, wherein the at least one field of view (A, B, C) contains the field of view of a left primary mirror and/or the field of view of a left wide-angle mirror and the field of view of a right primary mirror and/or the field of view of a right wide-angle mirror. 10. The system according to claim 9, wherein the system is adapted to depict the field of view of the left primary mirror and/or the field of view of the left wide-angle mirror on the left side of the at least one display unit. 11. The system according to claim 9, wherein the system is adapted to depict the field of view of the right primary mirror and/or the field of view of the right wide-angle mirror on the right side on the display unit. 12. The system according to claim 10, wherein the system is adapted to depict the field of view of the right primary mirror and/or the field of view of the right wide-angle mirror on the right side on the display unit. 13. The system according to claim 1, wherein the system is adapted to permanently depict the fields of view (A, B, C) on the at least one display unit at the same position and with the same size. 14. The system according to claim 1, wherein the system is adapted to permanently depict the fields of view (A, B, C) on the at least one display unit at varying positions and/or with varying sizes. 15. The system according to claim 1, wherein the system is adapted to depict at least one additional viewing area in accordance with the vehicle speed and/or vehicle driving direction. 16. The system according to claim 14, wherein the system is adapted to display, with reference to the commercial vehicle, position information superimposed with at least one of the fields of view (A, B, C) or the at least one of the viewing areas. 17. The system according to claim 1, wherein the display device includes two, three or four display units, which are separated from each other. 18. The system according to claim 1, wherein the display device includes at least two image capture units and the system is adapted to combine the field of view information for one to-be-depicted field of view from the field of view information of the at least two image capture units. 19. The system according to claim 1, wherein the display device includes at least two image capture units, which are adapted to sense redundant field of view information for one to-be-depicted field of view (A, B, C). 20. The system according to claim 1, wherein a first image capture unit having a first resolution for capturing a first angle of view and a second image capture unit having a second resolution for capturing a second angle of view, which is different from the first angle of view, are provided, and wherein the first resolution is higher than the second resolution, and wherein the two viewing areas captured by the image capture units are shown in a common display unit and do not substantially overlap, wherein the confluence portion of the field of view of a primary mirror and the field of view of a wide-angle mirror of the same vehicle side is shown, where-in preferably the first angle of view is smaller than the second image angle of view. 21. The system according to claim 1, further including a power supply device that is independent of an on-board power supply of the commercial vehicle. 22. A system for visually depicting fields of view for a commercial vehicle within a driver's cab of the commercial vehicle, the system comprising: at least one display device disposed within the driver's cab and comprising at least one display unit being configured to display at least two different fields of view (A, B, C), wherein the at least two different fields of view are displayed on the at least one display device in a common image, and the at least one display device is configured to be arranged within the driver's cab of the commercial vehicle such that the longitudinal axis thereof is substantially horizontally aligned. 23. The system according to claim 22, wherein the at least one display device is configured to be substantially disposed upright on a driver's side and/or a co-driver's side. 24. The system according to claim 22, wherein the at least one display device is configured to be substantially disposed upright on a driver's side and/or a co-driver's side and to be pivot-ally disposed with respect to a horizontal plane. 25. The system according to claim 22, further comprising at least one image capture unit configured to capture image data representing the at least one field of view, wherein the at least one image capture unit is configured to be integrally formed with a mirror attached to the commercial vehicle, the mirror providing a prescribed field of view. 26. The system according to claim 22, wherein the system is configured to depict the different fields of view (A, B, C) on one or more display units overlapping each other. 27. The system according to claim 22, wherein the system is configured to be disposed on the co-driver's side within the driver's cab, wherein the at least two fields of view correspond to areas right next to the commercial vehicle in forward drive direction. 28. The system according to claim 22, wherein the system is configured to display fields of view of a roof mirror, ramp mirror, a wide-angle mirror and/or fender mirror on one or more dis-play units directly bordering each other, separate from each other and/or overlapping each other. 29. The system according to claim 28, wherein the system is configured to display the fields of view in accordance with vehicle parameters. 30. The system according to claim 22, wherein the system is configured to display adjacent fields of view directly bordering each other. 31. The system according to claim 22, wherein the at least one field of view contains the field of view of a left primary mirror and/or the field of view of a left wide-angle mirror and the field of view of a right primary mirror and/or the field of view of a right wide-angle mirror. 32. The system according to claim 31, wherein the system is adapted to depict the field of view of the left primary mirror and/or the field of view of the left wide-angle mirror on the left side of the at least one display unit. 33. The system according to claim 31, wherein the system is adapted to depict the field of view of the right primary mirror and/or the field of view of the right wide-angle mirror on the right side on the display unit. 34. The system according to claim 22, wherein the system is adapted to permanently depict the fields of view on the at least one display unit at the same position and with the same size. 35. The system according to claim 22, wherein the system is adapted to permanently depict the fields of view on the display unit at varying positions and/or with varying sizes. 36. The system according to claim 22, wherein the system is adapted to depict at least one additional viewing area in accordance with the vehicle speed and/or vehicle driving direction. 37. The system according to claim 36, wherein the system is adapted to display, with reference to the commercial vehicle, position information superimposed with at least one of the fields of view (A, B, C) or the at least one of the additional viewing areas. 38. The system according to claim 22, wherein the display device includes two, three or four display units, which are separated from each other. 39. The system according to claim 22, wherein the display device includes at least two image capture units and the display device is adapted to combine the field of view information for one to-be-depicted field of view from the field of view information of the at least two image capture units. 40. The system according to claim 22, wherein the display device includes at least two image capture units, which are adapted to sense redundant field of view information for one to-be-depicted field of view. 41. The system according to claim 22, wherein a first image capture unit having a first resolution for capturing a first angle of view and a second image capture unit having a second resolution for capturing a second angle of view, which is different from the first angle of view, are provided, and wherein the first resolution is higher than the second resolution, and wherein the two viewing areas captured by the image capture units are shown in a common display unit and do not substantially overlap, wherein the confluence portion of the field of view of a primary mirror and the field of view of a wide-angle mirror of the same vehicle side is shown, where-in preferably the first angle of view is smaller than the second image angle of view. 42. The system according to claim 22, further including a power supply device that is independent of an on-board power supply of the commercial vehicle.
2,400
8,079
8,079
13,978,736
2,413
Base station and UE and methods therein for broadcast in a wireless communication network. The method in the base station comprises determining ( 1201 a - c ) a set of transmission resources, out of a number of sets of transmission resources, based on a property associated with a synchronization signal of the base station, and further transmitting ( 1202 a - c ) the synchronization signal and/or system information, such as a MIB, in the determined set of transmission resources.
1-35. (canceled) 36. A method performed by a base station for broadcast in a wireless communication network, the method comprising: determining a set of transmission resources, out of a number of sets of transmission resources, based on a property associated with a synchronization signal of the base station; and transmitting at least one of the synchronization signal and system information in the determined set of transmission resources. 37. The method according to claim 36, wherein the property associated with the synchronization signal is a property which is configured differently for adjacent base stations, so that the same determining criterion used for determining sets of transmission resources in the adjacent base stations results in different sets of transmission resources being determined in the adjacent base stations, out of said number of sets of transmission resources. 38. The method according to claim 36, wherein the property relates to at least one of: a symbol sequence comprised in the synchronization signal; a scrambling code used on the synchronization signal; a transmission resource used for transmission of the synchronization signal. 39. The method according to claim 38, wherein the symbol sequence represents a cell identification number. 40. The method according to claim 36, wherein the determining based on the property comprises one or more of: performing a modulo operation on a symbol sequence number comprised in the synchronization signal; matching the property to a set of transmission resources, out of the number of sets of transmission resources, in accordance with a scheme for matching; determining which set of transmission resources, out of the number of sets of transmission resources, is associated with a sequence comprised in the synchronization signal, or with a number derived from a sequence comprised in the synchronization signal; determining which set of transmission resources, out of the number of sets of transmission resources, is associated with the scrambling code used on the synchronization signal; and determining which set of transmission resources, out of the number of sets of transmission resources, is associated with the transmission resources in which the synchronization signal is transmitted. 41. The method according to claim 36, wherein the synchronization signal is one or more of: a Primary Synchronization Signal (PSS); a Secondary Synchronization Signal (SSS); an Enhanced Synchronization Signal (ESS). 42. The method according to claim 36, wherein the transmission resources in the set of transmission resources are time-frequency resource elements in an OFDM type of communication system. 43. The method according to claim 36, wherein the remaining sets of transmission resources not used for transmitting of the synchronization signal or system information by the base station are allocated zero power by the base station. 44. The method according to claim 36, wherein the system information comprises a Master Information Block (MIB). 45. The method according to claim 36, wherein the determined set of transmission resources is positioned in a different subframe than the synchronization signal, when the determined set relates to system information. 46. The method according to claim 36, further comprising: determining a second set of transmission resources from out of a second number of sets of transmission resources, based on a property associated with a synchronization signal of the base station, thus having determined a first and a second set of transmission resources; and transmitting the synchronization signal in the first set of transmission resources and transmitting the system information in the second set of transmission resources. 47. The method according to claim 36, wherein the system information, when received by a User Equipment (UE) enables the UE to connect to the base station. 48. A base station for broadcast in a wireless communication network, the base station comprising: a determining unit, adapted to determine a set of transmission resources, out of a number of sets of transmission resources, based on a property associated with a synchronization signal of the base station; and a transmitting unit, adapted to transmit at least one of the synchronization signal and system information in the determined set of transmission resources. 49. The base station according to claim 48, wherein the property relates to at least one of: a symbol sequence comprised in the synchronization signal; a scrambling code used on the synchronization signal; and a transmission resource used for transmission of the synchronization signal. 50. The base station according to claim 48, wherein the transmission resources in the set of transmission resources are time-frequency resource elements in an OFDM type of communication system. 51. The base station according to claim 48, wherein the remaining sets of transmission resources not used for transmitting of the synchronization signal or system information by the base station are allocated zero power by the base station. 52. The base station according to claim 48, further adapted to: determine a second set of transmission resources from out of a second number of sets of transmission resources, based on a property associated with a synchronization signal of the base station, thereby having determined a first and a second set of transmission resources; and transmit the synchronization signal in one of the determined first and second sets of transmission resources and transmit the system information in the other one of the first and second sets of transmission resources. 53. A method performed by a User Equipment (UE) in a wireless communication system, for receiving information broadcasted from a base station, the method comprising: receiving a synchronization signal from the base station; determining a set of transmission resources, out of a number of sets of transmission resources, based on a property associated with the synchronization signal; and performing at least one of: determining a subframe boundary based on the determined set of transmission resources, when the determined set relates to the transmission resources of the synchronization signal; and receiving system information from the base station in the determined set of transmission resources, when the determined set relates to system information. 54. The method according to claim 53, wherein the property relates to at least one of: a symbol sequence comprised in the synchronization signal; a scrambling code used on the synchronization signal; a transmission resource used for transmission of the synchronization signal. 55. The method according to claim 54, wherein the symbol sequence represents a cell identification number. 56. The method according to claim 53, wherein the determining based on the property comprises one or more of: performing a modulo operation on a symbol sequence number comprised in the synchronization signal; matching the property to a set of transmission resources, out of the number of sets of transmission resources, in accordance with a scheme for matching; determining which set of transmission resources, out of the number of sets of transmission resources, is associated with a sequence comprised in the synchronization signal, or with a number derived from a sequence comprised in the synchronization signal; determining which set of transmission resources, out of the number of sets of transmission resources, is associated with the scrambling code used on the synchronization signal; and determining which set of transmission resources, out of the number of sets of transmission resources, is associated with the transmission resources in which the synchronization signal is received. 57. The method according to claim 53, wherein the synchronization signal is one or more of: a Primary Synchronization Signal, PSS; a Secondary Synchronization Signal, SSS; and an Enhanced Synchronization Signal, ESS. 58. The method according to claim 53, wherein the transmission resources in the set of transmission resources are time-frequency resource elements in an OFDM type of communication system. 59. The method according to claim 53, wherein the system information comprises a Master Information Block (MIB). 60. The method according to claim 53, wherein the determined set of transmission resources is positioned in a different subframe than the synchronization signal, when the determined set relates to system information. 61. The method according to claim 53, further comprising: determining a second set of transmission resources from out of a second number of sets of transmission resources, based on a property associated with a synchronization signal received from the base station, thus having determined a first and a second set of transmission resources; and determining a subframe boundary based on one of the determined first and second sets of transmission resources, and receiving the system information in the other one of the first and second sets of transmission resources. 62. The method according to claim 53, wherein the system information enables the UE to connect to the base station. 63. A User Equipment (UE) for receiving information broadcasted from a base station in a wireless communication system, the UE comprising: a receiving unit, adapted to receive a synchronization signal from the base station; a determining unit, adapted to determine a set of transmission resources, out of a number of sets of transmission resources, based on a property associated with the synchronization signal; and wherein the UE is further adapted to: determine a subframe boundary based on the determined set of transmission resources, when the determined set relates to the transmission resources of the synchronization signal; and receive system information from the base station in the determined set of transmission resources, when the determined set relates to system information. 64. The UE according to claim 63, wherein the property relates to at least one of: a symbol sequence comprised in the synchronization signal; a scrambling code used on the synchronization signal; and a transmission resource used for transmission of the synchronization signal. 65. The UE according to claim 63, wherein the transmission resources in the set of transmission resources are time-frequency resource elements in an OFDM type of communication system. 66. The UE according to claim 63, further adapted to: determine a second set of transmission resources from out of a second number of sets of transmission resources, based on a property associated with a synchronization signal received from the base station, thus being adapted to determine a first and a second set of transmission resources; and determine a subframe boundary based on one of the determined first and second sets of transmission resources, and to receive the system information in the other one of the first and second sets of transmission resources. 67. A computer-readable medium storing a computer program comprising program instructions that, when executed by a base station of a wireless communication network, configure the base station to: determine a set of transmission resources, out of a number of sets of transmission resources, based on a property associated with a synchronization signal of the base station; and transmit at least one of the synchronization signal and system information in the determined set of transmission resources. 68. A computer-readable medium storing a computer program comprising program instructions that, when executed by a User Equipment (UE) adapted for operation in a wireless communication network, configure the UE to: receive a synchronization signal from the base station; determine a set of transmission resources, out of a number of sets of transmission resources, based on a property associated with the synchronization signal; determine a subframe boundary based on the determined set of transmission resources, when the determined set relates to the transmission resources of the synchronization signal; and receive system information from the base station in the determined set of transmission resources, when the determined set relates to system information.
Base station and UE and methods therein for broadcast in a wireless communication network. The method in the base station comprises determining ( 1201 a - c ) a set of transmission resources, out of a number of sets of transmission resources, based on a property associated with a synchronization signal of the base station, and further transmitting ( 1202 a - c ) the synchronization signal and/or system information, such as a MIB, in the determined set of transmission resources.1-35. (canceled) 36. A method performed by a base station for broadcast in a wireless communication network, the method comprising: determining a set of transmission resources, out of a number of sets of transmission resources, based on a property associated with a synchronization signal of the base station; and transmitting at least one of the synchronization signal and system information in the determined set of transmission resources. 37. The method according to claim 36, wherein the property associated with the synchronization signal is a property which is configured differently for adjacent base stations, so that the same determining criterion used for determining sets of transmission resources in the adjacent base stations results in different sets of transmission resources being determined in the adjacent base stations, out of said number of sets of transmission resources. 38. The method according to claim 36, wherein the property relates to at least one of: a symbol sequence comprised in the synchronization signal; a scrambling code used on the synchronization signal; a transmission resource used for transmission of the synchronization signal. 39. The method according to claim 38, wherein the symbol sequence represents a cell identification number. 40. The method according to claim 36, wherein the determining based on the property comprises one or more of: performing a modulo operation on a symbol sequence number comprised in the synchronization signal; matching the property to a set of transmission resources, out of the number of sets of transmission resources, in accordance with a scheme for matching; determining which set of transmission resources, out of the number of sets of transmission resources, is associated with a sequence comprised in the synchronization signal, or with a number derived from a sequence comprised in the synchronization signal; determining which set of transmission resources, out of the number of sets of transmission resources, is associated with the scrambling code used on the synchronization signal; and determining which set of transmission resources, out of the number of sets of transmission resources, is associated with the transmission resources in which the synchronization signal is transmitted. 41. The method according to claim 36, wherein the synchronization signal is one or more of: a Primary Synchronization Signal (PSS); a Secondary Synchronization Signal (SSS); an Enhanced Synchronization Signal (ESS). 42. The method according to claim 36, wherein the transmission resources in the set of transmission resources are time-frequency resource elements in an OFDM type of communication system. 43. The method according to claim 36, wherein the remaining sets of transmission resources not used for transmitting of the synchronization signal or system information by the base station are allocated zero power by the base station. 44. The method according to claim 36, wherein the system information comprises a Master Information Block (MIB). 45. The method according to claim 36, wherein the determined set of transmission resources is positioned in a different subframe than the synchronization signal, when the determined set relates to system information. 46. The method according to claim 36, further comprising: determining a second set of transmission resources from out of a second number of sets of transmission resources, based on a property associated with a synchronization signal of the base station, thus having determined a first and a second set of transmission resources; and transmitting the synchronization signal in the first set of transmission resources and transmitting the system information in the second set of transmission resources. 47. The method according to claim 36, wherein the system information, when received by a User Equipment (UE) enables the UE to connect to the base station. 48. A base station for broadcast in a wireless communication network, the base station comprising: a determining unit, adapted to determine a set of transmission resources, out of a number of sets of transmission resources, based on a property associated with a synchronization signal of the base station; and a transmitting unit, adapted to transmit at least one of the synchronization signal and system information in the determined set of transmission resources. 49. The base station according to claim 48, wherein the property relates to at least one of: a symbol sequence comprised in the synchronization signal; a scrambling code used on the synchronization signal; and a transmission resource used for transmission of the synchronization signal. 50. The base station according to claim 48, wherein the transmission resources in the set of transmission resources are time-frequency resource elements in an OFDM type of communication system. 51. The base station according to claim 48, wherein the remaining sets of transmission resources not used for transmitting of the synchronization signal or system information by the base station are allocated zero power by the base station. 52. The base station according to claim 48, further adapted to: determine a second set of transmission resources from out of a second number of sets of transmission resources, based on a property associated with a synchronization signal of the base station, thereby having determined a first and a second set of transmission resources; and transmit the synchronization signal in one of the determined first and second sets of transmission resources and transmit the system information in the other one of the first and second sets of transmission resources. 53. A method performed by a User Equipment (UE) in a wireless communication system, for receiving information broadcasted from a base station, the method comprising: receiving a synchronization signal from the base station; determining a set of transmission resources, out of a number of sets of transmission resources, based on a property associated with the synchronization signal; and performing at least one of: determining a subframe boundary based on the determined set of transmission resources, when the determined set relates to the transmission resources of the synchronization signal; and receiving system information from the base station in the determined set of transmission resources, when the determined set relates to system information. 54. The method according to claim 53, wherein the property relates to at least one of: a symbol sequence comprised in the synchronization signal; a scrambling code used on the synchronization signal; a transmission resource used for transmission of the synchronization signal. 55. The method according to claim 54, wherein the symbol sequence represents a cell identification number. 56. The method according to claim 53, wherein the determining based on the property comprises one or more of: performing a modulo operation on a symbol sequence number comprised in the synchronization signal; matching the property to a set of transmission resources, out of the number of sets of transmission resources, in accordance with a scheme for matching; determining which set of transmission resources, out of the number of sets of transmission resources, is associated with a sequence comprised in the synchronization signal, or with a number derived from a sequence comprised in the synchronization signal; determining which set of transmission resources, out of the number of sets of transmission resources, is associated with the scrambling code used on the synchronization signal; and determining which set of transmission resources, out of the number of sets of transmission resources, is associated with the transmission resources in which the synchronization signal is received. 57. The method according to claim 53, wherein the synchronization signal is one or more of: a Primary Synchronization Signal, PSS; a Secondary Synchronization Signal, SSS; and an Enhanced Synchronization Signal, ESS. 58. The method according to claim 53, wherein the transmission resources in the set of transmission resources are time-frequency resource elements in an OFDM type of communication system. 59. The method according to claim 53, wherein the system information comprises a Master Information Block (MIB). 60. The method according to claim 53, wherein the determined set of transmission resources is positioned in a different subframe than the synchronization signal, when the determined set relates to system information. 61. The method according to claim 53, further comprising: determining a second set of transmission resources from out of a second number of sets of transmission resources, based on a property associated with a synchronization signal received from the base station, thus having determined a first and a second set of transmission resources; and determining a subframe boundary based on one of the determined first and second sets of transmission resources, and receiving the system information in the other one of the first and second sets of transmission resources. 62. The method according to claim 53, wherein the system information enables the UE to connect to the base station. 63. A User Equipment (UE) for receiving information broadcasted from a base station in a wireless communication system, the UE comprising: a receiving unit, adapted to receive a synchronization signal from the base station; a determining unit, adapted to determine a set of transmission resources, out of a number of sets of transmission resources, based on a property associated with the synchronization signal; and wherein the UE is further adapted to: determine a subframe boundary based on the determined set of transmission resources, when the determined set relates to the transmission resources of the synchronization signal; and receive system information from the base station in the determined set of transmission resources, when the determined set relates to system information. 64. The UE according to claim 63, wherein the property relates to at least one of: a symbol sequence comprised in the synchronization signal; a scrambling code used on the synchronization signal; and a transmission resource used for transmission of the synchronization signal. 65. The UE according to claim 63, wherein the transmission resources in the set of transmission resources are time-frequency resource elements in an OFDM type of communication system. 66. The UE according to claim 63, further adapted to: determine a second set of transmission resources from out of a second number of sets of transmission resources, based on a property associated with a synchronization signal received from the base station, thus being adapted to determine a first and a second set of transmission resources; and determine a subframe boundary based on one of the determined first and second sets of transmission resources, and to receive the system information in the other one of the first and second sets of transmission resources. 67. A computer-readable medium storing a computer program comprising program instructions that, when executed by a base station of a wireless communication network, configure the base station to: determine a set of transmission resources, out of a number of sets of transmission resources, based on a property associated with a synchronization signal of the base station; and transmit at least one of the synchronization signal and system information in the determined set of transmission resources. 68. A computer-readable medium storing a computer program comprising program instructions that, when executed by a User Equipment (UE) adapted for operation in a wireless communication network, configure the UE to: receive a synchronization signal from the base station; determine a set of transmission resources, out of a number of sets of transmission resources, based on a property associated with the synchronization signal; determine a subframe boundary based on the determined set of transmission resources, when the determined set relates to the transmission resources of the synchronization signal; and receive system information from the base station in the determined set of transmission resources, when the determined set relates to system information.
2,400
8,080
8,080
14,750,885
2,485
A method and user equipment for decoding a bitstream of video. The user equipment includes a transceiver and a decoder. The transceiver is configured to receive an encoded bitstream of video including a pixel block. The decoder includes processing circuitry configured to select, from among a plurality of vertical interpolation filters, one of a vertical one-dimensional filter and a vertical two-dimensional filter. The processing circuitry is also configured to select, from among a plurality of horizontal interpolation filters, one of a horizontal one-dimensional filter and a horizontal two-dimensional filter. The processing circuitry is also configured to use the selected vertical and horizontal interpolation filters to generate at least one pixel value by interpolating pixels of the pixel block. The processing circuitry is also configured to perform prediction decoding using the at least one pixel value to restore the video.
1. A user equipment, comprising: a transceiver configured to receive an encoded bitstream of video including a pixel block; and a decoder comprising processing circuitry configured to: select, from among a plurality of vertical interpolation filters, one of a vertical one-dimensional filter and a vertical two-dimensional filter, select, from among a plurality of horizontal interpolation filters, one of a horizontal one-dimensional filter and a horizontal two-dimensional filter, use the selected vertical and horizontal interpolation filters to generate at least one pixel value by interpolating pixels of the pixel block, and perform prediction decoding using the at least one pixel value to restore the video. 2. The user equipment of claim 1, wherein the horizontal and vertical two-dimensional filters use an M×N neighborhood of samples of the pixel block, where M is a number of columns, and where N is a number of rows. 3. The user equipment of claim 2, wherein the M×N neighborhood of samples associated with the horizontal two-dimensional filter is different from the M×N neighborhood of samples associated with the vertical two-dimensional filter. 4. The user equipment of claim 1, wherein the processing circuitry is further configured to: determine whether the pixel block is uni-predicted or bi-predicted; responsive to the pixel block being uni-predicted, interpolate the pixels of the pixel block using the vertical and horizontal one-dimensional filters; and responsive to the encoded bitstream being bi-predicted, interpolate the pixels of the pixel block using the vertical and horizontal two-dimensional filters. 5. The user equipment of claim 2, wherein the processing circuitry is configured to use the selected vertical and horizontal interpolation filters in succession. 6. The user equipment of claim 1, wherein the processing circuitry is further configured to: identify a flag indicating whether to use two-dimensional interpolation; select, from among the plurality of vertical interpolation filters, one of the vertical one-dimensional filter and the vertical two-dimensional filter based on the flag, select, from among the plurality of horizontal interpolation filters, one of the horizontal one-dimensional filter and the horizontal two-dimensional filter based on the flag. 7. The user equipment of claim 1, wherein the horizontal two-dimensional filter for horizontal interpolation is defined as: H = [ α 1  h 1 α 2  h 2 ⋮ α N  h N ] , where α1, α2, . . . , αN are scalar values, h1, h2, . . . , hN are one-dimensional filters of at most length N, where h1, h2, . . . , hN are each selected to include a phase shift of 0, and where α1, α2, . . . , αN are selected to include a phase shift of 0. 8. The user equipment of claim 1, wherein the vertical two-dimensional filter for vertical interpolation is defined as: V=β 1 v 1β2 v 2 . . . βM v M, where β1, β2, . . . , βM are scalar values, v1, v2, . . . , vN are one-dimensional filters of at most length M, where v1, v2, . . . , vN are each selected to include a phase shift of φ, and where β1, β2, . . . , βM are selected to include a phase shift of 0. 9. A user equipment, comprising: an encoder comprising processing circuitry configured to: select, from among a plurality of vertical interpolation filters, one of a vertical one-dimensional filter and a vertical two-dimensional filter, select, from among a plurality of horizontal interpolation filters, one of a horizontal one-dimensional filter and a horizontal two-dimensional filter, use the selected vertical and horizontal interpolation filters to generate at least one pixel value by interpolating pixels of a pixel block, and perform prediction encoding using the at least one pixel value to generate an encoded bitstream of video; and a transceiver configured to send the encoded bitstream of video. 10. The user equipment of claim 9, wherein the horizontal and vertical two-dimensional filters use an M×N neighborhood of samples of the pixel block, where M is a number of columns, and where N is a number of rows. 11. The user equipment of claim 10, wherein the M×N neighborhood of samples associated with the horizontal two-dimensional filter is different from the M×N neighborhood of samples associated with the vertical two-dimensional filter. 12. The user equipment of claim 9, wherein the processing circuitry is further configured to: determine whether the pixel block is uni-predicted or bi-predicted; responsive to the pixel block being uni-predicted, interpolate the pixels of the pixel block using the vertical and horizontal one-dimensional filters; and responsive to the encoded bitstream being bi-predicted, interpolate the pixels of the pixel block using the vertical and horizontal two-dimensional filters. 13. The user equipment of claim 10, wherein the processing circuitry is configured to use the selected vertical and horizontal interpolation filters in succession. 14. The user equipment of claim 9, wherein the processing circuitry is further configured to: identify a flag indicating whether to use two-dimensional interpolation; select, from among the plurality of vertical interpolation filters, one of the vertical one-dimensional filter and the vertical two-dimensional filter based on the flag, select, from among the plurality of horizontal interpolation filters, one of the horizontal one-dimensional filter and the horizontal two-dimensional filter based on the flag. 15. The user equipment of claim 9, wherein the horizontal two-dimensional filter for horizontal interpolation is defined as: H = [ α 1  h 1 α 2  h 2 ⋮ α N  h N ] , where α1, α2, . . . , αN are scalar values, h1, h2, . . . , hN are one-dimensional filters of at most length N, where h1, h2, . . . , hN are each selected to include a phase shift of 0, and where α1, α2, . . . , αN are selected to include a phase shift of 0. 16. The user equipment of claim 9, wherein the vertical two-dimensional filter for vertical interpolation is defined as: V=β 1 v 1β2 v 2 . . . βM v M, where β1, β2, . . . , βM are scalar values, v1, v2, . . . , vN are one-dimensional filters of at most length M, where v1, v2, . . . , vN are each selected to include a phase shift of φ, and where β1, β2, . . . , βM are selected to include a phase shift of 0. 17. A method for decoding an encoded bitstream of video, the method comprising: receiving the encoded bitstream of video including a pixel block; selecting, from among a plurality of vertical interpolation filters, one of a vertical one-dimensional filter and a vertical two-dimensional filter; selecting, from among a plurality of horizontal interpolation filters, one of a horizontal one-dimensional filter and a horizontal two-dimensional filter; using the selected vertical and horizontal interpolation filters to generate at least one pixel value by interpolating pixels of the pixel block; and performing prediction decoding using the at least one pixel value to restore the video. 18. The method of claim 17, wherein the horizontal and vertical two-dimensional filters use an M×N neighborhood of samples of the pixel block, where M is a number of columns, and where N is a number of rows. 19. The method of claim 18, wherein the M×N neighborhood of samples associated with the horizontal two-dimensional filter is different from the M×N neighborhood of samples associated with the vertical two-dimensional filter. 20. The method of claim 17, further comprising: determining whether the pixel block is uni-predicted or bi-predicted; responsive to the pixel block being uni-predicted, interpolating the pixels of the pixel block using the vertical and horizontal one-dimensional filters; and responsive to the encoded bitstream being bi-predicted, interpolating the pixels of the pixel block using the vertical and horizontal two-dimensional filters.
A method and user equipment for decoding a bitstream of video. The user equipment includes a transceiver and a decoder. The transceiver is configured to receive an encoded bitstream of video including a pixel block. The decoder includes processing circuitry configured to select, from among a plurality of vertical interpolation filters, one of a vertical one-dimensional filter and a vertical two-dimensional filter. The processing circuitry is also configured to select, from among a plurality of horizontal interpolation filters, one of a horizontal one-dimensional filter and a horizontal two-dimensional filter. The processing circuitry is also configured to use the selected vertical and horizontal interpolation filters to generate at least one pixel value by interpolating pixels of the pixel block. The processing circuitry is also configured to perform prediction decoding using the at least one pixel value to restore the video.1. A user equipment, comprising: a transceiver configured to receive an encoded bitstream of video including a pixel block; and a decoder comprising processing circuitry configured to: select, from among a plurality of vertical interpolation filters, one of a vertical one-dimensional filter and a vertical two-dimensional filter, select, from among a plurality of horizontal interpolation filters, one of a horizontal one-dimensional filter and a horizontal two-dimensional filter, use the selected vertical and horizontal interpolation filters to generate at least one pixel value by interpolating pixels of the pixel block, and perform prediction decoding using the at least one pixel value to restore the video. 2. The user equipment of claim 1, wherein the horizontal and vertical two-dimensional filters use an M×N neighborhood of samples of the pixel block, where M is a number of columns, and where N is a number of rows. 3. The user equipment of claim 2, wherein the M×N neighborhood of samples associated with the horizontal two-dimensional filter is different from the M×N neighborhood of samples associated with the vertical two-dimensional filter. 4. The user equipment of claim 1, wherein the processing circuitry is further configured to: determine whether the pixel block is uni-predicted or bi-predicted; responsive to the pixel block being uni-predicted, interpolate the pixels of the pixel block using the vertical and horizontal one-dimensional filters; and responsive to the encoded bitstream being bi-predicted, interpolate the pixels of the pixel block using the vertical and horizontal two-dimensional filters. 5. The user equipment of claim 2, wherein the processing circuitry is configured to use the selected vertical and horizontal interpolation filters in succession. 6. The user equipment of claim 1, wherein the processing circuitry is further configured to: identify a flag indicating whether to use two-dimensional interpolation; select, from among the plurality of vertical interpolation filters, one of the vertical one-dimensional filter and the vertical two-dimensional filter based on the flag, select, from among the plurality of horizontal interpolation filters, one of the horizontal one-dimensional filter and the horizontal two-dimensional filter based on the flag. 7. The user equipment of claim 1, wherein the horizontal two-dimensional filter for horizontal interpolation is defined as: H = [ α 1  h 1 α 2  h 2 ⋮ α N  h N ] , where α1, α2, . . . , αN are scalar values, h1, h2, . . . , hN are one-dimensional filters of at most length N, where h1, h2, . . . , hN are each selected to include a phase shift of 0, and where α1, α2, . . . , αN are selected to include a phase shift of 0. 8. The user equipment of claim 1, wherein the vertical two-dimensional filter for vertical interpolation is defined as: V=β 1 v 1β2 v 2 . . . βM v M, where β1, β2, . . . , βM are scalar values, v1, v2, . . . , vN are one-dimensional filters of at most length M, where v1, v2, . . . , vN are each selected to include a phase shift of φ, and where β1, β2, . . . , βM are selected to include a phase shift of 0. 9. A user equipment, comprising: an encoder comprising processing circuitry configured to: select, from among a plurality of vertical interpolation filters, one of a vertical one-dimensional filter and a vertical two-dimensional filter, select, from among a plurality of horizontal interpolation filters, one of a horizontal one-dimensional filter and a horizontal two-dimensional filter, use the selected vertical and horizontal interpolation filters to generate at least one pixel value by interpolating pixels of a pixel block, and perform prediction encoding using the at least one pixel value to generate an encoded bitstream of video; and a transceiver configured to send the encoded bitstream of video. 10. The user equipment of claim 9, wherein the horizontal and vertical two-dimensional filters use an M×N neighborhood of samples of the pixel block, where M is a number of columns, and where N is a number of rows. 11. The user equipment of claim 10, wherein the M×N neighborhood of samples associated with the horizontal two-dimensional filter is different from the M×N neighborhood of samples associated with the vertical two-dimensional filter. 12. The user equipment of claim 9, wherein the processing circuitry is further configured to: determine whether the pixel block is uni-predicted or bi-predicted; responsive to the pixel block being uni-predicted, interpolate the pixels of the pixel block using the vertical and horizontal one-dimensional filters; and responsive to the encoded bitstream being bi-predicted, interpolate the pixels of the pixel block using the vertical and horizontal two-dimensional filters. 13. The user equipment of claim 10, wherein the processing circuitry is configured to use the selected vertical and horizontal interpolation filters in succession. 14. The user equipment of claim 9, wherein the processing circuitry is further configured to: identify a flag indicating whether to use two-dimensional interpolation; select, from among the plurality of vertical interpolation filters, one of the vertical one-dimensional filter and the vertical two-dimensional filter based on the flag, select, from among the plurality of horizontal interpolation filters, one of the horizontal one-dimensional filter and the horizontal two-dimensional filter based on the flag. 15. The user equipment of claim 9, wherein the horizontal two-dimensional filter for horizontal interpolation is defined as: H = [ α 1  h 1 α 2  h 2 ⋮ α N  h N ] , where α1, α2, . . . , αN are scalar values, h1, h2, . . . , hN are one-dimensional filters of at most length N, where h1, h2, . . . , hN are each selected to include a phase shift of 0, and where α1, α2, . . . , αN are selected to include a phase shift of 0. 16. The user equipment of claim 9, wherein the vertical two-dimensional filter for vertical interpolation is defined as: V=β 1 v 1β2 v 2 . . . βM v M, where β1, β2, . . . , βM are scalar values, v1, v2, . . . , vN are one-dimensional filters of at most length M, where v1, v2, . . . , vN are each selected to include a phase shift of φ, and where β1, β2, . . . , βM are selected to include a phase shift of 0. 17. A method for decoding an encoded bitstream of video, the method comprising: receiving the encoded bitstream of video including a pixel block; selecting, from among a plurality of vertical interpolation filters, one of a vertical one-dimensional filter and a vertical two-dimensional filter; selecting, from among a plurality of horizontal interpolation filters, one of a horizontal one-dimensional filter and a horizontal two-dimensional filter; using the selected vertical and horizontal interpolation filters to generate at least one pixel value by interpolating pixels of the pixel block; and performing prediction decoding using the at least one pixel value to restore the video. 18. The method of claim 17, wherein the horizontal and vertical two-dimensional filters use an M×N neighborhood of samples of the pixel block, where M is a number of columns, and where N is a number of rows. 19. The method of claim 18, wherein the M×N neighborhood of samples associated with the horizontal two-dimensional filter is different from the M×N neighborhood of samples associated with the vertical two-dimensional filter. 20. The method of claim 17, further comprising: determining whether the pixel block is uni-predicted or bi-predicted; responsive to the pixel block being uni-predicted, interpolating the pixels of the pixel block using the vertical and horizontal one-dimensional filters; and responsive to the encoded bitstream being bi-predicted, interpolating the pixels of the pixel block using the vertical and horizontal two-dimensional filters.
2,400
8,081
8,081
14,674,225
2,432
A method and system for providing invitation links with enhanced protection are presented. The method includes sending, to at least one invitee, at least one invitation link for accessing the protected resource, wherein the at least one invitation link includes a secret invitation code encoded therein, wherein the secret invitation code is unique to each invitee, the invitation link is sent to the at least one invitee through a primary communication channel; upon detecting an attempt to access the at least one invitation link, determining whether the encoded secret invitation code matches a known secret invitation code; upon determining that the secret invitation code matches the known secret invitation code, performing a verification process to authenticate the invitee via a secondary channel of communication; and upon determining that the verification process has been passed, granting access to the protected resource.
1. A method for providing invitation links to access a protected resource, comprising: sending, to at least one invitee, at least one invitation link for accessing the protected resource, wherein the at least one invitation link includes a secret invitation code encoded therein, wherein the secret invitation code is unique to each invitee, the invitation link is sent to the at least one invitee through a primary communication channel; upon detecting an attempt to access the at least one invitation link, determining whether the encoded secret invitation code matches a known secret invitation code; upon determining that the secret invitation code matches the known secret invitation code, performing a verification process to authenticate the invitee via a secondary channel of communication; and upon determining that the verification process has been passed, granting access to the protected resource. 2. The method of claim 1, wherein upon determining that the secret invitation code matches the known secret invitation code further comprising: determining based on the invitation code and verification provisions, if a verification process is required. 3. The method of claim 2, wherein the verification provisions include at least a verification requirement set for the invitee and an expiration time of the matching invitation link. 4. The method of claim 1, wherein the primary communication channel is different than the secondary communication channel. 5. The method of claim 1, wherein the verification process further comprises: generating a verification challenge; sending a verification message including the verification challenge via the secondary communication channel; and upon receiving a valid response to the verification challenge, determining that the verification process has been passed. 6. The method of claim 5, wherein the verification challenge includes any one of: a random number, a temporary link, a voice prompt, and a token. 7. The method of claim 1, wherein granting access to the protected resource further comprises: sending a persistent cookie to the invitee device. 8. The method of claim 7, wherein upon subsequent access attempts to the invitation link further comprises: determining if a valid persistent security cookie has been received; and upon determining that the valid persistent security cookie has been received, bypassing the verification challenge, identifying the invitee device as trusted, and granting access to the protected resource. 9. The method of claim 8, further comprising: identifying the invitee device as untrusted after a predefined period of time. 10. The method of claim 1, further comprising: setting a maximum usage counter being decreased for each access granted to the protected resource; upon detecting an attempt to access the protected resource, determining whether the maximum usage counter is greater than zero; and upon determining that the maximum usage counter is not greater than zero, revoking the invitation link. 11. The method of claim 5, further comprising: determining if the invitee device meets at least one pre-admission security check requirement; and upon determining that the invitee device does not meet the at least one pre-admission security check requirement, determining that the verification challenge has not been passed. 12. The method of claim 1, wherein the at least one invitation link is generated and sent based on a collaboration policy. 13. The method of claim 11, wherein the at least one invitation link is generated and sent upon compliance with a collaboration policy. 14. The method of claim 13, wherein the collaboration policy defines a set of invitation permissions for external users outside of a predefined group of users, wherein the set of invitation permissions include at least one of: a permission level, a required verification, and at least one challenge restrictions. 15. The method of claim 1, wherein the protected resource is at least one of: a file and folder stored in a hybrid cloud storage system 16. A non-transitory computer readable medium having stored thereon instructions for causing one or more processing units to execute the method according to claim 1. 17. A system for providing invitation links with enhanced protection, comprising: a processing unit; and a memory, the memory containing instructions that, when executed by the processing unit, configure the system to: send, to at least one invitee, at least one invitation link for accessing a protected resource, wherein the at least one invitation link includes a secret invitation code encoded therein, wherein the secret invitation code is unique to each invitee, the invitation link is sent to the at least one invitee through a primary communication channel; upon detecting an attempt to access the at least one invitation link, determine whether the encoded secret invitation code matches a known secret invitation code; upon determining that the secret invitation code matches the known secret invitation code, perform a verification process to authenticate the invitee via a secondary channel of communication; and upon determining that the verification process has been passed, grant access to the protected resource. 18. The system of claim 17, wherein when performing the verification process the system is further configured to: generate a verification challenge; send a verification message including the verification challenge via the secondary communication channel; and upon receiving a valid response to the verification challenge, determine that the verification process has been passed. 19. The system of claim 17, wherein upon subsequent access attempts to the invitation link, the system is further configured to: determine if a valid persistent security cookie has been received; and upon determining that the valid persistent security cookie has been received, bypass the verification challenge, identify the invitee device as trusted, and grant access to the protected resource. 20. A method for generating invitation links with enhanced protection, comprising: determining a protected resource to which the invitation link will provide access, wherein the protected resource is identified by a protected resource identifier; generating a secret invitation code being unique for each invitee; encoding the secret invitation code and the protected resource identifier in the invitation link; and storing the generated secret invitation code and the invitation link. 21. The method of claim 20, wherein the verification challenge includes any one of: a random number, a temporary link, a voice prompt, and a token. 22. A system for generating invitation links with enhanced protection, comprising: a processing unit; and a memory, the memory containing instructions that, when executed by the processing unit, configure the system to: determine a protected resource to which the invitation link will provide access, wherein the protected resource is identified by a protected resource identifier; generate a secret invitation code being unique for each invitee; encode the secret invitation code and the protected resource identifier in the invitation link; store the generated secret invitation code and the invitation link. 23. A method for a secured registration process, comprising: sending, to at least one invitee, at least one invitation link for registering for a service, wherein the at least one invitation link includes a secret invitation code encoded therein, wherein the secret invitation code is unique to each invitee, the at least one invitation link is sent to the at least one invitee through a primary communication channel; upon detecting an attempt to access the at least one invitation link, determining whether the encoded secret invitation code matches a known secret invitation code; upon determining that the known secret invitation code is found, displaying a registration process; and performing a verification process to authenticate the invitee via a secondary channel of communication. 24. The method of claim 23, wherein the verification process further comprises: generating a verification challenge; sending a verification message including the verification challenge via the secondary communication channel; and upon receiving a valid response to the verification challenge, determining that the verification process has been passed. 25. The method of claim 24, wherein the service is at least a cloud storage service. 26. A system for a secured registration process, comprising: a processing unit; and a memory, the memory containing instructions that, when executed by the processing unit, configure the system to: send, to at least one invitee, at least one invitation link for registering for a service, wherein the at least one invitation link includes a secret invitation code encoded therein, wherein the secret invitation code is unique to each invitee, the at least one invitation link is sent to the at least one invitee through a primary communication channel; upon detecting an attempt to access the at least one invitation link, determine whether the encoded secret invitation code matches a known secret invitation code; upon determining that the known secret invitation code is found, display a registration process; and perform a verification process to authenticate the invitee via a secondary channel of communication. 27. The system of claim 26, wherein when performing the verification process the system is further configured to: generate a verification challenge; send a verification message including the verification challenge via the secondary communication channel; and upon receiving a valid response to the verification challenge, determine that the verification process has been passed.
A method and system for providing invitation links with enhanced protection are presented. The method includes sending, to at least one invitee, at least one invitation link for accessing the protected resource, wherein the at least one invitation link includes a secret invitation code encoded therein, wherein the secret invitation code is unique to each invitee, the invitation link is sent to the at least one invitee through a primary communication channel; upon detecting an attempt to access the at least one invitation link, determining whether the encoded secret invitation code matches a known secret invitation code; upon determining that the secret invitation code matches the known secret invitation code, performing a verification process to authenticate the invitee via a secondary channel of communication; and upon determining that the verification process has been passed, granting access to the protected resource.1. A method for providing invitation links to access a protected resource, comprising: sending, to at least one invitee, at least one invitation link for accessing the protected resource, wherein the at least one invitation link includes a secret invitation code encoded therein, wherein the secret invitation code is unique to each invitee, the invitation link is sent to the at least one invitee through a primary communication channel; upon detecting an attempt to access the at least one invitation link, determining whether the encoded secret invitation code matches a known secret invitation code; upon determining that the secret invitation code matches the known secret invitation code, performing a verification process to authenticate the invitee via a secondary channel of communication; and upon determining that the verification process has been passed, granting access to the protected resource. 2. The method of claim 1, wherein upon determining that the secret invitation code matches the known secret invitation code further comprising: determining based on the invitation code and verification provisions, if a verification process is required. 3. The method of claim 2, wherein the verification provisions include at least a verification requirement set for the invitee and an expiration time of the matching invitation link. 4. The method of claim 1, wherein the primary communication channel is different than the secondary communication channel. 5. The method of claim 1, wherein the verification process further comprises: generating a verification challenge; sending a verification message including the verification challenge via the secondary communication channel; and upon receiving a valid response to the verification challenge, determining that the verification process has been passed. 6. The method of claim 5, wherein the verification challenge includes any one of: a random number, a temporary link, a voice prompt, and a token. 7. The method of claim 1, wherein granting access to the protected resource further comprises: sending a persistent cookie to the invitee device. 8. The method of claim 7, wherein upon subsequent access attempts to the invitation link further comprises: determining if a valid persistent security cookie has been received; and upon determining that the valid persistent security cookie has been received, bypassing the verification challenge, identifying the invitee device as trusted, and granting access to the protected resource. 9. The method of claim 8, further comprising: identifying the invitee device as untrusted after a predefined period of time. 10. The method of claim 1, further comprising: setting a maximum usage counter being decreased for each access granted to the protected resource; upon detecting an attempt to access the protected resource, determining whether the maximum usage counter is greater than zero; and upon determining that the maximum usage counter is not greater than zero, revoking the invitation link. 11. The method of claim 5, further comprising: determining if the invitee device meets at least one pre-admission security check requirement; and upon determining that the invitee device does not meet the at least one pre-admission security check requirement, determining that the verification challenge has not been passed. 12. The method of claim 1, wherein the at least one invitation link is generated and sent based on a collaboration policy. 13. The method of claim 11, wherein the at least one invitation link is generated and sent upon compliance with a collaboration policy. 14. The method of claim 13, wherein the collaboration policy defines a set of invitation permissions for external users outside of a predefined group of users, wherein the set of invitation permissions include at least one of: a permission level, a required verification, and at least one challenge restrictions. 15. The method of claim 1, wherein the protected resource is at least one of: a file and folder stored in a hybrid cloud storage system 16. A non-transitory computer readable medium having stored thereon instructions for causing one or more processing units to execute the method according to claim 1. 17. A system for providing invitation links with enhanced protection, comprising: a processing unit; and a memory, the memory containing instructions that, when executed by the processing unit, configure the system to: send, to at least one invitee, at least one invitation link for accessing a protected resource, wherein the at least one invitation link includes a secret invitation code encoded therein, wherein the secret invitation code is unique to each invitee, the invitation link is sent to the at least one invitee through a primary communication channel; upon detecting an attempt to access the at least one invitation link, determine whether the encoded secret invitation code matches a known secret invitation code; upon determining that the secret invitation code matches the known secret invitation code, perform a verification process to authenticate the invitee via a secondary channel of communication; and upon determining that the verification process has been passed, grant access to the protected resource. 18. The system of claim 17, wherein when performing the verification process the system is further configured to: generate a verification challenge; send a verification message including the verification challenge via the secondary communication channel; and upon receiving a valid response to the verification challenge, determine that the verification process has been passed. 19. The system of claim 17, wherein upon subsequent access attempts to the invitation link, the system is further configured to: determine if a valid persistent security cookie has been received; and upon determining that the valid persistent security cookie has been received, bypass the verification challenge, identify the invitee device as trusted, and grant access to the protected resource. 20. A method for generating invitation links with enhanced protection, comprising: determining a protected resource to which the invitation link will provide access, wherein the protected resource is identified by a protected resource identifier; generating a secret invitation code being unique for each invitee; encoding the secret invitation code and the protected resource identifier in the invitation link; and storing the generated secret invitation code and the invitation link. 21. The method of claim 20, wherein the verification challenge includes any one of: a random number, a temporary link, a voice prompt, and a token. 22. A system for generating invitation links with enhanced protection, comprising: a processing unit; and a memory, the memory containing instructions that, when executed by the processing unit, configure the system to: determine a protected resource to which the invitation link will provide access, wherein the protected resource is identified by a protected resource identifier; generate a secret invitation code being unique for each invitee; encode the secret invitation code and the protected resource identifier in the invitation link; store the generated secret invitation code and the invitation link. 23. A method for a secured registration process, comprising: sending, to at least one invitee, at least one invitation link for registering for a service, wherein the at least one invitation link includes a secret invitation code encoded therein, wherein the secret invitation code is unique to each invitee, the at least one invitation link is sent to the at least one invitee through a primary communication channel; upon detecting an attempt to access the at least one invitation link, determining whether the encoded secret invitation code matches a known secret invitation code; upon determining that the known secret invitation code is found, displaying a registration process; and performing a verification process to authenticate the invitee via a secondary channel of communication. 24. The method of claim 23, wherein the verification process further comprises: generating a verification challenge; sending a verification message including the verification challenge via the secondary communication channel; and upon receiving a valid response to the verification challenge, determining that the verification process has been passed. 25. The method of claim 24, wherein the service is at least a cloud storage service. 26. A system for a secured registration process, comprising: a processing unit; and a memory, the memory containing instructions that, when executed by the processing unit, configure the system to: send, to at least one invitee, at least one invitation link for registering for a service, wherein the at least one invitation link includes a secret invitation code encoded therein, wherein the secret invitation code is unique to each invitee, the at least one invitation link is sent to the at least one invitee through a primary communication channel; upon detecting an attempt to access the at least one invitation link, determine whether the encoded secret invitation code matches a known secret invitation code; upon determining that the known secret invitation code is found, display a registration process; and perform a verification process to authenticate the invitee via a secondary channel of communication. 27. The system of claim 26, wherein when performing the verification process the system is further configured to: generate a verification challenge; send a verification message including the verification challenge via the secondary communication channel; and upon receiving a valid response to the verification challenge, determine that the verification process has been passed.
2,400
8,082
8,082
15,786,310
2,457
A personalization framework is provided. In example embodiments, a machine, including processing circuitry and memory, determines, based on interaction of a user with a virtual personal assistant at one or more client devices associated with an account of the user, a plurality of inferences about the user. The machine stores the plurality of inferences in an inference store associated with the virtual personal assistant. The machine stores user consent data representing whether the user provided consent for a module to access at least a portion of the inferences in the inference store. The machine receives, from the module, a request for a specified inference from the inference store. The machine verifies the user consent data associated with the specified inference and the module. The machine provides the specified inference to the module in response to verifying the user consent data.
1. A system comprising: processing circuitry; and memory storing instructions which, when executed by the processing circuitry, cause the processing circuitry to perform operations comprising: determining, based on interaction of a user with a virtual personal assistant at one or more client devices associated with an account of the user, a plurality of inferences about the user; storing the plurality of inferences in an inference store associated with the virtual personal assistant; storing user consent data representing whether the user provided consent for a module to access at least a portion of the inferences in the inference store; receiving, from the module, a request for a specified inference from the inference store; verifying the user consent data associated with the specified inference and the module; and providing the specified inference to the module in response to verifying the user consent data. 2. The system of claim 1, wherein the module comprise a skill of a smart speaker device, an application of a mobile phone or tablet computer, or a page accessible via a browser. 3. The system of claim 1, wherein the virtual personal assistant is native to the one or more client devices, and wherein the module is not native to the one or more client devices. 4. The system of claim 1, the operations further comprising: generating, via the module, a new inference about the user; prompting the user for permission to share the inference with the inference store and for permission to share the inference with other modules via the inference store; providing the new inference to the inference store upon receiving the permission to share the inference with the inference store; and storing, in the user consent data, the permission to share the inference with other modules via the inference store. 5. The system of claim 1, wherein the plurality of inferences comprise data about one or more of: user interests, user tastes, user habits, and repeated user activities. 6. The system of claim 1, the operations further comprising: installing the module at a first client device from among the one or more client devices; and providing a prompt, to the user, for the user consent data during installation of the module, wherein the prompt identifies the specified inference. 7. The system of claim 1, the operations further comprising: providing a prompt, to the user, for the user consent data in response to receiving, from the module, the request for the specified inference from the inference store, wherein the prompt identifies the specified inference. 8. The system of claim 1, wherein determining the plurality of inferences about the user comprises: accessing interaction data of the user with the virtual personal assistant; and computing a first inference for the plurality of inferences based on the interaction data. 9. The system of claim 8, the operations further comprising: prompting the user to verify or modify the first inference; receiving a verification or modification of the first inference; and storing the received verification or modification of the first inference. 10. A non-transitory machine-readable medium storing instructions which, when executed by processing circuitry of at least one machine, cause the processing circuitry to perform operations comprising: determining, based on interaction of a user with a virtual personal assistant at one or more client devices associated with an account of the user, a plurality of inferences about the user; storing the plurality of inferences in an inference store associated with the virtual personal assistant; storing user consent data representing whether the user provided consent for a module to access at least a portion of the inferences in the inference store; receiving, from the module, a request for a specified inference from the inference store; verifying the user consent data associated with the specified inference and the module; and providing the specified inference to the module in response to verifying the user consent data. 11. The machine-readable medium of claim 10, wherein the module comprise a skill of a smart speaker device, an application of a mobile phone or tablet computer, or a page accessible via a browser. 12. The machine-readable medium of claim 10, wherein the virtual personal assistant is native to the one or more client devices, and wherein the module is not native to the one or more client devices. 13. The machine-readable medium of claim 10, the operations further comprising: generating, via the module, a new inference about the user; prompting the user for permission to share the inference with the inference store and for permission to share the inference with other modules via the inference store; providing the new inference to the inference store upon receiving the permission to share the inference with the inference store; and storing, in the user consent data, the permission to share the inference with other modules via the inference store. 14. The machine-readable medium of claim 10, wherein the plurality of inferences comprise data about one or more of: user interests, user tastes, user habits, and repeated user activities. 15. The machine-readable medium of claim 10, the operations further comprising: installing the module at a first client device from among the one or more client devices; and providing a prompt, to the user, for the user consent data during installation of the module, wherein the prompt identifies the specified inference. 16. The machine-readable medium of claim 10, the operations further comprising: providing a prompt, to the user, for the user consent data in response to receiving, from the module, the request for the specified inference from the inference store, wherein the prompt identifies the specified inference. 17. A method comprising: determining, using processing circuitry of at least one machine, based on interaction of a user with a virtual personal assistant at one or more client devices associated with an account of the user, a plurality of inferences about the user; storing the plurality of inferences in an inference store associated with the virtual personal assistant; storing user consent data representing whether the user provided consent for a module to access at least a portion of the inferences in the inference store; receiving, from the module, a request for a specified inference from the inference store; verifying the user consent data associated with the specified inference and the module; and providing the specified inference to the module in response to verifying the user consent data. 18. The method of claim 17, wherein the module comprise a skill of a smart speaker device, an application of a mobile phone or tablet computer, or a page accessible via a browser. 19. The method of claim 17, wherein the virtual personal assistant is native to the one or more client devices, and wherein the module is not native to the one or more client devices. 20. The method of claim 17, further comprising: generating, via the module, a new inference about the user; prompting the user for permission to share the inference with the inference store and for permission to share the inference with other modules via the inference store; providing the new inference to the inference store upon receiving the permission to share the inference with the inference store; and storing, in the user consent data, the permission to share the inference with other modules via the inference store.
A personalization framework is provided. In example embodiments, a machine, including processing circuitry and memory, determines, based on interaction of a user with a virtual personal assistant at one or more client devices associated with an account of the user, a plurality of inferences about the user. The machine stores the plurality of inferences in an inference store associated with the virtual personal assistant. The machine stores user consent data representing whether the user provided consent for a module to access at least a portion of the inferences in the inference store. The machine receives, from the module, a request for a specified inference from the inference store. The machine verifies the user consent data associated with the specified inference and the module. The machine provides the specified inference to the module in response to verifying the user consent data.1. A system comprising: processing circuitry; and memory storing instructions which, when executed by the processing circuitry, cause the processing circuitry to perform operations comprising: determining, based on interaction of a user with a virtual personal assistant at one or more client devices associated with an account of the user, a plurality of inferences about the user; storing the plurality of inferences in an inference store associated with the virtual personal assistant; storing user consent data representing whether the user provided consent for a module to access at least a portion of the inferences in the inference store; receiving, from the module, a request for a specified inference from the inference store; verifying the user consent data associated with the specified inference and the module; and providing the specified inference to the module in response to verifying the user consent data. 2. The system of claim 1, wherein the module comprise a skill of a smart speaker device, an application of a mobile phone or tablet computer, or a page accessible via a browser. 3. The system of claim 1, wherein the virtual personal assistant is native to the one or more client devices, and wherein the module is not native to the one or more client devices. 4. The system of claim 1, the operations further comprising: generating, via the module, a new inference about the user; prompting the user for permission to share the inference with the inference store and for permission to share the inference with other modules via the inference store; providing the new inference to the inference store upon receiving the permission to share the inference with the inference store; and storing, in the user consent data, the permission to share the inference with other modules via the inference store. 5. The system of claim 1, wherein the plurality of inferences comprise data about one or more of: user interests, user tastes, user habits, and repeated user activities. 6. The system of claim 1, the operations further comprising: installing the module at a first client device from among the one or more client devices; and providing a prompt, to the user, for the user consent data during installation of the module, wherein the prompt identifies the specified inference. 7. The system of claim 1, the operations further comprising: providing a prompt, to the user, for the user consent data in response to receiving, from the module, the request for the specified inference from the inference store, wherein the prompt identifies the specified inference. 8. The system of claim 1, wherein determining the plurality of inferences about the user comprises: accessing interaction data of the user with the virtual personal assistant; and computing a first inference for the plurality of inferences based on the interaction data. 9. The system of claim 8, the operations further comprising: prompting the user to verify or modify the first inference; receiving a verification or modification of the first inference; and storing the received verification or modification of the first inference. 10. A non-transitory machine-readable medium storing instructions which, when executed by processing circuitry of at least one machine, cause the processing circuitry to perform operations comprising: determining, based on interaction of a user with a virtual personal assistant at one or more client devices associated with an account of the user, a plurality of inferences about the user; storing the plurality of inferences in an inference store associated with the virtual personal assistant; storing user consent data representing whether the user provided consent for a module to access at least a portion of the inferences in the inference store; receiving, from the module, a request for a specified inference from the inference store; verifying the user consent data associated with the specified inference and the module; and providing the specified inference to the module in response to verifying the user consent data. 11. The machine-readable medium of claim 10, wherein the module comprise a skill of a smart speaker device, an application of a mobile phone or tablet computer, or a page accessible via a browser. 12. The machine-readable medium of claim 10, wherein the virtual personal assistant is native to the one or more client devices, and wherein the module is not native to the one or more client devices. 13. The machine-readable medium of claim 10, the operations further comprising: generating, via the module, a new inference about the user; prompting the user for permission to share the inference with the inference store and for permission to share the inference with other modules via the inference store; providing the new inference to the inference store upon receiving the permission to share the inference with the inference store; and storing, in the user consent data, the permission to share the inference with other modules via the inference store. 14. The machine-readable medium of claim 10, wherein the plurality of inferences comprise data about one or more of: user interests, user tastes, user habits, and repeated user activities. 15. The machine-readable medium of claim 10, the operations further comprising: installing the module at a first client device from among the one or more client devices; and providing a prompt, to the user, for the user consent data during installation of the module, wherein the prompt identifies the specified inference. 16. The machine-readable medium of claim 10, the operations further comprising: providing a prompt, to the user, for the user consent data in response to receiving, from the module, the request for the specified inference from the inference store, wherein the prompt identifies the specified inference. 17. A method comprising: determining, using processing circuitry of at least one machine, based on interaction of a user with a virtual personal assistant at one or more client devices associated with an account of the user, a plurality of inferences about the user; storing the plurality of inferences in an inference store associated with the virtual personal assistant; storing user consent data representing whether the user provided consent for a module to access at least a portion of the inferences in the inference store; receiving, from the module, a request for a specified inference from the inference store; verifying the user consent data associated with the specified inference and the module; and providing the specified inference to the module in response to verifying the user consent data. 18. The method of claim 17, wherein the module comprise a skill of a smart speaker device, an application of a mobile phone or tablet computer, or a page accessible via a browser. 19. The method of claim 17, wherein the virtual personal assistant is native to the one or more client devices, and wherein the module is not native to the one or more client devices. 20. The method of claim 17, further comprising: generating, via the module, a new inference about the user; prompting the user for permission to share the inference with the inference store and for permission to share the inference with other modules via the inference store; providing the new inference to the inference store upon receiving the permission to share the inference with the inference store; and storing, in the user consent data, the permission to share the inference with other modules via the inference store.
2,400
8,083
8,083
14,974,234
2,491
Managed real-time communications between user devices may be provided. Upon receiving a request to instantiate a communication connection from an application, a secure session may be established between the application and a remote application. Input from a user of the application may be received, subjected to at least one management policy, and transmitted to the remote application.
1-20. (canceled) 21. A method comprising: receiving a request to initiate a messaging connection from an application; determining whether the request is in compliance with at least one management policy; determining whether a device associated with the request is in compliance with at least one second management policy; and in response to determining that the request is not in compliance with the at least one management policy or the device is not in compliance with the at least one second management policy, applying a remediation action to at least one of the device or the request. 22. The method of claim 21, wherein the request comprises at least one of: a request to report in to a monitoring server or a user input associated with a messaging application. 23. The method of claim 21, wherein the at least one management policy specifies at least one of: that a minimum encryption level be applied to the messaging connection, that a particular encryption key be employed to encrypt the messaging connection, or a restriction based upon network conditions associated with the messaging connection. 24. The method of claim 21, wherein the remediation action comprises restricting the request from being transmitted to at least one of a second application or a remotely located server. 25. The method of claim 21, wherein the remediation action comprises: applying or modifying a security level associated with the request; and transmitting the request with the security level applied to the request. 26. The method of claim 25, wherein applying or modifying the security level associated with the request comprises applying at least one of: an encryption algorithm, an encryption level, an encryption key size, a communication protocol, a communication type limitation, a permitted user limitation, a permitted recipient limitation, a communication protocol, a package size, or a compression algorithm. 27. The method of claim 25, wherein applying or modifying the security level associated with the request comprises obfuscating message contents associated with the request. 28. The method of claim 21, wherein the at least one second management policy comprises at least one of: a requirement that the device have a passcode enabled, a time restriction, a location restriction, or a requirement that the device be enrolled with a management system. 29. A system comprising: a computing device; and an application executable by the computing device, the application configured to cause the computing device to at least: receive a request to initiate a messaging connection from an application; determine whether the request is in compliance with at least one management policy; determine whether a device associated with the request is in compliance with at least one second management policy; and in response to a determination that the request is not in compliance with the at least one management policy or the device is not in compliance with the at least one second management policy, apply a remediation action to at least one of the device or the request. 30. The system of claim 29, wherein the request comprises at least one of a request to report in to a monitoring server or a user input associated with a messaging application. 31. The system of claim 29, wherein the at least one management policy specifies at least one of: that a minimum encryption level be applied to the messaging connection, that a particular encryption key be employed to encrypt the messaging connection, or a restriction based upon network conditions associated with the messaging connection. 32. The system of claim 29, wherein the remediation action comprises: applying or modifying a security level associated with the request; and transmitting the request with the security level applied to the request. 33. The system of claim 32, wherein applying or modifying the security level associated with the request comprises applying at least one of: an encryption algorithm, an encryption level, an encryption key size, a communication protocol, a communication type limitation, a permitted user limitation, a permitted recipient limitation, a communication protocol, a package size, or a compression algorithm. 34. The system of claim 29, wherein the at least one second management policy comprises at least one of: a requirement that the device have a passcode enabled, a time restriction, a location restriction, or a requirement that the device be enrolled with a management system. 35. A non-transitory computer-readable medium comprising an application, the application, when executed, causing a computing device to at least: receive a request to initiate a messaging connection from an application; determine whether the request is in compliance with at least one management policy; determine whether a device associated with the request is in compliance with at least one second management policy; and in response to a determination that the request is not in compliance with the at least one management policy or the device is not in compliance with the at least one second management policy, apply a remediation action to at least one of the device or the request. 36. The non-transitory computer-readable medium of claim 35, wherein the request comprises at least one of a request to report in to a monitoring server or a user input associated with a messaging application. 37. The non-transitory computer-readable medium of claim 35, wherein the at least one management policy specifies at least one of: that a minimum encryption level be applied to the messaging connection, that a particular encryption key be employed to encrypt the messaging connection, or a restriction based upon network conditions associated with the messaging connection. 38. The non-transitory computer-readable medium of claim 35, wherein the remediation action comprises restricting the request from being transmitted to at least one of a second application or a remotely located server. 39. The non-transitory computer-readable medium of claim 35, wherein the remediation action comprises: applying or modifying a security level associated with the request; and transmitting the request with the security level applied to the request. 40. The non-transitory computer-readable medium of claim 39, wherein the at least one second management policy comprises at least one of: a requirement that the device have a passcode enabled, a time restriction, a location restriction, or a requirement that the device be enrolled with a management system.
Managed real-time communications between user devices may be provided. Upon receiving a request to instantiate a communication connection from an application, a secure session may be established between the application and a remote application. Input from a user of the application may be received, subjected to at least one management policy, and transmitted to the remote application.1-20. (canceled) 21. A method comprising: receiving a request to initiate a messaging connection from an application; determining whether the request is in compliance with at least one management policy; determining whether a device associated with the request is in compliance with at least one second management policy; and in response to determining that the request is not in compliance with the at least one management policy or the device is not in compliance with the at least one second management policy, applying a remediation action to at least one of the device or the request. 22. The method of claim 21, wherein the request comprises at least one of: a request to report in to a monitoring server or a user input associated with a messaging application. 23. The method of claim 21, wherein the at least one management policy specifies at least one of: that a minimum encryption level be applied to the messaging connection, that a particular encryption key be employed to encrypt the messaging connection, or a restriction based upon network conditions associated with the messaging connection. 24. The method of claim 21, wherein the remediation action comprises restricting the request from being transmitted to at least one of a second application or a remotely located server. 25. The method of claim 21, wherein the remediation action comprises: applying or modifying a security level associated with the request; and transmitting the request with the security level applied to the request. 26. The method of claim 25, wherein applying or modifying the security level associated with the request comprises applying at least one of: an encryption algorithm, an encryption level, an encryption key size, a communication protocol, a communication type limitation, a permitted user limitation, a permitted recipient limitation, a communication protocol, a package size, or a compression algorithm. 27. The method of claim 25, wherein applying or modifying the security level associated with the request comprises obfuscating message contents associated with the request. 28. The method of claim 21, wherein the at least one second management policy comprises at least one of: a requirement that the device have a passcode enabled, a time restriction, a location restriction, or a requirement that the device be enrolled with a management system. 29. A system comprising: a computing device; and an application executable by the computing device, the application configured to cause the computing device to at least: receive a request to initiate a messaging connection from an application; determine whether the request is in compliance with at least one management policy; determine whether a device associated with the request is in compliance with at least one second management policy; and in response to a determination that the request is not in compliance with the at least one management policy or the device is not in compliance with the at least one second management policy, apply a remediation action to at least one of the device or the request. 30. The system of claim 29, wherein the request comprises at least one of a request to report in to a monitoring server or a user input associated with a messaging application. 31. The system of claim 29, wherein the at least one management policy specifies at least one of: that a minimum encryption level be applied to the messaging connection, that a particular encryption key be employed to encrypt the messaging connection, or a restriction based upon network conditions associated with the messaging connection. 32. The system of claim 29, wherein the remediation action comprises: applying or modifying a security level associated with the request; and transmitting the request with the security level applied to the request. 33. The system of claim 32, wherein applying or modifying the security level associated with the request comprises applying at least one of: an encryption algorithm, an encryption level, an encryption key size, a communication protocol, a communication type limitation, a permitted user limitation, a permitted recipient limitation, a communication protocol, a package size, or a compression algorithm. 34. The system of claim 29, wherein the at least one second management policy comprises at least one of: a requirement that the device have a passcode enabled, a time restriction, a location restriction, or a requirement that the device be enrolled with a management system. 35. A non-transitory computer-readable medium comprising an application, the application, when executed, causing a computing device to at least: receive a request to initiate a messaging connection from an application; determine whether the request is in compliance with at least one management policy; determine whether a device associated with the request is in compliance with at least one second management policy; and in response to a determination that the request is not in compliance with the at least one management policy or the device is not in compliance with the at least one second management policy, apply a remediation action to at least one of the device or the request. 36. The non-transitory computer-readable medium of claim 35, wherein the request comprises at least one of a request to report in to a monitoring server or a user input associated with a messaging application. 37. The non-transitory computer-readable medium of claim 35, wherein the at least one management policy specifies at least one of: that a minimum encryption level be applied to the messaging connection, that a particular encryption key be employed to encrypt the messaging connection, or a restriction based upon network conditions associated with the messaging connection. 38. The non-transitory computer-readable medium of claim 35, wherein the remediation action comprises restricting the request from being transmitted to at least one of a second application or a remotely located server. 39. The non-transitory computer-readable medium of claim 35, wherein the remediation action comprises: applying or modifying a security level associated with the request; and transmitting the request with the security level applied to the request. 40. The non-transitory computer-readable medium of claim 39, wherein the at least one second management policy comprises at least one of: a requirement that the device have a passcode enabled, a time restriction, a location restriction, or a requirement that the device be enrolled with a management system.
2,400
8,084
8,084
15,403,087
2,416
In order to maintain performance during wireless communication, a transmitting electronic device may selectively perform a remedial action based on a monitored throughput. In particular, the transmitting electronic device may monitor communication with one or more receiving electronic devices, and may calculate a throughput metric based on the monitored communication. For example, the transmitting electronic device may monitor data rates, may receive feedback about the communication from at least one of the receiving electronic devices, and may determine an observed distribution of the data rates. Then, the transmitting electronic device may compare the throughput metric to a threshold value. If the throughput metric is less than the threshold value, the transmitting electronic device may perform the remedial action. This remedial action may include: denying subsequent association requests, discontinuing an existing association; and/or notifying a cellular-telephone network that the remedial action was needed.
1. A transmitting electronic device, comprising an interface circuit configured to communicate with one or more receiving electronic devices, wherein the interface circuit is configured to: monitor, at one or more nodes of the transmitting electronic device, the communication with one of the receiving electronic devices in a wireless local area network; calculate a throughput metric based on measurements obtained during the monitoring, the calculating involving determining an observed distribution of data rates; compare the throughput metric to a threshold; and selectively perform a remedial action based on the comparison, wherein the remedial action includes one of: denying subsequent association requests from an additional receiving electronic device; and discontinuing an association with one or more of the receiving electronic devices. 2. The transmitting electronic device of claim 1, further comprising an antenna coupled to the interface circuit. 3. The transmitting electronic device of claim 1, wherein the monitoring involves tracking, at the one or more nodes, data rates during the communication and receiving, from the one or more nodes, feedback about the communication from the one of the receiving electronic devices. 4. The transmitting electronic device of claim 1, wherein the threshold includes a target data rate associated with a percentile on the observed distribution; and wherein the remedial action is selectively performed if the data rate associated with the percentile on the observed distribution is less than the target data rate. 5. The transmitting electronic device of claim 1, wherein the calculating involves determining utilization based on a measured data rate during the communication and an estimated data rate during the communication. 6. The transmitting electronic device of claim 5, wherein the threshold includes a target utilization; and wherein the remedial action is selectively performed if the utilization is less than the target utilization. 7. The transmitting electronic device of claim 1, wherein the remedial action further includes notifying, to the one or more nodes, a cellular-telephone network that the remedial action was needed. 8. The transmitting electronic device of claim 1, wherein the transmitting electronic device further comprises: a processor; and a memory, coupled to the processor, which stores a program module configured to be executed by the processor, wherein, when executed by the processor, the program module causes the transmitting electronic device to: monitor, at the one or more nodes, the communication; calculate the throughput metric; compare the throughput metric to the threshold; and selectively perform the remedial action. 9. A non-transitory computer-readable storage medium for use in conjunction with a transmitting electronic device, the computer-readable storage medium storing a program module that, when executed by the transmitting electronic device, causes the transmitting electronic device to: monitor, at one or more nodes of the transmitting electronic device, communication between a transmitting electronic device and one of a set of receiving electronic devices in a wireless local area network; calculate a throughput metric based on measurements obtained during the monitoring, the calculating involving determining an observed distribution of data rates; compare the throughput metric to a threshold; and selectively perform the remedial action based on the comparison, wherein the remedial action includes one of: denying subsequent association requests from an additional receiving electronic device; and discontinuing an association with one or more of the receiving electronic devices. 10. The computer-readable storage medium of claim 9, wherein the monitoring involves tracking, at the one or more nodes, data rates during the communication and receiving, from the one or more nodes, feedback about the communication from the one of the receiving electronic devices. 11. The computer-readable storage medium of claim 9, wherein the threshold includes a target data rate associated with a percentile on the observed distribution; and wherein the remedial action is selectively performed if the data rate associated with the percentile on the observed distribution is less than the target data rate. 12. The computer-readable storage medium of claim 9, wherein the calculating involves determining utilization based on a measured data rate during the communication and an estimated data rate during the communication. 13. The computer-readable storage medium of claim 12, wherein the threshold includes a target utilization; and wherein the remedial action is selectively performed if the utilization is less than the target utilization. 14. The computer-readable storage medium of claim 9, wherein the remedial action further includes notifying, to the one or more nodes, a cellular-telephone network that the remedial action was needed. 15. A transmitting electronic device-implemented method for selectively performing a remedial action to maintain communication performance in a wireless network, wherein the method comprises: monitoring, at one or more nodes of the transmitting electronic device, communication between the transmitting electronic device and one of receiving electronic devices in a wireless local area network; using the transmitting electronic device, calculating a throughput metric based on measurements obtained during the monitoring, the calculating involving determining an observed distribution of data rates; comparing the throughput metric to a threshold; and selectively performing the remedial action based on the comparison, wherein the remedial action includes one of: denying subsequent association requests from an additional receiving electronic device; and discontinuing an association with one or more of the receiving electronic devices. 16. The method of claim 15, wherein the monitoring involves tracking, at the one or more nodes, data rates during the communication and receiving, from the one or more nodes, feedback about the communication from the one of the receiving electronic devices. 17. The method of claim 15, wherein the calculating involves determining an observed distribution of data rates; wherein the threshold includes a target data rate associated with a percentile on the observed distribution; and wherein the remedial action is selectively performed if the data rate associated with the percentile on the observed distribution is less than the target data rate. 18. The method of claim 15, wherein the calculating involves determining utilization based on a measured data rate during the communication and an estimated data rate during the communication. 19. The method of claim 18, wherein the threshold includes a target utilization; and wherein the remedial action is selectively performed if the utilization is less than the target utilization. 20. The method of claim 15, wherein the remedial action further includes notifying, to the one or more nodes, a cellular-telephone network that the remedial action was needed.
In order to maintain performance during wireless communication, a transmitting electronic device may selectively perform a remedial action based on a monitored throughput. In particular, the transmitting electronic device may monitor communication with one or more receiving electronic devices, and may calculate a throughput metric based on the monitored communication. For example, the transmitting electronic device may monitor data rates, may receive feedback about the communication from at least one of the receiving electronic devices, and may determine an observed distribution of the data rates. Then, the transmitting electronic device may compare the throughput metric to a threshold value. If the throughput metric is less than the threshold value, the transmitting electronic device may perform the remedial action. This remedial action may include: denying subsequent association requests, discontinuing an existing association; and/or notifying a cellular-telephone network that the remedial action was needed.1. A transmitting electronic device, comprising an interface circuit configured to communicate with one or more receiving electronic devices, wherein the interface circuit is configured to: monitor, at one or more nodes of the transmitting electronic device, the communication with one of the receiving electronic devices in a wireless local area network; calculate a throughput metric based on measurements obtained during the monitoring, the calculating involving determining an observed distribution of data rates; compare the throughput metric to a threshold; and selectively perform a remedial action based on the comparison, wherein the remedial action includes one of: denying subsequent association requests from an additional receiving electronic device; and discontinuing an association with one or more of the receiving electronic devices. 2. The transmitting electronic device of claim 1, further comprising an antenna coupled to the interface circuit. 3. The transmitting electronic device of claim 1, wherein the monitoring involves tracking, at the one or more nodes, data rates during the communication and receiving, from the one or more nodes, feedback about the communication from the one of the receiving electronic devices. 4. The transmitting electronic device of claim 1, wherein the threshold includes a target data rate associated with a percentile on the observed distribution; and wherein the remedial action is selectively performed if the data rate associated with the percentile on the observed distribution is less than the target data rate. 5. The transmitting electronic device of claim 1, wherein the calculating involves determining utilization based on a measured data rate during the communication and an estimated data rate during the communication. 6. The transmitting electronic device of claim 5, wherein the threshold includes a target utilization; and wherein the remedial action is selectively performed if the utilization is less than the target utilization. 7. The transmitting electronic device of claim 1, wherein the remedial action further includes notifying, to the one or more nodes, a cellular-telephone network that the remedial action was needed. 8. The transmitting electronic device of claim 1, wherein the transmitting electronic device further comprises: a processor; and a memory, coupled to the processor, which stores a program module configured to be executed by the processor, wherein, when executed by the processor, the program module causes the transmitting electronic device to: monitor, at the one or more nodes, the communication; calculate the throughput metric; compare the throughput metric to the threshold; and selectively perform the remedial action. 9. A non-transitory computer-readable storage medium for use in conjunction with a transmitting electronic device, the computer-readable storage medium storing a program module that, when executed by the transmitting electronic device, causes the transmitting electronic device to: monitor, at one or more nodes of the transmitting electronic device, communication between a transmitting electronic device and one of a set of receiving electronic devices in a wireless local area network; calculate a throughput metric based on measurements obtained during the monitoring, the calculating involving determining an observed distribution of data rates; compare the throughput metric to a threshold; and selectively perform the remedial action based on the comparison, wherein the remedial action includes one of: denying subsequent association requests from an additional receiving electronic device; and discontinuing an association with one or more of the receiving electronic devices. 10. The computer-readable storage medium of claim 9, wherein the monitoring involves tracking, at the one or more nodes, data rates during the communication and receiving, from the one or more nodes, feedback about the communication from the one of the receiving electronic devices. 11. The computer-readable storage medium of claim 9, wherein the threshold includes a target data rate associated with a percentile on the observed distribution; and wherein the remedial action is selectively performed if the data rate associated with the percentile on the observed distribution is less than the target data rate. 12. The computer-readable storage medium of claim 9, wherein the calculating involves determining utilization based on a measured data rate during the communication and an estimated data rate during the communication. 13. The computer-readable storage medium of claim 12, wherein the threshold includes a target utilization; and wherein the remedial action is selectively performed if the utilization is less than the target utilization. 14. The computer-readable storage medium of claim 9, wherein the remedial action further includes notifying, to the one or more nodes, a cellular-telephone network that the remedial action was needed. 15. A transmitting electronic device-implemented method for selectively performing a remedial action to maintain communication performance in a wireless network, wherein the method comprises: monitoring, at one or more nodes of the transmitting electronic device, communication between the transmitting electronic device and one of receiving electronic devices in a wireless local area network; using the transmitting electronic device, calculating a throughput metric based on measurements obtained during the monitoring, the calculating involving determining an observed distribution of data rates; comparing the throughput metric to a threshold; and selectively performing the remedial action based on the comparison, wherein the remedial action includes one of: denying subsequent association requests from an additional receiving electronic device; and discontinuing an association with one or more of the receiving electronic devices. 16. The method of claim 15, wherein the monitoring involves tracking, at the one or more nodes, data rates during the communication and receiving, from the one or more nodes, feedback about the communication from the one of the receiving electronic devices. 17. The method of claim 15, wherein the calculating involves determining an observed distribution of data rates; wherein the threshold includes a target data rate associated with a percentile on the observed distribution; and wherein the remedial action is selectively performed if the data rate associated with the percentile on the observed distribution is less than the target data rate. 18. The method of claim 15, wherein the calculating involves determining utilization based on a measured data rate during the communication and an estimated data rate during the communication. 19. The method of claim 18, wherein the threshold includes a target utilization; and wherein the remedial action is selectively performed if the utilization is less than the target utilization. 20. The method of claim 15, wherein the remedial action further includes notifying, to the one or more nodes, a cellular-telephone network that the remedial action was needed.
2,400
8,085
8,085
14,677,712
2,491
A device includes a memory. The device also includes a controller. The controller includes a register configured to store an indication of whether an ability of a received command to alter an access protection scheme of the memory is enabled. The received command may alter the access an access protection scheme of the memory responsive to the indication.
1. An apparatus, comprising: a memory; and a controller associated with a register, wherein the register is configured to store an indication of whether an ability of a received command to alter an access protection scheme of the memory is enabled. 2. The apparatus of claim 1, wherein the controller is configured to authenticate the command by accessing a pre-loaded cryptographic key. 3. The apparatus of claim 2, wherein the controller is configured to authenticate the command by generating a message authentication code responsive to the pre-loaded cryptographic key. 4. The apparatus of claim 3, wherein the controller is configured to authenticate the command by comparing the generated message authentication code with a message authentication code associated with the command. 5. The apparatus of claim 4, wherein the controller is configured to allow access to at least a portion of the register responsive to the generated message authentication code matching the message authentication code associated with the command. 6. The apparatus of claim 5, wherein the controller is configured to allow access to at least a portion of the register via a command present in the command responsive to the generated message authentication code matching the message authentication code associated with the command. 7. The apparatus of claim 4, wherein the controller is configured to allow access to at least a portion of a configuration register of the apparatus responsive to the generated message authentication code matching the message authentication code associated with the command. 8. The apparatus of claim 1, wherein the memory and the controller are included in an embedded multimedia card (eMMC). 9. The apparatus of claim 1, wherein the access protection scheme protects write access or erase access of the memory. 10. The apparatus of claim 1, wherein a portion of the memory protected by the access scheme is configured to store boot partitions. 11. A tangible machine readable medium configured to store instructions to: receive a request to alter an access protection scheme of an embedded memory device; generate a first message authentication code; determine whether the first message authentication code is equivalent to a second message authentication code received as part of the request; and allow alteration of the access protection scheme of the embedded memory device only responsive to the first message authentication code matching the second message authentication code. 12. The tangible machine readable medium of claim 11, wherein the instructions comprise instructions to: access a pre-loaded key and generate the first message authentication code responsive to the pre-loaded key. 13. The tangible machine readable medium of claim 11, wherein the instructions comprise instructions to: alter the access protection scheme of the embedded memory device via alteration of a stored value in a register of the embedded memory device. 14. The tangible machine readable medium of claim 11, wherein the instructions comprise instructions to: alter a write protected portion of the embedded memory device responsive to the access protection scheme of the embedded memory device being altered. 15. The tangible machine readable medium of claim 14, wherein the instructions comprise instructions to: alter write protected groups as the write protected portion of the embedded memory device responsive to the access protection scheme of the embedded memory device being altered. 16. The tangible machine readable medium of claim 14, wherein the instructions comprise instructions to: alter boot partitions as the write protected portion of the embedded memory device responsive to the access protection scheme of the embedded memory device being altered. 17. An apparatus, comprising: an embedded memory device; and a host comprising a processor configured to generate a request to alter an access protection scheme of an embedded memory device, wherein the request comprises a message authentication code generated responsive to a cryptographic key associated with the embedded memory device. 18. The apparatus of claim 17, wherein the host is configured to transmit the request to the embedded memory device to alter the access protection scheme of the embedded memory device. 19. The apparatus of claim 17, wherein the host is configured to generate a command to configure a write protection mode of the embedded memory device as part of the request to alter the access protection scheme. 20. The apparatus of claim 19, wherein the host is configured to generate a second command to request a read of a register field that indicates the configuration of the write protection mode of the embedded memory device as part of a second request. 21. The apparatus of claim 17, wherein the host is configured to generate a command to enable or disable setting of the access protection scheme of the embedded memory device as part of the request. 22. The apparatus of claim 21, wherein the host is configured to generate a second command to request a read of a register field that indicates the setting of the access protection scheme of the embedded memory device as part of a second request. 23. The apparatus of claim 17, wherein the host is configured to generate a command to enable or disable clearing of the access protection scheme of the embedded memory device as part of the request. 24. The apparatus of claim 23, wherein the host is configured to generate a second command to request a read of a register field that indicates the clearing of the access protection scheme of the embedded memory device as part of a second request. 25. An apparatus, comprising: a memory; and a controller, wherein the controller is configured to enable an ability of a received command responsive to authentication of the received command, wherein the received command comprises a command to alter an access protection scheme of the memory. 26. The apparatus of claim 25, wherein the received command comprises a command to alter boot access of the memory. 27. The apparatus of claim 25, wherein the received command comprises a command to alter boot partitions of the apparatus.
A device includes a memory. The device also includes a controller. The controller includes a register configured to store an indication of whether an ability of a received command to alter an access protection scheme of the memory is enabled. The received command may alter the access an access protection scheme of the memory responsive to the indication.1. An apparatus, comprising: a memory; and a controller associated with a register, wherein the register is configured to store an indication of whether an ability of a received command to alter an access protection scheme of the memory is enabled. 2. The apparatus of claim 1, wherein the controller is configured to authenticate the command by accessing a pre-loaded cryptographic key. 3. The apparatus of claim 2, wherein the controller is configured to authenticate the command by generating a message authentication code responsive to the pre-loaded cryptographic key. 4. The apparatus of claim 3, wherein the controller is configured to authenticate the command by comparing the generated message authentication code with a message authentication code associated with the command. 5. The apparatus of claim 4, wherein the controller is configured to allow access to at least a portion of the register responsive to the generated message authentication code matching the message authentication code associated with the command. 6. The apparatus of claim 5, wherein the controller is configured to allow access to at least a portion of the register via a command present in the command responsive to the generated message authentication code matching the message authentication code associated with the command. 7. The apparatus of claim 4, wherein the controller is configured to allow access to at least a portion of a configuration register of the apparatus responsive to the generated message authentication code matching the message authentication code associated with the command. 8. The apparatus of claim 1, wherein the memory and the controller are included in an embedded multimedia card (eMMC). 9. The apparatus of claim 1, wherein the access protection scheme protects write access or erase access of the memory. 10. The apparatus of claim 1, wherein a portion of the memory protected by the access scheme is configured to store boot partitions. 11. A tangible machine readable medium configured to store instructions to: receive a request to alter an access protection scheme of an embedded memory device; generate a first message authentication code; determine whether the first message authentication code is equivalent to a second message authentication code received as part of the request; and allow alteration of the access protection scheme of the embedded memory device only responsive to the first message authentication code matching the second message authentication code. 12. The tangible machine readable medium of claim 11, wherein the instructions comprise instructions to: access a pre-loaded key and generate the first message authentication code responsive to the pre-loaded key. 13. The tangible machine readable medium of claim 11, wherein the instructions comprise instructions to: alter the access protection scheme of the embedded memory device via alteration of a stored value in a register of the embedded memory device. 14. The tangible machine readable medium of claim 11, wherein the instructions comprise instructions to: alter a write protected portion of the embedded memory device responsive to the access protection scheme of the embedded memory device being altered. 15. The tangible machine readable medium of claim 14, wherein the instructions comprise instructions to: alter write protected groups as the write protected portion of the embedded memory device responsive to the access protection scheme of the embedded memory device being altered. 16. The tangible machine readable medium of claim 14, wherein the instructions comprise instructions to: alter boot partitions as the write protected portion of the embedded memory device responsive to the access protection scheme of the embedded memory device being altered. 17. An apparatus, comprising: an embedded memory device; and a host comprising a processor configured to generate a request to alter an access protection scheme of an embedded memory device, wherein the request comprises a message authentication code generated responsive to a cryptographic key associated with the embedded memory device. 18. The apparatus of claim 17, wherein the host is configured to transmit the request to the embedded memory device to alter the access protection scheme of the embedded memory device. 19. The apparatus of claim 17, wherein the host is configured to generate a command to configure a write protection mode of the embedded memory device as part of the request to alter the access protection scheme. 20. The apparatus of claim 19, wherein the host is configured to generate a second command to request a read of a register field that indicates the configuration of the write protection mode of the embedded memory device as part of a second request. 21. The apparatus of claim 17, wherein the host is configured to generate a command to enable or disable setting of the access protection scheme of the embedded memory device as part of the request. 22. The apparatus of claim 21, wherein the host is configured to generate a second command to request a read of a register field that indicates the setting of the access protection scheme of the embedded memory device as part of a second request. 23. The apparatus of claim 17, wherein the host is configured to generate a command to enable or disable clearing of the access protection scheme of the embedded memory device as part of the request. 24. The apparatus of claim 23, wherein the host is configured to generate a second command to request a read of a register field that indicates the clearing of the access protection scheme of the embedded memory device as part of a second request. 25. An apparatus, comprising: a memory; and a controller, wherein the controller is configured to enable an ability of a received command responsive to authentication of the received command, wherein the received command comprises a command to alter an access protection scheme of the memory. 26. The apparatus of claim 25, wherein the received command comprises a command to alter boot access of the memory. 27. The apparatus of claim 25, wherein the received command comprises a command to alter boot partitions of the apparatus.
2,400
8,086
8,086
15,146,836
2,434
A system and method wherein an authentication request to verify authentication information submitted to a first system in connection with a first request submitted to the first system is received from the first system. A response to the authentication request is generated that includes information usable by a second system to make, without communicating with the authentication system, based at least in part on the information and one or more cryptographic processes, a determination whether fulfillment of a second request from the first system is allowable under authority of the authentication system, with the determination being based at least in part on policy information included in the information that specifies one or more policies applicable to an identity that is associated with the first request. The response generated is provided to the first system.
1. An authentication system, comprising: one or more processors; and memory including instructions executable by the one or more processors that cause the authentication system to at least: receive, from a first system, an authentication request to verify authentication information submitted to the first system in connection with a first request submitted to the first system; generate a response to the authentication request that includes information usable by a second system to make, without communicating with the authentication system, based at least in part on the information and one or more cryptographic processes, a determination whether fulfillment of a second request from the first system is allowable under authority of the authentication system, the determination being based at least in part on policy information included in the information that specifies one or more policies applicable to an identity that is associated with the first request; and provide the response to the first system. 2. The authentication system of claim 1, wherein making the determination includes cryptographically verifying the information using, in the one or more cryptographic processes, secret information shared by the second system and the authentication system but lacked by the first system. 3. The authentication system of claim 1, wherein evaluation of the information causes the second system to make a negative determination whether to fulfill the request from the first system unless the information is provided to the second system in accordance with one or more key use limitations used to generate the information. 4. The authentication system of claim 1, wherein: the authentication request includes an electronic signature to be verified by the authentication system, the electronic signature being from an entity different from the first system; and the second request from the first system is for access to one or more computing resources managed by the second system on behalf of the entity. 5. The authentication system of claim 1, wherein: a service provider operates a set of systems that includes the second system; the instructions further cause the authentication system to select a proper subset of the set; and the information is usable by the second system to make the determination as a result of the second system being in the proper subset. 6. The authentication system of claim 1, wherein: the information is encrypted under a key accessible to both the second system and the authentication system but inaccessible to the first system; and the one or more cryptographic processes include: using the key to decrypt the information to obtain a signing key; and using the signing key to verify the second request from the first system. 7. The authentication system of claim 6, wherein: the information further includes information specific to a third system, the information specific to the third system being derived based at least in part on secret information shared between the authentication system and the third system; and the information specific to the third system is usable by the third system to verify requests from the first system that are electronically signed using the signing key. 8. The authentication system of claim 1, wherein the information includes: an electronic signature verifiable by the authentication system; and encrypted information that: is decryptable by the first system; and upon being decrypted, includes a signing key usable to verify the electronic signature without contacting the authentication system. 9. The system of claim 8, wherein: the information includes information specific to the second system that is decryptable using secret information lacked by the first system; and the determination is made by the second system: using the secret information to decrypt the information specific to the second system to produce decrypted information specific to the second system; obtaining the signing key from the decrypted information specific to the second system; and using the signing key to determine whether the electronic signature is valid. 10. A computer-implemented method, comprising, under the control of an authentication service, comprising one or more computer systems that execute instructions, of service provider: receiving, from a first service, an authentication request to verify authentication information submitted to the first service in connection with a first request submitted to the first service; generating a response to the authentication request that includes information usable by a second service to make, without communication with the authentication service, based at least in part on the information and one or more cryptographic processes, a determination whether fulfillment of a second request from the first service is allowable under authority of the authentication service, the determination based at least in part on policy information included in the information that specifies one or more policies applicable to an identity that is associated with the first request; and providing the response to the first service. 11. The computer-implemented method of claim 10, wherein the determination: includes checking a cache for information usable to determine whether to fulfill the request; and depends at least in part on whether the cache lacks the information usable to determine whether to fulfill the request. 12. The computer-implemented method of claim 10, further comprising: receiving, from the second service, a third request for an indication whether to determine to fulfill a fourth request submitted to the second service; and providing, to the second service, a response that indicates to fulfill the fourth request. 13. The computer-implemented method of claim 10, wherein: the information includes information derived based at least in part on one or more first parameters each corresponding to a limitation on use of a signing key; and the determination whether fulfillment of the second request from the first service is allowable is made by: performing an algorithm to generate reference information based at least in part on the signing key and one or more second parameters; and determining that the reference information generated matches the authentication information on a condition that the one or more first parameters match the one or more second parameters. 14. The computer-implemented method of claim 10, wherein the method further comprises selecting the information from a plurality of instances of information each corresponding to a different service of the service provider. 15. A non-transitory computer-readable storage medium having stored thereon instructions that, as a result of execution by one or more processors of a computer system of an authentication service, cause the computer system to: receive, from a first system, an authentication request to verify authentication information submitted to the first system in connection with a first request submitted to the first system; generate a response to the authentication request that includes information usable by a second system to make, without communication with the authentication service, based at least in part on the information and one or more cryptographic processes, a determination whether fulfillment of a second request from the first system is allowable under authority of the authentication service, the determination based at least in part on policy information included in the information that specifies one or more policies applicable to an identity that is associated with the first request; and provide the response to the first system. 16. The non-transitory computer-readable storage medium of claim 15, wherein the computer system and the first system are subsystems of a service provider. 17. The non-transitory computer-readable storage medium of claim 15, wherein: the information comprises a signing key in encrypted form; and the response includes an electronic signature that is generated based at least in part on the signing key. 18. The non-transitory computer-readable storage medium of claim 15, wherein the first system lacks the information shared between the second system and the computer system. 19. The non-transitory computer-readable storage medium of claim 15, wherein: the information includes metadata comprising identity information and policy information and an electronic signature of the metadata; and the determination whether fulfillment of the second request can be made by the second system authenticating the metadata and determining whether the second request is compliant with the identity information and the policy information. 20. The non-transitory computer-readable storage medium of claim 15, wherein the first system manages, on behalf of a customer of a service provider, one or more computing resources that include the second system.
A system and method wherein an authentication request to verify authentication information submitted to a first system in connection with a first request submitted to the first system is received from the first system. A response to the authentication request is generated that includes information usable by a second system to make, without communicating with the authentication system, based at least in part on the information and one or more cryptographic processes, a determination whether fulfillment of a second request from the first system is allowable under authority of the authentication system, with the determination being based at least in part on policy information included in the information that specifies one or more policies applicable to an identity that is associated with the first request. The response generated is provided to the first system.1. An authentication system, comprising: one or more processors; and memory including instructions executable by the one or more processors that cause the authentication system to at least: receive, from a first system, an authentication request to verify authentication information submitted to the first system in connection with a first request submitted to the first system; generate a response to the authentication request that includes information usable by a second system to make, without communicating with the authentication system, based at least in part on the information and one or more cryptographic processes, a determination whether fulfillment of a second request from the first system is allowable under authority of the authentication system, the determination being based at least in part on policy information included in the information that specifies one or more policies applicable to an identity that is associated with the first request; and provide the response to the first system. 2. The authentication system of claim 1, wherein making the determination includes cryptographically verifying the information using, in the one or more cryptographic processes, secret information shared by the second system and the authentication system but lacked by the first system. 3. The authentication system of claim 1, wherein evaluation of the information causes the second system to make a negative determination whether to fulfill the request from the first system unless the information is provided to the second system in accordance with one or more key use limitations used to generate the information. 4. The authentication system of claim 1, wherein: the authentication request includes an electronic signature to be verified by the authentication system, the electronic signature being from an entity different from the first system; and the second request from the first system is for access to one or more computing resources managed by the second system on behalf of the entity. 5. The authentication system of claim 1, wherein: a service provider operates a set of systems that includes the second system; the instructions further cause the authentication system to select a proper subset of the set; and the information is usable by the second system to make the determination as a result of the second system being in the proper subset. 6. The authentication system of claim 1, wherein: the information is encrypted under a key accessible to both the second system and the authentication system but inaccessible to the first system; and the one or more cryptographic processes include: using the key to decrypt the information to obtain a signing key; and using the signing key to verify the second request from the first system. 7. The authentication system of claim 6, wherein: the information further includes information specific to a third system, the information specific to the third system being derived based at least in part on secret information shared between the authentication system and the third system; and the information specific to the third system is usable by the third system to verify requests from the first system that are electronically signed using the signing key. 8. The authentication system of claim 1, wherein the information includes: an electronic signature verifiable by the authentication system; and encrypted information that: is decryptable by the first system; and upon being decrypted, includes a signing key usable to verify the electronic signature without contacting the authentication system. 9. The system of claim 8, wherein: the information includes information specific to the second system that is decryptable using secret information lacked by the first system; and the determination is made by the second system: using the secret information to decrypt the information specific to the second system to produce decrypted information specific to the second system; obtaining the signing key from the decrypted information specific to the second system; and using the signing key to determine whether the electronic signature is valid. 10. A computer-implemented method, comprising, under the control of an authentication service, comprising one or more computer systems that execute instructions, of service provider: receiving, from a first service, an authentication request to verify authentication information submitted to the first service in connection with a first request submitted to the first service; generating a response to the authentication request that includes information usable by a second service to make, without communication with the authentication service, based at least in part on the information and one or more cryptographic processes, a determination whether fulfillment of a second request from the first service is allowable under authority of the authentication service, the determination based at least in part on policy information included in the information that specifies one or more policies applicable to an identity that is associated with the first request; and providing the response to the first service. 11. The computer-implemented method of claim 10, wherein the determination: includes checking a cache for information usable to determine whether to fulfill the request; and depends at least in part on whether the cache lacks the information usable to determine whether to fulfill the request. 12. The computer-implemented method of claim 10, further comprising: receiving, from the second service, a third request for an indication whether to determine to fulfill a fourth request submitted to the second service; and providing, to the second service, a response that indicates to fulfill the fourth request. 13. The computer-implemented method of claim 10, wherein: the information includes information derived based at least in part on one or more first parameters each corresponding to a limitation on use of a signing key; and the determination whether fulfillment of the second request from the first service is allowable is made by: performing an algorithm to generate reference information based at least in part on the signing key and one or more second parameters; and determining that the reference information generated matches the authentication information on a condition that the one or more first parameters match the one or more second parameters. 14. The computer-implemented method of claim 10, wherein the method further comprises selecting the information from a plurality of instances of information each corresponding to a different service of the service provider. 15. A non-transitory computer-readable storage medium having stored thereon instructions that, as a result of execution by one or more processors of a computer system of an authentication service, cause the computer system to: receive, from a first system, an authentication request to verify authentication information submitted to the first system in connection with a first request submitted to the first system; generate a response to the authentication request that includes information usable by a second system to make, without communication with the authentication service, based at least in part on the information and one or more cryptographic processes, a determination whether fulfillment of a second request from the first system is allowable under authority of the authentication service, the determination based at least in part on policy information included in the information that specifies one or more policies applicable to an identity that is associated with the first request; and provide the response to the first system. 16. The non-transitory computer-readable storage medium of claim 15, wherein the computer system and the first system are subsystems of a service provider. 17. The non-transitory computer-readable storage medium of claim 15, wherein: the information comprises a signing key in encrypted form; and the response includes an electronic signature that is generated based at least in part on the signing key. 18. The non-transitory computer-readable storage medium of claim 15, wherein the first system lacks the information shared between the second system and the computer system. 19. The non-transitory computer-readable storage medium of claim 15, wherein: the information includes metadata comprising identity information and policy information and an electronic signature of the metadata; and the determination whether fulfillment of the second request can be made by the second system authenticating the metadata and determining whether the second request is compliant with the identity information and the policy information. 20. The non-transitory computer-readable storage medium of claim 15, wherein the first system manages, on behalf of a customer of a service provider, one or more computing resources that include the second system.
2,400
8,087
8,087
14,458,693
2,476
A network device that sends resource allocation information associated with a physical uplink control channel is disclosed. The physical uplink control channel and a physical uplink shared channel may have different resources. The network device may receive, at times that the physical uplink shared channel is not received, a signal over the physical uplink control channel in relation to the sent resource allocation information.
1. A network device characterized in that: a transceiver is configured to send, to a user equipment (UE), resource allocation information associated with a physical uplink control channel, wherein the physical uplink control channel and a physical uplink shared channel have different resources; the network device is configured to receive, over the physical uplink shared channel, data at assigned times; the network device is further configured to receive, at times that the physical uplink shared channel is not received, a signal over the physical uplink control channel in relation to the sent resource allocation information; and the transceiver is further configured to send, over a downlink control channel, feedback information. 2. The network device of claim 1, wherein the transceiver is further configured to send data over a physical downlink shared channel. 3. The network device of claim 2, wherein the downlink control channel and the physical downlink shared channel are time multiplexed. 4. The network device of claim 1, wherein the feedback information includes power control information. 5. The network device of claim 1, wherein the downlink control channel includes power control information for a plurality of UEs using different bits. 6. The network device of claim 1, wherein the times that the signal over the physical uplink control channel is received by the network device, signals are received over other physical uplink control channels in the times from a plurality of UEs. 7. The network device of claim 1 further comprising: the physical uplink control channel, the physical uplink shared channel, or the downlink control channel is any one of a time division multiple access (TDMA), code division multiple access (CDMA), time division duplex (TDD), frequency division duplex (FDD), time division-code division multiple access (TD-CDMA), or universal mobile telecommunication system (UMTS) channel. 8. The network device of claim 1, wherein the network device is configured as any one of a time division multiple access (TDMA), code division multiple access (CDMA), time division duplex (TDD), frequency division duplex (FDD), time division-code division multiple access (TD-CDMA), or universal mobile telecommunication system (UMTS) network device or the network device is configured as a radio network controller. 9. The network device of claim 1, wherein the UE is configured as any one of a time division multiple access (TDMA), code division multiple access (CDMA), time division duplex (TDD), frequency division duplex (FDD), time division-code division multiple access (TD-CDMA), or universal mobile telecommunication system (UMTS) UE. 10. The network device of claim 1, wherein the resource allocation information provides information related to one of time division multiple access (TDMA) resources or timeslots and the different resources are one of TDMA resources or timeslots. 11. A method performed by a network device, the method comprising: sending, by the network device to a user equipment (UE), resource allocation information associated with a physical uplink control channel, wherein the physical uplink control channel and a physical uplink shared channel have different resources; receiving, by the network device over the physical uplink shared channel, data at assigned times; receiving, by the network device at times that it is not receiving the physical uplink shared channel, a signal over the physical uplink control channel in relation to the sent resource allocation information; and sending, by the network device over a downlink control channel, feedback information. 12. The method of claim 11, wherein the network device is further configured to send data over a physical downlink shared channel. 13. The method of claim 12, wherein the downlink control channel and the physical downlink shared channel are time multiplexed. 14. The method of claim 11, wherein the feedback information includes power control information. 15. The method of claim 11, wherein the downlink control channel includes power control information for a plurality of UEs using different bits. 16. The method of claim 11, wherein the times that the signal over the physical uplink control channel is received by the network device, signals are received over other physical uplink control channels in the times from a plurality of UEs. 17. The method of claim 11 further comprising: the physical uplink control channel, the physical uplink shared channel, or the downlink control channel is any one of a time division multiple access (TDMA), code division multiple access (CDMA), time division duplex (TDD), frequency division duplex (FDD), time division-code division multiple access (TD-CDMA), or universal mobile telecommunication system (UMTS) channel. 18. The method of claim 11, wherein the network device is configured as any one of a time division multiple access (TDMA), code division multiple access (CDMA), time division duplex (TDD), frequency division duplex (FDD), time division-code division multiple access (TD-CDMA), or universal mobile telecommunication system (UMTS) network device or the network device is configured as a radio network controller. 19. The method of claim 11, wherein the UE is configured as any one of a time division multiple access (TDMA), code division multiple access (CDMA), time division duplex (TDD), frequency division duplex (FDD), time division-code division multiple access (TD-CDMA), or universal mobile telecommunication system (UMTS) UE. 20. The method of claim 11, wherein the resource allocation information provides information related to one of time division multiple access (TDMA) resources or timeslots and the different resources are one of TDMA resources or timeslots.
A network device that sends resource allocation information associated with a physical uplink control channel is disclosed. The physical uplink control channel and a physical uplink shared channel may have different resources. The network device may receive, at times that the physical uplink shared channel is not received, a signal over the physical uplink control channel in relation to the sent resource allocation information.1. A network device characterized in that: a transceiver is configured to send, to a user equipment (UE), resource allocation information associated with a physical uplink control channel, wherein the physical uplink control channel and a physical uplink shared channel have different resources; the network device is configured to receive, over the physical uplink shared channel, data at assigned times; the network device is further configured to receive, at times that the physical uplink shared channel is not received, a signal over the physical uplink control channel in relation to the sent resource allocation information; and the transceiver is further configured to send, over a downlink control channel, feedback information. 2. The network device of claim 1, wherein the transceiver is further configured to send data over a physical downlink shared channel. 3. The network device of claim 2, wherein the downlink control channel and the physical downlink shared channel are time multiplexed. 4. The network device of claim 1, wherein the feedback information includes power control information. 5. The network device of claim 1, wherein the downlink control channel includes power control information for a plurality of UEs using different bits. 6. The network device of claim 1, wherein the times that the signal over the physical uplink control channel is received by the network device, signals are received over other physical uplink control channels in the times from a plurality of UEs. 7. The network device of claim 1 further comprising: the physical uplink control channel, the physical uplink shared channel, or the downlink control channel is any one of a time division multiple access (TDMA), code division multiple access (CDMA), time division duplex (TDD), frequency division duplex (FDD), time division-code division multiple access (TD-CDMA), or universal mobile telecommunication system (UMTS) channel. 8. The network device of claim 1, wherein the network device is configured as any one of a time division multiple access (TDMA), code division multiple access (CDMA), time division duplex (TDD), frequency division duplex (FDD), time division-code division multiple access (TD-CDMA), or universal mobile telecommunication system (UMTS) network device or the network device is configured as a radio network controller. 9. The network device of claim 1, wherein the UE is configured as any one of a time division multiple access (TDMA), code division multiple access (CDMA), time division duplex (TDD), frequency division duplex (FDD), time division-code division multiple access (TD-CDMA), or universal mobile telecommunication system (UMTS) UE. 10. The network device of claim 1, wherein the resource allocation information provides information related to one of time division multiple access (TDMA) resources or timeslots and the different resources are one of TDMA resources or timeslots. 11. A method performed by a network device, the method comprising: sending, by the network device to a user equipment (UE), resource allocation information associated with a physical uplink control channel, wherein the physical uplink control channel and a physical uplink shared channel have different resources; receiving, by the network device over the physical uplink shared channel, data at assigned times; receiving, by the network device at times that it is not receiving the physical uplink shared channel, a signal over the physical uplink control channel in relation to the sent resource allocation information; and sending, by the network device over a downlink control channel, feedback information. 12. The method of claim 11, wherein the network device is further configured to send data over a physical downlink shared channel. 13. The method of claim 12, wherein the downlink control channel and the physical downlink shared channel are time multiplexed. 14. The method of claim 11, wherein the feedback information includes power control information. 15. The method of claim 11, wherein the downlink control channel includes power control information for a plurality of UEs using different bits. 16. The method of claim 11, wherein the times that the signal over the physical uplink control channel is received by the network device, signals are received over other physical uplink control channels in the times from a plurality of UEs. 17. The method of claim 11 further comprising: the physical uplink control channel, the physical uplink shared channel, or the downlink control channel is any one of a time division multiple access (TDMA), code division multiple access (CDMA), time division duplex (TDD), frequency division duplex (FDD), time division-code division multiple access (TD-CDMA), or universal mobile telecommunication system (UMTS) channel. 18. The method of claim 11, wherein the network device is configured as any one of a time division multiple access (TDMA), code division multiple access (CDMA), time division duplex (TDD), frequency division duplex (FDD), time division-code division multiple access (TD-CDMA), or universal mobile telecommunication system (UMTS) network device or the network device is configured as a radio network controller. 19. The method of claim 11, wherein the UE is configured as any one of a time division multiple access (TDMA), code division multiple access (CDMA), time division duplex (TDD), frequency division duplex (FDD), time division-code division multiple access (TD-CDMA), or universal mobile telecommunication system (UMTS) UE. 20. The method of claim 11, wherein the resource allocation information provides information related to one of time division multiple access (TDMA) resources or timeslots and the different resources are one of TDMA resources or timeslots.
2,400
8,088
8,088
15,805,193
2,474
An intelligent network management device including an analytic unit, conducting an analysis according to received packets in order to determine whether a given event is occurred; and a processing unit, generating and sending a control instruction to a SDN controller to change configurations of a SDN switch when the analytic unit determined the given event has been occurred.
1. An intelligent network management device, disposed in a software-defined network (SDN) and connected to a SDN switch and connected to a SDN controller configured to control the SDN switch via a flow table of the SDN switch, the intelligent network management device comprising an analytic unit portion and a processing unit portion, wherein: the analytic unit portion of the intelligent network management device is configured to conduct an analysis according to packets received by the intelligent network management device via the SDN switch to determine whether a given event has occurred and notify the processing unit portion of the intelligent network management device when the given event is determined to have occurred; and the processing unit portion of the intelligent network management device is configured to generate and send an instruction to the SDN controller to change configurations of the SDN switch flow table when the analytic unit portion of the intelligent network management device determines that the given event has occurred. 2. The intelligent network management device as claimed in claim 1, wherein the intelligent network management device is an intrusion prevention system (IPS) device. 3. The intelligent network management device as claimed in claim 1, wherein the configurations maintained within the SDN switch are changed by the SDN controller as instructed by the intelligent network management device so that the SDN switch at least affects subsequent network flow to the intelligent network management device in the SDN. 4. (canceled) 5. The intelligent network management device as claimed in claim 1, wherein the configurations of the SDN switch are changed so that the SDN switch at least affects subsequent packets sent to the intelligent network management device in the SDN. 6. The intelligent network management device as claimed in claim 5, wherein the given event is an attack event and the SDN switch accordingly blocks packets from a source of the attack event from being further sent to the intelligent network management device. 7. (canceled) 8. The intelligent network management device as claimed in claim 5, wherein the given event determined by the analytic unit portion of the intelligent network management device is an unanalyzable-packet event and the configuration of the SDN switch is changed by the SDN controller such that the SDN switch accordingly stops sending packets unanalyzable by the intelligent network management device to the intelligent network management device. 9. The intelligent network management device as claimed in claim 5, wherein the given event determined by the analytic unit portion of the intelligent network management device is an unanalyzable-packet event and the configuration of the SDN switch is changed by the SDN controller such that the SDN switch accordingly sends packets unanalyzable by the intelligent network management device to a pre-processing device to be converted into packets analyzable by the intelligent network management device. 10. The intelligent network management device as claimed in claim 8, wherein the packets unanalyzable by the intelligent network management device are encrypted, and wherein the configuration of the SDN switch is changed by the SDN controller such that the SDN switch sends the packets that are encrypted to an appliance for pre-processing. 11. A network management method, used in an intelligent network management device comprising an analytic unit conducting configured to conduct an analysis according to packets received by the intelligent network management device via software-defined network (SDN) switch to determine whether a given event has occurred; and a processing unit configured to generate and send an instruction to an SDN controller operatively coupled to both the intelligent network management device and the SDN switch and configured to change configurations of a flow table of the SDN switch when the analytic unit determines that the given event has occurred, the method comprising: conducting an analysis according to packets received by the intelligent network management device via the SDN switch to determine whether a given event has occurred and notifying the processing unit when the given event is determined to have occurred; and generating and sending an instruction to the SDN controller to change configurations of the SDN switch flow table when the analytic unit determines that the given event has occurred. 12. A network management method, adopted by an intelligent network management device disposed in a software-defined network (SDN) and connected to a SDN switch and a SDN controller used to control the SDN switch via a flow table of the SDN switch, the method comprising: conducting an analysis according to packets received by the intelligent network management device via the SDN switch to determine whether a given event has occurred; further determining whether the given event is preferred to be handled by the SDN controller when the given event is determined to have occurred; and generating and sending an instruction to the SDN controller to change configurations of the SDN switch flow table when the given event is determined to be preferred to be handled by the SDN controller. 13. A computer program product comprising a non-transitory computer usable storage device having program code embodied thereon that is configured to perform, when executed by a data processor, the method of claim 11. 14. The intelligent network management device as claimed in claim 1, wherein the instruction is an instruction to change configurations of the SDN switch to block subsequent attack packets, and wherein the processing unit portion of the intelligent network management device sends the instruction to the SDN switch instructing the SDN switch to block the subsequent attack packets. 15. The intelligent network management device as claimed in claim 1, wherein the intelligent network management device is configured to block packets received from the SDN switch. 16. The intelligent network management device as claimed in claim 1, wherein the intelligent network management device and the SDN switch are operatively coupled to an appliance. 17. The intelligent network management device as claimed in claim 16, wherein the intelligent network management device is configured to receive decrypted packets decrypted by the appliance. 18. The intelligent network management device as claimed in claim 10, wherein the intelligent network management device is configured to receive decrypted packets decrypted by the appliance.
An intelligent network management device including an analytic unit, conducting an analysis according to received packets in order to determine whether a given event is occurred; and a processing unit, generating and sending a control instruction to a SDN controller to change configurations of a SDN switch when the analytic unit determined the given event has been occurred.1. An intelligent network management device, disposed in a software-defined network (SDN) and connected to a SDN switch and connected to a SDN controller configured to control the SDN switch via a flow table of the SDN switch, the intelligent network management device comprising an analytic unit portion and a processing unit portion, wherein: the analytic unit portion of the intelligent network management device is configured to conduct an analysis according to packets received by the intelligent network management device via the SDN switch to determine whether a given event has occurred and notify the processing unit portion of the intelligent network management device when the given event is determined to have occurred; and the processing unit portion of the intelligent network management device is configured to generate and send an instruction to the SDN controller to change configurations of the SDN switch flow table when the analytic unit portion of the intelligent network management device determines that the given event has occurred. 2. The intelligent network management device as claimed in claim 1, wherein the intelligent network management device is an intrusion prevention system (IPS) device. 3. The intelligent network management device as claimed in claim 1, wherein the configurations maintained within the SDN switch are changed by the SDN controller as instructed by the intelligent network management device so that the SDN switch at least affects subsequent network flow to the intelligent network management device in the SDN. 4. (canceled) 5. The intelligent network management device as claimed in claim 1, wherein the configurations of the SDN switch are changed so that the SDN switch at least affects subsequent packets sent to the intelligent network management device in the SDN. 6. The intelligent network management device as claimed in claim 5, wherein the given event is an attack event and the SDN switch accordingly blocks packets from a source of the attack event from being further sent to the intelligent network management device. 7. (canceled) 8. The intelligent network management device as claimed in claim 5, wherein the given event determined by the analytic unit portion of the intelligent network management device is an unanalyzable-packet event and the configuration of the SDN switch is changed by the SDN controller such that the SDN switch accordingly stops sending packets unanalyzable by the intelligent network management device to the intelligent network management device. 9. The intelligent network management device as claimed in claim 5, wherein the given event determined by the analytic unit portion of the intelligent network management device is an unanalyzable-packet event and the configuration of the SDN switch is changed by the SDN controller such that the SDN switch accordingly sends packets unanalyzable by the intelligent network management device to a pre-processing device to be converted into packets analyzable by the intelligent network management device. 10. The intelligent network management device as claimed in claim 8, wherein the packets unanalyzable by the intelligent network management device are encrypted, and wherein the configuration of the SDN switch is changed by the SDN controller such that the SDN switch sends the packets that are encrypted to an appliance for pre-processing. 11. A network management method, used in an intelligent network management device comprising an analytic unit conducting configured to conduct an analysis according to packets received by the intelligent network management device via software-defined network (SDN) switch to determine whether a given event has occurred; and a processing unit configured to generate and send an instruction to an SDN controller operatively coupled to both the intelligent network management device and the SDN switch and configured to change configurations of a flow table of the SDN switch when the analytic unit determines that the given event has occurred, the method comprising: conducting an analysis according to packets received by the intelligent network management device via the SDN switch to determine whether a given event has occurred and notifying the processing unit when the given event is determined to have occurred; and generating and sending an instruction to the SDN controller to change configurations of the SDN switch flow table when the analytic unit determines that the given event has occurred. 12. A network management method, adopted by an intelligent network management device disposed in a software-defined network (SDN) and connected to a SDN switch and a SDN controller used to control the SDN switch via a flow table of the SDN switch, the method comprising: conducting an analysis according to packets received by the intelligent network management device via the SDN switch to determine whether a given event has occurred; further determining whether the given event is preferred to be handled by the SDN controller when the given event is determined to have occurred; and generating and sending an instruction to the SDN controller to change configurations of the SDN switch flow table when the given event is determined to be preferred to be handled by the SDN controller. 13. A computer program product comprising a non-transitory computer usable storage device having program code embodied thereon that is configured to perform, when executed by a data processor, the method of claim 11. 14. The intelligent network management device as claimed in claim 1, wherein the instruction is an instruction to change configurations of the SDN switch to block subsequent attack packets, and wherein the processing unit portion of the intelligent network management device sends the instruction to the SDN switch instructing the SDN switch to block the subsequent attack packets. 15. The intelligent network management device as claimed in claim 1, wherein the intelligent network management device is configured to block packets received from the SDN switch. 16. The intelligent network management device as claimed in claim 1, wherein the intelligent network management device and the SDN switch are operatively coupled to an appliance. 17. The intelligent network management device as claimed in claim 16, wherein the intelligent network management device is configured to receive decrypted packets decrypted by the appliance. 18. The intelligent network management device as claimed in claim 10, wherein the intelligent network management device is configured to receive decrypted packets decrypted by the appliance.
2,400
8,089
8,089
12,894,496
2,455
Virtual resources may be provisioned in a manner that is aware of, and respects, underlying implementation resource boundaries. A customer of the virtual resource provider may specify that particular virtual resources are to be implemented with implementation resources that are dedicated to the customer. Dedicating an implementation resource to a particular customer of a virtual resource provider may establish one or more information barriers between the particular customer and other customers of the virtual resource provider. Implementation resources may require transition procedures, including custom transition procedures, to enter and exit dedicated implementation resource pools. Costs corresponding to active and inactive implementation resources in a dedicated pools associated with a particular customer may be accounted for, and presented to, the customer in a variety of ways including explicit, adjusted per customer and adjusted per type of virtual resource and/or implementation resource.
1. A computer-implemented method for provisioning virtual resources, comprising: under control of one or more computer systems configured with executable instructions, receiving, at a control plane of a virtual resource provider having a plurality of customers, a request to provision a virtual resource from at least one of a set of customers of the virtual resource provider, the requested virtual resource having an associated set of implementation resources including at least one implementation resource incorporating at least one information barrier and capable of implementing a plurality of virtual resources associated with the plurality of customers behind said at least one information barrier, the request having an associated set of implementation resource constraints including at least one dedicated implementation resource constraint specifying that said at least one implementation resource is to be dedicated to virtual resources of the set of customers; establishing said at least one information barrier between the set of customers and other customers of the virtual resource provider at least in part by dedicating said at least one implementation resource to virtual resources of the set of customers in accordance with said at least one dedicated implementation resource constraint; and provisioning the requested virtual resource at least in part by allocating the set of implementation resources to the virtual resource, the allocated set of implementation resources including said at least one implementation resource. 2. A computer-implemented method according to claim 1, wherein dedicating said at least one implementation resource comprises transitioning said at least one implementation resource from a general implementation resource pool to a dedicated implementation resource pool associated with the set of customers. 3. A computer-implemented method according to claim 1, wherein said at least one information barrier corresponds at least in part to a physical separation of said at least one implementation resource from other implementation resources of the virtual resource provider. 4. A computer-implemented method for provisioning virtual resources, comprising: under control of one or more computer systems configured with executable instructions, receiving a request to provision a virtual resource, the request indicating that the virtual resource is to be implemented at least in part with at least one implementation resource that is dedicated to a set of customers of a virtual resource provider, said at least one implementation resource incorporating at least one information barrier and being capable of at least partially implementing a plurality of virtual resources associated with a plurality of customers of the virtual resource provider behind said at least one information barrier; identifying a set of unallocated implementation resources dedicated to the set of customers and checking that the set of unallocated implementation resources includes said at least one implementation resource; and provisioning the virtual resource at least in part by allocating said at least one implementation resource to the virtual resource from the set of implementation resources dedicated to the set of customers thereby, at least in part, establishing said at least one information barrier between the set of customers and other customers of the virtual resource provider. 5. A computer-implemented method according to claim 4, wherein establishing said at least one information barrier lowers a probability that at least one of the other customers of the virtual resource provider gains access to unpublished information concerning the virtual resource. 6. A computer-implemented method according to claim 4, further comprising dedicating said at least one implementation resource to the set of customers at least in part by transitioning said at least one implementation resource from a general implementation resource pool of the virtual resource provider to a dedicated implementation resource pool associated with the set of customers. 7. A computer-implemented method according to claim 6, wherein the dedicating is predictive based at least in part on a forecast demand for the virtual resource by the set of customers. 8. A computer-implemented method according to claim 6, wherein transitioning said at least one implementation resource from the general implementation resource pool to the dedicated implementation resource pool comprises performing an implementation resource transition procedure specified by at least one of the set of customers. 9. A computer-implemented method according to claim 8, wherein at least one of the set of customers selects the implementation resource transition procedure from a plurality of implementation resource transition procedures offered by the virtual resource provider. 10. A computer-implemented method according to claim 8, wherein the implementation resource transition procedure reduces an amount of residual information associated with activity of said at least one implementation resource while in the general implementation resource pool. 11. A computer-implemented method according to claim 4, wherein at least one of the set of customers makes the request at a Web-based interface of the virtual resource provider. 12. A computer-implemented method according to claim 4, wherein the virtual resource comprises at least one of: a virtual computer system, a virtual data store, and a virtual private network. 13. A computer-implemented method according to claim 4, wherein said at least one implementation resource comprises at least one of: a storage device, a physical server, a server rack, a physically secured portion of a data center, a portion of a data center monitored with respect to physical access, a data center, a mobile data center, a network switch, a network connection, a wireless network transmitter, and a wireless network receiver. 14. A computer-implemented method for provisioning virtual resources, comprising: under control of one or more computer systems configured with executable instructions, maintaining a general implementation resource pool including at least one general implementation resource configured to at least partially implement a plurality of virtual resources associated with a plurality of customers of a virtual resource provider; maintaining a dedicated implementation resource pool including at least one dedicated implementation resource dedicated to a subset of the plurality of customers of the virtual resource provider; receiving a request to provision a virtual resource, the request associated with an implementation constraint specifying that the virtual resource be at least partially implemented with at least one implementation resource drawn from the dedicated implementation resource pool; and in response to the request, provisioning the virtual resource at least in part by allocating said at least one dedicated implementation resource to the virtual resource. 15. A computer-implemented method according to claim 14, wherein maintaining the dedicated implementation resource pool comprises transitioning implementation resources from the general implementation resource pool to the dedicated implementation resource pool when an inactivity level of the dedicated implementation resource pool is less than a first threshold. 16. A computer-implemented method according to claim 15, wherein maintaining the dedicated implementation resource pool further comprises transitioning implementation resources from the dedicated implementation resource pool to the general implementation resource pool when the inactivity level of the dedicated implementation resource pool is greater than a second threshold. 17. A computer-implemented method according to claim 14, wherein maintaining the dedicated implementation resource pool comprises transitioning implementation resources based at least in part on a derivative of an activity level associated with the dedicated implementation resource pool. 18. A computer-implemented method according to claim 14, wherein provisioning the virtual resource with said at least one dedicated implementation resource establishes, at least in part, an information barrier between the subset of the plurality of customers and other customers of the virtual resource provider. 19. A computer-implemented method according to claim 18, wherein provisioning the virtual resource with said at least one dedicated implementation resource lowers a probability that at least one of the other customers of the virtual resource provider is able to make authorized modifications to data associated with the virtual resource. 20. A computer-implemented method according to claim 14, wherein provisioning the virtual resource with said at least one dedicated implementation resource increases a performance metric associated with the virtual resource relative to at least one virtual resource provisioned with said at least one general implementation resource. 21. A computer-implemented method according to claim 14, wherein provisioning the virtual resource with the dedicated implementation resource isolates the virtual resource, at least in part, from at least one operational fault occurring at said at least one general implementation resource. 22. A computerized system for provisioning virtual resources, comprising: a plurality of implementation resources collectively capable of implementing a plurality of virtual resources associated with a plurality of customers of a virtual resource provider; a provisioning interface configured at least to enable the plurality of customers to make requests to provision virtual resources; and an implementation resource allocation component configured at least to track allocation of the plurality of implementation resources to the plurality of virtual resources and modify the allocation responsive to the requests including: dedicating at least one of the plurality of implementation resources to at least one customer of the plurality of customers, said at least one of the plurality of implementation resources incorporating at least one information barrier; and establishing said at least one information barrier between said at least one customer and other customers of the virtual resource provider at least in part by allocating said at least one of the plurality of implementation resources to at least one virtual resource requested by said at least one customer when the request indicates that said at least one virtual resource is to be implemented at least in part with implementation resources that are dedicated to said at least one customer. 23. A computerized system according to claim 22, wherein the implementation resource allocation component is further configured to, at least: maintain a dedicated implementation resource pool containing at least two of the plurality of implementation resources dedicated to said at least one customer, each implementation resources having a virtual resource implementation capacity and a current level of allocation to virtual resource implementation; and assign said at least one virtual resource requested by said at least one customer to an implementation resource in the dedicated implementation resource pool having a greatest current level of allocation when the assignment does not exceed the implementation capacity of the implementation resource. 24. A computerized system according to claim 23, wherein the implementation resource allocation component is further configured at least to migrate virtual resources from implementation resources in the dedicated implementation resource pool having lower current levels of allocation to implementation resources in the dedicated implementation resource pool having higher current levels of allocation when the migration would not exceed the implementation capacities of the implementation resources in the dedicated implementation resource pool having higher current levels of allocation. 25. One or more computer-readable media having collectively thereon computer-executable instructions that configure one or more computers to collectively, at least: maintain a plurality of implementation resource pools including at least one dedicated implementation resource pool that includes at least one implementation resource dedicated to at least one customer of a plurality of customers of a virtual resource provider, said at least one implementation resource incorporating at least one information barrier; receive a request to provision at least one virtual resource, the request associated with at least a first implementation constraint specifying that said at least one virtual resource be at least partially implemented with said at least one implementation resource in said at least one dedicated implementation resource pool; and in response to the request, provisioning said at least one virtual resource at least in part by allocating said at least one implementation resource to said at least one virtual resource thereby, at least in part, establishing said at least one information barrier between said at least one customer and other customers of the virtual resource provider. 26. One or more computer-readable media according to claim 25, wherein: said at least one virtual resource includes a plurality of virtual resources; the request is further at least associated with a second implementation constraint specifying a target implementation spread of the plurality of virtual resources over a plurality of implementation resources in said at least one dedicated implementation resource pool; and the provisioning comprises allocating the plurality of virtual resources to the plurality of implementation resources such that a ratio of allocated virtual resources to implementation resources is no greater than the target implementation spread. 27. One or more computer-readable media according to claim 26, wherein: the request is further at least associated with a third implementation constraint specifying a target geographic separation of the plurality of implementation resources; and the provisioning further comprises allocating the plurality of virtual resources to the plurality of implementation resources such that at least two of the plurality of implementation resources are separated by a geographic distance of at least the target geographic separation.
Virtual resources may be provisioned in a manner that is aware of, and respects, underlying implementation resource boundaries. A customer of the virtual resource provider may specify that particular virtual resources are to be implemented with implementation resources that are dedicated to the customer. Dedicating an implementation resource to a particular customer of a virtual resource provider may establish one or more information barriers between the particular customer and other customers of the virtual resource provider. Implementation resources may require transition procedures, including custom transition procedures, to enter and exit dedicated implementation resource pools. Costs corresponding to active and inactive implementation resources in a dedicated pools associated with a particular customer may be accounted for, and presented to, the customer in a variety of ways including explicit, adjusted per customer and adjusted per type of virtual resource and/or implementation resource.1. A computer-implemented method for provisioning virtual resources, comprising: under control of one or more computer systems configured with executable instructions, receiving, at a control plane of a virtual resource provider having a plurality of customers, a request to provision a virtual resource from at least one of a set of customers of the virtual resource provider, the requested virtual resource having an associated set of implementation resources including at least one implementation resource incorporating at least one information barrier and capable of implementing a plurality of virtual resources associated with the plurality of customers behind said at least one information barrier, the request having an associated set of implementation resource constraints including at least one dedicated implementation resource constraint specifying that said at least one implementation resource is to be dedicated to virtual resources of the set of customers; establishing said at least one information barrier between the set of customers and other customers of the virtual resource provider at least in part by dedicating said at least one implementation resource to virtual resources of the set of customers in accordance with said at least one dedicated implementation resource constraint; and provisioning the requested virtual resource at least in part by allocating the set of implementation resources to the virtual resource, the allocated set of implementation resources including said at least one implementation resource. 2. A computer-implemented method according to claim 1, wherein dedicating said at least one implementation resource comprises transitioning said at least one implementation resource from a general implementation resource pool to a dedicated implementation resource pool associated with the set of customers. 3. A computer-implemented method according to claim 1, wherein said at least one information barrier corresponds at least in part to a physical separation of said at least one implementation resource from other implementation resources of the virtual resource provider. 4. A computer-implemented method for provisioning virtual resources, comprising: under control of one or more computer systems configured with executable instructions, receiving a request to provision a virtual resource, the request indicating that the virtual resource is to be implemented at least in part with at least one implementation resource that is dedicated to a set of customers of a virtual resource provider, said at least one implementation resource incorporating at least one information barrier and being capable of at least partially implementing a plurality of virtual resources associated with a plurality of customers of the virtual resource provider behind said at least one information barrier; identifying a set of unallocated implementation resources dedicated to the set of customers and checking that the set of unallocated implementation resources includes said at least one implementation resource; and provisioning the virtual resource at least in part by allocating said at least one implementation resource to the virtual resource from the set of implementation resources dedicated to the set of customers thereby, at least in part, establishing said at least one information barrier between the set of customers and other customers of the virtual resource provider. 5. A computer-implemented method according to claim 4, wherein establishing said at least one information barrier lowers a probability that at least one of the other customers of the virtual resource provider gains access to unpublished information concerning the virtual resource. 6. A computer-implemented method according to claim 4, further comprising dedicating said at least one implementation resource to the set of customers at least in part by transitioning said at least one implementation resource from a general implementation resource pool of the virtual resource provider to a dedicated implementation resource pool associated with the set of customers. 7. A computer-implemented method according to claim 6, wherein the dedicating is predictive based at least in part on a forecast demand for the virtual resource by the set of customers. 8. A computer-implemented method according to claim 6, wherein transitioning said at least one implementation resource from the general implementation resource pool to the dedicated implementation resource pool comprises performing an implementation resource transition procedure specified by at least one of the set of customers. 9. A computer-implemented method according to claim 8, wherein at least one of the set of customers selects the implementation resource transition procedure from a plurality of implementation resource transition procedures offered by the virtual resource provider. 10. A computer-implemented method according to claim 8, wherein the implementation resource transition procedure reduces an amount of residual information associated with activity of said at least one implementation resource while in the general implementation resource pool. 11. A computer-implemented method according to claim 4, wherein at least one of the set of customers makes the request at a Web-based interface of the virtual resource provider. 12. A computer-implemented method according to claim 4, wherein the virtual resource comprises at least one of: a virtual computer system, a virtual data store, and a virtual private network. 13. A computer-implemented method according to claim 4, wherein said at least one implementation resource comprises at least one of: a storage device, a physical server, a server rack, a physically secured portion of a data center, a portion of a data center monitored with respect to physical access, a data center, a mobile data center, a network switch, a network connection, a wireless network transmitter, and a wireless network receiver. 14. A computer-implemented method for provisioning virtual resources, comprising: under control of one or more computer systems configured with executable instructions, maintaining a general implementation resource pool including at least one general implementation resource configured to at least partially implement a plurality of virtual resources associated with a plurality of customers of a virtual resource provider; maintaining a dedicated implementation resource pool including at least one dedicated implementation resource dedicated to a subset of the plurality of customers of the virtual resource provider; receiving a request to provision a virtual resource, the request associated with an implementation constraint specifying that the virtual resource be at least partially implemented with at least one implementation resource drawn from the dedicated implementation resource pool; and in response to the request, provisioning the virtual resource at least in part by allocating said at least one dedicated implementation resource to the virtual resource. 15. A computer-implemented method according to claim 14, wherein maintaining the dedicated implementation resource pool comprises transitioning implementation resources from the general implementation resource pool to the dedicated implementation resource pool when an inactivity level of the dedicated implementation resource pool is less than a first threshold. 16. A computer-implemented method according to claim 15, wherein maintaining the dedicated implementation resource pool further comprises transitioning implementation resources from the dedicated implementation resource pool to the general implementation resource pool when the inactivity level of the dedicated implementation resource pool is greater than a second threshold. 17. A computer-implemented method according to claim 14, wherein maintaining the dedicated implementation resource pool comprises transitioning implementation resources based at least in part on a derivative of an activity level associated with the dedicated implementation resource pool. 18. A computer-implemented method according to claim 14, wherein provisioning the virtual resource with said at least one dedicated implementation resource establishes, at least in part, an information barrier between the subset of the plurality of customers and other customers of the virtual resource provider. 19. A computer-implemented method according to claim 18, wherein provisioning the virtual resource with said at least one dedicated implementation resource lowers a probability that at least one of the other customers of the virtual resource provider is able to make authorized modifications to data associated with the virtual resource. 20. A computer-implemented method according to claim 14, wherein provisioning the virtual resource with said at least one dedicated implementation resource increases a performance metric associated with the virtual resource relative to at least one virtual resource provisioned with said at least one general implementation resource. 21. A computer-implemented method according to claim 14, wherein provisioning the virtual resource with the dedicated implementation resource isolates the virtual resource, at least in part, from at least one operational fault occurring at said at least one general implementation resource. 22. A computerized system for provisioning virtual resources, comprising: a plurality of implementation resources collectively capable of implementing a plurality of virtual resources associated with a plurality of customers of a virtual resource provider; a provisioning interface configured at least to enable the plurality of customers to make requests to provision virtual resources; and an implementation resource allocation component configured at least to track allocation of the plurality of implementation resources to the plurality of virtual resources and modify the allocation responsive to the requests including: dedicating at least one of the plurality of implementation resources to at least one customer of the plurality of customers, said at least one of the plurality of implementation resources incorporating at least one information barrier; and establishing said at least one information barrier between said at least one customer and other customers of the virtual resource provider at least in part by allocating said at least one of the plurality of implementation resources to at least one virtual resource requested by said at least one customer when the request indicates that said at least one virtual resource is to be implemented at least in part with implementation resources that are dedicated to said at least one customer. 23. A computerized system according to claim 22, wherein the implementation resource allocation component is further configured to, at least: maintain a dedicated implementation resource pool containing at least two of the plurality of implementation resources dedicated to said at least one customer, each implementation resources having a virtual resource implementation capacity and a current level of allocation to virtual resource implementation; and assign said at least one virtual resource requested by said at least one customer to an implementation resource in the dedicated implementation resource pool having a greatest current level of allocation when the assignment does not exceed the implementation capacity of the implementation resource. 24. A computerized system according to claim 23, wherein the implementation resource allocation component is further configured at least to migrate virtual resources from implementation resources in the dedicated implementation resource pool having lower current levels of allocation to implementation resources in the dedicated implementation resource pool having higher current levels of allocation when the migration would not exceed the implementation capacities of the implementation resources in the dedicated implementation resource pool having higher current levels of allocation. 25. One or more computer-readable media having collectively thereon computer-executable instructions that configure one or more computers to collectively, at least: maintain a plurality of implementation resource pools including at least one dedicated implementation resource pool that includes at least one implementation resource dedicated to at least one customer of a plurality of customers of a virtual resource provider, said at least one implementation resource incorporating at least one information barrier; receive a request to provision at least one virtual resource, the request associated with at least a first implementation constraint specifying that said at least one virtual resource be at least partially implemented with said at least one implementation resource in said at least one dedicated implementation resource pool; and in response to the request, provisioning said at least one virtual resource at least in part by allocating said at least one implementation resource to said at least one virtual resource thereby, at least in part, establishing said at least one information barrier between said at least one customer and other customers of the virtual resource provider. 26. One or more computer-readable media according to claim 25, wherein: said at least one virtual resource includes a plurality of virtual resources; the request is further at least associated with a second implementation constraint specifying a target implementation spread of the plurality of virtual resources over a plurality of implementation resources in said at least one dedicated implementation resource pool; and the provisioning comprises allocating the plurality of virtual resources to the plurality of implementation resources such that a ratio of allocated virtual resources to implementation resources is no greater than the target implementation spread. 27. One or more computer-readable media according to claim 26, wherein: the request is further at least associated with a third implementation constraint specifying a target geographic separation of the plurality of implementation resources; and the provisioning further comprises allocating the plurality of virtual resources to the plurality of implementation resources such that at least two of the plurality of implementation resources are separated by a geographic distance of at least the target geographic separation.
2,400
8,090
8,090
14,695,118
2,464
A method and apparatus are provided for classifying received network frames ( 106 ) by using a key composition rule ( 134 ) having a header portion (NF) and multiple variable length key extract commands in a coded order sequence to sequentially generate multiple data fields (FIELD 1 -FIELD n) using operands contained in the key extract commands to generate a lookup key ( 116 ) by combining multiple data fields in the same coded order sequence as the key extract commands.
1. A method comprising: retrieving from memory a first key composition rule comprising a plurality of key extract commands in a coded order sequence; generating a first data field from one or more operands contained in a first key extract command from the plurality of key extract commands; generating a second data field from one or more operands contained in a second key extract command from the plurality of key extract commands; and generating a lookup key by combining the first data field and second data field in the same coded order sequence as the plurality of key extract commands. 2. The method of claim 1, where the key composition rule comprises a header portion specifying how many key extract commands are included in the key composition rule. 3. The method of claim 1, where one or more of the plurality of key extract commands comprises a field extract command for providing a pointer to a frame header parse result, an offset from a protocol header in a frame, and an extract size for extracting a data field from the frame. 4. The method of claim 1, where one or more of the plurality of key extract commands comprises a generic extract command for providing a pointer to a protocol header in a frame, an offset from the protocol header in the frame, and an extract size for extracting a data field from the frame or other data structure. 5. The method of claim 1, where each of the plurality of key extract commands comprises a variable length key extract command. 6. The method of claim 1, where at least one of the key extract commands comprises a mask attribute which may be set to indicate application of one or more mask operands. 7. The method of claim 6, where the at least one of the key extract commands further comprises one or more mask operand values defining a mask and one or more mask offset values for applying the mask. 8. The method of claim 1, where the steps of generating the first and second data fields use pipelined hardware logic to extract the first and second data fields from a frame. 9. The method of claim 1, further comprising looking up frame processing instructions from a lookup table using the lookup key to access a frame classification result. 10. A device for processing a frame, the device comprising: a network interface adapted to receive and output frames; and key generation hardware adapted to receive a first frame from the network interface and a key composition rule from memory, where the key composition rule comprises a plurality of variable length key extract commands in a coded order sequence, the key generation hardware comprising: a decoder for sequentially decoding each variable length key extract command to identify one or more data extract operands, pipelined hardware logic for extracting data from the first frame based on the one or more data extract operands decoded from each variable length key extract command, and a key generator for generating a classification key by combining extracted data from each variable length key extract command in the same coded order sequence as the plurality of variable length key extract commands. 11. The device of claim 10, further comprising frame classification logic for looking up frame processing instructions from a lookup table using the classification key to access a frame classification result. 12. The device of claim 10, where the plurality of variable length key extract commands comprises a variable length field extract command for extracting data from a header in the first frame. 13. The device of claim 12, where the variable length field extract command comprises a field extract command for providing a pointer to a frame header parse result, an offset from a protocol header in the first frame, and an extract size for extracting a data field from the first frame. 14. The device of claim 10, where the plurality of variable length key extract commands comprises a variable length generic extract command for extracting data from data structures associated with the first frame, such as metadata associated with a header in the first frame. 15. The device of claim 14, where the variable length generic extract command comprises a pointer to a protocol header in the first frame, an offset from the protocol header in the first frame, and an extract size for extracting a data field from the first frame or other data structure. 16. The device of claim 10, where each key composition rule comprises a header portion specifying how many variable length key extract commands are included in the key composition rule. 17. The device of claim 10, where at least one of the variable length key extract commands comprises a mask attribute which may be set to indicate application of one or more mask operands. 18. The device of claim 17, where the at least one of the key extract commands further comprises one or more mask operand values defining a mask and one or more mask offset values for applying the mask. 19. A network device comprising at least one processing device and at least one recordable storage medium having stored thereon executable instructions and data which, when executed by the at least one processing device, cause the at least one processing device to process a key composition rule stored in said at least one recordable storage medium to generate a lookup key, said key composition rule comprising: a plurality of variable length key extract commands stored in a coded order sequence in said at least one recordable storage medium, each of said variable length key extract commands containing one or more data extract operands for extracting data from one or more data structures associated with a network frame to generate the lookup key by sequentially combining data extracted under control of the plurality of variable length key extract commands in the same coded order sequence as the plurality of variable length key extract commands; and a header portion specifying how many variable length key extract commands are included in the key composition rule. 20. The network device of claim 19, where at least one of the variable length key extract commands comprises a mask attribute which may be set to indicate application of one or more mask operands and one or more mask operand values defining a mask and one or more mask offset values for applying the mask.
A method and apparatus are provided for classifying received network frames ( 106 ) by using a key composition rule ( 134 ) having a header portion (NF) and multiple variable length key extract commands in a coded order sequence to sequentially generate multiple data fields (FIELD 1 -FIELD n) using operands contained in the key extract commands to generate a lookup key ( 116 ) by combining multiple data fields in the same coded order sequence as the key extract commands.1. A method comprising: retrieving from memory a first key composition rule comprising a plurality of key extract commands in a coded order sequence; generating a first data field from one or more operands contained in a first key extract command from the plurality of key extract commands; generating a second data field from one or more operands contained in a second key extract command from the plurality of key extract commands; and generating a lookup key by combining the first data field and second data field in the same coded order sequence as the plurality of key extract commands. 2. The method of claim 1, where the key composition rule comprises a header portion specifying how many key extract commands are included in the key composition rule. 3. The method of claim 1, where one or more of the plurality of key extract commands comprises a field extract command for providing a pointer to a frame header parse result, an offset from a protocol header in a frame, and an extract size for extracting a data field from the frame. 4. The method of claim 1, where one or more of the plurality of key extract commands comprises a generic extract command for providing a pointer to a protocol header in a frame, an offset from the protocol header in the frame, and an extract size for extracting a data field from the frame or other data structure. 5. The method of claim 1, where each of the plurality of key extract commands comprises a variable length key extract command. 6. The method of claim 1, where at least one of the key extract commands comprises a mask attribute which may be set to indicate application of one or more mask operands. 7. The method of claim 6, where the at least one of the key extract commands further comprises one or more mask operand values defining a mask and one or more mask offset values for applying the mask. 8. The method of claim 1, where the steps of generating the first and second data fields use pipelined hardware logic to extract the first and second data fields from a frame. 9. The method of claim 1, further comprising looking up frame processing instructions from a lookup table using the lookup key to access a frame classification result. 10. A device for processing a frame, the device comprising: a network interface adapted to receive and output frames; and key generation hardware adapted to receive a first frame from the network interface and a key composition rule from memory, where the key composition rule comprises a plurality of variable length key extract commands in a coded order sequence, the key generation hardware comprising: a decoder for sequentially decoding each variable length key extract command to identify one or more data extract operands, pipelined hardware logic for extracting data from the first frame based on the one or more data extract operands decoded from each variable length key extract command, and a key generator for generating a classification key by combining extracted data from each variable length key extract command in the same coded order sequence as the plurality of variable length key extract commands. 11. The device of claim 10, further comprising frame classification logic for looking up frame processing instructions from a lookup table using the classification key to access a frame classification result. 12. The device of claim 10, where the plurality of variable length key extract commands comprises a variable length field extract command for extracting data from a header in the first frame. 13. The device of claim 12, where the variable length field extract command comprises a field extract command for providing a pointer to a frame header parse result, an offset from a protocol header in the first frame, and an extract size for extracting a data field from the first frame. 14. The device of claim 10, where the plurality of variable length key extract commands comprises a variable length generic extract command for extracting data from data structures associated with the first frame, such as metadata associated with a header in the first frame. 15. The device of claim 14, where the variable length generic extract command comprises a pointer to a protocol header in the first frame, an offset from the protocol header in the first frame, and an extract size for extracting a data field from the first frame or other data structure. 16. The device of claim 10, where each key composition rule comprises a header portion specifying how many variable length key extract commands are included in the key composition rule. 17. The device of claim 10, where at least one of the variable length key extract commands comprises a mask attribute which may be set to indicate application of one or more mask operands. 18. The device of claim 17, where the at least one of the key extract commands further comprises one or more mask operand values defining a mask and one or more mask offset values for applying the mask. 19. A network device comprising at least one processing device and at least one recordable storage medium having stored thereon executable instructions and data which, when executed by the at least one processing device, cause the at least one processing device to process a key composition rule stored in said at least one recordable storage medium to generate a lookup key, said key composition rule comprising: a plurality of variable length key extract commands stored in a coded order sequence in said at least one recordable storage medium, each of said variable length key extract commands containing one or more data extract operands for extracting data from one or more data structures associated with a network frame to generate the lookup key by sequentially combining data extracted under control of the plurality of variable length key extract commands in the same coded order sequence as the plurality of variable length key extract commands; and a header portion specifying how many variable length key extract commands are included in the key composition rule. 20. The network device of claim 19, where at least one of the variable length key extract commands comprises a mask attribute which may be set to indicate application of one or more mask operands and one or more mask operand values defining a mask and one or more mask offset values for applying the mask.
2,400
8,091
8,091
13,673,951
2,437
A secure integrated circuit comprises a lower logic layer, and one or more memory layers disposed above the lower logic layer. A security key is provided in one or more of the memory layers for unlocking the logic layer.
1. A secure circuit device comprising: a logic layer; one or more memory layers comprising non-volatile memory cells disposed over the circuit layer and integrated with the logic layer; a plurality of connectors provided between the logic layer and the one or more memory layers to electrically couple the logic layer and the one or more memory layers; and a security key disposed in the non-volatile memory cells of at least one memory layer, the security key being a key required for enabling access to the logic layer for operation. 2. The secure circuit device of claim 1, wherein the one or more memory layers comprises a first memory layer and a second memory layer. 3. The secure circuit device of claim 2, wherein the security key comprises a first key portion disposed in a first area, and a second key portion disposed in a second area that is vertically located with respect to the first area. 4. The secure circuit device of claim 3, wherein the first area is a first memory layer, and the second area is a second memory layer disposed over the first memory layer, wherein the second security key portion is used to unlock the first security key portion, and the first security key portion is used to unlock the logic layer. 5. The secure circuit device of claim 4, further comprising a third security key portion disposed on a third memory layer in a third area that is vertically located with respect to the first area. 6. The secure circuit device of claim 1, wherein the non-volatile memory cells storing the security key are one time programmable memory cells. 7. The secure circuit device of claim 1, wherein the memory cells of the one or more memory layers are two terminal cells. 8. The secure circuit device of claim 7, wherein the two terminal cells are memory cells in a resistive memory (RRAM) a phase-change memory (PCRAM), a ferroelectric memory (FERAM), or a magnetic memory (MRAM). 9. The secure circuit device of claim 1, further comprising a dummy key disposed in the one or more memory layers. 10. The secure circuit device of claim 1, wherein the non-volatile memory cells are resistive memory cells arranged in a crossbar configuration. 11. A system including a secure circuit device comprising: a logic layer; one or more memory layers comprising non-volatile memory cells disposed over the logic layer and integrated with the logic layer in a monolithic structure; and a security key disposed in the non-volatile memory cells of at least one memory layer, the security key being a key required for enabling access to the logic layer for operation. 12. The system including the secure circuit device of claim 11, wherein the one or more memory layers comprises a first memory layer and a second memory layer. 13. The system including the secure circuit device of claim 12, wherein the security key comprises a first key portion disposed in a first area, and a second key portion disposed in a second area that is vertically located with respect to the first area. 14. The system including the secure circuit device of claim 13, wherein the first area is a first memory layer, and the second area is a second memory layer disposed over the first memory layer, wherein the second security key portion is used to unlock the first security key portion, and the first security key portion is used to unlock the logic layer. 15. The system including the secure circuit device of claim 14, further comprising a third security key portion disposed on a third memory layer, wherein the first, second, and third security key portions are all needed to unlock the logic layer. 16. The system including the secure circuit device of claim 11, wherein the non-volatile memory cells storing the security key are one time programmable memory cells. 17. The system including the secure circuit device of claim 11, wherein the memory cells of the one or more memory layers are two terminal cells. 18. The system including the secure circuit device of claim 14, further comprising a dummy key disposed in the one or more memory layers. 19. The system including the secure circuit device of claim 11, wherein the non-volatile memory cells are resistive memory cells arranged in a crossbar configuration. 20. The system including the secure circuit device of claim 11 wherein the logic layer includes one or more processing or computational elements. 21. The system including the secure circuit device of claim 11 further comprising access logic, wherein the access logic is configured to receive the security key disposed in the non-volatile memory cells and is configured to enable access to the logic layer in response thereto.
A secure integrated circuit comprises a lower logic layer, and one or more memory layers disposed above the lower logic layer. A security key is provided in one or more of the memory layers for unlocking the logic layer.1. A secure circuit device comprising: a logic layer; one or more memory layers comprising non-volatile memory cells disposed over the circuit layer and integrated with the logic layer; a plurality of connectors provided between the logic layer and the one or more memory layers to electrically couple the logic layer and the one or more memory layers; and a security key disposed in the non-volatile memory cells of at least one memory layer, the security key being a key required for enabling access to the logic layer for operation. 2. The secure circuit device of claim 1, wherein the one or more memory layers comprises a first memory layer and a second memory layer. 3. The secure circuit device of claim 2, wherein the security key comprises a first key portion disposed in a first area, and a second key portion disposed in a second area that is vertically located with respect to the first area. 4. The secure circuit device of claim 3, wherein the first area is a first memory layer, and the second area is a second memory layer disposed over the first memory layer, wherein the second security key portion is used to unlock the first security key portion, and the first security key portion is used to unlock the logic layer. 5. The secure circuit device of claim 4, further comprising a third security key portion disposed on a third memory layer in a third area that is vertically located with respect to the first area. 6. The secure circuit device of claim 1, wherein the non-volatile memory cells storing the security key are one time programmable memory cells. 7. The secure circuit device of claim 1, wherein the memory cells of the one or more memory layers are two terminal cells. 8. The secure circuit device of claim 7, wherein the two terminal cells are memory cells in a resistive memory (RRAM) a phase-change memory (PCRAM), a ferroelectric memory (FERAM), or a magnetic memory (MRAM). 9. The secure circuit device of claim 1, further comprising a dummy key disposed in the one or more memory layers. 10. The secure circuit device of claim 1, wherein the non-volatile memory cells are resistive memory cells arranged in a crossbar configuration. 11. A system including a secure circuit device comprising: a logic layer; one or more memory layers comprising non-volatile memory cells disposed over the logic layer and integrated with the logic layer in a monolithic structure; and a security key disposed in the non-volatile memory cells of at least one memory layer, the security key being a key required for enabling access to the logic layer for operation. 12. The system including the secure circuit device of claim 11, wherein the one or more memory layers comprises a first memory layer and a second memory layer. 13. The system including the secure circuit device of claim 12, wherein the security key comprises a first key portion disposed in a first area, and a second key portion disposed in a second area that is vertically located with respect to the first area. 14. The system including the secure circuit device of claim 13, wherein the first area is a first memory layer, and the second area is a second memory layer disposed over the first memory layer, wherein the second security key portion is used to unlock the first security key portion, and the first security key portion is used to unlock the logic layer. 15. The system including the secure circuit device of claim 14, further comprising a third security key portion disposed on a third memory layer, wherein the first, second, and third security key portions are all needed to unlock the logic layer. 16. The system including the secure circuit device of claim 11, wherein the non-volatile memory cells storing the security key are one time programmable memory cells. 17. The system including the secure circuit device of claim 11, wherein the memory cells of the one or more memory layers are two terminal cells. 18. The system including the secure circuit device of claim 14, further comprising a dummy key disposed in the one or more memory layers. 19. The system including the secure circuit device of claim 11, wherein the non-volatile memory cells are resistive memory cells arranged in a crossbar configuration. 20. The system including the secure circuit device of claim 11 wherein the logic layer includes one or more processing or computational elements. 21. The system including the secure circuit device of claim 11 further comprising access logic, wherein the access logic is configured to receive the security key disposed in the non-volatile memory cells and is configured to enable access to the logic layer in response thereto.
2,400
8,092
8,092
14,484,042
2,477
Aspects of the present disclosure provide techniques for providing uplink channel coverage enhancements for wireless devices. An example method generally includes determining a power difference value based on a target preamble received power level and a maximum preamble transmit power level, selecting a bundling size for uplink transmissions based on the determined difference, and sending the uplink transmissions, in accordance with the selected bundling size.
1. A method for wireless communications by a user equipment (UE), comprising: determining a power difference value based on a target preamble received power level and a maximum preamble transmit power level; selecting a bundling size for uplink transmissions based on the determined power difference value; and sending the uplink transmissions, in accordance with the selected bundling size. 2. The method of claim 1, wherein the power difference value is also based on a downlink path loss estimate. 3. The method of claim 1, wherein the uplink transmission comprises RACH preamble transmission. 4. The method of claim 3, wherein the RACH preamble transmission comprises a RACH repetition sequence. 5. The method of claim 3, wherein a bundling size for uplink transmission is selected based on the determined power difference value only if the power difference value is greater than zero. 6. A method for wireless communications by a user equipment (UE), comprising: sending a first uplink transmission at a power level and a bundling size; and adjusting the bundling size for one or more subsequent uplink transmissions, if the first uplink transmission fails. 7. The method of claim 6, wherein the first uplink transmission comprises a RACH preamble transmission. 8. The method of claim 7, wherein the RACH preamble transmission comprises a RACH repetition sequence. 9. The method of claim 6, wherein adjusting the bundling size for one or more subsequent uplink transmissions comprises: determining a power difference value based on a target preamble received power level and a maximum preamble transmit power level; and selecting a bundling size for uplink transmissions based on the determined power difference value. 10. The method of claim 6, wherein adjusting the bundling size for one or more subsequent uplink transmissions comprises: adjusting the bundling size for one or more subsequent uplink transmissions after transmission power for a previous uplink transmission has reached a predetermined level. 11. The method of claim 10, wherein the predetermined level corresponds to a maximum uplink transmission power level. 12. The method of claim 10, further comprising: reducing transmission power for subsequent uplink transmissions after increasing the bundling size. 13. A method for wireless communications by a user equipment (UE), comprising: determining a transmission power level for an uplink transmission based, at least in part, on a transmission power level parameter that has a first value for uplink transmissions without bundling and a second value for uplink transmissions with bundling; and sending the uplink transmission, in accordance with the determined transmission power level. 14. The method of claim 13, wherein the uplink transmission comprises a RACH preamble transmission. 15. The method of claim 14, wherein the RACH preamble transmission comprises a RACH repetition sequence. 16. The method of claim 13, wherein the uplink transmission comprises a physical uplink shared channel (PUSCH) transmission. 17. The method of claim 13, further comprising receiving at least one of the first and second values in a broadcast system information block (SIB). 18. A method for wireless communications by a user equipment (UE), comprising: determining a bundling size to use for a random access channel (RACH) procedure, wherein different bundling sizes are used for contention-based and non contention-based RACH procedures; and performing the RACH procedure, in accordance with the determined bundling size. 19. The method of claim 18, wherein a bundling size for a contention based RACH procedure is determined based, at least in part, on downlink path loss estimations. 20. The method of claim 18, wherein a bundling size for a non-contention based RACH procedure is indicated by base station. 21. The method of claim 18, wherein: the RACH procedure is ordered by a base station; and the base station indicates a bundling size to use for the RACH procedure in a physical downlink control channel (PDCCH).
Aspects of the present disclosure provide techniques for providing uplink channel coverage enhancements for wireless devices. An example method generally includes determining a power difference value based on a target preamble received power level and a maximum preamble transmit power level, selecting a bundling size for uplink transmissions based on the determined difference, and sending the uplink transmissions, in accordance with the selected bundling size.1. A method for wireless communications by a user equipment (UE), comprising: determining a power difference value based on a target preamble received power level and a maximum preamble transmit power level; selecting a bundling size for uplink transmissions based on the determined power difference value; and sending the uplink transmissions, in accordance with the selected bundling size. 2. The method of claim 1, wherein the power difference value is also based on a downlink path loss estimate. 3. The method of claim 1, wherein the uplink transmission comprises RACH preamble transmission. 4. The method of claim 3, wherein the RACH preamble transmission comprises a RACH repetition sequence. 5. The method of claim 3, wherein a bundling size for uplink transmission is selected based on the determined power difference value only if the power difference value is greater than zero. 6. A method for wireless communications by a user equipment (UE), comprising: sending a first uplink transmission at a power level and a bundling size; and adjusting the bundling size for one or more subsequent uplink transmissions, if the first uplink transmission fails. 7. The method of claim 6, wherein the first uplink transmission comprises a RACH preamble transmission. 8. The method of claim 7, wherein the RACH preamble transmission comprises a RACH repetition sequence. 9. The method of claim 6, wherein adjusting the bundling size for one or more subsequent uplink transmissions comprises: determining a power difference value based on a target preamble received power level and a maximum preamble transmit power level; and selecting a bundling size for uplink transmissions based on the determined power difference value. 10. The method of claim 6, wherein adjusting the bundling size for one or more subsequent uplink transmissions comprises: adjusting the bundling size for one or more subsequent uplink transmissions after transmission power for a previous uplink transmission has reached a predetermined level. 11. The method of claim 10, wherein the predetermined level corresponds to a maximum uplink transmission power level. 12. The method of claim 10, further comprising: reducing transmission power for subsequent uplink transmissions after increasing the bundling size. 13. A method for wireless communications by a user equipment (UE), comprising: determining a transmission power level for an uplink transmission based, at least in part, on a transmission power level parameter that has a first value for uplink transmissions without bundling and a second value for uplink transmissions with bundling; and sending the uplink transmission, in accordance with the determined transmission power level. 14. The method of claim 13, wherein the uplink transmission comprises a RACH preamble transmission. 15. The method of claim 14, wherein the RACH preamble transmission comprises a RACH repetition sequence. 16. The method of claim 13, wherein the uplink transmission comprises a physical uplink shared channel (PUSCH) transmission. 17. The method of claim 13, further comprising receiving at least one of the first and second values in a broadcast system information block (SIB). 18. A method for wireless communications by a user equipment (UE), comprising: determining a bundling size to use for a random access channel (RACH) procedure, wherein different bundling sizes are used for contention-based and non contention-based RACH procedures; and performing the RACH procedure, in accordance with the determined bundling size. 19. The method of claim 18, wherein a bundling size for a contention based RACH procedure is determined based, at least in part, on downlink path loss estimations. 20. The method of claim 18, wherein a bundling size for a non-contention based RACH procedure is indicated by base station. 21. The method of claim 18, wherein: the RACH procedure is ordered by a base station; and the base station indicates a bundling size to use for the RACH procedure in a physical downlink control channel (PDCCH).
2,400
8,093
8,093
14,935,783
2,439
Access to online collaborative resources such as an online meeting, web conference, online chat room, an online video conference, an online audio conference, a collaboratively edited document, a collaborative browsing session, an online social networking group, or a web site is secured by providing a first user-specific URL to a first user for addressing collaborative resource; responsive to the first user accessing the first user-specific URL, granting by a computing system access to the collaborative event to the first user; and responsive to a second user accessing the first user-specific URL, preventing by a computing system access to the collaborative event to the second user. Optionally, time criteria for accessing the first user-specific URL may be used to invalidating the first user-specific URL, wherein access to the collaborative resource is disabled.
1. A method for protecting online access to collaborative resources comprising: responsive to a first user attempting to access a collaborative resource at a universal resource locator (URL), determining by a computer that the URL contains an actual location of the collaborative resource obscured by an encrypted identifier for the first user in a domain name portion or a locator address portion of the URL; and granting by a computer to the first user access to the collaborative resource located at actual location. 2. The method as set forth in claim 2 further comprising, responsive to a subsequent attempt to access the collaborative resource using the URL, preventing by a computer user access to the collaborative resource. 3. The method as set forth in claim 2, further comprising: retrieving by a computer a time criteria for accessing the collaborative resource, wherein the first URL comprises a user-specific secure personal universal resource locator; and responsive to detecting an elapsed time exceeding the time criteria, invalidating by a computer the first user-specific secure personal universal resource locator, wherein access to the collaborative resource is disabled. 4. The method as set forth in claim 1, further comprising authenticating the first user by a computing system prior to the granting of access. 5. The method as set forth in claim 1 wherein the collaborative resource comprises at least one resource selected from the group consisting of an online meeting, web conference, online chat room, an online video conference, an online audio conference, a collaboratively edited document, a collaborative browsing session, an online social networking group, and a web site. 6. The method as set forth in claim 1 further comprising providing by a computer a collaborative resource management component that authenticates resource owners, resource invitations, and resource accesses utilizing secure communication and authentication protocols. 7. The method as set forth in claim 1 further comprising generating by a computer the user-specific secure personal universal resource locator by: generating a dynamic private key to be later used as a salt; generating a hash value using a first user's system identifier, the salt, and a collaborative resource identifier, using a strong and secure encryption process; generating the secure personal universal resource locator including the hash value as part of the universal resource locator; caching the first user's system identifier, the salt and the collaborative resource identifier using a secure cache and using the hash value as a key into the cached elements; and returning the secure personal universal resource locator to a collaborative session owner. 8. The method as set forth in claim 7 wherein the user's system identifier comprises at least one identifier selected from the group consisting of an electronic mail address, a telephone number, an online messaging identifier, a social networking alias name, and an employee number. 9. The method as set forth in claim 7 wherein the strong and secure encryption process comprises a method compliant with a U.S. National Institute of Standards and Technology Secure Hash Algorithm specification. 10. The method as set forth in claim 7 wherein the caching the first user's system identifier comprises caching it for a limited period of time. 11. A computer program product for protecting online access to collaborative resources comprising: a computer-readable memory device which is not a transitory signal per se; and program instructions embodied by the computer-readable memory device for causing a processor to: responsive to a first user attempting to access a collaborative resource at a universal resource locator (URL), determine that the URL contains an actual location of the collaborative resource obscured by an encrypted identifier for the first user in a domain name portion or a locator address portion of the URL; and grant to the first user access to the collaborative resource located at actual location. 12. The computer program product as set forth in claim 11 wherein the program instructions further comprise program instructions to cause a processor to, responsive to a subsequent attempt to access the collaborative resource using the URL, prevent user access to the collaborative resource. 13. The computer program product as set forth in claim 11, wherein the program instructions further comprise program instructions to cause a processor to: retrieve a time criteria for accessing the collaborative resource, wherein the first URL comprises a user-specific secure personal universal resource locator; and responsive to detecting an elapsed time exceeding the time criteria, invalidating by a computer the first user-specific secure personal universal resource locator, wherein access to the collaborative resource is disabled. 14. The computer program product as set forth in claim 11 wherein the collaborative resource comprises at least one resource selected from the group consisting of an online meeting, web conference, online chat room, an online video conference, an online audio conference, a collaboratively edited document, a collaborative browsing session, an online social networking group, and a web site. 15. The computer program product as set forth in claim 13 further comprising program instructions embodied by the computer-readable memory device for causing a processor to generate the user-specific secure personal universal resource locator by: generating a dynamic private key to be later used as a salt; generating a hash value using a first user's system identifier, the salt, and a collaborative resource identifier, using a strong and secure encryption process; generating the secure personal universal resource locator including the hash value as part of the universal resource locator; caching the first user's system identifier, the salt and the collaborative resource identifier using a secure cache and using the hash value as a key into the cached elements; and returning the secure personal universal resource locator to a collaborative session owner. 16. A system for protecting online access to collaborative resources comprising: a computer processor; a computer-readable memory device which is not a transitory signal per se, and which is accessible as program memory for the computer processor; and program instructions embodied by the computer-readable memory device for causing the processor to: responsive to a first user attempting to access a collaborative resource at a universal resource locator (URL), determine that the URL contains an actual location of the collaborative resource obscured by an encrypted identifier for the first user in a domain name portion or a locator address portion of the URL; and grant to the first user access to the collaborative resource located at actual location. 17. The system as set forth in claim 16 wherein the program instructions further comprise program instructions to cause a processor to, responsive to a subsequent attempt to access the collaborative resource using the URL, prevent user access to the collaborative resource. 18. The system as set forth in claim 12, wherein the program instructions further comprise program instructions to cause a processor to: retrieve a time criteria for accessing the collaborative resource, wherein the first URL comprises a user-specific secure personal universal resource locator; and responsive to detecting an elapsed time exceeding the time criteria, invalidating by a computer the first user-specific secure personal universal resource locator, wherein access to the collaborative resource is disabled. 19. The system as set forth in claim 12 wherein the collaborative resource comprises at least one resource selected from the group consisting of an online meeting, web conference, online chat room, an online video conference, an online audio conference, a collaboratively edited document, a collaborative browsing session, an online social networking group, and a web site. 20. The system as set forth in claim 19 further comprising program instructions embodied by the computer-readable memory device for causing a processor to generate the user-specific secure personal universal resource locator by: generating a dynamic private key to be later used as a salt; generating a hash value using a first user's system identifier, the salt, and a collaborative resource identifier, using a strong and secure encryption process; generating the secure personal universal resource locator including the hash value as part of the universal resource locator; caching the first user's system identifier, the salt and the collaborative resource identifier using a secure cache and using the hash value as a key into the cached elements; and returning the secure personal universal resource locator to a collaborative session owner.
Access to online collaborative resources such as an online meeting, web conference, online chat room, an online video conference, an online audio conference, a collaboratively edited document, a collaborative browsing session, an online social networking group, or a web site is secured by providing a first user-specific URL to a first user for addressing collaborative resource; responsive to the first user accessing the first user-specific URL, granting by a computing system access to the collaborative event to the first user; and responsive to a second user accessing the first user-specific URL, preventing by a computing system access to the collaborative event to the second user. Optionally, time criteria for accessing the first user-specific URL may be used to invalidating the first user-specific URL, wherein access to the collaborative resource is disabled.1. A method for protecting online access to collaborative resources comprising: responsive to a first user attempting to access a collaborative resource at a universal resource locator (URL), determining by a computer that the URL contains an actual location of the collaborative resource obscured by an encrypted identifier for the first user in a domain name portion or a locator address portion of the URL; and granting by a computer to the first user access to the collaborative resource located at actual location. 2. The method as set forth in claim 2 further comprising, responsive to a subsequent attempt to access the collaborative resource using the URL, preventing by a computer user access to the collaborative resource. 3. The method as set forth in claim 2, further comprising: retrieving by a computer a time criteria for accessing the collaborative resource, wherein the first URL comprises a user-specific secure personal universal resource locator; and responsive to detecting an elapsed time exceeding the time criteria, invalidating by a computer the first user-specific secure personal universal resource locator, wherein access to the collaborative resource is disabled. 4. The method as set forth in claim 1, further comprising authenticating the first user by a computing system prior to the granting of access. 5. The method as set forth in claim 1 wherein the collaborative resource comprises at least one resource selected from the group consisting of an online meeting, web conference, online chat room, an online video conference, an online audio conference, a collaboratively edited document, a collaborative browsing session, an online social networking group, and a web site. 6. The method as set forth in claim 1 further comprising providing by a computer a collaborative resource management component that authenticates resource owners, resource invitations, and resource accesses utilizing secure communication and authentication protocols. 7. The method as set forth in claim 1 further comprising generating by a computer the user-specific secure personal universal resource locator by: generating a dynamic private key to be later used as a salt; generating a hash value using a first user's system identifier, the salt, and a collaborative resource identifier, using a strong and secure encryption process; generating the secure personal universal resource locator including the hash value as part of the universal resource locator; caching the first user's system identifier, the salt and the collaborative resource identifier using a secure cache and using the hash value as a key into the cached elements; and returning the secure personal universal resource locator to a collaborative session owner. 8. The method as set forth in claim 7 wherein the user's system identifier comprises at least one identifier selected from the group consisting of an electronic mail address, a telephone number, an online messaging identifier, a social networking alias name, and an employee number. 9. The method as set forth in claim 7 wherein the strong and secure encryption process comprises a method compliant with a U.S. National Institute of Standards and Technology Secure Hash Algorithm specification. 10. The method as set forth in claim 7 wherein the caching the first user's system identifier comprises caching it for a limited period of time. 11. A computer program product for protecting online access to collaborative resources comprising: a computer-readable memory device which is not a transitory signal per se; and program instructions embodied by the computer-readable memory device for causing a processor to: responsive to a first user attempting to access a collaborative resource at a universal resource locator (URL), determine that the URL contains an actual location of the collaborative resource obscured by an encrypted identifier for the first user in a domain name portion or a locator address portion of the URL; and grant to the first user access to the collaborative resource located at actual location. 12. The computer program product as set forth in claim 11 wherein the program instructions further comprise program instructions to cause a processor to, responsive to a subsequent attempt to access the collaborative resource using the URL, prevent user access to the collaborative resource. 13. The computer program product as set forth in claim 11, wherein the program instructions further comprise program instructions to cause a processor to: retrieve a time criteria for accessing the collaborative resource, wherein the first URL comprises a user-specific secure personal universal resource locator; and responsive to detecting an elapsed time exceeding the time criteria, invalidating by a computer the first user-specific secure personal universal resource locator, wherein access to the collaborative resource is disabled. 14. The computer program product as set forth in claim 11 wherein the collaborative resource comprises at least one resource selected from the group consisting of an online meeting, web conference, online chat room, an online video conference, an online audio conference, a collaboratively edited document, a collaborative browsing session, an online social networking group, and a web site. 15. The computer program product as set forth in claim 13 further comprising program instructions embodied by the computer-readable memory device for causing a processor to generate the user-specific secure personal universal resource locator by: generating a dynamic private key to be later used as a salt; generating a hash value using a first user's system identifier, the salt, and a collaborative resource identifier, using a strong and secure encryption process; generating the secure personal universal resource locator including the hash value as part of the universal resource locator; caching the first user's system identifier, the salt and the collaborative resource identifier using a secure cache and using the hash value as a key into the cached elements; and returning the secure personal universal resource locator to a collaborative session owner. 16. A system for protecting online access to collaborative resources comprising: a computer processor; a computer-readable memory device which is not a transitory signal per se, and which is accessible as program memory for the computer processor; and program instructions embodied by the computer-readable memory device for causing the processor to: responsive to a first user attempting to access a collaborative resource at a universal resource locator (URL), determine that the URL contains an actual location of the collaborative resource obscured by an encrypted identifier for the first user in a domain name portion or a locator address portion of the URL; and grant to the first user access to the collaborative resource located at actual location. 17. The system as set forth in claim 16 wherein the program instructions further comprise program instructions to cause a processor to, responsive to a subsequent attempt to access the collaborative resource using the URL, prevent user access to the collaborative resource. 18. The system as set forth in claim 12, wherein the program instructions further comprise program instructions to cause a processor to: retrieve a time criteria for accessing the collaborative resource, wherein the first URL comprises a user-specific secure personal universal resource locator; and responsive to detecting an elapsed time exceeding the time criteria, invalidating by a computer the first user-specific secure personal universal resource locator, wherein access to the collaborative resource is disabled. 19. The system as set forth in claim 12 wherein the collaborative resource comprises at least one resource selected from the group consisting of an online meeting, web conference, online chat room, an online video conference, an online audio conference, a collaboratively edited document, a collaborative browsing session, an online social networking group, and a web site. 20. The system as set forth in claim 19 further comprising program instructions embodied by the computer-readable memory device for causing a processor to generate the user-specific secure personal universal resource locator by: generating a dynamic private key to be later used as a salt; generating a hash value using a first user's system identifier, the salt, and a collaborative resource identifier, using a strong and secure encryption process; generating the secure personal universal resource locator including the hash value as part of the universal resource locator; caching the first user's system identifier, the salt and the collaborative resource identifier using a secure cache and using the hash value as a key into the cached elements; and returning the secure personal universal resource locator to a collaborative session owner.
2,400
8,094
8,094
12,198,230
2,426
A system and method for controlling the transmission of signals within an interactive network which transmits audio/visual (A/V) information on at least one channel to a user and including a transmission source configured to transmit the A/V information on the at least one channel is provided. The system includes at least one set-top box and at least one random number generator. The set-top box is configured to record the A/V information on a channel at a predetermined recording time and to transmit a change channel request signal to the transmission source prior to the predetermined recording time to change the channel to record the A/V information at the predetermined recording time. The random number generator is configured to generate a time value such that the at least one set-top box transmits the change channel request signal to the transmission source at the time value prior to the predetermined recording time.
1. A system for controlling the transmission of signals within an interactive network which transmits audio/visual (A/V) information to a user and including a transmission source configured to transmit the A/V information on at least one channel and an application server configured to control the flow of the A/V information into the network, the system comprising: at least one set-top box configured to: receive the A/V information on a channel; record the A/V information on the channel at a predetermined recording time; and transmit a change channel request signal to the application server prior to the predetermined recording time to enable recording the A/V information at the predetermined recording time on the channel; and at least one random number generator configured to generate a time offset value such that the at least one set-top box transmits the change channel request signal to the application server at the time offset value prior to the predetermined recording time. 2. The system of claim 1 wherein the at least one set-top box is further configured to store at least one preselected initial seed value. 3. The system of claim 2 wherein the at least one random number generator is further configured to receive the at least one preselected initial seed value from the at least one set-top box and to generate the time offset value based upon the at least one preselected initial seed value. 4. The system of claim 3 wherein the at least one set-top box is further configured to transmit the at least one preselected initial seed value after a power reset condition. 5. The system of claim 2 wherein the at least one preselected initial seed value corresponds to a media access control (MAC) address that is specific to a particular set-top box. 6. The system of claim 2 wherein the at least one preselected initial seed value corresponds to a serial number that is specific to a particular set-top box. 7. A system for controlling the transmission of signals within an interactive network which transmits audio/visual (A/V) information a user and including a transmission source configured to transmit the A/V information on at least one channel and an application server configured to control the flow of the A/V information into the network, the system comprising: a first set-top box configured to transmit a first change channel request signal for instructing the application server to change to a channel and to record the A/V information on the channel at the predetermined recording time; and a second set-top box configured to transmit a second change channel request signal for instructing the application server to change to the channel and to record the A/V information on the channel at the predetermined recording time; and wherein the first set-top box is further configured to transmit the first change channel request signal to the application server at a first time offset value prior to the predetermined recording time and the second set-top box is further configured to transmit the second change channel request signal to the application server at a second time offset value prior to the predetermined recording time, the second time offset value being different than the first time offset value. 8. The system of claim 7 further comprising first and second random number generators configured to generate the first and the second time offset values, respectively. 9. The system of claim 8 wherein the first and the second set-top boxes are further configured to store first and second preselected initial seed values, respectively and to transmit the first and the second preselected initial seed values to the first and the second random number generators, respectively for generating the first and the second time offset values, respectively. 10. The system of claim 9 wherein the first and the second preselected initial seed values are different from one another. 11. The system of claim 10 wherein the first random number generator is further configured to generate the first time offset value with the first preselected initial seed value after a power reset condition and the second random number generator is further configured to generate the second time offset value with the second preselected initial seed value after a power reset condition. 12. The system of claim 9 wherein the first preselected initial seed value corresponds to a first media access control (MAC) address that is specific to the first set-top box and the second preselected initial seed value corresponds to a second MAC address that is specific to the second set-top box. 13. The system of claim 9 wherein the first preselected initial seed value corresponds to a first serial number of the first set-top box and the second preselected initial seed value corresponds to a second serial number of the second set-top box. 14. A method for controlling the transmission of signals within an interactive network including a transmission source for transmitting audio/visual (A/V) information on at least one channel to a user and an application server for directing the flow of the A/V information into the network, the method comprising: receiving the A/V information on a first channel from the application server; recording the A/V information on a second channel at a predetermined recording time; transmitting a first change channel request signal at a first time offset value and a second change channel request signal at a second time offset value prior to the predetermined recording time for instructing the application server to change channels from the first channel to the second channel to enable recording the A/V information at the predetermined recording time; and randomly generating the first time offset value via a first random number generator and the second time offset value via a second random number generator. 15. The method of claim 14 wherein the first and the second time offset values are different from one another. 16. The method of claim 14 further comprising inserting a first preselected initial seed value into the first random number generator prior to randomly generating the first time offset value and inserting a second preselected initial seed value into the second random number generator prior to randomly generating the second time offset value. 17. The method of claim 16 further comprising inserting any random seed value into the first and the second random number generators after inserting the first and the second preselected initial seed values. 18. The method of claim 16 wherein the first preselected initial seed value corresponds to a first media access control (MAC) address of a first set-top box and the second preselected initial seed value corresponds to a second media access control (MAC) address of a second set-top box. 19. The method of claim 16 wherein the first preselected initial seed value corresponds to a first serial number of a first set-top box and the second preselected initial seed value corresponds to a second serial number of a second set-top box. 20. The method of claim 16 further comprising inserting the first preselected initial seed value into the first random number generator in response to detecting a power outage condition and inserting the second preselected initial seed value into the second random number generator in response to detecting a power outage condition.
A system and method for controlling the transmission of signals within an interactive network which transmits audio/visual (A/V) information on at least one channel to a user and including a transmission source configured to transmit the A/V information on the at least one channel is provided. The system includes at least one set-top box and at least one random number generator. The set-top box is configured to record the A/V information on a channel at a predetermined recording time and to transmit a change channel request signal to the transmission source prior to the predetermined recording time to change the channel to record the A/V information at the predetermined recording time. The random number generator is configured to generate a time value such that the at least one set-top box transmits the change channel request signal to the transmission source at the time value prior to the predetermined recording time.1. A system for controlling the transmission of signals within an interactive network which transmits audio/visual (A/V) information to a user and including a transmission source configured to transmit the A/V information on at least one channel and an application server configured to control the flow of the A/V information into the network, the system comprising: at least one set-top box configured to: receive the A/V information on a channel; record the A/V information on the channel at a predetermined recording time; and transmit a change channel request signal to the application server prior to the predetermined recording time to enable recording the A/V information at the predetermined recording time on the channel; and at least one random number generator configured to generate a time offset value such that the at least one set-top box transmits the change channel request signal to the application server at the time offset value prior to the predetermined recording time. 2. The system of claim 1 wherein the at least one set-top box is further configured to store at least one preselected initial seed value. 3. The system of claim 2 wherein the at least one random number generator is further configured to receive the at least one preselected initial seed value from the at least one set-top box and to generate the time offset value based upon the at least one preselected initial seed value. 4. The system of claim 3 wherein the at least one set-top box is further configured to transmit the at least one preselected initial seed value after a power reset condition. 5. The system of claim 2 wherein the at least one preselected initial seed value corresponds to a media access control (MAC) address that is specific to a particular set-top box. 6. The system of claim 2 wherein the at least one preselected initial seed value corresponds to a serial number that is specific to a particular set-top box. 7. A system for controlling the transmission of signals within an interactive network which transmits audio/visual (A/V) information a user and including a transmission source configured to transmit the A/V information on at least one channel and an application server configured to control the flow of the A/V information into the network, the system comprising: a first set-top box configured to transmit a first change channel request signal for instructing the application server to change to a channel and to record the A/V information on the channel at the predetermined recording time; and a second set-top box configured to transmit a second change channel request signal for instructing the application server to change to the channel and to record the A/V information on the channel at the predetermined recording time; and wherein the first set-top box is further configured to transmit the first change channel request signal to the application server at a first time offset value prior to the predetermined recording time and the second set-top box is further configured to transmit the second change channel request signal to the application server at a second time offset value prior to the predetermined recording time, the second time offset value being different than the first time offset value. 8. The system of claim 7 further comprising first and second random number generators configured to generate the first and the second time offset values, respectively. 9. The system of claim 8 wherein the first and the second set-top boxes are further configured to store first and second preselected initial seed values, respectively and to transmit the first and the second preselected initial seed values to the first and the second random number generators, respectively for generating the first and the second time offset values, respectively. 10. The system of claim 9 wherein the first and the second preselected initial seed values are different from one another. 11. The system of claim 10 wherein the first random number generator is further configured to generate the first time offset value with the first preselected initial seed value after a power reset condition and the second random number generator is further configured to generate the second time offset value with the second preselected initial seed value after a power reset condition. 12. The system of claim 9 wherein the first preselected initial seed value corresponds to a first media access control (MAC) address that is specific to the first set-top box and the second preselected initial seed value corresponds to a second MAC address that is specific to the second set-top box. 13. The system of claim 9 wherein the first preselected initial seed value corresponds to a first serial number of the first set-top box and the second preselected initial seed value corresponds to a second serial number of the second set-top box. 14. A method for controlling the transmission of signals within an interactive network including a transmission source for transmitting audio/visual (A/V) information on at least one channel to a user and an application server for directing the flow of the A/V information into the network, the method comprising: receiving the A/V information on a first channel from the application server; recording the A/V information on a second channel at a predetermined recording time; transmitting a first change channel request signal at a first time offset value and a second change channel request signal at a second time offset value prior to the predetermined recording time for instructing the application server to change channels from the first channel to the second channel to enable recording the A/V information at the predetermined recording time; and randomly generating the first time offset value via a first random number generator and the second time offset value via a second random number generator. 15. The method of claim 14 wherein the first and the second time offset values are different from one another. 16. The method of claim 14 further comprising inserting a first preselected initial seed value into the first random number generator prior to randomly generating the first time offset value and inserting a second preselected initial seed value into the second random number generator prior to randomly generating the second time offset value. 17. The method of claim 16 further comprising inserting any random seed value into the first and the second random number generators after inserting the first and the second preselected initial seed values. 18. The method of claim 16 wherein the first preselected initial seed value corresponds to a first media access control (MAC) address of a first set-top box and the second preselected initial seed value corresponds to a second media access control (MAC) address of a second set-top box. 19. The method of claim 16 wherein the first preselected initial seed value corresponds to a first serial number of a first set-top box and the second preselected initial seed value corresponds to a second serial number of a second set-top box. 20. The method of claim 16 further comprising inserting the first preselected initial seed value into the first random number generator in response to detecting a power outage condition and inserting the second preselected initial seed value into the second random number generator in response to detecting a power outage condition.
2,400
8,095
8,095
14,223,779
2,459
An information handling system monitors events of a first time period, forms sequences from the events (first sequences), and determines normal sequences of the events. In one embodiment, it may also form sequences based upon events of a second time period (second sequences), the second time period later than the first time period, match the first sequences against the second sequences, and remove events of the second sequences from the events of the second time period. The information handling systems may then search for anomalous events in the remaining events. In another embodiment, the normal sequences may represent purchases. The information handling systems may compare purchases of a customer to the normal sequences and determine products of possible interest to the customer based upon the comparison.
1. A method comprising: classifying by an information handling system events into event types; forming first sequences based upon events of a first time period; forming second sequences based upon events of a second time period, the second time period later than the first time period; matching a portion of sequences of the second sequences to sequences of the first sequences, thereby producing matched sequences of the second sequences, wherein: a first element of one of the first sequences matches a second element of one of the second sequences if the first element and the second element are of the same event type; and the matching includes removing a third element from one of the matched sequences of the second sequences when the one of the matched sequences is matched to another of the first sequences and the third element does not match an element of the another of the first sequences, thereby producing reduced matched sequences of the second sequences; for each element in each of the reduced matched sequences of the second sequences, removing an event upon which the element was based from the events of the second time period; and searching for anomalous events in the events of the second time period after removing the event for the each element. 2. The method of claim 1, wherein the forming first sequences comprises: determining probabilities of pairs of events types from the events of the first time period; and concatenating pairs of event types into sequences, wherein the probability of each pair exceeds a threshold probability value. 3. The method of claim 2, wherein the concatenating pairs of event types into sequences comprises generating discrete pairwise Markov chains at the first time period. 4. The method of claim 3, wherein the forming first sequences comprises limiting the first sequences to sequences that exceed a threshold probability. 5. The method of claim 1, wherein the forming first sequences comprises: selecting an integer k>2; examining sequences of length between 2 and k based upon consecutive events of the first time period; for each sequence E: determining a probability of E; and including E in the first sequences if the probability of E exceeds a threshold probability. 6. The method of claim 1, wherein the matching comprises matching according to a Smith-Waterman matching algorithm. 7. The method of claim 1, wherein the searching for anomalous events comprises searching by clustering algorithm. 8. The method of claim 1, further comprising verifying the first sequences by a subject-matter expert. 9. The method of claim 1, further comprising verifying the anomalous events by a subject-matter expert. 10. The method of claim 4, further comprising: not being able to find a sufficient number of first sequences; and based upon not finding them: selecting an integer k>2; examining sequences of length between 2 and k based upon consecutive events of the first time period; for each sequence E: determining a probability of E; and including E in the first sequences if the probability of E exceeds a threshold probability. 11. An information handling system comprising: a monitor to detect events; a timer to determine a first time period and a second time period later than the first time period; and an anomalous event detector to: classify the events into event types; form first sequences based upon events of the first time period; form second sequences based upon events of the second time period; match a portion of the sequences of the second sequences to sequences of the first sequences, thereby producing matched sequences of the second sequences, wherein: a first element of one of the first sequences matches a second element of one of the second sequences if the first element and the second element are of the same event type; and the matching includes removing a third element from one of the matched sequences of the second sequences when the one of the matched sequences is matched to another of the first sequences and the third element does not match an element of the another of the first sequences, thereby producing reduced matched sequences of the second sequences; for each element in each of the reduced matched sequences of the second sequences, remove an event upon which the element was based from the events of the second time period; and search for anomalous events in the events of the second time period after removing the events. 12. The information handling system of claim 11, wherein the anomalous event detector is to form first sequences by generating discrete pair-wise Markov chains at the first time period. 13. The information handling system of claim 11, wherein the matching comprises matching according to a Smith-Waterman matching algorithm. 14. The information handling system of claim 11, further comprising an alarm component to warn of a detection of an anomalous event. 15. A method comprising: creating by an information handling system a model of customer purchases from data of the purchases of a group of customers; classifying a customer as included in at least a portion of the model; generating sequences of purchasing events from the at least a portion of the model, wherein each sequence is a sequence of purchasing events by one customer of the group of customers; removing a portion of the sequences based on the portion of the sequences not being normal sequences of purchasing events, thereby retaining a remainder of the sequences; comparing the purchases of the customer with the remainder of the sequences; and determining products of possible interest to the customer based upon the comparison. 16. The method of claim 15, wherein the removing the portion comprises: ranking the sequences by similarity to other sequences of the sequences; and removing the portion of the sequences with least similarity to the other sequences. 17. The method of claim 16, wherein the ranking by similarity comprises determining similarity by means of a sequence-comparison algorithm. 18. The method of claim 17, wherein the sequence-comparison algorithm is a Needleman-Wunsch algorithm. 19. The method of claim 15, wherein the classifying the customer comprises classifying the customer on the basis of the purchases of the customer. 20. The method of claim 15, further comprising advertising the products to the customer.
An information handling system monitors events of a first time period, forms sequences from the events (first sequences), and determines normal sequences of the events. In one embodiment, it may also form sequences based upon events of a second time period (second sequences), the second time period later than the first time period, match the first sequences against the second sequences, and remove events of the second sequences from the events of the second time period. The information handling systems may then search for anomalous events in the remaining events. In another embodiment, the normal sequences may represent purchases. The information handling systems may compare purchases of a customer to the normal sequences and determine products of possible interest to the customer based upon the comparison.1. A method comprising: classifying by an information handling system events into event types; forming first sequences based upon events of a first time period; forming second sequences based upon events of a second time period, the second time period later than the first time period; matching a portion of sequences of the second sequences to sequences of the first sequences, thereby producing matched sequences of the second sequences, wherein: a first element of one of the first sequences matches a second element of one of the second sequences if the first element and the second element are of the same event type; and the matching includes removing a third element from one of the matched sequences of the second sequences when the one of the matched sequences is matched to another of the first sequences and the third element does not match an element of the another of the first sequences, thereby producing reduced matched sequences of the second sequences; for each element in each of the reduced matched sequences of the second sequences, removing an event upon which the element was based from the events of the second time period; and searching for anomalous events in the events of the second time period after removing the event for the each element. 2. The method of claim 1, wherein the forming first sequences comprises: determining probabilities of pairs of events types from the events of the first time period; and concatenating pairs of event types into sequences, wherein the probability of each pair exceeds a threshold probability value. 3. The method of claim 2, wherein the concatenating pairs of event types into sequences comprises generating discrete pairwise Markov chains at the first time period. 4. The method of claim 3, wherein the forming first sequences comprises limiting the first sequences to sequences that exceed a threshold probability. 5. The method of claim 1, wherein the forming first sequences comprises: selecting an integer k>2; examining sequences of length between 2 and k based upon consecutive events of the first time period; for each sequence E: determining a probability of E; and including E in the first sequences if the probability of E exceeds a threshold probability. 6. The method of claim 1, wherein the matching comprises matching according to a Smith-Waterman matching algorithm. 7. The method of claim 1, wherein the searching for anomalous events comprises searching by clustering algorithm. 8. The method of claim 1, further comprising verifying the first sequences by a subject-matter expert. 9. The method of claim 1, further comprising verifying the anomalous events by a subject-matter expert. 10. The method of claim 4, further comprising: not being able to find a sufficient number of first sequences; and based upon not finding them: selecting an integer k>2; examining sequences of length between 2 and k based upon consecutive events of the first time period; for each sequence E: determining a probability of E; and including E in the first sequences if the probability of E exceeds a threshold probability. 11. An information handling system comprising: a monitor to detect events; a timer to determine a first time period and a second time period later than the first time period; and an anomalous event detector to: classify the events into event types; form first sequences based upon events of the first time period; form second sequences based upon events of the second time period; match a portion of the sequences of the second sequences to sequences of the first sequences, thereby producing matched sequences of the second sequences, wherein: a first element of one of the first sequences matches a second element of one of the second sequences if the first element and the second element are of the same event type; and the matching includes removing a third element from one of the matched sequences of the second sequences when the one of the matched sequences is matched to another of the first sequences and the third element does not match an element of the another of the first sequences, thereby producing reduced matched sequences of the second sequences; for each element in each of the reduced matched sequences of the second sequences, remove an event upon which the element was based from the events of the second time period; and search for anomalous events in the events of the second time period after removing the events. 12. The information handling system of claim 11, wherein the anomalous event detector is to form first sequences by generating discrete pair-wise Markov chains at the first time period. 13. The information handling system of claim 11, wherein the matching comprises matching according to a Smith-Waterman matching algorithm. 14. The information handling system of claim 11, further comprising an alarm component to warn of a detection of an anomalous event. 15. A method comprising: creating by an information handling system a model of customer purchases from data of the purchases of a group of customers; classifying a customer as included in at least a portion of the model; generating sequences of purchasing events from the at least a portion of the model, wherein each sequence is a sequence of purchasing events by one customer of the group of customers; removing a portion of the sequences based on the portion of the sequences not being normal sequences of purchasing events, thereby retaining a remainder of the sequences; comparing the purchases of the customer with the remainder of the sequences; and determining products of possible interest to the customer based upon the comparison. 16. The method of claim 15, wherein the removing the portion comprises: ranking the sequences by similarity to other sequences of the sequences; and removing the portion of the sequences with least similarity to the other sequences. 17. The method of claim 16, wherein the ranking by similarity comprises determining similarity by means of a sequence-comparison algorithm. 18. The method of claim 17, wherein the sequence-comparison algorithm is a Needleman-Wunsch algorithm. 19. The method of claim 15, wherein the classifying the customer comprises classifying the customer on the basis of the purchases of the customer. 20. The method of claim 15, further comprising advertising the products to the customer.
2,400
8,096
8,096
16,382,342
2,413
Embodiments provides a radio network entity and the method thereof for improving filtering performance in a time division duplexing radio communication system, the radio network entity comprises a first filter which is configured to perform a first type of filtering for a signal to be transmitted to or received from a device in the radio communication system through a radio interface, with a common filtering requirement for transmitting and receiving fulfilled a second filter, which is configured to perform a second type of filtering for the signal to be transmitted to the device, with additional filtering requirement for transmitting besides the common filtering requirement fulfilled and a third filter, which is configured to perform a third type of filtering for the signal received from the device with additional filtering requirement for receiving besides the common filtering requirement fulfilled.
1.-16. (canceled) 17. A radio network entity for improving filtering performance in a time division duplexing, TDD, radio communication system, comprising: a first filter, configured to perform a first type of filtering for a signal to be transmitted to, or received from a device in the radio communication system through a radio interface, with a common filtering requirement for transmitting and receiving fulfilled; a second filter, configured to perform a second type of filtering for the signal to be transmitted to the device, with additional filtering requirement for transmitting besides the common filtering requirement fulfilled; and a third filter, configured to perform a third type of filtering for the signal received from the device, with additional filtering requirement for receiving besides the common filtering requirement fulfilled, wherein a frequency attenuation of the second filter is different from a frequency attenuation of the third filter, a characteristic of the second filter is a characteristic that provides an additional attenuation only required in a transmission path, and a characteristic of the third filter is a characteristic that provides an additional attenuation only required in a reception path. 18. The entity of claim 17, further comprising: a bypasser, configured to provide a bypass route to bypass the third filter for the signal received from the device; an interference detector, configured to detect interferences received; and a controller, configured to control the bypasser to provide a filtering route including the third filter when the interference detector detects interferences, and to control the bypasser to provide the bypass route when the interference detector does not detects interferences. 19. The entity of claim 18, wherein the bypasser comprises a first multipath switch and a second multipath switch, wherein the bypass route is activated with a first path of the first multipath switch connected with a first path of the second multipath switch, and the filtering route is activated with a second path of the first multipath switch connected with an input of the third filter, and a second path of the second multipath switch connected with an output of the third filter. 20. The entity of claim 18, wherein the bypasser comprises a first voltage control diode, a second voltage control diode and a third voltage control diode, with the second voltage control diode and the third voltage control diode connected with the input and output of the third filter respectively, and then connected with the first voltage control diode in parallel. 21. The entity of claim 18, wherein the interference detector further comprises: a detection filter configured to couple to a radio interface and obtain the interferences when the radio interface is not performing transmission, and a power detector configured to determine power level of the interferences; and the controller is further configured to: activate the bypass route if the power level is lower than a predetermined threshold, and activate the filtering route if the power level is not lower than the predetermined threshold. 22. The entity of claim 18, further comprising: a gain compensator configured to perform gain compensation between the bypass route and the filtering route, wherein the controller is further configured to notify the gain compensator of the activating of the bypass route and the filtering route. 23. The entity of claim 18, further comprising: a low noise amplifier configured to perform low noise amplifying for the signal received from the device before performing the third type of filtering for it, or before routing it through the bypass route. 24. The entity of claim 17, wherein the radio network entity is a user equipment, UE, or a radio base station, RBS, in the TDD radio communication system, or is an apparatus internal or external to any of the UE or the RBS. 25. A method for a radio network entity for improving filtering performance in a time division duplexing, TDD, radio communication system, comprising: performing a first type of filtering for a signal to be transmitted to, or a signal received from a device in the radio communication system through a radio interface, with a common filtering requirement for transmitting and receiving fulfilled; performing a second type of filtering for the signal to be transmitted to a device in the radio communication system through a radio interface, with additional filtering requirement for transmitting besides the common filtering requirement for transmitting and receiving fulfilled; and performing a third type of filtering for the signal received, with additional filtering requirement for receiving besides the common filtering requirement fulfilled, wherein a frequency attenuation of the second type of filtering is different from a frequency attenuation of the third type of filtering, a characteristic of the second type filtering is a characteristic that provides an additional attenuation only required in a transmission path, and a characteristic of the third type of filtering is a characteristic that provides an additional attenuation only required in a reception path. 26. The method of claim 25, further comprising: detecting interferences received; and wherein the performing the third type of filtering for the signal received is done when the interferences is detected. 27. The method of claim 26, wherein the detecting interferences received further comprises: obtaining the interferences when a radio interface is not performing transmission, and determine power level of the interferences; and performing the third type of filtering further comprises: if the power level is not lower than a predetermined threshold, performing the third type of filtering. 28. The method of claim 26, further comprising: notifying performing or not performing the third type of filtering for the purpose of gain compensation; performing gain compensation between a signal with and a signal without the third type of filtering being performed. 29. The method of claim 26, further comprising: performing low noise amplifying for the signal received before performing the third type of filtering. 30. The method of claim 25, wherein the radio network entity is a user equipment, UE, or a radio base station, RBS, in the TDD radio communication system, or is an apparatus internal or external to any of the UE or the RBS.
Embodiments provides a radio network entity and the method thereof for improving filtering performance in a time division duplexing radio communication system, the radio network entity comprises a first filter which is configured to perform a first type of filtering for a signal to be transmitted to or received from a device in the radio communication system through a radio interface, with a common filtering requirement for transmitting and receiving fulfilled a second filter, which is configured to perform a second type of filtering for the signal to be transmitted to the device, with additional filtering requirement for transmitting besides the common filtering requirement fulfilled and a third filter, which is configured to perform a third type of filtering for the signal received from the device with additional filtering requirement for receiving besides the common filtering requirement fulfilled.1.-16. (canceled) 17. A radio network entity for improving filtering performance in a time division duplexing, TDD, radio communication system, comprising: a first filter, configured to perform a first type of filtering for a signal to be transmitted to, or received from a device in the radio communication system through a radio interface, with a common filtering requirement for transmitting and receiving fulfilled; a second filter, configured to perform a second type of filtering for the signal to be transmitted to the device, with additional filtering requirement for transmitting besides the common filtering requirement fulfilled; and a third filter, configured to perform a third type of filtering for the signal received from the device, with additional filtering requirement for receiving besides the common filtering requirement fulfilled, wherein a frequency attenuation of the second filter is different from a frequency attenuation of the third filter, a characteristic of the second filter is a characteristic that provides an additional attenuation only required in a transmission path, and a characteristic of the third filter is a characteristic that provides an additional attenuation only required in a reception path. 18. The entity of claim 17, further comprising: a bypasser, configured to provide a bypass route to bypass the third filter for the signal received from the device; an interference detector, configured to detect interferences received; and a controller, configured to control the bypasser to provide a filtering route including the third filter when the interference detector detects interferences, and to control the bypasser to provide the bypass route when the interference detector does not detects interferences. 19. The entity of claim 18, wherein the bypasser comprises a first multipath switch and a second multipath switch, wherein the bypass route is activated with a first path of the first multipath switch connected with a first path of the second multipath switch, and the filtering route is activated with a second path of the first multipath switch connected with an input of the third filter, and a second path of the second multipath switch connected with an output of the third filter. 20. The entity of claim 18, wherein the bypasser comprises a first voltage control diode, a second voltage control diode and a third voltage control diode, with the second voltage control diode and the third voltage control diode connected with the input and output of the third filter respectively, and then connected with the first voltage control diode in parallel. 21. The entity of claim 18, wherein the interference detector further comprises: a detection filter configured to couple to a radio interface and obtain the interferences when the radio interface is not performing transmission, and a power detector configured to determine power level of the interferences; and the controller is further configured to: activate the bypass route if the power level is lower than a predetermined threshold, and activate the filtering route if the power level is not lower than the predetermined threshold. 22. The entity of claim 18, further comprising: a gain compensator configured to perform gain compensation between the bypass route and the filtering route, wherein the controller is further configured to notify the gain compensator of the activating of the bypass route and the filtering route. 23. The entity of claim 18, further comprising: a low noise amplifier configured to perform low noise amplifying for the signal received from the device before performing the third type of filtering for it, or before routing it through the bypass route. 24. The entity of claim 17, wherein the radio network entity is a user equipment, UE, or a radio base station, RBS, in the TDD radio communication system, or is an apparatus internal or external to any of the UE or the RBS. 25. A method for a radio network entity for improving filtering performance in a time division duplexing, TDD, radio communication system, comprising: performing a first type of filtering for a signal to be transmitted to, or a signal received from a device in the radio communication system through a radio interface, with a common filtering requirement for transmitting and receiving fulfilled; performing a second type of filtering for the signal to be transmitted to a device in the radio communication system through a radio interface, with additional filtering requirement for transmitting besides the common filtering requirement for transmitting and receiving fulfilled; and performing a third type of filtering for the signal received, with additional filtering requirement for receiving besides the common filtering requirement fulfilled, wherein a frequency attenuation of the second type of filtering is different from a frequency attenuation of the third type of filtering, a characteristic of the second type filtering is a characteristic that provides an additional attenuation only required in a transmission path, and a characteristic of the third type of filtering is a characteristic that provides an additional attenuation only required in a reception path. 26. The method of claim 25, further comprising: detecting interferences received; and wherein the performing the third type of filtering for the signal received is done when the interferences is detected. 27. The method of claim 26, wherein the detecting interferences received further comprises: obtaining the interferences when a radio interface is not performing transmission, and determine power level of the interferences; and performing the third type of filtering further comprises: if the power level is not lower than a predetermined threshold, performing the third type of filtering. 28. The method of claim 26, further comprising: notifying performing or not performing the third type of filtering for the purpose of gain compensation; performing gain compensation between a signal with and a signal without the third type of filtering being performed. 29. The method of claim 26, further comprising: performing low noise amplifying for the signal received before performing the third type of filtering. 30. The method of claim 25, wherein the radio network entity is a user equipment, UE, or a radio base station, RBS, in the TDD radio communication system, or is an apparatus internal or external to any of the UE or the RBS.
2,400
8,097
8,097
14,722,785
2,462
A device may receive power management information associated with a wearable device. The power management information may identify a power management trigger associated with the wearable device, and the wearable device may be different from the device. The device may detect the power management trigger associated with the wearable device. The device may prevent, based on detecting the power management trigger, transmissions by the device to the wearable device. The transmissions may be associated with notifications for an application executing on the wearable device. The power management information may indicate that the device is to prevent the transmissions associated with the notifications for the application.
1. A device, comprising: one or more processors to: receive power management information associated with a wearable device, the power management information identifying a power management trigger associated with the wearable device, and the wearable device being different from the device; detect the power management trigger associated with the wearable device; and prevent, based on detecting the power management trigger, transmissions by the device to the wearable device, the transmissions being associated with notifications for an application executing on the wearable device, the power management information indicating that the device is to prevent the transmissions associated with the notifications for the application. 2. The device of claim 1, where the one or more processors are further to: determine a remaining battery life of the wearable device; compare the remaining battery life of the wearable device to a power threshold, the power management information identifying the power threshold; and where the one or more processors, when detecting the power management trigger, are to: detect the power management trigger based on comparing the remaining battery life and the power threshold. 3. The device of claim 1, where the one or more processors, after detecting the power management trigger, are further to: cause the wearable device to be disabled from communicating using a particular wireless communication method. 4. The device of claim 1, where the one or more processors, after detecting the power management trigger, are further to: cause the wearable device to switch to a grayscale mode; cause a brightness configuration associated with the wearable device to be modified; or cause a backlight timer configuration associated with the wearable device to be modified. 5. The device of claim 1, where the transmissions are first transmissions, the notifications are first notifications, and the application is a first application, where the one or processors, after detecting the power management trigger, are further to: allow second transmissions by the device, the second transmissions being associated with second notifications for a second application executing on the wearable device, the power management information indicating that the device is to allow the second transmissions associated with the second notifications for the second application while preventing the first transmissions associated with the first notifications for the first application. 6. The device of claim 1, where the transmissions are first transmissions and the notifications are first notifications, where the one or processors, after detecting the power management trigger, are further to: allow second transmissions by the device, the second transmissions being associated with second notifications for the application executing on the wearable device, the power management information indicating that the device is to allow the second transmissions associated with the second notifications for the application while preventing the first transmissions associated with the first notifications for the application. 7. The device of claim 1, where the one or more processors are further to: receive user input associated with the power management information; and where the one or more processors, when receiving the power management information, are further to: receive the power management information based on the user input. 8. A computer-readable medium storing instructions, the instructions comprising: one or more instructions that, when executed by one or more processors, cause the one or more processors to: receive power management information associated with a wearable device, the power management information identifying a power management trigger associated with the wearable device, and the wearable device being different from the device; detect the power management trigger associated with the wearable device; and prevent, based on detecting the power management trigger, transmissions by the device to the wearable device, the transmissions being associated with notifications for an application executing on the wearable device, the power management information indicating that the device is to prevent the transmissions associated with the notifications for the application. 9. The computer-readable medium of claim 8, where the one or more instructions, when executed by the one or more processors, further cause the one or more processors to: determine a remaining battery life of the wearable device; compare the remaining battery life of the wearable device to a power threshold, the power management information identifying the power threshold; and where the one or more instructions, after causing the one or more processors to detect the power management trigger, cause the one or more processors to: detect the power management trigger based on comparing the remaining battery life and the power threshold. 10. The computer-readable medium of claim 8, where the one or more instructions, after causing the one or more processors to detect the power management trigger, further cause the one or more processors to: cause the wearable device to be disabled from communicating using a particular wireless communication method. 11. The computer-readable medium of claim 8, where the one or more instructions, that cause the one or more processors to detect the power management trigger, further cause the one or more processors to: cause the wearable device to switch to a grayscale mode; cause a brightness configuration associated with the wearable device to be modified; or cause a backlight timer configuration associated with the wearable device to be modified. 12. The computer-readable medium of claim 8, where the transmissions are first transmissions, the notifications are first notifications, and the application is a first application, where the one or more instructions, after causing the one or more processors to detect the power management trigger, further cause the one or more processors to: allow second transmissions by the device, the second transmissions being associated with second notifications for a second application executing on the wearable device, the power management information indicating that the device is to allow the second transmissions associated with the second notifications for the second application while preventing the first transmissions associated with the first notifications for the first application. 13. The computer-readable medium of claim 8, where the transmissions are first transmissions and the notifications are first notifications, where the one or more instructions, after causing the one or more processors to detect the power management trigger, further cause the one or more processors to: allow second transmissions by the device, the second transmissions being associated with second notifications for the application executing on the wearable device, the power management information indicating that the device is to allow the second transmissions associated with the second notifications for the application while preventing the first transmissions associated with the first notifications for the application. 14. The computer-readable medium of claim 8, where the one or more instructions, that cause the one or more processors to receive the power management information, cause the one or more processors to: receive the power management information based on information provided by an administrative device associated with remotely managing the wearable device. 15. A method, comprising: receiving, by a device, power management information associated with a wearable device, the power management information identifying a power management trigger associated with the wearable device, and the wearable device being different from the device; detecting, by the device, the power management trigger associated with the wearable device; and preventing, by the device and based on detecting the power management trigger, transmissions by the device to the wearable device, the transmissions being associated with notifications for an application executing on the wearable device, the power management information indicating that the device is to prevent the transmissions associated with the notifications for the application. 16. The method of claim 15, further comprising: determining a remaining battery life of the wearable device; comparing the remaining battery life of the wearable device to a power threshold, the power management information identifying the power threshold; and where detecting the power management trigger comprises: detecting the power management trigger based on comparing the remaining battery life and the power threshold. 17. The method of claim 15, further comprising: causing, after detecting the power management trigger, the wearable device to be disabled from communicating using a particular wireless communication method. 18. The method of claim 15, where the transmissions are first transmissions, the notifications are first notifications, and the application is a first application, where, after detecting the power management trigger, the method further comprises: allowing second transmissions by the device, the second transmissions being associated with second notifications for a second application executing on the wearable device, the power management information indicating that the device is to allow the second transmissions associated with the second notifications for the second application while preventing the first transmissions associated with the first notifications for the first application. 19. The method of claim 15, where the transmissions are first transmissions and the notifications are first notifications, where, after detecting the power management trigger, the method further comprises: allowing second transmissions by the device, the second transmissions being associated with second notifications for the application executing on the wearable device, the power management information indicating that the device is to allow the second transmissions associated with the second notifications for the application while preventing the first transmissions associated with the first notifications for the application. 20. The method of claim 15, further comprising: receiving user input associated with the power management information; and where receiving the power management information further comprises: receiving the power management information based on the user input.
A device may receive power management information associated with a wearable device. The power management information may identify a power management trigger associated with the wearable device, and the wearable device may be different from the device. The device may detect the power management trigger associated with the wearable device. The device may prevent, based on detecting the power management trigger, transmissions by the device to the wearable device. The transmissions may be associated with notifications for an application executing on the wearable device. The power management information may indicate that the device is to prevent the transmissions associated with the notifications for the application.1. A device, comprising: one or more processors to: receive power management information associated with a wearable device, the power management information identifying a power management trigger associated with the wearable device, and the wearable device being different from the device; detect the power management trigger associated with the wearable device; and prevent, based on detecting the power management trigger, transmissions by the device to the wearable device, the transmissions being associated with notifications for an application executing on the wearable device, the power management information indicating that the device is to prevent the transmissions associated with the notifications for the application. 2. The device of claim 1, where the one or more processors are further to: determine a remaining battery life of the wearable device; compare the remaining battery life of the wearable device to a power threshold, the power management information identifying the power threshold; and where the one or more processors, when detecting the power management trigger, are to: detect the power management trigger based on comparing the remaining battery life and the power threshold. 3. The device of claim 1, where the one or more processors, after detecting the power management trigger, are further to: cause the wearable device to be disabled from communicating using a particular wireless communication method. 4. The device of claim 1, where the one or more processors, after detecting the power management trigger, are further to: cause the wearable device to switch to a grayscale mode; cause a brightness configuration associated with the wearable device to be modified; or cause a backlight timer configuration associated with the wearable device to be modified. 5. The device of claim 1, where the transmissions are first transmissions, the notifications are first notifications, and the application is a first application, where the one or processors, after detecting the power management trigger, are further to: allow second transmissions by the device, the second transmissions being associated with second notifications for a second application executing on the wearable device, the power management information indicating that the device is to allow the second transmissions associated with the second notifications for the second application while preventing the first transmissions associated with the first notifications for the first application. 6. The device of claim 1, where the transmissions are first transmissions and the notifications are first notifications, where the one or processors, after detecting the power management trigger, are further to: allow second transmissions by the device, the second transmissions being associated with second notifications for the application executing on the wearable device, the power management information indicating that the device is to allow the second transmissions associated with the second notifications for the application while preventing the first transmissions associated with the first notifications for the application. 7. The device of claim 1, where the one or more processors are further to: receive user input associated with the power management information; and where the one or more processors, when receiving the power management information, are further to: receive the power management information based on the user input. 8. A computer-readable medium storing instructions, the instructions comprising: one or more instructions that, when executed by one or more processors, cause the one or more processors to: receive power management information associated with a wearable device, the power management information identifying a power management trigger associated with the wearable device, and the wearable device being different from the device; detect the power management trigger associated with the wearable device; and prevent, based on detecting the power management trigger, transmissions by the device to the wearable device, the transmissions being associated with notifications for an application executing on the wearable device, the power management information indicating that the device is to prevent the transmissions associated with the notifications for the application. 9. The computer-readable medium of claim 8, where the one or more instructions, when executed by the one or more processors, further cause the one or more processors to: determine a remaining battery life of the wearable device; compare the remaining battery life of the wearable device to a power threshold, the power management information identifying the power threshold; and where the one or more instructions, after causing the one or more processors to detect the power management trigger, cause the one or more processors to: detect the power management trigger based on comparing the remaining battery life and the power threshold. 10. The computer-readable medium of claim 8, where the one or more instructions, after causing the one or more processors to detect the power management trigger, further cause the one or more processors to: cause the wearable device to be disabled from communicating using a particular wireless communication method. 11. The computer-readable medium of claim 8, where the one or more instructions, that cause the one or more processors to detect the power management trigger, further cause the one or more processors to: cause the wearable device to switch to a grayscale mode; cause a brightness configuration associated with the wearable device to be modified; or cause a backlight timer configuration associated with the wearable device to be modified. 12. The computer-readable medium of claim 8, where the transmissions are first transmissions, the notifications are first notifications, and the application is a first application, where the one or more instructions, after causing the one or more processors to detect the power management trigger, further cause the one or more processors to: allow second transmissions by the device, the second transmissions being associated with second notifications for a second application executing on the wearable device, the power management information indicating that the device is to allow the second transmissions associated with the second notifications for the second application while preventing the first transmissions associated with the first notifications for the first application. 13. The computer-readable medium of claim 8, where the transmissions are first transmissions and the notifications are first notifications, where the one or more instructions, after causing the one or more processors to detect the power management trigger, further cause the one or more processors to: allow second transmissions by the device, the second transmissions being associated with second notifications for the application executing on the wearable device, the power management information indicating that the device is to allow the second transmissions associated with the second notifications for the application while preventing the first transmissions associated with the first notifications for the application. 14. The computer-readable medium of claim 8, where the one or more instructions, that cause the one or more processors to receive the power management information, cause the one or more processors to: receive the power management information based on information provided by an administrative device associated with remotely managing the wearable device. 15. A method, comprising: receiving, by a device, power management information associated with a wearable device, the power management information identifying a power management trigger associated with the wearable device, and the wearable device being different from the device; detecting, by the device, the power management trigger associated with the wearable device; and preventing, by the device and based on detecting the power management trigger, transmissions by the device to the wearable device, the transmissions being associated with notifications for an application executing on the wearable device, the power management information indicating that the device is to prevent the transmissions associated with the notifications for the application. 16. The method of claim 15, further comprising: determining a remaining battery life of the wearable device; comparing the remaining battery life of the wearable device to a power threshold, the power management information identifying the power threshold; and where detecting the power management trigger comprises: detecting the power management trigger based on comparing the remaining battery life and the power threshold. 17. The method of claim 15, further comprising: causing, after detecting the power management trigger, the wearable device to be disabled from communicating using a particular wireless communication method. 18. The method of claim 15, where the transmissions are first transmissions, the notifications are first notifications, and the application is a first application, where, after detecting the power management trigger, the method further comprises: allowing second transmissions by the device, the second transmissions being associated with second notifications for a second application executing on the wearable device, the power management information indicating that the device is to allow the second transmissions associated with the second notifications for the second application while preventing the first transmissions associated with the first notifications for the first application. 19. The method of claim 15, where the transmissions are first transmissions and the notifications are first notifications, where, after detecting the power management trigger, the method further comprises: allowing second transmissions by the device, the second transmissions being associated with second notifications for the application executing on the wearable device, the power management information indicating that the device is to allow the second transmissions associated with the second notifications for the application while preventing the first transmissions associated with the first notifications for the application. 20. The method of claim 15, further comprising: receiving user input associated with the power management information; and where receiving the power management information further comprises: receiving the power management information based on the user input.
2,400
8,098
8,098
15,472,861
2,434
An anomaly-based intrusion detection system is presented for use in vehicle networks. The intrusion detection system measures and exploits the intervals of periodic in-vehicle messages for fingerprinting electronic control units. Fingerprints are then used for constructing a baseline of clock behaviors, for example with a Recursive Least Squares algorithm. Based on the baseline, the intrusion detection system uses cumulative sum to detect any abnormal shifts in the identification errors—a clear sign of an intrusion. This approach allows quick identification of in-vehicle network intrusions with low false positive rates.
1. A method for detecting intrusions in a vehicle network, comprising: receiving, by a recipient electronic control unit (ECU), a plurality of messages from a transmitting ECU, where the plurality of messages are transmitted periodically from the transmitting ECU via the vehicle network to the recipient ECU and the plurality of messages do not include any timestamp information from the transmitting ECU; determining, by the recipient ECU, a clock skew for the transmitting ECU from the plurality of messages; detecting, by the recipient ECU, a sudden change in the clock skew for the transmitting ECU by comparing the clock skew for the transmitting ECU to a baseline value for the clock skew of the transmitting ECU; and identifying, by the recipient ECU, the transmitting ECU as compromised in response to detecting a sudden change in the clock skew for the transmitting ECU. 2. The method of claim 1 wherein determining clock skew further comprises determining, by the recipient ECU, a clock offset for each message in the plurality of messages, where clock offset is determined in relation to a first message received from amongst the plurality of messages; determining, by the recipient ECU, an accumulated clock offset for the plurality of messages by summing the determined clock offsets together; and determining, by the recipient ECU, slope of the accumulated clock offset. 3. The method of claim 1 further comprises determining the baseline value for the clock skew of the transmitting ECU from additional messages transmitted by the transmitting ECU and receive by the recipient ECU prior to the receipt of the plurality of messages. 4. The method of claim 3 further comprises determining a baseline value for the clock skew of the transmitting ECU using linear regression. 5. The method of claim 3 further comprises determining a baseline value for the clock skew of the transmitting ECU using a total least squares method. 6. The method of claim 1 further comprises detecting a sudden change between the accumulated clock offset and the baseline clock offset using a cumulative sum method. 7. The method of claim 1 further comprises disabling the transmitting ECU in response to detecting a sudden change in the clock skew for the transmitting ECU. 8. A method for detecting a compromised electronic control unit in a vehicle network, comprising: receiving, by a recipient electronic control unit (ECU), a plurality of messages from a transmitting ECU, where the plurality of message are transmitted from the transmitting ECU via the vehicle network to the recipient ECU; determining, by the recipient ECU, a clock offset for each message in the plurality of messages, where clock offset is determined in relation to a first message received from amongst the plurality of messages; determining, by the recipient ECU, an accumulated clock offset for the plurality of messages by summing the determined clock offsets together; computing, by the recipient ECU, a difference between the accumulated clock offset to a baseline clock offset; detecting, by the recipient ECU, a sudden change in difference between the accumulated clock offset and the baseline clock offset; and identifying, by the recipient ECU, the transmitting ECU as compromised in response to detecting a sudden change in the differences between the accumulated clock offset and the baseline clock offset. 9. The method of claim 8 wherein determining clock offset further comprises calculating a difference between an estimated arrival time for a given message and an actual arrival time for the given message. 10. The method of claim 9 wherein the baseline clock offset is derived in part from messages from the transmitting ECU received by the recipient ECU prior to receiving the plurality of messages, 11. The method of claim 10 further comprises updating the baseline clock offset using a recursive least squares method. 12. The method of claim 11 further comprises determining an identification error between the accumulated clock offset and the baseline clock offset and updating the baseline clock offset as a function of the identification error, where the identification error is a difference between the accumulated clock offset and a product of the baseline clock offset and the elapsed time for transmitting the plurality of messages. 13. The method of claim 12 wherein detecting a sudden change between the accumulated clock offset and the baseline clock offset using a cumulative sum method. 14. The method of claim 13 further comprises computing a limit for the identification error as a function of a difference between the identification error and a mean of the identification error divided by variance of the identification error. 15. A non-transitory computer storage medium associated with a recipient electronic control unit (ECU) in a vehicle network and with instructions stored thereon, that when executed by a processor, perform the steps comprising: receiving a plurality of messages from a transmitting ECU, where the plurality of message are transmitted from the transmitting ECU via the vehicle network to the recipient ECU; determining clock offset for each message in the plurality of messages, where clock offset is determined in relation to a first message received from amongst the plurality of messages; determining an accumulated clock offset for the plurality of messages by summing the determined clock offsets together; computing a difference between the accumulated clock offset to a baseline clock offset; detecting a sudden change in difference between the accumulated clock offset and the baseline clock offset; and identifying the transmitting ECU as compromised in response to detecting a sudden change in the differences between the accumulated clock offset and the baseline clock offset. 16. The non-transitory computer storage medium of claim 15 wherein determining clock offset further comprises calculating a difference between an estimated arrival time for a given message and an actual arrival time for the given message. 17. The non-transitory computer storage medium of claim 16 wherein the baseline clock offset is derived in part from messages from the transmitting ECU received by the recipient ECU prior to receiving the plurality of messages, 18. The non-transitory computer storage medium of claim 17 further comprises updating the baseline clock offset using a recursive least squares method. 19. The non-transitory computer storage medium of claim 18 further comprises determining an identification error between the accumulated clock offset and the baseline clock offset and updating the baseline clock offset as a function of the identification error, where the identification error is a difference between the accumulated clock offset and a product of the baseline clock offset and the elapsed time for transmitting the plurality of messages. 20. The non-transitory computer storage medium of claim 19 wherein detecting a sudden change between the accumulated clock offset and the baseline clock offset using a cumulative sum method.
An anomaly-based intrusion detection system is presented for use in vehicle networks. The intrusion detection system measures and exploits the intervals of periodic in-vehicle messages for fingerprinting electronic control units. Fingerprints are then used for constructing a baseline of clock behaviors, for example with a Recursive Least Squares algorithm. Based on the baseline, the intrusion detection system uses cumulative sum to detect any abnormal shifts in the identification errors—a clear sign of an intrusion. This approach allows quick identification of in-vehicle network intrusions with low false positive rates.1. A method for detecting intrusions in a vehicle network, comprising: receiving, by a recipient electronic control unit (ECU), a plurality of messages from a transmitting ECU, where the plurality of messages are transmitted periodically from the transmitting ECU via the vehicle network to the recipient ECU and the plurality of messages do not include any timestamp information from the transmitting ECU; determining, by the recipient ECU, a clock skew for the transmitting ECU from the plurality of messages; detecting, by the recipient ECU, a sudden change in the clock skew for the transmitting ECU by comparing the clock skew for the transmitting ECU to a baseline value for the clock skew of the transmitting ECU; and identifying, by the recipient ECU, the transmitting ECU as compromised in response to detecting a sudden change in the clock skew for the transmitting ECU. 2. The method of claim 1 wherein determining clock skew further comprises determining, by the recipient ECU, a clock offset for each message in the plurality of messages, where clock offset is determined in relation to a first message received from amongst the plurality of messages; determining, by the recipient ECU, an accumulated clock offset for the plurality of messages by summing the determined clock offsets together; and determining, by the recipient ECU, slope of the accumulated clock offset. 3. The method of claim 1 further comprises determining the baseline value for the clock skew of the transmitting ECU from additional messages transmitted by the transmitting ECU and receive by the recipient ECU prior to the receipt of the plurality of messages. 4. The method of claim 3 further comprises determining a baseline value for the clock skew of the transmitting ECU using linear regression. 5. The method of claim 3 further comprises determining a baseline value for the clock skew of the transmitting ECU using a total least squares method. 6. The method of claim 1 further comprises detecting a sudden change between the accumulated clock offset and the baseline clock offset using a cumulative sum method. 7. The method of claim 1 further comprises disabling the transmitting ECU in response to detecting a sudden change in the clock skew for the transmitting ECU. 8. A method for detecting a compromised electronic control unit in a vehicle network, comprising: receiving, by a recipient electronic control unit (ECU), a plurality of messages from a transmitting ECU, where the plurality of message are transmitted from the transmitting ECU via the vehicle network to the recipient ECU; determining, by the recipient ECU, a clock offset for each message in the plurality of messages, where clock offset is determined in relation to a first message received from amongst the plurality of messages; determining, by the recipient ECU, an accumulated clock offset for the plurality of messages by summing the determined clock offsets together; computing, by the recipient ECU, a difference between the accumulated clock offset to a baseline clock offset; detecting, by the recipient ECU, a sudden change in difference between the accumulated clock offset and the baseline clock offset; and identifying, by the recipient ECU, the transmitting ECU as compromised in response to detecting a sudden change in the differences between the accumulated clock offset and the baseline clock offset. 9. The method of claim 8 wherein determining clock offset further comprises calculating a difference between an estimated arrival time for a given message and an actual arrival time for the given message. 10. The method of claim 9 wherein the baseline clock offset is derived in part from messages from the transmitting ECU received by the recipient ECU prior to receiving the plurality of messages, 11. The method of claim 10 further comprises updating the baseline clock offset using a recursive least squares method. 12. The method of claim 11 further comprises determining an identification error between the accumulated clock offset and the baseline clock offset and updating the baseline clock offset as a function of the identification error, where the identification error is a difference between the accumulated clock offset and a product of the baseline clock offset and the elapsed time for transmitting the plurality of messages. 13. The method of claim 12 wherein detecting a sudden change between the accumulated clock offset and the baseline clock offset using a cumulative sum method. 14. The method of claim 13 further comprises computing a limit for the identification error as a function of a difference between the identification error and a mean of the identification error divided by variance of the identification error. 15. A non-transitory computer storage medium associated with a recipient electronic control unit (ECU) in a vehicle network and with instructions stored thereon, that when executed by a processor, perform the steps comprising: receiving a plurality of messages from a transmitting ECU, where the plurality of message are transmitted from the transmitting ECU via the vehicle network to the recipient ECU; determining clock offset for each message in the plurality of messages, where clock offset is determined in relation to a first message received from amongst the plurality of messages; determining an accumulated clock offset for the plurality of messages by summing the determined clock offsets together; computing a difference between the accumulated clock offset to a baseline clock offset; detecting a sudden change in difference between the accumulated clock offset and the baseline clock offset; and identifying the transmitting ECU as compromised in response to detecting a sudden change in the differences between the accumulated clock offset and the baseline clock offset. 16. The non-transitory computer storage medium of claim 15 wherein determining clock offset further comprises calculating a difference between an estimated arrival time for a given message and an actual arrival time for the given message. 17. The non-transitory computer storage medium of claim 16 wherein the baseline clock offset is derived in part from messages from the transmitting ECU received by the recipient ECU prior to receiving the plurality of messages, 18. The non-transitory computer storage medium of claim 17 further comprises updating the baseline clock offset using a recursive least squares method. 19. The non-transitory computer storage medium of claim 18 further comprises determining an identification error between the accumulated clock offset and the baseline clock offset and updating the baseline clock offset as a function of the identification error, where the identification error is a difference between the accumulated clock offset and a product of the baseline clock offset and the elapsed time for transmitting the plurality of messages. 20. The non-transitory computer storage medium of claim 19 wherein detecting a sudden change between the accumulated clock offset and the baseline clock offset using a cumulative sum method.
2,400
8,099
8,099
14,454,150
2,454
Methods of managing an information technology (IT) infrastructure include detecting by a configuration management system an unauthorized change to one of a plurality of network elements, determining by the configuration management system that the unauthorized change to the one of the plurality of network elements creates a risk condition to an operation of one of the services provided by the IT infrastructure, and initiating an action to remedy the unauthorized change in response to determining that the unauthorized change to the one of the plurality of network elements creates the risk condition to the operation of one of the services provided by the IT infrastructure. Related systems and computer program products are disclosed.
1. A method of managing an information technology (IT) infrastructure comprising a plurality of interconnected network elements that are configured to provide services to clients of the IT infrastructure, a configuration management system that manages elements of the IT infrastructure, and a service management system that monitors operation of services provided by the IT infrastructure, the method comprising: detecting by the configuration management system an unauthorized change to one of the plurality of network elements; determining by the configuration management system that the unauthorized change to the one of the plurality of network elements creates a risk condition to an operation of one of the services provided by the IT infrastructure; and initiating an action to remedy the unauthorized change in response to determining that the unauthorized change to the one of the plurality of network elements creates the risk condition to the operation of one of the services provided by the IT infrastructure. 2. The method of claim 1, further comprising: determining by the configuration management system the identity of the one of the services provided by the IT infrastructure that utilizes the one of the plurality of network elements. 3. The method of claim 1, further comprising: notifying the service management system of the unauthorized change to one of the plurality of network elements. 4. The method of claim 3, wherein notifying the service management system of the unauthorized change to the one of the plurality of network elements comprises notifying the service management system of a potential effect of the unauthorized change to the one of the plurality of network elements. 5. The method of claim 4, wherein the potential effect comprises a reduction in redundancy, capacity, and/or security within the IT infrastructure. 6. The method of claim 1, further comprising: determining by the configuration management system that the unauthorized change to the one of the plurality of network elements affects an operation of a plurality of the services; and notifying a plurality of service management systems that monitor operation of the plurality of the services of the unauthorized change to the one of the plurality of network elements. 7. The method of claim 1, wherein detecting the unauthorized change to the one of the plurality of network elements comprises detecting an unauthorized change of location of the one of the plurality of network elements. 8. The method of claim 7, wherein the location of the one of the plurality of network elements comprises a physical location of the one of the plurality of network elements. 9. The method of claim 7, wherein the location of the one of the plurality of network elements comprises a virtual location of the one of the plurality of network elements. 10. The method of claim 7, wherein detecting the unauthorized change of location of the one of the plurality of network elements comprises detecting the unauthorized change of location of the one of the plurality of network elements using geolocation based on an IP address of the one of the plurality of network elements. 11. The method of claim 1, wherein detecting the unauthorized change of location of the one of the plurality of network elements comprises detecting the unauthorized change of location of the one of the plurality of network elements in real time. 12. The method of claim 1, wherein detecting the unauthorized change of the one of the plurality of network elements comprises detecting an unauthorized change in a configuration of the one of the plurality of network elements. 13. The method of claim 1, wherein detecting the unauthorized change of the one of the plurality of network elements comprises detecting a change in the one of the plurality of network elements, and comparing the detected change in the one of the plurality of network elements to a record of planned changes for the one of the plurality of network elements. 14. The method of claim 1, wherein the one of the plurality of network elements comprises an application program, and wherein detecting the unauthorized change of the one of the plurality of network elements comprises detecting an unauthorized change in a configuration of the application program. 15. The method of claim 1, further comprising halting the one of the services in response to determining that the unauthorized change to the one of the plurality of network elements affects the operation of the one of the services. 16. The method of claim 1, further comprising initiating a work flow process to roll back the unauthorized change to the one of the plurality of network elements in response to determining that the unauthorized change to the one of the plurality of network elements affects the operation of the one of the services. 17. The method of claim 1, wherein determining that the unauthorized change to the one of the plurality of network elements affects an operation of the one of the services comprises determining that the unauthorized change to the one of the plurality of network elements increases an operation risk to the one of the services. 18. The method of claim 17, wherein the operational risk comprises a reduction in redundancy of a function provided by the one of the plurality of network elements. 19. The method of claim 17, wherein the operational risk comprises a reduction in security of a function provided by the one of the plurality of network elements. 20. A configuration management system that manages a plurality of interconnected network elements in an information technology (IT) infrastructure, the configuration management system comprising: a processor; an i/o device coupled to the processor; and a memory coupled to the processor; wherein the memory comprises computer readable instructions configured to cause the processor to carry out the steps of: detecting an unauthorized change to one of the plurality of network elements; determining that the unauthorized change to the one of the plurality of network elements affects an operation of a service provided by the IT infrastructure; and notifying a service management system that monitors operation of services provided by the IT infrastructure of the unauthorized change to the one of the plurality of network elements.
Methods of managing an information technology (IT) infrastructure include detecting by a configuration management system an unauthorized change to one of a plurality of network elements, determining by the configuration management system that the unauthorized change to the one of the plurality of network elements creates a risk condition to an operation of one of the services provided by the IT infrastructure, and initiating an action to remedy the unauthorized change in response to determining that the unauthorized change to the one of the plurality of network elements creates the risk condition to the operation of one of the services provided by the IT infrastructure. Related systems and computer program products are disclosed.1. A method of managing an information technology (IT) infrastructure comprising a plurality of interconnected network elements that are configured to provide services to clients of the IT infrastructure, a configuration management system that manages elements of the IT infrastructure, and a service management system that monitors operation of services provided by the IT infrastructure, the method comprising: detecting by the configuration management system an unauthorized change to one of the plurality of network elements; determining by the configuration management system that the unauthorized change to the one of the plurality of network elements creates a risk condition to an operation of one of the services provided by the IT infrastructure; and initiating an action to remedy the unauthorized change in response to determining that the unauthorized change to the one of the plurality of network elements creates the risk condition to the operation of one of the services provided by the IT infrastructure. 2. The method of claim 1, further comprising: determining by the configuration management system the identity of the one of the services provided by the IT infrastructure that utilizes the one of the plurality of network elements. 3. The method of claim 1, further comprising: notifying the service management system of the unauthorized change to one of the plurality of network elements. 4. The method of claim 3, wherein notifying the service management system of the unauthorized change to the one of the plurality of network elements comprises notifying the service management system of a potential effect of the unauthorized change to the one of the plurality of network elements. 5. The method of claim 4, wherein the potential effect comprises a reduction in redundancy, capacity, and/or security within the IT infrastructure. 6. The method of claim 1, further comprising: determining by the configuration management system that the unauthorized change to the one of the plurality of network elements affects an operation of a plurality of the services; and notifying a plurality of service management systems that monitor operation of the plurality of the services of the unauthorized change to the one of the plurality of network elements. 7. The method of claim 1, wherein detecting the unauthorized change to the one of the plurality of network elements comprises detecting an unauthorized change of location of the one of the plurality of network elements. 8. The method of claim 7, wherein the location of the one of the plurality of network elements comprises a physical location of the one of the plurality of network elements. 9. The method of claim 7, wherein the location of the one of the plurality of network elements comprises a virtual location of the one of the plurality of network elements. 10. The method of claim 7, wherein detecting the unauthorized change of location of the one of the plurality of network elements comprises detecting the unauthorized change of location of the one of the plurality of network elements using geolocation based on an IP address of the one of the plurality of network elements. 11. The method of claim 1, wherein detecting the unauthorized change of location of the one of the plurality of network elements comprises detecting the unauthorized change of location of the one of the plurality of network elements in real time. 12. The method of claim 1, wherein detecting the unauthorized change of the one of the plurality of network elements comprises detecting an unauthorized change in a configuration of the one of the plurality of network elements. 13. The method of claim 1, wherein detecting the unauthorized change of the one of the plurality of network elements comprises detecting a change in the one of the plurality of network elements, and comparing the detected change in the one of the plurality of network elements to a record of planned changes for the one of the plurality of network elements. 14. The method of claim 1, wherein the one of the plurality of network elements comprises an application program, and wherein detecting the unauthorized change of the one of the plurality of network elements comprises detecting an unauthorized change in a configuration of the application program. 15. The method of claim 1, further comprising halting the one of the services in response to determining that the unauthorized change to the one of the plurality of network elements affects the operation of the one of the services. 16. The method of claim 1, further comprising initiating a work flow process to roll back the unauthorized change to the one of the plurality of network elements in response to determining that the unauthorized change to the one of the plurality of network elements affects the operation of the one of the services. 17. The method of claim 1, wherein determining that the unauthorized change to the one of the plurality of network elements affects an operation of the one of the services comprises determining that the unauthorized change to the one of the plurality of network elements increases an operation risk to the one of the services. 18. The method of claim 17, wherein the operational risk comprises a reduction in redundancy of a function provided by the one of the plurality of network elements. 19. The method of claim 17, wherein the operational risk comprises a reduction in security of a function provided by the one of the plurality of network elements. 20. A configuration management system that manages a plurality of interconnected network elements in an information technology (IT) infrastructure, the configuration management system comprising: a processor; an i/o device coupled to the processor; and a memory coupled to the processor; wherein the memory comprises computer readable instructions configured to cause the processor to carry out the steps of: detecting an unauthorized change to one of the plurality of network elements; determining that the unauthorized change to the one of the plurality of network elements affects an operation of a service provided by the IT infrastructure; and notifying a service management system that monitors operation of services provided by the IT infrastructure of the unauthorized change to the one of the plurality of network elements.
2,400